text
stringlengths
144
682k
Indicators and ph measurements Indicators and ph measurements Go Back Examples of pH Values The pH of a solution is a measure of the molar concentration of hydrogen ions in the solution and as such is a measure of the acidity or basicity of the solution. Indicators and ph measurements The usual range of pH values encountered is between 0 and 14, with 0 being the value for concentrated hydrochloric acid 1 M HCl7 the value for pure water neutral pHand 14 being the value for concentrated sodium hydroxide 1 M NaOH. It is possible to get a pH of -1 with 10 M HCl, but that is about a practical limit of acidity. Numerical examples from Shipman, Wilson and Todd. An important example of pH is that of the blood. If the pH of the blood gets outside the range 7. If you measure the pH of tap water with a pH meter, you may be surprised at how far from a pH of 7 it is because of dissolved substances in the water. Distilled water is necessary to get a pH near 7. Meters for pH measurement can give precise numerical values, but approximate values can be obtained with various indicators. Image Quality Factors (Key Performance Indicators) | imatest Red and blue litmus paper has been one of the common indicators. Red litmus paper turns blue at a basic pH of about 8, and blue litmus paper turns red at an acid pH of about 5. The measured value for the color change can vary over a range of approximately 4. Neither changes color if the pH is nearly neutral. Litmus is an organic compound derived from lichens. Phenolpthalein is also a common indicator, being colorless in solution at pH below 8 and turning pink for pH above 8.Measurements of pH are important in agronomy, medicine, chemistry, water treatment, and many other applications. The pH scale is traceable to a set of standard solutions whose pH is established by international agreement. pH indicators. Chart showing the variation of . Indicators may be used to measure pH, by making use of the fact that their color changes with pH. Visual comparison of the color of a test solution with a standard color chart provides a means to measure pH accurate to the nearest whole number. pH and how to measure it Knowing the pH value of a solution or fluid is very important for many chemical and analytical tasks and its measurement determines any follow up measurements. Water Testing Instruments - Do Meter Bench Meter Manufacturer from Coimbatore The PHTX pH/mV transmitter is a loop-powered transmitter with a wide range of useful features and programmable options. Five buffer choices are available in two-point calibration mode. The most common method is a pH meter, which involves a pH-sensitive electrode (usually made of glass) and a reference electrode. Acid-base indicators change color in response to different pH values. Indicators and ph measurements Every image quality factor counts. pH Indicators | Thermo Fisher Scientific - US
May 27, 2022 Breaking News Breaf Evidence that there are people who do not get corona Many scientists around the world are studying the phenomenon of workers in the health sectors who are directly exposed to the emerging corona virus, but have not been infected with it at all. Scientists believe that there is increasing evidence that some people are naturally resistant to the emerging corona virus and its variants, according to a report published by the “Daily Mail”. According to data from the British Office for National Statistics, as the infection continues to spread in the new Omicron wave, several cases of people who have managed to stay away from infection have been observed, and these cases are becoming more evident than ever. Scientists say there is increasing evidence that some people are naturally resistant to the coronavirus and its variants. They stress that for reasons that are not fully understood, it is believed that these people were already immune to the Corona virus, and that they remain so even while it mutates. Experts hope that by studying these individuals, they may unlock clues that will help them create a mutagenic vaccine that could fight the virus for good. In America and Brazil, researchers are studying possible genetic differences that might make some people immune to infection. At University College London (UCL), scientists are looking at blood samples from hundreds of healthcare workers who have avoided contracting the virus. When UCSD researchers examined blood samples of health care workers taken prior to the vaccine, they confirmed that they had no antibodies to the coronavirus, meaning they were unlikely to have contracted the infection. However, they discovered other cells in the immune system, called T cells, similar to those in the immune system of people who have recovered from COVID-19. Like antibodies, T cells are created by the immune system to fend off invaders. But while antibodies prevent viral cells from entering the body, T cells attack and destroy them. One theory is that the protection came from regular exposure in the past. This may be through their work dealing with sick people or encountering other, less devastating types of coronavirus, the type of disease that includes coronavirus, of which four strains cause the common cold. Of course, there is a possibility that health care workers may have caught the corona but did not have any symptoms, at the beginning of the epidemic. Another plausible hypothesis is that Covid’s natural resistance, and a possible preventative treatment, lies in the genes. According to official figures, more than 5.4 million people have died since the virus first appeared in China in December 2019. The World Health Organization estimates that the actual toll may be two to three times higher.
All These Little French and American Words… Welcome to the A to Z Challenge When I had the idea of a series , based on these little French and American words that have a different meaning, whether they’re used in France or in the USA, I knew it would be more challenging than my 2015 French Idioms Series. Although my French blogger friend Lectrice en Campagne, an expert in American fiction and also in language, forwarded me several valuable sources of information, we both couldn’t find a French or American word for a few letters. As of today I still miss five words for the letters K, Q, U, X and Z. Unless I find one or you jump to the rescue, I’ve decided to offer a French and American Idiom in place of a word for these letters. So today one French and one American Idioms for the letter This French expression would take its origins in the Middle Ages when people from the lower conditions were called ‘vilains.’ Some believed that the expression is related to the fact that the vilains poked each other around for fun, triggering sometimes more violent fights. Others say that the expression simply means that the vilains, unlike those from the higher society, used their hands and fists instead of weapons when they had to fight. Lastly, the expression would go back to the jeu de paume, the ancestor of tennis. The vilains didn’t have money to buy a racket to play the game and used their hands. Thanks to Wikipedia, you can read here about this old French game. In any case, Jeux de mains had a distinct connection to the vilains. Nowadays this expression is used to warn children who start games that have the potential to switch to violence. It is fairly frequent in France to address children as vilain or vilaine when they misbehave. In addition this expression carries an erotic meaning when used between adults where jeux de mains imply caresses. The rest remains private… Si vous faites quelque chose just in the nick of time, vous vous êtes débrouillés pour le faire juste à temps, à la dernière limite. In  extremis, si vous voulez. If you know of a French or English word starting with the letter J that has a different meaning whether it’s used in France or the USA, please go ahead. Si vous connaissez un mot français ou anglais commençant par la lettre H ayant un sens différent selon qu’il soit utilisé en France ou aux Etats Unis, faites le savoir, s’il vous plait. See you tomorrow with two idiomatic expressions for the letter K, unless you have a suggestion. %d bloggers like this:
In this article, Cancer cells use nerve-cell tricks to spread from one organ to the next, it explores how cancer cells are able to reproduce and spread into the bloodstream and other organs as well. Specifically in Breast and Lung Cancer, the cells are able to create signaling pathways that neurons use, in order to metastasis, or reproduce. I am really interested in going into the medical field so I decided to choose an article that relates to current research. Cancer research relates back to the basics of cells, which is such a crucial foundation to learning biology. I found it interesting how this article spoke about cell reproduction and organic compounds as well. It is neat to learn about current research after learning the fundamentals of biology throughout this unit.  Sohail Tavazoie, a scientist, found that cells located in the inner blood vessels can tell the cancer cells to metastasize in the tumor. Tumors are able to attach to the body’s nutrient supply and oxygen. I wanted to find out a little bit more about metastasis so I read an article to learn more about it and better my understanding of the process. Metastasis is when cancer spreads to another part of the body from where it started originally. Metastases, the plural of metastasis form when some of the cancer breaks off from the cell and enters the bloodstream. These metastases carry fluid and can form tumors in other locations in the body. Bernardo Tavora, who is a research associate, used a modified version of TRAP, which was developed in Nathaniel Heinz’s lab. This helps to pinpoint subtle differences between cells that are similar and have produced similar proteins. To further develop my knowledge and research of TRAP, I read this articleIn this article I learned that TRAP stands for Translating Ribosome Affinity Purification. TRAP has been used to study the aging of neurons to further research diseases such as Huntington’s Disease. In order to use this technique, scientists needed to understand translation. When DNA turns into mRNA in the nucleus it is transported to the cytoplasm or the ER. This is then recognized by ribosomes and then the ribosomes turn the mRNA into proteins.  Cancer cells replicating Tavora and his colleagues discovered that the signal is Slit2, which is a protein that is made by neurons. Slit2 helps to guide nerve-cell extensions when they go through different parts of the brain. Researchers found that cancer cells use a process to make blood-vessel cells make and release Slit2. This dose helps the cancer cells to start spreading throughout the body, making the cancer worse. The cells activate DNA so that it makes RNA, and then it acts like a signal, which triggers them to move into the bloodstream and other organs. This protein along with other molecules could help with diagnostics. Doctors could identify cancers that have left the primary tumor before it is too late. This could also help develop drugs to stop metastasis in cancer cells.  This topic raketes a lot to what we have learned in biology so far this year. Cancer is made up of cells which can multiply and spread to other parts of the body through reproduction, or metastasis in this case. We learned about Slit2 which is the protein made by neurons, and helps to guide nerve-cell extensions. The cancer cells can use this protein to “trick” and then spread throughout the body by acting like a signal. We also learned that proteins are transported from cell to cell by being released from the plasma membrane. Proteins are crucial for many functions in the body such as speeding up chemical reactions, responding to stimuli, etx.  This article helped me to understand how biology works in research and how the fundamentals are so pertinent to understanding complex research.
2020-11-03 07:47:26 | What are the key swing states in the 2020 election, and who is leading the battleground polls? Story by: Leeanna Faulkner The Telegraph What determines a swing state? Why are they so important? There are six states that everyone has their eyes on in this election, most evident from the money spent on advertising and travel in Trump and Biden’s campaigns. They include the three Rust Belt states that Trump won in 2016. Wisconsin, Pennsylvania and Michigan were once considered the Blue Wall, but Trump managed to turn them red in the last election. Biden is currently ahead in the polls for Michigan’s votes. The state has large white suburbs, union members and black voters. If Biden loses Michigan it’s hard to see how he can claim presidency this year. If it hadn’t have been for Covid-19, Joe Biden would have accept the Democratic nomination at the party’s in Wisconsin. He was keen to show the importance of the state and to learn from his predecessors’ mistakes. Hillary Clinton didn’t visit the state once during her 2016 campaign, and despite polling well there, she lost the state to Trump. See also  2020-10-25 13:30:00 | The six crucial pandemic lessons the government ignored Before 2016, Pennsylvania was a Democrat state with lots of coal and steel communities and deep ties to the trade unions. Donald Trump campaigned hard there in 2016, promising to bring back mining and manufacturing jobs and he’s been doing the same again this year. Joe Biden was born in Pennsylvania, spending his early years in the city of Scranton, where their are now many Biden supporters. The other three states to watch are the southern sunbelt states of Florida, Arizona and North Carolina. Florida is  almost always close in presidential elections. It’s generally a conservative state, but it’s also diverse demographically. Since 1964, the candidate that has won Florida has always won the White House, apart from in 1992. Democrats haven’t won Arizona since 1996, so it’s unusual to be known as a swing state. The growing Latino population, migration from California and changing attitudes from white college educated voters are all important factors that could turn this state blue. North Carolina was once a red state through and through. They elected Republicans in the 80s, 90s and the early 2000s. Patterns changed when Obama won here in 2008. North Carolina’s demographics are changing. Many people from traditional blue states are moving to the tar heel state. The state’s voting habits are divided between urban and rural areas. In 2016, suburban voters turned out for Donald Trump Read more: What time will the 2020 election result come out? The history of swing states See also  2021-02-23 10:30:50 | Merrick Garland says the Capitol riot means we can't 'defund the police.' That makes no sense. Story continues… Source References: The Telegraph Leave a Reply
Powdered sugar, glucose, maltitol, aspartame, sodium saccharin, mangosteen powder, etc. Mesh size: Equipment configuration: Sweetener introduction A sweetener is a food additive that imparts sweetness to a soft drink. According to the nutritional value, sweeteners can be divided into nutritive sweeteners (sucrose, glucose, fructose) and non-nutritive sweeteners; according to their sweetness, they can be divided into low-sweet sweeteners and high-sweet sweeteners. According to its source, it can be divided into natural sweeteners (xylitol, sorbitol, mangosteen powder, stevia, maltitol) and synthetic sweeteners (saccharin, sodium saccharin, aspartame). Sweetener characteristics Sweeteners: sweeteners absorb moisture, stability, different properties due to different materials Applicable models: rotary vibrating screen, ultrasonic vibrating screen, linear vibrating screen, air flow sieve, straight screen Sweetener screening requirements Screening requirements: impurity & agglomeration removal, classification Sweetener production process Production process: crystallization / spray drying Common material screening purpose and applicable models 1. Sugar powder (white sugar crushed): 10 mesh, remove large particles or foreign matter generated when workers unpack bags, theoutput 1.5 tons / hourfor S49-1000 2. glucose: 40 mesh, remove large particles, theoutput 1 ton / hour for S49-1000 3. maltitol: 10 mesh, remove agglomeration, theoutput 800 kg / hour for S4-1000 4. Aspartame: 150 mesh, impurity removal and screening, theoutput 200 kg / hour for WSA-18-65 5. Sodium saccharin: 20 mesh / 40 mesh / 60 mesh, theoutput 2 tons / hour or more for SZF-1030 6. Mangosteen powder: This material has strong moisture absorption, it needs to be sieved in a constant temperature environment, 40 mesh, theoutput is 250 kg / hour for S49-AC-1000 E-mail: [email protected]
Question: Is all chemotherapy platinum based? Does chemo have platinum in it? Platinum compounds, including cisplatin, carboplatin, and oxaliplatin, are some of the most commonly used and active chemotherapy drugs utilized by oncologists today. Which chemo drugs are platinum-based? Platinum-based anticancer drugs, including cisplatin, carboplatin, oxaliplatin, nedaplatin, and lobaplatin, are heavily applied in chemotherapy regimens. However, the intrinsic or acquired resistance severely limit the clinical application of platinum-based treatment. What is a platinum chemotherapy? Platinum-based antineoplastic drugs (informally called platins) are chemotherapeutic agents used to treat cancer. They are coordination complexes of platinum. These drugs are used to treat almost half of people receiving chemotherapy for cancer. Why is platinum used for chemotherapy? Platinum-based drugs are effective against cancer because at their centre is a platinum atom joined to two ammonion molecules and two chloride ions. The compound is negatively charged, but when it enters the cancer cell it becomes positively charged because the chloride ions are replaced by water molecules. Do platinum chemo drugs cause hair loss? THIS IS IMPORTANT:  Your question: Can a benign tumor become cancerous? Is pemetrexed platinum-based? Single pemetrexed is noninferior to platinum-based pemetrexed doublet as first-line treatment on elderly Chinese patients with advanced nonsquamous nonsmall cell lung cancer. How does platinum-based chemo work? Platinum-Based Drugs (Cisplatin, Carboplatin) What is the side effects of platinum? Other common side effects include anaphylaxis, cytopenias (including leukopenia and neutropenia, thrombocytopenia, and anaemia), hepatotoxicity, ototoxicity, cardiotoxicity, nausea and vomiting, diarrhea, mucositis, stomatitis, pain, alopecia, anorexia, cachexia, and asthenia. What is the most powerful chemotherapy? What does platinum resistant mean? Cancer that responds at first to treatment with drugs that contain the metal platinum, such as cisplatin and carboplatin, but then comes back within a certain period. For example, ovarian cancer that comes back within 6 months after treatment is considered platinum resistant. Is platinum better than gold? How many rounds of chemo are normal? THIS IS IMPORTANT:  What is the first test for stomach cancer?
