text
stringlengths
144
682k
Firefighter injury prevention is about working smarter Using the right tools to overcome physical obstacles is the first step to reducing the most common fireground injuries The most common injuries to firefighters both on the fireground and in training involve sprained joints and muscles and ligaments that are strained or over exerted. There have been many campaigns to educate and train firefighters to be aware of their work habits and to work smarter rather than harder. There is much merit and truth to "work smarter, not harder" when it comes to our line of work and service. Fire trucks are stocked with the newest and best tools and equipment to help with our day-to-day operations. When using the right tool or equipment, firefighters can get a lot accomplished in a short period of time and avoid placing added stress on their bodies. The accompanying video shows an example of using the body rather than the proper tools or equipment to try to accomplish a task. When watching the video, focus on the efforts to open the garage door. You will witness two firefighters trying to forcibly open a garage door by using their feet and bodies. The outcome is evident by the video and we are not sure if the two firefighters suffered any injuries as a result. The question is: How could this have been avoided and the task of opening the garage door been accomplished? Having the right tools for the job is the answer. Tool time In this case, a set of forcible-entry tools such as a rotary saw and a roof hook or a pike pole would have been helpful. The garage door could have been cut open with the saw while the roof hook was used to pull or hold the door away during the cut. There are different ways to approach this with a rotary saw as far as style or sequence of cuts are concerned. But the main point is that the rotary saw would have taken the brunt of the physical work or stress of opening up the garage door rather than the firefighters' feet, leg bones, backs and joints. What would have happened if one of the firefighters were hurt while kicking the door open? They would have needed another firefighter to replace the injured firefighter on the hose line. If the injury was serious enough, it would mean shift changes and overtime for a career department or a staff shortage for a volunteer department. A rotary saw is eventually brought to the garage door. But by that time, the garage door was opened by the kicking operation. Had the saw been deployed sooner as part of proactive fireground operations, the garage door would have been opened a lot sooner and with a lot less stress on the feet. Recommended for you Join the discussion Copyright © 2022 FireRescue1. All rights reserved.
Examples Of Moral Decay In The Great Gatsby Good Essays In The Great Gatsby by Scott Fitzgerald, one of the characters is “stuck in the past”. Throughout the novel, Gatsby is constantly longing for a past relationship he had with a woman named Daisy, who moved on from Gatsby and married another man when Gatsby left for the war. Gatsby’s view of the past is used to develop a major theme of the novel: the moral decay of society. The novel begins with Nick, the narrator saying how the events that happened in New York, where the novel takes place, caused him to leave, and how he doesn’t like any of the people he was involved with. As the novel progresses, Nick becomes friends with a man named Gatsby, who is viewed as a mysterious figure to outsiders. Nick finds out his second cousin once removed, Daisy was once in love with Gatsby. Unfortunately for Gatsby, Daisy was more focused on money and the social power, so when he went to war, she did not wait for him, and instead married Tom Buchanan who had lots of “old” money. This shows the moral decay of society because Daisy left a man she loved (Gatsby) because she could not wait for him and he did not have the money. The name Daisy itself shows moral decay because in the novel the color yellow symbolizes moral decay. A daisy (flower) is white and pretty on the outside “She (Daisy) dressed in white and had a little white roadster” (79), but yellow on the inside, just like Daisy in the novel. Gatsby saw the white in Daisy because he was stuck in the past, and he saw her as the girl he Get Access
Umbilical cord In placental mammals, the umbilical cord (also called the navel string,[1] birth cord or funiculus umbilicalis) is a conduit between the developing embryo or fetus and the placenta. During prenatal development, the umbilical cord is physiologically and genetically part of the fetus and (in humans) normally contains two arteries (the umbilical arteries) and one vein (the umbilical vein), buried within Wharton's jelly. The umbilical vein supplies the fetus with oxygenated, nutrient-rich blood from the placenta. Conversely, the fetal heart pumps low-oxygen, nutrient-depleted blood through the umbilical arteries back to the placenta. Umbilical cord Umbilical cord of a three-minute-old baby. A medical clamp has been applied. Latinfuniculus umbilicalis TEcord_by_E6. E6. Anatomical terminology [edit on Wikidata] Structure and developmentEdit Cross section of the umbilical cord. Vaginal ultrasonography of an embryo of a gestational age of 8 weeks and 3 days. The embryo is surrounded by the thin membranes of the amniotic sac, the umbilical cord is seen in the center, attaching the embryo to the placenta. The umbilical cord develops from and contains remnants of the yolk sac and allantois. It forms by the fifth week of development, replacing the yolk sac as the source of nutrients for the embryo.[2] The cord is not directly connected to the mother's circulatory system, but instead joins the placenta, which transfers materials to and from the maternal blood without allowing direct mixing. The length of the umbilical cord is approximately equal to the crown-rump length of the fetus throughout pregnancy. The umbilical cord in a full term neonate is usually about 50 centimeters (20 in) long and about 2 centimeters (0.75 in) in diameter. This diameter decreases rapidly within the placenta. The fully patent umbilical artery has two main layers: an outer layer consisting of circularly arranged smooth muscle cells and an inner layer which shows rather irregularly and loosely arranged cells embedded in abundant ground substance staining metachromatic.[3] The smooth muscle cells of the layer are rather poorly differentiated, contain only a few tiny myofilaments and are thereby unlikely to contribute actively to the process of post-natal closure.[3] Umbilical cord can be detected on ultrasound by 6 weeks of gestation and well-visualised by 8 to 9 weeks of gestation.[4] The umbilical cord lining is a good source of mesenchymal and epithelial stem cells. Umbilical cord mesenchymal stem cells (UC-MSC) have been used clinically to treat osteoarthritis, autoimmune diseases, and multiple other conditions. Their advantages include a better harvesting, and multiplication, and immunosuppressive properties that define their potential for use in transplantations. Their use would also overcome the ethical objections raised by the use of embryonic stem cells.[5] The umbilical cord contains Wharton's jelly, a gelatinous substance made largely from mucopolysaccharides that protects the blood vessels inside. It contains one vein, which carries oxygenated, nutrient-rich blood to the fetus, and two arteries that carry deoxygenated, nutrient-depleted blood away.[6] Occasionally, only two vessels (one vein and one artery) are present in the umbilical cord. This is sometimes related to fetal abnormalities, but it may also occur without accompanying problems. It is unusual for a vein to carry oxygenated blood and for arteries to carry deoxygenated blood (the only other examples being the pulmonary veins and arteries, connecting the lungs to the heart). However, this naming convention reflects the fact that the umbilical vein carries blood towards the fetus's heart, while the umbilical arteries carry blood away. The blood flow through the umbilical cord is approximately 35 ml / min at 20 weeks, and 240 ml / min at 40 weeks of gestation.[7] Adapted to the weight of the fetus, this corresponds to 115 ml / min / kg at 20 weeks and 64 ml / min / kg at 40 weeks.[7] For terms of location, the proximal part of an umbilical cord refers to the segment closest to the embryo or fetus in embryology and fetal medicine, and closest to the placenta in placental pathology, and opposite for the distal part, respectively.[8] Connection to fetal circulatory systemEdit The umbilical cord enters the fetus via the abdomen, at the point which (after separation) will become the umbilicus (or navel). Within the fetus, the umbilical vein continues towards the transverse fissure of the liver, where it splits into two. One of these branches joins with the hepatic portal vein (connecting to its left branch), which carries blood into the liver. The second branch (known as the ductus venosus) bypasses the liver and flows into the inferior vena cava, which carries blood towards the heart. The two umbilical arteries branch from the internal iliac arteries and pass on either side of the urinary bladder into the umbilical cord, completing the circuit back to the placenta.[9] Changes after birthEdit After birth, the umbilical cord stump will dry up and drop away by the time the baby is three weeks old.[10][11] If the stump still has not separated after three weeks, it might be a sign of an underlying problem, such as an infection or immune system disorder.[11] In absence of external interventions, the umbilical cord occludes physiologically shortly after birth, explained both by a swelling and collapse of Wharton's jelly in response to a reduction in temperature and by vasoconstriction of the blood vessels by smooth muscle contraction. In effect, a natural clamp is created, halting the flow of blood. In air at 18 °C, this physiological clamping will take three minutes or less.[12] In water birth, where the water temperature is close to body temperature, normal pulsation can be 5 minutes and longer. Closure of the umbilical artery by vasoconstriction consists of multiple constrictions which increase in number and degree with time. There are segments of dilatations with trapped uncoagulated blood between the constrictions before complete occlusion.[13] Both the partial constrictions and the ultimate closure are mainly produced by muscle cells of the outer circular layer.[3] In contrast, the inner layer seems to serve mainly as a plastic tissue which can easily be shifted in an axial direction and then folded into the narrowing lumen to complete the closure.[3] The vasoconstrictive occlusion appears to be mainly mediated by serotonin[14][15] and thromboxane A2.[14] The artery in cords of preterm infants contracts more to angiotensin II and arachidonic acid and is more sensitive to oxytocin than in term ones.[15] In contrast to the contribution of Wharton's jelly, cooling causes only temporary vasoconstriction.[15] Within the child, the umbilical vein and ductus venosus close up, and degenerate into fibrous remnants known as the round ligament of the liver and the ligamentum venosum respectively. Part of each umbilical artery closes up (degenerating into what are known as the medial umbilical ligaments), while the remaining sections are retained as part of the circulatory system. Clinical significanceEdit Problems and abnormalitiesEdit A knotted cord on a newborn baby A number of abnormalities can affect the umbilical cord, which can cause problems that affect both mother and child:[16] Clamping and cuttingEdit The umbilical cord is about to be cut with scissors via cesarean section Umbilical cord clamp A day-old baby with its cord stump still attached. A 7 cm (2.75 in) long detached umbilical cord. The cord can be clamped at different times; however, delaying the clamping of the umbilical cord until at least one minute after birth improves outcomes as long as there is the ability to treat the small risk of jaundice if it occurs.[19] Clamping is followed by cutting of the cord, which is painless due to the absence of nerves. The cord is extremely tough, like thick sinew, and so cutting it requires a suitably sharp instrument. While umbilical severance may be delayed until after the cord has stopped pulsing (1–3 minutes after birth), there is ordinarily no significant loss of either venous or arterial blood while cutting the cord. Current evidence neither supports, nor refutes, delayed cutting of the cord, according to the American Congress of Obstetricians and Gynecologists (ACOG) guidelines. There are umbilical cord clamps which incorporate a knife. These clamps are safer and faster, allowing one to first apply the cord clamp and then cut the umbilical cord. After the cord is clamped and cut, the newborn wears a plastic clip on the navel area until the compressed region of the cord has dried and sealed sufficiently. The length of umbilical left attached to the newborn varies by practice; in most hospital settings the length of cord left attached after clamping and cutting is minimal. In the United States, however, where the birth occurred outside of the hospital and an emergency medical technician (EMT) clamps and cuts the cord, a longer segment up to 18 cm (7 in) in length[20][21] is left attached to the newborn. The remaining umbilical stub remains for up to 10 days as it dries and then falls off. Early versus delayed clampingEdit A Cochrane review in 2013 came to the conclusion that delayed cord clamping (between one and three minutes after birth) is "likely to be beneficial as long as access to treatment for jaundice requiring phototherapy is available".[22] In this review delayed clamping, as contrasted to early, resulted in no difference in risk of severe maternal postpartum hemorrhage or neonatal mortality, and a low Apgar score. On the other hand, delayed clamping resulted in an increased birth weight of on average about 100 g, and an increased hemoglobin concentration of on average 1.5 g/dL with half the risk of being iron deficient at three and six months, but an increased risk of jaundice requiring phototherapy.[22] In 2012, the American College of Obstetricians and Gynecologists officially endorsed delaying clamping of the umbilical cord for 30–60 seconds with the newborn held below the level of the placenta in all cases of preterm delivery based largely on evidence that it reduces the risk of intraventricular hemorrhage in these children by 50%.[23][obsolete source] In the same committee statement, ACOG also recognize several other likely benefits for preterm infants, including "improved transitional circulation, better establishment of red blood cell volume, and decreased need for blood transfusion". In January 2017, a revised Committee Opinion extended the recommendation to term infants, citing data that term infants benefit from increased hemoglobin levels in the newborn period and improved iron stores in the first months of life, which may result in improved developmental outcomes. ACOG recognized a small increase in the incidence of jaundice in term infants with delayed cord clamping, and recommended policies be in place to monitor for and treat neonatal jaundice. ACOG also noted that delayed cord clamping is not associated with increased risk of postpartum hemorrhage.[24] Several studies have shown benefits of delayed cord clamping: A meta-analysis[25] showed that delaying clamping of the umbilical cord in full-term neonates for a minimum of 2 minutes following birth is beneficial to the newborn in giving improved hematocrit, iron status as measured by ferritin concentration and stored iron, as well as a reduction in the risk of anemia (relative risk, 0.53; 95% CI, 0.40–0.70).[25] A decrease was also found in a study from 2008.[26] Although there is higher hemoglobin level at 2 months, this effect did not persist beyond 6 months of age.[27] Not clamping the cord for three minutes following the birth of a baby improved outcomes at four years of age.[28] A delay of three minutes or more in umbilical cord clamping after birth reduce the prevalence of anemia in infants.[29] Negative effects of delayed cord clamping include an increased risk of polycythemia. Still, this condition appeared to be benign in studies.[25] Infants whose cord clamping occurred later than 60 seconds after birth had a higher rate of neonatal jaundice requiring phototherapy.[27] Delayed clamping is not recommended as a response to cases where the newborn is not breathing well and needs resuscitation. Rather, the recommendation is instead to immediately clamp and cut the cord and perform cardiopulmonary resuscitation.[30] The umbilical cord pulsating is not a guarantee that the baby is receiving enough oxygen.[31] Umbilical nonseveranceEdit Some parents choose to omit cord severance entirely, a practice called "lotus birth" or umbilical nonseverance. The entire intact umbilical cord is allowed to dry and separates on its own (typically on the 3rd day after birth), falling off and leaving a healed umbilicus.[32] Umbilical cord catheterizationEdit As the umbilical vein is directly connected to the central circulation, it can be used as a route for placement of a venous catheter for infusion and medication. The umbilical vein catheter is a reliable alternative to percutaneous peripheral or central venous catheters or intraosseous canulas and may be employed in resuscitation or intensive care of the newborn. Blood samplingEdit Storage of cord bloodEdit The blood within the umbilical cord, known as cord blood, is a rich and readily available source of primitive, undifferentiated stem cells (of type CD34-positive and CD38-negative). These cord blood cells can be used for bone marrow transplant. Some parents choose to have this blood diverted from the baby's umbilical blood transfer through early cord clamping and cutting, to freeze for long-term storage at a cord blood bank should the child ever require the cord blood stem cells (for example, to replace bone marrow destroyed when treating leukemia). This practice is controversial, with critics asserting that early cord blood withdrawal at the time of birth actually increases the likelihood of childhood disease, due to the high volume of blood taken (an average of 108ml) in relation to the baby's total supply (typically 300ml).[26] The Royal College of Obstetricians and Gynaecologists stated in 2006 that "there is still insufficient evidence to recommend directed commercial cord blood collection and stem-cell storage in low-risk families".[34] The American Academy of Pediatrics has stated that cord blood banking for self-use should be discouraged (as most conditions requiring the use of stem cells will already exist in the cord blood), while banking for general use should be encouraged.[35] In the future, cord blood-derived embryonic-like stem cells (CBEs) may be banked and matched with other patients, much like blood and transplanted tissues. The use of CBEs could potentially eliminate the ethical difficulties associated with embryonic stem cells (ESCs).[36] While the American Academy of Pediatrics discourages private banking except in the case of existing medical need, it also says that information about the potential benefits and limitations of cord blood banking and transplantation should be provided so that parents can make an informed decision. In the United States, cord blood education has been supported by legislators at the federal and state levels. In 2005, the National Academy of Sciences published an Institute of Medicine (IoM) report which recommended that expectant parents be given a balanced perspective on their options for cord blood banking. In response to their constituents, state legislators across the country are introducing legislation intended to help inform physicians and expectant parents on the options for donating, discarding or banking lifesaving newborn stem cells. Currently 17 states, representing two-thirds of U.S. births, have enacted legislation recommended by the IoM guidelines. The use of cord blood stem cells in treating conditions such as brain injury[37] and Type 1 Diabetes[38] is already being studied in humans, and earlier stage research is being conducted for treatments of stroke,[39][40] and hearing loss.[41] Cord blood stored with private banks is typically reserved for use of the donor child only. In contrast, cord blood stored in public banks is accessible to anyone with a closely matching tissue type and demonstrated need.[42] The use of cord blood from public banks is increasing. Currently it is used in place of a bone marrow transplant in the treatment of blood disorders such as leukemia, with donations released for transplant through one registry,,[43] passing 1,000,000 as of January 2013. Cord blood is used when the patient cannot find a matching bone marrow donor; this "extension" of the donor pool has driven the expansion of public banks. The umbilical cord in other animalsEdit The umbilical cord in some mammals, including cattle and sheep, contains two distinct umbilical veins. There is only one umbilical vein in the human umbilical cord.[44] In some animals, the mother will gnaw through the cord, thus separating the placenta from the offspring. The cord along with the placenta is often eaten by the mother, to provide nourishment and to dispose of tissues that would otherwise attract scavengers or predators.[citation needed] In chimpanzees, the mother leaves the cord in place and nurses her young with the cord and placenta attached until the cord dries out and separates naturally, within a day of birth, at which time the cord is discarded. (This was first documented by zoologists in the wild in 1974.[45]) Some species of sharkhammerheads, requiems and smooth-hounds—are viviparous and have an umbilical cord attached to their placenta.[46] Animals that lay eggs seem to have a false umbilical-cord that attaches the embryo and yolk together in much the same way.[citation needed] Other uses for the term "umbilical cord"Edit The term "umbilical cord" or just "umbilical" has also come to be used for other cords with similar functions, such as the hose connecting surface-supplied divers to their surface supply of air and/or heating, or space-suited astronauts to their spacecraft. Engineers sometimes use the term to describe a complex or critical cable connecting a component, especially when composed of bundles of conductors of different colors, thickness and types, terminating in a single multi-contact disconnect. Cancer-causing toxicants in human umbilical cordsEdit In multiple American and international studies, cancer-causing chemicals have been found in the blood of umbilical cords. These originate from certain plastics, computer circuit boards, fumes and synthetic fragrances among others. Over 300 chemical toxicants have been found, including bisphenol A (BPA), tetrabromobisphenol A (TBBPA), Teflon-related perfluorooctanoic acid, galaxolide and synthetic musks among others.[47] The studies in America showed higher levels in African Americans, Hispanic Americans and Asian Americans due, it is thought, to living in areas of higher pollution.[48] Additional imagesEdit See alsoEdit 1. ^ "Umbilical – Search Online Etymology Dictionary". Archived from the original on 4 March 2016. Retrieved 27 March 2018. 2. ^ "The Umbilical Cord". Archived from the original on 28 March 2013. Retrieved 27 March 2018. 3. ^ a b c d Meyer WW, Rumpelt HJ, Yao AC, Lind J (July 1978). "Structure and closure mechanism of the human umbilical artery". Eur. J. Pediatr. 128 (4): 247–59. doi:10.1007/BF00445610. PMID 668732. S2CID 37516644. 4. ^ Moshiri, Mariam; Zaidi, Sadaf F.; Robinson, Tracy J.; Bhargava, Puneet; Siebert, Joseph R.; Dubinsky, Theodore J.; Katz, Douglas S. (January 2014). "Comprehensive Imaging Review of Abnormalities of the Umbilical Cord". RadioGraphics. 34 (1): 179–196. doi:10.1148/rg.341125127. ISSN 0271-5333. PMID 24428290. 5. ^ Saleh, R; Reza, HM (10 October 2017). "Short review on human umbilical cord lining epithelial cells and their potential clinical applications". Stem Cell Research & Therapy. 8 (1): 222. doi:10.1186/s13287-017-0679-y. PMC 5634865. PMID 29017529. 6. ^ "Fetal Circulation". Archived from the original on 22 December 2017. Retrieved 27 March 2018. 7. ^ a b Kiserud, T.; Acharya, G. (2004). "The fetal circulation". Prenatal Diagnosis. 24 (13): 1049–1059. doi:10.1002/pd.1062. PMID 15614842. S2CID 25040285. 8. ^ Mikael Häggström, MD (2020-08-27). Patholines {{cite web}}: Missing or empty |title= (help) 9. ^ "Peculiarities in the Vascular System in the Fetus – Gray's Anatomy of the Human Body – Yahoo! Education". Archived from the original on January 23, 2012. 10. ^ "How to Care for Baby's Umbilical Cord". What to Expect. Retrieved 2022-06-12. 11. ^ a b "Umbilical cord care: Do's and don'ts for parents". Mayo Clinic. Retrieved 2022-06-12. 12. ^ Cohain, J. S. (2010). "A Proposed Protocol for Third Stage Management – Judy's 3,4,5,10 minute method". Birth. 37 (1): 84–85. doi:10.1111/j.1523-536x.2009.00385_2.x. PMID 20402731. 13. ^ Yao AC, Lind J, Lu T (1977). "Closure of the human umbilical artery: a physiological demonstration of Burton's theory". Eur. J. Obstet. Gynecol. Reprod. Biol. 7 (6): 365–8. doi:10.1016/0028-2243(77)90064-8. PMID 264063. 14. ^ a b Quan A, Leung SW, Lao TT, Man RY (December 2003). "5-hydroxytryptamine and thromboxane A2 as physiologic mediators of human umbilical artery closure". J. Soc. Gynecol. Investig. 10 (8): 490–5. doi:10.1016/S1071-5576(03)00149-7. PMID 14662162. 15. ^ a b c White RP (January 1989). "Pharmacodynamic study of maturation and closure of human umbilical arteries". Am. J. Obstet. Gynecol. 160 (1): 229–37. doi:10.1016/0002-9378(89)90127-0. PMID 2912087. 16. ^ "Umbilical Cord Complications: eMedicine Obstetrics and Gynecology". Archived from the original on 2010-01-29. Retrieved 2010-01-24. 17. ^ a b c P02.5 Fetus and newborn affected by other compression of umbilical cord Archived 2014-11-02 at the Wayback Machine in ICD-10, the International Statistical Classification of Diseases 18. ^ "Fetus or Newborn Problems: Labor and Delivery Complications: Merck Manual Home Edition". Archived from the original on 2010-03-28. Retrieved 2010-03-27. 19. ^ McDonald, SJ; Middleton, P; Dowswell, T; Morris, PS (Jul 11, 2013). "Effect of timing of umbilical cord clamping of term infants on maternal and neonatal outcomes". The Cochrane Database of Systematic Reviews. 7 (7): CD004074. doi:10.1002/14651858.CD004074.pub3. PMC 6544813. PMID 23843134. 20. ^ Stiegler, Paul M., M.D. (May 2007). "EMT-BASIC \ EMT BASIC INTERMEDIATE TECHNICIAN PROTOCOLS" (PDF). Dane County Emergency Medical Services. Archived (PDF) from the original on April 6, 2012. Retrieved December 17, 2011.{{cite web}}: CS1 maint: multiple names: authors list (link) 21. ^ Meersman, Jack. "EMT-B: Obstetrics, Infants and Children". Wild Iris Medical Education. Archived from the original on January 20, 2012. Retrieved December 17, 2011. 22. ^ a b McDonald, S. J.; Middleton, P.; Dowswell, T.; Morris, P. S. (2013). McDonald, Susan J (ed.). "Effect of timing of umbilical cord clamping of term infants on maternal and neonatal outcomes". The Cochrane Database of Systematic Reviews. 7 (7): CD004074. doi:10.1002/14651858.CD004074.pub3. PMC 6544813. PMID 23843134. 23. ^ Committee on Obstetric Practice, American College of Obstetricians and, Gynecologists (December 2012). "Committee Opinion No.543: Timing of umbilical cord clamping after birth". Obstetrics and Gynecology. 120 (6): 1522–6. doi:10.1097/01.aog.0000423817.47165.48. PMID 23168790. 24. ^ Committee on Obstetric Practice (2017-01-01). "Committee Opinion No. 684". Obstetrics & Gynecology. 129 (1): e5–e10. doi:10.1097/aog.0000000000001860. ISSN 1873-233X. PMID 28002310. 25. ^ a b c Hutton EK, Hassan ES (March 2007). "Late vs early clamping of the umbilical cord in full-term neonates: systematic review and meta-analysis of controlled trials". JAMA. 297 (11): 1241–52. doi:10.1001/jama.297.11.1241. PMID 17374818. 26. ^ a b Examination of the Newborn & Neonatal Health: A Multidimensional Approach, p. 116-117 27. ^ a b "Effect of timing of umbilical cord clamping of term infants on maternal and neonatal outcomes." Cochrane Database Syst Rev. 2008; (2):CD004074 28. ^ Andersson, O; Lindquist, B; Lindgren, M; Stjernqvist, K; Domellöf, M; Hellström-Westas, L (1 July 2015). "Effect of Delayed Cord Clamping on Neurodevelopment at 4 Years of Age: A Randomized Clinical Trial". JAMA Pediatrics. 169 (7): 631–8. doi:10.1001/jamapediatrics.2015.0358. PMID 26010418. 29. ^ "Can delayed umbilical cord clamping reduce infant anemia at age 8, 12 months?". Archived from the original on 25 February 2018. Retrieved 27 March 2018. 30. ^ Military Obstetrics & Gynecology – Delivery of the Baby Archived 2010-01-23 at the Wayback Machine The Brookside Associates Medical Education Division. Retrieved Jan 10, 2009 31. ^ Waterbirth International – Waterbirth FAQ Retrieved Jan 10, 2009 32. ^ Crowther, S (2006). "Lotus birth: leaving the cord alone". The Practising Midwife. 9 (6): 12–14. PMID 16830839. 33. ^ "Human Reproduction, Lectures: Clinical Genetics". Retrieved 2010-02-11. 34. ^ "Umbilical Cord Blood Banking" (PDF) (Scientific Impact Paper 8). Royal College of Obstetricians and Gynaecologists. 2006. Retrieved 2021-07-01.{{cite web}}: CS1 maint: url-status (link) 35. ^ American Academy of Pediatrics. "Cord Blood Banking for Potential Future Transplantation". Archived from the original on 2007-10-13. 36. ^ "Cord blood yields 'ethical' embryonic stem cells." Archived 2008-10-10 at the Wayback Machine, Coghlin A. New Scientist, August 18, 2005. Accessed June 25, 2007. 37. ^ Cord Blood for Neonatal Hypoxic-Ischemic Encephalopathy Archived 2011-08-12 at Wikiwix, Autologous Cord Blood Cells for Hypoxic Ischemic Encephalopathy Study 1. Phase I Study of Feasibility and Safety 38. ^ Haller MJ; Viener, HL; Wasserfall, C; Brusko, T; Atkinson, MA; Schatz, DA; et al. (2008). "Autologous Umbilical Cord Blood Infusion for Type 1 Diabetes". Exp. Hematol. 36 (6): 710–715. doi:10.1016/j.exphem.2008.01.009. PMC 2444031. PMID 18358588. 39. ^ Vendrame M, et al. (2006). "Cord blood rescues stroke-induced changes in splenocyte phenotype and function". Exp. Neurol. 199 (1): 191–200. doi:10.1016/j.expneurol.2006.03.017. PMID 16713598. S2CID 29804539. 40. ^ Vendrame M, et al. (2005). "Anti-inflammatory effects of human cord blood cells in a rat model of stroke". Stem Cells Dev. 14 (5): 595–604. doi:10.1089/scd.2005.14.595. PMID 16305344. 41. ^ Revoltella RP, et al. (2008). "Cochlear repair by transplantation of human cord blood CD133+ cells to nod-scid mice made deaf with kanamycin and noise". Cell Transplant. 17 (6): 665–678. doi:10.3727/096368908786092685. PMID 18819255. 42. ^ Najjar, Dana (2020-12-18). "Should You Bank Your Baby's Cord Blood?". The New York Times. ISSN 0362-4331. Retrieved 2021-07-01. 43. ^ "Archived copy" (PDF). Archived (PDF) from the original on 2013-11-02. Retrieved 2013-04-13.{{cite web}}: CS1 maint: archived copy as title (link) 44. ^ Meat Hygiene. J. F. Gracey, D. S. Collins, Robert J. Huey. p. 32. 45. ^ See In the Shadow of Man, by Jane Goodall. 46. ^ "Sharks (Chondrichthyes)". FAO. Archived from the original on 2008-08-02. Retrieved 2009-09-14. 47. ^ Chen, Mei-Huei; Ha, Eun-Hee; Wen, Ting-Wen; Su, Yi-Ning; Lien, Guang-Wen; Chen, Chia-Yang; Chen, Pau-Chung; Hsieh, Wu-Shiun (3 August 2012). "Perfluorinated Compounds in Umbilical Cord Blood and Adverse Birth Outcomes". PLOS ONE. 7 (8): e42474. Bibcode:2012PLoSO...742474C. doi:10.1371/journal.pone.0042474. PMC 3411780. PMID 22879996. 48. ^ "Why Are Trace Chemicals Showing up in Umbilical Cord Blood?". Scientific American. Archived from the original on 2012-09-02. Retrieved 2012-09-01. • Marianne Messerli; et al. (December 2013). "Stem Cells from Umbilical Cord Wharton's Jelly from Preterm Birth Have Neuroglial Differentiation Potential". Reproductive Sciences. 20 (12): 1455–1464. doi:10.1177/1933719113488443. PMC 3817666. PMID 23670950. External linksEdit •   Media related to Umbilical cord at Wikimedia Commons
Breastfeeding and hepatitis C: Is it safe? There have been no reports of a baby contracting hepatitis C as a result of breastfeeding. However, if a person’s nipples are bleeding or cracked while breastfeeding, the hepatitis C virus can be transmitted (HCV). The Centers for Disease Control and Prevention (CDC) provides this information. HCV causes hepatitis C, which is a liver disorder. It is transmitted by coming into contact with the infected person’s blood. As a consequence, it cannot be transmitted solely by breast milk. In this article, we’ll look into whether breastfeeding is healthy for someone who has HCV, what to do if the nipples are broken or bleeding, and other preventative measures caregivers may take. How safe is breastfeeding ? A lady breastfeeding her child There have been no reports of a baby contracting HCV from human milk. As a result, it appears that giving breast milk to babies is healthy, even if the person feeding them has hepatitis C. Human breast milk appears to have the ability to deactivate HCV. As a result, caregivers who breastfeed, chest feed, or bottle feed using their own milk do not need to be concerned about the virus spreading. Cracked nipples There is currently insufficient evidence to establish whether cracked nipples can transmit HCV. If a person’s nipples are cracked or bleeding, it’s theoretically possible for a baby to drink HCV-infected blood. This is so if the baby is breastfed or the mother expresses milk into a bottle. However, the risk level is unknown. As a result, the CDC recommends that people with hepatitis C who have broken or bleeding nipples temporarily avoid feeding their baby with their own milk. Until the nipples heal, people should: • Since their milk can be mixed with blood, they should convey and then discard it safely. • To feed the baby, turn to donor human milk or formula. • If required, seek assistance from a lactation specialist, especially to devise a strategy for maintaining their milk supply. Other precautions In addition to the precautions mentioned above, parents and caregivers with HCV should take additional steps to help prevent the virus from spreading to their children. Preventative measures in general Do not share personal objects with them, such as nail scissors or clippers, toothbrushes, or jewellery that reaches the skin, such as earrings, to help avoid HCV transmission from a caregiver to an infant. Disinfect any household, personal, or baby products that are likely to come into contact with blood on a regular basis. In the event of an accident If a caregiver sustains an injury, they must: • Use disposable cloths or paper towels to cover up any spilt blood right away • Separate the cloths or towels and place them in a sealed container • Using bleach, sterilise the area before rinsing it with water When a caregiver has a cut or wound, they must also: • Use bandages, sterile dressings, or other protective coverings to fully cover any open wounds or areas of broken skin • Kissing a baby should be avoided until any wounds or sores on the lips or inside the mouth have healed • If either the baby or the caregiver’s hand has a wound or broken skin, stop holding hands with them • Band-aids, wound dressings, sanitary or menstrual items should all be placed in a separate sealed bag out of reach of children In case of exposure to blood If a baby had come into contact with the caregiver’s blood: • Wash them as soon as possible with warm running water and soap, or with an antiviral product. • Remove all of the blood, paying special attention to hard-to-reach places, and pat dry with a new, clean towel. • Any personal products that may have come into contact with the blood, such as bedding, towels, eating utensils, and drinkware, should be cleaned and disinfected. Getting tested It’s helpful to know what types of HCV tests are available and what they mean before pursuing testing. There are two types of HCV examinations. Antibody or polymerase chain reaction (PCR) tests determine whether a person’s blood contains HCV antibodies. Antibodies are proteins produced by the body to kill or deactivate certain viruses and bacteria. A positive antibody test indicates that someone has had HCV at some stage in their lives. However, this does not always imply that they are infected. Another form of test is the PCR test. These check to see if the virus is still reproducing in the body. This means that the infection is active. When would adults be tested? If a parent or caregiver suspects they have HCV but isn’t positive, they should get tested right away. Since HCV sometimes causes no symptoms at first, it’s critical to determine if anyone is a carrier. People should be screened for HCV if they have any of the following symptoms: • They believe they might have been infected with HCV by someone else • They experience exhaustion, fever, abdominal pain, and trouble concentrating • They use medications that can be injected, such as heroin After giving birth, people with HCV should have their HCV RNA levels checked. This is because HCV seems to clear up on its own in certain people after they give birth. A 2017 study from Cairo University in Egypt found that 12 months after giving birth, 26.9% of people with HCV had undetectable levels of the virus’s DNA in their blood. This tends to be linked to a particular genetic mutation. When will children be able to be tested? A baby born to someone who has HCV should be tested when they are 18 months old or older, according to most health authorities. This is due to the presence of maternal antibodies in the blood of newborns. These HCV antibodies will be detected by a conventional HCV test, resulting in a false-positive result. If parents or caregivers are worried about a baby’s HCV infection, testing may be available as early as 3 months of age, but this raises the likelihood of a false-positive result. Doctors use a PCR test instead of an antibody test in these situations. Children over the age of two are tested for HCV in the same way as adults are. If a child tests positive, therapy will begin until they hit the age of three. Treatment when breastfeeding Direct-acting antivirals (DAAs) are the most commonly prescribed drugs for chronic hepatitis C. DAAs are typically taken for 8–12 weeks by most people who aren’t pregnant or breastfeeding. Current treatments have a success rate of 90% or higher. However, there isn’t enough evidence to suggest that DAAs are healthy to use during pregnancy or breastfeeding. Much less research has been done on the impact of DAAs and other HCV therapies on infants. DAAs have been shown in animal studies to cross the placenta and enter breast milk. However, according to a 2019 report, DAAs may be safe to use during the second or third trimester of pregnancy, as well as when breastfeeding. Doctors usually wait until a person finishes feeding a baby with breast milk before starting DAA treatment until more proof proving DAAs are safe during breastfeeding is available. Some good questions to ask a doctor If a mother wants to breastfeed her child, she should obtain assistance and support from a doctor or lactation specialist. Such questions to consider are: • What are the safest ways for me to breastfeed, chest feed, or pump breast milk? • Is there something I can purchase, such as medical equipment or cleaning supplies? • Is there any new evidence on the protection of breastfeeding or HCV avoidance for people with the virus? • What do I do if I suspect my child has been exposed to HCV? • Is it necessary to test my baby for HCV? • What happens if they get a positive test result? • When will I be able to start treatment? • What are the treatment options? As long as they don’t have broken or bleeding nipples, people with HCV can safely breastfeed, chest feed, or feed their bottled milk to an infant. If this happens, avoid breastfeeding and temporarily turn to donor or formula milk.
Medical reports: Mother of all medical breakthroughs A medical history simply refers to the information gained by doctors, through asking their patients or someone close to them specific questions that would give them the information they need to find the most accurate diagnosis and suitable treatment for the patient. Complaints brought forward by patients are recorded hence the compilation of a medical report. Case reports are the heart of medicine as most medical breakthroughs have been greatly assisted by medical reports. It has become a dispensable commodity in the world of research with the main purpose being to offer precise health services. The law restricts hospitals and clinics from opening until they have well equipped medical report sections. Many universities that offer courses in medicine also impart a special training on those who work in the medical reports section as such skills are useful in handling reports and maintaining confidentiality. Medical reports help to prevent errors whether made intentionally or not. They also pay specific attention to injuries resulting from external accidents with a space provided where the physician can enter the cause and effects of the accidents. This in turn has been used to reduce the amounts of accidents occurring by ensuring safety measures are in place. Image Source: Pixabay Medical reports are without a doubt the supporting hand between the doctor and patient. They help both patients and physicians to understand an illness and the medicines that could possibly be used for treatment. Medical reports make it possible for a patient to be attended to without any delay hence increasing the hospital’s efficiency in dealing with emergencies; as availability of the information is ready and easily retrieved. Medical reports are also known to help physicians find health patterns and figure out treatments for specific health related issues. Through the help of medical reports, doctors are able to diagnose the patient from a set of previous ailments and offer the correct medication; reports usually contain a list of allergies the patient has in relation to medicines and drugs. Often, an allergic reaction to a drug may result in death through heart failure or cardiovascular related illness. Factors that inhibit proper B of a medical report The main factors would be the inability of the patient to communicate with the doctor. This may be because the patient is unconscious or has a communication disorder; this often leads to doctors performing a heteroanamnesis. Another factor would be the patient doctor relationship. If a patient has little trust in the doctor, then he tends to share less, and this often occurs with new doctors whose patients are not familiar with. This mainly comes up in relation to sexual subjects as patients are often reluctant to disclose their intimate life with physicians because the issue makes them feel uncomfortable. Doctors are always advised to have patients come in with their spouse to make them feel comfortable though reports have suggested that this may also prevent disclosure of certain subjects and instead cause an increase in stress. About Author
University of East Anglia – Avatars for Visual Communication Communication isn’t just about words. After all, “Good job” can be transformed from a compliment to an insult with a twist of the voice. Every day, we use our tone, our hands, our faces and our body language to add to what we say, and even to alter its meaning. It’s the same for sign language. So how do you teach a computer to read all that, and pass it on effectively? Professor John Glauert “People imagine that sign language is all about the hands, but quite a lot comes from the face”, says Professor John Glauert. “Your facial expression changes what you’re talking about, and whether you’re happy about something or not. “Also, when people perform signs they make mouth movements that go with the words. Sometimes you change the meaning of a sign with a facial expression. To change the type of fish, you might sign fish, but mouth “salmon”. The only difference between the sign variations is on the face, not the hands.” Since 1999, the Virtual Humans Group has been looking at ways to translate everyday communication into recognisable and nuanced sign language. They develop systems that can interpret speech and language, and animate a 3D character to make recognisable signs and gestures. This requires a diverse mix of skills. Based at the University of East Anglia, the team has expertise in speech and language recognition, 3D character animation, AI and computational linguistics. Professor Glauert says: “Around 50,000 people in Britain use British Sign Language as their first language. With a number like that, some might not be particularly motivated to produce tailored services for signing deaf people. But part of our work is to make it more cost-effective, so that people don’t have the excuse not to do it. “One of the things that’s struck me during the time I’ve been doing this is the gap in people’s understanding of the hearing-impaired community. There’s a lot of misunderstanding, which leads to people not providing them with what they need.” It all started back in 1999, with an avatar called Simon the Signer. Simon translated text subtitles into animated sign language. It won two Royal Television Society Awards, but it was only a rough solution. “Simon the Signer simply spotted important words and turned them into signs. So you’re basically putting stuff out in the order it would be in English. However, sign language doesn’t use the same order as the English language. “If you do it like that, you can certainly turn it into something that most signers can understand, but it’s like turning a German or Spanish sentence into English without changing the word order. It doesn’t look right.” The group originally started by looking solely at the linguistics side of the problem, but later created their own platform to animate the 3D character as well. The challenge was to balance two occasionally competing priorities: to make the signing movements as quick and fluid as possible, and to pass on the full meaning and nuance of the speech, often without any other visual means of communication. By picking out words in order, Simon the Signer could translate quickly enough for the animation to look fluid and natural. However, for the signing sequences to have the right structure, the system needed to know more about the sentence before translating. Enter the TESSA project. TESSA was a speech recognition system designed to translate sentences and phrases into true British Sign Language by identifying a phrase as it was being said, and producing the corresponding signs with almost no delay. Of course, it’s a huge challenge to develop a system that can predict any sentence. There are so many variables. So TESSA was developed primarily for use in customer service situations, translating phrases spoken to customers by counter staff. In these situations, there are only a limited number of essential phrases that are likely to be said, so the system could spot them much quicker. In 2000, the technology was trialled by the Post Office in the UK. Professor Glauert says: “The system has to recognise the whole sentence, but it can start making a pretty good guess midway through, and can come out almost straight away with an answer. It’s not looking for every phrase. It starts, gets better information, and corrects itself.” The team also approached the issue of how to translate those meanings that weren’t spoken. First arriving in 2000, the ViSiCAST system took a number of features of communication into account, such as eyebrow position, plural verbs, and the size and placement of gestures. In two more EU-funded projects called eSIGN and Dicta-Sign, the group has since fine-tuned algorithms that can deliver gestures that differ subtly in hand shape and location. 10.2In order to achieve this, they used an established transcription system called the Hamburg Notation System, which tackled the sentences phonetically. This is converted into computer-readable XML, and then processed through a module that uses this information to manipulate the skeleton of an avatar character. “The actual speech recognition element of our work is state-of-the-art, but not groundbreaking. The more challenging part is what we do with the animation. It’s telling the system exactly how to move the bones of the fingers and arms to pass on a meaning. “It’s working on two parallel tracks: One communicates what the hand is doing and what the body is doing. The other tracks the face, eyebrows and eyes. For the mouth, we use an animation technique called Morphing, which carries a description of the mouth shape. “You add a mesh with a skin and clothes over the top. So one of the great things about our system is that we can play the information back with different characters, from humans to robots, aliens and monkeys.” Their research has been applied in a number of different ways. IBM called their virtual signing technology “the most advanced and flexible system available”, and integrated it into a real-time system called Say It Sign It. Thanks to a collaboration with Orange, that system was modified to work on mobile devices. It has helped to translate pre-defined information into sign language, from train announcements to weather forecasts and warnings about avalanches. In conjunction with Action on Hearing Loss, the Visual Humans Group has built resources that have allowed others to create sign language content for websites, including Germany’s Federal Ministry of Labour and Social Affairs and employment sites in the Netherlands. There is also a valuable application in learning. Many children pick up words much more easily when there is a gesture associated with it, a process known as kinesthetic learning. With this in mind, a series of animated story DVDs have been released under the LinguaSign brand. They have been re-produced for English, Dutch, French and Portuguese. Following a 2013 trial of Key Stage 2 students at more than 50 UK primary schools, 62% of respondents confirmed that it improved a child’s speaking and listening skills in a new language. The avatar technology has already begun to supplement the interpreters we’re used to seeing on TV. It has been showcased on Dutch programme Het Zandkasteel, and on online shows such as Wicked Kids. It has also been used by cultural heritage sites to help pass on stories from history using sign language. Having almost mastered the hands, the team hopes to improve their work even further by improving their grasp of the expressive human face. “It’s not about dragging deaf people into the hearing world, but providing them with the sort of services we take for granted on their own terms”, says Professor Glauert. “It’s what they want, rather than what we think they should get.” Links for Additional Information UEA Virtual Humans Visicast Demos Naomi AtkinsonCase Study You might also like to read: Case Study University of Hertfordshire – Robot-assisted play therapy for autistic children Case Study University of Brighton – Dictionary Production Case Study University of York – Real time vehicle control Leave a Reply
Oldest Pagan Symbols Catholic Church List of Catholic Symbols and Meanings - Owlcation. I feel it would be have been more insightful if you had also explained the pagan origins of these symbols and their translation to the catholic church. Bernard price on September 20, 2010: I notice during the recent papal visit a symbol being worn . It is a circle with a bar through it. in the form of a pendant.. Welcome to Butler County Recorders Office. Catholic Church - Wikipedia. The Catholic Church, also known as the Roman Catholic Church, is the largest Christian church, with 1.3 billion baptised Catholics worldwide as of 2019. As the world's oldest and largest continuously functioning international institution, it has played a prominent role in the history and development of Western civilisation. The church consists of 24 particular churches and almost .... Who Is The Roman Catholic Church Really Worshiping?. The Cap of Cybele is one of the oldest and most sacred pagan religious symbols of humanity, dating back to 2,000 B.C. The skull cap was worn by the sun priests of Egypt. It is a thin, slightly rounded skullcap now commonly known by various titles including the Yarmulke (Jewish) and Kufi (Muslims). The Roman Catholic Church calls it the Zucchetti.. Bible - Wikipedia. Bosniaks - Wikipedia. Thomas the Apostle - Wikipedia. Thomas the Apostle (Aramaic: ?????, Biblical Hebrew: ???? ????? or ???? ????? (Toma HaKadosh Thomas the Holy or Toma Shlikha Thomas the Messenger/Apostle in Hebrew-Aramaic), Classical Syriac: ?????, T?oma, meaning "twin"; Koine Greek: ??u??), also known as Didymus ("twin"), was one of the Twelve Apostles of Jesus according to the New Testament.. Pachamama - Wikipedia. Pachamama is a goddess revered by the indigenous peoples of the Andes.In Inca mythology she is an "Earth Mother" type goddess, and a fertility goddess who presides over planting and harvesting, embodies the mountains, and causes earthquakes.She is also an ever-present and independent deity who has her own creative power to sustain life on this earth. Her shrines are .... Outlook – free personal email and calendar from Microsoft. Jewish Worship, Pagan Symbols - Biblical Archaeology Society. Jul 14, 2022 . Many of the symbols included in the uppermost mosaic panel reaffirmed the Jewish nature of the synagogue at Beth Alpha: the Ark of the Covenant at the center (aron kodesh), eternal light (ner tamid), two seven-branched candelabra (menorot; plural, menorah), palm frond (lulav), citron (etrog), and an incense shovel (mahta).From these items it takes the .... Catholic Church in Scotland - Wikipedia. The Catholic Church in Scotland overseen by the Scottish Bishops' Conference, is part of the worldwide Catholic Church headed by the Pope.After being firmly established in Scotland for nearly a millennium, the Catholic Church was outlawed following the Scottish Reformation in 1560. Catholic Emancipation in 1793 and 1829 helped Catholics regain both religious and civil .... Jan 01, 2013 . The true Catholic Church will never sanction the abuses perpetrated erring friars according to Rizal. ... How can you say that when the Church founded the oldest universities and schools in the country like the University of Sto. Tomas, Ateneo de Manila, De la Salle University, San Carlos University? These are top schools in the country even today.. Solar deity - Wikipedia. A solar deity (also sun goddess or sun god) is a sky deity who represents the Sun, or an aspect of it.Such deities are usually associated with power and strength. Solar deities and Sun worship can be found throughout most of recorded history in various forms. The Sun is sometimes referred to by its Latin name Sol or by its Greek name Helios.The English word sun derives from Proto .... Ichthys - Wikipedia. In the 1970s the "Jesus Fish" started to be used as an icon of modern Christianity.In 1973 the symbol and message was taken to the Aquarius Rock Festival in Nimbin, Australia.Today, it can be seen as a decal or emblem on the rear of automobiles or as pendants or necklaces as a sign that the owner is a Christian. Versions of this include an Ichthys with "Jesus" or "?????" in the .... Christian symbolism - Wikipedia. Golden Rule - Wikipedia. Etymology. The term "Golden Rule", or "Golden law", began to be used widely in the early 17th century in Britain by Anglican theologians and preachers; the earliest known usage is that of Anglicans Charles Gibbon and Thomas Jackson in 1604.. Ancient history Ancient Egypt. Possibly the earliest affirmation of the maxim of reciprocity, reflecting the ancient Egyptian goddess .... Christian cross - Wikipedia. The Christian cross, seen as a representation of the crucifixion of Jesus on a large wooden cross, is a renowned symbol of Christianity. It is related to the crucifix (a cross that includes a corpus, usually a three-dimensional representation of Jesus' body) and to the more general family of cross symbols, the term cross itself being detached from the original specifically Christian .... Religion in Lithuania - Wikipedia. According to the 2021 census, the predominant religion in Lithuania is Christianity, with the largest confession being that of the Catholic Church (about 74% of the population). There are smaller groups of Orthodox Christians, Evangelical Lutherans, members of Reformed churches, other Protestants, Jews and Muslims as well as people of other religions. .... Welsh mythology - Wikipedia. Welsh mythology (Welsh: Mytholeg Cymru) consists of both folk traditions developed in Wales, and traditions developed by the Celtic Britons elsewhere before the end of the first millennium. As in most of the predominantly oral societies Celtic mythology and history were recorded orally by specialists such as druids (Welsh: derwyddon).This oral record has been lost or altered as a .... Mary, mother of Jesus - Wikipedia. Mary was a first-century Jewish woman of Nazareth, the wife of Joseph, and the mother of Jesus.Both the New Testament and the Quran describe Mary as a virgin.According to Christian theology, Mary conceived Jesus through the Holy Spirit while still a virgin, and accompanied Joseph to Bethlehem, where Jesus was born.. Mary has been venerated since early .... Symbols in the Book of Revelation - Good News WordBytes. 666 = tripled (the most) imperfection; anyone who viciously persecutes Christians. SEVEN = fullness, complete amount. SEVEN CHURCHES = all the churches of all the world of all times. 10 DAYS = a short time. THREE-AND-A-HALF = a very short time. 1260 days or 3&1/2 years or 42 months = period of persecutions of God's people. 1000 = a large amount. 7000 PEOPLE = a .... Grimoire - Wikipedia. A grimoire (/ g r I m ' w ?:r / grim-WAHR) (also known as a "book of spells" or a "spellbook") is a textbook of magic, typically including instructions on how to create magical objects like talismans and amulets, how to perform magical spells, charms and divination, and how to summon or invoke supernatural entities such as angels, spirits, deities, and demons.. News: Breaking stories & updates - The Telegraph. Catechism of the Catholic Church - Academia.edu. Catechism of the Catholic Church. E. Dela Pena. Download Download PDF. Full PDF Package Download Full PDF Package. This Paper. A short summary of this paper. 31 Full PDFs related to this paper. Read Paper. Download Download PDF. Download Full PDF Package.. Halloween: Origins, Meaning & Traditions - HISTORY. Nov 18, 2009 . Halloween originated with the ancient Celtic festival of Samhain and is now a worldwide event. Learn more about Halloween's origins, .... Religious symbolism in the United States military - Wikipedia. Religious symbolism in the United States military includes the use of religious symbols for military chaplain insignia, uniforms, emblems, flags, and chapels; symbolic gestures, actions, and words used in military rituals and ceremonies; and religious symbols or designations used in areas such as headstones and markers in national cemeteries, and military ID tags ("dog tags").. Eastern Orthodox Church - Wikipedia. The Eastern Orthodox Church, also called the Orthodox Church, is the second-largest Christian church, with approximately 260 million baptized members. It operates as a communion of autocephalous churches, each governed by its bishops via local synods. The church has no central doctrinal or governmental authority analogous to the head of the Roman Catholic .... Christian Holidays with Pagan Origins — The 8 Pagan Holidays. Oct 14, 2021 . There are 8 pagan holidays that use celestial alignments to measure time. So, there's no surprise that there are 8 Christian holidays with pagan origins. ... including the Church of God Seventh-day Adventists, Jehovah's Witnesses, Armstrongite, and the True Jesus Church, to name a few. ... We go to the Catholic work because it is the oldest .... Religious male circumcision - Wikipedia. According to the Torah and Halakha (Jewish religious law), ritual circumcision of all male Jews and their slaves (Genesis 17:10-13) is a commandment from God that Jews are obligated to perform on the eighth day of birth, and is only postponed or abrogated in the case of threat to the life or health of the child. Jews believe that Gentiles (i. e. non-Jews) are neither required nor .... Dictionary of Catholic Terms - THE SACRED HEART. Catholic Church: The Church established by Christ on the foundation of the Apostles, possessing the fullness of the means of salvation which he has willed: correct and complete confession of faith, full sacramental life, and ordained ministry in apostolic succession. Celebrant: The one who presides at a religious service.. Valentine's Day 2022: Origins, Background & Traditions - HISTORY. Dec 22, 2009 . Officially recognized by the Roman Catholic Church, St. Valentine is known to be a real person who died around A.D. 270. However, his true identity was questioned as early as A.D. 496 by Pope .... Eucharist | Catholic Answers. Eucharist (Gr. eucharistia, thanksgiving), the name given to the Blessed Sacrament of the Altar under its twofold aspect of sacrament and Sacrifice of the Mass, and in which, whether as sacrament or sacrifice, Jesus Christ is truly present under the appearances of bread and wine. Other titles are used, such as the "Lord's Supper" (Coena Domini), "Table of the Lord" (Mensa .... Return of the Ancient Gods: The Resurgence of Paganism. Sep 10, 2020 . In Iceland, the Norse gods are making a particularly strong comeback and Nordic paganism is now Iceland's fastest growing religion. In fact, they will soon complete the first temple to Thor and Odin to exist in Iceland in over 1000 years. "I don't believe anyone believes in a one-eyed man who is riding about on a horse with eight feet," High priest Hilmar Orn Hilmarsson .... Christian Symbols: An Illustrated Glossary - Learn Religions. Mar 06, 2021 . Way of the Cross procession makes its way across the Brooklyn Bridge on Good Friday. Drew Angerer / Getty Images. The Latin cross is the most familiar and widely recognized symbol of Christianity today. In all likelihood, it was the shape of the structure upon which Jesus Christ was crucified.Though various forms of the cross existed, the Latin cross was made of ....
On June 8th, 2016 we learned about Ensuring the sound of loud launches don’t destroy buildings and spacecraft These days it’s possible to see an abundance of rocket launches from the comfort of our own homes, offices, or even street corners, if you feel like watching a broadcast from your phone. Launches are covered with cameras on the ground and even on the rockets themselves, letting us experience some of these exciting events like never before. One key aspect of a rocket launch that isn’t being fully translated through YouTube is the sound though, which is a very good thing. The amount of energy to create 650,000 pounds of thrust leads to some very powerful vibrations, loud enough to not only blow out your ear-drums, but even destroy buildings or the rocket itself if left unchecked. The typical launch these days peaks at about 195 decibels, but this is by no means the record holder. The Saturn V rockets from the late 60s were observed blasting at 204 decibels, well beyond what would be safe for a human body. At that magnitude, the sound is less of an audio experience as and more of a shock-wave, creating waves of energy strong enough to damage structures as well as the spacecraft trying to take off. In effect, it’s almost like a an earthquake made out of sound and air. Buildings near launch areas are insulated with buffering panels to help absorb some of these vibrations, but to really reduce the amount of engine noise during a launch, NASA turns on the sprinklers. Very wet sound dampening We don’t normally think of spraying water as quieting, but the droplets are actually quite good at absorbing energy and breaking up the massive sound waves so they don’t become dangerously intense. Supplied by a 300,000 gallon tank, water is sprayed at two locations during a launch— in a trench below the engines for when they first fire, and higher up from 12-foot “rainbird” nozzles as the spacecraft leaves the ground. Over 900,000 gallons are sprayed per minute, which is enough interference to bring the overall volume levels within a spacecraft’s payload bay down to 142 decibels, 8 decibels quieter than a close encounter with a jet engine, and more importantly, 3 decibels below the structural threshold of a spacecraft like the now retired space shuttle. Scale-model sounds With even larger engines slated to go into use in the next year or so, NASA has been conducting tests of this sound-suppression system. Rather than risk damaging sensitive and expensive equipment, tests are performed with functional models around 11 feet tall. The engines are fired and model lifted to no more than seven-and-a-half feet, which simulates 150 feet of lift in the real thing. This allows for measurements from hundreds of microphones, all to make sure that the future Space Launch System (SLS) spacecraft can withstand the noise of its own engines at liftoff. In the mean time, the rest of us can crank up our sub-woofers and safely pretend to go along for the journey, doing no more damage than annoying our neighbors with the sound. Source: NASA's Next Rocket Is So Big, the Sound of It Launching Could Damage Buildings by Amy Shira Teitel, Motherboard A 2 New Things vulture sticker on a car bumper Get a new buzzard for your bumper 2 New Things sticker shop
Annette Gordon-Reed Photo byDavid Shankborne Annette Gordon-Reed is an American law professor and Pulitzer Prize winning historian. She is currently the Charles Warren Professor of American Legal History at Harvard University, where she is also the Carol K. Pforzheimer Professor at the Radcliffe Institute for Advanced Study and a professor of history in the university’s Faculty of Arts & Sciences. Gordon-Reed is noted for changing scholarship on Thomas Jefferson regarding his relationship with Sally Hemings and her children. She was awarded the Pulitzer Prize for History and the National Book Award for Nonfiction and 15 other prizes in 2009 for her work on the Hemings family of Monticello. In 2010, she received the National Humanities Medal and a MacArthur Fellowship also known as the MacArthur “Genius Award.” Since 2018, she has served as a trustee of the National Humanities Center in Research Triangle Park, NC. She was elected a Member of the American Philosophical Society in 2019. Now, Annette Gordon-Reed teams up with America’s leading Jefferson scholar, Peter S. Onuf, to present an absorbing and revealing character study that dispels the many clichés that have accrued over the years about our third president. Challenging the widely prevalent belief that Jefferson remains so opaque as to be unknowable, the authors―through their careful analysis, painstaking research, and vivid prose―create a portrait of Jefferson, as he might have painted himself, one “comprised of equal parts sun and shadow” (Jane Kamensky). Andrew Johnson: The American Presidents Series: The 17th President, 1865-1869 Andrew Johnson never expected to be president. But just six weeks after becoming Abraham Lincoln’s vice president, the events at Ford’s Theatre thrust him into the nation’s highest office. Johnson faced a nearly impossible task―to succeed America’s greatest chief executive, to bind the nation’s wounds after the Civil War, and to work with a Congress controlled by the so-called Radical Republicans. Annette Gordon-Reed, one of America’s leading historians of slavery, shows how ill-suited Johnson was for this daunting task. His vision of reconciliation abandoned the millions of former slaves (for whom he felt undisguised contempt) and antagonized congressional leaders, who tried to limit his powers and eventually impeached him. The climax of Johnson’s presidency was his trial in the Senate and his acquittal by a single vote, which Gordon-Reed recounts with drama and palpable tension. Despite his victory, Johnson’s term in office was a crucial missed opportunity; he failed the country at a pivotal moment, leaving America with problems that we are still trying to solve. The Hemingses of Monticello: An American Family This epic work―named a best book of the year by the Washington Post, Time, the Los Angeles Times, Amazon, the San Francisco Chronicle, and a notable book by the New York Times―and winner of the Pulitzer Prize and National Book Award―tells the story of the Hemingses, whose close blood ties to our third president had been systematically expunged from American history until very recently. Now, historian and legal scholar Annette Gordon-Reed traces the Hemings family from its origins in Virginia in the 1700s to the family’s dispersal after Jefferson’s death in 1826. Race on Trial: Law and Justice in American History This book of twelve original essays will bring together two themes of American culture: law and race. The essays fall into four groups: cases that are essential to the history of race in America; cases that illustrate the treatment of race in American history; cases of great fame that became the trials of the century of their time; and cases that made important law. Some of the cases discussed include Amistad, Dred Scott, Plessy v. Ferguson, Scottsboro, Korematsu v. US, Brown v. Board, Loving v. Virginia, Regents v. Bakke, and OJ Simpson. All illustrate how race often determined the outcome of trials, and how trials that confront issues of racism provide a unique lens on American cultural history. Cases include African-Americans, Asian-Americans, and Caucasians. Contributors include a mix of junior and senior scholars in law schools and history departments. Vernon Can Read!: A Memoir As a young college student in Atlanta, Vernon E. Jordan, Jr. had a summer job driving a white banker around town. During the man’s post-luncheon siestas, Jordan passed the time reading books, a fact that astounded his boss. “Vernon can read!” the man exclaimed to his relatives. Nearly fifty years later, Vernon Jordan, now a senior executive at Lazard Freres, long-time civil rights leader, adviser and close friend to presidents and business leaders and one of the most charismatic figures in America, has written an unforgettable book about his life and times. The story of Vernon Jordan’s life encompasses the sweeping struggles, changes, and dangers of African-American life in the civil rights revolution of the second half of the twentieth century. Vernon E. Jordan, Jr’s memoir with Annette Gordon Reed is a a must-own for anyone interested in modern American history. Thomas Jefferson and Sally Hemings: An American Controversy Possessing both a layperson’s unfettered curiosity and a lawyer’s logical mind, Annette Gordon-Reed writes with a style and compassion that are irresistible. Each chapter revolves around a key figure in the Hemings drama, and the resulting portraits are engrossing and very personal. Gordon-Reed also brings a keen intuitive sense of the psychological complexities of human relationships… relationships that, in the real world, often develop regardless of status or race. The most compelling element of all, however, is her extensive and careful research, which often allows the evidence to speak for itself. is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program where Amazon will pay us a commission for linking to products on and affiliated sites.