Accessing information and interactive resources available around the globe via the Internet is a pretty simple task. In a carefree Internet world, the dynamics of connecting to resources are transparent, and we expect resources we want to access are available through our local Internet service provider. For most, technical details of connecting to Internet resources are an abstract concept, and whatever mechanics happen behind the scenes is not relevant to our everyday use of the network. Because the Internet is made up of a complex matrix of physical, business, and international relationships, how these systems interact and collaborate is very important to the end user and those providing Internet services and content. Of the greatest concern impacting online resources from eBay to the Bank of America is the potential financial pressure of the largest Tier 1 networks. As the only networks in the world having global Internet visibility, these few companies, including AT&T, Sprint, Verizon, Level 3, and Cable and Wireless, facilitate access to the global Internet – a function which people and companies worldwide depend on to ensure small networks and content providers are available through their local service providers. The Tier 1 world was born at the demise of NSFNet (National Science Foundation Network). In the early days of Internet development, the NSF supported developing an extensive publicly funded academic and research network throughout the United States and connecting many foreign academic networks to the US as a hub through the International Connections Manager (ICM Network). As commercial Internet development grew in the early 1990s, the NSF realized it was time to back away from publicly funding the “Internet” and grant contracts to large US carriers to take over responsibility for the former US Domestic backbone and ICM portions NSFNet. Minor Internet exchange points (IXPs) were also funded, allowing the large networks to take over NSFNet assets, as well as their commercial Internet to connect and share Internet traffic. Those network access points (NAPs) were also contracted to the large US carriers, who managed the US and International network exchange policies. The large US carriers ultimately had control of the networks and were the original Tier, 1 Internet providers. Roadblocks in the Internet Community Debates around net neutrality highlight some underlying issues. The goal of net neutrality is to preserve the open and interconnected nature of the public Internet. But whether the largest networks use their control to hinder growth and innovation within the Internet-connect business community or impede free access to Internet-connected content sources, they have the power and control to present challenges to an open Internet environment. A Tier 1 network, for example, has the power to charge a major content delivery network (CDN) a premium to access its network. This is because the CDN may deliver a considerable amount of content traffic into a network. The Tier 1 network believes they should receive additional compensation to fund the extra capacity needed to support content distribution. This premium may be more money than the CDN is willing or able to pay. In turn, if the CDN doesn’t comply, Tier 1 can ultimately refuse the CDN access to its network and cut its consumer’s access to the CDN’s content. This applies whether consumers access Tier 1 directly or if Tier 1 is the middle network between consumers and their Tier 2 or 3 networks. A voice-over-Internet Protocol Company underscores another potential conflict of interest. Let’s say you’re a consumer of a Tier 1 network that’s also a telephone company, and you want to use a VoIP company, such as Vonage. But Tier 1 doesn’t want the VoIP company to compete with its network and instead use its telephone product, so Tier 1 may prevent you from using your VoIP company. In other words, a Tier 1, in developing its commercial VoIP product, can prevent non-owned VoIP traffic from passing through its network. Breaking Down Barriers One objective in building efficiency and the performance needed to deliver content resources to end users is to flatten existing Internet architecture. Whenever possible, you eliminate the Tier 1 Internet networks from participating in providing content resources to end-users. How do we accomplish this task? One option is through the development and use of commercial Internet Exchange Points (IXPs). In this location, many Internet-enabled networks and content resources meet to interconnect with each other as peers. According to Wikipedia, an IXP is a physical infrastructure that allows different Internet Service Providers to exchange Internet traffic between their networks (autonomous systems) using mutual peering agreements, allowing traffic to be exchanged without cost. An IXP is essentially a physical switch in a carrier hotel or data center with the capacity to connect thousands of networks, whether content providers or network providers. Today at the Any2 Exchange, an IXP built within One Wilshire, on a single switch, 125 different networks interconnect and can freely pass traffic amongst each other without having to go to a Tier 1 for routing. Members pay a small annual fee to the Any2 Exchange for the one-time connection and then benefit from the “peering” relationships among members of the Internet exchange. Akamai, for example, a prominent content distribution network company that delivers streaming media and movies on demand, can connect to American Internet Services, a Tier 3 ISP in San Diego, Calif., through a local or regional Internet exchange point such as the Any2 Exchange, the Palo Alto Internet Exchange (PAIX), or other significant exchange points operated by data centers and carrier hotels. When an American Internet Services user wants to watch a movie that’s available on Akamai’s content delivery network, the data is passed directly from Akamai to American Internet Services – and subsequently to the end-user – without transiting any other network. Not only has the goal of being less reliant on Tier 1 been achieved, but the performance is superior because there are no “hops” between the CSP and ISP. Anytime you’re able to cut out the transit network, you increase the end-user experience. Plus, it’s more economical, as in most cases, the CDN and ISP have no financial settlement for data exchanged. The European IXP model, which is more mature and robust than the US model, highlights the critical function of IXPs and how an exchange point alone can help influence the net neutrality debate. In Europe, Internet service providers and content delivery networks look to the IXP as their first connection point, and if the IXP doesn’t have what they’re looking for, they will only go to a Tier 1 or large Tier 2. Americans on the other hand, partially due to geographic size Overall European IXP traffic grew at 11.05%, compared to America’s rate of 7.44%, according to the European Internet Exchange Association in August 2007. This can be attributed in part to greater member density in Europe – the London Internet Exchange/LINX has more than 275 members – where the larger the addressable community, the larger the traffic exchanged and the more the members want to get involved. After all, network effect (exponential growth of a community) and the “Law of Plentitude” (the idea that once an addressable or social community reaches participation by 15% or greater of a total community, it becomes a risk to not participate in the emerging community) motivate European companies to use IXPs. Additionally, Europeans generally have lower entry costs for participation, giving companies every reason to join the IXP-enabled peering community. If one were to buy access to 275 networks through a Tier 1, the cost would be astronomical, but one can access 275 networks for a nominal fee through a single connection to LINX. This is why European companies rely on IXPs 60% of the time and only look to Tier 1 or 2 networks 40%. In contrast, American ISPs typically look to larger wholesale and Internet transit providers first and then consider reducing their operational expenses via an IXP as a second priority. American ISPs companies use IXPs at a more meager 15% rate, looking to larger wholesale and transit Tier 1 or Tier 2 networks 85% of the time. Still, recent American IXP traffic growth does exceed other regions, such as Japan (+5.85% in August) and the rest of Asia (+4.3% in August), which we believe is a result of increased price pressure on the American IXP industry. Newer IXPs, such as the Any2 Exchange, have significantly lowered entry costs, forcing others to follow suit and encourage more networks to participate. As the cost of entry to IXPs continues to fall, participation in IXPs will become more common and attractive to all access and CDN networks. Adding to the Cause For American ISPs that pay anywhere from $20-to- to $40/Mbps when connecting to Tier 1 and Tier 2 networks, the cost of delivering applications and services to end-users who require much more extensive network and bandwidth resources is one of the obstacles that need to be overcome. But without broad participation in IXPs, access networks have a challenging future, as do content providers who will find that the cost of delivery to end users becomes much more expensive if Tier 1 and Tier 2 networks increase the cost of delivering both wholesale and end user Internet traffic. What Can the American Internet-Connected Community Do? Whether through price increases or monopolistic practices, the largest networks are currently writing the rules for a global Internet product. They gradually merge and acquire competition, reinforcing their influence in wholesale and transit network share and presence. Opportunities for network peering decrease with each merger. Carrier hotels and large data centers in the US can support positive change in the Internet peering community by creating or supporting open and low-cost Internet Exchange points promoting network looking and content delivery to all networks.
Science Says You Can Actually Be Allergic To Avocados Unfortunately, sometimes your most-beloved foods can turn against you. If you’re histamine intolerant, and you feel blah after eating your avocado toast, it’s worth exploring whether or not you could be allergic to avocado. Yes, you read that right. Sadly, in addition to allergies to coffee and other foods and drinks, some people can also be allergic to avocado. How can this be? Avocado is an all-natch super food; why would anyone’s body treat this luscious green treat as an invader? It turns out that avocados are high in histamine, which is one of the main culprits of many common allergies. If you develop gastrointestinal issues after eating avocados, and you’ve eliminated the usual suspects from your diet (like dairy and gluten), avocados could be causing your discomfort. Of all the things that can cause allergies, who knew that histamine was hiding in one of life’s last simple pleasures? "Histamines are natural signaling chemicals that our bodies produce and use for all sorts of purposes. They play a role in the release of stomach acid and produce the swelling and inflammation essential to our immune system’s ability to heal infections," Registered Dietician Tamara Duker Freuman wrote for U.S. News & World Report. While this makes it sound like histamine is your BFF, sometimes everyone needs a break from their bestie. "So what happens if someone — particularly someone whose histamine levels already run high as the result of seasonal or environmental allergies — starts eating lots of high-histamine foods?" Freuman asked. You’ve probably already guessed the answer, but I’ll tell you anyway. Seasonal and environmental allergies coupled with high-histamine foods can make you feel icky. "In come cases, [you] may experience an inflammatory reaction within the digestive system that produces symptoms very similar to IBS and GERD: chest tightening, heartburn, bloating and/or sudden onset diarrhea," Freuman explained. "Typically, the symptoms kick in within minutes of eating an offending food. This is called histamine intolerance." What’s more, if you’re not histamine intolerant and breathing a huge sigh of relief, I have more bad news. If you’re allergic to latex you can also have an allergic reaction to avocado because of cross reactivity, which means you could be reacting to an avocado that has been handled by someone wearing latex gloves, according to Healthline. "Symptoms of latex-avocado allergy include swelling of the lips, sneezing, itchy eyes, and stomach discomfort, including vomiting. You also could have systemic reactions, including hives, and anaphylactic response, like swelling of the airways and difficulty breathing," Healthline reported. However, in this situation, you might be able to avoid having an allergic reaction by washing your fruit thoroughly and choosing organic avocados. This means avoiding eating avocados in restaurants, but the good news is that you won’t have to shun avocados altogether. If you are allergic to avocado, you’ll have to do some detective work to ensure that it’s not present in any of the prepared food you’re eating. Kind of like dairy and sugar, avocado can show up in a lot of places you wouldn’t expect. According to Healthline, avocado is used in a lot of vegan and paleo recipes, it’s a popular ingredient in many baked goods, and is often used as a butter substitute in some recipes. And, if you’re allergic to avocado, you might be allergic to other high-histamine foods like spinach, tomatoes (including ketchup and marinara sauce), pumpkin, eggplant, soy foods, brewer’s yeast, and red kidney beans, Freuman reported. Unfortunately, there’s more to cross off your list. "Avoid fermented, cured or cultured foods: wine, beer, aged cheese, smoked fish, salami/prosciutto/pepperoni, kimchi, sauerkraut, kombucha, miso, tofu, soy sauce, yogurt, and kefir." Spices and sulfites present in some foods can also trigger a reaction. If you are histamine intolerant, Heathline has a low-histamine foods guide that can help you make safe choices. That being said, food isn’t the only place you can find avocado. Your BAE-turned frenemy can also be present in some non-food products like makeup, shampoos, and moisturizers. If you’ve had any of the symptoms associated with histamine intolerance, check with your doctor to see if something else could be causing it before breaking up with avocados for good. #TheMoreYouKnow Source: Read Full Article
Cambrian Explosion #44: Isoxyida They’re generally considered to be more closely related to the true arthropods than the radiodonts were, although their exact position in the arthropod evolutionary tree is uncertain. Usually they’re placed as some of the most basalstem-euarthropods”, while other studies have instead classified them as much more “advanced” euarthropods related to early mandibulates. Isoxys curvirostratus Isoxys curvirostratus is known from the Chinese Chengjiang fossil deposits (~518 million years ago). About 2-4cm long (0.8-1.6″), it was an active fast-swimming animal with large eyes and raptorial front appendages that curled upwards and inwards, suggesting it was a visual-based predator hunting smaller planktonic animals. It may have been a vertical migrator, moving between different depths at different times of day. Leave a Reply
John Arthur Roebuck Rudge Died aged c. 66 John Arthur Roebuck Rudge (26 July 1837 – 3 January 1903) was a British scientific instrument maker and inventor, who lived in Bath, noted for his contributions to the development of moving pictures. He collaborated with William Friese-Greene and, around 1880, he invented a device known as the Biophantic Lantern. This rotated seven square slides around a circular lamp housing, using a movement similar to the Maltese Cross, later found in many film projectors. The light was obscured between images via a pair of ground glass shutters. The only surviving sequence - likely the only one ever made - shows Rudge taking off his own head and putting it under his arm. The trick was carried out by Friese-Greene playing the body. This lantern and the slides are now to be found in the Cinémathèque Française. Over the following decade Rudge came up with a series of magic lantern experiments to try to recreate movement, calling all of these 'Biophantoscopes'. All employed individually posed photographs, rather than images taken with a moving picture camera, and featured changing faces. Wikidata Wikipedia Commemorated on 2 plaques To perpetuate the name and memory of John Arthur Roebuck Rudge who lived for many years in the adjoining house and after numerous experiments conducted in the basement was the first Englishman to produce moving pictures by means of photographs mounted on a revolving drum And also of his friend William Friese-Greene who had his studio at no. 9 The Corridor nearby,the inventor of commercial kinematography, being the first man to apply celluloid ribbon for this purpose. Kinematography can thus be attributed to the labours of these two citizens of Bath where this wonderful invention undoubtedly received its birth. New Bond Street Place, Bath, United Kingdom where they lived Here lived, worked and died Rudge inventor of the biophantascope the precursor of the kinematograph B.1837 D.1903 New Bond Street Place, Bath, United Kingdom where they lived , worked , and died (1903)
The 7 Different Types of Packaging Materials What are the packaging materials Chipboard packaging is made from thin chipboard sheets, which are lightweight and ideal for grocery items. However, chipboard can be susceptible to moisture, which weakens the material and results in discoloration and expansion. Alternatively, you can choose from a variety of plastic bags made from flexible thin plastic film fabrics. Plastic bags are lightweight and suitable for a variety of different products. This article will help you to decide which material is best for your packaging needs. Most types of metals are recyclable. Of all metals used in packaging materials, steel and aluminum are the most recycled. In fact, most metal packaging companies use partially recycled metal in their packaging. The most commonly recycled metal is aluminum, which makes it the most environmentally friendly of all metals. Despite its popularity, however, many consumers are still skeptical about metal packaging. This article will examine the benefits and disadvantages of metal packaging and help you choose the right type of packaging for your product. Food products can interact with metal containers through a chemical, physical, or microbiological reaction. The degree of the interaction depends on the type of food product, its processing, and the metal used in the container. In general, interactions between metal and food products can cause corrosion, perforation, and loss of coating, resulting in the degradation of the food product. Common catalysts used in metal-food packaging include phosphates, plant pigments, synthetic colours, and sulphur compounds. Most metals are used in food packaging, and they are available in pure or alloy form. Their high density and malleability make them suitable for packaging. The high density values and thermal conductivity make them ideal for recycling. They also allow for thermal and magnetic recycling, without losing their original performances. Metals are widely available on the market and can be found in three general categories: tinplate, stainless steel, and coated metal. Unlike paper and plastic, metals are easier to sterilize and last longer. Unlike plastic and paper, metal does not absorb moisture, so it is an excellent option for food packaging. In addition, metal is highly durable and recyclable, so you can recycle it and reuse it again. Its durability is further improved by the addition of a lining. Metal is also more attractive than plastic, which makes it an excellent choice. If you need high quality affordable packaging in VSL Packaging. They provide custom packaging services for packaging boxes, packaging bags and etc. Among the most common types of plastics used for food packaging are PET and OPP films. The former are durable, but the latter are decorative. Metallized films are also better suited for storing and retorting food. Aluminium laminated film is used for bakery products, snack foods, and some food powders. Metalized film is also widely used in high-end packaging materials. You can also find many metal packaging options, including tinplates and foil. The use of paper as packaging material is widespread, but it has its drawbacks. While it is widely used as a packaging material, it lacks a certain amount of barrier properties and heat sealability. Instead, it is impregnated with additives or coated with plastic or aluminium. Paper’s high toxicity can have adverse health effects if it comes into contact with food. There are two ways to measure the amount of toxic substances that make it into food: migration to food and exposure. Different products require different grades of packaging paper. Paper used for packaging products for online stores needs to be of higher quality than those for non-online stores. According to a McKinsey study, 55% of U.S. consumers cite sustainability as an important factor in purchasing decisions. Paper and paperboards are used in corrugated boxes, milk cartons, tissue paper, and folding cartons. This makes them an eco-friendly choice that consumers will appreciate. There are many grades of paper available in the market. Depending on its purpose, paperboard can be food grade or non-food grade. The sulfite type is light weight but has a lower barrier strength than the kraft paper. However, it is commonly used in pharmaceutical packaging. By learning the differences between these grades, you can get the best deal on paper. If you are buying paperboard for your packaging needs, you can check out the following tips to save more money. The strength of paper varies from type to type. Kraft paper is the strongest type and sulphite is the weakest, making it perfect for wrapping biscuits and sweets. Other varieties of paper include greaseproof paper, glassine, and parchment. Some of these types are acid-treated and used for packing fluids. The type you choose depends on what you’re trying to pack. If you have a specific purpose in mind, the paper you choose can be used in your packaging. Cardboard is also used to package products. This type is thicker and sturdier than regular paper. It is often made from recycled content, such as cardboard, and comes in different grades for different uses. For example, paperboard is used to package juice boxes and milk containers. While cardboard is generally considered a secondary packaging material, some businesses choose to use it as the primary material. Aluminum is another popular primary packaging material. A few tips can help you choose the best glass packaging for your product. For starters, try to avoid using too-small or too-large boxes. This can result in cracked glass and void fill. The right size box leaves space for void fill, while corrugated boards provide extra padding. Wooden boxes are also a good choice, but make sure there are no protruding nails. Glass packaging materials are often more fragile than other materials, so careful handling is crucial. Another important factor when selecting the right glass packaging material is the safety of the product. Glass is brittle and easily breaks, which increases the risk of damage and defect. The quality of your product can be harmed by poor production processes. To help ensure safety, glass packaging must be certified by a third-party company. TUV Rheinland offers glass certification services. These certifications provide the consumer with peace of mind, as the materials must pass a stringent checklist to stay in business. There are two types of glass: Type I glass and Type II glass. Type I glass contains 80% silica and 10% boric oxide, and small amounts of sodium oxide, aluminium oxide, potassium oxide, and magnesium oxide. Because of the silica and the oxides in glass, it is resistant to water, air, and insects. In addition, glass has good chemical and thermal shock resistance. Its chemical resistance makes it an excellent choice for packaging a variety of products. Among the various packaging materials, cardboard is one of the most versatile and inexpensive. It can be used to manufacture shipping containers, as well as individual packaging. In addition to its low cost, cardboard is lightweight and easy to transport. Because of its versatility, it can be printed with full-color images, thereby increasing the information content of the package. Another benefit of cardboard is its environmental friendliness. Since it can be recycled, it can serve as a secondary raw material. In terms of performance, cardboard has several advantages over plastics. It has low weight and high permeability to gas and moisture. It is also inflexible, and its resistance to mechanical and chemical influences is low. However, the price of domestic cardboard is often low, resulting in inferior packaging. Compared to plastic, cardboard is more environmentally friendly, consumes less energy and resources, and is a more sustainable material. Cardboard is also easier to print on, allowing it to carry almost any image. The adhesive of corrugated cardboard is composed of starch grains. Starch is a sticky substance, and water acts as its solvent. It is composed of 73 percent water and 12% starch that has been molecularly bound. Glue adheres to the starch molecules through a process called gelatinization. Using water as a solvent helps starch set. The glue has a high water content, so that it can set quickly. Unlike plastic, cardboard is 100% recyclable. It is safe for all types of products, and can be recycled. It is produced by pressing pulped fibres and compressing them into a wide roll. The paper is then sent to corrugating plants to be flattened and shaped into cardboard. Once this is completed, the cardboard is ready for shipping. This process has many advantages and is a good option for the environmental conscious packaging industry. Cardboard can be divided into two types, kraft liner and corrugated liner. The kraft liner contains at least 80% hardwood pulp fibers. Kraft liner is the highest quality of corrugated cardboard base papers and is the most durable. It is also moisture resistant, making it an excellent choice for transportation packaging. There are also different kinds of labels available for corrugated cardboard, including bar code, UPC, IBM, shrink label, and color envelopes. Despite its versatility, plastics are relatively inefficient at recycling. The low melting point of plastics prevents contaminants from being driven off during the heating process. While government regulations encourage recycling of plastics, rates vary widely across the world. Only northern European countries achieve recycling rates above 50%. Nevertheless, some packaging materials are more recyclable than others. This article will discuss the benefits and drawbacks of plastic packaging and how it can be recycled. In general, the process of recycling plastic waste involves breaking down the discarded product into chemicals that can be further recycled to create fresh plastic. While feedstock recycling offers greater recycling, it is associated with higher energy and capital costs. In some cases, waste plastic can be burned instead of using fossil fuels to generate electricity. However, this practice is highly controversial, and it is the predominant method of disposing of plastic waste in some countries. Polyethylene and polypropylene are among the most commonly used plastics for packaging food. These materials combine a range of properties, including strength, flexibility, and lightness. They are also suited to recycling. Further, plastics are biodegradable and can be recycled. In addition to being recyclable, polyethylene and polypropylene are also very easy to process. Hence, they are the most popular plastic packaging materials While some may think that wood is not a good material for food packaging, that is simply not true. Wood has some advantages over plastic. It is strong and customizable, making it a great choice for pallets, custom crates, and hybrid solutions. Because wood is so durable, it is a good choice for heavy, bulky products. It also offers space-efficiency, allowing it to be stacked during transportation. Although wood packaging materials are widely used, there are concerns about the introduction of disease organisms and pests. Because wood packaging materials are often derived from recently-cut trees, they have the potential to carry live insects and pathogens. Most non-native bark and wood-infesting insects likely arrived in these materials via wood packaging. To combat this concern, the United States committed to enforcing ISPM-15 standards. These standards require wood packaging materials to be heat-treated and fumigated with methyl bromide before export. Despite its popularity, wood packaging is subject to strict regulations. Many countries have imposed strict rules regarding the importation of wood packaging material. In the United States, for example, U.S. Customs can confiscate or destroy wood-based packaging materials and make the owner pay a fine. This means that it’s best to avoid wood-based packaging materials if possible. But how do you choose which wood-based material is right for your business? ISPM 15 is a comprehensive set of requirements for packaging made from wood. Wood packaging material must be certified to meet ISPM 15 requirements. ISPM 15 certification has three mandatory elements: an ISO country code, an ISPM15 certification mark, and a corresponding ISPM 15 compliance stamp. This stamp will identify the source of wood packaging material and allow for paperless verification. The ISPM 15 mark is widely recognized and permanent. Some other packaging materials may be considered as alternatives. Wood industry products, such as plywood and corrugated paper, are cost-competitive with WPM. However, their recycling and disposal capabilities may be inferior. Other alternatives, like processed wood, could cost up to four times as much as wood-based pallets. This may make the choice between wood and processed wood more attractive for a given business. However, companies should consider the cost-benefit ratio. Aluminum is a metal with many benefits. It can be used in a variety of different packaging materials, including rigid, flexible and semi-flexible containers. In food packaging, aluminium helps preserve freshness and protects from radiation, moisture, oils and microorganisms. This metal is also commonly used in pet food packaging. There are three major grades of aluminium: AA 8006, AA 8011, and AA 1235. This metal is recyclable, which means it can be used for a number of different applications, including food and beverage packaging. It is highly durable and can be easily formed into many different shapes and sizes. It does not break easily in transit, which makes it the perfect material for packaging food, beauty products, pharmaceuticals, and other products. Furthermore, over 75% of all used aluminium is still in circulation, so it is infinitely recyclable. Aluminium packaging materials can be recycled at any time, and it can even be used for packaging of hazardous materials such as chemicals and petroleum. Several manufacturers use aluminium in food packaging. This material is used to provide a barrier against food odors, moisture, and heat. It also offers a wide range of decorative properties. A large advantage of aluminium packaging is that it can be custom-designed for the individual needs of customers. Its flexibility allows producers to make a variety of different shapes, including boxes, tins, and jars. Because of these benefits, it is one of the most versatile packaging materials available. Paperboard is made of wood pulp and is 100% recyclable. It is a versatile packaging material, which can be printed, embossed, creased, folded, and glued. It is an excellent choice for packaging liquids and other goods, including foods and fragrances. It can also be coated with an antistatic chemical for food-safe packaging. For more information, read about the benefits of paperboard. Here are some of the benefits. The most common use for paperboard is in rigid cartons, milk cartons, and wraps. These products require a high barrier to extend their shelf lives, so they are typically treated with polyethylene on both sides. Various grades of paperboard are available, each with its own strengths and weaknesses. Read on to learn more about the advantages and disadvantages of different types of paperboard. When choosing a packaging material, consider how it will affect your product. Paperboard is an effective packaging material for a wide range of products. It is used in corrugated boxes, rigid paper boxes, lightweight infusible tissues, and for food distribution. Today, paperboard accounts for one-third of the world’s packaging market. It is used mainly for containment, convenience during storage, and communication of relevant information to consumers. If you are considering the benefits of paperboard, read on! Fluted fiberboard Fluted fiberboard is a type of corrugated board that is composed of two or more layers. Its outer layer is made from paperboard and the inner layer is made of foam. This material can be easily cut and shaped to fit the product being packed. There are three primary elements to corrugated board: weight, flute type, and the inner liner. Each of these components has its own role in corrugation and packaging. In manufacturing corrugated boxes, solid fiberboard and fluted fiberboard, these materials are laminated to form a container. The corrugated layer is used as a backing sheet for padded writing paper. It also forms the center ply or plies of solid fiberboard boxes. Fluted fiberboard has a dry finish, which means it is not dampened before its final manufacturing process. There are several types of fluted fiberboard. One type has three fluting rows, while another has two or four. Both flutes have varying sizes, but they all have the same purpose of protecting the product. Depending on the application, a fluted fiberboard box is suitable for packaging items weighing more than 150 pounds. A fluted fiberboard box has a rigid interior that will protect the product when it is shipped. Leave a Comment
Oxygen airlift links ozone depletion and Greenhouse gas problems Many people do not know that ozone depletion is considered a cause of global warming as well and it is very significant. The Ozone-Oxygen cycle absorbs UV radiation UVB and UVC. Because the Ozone layer is depleted, this heat is getting through because Ozone is formed by default where UV can get through to oxygen. The reason this causes warming is that when UV hits oxygen or ozone at any altitude, the UV is converted to heat energy. (Madronich). If the reaction happens lower down then because it did not happen higher up, it comes with a heat conversion and heat product. For every 1% of ozone depletion the calculation has been made that a 2% increase in temperature is happening. It is estimated that the ozone column on average is now 6% depleted in 2018, so that would translate into a 12% temperature rise, which would roughly translate into an average of 1.68 degrees in a world where average warming has already increased the temperature by 1.5 ‘C and is approaching 2’C. Almost all of the warming is accounted for in this simplified way, but the temperature anomaly is not even in distribution because the poles have greater ozone depletion than the tropics, yet we still see a close correlation. With this kind of an ozone layer depletion baseline, and the addition of the heat being added from elevated methane levels, elevated CO2 we need to be thinking about what can we reverse. So far, with an oxygen airlift to the ozone layer we could reverse the ozone depletion and with enough oxygen, we could destroy significant amounts of methane and significant amounts of  all our synthetic greenhouse gases. Next week (August 25, 2018) we will have the logistics presentation for the oxygen airlift posted, contributed by engineer and contractor, Donald Hugh D’Arcy Evans, from Rushden, UK. Leave a Reply WordPress.com Logo Twitter picture Facebook photo Connecting to %s
Reducing Water Costs in Building HVAC Systems The HVAC system is the largest user of energy and water in typical commercial buildings. In the past, energy costs overshadowed water costs. Recent droughts and the need to expand municipal water supplies to support growth have led to increased water costs nationwide. Combined with the focus on water conservation in green buildings, the payback associated with reducing building water usage is greater than ever. Most commercial buildings use water cooled chillers to provide air conditioning because they are much more energy efficient than air-cooled chillers. Achieving these efficiencies, however, requires large quantities of water to operate a cooling tower. Most buildings also use re-circulating hot and chilled water loops to distribute heating and cooling throughout the building. Although not designed to routinely use water, these systems can use large amounts of water if undetected leaks occur. As the major consumer of water, the building HVAC system is an obvious target for water conservation efforts and often provides significant savings. Water Meters Water meters are a valuable tool for troubleshooting operational problems in cooling towers and closed loops systems and benchmarking water efficiency improvement projects. It is recommended that water meters be installed on the makeup water and blowdown line of cooling tower systems and on the makeup water line to the closed heating and cooling loops. Water Savings in Cooling Tower Systems Cooling towers are mechanical devices that reject heat by evaporative cooling. Approximately 0.1 percent of the water circulated through a cooling tower is lost to evaporation for each degree (ºF) the water is cooled. As a point of reference, a 400-ton water cooled chiller operating at a 30 percent load year-round requires almost 1.9 million gallons of makeup water just to replace evaporation losses. Because dissolved minerals in the evaporated water are left behind to concentrate in the remaining water, a portion of the tower water must be routinely discharged as blowdown. Without blowdown, the dissolved mineral concentration in the tower water will eventually reach a point where deposits form on waterside surfaces, including chiller condenser tubes. A key objective of a cooling tower treatment program is preventing these deposits while minimizing blowdown. Cycles of concentration is an important concept in cooling tower treatment. Cycles of concentration reflect the degree to which dissolved impurities in the makeup water are concentrated in the re-circulating water of an evaporative cooling system and are inferred by dividing the conductivity of the tower water by the conductivity of the makeup water. The higher this ratio, the more the impurities in the makeup water are being concentrated in the system water and the lower the cooling tower blowdown rate. To minimize water usage, maintaining maximum cycles of concentration is important. Optimum cycles for a particular cooling tower are largely a function of makeup water quality, operating conditions, and chemical inhibitor selection. By evaluating these factors, your water treatment consultant can recommend the target cycles to prevent waterside problems and minimize water usage. Evaporation Credits For facilities connected to a sanitary sewer, water cost is divided into two parts: water purchase and sewer costs. Most municipalities assume all water entering a facility leaves through the sanitary sewer and therefore apply the water purchase and sewer costs to the entire water bill. In facilities with cooling towers, a large portion of incoming water leaves by evaporation, not the sanitary sewer. Often, the local water authority provides facilities with cooling towers a credit (called an evaporation credit or sewer cost rebate) on the evaporated water. Requirements vary for documenting the amount of evaporation, but typically the facility is required to install an approved water meter on cooling tower makeup and blowdown water lines. Assuming there are no leaks in the system, the difference between the makeup water meter and blowdown water meter readings is the amount of water evaporated from the cooling tower in a given time period. Savings associated with obtaining an evaporation credit depends on the average cooling load and sewer cost and can be considerable. Eliminate Leaking Makeup and Blowdown Valves Not all chiller systems run 24 hours/day, seven days/week. If a cooling system shuts down during the night or weekend, the tower overflow line should be observed for signs of overflow. Float valves are notorious for leaking when the cooling tower is shut down. Since these valves throttle the water flow based on demand, the seats are easily cut, leaks occur, and the valve will not properly shut off. The float or control valve could also be out of adjustment allowing water to overflow through the drain. Blowdown valves can also not seat properly and allow excessive blowdown to the drain. This wastes water and can also throw the chemistry out of balance and lead to deposits and poor microbiological control. Water meter readings will help detect makeup and blowdown valve problems. Using Full or Blended Soft Water for Cooling Tower Makeup In some areas, the high hardness level in the water necessitates a high cooling tower blowdown rate to prevent scale deposits. In these areas, building water usage may be reduced by using soft water or blending soft water with untreated water for the cooling tower makeup water. In certain situations, softening the makeup water can allow the cooling tower to be operated at a greatly reduced blowdown rate. This may not be viable or economical in all areas. Blending soft water in the tower makeup usually requires new softeners and routine salt purchases. Also, some municipalities are limiting salt discharge to the sanitary sewer to lower the salt content of wastewater treatment plants. Use Air Handler Condensate as Tower Makeup In hot and humid areas, large quantities of condensate are produced from air handlers or fan coil units that can be used as cooling tower makeup water. Using air handler condensate this way offers several advantages: it is cool (50o F), very pure, and would normally go to the drain. Adding this nearly pure water to the cooling tower reduces the amount of city water required for makeup and reduces the amount of blowdown water. For example, a 164,000 square foot office building in Texas was able to use air handler condensate for 17 percent of their cooling tower makeup requirements. Use Rain Water for Tower Makeup Rainwater collection is an alternative source of water for cooling towers. Collection systems can be simple above-ground or underground tanks. A 30 foot by 30 foot roof area can collect 558 gallons of water for every one inch of rain. A facility can collect thousands of gallons of water annually at an economical cost compared to purchasing city water. Additional biocides may be required to properly treat systems using this type of water. Use Reclaim or Gray Water for Tower Makeup Many municipalities and industrial plants are providing reclaim or reuse water for non-potable uses, like makeup water to cooling tower systems and landscape irrigation. This is treated water that comes from a waste treatment plant. Piping associated with reclaim or reuse water is typically designated by a purple or lavender color. This water is an excellent source of non-potable water and significantly reduces demand for fresh water. Cycles of concentration may have to be reduced in cooling tower systems to accommodate higher solids and contaminant levels found in this water. Additional biocides may be required to properly treat systems using this type of water. Water Savings in Closed Systems Closed heating and cooling water systems typically require little makeup water following initial system charge. When leaks occur, it can be costly and difficult to maintain treatment levels necessary for good corrosion and deposit control. The source(s) of significant water losses should be identified and eliminated. In a treated closed system, routine testing of water chemistry can be used to determine if there has been significant water loss. If the treatment parameters decrease simultaneously, water has been lost. If water loss is significant, a water meter installed on the makeup water line can help quantify the rate of water loss. It should be noted that small leaks (often less than one gpm) may not register on the water meter. The following checklist may help identify why a closed system is losing water: • Check all circulating pumps for leaks around the seals or packing. Replace and/or tighten if necessary. • Check the expansion tank to ensure it is not full of water. If the expansion tank does not have sufficient air space for expansion when the system water heats up, the relief valve will lift to relieve the excess pressure. If the tank is full of water, manually drain so it is only about 1/3 full when the system is cold. • Check all pressure relief valves. Closed systems can intermittently relieve excess system pressure due to temperature changes and an improperly functioning pressure regulator (located on makeup line). If the regulator fails, the system pressure can slowly increase to the point where the pressure relief valve momentarily opens. Water will then be expelled until the pressure returns to normal. • Check all automatic air vents to see if they are leaking water. Pay particular attention to vents that are piped directly into a drain. Replace all air vents that are leaking water. • Check the backflow preventer. Be sure the makeup line has a properly installed and functioning backflow preventer. This is especially true if the system pressure is greater than the makeup water line pressure. Without proper backflow preventers, system water can be lost into the makeup water line. Swing type check valves are unacceptable since they will not function properly under a vacuum - as water rushes from the closed system (higher pressure) to the makeup line (lower pressure), a vacuum can occur. • A common cause of system pressure being greater than makeup line pressure is when someone shuts off the main water supply. All new buildings have backflow preventers on the main potable water supply line. Each closed system should have its own backflow preventers. • Check drain pan water. Where fan coil units are used with a chilled water system, check the water chemistry or color of the condensate (if a colored inhibitor is used). If a fan coil unit is leaking, you will detect the presence of treatment chemicals and/ or hardness in the drain pan water. Otherwise, the drain pan water should be more or less distilled water (less than 25 μS/cm conductivity). A building HVAC system can be a major consumer of water. With the right planning, facilities professionals can ensure greater water conservation and reduced water costs. Your water treatment consultant can help evaluate payback on water and chemical savings. A knowledgeable water treatment partner, like Chem-Aqua, provides value that goes far beyond the chemical program costs. Contact us today! Please login or register to post comments.
How to Solve “Drawing File Is Not Valid” Error in AutoCAD A common error message that AutoCAD users see is the message that a “Drawing file is not valid”. This can occur when you are trying to open a file. We discuss the possible reasons for this error and what to do about it. AutoCAD is one of the most popular computer-aided drawing programs out there, used by architects and engineers to create and share blueprints and technical drawings. AutoCAD files contain vital data that are needed in construction projects as well as the creation and design of machines. So it can be quite a blow if these files become lost or corrupted. “Drawing file is not valid” One of the most common signs that your AutoCAD is corrupted is, if you try to open it, you get the message that the “Drawing file is not valid”. Often time’s you will see this error message if one of the following has happened: 1. You are trying to open a drawing file that was actually created in a different CAD program and not AutoCAD. 2. Your AutoCAD version was updated after the file was created. 3. You experienced an unexpected shutdown of either your computer or your AutoCAD program. How can I fix this? Likely because they recognize the fact that errors and corrupt DWG files are a common occurrence, there are a few built in tools that you can use to try and retrieve them. 1. Use “Recover” on AutoCAD 1. Open AutoCAD and go to “File” 1. Select the option “Drawing Utilities” 1. Choose “Recover” 1. Find and select the DWG file that you were trying to access when you got the “Drawing file is not valid” message 1. Wait for the file to be scanned and repaired. If it is successful, the file should automatically open. 2. Find and delete DWL files 1. Open the folder where AutoCAD places saved files. 1. Check the option “Hidden Files” 1. Go back to the Control Panel. From there, click on “Folder” 1. A new box should open, click the option to “View tab” 1. Click the option to “Show hidden files” 1. Look for files that share the file name of your DWG file, but that are either .dwl or .dwl2. 1. Select and delete the files. 1. Try and open your DWG file. Can data recovery software help? When you suspect that you have corrupt or damaged files, you need to act as quickly as possible to try and repair or recover them to ensure that the data loss doesn’t end up becoming permanent. To this extent, it might be wise to have a data recovery program that is specifically programmed to repair and restore AutoCAD files. A good program to install is DataNumen DWG Recovery; it can fix corrupt AutoCAD files quickly and easily. DataNumen DWG Recovery Even if you have data recovery software, however, it’s still a good idea to regularly back up your important AutoCAD files. If you install DataNumen Backup on your computer, you can create multiple backups of your files to prevent data loss. This will also allow you to access your files even if you need to take your hard drive to an expert for repairs. Leave a Reply Your email address will not be published.