Remembering the Holocaust Rate this post Cindy Simon Skjodt reflects on the 70th Anniversary of Auschwitz Liberation Writer / Ray compton Undoubtedly, there were numerous eerie similarities between January 25, 1945, and January 25, 2015, that were separated by seven decades of time. Both of the dates with significance in world history featured familiar settings in the wintertime in western Poland. The winter weather near the German border can become a nightmarish rerun of frigid temperatures, dark skies and relentless bursts of snow. “It was Poland in the wintertime,” noted a recent visitor to the Polish site in January. “Gray. It was very gray and cold.” But there was certainly another haunting comparison that greeted the invaders in 1945 and the visitors who journeyed to the Polish countryside in 2015. In both settings, the silence that seemingly billowed from the drab theater of buildings, bricks and mortar was overwhelming. Despite hundreds of buildings, kilometers of surrounding train tracks and other overt signs left behind by onetime inhabitants, quiet ruled in 1945 and 2015. “I will always remember how quiet it was when we walked around [the facility],” the guest recalled. “The silence was so gripping.” But there was one major difference from the Auschwitz death camp that thousands of Russian soldiers stormed in to liberate in January 1945 and the one that 300 world leaders and dignitaries traveled to in January 2015 to note the 70th anniversary of the liberation of the Holocaust horror chamber. When the Russians broke into Auschwitz, 7,000 helpless prisoner survivors remained, most of those suffering ramifications from terrifying starvation and horrific illnesses. Some camp residents would survive for another chapter of life in Europe, Israel or the U.S. But many would not. On the 70th anniversary, the crude housing was without any life. All that remained in the barracks and gas chambers were the memories of the 1.1 million people who perished at Auschwitz under the rule of Adolf Hitler and his Nazi regime. Three months ago, most of the world paused to remember and honor the victims and survivors. Kings and queens, presidents and prime ministers, Hollywood celebrities like Steven Spielberg and relatives of those who lost family members in the atrocities toward the European Jews and others traveled to Auschwitz to be part of the event. And not to be forgotten among the guests was a dwindling number of genocide survivors such as 96-year-old Yuda Widawski and Paula Lebovics, 81, who was a hungry 11-year-old girl when she was lifted up by a Russian soldier who rocked her tenderly in his arms as tears came to his eyes. Also included in the anniversary crowd were three Hoosiers who said prayers for the dead and lit candles at a monument. One of those present was Carmel philanthropist Cindy Simon Skjodt, the daughter of Melvin and Bess Meshulam Simon, descendants of Austrian-Hungarian, Russian, Greek and Turkish Jewish families who came to America earlier in the 19th century before the rise of the Nazis. Joining Simon Skjodt were daughter Samantha and Fonda Crandall, executive director of Simon Sjkodt’s Samerian Foundation. All witnessed history, and each was moved to tears in the moments of sharing a life experience. The following is a one-on-interview with Cindy Simon Skjodt that has been slightly altered for clarity and abbreviated for length: Henry Greenbaum (survivor), Cindy Skjodt, Samantha Skjodt touring the grounds of Auschwitz Both of your parents’ families had immigrated to the U.S. and were not part of Europe during World War II. Do you know if your extended family may have suffered during the Holocaust? “I don’t for sure know if we may have had cousins or others who were victims. I looked through the list of names but didn’t find any Ashers [a previous family name on the father’s side] or Simons.” When and why did you decide to take the trip to Poland and Auschwitz for the 70th Anniversary event? “I have always been interested in the Holocaust, though I couldn’t always grasp how this could happen. I went to the Holocaust Museum [in Washington, D.C.] two years ago, and I saw the how [the Nazis] went through the propaganda steps and then the final solution. I had always given some money to the museum, but then I had an event here to raise some money.” One of the speakers at the event was Fishers resident Frank Grunwald, whose family was separated during the Holocaust. Grunwald and his father were divided from his mother and physically disabled brother. Grunwald and his father survived, but his mother and brother died. “He read a letter written by his mother to his father. Everyone cried. I knew that I wanted to do more, especially for future generations and so that people don’t forget. That’s what got me on the path. “Then a couple of months later, I got a call saying the museum was taking a delegation of about 30 people who were sponsors or had given money. They asked if I wanted to go. I said yes. [My husband] Paul couldn’t go, so I decided to take Samantha, thinking it would be good for her. When another ticket opened up, I wanted to take Fonda who has been with us for 25 years.” The first stop on the trip to Poland was a two-day tour of Warsaw and the few remains from the Warsaw Ghetto. A train took the somber tourists to Krakow, located 37 miles from Auschwitz. Ironically, while Warsaw lain in ruins after the war, Krakow was virtually untouched since it housed the headquarters of the SS troops. Buses took the visitors on the last leg to Auschwitz. Samantha Skjodt, Estelle Laughlin (survivor), Cindy Skjodt What was it like for you as the bus pulled into Auschwitz? “The place was just massive [25 square miles]. It was a city that was renamed Auschwitz. “It was freezing, and they built a huge tent at the front gate, so the survivors would not get ill. I was in Normandy for the 70th anniversary, and this was the 70th year of the liberation. I think they are doing this because everyone knows we are losing those folks. “The day we had the tour, it was very cold. I will never go back to Poland and Auschwitz, but it was very heart-wrenching and life-changing.” Can you tell us more how it was a life-changing experience? “I guess I looked at the survivors and how so many of them survived and have had a lust for life. They felt they had a second chance to make something out of themselves. It makes me think how I need to do something like they have done. They were incredible…and their forgiveness brings tears to my eyes. I don’t know if I could have done that, but maybe that is why they survived. They had that inner strength.” One of Simon-Skjodt’s prized pictures from the trip is a picture of daughter Samantha with one of the female survivors. Did you feel the presence of those who died at Auschwitz? “Absolutely. There were 1.1 million people who died there. It is the largest cemetery in the world. You see the guard towers, the barbed fences, the barracks….they had no blankets and maybe one kerosene lamp in a barrack. I don’t know how they survived. If anyone believes the Holocaust didn’t exist, they should spend a night there. “It’s mind boggling how many families were wiped out, some of them dying in train cars even before they got there. “You are amazed at what you hear from the survivors. They were there.” The barracks at Auschwitz held over 250,000 living human beings. Many worked at adjoining camps, assisting the German war efforts. Others were separated after deployment from the trains. The young, old and invalid would be immediately marched to the gas chambers. How important is it to retain the history of the war, Holocaust and genocide pursuit? “It is very important. That’s why I took my daughter. They tried to destroy many of the camp items, but they couldn’t destroy the gas chambers since they were underground. We have to remember what happened, so it will never take place again.” The tour did not stop by a pond inside the camp. The murky pond still is a final resting spot for many victims as their fragments of bones and ashes were taken to the pond after they perished in the crematoriums at Auschwitz. Among the items at the camp is a listing of the countries where the victims lived before the Holocaust. Poland had 3.1 million Jews before the Holocaust. It lost 2.9 million of those Jews. Among the names discovered on the list of Auschwitz victims by the Indiana trio was the last name of an accountant used by the Simon Skjodt family in Indiana. The victim was the accountant’s father. “When you went into the gas chambers, you could feel the presence of the victims. It was overwhelming. I was emotionally drained. It was so hard. We all took it so hard. I was glad I did it, but I would never go back again to Poland and Auschwitz. It was too traumatic.” Would you advise others to go to Auschwitz? “I would. We can never forget. We have to remember the era, the time and the conditions. People were looking for scapegoats. It was not a war against religion. It was against people who they thought were too powerful.” What would be your closing assessment of the Auschwitz experience? “It was somber, very somber. When we left Krakow, they asked everyone to get up and talk. I couldn’t do it. But Samantha got up and said that she was going to get her generation involved. I hope she does.” Any closing thoughts? “We need to be kinder to each other at home and in our communities. We have to take care of each other. We need to live not only for ourselves but also for other people. Just participate in the human spirit.” Since her return from the Auschwitz visit, Simon Skjodt and her husband have donated $20 million to the U.S. Holocaust Museum toward a center to prevent genocide. The location has been renamed the Simon-Skjodt Center for the Prevention of Genocide with the goal of researching and developing initiatives to prevent genocide throughout the world. As is the case with many of her foundation’s efforts, Cindy donated the funds on behalf of her father, Melvin.
What motivates workers to return to school to complete vocational training? To understand this phenomenon, Jonas Masdonati, a researcher in Université Laval’s Department of Educational Fundamentals and Practices, conducted semi-structured interviews with 30 vocational training students between the ages of 25 and 40 who had spent at least two years in the workforce. The researcher divided their reasons into two categories: reactive and proactive. Reactive motivations arise mainly from dissatisfaction with the current situation. This dissatisfaction may result from physical or psychological health problems, a lack of interest in the job or a lack of job satisfaction. Returning to vocational training is not the same for all adults. Proactive motivations result from an interest in pursuing a more rewarding career path. In this case, students were seeking better working conditions, personal growth, new learning, or an occupation more in line with their values and interests. Returning to vocational training is not the same for all adults. Some question their career choice and keep one foot in their former profession or are disappointed with their new training. Conversely, others see this change as a rebirth, both personal and professional. Finally, there is a third group halfway between these two extremes: for these adults, vocational training is more of an opportunity to add another string to their bow or to gain recognition for a skill they were already practicing in their work. These findings will help counsellors to better understand the motivations and needs of adults undergoing vocational retraining, enabling them to provide more effective support and guidance.
Through the Looking Glass Children's Book Reviews The Memory Coat The Memory Coat Elvira Woodruff Illustrator:  Michael Dooling  Picture Book For ages 6 to 9 Scholastic, 1999   ISBN: 0590677179 Long ago, a girl called Rachel lived with her family in a village in Russia. The family was large, noisy, and poor, but they were mostly happy. Rachel’s cousin Grisha lived with Rachel’s family, and together Rachel and Grisha would tell wonderful stories using words and pictures. Then one day, Rachel and Grisha’s life was turned upside down. The Cossacks attacked their village, determined to kill every Jew they could find. The children’s grandfather decided that Russia was no longer safe for them, so the family sold what they could, packed a few necessities, and began the journey that would take them to America. Though they knew that the long trip would be hard, what Rachel’s family worried about the most was that they might be turned away at Ellis Island. Imagine if they got all the way to America only to be told that they could not enter the country. “We must make a good impression” Rachel’s grandfather said. Many of the people in the family are worried that Grisha’s tattered coat would make a very bad impression, but the boy refused to wear a different coat. Though his coat was ragged, it was precious to him because his mother had made it for him just before she had died. Everyone hoped that Grisha’s coat would not be his undoing when he got to Ellis Island. The author of this memorable and very touching story was inspired to create her tale after she visited Ellis Island. On the island, she saw an exhibit of clothes that had belonged to immigrants who came through the island. One of the items she saw was a “child’s woolen jacket, patched at the elbows and frayed at the collar.” Her imagination cooked up a little boy’s story to go with the little woolen coat.
Storytelling is as relevant today as it was more than 2,000 years ago Storytelling is today a method of communication to transport selected contents to customers/interested parties. In doing so, offers, services, thoughts, wishes and goals are not simply expressed, but “packaged” in a story. But why should you as a pharmacy, rather you and your team, not simply say what you mean? Why the complicated detour via images and stories? Why say the “un-actual” instead of the “actual”? Because it is exciting and entertaining. And because people remember messages much better this way. In the digital age, storytelling is ONE method among many to convey content, for example, in the context of content marketing, sales or even financial management. There are plenty of other methods, so it’s all the more exciting that more and more companies in a wide variety of industries are making use of storytelling. So you, as a local pharmacy doing storytelling, don’t just say that your overall services are more beneficial to the customer than the low prices of mail order. You tell a story, show pictures or videos that package that statement, “the actual thing.” Your potential customers (readers, listeners, viewers) need to unpack the “actual” again for it to have an impact. So in storytelling, you don’t talk about factual data and facts, but for example in comparisons, adorned with linguistic devices (irony, metaphor, etc.). The reader/listener/viewer must “unravel” the packaging and make the right analogy between what is said and what is meant. Storytelling is by no means new, for thousands of years people have been telling stories to achieve certain reactions or insights. In business, in child rearing, in religion, in art and culture, in ethics, and so on. One of the most important fathers of the theory of storytelling is Aristotle. The rhetorical devices named above spring from his rhetoric. They all have in common that one does not say what one means, but something else. And this is exactly how they create attention and tension. For storytelling to work, for stories to be understood, there absolutely must be a connection or something in common between what is said and what is meant. Otherwise, the addressee will not be able to “unpack” them in a meaningful way and recognize the “meant”. Here’s how to approach preparing your story. The first, most important step is to answer the following question: What is there to tell about you or your pharmacy? From this, make your pharmacy’s own stories! Then, create a structure: What do you/the storyteller want the customer to achieve with the story? Heroes = Protagonist: Who is the main character in the story? Is it a person, an organization or a personified product? Your customers identify with the hero and see themselves in him. Challenges, conflicts, resistance, new tasks that have not been solved so far create tension that evokes emotion (fear, anger, joy, desire). Without this element, the story does not work. Phases = dramaturgy: What follows when? The story unfolds in three phases: Background – Action – Outcome At the end of a story, it is advisable to give a resolution. How did the story end? Your customers need it to find inner peace again. If you withhold the resolution from the audience, don’t be surprised if there are questions. Then it’s on to building the story: Phase 1 – Background: This is where the hero/heroine of the story and the initial situation/existing situation or background is described. This part of the story answers the question: What was in the beginning? Phase 2 – Actions: A new circumstance creates a predicament, conflict, or a challenge for the hero/heroine. He/she must face it and experiences ups and downs in his/her activities. Phase 3 – Result: In the end, the hero succeeds (or sometimes fails). The tension is resolved. Phase 3 is the place for a logical argument or a call to action. By the way, Aristotle already referred to the three phases in Dialectical Rhetoric (Phase 1 – Ethos- the character of the hero, Phase 2 – Pathos, the emotional journey and Phase 3 – Logos, the argument). And here is a simple example (which you underline with a photo, depending on the medium): Susi Sorglos, 31 years old, is a young mother with a preference for natural medicine and digital purchases. She always orders homeopathic, over-the-counter medicines for her 2-year-old daughter Sarah and other medicines for herself and her husband online from a mail-order pharmacy. building the story Late in the evening of February 12, her daughter develops a fever and it continues to rise, despite calf wraps and Belladonna globules. She can’t get any fever-reducing remedies sent on such short notice via the Internet pages of her favorite mail-order company. And the live chat is no longer manned at this hour. Perplexed and worried, she considers taking Sarah to the hospital, but then calls her mother. She listens to her and asks in amazement: “Tell me, why haven’t you been to the nearest emergency pharmacy? There you can get advice even at night and, above all, you can get the medicines you need right away.” Susi looks on the Internet and within seconds finds our address in the list of emergency pharmacies in her district. Her husband leaves immediately and is back home within 30 minutes with a fever-reducing juice for small children. An hour later: Sarah is sleeping peacefully, her fever has already dropped significantly and she makes a relaxed impression. Feeling good, Susi and her husband also go to sleep reassured – inspired by the certainty that they will ALWAYS find help and advice from us.
Edgar Allan Poe (1809–49) may be the most misunderstood and the most disliked of serious writers who have made a deep impact on the American public. This is in part the consequence of his sensational and morbid themes—hysteria, catalepsy, metempsychosis, hallucinations, premature burial, the odd impulse, the bizarre fetish, the split personality, the paranoid delusion, insane revenge, and bestial murder. But more important, Poe’s general reputation is the unfortunate consequence of persistent errors of fact and interpretation that have twisted the public view of the writer’s life and work from the very beginning. Just four years after Poe’s death, the Reverend George Gilfillan proclaimed: Poets as a tribe have been rather a worthless, wicked set of people; and certainly Edgar A. Poe, instead of being an exception, was probably the... A Message from the Editors Popular Right Now
[Previous] [Contents] [Index] [Next] Backing Up and Recovering Data This chapter includes: No matter how reliable your hardware and electrical supply are, or how sure you are that you'll never accidentally erase all your work, it's just common sense to keep backups of your files. Backup strategies differ in ease of use, speed, robustness, and cost. Although we'll discuss different types of archives below, here's a quick summary of the file extensions associated with the different utilities: Extension Utility .tar pax or tar .cpio pax or cpio .gz gzip or gunzip .tar.gz or .tgz tar -z .z or .F melt No matter how robust a filesystem is designed to be, there will always be situations in the real world where disk corruption will occur. Hardware will fail eventually, power will be interrupted, and so on. The QNX 4 filesystem has been designed to tolerate such catastrophes. It is based on the principal that the integrity of the filesystem as a whole should be consistent at all times. While most data is held in the buffer cache and written after only a short delay, critical filesystem data is written immediately. Updates to directories, inodes, extent blocks, and the bitmap are forced to disk to ensure that the filesystem structure on disk is never corrupt (i.e. the data on disk should never be internally inconsistent). If a crash occurs, you can such utilities as fdisk, dinit, chkfsys, and spatch to detect and repair any damage that happened to files that were open for writing at the time of the crash. In many cases, you can completely restore the filesystem. Sometimes the damage may be more severe. For example, it's possible that a hard disk will develop a bad block in the middle of a file, or worse, in the middle of a directory or some other critical block. Again, the utilities we've provided can help you determine the extent of such damage. You can often rebuild the filesystem in such a way as to avoid the damaged areas. In this case, some data will be lost, but with some effort, you can recover a large portion of the affected data. Backup strategies Your backup strategy will consist of making one or more backups on a periodic or triggered basis. For each backup you incorporate in your strategy, you have to choose: Often, a comprehensive backup strategy incorporates some backups on the local side (i.e. controlled and stored on the same machine that the data is located on), and others that copy data to a remote machine. For example, you might automatically back up a developer's data to a second hard drive partition on a daily basis and have a central server automatically back up the developer's data to a central location on a weekly basis. Choosing backup storage media and location Early in the process of determining your backup strategy, you're likely to choose the location of your data backups and the media to store the backups on, because these choices are the primary factors that affect the hardware and media costs associated with the system. To make the best choice, first take a close look at what you need to back up, and how often you need to do it. This information determines the storage capacity, transfer bandwidth, and the degree to which multiple users can share the resource. Your choices of backup media vary, depending on whether you create backup copies of your data on a local machine or on a remote machine by transferring the data via a network: Here's a summary of some of the backup media you might consider, and their availability for local or remote backups: Media Local/Neutrino Remote Floppy Yes Yes LS-120 Yes Yes Tape No Yes CD Yes Yes DVD No Yes Hard disk Yes Yes Flash device Yes Yes USB mass-storage device Yes Yes Choosing a backup format When backing up your data, you need to decide whether to back up each file and directory separately, or in an archive with a collection of other files. You also need to decide whether or not to compress your data to reduce the storage requirements for your backups. The time lost to compression and decompression may be offset to a degree by the reduced time it takes to write or read the compressed data to media or to transfer it through a network. To reduce the expense of compression, you may choose to compress the backup copies of your data as a background task after the data has been copied -- possibly days or weeks after -- to reduce the storage requirements of older backups while keeping newer backups as accessible as possible. Controlling your backup You should back up often enough so that you can recover data that's still current or can be made current with minimal work. In a software development group, this may range from a day to a week. Each day of out-of-date backup will generally cost you a day of redevelopment. If you're saving financial or point-of-sale data, then daily or even twice-daily backups are common. It's a good idea to maintain off-site storage. Archiving your data You can store backups of each of your files separately, or you can store them in an archive with other files that you're backing up. Files stored in an archive can be more readily identified as belonging to a certain time or machine (by naming the archive), more easily transferred in bulk to other systems (transfer of a single archive file), and can sometimes be more readily compressed than individual files can. You have several archive formats to choose from under Neutrino, including pax, and tar. Neutrino also supports cpio (*.cpio), but we recommend it only when the archive needs to be readable by other systems that use cpio archives. Creating an archive The simplest backup you can do on your system is to duplicate the files individually using cp or pax. For example, to duplicate a single file: cp -t my_file backup_directory echo my_file | pax -rw backup_directory To back up an entire directory, type: cp -Rt my_directory backup_directory find my_directory -print | pax -rw backup_directory To back up only certain files matching some criteria, use the find utility or other means of identifying the files to be backed up, and pipe the output to pax -rw, like this: find my_directory -name '*.[ch]' | pax -rw backup_directory To combine individual files into a single archive, use tar or pax. These utilities take all the files that you give them and place them into one big contiguous file. You can use the same utilities to extract discrete files from the archives. Note: The filesystem can't support archives -- or any other files -- that are larger than 2G. When you use pax as an archiver (pax -w mode), it writes tar-format archives. Your choice of which to use is based on the command-line syntax that works better for you, not the format of the archives, because the formats are identical. The pax utility was created as part of the POSIX standard to provide a consistent mechanism for archive exchange (pax stands for Portable Archive eXchange), thus avoiding conflict between variants of the tar utility that behave differently. You can create archives of: You can keep the archive on your local system, but we recommend that you keep a copy of it on a remote system; if the local system gets physically damaged, or the hard disk is corrupted, you'll lose a local archive. Extracting from an archive To extract from the archive, you can use pax with the -r option: pax -rf my_archive.tar or tar with the -x (extract), -v (verbose), and -f (filename) options: tar -xvf my_archive.tar Note: To view the contents of the archive without extracting them, use tar with the -t option instead of -x. Compressing an archive An archive can be quite large -- especially if you archive the entire partition. To conserve space, you can compress archives, although it takes some time to compress on storage and decompress on retrieval. Neutrino includes the following compressors and decompressors: The best choice is usually gzip, because it's supported on many operating systems, while freeze is used mainly for compatibility with QNX 4 systems. There are also many third-party compressors. Note: The gzip utility is licensed under the Gnu Public License (GPL), which is a consideration if you're going to distribute gzip to others as part of the backup solution you're developing. For example, to compress my_archive.tar to create a new file called my_archive.tar.gz, type: gzip my_archive.tar This file is much smaller than the original one, which makes it easier to store. Some of the utilities -- including gzip -- have options that let you control the amount of compression. Generally, the better the compression, the longer it takes to do. Note: The default extension is .tar.gz, but you'll see others, such as .tgz. You can use the -S option to gzip to specify the suffix. Decompressing the archive To decompress the archive, use the compressor's corresponding utility. In the case of a .gz or .tgz file, use gunzip: gunzip my_archive.tar.gz gunzip my_archive.tgz These commands decompress the file, resulting in my_archive.tar. You can also use tar with the -z option to extract from the archive without decompressing it first: tar -xzf my_archive.tgz Storage choices You can back up to a CD by using a CD burner on the Neutrino system or by creating an ISO image and copying it to a system with a CD burner that can burn ISO images. If you want to burn CDs on a Neutrino system, download cdrecord, which you can find in the software under QNX 6.x Fixes on http://developers.qnx.com/. In either case, you have to create an ISO image of the data that you want to burn to a CD. You can do this with mkisofs, a utility that's included with cdrecord. Before you can create an ISO image, you need to arrange the files into the directory structure that you want to have on the CD. Then use mkisofs, like this: mkisofs -l -f -r -joliet -quiet -V"My Label" -o my_iso_image.iso This command creates an ISO image named my_iso_image.iso with the label, My Label, using the Joliet file format, allowing full 31-character filenames (-l), following all symbolic links when generating the filesystem (-f), and generating SUSP and RR records using the Rock Ridge protocol (-r). Once you've created the ISO image, you can send the image to a system that can burn an ISO image or you can burn it using cdrecord: cdrecord -v speed=2 dev=/dev/cd0 my_iso_image.iso This command burns a CD at dual speed (2), using the CD burner called cd0, from the ISO image called my_iso_image.iso. For more information, see the documentation for cdrecord. Note: For a list of supported CD drives, see the README file that comes with the cdrecord source code. Bootable CDs You can also make the CD bootable, using cdrecord and its associated utilities, as follows: 1. Create a bootable floppy that calls the needed scripts and includes the needed binaries in the image. 2. Make an image of the floppy, using the dd utility. For example: dd if=/dev/fd0 of=/floppy.img 3. Create a directory with all the needed binaries, in the layout that you want in your CD-ROM ISO image. For example: mkdir iso_image cp -Rc /bin iso_image/bin cp -Rc /etc iso_image/etc 4. Make sure that the isocatalog is in /usr/share/cdburning on the system. 5. Create the ISO image using mkisofs, making sure to specify the catalog with the -c option. For example: mkisofs -l -f -r -joliet -quiet -V"My Label" -b floppy.img \ -c /usr/share/cdburning/isocatalog -o my_iso_image.iso 6. Burn the ISO image to a CD. Removable media Other forms of removable media are also useful for backing up data. Neutrino supports LS-120, magnetic optical (MO drives), internal ZIP drives, and USB mass-storage devices. Each has its own benefits and weaknesses; it's up to you to determine which form of media is best for backing up your data. For instructions on how to install this hardware, see the Connecting Hardware chapter in this guide. Backing up physical hard disks Note: The instructions here are for copying from one hard disk to another of identical properties (size, make model). To make a copy of a drive that differs in size and make, contact technical support for the QNX_Drive_Copy utility. You can make identical images of hard drives under Neutrino, using simple utilities. This is called making a raw copy of the drive. If you have an identical hard drive (manufacturer, size, model number), you can simply attach the drive to the system. Make sure you know which position the drive is set up as (e.g. EIDE Primary Slave). Once you've attached the drive, boot the Neutrino system. The system should automatically detect the hard drive and create an entry in the /dev directory for it. The new entry should appear as /dev/hd1 if there are only two drives in the system. If there are more than two, then the drive could be hd1, hd2, and so on. In this case, use the fdisk to identify which drive is which. The new drive shouldn't have any partitions set up on it and should be blank. Caution: Be absolutely positive about the drives before continuing, because if you don't identify the drives correctly, you could copy the contents of the blank hard drive onto your original drive, and you'll lose all your data. There's no way to recover from this. Once you've identified the drives, type: cp -V /dev/hd0 /dev/hd1 where hd0 is the original hard disk, and hd1 is the new drive that you're copying to. This command copies everything from the first drive, including partition tables, boot loaders, and so on, onto the second drive. To test that the copy was successful, remove the original drive and put the backup drive in its place, then boot the system from the backup drive. The system should boot into Neutrino and look the same as your original drive. Keep the backup in a safe location. Ghost Images Some Neutrino users have used ghost images for backups, but we don't recommend them. Partition information might not be restored properly, causing filesystems to not boot correctly. If you run fdisk again on the drive, the drive reports incorrect information, and fdisk writes incorrect data to the drive. Remote backups Remote backups are generally a much safer solution than storing a backup on a local system, because a remote server is generally more reliable -- as the saying goes, don't put all your eggs in one basket. Depending on your situation, it might make sense to buy a good system with lots of server-grade hardware, and then buy regular systems to develop on. Make regular backups of your server. Neutrino ships with a copy of the CVS (Concurrent Versions System) client utility. In order to use CVS, you need to have a CVS server (preferably one that your company administers). CVS lets you manage your source archives safely and remotely. For more details, see the Using CVS chapter in this guide. Remote filesystems Storing a second backup on a remote system is often a simple yet effective way to prevent the loss of data. For example, if you have a basic archive of your code in a separate directory on your local system, and then the hard disk breaks down for some unforeseen reason, you've lost your local backup as well. Placing a copy on a remote filesystem effectively lowers the chance of losing data -- we highly recommend it. Note: If you place a file on a non-Neutrino filesystem, you might lose the file's permissions. Files under Neutrino (like other UNIX systems) have special file permissions (see Working with Files) that are lost if you store individual files on a Windows-based filesystem. If you create an archive (see "Archiving your data," above), the permissions are preserved. Other remote backups There are other remote version systems (similar to CVS) that are available to Neutrino via third-party solutions. Many of them are free; search the Internet for the tools that are right for your company and project. QNX 4 disk structure If you ever have a problem with a QNX 4 filesystem, you'll need to understand how it stores data on a disk. This knowledge will help you recognize and possibly correct damage if you ever have to rebuild a filesystem. The <sys/fs_qnx4.h> header file contains the definitions for the structures that this section describes. For an overall description of the QNX 4 filesystem, see the Working with Filesystems chapter. Partition components A QNX 4 filesystem may be an entire disk (in the case of floppies) or it may be one of many partitions on a hard disk. Within a disk partition, a QNX 4 filesystem contains the following components: QNX 4 filesystem in a disk partition Components of a QNX 4 filesystem in a disk partition. These structures are created when you initialize the filesystem with the dinit utility. Loader block The first physical block of a disk partition is the loader block. It contains the bootstrap code that the BIOS loads and then executes to load an OS from the partition. If a disk hasn't been partitioned (e.g. it's a floppy), this block is the first physical block on the disk. Root block The root block is the second block of a QNX 4 partition. It's structured as a standard directory and contains a label field and the inode information for these special files: The files /.boot and /.altboot contain images of the operating system that can be loaded by the QNX bootstrap loader. Normally, the QNX loader loads the OS image stored in the /.boot file. But if the /.altboot file isn't empty, you can load the image stored in it. For more information, see the Controlling How Neutrino Starts chapter. Bitmap blocks Several consecutive blocks follow the root block. The bitmap blocks form the bitmap for the QNX 4 partition. One bit exists for each block on the partition; thus one bitmap block is used for every 4096 disk blocks (corresponding to 2M of disk space). If the value of a bit is zero, the corresponding block is unused. Unused bits at the end of the last bitmap block (for which there are no corresponding disk blocks) are turned on. Bit assignments start with the least-significant bit of byte 0 of the first bitmap block -- which corresponds to QNX 4 block #1. Root directory The root directory follows the bitmap blocks. The root directory is a "normal" directory (see the "Directories" section), with two exceptions: The dinit utility creates this directory with initially enough room for 32 directory entries (4 blocks). The root directory (/) contains directory entries for several special files that always exist in a QNX 4 filesystem. The dinit utility creates these files when the filesystem is first initialized. QNX 4 root dir (/) Contents of the root directory, /. File Description /. A link to the / directory /.. Also a link to the / directory /.bitmap Represents a read-only file that contains a map of all the blocks on the disk, indicating which blocks are used. /.inodes A normal file of at least one block on a floppy/RAM disk and 16 blocks on other disks, /.inodes is a collection of inode entries. The first entry is reserved and used as a signature/info area. The first bytes of the .inode file are set to IamTHE.inodeFILE. /.longfilenames An optional file that stores information about files whose names are longer than 48 characters; see "QNX 4 filesystem" in Working with Filesystems. /.boot Represents an OS image file that will be loaded into memory during the standard boot process. This file will be of zero length if no boot file exists. /.altboot Represents an OS image file that will be loaded into memory during the alternate boot process. This file will be of zero length if no alternate boot file exists. A directory is simply a file that has special meaning to the filesystem; the file contains a collection of directory entries. Directory file A directory entry. The bits in the i_status field indicate the type of the directory entry: 0 0 Unused directory entry 0 1 Normal, used directory entry 1 0 Link to an entry in /.inodes (which should be used) 1 1 Invalid The first directory entry is always for the . ("dot") link and includes a directory signature ("I[heart-symbol]QNX"). The hexadecimal equivalent of the [heart-symbol] character is 0x03. This entry refers to the directory itself by pointing to the entry within the parent directory that describes this directory. The second entry is always for the .. ("dot dot") link. This entry refers to the parent directory by pointing to the first block of the parent directory. Every directory entry either defines a file or points to an entry within the /.inodes file. Inode entries are used when the filename exceeds 16 characters or when two or more names are linked to a single file. If you've enabled support for long filenames, the root directory of the filesystem also includes the .longfilenames file, which stores information about files whose names are longer than 48 characters. The first extent (if any) of a file is described in the directory/inode entry. Additional file extents require a linked list of extent blocks whose header is also in the directory/inode entry. Each extent block can hold location information for up to 60 extents. Files with names greater than 16 characters, and files that are links to other files, are implemented with a special form of directory entry. These entries have the QNX4FS_FILE_LINK bit (0x08) set in the i_status field. For these files, a portion of the directory entry is moved into the /.inodes file. inode entry An inode entry. If the filename is longer than 48 characters: Extent blocks Extent blocks are used for any file that has more than a single extent. The i_xblk field in the directory entry points to one of these extent blocks, which in turn defines where the second and subsequent extents are to be found. An extent block is exactly one 512-byte disk block with the following form: Extent block An extent block. Each extent block contains: The first extent block also contains a redundant pointer to the first file extent (also described within the directory/inode entry). This lets you recover all data in the file by locating this block alone. Files or file extents are groupings of blocks described by directory/inode entries; they have no structure imposed on them by the QNX 4 filesystem. Most files in Neutrino have the following overall structure: File structure QNX 4 file structure. File-maintenance utilities If a crash occurs, you can use the following file-maintenance and recovery utilities: This section gives a brief description of these utilities; for more information, see the Utilities Reference. The fdisk utility creates and maintains the partition block on a hard disk. This block is compatible with other operating systems and may be maintained by other OS versions of fdisk (although ours has the advantage of recognizing QNX-specific information). If the partition loader is missing or damaged, fdisk can create it. Note: We recommend that you keep a hard copy of the partition table information for every disk in your network. The dinit utility creates (but the QNX 4 filesystem maintains) the following: If something destroys the first few blocks of your filesystem, you can try to recover them by using the -r option to dinit and then running chkfsys. For more information, see dinit in the Utilities Reference. The chkfsys utility is your principal filesystem-maintenance tool. This utility: The chkfsys utility assumes that the root block is valid. If the root block isn't valid, chkfsys complains and gives up -- you'll need to try restoring the root block with the dinit utility. The dcheck utility checks for bad blocks on a disk by attempting to read every block on the drive. When you specify the -m option, dcheck removes any bad blocks from the disk allocation bitmap (/.bitmap). If it finds the file /.bad_blks, dcheck updates the bitmap and recreates the /.bad_blks file. You can run dcheck a few times to increase your chances of recognizing bad blocks and adding them to the /.bad_blks file. The zap utility lets root remove files or directories from the filesystem without returning the used blocks to the free list. You might do this, for example, if the directory entry is damaged, or if two files occupy the same space on the disk (an error). Recovering a zapped file If you zapped a file in error, it's sometimes possible to recover the zapped file using the zap utility with the -u option immediately after the deletion. You can recover a zapped file using zap under these conditions: You may sometimes find that files or directories have been completely lost due to disk corruption. If after running chkfsys, you know that certain key files or directories weren't recovered, then you might be able to use spatch to recover some or all of this data. The spatch utility lets you browse the raw disk and patch minor problems. You can sometimes cure transient disk problems by reading and writing the failing block with spatch. Note: Before using spatch, make sure you understand the details of a QNX 4 filesystem; see "QNX 4 disk structure" earlier in this chapter. Recovering disks and files Using chkfsys The chkfsys utility is your principal tool for checking and restoring a potentially damaged filesystem. It can identify and correct a host of minor problems as well as verify the integrity of the disk system as a whole. Normally, chkfsys requires that the filesystem be idle and that no files be currently open on that device. You'll have to shut down any processes that have opened files or that may need to open files while chkfsys is running. To run chkfsys on a mountpoint, type: chkfsys mountpoint The utility scans the entire disk partition from the root down, building an internal copy of the bitmap and verifying the consistency of all files and directories it finds in the process. When it has finished processing all files, chkfsys compares the internal bitmap to the bitmap on the disk. If they match, chkfsys is finished. If any discrepancies are found, chkfsys will -- upon your approval -- rewrite the bitmap with data consistent with the files it was able to find and verify. In addition to verifying block allocation (bitmap), chkfsys attempts to fix any problems it finds during the scan. For example, chkfsys can: When to run chkfsys It's a good idea to run chkfsys as part of your regularly scheduled maintenance procedures -- this lets you verify that the data on your disk is intact. For example, you might consider running chkfsys on your network servers every time they boot. An automated check on the filesystem at boot time guarantees that chkfsys will attempt to fix any problems it finds during the scan. To automate this process, add chkfsys to the server's rc.local file (see Controlling How Neutrino Starts). It's especially important to run chkfsys after a system crash, power outage, or unexpected system reboot so that you can identify whether any files have been damaged. The chkfsys utility checks the "clean" flag on the disk to determine whether the system was in a consistent state at the time. The clean flag is stored on disk and is maintained by the system. The flag is turned off when the filesystem is mounted and is turned on when the filesystem is unmounted. When the clean flag is set, chkfsys assumes that the filesystem is intact. If chkfsys finds the clean flag off, it tries to fix the problem. The chkfsys utility supports a -u option, which overrides a set clean flag and tells chkfsys to run unconditionally. You might want to override the clean flag when: Using chkfsys on a live system The chkfsys utility normally requires exclusive use of the filesystem to provide a comprehensive verification of the disk. Caution: There is some risk in running chkfsys on a live system -- both chkfsys and the filesystem are reading and possibly writing the same blocks on the disk. If you do this, and chkfsys writes something, it sends a message to the filesystem to invalidate itself, and that makes the filesystem remount itself and go back to the disk to reread all data. This marks any open files as stale; you'll get an error of EIO whenever you read or write, unless you close and reopen the files. This can affect things such as your system log file. Static changes, in place, on files or directories that the filesystem doesn't currently have opened will probably not cause problems. If you're running an application that can't afford downtime or you couldn't run chkfsys because files were open for updating, try to run chkfsys with the -f option: chkfsys -f /dev/hd0t79 This invokes a special read-only mode of chkfsys that can give you an idea of the overall sanity of your filesystem. Recovering from a bad block in the middle of a file Hard disks occasionally develop bad blocks as they age. In some cases, you might be able to recover most or even all the data in a file containing a bad block. Some bad blocks are the result of power failures or of weak media on the hard disk. In these cases, sometimes simply reading then rewriting a block will "restore" the block for a short period of time. This may allow you to copy the entire file somewhere else before the block goes bad again. This procedure certainly can't hurt, and is often worth a try. To examine the blocks within a file, use the spatch utility. When you get to a bad block, spatch should report an error, but it may have actually read a portion of "good" bytes from that block. Writing that same block back will often succeed. At the same time, spatch will rewrite a correct CRC (Cyclic Redundancy Check) that will make the block good again (but with possibly incorrect data). You can then copy the entire file somewhere else, and then zap the previously damaged file. To complete the procedure, you mark the marginal block as bad (by adding it to the /.bad_blks file), then run chkfsys to recover the remaining good blocks. If this procedure fails, you can use the spatch utility to copy as much of the file as possible to another file, and then zap the bad file and run chkfsys. What to do if your system will no longer boot If a previously working Neutrino system suddenly stops working and will no longer boot, then one of the following may have occurred: The following steps can help you identify the problem. Where possible, corrective actions are suggested. 1. Try booting from CD or across the network. 2. Start the hard disk driver. For example, to start a driver for an Adaptec series 4 SCSI adapter, type: devb-aha4 options & If you're using another type of driver, enter its name instead. For example: devb-eide options qnx4 options & This should create a block special file called /dev/hd0 that represents the entire hard disk. 3. Run fdisk. Running the fdisk utility will immediately give you useful information about the state of your hard disk. The fdisk utility might report one of several types of problems: Problem: Probable cause: Remedy: Error reading block 1 Either the disk controller or the hard disk itself has failed. If the disk is good, replacing the controller card might let you continue using the disk. Otherwise, you'll have to replace the hard drive, reinstall Neutrino, and restore your files from backup. Wrong disk parameters Your hardware has probably "lost" its information about this hard drive -- likely because the battery for the CMOS memory is running low. Rerunning the hardware setup procedure (or the programmable option select procedure on a PS/2) will normally clear this up. Of course, replacing the battery will make this a more permanent fix. Bad partition information If the disk size is reported correctly by fdisk, but the partition information is wrong, then the data in block 1 of the physical disk has somehow been damaged. Use fdisk to recreate the correct partition information. It's a good idea to write down or print out a hard copy of the correct partition information in case you ever have to do this step. 4. Mount the partition and the filesystem. At this point, you have verified that the hardware is working (at least for block 1) and that a valid partition is defined for Neutrino. You now need to create a block special file for the QNX 4 partition itself and to mount the block special file as a QNX 4 filesystem: mount -e /dev/hd0 mount /dev/hd0t79 /hd This should create a volume called /dev/hd0t79. Depending on the state of the QNX 4 partition, the mount may or may not fail. If the partition information is correct, there shouldn't be any problem. Since the root (/) already exists (on a CD or on a remote disk on the network), we've mounted the local hard disk partition as a filesystem with the name /hd. Your goal now would be to run the chkfsys utility on the disk to examine -- and possibly fix -- the filesystem. Note: If you booted from CD and you don't suspect there's any damage to the filesystem on your hard disk (e.g. the system was unable to boot because of a simple error introduced in the boot file or system initialization file), you can see up a symbolic link to your hard disk partition in the process manager's in-memory prefix tree: ln -sP /hd / If you run this command, you can skip the rest of this section. If the mount fails... If the mount fails, the first portion of the QNX 4 partition is probably damaged (since the driver will refuse to mount what it considers to be a corrupted filesystem). In this case, you can use the dinit utility to overlay enough good information onto the disk to satisfy the driver: dinit -hr /dev/hd0t79 The -r option tells dinit to rewrite: You should now be able to reissue the mount command and once again try to create a mountpoint for a QNX 4 filesystem called /hd. After doing this, you'll need to rebuild the bitmap with chkfsys, even on a good partition. At least a portion of your QNX 4 filesystem should now be accessible. You can use chkfsys to examine the filesystem and recover as much data as possible. If the hard disk is mounted as /hd (e.g. the machine boots from CD), enter: path_on_CD/chkfsys /hd If the hard disk is mounted as / (e.g. a network boot), enter: network_path/chkfsys / In either case: What you do next depends on the result of running chkfsys. If the disk is unrecoverable If, for any reason, your disk is completely unrecoverable, you might be able to use spatch (see above) to patch your files and directories. In some cases, you may need to reinstall Neutrino and restore your disk from your backup files. If significant portions of the filesystem are irreparably damaged, or important files are lost, then restoring from backup might be your best alternative. If the filesystem is intact If your filesystem is intact, yet the machine still refuses to boot from hard disk, then either of the following is probably damaged: To rewrite a partition loader, use fdisk: fdisk /dev/hd0 loader To rewrite the QNX loader, use dinit: dinit -b /dev/hd0t79 You should now be able to boot your system. [Previous] [Contents] [Index] [Next]
I'm teaching a jr. high/high school web programming class, and we're starting with simple elements and attributes like font and color before moving on to CSS. I know color is deprecated and font is not included in HTML5, but for teaching purposes, I find it convenient to start with simple HTML tags and work our way up to CSS. The students get a lot of joy out of being able to change colors on a page during the first week of class. (I also teach them marquee and blink in week 1, but inform them that if they ever use them again, they will lose points). One of the students started submitting homework with odd things in the color attribute values, like "Skittles" or "Spiderman". I started experimenting with this and discovered that just about anything you put into the color="" attribute on the font tag produces some sort of color. And it appears that the color is consistent across the latest versions of IE, Firefox, Chrome, Opera, and Safari. I have discovered that putting "LuckyCharms" in as a CSS color DOES NOT WORK. It only seems to work where colors are expected in HTML attributes, for example font color="LuckyCharms", or body bgcolor="LuckyCharms". I'm trying to explain to my class why this happens, and so far I haven't been able to make sense of it, or to Google a good answer. It would appear that it's being interpreted as a color code, but I can't make sense of how. UPDATE: After some trial and error, I have determined a 5-step algorithm (using the link provided) to convert pretty much any string into the corresponding hex color. I will provide the algorithm here for the edification of future visitors: 1. Change each non-hex character to a 0. 2. Add 0's to the string until its length is a multiple of 3. 3. Divide string into 3 equal parts. 4. While the length of the sub-strings is greater than 2, and all three of the sub-strings begin with a 0, remove the leading 0s from each string. 5. If the length of the sub-strings is still greater than 2, then truncate each substring to 2 characters. That's it, put the substrings together and you've got your hex color code. I have verified this algorithm with about 20 different samples and compared the results using the Firefox ColorZilla add-on color picker. Note that in this case, the rules ARE indeed specifically stated in the link specified in one of the answers and will be adhered to by all browsers. So it is something you can count on to work in any browser (should you really want to use funny color names). • 4 Instead of teaching them how it looks, teach them what it means. Trust me, worked very well with my brother when I taught him that. Teach them good HTML, what <p> means, and what <strong> means. Then move forward to styling. Also, don't forget to mention that <font> and <color> are deprecated, and should not be used on an actual site, and are only for demonstrational purposes. Now I can read your question. :) Oct 17, 2012 at 16:50 • Proposals to close a question, or closing a question, are not meant to say that the question was bad. Just that it’s about something that is already covered, and time would be better spent in improving the answers to the existing question than starting from scratch in answering a duplicate. Being a duplicate means that it’s about something that has interested people earlier, and has been answered; so the question is relevant, just a duplicate. Oct 17, 2012 at 16:58 • 7 I created a "random string to css color" converter based on your 5 steps. What do you think? Mar 10, 2013 at 19:31 • 1 @TimPietrusky FANTASTIC! (took me a few minutes to figure out how to work it though) Mar 11, 2013 at 15:27 • 1 @JeremyGoodell thanks dude! What took you so long? Is the UI that bad? I created a standalone version: randomstringtocsscolor.com and linked your question as the src. Mar 11, 2013 at 16:42 4 Answers 4 The HTML 5 specification includes the rules for parsing legacy colours. They are rather long, and are designed to allow browsers to be consistent about how they handle broken code. • And none of these rules apply to CSS. CSS has its own set of rules for interpreting color values, which are pretty strict. (CSS21 and css-color-3) – BoltClock Oct 17, 2012 at 16:56 • Ok, I think this works. I followed the instructions for legacy colors and converted "LuckyCharms" first into "LuckyCharms0" to make the length a multiple of 3, then converted it into three equal size strings: "Luck" "yCha" and "rms0", then I truncated each string like so: "Lu", "yC" and "rm". Then I got stumped for a minute, but ended up eventually converting "Lu" to "00", "yC" to "C0", and "rm" to "00". Sure enough, "00C000" appears to be the same color as "LuckyCharms". I'm not sure the class will find this exercise as interesting as I did ... Oct 17, 2012 at 17:14 • Rats. I am now using the Firefox Colorzilla addon to see what the colors really are. LuckyCharms is actually #0CC000 so my interpretation of the parsing rules is not quite right. Oct 17, 2012 at 18:02 • Ok, I see, I did not interpret instruction 10 correctly. LuckyCharms is indeed #0CC000 by the following rules: (1) Convert all non hex chars to 0's: 00c00C0a000; (2) Add 0s to make length a multiple of 3: 00c00C0a0000; (3) Split into 3 equal length strings: 00c0 0C0a 0000; (4) Remove leading zeroes from each string while all strings are longer than 2, and all strings still start with 0: 0c0 C0a 000; (5) truncate all strings to 2 characters: 0C C0 00. Now I can sleep tonight. Oct 17, 2012 at 18:09 • 1 I posted the 5-step algorithm as an UPDATE in the question above. Oct 17, 2012 at 18:51 Very interesting. Seems as though the browser will interpret any character it can (a-f) and leave the rest to be 0's if it can't match. For instance: 00DE0 A Still needs more experimenting though. • 1 Spiderman first gets converted to 000de00a0 (replacing all non-hex chars with 0s), which is fine because the length is 9 (a multiple of 3), then to 000 de0 0a0, which is fine since at least one of the strings starts with something other than 0, and then truncate to 00 DE 0A, just like you said. It's essentially a 5-step algorithm. Oct 17, 2012 at 18:40 • 1 Am I missing something, or person with 61.5k rep wrote an answer, that is not an answer at all, that is a comment in fact and that violates everything, we know (or should know) about writing good, quality answers? – trejder Oct 16, 2014 at 12:04 • 4 @trejder Yes, you're missing the fact that this answer was written (almost exactly) 2 years ago, when I didn't have 61.5k. Oct 16, 2014 at 13:27 This is an intriguing question. Through brief experimentation, I've found that "Luck" produces the same color (to my eyes, anyway) as "LuckyCharms" but "LuckBeALady" gets you a darker shade, while "LuckBeALadyTonight" is bluer. BTW, my first thought was that it was acting on the recognizable hex characters, but that turns "LuckyCharms" into cca, which rendered black. Combinations of 0's and the hex chars, as Madara Uchiba suggests, failed to render the same grass green as "LuckyCharms" Don't have an answer tho. • I thought the same thing myself about the hex codes, but discovered it didn't fly. Oct 17, 2012 at 17:02 • According to the rules specified in the link posted by @Quentin, "LuckyCharms" = "Luck yCha rms0" = "Lu yC rm" = #00C000, "Luck" = "Luck00" = "#00C000, LuckBeALady = "Luck BeAL ady0" = "Lu Be ad" = "#00BEAD", and LuckBeALadyTonight = "LuckBe ALadyT onight = "Lu AL on" = #00A000. My testing shows that indeed, these values produce exactly the same colors. Oct 17, 2012 at 17:31 • hmmm, not quite right, it doesn't seem to work for "adamlevine" which according to my parsing should be "adam levi ne00" or "#ADE0E0", but it's not. Oct 17, 2012 at 17:47 The basic answer for what is expected to happen is "it depends on the browser". One of the problems with previous versions of HTML before 5 is that it is unspecified what happens when non-standard HTML is encountered by the browser. The interpretation from @Madara Uchiha is one example of how a browser might interpret the color specification, but it's just as allowable, standards-wise, for the browser to crash or to eject the CD tray or to change the resolution of your monitor to 400x300 px. Of course, this is not ideal - so what you're seeing is one programmer's idea, at one time, as to what should happen if a non-standard HTML color specification is encountered. The reason it doesn't happen with CSS is that it's a different parser interpreting the color. This same parser interprets the color whether it's inline CSS or in a linked-in CSS document. CSS does define what happens to an improper value when it is encountered: it is ignored, and does not affect the document at all. I would say this is a good time to talk to the class about standards compliance, as this is a critical field of understanding for students - and some professionals I have the misfortune to know. When they say, "But color Skittles works just fine", you can tell them that it works fine when they look at it, but it's entirely possible that it would crash their instructors' browser, earning them a big fat F. That's as close to a real-world scenario as you can get, when some of us have to give up our weekends because at demo time somebody else's crappy code doesn't work correctly. I ain't bitter though. Mostly :) • To my way of thinking, if something works the same in IE, Firefox, Chrome, Opera and Safari, it's pretty safe. But I am constantly reinforcing the notion that just because it works, doesn't mean it's correct. And that if you make a mistake in your HTML, it probably won't work in Internet Explorer 6, which some of your visitors are sure to be using. I always take points off for incorrect HTML even if the result is correct. Oct 17, 2012 at 17:19
Stanford Encyclopedia of Philosophy Supplement to Aristotle's Ethics Alternate Readings of Aristotle on Akrasia That, at any rate, is one way of interpreting Aristotle's statements. But it must be admitted that his remarks are obscure and leave room for alternative readings. It is possible that when he denies that the akratic has knowledge in the strict sense, he is simply insisting on the point that no one should be classified as having practical knowledge unless he actually acts in accordance with it. A practical knower is not someone who merely has knowledge of general premises; he must also have knowledge of particulars, and he must actually draw the conclusion of the syllogism. Perhaps drawing such a conclusion consists in nothing less than performing the action called for by the major and minor premises. Since this is something the akratic does not do, he lacks knowledge; his ignorance is constituted by his error in action. On this reading, there is no basis for attributing to Aristotle the thesis that the kind of akrasia he calls weakness is caused by a diminution of intellectual acuity. His explanation of akrasia is simply that pathos is sometimes a stronger motivational force than full-fledged reason. This is a difficult reading to defend, however, for Aristotle says that after someone experiences a bout of akrasia his ignorance is dissolved and he becomes a knower again (1147b6-7). In context, that appears to be a remark about the form of akrasia Aristotle calls weakness rather than impetuosity. If so, he is saying that when an akratic person is subject to two conflicting influences -- full-fledged reason versus the minimal rationality of emotion -- his state of knowledge is somehow temporarily undone but is later restored. Here, knowledge cannot be constituted by the performance of an act, because that is not the sort of thing that can be restored at a later time. What can be restored is one's full recognition or affirmation of the fact that this act has a certain undesirable feature, or that it should not be performed. Aristotle's analysis seems to be that both forms of akrasia -- weakness and impetuosity -- share a common structure: in each case, one's full affirmation or grasp of what one should do comes too late. The difference is that in the case of weakness but not impetuosity, the akratic act is preceded by a full-fledged rational cognition of what one should do right now. That recognition is briefly and temporarily diminished by the onset of a less than fully rational affect. There is one other way in which Aristotle's treatment of akrasia is close to the Socratic thesis that what people call akrasia is really ignorance. Aristotle holds that if one is in the special mental condition that he calls practical wisdom, then one cannot be, nor will one ever become, an akratic person (1152a6-7). For practical wisdom is present only in those who also possess the ethical virtues, and these qualities require complete emotional mastery. Anger and appetite are fully in harmony with reason, if one is practically wise, and so this intellectual virtue is incompatible with the sort of inner conflict experienced by the akratic person. Furthermore, one is called practically wise not merely on the basis of what one believes or knows, but also on the basis of what one does. Therefore, the sort of knowledge that is lost and regained during a bout of akrasia cannot be called practical wisdom. It is knowledge only in a loose sense. The ordinary person's low-level grasp of what to do is precisely the sort of thing that can lose its acuity and motivating power, because it was never much of an intellectual accomplishment to begin with. That is what Aristotle is getting at when he compares it with the utterances of actors, students, sleepers, drunks, and madmen. Return to Aristotle's Ethics
Sunday, June 30, 2019 Wild Free and Happy Sample 18 [Note: This is the eighteenth sample from my rough draft of a far from finished new book, Wild, Free, & Happy.  I don’t plan on reviewing more books for a while.  My blog is home to reviews of 201 books, and you are very welcome to explore them.  The Search field on the right side will find words in the full contents of all rants and reviews, if you are interested in specific authors, titles, or subjects.]  Megafauna Pioneers Every continent has regions of grasslands — savannahs, steppes, prairies, and so on.  Grasslands provide the nutritious greenery that can nourish herds of large herbivores.  Forest or desert ecosystems are far less ideal for grazing animals.  Meat provides nutrients that are essential for good health — nutrients much harder to acquire from wild grassland vegetation.  Hunters prefer to kill a large animal, rather than numerous rodents, grubs, worms, and so on. Naturally, the existence of large herbivores needs to be kept in balance by the existence of hungry carnivores.  Too many grass eaters can turn grasslands into barren wastelands.  Large herbivores and large carnivores are both megafauna.  Megafauna are animals weighing more than 100 pounds (45 kg).  (Outside of America, more than 50 kg.) Many families of megafauna species have expanded across five continents: Africa, Europe, Asia, North America, and South America.  During glacial cycles, some regions currently separated by water became connected by dry land, as sea levels dropped.  Land bridges allowed megafauna on both sides to cross over into new habitats.  Australia has mostly been isolated from the other five continents.  It has its own unique story of herbivores, carnivores, and megafauna extinction spasms. Buried under downtown London, construction crews have discovered the remains of hippos, elephants, Irish elk, aurochs, and lions.  North America was the original homeland for the ancestors of horses, bears, rhinos, camels, and others.  Horses and bears spread across the five continents.  Camels expanded into Asia and Africa.  Rhinos vanished from America five million years ago. Mother Africa was the homeland for the saber-tooth cat group, which later expanded across Eurasia, and then to North America and South America.  Africa was also where the elephant-like family began, which eventually colonized the five continents, diversifying into many forms over millions of years, including mammoths and mastodons.  Until 13,000 years ago, mammoth country ranged from Western Europe, across Siberia, and down into Mexico.  In the Americas, before hunters from Siberia arrived, there were seven elephant-like species. On nutrient rich grasslands, a major trend in evolution was to encourage herbivores to gradually expand to jumbo-sized proportions, a trait that increased their odds for survival.  Bigger was better — thicker hide, stronger, and more dangerous.  Size mattered.  For example: Giant beavers could grow to 7.6 feet (2.3 m) long, and weigh up to 276 pounds (125 kg) — about the size of a black bear. Giant ground sloths could grow as large as elephants.  They could stand erect up to 20 feet (6 m) tall, and weigh 2,204 pounds (1,000 kg). Giant armadillos were mammals that had an armor of bony plates.  Some weighed more than 1,000 pounds (454 kg). Short-faced bears were among the largest land dwelling mammalian carnivores.  They could weigh over 1,500 pounds (680 kg). Irish elk were giant deer that could weigh more than 2,500 pounds (1,133 kg).  Their enormous antlers weighed more than the animal’s skeleton.  They could spread up to 13 feet (4 m) across. Of course, the rise of jumbo herbivores encouraged evolution to also select for larger carnivores.  Grasslands were home to a continuous evolutionary arms race, the ancient sacred dance of eaters and eaten. Later, when skilled teams of hominin hunters became prominent, jumbo size eventually became a huge liability.  (Jumbo herbivores became as vulnerable as whales did when primates began harpooning them from boats.)  Jumbo herbivores were easy to see, and they did not excel at high speed getaways.  To hungry hunters, they were slow moving giant meatballs. In 1961, Colin Turnbull noted that a Mbuti pygmy hunter could singlehandedly kill an elephant with a short handled spear.  This deadly spear technology was available to African hunters two million years ago. Paul Martin stimulated much controversy in the study of megafauna extinctions.  In the 1960s, he was surprised to discover that in Africa, about 1.4 million years ago, a cluster of megafauna species went extinct.  The number of elephant-like species dropped from twelve to eight.  Three species of sabertooth cats, adapted for preying on large animals like the elephant family, also vanished from Africa.  These cats had two long upper teeth that were useful for stabbing through the very thick hides of elephants.  When the elephants declined, the huge incisors became a fatal handicap. Baz Edmeades notes that this time period corresponds to when hominin hunters developed the larger and more complex Acheulean class of tools.  Apparently, hominins were getting better at competing against the sabertooths for jumbo-sized prey.  As the prey populations declined, so did the cats that ate them.  Hominins can survive on a far wider variety of foods.  When elephants are scarce, they can feast on eggs, grubs, or lizards. The notion of hominin-caused extinctions 1.4 million years ago did not sit well with those who proposed the Great Leap Forward theory.  While Jared Diamond accepted the notion of the more recent overkill in North America 13,000 years ago, the far earlier date clashed with his belief that humans were essentially cute chimp-class primates until 40,000 years ago, when the miracle of turbocharged cognitive abilities arrived.  (This date also corresponds to the start of the human migration into snow country.) Later, Martin grated even more nerves when he presented his research on the megafauna extinctions in North America.  He framed them as a rapid thousand year “blitzkrieg” (lightning war) of overkill.  Following World War II, there was a golden age of anthropology, when scholars visited many lands, and learned that most wild folks were not stupid, fiendish, bloody savages.  In fact, they had many admirable traits.  In fact, in many ways their lives were far healthier and saner than those of the anxious stressed out consumers of industrial civilization. It became trendy to issue shining halos to wild people, because they were clearly not relentless maniacal planet thrashers.  Indeed, compared to modern consumers, their eco-impacts can seem close to insignificant.  But, as centuries pass, even modest impacts can gradually snowball into embarrassing blunders that hurl numerous species off the stage. In hindsight, it’s easy to see that most or all techno-innovations have unintended consequences (even fire drills and wooden spears).  These consequences can often outweigh the benefits.  Also, the combined consequences of numerous innovations can swirl into bad juju hurricanes that can sharply impact the stability of entire ecosystems, even the planet’s atmosphere and climate systems. It’s important to put these impacts into proper perspective.  Compared to modern consumers, whose whirlwind lives have staggering eco-impact, the lives of those Pleistocene ancestors were much closer to ecologically sustainable.  Walter Youngquist reported that in just the last few hundred years, highly educated civilized people have dug up and burned 500 million years of safely sequestered carbon, most of it during the lifetime of the baby boomer generation — me and my peers.  Look, it took 1,400,000 years to finally drive all sabertooth cats extinct on five continents.  It took just 40 years for greed-crazed American yahoos, with their rifles and railroads, to exterminate something like 60 million buffalo, and waste most of their meat.  Technology matters. At the same time, paying careful attention to reality leads to far less cognitive dissonance than indulging in magical thinking.  Dan Flores prodded the romantics.  If the Paleolithic was such a long wonderful era of harmony, why did our ancestors abandon it?  Why, in the last 50,000 years, did they fan out across the world?  Why does the pattern of megafauna extinction spasms correspond to the geographical pattern of human expansion? It’s always embarrassing to compare the human saga to our ancestral baseline.  Chimps and bonobos have continued to live sustainably, in the same way, in the same place, for several million years, without swerving off to dangerous experiments in technological innovation.  We seem to be the one and only living species that has wandered off the traditional path.  Many cultures have foolishly succeeded at monopolizing the exploitation of resources in their territories — a perfectly insane joyride of ecological self-destruction that will not have a happy ending. Now, I must confess that I find it a bit difficult to effortlessly believe the overkill theory without a doubt.  I mean, how could a modest population of hunters, travelling on foot, armed with spears, exterminate all of the horses in all of North America, over the course of a dozen centuries or so, while the bison and others survived?  Many readers who have hunted wild horses with spears will find this idea hard to swallow.  To get a deeper understanding of this extinction tragedy, it’s time to pull on our waders, slog down bloody Megafauna Lane, and take a bunch of selfies. Trail of Tears Hominins have been around for maybe 2.8 million years.  During our visit on Earth, there have been several spasms of megafauna extinctions.  The spasms during the hominin era began in Africa about two million years ago, when the hominin predecessors of Homo sapiens were romping around on the savannah.  Our species emerged maybe 300,000 years ago, and eventually expanded eastward, across tropical Asia.  Around 50,000 years ago, folks arrived in Australasia, setting off a wave of large animal extinctions.  Over the course of several thousand years, 17 out of 18 genera of megafauna blinked out. What’s a genera?  It’s the plural of genus.  A genus is a category of closely related species.  For example, the Homo genus includes the species Homo sapiens, Homo neanderthalensis, Homo erectus, and so on. Around 40,000 years ago, humans wandered into Europe, where the extinctions were less extreme because the local megafauna had already been living with dangerous armed primates (Neanderthals and others) for maybe 500,000 years.  The megafauna had learned the hard way that primates were not their good little buddies.  In the European spasm, 21 of 37 genera vanished. Eventually folks expanded across northern Asia (Siberia), and crossed into the Americas, where the extinction spasm was rapid and intense.  Asia lost 24 of 46 genera, North America lost 45 of 61, and South America got hammered hard, with 58 of 71. Finally, on many isolated islands, extinctions happened much later, when humans arrived.  For example, 4,700 years ago in Cuba, 1,500 years ago in Madagascar, 500 years ago in New Zealand, and so on. Attentive readers will perceive that this series of extinction spasms clearly corresponds to the expansion of humans into new regions.  [Martin’s chart]  It is also absolutely clear that the pattern of extinctions does not correspond to patterns in climate history.  Most or all of the genera that blinked out had been in existence for at least several million years, and had survived numerous glacial cycles. Fernando Fernandez summed up the extinctions more broadly.  Between 50,000 years ago, and A.D. 1500, about two thirds of the world’s megafauna species went extinct.  In this process, of the 150 genera of large mammals, at least 97 went extinct.  This statistic does not include the extinctions in Africa prior to 50,000 years ago.  When we take a moment to reverently sniff reality’s butt, it’s easy to see that, in the long run, innovation is not a good little buddy of the family of life.  Our magnificent standard of living has mindlessly created a global gas chamber. No comments:
World’s Most Popular Fabrics and Textiles World's Most Popular Fabrics and Textiles The list of fabric available on the market is endless. What are the most popular fabrics and why? Versatility, durability, and ease of care are some of the reasons. Read on for a list of the worlds most popular textiles, their uses and care, and what makes them so sought after. 1. Cotton leads the pack as the most popular fabric in the world. It is a natural fiber from the cotton plant and is versatile and easy to care for. Cotton has been cultivated for over 7,000 years and only increases in popularity as time goes on. It is often blended with other fibers to create garments that last longer and wash better. Common cotton fabrics include denim, gingham, canvas and broadcloth. Cotton can absorb up to 27 times its own weight in water; is machine washable and can withstand high heat; takes and retains dye color easily; and is strong and durable. Cotton can be used to make shirts, dresses, skirts, pants, jackets, children’s clothes, curtains and other window treatments. 2. Linen, made from the fibers of the flax plant, has been coveted for many thousands of years. Linen has always been a symbol of purity and wealth. Produced in small quantities, this luxurious fabric is valued for its coolness and freshness in hot weather and its remarkable ease of care. Linen is a strong, cool fabric that doesn’t cling to skin and is two to three times stronger than cotton. Linen can absorb moisture without feeling damp. If a warm breeze blows a skirt or dress made from linen fabric it will return to your skin cool to the touch. High-quality linens are free from slubs (those small knots along the fabric) and present a uniformly smooth texture that is beautiful to the touch. Linen can be used in home décor, and in mens’ and womens’ apparel including skirts, dresses, blouses, and shirts. Linen can be dry cleaned, machine washed or steamed. It may be hung to dry and left with a slightly wrinkled look which is part of the charm of the fabric. 3. Polyester is a popular synthetic fabric that has many advantages over its natural counterparts. While synthetic clothing in general is perceived by many as having a less natural feel, polyester offers superior wrinkle resistance, durability and machine washability. Polyester is often blended with other yarns to create wonderful fabrics that mix the benefits of both textiles, like dressy uniform fabrics and professional wear. Synthetic fibers also can create materials with superior water, wind and environmental resistance compared to plant-derived fibers. 4. Wool fiber comes from sheep and other animals like cashmere and mohair from goats, and angora from rabbits. Wool is bulkier than other fabrics and retains heat well making it perfect for cold weather. Wool is usually specified for garments for fire-fighters, soldiers, and others in occupations where they are exposed to the likelihood of fire because it ignites at a higher temperature than cotton or other fabrics. Wool is resistant to static electricity which is why wool garments are much less likely to spark or cling to the body. Australia is the leading producer of wool, especially high quality Merino from the sheep of the same name. Wool can be used in high-quality suits and several types of men’s and women’s apparel and outerwear. 5. Leather is a flexible and durable material created when animal hide is transformed by a process called tanning. The majority of leather today is tanned via chrome tanning, a process discovered in 1858. Chrome tanning is more supple and pliable than vegetable-tanned leather, and does not discolor or lose shape as drastically in water as vegetable-tanned leather. Most leather is made from cow hide but there are many other types of leathers available including suede, aniline, Corinthian and patent. Leather is a versatile material that can be used in upholstery and apparel including automobile interiors, furniture coverings, skirts, pants, jackets, shoes, handbags, and other accessories. Source by Laura Connell What do you think? Leave a Reply Your email address will not be published. GIPHY App Key not set. Please check settings World Most Popular Sports World Most Popular Sports World's Most Famous Novel Understanding the Humorous and Ironic Title of the World’s Most Famous Novel
A Simple Method for the Decapsulation of Dormant Resting Eggs for Nuclear Staining in the Monogonont Rotifer, Brachionus plicatilis Muller The bdelloid rotifer Brachionus plicatilis Müller is an aquatic invertebrate that predominately populates freshwater lakes and ponds. It is a pseudocoelomate which consists of approximately 1000 cells. B. plicatilis exhibits both asexual reproduction in which parthenogenetically derived eggs quickly mature into new progeny (~12 hours) or sexual reproduction in which fertilized eggs diapause for 2-3 months before reinitiating progression into organismic development based on environmental cues, such as water conditions and sunlight. Because B. plicatilis shares many of the conserved genes responsible for dormancy survival such as genes that code for late embryogenesis abundant (LEA), trehalose metabolism and small heat shock proteins (sHSP), it has become an excellent model organism for studies investigating dormancy and developmental biology. Several recent reports have developed procedures in quiescent B. plicatilis resting eggs for molecular manipulation of gene transcription, such as RNAi. However, the dechorionation procedure employed for those previous studies was not effective in our hands to penetrate dessicated resting eggs for nuclei staining. Therefore, we developed a procedure described in this manuscript for decapsulating encysted resting eggs for staining with Hoechst dye. This method may ultimately be used to track phenotypic aspects of entry into and exit from dormancy by determining whether there is a correlation in nuclei number and developmental progress in the Monogonont Rotifer, Brachionus plicatilis Müller. Michael Gotesman and Nitsan Dahan Abstract | Full-Text | PDF Share this  Facebook  Twitter  LinkedIn  Google+ As the costs of dental treatment have skyrocketed among the world, annals of clinical labs recommends Periodonta as an Affordable dental clinic in Turkey
Speech Madness North Carolinians take college basketball very seriously and March Madness is the culmination of all craziness.  This year’s tournament starts on March 19 and lasts through the first week of April and everyone knows the games are even more fun to watch if you have your bracket filled out. A lot of thought goes into these brackets.  Does this team look like it’s starting to peak, really come together?  Who will be out with an injury?  Which team seems to always choke under pressure or always rise to the occasion?  In a pinch, who has the better mascot? No matter how you fill it out, or whether or not you watch any games, using a bracket is a fun way to track progress and even work on some statistics along the way. Speech Madness bracket Speech Madness cards To Play: This bracket starts with the Elite Eight.  Decide how many trials you want per team.  Five would be logical since that’s how many are on the court/team during a basketball game, but ten is fine too.  You will need a set of Speech Madness cards to represent each team (5×8=40 cards or 10×8=80 cards).  Trials might include articulation words, math facts, spelling words, really anything that requires some drill practice. Depending on your child’s goals you might find natural “team” breaks.  For instance, a child working on /r/ carryover might have a final /or/ team, medial /ire/ team, final /er/ team, etc.  If you decided to help your own kids with math facts, you might have a team of 3 times tables, another of 7 times tables, 6 times tables, etc.  If their skill level or goals don’t have natural breaks, no big deal.  Just create teams with words/questions/facts at random. Name each “team” then pick two teams to go up against each other and write each one on the first set of black lines.  Go through all the cards on one team and place the score as a percentage next to it.  Now go through the other set and put down that team’s percent correct.  Who was the winner?  That team moves on to the “Final Four” and their name is written on the adjacent red line. Choose two more teams for the next “Elite Eight” game.  The winner from that grouping also is written on a red line.  The next two “Elite Eight” games have their winners written on blue lines. Time for the “Final Four!”  Continue play as you have been, this time whittling the teams down to a Championship game and then crowning a tournament winner. Want to shake things up?  What if each “Final Four” team had an injured player?  Pull one card at random from each of those teams and insert a sub from the deck of a losing team.  (This is particularly helpful if you need additional practice with a fact that got knocked out.) This game is particularly good way to help kids identify their strengths.  And, sticking with the sports analogy, you can have them go back and work with the teams that didn’t go on.  Who knows, next time they might end up with a Cinderella story! Bracket sheet and basketball themed cards are available as  Speech Madness FREEBIE in my TpT store.  Please follow me while you’re there!  And don’t forget, my sale on Artic Attack and other R games ends tonight!
Need to know more about installing Python on Windows 7? More after the break. How to install Python? (xampp) Programming languages are into the trends these days. The computing world have gone beyond just the conventional programming and a lot of new programming languages have joined the arena. Python is amongst one of the high level programming language. The programming language is said to have remarkable powers with clean and clear syntax. Python library is huge and comprehensive. Installing Python is essential for developers therefore we’ve written the following post for your help. 1. StepGo to, the website dealing with Python programming language. Python is developed by Python Software foundation and they have been patroning the platform by now. The official channel of Python deals with all information related the programming language and the associated packages. Python Official Website 2. StepThe right navigation panel has the link through which you can download Python on your machine. Python Website Download Link 3. StepThe latest release of Python is 3.2 whereas the download section features the entire library of versions released to date. Latest Release of Python 4. StepScroll down to the installation section where you get to see the different file formats available for download. Python Download Section I use Windows 7 with a 64 bit architecture therefore I selected Windows X86-64 MSI Installer. 5. StepRun the installer from the download location. Python Setup 6. StepThe default installation location for Python is C:/. You can still use the “Up” and “New” buttons to change the installation location. Select Destination Directory Screenshot 7. StepThe installation file gives you the option to customize the installation and select the components that you wish to install on your system. Customize your Installation Screenshot 8. StepInstallation needs these step and the rest is automatic. Python Installation 9. StepBingo! Installation Complete. Now is the time to run the console through which you are going to be communicating with the programming language. Installation Complete Message 10. StepSearch for Python in the Start Menu and you are going to have two versions of Python Shell; the graphical and the command based. Python Graphical User Shell Python Command Line User Interface This is it. Feel free to contact us if you find anything difficult to understand and we’ll be more then happy to assist.
In a world where everything is available on the internet, NFTs are the answer to creating technical scarcity. NFTs have allowed new types of digital goods to be created that give users the opportunity to purchase or sell unique, digital items. What is an NFT? A Non-fungible token. Non-fungible means that each token is unique and cannot be replaced by something else. Cryptocurrencies like Bitcoin, Ethereum, and Dogecoin are considered fungible as they can be easily traded – you can exchange one Bitcoin for another readily. A one-of-a-kind piece of artwork created by a digital artist, however, is non-fungible. It cannot be readily exchanged for another good within the same asset class as that good may not hold the same value. NFTs cannot be divided into smaller denominations in the same way that dollars can be split into pocket change. NFTs are making inroads into the realms of music, fine art, and even virtual trading cards. In the process, they are making some people very rich. NFTs are unique digital goods that are, for the most part, stored on the Ethereum blockchain. Ethereum is a cryptocurrency but its blockchain supports NFTs. Blockchains are peer-to-peer networks that use complex encryption algorithms to record online cryptocurrency transactions. They use a significant amount of computing power to ensure each transaction on the network is legitimate. The blockchain is able to store extra information which makes the NFT different from an ETH coin. It is worth noting that other blockchains can also support their own NFTs separate from Ethereum’s blockchain. Each NFT on the Ethereum blockchain has its own unique identification, including data on who created the NFT, its price, and more. To put this into perspective, let’s use the example of having one-of-a-kind Adidas sneakers made just for you. Adidas could also send an official authentication certificate that says there are not other sneakers in the world like yours. In the same way, NFTs are uniquely created digital goods (music, graphic designs, GIFs, memes, tweets, and animations) that appeal to collectors because they come with a digital certificate of authenticity due to the Ethereum-based blockchain support proving their uniqueness. NFTs are appealing for artists who struggle to keep their unique work from being illegally downloaded or stolen. When an NFT is minted on Ethereum by a creator, this information is registered on the blockchain and becomes a digital fingerprint for the work. Artists and creators are able to secure their work and can guarantee buyers are getting an authentic product. Some NFTs have been recently sold for millions of dollars. A GIF of a flying cat with a Pop-Tart body and rainbow tail sold for $580,000 according to the New York Times. Jack Dorsey, Twitter’s CEO, sold an NFT version of his first tweet on the website for $2.9 million at an auction. While these digital assets cannot be held physically, they are selling at extremely high prices because buyers are looking for authentic virtual artwork via NFTs. Many investors wonder if NFTs will be the next investment vehicle, like cryptocurrency. NFTs, like any piece of artwork, are risky. They are even higher risk than investing in Bitcoin or Ethereum; with cryptocurrency, you can evaluate and make a wise bet on its value increasing over time as Bitcoin and Ethereum become more widely accepted forms of payment. NFTs are more of a collector’s item for fans of crypto-art and are just beginning to gain popularity. NFTs are not well-known and have not yet gained mass acceptance. This does not mean that using an NFT as an investment tool is out of the question. Purchasing an NFT album from a well-known musician this year may turn out to be a great investment if something significant happens to that musician in the future. If the musician’s fame skyrockets or they experience a publicized tragedy, you may be able to resell that NFT album for double or triple the price of your original purchase. This is a massive gamble, though, and your NFT investment could plummet in value if the hype dwindles and demand wanes. Keep in mind that if the value of Ethereum falls, NFTs will also lose value. NFTs can be found on platforms including OpenSea, Nifty Gateway, and Rarible. These platforms are currently seeing more members of the public willing to spend large sums of money or cryptocurrency to purchase tokens that represent ownership of unique digital goods. Even Christie’s Auction House held its first digital auction for a digital collage by an artist named Beeple, which sold for nearly $70 million. With history-making sales so early in the year, digital art tokens are becoming one of the biggest breakthroughs of 2021. The structure of an NFT, being modeled after artwork instead of shares, implies that they may not be subject to the same types of financial regulation as stocks or cryptocurrency. Those wanting to enter the world of NFT artwork should consider whether the transfer of this type of token will be subject to certain taxes, what value it truly represents, and what rights the owner will be given for display of the artwork. Houston Cryptocurrency Lawyers If you have any questions about how state and federal laws might impact a recent or upcoming NFT transaction, we encourage you to reach out to the Houston cryptocurrency & blockchain lawyers of Feldman & Feldman to discuss your situation. Contact our office today to set up a consultation. The post The Hottest New Trend in Cryptocurrency: NFTs Explained appeared first on Feldman & Feldman.
Mold vs Dust – How To Tell Apart If you’ve noticed dark specks around a bathroom vent, in a shower corner, or on your ceiling, you might’ve wondered, “Is that just dust or could it be mold?” In this article, you will learn the answers to these essential questions:  • Can mold look like dust or dirt? • How can I tell if it’s actually mold and not dust? • & Can I wipe off mold like dust? Mold is a living organism categorized as fungus, and it thrives in warm environments where moisture and oxygen are present. Mold feeds on paper, drywall, clothes, and most of all – dust. Dust is a combination of dirt, dead skin cells, clothing fibers, pollen, mites, hair, and many other organic substances. Dusty areas of your home create the perfect living conditions needed for mold growth. Although it isn’t always the case, sometimes a substance can be both dust and mold at the same time. Regardless, these substances should never be allowed to spread in your home. Allowing mold to continue to grow or darken can lead to dangerous home conditions, and cause respiratory sickness in you or other home occupants.  Can Mold Look Like Dust Or Dirt? In certain cases, mold growth in a home setting can appear as dust-like specks or grains of dirt. The few variations of mold that can form in these ways are all dangerous if left untreated, and should be removed from your home immediately. Black Mold Black mold (stachybotrys chartarum) is a common toxic fungus found in high-moisture areas, such as under sinks and around or inside vents. As the name suggests, black mold forms in small dark spots that can look similar to dust or dirt. Unfortunately, black mold is extremely dangerous. If you inhale black mold spores, you can experience severe allergy symptoms, such as: • Eye irritation, • Chronic coughing, • Frequent sneezing, • Continuous fatigue, • & Persistent headaches. Luckily, you can prevent black mold growth by immediately repairing leaks or water damage, ensuring your home is properly ventilated, and keeping internal humidity levels as low as possible. White Mold Many types of mold (typically aspergillus or cladosporium) can take on a white color depending on the age of the growth, thus leading to a common name of “white mold”. White mold  resembles a powdery-like substance and is commonly mistaken for mildew or light-colored dust. While both mold and mildew are types of fungi, they are still two different things. Mildew grows on top on surfaces in a flat shape, while actual mold can permeate the surface of the material it grows on and can produce spores in several shapes and colors. Just like all other mold types, exposure to white mold can lead to serious health conditions and should be removed quickly. Outdoor Mold Inside Your Home Alternaria is one of the most common plant pathogens found in warm climates and it can also form mold with a spotty, dirt-like appearance. In particularly windy locations, Alternaria can become airborne and land in your home, leading to mold on furniture, plants, clothing, and even produce. Alternaria mold can be harmful, and exposure symptoms include: • Nausea, • Dizziness, • Wheezing, • Sore Throat, • & Even rashes. To lower the risk of Alternaria mold in your home, make sure to keep windows and doors closed as much as possible in warm, windy months. How To Tell If It’s Actually Mold And Not Dust A key difference between mold and dust is that mold is a living organism, and dust is not. However, this is probably not an obvious trait when you’re visually assessing the issue. To determine if you have dust or mold in your home, check the following characteristics: 1. Smell Mold typically has a musty scent, and it can produce a rotten or soggy smell. Dust is a nonliving organism, so it usually smells like dry earth and dirt. Due to the fact that mold and dust both come with unpleasant smells, it’s critical to remove them in a timely manner.  2. Location Investigating the overall location of the affected area can help you determine what the substance is. For example, dust is pulled downwards by gravity, so it typically doesn’t settle on ceilings or under shelves. Mold is alive and can attach itself anywhere, especially celling corners or under sinks. Also, mold thrives in dark, humid environments (vents can be optimal for mold growth). If the substance in question has sprouted in a bright and dry location, it’s more than likely dirt or dust. 3. Bleach Test If you prefer a more scientific approach, try using the bleach test to determine what the substance is. Place a small amount of bleach onto the desired area, and wait 5 minutes. If the substance appears lighter after the 5 minutes, it’s most likely mold. If it doesn’t lighten at all, it’s dirt or dust. Does Mold Wipe Off Like Dust? Luckily, dust settles on top of surfaces and is easy to simply wipe away. Use a duster or a damp cleaning sponge to clean the area and solve your dust problem in no time. However, mold permeates the material it grows on and cannot be wiped off like dust. Simply wiping off the surface layer will not remove any deep, hidden spores that can’t be seen with your eyes. Since mold infests more than just the surface layer, the removal process is more involved. Here are a few steps you can take to rid yourself of a mold spot: 1. Wear Protective Equipment Coming into contact with mold spores can cause both temporary and long-term health risks. To protect yourself, be sure to wear: • A high-quality face mask, • Protective gloves, • Appropriate eye ware, • A long sleeve shirt, • & Full coverage pants. 2. Create A Cleaning Solution Depending on the type of material the mold has grown on (drywall, wood, tile, etc.) you’ll need to prepare a cleaning solution to neutralize the spread. Fortunately, you can make a highly effective cleaning solution using ingredients you might already have in your home, such as: • Bleach, • Hydrogen Peroxide, • Vinegar, • Borax, • & Water 3. Saturate & Scrub Once you’ve got protective equipment on and have prepared a cleaning solution, you’ll need to saturate the entire mold growth in the cleaning liquid (usually with a spray bottle) and allow it to soak in for at least 15 minutes. Use a scrubbing brush to remove any mold or stain left behind, and repeat the process as needed. When To Call A Professional While some mold spots can be handled without help, other spreads go unnoticed for too long and a professional will be required to assist you.  Mold can be highly dangerous if left untreated, so reach out to a professional if: • The mold growth is quite large, • Black mold has appeared, • The mold has ruined sections of drywall and needs to be removed, • You do not have access to the necessary protective equipment, • Or in severe cases, you have a complete home infestation. Mold is a very common problem most homeowners will deal with at least once, but it should always be taken seriously. Always act swiftly when dealing with mold and guarantee you and your family stay healthy. If needed, consider reaching out to a professional for added reassurance.  Scroll to Top
Low Water Pressure in Schwertner, TX Water is a precious resource and clean water is not easily available in many parts of the world. It doesn't matter where we live, however, we can all do something to use water more economically and in a way that protects the environment. There are many simple ways of being more efficient in using water in the home that do not have to mean installing new and expensive equipment and appliances, even where a home suffers from weak water pressure. According to statistics from the National Geographic website an average of ten gallons per day per household is lost to leaks and a simple way to become more water efficient is therefore to repair leaky taps and toilets. There can be a number of reasons for low water pressure in Schwertner, TX into the home including its location, at the top of a hilly street, for example, the mains supply pipes into the home being not large enough and the level of overall demand in the neighbourhood, which reduces the flow available to each property. Once in the home, the number of appliances simultaneously being used can affect the amount of water each gets and this can reduce the flow, for example to the shower causing weak water pressure in the shower when the washing machine or central heating via a combination boiler is working elsewhere in the house. Combination boilers in particular require a minimum pressure in order to fire up and this will affect the flow to other parts of the house. Many people now know that a daily shower uses less water than filling the bath but It can be frustrating when in the shower when someone else in the house turns on a tap to do the washing up and suddenly the water flow in the bathroom reduces to a trickle. While one solution may be to install a special power shower pumping appliance this can be expensive and there is a simpler solution, which is to fit a low flow shower head to the shower. low water pressure in Schwertner, TX. low water pressure in Schwertner, TX. These are designed to compensate for the low pressure and to do so while also using water economically. They work by using air forced into the water stream through a small hole at the base of the shower handle. When the air mixes with the water the mixture spins around at high speed causing turbulence which increases the pressure inside the shower head. There are a number of models of showerheads available that use this air technology, which has been independently tested at a University in Liverpool, UK, and demonstrated that average water savings of 40% can be achieved compared to standard shower heads. Zip Codes in Wyoming 76573, 76540, 78660, 78664, 76513, 76685, 76530, 76564, 78948, 76522, 78947, 78634, 78626, 78659, 76550, 78617, 76661, 76579, 76526, 76570, 76561, 76555, 76523, 76534, 76557, 76578, 76656, 76519, 76571, 78651, 78613, 76569, 76643, 76712, 78605, 76528, 76559, 76527, 76533, 76577, 76552, 73301, 76556, 76539, 76630, 76554, 78642, 76520, 77857, 76574, 76548, 76632, 76511, 78654, 78641, 78650, 76537, 78673, 76657, 76518, 76573
Sunday, May 29, 2022 Rising temperatures erode human sleep globally So global warming will endanger your sleep? Given the ubiquity of temperature-control devices from fans to to air-conditioning, probably not. And the effect observed was tiny anyway. They found that greater warmth would lose you just 50 hours of sleep per YEAR Ambient temperatures are rising worldwide, with the greatest increases recorded at night. Concurrently, the prevalence of insufficient sleep is rising in many populations. Yet it remains unclear whether warmer-than-average temperatures causally impact objective measures of sleep globally. Here, we link billions of repeated sleep measurements from sleep-tracking wristbands comprising over 7 million sleep records (n = 47,628) across 68 countries to local daily meteorological data. Controlling for individual, seasonal, and time-varying confounds, increased temperature shortens sleep primarily through delayed onset, increasing the probability of insufficient sleep. The temperature effect on sleep loss is substantially larger for residents from lower-income countries and older adults, and females are affected more than males. Those in hotter regions experience comparably more sleep loss per degree of warming, suggesting limited adaptation. By 2099, suboptimal temperatures may erode 50–58 h of sleep per person-year, with climate change producing geographic inequalities that scale with future emissions. UK to relax law on gene-edited food in post-Brexit change from EU The UK has begun the passage of a law that will allow the sale of food that has been gene-edited to improve human health and curb environmental impacts, in one of the country’s first big post-Brexit divergences with the European Union. The Genetic Technology (Precision Breeding) Bill introduced today will allow crops that have had their genome edited to be treated differently in England from genetically-modified organisms, which can involve foreign DNA from other species. There was a de facto ban on both under EU rules that the UK carried over when leaving the bloc, but GE crops could be developed, grown and sold in England if the law passes. They could also be sold in Wales and Scotland, but not in Northern Ireland as it is still subject to some EU rules as part of the Brexit agreement. “These gene editing tools have the ability to mimic natural breeding, and generate changes within a species that we find desirable for one reason or another,” says Gideon Henderson, chief scientific adviser at Department for Environment, Food and Rural Affairs. “There’s potential for UK economic growth in this area, also potential for UK environmental benefit.” This week, researchers revealed a tomato had been edited using CRISPR technology to make it a rich source of vitamin D. Other mooted uses for the technology include making more drought-resilient to cope with climate change, and creating crops resistant to diseases so farmers can use fewer pesticides, which have been linked to insect declines. The vast majority of the UK public, 88 per cent, are opposed to the rule change allowing gene-edited food to be sold. However, to date there has been no major backlash akin to the one against GMO “Frankenfood” where campaigners ripped out crops in field trials more than two decades ago. Accounts differ on when gene-edited food might be in shops. Environment minister George Eustice has claimed next year. Henderson says: “In the next four or five years, I would anticipate seeing a slew of potential new products arriving.” There are no plans to require retailers to label products that are gene-edited. New Scientist asked the UK’s major supermarkets to confirm if they would be selling gene-edited food, but none of them were prepared to say yes. Under the proposed law, only gene-edited crops with traits that could also be produced using traditional plant breeding will be allowed. An expert committee advising Eustice, ACRE, will decide if products meet that criteria or not, though exactly how is unclear at this stage. The proposed rule changes, which the government is hoping become law later this year, initially apply only to crops. However, the law would mean secondary legislation, which does not require parliamentary scrutiny, could be given the green light for gene-editing in livestock later. Republicans Can Stop ESG Political Bias ESG scores are not only inherently political, as evidenced by the attack on Tesla and Mr. Musk, but they are completely subjective, and often hypocritical. In one particularly egregious example, Exxon Mobil and Chevron received less favorable ESG scores than Russian energy companies Gazprom and Rosneft, in which Vladimir Putin’s government is a major shareholder. What exactly is the left’s criteria when companies largely controlled by Mr. Putin’s murderous regime are ranked higher than American companies? It is revealing to note that proponents of ESG, despite their altruistic pretenses, almost never refuse to do business with China or Russia—two of the world’s biggest polluters with well-documented histories of human rights abuses. Finance was always meant to facilitate investment and spur economic growth benefiting the entire country. But President Biden’s regulators are weaponizing the financial system to shut down economic growth in the energy industry in the name of environmental extremism. The president’s climate envoy, John Kerry, is pressuring banks to refuse to make loans to U.S. oil and gas companies, leaving them unable to increase production. Activist investors in the private sector are all too happy to play along. In one recent instance, an insurgent shareholder, backed by BlackRock, the world’s largest asset manager, forced Exxon Mobil to put three environmentalists on its corporate board. Without government intervention, the ESG craze will only get worse. Mastercard recently announced that it will begin “linking employee compensation to ESG goals.” In other words, paychecks will no longer be based on an employee’s performance but on how well they conform to the woke political opinions of their supervisors. In April, a California court struck down state laws requiring corporations to select board members based on race and sex, delivering a victory for the right to equal treatment guaranteed by the Constitution. States, cities and Congress should follow suit by adopting measures to discourage the use of ESG principles. States with large employee pension funds invested in the stock market would be well advised to rein in massive investment firms like BlackRock, State Street and Vanguard, which manage a combined $22 trillion in assets and are pushing a radical ESG agenda. State and local governments should entrust their money to managers that don’t work against their residents’ best interests. States should also pass model legislation developed by the American Legislative Exchange Council requiring government pension-fund managers to vote the state’s shares, rather than delegating that authority to huge Wall Street firms. Most important, the next Republican president and GOP Congress should work to end the use of ESG principles nationwide. For the free market to thrive, it must be truly free. ? A skeptical view of sustainable living The Idiocy of Tiny Houses and Electric Vehicles The only readily available statistics are from 2013, but they indicate tiny home owners are older, whiter, and have higher incomes than the national average, even without adjusting for the large percentage of retirees who are living off pensions. Like everything else, sustainability has gone commercial. Tiny houses and electric cars are trendy, but if you’re abandoning a perfectly functional home to build a tiny one, or a dependable gas vehicle to go electric, you’re just wasting money on more crap. To live more sustainably, if you don’t need it, don’t buy it. One could make the argument that over 10–15 years, what you’ll save on gas or utilities will make up for splurging on a tiny house or a Tesla, but this is more of a rationalization. When it comes to shiny objects, we decide to buy first, then figure out how to justify it later. 44% of the people who buy tiny homes regret it, 20% of electric car owners switch back to gas-powered cars, 43% report driving more once they go electric, and 78% keep at least one gas-powered vehicle. The biggest complaint about tiny houses? They’re too tiny. The biggest complaint about electric cars? Not enough range or charging stations, and home charging systems are too expensive. This isn’t sustainability, it’s just buying more garbage, all of which has to be mined, manufactured, transported, and maintained. Consider the amount of labor and materials wasted when needlessly replacing a two ton vehicle 78% of drivers keep anyway. All you have is another car that has to be serviced, registered, and insured. If everyone could afford a dependable, long-range electric vehicle — which was supposed to be the point — how many of the current owners of EVs would even want one? The average cost of a tiny house is $30,000-$60,000, depending on size, location, plumbing, electricity, and your ability and willingness to build it on your own. This is still out of reach for most Americans, even if they’re willing to live out in the middle of nowhere without plumbing and solar power only, which requires several batteries, inverters, and large panels if you want to maintain any semblance of the life you’re accustomed to. The most modest independent solar power systems can recharge a phone or a laptop, and maybe power an electric fan for a few hours assuming it’s sunny. No TV, air conditioning, microwave, or dependability, unless you’re willing to spend tens of thousands on additional panels, batteries, and industrial strength inverters, and even then, a cloudy week could leave you powerless. Conceding you’re one of the few who can afford a cramped house and an extra field of panels to power your car, is this really the best use of your money if your goal is to live sustainably? Instead of going small, you could rent out a few rooms in your house, if only for storage, or shutter and seal them to save on utilities. This would give you a taste of living tiny before you commit. Or you could put that money toward providing housing for people who actually need it. You might squeeze another 100,000 miles out of a reliable old car with great gas mileage. Wait until you actually have to replace it, and you’ll have the option of purchasing a cheaper electric vehicle with better range than anything available today. We like to buy stuff because it’s tangible and typically visible. One of the reasons I suspect people are dissatisfied with tiny houses is because they can’t drag enough people over to show them off, or don’t have enough power to keep posting pictures on social media. Tiny houses and electric cars have been co-opted by lifestyle salesmen, so save your money or put it toward causes that can help instead, like libraries, homeless shelters, and expanding mass transit. If you want to live in a cramped overpriced dwelling where you don’t need a car, try NYC. Large cities are greener than smaller ones and the suburbs, and you’ll be cured of tiny houses for life. No comments:
H1N1 -- Can GPS tracking technology prevent a swine flu pandemic? Japan's Ministry of Internal Affairs and Communications hopes to find out this autumn by testing a mobile phone-based GPS tracking system that constantly monitors each individual's location and sends text alerts to participants if they cross paths with anyone who is later identified as a flu victim. The proposed system relies on mobile phone providers to constantly track the subjects' geographical locations and keep chronological records of their movements in a database. When a person is labeled as "infected," all the past location data in the database is analyzed to determine whether or not anyone came within close proximity to the infected individual. The system will know, for example, whether or not you once boarded the same train or sat in the same movie theater as the infected individual, and it will send you a text message containing the details of the close encounter. The text messages will also provide instructions on specific measures to take in response. The primary purpose of the test, which will involve about 2,000 volunteers in both urban and rural areas, is to verify the precision of GPS tracking technology, estimate the potential costs of operating such a system, and determine whether or not such a system can be put into practical use. To be of any real use in a place like Tokyo, a phone-based disease-tracking system would require the participation of hundreds of thousands, if not millions, of subscribers willing to have their locations tracked -- not a stretch given the popularity of wireless services such as NTT DoCoMo's "iConcier," which provides personalized, concierge-like services to individual mobile phones based on location data, shopping history, and other personal information. From a privacy standpoint, opinions differ on the degree to which sensitive personal data such as location and travel history should be shared and used. With this in mind, the ministry will also explore the issue of psychological resistance to the use of personal information. [Source: Asahi]
Go Hello World Go Hello World The best ways to start with any language is to write classic hello world program. So, to start with Golang write a program to print “Hello World !!!” on console. Step 1: Write Hello World program Create a file helloworld.go in any of the directory and open the file using any of your favorite text editor. Now, write below code to print “Hello world !!!”. package main import ( func main() { fmt.Println("Hello World !!!") Step 2: Run the program Open command prompt inside the directory and use following command to run the program. $ go run helloworld.go Hello World !!! Step 3: Create binary and execute it To create executable binary, Golang provides go build command. Now use the command and execute the binary. $ go build helloworld.go $ ./helloworld Hello World !!! Stay tuned for more updates ! Leave a Reply
Research Press Release Neuroscience: Brain network linked to disrupting substance addiction identified Nature Medicine June 14, 2022 Brain lesions that lead to spontaneous remission of tobacco addiction in humans affect part of a common brain network, according to a study published in Nature Medicine. Further evidence for commonality of this network across different substance addictions suggests a potential new target for neuromodulation therapies. Substance addiction is a public health crisis and a leading cause of death, particularly among young people. Neuromodulation treatments — such as neurosurgical lesioning and brain stimulation — are promising treatment options; however, the absence of a clear therapeutic target has limited their efficacy. Brain lesions caused by injury, such as a stroke, can lead to addiction remission in rare circumstances. Therefore, lesions that result in a therapeutic benefit could potentially help to identify effective targets to treat addiction. Juho Joutsa, Michael Fox and colleagues analyzed brain scans from 129 patients (60% male; average age of 56 years) addicted to smoking at the time they experienced localized brain damage, of whom 34 subsequently experienced spontaneous addiction remission (defined as being able to easily quit smoking immediately after injury, with no evidence of cravings or relapse). The authors reveal that although lesions associated with remission occurred in multiple locations in the brain, they could all be mapped to a specific brain network. This network was reproducible in other substances of abuse in independent groups of people with brain lesions. This included people with a reduced risk of alcohol addiction and case reports of lesions that disrupted addiction to substances other than nicotine. The authors conclude that these findings suggest a shared brain network for addiction across different substances of abuse and potentially identify new targets for neuromodulation therapies aimed at treating addiction. However, they go on to state that further research — notably into the potential side effects that may be associated with these targets — is needed. Return to research highlights PrivacyMark System
Genetic screen during IVF can allow the picking of a healthier child — but is that playing God? I was curious enough to check the age of the embryo when implanted in the womb of the woman who will become pregnant — it’s only a matter of days, nowhere close to the six week period used in many of the antiabortion laws recently enacted in various U.S. states. Genetic Screening Now Lets Parents Pick the Healthiest Embryos People using IVF can see which embryo is least likely to develop cancer and other diseases. But can protecting your child slip into playing God? At 18 months old, Aurea Yenmai Smigrodzki is inquisitive like any other toddler. She likes peanut butter, the beach, and mobile phones—or any toys that look like phones. She likes to copy her mum and dad, Thuy and Rafal, when they are using theirs. Aurea doesn’t know it yet, but her birth was very special: She is the world’s first PGT-P baby, meaning she is statistically less likely than the rest of us to develop a genetic disease or disorder throughout her life. PGT-P stands for preimplantation genetic testing for polygenic disorders. It is conducted in conjunction with IVF and allows prospective parents to actively select which of their own embryos to take, based on the strength of its genes. Rafal and Thuy were given the genetic profiles of five prospective embryos, and Aurea’s was the strongest candidate, because her embryo had the fewest recognizable genetic mutations that could go on to cause disease. “It was really a no-brainer,” says Rafal of the choice he and Thuy made to undergo the genetic screening process. “If you can do something good for your child, you want to do it, right? That’s why people take prenatal vitamins.” All parents want their children to be healthy, but lots have reason to fear passing on something harmful. Our genes can predispose us to developing all kinds of diseases: diabetes, heart disease, cancers, and many more. With this in mind, one could be forgiven for assuming that Rafal or Thuy carried some inheritable condition and wanted to break the chain. But the reality, Rafal admits, is that he “simply knew that PGT-P existed,” and so he decided to give it a try. Rafal is a neurologist and has an interest in pioneering technologies, referring to himself as a “techno-optimist.” He has even signed up to have his brain cryogenically stored when he dies, in the belief it will one day be resurrected, thoughts and spirit intact. In his eyes, genetic screening of embryos is nothing crazy or even special, it is simply the natural next step for humans to take. “It’s like the first time someone ever made a phone call—sure, it was a unique moment, but really it was just the beginning of something that now everybody does,” Rafal muses. “In 10 years’ time, this kind of polygenic testing will be completely non-controversial. People will be doing it as a matter of course.” Get the WIRED Guide What is genomic sequencing? How is it developing? And how is it going to change human health? Get the WIRED guide now. T huy and Rafal screened their embryos through Genomic Prediction, the first of a couple of biotech firms in the US to open up genetic screening services to prospective parents. Taking DNA samples from the embryo cells alongside genetic sequences from both parents, analysts are able to draw up a set of markers from which they can construct a full genetic picture of the embryo. This effectively fast-forwards its development process to create a projection of what level of health a child born with those genes might enjoy. To help their clients put this data into context, each embryo is given a health score based on the existing mutations in its genes which could potentially one day be life limiting, and the would-be parents are shown how that score compares against the population average. The ranking takes into account the severity of conditions, if shown, as well as the ethnicity of the embryo, since this can also have an impact on disease incidence. Aurea is the product of that ranking: she was the top-rated embryo out of Thuy and Rafal’s IVF collection and the cells they chose to give the best possible chance at living a long, disease-free life. When Aurea is older, she will have access to the full set of embryonic screening data shared with her parents. She will probably have her own genome sequenced, too—Rafal has already purchased a home testing kit for her—and use that information to guide her approach to health and lifestyle through her life. “I hope she will be glad for it,” says Rafal. “People ask me if I’m trying to play God in choosing to do this,” Rafal adds, anticipating the next big question. He believes that “genetic selection is not playing God, it’s working as a mechanic on molecular machines that sometimes break and need to be fixed.” Of course, good genes are by no means a guarantee for a long and healthy life, and carrying an abnormality or even living with a hereditary disease does not always equate to a poorer quality of life. Rafal does not for a moment believe that passing on unhealthy genes makes someone a bad parent, either. But he is unequivocal in his belief that he has done the best thing for his child by giving her the best odds against genetic disease. “As parents, we act as the health champions of our children, and it makes sense to treat genes not as mysterious determinants of identity, but something that you know is there and is important; these are the same principles I apply in trying to take good care of my own health. What matters,” he continues, “is that the process was successful, my child was born healthy, and she is happy.” Polygenic risk scores (also referred to as a genetic risk score) were used by Genomic Prediction in the case of Rafal, Thuy, and Aurea to indicate the likelihood of gene mutations among multiple embryos. They are also a marker used in other areas of biology to determine roughly how one organism’s genetic health compares to another’s. For example, polygenic scores are commonly used in animal and plant breeding to improve the chances of having healthy and resilient livestock and crops. The “score” is calculated from the number of variations found in each organism’s genome that relate to a particular disease (therefore increasing the risk of developing it). This is compared against a reference database compiled from large-scale population studies in order to provide a relative indicator of how likely that organism is to develop a disease relative to the average. There are no guarantees in using this process: it can only be used as a forecast, because the score only compares to an average organism rather than testing for genetic links to disease in each individual. Neither does it take into consideration environmental factors. For example, a 21-year-old and a 99-year-old could have the same polygenic risk score if their genes predispose them to having coronary heart disease, but the score doesn’t account for where they are in their lifespan or when they might present with the disease. So, the indicators are limited, but they can show with accuracy what common genetic conditions a person or organism might be carrying—which is relevant to parents selecting one embryo out of several. Embryonic selection itself is nothing new. For around three decades, IVF clinicians have taken sperm and egg samples to grow into several embryos at once, before choosing the most promising-looking one for implantation in the uterus. Clinics already tend to screen against chromosomal abnormalities such as Down’s syndrome, but until recently the only other indicator they had to go by was the way one group of cells looked against the other—the selection was more or less arbitrary. Companies such as Genomic Prediction are taking this process much further, giving parents the power to select the embryo they believe to have the best fighting chance of survival both in the womb and out in the world. At the time of writing, Genomic Prediction works with around 200 IVF clinics across six continents. For company cofounder Stephen Hsu, the idea behind preconception screening was no eureka moment, but something he and his peers developed gradually. “We kept pursuing the possibilities from a purely scientific interest,” he says. Over time sequencing has become cheaper and more accessible, and the bank of genetic data has become ever greater, which has provided the opportunity to easily apply machine learning programs to seek out patterns, Hsu explains. “You can have typically millions of people in one data set, with exact measurements of certain things about them—for instance how tall they are or whether they have diabetes—what we call phenotypes. And so it’s relatively straightforward to use AI to build genetic predictors of traits ranging from very simple ones which are only determined by a few genes, or a few different locations in the genome, to the really complicated ones.” As Hsu indicates, the crucial difference with this technology is that it’s not just single mutations like cystic fibrosis or sickle cell anemia that the service makes its calculations on. The conditions embryos are screened for can be extremely complicated, involving thousands of genetic variants across different parts of the genome. In late 2017, Hsu and his colleagues published a paper demonstrating how, using genomic data at scale, scientists could predict someone’s height to within an inch of accuracy using just their DNA. The research group later used the same method to build genomic predictors for complex diseases such as hypothyroidism, types 1 and 2 diabetes, breast cancer, prostate cancer, testicular cancer, gallstones, glaucoma, gout, atrial fibrillation, high cholesterol, asthma, basal cell carcinoma, malignant melanoma, and heart attacks. This did not come without controversy. In fact, by mid-2020, the outrage among graduate students at Michigan State University was loud enough to force Hsu out of his position as vice president at the institution. Hsu believes that the opposition people felt to Genomic Prediction in the beginning was largely because people feel uneasy about the fact that genetics can seal our fate—that unfavorable traits can’t always be amended through hard work and determination. “People don’t want to believe that there’s some degree of hardwiring that can’t be overcome by good habits or good education,” he says. “But the fear is misplaced: the ability to detect single gene mutations has been around for some time and nobody considers that ethically questionable, right? It’s just that now we can do it with more precision.” Studies by Genomic Prediction show that children born through the service have a 46 percent lower risk of heart attack, 42 percent less chance of getting type 2 diabetes, 15 percent reduction in risk of breast cancer and 34 percent lower risk of schizophrenia. “Using genomic predictors we can easily find people who are at 10 times the normal risk. We can easily find people who are 10 times below normal risk. And that’s a huge piece of progress,” says Hsu. Like Rafal Smigrodzki, Hsu is confident that public disapproval will ease, and that one day soon embryonic selection against inheritable diseases will be considered the norm. In his opinion, “we shouldn’t only use artificial ways to reproduce, but we should make use of the tools we have for IVF to ensure we have the best chance of making healthy babies.” It’s not just Genomic Prediction that is in the market. Other businesses are now offering screening services aimed at prospective parents. One, MyOme, is conducting trials with doctors and IVF patients, the results of which will determine their plans to open to clients. Orchid, a San Francisco–based startup, launched its waiting list for at-home DNA testing kits in spring 2021 aimed at couples who are looking to have children. The service promises a report detailing risks for any future children and separate male and female partner reports. One aspect of Genomic Prediction’s work that few would criticize, and shouldn’t be overlooked, is screening to improve the chances of a healthy pregnancy. In screening for healthy embryos, clinicians are also reducing the chances of complications during pregnancy which can result from genetic factors, and helping couples to save time, money, and a lot of heartache. But advancements in genomics are facilitating other ways of improving the conception process for couples, too. In 2013, a biotech company called Natera became the first to develop a panoramic blood test to screen for fetal abnormalities from as early as nine weeks into pregnancy. The noninvasive prenatal test (NIPT) replaces traditional chorionic villus sampling (CVS)—an unpleasant test involving a large needle to extract cells from the placenta—in screening for chromosomal conditions such as Down’s syndrome, Edwards’ syndrome or Patau’s syndrome. CVS was effective in detecting abnormalities, but increased the risk of miscarriage by around 1 percent; NIPT, being noninvasive, is much safer. Like so many life-changing inventions, the first NIPT came about because of a personal experience. Natera’s cofounder and chair Matthew Rabinowitz explains that, in 2003, his sister gave birth to a son who had severe chromosomal abnormalities. Tragically, the baby died at six days old, an experience Rabinowitz says was “overwhelmingly upsetting. I’m an engineer and my nature is to solve problems. And this was a situation that was just not fixable.” The family felt blindsided: “He was born in a top hospital in Boston, and yet they didn’t realize that he had these problems until he was born,” says Rabinowitz. “I thought, ‘How could this happen in the 21st century?’ There’s got to be a way to improve on these technologies.” At the time, Rabinowitz was a professor in aeronautics and astronautics at Stanford University, and dealt with the shock and grief in the best way he knew how: by throwing himself into new research. His team began work on genetic techniques to look at tiny amounts of DNA that could extract “a much more powerful signal” of the health and development of a fetus. Rabinowitz submitted the resulting data to the National Institutes of Health (the US’s publicly funded medical research agency), which awarded him a startup business grant—and the rest is history. NIPT works by sequencing small fragments of fetal DNA (cfDNA) that can be detected in the mother’s blood. The cfDNA is isolated and examined to detect aneuploidies—where an abnormal number of chromosomes is present in each cell—but also, if the doctor requests, some of the single-gene variations which cause severe genetic diseases. Since biological sex is determined by chromosomes, the blood test can also identify the fetus’s sex much earlier than an ultrasound. Different brands of NIPT have since been developed and rolled out across the world in both public and private healthcare. “It’s completely changed the way people all over the world manage pregnancy,” says Rabinowitz. Rachael Pells is the author of Genomics: How Genome Sequencing Will Change Our Lives. Find out more and order your copy of the book. Leave a Reply You are commenting using your account. Log Out /  Change ) Twitter picture Facebook photo Connecting to %s
Clickable Wireframes and the User Experience Clickable Wireframes and the User Experience A UI designer routinely uses clickable wireframes to design a user interface in a manner that enhances the user’s experience. A wireframe is a visual representation of a website’s framework that allows the designer to arrange elements on each of the website’s pages. A clickable wireframe allows the designer to interact with the wireframe by clicking on its components. Clickable wireframes are especially common in prototyping, where developers must create the UI within a short period of time. Organizations that wish to hire a web designer should ensure that these workers are able to collaborate effectively with other team members such as marketing specialists, web designers and project managers. Prototyping tools also help reduce the disagreement between these team members by allowing you visualize design ideas. Emil Mitry, a UX Architect Lead Designer, provides specific guidance on the use of clickable wireframes in UI design: Initial Design Prototyping with paper can be accomplished rapidly, although this approach has some limitations. UI designers typically select software to build prototypes based on input from the members of the development team. Clickable wireframes and other features of a software-based prototyping tool allow you to use an interactive approach that facilitates communication with other team members. These features also let you quickly modify the requirements of the prototype and perform usability testing to ensure that your assumptions about the design are correct. You can then adapt the wireframes based on user feedback and repeat the testing process. This capability provides an advantage over paper prototyping, which generally involves throwing the prototypes away after the completion of the project. Wireframe prototyping typically begins with low-fidelity models that you refine as you obtain more details from user feedback. Each team member can use this form of prototyping to illustrate a particular concept to the other team members. Wireframes also provide the team members of a prototyping project with a detailed layout of the UI, allowing them to plan ahead. Wireframes allow designers to create an effective demonstration of the user experience. They also let team members efficiently communicate with each other regarding a design concern, allowing them to collaborate in real time. The ability to generate visuals without the need to worry about details during the early stages of design lets developers quickly create prototypes with wireframes. The primary objective of wireframes is the ability to create an interactive UI through the use of clickable frames. This capability allows designers to check the prototype periodically to ensure the design is on track. You can develop the UI quickly by focusing on functional widgets such as check boxes, dropdown menus and tab buttons rather than non-functional features such as colors and fonts. Usability tests with clickable wireframes allow UI designers to identify usability issues that can impair the user’s experience with these interfaces. Some online tools that include wireframes also allow users to conduct a remote usability test directly, a capability that would otherwise require an additional tool. Need someone to help you navigate the UI world and help you use clickable wireframes? Contact us today and we’ll find you the right professional. Ready to work with us?
10 Ways Drones Will Impact the Future of the World Web Stories Drones are becoming extensively popular around the world. The benefits and popularity of drones are extensively growing in India as well. Before 2018, drone registration and regulations were very hectic for content creators and customers who were planning to use a drone. However, to make sure drone flying in India gets easy and hassle-free, the government of India launched Digital Sky Portal where customers have to register their drones (except nano) to obtain permission to fly. Since the Digital Sky Portal have been launched, flying drones in India have become comfortable and hassle-free. As the popularity of drones is increasing, the demand for drones in various industries is also growing simultaneously. In other words, the impact of drones in society is increasing because of the increased demand. Some of the sectors where the drone is going to dominate and make its space in future are: 1. Food Service: Many big companies around the world have already started using drones to offer food to their customers at their doorsteps. With drones in food delivery, companies are trying to reduce the delivery cost, which adds more pressure on their expenses. Since food delivery is one of the most common routines by people, using drones in food services will surely impact the lives of people and society. 2. Defence Operations: Drones are being used in Military and defence operations for a long time. One of the most common used drones by the defence sector is the predator UAV. Similar to the technology, drone manufactures have developed portable drones which are helping defence personnel to plan strategic operations against their enemy. Not only this, to track the movements of the enemy and lead tactical initiatives, but drones in defence operations are also being used extensively for the safety of the nation. Also, the use and demand of drones in tactical operations and missions will grow in future. 3. Healthcare: Urban Areas have some of the best medical facilities available for increasing life expectancy, preventing diseases and keeping a healthy environment. However, health care facilities in rural areas are still not that advanced. The traditional mode of transport is still used for medical supplies which takes longer duration. Making medicines, providing blood and other important medical equipment more accessible will be the major impact of drones in the healthcare field. 4. Advertising: Drones in the advertising sector will be one of the major demanded products for aerial marketing. Drones have the ability to lift things, and it is the perfect choice to market your offering from an aerial view, which would absorb the attention of people. 5. News Coverage: One of the most important aspects of news coverage is storytelling. Viewers get hooked to interactive stories. For interactive storytelling, the production value is important, which can be enhanced with the help of drones. FAA has already allowed journalists to use drones in news coverage and deliver some of the best and real news stories. 6. Creative Content Creation (CCC): A lot of new content creators are emerging around the world. To step up their content game and show their creativity in multiple platforms, various creators have been using drones to increase their production value and create best and intriguing content. With the help of drones, creators are getting a wider perspective for their storytelling, and aerial photos and videos are making the content more dynamic and appealing. 7. Hollywood and Bollywood (Media Industry): Films released in both Hollywood and Bollywood are produced with some of the best technologies available in the market. With the help of drones, movie producers glorify their storytelling and add more creativity to their films. Since the craze and demand of good movies will extensively grow around the world, drone technologies will also be widely used in the media industry. 8. Conservation of Wildlife: Wildlife has been disturbed because of human actions and ecological disturbance. However, the entire world is working on a mission to save wildlife. To ensure the safety of wildlife, all the conservationists are using dynamic approaches to protect wildlife. One such approach is using drones for tracking wild animals. Renowned drone manufacturer DJI has worked within the sector to facilitate research with the help of drones without disturbing the natural habitat. Drones are becoming extremely important in the field of wildlife, and their demand will extensively grow in future. 9. Infrastructure Development: Drones are widely being used in commercial infrastructure development. Apart from aerial photography and videography, drones are also being used in physical infrastructure. Special powerful drones are being deployed by various companies to facilitate infrastructure and also aid in construction planning and management. 10. Airlines: Drones are also being deployed in the Airline industry for various safety and inspection services. Airline manufacture Airbus has already launched its subsidiary entity Airbus Aerial to provide inspection services across multiple sectors. In the airline industry, drones will play a crucial role by collecting photos and videos of aircraft, which would further help detailed inspection. The popularity of drones is rapidly increasing among various sectors. Drone manufacturers are also offering different types of drones to ensure that demand is being fulfilled for every sector. Since drones in India have also become accessible and easy to fly, individual creators are relying on drones to step up their content game in multiple platforms whereas commercial sector is deploying drones to enhance their output and make use of cost-effective technology. Since the world is inclining towards dynamic technologies, drones are also being upgraded as per the dynamic changes happening around the world. Impact of drones in various sectors will surely change the future of the world. Reported By Recent Comments Tech News Notify of Inline Feedbacks View all comments
Mei Lanfang Mei Lanfang (1894–1961) is without doubt the most famous Peking opera actor, both in China and abroad. It was Mei Lanfang who, for the first time, brought Peking Opera to the West, and thus influenced many Western pioneers of early modern theatre. He was born into a Peking Opera actor family that specialised in the dan or female roles. He made his stage debut at the early age of ten. In 1913 he performed in Shanghai and was a sensation in South China. Although he specialised in traditional Peking Opera, he also experimented with modern drama, inspired by the many innovations of the lively theatre life of cosmopolitan Shanghai. In the 1910s and 1920s he worked actively in the field of xinxi or “new plays”, in which a famous actor invites a scholar or a writer to adapt an already well-known story into an opera libretto. These kinds of new operas were very popular during the period of the Republic of China. It was also the period of the early flourishing of Western-influenced spoken drama in Shanghai among the rather limited university-educated audience. These modern dramas usually had very concentrated themes, often with patriotic or social overtones. Mei Lanfang, for example, produced a few modern theme-plays that focused on the oppression of Chinese women. Above all, Mei Lanfang worked with traditional Peking Opera. However, he introduced many new features to its stagecraft and enriched the dan role category further. Together with actor Wang Yaoqing (Wang Yao-ch’ing), he created a new sub-category, the so-called huashan or the “flower robe”. It is a combination of the restrained qingyi or noble lady and huadan or the coquettish woman, in which the actor should master both singing and miming skills, sometimes even acrobatics. Thus Mei Lanfang widened the scope of dan acting. Mei Lanfang was an art collector and an accomplished amateur calligrapher. His interest in Chinese history led him to create new variations of stage costumes based on prototypes older than the Ming dynasty. He pointed out that an actor should have a sound knowledge of history. He once said: “Of course, an actor should be innovative in his work, but his originality should stem from knowledge. He will not find the right means of expression if he has not studied widely and if he does not know history.” He also composed several new melodies for Peking Opera and created new dance sequences, still popular today. They include the Satin dance, the Sleeve dance, the Dusting dance, and the Feather dance. In his acting technique he incorporated dance to the extent that practically all his movements could be regarded as dance. In 1919, Mei Lanfang was invited by the Imperial Theatre in Tokyo to perform there for a month. In the spring of 1930 he went to the United States, where he performed successfully in New York, Chicago, San Francisco and Los Angeles, and was awarded honorary doctorates by two universities. His visit to the Soviet Union in 1935 was an even greater success. His performances were seen by several important Western theatre reformers, such as Konstantin Stanislavski, Bertolt Brecht and Gordon Craig. Brecht, in particular, together with actor Wang Yaoqing, became deeply interested in Peking Opera and Mei’s art. In his famous essay on Mei Lanfang, Brecht expresses his awe of the articulated technique of Mei Lanfang’s acting. He wondered if there were any Western actors of the period who would be able, after a performance, in a short time and dressed in a tuxedo, to demonstrate the actual fundamentals of his acting technique. During his career in China Mei Lanfang became a major cultural personality. In 1931, at the beginning of the Japanese invasion, Mei Lanfang promoted patriotism by means of his stage productions in Shanghai. During the Second World War, when Japan occupied part of China, he grew a beard in order not to be able to perform on stage. In 1950 Mei Lanfang moved back to Peking, where he both performed and trained a new generation of actors. Owing to his achievements and influential position, Mei Lanfang was able to persuade Mao Zedong and the Communist Party not to ban Peking Opera. Although Peking Opera went through several “reforms” during the early decades of the new regime, it has been taught and performed continuously until now, with the exception of the Cultural Revolution in 1966–1976.