NGF Blog Using Artificial Intelligence to Diagnose Rare Genetic Diseases Diagnosing a rare genetic disease can be like putting a puzzle together. Doctors work to create a complete picture from many different pieces. They use lab and test results, bits of patient information, and limited knowledge about more than 7,000 rare diseases. The final picture is often unclear while pursuing a diagnosis—a process that can take time, money, and an emotional toll on patients and their families. The good news is that efforts are being made to improve the time it takes to reach a rare disease diagnosis. Globally coordinated movements, such as Rare Disease Day (on February 28 this year), shine a light on the challenges posed by rare conditions including Gaucher disease. And leading-edge companies, such as Virginia-based ThinkGenetic, Inc., are working to shorten the diagnostic journey for people with rare genetic diseases. To meet their goal, they’re developing solutions using artificial intelligence (AI), the ability of computer systems to perform tasks that usually require human intelligence. In 2017, ThinkGenetic, Inc. introduced SymptomMatcher, an AI tool that matches a patient’s self-reported symptoms with those of rare diseases. With their newest AI solution, ThinkGenetic, Inc. now hopes to identify patients with rare diseases who are currently undiagnosed. It’s called FindEHR, which stands for “Finding Individuals Needing Diagnosis through Electronic Health Records.” FindEHR leverages patient data and AI to screen patients for rare genetic diseases.  We spoke with two members of the FindEHR team: Jessica Dronen, MS, LCGC, a genetic disease research and information specialist, and Sarika Kondra, PhD, an applied researcher. Their collaborative efforts help build AI models that combine modern machine learning with genetic information. We asked them to explain how emerging technology is meeting the challenges facing rare disease diagnosis. Here’s what you need to know about how AI tools like FindEHR are affecting people living with Gaucher disease and other rare genetic disorders. How We Use AI in Healthcare Healthcare systems collect a lot of data about patients, conditions, and treatments. They accumulate structured data, such as lab values, patient demographics, and other defined information. They also have unstructured data for each patient treated, such as clinical notes and reports written in free form by medical professionals. All this data is protected by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and related rules. The Standards for Privacy of Individually Identifiable Health Information (HIPAA Privacy Rule) regulate how protected health information (PHI) is accessed and disclosed. The HIPAA Security Rule requires healthcare entities to safely store and protect PHI. The amount of data healthcare systems gather is so large and varied in format, it’s hard for humans to make sense of it on their own. AI can comb through de-identified data, which doesn’t include any personally identifiable information (PII) and is HIPAA-compliant, to extract information and recognize patterns. The results inform and educate providers and other healthcare professionals. Healthcare professionals use AI for help with: • Diagnosing patients • Defining disease characteristics • Identifying potential treatments and which conditions will benefit from the treatments • Predicting disease progression or response to treatment • Understanding how a disease associates with other conditions “Humans get tired, but machines do not,” Dr. Kondra says. “No matter how much information we input, machines still give us the results. Humans have limitations to how much they can handle and how much work that they can do.” As advances in technology reveal new uses for AI, its role in the medical space continues to grow. Experts are also learning how to focus AI to meet specific challenges, like diagnosing rare genetic diseases. Barriers in Rare Disease Diagnosis The National Organization for Rare Disorders (NORD) surveyed over 1,000 people about living with a rare disease. They found that 28% of participants waited seven years or more for an accurate diagnosis. Approximately 38% of all those surveyed received a misdiagnosis during their journeys. In search of a diagnosis, patients endure endless testing and expenses, while missing out on years of possible treatment. Dronen says the sheer number of rare genetic diseases makes diagnosis difficult. Doctors struggle to keep up with the latest research and details for each condition. Existing information about rare diseases also tends to come from details gathered about diagnosed patients. People with atypical cases often remain undiagnosed, so their signs and symptoms aren’t documented. “With more testing available, we’re finding there are people who have atypical presentations of the disease,” Dronen says. “We’re also recognizing that there’s just a much larger phenotypic spectrum (range of observable traits or symptoms) to a lot of diseases, and they don’t necessarily behave the way that we thought they would.” The same challenges in diagnosing rare diseases have also made it difficult to apply AI in this space. Each rare disease is only linked to a small number of patients whose disease tends to present in the same or similar ways. That makes it hard to collect the amount of data AI needs to predict diseases and outcomes with accuracy—especially for atypical cases. Using AI to Help Diagnose Rare Genetic Diseases Many types of AI used for general healthcare already help with diagnosing rare diseases. One example is a field of AI called computer vision, which enables computers to analyze digital images, videos, and other visual input. Computer vision applications help technicians understand X-ray images and identify anomalies otherwise missed. But diagnosing rare genetic diseases is not a straightforward process. Doctors must consider factors that include a patient’s family history, medical history, and genetic reports. That information often exists in written reports or as part of the clinical notes collected at appointments. In other words, it’s found within unstructured data. The role of natural language processing Natural language processing (NLP) is a branch of AI used to extract information from      unstructured text data. It can scan freeform text and pull data about specific symptoms, gene sequencing, or medical history. That information helps physicians screen patients for genetic conditions and diagnose rare diseases. “To diagnose a rare disease, we have to dig deep into the unstructured data that is clinical notes, and we have to extract that information,” Dr. Kondra says. “This is where NLP plays a major role.” FindEHR: NLP in action FindEHR is a screening tool that uses NLP, along with other AI techniques, to comb electronic health records (EHR). Healthcare systems engage FindEHR to flag at-risk patients for a specific underlying genetic condition. FindEHR extracts information from both structured and unstructured EHR data using only de-identified and relevant pieces of the EHR (not the entire health record). If FindEHR flags a patient, a genetic counselor reviews the information and passes it along to the healthcare facility. ThinkGenetic, Inc. also provides doctors with any education, next steps, and resources they need. Benefits of AI within the rare disease space AI techniques, such as NLP, offer many benefits when used to diagnose rare diseases: • Patients: AI minimizes the time, money, and effort it takes to get a diagnosis. An earlier diagnosis provides an opportunity for earlier treatment, which typically improves outcomes. AI can identify approved therapies and clinical trials related to the rare disease. • Providers: Tools like FindEHR give doctors the help they need to diagnose rare diseases. AI predictions are usually precise and reduce the element of human error in the diagnostic process. • Payers: A timely and accurate diagnosis saves payers from the costs of unnecessary tests and misdiagnosis. When patients receive treatment earlier, it can lessen the number of health concerns that develop later. Other Emerging AI Applications for Rare Disease FindEHR is one of many AI applications in development for rare diseases. Experts are designing AI technology to help predict, diagnose, and identify treatment for rare diseases. Some up and coming AI applications for the rare disease space include: • Fabric GEM by Fabric Genomics, which uses AI to analyze possible gene variants and quickly identify the root cause of the disease so that patients receive the right treatment sooner. • Face2Gene by FNDA, an AI-powered smartphone app that uses computer vision to analyze facial features and identify rare genetic disorders. • Healnet by Healx, a platform that uses AI drug discovery to predict which known drugs or drug combinations have the highest chance of success in treating rare diseases. How AI Affects People With Gaucher Disease The power of AI is especially exciting for people living with Gaucher disease and other lysosomal storage disorders. People with typical or severe symptoms of Gaucher disease can use a standard blood test for diagnosis. But those who are asymptomatic or present with mild or atypical signs often go undiagnosed. FindEHR and other AI applications may change that. “The exciting thing about FindEHR is hopefully finding those atypical patients sooner. They often have a longer wait for diagnosis, and they’re wasting time that they could be getting helpful treatment,” Dronen says. Diagnosing Gaucher disease when it’s mild or atypical allows patients to connect with a Gaucher specialist and obtain proper disease management earlier. If deemed appropriate, the person can start enzyme replacement therapy (ERT) or substrate reduction therapy (SRT) before the disease progresses. “When a condition’s treatment includes enzyme replacement or substrate reduction therapy, patients have better health outcomes over their lives if they start treatment earlier.” Join the National Gaucher Foundation in Celebrating Rare Disease Day NGF and ThinkGenetic, Inc. are advocacy partners, working together to provide support and information about rare diseases like Gaucher disease. You can help raise awareness and celebrate our community by getting involved with Rare Disease Day, which takes place annually on the last day in February. Make a gift or learn more about Rare Disease Day. Living a Better Today Skip to content
How to Change the World (Sort Of) Updated: Mar 21 The times they are a changin'. Or at least the climate is. And agriculture plays a huge role in that change. It can also play a critical part in changing it back. Let us explain. Agriculture by definition impacts the land, replacing wild plants and animals with domesticated ones. But as humans have refined farming over time, we have come to prefer the ease of growing one (or maybe two, in the case of corn and soybeans) crop at a time so as to gain a "comparative advantage" by specializing in only one thing. We confine animals in feeding units (CAFOs) or grow potatoes on1000s of acres in order to most "efficiently" produce, aggregate and distribute food, growing it in one area and eating it in another. These efficiencies have made our food cheap, plentiful and convenient. But as we are all too well aware, these "efficiencies" also have dramatic costs, for the land, for our food and for our communities. The landscape is completely altered, causing issues with pollution, erosion and battles over water use. Our food becomes less nutritious (check out this game-changing group that has found that a single leaf of spinach can be nutritionally equal to 364 leaves of spinach raised with chemicals in an industrial model). And we have less and less farmers. So how do we 'change the world,' or at least 'how can we help change farming practices so that we are better nourishing our families and the land?' Buying directly from a farmer you know allows you to question how exactly they are paying attention to soil health and the nutritional value of the food. Does the farm use "regenerative" practices, keeping an eye on how every aspect of our farming impacts the land and working to improve it? Our goats eat invasive species like multiflora rose Buying food directly from your farmer and knowing how your food is raised are also key in taking charge of your responsibility to the planet. True, it is perhaps less convenient than walking into your local grocery right before dinner and requires more storage and freezer space. But it puts more money into the hands of farmers working hard to transition our land away from the chemical dumping grounds farms have been, and back into important ecozones. Whippoorwill Creek Farm offers beef directly to consumers. And while cattle are not as ecologically sound as carrots or wild mushrooms (they have the unfortunately tendency to burp methane), the way we raise them reduces their impact on the planet and produces delicious, more nutrient dense meat. We never use chemicals and only use antibiotics to treat sick animals. We never irrigate or feed our animals grains. And with our regenerative practices, we use the cattle to help fertilize the land (with their manure and urine) and, it is speculated (but not confirmed), that grazing animals in this way also helps sequester carbon. Cattle moved every day do not beat up the land. Instead they help the grass grow deep roots. But perhaps most importantly, buying directly from a farmer puts more of your food dollar into the hands of those who grow it, and less into the pockets those sitting in corner offices concocting advertisements to sell you products of questionable value. It helps attract more farmers to better growing methods and allows more small farms to make living. Which means that more people might some day be able to afford to farm and to raise families on the land (and we might add, all while costing consumers less for their beef per pound). Oyster mushrooms also grow in forests on the farm And yet. We realize that many think this paradigm is not for them. Not everyone has a freezer in which to fit a year's worth of meat, nor does everyone have the bandwidth to sit down and figure out how to buy directly from a nearby farmer. We hear you that the logistics are complicated and that many people do not eat that much meat and we fully support that. But it's not out of the question to buy at least some of the things you eat directly from a farmer. Maybe you can commit to a Community Supported Agriculture food box in your area, or look up on Local Harvest a farm near you to buy from each week. There are farm subscription boxes, food hubs like the Iowa Food Coop, and farmers markets. As the climate changes, it is up to all of us - even consumers - to change their habits too. Contact us about buying beef, mushrooms or goat, or about anything food and farming related! Recent Posts See All
The Great Musical Drum Set The Great Musical Drum Set Musical drums are one of the most popular instruments of all time. This instrument is present in almost every musical style. It is one of the instruments that fascinates and captivates fans throughout the ages. It is also one of the oldest instruments in existence. In this text, you will learn more about this incredible instrument that is the musical drum set. Drum musical instrument The drum set is a percussion musical instrument. The drums consist of drums and cymbals of different timbres. This instrument is played with two wooden or silicone sticks called drumsticks. There are also metal drumsticks in the shape of a broom commonly used in blues music. Drums are used in pop, rock, samba, jazz, reggae, gospel, MPB, country, bossa nova, sertanejo and other styles. It is a versatile instrument. The main function of drums in music is to dictate the rhythm. Drum parts Musical drums are a set of percussion instruments. These instruments form a complete and versatile percussion instrument. There are musical drums of different models and sizes. Generally, the basic musical drum kit consists of 20 elements. These elements are divided into the following instruments. • The cashier: wooden or metal drum of flattened shape. It has an acrylic skin at the top and bottom. At the bottom, there is a metal turnbuckle that can be stretched or loosened, thus changing the sound extracted from the box. The sound of the box can come from both the contact of the sticks on the skin and the rim. • Charleston: it consists of two plates, one facing up and the other facing down. The plates are fixed on a support attached to a pedal. The pedal is activated to unite the cymbals by extracting the sound of the cymbals and changing the sounds of the cymbal when played by the stick. • The bass drum: which usually stands upright and is played by a stick connected to a lever operated by the drummer's foot (pedal). It is the biggest drum of the musical drums. • Toms: drums usually have two toms, which are attached to a rack on top of the bass drum or attached to it. There are also drums with one tam-tam, or three, it depends a lot on the taste and purpose of the drummer.Toms have a medium timbre. • Dishes: these are metal discs from which the drummer extracts increasingly loud sounds. There are two types of plates: driving and attacking. Driving plates have a drier sound and are used to dictate the rhythm of the music. Attacks have a more explosive sound and are used in turn or to produce effects. • Drumsticks: there are two wooden sticks used to extract the sounds of the drums and cymbals from the drums. Although the tips are made of wood, they can be made of different materials. It can have a wooden tip, nylon tip, felt tip, metal tip (broom).
Fairfax District LA School of Rock Explore School of Rock Fairfax District LA How to warm up your singing voice 9 Best Vocal Warm-Ups for Singers Professional singers know how physically demanding singing can be. It takes a lot of stamina and energy to sing onstage and bring the venue to life. That’s why singing, like any other physical activity, should involve a warm-up, as well as a vocal cool-down. At School of Rock, we make these vocal warm-ups a ritual, whether it’s to prepare for a singing lesson or a show rehearsal. These quick singing warm-ups can be done in just 10 to 20 minutes, and they should become an integral part of any successful practice routine. Why do you need to warm up your voice? We warm up our voices so we can keep them healthy, sound our best and protect against damage. Warming up your voice will allow you to sing better and extend your range comfortably. It is absolutely necessary to always warm up before singing. 9 best vocal warm-ups for singers There are many simple vocal exercises you can use to warm up your voice, so you have a lot of options when it comes to deciding how to warm up your voice. Fortunately, School of Rock can help you narrow them down. Here are nine of the best vocal warm-ups used by our vocal instructors. 9 best vocal warm ups from School of Rock 1. Yawn-sigh Technique For this quick vocal exercise, simply yawn (take in air) with your mouth closed. Then, exhale through your nose as if you are sighing. This will help relax your voice and improve its range. 2. Humming warm-upS 3. Vocal Straw Exercise  To perform the vocal straw exercise (also known as straw phonation), take a straw and hum through it. Start at the bottom of your range and slide up to the top slowly and evenly. Then, hum your favorite song through the straw. You can also place the straw in a partially full glass of liquid and blow controlled bubbles in the glass. 4. Lip buzz Vocal warm-up As far as vocal warm-ups go, lip buzz (or lip trill, as it is sometimes called) is very simple. The goal is to make a motorboat sound by making your lips vibrate as you blow air through your mouth and nose. You can incorporate pitch slides as well. 5. Tongue trill exercise The tongue trill vocal exercise is difficult for some singers. It involves curling your tongue and rolling your R’s as you go through your range from low to high. 6. Jaw Loosening ExerciseS When singing, you want to drop your jaw lower than when you are just talking. With your finger, trace back along your jawline from your chin to your ear. That curved space between your jaw and your ear is where you want to drop your jaw. Pretend you are yawning with your mouth closed and feel where your jaw drops. Avoid just dropping your chin. 7. Two-octave pitch glide Warm-Up For this easy vocal warm-up, make an “eeee” or “ohhhh” sound and gradually glide through the chromatic notes of a two-octave range. Glide up and then back down. This will transition from your chest voice to your head voice. 8. Vocal Sirens Exercise Much like the pitch glide, the siren exercise takes an “oooo” sound and gradually goes from the lowest note of your range to the highest and back down, like a siren for an emergency vehicle. The sound is continuous and covers the tones between the notes. 9. Vocal Slides Technique This technique is also known as a portamento, which is Italian for “the act of carrying.” Much like the siren exercise, you slide from one note to the next in your range, but you don’t sing the in-between notes. PlayPlay Button Now that you've mastered a few vocal warm-ups and exercises, always remember to maintain good posture and use proper breathing techniques. Two common breathing techniques are singing from your diaphragm and exhaling on a hiss. Keep reading to learn how you can perform these to improve your singing. You can also sign-up for a trial singing lesson in-person or online at your nearest School of Rock. 1. Sing from Your Diaphragm When singing, it is vitally important to use proper breathing techniques to avoid hurting your voice. It is most common to breathe from the chest during everyday activities, including speaking, but singing requires breathing from the diaphragm. Proper breathing gives your voice more power, more control and a fuller, more expressive tone. Sing from your diaphragm to avoid straining your voice. Your body should be relaxed and balanced, with your weight slightly forward. What is your diaphragm? The diaphragm is a muscle between your chest and your belly that governs how much air you inhale and exhale when you breathe. “Singing from your diaphragm” is a phrase for this important breathing technique, which describes the proper way to breathe in and out while singing. How to sing with your diaphragm The sound of your voice doesn’t actually come from your diaphragm, of course — sound is generated by vibrations of your vocal cords. The vibrations are caused by air being pushed out of your lungs. Your diaphragm is what controls the pushing and is responsible for putting power behind your voice. 2. Exhale on a hiss A hissing breath exercise is a great way to start when learning how to warm up your voice before singing. This technique forces vocalists to sing from their diaphragms and improves breath control. To master the exhale on a hiss breathing technique, it’s important to: 1. Stand up straight and relax your body. This will also relax your diaphragm and release any tension that could prevent you from singing incorrectly. 2. Breathe in through your mouth and count to five. As you breathe, bring the air deep into your lungs. A “singer’s breath” should not make your chest puff out or your shoulders rise — instead, your belly should expand outward. 3. Exhale and count to nine. While exhaling, make a hissing noise that sounds like the first letter of the word “sizzle.” By the time you are done counting, all the air should be expelled from your lungs. Once you build more lung capacity and get comfortable with this exercise, you can breathe in for a seven count and exhale for a 12 count. Now that you've warmed up your voice and know how to breathe from your diaphragm and exhale on a hiss, you’re ready to sing. How to cool down your voice after singing After vocal warm-ups and singing, it is essential that you also cool down your voice. You can use the same vocal exercises you used during your warm-up, starting with the most intense and working down to the least intense. Simply using the humming vocal exercise will also allow your voice to cool down and relax. Following these tips will keep your voice strong and allow you to perform at your best. Vocal warm-ups are a critical part of any singer’s practice and performance routine. These quick and easy vocal warm-ups will refine your technique, build your vocal power and control, and help expand your vocal range. At School of Rock, our trained vocal instructors teach students all aspects of singing, including warm-ups and other vocal techniques that thousands of professional singers use every day to keep their voices in shape and sounding their best. Ready to start singing? Sign up for a singing lesson now, or read more about our perforamnce-based music programs. Check out other School of Rock Resources
The Environmental Dimensions of the ‘War on Terror’ Structure of lecture: Environmental roots of conflict • Scarce resources, eg water (eg Middle East); land for agriculture, population growth • Abundant resources, eg oil (1991 Gulf war; civil war in Sudan; unrest in Nigeria); minerals (diamonds in civil wars in Sierra Leone and Angola; metal ores in civil war in Democratic Republic of Congo); timber (eg unrest in Indonesia) • ‘War on Terror’ - Iraq/ Afghanistan wars - control of oil resources was a factor • Other foreign natural resources and their processing operations which the West relies on could also become terrorist targets, eg gas fields/pipelines, timber/ paper plants, uranium mining/ refining Direct environmental impacts • Eg 1991 Gulf war • Damage to infrastructure allowed disease and ill-health to spread - tens of thousands of Iraqi's died of the health effects of the war • Damage to water purification facilities (and related electricity supplies) caused major shortages of clean water • Chemical/ biological/ nuclear weapons plants bombed - toxic/ radioactive releases may be a cause of Gulf War syndrome • Damage to sewerage plants caused serious pollution • Oil well fires - more than 600 wells set ablaze, some burning for 9 months - smoke blocked sun - temperature fell by 10C; approx 1000 people died due to acrid smoke; 300 million tonnes CO2 released contributing to Climate Change • Oil polluted groundwater - 60 million barrels leaked into ground poisoning 40% of groundwater (Kuwait has less water per head than any other country) • Oil spills into sea - at least 6 million barrels of oil leaked into sea causing largest ever oil slick - devastated local bird, mammal, fish populations - prawn fisheries decimated • Landmines and other unexploded ordnance (UXO), eg cluster bombs - 1.6 million landmines laid by Iraqi forces in Kuwait; approx 5% of bombs do not explode on impact (higher % in desert) - many people killed/ injuries • Depleted Uranium (DU) - super-dense metal used in armour piercing weapons - approx 290 tonnes spread across Gulf - source of low-level radioactivity and toxicity • Damage to desert ecology - obvious bomb damage, but also movements of armoured vehicles broke up fragile soil surface - approx 50% of Kuwait's land area damaged • References: UNEP, 2003; Additional info from: New Scientist, 2003; FOE 2003; Medact, 2002 • 2003 Iraq war - preliminary assessment made in UNEP 'desk study' (UNEP, 2003) • Damage to water purification (and related electricity supplies) leading to major shortages of clean water • Damage to sewerage plants and lack of waste collection leading to increased disease risk • Oil fires - only 9 wells set ablaze, but many oil-filled trenches around Baghdad (trying to fool incoming missiles) - causing high levels of air pollution in local area, and groundwater contamination • Water desalination systems damaged, causing salt water damage to fields • Chemical plants again targets - causing toxic releases • UXO (including cluster bombs), DU again used by Allied forces (US has refused to accept DU is problem and hence won't assist in clean up) • Further damage to local ecology, especially southern wetlands - internationally important wintering area for hundreds of thousands of birds • Afghan war (New Scientist, 2002) • Many similar issues to Iraq • Since end of war, major deforestation by refugees for fuelwood; migratory birds down by 85%; rare species (eg snow leopard) killed for valuable fur etc Indirect environmental impacts • Iraq/ Afghanistan wars allow continued reliance on oil, accelerating Climate Change - oil sources are now more secure, and oil production can now be expanded (oil production in Iraq is among the cheapest in the world, at 25% of North Sea oil costs) - these factors will help bring down oil prices and encourage higher global consumption - the US Energy Information Agency forecasts world oil consumption will rise by between 37% and 90% by 2020 - victory in Iraq will mean the increase in consumption will be towards the higher end of this estimate - the US already produces 25% of the world's carbon dioxide emissions (the gas which contributes most to Climate Change), while its population is only 3% of world - Reference: Friends of the Earth, 2003 • Maintaining very large armed forces - consumes high levels of natural resources (eg oil for fuel - world's armed forces consume as much petrol as the whole of Japan, and 1/4 of world's aviation fuel) - produces high levels of hazardous waste (US Dept of Defense generates more than 5 largest chemical companies combined) - Reference: The Ecologist, 2003 Tackling the environmental causes of conflict • Annual world military spending is nearly $800,000,000,000 - US budget alone is nearly 50% of this (approx $400bn); UK budget is approx $40bn (£25bn) • Spending some of this money on environmental and social issues could prevent many conflicts, eg clean water (6000 children die every day from lack of clean water/ poor sanitation), renewable energy (eg solar, wind) would reduce dependence on oil, sustainable agricultural practices would prevent soil erosion/ deforestation and hence provide food security. • Extra cost of universal education, halving poverty and cutting child deaths by three quarters is estimated at $25bn per year (UNICEF, as quoted in Independent 21/05/03) (web links correct as of July 2003) The Ecologist (2003) War on the environment. Vol. 33, no. 4, p44-45. May. Friends of the Earth (2003) War in Iraq: why Friends of the Earth is opposed. February, 13th. Medact (2002) Collateral Damage: the health and environmental costs of war on Iraq. New Scientist (2002) Afghanistan faces an environmental crisis. January. New Scientist (2003) Future looks bleak for Iraq's fragile environment. March 15th, p12-13. UNEP (2003) Desk study on the environment in Iraq. United Nations Environment Programme. April.