LawShelf courses have been evaluated and recommended for college credit by the National College Credit Recommendation Service (NCCRS), and may be transferred to over 1,500 colleges and universities. We also have established a growing list of partner colleges that guarantee LawShelf credit transfers, including Excelsior College, Thomas Edison State University, University of Maryland Global Campus, Purdue University Global, and DeVry University. Actus Reus: The Physical Act of Committing a Crime See Also: Actus Reus: The Physical Act of Committing a Crime Criminal liability will require proof of a physical act prior to any discussion of criminal mental states.[1] This physical act requirement is known as actus reus and is a foundational concept of American criminal legal doctrine.[2] This presentation explores actus reus and affirmative acts, as well as defining when a failure to act may lead to a defendant’s criminal liability. Example of Actus Reus The actus reus component of a crime will vary depending on the crime and the state where the defendant is being prosecuted. For example, burglary in Illinois is defined as, “[a] person commits burglary when without authority he or she knowingly enters or without authority remains within a building, housetrailer, watercraft, aircraft, motor vehicle, railroad car, or any part thereof, with intent to commit therein a felony or theft.”  To show that the actus reus element is satisfied, the prosecution will have to prove that the defendant unlawfully entered, or remained in, the building without authority, and that he intended to commit a felony or steal therein. When is Actus Reus satisfied? For the actus reus element of a crime to be present, there must be a voluntary, physical action made by the defendant. The prosecution must prove the defendant made a conscious and intentional movement.  Additionally, a person can be held criminally responsible if he engages in an action, knowing that he may unintentionally become unconscious and hurt somebody.[3] In one case, a New York state appeals court held a defendant was criminally responsible for his actions because he knew that he was subject to epileptic attacks rendering him likely to lose consciousness. Thus, he was responsible for the harms caused while suffering an epileptic episode and driving his automobile over a sidewalk, resulting in the death of four people. When is Actus Reus NOT satisfied? Historically, when a law criminalizes a status or illness (such as drug addiction or alcoholism), that law has been found to be unconstitutional because the law may result in cruel and unusual punishment.  The United States Supreme Court held that someone could not be arrested and charged with being a drug addict because being a drug addict is a status, not an action. Second, criminal thoughts do not satisfy the actus reus element. Criminal thoughts, if not accompanied by any action, do not harm society in any way and will not lead to criminal liability.  Does a failure to act satisfy actus reus element?             A failure to act, known as an omission, could satisfy actus reus and potentially give rise to criminal liability. In order to do so, the prosecution must prove the following three elements:             (1)  There was a legal duty to act;             (2)  The defendant knew that he had a legal duty to act; and             (3)  It was reasonable for the defendant to perform the duty or the defendant was physically capable of performing the legal duty A legal duty to act arises in five situations. The first is when there is a special relationship between the defendant and the victim. These special relationships include parent-child relationships, employer-employee relationships, or husband-wife relationships.[4] The second situation that forms a legal duty to act is one that is imposed by law or by legislation.[5] The third method of creating a legal duty to act is through a private contract between parties. In a case highlighting this legal duty to act, defendants were found guilty of murder in the third degree after the death of a 92-year old man who lived with the defendants.[6] The Pennsylvania Supreme Court reasoned that actus reus was satisfied because the defendants had an oral contract to provide food and medical care to the deceased. Their failure to perform their part of the oral contract gave rise to an omission. Lastly, a legal duty to act will arise if the defendant wrongfully created the peril for the victim. If the defendant wrongfully places the victim in danger, then his failure to help the victim could lead to criminal liability.             It is important to understand that there is no criminal liability for an omission when there is only a moral obligation to act. A party is not bound to perform or prevent harm to another “simply upon his humanity, or his sense of justice or propriety.”[7] In People v. Beardsley, the Michigan Supreme Court approached the issue of whether the defendant, who was convicted of manslaughter, had a legal duty to act to save the victim who overdosed on morphine in his presence. The court held that the man could not be convicted because he had no legal duty to take reasonable measures to prevent her death, even though saving her life was the right thing to do. Actus reus will have to be proven alongside of mens rea in order to secure a conviction. Once both elements are, a jury can reasonably reach the conclusion that a guilty verdict is appropriate. [1] Robinson v. California, 370 U.S. 660, (1962). [2] Ian Farrell, Taking Voluntariness Seriously, 54 B.C. L. Rev. 1545, (2013). [3] People v. Decina, 138 N.E.2d 799, (N.Y. Ct. App. 1956). [4] Roberts v. St. Louis & S. F. R. Co., 136 Kan. 749, 18 P.2d 167, 1933 Kan. LEXIS 21 (Kan. 1933) [5] Francis McCarthy, Crimes of Omission in Pennsylvania, 68 Temp. L. Rev. 633, (1995).  [6] Commonwealth v. Pestinikas, 421 Pa. Super. 371, 617 A.2d 1339, 1992 Pa. Super. LEXIS 4260 (Pa. Super. Ct. Dec. 10, 1992) [7] People v. Beardsley, 150 Mich. 206, 113 N.W. 1128, 1907 Mich. LEXIS 779 (Mich. 1907)
What Is the Difference Between Resume and CV? Applying for a job is a challenging task. You need to prepare many documents, including some papers that you’d never heard of. Finally, an employer informs you that the company needs your CV, and a resume isn’t an option. At this point, many people who are searching for a job get confused. They don’t know what the CV is. Is it a cover letter? Is it a specific type of resume? Let us clarify this issue to help you get a job you’re looking for. CV stands for “curriculum vitae.” This phrase means “course of life” in Latin. Unlike resumes, CVs don’t provide just a brief overview of your working experience. A CV is a detailed story of your academic life. In a CV, you must describe all your important achievements, including publications, awards, honors, associations, clubs, etc. Thus, the CV is not just about your career. Your CV will take much more time to write than a resume. Prepare to write at least 3-4 pages, depending on your achievements. All your activities must be organized chronologically. CVs are always required for jobs where your academic background is especially important, like teaching jobs. You also more likely will need a CV in graduate school than when applying for undergraduate programs. If you’re working on a Ph.D. dissertation, you will also need a CV. This document is more cohesive, and you may need some professional help to make sure your CV has a proper structure and is written according to all existing standards. We suggest ordering editing on the internet. There are many online writing services that can help you with your CV. You will likely need a CV when applying for a job abroad. It doesn’t mean that all foreign countries use CVs only, but Americans will surely benefit from having a CV, just in case. We also suggest asking a company whether they prefer a resume or a CV, before applying for a job. There are also countries where having a CV is a necessity. These are New Zealand, the U.K., and Ireland. Applying for work in these countries, a resume will be useless. However, even if you have problems with writing your CV, online writing services can always help you with it, taking into account your needs and objectives. A resume is a simpler document, it usually depends on a specific job you’re applying for. Resumes are rarely longer than 1 page. Moreover, you must be ready that hiring managers and recruiters won’t read the whole document. Take your resume and look where your thumb points. This is a place where most managers stop reading, so make sure the most important information is at the beginning. As you may have noticed, employers don’t spend much time reading resumes. The purpose of such papers is to make you stand out in a crowd of candidates. While CVs have a static structure, resumes may include different information in different sections, depending on the type of work. Thus, there are three important differences between these documents: *The purpose; *The length; *The structure. When writing your resume, make sure to follow these rules: *The first sentence must show benefits of hiring you instead of a description of your objectives; *Clearly articulate how you can help the company; *Include your important achievements in previous companies; *You need to be specific about what you did in previous jobs (what you developed, administered, what awards you’ve taken, and so on); *Be concise. Unlike CVs, resumes provide only the essential information about you as a worker. Make It Effective No matter how good your resume or CV is, you need it to be seen by HR managers, otherwise, you’ll just waste your time. There are many applicants who have already appreciated advantages of professional writing help. There are many experts who know what keywords to include so that recruiters will easily find what they are looking for. Professional CV and resume writers also know how to optimize your documents for application tracking software (ATS), which is used by the majority of modern companies. « Previous Article Next Article »
Your question: Is venison similar to veal? Is baby deer meat called veal? The meat of a deer. The flesh of a calf (i.e. a young bovine) used for food. Veal can be produced from a calf of either sex and any breed; however, most veal comes from young males of dairy breeds which are not used for breeding. … What meats are considered venison? Venison, (from Latin venatus, “to hunt”), the meat from any kind of deer; originally, the term referred to any kind of edible game. Venison resembles beef and mutton in texture, colour, and other general characteristics. Why you shouldn’t eat deer meat? Does venison taste like liver? Overcooking venison steaks is the worst thing you can do. Overcooking makes it dry and taste like liver. What type of meat is veal? Veal is the meat from a male calf up to 16 to 18 weeks old. It is not fed any grains or grasses, which gives its meat a delicate texture and a creamy pale color with a grayish-pink hue. Beef, on the other hand, is the darker, red meat from older animals. IT IS IMPORTANT:  Is smoked and cured meat cooked? Is venison healthier than chicken? Venison contains only a third of the amount of fat found in beef, and less calories than chicken. It also has a number of other benefits, says nutritionist Naomi Mead: … Being wild and grass fed, venison is much leaner than beef, and contains less saturated fat. Can you eat raw venison? It’s not a crazy concern. But here’s what you need to know to eat raw venison (deer, antelope, moose, elk, etc) as safely as possible: Shoot straight. … coli, both the really nasty o157 variety as well as the nasty-but-non-lethal o103 strain exist in venison (and all other ruminants). Why is deer meat banned in India? Why is deer meat banned in India? This ban is not for religious reasons (other than the beef ban), but to protect the various species of wild life. What is a group of male deer called? Most people, upon seeing a bunch of deer together, would call it a herd; however, you also could call the group a bunch, a mob, a parcel or a rangale.
What is the Kalispel tribe known for? The Kalispel Tribe lives in harmony with nature and is a recognized leader in wildlife habitats and fish hatcheries. The Kalispel Tribe of Indians is the center for complete health care. Where did the Kalispel tribe live? The Pend d’Oreille, also known as the Kalispel, are Indigenous peoples of the Northwest Plateau. Today many of them live in Montana and eastern Washington. The Kalispel peoples referred to their primary tribal range as Kaniksu. Is Northern Quest a tribal casino? Northern Quest Resort & Casino is proudly owned and operated by the Kalispel Tribe of Indians. The Tribe is committed to giving back to the communities of Spokane and Pend Oreille Counties. Who is the chief of the Kalispel Tribe? Chief Loyola Chief Loyola – Ečswiš smx̣éy̓čn – Kalispel Tribe of Indians. How many people are in the Kalispel Tribe? 450 members The Kalispel Tribe currently consists of about 450 members and their families, with 168 under the age of 18. What did the Kalispel Tribe eat? While camas was the most important plant food, the Kalispel also gathered Indian potato, cattail roots, wild garlic, wild celery, wild carrot, Easter lily, and bitterroot. A wide variety of berries were also harvested. How much does Northern Quest casino make a year? Based in Washington, Northern Quest Resort & Casino is a key player in the hospitality industry with 1,000 employees and an annual revenue of $49.9M. Is Northern Quest casino smoke free? It is great to hear about your visit and that you enjoyed the non-smoking poker room. While the majority of our casino does allow smoking, our hotel and dining venues are all smoke-free. The casino lounges are an exception, but we do have the Fireside lounge located in our hotel lobby which is also 100% smoke free. What is the Kalispel culture? The Kalispel Indians were semi-nomadic hunters, diggers and fishermen and were often called the “River/Lake paddlers.” During the mid to late 19th century, the Kalispel Tribe of Indians worked to preserve its culture and life in the midst of increasing white settlement in the area. What language did the Kalispel Tribe speak? The Salish or Séliš language /ˈseɪlɪʃ/, also known as Kalispel–Pend d’oreille, Kalispel–Spokane–Flathead, or, to distinguish it from the Salish language family to which it gave its name, Montana Salish, is a Salishan language spoken (as of 2005) by about 64 elders of the Flathead Nation in north central Montana and of … What did the Kalispel Tribe wear? Dress Most clothes were made from rabbit or deer skins. Men wore breechclouts and shirts, and women wore dresses. Both wore moccasins, caps, robes, leggings, and shell earrings. War and Weapons The Kalispel were generally peaceful, although they were occasionally allied with the Spokan against the Kootenai. How did the Kalispel Tribe travel? As a river people, water transport was important. The Kalispel made and used several different kinds of canoes, including both dugouts (that is, made from a single log that had been hollowed out) and bark canoes (a frame covered with bark). What does the Kalispel Tribe of Indians do? The Kalispel Tribe owns and operates more than a dozen businesses and enterprises in and around the Pend Oreille area. We believe in building a strong community and our economic development opportunites emphasize our commitment to the land and people. Where is the Kalispel Casino in Colorado located? What to expect at Northern Quest Casino in Kalispel? Throughout the resort and casino, guests will find tributes to traditional Native American culture and history. Beautiful photos throughout the property celebrate Kalispel Tribal elders and customs. Guests will also notice a river theme in the carpets, wallpapers and décor. Who is the chairman of the Kalispel Tribe? In his capacity as Chairman, his responsibilities include oversight of all Tribal enterprise business activities and ongoing government programs. Under Glen’s leadership, the Kalispel Tribe has moved from poverty to prosperity with tremendous economic expansion and community development. Share this post
How Do You Grow Cilantro Indoors? “What is the best practice to ensure a window-sill cilantro plant will thrive? I have a green thumb and can grow or rehab practically any plant/flower/herb/garden. However, each time I’ve purchased a cilantro plant, it wilts after a few months. I only water when dry. Thank you!” Question from Ann of Raleigh, North Carolina Answer: Cilantro (Coriandrum sativum) is a short-lived annual herb that grows best in full sun and cooler temperatures between 65–70°F. That’s why it dies away after a few months after flowering. It’s just what annuals do. My recommendation is to start it from seed in pots along a sunny windowsill and keep replanting as needed. Growing Cilantro from Seed Cilantro seeds germinate well in Sunshine Natural & Organic Planting Mix. Simply sow the seeds, cover them lightly with 1/8 of an inch of soil, and water them thoroughly. Then keep the seeds lightly moist by spritzing them with water. Expect them to sprout in a week to ten days. Then keep the soil just moist by watering from the bottom. It also helps to apply an application of water-soluble fertilizer weekly after they begin to grow. Typically, you can start trimming the leaves for cooking after a few more weeks. Microgreens can be harvested earlier. Cilantro remains leafy for only a couple of months before it starts to send up stems of white, lacy flowers. If you let it flower and set seed, you can harvest and dry the coriander seeds for pickling and cooking. If you prefer cilantro, then pull the plants as they flower, and plant seeds anew. You might even maintain a couple of pots and plant them several weeks apart to ensure you have a constant flow of cilantro. Some cilantro varieties stay leafy longer than others. ‘Calypso‘ is one of these. It is generally ready to harvest 50 days after planting. Happy gardening, Jessie Keith About Jessie Keith Laisser un commentaire
Whole food options to boost protein quality Whole food options to boost protein quality -By Juliet M. Getty, Ph.D.- Protein is not a popular subject. Most “nutrition-talk” revolves around carbohydrates – sugar and starch, to be specific, because they impact metabolic conditions that are a very real concern for many horse owners. We also talk about fat – types of fat, essential fatty acids, omega 3s, you know the terms – because horses require a daily supply of essential fatty acids and they also benefit from fat to fulfill high energy needs for weight gain and exercise. But protein? Just check the “percent crude protein” and figure it’s enough, right? Not necessarily. There’s a lot more to it than that. To guide you, let’s start by looking at what happens to the protein in your forages and feeds, when your horse eats it. Proteins in the feed are digested down to amino acids. There are 22 individual amino acids – “building blocks” your horse’s cells put together to create new proteins. There are literally hundreds of proteins in his body, all of which rely on not only enough total protein, but enough amino acid variability. Forages have protein, but their variability is limited; they have lots of some amino acids and not much of others. If a single type of grass as hay or pasture is the only protein source in your horse’s diet, the pool of amino acids available to your horse’s body will be deficient in several amino acids, making it difficult for him to stay healthy. Think of it like a beaded necklace Imagine a bowl full of red, blue, yellow and green beads. You want to make a long necklace with a very specific color pattern. As you progress in stringing this necklace, you notice that you’ve run out of yellow beads. Uh oh… now you cannot make the necklace you planned. You either get more yellow beads, or you end up with a bracelet instead of a necklace! Protein molecules are like long, beaded chains of amino acids, in a very specific order, depending on where the protein is located. Muscle protein looks different than joint proteins. Hemoglobin in red blood cells, looks different that digestive enzymes. The DNA within each tissue’s cells dictates the order of amino acids needed to produce that specific protein. If there are enough amino acids available, the protein can be created. If not, then that tissue goes without. And what about all those unused amino acids – those red, blue and green beads?  Can’t they be saved for later in the hope that you’ll feed more “yellow beads?” Unfortunately, no. Instead, they get destroyed and cannot be used for protein synthesis. They can be used for energy, glucose production, or stored as fat, but that doesn’t meet your horse’s protein need.[1] What about wild horses? Horses in a wild setting travel for miles each day, grazing on a vast assortment of feedstuffs – grasses, legumes, flowers, fruits, berries, seeds, leaves, edible weeds, shrubs, and bark, offering a mixture of nutrients, including proteins. Can we duplicate this in a domesticated setting?  Not usually, unless you have many acres of untouched land. Therefore, our goal should be to improve the horse’s protein quality of the diet by offering more protein-rich feeds. How do we know if we are creating a high-quality protein? We need to pay attention to the amino acid profile of the entire diet. Of the 22 different amino acids, your horse’s body is only able to make 12. The remaining ten are considered essential, meaning the body cannot produce them, or cannot produce them in adequate quantity. Therefore, they must be in the diet. The 10 essential amino acids (EAAs) are methionine, arginine, threonine, tryptophan, histidine, isoleucine, leucine, lysine, valine, and phenylalanine. We do not know the specific requirements of each EAA for horses. The only one that has been evaluated is lysine, because it is considered “limiting.”  This simply means that the amount of proteins produced will be limited by the level of lysine. If lysine is low, it’s like not having enough yellow beads (going back to our beaded necklace analogy). There are two other limiting amino acids: methionine and threonine. Exactly how much the horse requires is unknown, but we do have an idea of the levels relative to the lysine content. The general thinking among equine nutritionists is that there should be 2 to 3 times more lysine than methionine, and threonine content should be about the same as lysine. Most animal proteins are higher in quality than those found in plants. This means that they contain more than enough amino acid building blocks to build tissues for vital organs as well as peripheral, non-vital tissues. But horses do not naturally consume animal protein sources, so we have to get a little creative by mixing several plant protein sources so that they ultimately reflect the amino acid profile of an animal source. Most grasses have a similar amino acid profile. Cool season grasses, such as timothy, brome, orchardgrass, rye, fescue, and Kentucky bluegrass, tend to have more amino acids than warm season grasses, such as the popular Bermuda and Teff.  To improve the protein quality, you can add a legume such as alfalfa (lucerne), clover, and perennial peanut grass (grown in some southern areas of the US). Consider adding whole foods to the mix Adding alfalfa to grasses will certainly help, but many horse owners choose to avoid it.[2]  Or even if you do include it, the EAA content may not be sufficient for your particular horse. For example, feeding 18 lbs of grass hay plus 4 lbs of alfalfa may meet the EAA need of an average horse on light activity, but it may not if the horse has any compromised health issues. Adding whole foods to your horse’s diet will not only improve the overall protein quality, but can add valuable vitamins, antioxidants, trace minerals, and fatty acids that your horse might not otherwise consume. Here are some examples: 1) Dehulled soybean meal. This is the most commonly added protein source to commercial products. Economical and rich in protein (47%), it is easy to see why it is used to boost the protein content of many feeds and ration balancers. But there are several potential problems with soy: ·         Its fat content is high in linoleic acid (an omega 6 essential fatty acid) and low in alpha linolenic acid (an omega 3 essential fatty acid). High amounts of linoleic acid in the diet can increase inflammation. ·         Its high phytoestrogen content could possibly impact horses’ behavior.[3] ·         It is goitrogenic, meaning it has the potential to damage the thyroid gland, making it important to monitor iodine intake. ·         Many horses are allergic to soy, exhibiting respiratory and skin issues. ·         Unless organic, almost all soy grown in the US is genetically modified to withstand being sprayed with the herbicide, RoundUp (Bayer). Glyphosate, its active ingredient has been implicated in potentially damaging the microbiome and interfering with mineral absorption.[4] 2) Hemp seeds. High in protein (32%), they contain two main proteins:  albumin and edestin. Both have significant amounts of all EAAs.[5] Some other aspects of hempseeds: ·         They have both essential fatty acids, linoleic and alpha linolenic acid (ALA), as well as a special fatty acid known as gamma linolenic acid (GLA). GLA belongs to the omega 6 family, but unlike the omega 6 found in soybean oil, it reduces inflammation rather than promoting it. ·         They are easy to digest, and highly palatable (great for the picky eater). ·         Can be found as a hempseed meal (with some of the fat reduced to make it appropriate for an overweight horse), or as the whole hemp seed fines, which include the ground up fibrous coating.[6] 3) Flax seeds. With 18% protein, they make a good choice to include in the diet (make sure they are ground). But their real claim to fame is their essential fatty acid content which duplicates those naturally found in fresh, healthy pasture grasses. (Remember, the word, “essential” means that they cannot be made by the body and must be in the diet.) Adding flax will therefore, serve two benefits: provides necessary essential fatty acids, and offers a source of protein to boost overall protein quality in the diet.[7] 4) Chia seeds. They are comparable to flax seeds in their protein content and nearly identical to flax in their essential fatty acid content. In fact, you can feed either ground flax seeds, or chia seeds, depending on your budget and your horse’s preference. 5) Split peas and pea protein isolate. Peas that are dried and split are a tasty way to add protein and crunch to the diet. They can be fed raw, but it is good to soften them a bit by soaking them in warm water for a few minutes. Though the protein content is high (24%), it doesn’t compare to the protein content of pea protein isolate, with 75% protein. I recommend adding pea protein isolate to the diet for horses who require extra protein due to aging, growth, intense exercise needs, pregnancy, and lactation. 6) Coconut (copra) meal. A good source of protein (20%), it is low in sugar/starch, and high in fat, from coconut oil, making it a good choice for a horse who is underweight or is heavily exercised. Keep in mind that the fatty acid content of coconut oil does not include essential fatty acids, necessitating supplementation from an additional fat source (such as flax or chia). 7) Pumpkin seeds. A tasty treat, supplying 34% protein, and a variety of vitamins and minerals, including a high amount of magnesium. They can be fed raw, hulled, or with the shells on.  When fed raw, they contain active digestive enzymes that are helpful for gastrointestinal tract. 8) Whey. Whey is a protein found in milk and is highly concentrated (80% protein). Because it is animal, and not plant, it is of very high quality. It can contain some lactose, and adult horses are lactose intolerant; therefore, they may develop loose manure. 9) Other feedstuffs: ·         Beet pulp is not concentrated in protein (only about 7%) but it is a worthwhile way to add a similar amount of calories as oats, without the concurrent insulin response that starch creates. It is a nice carrier feed for supplements. However, most beets grown in the US are genetically modified (GMO), so it is best to choose a non-GMO source.[8] ·         Black oil sunflower seeds offer a similar level of protein as pumpkin seeds. However, they are very high in linoleic acid (omega 6) with virtually no omega 3s. Consequently, they can cause inflammation when fed in high amounts. Please note: Whenever you add a new feed to your horse’s diet, it is important to starting slowly, taking two or three weeks to allow the hindgut microbial population to adjust. Since each whole food has a difference density, the information below provides the volume measure equivalent to 4 ounces by weight of each product along with the protein grams. ·         Ground Hemp seeds: 1/2 cup; 30 grams of protein ·         Ground Flax seeds: 1 cup; 18 grams of protein ·         Chia seeds: 1/2 cup; 16 grams of protein ·         Split peas: 1 cup; 24 grams of protein ·         Pea protein isolate: 1/2 cup; 75 grams of protein ·         Copra meal: 1/2 cup; 20 grams of protein ·         Pumpkin seeds: 3/4 cup; 34 grams of protein ·         Whey: 1 cup; 73 grams of protein How much protein does your horse require? According to the National Research Council, protein requirements vary based on mature size, activity level, age of growing horses, and breeding status.[9] On average, a 1100 lb (500 kg) adult horse at maintenance, will require a minimum of 630 grams of crude protein per day. As exercise increases, values can increase to approximately 1000 grams/day. Growing horses require more, and pregnancy and lactation can double the maintenance requirement. But, and this is important … these values do not take into consideration that the amino acids in forages are not highly absorbed. The level of absorption is referred to as its biological value (BV).  The BV of pasture grasses and hays ranges from 45 to 80 percent.[10] That means that the NRC numbers may need to be increased by 20 to 55 percent to get a clear estimate of how much your horse is realistically absorbing. Here are some points to consider: ·        The higher the fiber, the lower the BV. If the NDF (neutral detergent fiber) value on your hay analysis report is much over 60% on a dry matter basis, the hay contains a large amount of fiber. In general, the more immature and softer the hay, the higher the BV. ·        Healthy, growing pasture grasses are higher in BV than they are during non-growing seasons. ·        If your horse is on ulcer medication (e.g., omeprazole, ranitidine, sucralfate), protein digestion and absorption will be diminished. ·        Inflammatory substances in the diet will diminish the protein’s BV. These can include vegetable oil/soybean oil, pesticides/herbicides, molasses, and high starch diets. Bottom line For your horse’s diet to contain quality protein, consider how many protein sources you are feeding. Adding one or more whole foods to hay and/or pasture will accomplish this goal. This will boost the essential amino acid content, allowing for every tissue in the body to get what it needs to thrive. Variety is key! [1] Getty, J.M. 2018. Four directions amino acids can take – The importance of feeding several protein sources. http://gettyequinenutrition.biz/Library/theimportanceoffeedingseveralproteinsources.htm [2] Getty, J.M. Alfalfa and the insulin resistant horse. The true story. http://gettyequinenutrition.biz/Library/Alfalfaandtheinsulinresistanthorse.htm [3] Yang, Sarah, 2012. Eating estrogenic plants alters hormones in monkeys, may increase aggression and sex. https://news.berkeley.edu/2012/11/19/phytoestrogens-may-affect-behavior/ [4] Getty, J.M., Non-GMO is not necessarily safe.  http://gettyequinenutrition.biz/library/nongmoisnotnecessarilysafe.htm [5] Getty, J.M. Choose hemp instead of soy! http://gettyequinenutrition.biz/Library/choosehempinsteadofsoy.htm [6] See Dr. Getty’s Free Shipping Store for these two examples: Hempseed meal (Praise Performance 30%): http://gettyequinenutrition.biz/products/hempseedfiber.htm or Hempseed fines (Praise Topping): http://gettyequinenutrition.biz/products/hempseedtopping.htm [7] Getty, J.M. Feeding flaxseeds. Do you have all the facts? http://gettyequinenutrition.biz/Library/Feedingflaxseeds.htm [8] Speedi-Beet from Emerald Valley Natural Health is an excellent, non-GMO source of beet pulp. https://emeraldvalleyequine.com/product/speedi-beet/ [9] Nutrient Requirement of Horses6th Revised Edition. National Research Council of the National Academies. 2007. Table 16-3 Daily Nutrient Requirements of Horses with mature body weight of 500 kg. [10] Tucker, DVM, G., Chronic protein deficiency in horses. https://theequinepractice.com/protein/. Also Nutrient Requirement of Horses6th Revised Edition. National Research Council of the National Academies. 2007. Chapter 8 – Feeds and Feeds Processing, page 172. Juliet M. Getty, Ph.D Find a variety of quality supplements and whole foods at her online Free Shipping Supplement Store[i]. Reach Dr. Getty directly at gettyequinenutrition@gmail.com. [i] http://horsesupplements.gettyequinenutrition.biz ReplyReply allForward
Tidy Data Tutor helps you visualize data analysis pipelines Tidy Data Tutor lets you write R and Tidyverse code in your browser and see how your data frame changes at each step of a data analysis pipeline. (If you use Python, check out Pandas Tutor.) Why use this tool? Let's say you're trying to explain what this code does: penguins %>% select(species, bill_length_mm) %>% group_by(species) %>% arrange(desc(bill_length_mm), .by_group = TRUE) %>% Running this code in R or RStudio shows only the final result: If you want to explain what's going on here, at least three things get in the way: If you ran this same code in Tidy Data Tutor, you can teach students exactly what's happening step-by-step: Or if you're a student, you can use this tool to explore and learn on your own. Check out more examples below: group_by() %>% arrange() group_by() %>% filter() group_by() %>% mutate() group_by() %>% slice() group_by() %>% summarize() group_by() %>% group_by()
How artificial intelligence is shaping dentistry in 2021 Search Dental Tribune How artificial intelligence is shaping dentistry in 2021 With increasing digitalisation, AI technology will continuously influence all areas of life, including dentistry. (Image: everything possible/Shutterstock) Mon. 31. May 2021 The topic of artificial intelligence (AI) has always stirred up both intrigue and intimidation; the fear of the unknown is strong, but with the rise of today’s technology AI is no longer just a topic for discussion—it’s already here. Algorithms, mathematical calculations, computerised data collection methods and an enormous amount of reproducible data are the basis of machine learning, a category of AI that is helping to improve areas of dental care in ways once unimaginable. Healthcare has a simple rule to follow: provide patients with the best and most responsible care possible. Problems with the current model of dental care have been identified in the past, and they are becoming increasingly pertinent and in need of correction. Traditional methods need the implementation of AI to benefit both the patient and the dental professional, with advancement extending into finer areas of care. The unpredictability resulting from the pandemic has highlighted the crucial need for access to emergency dental care that is faltering for many owing to various factors such as demographics, financial considerations and severe illness. A solution has been found in AI-supported software, allowing patients to self-monitor while sitting in the comfort of their own homes. The model enables the patient to take pictures of his or her oral problems using a smartphone. These are then scanned into the app which can identify problems with teeth and gingivae and relay the details to both the patient and the dental provider. This streamlines the consultation and treatment planning process and the app can even extend to advice on the management of the presenting oral condition, depending on its type. The app also provides education and information on the condition in question, instils self-awareness and allows the patient to have control over his or her oral health status. The overall impact of just the one model of AI mentioned here is already pointing towards easier access, improved patient education, increased production and reduced dental care costs. At the end of a consultation and before treatment, a diagnosis needs to be made. An improvement in diagnostic ability is a benefit for both patients and professionals. AI computing allows the input of the patient’s history, complaint and clinical findings, and it can then offer the most probable diagnosis based on evidence. Several studies have shown that using AI has led to more specificity and sensitivity in usage when compared with results offered by a dental professional. Using this model of AI reduces human errors, helps to simplify complicated presentations of an oral condition and enables proper and targeted patient care. AI is also being used as the gold standard for identifying the risk development of oral cancers, even in their pre-stages. The refinement of this application of AI could lead to a proper and precise method for diagnosing cancers before they are even confirmed or visible to the eye. The most up-and-coming use of AI is in the orthodontic field of dentistry, where it is being implemented throughout the process: beginning from diagnosis, using genetic algorithms that aid in predicting sizes of unerupted teeth, and continuing to treatment and follow-up monitoring. Virtual models and 3D scans are exceptionally useful tools in assessing dental abnormalities and even craniofacial abnormalities, allowing devices such as aligners to be precise and treatment approach to be customised; the combination of these aids is revolutionising orthodontic treatment. Coupling AI with radiology, such as in magnetic resonance imaging and CBCT, allows the most minute deviations of normal structures to be taken into account and identified, which would have been otherwise impossible. This opens up an opportunity to catch a problem in the early stages and also to provide precise working parameters in smaller fields, such as in proximal caries. With the use of CAD/CAM, AI methods are able to design onlays, inlays, crowns and bridges with greater accuracy, and design considerations can be customised to each particular case; therefore, this is a crucial tool for prosthetic dentistry. In the field of periodontics, AI implementation has been utilised to efficiently categorise patients into those with chronic or aggressive periodontitis based on their previous and existing immune profile. This streamlines the treatment by accurately providing a diagnosis on which dental experts can focus. Apart from the contributions of AI methods to direct patient care, the support it is able to offer dentists and dental professionals has truly transformed the idea of the typical dental office and chair. AI is being used in dental offices as voice commands for tasks that are a hindrance, can be interrupting and even taxing when repetitious for both dentists and the related staff. Enabling tasks to be hands-free not only improves efficiency in practice but also limits contamination, operative time in one sitting, and can be extended to eventually integrate more useful features within the dental chair—for example, monitoring breathing rate, anxiety levels and measuring weight and height. The extension of this method of care and practice can start from when the patient is at home, by giving access to emergency dental services as discussed earlier, as well as with the use of teledentistry allowing patients to receive a certain amount of care before reaching the dental office. Scheduling and rescheduling appointments and follow-ups, managing insurance and reimbursement claims, taking a detailed medical history, dental history and history of habits—these can all be taken care of before seeing the dental professional. This allows dental experts to have the full picture before they even see the patient, reduces time and is a more streamlined approach to patient care. Overall, the most exciting part of AI is innovation. Being able to statistically offer studies and examples of how it is already having an impact on the dental workforce in terms of efficiency, proper standardisation and precision, are transformative on a larger scale. Unarguably, the advancements in AI are reconstructing and remodelling the foundation of healthcare in a manner that leaves little room for opposition. The possibilities are endless, and where AI takes us is only up to science-supported imagination. 2021 AI Artificial intelligence Dentistry Future Leave a Reply
Business & Economics Yes, the National Debt Still Really Matters Our growing public debt is diminishing our future growth Image Credit: Javier Ghersi/Getty Images When the president released his profligate budget proposal earlier this year, Treasury Secretary Janet Yellen described the plan to raise the debt ratio (total public debt as a share of GDP) to 117% within the decade as “fiscally responsible.” The increasingly popular notion that the debt ratio doesn’t matter has gained prominence among economists and policymakers in recent years—especially among those with ambitious public spending proposals. While several dangers arise from ignoring the upward-spiraling debt ratio, in a recently published journal article I focus specifically on the negative growth effects of a high and rising debt ratio. A review of 40 studies published over the past decade reveals a notable pattern: that high (and growing) levels of public debt have a negative impact on economic growth. How High Levels of Public Debt Reduce Growth A high and growing public debt ratio negatively affects economic growth rates in several ways. As governments increase borrowing to finance their ever-growing debt obligations, less money is available for private businesses and individuals to invest. Two recently published studies find that every 1 percentage point increase in the public debt ratio reduces private investment by 0.23-0.24 percentage points. Debt also dampens growth by increasing the risk of holding U.S. debt, which causes investors to demand a higher rate of interest on debt service payments. The resulting increase in interest rates reduces both public and private investment as the government is forced to allocate a larger share of its spending power toward debt service financing instead of funding other services. Another channel through which public debt reduces growth potential is one that myopic and self-interested advocates of growing debt often conveniently overlook—namely, higher distortionary future taxes. Eventually large tax hikes will be necessary to fund future liabilities and rising debt repayments. These future tax hikes will negatively affect investment and productivity and will significantly dampen future economic growth rates. When Will the Growth Rate Start Decreasing? Because high and growing levels of debt have negative and significant effects on economic growth, economists have sought to find out if there is a specific threshold level at which these negative effects will start to kick in. Of the 31 studies on the debt-growth relationship published since 2010 that explore the existence of a threshold, 25 studies find that a threshold level does exist. Taking this sample of 25 studies together, a threshold level (mean and median) for developed countries is around 80% of GDP. Studies that estimate the growth effects of increasing debt levels above this threshold find that on average, every 10-percentage-point increase in the debt-to-GDP ratio reduces economic growth by 0.2 percentage points. To put this into perspective, if the U.S. economy were to grow on average 2.5% (real GDP) per year with a debt ratio of 80%, all else being equal, the debt ratio would grow to 120% and average growth would fall to 1.7% per year. This difference in growth rates may seem negligible to some, but the difference between 2.5% annual growth and 1.7% growth is the difference between doubling national GDP every 28 years versus every 41 years. Debt dynamics in Europe demonstrate why the debt ratio matters for growth. From 2000 to 2019, European Union countries with debt ratios that never fell below 80% (high-debt countries) averaged only 0.8% real GDP growth, while EU countries with debt ratios that never exceeded 80% (low-debt countries) averaged 3.1% growth. Avoiding a High-Debt, Low-Growth Future While future technological innovations have great potential to boost productivity and growth, high and growing levels of public debt may push growth rates in the opposite direction. With lower rates of economic growth, the U.S. has less ability to grow its way out of debt, and a smaller economy means a reduced ability (relative to a low-debt economy) to collect sufficient revenues to finance growing debt repayments. In a fiscal environment where budget deficits, the annual additions to the debt stock, are 5% of GDP in good times and 15% in bad times, U.S. policymakers must consolidate our fiscal finances to avoid the impending possibility of economic stagnation. With a debt ratio exceeding 100% in 2020, the U.S. fiscal condition is already having a deleterious impact on the country’s growth potential. Policymakers need to stop kicking the can farther down the road and act now to return sustainability to America’s federal budget and fiscal condition. Policymakers should consider implementing real institutional reform to change the debt trajectory, including meaningful budget rules that have broad scope, few and high-hurdle escape clauses, and minimal accounting discretion. To reduce the debt burden, policymakers should instill a program of fiscal consolidation that focuses at least two-thirds of the consolidation measures on spending reductions, rather than tax increases, to maximize chances of success. While several options for improving fiscal sustainability are available to policymakers, reducing the national debt is a key measure to implement now, when the benefits will be greatest. The future growth potential of the U.S. economy and comparative living standards of the average American ultimately depend on the willingness of our political leaders to address the issue at hand. Submit a Letter to the Editor Submit your letter Subscribe to our newsletter
Connect with us Why Do Most Dogs Tilt Their Heads When We Talk to Them? Does your dog tilt its head slightly to the side when you speak to it? Most of us would agree that this adorable behaviour is their way of taking advantage of our emotions. After all, whose heart wouldn’t melt at the sight of a dog doing the cute trick? However, there is more to head tilting than just charming humans. According to Mental Floss, dogs do the head-tilt as their way of empathizing. You read that right, just like humans, dogs have the ability to empathize. Experts revealed that pooches are capable of reading as well as responding to human vocal cues, facial expressions and body language. For instance, when you’re praising your dog, they listen to specific words and intonation to get your message. Our four-legged friends tend to cock their heads as you speak to pick up your tone and listen for particular words. Some experts suggested that head titling has something to do with how the canine ear is constructed. Although dogs can pick up frequencies humans are not capable of hearing, their ability to identify where a sound is coming from is not as accurate as that of humans. A simple head tilt may enable a dog to adjust its outer ears in order to better locate the source of the sound. Photo credit: Getty via Mirror UK Meanwhile, Stanley Coren of Psychology Today theorized that dogs tend to behave in this manner because of their poor vision. The dog’s muzzle makes it difficult to read facial expressions, specifically the lower half of the face. By tilting their heads, dogs get to see key clues as to how humans feel when they’re talking. It is likely that one reason why dogs may tilt their heads when we talk to them is because they want to see our faces better, and to compensate for the way in which their muzzles obscure part of their vision,” he wrote on Psychology Today. Interestingly, dogs who tend to tilt their heads more often are especially empathetic. Several reports claimed that dogs who are more socially uneasy don’t usually tilt their heads when spoken to. But it must be noted that pooches with pointy ears or a flatter snout don’t usually show this kind of behavior. Experts encourage dog owners to respond to head tilting with positive reinforcement. View Comments
Super Seeds for Super Nutrition Get Healthy Fats, Protein, Fiber and Vitamins Importance of Diet Our diet plays a huge role in our health and well-being. People who eat well experience more health benefits, like improved weight control and cancer prevention. In fact, eating healthy is one of the best ways to fight obesity. Improving our eating habits gives us more energy during the day and better sleep at night. Mood, memory and cognitive functions are also improved when we make healthy food choices, and there is also a reduced chance of anxiety and depression when we are well nourished. Basically, when we give our bodies the fuel it needs to perform optimally, we are more motivated to live well in every area of our lives with more self-confidence and fulfillment. Incorporating Seeds Into Your Diet Seeds are a superstore of nutrition. Although the specific benefits vary from seed to seed, each provides a healthy source of energy and protein. Also, because they are a natural, whole food, you can rest assured in knowing exactly what you are eating when you consume these little gems. There are many ways to incorporate seeds into your diet. Add a tablespoon to smoothies as a thickener, to salads for a bit more texture or to rice to give a nutty flavor. For the more advanced and adventurous cook, there are porridges, puddings, energy bites and granola bars that could be made with little effort. Adding seeds to well-loved recipes is a delicious and nutritious way to liven up an old favorite. Chia seeds are tiny, black seeds that are rich in iron, calcium, fiber, antioxidants, and omega-3 fatty acids. They have been linked to reducing the risk of obesity, diabetes, and heart disease as well as promoting colon health. Besides eating these seeds, they can also be used in a face mask to help reduce inflammation and treat acne. Finally, they are great as a vegan replacement for eggs when baking since they have a binding effect when wet. But, unlike chicken eggs, chia seeds have no cholesterol. Flaxseeds are an excellent source of omega-3 fatty acids which have been associated with lowering blood pressure, reducing triglycerides, and lessening the likelihood of heart attacks and strokes. Additionally, the lignans in flaxseed can have an anti-inflammatory effect which can help prevent diabetes. The high fiber content also promotes good digestive health as it can help with constipation and regularity. Hemp Seeds Hemp seeds are a great source of protein. Although most people associate “hemp” with marijuana, hemp seeds, also known as hemp hearts, do not have any of the psychoactive chemicals that cause the typical “high” that is associated with the plant. Hemp hearts are one of the best sources of protein because they have all nine essential amino acids. These amino acids are considered essential since they can’t be produced by the body but are required for producing everything from insulin and collagen to enzymes and antibodies. Besides adding hemp seeds to salads, smoothies, or oatmeal, there are also hemp protein powders that are a great source of protein for vegans. Finally, hemp seed oil can be used to make salad dressings with a more earthy flavor. Quinoa is a seed prepared like a grain so it’s often mistaken as one. This seed is gluten-free, and comes in a variety of colors, like red and black, though white is most common. Lower in fat but higher in carbohydrates than flaxseed, quinoa is another source of all nine essential amino acids. Additionally the insoluble fiber in quinoa is a helpful way to stay regular. Try it as high protein alternative to rice or oatmeal. Amaranth, another pseudocereal, has fewer carbs than rice, barley, and couscous, while having more fiber and protein than those grains. It is rich in vitamins and antioxidants which help reduce inflammation and thus prevent chronic illness. Amaranth is also naturally gluten-free like quinoa but is slightly lower in calories and has more fiber, but both are great choices. Just make sure to get the water-to-seed ratio correct and not to overcook the seeds or you’ll have a mushy mess instead of a nutritious side dish. Supercharge Your Meals Seeds provide a great way to increase the nutrition in your food as they are an abundant source of healthy fats, protein, fiber and vitamins. Being rich in both micro and macronutrients, seeds are a low-cost way to supercharge your meals, and are easy to incorporate. Try adding one tablespoon of any one of these seeds to just one meal a day and see how you enjoy the addition of more texture and flavor to your diet. Erika Long ©2022 Advanced Research Media. Long Island Web Design
Qi Deficiency: What Is It, Its Causes, Symptoms and Treatment Qi deficiency is the term that is used to describe low energy levels in the body. It can cause an array of health problems. Chanchal Sengar Written by: Chanchal SengarPublished at: Oct 08, 2020Updated at: Oct 08, 2020 Do you feel fatigued and stressed all day? Are your energy levels drowning despite eating and exercising properly? This could be due to qi deficiency. This is when your body lacks significant energy to perform functions. Experts believe that the lack of energy is associated with the spleen and it can be treated with proper rest and proper diet. Read this article to know more about Qi deficiency, its causes, symptoms and treatment options. What is Qi Deficiency? To remain physically and mentally fit and healthy, a person must have a balanced qi. It is believed that if any disease is present in your body, then qi energy imbalance is caused in the body. Therefore, qi needs to be balanced to stay healthy. According to Traditional Chinese Medicine(TCM), qi is an important element for physical and psychological health. When a person’s qi quotient is not balanced, it causes an energy imbalance and calorie deficiency is also interlinked. Symptoms of Qi Deficiency  Qi Deficiency or lack of qi means less energy and can affect both either the whole body or a particular part of the body. Therefore, its deficiency can show many symptoms on your body like: • Extreme weakness • Feeling tired all the time • Shortness of breath • Excessive sweating • Tongue swelling  • Dizziness  • Headache  What Causes Qi Deficiency? There can be many reasons for qi deficiency, including older age, high blood pressure, stressful life and heart diseases. So to avoid a lack of qi, it is most important that you try to keep all these problems under control. If you do not do this, then over time it can cause other diseases. Qi deficiency or lack of energy may look a normal problem but it can initiate a lot of other health problems some of them may even have a long-lasting impact. Also Read: How The Body Reacts To Nutrition Deficiency In Different Ways How to overcome Qi deficiency? As already mentioned, Qi deficiency is not good for health and one should work in overcoming the problem with the right methods. Here we are telling you some easy and natural ways to overcome Qi deficiency. So whenever you feel that you are feeling tired all the time then you must try the following modes of recovery: Take an ample amount of rest If you feel that you are feeling very tired without doing some heavy work, then just sit back and relax. This will help balance the qi in the body. Sometimes, over-exhaustion is the reason why qi deficiency occurs.  Do yoga or meditation You should do yoga or meditation for 20 -30 minutes every day before starting your work. Also, take a break in between work and do some relaxing activities such as breathing exercises or listen to music, etc. This helps in relaxing the mind and unnecessary drainage of energy. Also Read: Are You Having Difficulty In Sleeping? Here Are Some Natural Ways To Help You Sleep Sleep is a must Try to get 7-8 hours of proper sleep every night. Good sleep is not only helpful in keeping qi balanced but also reduces the risk of many more diseases. Lack of sleep can also lead to tiredness and you may feel tired. Eat healthily Healthy eating is the key to living a healthy life. So always you eat fermented foods, green vegetables and seasonal fruits to keep the energy levels up. These are some suggestions that you must consider to prevent and overcome Qi deficiency. Energy is the greatest driving force for a human body and we need to always be energetic. Read More Articles in Miscellaneous
Pareto Efficiency / Pareto Optimality: 1 Perfect Allocation Feb 26, 2021 | Pareto Rule and Business What is a Pareto Efficiency or Pareto Optimality? Pareto Efficiency or Pareto Optimality pertains to the highest efficiency level resulting from an optimal allocation where any change to this allocation would make someone or something worse off. A situation is Pareto Efficient when there is no better alternative allocation: no individual or preference criterion can be better off without making at least one individual or preference criterion worse off or without any loss thereof. Pareto Efficiency Illustration Pareto Efficiency or Pareto Optimality - Illustration of the Pareto Frontier - ParetoAnalysis.Tools What are the origins of the Pareto Efficiency Concept? Pareto Efficiency’s concept originates from Vilfredo Pareto (1848–1923), the Italian civil engineer and economist who is better known for the Pareto Principle, also known as the 80/20 rule or Pareto Law. The Pareto Principle is used across industries with Pareto Charts (diagrams) or Pareto Analysis (data tables). Where is Pareto Efficiency used? Although Pareto Efficiency’s concept is prevalent in Economics with the Pareto improvements in Welfare, it is used in various domains such as Engineering. Why is a Pareto Efficient approach interesting? In a multi-objective optimization context, a Pareto efficient approach allows making tradeoffs within a set of choices that overall yield the same optimal “efficiency” or “utility” rather than considering the full range of every possibility. For a given situation, the set of choices that maximize the “efficiency” or “utility” is called the Pareto frontier or Pareto set, or Pareto front. What is a Pareto Efficient Economy? An economy is Pareto Efficient when its goods and resources are allocated to the optimal efficiency level, at which point no change can be made without making someone worse off. In a neoclassical economy, a Pareto efficient outcome is an action that harms no one and helps at least one person. Pareto Efficiency and Pareto Improvements in Economics in 1 Simple Video Economists Kenneth Arrow and Gerard Debreu demonstrated, theoretically, that under the assumption of perfect competition and where all goods and services are tradeable in competitive markets with zero transaction costs, an economy will tend toward Pareto Efficiency. There can be economy only where there is efficiency.” – Benjamin Disraeli How do I know if a situation is Pareto efficient? • A situation is Pareto optimal or Pareto efficient if no progress is possible without having some agent being worse off • A situation is called Pareto dominated if a Pareto improvement exists: one or more agents will gain from the new allocation, but no agents will lose. Conclusion and Suggestions Pareto Efficiency or Pareto Optimality is somewhat an academic way of describing an optimal resource allocation. While this concept of Pareto Optimality is essentially used in Economics and Sciences, a more straightforward but similar practical approach can be applied to improve one’s wellbeing. Learn how to improve your wellbeing using a Pareto Approach in this article. Alternatively, for more content about time management and resource allocation, please check our blog ParetoAnalysis.Tools/Blog. 1. Optimize Easily your Well-being with the 80/20 rule Approach - […] yourself: a sweet configuration that we call a Pareto-dominated situation (by opposition to a Pareto Optimal Situation) as these… 2. The Powerful Pareto Analysis or 20/80 Rule in Excel: FAQ - One-click Excel Pareto Analysis Add-In - […] Pareto Efficiency or Pareto Optimality pertains to the highest efficiency level resulting from an optimal allocation where any change to this allocation would make someone… How to build a Pareto Chart in Google Sheets in 2 Easy Steps This easy step-by-step tutorial shows how to build a Pareto Chart in Google Sheets. Download now the Free Google Sheets Pareto Chart template for immediate use. Time Management: 1 Simple Eisenhower Matrix to Get it Right The Eisenhower Matrix or Urgent-Important Matrix is a highly effective time management tool that uses 4 quadrants to prioritize tasks and increase productivity Create a Pareto Chart in Excel in 2 steps – Easy Tutorial The tutorial shows how to create a Pareto Chart in Excel in 2 simple steps after explaining the basics of the Pareto Principle or 20 80 rule. Happiness, the feeling of positivity, really is the foundation of productivity. - Miguel McKelvey Everyone deserves to have a happy and fulfilled life. Take control now of your well-being by applying the simple yet... Wellness 101: Pareto Your Time & Energy To Be Your Best-Self Pareto your time and energy so you’re always the best of yourself. Mood, Motivation, and Ability vary across the day: Pareto your time for the best outcome. 3 Tricks To Turn The Shiny Object Syndrome To Your Advantage The shiny object syndrome is bad for productivity. Focus is key. Execution is everything. How do you stay focus and execute with all these new ideas in mind? Why Your Best Time management Tool is Useless? 1 explanation The Best Time Management Tools provide optimal task planning. That’s a great start, but that’s not enough. Learn here how to make your ambitions come true. The Powerful Pareto Analysis Approach and 20/80 Rule: FAQ All about the Pareto Principle, Pareto Analysis, 80/20 Rule, Pareto Law, and the Law of the Vital Few. Free Microsoft Excel & Google Sheets Tutorials & Templates Work Smarter – Get Help Right Now From an Excel VBA Expert No time to learn VBA for your Excel project? Get it done: Ask a Microsoft Excel VBA Expert. Live Excel Help, Online Excel Assistance, Overnight Project Delivery Murphy’s Law: 1 Gloomy View On How Things Usually Turn Out Murphy’s Law is the adage that “Anything that can go wrong will go wrong.” People give Murphy’s Law relevance when things go awry as a reason to why it happened Laborit’s Law / Law of the Least Effort: 1 clear explanation Laborit’s Law or the Law of Least Effort suggests that humans prefer to carry out simple tasks that give immediate satisfaction to avoid stress or inconvenience Illich’s Law or Law of Diminishing Returns: 1 simple concept Illich’s Law or Law of Diminishing Returns suggests that optimal productivity is reached with an appropriate balance between working time and resting time. Pin It on Pinterest
Recognizing the Risk Factors and Prevention of Pre-term Labor Written by: Redaksi Mengenali Faktor Risiko dan Pencegahan Bayi Lahir Prematur Babies are generally born at about 37 weeks of pregnancy. If the baby is born prematurely or less than 37 weeks, the baby is declared premature. Pre-term birth is not good for the baby, because the baby's organs have not been fully developed, so it will be difficult to adapt well outside the mother's womb. Of course, it has to be avoided wherever possible. But, why can the baby be born prematurely? Risk Factors Pre-term birth occurs mostly when the membranes rupture prematurely or also known as premature rupture of membranes (PROM). The exact cause of this condition is still not found because the pregnancy and childbirth are complex processes with so many conflicting matters.  But there are several factors that can increase the risk of pre-term birth. The risk factors are: 1. Have had a pre-term birth previously. 2. Ever had a miscarriage. 3. Ever had an abortion. 4. Experiencing the events that lead to physical injury such as a fall or accident. 5. Pregnancy happens with in-vitro fertilization. 6. Twin pregnancy. 7. The distance between pregnancies is very close for example less than six months. 8. Lack of nutrients. 9. Smoking, drinking alcohol, and taking drugs. 10. Infections of the vagina. 11. Problems in the uterus such as abnormal uterine shape. 12. Problems with the placenta. 13. Disease factor such as diabetes and high blood pressure. 14. Events that increase stress as heavy grief or the occurrence of physical violence. 15. Being overweight or underweight. 16. Pregnancy at too young age (less than 20 years old) or too old (over 35 years). Preventive Actions The prevention of pre-term birth is carried out by avoiding the risk factors of pre-term birth. Some ways that can be done by Mommy are as follows :  Pregnancy in too young or too old age should be avoided. Try to provide sufficient distance between pregnancies of more than six months. During pregnancy, Mommy should consume healthy food which is high in nutrition. Mommy should not smoke and drink alcoholic beverages.  If Mommy is sick, consult a doctor before taking the drug. Maintain a normal weight of pregnant women according to gestational age. Do not be afraid to be fat because Mommy will remain beautiful even with a big belly, but Mommy cannot also be too fat. Try to always be happy and stay away from stress. If Mommy is stressful, try to look for things that can make happy. Try to always live a healthy life and maintain the environment to stay clean and healthy. Do not do too much physical activity that can be harmful to the womb If Mommy can maintain the health condition of herself and the fetus, it will reduce the risk of pre-term birth. Do not forget to visit the doctor regularly and follow all instructions given by the doctor. In addition, do n
Soalr water pump Basic Definitions Soalr water pump rutan Alternating Current An electric current that reverses its direction at regularly recurring intervals. Commonly used in most household appliances. Centrifugal Pump A type of pump that uses an impeller to spin water and push it out by centrifugal force. Diaphragm Pump Direct Current An electric current flowing in one direction only and substantially constant in value. The amount of fluid that flows in a given time, normally expressed in units of cubic meters per hour or gallons per minute in the US. Foot Valve A check valve that prevents water from flowing back down the pipe. It is placed in the water source below a surface pump. Friction Loss The loss of pressure due to flow of water in pipe due to distance covered, fittings, and other factors. An electronic control device that produces AC output from DC input. A unit of energy that is the multiplication of power in kilowatts (kW) and time in hours. Linear Current Booster An electronic device that conditions the voltage and current of a PV array to match the needs of a DC-powered pump, especially a positive displacement pump. It allows the pump to start and run under low sun conditions without stalling. It is also called a pump controller. Peak sun hours The equivalent number of hours available in a certain location per day when the intensity is enough to produce 1 kW of energy. Usually in the range of an annual average of 3 to 7 hours per day. Solar Insolation The amount of sunlight falling on a specific area for a given period of time. Also known as solar irradiance and given in kWh/m2 /day. Suction Lift The vertical distance from the surface of the water in the source, to a pump located above surface pump located above. Surface Pump A pump that is not located on ground level to suck out water from lower level sources. Dynamic Head The summation of vertical lift and friction loss in piping. Watt Peak The maximum capacity of the PV panel(s), also known as the rated power of the panel. It is the maximum amount that can be produced under standard test conditions. 4 次查看0 則留言
What Is A Grounding Rod Made Of? A ground rod is often positioned extremely close to your main electrical service panel and is typically constructed of copper or copper coated steel, depending on the manufacturer. They have a diameter of roughly 12 inches and a length of eight to ten feet. In order to offer an acceptable ground connection, it must be electrically connected to your main service panel. What is a grounding rod? Generally speaking, a grounding rod is a safety component of an electrical system that safely directs electricity away from a sputtering electrical circuit and into the ground. What is the standard length of a ground rod? The length of the ground rod. In most cases, a long metal rod, commonly copper linked to steel or galvanized iron, or stainless steel, serves as the connection between the home’s grounding system and the surrounding grounding system. Ground rods are available in two lengths: eight feet and ten feet, with eight feet being the most frequent length utilized in residential installations. What is a copper-bonded ground rod? Ground Rods with a Copper Bond Copper-bonded steel ground rods are produced by electroplating copper onto a steel core in a continuous electroplating process, resulting in a permanent molecular link between the two materials. Note that this is not to be confused with copper-clad steel, which is no longer used for ground rods due to the less reliable bond that results from this approach. You might be interested:  What Food Category Is Popcorn? What can be used as a grounding rod? 1. Allowable grounding electrodes are listed in 250.52 as the following eight things, which are arranged in alphabetical order: Listed Electrodes include: rod and pipe electrodes, plate electrodes, other Listed Electrodes, other local subsurface metal systems or structures, and concrete-encased electrodes. Do grounding rods have to be copper? In most regions of the globe, galvanized steel, copper-bonded steel, and stainless steel are the most prevalent materials chosen for grounding systems, with copper-bonded steel being the most popular. Galvanized steel rods are frequently used as a building material since they are inexpensive, allowable under the National Electrical Code, and UL approved. Is a grounding rod pure copper? Copper-bonded ground rods and galvanized ground rods are the two most prevalent types of ground rods found in most parts of the world. Copper-bonded ground rods are more expensive than galvanized ground rods. In some cases, stainless steel or solid copper ground rods may be required to be fitted in order to accommodate specific environmental conditions. Can aluminum be used as a ground rod? The grounding conductor is often made of copper; however, if the conductor is not in direct contact with masonry or the soil, you can use aluminum or copper-clad aluminum. If the building is equipped with an intersystem bonding termination, the grounding conductor must be attached to it or to one of the other options listed below: System of electrodes for grounding. Can I use rebar as ground rod? Using the Proper Grounding Rod Pipe or rebar can be used in the majority of circumstances. The grounding rod should be constructed of galvanized steel and should be at least four feet in length in order to get the greatest possible outcomes. You might be interested:  Does Central Vertigo Go Away? Can you ground to aluminum? Aluminum or copper-clad aluminum can be used as a grounding conductor if the ground is not in touch with masonry or the soil. Copper is often used as a grounding conductor. In order to prevent the grounding conductor from being terminated by intersystem bonding, it must be attached to either the building or one of the following: Electrodes for grounding. What is better copper or galvanized ground rod? Aluminum or copper-clad aluminum can be used as a grounding conductor if the ground is not in touch with masonry or earth. Copper is the most common grounding conductor. In order to prevent the grounding conductor from being terminated, it must be linked to either the building or to one of the following: Electrodes for earthing. Can galvanized wire be used for grounding? The use of an earthing system can help to mitigate the potentially hazardous consequences of electricity. Furthermore, by utilizing galvanized strips, it is possible to keep the efficiency, durability, and ductility of electrical equipment in a clean and organized manner. Why are 2 ground rods required? In accordance with Section 250.56 of the 2005 National Electrical Code, you must drive a second rod if the ground resistance is 25 ohms or greater. Many contractors, on the other hand, do not bother to measure the ground resistance. They just want to drive two rods since doing so will satisfy the criteria of 250.56, regardless of real ground resistance encountered during testing. Can you ground to galvanized steel? Galvanized steel outperforms copper rod in terms of grounding performance because the galvanized steel serves as a low impedance channel for current to flow from the rod to the ground when grounded. Furthermore, galvanized steel is coated with a protective coating of zinc, which helps to prevent corrosion from occurring. You might be interested:  How Do You Delime A Dish? How deep should a copper ground rod be? The only legal ground rod must be put at a depth of at least 8 feet into the earth.. Section 250.52(A)(5) of the 2017 National Electric Code specifies the length of rod and pipe electrodes in inches (NEC). Can any wire be used as a ground wire? It is commonly found in residential buildings or as a foundation for nearly any form of wire or cable installation. The wire enclosed within the base serves as a ground for the device. It is used by contractors for outdoor applications since it is resistant to corrosion and the effects of extreme weather conditions. What is copper bonded ground rod? A high carbon steel core is used in the construction of copper-bonded ground rods, making them ideal for deep driving applications. The steel core is electroplated with a layer of nickel, followed by a layer of copper, to give corrosion protection against corrosion. In the absence of bending or cracking, this coating is considered to be safe. Can bare copper ground wire be buried? Yes, it’s simple enough (if the ground is not pure rock). It has the potential to inhibit the growth of moss and a variety of plants when placed close to the surface. Written by Leave a Reply
Want Comprehend Green Energy Efficient electric power represents use of potential which is not primarily more efficient rather than fossil supply though which can be hospitable with the surrounding on top of that. Efficient electric power is frequently looked as electric power origins which will really don’t dirty so are eco-friendly. There are particular teams of efficient electric power. Rockwall Energy Rates They are really anaerobic digestive, wind power potential, geothermal potential, hydropower for the small-scale climb, biomass potential, sunlight and even tide potential. Fritter away incineration can even be an important strategy to obtain efficient electric power. Nuclear potential herbs declare that some people yield efficient electric power on top of that, nonetheless it form is without a doubt fraught through a hot debate, simply because we all assume. Even while nuclear electric power may just be maintainable, may just be thought about eco-friendly and even fails to dirty that aura when is without a doubt manufacturing electric power, the nation’s fritter away will do dirty that biosphere because is without a doubt discharged. That take, exploration and even years well before and even when formation in nuclear electric power will do yield and even give off co2 and even the same destructive garden greenhouse gas. As we browse in efficient electric power, so, you never find out nuclear potential listed. Folks who guidance nuclear electric power suggest which will nuclear fritter away is simply not, the reality is, discharged inside much of our earths biosphere for the period of the nation’s natural formation pattern. Some people stress and anxiety on top of that the fact that the co2 which will nuclear electric power formation relieves can be compared, when considering each individual kilowatt 60 minutes in source of electricity, to help you this type of reasons for efficient electric power simply because wind power potential. As an illustration belonging to the efficient electric power formation the regular wind mill, just like the you on Analyzing England, will be able to yield good enough electric power day by day to remain just one power source designed for 1000 family members. A number of states at present provide you with loved ones and even store-bought users to help you pick out absolute consumption of efficient electric power. Some people use this 1 of 2 options. Users can afford ones own source of electricity on a small business which will primarily applications eco-friendly efficient electric power concept, and they may obtain ones own all round components just like the localized tool small business just who then simply acquires as a result of efficient electric power information primarily so much to a give simply because users have the funds for. Leave a Reply Your email address will not be published. agen judi online toto hk situs judi slot online terbaik
Realization Principle Effectively, the revenue is deferred and not yet realized. The revenue recognition principle using accrual accounting requires that revenues are recognized when realized and earned–not when cash is received. Other accounting systems may have principles of profit accrual that differ from those in German commercial law accounting. For example, in a SaaS company, revenue would be from the sale of monthly or annual subscriptions. The information featured in this article is based on our best estimates of pricing, package details, contract stipulations, and service available at the time of writing. The term realization principle refers in a broader sense to the principles applicable within an accounting system for the realization – ie income-effective receipt – of positive components of success. The realization principle determines when a service or a product is considered to be “realized” and can therefore be used to determine the company’s success. On the other hand, it determines the value at which unrealized services and products are to be recognized in the balance sheet . This means if a business receives an advance, and they have not yet delivered or transferred the goods, the revenue should not be recognized. Revenue or income should be recognized when it is earned, whether the cash has been received or not. Businesses and clients need to adhere to the standard procedure before they can recognize revenue. Of course, the best evidence of an arrangement is a client paying cash for goods or services. Arrangement, the first condition, dictates that there needs to be an agreement between two parties in a transaction. Most businesses have a standard procedure for sales, like a client signing a contract or filling in an order form. The accounting industry has identified four conditions that must be met before revenue can be considered recognized. Realization Principle The States Parties to the present Covenant undertake to guarantee that the rights enunciated in the present Covenant will be exercised without discrimination of any kind as to race, colour, sex, language, religion, political or other opinion, national or social origin, property, birth or other status. A contingent asset is a potential economic benefit that is dependent on future events out of a company’s control. Allocate the determined amount of consideration/price to the contractual obligations. Determine the amount of consideration/price for the transaction. This principle is commonly followed when businesses use the accrual method of accounting. We will show how the business should recognize the revenue while following the realization principle. Another example is product is manufactured and sold on credit, according to the realization principle, the revenue is recognized at the time of the sale. Under this basic accounting principle, a company could earn and report $20,000 of revenue in its first month of operation but receive $0 in actual cash in that month. The matching principle requires that expenses incurred to produce revenue must be deducted from revenue earned in an accounting period to derive net income. In this way, business expenses are matched with revenue. The matching principle also requires that estimates be made, based on experience and economic conditions, for the purpose of providing for doubtful accounts. This provision leads to a reduction of gross revenue to net realizable revenue to prevent the overstatement of revenues. We will now explain when the business should recognize the revenue for this transaction. The revenue should be recognized at this point whether or not the payment has actually been received. Typically, this will happen when the business has rendered the services or transferred the goods to the customer. Revenue has to be recognized only when sales are actually made, not when an order is received or simply entered into. The risk can be minimized through the realization principle. In the above case, the sale of truck is related to the sale of goods and maintenance contract is the continuous service which is to be provided to the customer for one year period. Where risk and rewards are said to be transferred when the goods are delivered, or seller accepted his responsibility of the goods in case of damage or destroy at buyer place. Revenue Realization Vs Revenue Recognition: What Is The Difference? Last but not least, we recognize revenue when the performance obligation is satisfied either over time or at a point in time. Second, we need to identify the performance obligations in the contract. The performance obligations are the contractual promise to provide goods or services that are distinct either individually, in a bundle, or as a series over time. • Having a standard revenue recognition guideline helps to ensure that an apples-to-apples comparison can be made between companies when reviewing line items on the income statement. • In the case of the realization principle, performance, and not promises, determines when revenue should be booked. • It is one of the three principles for defining income under the seminal case in this area of tax law, Commissioner v. Glenshaw Glass Co. • The transaction price refers to the amount of consideration that an entity is expected to entitle to in exchange of transferring the promised goods or services. • These reports may include particulars of decisions and recommendations on such implementation adopted by their competent organs. The Law Dictionary In spite of the general realization rule that changes in wealth with respect to existing assets are not to be reckoned until disposition. This provides a more accurate overview of the financial health of the business. To remedy inaccurate health views, in our $1,200 annual subscription, $100 is recognized monthly for the 12 months. Revenue is different from income, which is a concept on its own but often gets used interchangeably. Before we go any further, let us look at the concept of revenue. Realization Principle As an example, a SaaS company that bills $1,200 annually can’t recognize that as revenue yet. The customer might fail to pay, downgrade, or cancel their contract. Revenue may be defined as the value of goods and services which a business enterprise transfers to its customers. Fourth, the transaction price shall be allocated to each corresponded performance obligation. The allocation is done by based on the stand alone selling price of each performance obligation. This principle allows the revenue actually earned during a year to be recognized instead of only what is collected. What Do You Mean By Matching Concept? It is commonly followed in a business organization as per the accrual system of accounting. Realization concept gives more importance to the recognition of revenue. Realization Principle These Sources include White Papers, Government Information & Data, Original Reporting and Interviews Realization Principle from Industry Experts. Reputable Publishers are also sourced and cited where appropriate. This stipulates that, for example, when a sales contract was concluded, no profit was realized, but there is no need to wait until the purchase price debt has been paid in full before a profit can be made. The profit applies at the time of the transfer of risk- i.e. at the time of handover to the buyer or a transport person commissioned for delivery (e.g. forwarding agent) – as realized. At this point in time, the sales revenue can be taken into account in the income statement and the payment or receivable in the balance sheet. Recognition of revenue on cash basis may not present a consistent basis for evaluating the performance of a company over several accounting periods due to the potential volatility in cash flows. The realization principle answers the question, “When is business revenue realized?” The principle states that revenue can be recorded when the earning process is complete and objective evidence exists regarding the amount of revenue earned. For example, revenue is earned when services are provided or products are shipped to the customer and accepted by the customer. In the case of the realization principle, performance, and not promises, determines when revenue should be booked. The States Parties to the present Covenant undertake to ensure the equal right of men and women to the enjoyment of all economic, social and cultural rights set forth in the present Covenant. The UN Human Rights Office and the mechanisms we support work on a wide range of human rights topics. • Revenue is at the heart of all business performance. • The inner realization principle of recursion is discussed. • The realization principle of accounting revolves around determining the point in time when revenues are earned. • At any level of resource availability, priority must been given to ensuring people’s basic economic, social and cultural rights, and there must continual progress on people’s enjoyment of ESCR. • Discover which SAP Fiori Apps fit to the transaction usage of your company. What is the realization principle, and why may it lead to a difference in the timing of when… RevVana is a SaaS company with industry-leading revenue realization management solutions. The Principle Of Implementation In Other Systems Of Standards To work around this and produce more accurate financial reports, revenue recognition is recorded. Based on the accrual accounting method of deferrals, the booking is recognized as soon as the sale is made, regardless of whether the money and/or services are realized. Intermediate Accounting 10e By Spiceland, Nelson, And Thomas It ensures a true and fair view of the accounts as profit is to be realized and recognized only when the seller transfers risk and rewards. So according to the recognition principle, the revenue of trucks is to be recognized when risk and rewards related to the truck are transferred, or truck is delivered whichever is earlier. Motors PLC delivers the cars to the respective customers within 30 days upon which it receives the remaining 80% of the list price. The true and fair view is better reflected in the realization concept. Learn more about the standards we follow in producing Accurate, Unbiased and Researched Content in our editorial policy. It helps allow a business to control the inflation of profits and revenue. Additionally, it recognizes the importance of legal ownership in a transaction that can be legally enforced. Underlying AssetUnderlying assets are the actual financial assets on which the financial derivatives rely. Discover which SAP Fiori Apps fit to the transaction usage of your company. It takes you just five minutes to share your company information and you will receive your personalized SAP Fiori Apps recommendations report within five business days. A current account is a deposit account for traders, business owners, and entrepreneurs, who need to make and receive payments more often than others. Understand the definition of Limited Liability Partnership . Know what an LLP is and learn the advantages of an LLP by understanding LLP examples. Learn about different types of partnership styles. Know about partnership agreements and when they dissolve. Simply omitting the figure from the financial statements is not accurate either. It doesn’t provide any insight into the future for planning purposes or lend towards securing loans or assessing business performance against targets. All the money generated from the sale of goods or services by a business is called revenue.
What is it, what is it for and how to create a WPAN network? – Advantages and disadvantages What is a WPAN network? WPAN or Wireless PAN ( Wireless Personal Areal Network ) is a personal network that covers a limited range of space of between ten and thirty meters depending on the capacity of the devices used for its connection. They can be connected from computers, mobile phones, printers and cameras. The connection between their devices is wireless and the most popular type of connection known is Bluetooth, which displaced infrared light technology a few years ago. WPAN networks are often used in devices that are in the same room due to their short range. What is a WPAN network What are WPAN networks for? As its name implies, it is a personal type network, it serves to connect personal devices such as a mobile phone, tablet or a computer. Its connection is wireless, but limited by a reduced distance. Data can be shared over the network as long as the devices are within the minimum distance range. Types of WPAN networks There are different types of technologies that can be used to interconnect multiple devices on a WPAN network. They are characterized because a wired connection is not necessary to share information. It is the most widely used and the best known standard. Most, if not all, of today’s devices have built-in Bluetooth technology. You can share almost any type of information, from images, videos, audios or files. To establish a connection the devices must be relatively close. Over the years this technology has had a positive evolution and they are becoming more stable. Bluetooth also allows you to connect devices such as remote controls, headphones, mice, and keyboards. It also functions as a communication channel for a mobile phone to access the Internet via Bluetooth through another phone. The new versions are expected to identify the location of devices connected to the same network. It is a type of technology that exists as an alternative to Bluetooth and works in a 2.4 Ghz frequency band . The download speed is lower compared to Bluetooth, but instead offers a greater range for connection between devices. It is usually used in the connection of electrical appliances and some toys. It is one of the first forays into WPAN networks. Currently it is little used, but those who remember it know how tedious it was to send a file from one mobile phone to another and all the time it took. The transmission is done directly, so the devices must remain close and in the same position during data transmission. create a WPAN network Create a WPAN network To create a personal wireless network you only need certain types of components. Initially it is necessary to have a device that works as a transmitter, it is the one that initiates the transmission. Then another device that works as a receiver to receive the signal. It is important to note that they must be connected by the same channel, referring to the type of technology used, be it Bluetooth, infrared or another. They do not need an additional wired connection so their implementation is very economical. Advantages and disadvantages of WPAN networks • Portability. It is a wireless network that can be easily moved from one place to another. • Security. To access this network, it is necessary to be in the same range, so accessing the data is more complicated. Some devices even request authorization to connect to others and share information. • Short range. Its use is limited to the scope of the signal in a reduced space. • Transfer speed. Although it has evolved over time, it still takes longer than other types of connections to send information from one device to another. Leave a Reply Your email address will not be published. Back to top button
The Remediation Series — Part 6 Automation as a Permanent Stopgap The use of artificial intelligence and machine learning is already well-established within cybersecurity. Such systems are commonly used to extract, process, and disseminate large amounts of information quickly, often in the pursuit of developing more accurate intrusion detection heuristics. Automation is also used in active defense measures, mitigating credential stuffing attacks committed by bot computer systems (Sawers, 2020). Automated systems are so prevalent that by 2030, an estimated 30% of organizations will have implemented Security, Orchestration, Automation, and Response (SOAR) technologies. SOAR technology enables an organization to efficiently collate and analyze data from a variety of sources and apply workflow modifications in response to anomalies, such as cyber attacks (Bari, 2019). Such extensive implementation is anticipated to replace an estimated 800 million workers worldwide (Mohammad & Lakshmisri, 2018). While this trend may be viewed as a threat to human job security in numerous industries, the cybersecurity industry has had a necessary reliance on such technology. Assuming the same trend of replacement applies to the industry, only 22% of cybersecurity roles are considered fully replaceable, with another 37% being considered hybrid-capable where man and machine share mutual responsibility (Luit, 2017). Even if the industry were to undergo the same level of automation by 2022, only about a quarter of the currently vacant positions would be filled (Luit, 2017). Additionally, with the mass implementation of automation, new roles will be created, with an estimated 85% of jobs that will exist in 2030 not yet being created, many in direct response to automation (Bourne, 2020). Professional roles that are created in response to the advent of mass automation are likely to be in one of three roles: teachers, explainers, and sustainers. Teachers refer to roles involved with development and training of AI systems, whereas Explainers enable the implementation and usage of these systems, and finally Sustainers examine the impact of AI systems (Luit, 2017). As one may see, each of these roles have the potential to be intimately involved in the spheres of private industry, government, and education. Because of this potential, it is essential the education-to-industry pipeline be repaired or restructured, so the course of the cybersecurity jobs gap be reversed. Once the issue of the gap is resolved, the cybersecurity industry will undergo maturation and attain a level of maturation as that of the medical or legal fields. Get the Medium app
Max Desiatov Max DesiatovI'm Max Desiatov, a Ukrainian software engineer. What are generators and why Swift needs them? 10 September, 2018 This article is a part of my series about concurrency and asynchronous programming in Swift. The articles are independent, but after reading this one you might want to check out the rest of the series: When developing apps, I frequently need to switch between different programming languages. In addition to using Swift on iOS/macOS and Linux, a lot of the time JavaScript/TypeScript is a good fit for full-stack web development, especially with the popularity of React and Node.js. And when doing data engineering, Python’s ecosystem is pretty good and is widely supported. But every time I come back to Swift, there is one big feature I miss called “generators”. Whether you’ve used generators and yield keyword before in other languages, or you are only interested to learn about it, you might find this short pitch interesting. Here I try to imagine how generators could look in Swift and what are the implications. Generators? What’s that? The best way to explain is to compare generators to functions: functions have one entry point (function application), execute once and finish. Functions return values and/or return early with a return statement. A generator is like a function with “holes”, after initialisation it executes up to a next yield statement, “generates” a value passed as yield argument and suspends, saving its state. The generator state is a position of yield in generator’s body and values of all variables in the generator’s scope. A caller of a generator can then resume the generator again and it would continue from the same yield position it was suspended preserving its scope. I tried to capture the difference in this diagram: Generators vs functions Thanks to the fact that generators produce a series of values of the same type, usually they can be treated like sequences and iterated with for ... in syntax. This is a powerful feature that can be used where common sequences and collections don’t fit well or there is a need to describe an algorithm that suspends and resumes later. How do different languages implement generators? If you’re interested in programming languages history, here’s a quick overview how a few of them approached generators: Naming Version and year introduced JavaScript Generators EcmaScript 6 (~2015) Python Generators and coroutines Generators in Python 2.3 (2003), coroutines in Python 2.5 (2006) Ruby Fibers Ruby 1.9 (2007) C# “iterators” C# 2.0 (2006) I’m sure there is a plenty of other languages that have generators under different names with a different syntax or with 3rd-party libraries, but I listed only those with relatively wide adoption that have it implemented as a language feature. Let’s get started with a simple use case for generators: reading huge amounts of Big Data™. Say you have hundreds of gigabytes of sensor data, which is stored as a JSON array of integers in a file. The only API you have at your disposal is a plain old synchronous blocking API to read a few bytes in a file at a given offset. We would like to have a nice and efficient way of reading this data and passing it to other code for post-processing. Reading all of the data up front and storing it in memory might be ok for small files, but do we really need servers with a hundred gigs of RAM to read a file with our sensor data? Maybe we could read the file only in small portions? Meet streams: a stream is a sequence of data elements made available over time. A stream can be thought of as items on a conveyor belt being processed one at a time rather than in large batches. Here’s how an implementation of a chunk reader could look like without syntax support for generators: final class ChunkReader { private let handle: FileHandle let chunkSize: Int init?(path: String, chunkSize: Int, start: UInt64 = 0) { guard let handle = FileHandle(forReadingAtPath: path) else { return nil self.handle = handle self.chunkSize = chunkSize start) func next() -> Data { return handle.readData(ofLength: chunkSize) This ChunkReader class maintains state in the handle instance of FileHandle, which itself is a state machine. Of all existing generator implementations, I find Python’s and JavaScript’s version the most straightforward and easy to use. You may be surprised by my choice of languages with dynamic typing for inspiration, but I think this generator design hasn’t appeared yet in statically typed languages only due to implementation details. In my experiments, I’ve reached a conclusion that it can be translated to a statically typed language, such as Swift, surprisingly well. Without further ado, here’s a version with generator support in Swift syntax: func chunkReader(path: String, chunkSize: Int, start: UInt64 = 0) -> Generator<Data> { // marker for a generator body return Generator { guard let handle = FileHandle(forReadingAtPath: path) else { } start) var data: Data repeat { data = handle.readData(ofLength: chunkSize) // suspends and resumes execution here at every iteration yield data } while !data.isEmpty let stream = chunkReader(path: "test.txt", chunkSize: 5) for chunk in stream { // prints lines of every 5 characters in test.txt Neat, we no longer need a dedicated class declaration and are able to express generators concisely, so it doesn’t differ much from a common function declaration. It’s quite important that the generator syntax version reads naturally with common control flow constructs such as loops. It’s easy to follow what happens when generator execution is resumed after the yield keyword. In a class version, you’re forced to introduce instance variables and initialise those explicitly. Generators are state machines An interesting observation is that the proposed language support for generators is a “syntax sugar” for state machines, in a similar way to closures being a “syntax sugar” for delegate objects. On a lower level closures are transformed to objects that capture external environment declared outside of the closure body. A reference to this environment is then stored in the closure object as an “instance variable”. Generators capture and maintain internal state declared inside the generator body, which is also stored as generator “instance variables”. Another sensible addition is to allow generator to capture variables in parent scope as closures do, which is the default behaviour in both Python in JavaScript. Here’s an example with more complex state and more state transitions to illustrate the point: HTTP reader stream. Imagine you’d like to report a detailed stream state for logging purposes or to make it clear in the UI what’s going on. Let’s introduce an enum to represent it: enum HTTPReaderState { case initialized case dnsResolved(ipAddress: String) case connectionEstablised case requestWritten case headersParsed(headers: [String: String]) case redirectRequired(redirected: URL) case bodyChunkDownloaded(chunk: Data) case connectionClosed And here’s a class implementation of this stream, assume that Socket implementation and all DNS resolution and HTTP parsing functions are already provided: final class HTTPReader { private let url: URL private var statusCode: Int? private var state: HTTPReaderState = .initialized private var currentBodyLocation = 0 // not a concrete type, abstract `Socket` used as an example private var socket: Socket? init(url: URL) { self.url = url func next() throws -> HTTPReaderState { switch state { case .initialized, .redirectRequired(let redirectURL): let ipAddress = try resolveDNS(redirectURL ?? url) state = .dnsResolved(ipAddress) case .dnsResolved(let ipAddress): socket = try establishConnection(ipAddress) state = .connectionEstablished case .connectionEstablished where let socket = socket: try writeHTTPRequest(socket, url) state = .requestWritten case .requestWritten where let socket = socket: statusCode = try parseHTTPStatusCode(socket) let headers = try parseHTTPHeaders(socket) state = .headersParsed(headers) case .headersParsed(let headers) where let socket = socket: if isRedirectCode(statusCode) { state = .redirectRequired(headers["Location"]) } else { case .bodyChunkDownloaded: let data = try readHTTPBody(socket) if data.isEmpty { state = .connectionClosed } else { state = .bodyChunkDownloaded(data) return state Disadvantages of this approach are pretty obvious: we need optionals and optional unwrapping for instance variables that have to outlive a single run of the next() function. All state transitions are described as a giant switch statement, which is error-prone and obscures natural control flow. At a glance, it would be hard to say which of the state transitions could be executed more than once and what’s the expected order of transitions. Notice where let socket parts to unwrap the socket instance variable. Another approach would be to make the socket an associated value of HTTPReaderState to make sure a state always has the required values to proceed, but this would expose private socket in the public API. To fix that we’d probably need yet another enum for private state, which illustrates the point that the class version gets complicated really quickly. Thanks to Cory Benfield for highlighting the problems with optional unwrapping and absence of socket in associated values. Turns out, this is a pattern that you can see used in SwiftNIO. So check out a version with the new generator syntax: func httpReader(url: URL) -> Generator<HTTPReaderState> { return Generator { var redirectURL: URL? let socket: Socket repeat { let ipAddress = try resolveDNS(redirectURL ?? url) yield .dnsResolved(ipAddress) socket = try establishConnection(ipAddress) yield .connectionEstablished try writeHTTPRequest(socket, url) yield .requestWritten let statusCode = try parseHTTPStatusCode(socket) let headers = try parseHTTPHeaders(socket) yield .headersParsed(headers) if isRedirectCode(statusCode) { redirectURL = headers["Location"] if let u = redirectURL { yield .redirectRequired(u) } else { redirectURL = nil } while redirectURL != nil var data = try readHTTPBody(socket) while !data.isEmpty { yield .bodyChunkDownloaded(data) data = try readHTTPBody(socket) yield .connectionClosed It is significantly smaller and easier to read: there aren’t as many optionals and optional unwrapping, variables are introduced with known values when needed. Control flow constructs like repeat ... while can naturally express repeating state transitions and you no longer need that giant switch altogether. I don’t get it… 🤔 Wouldn’t the addition of generators make Swift more complicated? I see a significant amount of complaints like this on Twitter. The narrative is that Swift has become unnecessarily complicated and everyone should focus on the quality of developer tools and frameworks instead of adding new stuff to the language itself. I disagree with the first point strongly: of all programming languages I worked with, Swift follows progressive disclosure principle most consistently. You don’t have to use advanced features if you aren’t ready or don’t want to. In addition, generators and yield keyword implemented in the way I propose are purely additive and don’t change anything in the Standard Library or in the way your old code works. If you don’t need this feature, you won’t even notice it exists if it’s introduced in some future version of Swift. As for developer tools and frameworks, we need to stop seeing it as a zero-sum game. Making the language more powerful enables more powerful tools and frameworks. As I’m in no way a member of the Swift compiler team or affiliated with Apple whatsoever, I’d be very happy to work together with the open-source community on this proposal. This wouldn’t have any negative impact on other high priority developments in the Swift ecosystem. I get it! 👍 Is this what Chris Lattner proposed a year ago? Yes and no. 😄 My pitch is heavily inspired by that proposal, but in no way conflicts with it. When I say I miss generators in Swift, I should mention I miss async/await as described in that proposal even more. I’ve been obsessed with the possibility to get it introduced for a while and been actively working on my generators proposal for months now because of this. await keyword and async functions can be directly expressed with yield and generators. In fact, this is how Python and JavaScript do it. From all my research and based on how other languages implemented this, I’m convinced we could get yield and generators in Swift much earlier than async/await. Given that yield and generators are simpler and more “primitive”, it would be a good thing to introduce these concepts gradually with smaller proposals over time. Even better, these features work so well together that we could get async generators after that, which would make operating on non-blocking streams natural. Good examples of these are: reading big amounts of uniform data from a database without blocking, streaming download/upload of huge amount of files, streaming parsers etc. Wait, I only saw generator output. Your diagram says generators also get input? Yeah, this one more thing… With generators you get not only reader streams, but also writer and reader-writer (i.e. duplex) streams. In my examples yield was only a statement with arguments treated as output. I’d propose to allow yield expressions, which evaluate to generator input. This is a more general and complex case and deserves a separate article, which is coming soon! 🤓 We were able to implement streams abstraction for reading huge amounts of data in small chunks. These chunks can be processed incrementally even with blocking synchronous APIs as a foundation. While you can implement streams with plain classes, it has numerous disadvantages. Based on what other programming languages have done before for a long time, I propose introducing generators to Swift with new generator syntax and yield statement. This is also a foundational feature for adding more support for asynchronous programming to Swift in the future. I won’t be able to proceed without your help, so I ask you to send me your comments and questions on Twitter or Mastodon. Whether you have interest in Swift and like or dislike this pitch, or you’re a compiler engineer who’d like to help, I look forward to hearing from you. Subscribe to this blog (multiple options available at the top) if you haven’t done that yet to be able to follow my progress with this proposal, stay tuned. 👋 If you enjoyed this article, please consider becoming a sponsor. My goal is to produce content like this and to work on open-source projects full time, every single contribution brings me closer to it! This also benefits you as a reader and as a user of my open-source projects, ensuring that my blog and projects are constantly maintained and improved.
Get it on Google Play New! Download Unionpedia on your Android™ device! Faster access than browser! Infrared and K band (infrared) Shortcuts: Differences, Similarities, Jaccard Similarity Coefficient, References. Difference between Infrared and K band (infrared) Infrared vs. K band (infrared) Infrared radiation (IR) is electromagnetic radiation (EMR) with longer wavelengths than those of visible light, and is therefore generally invisible to the human eye (although IR at wavelengths up to 1050 nm from specially pulsed lasers can be seen by humans under certain conditions). It is sometimes called infrared light. In infrared astronomy, the K band is an atmospheric transmission window centered on 2.2 μm (in the near-infrared 136 THz range). Similarities between Infrared and K band (infrared) Infrared and K band (infrared) have 2 things in common (in Unionpedia): Infrared astronomy, Infrared window. Infrared astronomy Infrared and Infrared astronomy · Infrared astronomy and K band (infrared) · See more » Infrared window The infrared atmospheric window is the overall dynamic property of the earth's atmosphere, taken as a whole at each place and occasion of interest, that lets some infrared radiation from the cloud tops and land-sea surface pass directly to space without intermediate absorption and re-emission, and thus without heating the atmosphere. Infrared and Infrared window · Infrared window and K band (infrared) · See more » The list above answers the following questions Infrared and K band (infrared) Comparison Infrared has 202 relations, while K band (infrared) has 3. As they have in common 2, the Jaccard index is 0.98% = 2 / (202 + 3). This article shows the relationship between Infrared and K band (infrared). To access each article from which the information was extracted, please visit: Hey! We are on Facebook now! »
+91 8266041801   +44 203 372 4609   +1 408 454 6110 Get Free Quote Python 3.6 adds New secrets Module for Robust Account and Password Security Python 3.6, the newest major release of the Python language, has added a new module, called secrets, to help generate cryptographically strong random numbers for managing secrets, like account authentication, tokens and related secrets. Python developers are highly likely to prefer secrets over the default pseudo-random number generator in the random module, since it’s not meant for cryptography or security, but modelling and simulation. Let’s understand with an example how one can create their own cryptographically strong pseudo-random values and generate tokens using the secrets module. How to create Cryptographically Strong Pseudo-Random Values using secrets >>> import secrets >>> import string >>> characters = string.ascii_letters + string.digits >>> secure_password = ''.join(secrets.choice(chNo Records.aracters) for i in range(10)) >>> secure_password The first step is to import the secrets and the string modules. Then we create a string of uppercase letters and integers. Now, in order to choose characters randomly to generate a secure password, we need to use the secrets module’s choice() method. The reason it’s being called a secure password is because there’s been a use of mixed case, numbers and symbols in the password, which is highly advised to people to keep their passwords protected from hack attacks. How to Generate Tokens using secrets There is not one but several methods to generate tokens using the secrets module. Below are mentioned some examples to ease your learning on token generation using secrets. >>>: secrets.token_bytes() >>> secrets.token_bytes(8) >>> secrets.token_hex(16) >>> secrets.token_urlsafe(16) The token_bytes function here allows to return a random byte string containing nbytes number of bytes. A reasonable default could also be put into use when nbytes is None or not supplied. In the first example, there is no mention of number of bytes, hence Python itself choose a reasonable number there. The token-bytes function was used again, but this time with 8 bytes. The next function used was token_hex, to return a random text string, in hexadecimal. The token_urlsafe function is the last one used there, meant to return a random URL-safe text string. Base64 encoding was also used for text. Click here to unveil 7 Python libraries to use in 2017 How Many Bytes to Use for Tokens? You should have sufficient randomness for your tokens to secure them against brute-force attacks. It’s advised that at least 32 bytes (256 bits) of randomness should be used to protect tokens from security breaches. The Python developer community will see the secrets module as an important addition to Python 3.6. With secrets, Python 3.6 developers now have a reliable way to generate cryptographically strong tokens and passwords. What’s your view on addition of secrets to Python 3.6? Would you like to give the secrets module a try for generating tokens and passwords? Please share your views in the comment box below. Source 1: Source 2: https://docs.python.org  Why to Use HTML5 and CSS3 for Your Business? Why Do Developers Now Compare Vue.js to JavaScript... No comments yet Already Registered? Login Here Monday, 08 August 2022 development Salesforce CRM offshore software development business offshore software development company software application outsourcing C++ apps Cloud computing web java web development mobile app development Big Data Analytics cloud mobile app development company J2ee custom app development Big Data website project management IT developers javascript IT consulting and software development developer QA Offshore development India software development NodeJs Salesforce customization Automation Offshore development testing Web app development programming Software development and testing Evon Technologies Product Development Salesforce Cloud Services consultant Salesforce consulting Android development enterprise data QA and Testing MVP Development Progressive Web Apps digital marketing services Salesforce development Agile Development risk management digital marketing services india offshore Python Agile product Development iOS apps Social Media Marketing Salesforce Lightning EmployeeEngagement project management methodology mobile data security startups language business analysts Offshore software development services Joomla developers Salesforce cloud Salesforce CRM consulting software development outsourcing Salesforce Mobile Development business management project Scrum time tracking Blockchain Offshore development company Findnerd Project Manager marketing automation App Development Outsourcing QA services WordPress Collaboration Recreationalactivity India DevOps Web application Virtual reality Real time data accessibility GDPR MVP software Android app development outsourcing VR Apps Our Team •   CMMI - Level 3 •   ISO 27001 : 2013 •   ISO 9001 : 2015 Recent Tweets Evon Technologies Your calm mind is the ultimate weapon against your challenges. #MondayMorning #MondayMotivation #MondayBlues Evon Technologies Thank you so much @PriyankaJoshiB for Retweet. Get in Touch   +91 8266041801   +44 203 372 4609   +1 408 454 6110 follow us on
Positive Effects of Flowers on Well-Being Positive Effects of Flowers on Well-Being Flowers will have an immediate impact on happiness and can have long-term positive effects on humans’ moods overall. In a recent study, participants had reported feeling less depressed, anxious, and agitated after receiving flowers.  They also demonstrated a higher sense of enjoyment and life satisfaction.  Flowers will reduce stress.  So many individuals report that there are many sources of stress in today’s world, from money and medical problems to the never-ending to-do lists, a lot of people feel they are in a constant frenzy of stress. However, research done by the University of North Florida shows that anything simple like flowers has the ability to help. The people who had flowers in their homes for only a few days stated a substantial reduction in their stress and an improvement in their mood.  Greenery and flowers have been shown to have a profound fundamental impact on our health, reducing stress and in helping to find a greater peace of mind. Multiple studies have proven that flowers have healing effects on people who receive them as a gift or if they just have them in their homes. People who are surrounded by flowers appear to be less agitated, anxious, and depressed.  They also seem to have an increased life satisfaction overall. What are benefits of flowers? Specifically, here are some fantastic health benefits of flowers: 1. Flowers can help heal the common cold 2. Flowers can help improve mood 3. Flowers improve memory 4. Flowers aid relaxation 5. Flowers increase energy Scientific Studies Confirm Benefits of Flowers Not only do flowers harness the power to cheer someone up when they are feeling down, but they hold many other healing properties.  Properties such as helping to get a good nights’ sleep, boosts in creativity, increased productivity, helps make a tolerance to pain higher, boosts good health, and even improves the sometimes short attention span.  One particular scientific study conducted at Texas A&M University found that nature also holds a key secret to business success.  Its research demonstrated that workers’ idea generation, creative performance, and problem-solving skills improved substantially in workplace environments that included flowers and plants.  Similiarily, in classrooms with flowers and plants, students had an even bigger attendance span, showing more creativity, free-thinking skills, and plain overall satisfaction.  Although we have known this for some time now, studies found that patients in hospital rooms decorated with flowers and potted plants needed less postoperative pain medication, had lower systolic blood pressure and pulse rates, were less anxious and tired, and generally were in a more positive psychological state than patients in rooms without flowers.  How do flowers affect humans? If a home is filled with blooms of flowers and greenery, it will help to keep your mind distracted from the typical stressors of life. When placed in the bedroom, it will be of much benefit to wake up to a soothing, cheerful view each morning or to assist in getting a relaxing night of sleep.  For this purpose, experts suggest choosing flowers like Lavender, Jasmine, or Gardenia as their specific scents have a relaxing as well as a sedative power to help with sleep. Additionally, flowers help to create intimate connections as well as strengthen bonds with family and friends, in the long run resulting in a happier, more fulfilled life. Why are flowers therapeutic? Flower therapy is how flowers, greenery, and blooms nourish our souls and keep us feeling refreshed. While we understand that flower bouquets make excellent gifts for various occasions, they also stir up positive emotions in individuals and serve as great mood lifters. Flower Therapy, discovered around 1930 by an English physician named Edward Bach. Dr. Bach, a renowned immunologist and bacteriologist of his time, and said to be gifted with extraordinary intuition, began to realize that the patient’s emotional state was critical for recovery. So he developed a method of natural healing in which he used flowers of wild plants and trees to equilibrate and harmonize negative emotional states that human beings seem to always have lurking around; fear, loneliness, anguish, anxiety, depression, fault, etc. It is suggested that flower therapy stirs an awakening in us of positive emotions, encoded innately, to find the psycho-emotional balance necessary.  “Through its high vibration, certain flowers, wild shrubs, and trees of a higher order have the power to increase our human vibrations and let expedite our channels to messages from our higher, flood our personality with the virtues that we are needed and thus wash defects (character) causing our problems. As good music or other great things, able to inspire, Flowers are able to raise our personality and closer to our essence as human beings. In this way, we offer peace and free us from our sufferings. They do not cure the disease by directly targeting, but invading our entire body with the beautiful vibrations of our higher, disease whose presence the melted like snow in the sun. There is no real cure without a change in the orientation of life, without peace in the soul and the inner sense of happiness,” said Edward Bach in 1934. How do flowers give us positive energy? The plant emits oxygen and absorbs carbon dioxide and carbon monoxide. Therefore, it will work best if you place it in the north or northeast of your house.  In an atmosphere that can potentially be very depressing and hold a deep sense of hopelessness within the facility’s overall energy, it is imperative to find ways to lift the “spirits” of those living, working, and visiting these locations.  Assisted living establishment cofounder recognizes the importance and continuously makes a concerted effort to consistently have fresh flowers available daily.   “There’s a reason you’ll always see fresh flowers on my desk. Flowers express what Inspire Home Care is all about. And so many ways, they mirror the clients we are so privileged to serve. Each is one of a kind. Each is beautiful. Each is special. Their bodies may be fragile, but in countless ways every day, they show us the true meaning of dignity and strength,” said Lorine Beattie, Cofounder and Executive Director of Inspire Home Care in Michigan. Positivity Energy Plants • Snake Plant • Calatheas • Jade Plant • Golden Pothos • Peace Lily • Eucalyptus • Chinese Money Plant • Rosemary • Aloe Vera • Areca Palm • Sage • Orchid • Jasmine • Lucky Bamboo These positive energy plants will reduce negativity from your home and bring happiness and peace. According to Japanese research, touching plants have a calming effect. Apart from that, these indoor plants can purify the air and beautify your interior. Leave a Reply Your email address will not be published. Previous post How To Qualify For Home Health Care Next post Meal Kits on the Rise
A value is a location in computer memory that stores DATA. There are many kinds of values, including String, Number, Array, Date, ... Different kinds of values are called types. We will be focusing on the most common types in this course A number is what it sounds like -- any integer or decimal. A string is an object that's a collection of characters, like a word or a sentence. "Cherry Pie" A boolean is a value that is either true or false. (It's named after George Boole, a 19th-century mathematician who invented Boolean algebra.) Comments - Single Line When reading JavaScript code, if you ever see two slashes in a row, that means "everything after these slashes is a comment". 2 + 2 // makes four A comment is a message for humans. JavaScript ignores everything to the right of the slashes, so you can explain what the nearby code does, or why it does it. In these lessons, we often use comments to explain the result of executing the nearby code. In this case, we sometimes add an arrow to the comment: 2 + 2 //=> 4 3 + 5 // -> 8 Comments - Multi Line JavaScript also has multi-line comments via /* I am a comment */ They can be used to comment out a section within a line, or many lines let x = 42; This is a multiline console.log(x /* the value from earlier */); // => 42 Values can be combined or manipulated using operators, like... • PLUS (+) • TIMES (*) • MINUS (-) • POWER (**) • MODULUS (%) • EQUALS (=) • INCREMENT (++) • DECREMENT (--) • COMMA (,) • DOT (.) All JavaScript Operators An operator sends a message to the value • e.g. 1 + 2 sends the number 1 the message please add 2 to yourself. Dot is a special operator that sends arbitrary messages; we will learn more about her later. LAB: Number Games We can use numbers and operators together to do math Use the node program to the answers to the following • What does 42 x 42 x 42 equal? • What does 65536 divided by 1024 equal? • What is the remainder integer of 123456789 divided by 35? • A variable is a name for a value. • You give a value a name using the assignment operator • It looks like an equal sign but is not a comparison. • Often preceded by let as in "Let there be light" or "Let X equal 10". let color = "blue" let fruit = "berry" • Anywhere you would use a literal value, you can use a variable instead. color + fruit // "blueberry" 'black' + fruit // "blackberry" color = 'pink' color + fruit // "pinkberry" • This means you should pick helpful names LAB: Strings with Whitespace let fruit = 'pineapple' let food = 'smoothie' How could you use the above variables to get the following? pineapple smoothie ^^^ Note that there is a space between the strings ^^^ The Warehouse Metaphor Think of memory as a giant warehouse. Warehouse from Raiders of the Lost Ark Like this warehouse from the movie Raiders of the Lost Ark, computer memory is vast and filled with boxes of various sizes. The Warehouse Metaphor Explained If memory is a giant warehouse... ...and memory locations are boxes in that warehouse ...then a value is the contents of a box ...and a variable is a label you stick on the outside of the box Let there be confusion • let is just one way to declare a variable in JavaScript • var is a lot like let but has wider scope which is sometimes bad • const has similar scope to let but won't allow you to reasign the value • If you don't use either let, var, or const then the variable becomes global (which is dangerous) • Lesson: always use let or const unless you have a good reason not to Don't let me down Unfortunately, in JavaScript you can only use let once per variable name in a given scope, otherwise you will receive an error like this: Identifier 'x' has already been declared That means that when you're in the JavaScript console, if you see this error then try again without the let > let x = 1 > let x = x + 2 SyntaxError: Identifier 'x' has already been declared > x = x + 2 String Literals • "literal" means "exactly as it is written" • a string literal is a string whose characters are spelled out explicitly in your code • JavaScript string literals are surrounded with either: • single quotes (') • or double quotes (") • You can use the alternate quote within another, for example: "He said 'My dog has fleas.' yesterday" 'Vermonters have a hundred words for "snow".' String Escapes • some characters can't be typed literally, so you need to use string escapes • backslash (\) is the escape character in JavaScript strings • backslash means "the next character means something special" • for instance backslash-n (\n) means "newline" console.log("Roses are red,\nViolets are blue;\nCandy is sweet,\nAnd so are you.") String Messages A string understands lots of messages. Here are a few: "drive" + "way" 'Java' + "Script" "Bert's pal Ernie" + ' sings "Rubber Duckie"' "blueberry".replace("blue", "black") Try all of these out in node or the browser console! Check out MDN String docs for more. Slicing and Dicing Every string is made of lots of other strings. You can pull out parts of a string with the slice message. // this means "slice from character 0 to character 4" "blueberry".slice(0, 4) // this means "slice from character 4 to the end These start and end numbers are called indexes (or indices if you're feeling fancy). MDN: slice String Indexing Explained Humans like to start counting at 1, but computers like to start counting at 0. This can be confusing, so here's a visualization to help explain it. Think of the indexes as pointing at the spaces between characters, as in this diagram: | B | L | U | E | B | E | R | R | Y | 0 1 2 3 4 5 6 7 8 9 So with this picture in your mind, slice... • includes the character to the right of the start index • includes the character to the left of the end index... • ...but excludes the character to the right of the end index Try various start and end values in the console and see what happens! LAB: Cut the Cream How could you take the following string "banana cream pie" and assign a variable to "cream" ? // starting string let favoritePie = 'banana cream pie'; // variable to assign to "cream" let withExtra = favoritePie.slice(/* What goes here? */); • JavaScript has a built-in type called Number. • It represents decimal numbers, aka floating-point decimals. • JavaScript does not have a special type for integers, unlike most other languages. • The maximum safe Number is 2**53 - 1 MDN Docs for Number Order of operations Q: What is 1 plus 2 times 3? A: It depends! (1 + 2) * 3 == 9 1 + (2 * 3) == 7 Parentheses Are Free When in doubt, use parentheses! (or, when there's any doubt, make your assumptions explicit) LAB: one nation, divisible One number is divisible by another if you divide them and the remainder is 0. Write code in node to figure out if... • 100 is divisible by 5 • 100 is divisible by 8 • 330 is divisible by 11 • 337 is divisible by 7 Strings vs. Numbers 1 + 2 "1" + "2" "1 + 2" Strings plus Numbers Hmmm again... "1" + 2 Even though Strings and Numbers are different TYPES, JavaScript converts one to the other. But when two types meet, which one wins? Type Conversion The clearest answer is that you, the programmer, explicitly declare which type you want to win. Converting a Number to a String (12).toString() // "12" Converting a String to a Number There are many ways to convert a string to a number in JavaScript. The easiest and cleanest is unary +: expression value +"12" 12 +"012" 12 +"0.2" 0.2 +"cheese" NaN +"0" 0 +"" 0 +" " 0 (Other ways can give bizarre results if the string contains letters or begins with a 0.) Converting a String to a Numer - ParseInt There are two other common methods to convert strings to numbers which are shown below // Converts strings to integers parseInt("42") // => 42 // Converts strings to floating point numbers parseFloat("3.1418") // => 3.1418 Type Coercion If you don't explicitly do type conversion then JavaScript will "helpfully" convert the types for you. This is called type coercion and just like with people, coercion is stressful and often backfires. For instance, if you ask the user their age, and read it from a web form or keyboard input, it will be in a string. If you forget to explicitly convert that to a number before using it in a calculation, the results can be unexpected... > "30" - 1 // "30" is coerced into a number > "30" + 1 // 1 is coerced into a string (You Don't Know JS has way more information than you wanted to know on this subject.) Randomize it! Math.random is your way to make things unpredictable! Calling Math.random() returns a random decimal number between 0 and 1. If you want a random integer you can multiply that decimal by a range, like this: function randomInteger(min, max) { let range = max - min + 1; return min + Math.floor(Math.random() * range); console.log(randomInteger(1, 3)); • an object that contains other objects • It's a list of objects What makes an array an array • You can put any values inside it • In any order • They stay in order (unless you move them later) • Duplicates are fine Creating an array square brackets on their own mean "please go create an array now" and put these 3 other values inside it Array Indexes • Every slot in the array has a serial number • You can retrieve any item in an array by its INDEX • Square brackets after an array mean "the whatever-th item in this array" • The following code retrieves one fruit let fruits = ["apple", "banana", "cherry"]; ...but which fruit? See next slide! LAB: Array Indexes Exercise Try this in node: Did you get the result you expected? Why or why not? Start At Zero When counting, humans start at one, but computers start at zero. So the first item in an array is number zero, not number one. All arrays have a special property named length What do you think it does? fruits.length //=> 3 Question: How can you get the last item in an array... even if you don't know its index beforehand? The End Answer: Use the Array's length proprty within the indexing fruits[fruits.length - 1] After The End Try this: Did you get the result you expected? Why or why not? Undefined means 🤷 by returning undefined, the computer is answering the question "What is the 99th item?" with the answer "There is no 99th item."
In 1927, an American aviator Charles Lindbergh made history when he flew across the Atlantic Ocean in the “Spirit of St. Louis.” He lifted off from Roosevelt Field on Long Island on May 20 and landed again 33.5 hours later at Le Bourget Aerodrome outside Paris. The flight covered an astounding 3600 miles. Lindbergh encountered a number of problems during the long flight: icing, fog, and winds. The plane's enormous engine blocked his forward view. To navigate, he had to look out his side windows. He did not carry a radio or navigational equipment; so he had to manage his flight-plan by “dead reckoning.” Wikipedia's article on Lindbergh said he flew over the coast of Ireland barely five kilometres off-course. As Lindbergh started his descent into the aerodrome in France, 150,000 people were en route greet him. While airborne, he had seen the headlights of their cars. They dragged him from his plane and carried him on their shoulders around the airfield for half an hour. He became an international celebrity overnight. Many nations around the world sent him some kind of recognition for his achievement. The Congressional Gold Medal is the most eye-catching. None of this made him show much emotion. He received each honor studiously and unsmiling, as the hundreds of contemporary news-photos show. After the hoopla of his Transatlantic flight died down, he married Anne Morrow and retired to a rural estate in Hopewell, New Jersey, to raise a family. His life changed forever on March 1, 1932, when his son Charles Lindbergh, Jr., was kidnapped from his home in New Jersey and held for a $50,000 ransom. The parents raised the money and delivered it, as requested, but they never heard from the kidnapper again, and all trace of him and their baby vanished. Law enforcement officers and bank-employees had written down the serial number of the ransom bills, so that officers could trace them back to the kidnapper. On this point, the government gave them a fortuitous boost when it took the nation off the gold standard. It required all American citizens to turn in their gold coins and “Gold Certificates.” The Gold Certificates allowed the bearer to convert the bank-note into gold coin. In their place, the government issued new “Federal Reserve Notes.” I can remember my grandmother telling me that she did as the government asked and turned in her gold coins and certificates, but she also said that many of her friends kept their gold coins. They were suspicious of the Roosevelt administration's effort to get them off the gold standard. After all, Americans had used gold coinage since the late 18th century. Now, the government told them they could no longer use gold coins or even own them. They could only own gold bullion with a license for gold jewelry or medals. The government fixed the price of gold at $35 an ounce. At any rate, the conversion to Federal Reserve Notes made the kidnapper's ransom-money stand out. When the police started looking for him, they could just follow the money-trail—the gold certificates. He could hardly spend his ill-gotten gain without someone noticing. Each time he bought something with a gold certificate, the police closed in on him. Finally, a gas-station attendant waited on the kidnapper, who paid for his gas with a gold certificate. The attendant jotted down his license-plate number on the edge of a gold certificate, and the police tracked him through New York's Department of Motor Vehicles. Even fairly innocent Americans could get into trouble if they did not obey the decision of the government regarding gold. They may have known that the government kept the price of gold artificially low and saw gold as a more reliable source of value than the dollar. Foreign governments who demanded payment in gold for the dollars that they held. The savvy government leaders knew they wanted gold instead of dollars, especially at $35.00 an ounce. This went on for a deplorably long time. Market forces pushed the market price for gold higher than its official price. This incongruity led to a decline in America's gold reserve from 21,000 metric tons in 1957 to just over 8,000 tons in 1974, where it stands today. When the Congress finally relented, abolished the fixed-price approach, and allowed Americans again to own gold, its bidding price shot up. Today, private companies and individuals own thousands of tons of it. Released from price-controls, gold skyrocketed to its current $1821.00 an ounce. In a sense, we all honor the gold standard, every time we lust for Lindbergh's Medal or a $10 Liberty-head gold piece. Gold has value in itself as a durable asset and can serve as a kind of economic indicator, because it reflects consumer confidence. When investors sense a downturn in the economy, they buy gold as a hedge, because of its historical ability to store value; but it can only serve as an indicator if it trades freely—free of interference by the government. The gold standard means more as a private institution, if you think about it. Gold has a magisterial beauty that maintains an inherent value across the globe and all its people. Used frequently in religious art, it acts as a conduit to the divine. Men have lusted for it and killed for it at least since the time of the Pharaohs, according to archaeological evidence. No other substance on the planet excites us so. The Limits of Gold Currency in the US is printed and issued by the government. Nowadays, I really pay for things more often with a credit or debit card—a private intermediary, so to speak. Currency plays less and less of a role in our transactions. At least, people still call it “money,” and hardly anyone can look at a satchel full of loot and keep a straight face about it. The handsome, high-tech banknotes are works of art. Wealth, on the other hand, is a many-splendored thing, taking many forms. Perhaps 10% of the nation's wealth ever appears as cash. To understand the complexity of it, all you have to do is look at the accounting of a business. No one keeps a lot of cash around. Knowledgeable people sock it away in a myriad of forms other than cash—certificates, contracts, and other official-looking pieces of paper with gingerbread on them. Even ordinary business-letters can have legally-binding language that obligates someone to perform tasks, pay out monies, or else just to stay quiet, and don't make trouble. Even oral assent and handshakes can be legally-binding. Used skillfully, the handshakes and documents work like hydraulic fluid in a machine, greasing the gears of a vibrant economy and enabling forward-movement. Often, documents transition into other kinds of documents; one kind of business activity evolves into another. Everyone counts on unfettered interchangeability and mobility, despite the inherent risks of identifying the evolving documents in a legal situation. It all adds up to trust or obligation that business-people count on, to provide financial support. In some instances, the documents and actions evolve into an asset known as “venture-capital.” People pool their resources to launch a new product-line or business. It happens all the time, and God help us if the government puts the brakes on it! That goes for other forms of capitalism—research and development, plant expansion and re-tooling, or employee training. Everything costs money which, in one form or another—has to be available. Wealthy people sit around and wait for someone to come to them with a viable business concept. They meet, shake hands, and a pot of money awaits them if they succeed. We count on them to succeed. Gold still plays a part, but it's just another asset. When merchants trade in gold, it takes the form of contracts. They never actually see or touch the gold, and increasingly, they never see a paper-contract. A computer stores all of the pertinent information in an electronic file. All that stuff takes place on-line, now. August 04, 2022 The Stats on the NORC poll, June, 2022 A poll conducted in June of 2016 by NORC-AP asked American voters for their opinions about the upcoming Presidential Election, scheduled for November of that year. The results, published on the NORC website in August 2016 should not have surprised anyone, but I admit the data surprised me. NORC-AP reported that "Eighty percent of Americans say the country is greatly divided when it comes to the most important values, and 85 percent say the United States is increasingly divided by politics." August 03, 2022 The Malaise of Being White, part I During college, we listened to Cheech and Chong's hilarious skit about "Dave" and "Man" doing a drug-deal late at night. Dave knocks on Man's door, and says, "Hey, Man, I got the stuff, let me in." From inside, Man calls out, "Who is it?" Dave repeats, "Man, it's Dave. Let me in. I got the stuff." After a long pause, Man replies, "Dave's not here." Dave yells to him, "Man, I'm Dave! Let me in!" "Who?" "It's Dave, Man! Let me in!" "Dave's not here." August 02, 2022 The Malaise of Being White, part II My Facebook correspondents rail a lot about narcissists and nacissism, and post trendy precepts by people like Maria Consiglio. That narcissism attracts so much attention and gets so many pithy put-downs suggests that the correspondents are clutching at straws after a failed fourth or fifth romance, and want to give up on it altogether. Narcissism has become the FB bête noire, since it evolved into a channel for the lovelorn; but the lovelorn need more input before they give up. Lloyd Bowers Facebook twitter Favorites google
Sign In GSH for Life Coordinated Radiation And Injection Attacks   - 1:28:52 Coordinated radiation and injection attacks against BC rural population: Genocide Klanmother Nurse Karen MacDonald WATCH LIVESTREAM ON FACEBOOK WATCH LIVESTREAM ON YOU TUBE WATCH LIVESTREAM ON TWITTER Share on TwitterShare on Twitter Uploaded half a year ago   December 3rd 2021   File Size: 181 MB Category: Health And Wellness 1 Comment - half a year ago   Heres Some new info Doctor Pablo Campra, studied the vaccines for the presence of graphene oxide. Using micro-ram spectrocopy. Which studies the frequencies. There are two of the frequency bands that are most important. They show that it is not graphene oxide but rather graphene hydroxide. It is a mono layer activated carbon. There are C6 rings found in all samples. Every corner is a carbon atom that is on a nano scale. If it is 50nm long there are 500 rings in a row. These are hydroxy groups. In graphene oxide you have double bonded oxygen. In graphene hydroxide you have an OH group. with which, electrons are delocalized, making them fully mobile. Now the piece may be 50nm long, But it will only be 0.1 nm thin and sharp just like a razor blade. These C6 structures are extremely stable; you could make brake pads out of this. Another bad attribute, its not biologically decomposable. It doesn't naturally dissolve. These nanoscale structures can best be described as razor blades. These razor blades are injected into the body. If it hits a vein. You will be cut up from the inside. These OH groups are wide, tall and very thin. One atom thick. These OH groups can split off of a proton. When the proton is split off, they gain a negative charge spread out over its whole system. It suspends well in water because of the negative charge. These razor blades are spread homogeneously in the liquid. Our blood vessels wall is lined by an exceedingly thin single sheet of endothelial cells, the endothelium, separated from the surrounding outer layers by a basal lamina. The endothelial cell liners are also extremely smooth which helps the blood to flow smoother. Imagine a 5 gallon bucket of water that has 5 million tiny razor blades mixed in it. That you pump through a 20 ft garden hose. Can you imagine the damage? That is another reason the vaccines are so dangerous. Toxicologists can't imagine there are structures that can cut up blood vessels from the inside out. When the toxicologists do their testing. They do them in petri dishes. Where the sample is motionless. Similar to having a razor blade just sitting on the table, nothing gets cut. Exactly like the toxicologists test. With their sample sitting there motionless in the petri dish. These structures have to be in motion to do damage. Like flowing through blood. If you do an autopsy on any of the victims you will not find anything. These are the sharpest imaginable structures because of how thin they are. These are huge molecules that are super thin which makes them very sharp. People are bleeding to death from the inside out. Especially the top athletes due to their fast flowing blood. The Doctor that discovered this did his doctoral thesis on turning graphene oxide into graphene hydroxide. He was hired directly from school for a very high position, placed in charge of new activated carbon products across all of Europe. We know if a chemist were to inject this stuff into somebody's blood they would be considered a murderer. This is a new material that toxicologists are not aware of yet.
Internal communication in companies – communicating appropriately in everyday management life Internal communication in companies – communicating appropriately in everyday management life Communication is one of the most important requirements for managers. With good communication and close contact with employees, a positive working environment can be created and maintained. But what does it all come down to? Find out in this article. Distinction between internal / external communication in companies Internal communication is an ongoing activity that takes place (at least to a greater extent) in every company. Its purpose is to disseminate information within the organisation on the one hand and to provide training for specific processes on the other. External communication or corporate public relations aims to disseminate information about companies concerning their latest activities, products or services in order to promote them and protect the image that consumers should associate with them. Both types of communication have common elements but pursue different goals so that both can serve their purpose perfectly. A mistake often made by some organizations is the false distinction between internal and external communication in the sense of how each is handled. For example, most companies deal with a crisis situation that affects both their reputation and image by not communicating effectively internally with their employees, but relying mainly on traditional media such as newspapers or television for external communication. An effective external response usually has a positive impact on internal communications (e.g. if the company is able to resolve the issue quickly), but it is also true that an unsuccessful resolution that leads to further disasters can cause serious damage within the company itself: ill-informed employees give out misleading information, negative attitudes are created among employees who may then seek other employment opportunities, and finally, high-cost damages directly impact shareholders. Internal and external communication accompany each other Internal communications must be considered when implementing a corporate public relations strategy as one of the factors that can help or hurt such a plan. With this in mind, it is advisable to establish an internal information committee based on specific activities (e.g. employee newsletter, website, etc.) that facilitate both the achievement of goals and the building of a positive attitude towards corporate messages in employee communications. Internal communication in general is the process of information transfer for everyday communication flow and information exchange between individuals. This includes employees, management, shareholders, board members. It also includes all factors that influence the behaviour or thinking or decisions of others (e.g. leadership). External communication is the message directed outside the boundaries of the organization to people who are not part of it (customers; suppliers; business partners; government agencies). Internal communication has two main functions Internal communication has two main functions The main functions of internal communication can be divided into two categories. The informational and motivational function. First, the informational function involves providing information about the activities, products/services, policies and procedures, etc. that enable members to effectively perform their duties. Second: The motivational function This looks at how the flow of information can assist in creating the tools to promote positive motivation within the company. This includes, for example, coaching of managers, incentive extension for employees and “internal branding”, branding with storytelling and messages of individual projects and project participants, events and further training. What is effective communication in business? We’ve all been there: we get a task, a project, or leave a meeting and have no idea what to do next. Unfortunately, this happens quite often. According to statistical surveys, 57 percent of employees say they often don’t receive clear instructions, and 69 percent of managers feel overwhelmed when communicating with employees. These figures show: Communication in the workplace needs to be improved in most cases. Basically, communication in the workplace is about exchanging information and ideas within a company in the most targeted way possible. However, this is only really effective if a message is formulated precisely by the sender. Only then can it be received one-to-one by the recipient. At least that is how communication theory puts it. Why is optimal communication in companies so important? Optimal and effective communication in companies is important for the following reasons: – It avoids confusion – It sets a clear objective – It builds a positive corporate culture – It delegates tasks and projects. How can communication in companies be optimised? If companies notice an increase in misunderstandings within the workforce, for example because employees often do not know which tasks and projects they have been assigned to, then they should ask themselves: Where is the communication bottleneck? Most of the time, improving communication in companies has to start at the top of a team – the team leader. After all, it is often the communication skills of a line manager that distinguish a well-performing team from a poorly performing team. While managers usually achieve excellent business results with their colleagues in the first case, managers with poor communication usually lag behind their targets in the second case: they are unable to communicate to their employees what they need to do in order to successfully manage their projects and achieve the common goals. Consequently, everyone works quietly away – in the hope that what they are doing will somehow fit. Important communication skills for managers What communication skills should team leaders have? Here are the main ones: – Verbal expression – listening – Written communication – Deliver speeches in the great plenary. Effective communication strategies that leaders use on the job The good news is that effective communication in companies can be trained and learned. Here are a few tips that managers can use to achieve initial success in direct communication with their employees after only a short time: Questions avoid misunderstandings Encourage your employees to ask questions or voice their opinions. In this way, potential misunderstandings can be eliminated from the outset. Praise works wonders Tell your employees what they are doing right and well: Get into the habit of giving positive feedback on a regular basis. Don’t accept all that is going well without a word. This will give your colleagues an extreme boost of motivation. You’ll see! Regular feedback is essential Also, give regular feedback on tasks and projects that is as specific as possible: Give your colleagues an accurate assessment of what they do best and give constructive tips on what they could still improve. Early warning system Check-in talks Schedule regular check-in meetings: meet with your employees for a morning check-in meeting. In a few minutes, clarify the tasks of the day and their importance. Are there challenges that a colleague needs help with? Then the daily check-in is the perfect time to voice this. In this way, problems can be avoided from the outset, before they arise. Team building: experiencing colleagues differently Also organize engaging external team building activities to improve communication within your team, prevent misunderstandings and ensure knowledge transfer. The advantage of teambuilding measures: Colleagues experience a completely different side of themselves and get to know each other better outside the company. In addition, shared experiences always create points that stimulate a common exchange. This creates closeness, which is also very beneficial for communication in companies. The communication plan as a basis for internal communication The communication plan is a central document that structures internal communication and fills it with life. It gives concrete instructions to all employees and is the basis for internal communication. This makes internal communication more efficient. In the following article we explain what you should consider when creating an internal communication plan. Internal communication is a necessary part of any business and while there are many things that need to be planned in detail (e.g. which channels should I use?), There are some basics that need to be covered first. The foundation of all good cross-company communication and communication planning starts with having a clear goal in mind before executing communication processes and channels – something that is often forgotten amidst all the other daily tasks. It is also important to think internally about the information flow of the communication plan and to pay close attention to the interlocutors in external communication: Who should be included in the communication? Which message do you want to convey via which information channels? How does it affect other people if they are not included or excluded in certain conversations? How can you ensure that everyone has an open space for news, feedback and the exchange of ideas without being too disruptive – because that could cause unnecessary tension and, above all, jeopardise cross-departmental processes? These are the kinds of questions that need to be answered before you even begin to consider what channels might yield results! The next step would then be to set specific goals by defining concretely what success looks like – how does interdepartmental communication work? We believe that every company needs such a communication plan in the sense of a communication platform, which can be fulfilled in just a few steps! The plan is important not only for inter-company communication, but also for inter-team and intra-team communication. As I said, it helps to structure all internal processes in all areas by giving employees concrete instructions on what they have to work on and what they have to do – making it easier for everyone involved. How do I create a communication plan? The creation of a communication plan is not a major project and only requires some know how and some project management after you are aware of the following contents: 1. the objective 2. the target group 3. the audience 4. the context 5. the choice of media and tools according to the context and the target group 6. the time frame for communication according to the context, the target group, the media choices and the objective of the plan according to point 1) to 5) Examples of employee communication projects can be found here, for example: How do I create a communication matrix? The Communication Matrix provides you with a visual display / representation of your organization’s culture. It also helps you name things and clarify definitions so that employees can easily understand what is being done, why it is being done, and how they can help make things happen. Using the communication matrix, you can easily identify your company’s team culture. If you ask your employees what’s important to them, you may get answers like pay, work-life balance, career growth, and learning new things. If everyone says the same thing, you have a homogeneous group of employees who are interested in similar things (e.g. monetary compensation). The communication matrix helps teams identify which departments are affected when certain decisions are made (e.g., if we don’t pay our employees well or allow them time for family obligations, their performance may suffer). It also clarifies how communication occurs within an organization and highlights where additional discussions could take place that could lead to improved performance, productivity and engagement. Simple communication matrix Start by making three lists on the right side of the paper. List the departments that report to you in one column. Then, in another column, list what is important to team members. Finally, in another column, write down how each department shares information with other teams (e.g., next to Marketing, write “Publishing”; next to Manufacturing, write “Sales”). This third column helps you identify where there are gaps or issues within the organization that could impact performance, quality, resources, productivity, and employee collaboration and innovation. What is the best way to acquire the skills to manage internal communications? Established or aspiring managers can acquire the communication skills mentioned above on their own, or through professional support within a professional management training on communication. The last one is recommended. After all, thoroughly professional communication is a central success factor for managers. Especially in the digital age, in which the speed of change in companies is extremely high and a lot has to be communicated. As a manager, for example, you will repeatedly take on the role of a facilitator and clarify with your team how an existing challenge can be solved. They also act as a motivator, leading their team to their goal through professional reasoning and appreciative communication. Such a thing can hardly be learned on one’s own. Instead, train in a precisely designed management training practical methods to communicate effectively in your leadership role and constructively involve their employees and thus achieve common goals optimally. You have little time? Then online training in communication is definitely recommended for you. Virtual learning has decisive advantages: you can learn whenever you want and wherever you want. Use the various learning opportunities: webinars, joint learning in a virtual classroom, online coaching or video tutorials and quizzes, with which the learned content can be deepened in a playful way. You will become a communication professional in no time. The communication plan usually directly increases employee motivation and is the first point of contact for further information to provide your employees with optimal employee communication across all communication processes and channels using modern tools. Leave your thought here Your email address will not be published.
When was The Skeleton Dance cartoon made? When was The Skeleton Dance cartoon made? The Skeleton Dance is a 1929 Silly Symphony animated short subject produced and directed by Walt Disney and animated by Ub Iwerks. In the film, four human skeletons dance and make music around a spooky graveyard—a modern film example of medieval European “danse macabre” imagery. Where can I watch The Skeleton Dance? When the clock strikes midnight, four skeletons come out to dance. Streaming on Roku. The Skeleton Dance, a comedy movie starring is available to stream now. Watch it on on your Roku device. What Disney movie is banned in Denmark? DANES BAN ‘MICKEY MOUSE’; Censor Calls the Film Creation of Disney Too Macabre. Wireless to THE NEW YORK TIMES. What does dancing skeletons mean? Noun. 1. danse macabre – a medieval dance in which a skeleton representing death leads a procession of others to the grave. What movie is Spooky Scary Skeletons from? Spooky Scary Skeletons is a 1996 Halloween song by Andrew Gold. It is the most well known of the songs from Gold’s album Halloween Howls….Spooky Scary Skeletons. “Spooky Scary Skeletons” Song by Andrew Gold Songwriter(s) Andrew Gold Producer(s) Andrew Gold Who drew the dancing skeleton? ‘Dancing Skeletons’, Edward Burra, 1934 | Tate. Is Skeleton dance on Disney plus? Some of the missing Silly Symphonies include “The Skeleton Dance”, “El Terrible Toreador”, “Springtime”, “Hell’s Bells”, and “The Merry Dwarfs”. As previously mentioned, dozens of Silly Symphonies are available on home media but aren’t on Disney+. When was the first Skeleton Dance released? The Skeleton Dance, released in 1929, was the first in Walt Disney and Carl Stalling’s Silly Symphonies series. What Disney movies has the Skeleton Dance been in? The Skeleton Dance makes an appearance in Epic Mickey 2: The Power of Two as one of the projector transition levels. Footage from this short was used in the Disney Sing Along Songs volume Happy Haunting: Party at Disneyland for the song “Spooky Scary Skeletons”. Part of the animation appeared in the 2007 film Ghost Rider. How long is the short Skeleton Dance? The short, only about five and a half minutes, consists mainly of a skeleton dance, hence the title, that is very well choreographed to conveniently macabre music. The music was very creepy and atmospheric, and added to the appeal of Skeleton Dance. What is the error code for the Skeleton Dance? Sorry, the video player failed to load. (Error Code: 100013) Do you like this video? The Skeleton Dance is a featured article, which means it has been identified as one of the best articles produced by the Disney Wiki community. If you see a way this page can be updated or improved without compromising previous work, please feel free to contribute.