If you’re reading this and you don’t know what IPv6 is, it’s the replacement for the internet addresses we’ve all been using for years. The old system – IPv4 – doesn’t offer enough combinations for all the devices connecting to the internet to have a unique address,  which is why IPv6 was developed. It’s a bit like landlines and mobile phones: you can call someone using either method, but IPv4 is the landline here, and it’s becoming outdated. Today, both IPv6 and IPv4 are used alongside each other but are incompatible. Let’s say you’re connected to the internet on your laptop at home, your internet service provider (ISP) might assign you only an IPv4 address because it does not support IPv6 yet. This means you can only connect to websites that use IPv4. That isn’t a problem for 99.9 percent of the time because virtually all websites still support the old protocol. They may also support IPv6, but it’s only websites which exclusively use the newer protocol that you won’t be able to access. What does IPv6 have to do with VPNs? Most VPN providers do not support IPv6 yet. If your ISP only gives you an IPv4 address, that’s not an issue at all because all the internet traffic will go through an encrypted ‘tunnel’ that uses the same IPv4 protocol. However, if your ISP does support IPv6 (such as BT in the UK, or Vodafone in Germany) then your device will probably be assigned both IPv6 and IPv4 addresses. Windows and other operating systems, plus software such as web browsers, are designed to prefer IPv6 when it’s available, so will use that protocol when you search for something on Google, for example. If your VPN service doesn’t support IPv6 and you are connected to one of its servers, then one of two things will happen. In an ideal scenario, the VPN will successfully block all IPv6 traffic and force everything to use IPv4 where it will be protected. However, what could happen is that the IPv6 traffic is not blocked and any web searches which use IPv6 will go via your ISP and not through the encrypted VPN tunnel. That means you get none of the protection that a VPN is supposed to give you, and you may not even realise it because – as far as you’re concerned – your VPN app is connected and running fine. Which VPNs support IPv6? CyberGhost, hide.me, Perfect Privacy and AirVPN are four examples. Virtually all others, including NordVPN, ExpressVPN and Surfshark don’t yet support IPv6 but many are working on it. Is it safe to use a VPN which doesn’t support IPv6? It depends. If it’s been designed and implemented properly, there should be no risk of IP leaks where your IPv6 traffic is allowed to flow outside of the VPN tunnel, exposing your real IPv6 address (and in turn potentially your real location and identity). That is, of course what all the non-IPv6-supporting VPNs say they do. They claim to fully block IPv6 connections and exclusively use IPv4. We test for this when we review VPN services by using websites such as ipleak.net to make sure our IPv6 address is properly blocked. And, as you might expect.  VPN services which support IPv6 tend to say that they are the better choice because you’re fully protected no matter which device or ISP you’re using. There’s also a potential speed benefit because IPv6 networks tend to be less congested than IPv4 ones. We spoke to hide.me’s tech lead Tomislav Cohar about this. He said, “Usually a VPN provider publishes an app and that app takes care of blocking IPv6, more or less successfully. That's fine and does work, but incurs a penalty for the customer: IPv6 sites do not work, dual-stack sites (Google, Facebook and the gang) use only IPv4. DNS queries have to be filtered to make sure no IPv6 addresses get served to a customer. Such operations may be logged. However you put it, anonymity gets reduced, connectivity suffers.” “If a VPN provider supports manual configuration (as most VPNs do) then manual configuration of a connection becomes dangerous. With no IPv6 blocking or leak protection going on (which is usually handled by the apps) your IPv6 traffic flows through your ISP. The customer's security becomes severely compromised and any claims about protection do not make sense anymore.” “In the UK, for example, the IPv6 adoption stands at 31%. So, roughly, every third customer of a VPN provider needs IPv6 protection of some sort.” We also spoke to Surfshark, which doesn’t yet support IPv6 but is in the process of doing so. A spokesperson told us “At the moment we support IPv4 and we are blocking IPv6 for dual-stack customers to prevent leaks. This technique is safe and all traffic from customer devices is going via encrypted VPN tunnel utilising IPv4 connectivity. We are in the process of building a network of IPv6 VPN servers and will be adding IPv6 support to our apps in near future. Once we have IPv4 and IPv6 ready networks, our VPN apps will be creating VPN tunnels either on IPv4 or IPv6 connectivity, based on the customer's device preference and block the other protocol to prevent leaks.” Hide.me, however offers simultaneous IPv4 and IPv6 connectivity, so there's no blocking going on. If you’re choosing a VPN service, there’s an argument that it’s worth picking one that already supports IPv6 if your broadband and mobile internet providers are already using IPv6. You can find more buying advice in our roundup of the best VPN services. However, if you’re already with NordVPN, Surfshark or another provider which doesn’t yet support  the newer protocol, you may find that you can log into your broadband router and disable IPv6 connectivity and then change the settings on your phone to do the same to eliminate the risk of IPv6 leaks.
Why antibodies aren't the only defense against Omicron Friday December 17 2021 A scientist studies a sample of Coronavirus antibody to produce drug treatment for Covid-19. PHOTO | AFP In the fight against the coronavirus, one key component of the human immune system has hogged the limelight: antibodies. These Y-shaped proteins have made top news recently because Covid-19 shots don't produce as many of them that work against the heavily mutated Omicron variant compared to past strains -- at least, not without a booster. Trained by both vaccines and infection, antibodies grab on to the spike protein that studs the surface of the coronavirus, stopping it from penetrating cells and sickening the host. But while antibodies are rightly celebrated, they're not the only game in town. In fact, "there's a complex and coordinated response that is really beautiful from an evolutionary standpoint," Harvard immunologist Roger Shapiro explains. Here are some key points: In the minutes and hours after the virus first comes calling, signalling proteins send out alarms to recruit the tough-but-dim brutes of the "innate" immune system. First to the scene are "neutrophils," which make up 50 to 70 percent of all white cells and are quick to fight, but also to perish. Others include hungry "macrophages" that snarf down pathogens and spit out key bits to help train their smarter colleagues, menacingly named "Natural Killer" cells and "dendritic" cells that pass on their intel to more elite fighters. "It's sort of like carpet bombing the whole area and hopefully you damage the invader as much as possible... at the same time calling into the headquarters to get your SEAL units ready to go," said John Wherry, an immunologist at the University of Pennsylvania. If the invaders aren't driven off, the "adaptive" immune system comes into play. A few days into a first infection, "B cells" wise up to the threat and start pumping out antibodies. Vaccination also trains B cells -- mainly inside lymph nodes in our armpits, near the site of injection -- to be primed and ready. Shapiro likened them to intelligence operatives, holding vital information about threats. The most potent kinds of antibodies, known as "neutralizing," are like chewing gum sticking to the business end of a key, stopping it from unlocking a door. There are other, less heralded antibodies that aren't as sticky as the neutralizing kind -- but still help grab a hold of the virus, dragging it towards immune cells, or calling for help and escalating the overall response. B cells' key partners are "T cells," which can be broadly split into "helpers" and "killers." Spurring B cells "Killers are like assassins, and they go and attack the cells that have been infected," said Shapiro -- but these assassins also inflict collateral damage for the sake of the greater good. The helper T cells "are like generals," added Shapiro, marshaling troops, spurring B cells to up their production and directing their lethal counterparts toward the enemy. Because of its heavily mutated spike protein, the Omicron variant may more easily slip by neutralizing antibodies conferred by prior infection or vaccination. The bad news is this makes people more prone to symptomatic infection. But the good news is that T cells aren't nearly as easily fooled. T cells have a "periscope" into infected cells, where they can look for the constituent parts of the virus during its replication cycle, said Wherry. Clever disguises They're much better at recognising tell-tale signs of foes they've encountered before, even if their clever disguises get them past antibodies. The killer T cells carry out search-and-destroy missions, poking holes in infected cells, bursting them open, and triggering reactions to bring inflammatory proteins known as "cytokines" to the fight. Depending on the speed of the response, a vaccinated person with a breakthrough infection might get mild, cold-like symptoms, or moderate, flu-like symptoms -- but the chances of severe disease are drastically reduced. None of this detracts from the case for boosters, which skyrocket the production of all types of antibodies, and also seem to further train B and T cells. "Omicron is concerning, but the glass is still half-full -- it's not totally going to evade our responses," Wherry said.
Out-of-control rocket stage is tumbling toward Earth Space experts are tracking a Russian rocket part that is set to make an uncontrolled reentry into Earth’s atmosphere within the next 24 ure. The Angara-A5 heavy-lift rocket was launched from the Plesetsk spaceport in Russia’s northwestern Arkhangelsk region on Monday, Desember 27. The launch was testing a new upper rocket stage, known as the Persei booster, volgens to the state-run TAS news agency. It’s safe to say that in the next 24 hours it will be down but where, nobody can say, because in the window of several hours it will do several revolutions around the globe,” Holger Krag, the head of the European Space Agency’s Space Debris Office, aan CNN gesê. Most space debris burns up on reentry to Earth’s atmosphere, but it’s possible that larger parts could cause damage if they land in inhabited regions. The Russian rocket part was traveling at 7.5 kilometers per second (4.7 miles per second), and its reentry latitude was likely to be between 63 degrees north and south of the equator, Krag said. Risk level While it was highly unlikely that it would cause damage or hurt anyone, “the risk is real and cannot be ignored,” hy het gesê. In Mei 2021, NASA lambasted China for its failure tomeet responsible standardsafter debris from an out-of-control rocket used to launch China’s space station plunged into the Indian Ocean. The Russian rocket part is thought to be smaller than the Chinese debris, weighing around 4 tons without fuel, compared to around 20 tons for the Chinese Long March 5B rocket, said Krag. The Chinese Long March rocket was one of the largest objects in recent memory to strike the Earth after falling out of orbit, following a 2018 incident in which a piece of a Chinese space lab broke up over the Pacific Ocean and the 2020 reentry of another Long March 5B rocket. The Persei booster was about 10 meter (33 voete) long compared to 32-meter (105-voet) Chinese Long March 5B rocket, said Jonathan McDowell, an astronomer at the Center for Astrophysics – Harvard & Smithsonian. While it weighed less, it was carrying about 16 tons of propellant on board, hy het gesê. Die “total mass is about the same as the Chinese stage, but most of it is probably liquid and will burn up in the atmosphere, so the risk to the ground is significantly less. ek dink,” said McDowell via email. Original intentions He added that the Russian rocket stage was not intended to reenter the Earth’s atmosphere in this way. It was meant to end up in an orbit where it would stay for many thousands of years. The rocket failed to restart. The Chinese stage reentry was by DESIGN, they deliberately left it in a low orbit. He said the rocket stage would reenter between 1 nm. en 5 nm. ET Woensdag. Russia’s space agency Roscosmos told CNN the launch was operated by the Russian Ministry of Defence, which did not immediately respond to an emailed request for comment. Best international practice for spent rocket parts or spacecraft at the end of their life span was typically to make a controlled reentry and fall to Earth in an uninhabited areausually a remote part of the Pacific Ocean, Krag said. Krag added that, gemiddeld, 100 aan 200 tons of space junk reenter the Earth’s atmosphere in an uncontrolled way every year. Only one person is known to have been hit by space junk — n vrou named Lottie Williams in Texas in 1997. She lived to tell the tale. , , , , , Kommentaar gesluit.
Why Computer Science and Engineering? 2. Expertise in CSE enables you to solve complex, challenging problems. CSE is a discipline that offers rewarding and challenging possibilities for a wide range of people regardless of their range of interests. CSE requires and develops capabilities in solving deep, multidimensional problems requiring imagination and sensitivity to a variety of concerns. 3. CSE enables you to make a positive difference in the world. CSE drives innovation in the sciences (human genome project, AIDS vaccine research, environmental monitoring and protection just to mention a few), and also in engineering, business, entertainment and education. If you want to make a positive difference in the world, study CSE. 4. CSE offers many types of lucrative careers. CSE jobs are among the highest paid and have the highest job satisfaction. CSE is very often associated with innovation, and developments in computing tend to drive it. This, in turn, is the key to national competitiveness. The possibilities for future developments are expected to be even greater than they have been in the past. 5. CSE jobs are here to stay, regardless of where you are located. There actually are more computing jobs than qualified people to fill them. If you consider the expected growth in computing, it’s easy to see that companies simply need more talent. Don’t miss out on pursuing the large number of open positions available right now. 6. Expertise in CSE helps you even if your primary career choice is something else. Having a CSE major will provide you with a foundation of knowledge, problem solving and logical thinking that will serve as a competitive advantage to you in your career, in whatever field you choose. 7. CSE offers great opportunities for true creativity and innovativeness. Creating high-quality computing solutions is a highly creative activity, and computing supports creative work in many other fields. The best solutions in computing exhibit high levels of elegance and beauty. 8. CSE has space for both collaborative work and individual effort. CSE is often about being part of a team that requires people with many different kinds of skills. Yet there is also plenty of space for individual flair and imagination. 9. CSE is an essential part of well-rounded academic preparation. An increasing number of universities and employers see successful completion of a computer science & engineering course as a sign of academic well-roundedness. 10. Future opportunities in CSE are without boundaries. CSE is one of those fields where it is almost impossible to predict what will happen next. This is why we cannot even begin to imagine all the ways that you can make a contribution to it and it can make your life’s work exciting and real.
The five dimensions of an autistic brain Major brain structures implicated in autism. Image via Wikipedia Enhanced by Zemanta Effecient Related Posts: 6 thoughts on “The five dimensions of an autistic brain 1. Pingback: Autism and Safety | Autism diet Blog 2. Pingback: Genetic Autism Research Has Struck Out | Autism spectrum disorder Blog 3. Pingback: cognitive psychology wiki | COGNITIVE PSYCHOLOGY 4. PanManiac Im curious to know which symptoms line up with each dimension and what happens when someone has some dimensions typical for autism but others far in the opposite direction? Also couldn’t you go on to even more dimensions? What if cortical thickness in one spot is profoundly in one direction and profoundly the opposite way in another? 1. sandygautam Post author Hi PanManiac, I don’t know of any research or theorizing that has tied these neural dimensions to Autistic symptoms, although that would definitely be interesting. By breaking into fine grained neural endophenotypes, one does make open to the possibility that these would be not correlated and diverge in different directions, although in the most plausible scenario they all correlate and cohere. In the case that they do diverge we will have a spectrum and that is exactly what we have instead of a black and white categorical assessment. regarding your other point, it is indeed true that the cortical thickness would be in one direction in one region and in opposite direction in other regions; the SVM uses the exact value at a particular vortex to classify, so is not based on one absolute avergaed value of cortical thickness, but indeed takes regional variation into account. Comments are closed.
Why is the Drinking Age 21? Presidents of some of the country’s biggest colleges and universities have come out in support of the Amethyst Initiative, which is pushing a proposal to reconsider the national drinking age of 21. The group contends that the current policy hasn’t actually deterred alcohol abuse among college-age students; instead, it’s forced these young people to imbibe in a “culture of dangerous, clandestine binge-drinking,” which might sound familiar to, oh, just about anyone who attended college, has seen a college-themed movie, or has heard the word “college.” So if this policy might not be the best way to deter alcohol abuse, how did we end up with a drinking age of 21 in the first place? That answers the legal question of why the drinking age is 21, but what was the underlying logic of the original policy? Did lawmakers just pick 21 out of a hat because they wanted college seniors to learn the nuances of bar culture before graduation? Not quite. The concept that a person becomes a full adult at age 21 dates back centuries in English common law; 21 was the age at which a person could, among other things, vote and become a knight. Since a person was an official adult at age 21, it seemed to make sense that they could drink then, too. Who was responsible for lowering the drinking age to 18 for part of the 20th century, though? Believe it or not, Franklin Roosevelt helped prompt the change in a rather circuitous fashion. FDR approved lowering the minimum age for the military draft from 21 to 18 during World War II. When the Vietnam-era draft rolled around, though, people were understandably a bit peeved that 18-year-old men were mature enough to fight, but not old enough to vote. Thus, in 1971 the states ratified the Twenty-sixth Amendment, which lowered the voting age to 18. Legislators started applying the same logic to drinking. The drinking age, which the 21st Amendment made the responsibility of individual states, started dropping around the country. Critics of the change decried rises in alcohol-related traffic fatalities among 18-20 year-old drivers in areas where the drinking age had been lowered. Indeed, one result of leaving states in charge of their own age was the creation of “blood borders” between states that allowed 18-year-olds to drink and those that didn’t. Teenagers from the more restrictive state would drive into the one where they could buy booze, drink, and then drive home, which created a perfect storm for traffic fatalities. Even if teens weren’t any more predisposed than older adults to drive after they’d been drinking, all of this state-hopping meant that those who did drive drunk had to drive greater distances to get home than their older brethren, who could just slip down the block for a beer or six. More miles logged in a car meant more opportunities for a drunken accident. Who led the back-to-21 movement? Organizations like Mothers Against Drunk Driving began agitating for a uniform national drinking age of 21 to help eliminate these blood borders and keep alcohol out of the hands of supposedly less-mature 18-year-olds. As a result, President Reagan signed the aforementioned National Minimum Drinking Age Act of 1984. MADD’s “Why 21?” website touts a National Traffic Highway Administration finding that the raised drinking age policy saves around 900 lives a year. Traffic reports show a 62% decrease in alcohol fatalities among teen drivers since 1982. Raw numbers show that drunk driving fatalities have definitely dropped since the early 1980s; despite an 88% increase in the number of miles driven, 2007 saw over 8,000 fewer total alcohol-related traffic fatalities than 1982. Teasing out the underlying cause of this reduction in total fatalities is no mean feat, though. Non-alcohol traffic fatalities have also declined relative to the number of miles driven over the same time period, which could be attributed to any number of causes, including increased seat belt usage, the widespread use of airbags, and other safety improvements to cars and roads. Moreover, drinking and driving for the whole population might be down as the result of increased education on its consequences, harsher penalties, improved enforcement, or increased stigmatization of drunk driving. The college presidents who support the Amethyst Initiative admit that drunk driving is a serious problem, but they point out that it’s not the only potential pitfall for young drinkers. They contend that by lowering the drinking age, colleges would be able to bring booze out into the open and educate students on responsible consumption. Such education might help curb alcohol poisoning, drunken injuries, drinking-fueled violence, and alcoholism on campuses. Interesting bit of trivia: the group takes its name from the character Amethyst in Greek mythology. She ran afoul of a drunken Dionysus, who had her turned into white stone. When the god discovered what he’d done, he poured wine on the stone, turning it into the purple rock we know as amethyst. Ancient Greeks wore the mineral as a form of protection from drunkenness. So is there any place in the United States an 18-year-old can escape the uniform 21-year-old drinking age? For a while, Louisiana was a safe haven for thirsty teens. To comply with the letter of the national drinking age law, the state passed a law that made it illegal to buy alcohol if you were under 21. However, the law had a pretty large loophole built in: it wasn’t illegal to sell alcohol to people under 21, a trick that severely hampered the enforcement of the drinking age. The state closed this exception in 1995, though. For the truly creative, the National Institutes of Health note that since Indian reservations are domestic sovereigns they don’t fall under the existing federal drinking laws. Don’t start researching your own tribal history just yet, though; according to the NIH over 200 tribes have passed their own laws against underage drinking. Found this Post interesting? Discover more Curious Reads. [via mental floss] More Post From The Web
• Today is: Friday, May 27, 2022 What you need to Know about Asthma Attack HWC team January06/ 2017 Asthma is a common condition in which the airways becomes inflamed and narrow resulting in production of excess of mucus. During asthma the muscles around your airways becomes tightened and triggers symptoms that makes it difficult for air to move in and out of your lungs. What is an Asthma attack? Asthma attack is the sudden worsening of the asthma symptoms leading to tightening of your muscles around your airways. The common symptoms associated with asthma are difficulty in breathing, chest pain, sweating, wheezing and difficulty in speaking. The first thing you need to do when you experience an asthma attack is, stop whatever you are doing and don’t panic. The most important thing you need to do is, calm and relax and try to restore your breathing. Firs aid tips to control Asthma Attacks First aid tips helps in controlling your asthma attacks. The common tips that you need to follow are: 1.      Know the cause of sudden attack Try to stay away from the possible triggers that can cause attack. Generally smoke and dust causes asthma and you need to keep yourself away from such triggers. Skin test usually helps you in knowing the allergens that can cause asthma. There are certain foods and chemicals that can also cause asthma attack. In few cases strenuous activities and physical exertion can also lead to asthma attack. In rare cases fatigue and stress are also considered as one of the cause of asthma attack. 2.      Know how to improve your lung capacity Daily physical activities can improve your lung capacity and enhance the respiratory system functioning. It is recommended that daily 10-15 minutes of simple aerobic exercise can improve your lung capacity and helps you in preventing asthma attacks. Frequent smoking can make the situation worse and triggers asthma attack frequently. 3.      Try to sit upright When you experience asthma attack, try to sit in upright position. Generally you will feel dizzy during asthma attack but lying down can aggravate your condition. Lying down during an asthma attack can make it harder for you to breathe and inhibit sufficient oxygen supply to your lungs and make the situation more worse. 4.      Carry the inhaler with you at all times Carry inhaler at all times is essential. Take 1-2 puffs as instructed by your doctor for quick relief during an asthma attack. Take slow breaths to normalize your breathing. Inhalers helps in preventing complications caused due to asthma attacks. 5.      Consult the doctor when required When you experience an asthma attack and not carrying inhaler, it is recommended to consult the doctor or call the emergency help line number for immediate help. In few cases even after using inhalers, you might not feel comfortable and face difficulty in breathing. In such situations immediately call an ambulance and take medical help. What happens if an Asthma Attack goes untreated? If you don’t use inhaler or the medications that are required to prevent your asthma attacks, your breathing becomes more labored and you will experience louder wheezing. Your lungs become more tighten during an asthma attack as there is not enough air movement to producing wheezing.  This condition is referred as silent chest and is considered as a danger sign. It is better to be aware of the simple first aid tips that can help you in preventing asthma attacks. Precautionary measures helps in avoiding complications due to asthma attack. HWC team nine − 3 =
4 Mental Health Lessons From Islam An active faith life can significantly improve mental health. I’ve found this to be true from my experience as a lifelong Muslim, an Imam with experience as a therapist, and a member of an organization for Muslims in recovery. Many people credit their recovery from addiction and other mental health issues to God and the support of a religious community. Each religion also has a unique contribution to make to conversations about addiction and mental illness. Islam contains at least four basic truths or lessons that can be a source of healing and comfort to people affected by these disorders…. 1. Addiction and Mental Illness Don’t Discriminate Source: pexels.com Anyone can suffer from mental illness, regardless of their faith or religion. There can be a tendency in religious circles, Islam included, to think it’s a sign of weakness to suffer from addiction or other mental health issues. This stigmatization isn’t helpful because it can keep people from seeking medical help. (Learn how treatment is helping people recover from drug addiction at FHE Health.) The truth is that mental illness is a disorder of the brain. Being a believer— (in any faith tradition)—doesn’t mean you can’t suffer from depression or anxiety. Nobody is immune to mental illness just because of a particular religious identity, faith tradition, or even an especially strong devotion to God or Allah. 2. The Importance of Both the Spiritual and the Practical Source: pexels.com Belief in God’s provision must make room for medical treatment. The prophet Muhammad said, “Trust in Allah but tie your camel.” What he meant was that living a spiritual life in communion with God should not be an escape from or denial of the practical needs of daily life. The spiritual is important, but so is the practical. By extension, if you have a mental health issue, pray and trust in Allah but also act to get the problem addressed. We can’t just “pray” certain things a way. Most of us know, for example, that if we have a serious medical condition we should get it treated by consulting a doctor and following their advice. The same needs to be true for mental health disorders like anxiety or depression. They are medical conditions that today are thankfully treatable much of the time. 3. Comfort From Meditation on Allah’s Nature and Attributes Source: pexels.com Meditating on the perfection and goodness of Allah can be comforting. In Arabic, we use the term “Allah” to describe the God we worship. “Allah” conveys perfection that supersedes all forms of perfection beyond our human imagination. There is no higher or more perfect being than Allah. We speak of Allah as One who is above the superlative degree. Allah is to the “infinitive” degree. By that we mean that Allah is greater than any power. Allah is the Creator of all things and the only One who can make something out of nothing. Allah the Incomparable One cannot be adulterated. Whereas you can take an integer and fractionalize it, Allah is indivisible. This belief can be traced all the way back to Islam’s origins with the prophet Muhammad. At the time, people were getting into polytheism. Islam grew out of a desire for purification: It was a return to the One True God. This One True God has 99 attributes. They help to describe Allah’s goodness. Allah is the Most Merciful, the Source of Peace, the Most Bountiful, the Most Honorable, the Most Holy, and the list of adjectives goes on. In times of anxiety or depression, it can be comforting to reflect on Allah’s goodness and encouraging to remember that Allah knows and sees everything we’re going through. 4. Peace From Submission to Allah and the Law Source: pexels.com Daily submission to Allah and the law can bring peace and tranquility. If you want peace, you connect yourself with the Source of Peace. In Islam, the word for tranquility is “sakinah” and is born out of the word for “peace be to you” in Arabic. We can find this peace and tranquility through remembrance of the law and doing those things that are obligatory (“fard” in Arabic). For example, we are obligated to pray five times a day and to follow the rituals that accompany prayers. When I’m in this prayer mode, it is not just me praying but my whole body stopping to pray; I must wash myself, face the East, and make sure everything is clean. This act of worship is also a form of meditation and can be very calming. It is a reminder that Allah is watching, so it brings a very strong sense of peace, love, devotion, and hope. If you have these things in your heart, that’s how you get high. Peace is an outgrowth of submission to Allah and the Law of Allah. Submission can be defined as doing everything you can to please God. This posture of submission affects our beliefs, actions, and character. It affects everything that we have and do. And because the Law is so detailed, it can provide relief from anxiety about whether we are living according to Allah’s perfectly good will for us. We can know that we are pleasing Allah. In fact, Allah is so beautiful in His perfect mercy that He has arranged that if we do just one good deed, that one good deed will take 10 bad deeds out of our account. While not an exhaustive list, these four mental health lessons from Islam can be a source of peace, comfort, and help for people who may be facing addiction or mental illness. Ultimately, Islam allows us to see the problem and understand it as it really is—then take responsibility to address it. If we need some help, we must ask for help to get to the root of the problem. Jory Kareem is an Imam in Boca Raton, Florida. He has served as a therapist and in other roles at the national behavioral health provider FHE Health.
Getting and Spending Excerpt from Human Development Report 1998 UNDP One child born in New York City, Paris or London will consume, waste and pollute more in a lifetime than as many as 50 children born in the average developing country. The wealthiest 20% of the world's people use 58% of the world's energy and consume 45% of all meat and fish. They own 87% of the world's vehicles and have access to 74% of all telephone lines. Poor households typically spend more than half of their income on food. Still, about one-fifth of the 4.4 billon people living in developing countries are malnourished. By 2050 8 billion of the world's projected 9.5 billion people, up from about 6 billion today, will be living in developing nations. A 1986 survey showed that citizens in the US believed they needed an income of at least US$50,000 a year to "fulfil their dreams" By 1994, the figure had doubled. Public spending on primary and secondary education averages $15,500 per person in Luxembourg, and $57 in China. Public and private spending on health care averages about $2,000 per person in Finland, and $3 in Vietnam. The average person in North America uses twice as much electricity as someone in the European Union, and 14 times more energy than someone in the developing world. An additonal $6 billion a year would be needed to achieve universal basic education -- about $2 billion less than what is currently spent in the USA alone on cosmetics. An additional $13 billion a year would be needed to ensure basic health and nutrition for all -- a fraction of the amount spent in Europe on cigarettes ($50 billion) or on alcoholic drinks ($105 billion). At the end of 1997, more than 30 million people were living with HIV. With about 16,000 new infections a day, 90 percent in developing nations, it is estimated that over 40 million people will be living with AIDS in 2000. An additional $9 billion a year would be required to provide clean water and sanitation worldwide. That is about half the money currently spent on pet food in Europe and the USA. In 1997 the world spent $435 billion on advertising, mostly in Europe, North America and Japan. That is nearly 8 times the amount that was channeled to the developing world in the form of offical development assistance. Link to UNDP Human Development Report
The Summing Amplifier The op amp amplifier can be used to add the inputs and amplify the result. The circuit which achieves this is shown below. The summing amplifier works by adding the current throughandto give the current through Applying Ohm's Law,orto each component gives (The minus sign is do to the inputs being to the inverting (-) input). Add comment Security code
Image source - http://bit.ly/31ft5er This article has been written by Aditi Shrivastava, pursuing the Diploma in Cyber Law, FinTech Regulations, and Technology Contracts from LawSikho. The article has been edited by Zigishu Singh (Associate, LawSikho) and Ruchika Mohapatra (Associate, LawSikho). Information and communication technology has expedited the growth of globalization. Advancement and innovation of technologies such as telecommunication devices, the internet, and television have led to more interaction among people, businesses, and governments around the globe. The process whereby businesses or other entities and groups gain international influence or begin to operate on a global scale is known as globalization. Globalization facilitates the spread and exchange of ideas, beliefs, values, ethics, culture, knowledge, information, goods, and services between the people of different nations. Globalization builds a connection and promotes partnership among people and businesses of different countries. The impact of globalization is so tenacious that it has created an insuppressible interdependence of the world’s economies, communities, populations, and cultures. Along with the progressive and evolutionary impact of globalization, it has numerous negative consequences as well. No doubt that ICT has pushed the growth of globalization but the combination of globalization and ICT has given birth to ‘Cyber Crimes’. Whereby globalization was facilitating the spread of cultures, beliefs, and values, it has also disseminated the ideas regarding innovation in crimes and unethical conducts. Globalization has developed as a defining element of the new century, and it has become an inevitable reality in contemporary society. Globalization is a force that cannot be ignored by any group or culture. It is a social development process in which geographical and cultural boundaries are broken down. Transportation and communication have resulted in the reduction of obstacles. Globalization is more than just an economic phenomenon; it is also a cultural phenomenon. The article aims to elaborately discuss the impact of Globalization on cybercrimes and how, with the growth of globalization and Information and Communication Technology, conventional crimes are getting replaced with crimes of the contemporary and digitalized world. It further explains how the perpetrators are coming up with innovative ways and ideas to commit a crime simply by sitting at their homes and having a good internet connection. What are cybercrimes? Globalization and advancement of technology have aided the spread of cybercrimes around the globe. Innovations and advancements in communication technology and the invention of the internet and telecommunication devices indeed facilitated the growth of globalization, which in turn aided the spread of innovative methods of committing crimes where the offender may not be present in the same city as the victim.  