You are here CHK2 Involved in DNA Damage Response in Oocytes In a paper published in Science, John Schimenti, Ph.D., and colleagues from Cornell University show that DNA damage during meiosis triggers CHK2, which activates both p53 and p63, thereby inducing apoptosis.  Double strand breaks (DSBs) are a normal part of meiosis in oogenesis.  Checkpoints in the cell cycle sense the presence of DSBs or other DNA damage, and if the damage is not repaired, induce apoptosis to eliminate defective cells.  While the checkpoint pathways in mitotic cells are well-characterized, the mechanisms sensing DNA damage in meiotic cells are not.  Using a number of knockout mouse lines, Dr. Schimenti’s group now report that CHK2 is a component of the DSB-sensing checkpoint in both developing oocytes and the "resting" pool of oocytes in adults.  Inactivation of the Chk2 gene allowed rescue of oocytes otherwise destined for apoptosis due to unrepaired DSBs.  Remarkably, these oocytes appeared fully functional, with the ability to produce healthy offspring lacking evidence of DSBs.  This implies that if the oocytes can get past the initial checkpoint, eventually the DSBs are repaired.  Further elucidation of the DNA damage response indicates that rather than the canonical activation of CHK2 by ATM, during meiosis in oocytes CHK2 is activated by ATR.  Chemotherapy and radiation treatments for cancer cause DNA mutations and can cause premature ovarian failure in women.  These results provide a ray of hope for such patients, as chemical inhibitors of CHK2 might rescue the ovarian failure. Bolcun-Filas E, Rinaldi VD, White ME, Schimenti JC. Reversal of female infertility by Chk2 ablation reveals the oocyte DNA damage checkpoint pathway. Science. 2014 Jan 31;343(6170):533-6.
Glutamine is a vital amino acid that serves numerous activities in the body. It is a protein-building block and an important component of the immune system. Furthermore, glutamine plays an important role in intestinal health. This amino acid is produced naturally by your body and can also be found in various foods. However, you may be confused about whether you require more glutamine from supplements for optimal health. The amino acid glutamine is the most plentiful in human bodies. It helps to support a variety of healthful functions, including: • Protein synthesis for muscular tissue • Providing energy to cells that protect our intestines • Immune system cell support • Assisting in the detoxification of foreign toxins from the liver • Your body produces glutamine, but we can get it from wheat, peanuts, corn, and milk. Deficiency is extremely rare and is caused by a hereditary condition rather than a lack of intake. ImageCredit: tryabouttime However, evidence suggests that taking glutamine supplements may have some health benefits. Experts continue to investigate the amino acid’s ability to prevent or treat certain illnesses. What Exactly Is Glutamine? Glutamine is a kind of vital amino acid. Amino acids are chemicals that have numerous functions in the body. Their primary function is to act as protein-building components. Proteins are essential for organ function. They also transport molecules in the blood and fight off dangerous viruses and germs. Like many other amino acids, it is available in two forms: L-glutamine and D-glutamine. Except for a minor change in a molecular organization, they are almost identical. Some supplements and medicines call it L-glutamine, while others just call it glutamine. The Amazing Glutamine Benefits Glutamine capsules ImageCredit: prozis While our bodies produce the glutamine we need to operate, we may require extra when stressed due to injury or disease. Many clinical studies have shown that glutamine helps alleviate the side effects of cancer treatments such as muscular atrophy, mouth inflammation, nausea, vomiting, and diarrhea. Supplementation has also been associated with shorter hospital stays and lower rates of mortality in unwell patients. These conclusions are reinforced by research on the health impacts of glutamine, which includes: 1. Immune System Aid Glutamine is the principal energy source for lymphocytes, which are white blood cells that fight infection and sickness in the body. However, when we are sick or injured, our blood glutamine levels drop, decreasing the ability of these immune cells to defend our bodies. While there is contradictory evidence on whether it increases immunity in healthy people, studies show that it can enhance recovery times and prevent problems when you are sick. 2. Intestinal Health Regulation The immune system support provided by glutamine is intimately tied to its activity in our intestines. The amino acid aids in the maintenance of your intestinal lining, ensuring that your body absorbs the nutrients it requires, so maintaining good health and protecting against major diseases such as leaky gut syndrome. Because our stomach is the greatest organ in our immune system, some experts believe glutamine may help immunity. There is evidence that glutamine supplementation may aid persons with gastrointestinal diseases such as Crohn’s disease, celiac disease, and gut inflammation. 3. Help with Muscle Recovery Glutamine is required for muscle protein maintenance. It first gained fame as a muscle-building and fat-burning supplement. Scientists are still investigating these claims. While studies have yet to establish any muscle-building effects, they may reduce fatigue and improve exercise recovery. According to research, athletes who supplemented with glutamine experienced decreased muscular discomfort and strength loss. It may also prevent muscle damage and improve workout performance, but research into these effects is ongoing. 4. Inconspicuous Necessity for L-Glutamine Because glutamine accounts for the lion’s share of the muscle amino pool, it is required to repair and rebuild the muscle in particularly significant quantities. What happens is that as we use our muscles more in our daily activities, they become injured. Muscle growth is hampered when muscle protein synthesis falls short of muscle protein degradation. Also Read, Take your Muscles to the Next level with BCAAs The Side effects of Glutamine Because glutamine is produced by our bodies and is found in many foods, it is deemed safe at moderate levels. However, there are a few potential side effects, so consult and discuss with your doctor before incorporating glutamine into your diet. Before using glutamine, you should be aware of the following potential risks: Glutamine benefits ImageCredit: yamamotonutrition Long-Term Supplementation Over time, a high consumption may alter how our systems transport and utilize amino acids, including glutamine. This change’s long-term impact is uncertain, although it may increase the chance of health problems. Risky Side Effects While uncommon, high levels of glutamine might result in some side effects that necessitate medical care, such as blood in the urine, changes in skin color, lower back pain, fast heartbeat, dizziness, or rash. Mild Adverse Reactions Adding a glutamine supplement to your diet may result in some minor negative effects. Coughing and abnormalities in bowel movements are the most prevalent side effects. Begin with minimal dosages to allow your body to acclimate to the supplement, but consult your doctor if the discomfort is severe or persistent, as you may have an allergy. Dosage and Amounts The amount and frequency with which you take glutamine are determined by the purpose you are taking it. Clinical trials typically employ doses ranging from 5 to 45 grams per day for up to six weeks with no significant side effects. Researchers estimate that we ingest 3 to 6 grams each day in our diet. Because the long-term effects of high glutamine intake are strange, supplement your diet with small amounts as directed by the product’s instructions. But first, consult with your doctor to ensure that it is safe for your health.
IOSH Working Safely course is designed to improve the safety culture within an organisation and provide employees with an understanding of how their actions contribute to safety, health and well-being, as well as their individual safety responsibilities in keeping themselves and others safe at work. Benefits of Achieving the IOSH Working Safely Certificate • Enables delegates to define hazards and risks • Enables delegates to identify common hazards  • Improves an organisations overall safety performance IOSH Working Safely aims to: • provide learners with an understanding of how their actions in the workplace contribute to safety and health • ensure that learners clearly understand their safety and health responsibilities The course has 4 units of study: 1. Introducing working safely 2. Defining hazard and risk 3. Identifying common hazards 4. Improving safety performance Class training is conducted in a day including assessment. IOSH Working Safely is assessed by a short multiple choice exam and hazard spotting exercise at the end of the course.  If you are studying Online your assessment is online. Back to top
4 Different Types of Bad Posture There are many signs of bad posture that we don’t even realize are exactly that. Rounded shoulders. A potbelly. Bent knees when standing or walking. A head that leads forward or backward. Back pain. Body aches and pains. Muscle fatigue. Headaches and migraines. Bad posture can cause all these things. It is important to correct or address the underlying cause of bad posture before doing anything else. Those must be adjusted if you have bad habits when standing, sitting, or lying down. This may involve buying a new chair or office desk, purchasing a new mattress, and modifying how you work at a computer or look at your smartphone. It may also involve doing physical therapy or wearing a brace, depending on the underlying condition and what’s happening symptomatically from the poor posture. Though it can take practice and be mindful, it is possible to correct bad posture and take away those aches and pains in the body. If you aren’t sure whether your posture is healthy, you can consult a chiropractor or try to identify the issues for yourself. Let’s learn about the four different types of bad posture: Type #1: Kyphosis Kyphosis is a forward rounding of the upper back. Unlike the natural curve in your upper back, typically somewhere between 20-50 degrees, kyphosis is when there are more than 50 degrees of excessive curvature. It’s akin to a slight hunchback and makes it appear as if the person is slouching. Kyphosis is most common in older women but can be seen at any age and gender. This type of bad posture happens as bones in the spine weaken from osteoporosis and start to crack or compress. You may also see kyphosis develop from spinal disc degeneration, diseases such as polio, as a by-product of chemotherapy or radiation in treating cancer, or from an infection. Type #2: Flat Back A flat back takes the spine’s natural ‘S’ curve and flattens it. Flatback syndrome means an imbalance in the spine, and the person leans forward in response. If you have trouble standing up straight or are experiencing back and leg pain, it could relate to a flat back. Possible causes of flat back relate to changes in the spine originating from degenerative disc disease, compression fractures, and ankylosing spondylitis. As with other types of bad posture, it takes time to resolve the posture issue and may require physical therapy or braces to re-establish alignment. Type #3: Swayback Swayback is when the natural curve in the spine is exaggerated by posture. When swayback occurs, you will notice the spine curving inward at the lower back and neck, typically resulting in back pain, discomfort, and difficulty moving. When you suffer from swayback, you often see the stomach, the buttocks, the head tilting forward, and the shoulders sitting further back. This type of bad posture puts undue stress on the lower back causing it to work harder. Swayback is caused by several things and often relates to osteoporosis, kyphosis, obesity, pregnancy, high heels, and stomach sleeping. Type #4: Forward Head Forward head posture is very common today. The head extends out past the shoulders. This is caused by repeated actions such as being constantly hunched over their smartphone or at a computer all day. Some people may better refer to the forward head as ‘tech neck. This bad posture type leads to tension and stiffness in the neck, shoulders, back, and even pain. Once the head goes forward, the shoulders and neck tend to follow. The head is 10-12 pounds, sometimes more, and causes the body to lean when it’s jotted forward. The result is a hunch from the stress on the neck, shoulders, back, and spine. Why Bad Posture Is Bad for Health Bad posture is very common. A person may exhibit bad posture for many reasons. It may make them feel comfortable in some way, compensate for discomfort or an injury, or adapt to the seating or environment that one is in. Regardless of why, bad posture is a problem that leads to muscle and joint strain, wears on the body. Bad posture also leads to pain in the neck, head, and back, and increases the risk of injury during exercise, work, and other activities. In correcting bad posture, one has to align the spine where the muscle groups, joints, and ligaments are aligned in a minimally-stressful way. What Does Good Posture Look Like? A good healthy posture keeps your body aligned. When standing, the ears should be lined up with the shoulders, the shoulders lined over the hips, and the hips over the ankles. When sitting, ideally, this looks like two flat feet on the ground, upright shoulders, and even weight distribution across the hips. By practicing good posture and proper spine alignment, you avoid putting unnecessary stress on other parts of the body and causing the sorts of aches and pains that could lead to serious pain health consequences.
Sugar-Based Polymer Packaging Material that can be Composted Food packaging and other disposable plastic items could soon be composted at home along with organic waste thanks to a new sugar-based polymer. The degradable polymer is made from sugars known as lignocellulosic biomass, which come from non-food crops such as fast-growing trees and grasses, or renewable biomass from agricultural or food waste. It is being developed at Imperial College London by a team of Engineering and Physical Sciences Research Council scientists led by Dr Charlotte Williams. The search for greener plastics, especially for single use items such as food packaging, is the subject of significant research worldwide. "It's spurred on not only from an environmental perspective, but also for economic and supply reasons," explains Dr Williams. Around 7% of worldwide oil and gas resources are consumed in plastics manufacture, with worldwide production exceeding 150 million tons per year. Almost 99% of plastics are formed from fossil fuels. "Our key breakthrough was in finding a way of using a non-food crop to form a polymer, as there are ethical issues around using food sources in this way," said Williams. Current biorenewable* plastics use crops such as corn or sugar beet. "For the plastic to be useful it had to be manufactured in large volumes, which was technically challenging. It took three-and-a-half years for us to hit a yield of around 80% in a low energy, low water use process," explains Dr Williams. In contrast, the oxygen-rich sugars in the new polymer allow it to absorb water and degrade to harmless products - meaning it can be tossed on the home compost heap and used to feed the garden. Because the new polymer can be made from cheap materials or waste products it also stacks up economically compared to petrochemical-based plastics. The polymer has a wide range of properties, laying the field open for a larger number of applications other than biorenewable plastic packaging. Its degradable properties make it ideal for specialised medical applications such tissue regeneration, stitches and drug delivery. The polymer has been shown to be non-toxic to cells and decomposes in the body creating harmless by-products. The team - including commercial partner BioCeramic Therapeutics, which was set up by Professor Molly Stevens and colleagues at Imperial - are investigating ways of using the material as artificial scaffolds for tissue regeneration. They are also focusing on exploiting the degradable properties of the material to release drugs into the body in a controlled way. Now the team is focused on developing the specific material characteristics needed for the packaging and medical areas. "The development of the material is very promising and I'm optimistic that the technology could be in use within two to five years," says Williams, who is already working with a number of commercial partners and is keen to engage others interested in the material. Tell Us What You Think Leave your feedback Your comment type
Statutory obligation to vote There is no statutory obligation to vote in the Federal Republic of Germany in contrast to other countries such as Belgium, Greece Luxembourg and Cyprus. There, a citizen will for instance be fined if he or she abstains from voting without a sufficient reason. According to the German concept, a statutory obligation to vote would contradict the freedom to vote. It goes without saying that there is a certain moral obligation to participate in elections (“The right to vote is an obligation to vote“). Last update: 1 December 2015
Addiction Treatment: How Counselling Helps with Addiction Posted November 11, 2021 by Cristina Vrech Cristina Vrech Cristina Vrech Founder and Director - Individual & Couple Therapist, Corporate Services Cristina Vrech can help with... Addiction is a biopsychosocial condition that causes a person to compulsively pursue rewarding substances or behaviours regardless of their adverse effects. Addiction can be seen as an attempt to solve a life problem, usually one involving emotional pain or stress. “The attempt to escape from pain, is what creates more pain.”  ― Gabor Maté Substances and addictive behaviors such as excessive eating or gambling stimulate the reward centers in the brain’s limbic system. These centers are in charge of our mood, attention, and emotional responses.  When you take drugs or engage in behavioral addictions, your brain’s reward system produces large amounts of dopamine. This neurotransmitter provokes feelings of pleasure and satisfaction known as “feeling high.”  Such feelings are at the core of psychological dependence, which makes quitting substance abuse or behavioral addiction so difficult.  Continuous substance use disrupts the brain’s communication pathways, altering brain chemistry and causing the brain to crave the substance regardless of its negative consequences. “Not why the addiction but why the pain.”  ― Gabor Maté If your addiction gives you a sense of comfort, what is your relationship with discomfort? If your addiction gives you a sense of control, why do feel disempowered, lacking control in your life?  While you might feel in control of how much or how often you use a substance, your drug tolerance will increase over time. So, you will need more substances to achieve the same effect, turning the initial feeling of “high” into a risk of dependence and addiction. Addiction Treatment: How Counselling Helps with Addiction Addiction Treatment: How Counselling Helps with Addiction The Types of Addiction ― Gabor Maté The most common substance addictions involve: • Alcohol • Drugs • Painkillers • Sedatives and mood-regulating drugs Behavioral Addictions: • Eating • Shopping • Gambling • Exercising • Internet surfing • Social Medias • Gaming • Sex • Work Sometimes a person trades one addiction for another. For example, in substance abuse recovery, withdrawal causes a drop in dopamine level, limiting one’s ability to experience satisfaction and happiness. To cope with side effects of withdrawal and achieve the feelings of joy and excitement, the person replaces their original addictive behavior with another addiction.  What is the Impact of the COVID-19 Pandemic on Addiction? Research shows that stress related to the ongoing COVID-19 pandemic has significantly increased substance use, anxiety, depression, and suicidal thoughts. Moreover, according to the Centers for Disease Control and Prevention, stress, smoking and substance abuse are classified as underlying conditions linked with a higher risk of severe COVID-19 complications.  The coronavirus pandemic presents a challenge for people struggling with addiction in both ways: increasing the risk of substance use and addiction and increasing the risk of poor COVID-19 outcomes. Also, people in substance use treatment face other unique challenges related to the pandemic. For example, physical distancing and quarantine, limited access to mental health services, and social support (peer-support groups, family, and friends) can increase relapse risk.  However, online support groups, online counselling, and telehealth have expanded during the pandemic, helping people in recovery.  The Role of Counseling in Treating Addiction Addiction Treatment: How Counselling Helps with Addiction Addiction Treatment: How Counselling Helps with Addiction Addiction often has profoundly adverse effects on a person’s mental and physical health, relationships, work, and overall well-being. Healing from addiction is a complex and lasting process that could also involve outpatient or inpatient rehab treatment. Addiction is much more than a physical dependence on substances. Addiction serves to fulfill an emotional need, not the need for a particular substance or behavior. So, even after rehab, you may be at risk of relapse. Some factors that can cause you to go back to addictive behavior involve:  • stress • mental health problems • social connections with people who still use substances • relationship problems Therefore, counselling plays a significant role in addiction rehab and recovery. It can help you overcome cravings and increase resilience, so you can cope with life challenges without reaching for substances or addictive behaviors.  Counseling in addiction treatment aims to help you work on the roots of your problems or the main reasons you reach for substances and addictive behaviors. Also, counseling for addiction aims to help you: • stop the addictive behavior  • acquire a set of tools for a healthy, sober life • achieve a long-term recovery • live a fulfilled life Various talk therapies treat substance abuse and addiction. No method has been proven to be more effective than another, as psychotherapy needs to be tailored to a person’s addiction and individual needs.  However, the most common counseling treatment choices for addiction involve: • Cognitive-behavioral therapy (CBT) • Family and couples therapy • Dialectical behavior therapy (DBT) • Contingency management therapy  • Twelve-steps programs (the Alcoholics Anonymous)  Individual vs. Group Therapy for Addiction Addiction Treatment: How Counselling Helps with Addiction Addiction Treatment: How Counselling Helps with Addiction Group therapy is generally considered more suitable for treating addiction as it provides support from peers in drug rehab.  At the same time, individual counseling can be helpful if you experience underlying conditions such as anxiety, depression, bipolar disorder, PTSD, or another mental health condition that requires a separate treatment.  Many rehab centers combine individual and group psychotherapy as a part of a holistic approach to treating addiction.  Next Post Do you experience a constant fatigue and lack of energy?…
The Frances Crick Institute London, UK Researchers at the Frances Crick Institute, Stanford University, and University College London have developed a new method to accurately record brain activity at scale. The technique could lead to the creation of new medical devices to help amputees, people with paralysis, or people with neurological conditions such as motor neurone disease. The research in mice, published in Science Advances, developed an accurate and scalable method to record brain activity across large areas, including on the surface and in deeper regions simultaneously. Using the latest in electronics and engineering techniques, the new device combines silicon chip technology with super-slim microwires, up to 15 times thinner than a human hair. The wires are so thin they can be placed deep in the brain without causing significant damage. Alongside its ability to accurately monitor brain activity, the device could also be used to inject electrical signals into precise areas of the brain. “This technology provides the basis for lots of exciting future developments beyond neuroscience research. It could lead to tech that can pass a signal from the brain to a machine, for example, helping those with amputations to control a prosthetic limb to shake a hand or stand up. It could also be used to create electrical signals in the brain when neurons are damaged and aren’t firing themselves, such as in motor neurone disease,” says Andreas Schaefer, group leader in the neurophysiology of behavior laboratory at the Crick and professor of neuroscience at UCL. When the device is connected to a brain, electrical signals from active neurons travel up the nearby microwires to a silicon chip, where the data is processed and analyzed showing which areas of the brain are active. The researchers ensured that the design of the device allows it to be easily scaled depending on the size of the animal, with a few hundred wires for a mouse to over 100,000 for larger mammals. This is a key feature of the device because it means it holds potential, in the future, to be scaled for use with humans. Mihaly Kollo, co-lead author, postdoc at the Crick’s neurophysiology of behavior laboratory, and senior research associate at UCL, says, “One of the great challenges in recording brain activity, especially in deeper regions, is how to get the wires, called electrodes, in position without causing a lot of tissue damage or bleeding. Our method overcomes this by using electrodes that are sufficiently thin. “Another challenge is recording the activity of many neurons that are distributed in layers with complex shapes in the three-dimensional space. Our method provides a solution as the wires can be readily arranged into any 3D shape.” The technology described in the study is also the basis for a fully integrated brain computer interface system that is being developed by Paradromics, a company founded by Matthew Angle, one of the authors of the paper. The Texas-based company is working to develop a medical device platform that will improve the lives of people with critical diseases, including paralysis, sensory impairment, and drug-resistant neuro-psychiatric diseases. For more information, visit here .
Five Everyday Tools That Help Protect the Environment forest setting Today, we humans are contending with countless factors that are hindering the path towards environmental sustainability. While the struggles are authentic and apparent, there have also been plenty of efforts to combat climate change and other ecological roadblocks. Technology plays a vital role in realizing these hopes of a greener future. In fact, many of these technologies already exist, and we are already making use of them today. Eco-friendly and sustainable technologies pervade our lives in more ways than we think they do. They help us go through our day-to-day routines more efficiently while also protecting the planet we live on. Five Eco-friendly Technologies We Use Daily These everyday tools that we use regularly are opening up the path for sustainability. How many of these have you already adopted in your daily living? 1. Community Apps Every person begins somewhere in making a difference for the environment. Community-building platforms allow individuals to come together online to learn more about the environment and the little initiatives that people are practicing to live more sustainably. In a time of physical distancing, community apps are perfect for engaging fellow advocates and new people to encourage them to get involved. These channels allow people to share their thoughts in unique ways. The variety of content allowed in the online space makes much room for creative ways to inform, engage, and make a sustainable change in local communities. 2. Cloud Computing Services Yes, cloud computing is also helping us save the planet. As more and more businesses are taking the road towards automation and the digitization of their operations, going paperless is much more achievable than it used to be. But while the possibility of a paperless workplace has existed for some time, offices are taking some time in adopting it. A major factor that is keeping offices from making the transition is the hesitation to invest in potentially expensive software. The shift requires a significant amount of spending, which companies would rather use for efforts that have more upfront financial benefits. Despite the slow uphill climb to going paperless, the pandemic helps shift winds in this direction. First, going digital during the lockdowns has revealed the capability and efficiency of businesses to go this route. COVID-19 also created a bigger demand for contactless technologies, and digitizing addresses the safety concerns involved in the use of paper in offices. iceberg floating 3. Solar-powered Lights Today, solar-powered equipment is not quite the cheapest of products, but it offers a good return on investment. Solar energy is clean and renewable, harnessing free light from the sun daily to power light, heating, and other needs. Since going solar requires a hefty sum of money, it helps make the shift little by little. The most popular place to start is using solar lighting for your outdoor light fixtures. These recharge in the daylight and brighten homes in the evening without the need for wirings and outlets. 4. Meat Analogues The meat industry—that is, the production of chicken, pork, and beef—is responsible for 18% of the world’s greenhouse gas emissions. This places it 4% higher than the contribution of transportation, which stands at 14%. Scientific American describes it in more concrete terms: the greenhouse emissions involved in producing half a pound of beef is equivalent to driving a gasoline-powered car for 9.81 miles. Meat is undoubtedly hard to give up, especially since it is such a staple in people’s diets over the world. Thankfully, improvements in the production of meat analogues or “fake meat” have made it possible to enjoy the taste of meat while avoiding its negative effects. Businesses specializing in plant-based “meat” have created formulas that capably compete with the unique taste of real meat. With fast-food chains and restaurants taking cues from this and beginning to include plant-based meals on their menus, fake meat can sooner become a regular part of a healthy diet. 5. Plant-based Plastics Single-use plastics are some of the biggest pollutants that we see in our oceans today. Technology has an answer to this: biodegradable plastics. Unlike single-use bags, these are made of organic materials that decompose and are also compostable. Many companies today have made eco-friendly packaging available for the use of businesses. There are also many varieties in use today, ranging from food containers to secure packaging for shipping needs. Countless Possibilities for the Future Achieving a sustainable future will take a collective effort from both individuals and businesses. With COVID-19 revealing our industrial systems’ vulnerabilities today, we hope to pursue a better future for this and the next generation. Share it Scroll to Top
The importance of hydration in Fresh Cows – Have you considered YMCP? Calving is a stressful time for cows, and unsurprisingly many health problems occur in the first few weeks post-calving. However, with careful management of the transition period, and targeted use of supplements, farmers can reduce the risk of metabolic disorders. Understanding the importance of hydration in fresh cows is crucial to future milk production. Veterinary journal InPractice describes the main factors causing the increased risk of metabolic disorders as being an open cervix and teats, reduced immunity, and a negative energy balance caused by reduced feed intake and a greater energy requirement in order to produce milk. The best practice for fresh cows will depend on the farm system, but it starts with good management of dry cows, starting with drying them off at a Body Condition Score appropriate to the breed. Through the dry period, Holsteins will need 75cm+ feed space each, and 10cm water trough space. There should be constant access to fresh, palatable feed and clean water. When sheds are built they should be designed so that they are sometimes understocked, but never overstocked, and to minimise stress cow movements should be limited. When cows do move groups do so in pairs if possible. Hydration of fresh cows is key to minimising the risk of metabolic disease. During calving, the cow can lose fluid equal to the weight of the calf, and this loss of water can impact how nutrients are transferred to the cells of the body. The loss of volume also provides space inside the body cavity which increases the risk of a displaced abomasum. Cow intakes are suppressed at calving, which also reduces hydration as part of the cow’s water intake comes from the feed ration. The reduction in intake also impacts the rumen’s pH and lactic acid levels. Supplementary yeast, in the form of TechMix’s RY Caps, can help support rumen health and encouraging intakes. The easy to use boluses contain yeast and vitamins and can be given to cows during any events where feed intake is suppressed. Containing live yeast, calcium, magnesium, potassium, niacin, betaine, vitamin E, and zinc chelate, TechMix’s Fresh Cow YMCP is a highly palatable and non-abrasive supplement which can be fed as a drench or given in a bucket to drink. The product is designed to be given immediately post-calving, or to cows that have been energy deficient, are suffering from a metabolic disorder, or have been off their feed after surgery. It is also available in a paste form which does not require additional water. Several projects have shown the benefit of providing Fresh Cow YMCP to newly calved cows. When compared to a control group, cows given the product showed a normal decline in blood calcium post-calving, but it never dropped below 7.4 mg/dl. In the control group, blood calcium levels dropped to 5.3 mg/dl. Fresh Cow YMCP has also been shown to outperform competitor products. 40 cows from a Cheshire herd of 2100 calved over a 5-day period and were given either Fresh Cow YMCP or a rival product. Their performance and health were subsequently tracked using data inputted to Uniform Agriculture. Compared to the 21 cows fed the competitor product, the 19 cows given Fresh Cow YMCP recorded an average of just under 3 litres per day of extra milk up to 148 days in milk, a cumulative total of 342 litres per cow. At a milk price of 27ppl, this is an extra income of £92.34 per cow, just to that stage in lactation. There was no difference in fat and protein levels between the two groups. Earlier trials in North America have shown that Fresh Cow YMCP reduced the incidence of metabolic disease, retained placentas and subsequent culling in the lactation. While fresh cow management is a multi-faceted part of farming, and one that will vary according to the farm system, a product such as Fresh Cow YMCP can play an important role in ensuring that cows have their needs met. Transition cow management- monitoring cow health, diet, housing or grazing, and supplementary feeding- should all be discussed with the farm vet and nutritionist to then be applied in a holistic way to provide the best care for the cows, resulting in optimal performance for the business. For more information about our TechMix range, call 0800 756 2787 or click HERE to view the range! First Name Last Name Address 1
Can You Donate Blood If You Take Xanax Blood transfusion is a life-saving intervention. However, the safety of the donor and the recipient is paramount. Millions of people need blood transfusions each year. Some may need blood during surgery. Others depend on it after an accident or because they have a disease that requires blood components. Blood donation makes all of this possible. There is no substitute for human blood — all transfusions use blood from a donor. On average, Xanax has an elimination half-life of about 11 hours (though the range is from about 6-27 hours—sometimes higher in obese patients). This means that it takes a healthy person’s body this amount of time to get rid of half of a dose of the drug. How long laboratories can detect Xanax in your blood depends on several factors. Most people have about half the dose of Xanax in their blood within a day. However, it can take several days longer for the body to completely eliminate Xanax, according to the Xanax prescribing information. Even if you don’t feel the anxiety-relieving effects anymore, a laboratory may be able to detect Xanax in the blood for up to 4 to 5 days. Can You Donate Blood If You Take Xanax? Most medications do not prevent people from donating blood. Common medications  such as those used to control blood pressure, birth control pills and over-the-counter medications do not affect your eligibility. But some prescription medicines can disqualify you from donating blood. Researchers from Oregon State University (OSU), sifted through 18 batches of supposedly pure human blood serum bought from a biomedical supplier using a technique called mass spectrometry. Reporting in the Journal of Pharmaceutical and Biomedical Analysis, the team was attempting to demonstrate a new method for looking at interactions between botanical dietary supplements and drugs. While carrying out the research, they noticed that their samples were laced with cocktails of drugs. All blood samples contained caffeine, while a number of other samples were found to contain alprazolam (Xanax). It is always safer to allow for complete elimination of Xanax from your body before donating blood. According to the Red Cross, some medications affect your eligibility as a blood donor, for the following reasons: Anti-platelet agents: affect platelet function, so people taking these drugs should not donate platelets for the indicated time; however, you may still be able to donate whole blood. Anticoagulants or “blood thinners”:  are used to treat or prevent blood clots in the legs, lungs, or other parts of the body, and to prevent strokes. These medications affect the blood’s ability to clot, which might cause excessive bruising or bleeding when you donate. Isotretinoin, finasteride, dutasteride acitretin and etretinate: can cause birth defects. Your donated blood could contain high enough levels to damage the unborn baby if transfused to a pregnant woman. Once the medication has been cleared from your blood, you may donate again. Erivedge (Vismodegib), Aubagio (teriflunomide): can cause birth defects or the death of an unborn baby if transfused to a pregnant woman. Once the medication has been cleared from your blood, you may donate again. Growth hormone from human pituitary glands: was prescribed for children with delayed or impaired growth. The hormone was obtained from human pituitary glands, which are in the brain. Some people who took this hormone developed a rare nervous system condition called CreutzfeldtJakob Disease (CJD, for short). Insulin from cows (bovine, or beef, insulin): is an injected medicine used to treat diabetes. If this insulin came to the United States from the United Kingdom (where “mad cow disease” has occurred),  it could contain material from cattle that have “mad cow disease.” Although no cases of the human type of “mad cow disease” have been reported in people treated with bovine (beef) insulin, there is concern that someone exposed to “mad cow disease” through beef insulin could transmit it to someone who receives their blood. Hepatitis B Immune Globulin (HBIG): is an injected material used to prevent hepatitis B infection following a possible or known exposure to hepatitis B. HBIG does not prevent hepatitis B infection in every case, therefore, persons who have received HBIG must wait to donate blood. Experimental Medication or Unlicensed (Experimental): vaccine is usually associated with a research study, and the effect on the safety of transfused blood is unknown. Can You Donate Blood If You Take Xanax Donors SHOULD NOT discontinue medications prescribed or recommended by their physician in order to donate blood. ALSO SEE: Does Xanax Thin Your Blood? error: Protected Content!!
How EV Charges and What are the Different Charging Levels? July 8, 2022 0 Comments Electric Vehicle demand is increasing all around the world, even in Australia. Many drivers are excited to do the right thing like saving the environment by using green fuel as well as saving costs down the line. EV buying is costly, which is one of the main reasons several Australians are not buying it. Another reason is they are concerned about finding charging stations on the road. In Australia, three levels of charging points are available for EV charging. How EV charge? Home utilities make use of AC fed from the grid domestic socket. Alternating current [AC] means changing direction often while flowing. It can be efficiently transferred across long distances. Direct current or DC is also used for powering devices. It is electricity that is stored in batteries. It travels in a straight line to power the device directly.  When an electric device is plugged into a socket, it receives AC power. The batteries in your electrical devices store DC, so there is conversion happening within the device. EVs even work the same way in power conversion. Grids power is converted within the car by an onboard converter for storage as DC in the battery that fuels your vehicle. Different EV charging levels Type 1 and type 2 stretch charging cable is commonly used to charge EVs, especially at home. There are levels 1, 2, and 3. Level 3 is a supercharger but the crucial thing to remember is that the charging capabilities of each EV differ. Fortunately, the car determines the speed of power acceptance. Therefore EV owners need not be concerned about plugging in a charging port that is capable to deliver more power than the capability of your EV to handle it. The car does not allow the charger to deliver more power than it can handle.  Level 1 charger  It is suitable for the domestic outlet of 120V available at home, public stations, and workplaces. Every EV can be charged with a level 1 charger from a standard domestic outlet. Its charging speed is too slow – 3 to 5 miles in an hour. Cars with small batteries less than 25kWh are compatible, but for large batteries type 1 charger is extremely slow for daily charging unless you don’t drive often or drive less distance every day.  Level 2 charger The majority of BEV owners prefer a type 2 charger for their daily charging. Install level 2 charging equipment at workplace, home, and even in public locations train stations, plaza malls]. Level 2 charger needs 208 to 240V and has a charging speed of 12 to 80 miles in an hour based on power output and maximum charge rate of the vehicle. The level 2 charging equipment allows EV owners to charge their car 10X faster at home. It means their EV gets fully charged overnight even if the battery was nearly empty when plugged in.  Level 3 chargers It is the fastest charger handling 400V to 900V with a charging speed of 3 to 20 miles in a minute. A high voltage supply is necessary for type 3 charging, which only some residential areas have. Level 3 charger and charging is extremely costly than level 1 and 2.
slide1 n. Skip this Video Loading SlideShow in 5 Seconds.. MEXICO PowerPoint Presentation 341 Views Download Presentation Download Presentation Presentation Transcript Slide 1: MEXICO Slide 2:Language Numbers Colors Animals Slide 3:Numbers English One Two Three Four Five Six Seven Eight Nine Ten Spanish Uno Dos Tres Cuatro Cinco Seis Siete Ocho Nueve Diez Slide 4:Colors English Red Blue Green Yellow Purple Orange Black White Spanish Rojo Azul Verde Amarillo Morado Naranja Negro Blanco Slide 5:Animals English Dog Cat Fish Pig Horse Cow Chicken Bird Spanish Perro Gato Pez Cerdo Caballo Vaca Gallina Ave Slide 6: Holidays Cinco de Mayo Dia de los Muertos La Quinceanera Slide 7:Cinco de Mayo Cinco de Mayo is celebrated on May 5th It is a celebration of the victory of the Mexicans over the French army at The Battle Of Puebla in 1862 Slide 8:History of Cinco de Mayo Mexico had recently suffered other wars, including the Mexican-American War (1846-1848) and the Mexican Civil War (1858) To Pay for the wars they had to borrow money from other countries, including England, France, and Spain When Mexico stopped paying their loan payments to France, they invaded Mexico with hopes of building onto their empire The French wanted to place Archduke of Maximilian of Austria, a relative of Napoleon, as the ruler of Mexico A poor, out numbered Mexican army was able to turn back the French at The Battle Of Puebla in 1862 However, a few years latter Napoleon successfully conquered Mexico and held it from 1864-1867 Slide 9:Cinco de Mayo Today Despite the eventual French invasion, Cinco de Mayo honors the bravery and the victory of the small, out numbered Mexican army It is most vigorously celebrated in the state of Puebla, but there is recognition of the holiday throughout all of Mexico Celebrating Cinco de Mayo has become increasingly popular along the U.S.-Mexico border and in parts of the U.S. that have a high population of people from a Mexican heritage In these areas the holiday is a celebration of Mexican culture, food, music, beverage, and customs that are unique to Mexico Slide 10:Dia de los Muertos (day of the dead) Slide 11:Dia de los Muertos Dia do los Muertos is celebrated on November 1-2 It is a celebration for when their dead relatives are allowed to return for two days to visit loved ones Slide 12:Dia de los Muertos November 1st is for the young children who have passed away and they are remembered with toys and colorful balloons placed on their graves November 2nd is for the adults and they are remembered with their favorite foods, drinks, and personal belongings Slide 13:Dia de los Muertos The people of Mexico welcome the spirits of their families with the smell of food, tasty candies decorated like skulls, lighted candles, and they decorate the gravestones with flowers One of the foods eaten on this day is Pan de Muerto (bread of the dead), which is a rich coffee cake made to look like bones Slide 14:La Quinceanera This is a celebration when a girl truns 15 years-old The most important part of the event is a church ceremony called Misa de accion de gracias At the ceremony she wears a fancy, full length gown and both her parents and godparents walk down the asile with her Slide 15:La Quinceanera Following the church service there is a fiesta (party) with live music, a customary toast, and large cake The dress that the girl wears, and the party are both very expensive The origins of La Quinceanera are unknown but it is a rite of passage that keeps the bonds of the Mexican family together
Opportunistic Network Coding for Real-Time Transmission over Wireless Networks With the growing popularity of wireless personal devices and services and the increasing demand for real-time multimedia applications, such as video streaming and videoconferencing, there is a pressing need to support various multimedia services over the wireless medium, simultaneously. However, multimedia transfer has stringent quality-of-service constraints on packet delivery time, throughput, packet order, and inter-packet delay. For example, if a packet is not received within an acceptable delay (usually milliseconds), the packet is dropped rather than being retransmitted. Furthermore, in wireless networks, such traffic-intense applications would overwhelm the limited resources of the wireless nodes and degrade the quality of the received media due to the increasing demand for bandwidth and the large number of the packet collisions. Many techniques, in different layers of the network stack, were developed for the purpose of improving the performance of multimedia transfer. For example, in some application layer protocols, multimedia traffic is compressed before transmission in order to save both storage and bandwidth. In addition, some transport layer protocols support multimedia transfer, but with limitations. For instance, the User Datagram Protocol (UDP), which is an Internet standard protocol, is simple and efficient, but it does not guarantee the delivery of the packets; causing reliability problems. Other protocols, such as the Real-time Transport Protocol (RTP), and Real-time Transport Control Protocol (RTCP), were built on top of UDP in order to make it more reliable. One of the recent techniques that has been used to improve the network performance is network coding. The advent of network coding has reformed the way traffic is routed in wired and wireless networks. By allowing relay nodes to combine incoming independent information flows, network coding can improve the overall network capacity and allow more traffic flows to be delivered without severely impacting the overall performance of the network. With network coding, instead of treating each packet independently, a number of packets are encoded and sent as one packet. Thus, the node’s resources are efficiently utilized, more packets are delivered, and, as a result, the overall network capacity and throughput are improved. For full text: click here (Author: Moad Yassin Mowafi, Fahed Hasan Awad, Mohammed A Al-Batati Published by Macrothink Institute)
MIT Know-how Review What’s a MOBA? On-line roleplaying video games tend to make use of text based roles using the internet because the medium to convey communications. Some position taking part in are performed by gamers taking turns. These can embody play be email video games and play by publish video games in web forums. Different position playing games are more realistic with using telnet or IRC. These are often referred to as multi user (MU) or massively multi-participant on-line position taking part in video games (MMORPG) Some individuals use internet chat shoppers or devoted virtual tabletop software program to play what would otherwise be a standard RPG. Any offline roleplaying game is capable of being played on-line.
social mental disorders this paper seeks to explore what is known about the associations of psychiatric disorders with indicators of social disadvantage, and therefore about social risk factors in individuals and populations, and the potential for targetting with additional resources to preventive or ameliorative ends. for these, the published work was examined independently by two researchers, with regard to the validity and reliability of their methods, and their findings relating to the prevalence of the common mental disorders and differentials in social position. for employment the ‘unemployed and seeking work’ were compared with either ‘all others of working age’, or ‘all employed’. for example, of those with difficulties in three or more activities of daily living, 38% had a ‘limiting neurotic disorder’. unemployment was associated with higher positive scores, and was the factor most strongly associated with symptom prevalence in men and women, while low material standard of living and poor education had the highest rates of probable neurosis. the results gave a gradient with occupational social class (subject or head of household, but not parents), which disappeared in men up to age 55 after adjusting for material standard of living, but was still true for women of all ages [21]. the german health survey of 1999 used the cidi and dsm iv to identify ‘cases’ in a realised sample of 4,181. data for 12-month prevalence of ‘any mood disorder’ and ‘any anxiety disorder’, relating fairly closely to the ‘common mental disorders’ are available [11,12]. a survey in belgium in 1997 [27] used the ghq-12 with a cut-off point of 2 or more. these are in the form of distributions of odds ratios (ors) for associations in individual subjects between various social indicators and psychiatric disorder in the 12 months previous to interview. • in the 1990–92 usa ncs (sample aged 15–54), people with 0–11 years of education had an or of 1.79 (1.31–2.43) for ‘any affective disorder’, and an or of 2.82 (2.26–3.51) for ‘any anxiety disorder’ in the previous 12 months, compared to those with 16 or more years of education. • in the 1996 netherlands national survey (sample aged 18–64), ors of 1.56 (1.20–2.03) for mood disorders, and 1.77 (1.43–2.21) for anxiety disorders, were reported for the lowest income quartile compared to the highest income quartile. (adapted from [6]) ‘positive’ associations with less privileged social status and the common mental disorders in european surveys (adapted from [6]) expanded number of studies reporting associations with higher rates of the common mental disorders, by indicators of less privileged social position. social anxiety disorder is a fairly common psychological disorder that involves an irrational fear of being watched, judged, humiliated, 7 disorders related to social anxiety disorder avoidant personality disorder panic disorder generalized anxiety disorder depression. mental disorders (or mental illnesses) are conditions that affect your thinking, feeling, mood, and behavior. they may be occasional or long-, . the three commonest disorders, anxiety, depression and alcohol were often present together. men had more alcohol and other drug disorders; women had more this guideline is concerned with the care and treatment of people with a common mental health disorder, including depression, generalised anxiety disorder, . When you try to get related information on social mental disorders, you may look for related areas. social anxiety mental illness,mental disorder and social deviance,mental disorders social awkwardness,determinants of social mental disorders .
Growing evidence that probiotics are good for your liver: In mice, probiotic treatment shown to protect against liver damage from acetaminophen “Probiotics have been studied most intensely in the context of the gastrointestinal tract,” said Bejan Saeedi, a doctoral candidate at Emory University who conducted the research. “This study provides evidence that the effects of probiotics extend beyond the gastrointestinal tract. What makes this study unique is that it suggests a discreet molecular mechanism by which these effects are elicited.” The vast populations of microbes that reside on and inside of our bodies have been shown to play a role in numerous functions that keep our bodies healthy. Probiotics are bacteria that are consumed or administered in an effort to boost the populations of these beneficial microbes. Saeedi and his colleagues focused their study on the probiotic Lactobacillus rhamnosus GG (known as LGG), a species common in many over-the-counter probiotic formulations. They gave mice food laced with LGG for two weeks and then examined how they responded to a high dose of acetaminophen (the active ingredient in Tylenol®). Taking too much acetaminophen can cause serious liver damage and even death by increasing the abundance of a form of oxygen called free radicals, a process known as oxidative stress. However, the researchers found that mice receiving the probiotic treatment suffered less liver damage when presented with an overdose of acetaminophen compared with mice that did not receive probiotics. “Administration of the probiotic LGG to mice improves the antioxidant response of the liver, protecting it from oxidative damage produced by drugs such as acetaminophen,” explained Saeedi. The liver is a hub for removing toxins from the blood and plays an important role in the body’s processes for converting food into energy. Since it is “downstream” of the gastrointestinal tract in the digestive process, it makes sense that the composition of bacteria in the gut could affect the functioning of the liver. Previous research by Saeedi’s colleagues has traced the molecular process by which LGG appears to protect against oxidative liver injury. That research points to the role of a protein called Nrf2, which regulates the expression of genes involved in fighting free radicals. Other studies in mice have previously shown that LGG can protect against alcoholic liver disease and non-alcoholic fatty liver disease. Saeedi said studies in human volunteers would be needed to definitively test the potential clinical benefits of LGG in humans. Source: Read Full Article
Why do basketball players put ice on their knees? Using heat may increase blood flow to the offending area temporarily. … But, the body reacts to cold differently, causing continuous blood flow to attempt to warm the area. Therefore, basketball players place ice on their knees to reduce pain and swelling that might occur while playing. Should you ice your knees after basketball? The use of ice immediately after activity, especially to reduce inflammation such as in a basketball player’s knees after a game or in a pitcher’s arm after a start, does have some negative effects. The cold may slow the body’s natural response to healing, slowing down the recovery. What do basketball players put on their knees? NBA players wear a soft knee brace to protect their knees from the start. The sleeve will compress the joint and keep ligaments in line as they put extra stress on them during a game. If a player injures his knee, he will wear more than just a sleeve. Why do basketball players sit in ice? The ice bath — or the cold tub — has long been a staple for recovery for NBA players. … The ice bath is a form of cryotherapy that requires athletes to submerge themselves in cold water for 10 to 15 minutes. Theoretically, it helps reduce inflammation and improve recovery by changing the way blood flows through the body. IT\'S FUNNING:  Question: How does basketball affect your life? Are NBA players sore after a game? Not only does all that sitting result in stiff muscles and joints which prevent quick recovery, but studies also show that players tend to suffer more injuries during the away games. Are NBA players allowed to wear knee braces? Professional athletic trainers for the NBA and NBA players trust and use Bauerfeind GenuTrain knee brace for preventing and treating knee injuries. Why do my knees hurt after playing basketball? Does LeBron do ice baths? Los Angeles Lakers superstars LeBron James and Anthony Davis had a really hard day of practice and decided to enjoy ice baths. The franchise shared a photo of their players enjoying their recovery. “Cooler than being cool,” the caption read. Why do athletes put their legs in ice? Ice baths reduce inflammation and improve recovery by changing the way blood and other fluids flow through your body. When you sit in cold water, your blood vessels constrict; when you get out, they dilate (or open back up). This process helps flush away metabolic waste post-workout, says Clayton. Why do athletes put their feet in ice? It is thought that this constriction improves post-exercise swelling and inflammation which may cause pain and muscle destruction after activity. Soothes sore muscles. … This is thought to be due to the pain-relieving effect of cold water. May improve performance. IT\'S FUNNING:  Can you play basketball without being tall? Is it bad to ice before a game? The results showed that icing improved muscle strength and nerve reaction. The volunteers who iced their ankles had better results after icing, and they also had better results than the control group. This data suggests that icing would improve joint and muscle function. Why do NBA players ice their shoulders? Treatment: In order to treat bursitis, you need to reduce the inflammation. In many cases, resting the shoulder and using ice and anti-inflammatory medications are all that is needed to manage the symptoms. For more severe pain and swelling, cortisone shots may be administered to reduce inflammation. How often should athletes ice their knees? Ice it about 10–20 minutes. However, taking a good rest is better. Like everyone else said here, icing your knees help reduce inflammation and soreness. There was a period where I spent about 2 hours of intense workout followed by 3-4 hours of pick up games afterwards everyday, for a whole month.
Machine Learning is the powerhouse of the digital ecosystem in recent times and adds more advancement and ease to the entire ecosystem. What is  Machine Learning? Machine learning is considered as the core of Artificial Intelligence and supports the computer algorithm which it’s decimal or hexadecimal instructions. Using the Machine Learning algorithm our team develops user – friendly interface for your business entity. Its classic algorithm allows us to focus on the text as a sequence rather than semantic analysis. As a result, it makes the platform potent enough to observe data, frame patterns, and support an effective decision-making process by easing out complex calculations and statistics. Why do we use Machine Learning? Our subject–matter experts can deliver a highly effective project with the incorporation of Machine Learning features into it. The diversified tool of Machine Learning provides us the powerful snippets of both structured and unstructured data and helps to deliver accuracy in our projects.  It also allows us to prepare the interface which provides an opportunity to our precious clients for obtaining prior insight into the market processes and trends.  With the thorough analyses of words, phrases, formats, etc we can create a customer-oriented interface and help brands receive greater brand loyalty. How do we proceed? The machine learning algorithms are quite complex to process therefore we have divided them into segments to allow efficient understanding and execution in the software development processes.  Focusing on supervised learning and understanding all the labeled data to compare actual results with the desired outputs.  The unknown or unlabeled data sets are then compared to rectify and revise the existing model. Now, the trained model aims to search the accurate patterns and generate desired outputs.  Now, the three major components of reinforcement learning – learner, decision-maker, and actions are combined to interact with the ecosystem to study the ideal behavior of the influencing factors. Machine Learning Tools we use  Polynomial Logistic  Random Forest Decision Trees Naïve Byes  K-means clustering  Hierarchical Clustering Fuzzy means An ISO 9001:2015 and 27001:2013 certified company
Project tutorial Internet Of Brain (IoT) Internet Of Brain (IoT) • 29 respects Components and supplies NeuroSky MindWave RN42 Bluetooth Module Ph a000067 iso (1) wzec989qrf Arduino Mega 2560 About this project Hello Guys, You might have seen about internet of things or internet of useless things etc etc... Now hereby create an new class of technology called as internet of brains. its my starting step of uploading my mind to internet.~~transcendence~~ this is my first step towards transcendance.. Step 1: What is Brain? How we hack the data? Now lets start telling about the basics of the brain and how we hack it to internet: There are two parameter you need to know one is Brain which is the main part of our body which sends electrical impulse to the parts of the body via nerves.. These signals are called as synapse.. so we use sensors/electrodes to decode those electrical activity over the brain and send it to the device we are going to work called as Electroencephalography Now i am going to copy paste the wikepedia stuff. you can have a quick read.. Human Brain: Electroencephalography (EEG) is the recording of electrical activity along the scalp. EEG measures voltage fluctuations resulting from ionic current flows within the neurons of the brain.[1] In clinical contexts, EEG refers to the recording of the brain's spontaneous electrical activity over a short period of time, usually 20–40 minutes[citation needed], as recorded from multiple electrodes placed on the scalp. Diagnostic applications generally focus on the spectral content of EEG, that is, the type of neural oscillations that can be observed in EEG signals. Step 2: What is Arduino? What is arduino mega?? its is simply the computer brain of the project, it takes control of all the data flow and logical operations taking place. Step 3: EEG sensor here is am going to explain the sensor use to record the signal from our mind. To understand the MindWave and MindWave Mobile, we must first understand what an EEG sensor is. The first recording of the human brain’s electric field was made by Hans Berger, a German psychiatrist, in 1924. Berger gave the recording the name electroencephalogram (EEG). Put simply, the EEG is performed by placing electrodes all over the subject’s scalp, and then reading in the electrical signals for analysis. Fast forward to today, and you have all of this technology packed into a compact form factor that is the MindWave. which sends all the eeg by bluetooth. The amplitude of the EEG is ~ 100 µV when measured on the scalp, and about 1-2 mV when measured on the surface of the brain. The bandwidth of this signal is from under 1 Hz to about 50 Hz. Step 4: Bluetooth interface Now as you know that the mindwave has the eeg sensor which is connected by means of a bluetooth. now we need an bluetooth module to connect that to our edison and decode the data to make it usefull. Here is used RN42 bluetooth its ttl module and it can be configured as master and i m connecting it directly to the arduino tx rx module. its 5v module so no need of the level converter. Step 5: Software developement Actually i taught of using the intel edison for the cloud push. but it has some issue with serial so unable to interface is directly. so i used my arduino mega and used my laptop as push mechnism to cloud i used python code to get serial data and split it and push to thingspeak server and arduino code to send data serially. Step 6: Thingspeak Cloud management It is an freee cloud iot tool. here you can push the data and send the data to the cloud which will create a json on its backend and plots the graph based on it. and only disadvantage is it can get data only after 15s. thats a bit slow import serial import httplib while 1: ine = ser.readline().rstrip() a,b,c = line.split(",") print a print b print c conn = httplib.HTTPConnection('') conn.request("GET", ("/update?key=API&field1="+a+"&field2="+b+"&field3="+c+"\n")) int BAUDRATE = 57600; // checksum variables byte payloadChecksum = 0; byte CalculatedChecksum; byte checksum = 0; //data type byte stores an 8-bit unsigned number, from 0 to 255 int payloadLength = 0; byte payloadData[64] = {0}; byte poorQuality = 0; byte attention = 0; byte meditation = 0; // system variables long lastReceivedPacket = 0; boolean bigPacket = false; boolean brainwave = false; void setup() { Serial1.begin(57600); // Bluetooth Serial.begin(9600); // software serial /// Serial.print("Communicating... "); byte ReadOneByte() { int ByteRead; // Wait until there is data //Get the number of bytes (characters) available for reading from the serial port. //This is data that's already arrived and stored in the serial receive buffer (which holds 64 bytes) ByteRead =; return ByteRead; // read incoming serial data unsigned int delta_wave = 0; unsigned int theta_wave = 0; unsigned int low_alpha_wave = 0; unsigned int high_alpha_wave = 0; unsigned int low_beta_wave = 0; unsigned int high_beta_wave = 0; unsigned int low_gamma_wave = 0; unsigned int mid_gamma_wave = 0; void read_waves(int i) { delta_wave = read_3byte_int(i); theta_wave = read_3byte_int(i); low_alpha_wave = read_3byte_int(i); high_alpha_wave = read_3byte_int(i); low_beta_wave = read_3byte_int(i); high_beta_wave = read_3byte_int(i); low_gamma_wave = read_3byte_int(i); mid_gamma_wave = read_3byte_int(i); int read_3byte_int(int i) { return ((payloadData[i] << 16) + (payloadData[i+1] << 8) + payloadData[i+2]); void loop() { // Look for sync bytes // Byte order: 0xAA, 0xAA, payloadLength, payloadData, // Checksum (sum all the bytes of payload, take lowest 8 bits, then bit inverse on lowest if(ReadOneByte() == 0xAA) { if(ReadOneByte() == 0xAA) { payloadLength = ReadOneByte(); if(payloadLength > 169) //Payload length can not be greater than 169 payloadChecksum = 0; for(int i = 0; i < payloadLength; i++) { //loop until payload length is complete payloadData[i] = ReadOneByte(); //Read payload payloadChecksum += payloadData[i]; checksum = ReadOneByte(); //Read checksum byte from stream payloadChecksum = 255 - payloadChecksum; //Take ones compliment of generated checksum if(checksum == payloadChecksum) { poorQuality = 200; attention = 0; meditation = 0; brainwave = false; for(int i = 0; i < payloadLength; i++) { // Parse the payload switch (payloadData[i]) { case 02: poorQuality = payloadData[i]; bigPacket = true; case 04: attention = payloadData[i]; case 05: meditation = payloadData[i]; case 0x80: i = i + 3; case 0x83: // ASIC EEG POWER INT brainwave = true; byte vlen = payloadData[i]; // Serial.print(vlen, DEC); /// Serial.println(); i += vlen; // i = i + vlen } // switch } // for loop if(bigPacket) { if(poorQuality == 0){ else{ // do nothing if(brainwave && attention > 0 && attention < 100) { Serial.print(delta_wave, DEC); Serial.print(theta_wave, DEC); Serial.print(low_alpha_wave, DEC); Similar projects you might like Code-Free IoT with Arduino and The Tentacle on Octoblu! Project tutorial by Aaron Herres • 47 respects IoT Node with STM32F4 Discovery, MKR1000 and Azure IoT Hub Project tutorial by vincent wong • 6 respects IoT Notes Printer: Your Smartphone Notes on Paper Project tutorial by Luigi Francesco Cerfeda and Daniele Mazzei • 35 respects IoT Blink - Getting started with IoT Project showcase by AppShed Support • 1 comment • 26 respects IoT Garage Door Monitor/Opener with Finger Print Scanner Project tutorial by • 46 respects IoT arduino ESP Garage Door opener (UD) Project in progress by David Smerkous • 23 respects Add projectSign up / Login
EBTRON Solutions for K-12 Schools Promote better learning Improve student health Reduce contaminants & mold growth Elementary and Secondary School Emergency Relief Fund (ESSERII) and the American Rescue Plan Act of 2021 Elementary school classrooms have stable populations throughout the day, while middle and high school classroom population’s change. Some rooms are utilized for extracurricular activities or by the community outside of normal school hours, and present ventilation control issues that can be overcome with a manual override timer. EBTRON has found that many spaces in K-12 schools can be ventilated based on design occupancy with an on-off schedule and manual overrides to provide ventilation air as required by the mechanical code. Additional energy savings can be found using EBTRON CENSus® occupancy counters, possibly combined with lighting controls to modulate the quantity of ventilation air and still meet code required flow rates while saving money from reduced energy usage. Spaces that currently use demand control ventilation with CO2 can have better ventilation control when EBTRON airflow measuring stations are incorporated into the control strategy. High volume spaces need the flexibility to handle design maximum population during specific as well as small groups or classes using these spaces. EBTRON recommends the combination of airflow measurement and CO2 inputs to provide the best mix of efficiency and capacity control. Cafeterias, Gymnasiums, and other high capacity spaces making application of EBTRON CENSus occupancy counters a great solution to save energy and maintain ventilation air. Locker Rooms and ancillary rooms to the Gym have a long reputation for generating odors and retaining moisture. EBTRON Airflow measurement and control is essential not only for ventilating the occupants and helping to dry these spaces, but also for pressurization to isolate any odors from the rest of the school and exhaust them. Science rooms are typically treated as normal rooms due to the limitations on school funding for better airflow controls. Some may have recirculating fume hoods, but few allow for chemical or biological materials that would present a major threat to student health. Storage spaces specific to these spaces should be considered in the ventilation system plans. Maintaining negative pressure for the lab and storage is a wonderful application of the EBTRON (EB-Flow II) Bi-directional Airflow and Temperature Measurement sensor. Find a Rep Near YouCancel Rep Finder Select Your Country/Region Enter your Zip Code
Jeffrey Heilveil Jeffrey Heilveil Sep 01, 2021 Group 6 Copy 340 Please wait... About This Project Successful freshwater conservation efforts require an understanding of genetic diversity and how it changes over time, data we often lack. This study will revisit populations of the saw-combed fishfly (an environmentally sensitive aquatic insect) sampled ~20 years ago to see which populations survived, how genetic diversity has changed, and whether next-generation DNA sequencing gives us a better understanding of how this species recolonized North America after the last glacial retreat. Blast off! Browse Other Projects on Experiment Related Projects Creating a neural network that classifies Dinoflagellate species How do gorillas see the world? Backer Badge Funded
You are using a browser we no longer support. Current functionality may be reduced and some features may not work properly. For a more optimal experience, please click here for a list of supported browsers. Kill your cough with water, not antibiotics GEHA | October 8, 2020 Health and wellness The next time you feel a tickle in your throat or cough coming on, slow down. As the weather turns cooler, it’s not unusual to discover a cough or soreness in the chest. These symptoms are often caused by acute bronchitis. Bronchitis is when the airways in the lungs swell and create mucus. Oxygen has a harder time moving through the restricted airway and collides with the mucus, causing you to cough. Typically, these symptoms last less than three weeks, if you don’t have heart or lung problems or a weakened immune system. In addition to coughs, you may experience the following symptoms while fighting bronchitis: • Sore chest • Feeling tired • Mild headache • Mild body aches • Watering eyes • Sore throat See your physician if you have any of the following symptoms. If you don’t have a primary care physician, use the GEHA Find Care tool to locate an in-network physician near you. • Temperature greater than 100.4 degrees Fahrenheit • Bloody mucus with cough • Trouble breathing or shortness of breath • Symptoms persisting longer than three weeks • Frequent, consecutive bouts of bronchitis Left untreated, bronchitis usually gets better on its own. Just get lots of rest, drink lots of fluids, and use a clean humidifier, mist vaporizer or breathe in steam from a bowl of hot water or shower. Drinking plenty of water helps thin the buildup and drainage in your lungs and throat, making it easier to clear them out. One thing you definitely do not want to do with acute bronchitis is take an antibiotic. As the name implies, antibiotics work by fighting bacteria. Bronchitis is caused by a virus, not a bacteria. Therefore, an antibiotic has no effect on bronchitis. Even worse, taking an antibiotic unnecessarily may lower how effective that antibiotic might be when you actually do need to take it. It also may produce a rash or diarrhea. The next time you feel a tickle in your throat or cough coming on, slow down. Get more rest, drink more fluids and wait several days to see if the condition improves on its own. “Preventing and Treating Bronchitis.”, Centers for Disease Control, no date provided. “Chest Cold (Acute Bronchitis).”, Centers for Disease Control, 30 August, 2019. “Antibiotics.”, National Institutes of Health, 17 August, 2020. “Stay hydrated with COPD.”, Lung Health Institute, 28 August, 2016.