Cybercrime is defined as a crime done with or through the use of a computer, computer network, internet, or any other online service or electronic device. Committing theft of personal data from the laptop of the victim, sexually assaulting a woman on the social media platform, blackmailing and threatening a person on social media to extort money, defaming a person by posting false derogatory statements against him on social media platforms and many more are some of the examples of frequently committed cybercrimes. With the advancement in every field and every part of society, and with the world becoming more globalized with every passing day, these crimes are increasing and are given specific names and definitions. Cyber bullying, sextortion, cyber hacking, phishing, cybersex trafficking, child grooming, etc. are some of the types of cybercrimes. ICT and globalization The information revolution and the rapid distribution of knowledge have opened a new era of knowledge and information that has immediate impacts on economic, social, cultural, and political activity in many parts of the globe. Governments all across the world have recognized the potential importance of information and communication technologies in socio-economic growth. Information Communication Technology (ICT) is a computer-based system for transmitting, receiving, processing, and retrieving data that has transformed the way we think, live, and interact with our surroundings. It’s important to remember that globalization isn’t only about financial markets; it also includes a wide spectrum of social, political, economic, and cultural aspects. Globalization’s primary and driving force is the information and communication technology revolution, and the dynamic change in all aspects of human existence is a major by-product of the current globalization period of the digital revolution. ICTs are becoming increasingly significant in the ability of companies and society to produce, acquire, adapt, and utilise information. Because of its potential to improve the transfer and acquisition of knowledge, it is being hailed as an instrument for the post-industrial age and the foundations for a knowledge society. ICT could provide developing countries with extraordinary chances to reform educational systems, better policy formulation and implementation, and expand the range of prospects for business and the poor, in addition to facilitating knowledge acquisition and absorption. Learning, knowledge networking, knowledge codification, teleworking, and science systems could all benefit from it. ICT can be utilised to gain access to global knowledge and to communicate with others. Without a question, the entire world is becoming digital, and globalization is speeding up every day as a result of this uninterrupted and highly functional information and communication technology. Globalization is predominantly affected by rapid advancements in ICT, which have resulted in a tremendous expansion in globalization over the last millennium. Impact of globalization and ICT Globalization has benefited industrialized countries while sometimes having negative consequences. Education and learning, commerce, technology and innovation, competition and entrepreneurship, investments and capital flows, employment, culture, and organizational structure are just a few of the positive consequences. Some elements of globalization that have a negative influence include job instability, price fluctuations, terrorism, cybercrime, cyber threat, currency fluctuations, capital flows, and so on. The impact of globalization on cybercrimes is elaborately discussed in this paper.  Offenders are coming up with new means and ideas to commit crimes as a result of the rapid emergence of globalization and ICT. Conventional crimes did not necessitate the use of computers or the internet, but with the advancement of technology, a person can steal personal data and information from his house. He is not required to visit the victim’s residence. In the online realm, this is known as hacking and data theft. Committing the offense of theft or extortion becomes easy when the victim cannot see the offender but it becomes easier for the offender to hide from the police when the offense is committed in the virtual world. Crimes in the globalized world As India progresses toward increased computerization, putting a greater number of operations on the internet, from government administration to surveillance and developmental programs, the threat of cybercrime is rising with each day. The threats of this crime have grown significantly as the process of globalization has expanded the levels and dimensions at which countries of the world interact nowadays. It appears that as the world becomes more globalized, the risk of cybercrime increases. In most situations, cybercrime is an attack on information about individuals, organizations, or governments; the attacks do not take place on a physical body, but rather on a virtual body, which is a collection of information about people and organizations on the internet. New technology opens up new criminal opportunities, yet there are rarely new forms of crimes. In the globalizing world, conventional crimes are getting replaced with innovative ones. The perpetrators are coming up with new means and ideas to commit crimes in the digitized world. When a conventional crime is committed with the use of computer or internet sources, it becomes a cybercrime. Some of the infamous conventional crimes, when committed in the globalized and digitalized world are given below- 1. Cyber theft Prior to globalization and innovation of ICT, the crime of theft required visiting the offender to the victim’s place of work or residence to steal the money, goods, confidential documents, and information because money and confidential documents used to be in tangible form locked up in a safe. In the contemporary world, when the personal and financial information of the victim is stored in his laptop or mobile phone, and when money is present in the bank accounts that can be virtually transferred, it has become very easy for the perpetrators to hack into the victim’s system and steal such data. There have been cases where the money is stolen from the account of the victim and transferred to some unknown bank account. Such crime is known as Cyber theft where the offender may not be present in the same city or country as the victim. 2. Cyber terrorism and cyber extortion When the offender hacks into the computer system of the victim and decrypts all the files and information stored in it and demands a ransom to decrypt them, such crime is known as cyber extortion. It refers to the conventional crime of extortion whereby the offender puts the victim in fear of physical injury to dishonestly induce him to deliver some property or money but is committed to the use of technology. Cyber terrorism refers to the use of computers and digital technology for political purposes to generate widespread disruption or fear in society. Cyber terrorism takes place in the virtual world unlike conventional crime of terrorism whereby the public or group of people are physically terrorised.  3. Sextortion The offender threatens and blackmails the victim to reveal her and publish the morphed and private pictures with the aim to extort sexual favors or/and money. This is known as sextortion. Unlike the conventional crime of sexual harassment, this does not require the use of criminal force or physical sexual assault of the victim. The offender can extort money and sexual favors from the victim with the use of digitally generated images and videos. 4. Cyber bullying and cyber defamation Cyber defamation involves the publishing of derogatory statements against the victim on social media platforms. Cyber defamation involves the use of the internet, social media platforms, or other intermediaries. Posting or publishing abusive and defamatory comments against the victim on social media platforms, constantly messaging or calling the victim on her mobile phone, posting morphed images of the victim on social media intermediaries are some of the acts covered under cyberbullying. Under conventional law, such an act of physically approaching the victim with the intention to establish a personal interaction is punishable under IPC. This may or may not require the use of the internet and mobile phones. 5. Sexually abusive or pornographic content It involves assault and sexual abuse of the victim over the internet, morphing the images of the victim and demanding sexual favors, using the morphed images of the victim for pornographic purposes. Morphing the images of a person has become very easy in the digitized world where one can download the image from the social media account of the victim and can edit it with the use of various photo-editing software.  6. Cyber fraud and forgery Cyber fraud involves attaching fake electronic signatures to an electronic document, altering the contents of any confidential document, creating fake digital identities, creating false e-documents to produce it as evidence in the court of law, etc. This does not involve paper and pen or making duplicate/false traditional signatures. The precision is so high that it becomes almost impossible to differentiate between the original and the fake document, identity, or signature.  It also involves deceiving people while displaying fake identities and inducing them to make online payments. It involves job scams where the offender acts as the HR of any reputed company and dishonestly induces the candidate to pay a sum of money to complete the onboarding formalities. The above mentioned are some of the cybercrimes that are being frequently committed in the digitalized and globalized world. These crimes are punishable under Information Technology Act, 2000 and the Indian Penal Code, 1860.  Globalization is the unshakable reality of today’s world. Information and communication technology has resulted in the boom of globalization and the exchange of ideas and beliefs across the globe. A person sitting in India can invest in a business running in America. It is very important to note that globalization is not only an economic phenomenon; it creates a way for people to indulge in social and political activities as well. It creates a medium for people to exchange and spread ideas, values, beliefs, and lifestyles. A British individual can influence people sitting in India simply by writing a post or uploading a video on a social media platform. Globalization facilitates the spread of cultures across nations. The dominance of western culture in India is the result of globalization. This medium of exchange of ideas and beliefs is indeed what the world needed to expand the horizons of development and awareness but as it has been said that “anything in excess is poison”, globalization also negatively impacted this world. People not only exchanged values and ethics but also came up with innovative ways to commit crimes. The boom in ICT and the invention of the internet, mobile phones, and computer resources also resulted in the commitment of crimes in the virtual world, making people unsafe while using the internet and telecommunication devices. When a conventional crime takes place in the virtual or online world, it is known as cybercrime. Therefore, globalization and ICT together influenced the growth of cybercrimes in the world. Committing the offense of theft or extortion becomes easy when the victim cannot see the offender but it becomes easier for the offender to hide from the police when the offense is committed in the virtual world. As elaborately mentioned in this paper, how easy it is to commit a crime in the virtual world and also to escape liability, the number of cybercrimes is increasing day by day.  Indian law provides the Information Technology Act, 2000 for the regulation and punishment of cybercrimes in India. The Government of India has also set up a national cybercrime reporting portal for the online complaint registration of cybercrimes and cyber cells for offline complaints. The national cybercrime reporting portal also gives an option of anonymously filing a complaint in case of female/child victim of sexual abuse or pornographic content. The status of complaints can also be tracked after registration. India has been modifying and expanding the scope of ICT law but ICT has been developing as well and perpetrators are coming up with new ideas of committing the crimes every single day. There is a need for stronger management and investigation mechanisms for the cyber police to catch the cybercrime offenders. • The Information Technology Act, 2000. • Indian Penal Code, 1860. Journal Articles • Anupam Sharma, Globalization and its Impact on Cybercrime: A case study of Indian Police Administration, Indian Journal of Public Administration, Volume 56, Issue 2 (2017), pp. 217-232. • Advento Jeronimo, The Globalization Effect of Law and Economic on Cybercrime, Jurnal Pembaharuan Hukum, Volume 6, Number 3 (2019), pp. 384-395. • L.A. Ogunsola, Information and Communication Technologies and the Effect of Globalization: Twenty-First Century “Digital Slavery” for Developing Countries- Myth or Reality? Electronic Journal of Academic and Special Librarianship, Volume 6, Number 1-2 (2005), pp. 2-15. Online articles Please enter your comment! Please enter your name here
Why did the ancient civilizations create star maps on the Earth? 30th of January 2022 at 9.00-11.30 am PT: Cost 40 USD. Left: The Pyramids of Teotihuacan, Center: The Belt stars of Orion, Right: The Giza Pyramids ”As above-so below” is a saying which potentially refers to many different levels of existence one of which may be how the earth plane is recreated as a mirror of the heavens. While this ideal is now essentially forgotten, the ancient peoples of the Earth certainly took it very seriously. One of the expressions of this was the ambition in many different civilizations of our planet to create temple and pyramid sites that mirrored the heavens, so-called star maps. Why did this activity stop? In this seminar, based on the Mayan calendar and what this tells us about the evolution of consciousness, I will discuss not only those formed by the pyramids in Egypt and Mexico, but also some others lesser known that in certain ways present a consistent pattern that I believe can clarify our understanding of this Creation. The cost for this seminar, which will take place online Sunday 30th of January 9.00-11.30 am PT is 40 USD.
Nowadays, Mobile Application is an integral part of all businesses. The trend of developing mobile a Nowadays, Mobile Application is an integral part of all businesses. The trend of developing mobile applications has been changing very fast along with all adaptive newest technologies. However there are only two biggest platforms that mobile apps are developed, that is iOS and Android. In our last article we studied three main kinds of iOS programming languages, this time we will show you vital advantages of Java, the most popular programming language for the Android platform.  What is Java? Java is a programming language and computing platform first released by Sun Microsystems in 1995. It is used for the development of mobile applications (especially Android apps), web applications, web servers, application servers, game development, and database association. Currently, Java app development is the common option for building high-performance mobile applications. How is Java beneficial for Android native app projects? Object Oriented Programming The primary benefit of using Java for android development is that it provides the concepts of OOPS (Object Oriented Programming) and is more proficient because they are extensible, scalable and adaptable. A rich library of default design patterns and other best practices comes with it. It is more adaptable to the growth of mobile apps because it is open-source. This permits you to make modular projects and reusable code. When building up Java android applications, web and app developers can use the source codes to modify the application coding according to their prerequisite.  Open-source Programming Language This outstanding programming language also provides a great collection of open-source libraries that essentially reduce the total cost of creating applications and speed up the procedure. Java is a high-level programming language, which means it simplifies Java android application development, and makes it much easier to write, read, and maintain. Powerful Development Tools Java app development also comes with a collection of excellent programming tools, making it much easier for app developers to work on it and construct an application that suits your needs perfectly. Java app development comes with few most popular development tools, including Eclipse, NetBeans, Robust, and many more. Such powerful tools play a crucial role in making Java programming language the first choice of Java android app development companies. Community Support to Developers Android developers can acquire genuine bits of knowledge of this programming language from the similar developers in their community and are ready to grow their network broadly. Its constructive developer group shares the insights and associated data to help beginners enhance their Java app development skills. Builds Robust and Secure Mobile Applications Security is the integral part of any mobile app design. Compiler, interpreter, and runtime environment:  all have been developed in the Java programming language keeping security in mind. Java has robust tool sets, which not only assist developers in coding but also give them the ability to influence debugging. Besides, Java puts a lot of focus on testing for early potential errors as its compilers are able to identify several issues that could occur during first execution time in other languages.
The expression I am looking for is something like this: Rather than putting the whole mixture of spices at one while cooking something, put a part of it in various steps/rounds separated by a regular interval. Is using rounds correct, or should I use something else? Basically, what I want to know is what word I am supposed to use to mean I am doing something in distributed steps rather than all at once. 7 Answers 7 Your original sentence is unclear to this extent: Do you mean that each spice should be put in separately (one spice at a time) or that they should all be mixed together into something like a curry powder and then added in equal fractional parts? I'll assume the former (it's more rational for cooking for a couple of reasons). You can say it this way: Rather than adding all (of) the spices at the same time while cooking something, put them in one at a time at regular intervals, for example, every 2 minutes. You can also say: ... put them in (separately) step by step, ..." There's no need to clutter the sentence with unnecessary terms like "rounds" and "steps". • Actually it is latter, what I want to know is that, if I am doing something repetitive like reading a particular chapter of a book but not doing at once, but doing it in several steps, what will I call that, Feb 3, 2013 at 11:27 • @johnmconore - Reading a book - "you are reading it in parts"? – Mohit Feb 3, 2013 at 11:50 • yeah, not reading it all at once, reading some part today some tomorrow some over the weekend. Hope this helps Feb 3, 2013 at 11:57 • 1 @johnmc: You can say that you're reading the book "chapter by chapter", "a few pages at a time", "piecemeal", "in 15-minute chunks": whatever best describes what you're actually doing. A more general description might be "in {manageable / digestible / bearable} parts". You can read a play or a screenplay "scene by scene", a textbook "chapter by chapter" or "topic by topic", etc. We don't have a more general description, except, perhaps, "part by part" or "a little at a time". – user264 Feb 3, 2013 at 12:15 • 1 @johnmconore If you need to be exceptionally pompous - if an editor or professor presses for a more formal expression - you may say "incrementally" or "in increments of [quantity]". But try to resist. Feb 3, 2013 at 13:37 A typical way of saying this is I followed the recipe step by step, or I followed the steps in order. I don't know a good single word for the process, although gradually, used in context, comes close. It still needs a verb to make sense. "Incrementally" means "do things in steps". There isn't a common noun that comes to mind that means this, but several adjectives. Periodically or gradually probably expresses what you mean the most succinctly: Rather than putting the whole mixture of spices in at once while cooking something, periodically add part of the mixture while it cooks. Rounds or steps refer to a process, not a thing. The first thing that comes to my mind with the word round is a game of some sort. A situation where there are multiple people (or other entities) and everyone/each thing is taking/receiving a "turn". There is an implication that everyone gets a turn, but no implication on the time that may take. You only have a single thing (the dish) receiving a single action (adding spices) that is desired on a defined time frame so the word round is not suitable. Steps means distinct actions to take to accomplish something. It does not by default suggest a single repeated action over time, but rather various different actions that must be completed in sequence. So in my opinion this word is not entirely suitable either. In this case, I would say: Put the spices in over time, while you're cooking. This is a stuffy term, but "seriatim" might do it if all else fails. "...seriatim is one after another, in order; taking one topic or subject at a time in an order; sequentially." - Wikidiff • Is "seristum" used anywhere outside of legal proceedings? – ColleenV Sep 15, 2017 at 15:36 "Rather than putting the whole mixture of spices at one while cooking something, add it in several batches." You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
Why Do I Have White Spots on My Teeth? Waterloo Dentist Kitchener White spots on your teeth are known as decalcification and are a form of acute discoloration. It is a common dental problem that many people experience, and while it is a cosmetic issue, most people want to treat these spots and want to prevent them from reappearing in the future. These spots can happen to anyone and the primary cause is decalcification; this is a process in which calcium and phosphorus are removed from the structure of your teeth. This is the result of acids that are formed by bacteria that dissolves teeth enamel and creates white spots. Some of the most common causes include bacteria overgrowth, too much fluoride, a poor diet and medications. Too much bacteria in your mouth will contribute to the formation of white spots, so you must follow through with your daily oral hygiene routine because if you allow bacteria to remain in your mouth, it will thrive and lead to a number of problems. Brushing and flossing will help prevent white spots on your teeth. Drinking too much fluoridated water, swallowing fluoride toothpaste and the use of certain medications will also lead to white spots, so be mindful of these aspects. Calcium is the foundation of teeth, so if your diet is low in terms of foods containing calcium, white spots will appear. Depriving your teeth of calcium means they are not getting the proper nutrients that are needed for healthy and strong tooth enamel, so make sure your diet includes almonds, cheese and leafy greens as they are rich in calcium. You should also be careful with the types of medications that you take because some antibiotics will impact the way your mouth builds tooth enamel and will make it easier for bacteria to get through. If you want to get rid of the white spots on your teeth, treatments are available but only through a professional dentist. These treatments cannot be done at home and your dentist can recommend a few different options based on your situation. Enamel microabrasion, teeth bleaching and porcelain veneers are all options you can consider and your dentist will help with the decision. Enamel microabrasion is a treatment that is executed mechanically and the use of tools will be required. It is a common process and very effective, so you will see results. Bleaching your teeth will also help get rid of white spots and your dentist will use one of two bleaches to whiten your teeth. Both hydrogen peroxide and carbamide peroxide are safe and will break up your white spots into smaller stains so that they are less noticeable. If you have white spots on your teeth, Forest Hill Family Dental can help. We can take care of all of your cosmetic dentistry needs, so whether you need dental implants or dentures, our dentists do it all. If you are in the Kitchener or Waterloo areas, give us a call today!