Aims and Objectives Objectives Explained: • Building in the students the skills of using ICT more effectively and responsibly. ICT may be misused or abused for destructive purposes. On the other hand, it can be used to develop and build humanity. The latter is the desired. • Building communication skills and confidence in learners. The ability to communicate effectively is a cornerstone to human survival. As information technology grows and develops the world becomes more accessible, drawing people of different races and languages into one global village. With it is an increasing dependency on information technology to communicate effectively. It therefore implies that the student of today must be prepared to communicate more effectively using ICT and master how to communicate with people of different cultures, races and languages. Confidence in one’s self is also very important to communicate effectively. • Enabling creativity and innovation. Creativity and innovation are the cornerstone for a sustainable development of a nation. Young people are dynamic and energetic. By embracing ICT, they have opportunity to accelerate their ability to create and innovate. • Developing critical thinking and problem-solving mentality. Before you can be a problem solver, you need to be a critical thinker. Entire communities are sometimes derailed because the people in it fail to critically analyze and identify the basis of their problems. The ICT learner therefore needs to be engaged in learning activities that challenge their thinking and come up with solutions to problems with aid of ICT as an invaluable enabler for critical thinking and problem solving. • Being able to integrate ICT in mainstream disciplines, other clubs and schools’ activities for learning purposes. ICT is not an end in itself. It is not used in isolation but as a tool and enabler in every aspect of human life. Therefore, the ICT clubs will be relevant only in as far as they support other programs and activities in the school. It may be supporting other clubs to embrace ICT in implementing their programs, guiding students in realizing the usefulness of lCT in their respective subjects, supporting school administration in a major event and so forth. The ICT clubs have to therefore strategically think of how they can integrate ICT in learning disciplines, clubs and schools’ programs and activities. • Engaging learners in programs and activities that develop a sense of global citizenship. It is increasingly becoming impossible to ignore what happens in the other end of the world because its effect may sooner or later be felt the other side of the globe. It therefore means that young people of today need to take global concern over issues. ICT provides an opportunity for learners to realize their potential to be global agents of impact or change. They essentially are at their best as global citizens, • Being able to purposefully network, collaborate and work as a team. In on increasingly interconnected world, the value of networking and collaborations have never been so acute. We need each other more than ever. It therefore means that the mentality and ability to work with each other need to be inculcated in the young people. ICT makes it very possible to collaborate and network. The ICT club members therefore need to get engaged in programs that propagate networking, collaboration and teamwork, locally and internationally. • Becoming peer learners that guide and support fellow students in learning and effective use of ICT in education. Sharing of knowledge and skills has a distinct benefit of helping the sharer to reinforce his or her own learning. The ICT Clubs were therefore encouraged to develop learning activities that involve sharing learning experiences with others. It may be with students in the same school, another school or else where in their community — face to face or online. • Empowering learners to address real issues affecting their communities and finding solutions to them through innovative learning projects. This is another key element of the project. Each ICT club has been encouraged to come up with at least one innovative learning activity that address real issues affecting people in their communities. Such activities do not have to be grand but within means of the students to implement. They should therefore develop keen senses to find out issues affecting their communities and plan to address at least one of them and determine how ICT can enable it. • Developing a sense of ownership of and taking part in maintenance of equipment of their respective ICT department. We explained to the students and teachers present that one of the key interests of UCC is to see the active participation of students in maintenance of labs and their equipment. They were reminded that lab maintenance is integral part of the ICT curriculum and it has to be not just minds-on but hands-on as well. They were encouraged to own the labs and be their first protectors. 21′ Century Challenges and Opportunities. The world is rapidly going hi-tech in almost every aspect of life. It is also increasingly possible to access almost any part of the world either physically or virtually. The level of trade and social interaction in the world has grown exponentially. There is also growing forces for freedom by all categories of societies and minorities. As the world becomes more of a global village cultural clash and amalgamation is the rising phenomena. All these above and others pose as challenges and opportunities that the 21st century student must deal with if he or she is to use ICT to its full advantage. It calls for ability to change and adopt to new ways in order to fit, survive, have desired impact today and ultimately remain relevant.
Part 2: Why Were The Chinese Head Tax and Chinese Exclusion Laws Enacted? March 14, 2006: Part 2: Why Were The Chinese Head Tax and Chinese Exclusion Laws Enacted? Press Release Part 2: Why Were The Chinese Head Tax and The Chinese Exclusion Laws Enacted? (Source: “In the Sea Of Sterile Mountains”) A number of conclusions could be drawn from Part 1. One of the major ones is that, contrary to the conventional wisdom of 2006, The Chinese Head Tax Act was a legitimate reaction by the Government of Canada to the flooding of the British Columbia labour market by Chinese labour contractors. These contractors were ignoring widespread unemployment among both the Chinese and host population and continuing to bring in Chinese labourers. This had caused unfair competition between recently-arrived Chinese labourers and host population labourers for limited available employment. (1) The year 1883 was the peak employment year for CPR construction in British Columbia. Chinese labourers were already being laid off because parts of Andrew Onderdonk’s railway contracts had been completed. (Pp. 103-104) “How are these miserable creatures to exist until spring?” asked The Columbian newspaper. “By January 1884, some indigent Chinese were seen eating decayed vegetables which they had found about the streets of Yale; along the Thompson River, they were camped in hundreds…. There were said to be 500 such Orientals around Savona and upward of 2000 in Spence’s Bridge.” (P. 106) “John Robson stated that some 3000 were burrowing caves in the earth near Tilton Creek and eating dead salmon from the stream. The government, he said, should either feed or transport them.” (P. 107) Yet despite the unemployment, over 3000 Chinese labourers arrived in 1884; about half of the 3000 arrived in the first six months of 1884. (P. 106) (Note: Chinese contractors should have been very much aware of the high unemployment among the Chinese.) (2) In August 1883, 300 coal miners (mostly of European ethnicity) in Robert Dunsmuir’s coal mines on Vancouver Island went on strike for higher wages. Dunsmuir used the Chinese to break the strike and later admitted that he had succeeded in doing so. (P. 107) Samuel Robbins, Superintendent of the Vancouver Coal Mining and Land Company, later said that his company had used the Chinese for the same purpose. (P. 119) (These incidents undoubtedly increased the resentment that the host labourer population felt towards both Dunsmuir, Robbins and the Chinese.) (3) Two new laws were introduced to the B.C. legislature. One, The Chinese Regulation Act of 1884, “proposed that every Chinese over the age of 14 years purhase a licence for a sum set at $100”. Exhumation of Chinese graves by fellow Chinese and shipping of bones back to China was to be regulated. Opium was to be prohibited and a minimum size for dwelling rooms was to be established. (P. 109) The second, ‘An Act To Prevent The Immigration of Chinese’ “stated that it was unlawful for Chinese to enter the province and that a fine of $50 or six months imprisonment would be levied on law-breakers. Furthermore, any person assisting Chinese to enter was liable to a fine of $100.” (P. 109) John Robson argued that “the acts might be ruled unconstitutional, but they must be passed locally to impress upon the Dominion government that legislation was imperative”. (P. 110) As expected, both were disallowed by the federal government. But a major point had been made. (3) Prime Minister John A. Macdonald established a two-man Commission to investigate Chinese immigration into B.C. From the start, the attitudes of Hon. Joseph A. Chapleau, Secretary of State in the federal government, and Mr. Justice John Hamilton Gray of the Supreme Court were questioned. Because the Canadian Pacific Raiway had not been completed, and no other trans-Canada route existed, both travelled across the U.S. to San Francisco and then by steamer to Victoria. Before leaving San Francisco, both had toured the city’s Chinatown and made inquiries about the Chinese presence there. They were particularly interested in what was happening there because “U.S. President Chester Arthur had signed a bill in 1882 prohibiting the immigration of Chinese into the United States for a period of ten years”. (P. 113) The issues that B.C. complained about existed on a much larger scale in the western U.S. and were much discussed in B.C. In total, 31 witnesses appeared before the Commission in British Columbia while 39 answered printed questions. Persons from all income levels were heard from. (P. 116) B.C.’s “aristocracy” spoke in favour of the Chinese while B.C.’s legislators and working people spoke against. Huang Sic Chen, a member of the Chinese Consulate in San Francisco, went to Victoria specifically to testify to the Commission. He presented statistics. He said that although it was claimed there were 15,000 Chinese in B.C. at that time (1885), there were really only 10,550, the difference being made up by deaths or departures. (Pp. 119-120) The Knights of Labour complained that their children had to seek employment in other countries. The Nanaimo Trades Association told the Commission that the federal government had a policy of “Canada for Canadians”, but that it had given away resources such as coal and forests to millionaire Robert Dunsmuir who used the Chinese to drive down labourers’ wages. Sensing condescension in the commissioners, Mayor Noah Shakespeare of Victoria and other prominent people boycotted the hearings. (Pp. 120-122) The Commission admitted that the great majority of witnesses were opposed to Chinese immigration. (P. 121) The Commission made three recommendations: a Chinese consul should be appointed to Victoria; a duty of $10 should be imposed upon every Chinese entering Canada.; the money raised should be used to administer the Chinese population. (P. 123) (4) A Chinese informant stated that there was no need for the Chinese labourers who arrived in 1885 and that misrepresentations by Chinese merchants (contractors) had lured poor Chinese labourers who had to give the merchants over half of their wages for the next 4 to 10 years in order to pay for ship’s passage and other expenses in addition to board. (P. 123) (5) The B.C. Legislature voted in March, 1885 to re-pass the legislation that the federal government had disallowed. But, in April, 1885, the federal government again disallowed the Immigration Law. Through Commissioner Joseph Chapleau, who was also a Cabinet minister, the federal government legislated a $5 duty on every Chinese entering Canada. (P. 128) Later, the federal government again disallowed the Chinese Regulation Law. (6) Despite the fact that there was really no need for more Chinese labourers (the CPR would be finished in a few months and the Vancouver Island Railway –The Esquimalt and Nanaimo–was to be finished in nine months), another 1000 Chinese labourers arrived in Victoria in the summer of 1885. (7) Finally, the House of Commons passed a Chinese Restriction Bill which was to take effect on August 3, 1885. A duty of $50 would now be imposed on every arriving Chinese and each ship could carry only one Chinese per 50 tons of ship’s weight. (P. 131) (8) Unemployment increased among all groups as the CPR construction approached its end. In September, 1885, the CPR laid off 6000 men. By mid-November, 1885, 1000 Chinese had left for China. Other Chinese had crossed the American border illegally. Another 1500 were estimated to have died in Canada. However, the Chinese Regulation Act was not being enforced on new arrivals because officers were too busy to collect the fee. (P. 135) (9) “Furthermore, it was charged that Chinese were purchasing re-entry certificates which were then sent to China. (Chinese residents of Canada were given certificates which allowed them to leave the country and re-enter without being liable to the $50 tax, provided they could show a (re-entry) certificate.) The illicit trade in re-entry certificates made a mockery of the Dominion Restriction Act.” (P. 135) (10) By January, 1886, most of the 3000 Chinese labourers in Victoria had become destitute. Victoria City Council tried to do something to help. With the urging of The Colonist, a soup kitchen was set up. In addition, San Francisco’s Chinese (Six Companies of San Francisco) hired four steam ships and offered discount fares of $25 back to China. Free passage and $15 was to be given to those 60 or older. Those younger than 60 could also get free passage and $10 if they could prove poverty. It is not known how many left on these ships. (P. 138) (11) An extension of the railway from Vancouver to New Westminster was planned in the Spring of 1886 with the condition that no Chinese labour be used. William Van Horne, President of the CPR, threatened not to build the extension unless he had Chinese labour. Finally, he got his way. “Three hundred Chinese and seven whites were hard at work on the extension in May.” (P.139) (Note the difference in numbers.) (12) Possibly responding to experiences in Victoria and elsewhere in B.C. with Chinese labour and goaded by Americans who had had similar experiences with Chinese labour in the U.S., the Vancouver Knights of Labour began a campaign against businesses that “employed Chinese, sold them food or patronized them in any way”. The Knights painted an “X” on the sidewalks in front of such stores or offices. (P. 145) (13) Two mob incidents occurred (in January and February) of 1887. (The population of Vancouver in 1884 was 2000, of whom 114 were Chinese.) Resentful about land-clearing jobs being given to Chinese labourers who worked for less, white labourers drove the Chinese out of Vancouver (P. 151), apparently with the tacit approval of Vancouver politicians. The B.C. legislature reacted by, in effect, imposing martial law on Vancouver: it sent a force of provincial constables to Vancouver to quell the actions and to permit the Chinese to return. By hiring Chinese labourers on one 350 acre plot, one of the contractors was estimated to have increased his profit to $21,000, “a stupendous sum for 1887”. (Pp. 145-153) (14) “In the 15 month period beginning in January 1886, …797 arrived by ship from the Orient, though only 127 were classified as immigrants. The remainder were returning to the United States or were classified as students or travellers.” (P. 158) (15) It became apparent in 1887, however, that there were loopholes in the Immigration Act, particularly in regard to re-entry certificates….. This evoked comments by Prime Minister John A. Macdonald that Chinese immigration was not a good thing because it would introduce conflict among the working class. (P. 158) (16) The U.S. had both a 10 year Chinese exclusion law and re-entry certificates, but they too found that “many Orientals, on obtaining a certificate, promptly mailed it to China for the use of a relative, friend or paying customer, and as early as 1888, the U.S. was considering an absolute exclusion act. In July of 1888…,”steamers arriving in Vancouver had carried 3527 Chinese, of which 2,854 were continuing to San Francisco. And it was generally accepted that that the smuggling of Chinese into Washington Territory was occurring with almost daily regularity”. (P. 159) (17) Early in October, 1888, President Grover Cleveland suddenly signed an absolute exclusion act, forbidding the entry of all Chinese, whether they held a re-entry certificate or not. This caused major problems for Chinese who had boarded ships to North America before the American law was passed. It caused a number of them to pay the Canadian head tax and then either to remain in Canada or to slip across the border into the U.S. Head tax revenue for October 1888 was around $11,000 (220 Chinese). (P. 159.) (18) Following an explosion which killed 194 coal miners in 1887, an amendment was introduced to the Coal Mines Regulation Act. The change would forbid Chinese, who had been blamed for the explosion, from working underground. John Robson, who had introduced a proposal for a Chinese Head Tax in 1872, spoke against the amendment and in favour of those Chinese who were long-term residents of B.C. and had worked in the coal mines. (P. 161) (19) In 1890, John Robson became Premier of British Columbia. A petition from 1500 miners to exclude Chinese from working underground was presented to his government. Characterizing the petition as not just “the old anti-Chinese cry”, Robson and the entire B.C. legislature passed the bill. But it was ignored by Robert Dunsmuir, owner of several coal mines. It was later disallowed by the federal government. (P. 162) (20) Vancouver City Council offered Industrialist B.T Rogers a bonus, and tax and water concessions if he did not employ Chinese in the sugar refinery he was planning to build in Vancouver. (21) In the period 1887-1890, 1887 Chinese entered Canada. But Tai Yune, the largest dealer in opium in the province, believed that…(Victoria’s) population had dwindled from 7000 to 3000…. (P. 164) (22) In 1891, Thomas Keith, one of two Labour members in the B.C. Legislature, proposed the same amendment that previous governments had approved: that Chinese be forbidden to work underground in coal mines. The standard reason for this was that the Chinese could not read mining regulations posted in English on signs and therefore were a danger to all other miners who could. It was defeated, presumably for ideological reasons. The Labour member proposed the same law the next year to include Japanese. He did the same thing the following two years. All were defeated. The majority in the B.C. legislature defended their action by saying that Canada had trade treaties with Japan, which she did not have with China, and did not want to jeopardize those treaties. (Pp. 165-166) (23) The Canadian Census of 1891 stated that there were 9,129 Chinese in Canada. Of these, 8910 (97%) Chinese were in B.C. The total non-First Nations B.C. population in 1891 was 107,302 (Chinese: 8.5%). (P. 167) (Note: The Chinese were accused of “interfering” with this census. “Interfering = not participating, and thus reducing the true count of Chinese?) In response to calls for Chinese exclusion from B.C. MP’s and B.C. Labour, Prime Minister John. A. Macdonald replied that the Chinese were only a small group. “If, however, there seemed to be a prospect of the Chinese coming in and swamping the whites, I would be willing to let the trade go rather than let the interests of the people of British Columbia be ignored.” Macdonald died a short time later in June, 1891. (P. 167) (Macdonald, although a resident of Ontario, had been one of the MP’s for Victoria since 1878–13 years–and was very familiar with the views of people in British Columbia.) (24) In 1894, Labour MLA Thomas Keith proposed a bill to ask Ottawa to raise the Chinese Head Tax from $50 to $500. It was defeated, but another bill to raise the tax to $100 was approved and sent to Ottawa. It was finally responded to by Canada’s Minister of Trade and Commerce, not the Minister of Immigration, who stated that passage of such a law might interfere with trade with China. (Pp. 168-169) (25) New Chinese immigration began in 1890 with 2367 arriving in 18 months, “paying $131,850 in head money”. (P. 171) The numbers continued to increase with 200 to 500 arriving on every ship. Some arrived with smallpox. This caused alarm, but not as much as the continued arrival of Chinese and Japanese during the economic depression and the rise in unemployment which began in 1893. The Fishermen’s Union complained in 1893 of Chinese working for lower wages. (P. 173) (26) Despite the unemployment in the host population, Chinese contractors continued to bring in labourers, made arrangements with fish canneries and other employers to employ the Chinese, paid the head tax for an unknown number of immigrant labourers and deducted a part of this tax from the pay given to each labourer every payday. (Pp. 172-174) (Note: These labourers were almost certainly surplus to B.C.’s labour needs. As in the 1880’s, Chinese contractors were frustrating government attempts in the 1890’s to protect the host Canadian population. They were using Chinese labourers to break strikes and to undermine wages for host population labourers. In effect, Chinese immigration was in private hands and was being used primarily for the benefit of Chinese contractors. A full list of conclusions will be drawn later.)
Chevron Left Approaching Music Theory: Melodic Forms and Simple Harmony(으)로 돌아가기 캘리포니아 예술대학의 Approaching Music Theory: Melodic Forms and Simple Harmony 학습자 리뷰 및 피드백 134개의 평가 79개의 리뷰 강좌 소개 This course is about how music works. It is about the relationship between the technical and aesthetic details of music. It is also about how developing a meaningful theoretical vocabulary can help you think and talk about musical style, and how learning that vocabulary can expand your appreciation for music. In this course you will learn music theory not by looking at theory itself, but by listening to, looking at, and—yes!—writing your own musical examples. By hearing, seeing, and writing yourself, you will learn about classical, modern, ancient, pop, jazz, and folk styles. Through lectures, relevant examples, and numerous practice assignments, we will examine fundamental aspects of melody. We will move into working with two voices and counterpoint, and finally to three voices and the beginnings of harmonic function. This is an intermediate-level course for musicians and composers who already have some understanding of music theory through previous study. If you are a musician or composer looking to build a deeper understanding of music theory for composing, performing, or improvisation, you have come to the right place. If you are an amateur lover of music or, perhaps, play a musical instrument and want to develop a deeper sense of appreciation for music theory, aesthetics, and history, you are also in the right place!... 최상위 리뷰 2020년 7월 4일 Great survey of Western music. I found it more of an appreciation of listening to music rather than a formal music theory course. There's lots of opportunity to learn different styles of composition. 2021년 3월 12일 Excellent, challenging course which opens your eyes and ears to many genres of music. Wonderfully presented with humour and concise descriptive explanation. Thank you 필터링 기준: Approaching Music Theory: Melodic Forms and Simple Harmony의 80개 리뷰 중 76~80 교육 기관: Kathy K 2022년 5월 28일 This course enchance my knowledge of music harmony which surely help me in my future career as a piano teacher. 교육 기관: Jia-ying K L 2021년 1월 25일 Very engaging lessons and exercises! However, waiting on peer feedback may take some time. 교육 기관: Kartik N 2022년 1월 11일 I​ think the content is good, at least initially. I love the fact that the instructor makes us compose music. But the two biggest failings are that there doesnt seem to be an end goal to this course and that finding peers who are capable of giving proper feedback is difficult. 교육 기관: Pedro L A D 2020년 6월 27일 Very difficult, explanation are not clear, much talk and many slang language... 교육 기관: Volkan A 2021년 4월 12일 I cannot unenroll. I have mistakenly enrolled. Please help.
Submarines Essay Research Paper The History of Submarines Essay, Research PaperThe History of SubmarinesIn the twelvemonth 2000, the American pigboat force will observe the first century of service by extremely skilled people in some of the most technologically advanced vass of all time built. The past 100 old ages have witnessed the development of a force that mastered submergible warfare, introduced atomic propulsion to make the true pigboat, and for decennaries patrolled the deep ocean front line ; the hottest portion of an otherwise Cold War.Submarines in WarThe U.S. Navy? s engagement with the pigboat dates form 1888 when the Bureau of Construction and Repair ( BUC & A ; R ) sponsored a design competition that brought John Holland a naval contract to construct the experimental Plunger. As the new century dawned, outstanding American naval leaders like Admiral George Dewey called the pigboat a existent menace to international surface forces, taking the Navy to get its first pigboat in 1900. Get the better ofing competition from fellow American discoverer, Simon Lake, Holland sold his newest theoretical account, Holland VI, to the Navy for $ 160,000 on April 11. This 64-ton pigboat commissioned as USS Holland, or SS-1, on October 12 of the same twelvemonth, was equipped with an Otto-type gasolene engine for surface running and electric motors for submersed operations.Due to the volatility of gasolene, American submergible designs shortly followed the Gallic pattern, following the Diesel engine in 1909 with the Electric Boat Company? s F category ( SS-20 through 23 ) , built at Union Iron Works in San Francisco. We Will Write a Custom Essay Specifically For You For Only $13.90/page! order now Uniting the influence of Diesel propulsion with the submergible designs of Holland and Lake, American submersibles took a familiar constellation through American entry into the Great War. Submarines of the E, H, K, L, M, N, O, and R categories and ranged in displacement signifier 287 to 510 dozenss, with the fastest boats exposing a top surface velocity of hardly 14 knots on Diesel power.During World War I the U.S. Navy separated these submersibles into two groups harmonizing to mission. ? Boats? of the N and O categories, every bit good as some of the E type, patrolled American seashores and seaports following a defensive scheme. Other pigboats drew assignments that sent them to hostile European Waterss after 1917. Some K- , L- , O- , and E-class boats conducted violative, open-sea operations from the Azores and Bantry Bay in Ireland. They supported the Allied attempt to keep unfastened sea lanes along the European seashore and in the attacks to the British Isles.The Nay Department? s programs for these vass reflected the prevalent surface warfare thought, which perceived the submergible as a type of destroyer or torpedo boat that should run with the conflict fleet. Thus the first raid into undersea design by the Bureau of Steam Engineering produced the faster 15-knot, 800 ton, S-class pigboat in 1916 with the aid of Electric Boat received a committee to plan the three boats of the 20-knowt T, or AA category, with a normal supplanting of 1107 dozenss. On paper these features, adopted during the First World War, brought the Navy one measure closer to the? fleet pigboat? , a submergible that could maintain the gait with the conflict fleet.Determining an IdentityThe German Submarines of the 1914-1918 struggle gave the American officers and interior decorators ground for intermission. Physically lasting, powered by really dependable Diesels, technically blessed with the really long sea legs, they provided the paradigm for American interwar development. At the same clip, the 1916 vintage American S-class proved a practical clinic for basic design errors, burdened with the hard metallurgical jobs and really undependable Diesels. While Rear Admirals Harry Yarnell and Samuel Robinson, consecutive interwar heads of the Bureau of Engineering, worked to rectify the proficient defects with solutions form European and American technology pattern, the community of pigboat officers struggled with a job even more cardinal than propulsion. How should the Navy usage pigboats? What was their proper strategic function? During the interwar period influential officers like Captains Thomas Hart and Yates Stirling Jr. , Admirals Henry Wiley and Frank Schofield, and the advanced commanding officer Thomas Withers debated these issues with the German paradigm in head. Unfortunately, this theoretical account did non offer easy way. While the German commercial warfare scheme and independent patrol tactics had great consequence on the war attempt of the Entente and its Alliess, incidents like the sinking of the rider line drive RMS Lusitania painted this manner of warfare with a dark coppice, proposing immorality when submersibles operated without limitation. Merely a elusive expression could assist American submariners address inquiries of individuality and mission in such a political environment. Since the province of design and propulsion engineering would non allow American industry to construct a pigboat lasting and fast plenty to maintain gait with the battlefleet, runing with surface ships on a regular footing seemed improbable. This forced pigboat strategians like Witherss to look more closely at independent patrols and a theoretical account that approximated the World War I German experience. On isolationist postwar America, nevertheless, this option brought with it the ethical load of unrestricted U-boat warfare and civilian casualties, something a Navy diminished by the Washington Treaties did non care to presume. Therefore, American pigboat scheme could non include unrestricted pigboat warfare, which might turn impersonal commercial vass and guiltless civilians into victims.American officers realized that war in all of its ferociousness, non peacetime political relations or worthy ethical concerns, would find the hereafter challenges faced by the pigboat force. In malice of official policy, the boats under building in the 1930s reflected self-asserting, violative strategic thought as the state came to footings with the Depression under Franklin Roosevelt and the Bureaus of Construction and Repair and Engineering resolved the pigboat technology and propulsion sludges. The new Salmon-Sargo designs were intended for long-range independent patrols, with the needed nutrient, fuel, and arms capacity. In add-on, the fleet exercisings and war game scenarios during the late thirtiess permitted these vass to assail war vessels, convoy bodyguard ships, and even certain convoys identified as critical to enemy logistical support. By 1940, the pigboat force had answered its cardinal strategic inquiries and had the vass to transport out the consequent functions and missions. Therefore, when Admiral Thomas Hart proclaimed unrestricted pigboat warfare against Japan on December 8, 1941, it came as no surprise. the undersea force know what to make.VictoryUsing the highly dependable boats of the Gato, Balao, and Tench categories, the pigboat force scored the most complete triumph of any force in any theatre of the war. In malice of a hesitating beginning due to the Pearl Harbor surprise and troubles with the faulty gunmans, the pigboat force destroyed 1,314 enemy ships for 5.3 million dozenss which translated into 55 per centum of all enemy ships lost. Out of 16,000 submariners, the force lost 375 officers and 3,131 enlisted work forces in 52 pigboats, the lowest casualty rate of any combatant pigboat service on any side in the 1939-1945 struggle. While the Japanese advanced rapidly after Pearl Harbor and the Navy struggled to retrieve from December 7, 1941, the pigboat force brought the war to the enemy runing from Pearl Harbor, and Australian bases at Freemantle, and Brisbane. Submarines played a assortment of functions in the war attempt, showing the versatility of stealing.Among those allied war vessels on a regular basis able to perforate Nipponese controlled countries, American pigboats had extraordinary success against both Nipponese bottoms and war vessels. The late summer of 1942, Lieutenant Commander Henry C. Bruton in bid of USS Greenling on her 3rd war patrol destroyed 32,050 Toms of enemy merchandiser transportation and damaged a 22,000 ton converted bearer. Bruton ended the war ranked 13th among the pigboat force? s ones. Polishing their methods of onslaught made American submariners the worst enemy of any ship winging the Nipponese flag. In early 1943, USS Wahoo put to sea on her 3rd war patrol under the bid of Lieutenant Commander Dudley W. Morton. Morton and his executive officer, Lieutenant Richard O? Kane, implemented and further refined a new method of onslaught suggested by Admiral James Fife, commanding officer of the American pigboats runing out of Brisbane. While O? Kane manned the periscope and made all of the observations, Morton was left free to measure the full combat state of affairs, doing possible Swift, informed, and effectual attack and onslaught determinations.The endowment of Morton and O? Kane every bit good as their new bid and control process enabled Wahoo to drop 31,890 dozenss of Nipponese transportation on that patrol. Morton received the first of four Navy Crosses and his ship took place a Presidential Unit Citation. Later in the war, as commanding officer of USS Tang, Richard O? Kane received the Congressional Medal of Honor and became the Submarine Force? s taking one of the war, credited with destructing 31 ships for 227,800 dozenss.In add-on, Submarines played both humane and particular operations functions in their run against Japan. In many of the hardest fought conflicts of the war pigboat crews rescued luckless bearer pilots who ended up in the sea, like future president, George Bush. Fleet pigboats besides delivered military personnels tasked with particular missions against Nipponese Pacific fastnesss. In August 1942, USS Nautilus [ SS-169 ] and USS Argonaut [ SS-165 ] delivered Marine Colonel Evans F. Carlson? s? Plunderers? to Makin Island. Upon finishing their mission to scout the island and destruct its most of import installations, the two pigboats picked up the Marines and returned to Pearl Harbor.In the concluding months of the war, American pigboats had trouble happening marks because the Japanese had virtually no ships left the sink. Undaunted, undersea commanding officers pursued the enemy into his seaports and concealing topographic points. Using freshly developed FM sonar sets, American pigboats penetrated the minefields of closely guarded Nipponese place Waterss to seek out war vessels and provide ships at ground tackle. There was no topographic point to conceal. The soundless triumph was complete.Deep Ocean, Cold WarUndersea warfare underwent a revolution after World War II and the American pigboat force led the manner. Building on the advanced pigboat designs created by the Germans during World War II, the Navy anticipated pigboats of the hereafter traveling deeper, remaining at that place longer, and traveling much faster. Indeed, in studies submitted in 1949 and 1950, naval and civilian advisers suggested that advanced German U-boat engineering exploited by the Soviets might show the most powerful postwar naval menace to the United States. No war vessel of the clip could efficaciously observe and track a pigboat like the German Type 21 which could prolong a 17 knot submerged velocity for at least 30 proceedingss.About instantly after the war, the pigboat force began experimenting with high velocity, sophisticated silencing techniques, sensitive sonic sensing, and deeper diving. the consequence took the form of the greater submerged propulsive power, or Guppy, transitions which changed the constellation of wartime submersibles to heighten submerged velocity and hydrodynamic efficiency. The Tang category, the first genuinely new postwar building, represented an initial measure on a new route toward greater velocity and endurance below the surface.It besides provided the basic hull signifier used for the first true pigboat. USS Nautilus went to sea propelled by a pressurized H2O atomic works in January 1955 and put a new criterion for this type of vas. Its submersed endurance was limited merely by the crews? periodic demand to see both their households and the visible radiation of twenty-four hours. Rather than a surface ship capable of submersing when the demand arose, this pigboat? s natural environment ballad below the surface. Seawolf and the Skate category hunter-killer pigboats rapidly followed Nautilus and together they demonstrated the new extent of pigboat effectivity, from the deep ocean, to the shoals, to the polar parts. This was the vas John Holland wanted to make but could non because of the bounds of scientific discipline and engineering at the bend of the century.Land, Sea, and AirThe coming of atomic pigboats provided the concluding piece to a figure of promising proficient mystifiers. The quest for the greater submerged velocity, initiated in earnest after 1945, found its manner to the Navy? s David Taylor Model Basin merely as Admiral Hyman Rickover? s atomic propulsion undertaking succeeded with Nautilus. the research at David Taylor provided penetrations into the ideal hull signifier for high velocity pigboats. With the conventionally-powered experimental Albacore, submariners reached an extraordinary submerged velocity. In the fast onslaught pigboat [ SSN ] USS Skipjack the endurance of atomic propulsion and the highspeed of the Albacore teardrop hull came together to organize the new paradigm. Every American pigboat since 1958 has followed the same basic expression. The onslaught submarines proved really effectual during the Cold War in turn toing the Soviet pigboat menace in the north Atlantic and Northwest Pacific through surveillance and disincentive.The Nautilus-Albacore combination besides served to widen the range of the pigboat force. While the Navy experimented with establishing air take a breathing missiles like the Regulus from pigboats during the late fiftiess, the mobility, stealing, and endurance of atomic pigboats on the Skipjack theoretical account proved the ideal platform for establishing ballistic missiles. From the PolarisA-1 in 1960, through multiple coevalss of missile pigboats [ SSBN ] have provided the ultimate atomic hindrance. As opposed to easy targeted land-based missiles easy targeted, SSBN? s are in changeless gesture, concealing deep in the ocean, with virtually limitless endurance, capable of making about any mark at the way of the President. With the current Ohio category SSBN? s the pigboat force employs this is the most effectual and survivable constituent of current American strategic atomic defence.Since the 1970s, the pigboat force has besides provided the Navy with a furtive manner of using tactical firepower against land and sea marks. These were ballistic missile pigboats. This category incorporated enormous betterments in noise quieting, easiness of care and public presentation over earlier designs. In add-on, this category introduced a more accurate and longer scope missile that eliminated the demand for these pigboats to be homeported overseas.Submarine Roles and MissionsThe cardinal alterations in the U.S. Submarine Force since the terminal of the Cold war involve major displacements in pigboat warfighting constructs and philosophy, organize the disincentive of planetary war to the support of U.S. national involvements in regional crises and struggles ; from a primary Anti-Submarine Warfare ( ASW ) orientation against atomic powered pigboats to taking full advantage of the modern pigboat? s multi-mission capablenesss ; from weapon loadouts of chiefly MK 48 gunmans to Tomahawk Land-Attack missiles or other arms. This altering operational context has rippled through all elements of U.S. pigboat operations, from peacetime presence to strategic disincentive. The passages in the pigboat force follow straight from the passages in the universe order and the evolving nature of the U.S. Navy. The universe order has shifted from bi-polar ace power alliance to a multi-polar aggregation of involvements. While the likeliness of planetary struggle is greatly reduced, there is an increasing opportunity of regional struggle. The composing and operational position of the U.S. Navy reflects this, holding changed from a bluish H2O accent to a littoral accent. For the pigboat force this has meant several alterations in functions:*Prior to the terminal of the Cold War, Anti-Submarine Warfare was the major function for U. S. Attack Submarines. Now U.S. pigboats are more multi-mission oriented.*Intelligence assemblage has shifted from strategic to tactical reconnaissance. *The? Silent Service? is no longer wholly soundless, but exchanges information covertly with other U.S. forces.The pigboat force is larning how to synergistically interoperate with other Navy and Joint communities for common mission achievement. This includes? community confederations? such as:*Force Protection/Strike with Aircraft Carrier Battle Groups and Amphibious Ready Groups. *Special Warfare with Special Operating Forces ( such as Navy SEALs ) .*Intelligence with the Surveillance community.Peacetime EngagementAlthough the United States is at peace, there is ever the potency of regional crises endangering to break out into armed struggle. During the past half-century, the U.S. has become involved in similar regional struggles and crises. Recently the Navy had played major functions in the emptying of Americans and other foreign subjects from the unrest in Liberia ( Operation Sharp Edge ) , the release of Kuwait and the devastation of Iraq? s violative capableness ( Operation Desert Storm ) , and the coincident deliverance of Americans from revolution in Somalia ( Operation Eastern Exit ) . In peacetime the deployment of pigboats in forward countries can show U.S. involvement in the part. Alternatively, pigboats are valuable if the President decides that involvement should non be seeable until a specific clip. The long endurance and high theodolite velocities of atomic pigboats make them peculiarly attractive for rapid deployments to send on countries in such fortunes. Once on station the onslaught pigboat can be extremely visible-in 1991 U. S. pigboats conducted more than 200 port visits to 50 metropoliss around the world- unseeable. This operational flexibleness is combined with the versatile firepower of the modern onslaught pigboat. Besides, the same pigboat can besides be used to set down little groups of particular operations forces, or to carry on surveillance of an country, or transport out electronic surveillance to derive valuable intelligence. These pigboats can besides run independently or in direct support of bearer conflict groups, surface undertaking forces, or with other pigboats. Surveillance and IntelligenceFor the past 45 old ages the onslaught pigboat has been an priceless platform for surveillance, intelligence, and warning. This capableness comes from the pigboat? s stealing characteristic & # 8230 ; .the ability to come in an country to watch, to listen, to roll up information without being seen. While orbiters and aircraft are used to earn assorted types of information, their operations are inhibited by conditions, cloud screen, and the locations of aggregation marks. In some state of affairss it is hard to maintain a orbiter or an aircraft in a place to carry on sustained surveillance of a specific country. And, of class, orbiters and aircraft are badly limited in their ability to detect or observe submerged activity. Submarines have been employed in assorted signifiers of surveillance and intelligence aggregation throughout the Cold War. Continuing regional crises and struggles will necessitate such operations in support of U.S. and allied involvements. In the hereafter, pigboats may besides utilize Autonomous Underwater Vehicles ( AUV ) or drones to roll up intelligence or behavior sustained surveillance of critical parts of the universe. These vehicles will be sent out from a pigboat to transport detectors into countries where it may non be safe or prudent for the pigboat to venture. After carry throughing its mission, the AUV could return to the launching pigboat, or transmit the informations underwater or to a orbiter. Information is critical to American political and military leaders if they are to do proper judgements, determinations, and programs. As Winston Churchill wrote: ? The great thing is to acquire the true image, whatever it is? . Submarines are of import in the array of methods by which the true image can be obtained.Particular OperationssSubmarines have long been used for particular operations ; transporting ranger, reconnaissance squads, and agents on bad missions. Most particular operations by U.S. pigboats are carried out by SEALs, the Sea-Air-Land squads trained for missions behind enemy lines. These particular forces can be inserted by fixed-wing aircraft, chopper, parachute, or surface trade, but in most scenarios merely submarines warrant covert bringing. Once in the nonsubjective country, SEALs can transport to battle search-and-rescue operations, reconnaissance, sabotage, diversionary onslaughts, monitoring of enemy motions or communications, and a host of other clandestine and frequently bad missions. Nuclear-powered pigboats are particularly will-suited for this function because of their high-velocity endurance and stealing. U. S. atomic powered pigboats have repeatedly demonstrated the ability to transport to particular operations affecting many swimmers. During exercisings, which include Army, Air Force, and Marine Corps particular operations forces every bit good as SEALs, submarines recover forces who parachute organize fixed-wing aircraft and abseil down signifier choppers into the sea, take them on board, and later establish them on missions. The Particular Warfare Team Missions include:*Combat Swimmer Attacks*Reconnaissance and Surveillance*Infiltration/Exfiltration Across the Beach*Beach Feasibility Studies, Hydrographic Survey, and Surf Observation Teams insupport of amphibian set downing operations.Any U.S. pigboat can be employed to transport SEALs, nevertheless, the Navy has several pigboats that have been specially modified to transport swimmers and their equipment more efficaciously, including the installing of Chamberss called Dry Deck Shelters ( DDSs ) to house Swimmer Delivery Vehicles ( SDVs ) . These pigboats retain their full suite of arms and detectors for operations as onslaught pigboats. But they have particular adjustments, alterations to their air systems and other characteristics to enable them to transport DDSs. The DDS can be used to transport and establish an SDV or to? lock-out? combat swimmers. A DDS can be installed in approximately 12 hours and is air-transportable, farther increasing particular operations flexibly. Several units of the STURGEON ( SSN 637 ) category can transport one chamber each, while two former ballistic missile pigboats can suit two shelters each. The DDS, fitted aft of the pigboat? s canvas construction, is connected to the pigboat? s after hatch to allow free transition between the pigboat and the DDS while the pigboat is submerged and nearing the nonsubjective country. The with the pigboat still submerged, the SEALs can go out the DDS and go up to the surface, conveying with them the equipment and gum elastic tonss, or they can mount an SDV and travel submerged several stat mis to their nonsubjective country. The figure of SEALs carried in a pigboat for particular operation varies with the mission, continuance, mark and other factors. One or more SEAL platoons of two officers and 14 enlisted work forces are usually embarked, plus extra Sealing waxs to assist with mission planing in the pigboat and to manage equipment. Former SSBNs employed to run with SEALs have particular berthing infinites for approximately 50 seals. Preciseness StrikeU.S. onslaught pigboats carry Tomahawk Land-Attack Missiles ( TLAM ) , which provide the capableness for long-range, preciseness work stoppage with conventional payloads against shore marks. This combination of furtive onslaught pigboatand precise, long-range sail missile has many advantages for national determination shapers.First used in combat in the 1991 Gulf War, the TLAM has proven to be a extremely effectual arm. The official Department of Defense study? Conduct of the Persian Gulf War? ( 1992 ) provinces: ? The ascertained truth of TLAM, for which unambiguous mark imagination is available, met or exceeded the truth mission contrivers predicted. ? . When the war began on the dark of January 16, 1991, the gap shootings were Tomahawk sail missiles launched from U.S. Navy surface ships in the Red Sea and Persian Gulf. The missiles arrived over the to a great extent defended Iraqi capital of Baghdad at about the same clip as U.S. Air Force f-117? Stealth? onslaught planes were the lone work stoppage aircraft to run over Baghdad at dark, and TLAMs were the lone U.S. arms to strike the metropolis in day-light during the full run. Conventional aircraft were non used in work stoppages against Baghdad and certain other Iraqi marks because of the heavy anti-aircraft defences. U.S. Navy surface ships and pigboats fired 288 land-attack discrepancies of the Tomahawk during the Gulf War. Battleships, patrol cars, and destroyers launched 276 of the missiles and 12 were launched form submarines-the USS LOUISVILLE ( SSN 724 ) , runing in the Red Sea launched eight missiles and the USS PITTSBURGH ( SSN 720 ) , operation in the eastern Mediterranean, launched four missiles. These launches demonstrated the ability of the pigboat to run as a portion of an integrated work stoppage force, with marks and related work stoppage informations being communicated to them at sea. In the future military operations pigboats will non replace traditional bearer onslaught aircraft. Rather, pigboat and surface ship-launched TLAM work stoppages will be the vanguard of such onslaughts, destructing early warning, air-defense, and communications installations to cut down the menaces against manned aircraft. Submarines in peculiar can make onslaught places without changing or arousing the intended antagonist. Battlegroup OperationsAttack pigboats are to the full integrated into Navy conflict group operations. Typically, 2 onslaught pigboats are assigned to each conflict group. These pigboats participate with the conflict group in all pre-deployment operational preparation and exercisings. While runing with the conflict group, tactical control or bid of the pigboats is routinely shifted to amphibian group commanding officers, conflict group commanding officers, destroyer squadron commanding officers, or even NATO commanding officers. Likewise, tactical control of NATO pigboats is routinely shifter to U.S. commanding officers.Sea DenialStoping enemy surface ships and pigboats form utilizing the sea is an of import mission for pigboats. Attack pigboats can execute sea denial missions in a assortment of scenarios, form general war against a major maritime power, to obstructions of enemy ports. Attacks against enemy surface ships or pigboats can be portion of a war of abrasion, where the object is to destruct as much of the opposing naval fleet or merchandiser transportation as possible, or such onslaughts can be directed against specific marks. An illustration of the abrasion run was the U. S. pigboat operations against the Imperial Nipponese merchandiser Marine in World War II, with U.S. undersea trade droping more than half of Japan? s merchandiser vass, every bit good as a big figure of war vessels. During the Falklands War in 1982, the sinking of the Argentine patrol car GENERAL BELGRANO by the British nuclear-powered pigboat CONQUEROR caused the balance of the Argentine surface fleet, including its aircraft bearer, to return to port.. There were no farther sallies by Argentine surface war vessels during the struggle because of the demonstrated menace from British nuclear-powered pigboats. The chief U.S. bomber arm for assailing enemy surface ships or pigboats is the MK 48 gunman, with the improved ADCAP discrepancy now come ining the service. This is a heavy-weight gunman, with a long scope and a big payload. Advanced counsel allows it to be used against both surface ships and pigboats, with the ability to prosecute in high-speed, steering marks. Attack pigboats besides carry anti-ship missiles that can prosecute enemy surface ships at scopes beyond those of gunmans. The Tomahawk Anti-Ship Missile ( TSAM ) , has the scope of more than 250 maritime stat mis and is launched while the pigboat is wholly submerged. After launch, the missile travels to the surface where the jet engine starts and the missile streaks toward its mark. Once launched, the missile has independent counsel, doing it a? fire and bury? arm. The Tomahawk can be carried in topographic point of gunmans and can be launched from gunman tubings. One-half of the pigboats in the LOS ANGELES ( SSN 688 ) category are besides fitted with 12 perpendicular tubings that can establish TLAMs and TASMs. Submarines besides carry mines to deny sea countries to enemy surface ships or pigboats. Two types of mines are used by pigboats, the enCAPsulated TORpedo ( CAPTOR ) and the Submarine-Launched Mobile Mine ( SLMM ) . The CAPTOR can be used against pigboats in deep H2O, while the SLMM is a torpedo-like arm that, after being launched by the pigboat, can go several stat mis to a specific point, where it sinks to the sea floor and activates its mine detectors. It is peculiarly utile for obstructing a seaport or a narrow sea transition.Fitted at first for gunman tubing launch, the Tomahawk sail missile has enhanced the effectivity of the onslaught pigboat fleet. Now capable of firing these missiles form a perpendicular launch system in the bow, the latest flight of the pigboat force? s front line Los Angeles category SSNs has proven really utile in the ambitious environment of modern littoral war at sea. during Desert Storm, pigboat launched Tomahawks proved their extraordinary effectivity during the first combat usage of the pigboat force? s new capableness. Mediterranean undersea operations during the Persian Gulf struggle provides a instance in point.With their stealing quiet mode, endurance, diverse arms array, and ability to observe menaces while efficaciously pass oning with the fleet at great scope, American submarines carry on both independent tactical and strategic patrols every bit good as operations in support of bearer conflict groups. The attempt to incorporate the pigboats more exhaustively with air and surface forces suggests that naval warfare of the hereafter will necessitate a flexible mix of assets designed for a hereafter filled with invariably altering defence demands. Always on the film editing border, the pigboat force will assist the Navy sustain the adaptability necessary to command tomorrow? s battlespace. DisincentiveMerely prior to the terminal of the Cold War and the prostration of the Soviet Union in late 1991, the U.S. Navy & # 8217 ; s 34 ballistic missile pigboats carried some 45 % of the about 12,000 atomic payloads in the states strategic violative forces. The other constituents of the U.S. Triad of strategic forces, the land-based intercontinental ballistic missiles and land-based bombers, carried some 20 % and 35 % of the payloads, severally. The significance of the Navy & # 8217 ; s SSBN force was cited by General Colin Powell, U. S. Army, Chairman of the Joint Chiefs of Staff, at a ceremonial in April 1992 taging the completion of the 3,000th hindrance patrol. General Colin Powell told the submariners, “ But no one-no one- has done more to forestall struggle, no 1 has made a greater forfeit for the cause of Peace, than you. America & # 8217 ; s proud missile pigboat household. You stand tall among all our heroes of the Cold War. ” Strategic disincentive remains a cardinal component of U.S. defence scheme, merely as conventional disincentive has become progressively of import since the autumn of the Berlin Wall. Nuclear-powered pigboats will be the chief constituent of the future U.S. strategic position. Land-based bombers and intercontinental missiles are being reduced ; the SSBN force will be the lone Triad component still deploying missiles armed with Multiple Independently Targeted Reentry vehicles ( MIRVs ) . The future undersea constituent of the Triad will dwell of 18 modern OHIO ( SSBN 726 ) category SSBNs, each capable of transporting 24 long-range TRIDENT missiles with up to eight payloads per missile. A reappraisal of SSBN payloads is being made by the United States as portion of the decrease of strategic arms directed by the President. Still, the pigboat force will supply the overpowering bulk of U.S. strategic arms & # 8211 ; the load of future strategic atomic disincentive will be forthrightly on the pigboat force. The United States entered World War I with a sum of 24 Diesel powered pigboats. They did non see a great trade of action, and in the little figure of brushs with the enemy they were unable to corroborate a individual triumph. The Submarines of Germany, nevertheless, were to show the critical function of the pigboat in any future struggle.After the war the Navy continued to construct up its pigboat force and the Portsmouth Naval Shipyard in New Hampshire became one of the largest pigboat builders in America. Between 1924 and 1929 the Portsmouth pace designed and built five 381-foot, V-class pigboats and between 1932 and 1941, an extra 22 pigboats in the 1500-ton class. It was during this period that the first all-welded pigboat, USS Pike, was completed. The welded hull allowed Pike to submerse to much greater deepnesss than her predecessors and at the same clip provided greater protection against depth-charge onslaughts.Radar and echo sounder were World War II inventions. Both were developed by the English to battle German Submarines, but were incorporated into the pigboat to warn of aeroplane onslaught and countermove from the surface vass. Sonar has become the most of import of the bomber & # 8217 ; s senses. Hydrophones listen for sounds from other ships and the reverberations of sound moving ridges signaled the pigboat itself.Toward the terminal of World War II, the Germans perfected a snorkel device which had been invented by the Dutch old ages earlier. This device permitted the running of Diesel engines while the ship was submerged. The best storage batteries discharged quickly and limited submerging clip. The snorkel greatly increased submerged endurance, but protruded above the surface and could be detected by radio detection and ranging. Although the U.S. Navy still had a comparatively little figure of pigboats when World War II broke out, this fact did small to stifle the liquors of submariners, and the narratives of their successes make full infinite pages of history books. When the figures were eventually tabulated it was found that American pigboats sank five and one-half million dozenss of Nipponese transportation during the war which included over half of the full Nipponese merchandiser fleet. Another important fact is that U.S. pigboats accounted for about 60 % ( over 1,300 ships ) of all Nipponese tunnage sunk, yet the pigboat strength at that clip comprised less than 2 % of the full U.S. fleet.Such promotions as echo sounder, radio detection and ranging and the snorkel came approximately as a consequence of the force per unit areas of World War II, and the U.S. Navy was speedy to better these systems and integrate the lessons of the war into its modern pigboat force. One of the first consequences of this scientific and technological progress was the transition of WW II Fleet pigboats to Guppy types. As portion of this transition, the rainbow fishs were streamlined to give them more velocity and they were fitted with more modern radio detection and ranging and sonar systems. Then with the debut of atomic power, the pigboat of old became a true pigboat & # 8211 ; a ship with greater endurance than its human applied scientists. Many records have already been chalked up by the atomic powered pigboat, and many more are still to come. The first American pigboat is every bit old as the United States itself. David Bushnell, a Yale alumnus, designed and built a pigboat gunman boat in 1776. The one-person vas submerged by acknowledging H2O and surfaced by pumping it out with a manus pump. Powered by a pedal-operated prison guard and armed with a keg of pulverization, the elliptic Turtle gave Revolutionary Americans high hopes for a secret arm & # 8211 ; a arm which could destruct the British war-ships anchored in New York Harbor.The keg of pulverization was to be attached to an enemy ship & # 8217 ; s hull and detonated by clip fuses. However, a deadening device which was operated signifier inside the oak-planked Turtle failed to perforate the copper-hulled vas. Since the keg could non be attached, the undertaking was abandoned, but non before an existent effort was made to blow up HMS Eagle.Then came another American, Robert Fulton, who successfully built and operated a pigboat ( in France ) in 1801, before turning his endowments to the steamboat. Fulton & # 8217 ; s fusiform Nautilus had a kite like canvas for surface power. It besides carried flasks of compressed air which permitted the two-man crew to stay submersed for five hours. Today, atomic powered pigboats carry compressed O to assist regenerate the air supply during submerged periods.William Bauer, a German, built a pigboat Kiel in 1850, but met with small success. Bauer & # 8217 ; s first boat sank in 55 pess of H2O. He opened the inundation valves to equalise the force per unit area inside the pigboat so the flight hatch could be opened. Bauer had to convert two panicky mariners this was the lone means of flight. When the H2O was at chin degree, the work forces were shot to the surface with a bubble of air that blew the hatch unfastened. Bauer & # 8217 ; s simple technique was rediscovered old ages subsequently and modern pigboats have escape compartments which operate on that rule. The USS Skate was the lead ship of the first production category of four atomic propelled pigboats and was the first pigboat to come up at the North Pole.The USS Triton was the first pigboat of all time built with two reactor workss. In add-on, until the commissioning of the Ohio-Class Ballistic Missile Submarines, the Triton was the longest pigboat of all time built by the U.S. Navy. The USS Halibut, the first pigboat designed and built for the specific intent of functioning as a platform to fire guided missiles.The USS Skipjack was the first nuclear-powered pigboat built with the Albacore hull design. It besides was the first atomic pigboat with a individual propulsion shaft and prison guard. Another first was mounting bow planes on the canvas which reduced flow noise at the bow-mounted echo sounder. Deep-diving and high velocity capablenesss were the consequence of HY-80 building and a new reactor design, the S5W. This reactor became the U.S. Navy & # 8217 ; s criterion until the Los Angeles category joined the fleet in the mid-1970 & # 8217 ; s. In 1956, Admiral Burke, so CNO, requested that the Committee on Undersea Warfare of the National Academy of Sciences study the consequence of advanced engineering on pigboat warfare. The consequence of this survey, dubbed “ Project Nobska ” was an increased accent on deeper-diving, ultraquiet designs using long-range echo sounder. The USS Tullibee incorporated three design alterations bases on Project Nobska. First, it incorporated the first bow-mounted spherical echo sounder array. This requited the 2nd invention, amidships, angled torpedo tubings. Third, Tullibee was propelled by a really quiet turboelectric power works.The Permit category was besides based on Project Nobska & # 8217 ; s recommendations. Hull streamlining, decrease in sail dimensions by about 50 % , quieting of the S5W reactor works and an addition in trial deepness all lead to a dramatic progress in undersea operational capablenesss and stealing. The lead ship of this category, the USS Thresher ( SSN 593 ) , was lost at sea during post-overhaul tests. Lessons learned from this calamity resulted in major design and shipboard operational betterments which still influence the pigboat force.The USS George Washington ( SSBN 598 ) was the universe & # 8217 ; s first atomic powered ballistic missile pigboat. Arguably, it can be considered the pigboat that has the most influenced universe events in the twentieth Century. With its entry into the service in December 1959, the U. S. immediately gained the most powerful deterrent force conceivable & # 8211 ; a stealing platform with tremendous atomic firepower.The Sturgeon category was an extension and betterment on the Permit design. This category of 37 pigboats became the workhorse of the fleet organize the mid-1960 & # 8217 ; s through the 1980 & # 8217 ; s when the Los Angeles category entered the fleet in big Numberss.The USS Narwhal ( SSN 671 ) was built as the paradigm platform for an ultra-quiet natural circulation reactor design. This allows for operation with the big H2O go arounding pumps, a major beginning of radiated noise, secured. It is similar to the Sturgeon design in other respects.The USS Glenard P. Lipscomb ( SSN 685 ) was the U.S. Navy & # 8217 ; s 2nd paradigm design utilizing a turbo-electric power works similar to the Tullibee. While this design is quieter, it is heavier and larger than conventional thrust trains. Those disadvantages, along with dependability issues led to the determination non to use this design on a broad graduated table.The Los Angeles category presently serves as the “ anchor ” of the pigboat fleet and is likely to stay so good into the twenty-first Century. These pigboats are faster, quieter, and far more capable than any of their predecessors. Subsequently ships in the category have incorporated design betterments particularly in echo sounder and electronics countries every bit good as the add-on of external sail missile launch tubings. Another consideration in the early 1920 & # 8217 ; s was the usage of a pigboat to send on deploy aircraft. Submarine S-1 was the first U.S. pigboat fitted out and extensively tested with a little lookout plane.The Cuttlefish was fundamentally an Americanized Submarine. This design incorporated the first complete dual hull in a U. S. pigboat and had a 11,000 nm radius at 19 kts..The S-class boats were used as the trial platforms for scope of echo sounder designs tested in the 1920 & # 8217 ; s and 1930 & # 8217 ; s. Higher frequences and little trainable transducers allowed for narrow beam breadth and exclusion of natural sea noises and other intervention.The Porpoise ( SS-172 ) category was the first all-electric thrust pigboat, and the precursor to the World War II fleet pigboats. With its new Diesel engine this design had a maximal surface velocity of 19 karat. Auxiliary Diesels avoided the demand to run out the battery while operating surfaced. This decreased battery bear downing rhythms form 150/year or 30/year, greatly widening battery life.Gato ( SS 212 ) provided the paradigm design for the World War II vintage pigboat. Construction of this category was accelerated in 1940 due to the escalation of the war in Europe. In order to increase production capableness the Manitowoc Shipbuilding Company in Wisconsin was contracted to construct pigboats under licence from Electric Boat.The coming of the pigboat bathothermograph ( SBT ) in 1942 provided the undersea force with an of import tool for covert patrol operations and onslaughts. Herring ( SS-233 ) was an early illustration of the successful application of the SBT.Within two old ages of the terminal of the war, the U. S. Navy had a functional snorkel mast on an operational, high-velocity pigboat & # 8211 ; the Irex ( SS 482 ) .The Tang was the first pigboat designed for submerged public presentation instead than surfaced velocity and handling. Key characteristics included taking the deck guns, streamlining the outer hull, replacing the victimizing tower with a canvas, put ining new propellors designed for submerged operations, put ining more air conditioning and a snorkel mast, and duplicating the battery capacity.In 1951, the pigboat force achieved another of import milepost. Guavina ( SS 362 ) used an experimental searchlight echo sounder to separate the sound of signature of Seacat ( SS 399 ) and the fleet jerk Salinian ( ATF 161 ) at scopes of 9-10 nanometer.The experimental pigboat Albacore ( AGSS-569 ) introduced the typical teardrop form hull, which has influenced all follow-on pigboat designs. This design provided for major progresss in noise decrease, submerged velocity and the usage of low C ( HY-80 ) as a structural steel. It besides tested the first fibreglass echo sounder dome, installed in 1953. The first war vessels built with a teardrop form hull were the Barbel ( SS 580 ) category. This category was besides the first to integrate a centralised agreement of ship controls and combat operations, or “ onslaught centre ” .The USS Nautilus represented a watershed for the U.S. Navy & # 8217 ; s pigboat plan. This was the universe & # 8217 ; s first nuclear-powered pigboat, a design betterment which allowed for a dramatic addition in scope and operational flexibleness. The Nautilus is besides credited with coercing the shipwrights to develop an improved quality control plan.The USS Seawolf was the first and merely submarine built with a liquid metal atomic reactor. The liquid metal ( Na ) provided a more efficient power works, but posed several safety jeopardies for the ship and crew.The SubmarinerMerely a submariner realizes to what great extent an full ship depends on him as an person. To a landlubber this is non apprehensible, and sometimes it is even hard for us to grok, but it is so!A pigboat at sea is a different universe in herself, and in consideration of the drawn-out and distant operations of pigboats, the Navy must put duty and trust in the custodies of those who take ships to sea.In each pigboat there are are work forces who, in the hr of exigency or hazard at sea, can turn to each other. These work forces are finally responsible to themselves and each to the other for all facets of operation of their pigboat. They are the crew. They are the ship.This is possibly the most hard and demanding assignment in the Navy. There is non an blink of an eye during his circuit as a submariner that he can get away the appreciation of duty. His privileges in position of his duties are about ludicruously little, however, it is the goad which has given the Navy its greatest seamans & # 8211 ; the work forces of the Submarine Service.Dolphinfishs, the insignia of the United States Navy Submarine Service, identifies the wearer as “ qualified in pigboats ” . The enlisted insignia is a silver pin, while the officer & # 8217 ; s insignia is a bronzy gold-plated pin. Both signify completion of about on twelvemonth of strict making.The pigboat insignia, designed by Capt. Ernest J. King, was adopted in March 1924. It is a bow position of a pigboat proceeding on the surface with bow planes rigged for diving, flanked by mahimahis in a horizontal place with their caputs resting on the upper border of the bow planes. The mahimahis on this insignia are symbolic of a unagitated sea and are the traditional attenders of Poseidon, Greek God of the sea.In more recent times, insignias for specializer officers in the pigboat force have been developed. These include the Engineering Duty dolphins, Medical Officer mahimahis, and Supply Corps dolphins. Regardless of the pin or the insignia at the centre, mahimahis are worn with pride by members of the Submarine Force.Following the tradition of the “ World War II ” patrol pin, the Ag Polaris Patrol Pin is worn by SSBN crews both officer and enlisted. It recognizes their forfeit and difficult work in finishing strategic patrols. On gilded star Markss each patrol completed. A silver star Markss five patrols. Upon completion of 20 patrols, a gold patrol pin is authorized. The individual on active responsibility, officer or enlisted, with the most deterrent patrols is presented with the Neptune Award. That individual retains the award until person else attains more patrols than the current holder or until he retires and it goes to the member with the following highest figure of patrols. I'm Ruth! Check it out
There are different triggers for those diagnosed with Lupus, and a common trigger is sunlight. What is it about the sunlight the causes the body to start attacking itself? Does the body not know how to process vitamin D? Does it wear them out faster by dehydrating them? Is there a scientific explaination for Lupus sun triggers? 1 Answer 1 Very interesting question. Thank you. The pathophysiology of photosensibility in lupus patients is related to the effect of ultraviolet radiation (UVR) on cells of the immune system. UVR stimulates lymphocytes recruitment and antibody-mediated cytotoxicity, which are involved in the pathogenesis of lupus. The mechanisms by which ultraviolet-A (UVA) (320–400 nm) and ultraviolet-B (UVB) (290–320 nm) induces photosensibility are however different. Following picture provides a good overview of our current understanding: enter image description here Recently, a review written by Kim et al (from which the above figure was taken), addressed the issue of photosensibility in patients with cutaneous lupus erythematosus. The paper is open-access if you wish to have further information (in particular on the possible treatments): Kim A, Chong BF. Photosensitivity in Cutaneous Lupus Erythematosus. Photodermatology, photoimmunology & photomedicine. 2013;29(1):4-11. doi:10.1111/phpp.12018. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3539182/ • Wow! Thank you for such a very thorough answer with a a helpful image to boot! This helps me understand the dangers of UV rays a whole lot more. Thanks. Sep 18, 2016 at 1:53 Your Answer
How Big Publishers Failed to Capture the Value of Data Posted on Jan 28, 2019 - By Martina Bretous Data is the powerhouse behind every big company. Without it, you’re operating without a clear direction or set destination. In spite of this, the term “big data” is relatively new. It refers to an old concept of harnessing data and analyzing it to make better strategic decisions. Data collection sources are vast and present in every aspect of a company, from financial transactions and revenue reports to marketing campaigns and social media. However, it’s not enough to simply collect the data – that’s only the first phase. The more complex part is interpreting it in order to uncover trends, understand inconsistencies and design strategies to improve your business. Too many companies fail to utilize the data they have to reduce costs, expand user reach and optimize product offerings. Data Is the Driver One of the most important types of data available is consumer data. Businesses collect this type of information at all levels when connecting with a consumer, whether it’s when a user lands on their social media page or after they make a purchase. Analyzing users’ behavior during these interactions is key in identifying potential pain points and discovering underutilized areas. Using consumer data is also how companies create predictive models for existing and upcoming products. One good company to examine is the online streaming service Netflix. Its entire business model centers around big data. The site uses analytics from user activity to predict what users might want to watch, and updates it to match ever-changing demands. This drives everything from show and film recommendations to the creation of original series for the platform. These services are not based on intuition, but rather on the data that promotes Netflix’s growth. Mining for Data Gold The same concept utilized to create the prediction algorithms on Netflix also applies to marketing. Many companies have an easy market entry that allows them to grow in popularity quickly. Advertisers often rely on outdated methods that focus on broad user segments instead of bringing it down to the granular level. However, when the market becomes saturated with similar business models, it’s harder to stand out. BuzzFeed, known for producing viral content, is a great example of a lack of optimal data utilization. The internet media company failed to leverage the vast amount of data they had to increase their revenue streams. This led to a 15 to 20 percent revenue shortfall in 2017, followed by employee cutoffs and a plan to restructure their advertising department. With data mining tools like machine learning and artificial intelligence, advertisers can now build marketing campaigns at scale that target specific users at the right time. Moreover, this is done at a much faster rate than before. While it may be difficult to keep up with constant changes in the online landscape, the insight you can obtain will prove to be invaluable. Sustainability Through Data The reason why many tech companies succeed in the way they do is due to the value they place on data analysis. Regardless of the type of service a business may offer, its sustainability in today’s market is highly contingent on its ability to leverage data to advance business goals. Recent studies show that almost a quarter of businesses don’t perform proper analysis on the data they have. This might be due to a lack of structure in what they wish to gain from their data. Having specific business goals when performing data analysis is very important, as it creates a framework from which the data can be understood and analyzed. When you already have structured data in place, your unstructured data will serve as a way to support your current business model or help restructure it. Another big obstacle that companies face with data collection and analysis is a lack of system integration. Many businesses use several software systems that do not communicate with each other, which leads to duplicate data and slow processing. The effects of this can usually be felt not only in the data, but especially in the company’s day-to-day functioning. Integrating data is a huge undertaking for a company, because it requires synchronizing data in varying formats and legacy systems. A company may also struggle with storage capacity and an unfamiliarity with data management. With a detailed strategy that is managed by a project leader, companies can homogenize their data into one system and begin to handle inconsistencies. Ultimately, if companies continue to ignore the value that data brings, they will fall behind in doing what’s most important: meeting consumers’ needs.
Business, Legal & Accounting Glossary Definition: Arrest Quick Summary of Arrest Seize (someone) by legal authority and take into custody. To arrest someone is to apprehend that person, sometimes forcibly, in order to bring him to answer for criminal charges, or else to prevent an imminently certain ‘breach of the peace’. The term ‘arrest’ is morally neutral; anyone intentionally deprived of his liberty is thereby arrested, whether for good reason or bad. As a consequence, while one might argue whether or not an apprehended party was lawfully arrested, it would be very much incorrect to say (assuming an unlawful arrest) that the apprehended party was never arrested at all. What is the dictionary definition of Arrest? Dictionary Definition A situation in which the police detain a person in a manner that, to any reasonable person, makes it clear she is not free to leave. A person can be “under arrest” even though the police have not announced it; nor are handcuffs or physical restraint necessary. Questioning an arrested person about her involvement in or knowledge of a crime must be preceded by the Miranda warnings if the police intend to use the answers against the person in a criminal case. If the arrested person chooses to remain silent, the questioning must stop. 1. to take into custody 2. the act of apprehending (especially apprehending a criminal) 3. A check, stop, an act or instance of arresting something. 4. The condition of being stopped, standstill. 5. legal The process of arresting a criminal, suspect etc. • A check, stop, an act or instance of arresting something. • The condition of being stopped, standstill. • The process of arresting a criminal, suspect etc. • A confinement, detention, as after an arrest. • A device to physically arrest motion. • The judicial detention of a ship to secure a financial claim against its operators. • Any seizure by power, physical or otherwise. • A scurfiness of the back part of the hind leg of a horse. • To stop the motion of (a person or animal). • To stay, remain. • To stop or slow (a process, course etc.). • To seize (someone) with the authority of the law; to take into legal custody. • To catch the attention of. Full Definition of Arrest v. 1) to take or hold a suspected criminal with legal authority, as by a law enforcement officer. An arrest may be made legally based on a warrant issued by a court after receiving a sworn statement of probable cause to believe there has been a crime committed by this person, for an apparent crime committed in the presence of the arresting officer, or upon probable cause to believe a crime has been committed by that person. Once the arrest has been made, the officer must give the arrestee his/her rights (“Miranda rights”) at the first practical moment, and either cite the person to appear in court or bring him/her in to jail. A person arrested must be brought before a judge for arraignment in a short time (e.g. within two business days), and have his/her bail set. A private “security guard” cannot actually arrest someone except by citizen’s arrest, but can hold someone briefly until a law officer is summoned. A “citizen’s arrest” can be made by any person when a crime has been committed in his/her presence. However, such self-help arrests can lead to lawsuits for “false arrest” if proved to be mistaken, unjustified or involving unnecessary holding. 2) to delay the enforcement of a judgment by a judge while errors in the record are corrected. An arrest is the process whereby a person is taken into legal custody by a legal authority. You do not have to be handcuffed or physically restrained to be under arrest. You can be arrested if a police officer sees you committing a crime, the officer has probable cause to believe you have committed a crime (evidence needs to exist not just the officer’s hunch), or the police have obtained an arrest warrant from a judge. After the arrest is the first court appearance, known as the arraignment. At the arraignment the defendant is notified of the charges against them, bail is set, and the court will also notify the defendant of all future proceedings such as the preliminary hearing, pretrial motions and the trial date. Most defendants should talk to a criminal attorney if they have been arrested for a crime. Many criminal lawyers specialize in certain types of crimes. For instance, if you are arrested for drunk driving it is important to talk to a DUI lawyer before making a plea. Examples of Arrest in a sentence The police have arrested a suspect in the murder inquiry. Arrest FAQ's What Is An Arrest? An arrest is the action of police or other authority, or even in some circumstances a private civilian, to apprehend and take under guard a person who is suspected of committing a crime. The term is Frankish in origin and is related to the French command verb Arrêt, meaning “stop”. In many legal systems, an arrest requires mere verbal information to suspects that they are under arrest on suspicion of a given crime; the laying of hands or restraints upon the person of the suspect is usually not required to effect an official and valid arrest. Contrary to popular belief, reading of the Miranda warning or similar information to an arrestee is not required upon arrest. It is required only prior to questioning by a detaining authority, and then again only in the US, most Commonwealth and other common law jurisdictions, and other countries where the right to legal counsel, the right to silence, and the right against self-incrimination have been clearly established. If the crime is serious, the usual procedure followed by police is to take suspects to a police station or a jail where they will be incarcerated pending a judicial bail determination or arraignment hearing. In other instances, the police will issue a notice to appear specifying where a misdemeanor or infraction suspect is to appear for his arraignment. Ordinarily only human beings can be arrested, but recent and somewhat controversial changes to criminal codes have allowed for the arrest not only of the usual “contraband, evidence, fruits, and instrumentalities” of crime, but also of inanimate objects such as money, automobiles, houses, and other personal property under asset forfeiture. Cite Term Page URL Modern Language Association (MLA): Arrest. Payroll & Accounting Heaven Ltd. August 08, 2022 Chicago Manual of Style (CMS): Arrest. Payroll & Accounting Heaven Ltd. (accessed: August 08, 2022). American Psychological Association (APA): Arrest. Retrieved August 08, 2022 , from website: Definition Sources Definitions for Arrest are sourced/syndicated and enhanced from: • A Dictionary of Economics (Oxford Quick Reference) • Oxford Dictionary Of Accounting • Oxford Dictionary Of Business & Management This glossary post was last updated: 26th November, 2021 | 0 Views.
Can a Praying Mantis Hurt a Dog? The subject of whether praying mantises are hazardous to dogs is frequently asked. They aren’t so venomous that they can kill, but the attack is. Dogs are inquisitive pets who may consume insects like praying mantises. The issue is that you may be concerned about whether the bug is dangerous to dogs, especially if they eat it. A praying mantis’ serrated forelimbs might bite or scratch your dog in another situation. Is it going to hurt your dog? A bite or scrape from a praying mantis will not hurt your dog or breeding dog. Because the bug is not poisonous, your dog will not experience any symptoms if it eats it. The praying mantis does not transmit parasites or diseases, so even if your dog gets bitten, he will be safe. Although praying mantises are not harmful to dogs, they can be a source of anxiety. When a dog comes across a praying mantis while out walking or playing, it may try to eat it. This may give the dog considerable discomfort. Praying mantises are considered annoyance insects although they do not carry illnesses. At night, they swarm near lights and enter houses. Are Praying Mantises Harmful to Humans? They are not toxic in general. However, several species in the Mantodean group may contain poisons or venom that can be hazardous to humans and canines. If disturbed or confronted, these insects may deliver a severe bite despite their small size. People who mishandle praying mantises by stroking them incorrectly or lifting them above with their knees bent risk receiving poisonous bites. Do Praying Mantises Make Dogs Envious? Dogs like human attention and care, to the point where they may get envious when another species receives it. Here are some indicators that your dog is jealous: • Growling or aggressive conduct • requesting additional cuddles • Tricking you into paying attention Is a Praying Mantis Capable of Biting? Dogs are not poisoned by praying mantis, although they may bite if they feel threatened. A praying mantis’ mouthparts are serrated and used to grip prey; nevertheless, they are not powerful enough to puncture human flesh. When people try to catch or handle a praying mantis, it will strike in self-defense. A praying mantis bite can cause the following symptoms: • Discomfort and swelling around the incision site redness. • Take your dog to the vet if he or she has been bitten by a praying mantis. If your pet’s bite requires special attention, your veterinarian can inform you. If you’re concerned about infection, bring the insect with you so the vet can identify the species. Because most praying mantis subspecies are non-venomous, your dog is unlikely to be harmed by their bite. There may be no need to be concerned because the bite wound will heal on its own or with some care. Can a Praying Mantis Be Eaten by a Dog? A dog may safely eat a praying mantis. If the bug feels threatened, it may attack or scratch your pet. Although an adult praying mantis is unlikely to be able to kill a healthy dog with its bite, any cut made by the serrated forelimbs may inflict some agony. If your dog finds a praying mantis in its house and plays with it, the bug may be devoured by the dog. The excellent thing is that whenever eaten, the insect is non-venomous, so your dog should be fine and there’s no need to be alarmed. In the worst-case scenario, your dog may swallow the praying mantis without completely eating it, causing stomach pain from the serrated forelimbs clawing the intestines. If Your Dog Eats a Praying Mantis, What Should You Do? There’s no need to be concerned if your dog eats a praying mantis because the bug is non-toxic. If the bug is ingested without chewing, it may cause stomach pain, but there should be no long-term health consequences or cause for alarm. Your pet will not get any infections or parasites from a praying mantis. Because they are non-allergenic, they do not pose an allergy risk. If a praying mantis bites or scratches your dog with its serrated forelimbs, it can cause injury, but this is not a cause for alarm if you take your pet to the clinic right away. The discomfort from the bite will go away in a few days, and there should be no long-term effects on his health. If left unchecked, problems are unlikely to occur, and the wound should recover without the need for intervention by owners or veterinarians. If you’re concerned about infection from the praying mantis’ wound, take it to a veterinarian who can identify the species and determine whether treatment is necessary. Moreover, after getting bitten by a praying mantis, treat the wound with soap and water right away. Apply one aspirin to the afflicted region by crushing it between your fingers. Please pray for pain alleviation. If you’re allergic to aspirin, use an EpiPen alternatively, which doesn’t require a prescription. Within hours after being attacked by a praying mantis, see your veterinarian or a veterinary emergency services provider. It may be their only opportunity to get care before symptoms appear. Why Do Some Dogs and Praying Mantis Have Such a Tense Relationship? A praying mantis may be hostile towards some dogs. Bugs and insects are often seen as toys by dogs, which can be dangerous to a praying mantis. Some dogs like attempting to eat insects. How Can I Tell How My Dog Will React to My New Praying Mantis Safely? The safety of both is a top priority! When first exposing your dog to your new praying mantis, keep them on a leash if you’re not sure how they’ll respond. Keep an eye out for any potentially hostile or too playful behavior in your dog. We hope you learn a lot about the praying mantis from this post since we’ve covered practically everything there is to know about them. If your dog is bitten by a praying mantis, you may now take extra precautions. Please enter your comment! Please enter your name here
Energy Density Comparison of Silver-Zinc Button Cells with Rechargeable Li-Ion and Li-Polymer Coin and Miniature Prismatic Cells Jeff Ortega, Ph.D., Director of Research, ZPower, LLC Ross Dueber, Ph.D., President and CEO, ZPower, LLC Silver-zinc batteries have the highest theoretical specific energy (Wh/kg) and energy density (Wh/L) of all rechargeable battery technologies available commercially today. Rechargeable silver-zinc batteries have been successfully used for decades in military and aerospace applications where high energy and power density are required.  The electrochemical reaction involves the oxidation of zinc to zinc oxide and the accompanying reduction of silver(II) oxide to metallic silver. The reaction at the AgO cathode involves a two-step oxidation (1.8 V and 1.5 V) of two water molecules to form hydroxide anions that migrate to the anode where they oxidize the metallic Zn to form the soluble zincate species before precipitation of the zinc oxide. The electrolyte is an aqueous system containing 35 to 45 percent by weight potassium hydroxide, and the separator has historically been cellophane. Because rechargeable silver-zinc batteries use an aqueous electrolyte, they may pose a reduced flammability hazard when compared with some Li-ion batteries. Therefore, silver-zinc batteries are safer for both the user and the environment. The nominal operating voltage is 1.65 V with end-of-discharge and end-of-charge being 1.2 V and 2.0 V, respectively. Figure 1 shows a comparison of the published literature values for the silver-zinc battery energy density and specific energy with respect to other commercial secondary battery chemistries. In the figure, it can be seen that silver-zinc batteries have the highest specific energy and energy density ranges when compared to the other rechargeable chemistry solutions available on the market, including Li-ion. This increased performance stems from the inherently higher material and capacity densities of the electrodes (shown in Table 1). Figure 1. Specific Energy and Energy Density Values for Several Battery Chemistries From Data Reported in Handbook of Batteries, 4th edition, D. Linden and T. Reddy, McGraw-Hill, 2010. Table 1. Physical Characteristics for Lithium-ion and Silver-Zinc Battery Electrode Materials Reported in Handbook of Batteries, 4th edition, D. Linden and T. Reddy, McGraw-Hill, 2010. Silver-zinc historically hasn’t achieved widespread commercial use due primarily to short cycle life and high cost. New rechargeable silver-zinc batteries developed by ZPower, however, have addressed the limited cycle life issue through 15 years of R&D and now offer a solution today with cycle life comparable to lithium-ion. The high cost of silver remains an issue and is one of the reasons for focusing upon small button and coin batteries where precious metal cost isn’t exorbitant. Global battery technology improvement efforts currently focus mainly upon large format batteries for transportation and energy storage with power density, longevity, and cost being the emphasis.  At the opposite end of the size spectrum, relatively little attention has been placed upon miniature batteries for electronics and medical applications. The miniature battery segment is where silver-zinc technology offers distinct advantages over every other rechargeable battery technology, even lithium-ion. Miniature Battery Comparison The cell performance data used in this report for comparing different commercially available battery chemistries were found on the companies’ websites. The reported energy densities from the different battery manufacturers are compared with respect to size in Figure 2 and with respect to discharge energies in Figure 3. Figure 2. Comparison of Energy Densities with Respect to Volume Figure 3. Comparison of Energy Densities with Respect to Discharge Energy Figures 2 and 3 focus on the smaller sizes that are more comparable to the silver-zinc button cell sizes currently available, up to 600 mm3 and 200 mWh, respectively. From the performance data plotted in the above two figures, it can be seen that the four silver-zinc button cell batteries deliver greater energy density than the equivalently sized rechargeable Li-ion batteries available on the market today. In fact, there are no rechargeable Li-ion options at volumes less than 200 mm3, whereas there are two silver-zinc solutions. For the other two silver-zinc button cell sizes, due to the higher intrinsic material and capacity density of the electrode materials, they clearly exhibit greater energy density performance than the similarly sized rechargeable Li-ion batteries. Also, with regard to cycling data for the Li-ion cells published in their specification sheets, they are given with a condition of only being able to maintain above 80 percent of that capacity for a minimum of 200 cycles.  Typically, Li-ion cells only deliver the rated capacity for the first few cycles, and then rapidly fall to between 85 to 90 percent within the first 100 cycles. Furthermore, the capacity of the Li-ion cells generally plateaus between 80 to 85 percent of their advertised rated capacity before the 200th cycle. In comparison, the silver-zinc button cells maintain greater than 98 percent of their advertised rated capacity for over 300 cycles. It is again clear that AgZn offers a significantly greater capacity density and cycle life performance over current rechargeable Li-ion solutions. Since the Li-ion battery involves the intercalation of Li-ions in and out of their electrode material, they are heavily dependent on interfacial surface area between electrodes.  Therefore, the performance of a Li-ion button cell is directly dependent on the number of layers from how the electrodes are wound together within a jelly-roll configuration; or for the case of the case of the Li-poly cells, the number of electrode layers that can be stacked.  In the case of Li-ion coin cells where the jelly-roll configuration is not an option, a larger diameter with shorter height form factor is preferred. These are the reasons for the spread of Li-ion performance shown in Figures 1 and 2. However for silver-zinc, because of the greater intrinsic electrode materials densities, AgZn battery chemistry is not as sensitive to interfacial surface area, and they can maintain a much higher energy density for these miniature battery sizes (<600 mm3) with their standard planar arrangement, resulting in a distinct advantage in energy density for the silver-zinc batteries at these smaller sizes.  Therefore, silver-zinc electrodes can be utilized in a variety of form factors without a loss in performance. For more information, contact ZPower, LLC at
Larger font Smaller font • Results • Related • Featured No results found for: "". • Weighted Relevancy • Content Sequence • Relevancy • Earliest First • Latest First Larger font Smaller font January 1894 “How to Breathe Properly” The Home Missionary, 6, 1, pp. 8-12. When the previous lesson closed, we had just noted the fact that the general shape of the inside of the chest, and of the organs contained therein is that of a cone right side up. However, it is not the shape of a complete cone, but of what is called a truncated cone; that is, a cone with the point off; a cone which does not end in a point at the top, but yet is considerably smaller at the tope than at the base. And the lungs and heart, the vital organs, completely fill this cavity, so that there is not a particle of unoccupied space there. And as the heart occupies but a very small place, it is evident that almost the whole cavity is occupied by the lungs alone.HOMI January 1894, page 8.1 Now this cone-shaped body formed of the lungs and heart, is not fastened at any placed to any part of the chest. It is connected with the throat by the wind-pipe, but it does not hang from the throat by this. What, then, supports these organs and keeps them in place?—The diaphragm. The diaphragm is as a floor upon which rests this cone-shaped body formed by the lungs and heart.HOMI January 1894, page 8.2 Here is a cut which will show the position and general shape of this cone, and of the diaphragm which supports it. The diaphragm is that apparent band marked d, running across the body just below the heart. Just above is shown the heart, marked A, and just beneat the diaphragm is the stomach, marked D.HOMI January 1894, page 8.3 The diaphragm is an arched, or more properly speaking, a dome-shaped muscle, which forms the floor of the organs in the chest-cavity, and at the same time the roof of the organs in the abdominal cavity. It is thus a lateral, or transverse, dome-shaped position between the inside of the chest, and the inside of the abdomen.HOMI January 1894, page 8.4 Now be sure that you have these points clearly fixed in your minds, then we can proceed to the study of the process of breathing. Bear in mind that the vital organs, lungs and heart, the contents of the chest have the general form of a cone right side up, formed almost wholly by the lungs and therefore capable of expansion, completely filling when at rest, the whole cavity of the chest, and supported by the come-shaped floor—the diaphragm. This is the normal position of these organs.HOMI January 1894, page 8.5 The amount of air taken in at a full breathe, varies of course, according to the various sizes of individuals, but the average is about 230 to 250 cubic inches. Here we stand, then, ready to breathe.HOMI January 1894, page 8.6 Now with the whole cavity of the chest completely filled already by these organs, it is plain enough that in order to get 230 cubic inches of air into the lungs, room has to be made for it in some way. And it is evident enough that in order to make the required room something has to move. Now to make this required room in the right way, to move the right things, in the right way—this is the whole philosophy of right breathing.HOMI January 1894, page 8.7 How, then, shall the necessary space be created for this air which we must have? Shall the cover of this cone be moved? or shall the cone itself be moved? What does nature itself teach in answer to these questions?HOMI January 1894, page 8.8 Let us take the first question first, Shall the cover be raised so as to give the cone, the lungs, the required space in which to expand and receive the 230 cubic inches of air that is required. The cover of this cone is that part of the chest from the tip of the breastbone upward. In other words it is that part of the chest which is formed by the strongest and heaviest ribs, strongly braced both front and rear—by the backbone and the breastbone—and therefore the most rigid part of the whole structure. Now to look at this structure, does it appear as though it was made to be either raised or expanded so as to create 230 cubic inches of space twenty times a minute? Everybody can see that the only possible answer is a decided and emphatic, No. It is true, as we shall see later, that there is a slight movement of these ribs upward at the outward ends, but it is so very slight when compared to the amount of space which must be created, that it is practically nothing.HOMI January 1894, page 8.9 But even though the chest—the cover of this cone—could be raised sufficiently to form the required space, it would have to be done only by drawing the air into the lungs, and by this means lifting the chest. This would bring all the pressure upon the lungs and would require that they do all the work, instead of having them do none of the work as the Testimony states. It would practically make the lungs perform the function of a force-pump with which to lift a weight. But the lungs are not a force-pump, and cannot be made to perform the function of a force-pump without destroying them, and so destroying life itself.HOMI January 1894, page 9.1 The lungs are not muscular tissue at all. They are neither muscle nor flesh; but a sort of texture containing air-cells, with only enough of tissue to hold these cells together and give place for the necessary arteries and veins to keep them alive, the whole forming a texture almost as elastic as rubber and as light as a sponge. The air-cells contained in the lungs of the average man are so numerous that if spread out flat they would cover a space of two thousand square feet—equal to a floor or ceiling 50x40 feet in size. Yet just think, all this 2000 square feet of air surface is contained in the lungs which occupy so little space as to be held in that part of the chest from the fifth rib, or point of the chestbone, upward, in a medium sized man.HOMI January 1894, page 9.2 A single glance at these facts is enough to convince anybody forever that the lungs are not composed of muscular tissue, and are totally incapable of performing any work for themselves. And that therefore no process of breathing or speaking which causes the lungs to do any work in lifting or expanding the chest, can possibly be right. From these facts it is clear that the lungs were never created for any such purpose, and that to make any such use of them is a violation of nature’s law which is the law of God.HOMI January 1894, page 9.3 Before leaving this part of the subject, it will perhaps be well to note the danger and even the damage that is caused by this perversion of nature’s intent in the use of the lungs. The surface of the air-cells in the lungs is a membrane so thin and delicate that when the blood comes up to the inside of it, and the air to the outside of it, the life-property of the air passes through into the blood; yet the blood cannot pass through to the outside. God has made it so.HOMI January 1894, page 9.4 Now it is a principle in nature that when any unusual exertion is required of any organ, nature begins at once to supply whatever is needed that the organ may perform the extra labor, or meet the extra demand, without injury; or if any part is injured, nature seeks at once to repair the injury. This is done, and can only be done, by sending to that place and increased supply of blood, carrying in its corpuscles building material with which to strengthen the organ for the increased exertion, or to repair the injury done. It is a fact that nature will thus fairly work miracles to keep men alive, against continued abuses. And it is a sad fact that she is compelled to do this nearly all the time with multitudes of people.HOMI January 1894, page 9.5 But it is impossible for nature, with safety, to strengthen the lungs to perform the unusual labor that is put upon them by this wrong breathing which tries to lift or expand the chest, as directed in the extract from the Union Signal in the previous lesson. She tries to do it, but cannot; for the very effort which she makes to remedy the evil is itself an injury. Let us examine this: When this unusual exertion, this work which was never intended, is put upon the lungs, of course they are unprepared for it. Nature begins at once to strengthen them for it in the only way possible, that is, by sending an increased supply of blood into the lungs. But if this blood is to strengthen the lungs it can do it only by making the tissue itself stronger. And this must inevitably make thicker that delicate membrane which is the surface of all the air-cells. But as certainly as this is made thicker, the vitalizing property of the air will not as readily pass through into the blood. Thus not enough breath can be taken to keep the blood pure; the blood therefore being deprived of this vitalizing property becomes sluggish, grows more and more impure, which conduces to ill health, breeds disease, and brings death.HOMI January 1894, page 9.6 But the lungs cannot in all cases endure this process, and particularly in those who have much talking or public speaking to do, and then this delicate membrane of the air-cells becomes distended by the increased supply of blood; it is easily ruptured, and then instead of the vitalizing property of the air passing through into the blood, the blood itself comes through into the air, and there is bleeding at the lungs, and this means death. So you see that it makes no difference what nature does in her efforts to build against this abuse of the lungs, it means only death. Not death on the instant, of course, nor in a day, nor in a week, but it means death just the same, sooner or later, and that long before nature’s proper time—precisely as the Testimony expresses it “slowly committing suicide.”HOMI January 1894, page 9.7 Another serious evil in this way of breathing is that it does not allow all of the lungs to be used. This will be noticed further on. So, then, our first question is answered over and over in the negative. The cover of this cone, formed of the lungs, etc., cannot be moved.HOMI January 1894, page 10.1 Then let us turn to our second question, Shall the cone itself be moved? Well, as something has to move in order to provide the space for the 230 cubic inches of air that we must have; and as the cover of this cone cannot be moved sufficiently for this purpose, it follows that the cone itself must be moved. How, then, shall this be done?HOMI January 1894, page 10.2 In describing these organs at the beginning, we found that this cone rests upon the diaphragm as upon a floor. Well, then, if this floor could be lowered this would lower the cone, and this would give space for the expansion of the lungs by the air which would rush in of itself. Now this is precisely what is done in right breathing. This is nature’s way. This is just what God has made these organs to do. And that is why the diaphragm is made as it is, and occupies the place that it does occupy as the floor of the lungs, the base of this cone.HOMI January 1894, page 10.3 The diaphragm, as we have seen, is an arched, or dome-shaped, muscle (as it is arched on all sides), which forms the floor of the organs in the chest cavity,—the lungs, etc.,—and at the same time forms the roof of the organs in the abdominal cavity—the stomach, liver, etc. The drooping sides of this dome all around are formed of muscle which reaches up over the curve toward the center, but does not extend clear to the center. A considerable portion of the center of this dome—the diaphragm—is not composed of muscle, but is simply a sheet of tendon. The drooping sides of this dome, the diaphragm, extend downward along the inner surface of the body to the twelfth rib all around except in front, where it extends only a very little below the tip of the breast-bone; and the edge is fastened all around to the inner surface of the body. By this it is seen that the edge of the diaphragm, or dome, except immediately in front. It is seen also that the drooping sides of the diaphragm—this dome—all around extend downward close to the inside walls of the body.HOMI January 1894, page 10.4 Now the muscles of these drooping sides of the dome-shaped diaphragm contract, and thus draw down the top of the dome which is the floor of the cone that is formed of the lungs, etc. When this floor is drawn down, that which already only fills the cavity where it is, being drawn down into a larger cavity would leave a space all around and over itself from bottom to top, but for the fact that “nature abhors a vacuum. Therefore as this cone is lowered, and begins thus to make room, the air having fifteen pounds of pressure to the square inch outside of the body, rushes through the nostrils into the lungs, and causes them to expand till every particle of this larger space is filled as completely as was the smaller space before the cone was lowered. Thus is created the room for that 230 cubic inches of air which must be taken in at each breath. And you can see that it is all accomplished without a particle of exertion being made by the lungs themselves.HOMI January 1894, page 10.5 Now we have taken this breath in, how shall it be gotten out? Let us follow on and see.HOMI January 1894, page 10.6 It was stated a little while ago that this dome-shaped diaphragm not only forms the floor of the organs in the chest cavity, but also the roof of the organs in the abdominal cavity. And the stomach, liver, etc., fit up under this roof, just as closely as the lungs fit down on the floor above. From this it is evident that when this roof descends by the contraction of the muscular sides of the diaphragm, that which is beneath—the contents of the abdomen—is forced downward also. But the abdominal cavity is completely filled already, and there is no vacant place into which to push the contents of the abdomen. Besides, the abdominal cavity is smaller at the lower part than at the upper.HOMI January 1894, page 10.7 What, then, can be done? That roof is surely descending, and so surely that which is beneath it must be pushed downward out of the way. O, well, it is all right. The Lord has provided for this. It is true that there is no vacant space into which to push these organs. But the Creator made the muscular walls of the abdomen elastic, so that when the diaphragm forces down the contents of the abdomen, these elastic muscles are stretched by the pressure against them, and thus ample room is made for the contents of the abdominal cavity, when the contents of the chest cavity descend by the drawing down of the diaphragm. Then when the muscular contraction of the diaphragm has ceased, and the pressure is taken off from the elastic abdominal muscles, the abdominal muscles naturally return to their former and normal position. This forces the contents of the abdomen back again up against the diaphragm, this carries the diaphragm upward again to its normal position, and this in turn carries the contents of the chest cavity back to their normal position by contracting the lungs and forcing out the air which has been taken in at the previous inspiration. And still it is all accomplished without a particle of exertion being made by the lungs themselves. They are not required to do any work at all, but are wholly passive, subject to the movement of the diaphragm.HOMI January 1894, page 10.8 And thus the abdominal muscles alternating with the muscles of the diaphragm, carry on the motion which alone is right breathing. The principle is that of the blacksmith’s bellows. The weights attached to the lower part of the bellows, draw it down, and the pressure of the air outside raises the valves underneath and the air rushes in and fills the bellows. The blacksmith’s hand upon the lever presses it down, compresses the bellows, and forces the air out. Not the diaphragm corresponds to the weights on the bellows. The abdominal muscles correspond to the lever. And the lungs are the bellows. As the bellows can do no work except as it is moved by the lever, so the lungs can properly do nothing except as they are moved by the abdominal muscles and diaphragm. The lungs, as the bellows, are never active of themselves, but always passive; never act, but are always acted upon.HOMI January 1894, page 11.1 This, though, is normal, regular breathing. But when taking a long, full breath, the fullest kind, there is another motion added to these, that comes only as the consequence of these. It is a slight motion of the ribs.HOMI January 1894, page 11.2 In looking at the course of the ribs, it is seen that from back to front they tend downward, instead of pointing straight around. If the ribs could be raised straight up, so that they should point straight or nearly straight around instead of downward, it would make the chest larger and so make more room inside. Now there are muscles attached to the ribs, and interconnected from rib to rib over the whole chest, which are put there for the express purpose of raising the rib s to the position in which they point nearly, if not quite, straight around. This is so arranged that that deep, full, long breath can be taken which is taken only occasionally, in addition to the normal regular breathing, and which when it is taken should fill every cell of the lungs to its fullest capacity.HOMI January 1894, page 11.3 But, as before stated, this motion is only in addition to the regular motion of the diaphragm and abdomen, and is only the consequence of that motion. It never can be properly made except as it follows the full motion of the diaphragm and abdomen. 1In military tactics there are certain movements that are made in what is called “one time in two motions.” The second motion is always the consequence of the first, and cannot properly be made except as it follows the first. Right breathing is also “one time in two motions.” The primary, original, motion is of the abdominal and diaphragm muscles. The secondary is the rib motion, and is the consequence of the primary, and cannot properly be made except as it follows the primary. And this is the point that is made in the Testimony when it says that “the chest will become broader” by exercising the “abdominal muscles in deep breathing.”HOMI January 1894, page 11.4 Now we do not want this to be a theory in any sense. We want it to be strictly practical. I therefore ask you, Are you breathing right? Are you exercising only the muscles of the abdomen and diaphragm in your regular breathing? Examine yourselves and see. An easy way to detect it is to place one hand on the upper part of the chest and the other on the point of the abdomen, and see which one moves. If only the upper hand moves you are breathing altogether wrong. If only the lower hand moves you are breathing right. If both move, then you are breathing partly right and partly wrong, and must train yourself to breathe so that only the lower hand will move.HOMI January 1894, page 11.5 Then again put your hands upon the sides. If they move out and in you are breathing wrong. And train yourself so that when you breathe in regular breathing there shall be visible only the motion of the abdomen. And in deep, long, full, inspirations only the abdominal motion followed by the rising of the ribs in the expansion of the chest as explained above. The motion of the abdominal muscles is the foundation and key of all. Do not say you cannot bring yourself to it. By diligent and persevering effort you can, for the Testimony says so, and it is so. If you have no teacher, you can help yourself by filling the lungs as full as possible, any way that you can, then holding your breath and forcing all downward. This will help to get your diaphragm in motion. And to help the abdominal muscles to their proper motion, place the thumbs backward, on the sides at the top of the hip-joint, and work the abdomen with the hands. When you have once acquired the proper motion, it will soon go easy enough, and at last it will become so natural that it will go on itself.HOMI January 1894, page 11.6 Larger font Smaller font
How to Jump a Boat Battery – Boat Battery Basics Published Categorized as Boats Boat power systems vary greatly depending on how the owner uses the boat. Therefore, it is tough to figure out your boat’s system as a new boater. However, taking a look at your entire system will give you a leg up should the day come when you need to figure out how to charge a boat battery on the water. Understanding the system is critical to your enjoyment of the boat. Knowing what to do when the boat battery is dead, how to charge it, and figuring out why it died will save the day should you need to jump a boat battery one day. Table of Contents red and black coated wire Battery Basics and Troubleshooting At their most basic level, boat electrical systems are very similar to your car’s. The simpler your boat is, the more like a car or truck it will be.  If your boat has an electric starter, chances are it has an engine alternator. So just like a car, once the engine is running, the motor will also charge the battery back up.  One crucial difference is that some boats use different voltages than cars. While most of them use 12-volt systems with traditional 12-volt batteries, some use 24 or even 48-volt power systems. As a result, you cannot simply jump a boat battery with a different voltage.  An invaluable tool in troubleshooting any electrical problem is a portable multimeter. Having one of these in your toolkit will enable you to test battery voltages to see if you indeed have a dead boat battery. They will also enable you to test electrical circuits, which can be a great help in understanding the battery switches and how your boat is wired. Uni-T B4Q094 UT210E True RMS AC/DC Current Mini Clamp M W Capacitance Tester Cruising Boat Battery Systems The most significant difference between cars and boats is that a boat uses the battery’s electricity for more items. For example, a fishing boat might turn off its motor and fish for a while. While the motor is off, the crew might run a few baitwell water pumps, the stereo, chartplotter, electronics, and the boat’s running lights. All of that stuff is draining the battery. If the crew isn’t careful, they might not be able to start the engine when they’re done fishing. The solution for most boats is to keep two batteries onboard. One battery is solely for the engine—it starts it and charges when the motor is running. This is known as the starting battery.  When the boat isn’t running, the other battery is being used for all of the power needs. It is called the “house” or “domestic” battery. Ideally, if the crew drains that battery, the starting battery will still work and start the engine. The alternator will then work to charge both batteries with the engine running.  House batteries are usually designed differently than starting batteries. They generally are deep-cycle batteries, designed to take deeper depths of discharge than starting batteries are.  The Art of Power Management As you might imagine, things can get complicated with two different types of batteries on board, each with its own purpose.  When you start looking at liveaboard cruising boats, the house battery is more likely to be a house battery bank made up of several individual batteries. These boats are designed to run for a few days away from the dock and without the motor running. How the two batteries or battery banks are separated varies from boat to boat. For decades the standard method was with a simple battery switch. The switch could select OFF, I, II, or BOTH.  Seachoice 11501 Battery Selector Switch, Red, One size Turning the battery switch OFF kills all power to everything. It is imperative never to select OFF when the engine is running. Many owners select OFF when they leave the boat in storage, although this might kill power to essential systems–like the bilge pump–on some boats. Turning the switch to either I or II selects that battery and nothing else. So, for example, if Battery I was the house bank, it could be selected while sitting at anchor or fishing. Selecting BOTH meant that the two battery banks were working in parallel, so power was coming from both, and the alternator was charging both. This is the standard setting for running, but if you left the switch in BOTH all the time, it would eventually drain power from both batteries. If this all seems to you to be complicated and easy to mess up, you are correct. Thankfully, the automatic charging relay (ACR) is a more modern equivalent. The ACR does all the work for you—it senses when the engine is running and charges both, and it isolates the starting battery when the engine is not running. All of this provides a simple solution if you are jumping a boat battery. Usually, the starting battery should be isolated from the house bank. But if you find the starting boat battery dead, you can usually use the house bank as a spare battery for jump starting a boat. Different Marine Battery Chemistries It’s also vital to realize that not all boats use standard lead-acid (LA) batteries. Instead, many variations of LA technology are used on boats and some completely different options. The traditional lead-acid car battery is known as a flooded lead-acid battery. This is because the battery plates are submerged in an electrolyte that you must occasionally replenish with distilled water. Some of these batteries are sealed and dubbed “maintenance-free.” This is still the most common type of battery used as a starting battery.  The liquid electrolyte model has variations, including the Gel and AGM (absorbed glass mat) batteries. These are similar to flooded-cell batteries, but they do not require any maintenance. There are also unique formulations and modifications of the basic LA, like the Firefly batteries from Oasis. This type of marine battery can be more deeply discharged than others. These different chemistries aim to solve some of the most fundamental problems of batteries—they have a limited lifespan that gets shorter and shorter the deeper you discharge them. For the most part, lead-acid batteries do not last very long if they are allowed to be discharged below 50 percent regularly. Some new lithium technologies are being used in boats. The most common lithium battery being used is the lithium iron phosphate battery, commonly referred to as an LFP or LiFePO4 battery. These batteries last much longer and can be discharged very low, sometimes down to 90 percent deep discharge or less. But they also have very particular charging profiles and require a more complex installation and system to work safely.  Each battery installed on a boat will come with limitations. The more complex the battery, the more critical it is to follow those limitations to the letter. Look to the battery manufacturer to provide a charging profile and installation instructions. The choice of which battery chemistry is right for you is beyond the scope of this article. The point, instead, is to emphasize that boat batteries come in a wide variety of shapes, sizes, and chemistries. So before you jump a boat battery, make sure you understand the type of battery you are working with and its requirements.  And one final word of caution—according to BoatUS insurance statistics, one of the leading causes of boat fires is improperly wired batteries. Batteries contain a vast amount of potential energy, and if shorted or wired improperly, they can explode. So be extra cautious that all wiring is correctly installed and that you understand how your system’s selector switch works.  Types of Battery Charging on Cruising Boats Any boat with a motor probably uses an engine alternator to charge the batteries. If there is a starting battery, the alternator will recharge it. If there is also a house battery, the alternator will usually recharge it.  However, large house banks often have many other ways to be charged. Here’s a list of a few ways that you can charge boat batteries. • Engine-mounted alternator or generator • Stand-alone generator • Shore-power battery charger • Renewable sources—solar panels, wind, or hydro generators How to Charge a Boat Battery on the Water So you’ve turned the key, and nothing happens—it looks like you’ve got a dead boat battery. There are basically four ways to jump start a boat. Whether your boat has an outboard motor or inboard, the procedure is the same. Method 1. How to Jumpstart a Boat with Two Batteries If a boat has a traditional battery switch or a modern ACR relay, you should be able to start the engine with the house battery. Turn the switch to BOTH and see if the engine will start. If not, both batteries may be dead. Method 2. Jumping a Boat Battery from Another Battery or a Car Can you jump start a boat just like a car’s battery? If the boat has the same voltage as your other vehicles, usually 12 volts, then the answer is yes. You just have to get the car close enough to the boat for the jumper wires to reach. You could also trying using any spare battery or backup battery, so long as it is fully charged. If you have a good battery, you can use jumper wires and jump the boat just like you would a dead car. Attach the cables correctly, first the black to the dead battery’s negative terminal, and then the red to the dead battery’s positive terminal. Then repeat the process on the good battery. Once the batteries are linked together, you can start the other vehicle’s engine and charge your dead battery for a few minutes.  If you’re familiar with jump starting cars, you know that the frame is used as the negative or ground connector. This is not the case in boats, so make sure that the negative cable is secured to the negative terminal on the battery. All negative electrical connections on a boat come back directly to the negative terminal. Once you’ve connected the cables, the voltage will hopefully climb enough in your battery that you can try to start your engine. If your engine runs, you can disconnect the batteries and go on your way. Use caution to avoid sparking when you disconnect the jumper cables! person holding red and black hand tool Method 3. How to Use a Boat Battery Jump Starter  A more straightforward solution is to use a portable battery jump starter. These are small rechargeable battery packs that store enough electricity to get you going when you have a dead battery. The starter will have jumper cables coming off that attach to your dead battery. Clip them on correctly, with the red one on the dead battery’s positive terminal and the black one on the dead battery’s negative terminal. Then turn the charger on. You can then try to start the boat’s motor. Method 4. Use a Corded Battery Charger If all else fails, you’ll have to get the battery a proper charge. If the boat is equipped with a built-in battery charger, you should be able to plug the shore power cord in and let it sit. Depending on the size of your charge, it might take a few hours.  If your boat doesn’t have its own battery charger, you can remove the battery from the boat and take it home to charge. Portable battery chargers are inexpensive. Just make sure you disconnect it once the battery is topped off.  What if the Boat Battery Won’t Charge? If the battery still doesn’t start the boat after a proper charge, you probably need a new one. Take it to your local auto parts store, where they can plug it into a load tester. It is possible the battery is showing charged voltage but no longer has the capacity to start your engine.  Boat Battery Charged, But No Power What if you have charged the battery, but the engine still isn’t starting? You can usually confirm the state of charge with your multimeter. Place the probes (red on positive and black on negative) and set the dial to DC voltage. A charged battery should read somewhere near 12 volts. If it is closer to 10 volts, it’s likely dead.  If it seems charged, make sure the switches are selected correctly. Do any boat systems have power? Does the engine have a separate switch from the house battery system? Sometimes you just have to step back and make sure the darned thing is turned on! It’s happened to us all.  Dead Battery? Don’t Dispair! When it comes to the basics, not much separates boat battery systems from those you find in your car. That’s good news because it means help is easy to find. You can usually find batteries that will work for a basic engine starting at your nearest NAPA or AutoZone. Plus, they can test your old battery and take it off your hands if it’s shot. You can also find wall chargers to keep your battery in top shape and charge it on your own in most stores.  Finally, dead boat batteries are one of the many reasons you should carry marine tow insurance. In the worst case scenario where you are away from the dock and cannot start your boat, TowboatUS and Seatow will come to their member’s rescue and jump start their boats–a handy service if you find you’ve broken down away from the dock. Boat Battery FAQs Can you recharge a dead boat battery? It depends on the condition and age of the battery and how deeply discharged it is. Like cars, boat batteries do not last forever and will need to be replaced every few years. Also, keep in mind that boat batteries live tougher lives than those in your car, with deeper discharges and longer periods of disuse.  If the battery is in otherwise good condition, you can recharge or jump it. You can either jump start it with cables from a good battery or use a portable jump starter battery pack. Once the boat is running, the engine alternator should recharge the battery as usual. But if the battery does not hold a charge after that, you’ll need to do some troubleshooting and maybe replace the battery. If you’re unsure about the condition of your battery, you can always take it to an automotive parts store and have it load tested. That will tell you if you can simply recharge it or if it needs to be replaced. By Matt C Matt has been boating around Florida for over 25 years in everything from small powerboats to large cruising catamarans. He currently lives aboard a 38-foot Cabo Rico sailboat with his wife Lucy and adventure dog Chelsea. Together, they cruise between winters in The Bahamas and summers in the Chesapeake Bay.
Some People Say That Music Is A Good Way Of Bringing People Of Different Cultures And Ages Together | Band 8 IELTS Essay Sample Some people say that music is a good way of bringing people of different cultures and ages together. To what extend do you agree or disagree with this opinion? Band 8 IELTS essay sample Music has no language. According to many people, music brings people of different cultures and ages closer. I can only partially agree with this statement. Although music is a great way of making people feel light and happy, it is not always necessary that everyone enjoys similar types of music. To begin with, music is enjoyed by people of all ages. In fact, toddlers are also seen dancing to songs they do not even understand. This clearly shows that music has the power to create joy among people regardless of their age, national identities, cultural differences and varied social norms. This is because when music is composed in a way that the beats and lyrics flow in harmony it creates / leaves a soothing and relaxing effect on the listener. As a result / consequently, the person experiences light-heartedness and a deeper sense of joy. However, music does not always bring individuals together. For example, some people enjoy only a specific genre of music. For instance, many teenagers enjoy listening to heavy metal rock music. They do not like it when their parents encourage them to listen to classical music. They might even leave the room when their parents play some soothing, traditional music. Likewise, it is not uncommon for parents to ask their children to listen to rock music via earphones so that they do not have to hear it. Obviously, music does not bring all people together. Rather, it can even create divide. To conclude, music is an excellent way of creating closer bonds among people despite their cultural differences and age gaps. Certain types of music genres are known to relax the listeners even though they might be in a different language. That being said, if someone has a fondness for only a specific form of music, they usually do not appreciate other varieties and thus enjoy the company of only those people who share the same tastes. Manjusha Nambiar Leave a Reply
Support 100 years of independent journalism. 1. Ideas 2. Agora 14 December 2021updated 04 Apr 2022 7:22pm Why social science needs stories Statistics can illuminate the world, but narratives explain why the numbers matter. By Alexander Prescott-Couch In a recent profile in the Atlantic, the journalist Tom McTague described Boris Johnson as being in a “battle to write the national story”. As Johnson sees things, his political success is tied to his ability to convince the public that the story of the past few years is one of Britain’s rise, with the nation coming out of Brexit with more “oomph, impetus, mojo” than when it was shackled to the EU. “People live by narrative,” Johnson is reported to have said. “Human beings are creatures of the imagination.” It is not only politicians who appeal to our interest in narrative. The story form is often employed by journalists, activists, historians and lawyers, among others. For instance, narratives of industrial decline inform our collective understanding of populism, victim narratives influence changing perceptions of social injustices, and the significance of historical events is often illuminated by placing them within broader narrative arcs. Popular understanding is often structured by stories. However, many social scientists and philosophers are suspicious of narrative. Stories tend to simplify complex social realities, aiming at emotional satisfaction rather than accurate explanation. And because stories tend to elicit emotion, they might be thought to interfere with the objective adjudication of evidence. Moreover, since good stories thrive on human drama, narrative explanations tend to focus on the effects of individual personalities and choices, and therefore often ignore structural factors and more sophisticated social scientific theories. Finally, stories encourage bad anecdotal reasoning: good stories are often unrepresentative stories, so they invite us to misunderstand the average experience, as well as to overestimate the prevalence of extreme and idiosyncratic personalities and situations. A more sophisticated scientific approach to understanding society is therefore often thought to avoid stories in favour of sober empirical description, careful weighing of statistical evidence and rigorous causal reasoning. This suspicion of stories fits into broader trends in the social sciences. As the Harvard political scientist Gary King has argued, “The social sciences are in the midst of an historic change, with large parts moving from the humanities to the sciences…” New technologies are generating increasing quantities of diverse, high-quality data, making researchers more sensitive about drawing broad implications from small sets of anecdotes. New statistical methods have been developed to analyse this data, enabling them to identify robust patterns useful to making more precise predictions and causal identifications than any story could support. These changes in data and methods have reorientated the social sciences away from narrative and ethnographic description and towards model-building, prediction, and the identification of discreet causal relationships. These shifts have many benefits. For example, consider Princeton’s Eviction Lab, a team of researchers directed by the sociologist Matthew Desmond that collects and analyses eviction statistics across the United States. The Lab presents its data online with an interactive tool for easy comparison of eviction statistics between locales, allowing for a comprehensive picture of eviction in the US. It also provides analyses of the causes and effects of eviction and links these analyses to current events and policy. For instance, if you want to learn about connections between Covid vaccination rates and housing instability, or the effectiveness of the Biden administration’s temporary ban on evictions, then Eviction Lab can provide rigorous and up-to-date analysis. Stories cannot provide the same kind of precision, scope, or concrete policy guidance. Yet despite the limitations of the story form, a categorical rejection of narrative and more humanistic kinds of social inquiry is mistaken. Such rejection expresses an overly narrow conception of the task of the social sciences, one that ignores forms of humanistic understanding that sophisticated social inquiry can help us achieve. The social sciences should embrace stories. Content from our partners “Unions are helping improve conditions for drivers like me” Transport is the core of levelling up The value of stories for social science can be illustrated by considering Desmond’s Pulitzer Prize-winning book Evicted. Like much of his work for the Eviction Lab, Desmond’s book concerns the processes by which eviction contributes to racial and class inequality. But rather than describing those processes through statistical abstractions, the book consists in a complex narrative made up of an interlinked set of stories of landlords, tenants, judges, case workers and others involved in these processes, all woven together into a novel-like tapestry. What can stories do that more quantitative work cannot? There are three kinds of humanistic understanding that narratives are often thought to promote. First, placing events into a narrative may reveal their underlying meaning or significance. For instance, tenant narratives may help us understand why eviction matters by showing the position it plays in the broader story of tenants’ lives. Sophisticated social inquiry can illuminate not only why things happened but why they matter. Second, sophisticated narratives often encourage us to imagine the points of view and situations of various protagonists and thereby help us understand others through imaginative projection. You might learn a lot about eviction by collecting and analysing statistics, but through imaginative engagement prompted by narrative we are also able to “put ourselves in another’s shoes” and grasp, albeit imperfectly, what it is like to be on the receiving end of an eviction notice or dealing with a recalcitrant tenant. Social science should not limit itself to explaining events; it should also help us understand experiences. Third, narratives may attune us emotionally to parts of the social world. In most sophisticated narratives, we are encouraged to imagine situations not from the perspective of this or that particular protagonist, but from a broader perspective, one analogous to the omniscient narrator often found in fictional narratives. This perspective tends to provoke emotional responses to broader features of the events being described – for example, you might have mixed feelings about exploitative landlords who themselves come from poor backgrounds. These emotional responses are not just non-rational reactions. They can be appropriate or inappropriate, and part of understanding a situation is having the appropriate ones. You have not really understood eviction if you feel indifference to the plight of impoverished tenants or delight at the exploitative strategies employed by clever landlords. Well-researched narratives can tutor these feelings, helping us to come to nuanced and sophisticated emotional responses to morally complex situations. These humanistic aspects of social inquiry are important complements and correctives to the cooler forms of reflective thinking encouraged by quantitative work in the social sciences. While quantitative work has obvious benefits, when it comes to marginalised populations it can encourage what the Harvard philosopher Tommie Shelby has called the “medical model” of social inquiry – research orientated towards identifying interventions that might most effectively alleviate social problems. Due to this focus on intervention, members of marginalised communities can easily come to be seen as problems for political elites to solve. Narrative can humanise individuals that are often conceived primarily as targets for policy nudges and behavioural correction, as objects rather than subjects. This is not to say that narrative social science is perfect in its current form. As the legal scholar Steven Lubet has argued, many social scientific narratives face problems of factual accuracy, generalisability and replicability. What’s more, many narratives are simplistic, playing into popular prejudice rather than challenging conventional wisdom. However, such problems are not problems of the narrative form itself but problems with particular narratives. Social scientists should, of course, question simplistic stories, and they should be careful not to mislead by passing off extreme and idiosyncratic cases as typical ones. These are basic requirements of honest scholarship – accurate description of cases and care with case selection and generalisation. It is here that recent advances in data availability and more sophisticated quantitative methods can help. Statistical analysis can identify unrepresentative cases, direct our attention to unexpected narratives, and suggest telling juxtapositions, helping us debunk clichés and question prevalent assumptions. The sophisticated use of evidence is what distinguishes good social scientific narrative work such as Evicted from the kind of anecdotal making-it-up that many see as polluting our politics and public discourse. Numbers without stories are lifeless, but stories without numbers are flying blind. In short, by integrating narratives into social science, we allow stories to receive rigorous evidential scrutiny while encouraging reflection on the full set of reasons that social analysis matters. Moreover, we offer a means of making social science comprehensible and compelling to a broader public. It is by responding to, rather than ignoring popular stories that social scientists can “take back control” from the politicians, popularisers and other purveyors of simplistic and manipulative story-telling. Alexander Prescott-Couch is associate professor of philosophy and tutorial fellow at Lincoln College, Oxford. This article is part of the Agora series, a collaboration between the New Statesman and Aaron James Wendland. Aaron is Vision Fellow in Public Philosophy at King’s College, London and a Senior Research Fellow at Massey College, Toronto. He tweets @aj_wendland.
Nuke contaminated water from Fukushima may be out of sight but never be out of one’s mind By Zhou Dingxing In 2011, the “3/11” earthquake in Japan caused the meltdown of the Fukushima Daiichi Nuclear Power Plant reactor core, unleashing enormous amounts of radioactive material. The operator of the plant, Tokyo Electric Power Company (TEPCO), decided to pour in seawater to cool the reactor and contain the leakage. And because the used seawater became highly contaminated with radioactive material, TEPCO had to put it in storage tanks. A decade on, the nuclear contaminated water generated by the Fukushima Daiichi Nuclear Power Plant are about 150 tons per day in 2021, and will reach the upper limit of the storage tank capacity of 1.37 million tons in the spring of 2023. According to estimates by the Japan Center for Economic Research, it will cost 50-70 trillion yen (about $400-550 billion) to scrap and decontaminate the reactor, the bulk of which goes to the treatment of contaminated water. So in April 2021, the Japanese government announced that the problem of increasing amounts of nuclear contaminated wastewater would be addressed by dumping it into the sea. On May 18, 2022, the Japan Atomic Energy Regulatory Commission granted initial approval for TEPCO’s ocean dumping plan. After the Fukushima nuclear accident, the Japanese government set up the “Nuclear Damage Compensation and Decommissioning Facilitation Corporation” (NDF), which is an official agency with 50.1 percent of TEPCO’s voting rights, in order to prevent TEPCO from going bankrupt. In other words, TEPCO is now under direct jurisdiction and control of the Japanese government. It is not hard to see that both TEPCO and the Japanese government are the masterminds behind the nuclear contaminated water dumping plan, because for them, this is the most expedient, cost-effective and trouble-saving way. Japan would need to spend only 3.4 billion yen (about $27 million) according to this plan. But the threat to nature, the environment and human life as a result of such reckless actions was probably never on their minds. Nuclear contaminated water is not nuclear treated water Monitoring data collected in 2012 showed that the concentration of Cesium in the waters near Fukushima was 100,000 becquerels per cubic meter, which is 100 times higher than what was detected in the Black Sea after the Chernobyl nuclear leak. Ten years later in 2021, 500 becquerels of radioactive elements per kilogram of weight could still be detected in the flat scorpionfish caught by Japanese fishermen off the coast of Fukushima Prefecture, or five times higher than Japan’s own standards. In the 11 years since the nuclear disaster, one or two thyroid cancer cases have been reported for every 60,000 children in Fukushima Prefecture, much higher than the normal rate. The Japanese government and TEPCO have repeatedly claimed that nuclear contaminated water is “safe” to be dumped into the ocean because it would go through the multi-nuclide removal system (Advanced Liquid Processing System, ALPS). But it is only the radioactive substance called “Tritium” that has reached this standard. And what Japan doesn’t say is that, even after treatment, the water still contains other radioactive substances such as Strontium 90 and Carbon 14 that cause genetic mutation in the ecosystem. Since the release of the ALPS-related report, the Japanese government has not held any briefings or hearings for the public. And in order to justify the dumping plan, the Japanese government contacted citizen and groups to ask them to stop using the words “nuclear contaminated water”, and use “nuclear treated water” instead. Vigorous public relations (PR) efforts have also been carried out to whitewash the plan. In the 2021 budget of the Japanese Reconstruction Agency, PR expenses related to the Fukushima nuclear accident have increased to 2 billion yen (around $16 million), over four times than the previous year figure. The money has been used on professional teams to weaken and remove negative public opinion in Japan and abroad about the nuclear contaminated water through various propaganda programs. Furthermore, TEPCO’s track records for handling the nuclear accident have been filled with deception and distortion. In 2007, TEPCO admitted that it had tampered with data and concealed potential safety hazards in a total of 199 regular inspections of 13 reactors in its nuclear power plants since 1977, including the cooling system failure in the Fukushima nuclear accident. One week after the 2011 nuclear accident when experts had already made the judgment that the cores of Units 1 to 3 of the Fukushima Daiichi Nuclear Power Plant had melted, the company still refused to announce the truth to the public, and instead chose to use “core damage,” a term that was significantly less alarming. With a past so bad it is hard to make one believe that TEPCO will dump “safe” nuclear contaminated water into the sea.  Waves of opposition at home and abroad The Japanese government has so far failed to provide sufficient and credible explanations on the legitimacy of the nuclear contaminated water dumping plan, the reliability of nuclear contaminated water data, the effectiveness of the purification devices, and the uncertainty of the environmental impact. To promote the plan under such circumstances has only brought about wide criticism and questions by various communities in Japan and beyond. Up to 70 percent of the people in Fukushima Prefecture have expressed opposition to the dumping plan. Konno Toshio, former president of Fukushima University, was opposed to advancing the ocean dumping plan without prior understanding at home and abroad, because this plan could affect future generations and must be treated with great caution. The fishery cooperatives and local councils in Miyagi Prefecture, which is adjacent to Fukushima Prefecture, believe that the dumping of nuclear contaminated water into the ocean may affect the safety of local aquatic products and cause significant economic losses to related industries. Already, 180,000 people in Japan have signed the petition to the Japanese government to adopt disposal options other than ocean dumping. Vladimir Kuznetsov, academician at the Russian Academy of Natural Sciences, said that radioactive substances in the nuclear contaminated water can only be partially filtered, and the treated water still contains extremely dangerous radionuclides, which will pollute marine life and spread to the entire ocean through fish migration. This will gravely harm the global marine environment and cause serious harm to the health of people in the periphery. According to a research model established by GEOMAR Helmholtz Centre for Ocean Research Kiel, half of the Pacific Ocean will be polluted in less than 57 days if nuclear contaminated water is dumped at the speed announced by Japan. Voices of justice Japan’s ocean dumping plan of nuclear contaminated water is a serious threat to the marine environment, and it damages marine interests of the neighbors and other littoral countries. It also violates multiple international conventions such as the United Nations Convention on the Law of the Sea, the Convention on Assistance in Nuclear Accidents or Radiation Emergencies, and the Convention on Nuclear Safety as well as principles of the international law. Many countries, including China, have expressed concern over or opposition to it. The Russian Foreign Ministry issued a statement criticizing the Japanese government for not consulting with or providing any related information to its neighbors when the decision was made, and expressing grave concern over Japan’s dumping of nuclear polluted water into the ocean. The South Korean Foreign Ministry summoned the Japanese ambassador to Seoul to make a serious protest against Japan’s unilateral decision while large crowds gathered in front of the Japanese embassy to protest. The International Atomic Energy Agency (IAEA) has launched an assessment of Japan’s plan. The spokesperson of the Chinese Ministry of Foreign Affairs has repeatedly pointed out that Japan’s dumping of nuclear contaminated water into the ocean is extremely irresponsible, and demanded that Japan fully consult with neighboring countries, other stakeholders, and relevant international institutions to find a proper way to dispose of the nuclear contaminated water, before which the dumping into the ocean shall not be initiated. The ocean is a treasure for all mankind and our home for survival. It is essential for sustainable development and our future. To dump nuclear contaminated water from Fukushima into the ocean is a major issue that bears on the environment for human survival and health, it is not just Japan’s internal affairs. Although keenly aware of the grave harm to the global marine environment caused by the dumping of such water into the sea, Japan has attempted to push through the plan without exhausting all other safe methods. Such an opaque and irresponsible approach is unacceptable, let alone trusted by countries in the region and the larger international community. The author is a scholar on international studies. Please enter your comment! Please enter your name here - Advertisment - Must Read On the rationalization of God
0 votes in CBSE by (25 points) How does pollination takes place in salvia. List any four adaptations required for such type of pollination Please log in or register to answer this question. 1 Answer 0 votes by (20.6k points) In Salvia, there is a special mechanism called as lever mechanism or turn pipe mechanism. This favours the pollination method of entomophily where the pollinating agents are insects. When a pollinator probes a male stage flower for nectar, the lever present in the plant causes the stamens to move and the pollen to be deposited on the pollinator. When the pollinator withdraws from flower, the lever returns to their original position. Related questions