Africa Dialogue Narratives Communicating without Words: Language Barriers in the Atlas Mountains Story by Aspen Schneider, Dialogue of Civilizations⎜ Photo by Katherine Murrey Communication became the greatest comfort when traveling with a group of unknown classmates to a continent that I had never been and immersing in a culture and religion vastly different than my own. To be able to ask my professor questions, to discuss new ideas and experiences amongst peers, and to converse with my host family about the different lifestyles we live all helped immensely in feeling comfortable in Morocco and gaining understanding of the country. Within the High Atlas Mountains, however, a mountain range within the Northern area of Morocco in which we spent time, such communication was completely impossible. The villages within the High Atlas Mountains are isolated from the modernized world, with very little interaction with any other place. A sink with running water and a very old television were among the most advanced technology to be seen. Within an isolated way of life, also came a more isolated language. The villagers within the area spoke only Amazigh, a very old dialect, which is not commonly used. Suddenly, the ability to communicate with others and the connection that provided assistance in a foreign land no longer existed. The families of the High Atlas Mountains live simply, and are self-reliant for all of their needs. The mothers create the clothing that is worn, the fathers kill the animals that are eaten. Us students, when staying within the mountains, were tasked with helping the families complete their necessary tasks. Such tasks included bringing cattle to water sources, pulling weeds from the ground and cutting plants to bring home. Although such tasks may seem easy at first consideration, they become much more difficult when there is no common language for the person guiding you to explain the tasks at hand or provide assistance in the best methods to complete the assignments. What resulted from this lack of verbal communication was a much greater appreciation for non-verbal communication. The ability to point in different directions or at different paths, to demonstrate how to hold the weeds properly before pulling, to shake a finger when something was incorrect all proved helpful. Even more so, the warmth that a smile can bring and the reassurance provided from a clap of the hands were proven more so than ever before. The ability for different people, of very different lifestyles and backgrounds with almost nothing in common, to connect through the most fundamental cues was astounding. It served as a reminder that regardless of the many differences that exist amongst countries, amongst groups, and amongst people, we are all linked in some way. There is always a way to cooperate, to share a moment, to show kindness. %d bloggers like this:
Tote Bag Needs 21 Uses to Be More Sustainable Than Plastic, Study Finds By: Dave Roos The Chinese government announced a nationwide ban on stores distributing free ultra-thin plastic bags starting June 1, 2008. Chinese people had been using 3 billion plastic bags each day. China Photos/Getty Images On Election Day 2016, famously eco-conscious Californians will be asked to make an even more difficult decision than Donald or Hillary. Is it "bag or no bag?" Thanks to a ballot referendum sponsored by the American Progressive Bag Alliance (formerly the American Plastic Bag Alliance), California voters will have a chance to repeal the state's all-out ban on plastic grocery bags. California's plastic bag ban was passed in 2014, but implementation has been delayed until after the fall vote. Mark Daniels, chairman of the APBA, says Proposition 67 all about consumer choice and consumer education. "We're trying to educate consumers about the true environmental impact of plastic retail bags, not the mythology that environmental community has put out there as they've made this their flagship issue," Daniels says. Daniels, who is also senior vice president of sustainability at plastics manufacturer Novolex, believes that plastic grocery bags have been unfairly maligned as a pervasive environmental toxin. To counter the widespread belief that plastic bags contribute to global warming, choke sewage systems and poison wildlife, the plastics industry has funded scientific studies on the environmental impact of plastic grocery bags versus paper and reusable bags. In 2012, Daniels' company awarded $179,864 to researchers at Clemson University to conduct an in-depth life-cycle analysis (LCA) of the environmental costs of plastic bags versus other alternatives. The results were conclusive: plastic grocery bags were by far the most environmentally friendly choice at the checkout counter. How so? The Clemson report calculated that canvas tote bags would need to be reused at least 21.5 times before their environmental impact equaled that of plastic grocery bags. That's because most plastic grocery bags are made in the United States from byproducts of natural gas. The most common reusable bags — the $1 totes known in the industry as non-woven polypropylene (NWPP) — are made in Asia and require more energy to produce and ship. But don't most people use their reusable bags more than 21 times? That's the real "gotcha" moment of the Clemson report. According to a national survey, just 41 percent of Americans who shop with these tote bags reused them at least 21.5 times. (Most people reused them 14. 6 times.) Paper bags, which are seldom reused and require serious energy to produce and recycle, were considered the least environmentally friendly of the three options by the report. Andy Keller isn't buying it. Keller is the president and inventor of ChicoBag, a reusable bag company based in Chico, California. Keller's bags aren't the cheap NWPP bags studied by Clemson. ChicoBags are woven from either 100 percent recycled plastic or virgin polyester, are lightweight and compact, rolling up into a tiny pouch designed to fit into your pocket or purse. This is one way to encourage reuse — people don't have to remember to carry them, unlike traditional canvas totes. (The retail cost is $6.99 per bag.) Plastic Floating Islands? Keller doesn't trust any studies funded by the plastics industry, and he really doesn't trust the reusable bag numbers at the heart of the Clemson study. The national survey of reusable bag users was conducted by Edelman Berland, the market research wing of the global public relations firm Edelman, which happens to represent the American Progressive Bag Alliance. "The plastics industry has spent millions and millions of dollars in California to overturn our bag ban," Keller says. "If they spent a fraction of that on actually addressing the environmental issues that people have brought up with their product, and being good corporate citizens, they wouldn't have all these communities trying to ban plastic bags." For his part, Daniels claims that the so-called "environmental issues" linked to plastic grocery bags — like windblown litter and oceanic "garbage patches" — are exaggerated or patently false. "On average, plastic grocery bags are six-tenths of 1 percent of litter. We would love it to be nothing," says Daniels. "We don't want to see a plastic retail bag in any environment, whether it's roadside or whether it's in a marine environment. But it's been proven by Oregon State University and the EPA that there is no plastic trash island out in the ocean." Again, Keller disagrees. He has personally visited two of the five subtropical gyres commonly known as garbage patches. True, they're not floating islands of solid debris, but rather a smoggy soup of tiny plastic particles and detritus. The National Oceanic Service reports that fish and other marine wildlife eat these "microplastics," which can damage the digestive tract and potentially poison them with toxic pollutants such as PCBs.   "I've seen the results," Keller says. "I've seen the remains of plastic bags. I have firsthand experience seeing what plastics are doing to this earth. I would ask Mark Daniels, has he been out there?" Reuse versus Recycle Daniels simply points to the science, which he adamantly denies is biased or influenced in any way by the plastics industry. He says that his company and his industry are following the EPA hierarchy: reduce, reuse, recycle. Keller's company ChicoBag is a certified B Corporation, a global designation for a sustainable business, and has won the "Best for the World Environment" award three years in a row. Keller launched his reusable bag business in 2004 after visiting a landfill and seeing massive amounts of windblown plastic bags floating off of the garbage heap and back into the environment. He believes the California ban, if upheld by voters, will make more people question their disposable lifestyle. "Why are we using such a wonderful material to make things that are deigned to be thrown away?" asks Keller. "It's time to change the question from 'paper or plastic?' to 'do you need a bag?'" A 2011 study done by the U.K. government's Environment Agency, concluded that NWPP bags would have to be reused 11 times to have a lower potential on global warming than plastic bags that were not reused. But whatever type of bag is used, the report added, the key is to reuse it as much as possible, if not for other shopping, then as a garbage bin liner. This has greater environmental benefits that recycling the bag. Update: California voters upheld the ban on plastic bags 52 to 48 percent.
Cultural Value and Norm Assignment Cultural Value and Norm Assignment This assignment should be fun and creative but it needs to be safe. You should not do anything that will get you or anyone else in trouble, physically, emotionally, or legally. You should be able to do this as part of your daily interactions and routines. First, start by thinking about some pattern of behavior or interaction that interests you and that you regularly participate in as either actor or audience. This can quite literally be almost anything. Think about it specifically as a Culturally Based Pattern. All patterns of behavior reflect some larger Cultural Value and assumption. The point is not to just disrupt a routine. The point is to discover what the routine means to people and how we can tell when it is not followed Step one, what are the cultural assumptions and values that you will be disrupting? Second, plan out your violation of the scene so that you know how you specifically plan to implement your experiment. Third, run through it in your head and ask yourself; will anyone get harmed by doing this? If so do something different. Fourth, go ahead and do it and see what happens. Like a researcher, keep detailed observations. Pay attention to how different types of people react and respond differently. Pay attention to what is said, not said, or done to make sense of the violation. Even something as simple as an elevator ride can be a huge source of data, when you look closely enough. Fifth, always disclose your research and let the people you have been socially messing with what you are doing and why. It is only right to let them know and this can also be a great source of additional data. Sixth, write it all up in a two-page explanation of what you did and what happened. Be sure to frame and introduce the results by providing an explanation of the Cultural Value and Norm you are investigating. Get Accounting Homework Help in Canada from Helphub Calculate your paper price Pages (550 words) Approximate price: - Why Choose HelpHub Quality Researched Papers Qualified Writers Unlimited Revisions On Time Delivery Original & Confidential 24/7 Customer Support Try it now! Calculate the price of your order Total price: How it works? Follow these simple steps to get your paper done Help Hub Place your order Help Hub Proceed with the payment Choose the payment system that suits you most. Help Hub Receive the final file HelpHub Writing Services HelpHub HelpHub Essay Writing Service HelpHub HelpHub Admission Essays HelpHub HelpHub Editing Support HelpHub HelpHub Revision Support
Are schools in Ontario funded by property tax? Municipalities collect the education portion of property taxes for the school boards in their communities. … Property tax revenues are considered to form part of the allocation, and the Province provides additional funding up to the level set by the funding formula. Are schools in Canada funded by property taxes? For schools and districts across the country, funding from local sources makes up about 40 percent of all school resources. 7 The large majority of this funding comes from local property taxes. This means a district’s ability to raise money locally depends on its wealth. How do schools get funding in Ontario? Funding for education in Ontario is set through a provincial funding formula, and is based, for the most part, on the number of pupils in each school board. How are schools funded federally? According to the US Department of Education, the Federal Government contributes about 8% to funding US public schools. … The Local government allocates education funding from the revenue generated by property tax and other fundraising efforts. How schools are funded in Canada? IT IS IMPORTANT:  Which is an example of an in house sale? Is there a school tax in Ontario? Education taxes help fund elementary and secondary schools in Ontario. Education tax rates are set by the provincial government. All residential properties in Ontario are subject to the same education tax rate. The education tax rates can be found in Ontario Regulation 400/98. How much of my taxes go to education Ontario? Indeed, spending by the core Ministry of Education totalled only $0.4 billion in fiscal 2018-19, a mere 1.5% of its total spending. Are schools federally funded? Federal education funding is distributed to states and school districts through a variety of formula and competitive grant programs. While the federal government contributes about 12 percent of direct funding for elementary and secondary schools nationally, the amount varies considerably from state to state. Who is responsible for education in Ontario? The Ontario Government and the Education Act Who is in charge of education in Ontario? The current minister of education is Stephen Lecce. How are private schools funded in Canada? In Canada, only one province, Alberta, allows for charter schools to exist. These schools are fully funded by the government and as such, must abide by the rules and policies set out by the government.
Is real estate inefficient market? Is real estate market an efficient market in economy? It is generally acknowledged that real estate markets are less efficient than financial markets. However, the results within real estate markets are inconclusive. For instance, short-run returns to land and housing are generally found to be positively autocorrelated whilst long-run returns are mean-reverting. Which markets are inefficient? According to economic theory, an inefficient market is one in which an asset’s prices do not accurately reflect its true value, which may occur for several reasons. Inefficiencies often lead to deadweight losses. Is real estate an imperfect market? How do you identify market inefficiency? A market is said to be inefficient when it provides consistent opportunities for profits. When an asset is trading at different prices on 2 exchanges, that is a market inefficiency. IT IS IMPORTANT:  How do I report foreign rental property income? What is a major cause of inefficient markets especially relating to real estate? Information asymmetry causes inefficient markets since all of the market participants do not have access to the information needed for their decision-making processes. ( Chapter 1 – Definitions) Because of the high price of real estate: Property values always go up. Recessions usually last five years or more. What are the 3 forms of market efficiency? Three common types of market efficiency are allocative, operational and informational. What is the example of inefficient? Productive inefficiency – says that we could produce the given output at a lower cost—or could produce more output for a given cost. For example, a company that is inefficient will have higher operating costs and will be at a competitive disadvantage (or have lower profits than other firms in the market). What is the difference between efficient and inefficient markets? In an efficient stocks market, the price of a share shows the true value of all publicly available information of such a company. Whereas, in an inefficient stocks market, there are no publicly available information (or a limited number), thus making it possible to bargain prices with the company. What is an example of an efficient market? If the New York Stock Exchange is an efficient market, then Company ABC’s share price perfectly reflects all information about the company. Therefore, all participants on the NYSE could predict that Company ABC would release the new product. As a result, the company’s share price does not change. Is real estate perfectly competitive? IT IS IMPORTANT:  Why are real estate agent fees so high? Why housing market is not a perfectly competitive market? Firstly, in a perfectly competitive market, all the products are homogeneous, meaning they are all identical. this is clearly untrue in the housing market as houses are not all the same, they vary in size, location, quality and many other areas. What happens when markets do not work perfectly? In an imperfect market, individual buyers and sellers can influence prices and production, there is no full disclosure of information about products and prices, and there are high barriers to entry or exit in the market. How do you exploit market inefficiencies? 3 ways to exploit market inefficiency and earn market-beating… 1. Imperfect information. The more coverage a stock receives, the harder it is to find divergences in intrinsic value based on traditional forms of valuation. … 2. Prices do not always reflect intrinsic value. … 3. Don’t do anything — when there’s nothing to do. What is another word for inefficiency? In this page you can discover 44 synonyms, antonyms, idiomatic expressions, and related words for inefficient, like: careless, incapable, wasteful, slack, incompetent, ineffective, able, unfitted, unreliable, disorganized and unproductive. Can you make money in an efficient market? If markets are efficient, then, on average, there are no excessive profits to be made in asset markets. Some people will be lucky and do better than average, while others will be unlucky and do worse than average.
Internet Shakespeare Editions About this text • Title: Textual Introduction • Author: Michael Best Author: Michael Best Not Peer Reviewed Textual Introduction 1The two versions of King Lear King Lear presents an exceptional challenge to a modern editor. Two significantly differing versions of the play survive in print; despite a long tradition of meticulous and often exciting scholarship, the relationship between them is still hotly contested. The first version, a quarto published in 1608 (Q1), has a fulsome title, highlighting Shakespeare as the author, and making special mention of the part played by Edgar: M. William Shak-speare: H I S True Chronicle Historie of the life and death of King LEAR and his three Daughters. With the vnfortunate life of Edgar, sonne and heire to the Earle of Gloster, and his sullen and assumed humor of TOM of Bedlam: As it was played before the King's Maiestie at Whitehall vpon S. Stephans night in Christmas Hollidayes. By his Maiesties seruants playing vsually at the Gloabe on the Bancke-side. LONDON, Printed for Nathaniel Butter, and are to be sold at his shop in Pauls Church-yard at the signe of the Pide Bull neere St. Austins Gate. 1608. On November 26, 1607, the play had been entered in the register of the Company of Stationers: Na[thaniel] Butter / Io. [John] Busby. Entred for their copie vnder thandes [the hands] of Sr Geo[rge] Buck knight & Th[e] wardens. A booke called Mr William Shakespeare his historye of Kinge Lear as yt was played before the kinges maiestie at Whitehall vppon St Stephans night at christmas Last by his maities servantes playinge vsually at the globe on Banksyde. A second quarto of Shakespeare's King Lear was published in 1619, falsely dated 1608 (Q2); see my discussion of this edition below. Both the title page of the Quarto and the entry in the Stationers' Register conveniently record the first known performance: St. Stephen's Day (26 December), 1606. It would probably have been performed earlier at the Globe. The generally agreed date of composition is some time in 1605, after an somewhat fallow period in Shakespeare's writing career; it must have been written after the publication of Samuel Harsnett's engagingly entitled A Declaration of Egregious Popish Impostures in 1603, since from this work Shakespeare took the names of the "fiends" Edgar, as Poor Tom, mentions. The much earlier anonymous play The Chronicle History of King Leir (published by our sibling organization, the Queen's Men Editions) was printed in 1605; though somewhat dated in style it may have been revived before publication and may have been the stimulus that directed Shakespeare towards his radical rewriting and restructuring of the plot. 5The second version of the play appeared in 1623 in the First Folio (F), where the title was changed to accord with the division of the Folio into the genres of comedy, history, and tragedy: "THE TRAGEDIE OF KING LEAR" (Folio plays have no title pages). The two versions are significantly different in more than their titles: depending on the method of counting, Q1 includes approximately 285 lines not in F, and F records about 102 lines not in Q1. In addition there are a large number of individually varying readings in words, phrases, and speech assignments. Sonia Massai elegantly discusses the editorial history of the play, showing how varying social and ideological pressures have shaped the way editors have understood the texts ("Working"; see also Urkowitz, "'Base,'" Holderness "Introduction," and Halio Tragedy 65ff.). From the earliest editions to the late twentieth century editors assumed that Shakespeare had written a single play, which for various reasons had been garbled or corrupted in the two surviving versions; there were thus general attempts to re-create what was thought to be the closest possible approximation to Shakespeare's imagined original by conflating the two editions and making more or less eclectic decisions on which variant reading to adopt. Two late twentieth-century theoretical discussions significantly complicated this deceptively neat solution. As our understanding of the processes of the theater, print shop, and the creation of theatrical manuscripts has deepened, we have become more keenly aware of the production of a work such as King Lear as a social and collaborative activity; a corollary of this awareness is that scholars have become increasingly interested in looking at each version as a separate snapshot of a play that was in continuing change both on stage and in varying manuscript manifestations. The most important result of this revaluation has been a sustained argument that Shakespeare himself revised the play, and that the Folio version reflects this revision. Following early work by Michael Warren ("Quarto and Folio King Lear") and Steven Urkowitz (Shakespeare's Revision), Warren and Gary Taylor published The Division of the Kingdoms: Shakespeare's Two Versions of King Lear (1983), a collection of essays that argued strongly that the Folio Lear represents a conscious revision by Shakespeare. Three years later the new Oxford Complete Works edited by Taylor and Stanley Wells (1986) published two separate versions of Lear, one based on Q1, the other on the Folio. Since this important publication the debate about the legitimacy of a conflated text has continued and has been extended to include Hamlet, Troilus and Cressida, Othello, and other plays where Quarto and Folio versions differ significantly. Single-text editions of Quarto and Folio texts have appeared for many plays. Grace Ioppolo put the case against conflating King Lear trenchantly: However, not all scholars agree that deconflation is desirable or even possible. Richard Knowles uses the Quarto as his base text for his monumental Variorum King Lear (2018, forthcoming); his views are discussed further below. Brian Vickers in The One King Lear argues, in a curiously polemical tirade, that King Lear is really a single version where even the Folio additions can be explained; and Peter Blayney, in a generally critical review of Vickers's work, reveals that he regards the Folio text as a non-Shakespearian "adaptation" of the Quarto ("Quatrat" 64, 101). Whatever their views on the relationship between the two versions, editors of King Lear are squarely in the firing line. Ernst Honigmann points out astutely that even those editors who attempt to produce a "pure" modern text of Q1 or F end up, in effect, conflating, since they invariably use readings from the other text in their solutions to various cruxes: "Conflation appears to be unavoidable: the question is not whether to conflate or not, but rather how much to conflate" ("The New Bibliography" 87-8). R. A. Foakes's edition for the Arden 3 series prints a conflated version with variant readings and passages from Quarto and Folio clearly indicated by small superscript letters; Barbara Mowat and Paul Werstine's Folger Lear uses variously shaped brackets to distinguish the origin of different readings. The most recent Norton Shakespeare (Third Edition) includes parallel texts of each version of the play, together with what the editor, Grace Ioppolo, terms a "scars-and-stitches" version—similar in may respects to my extended Folio text; the previous version, which used the separate Oxford texts for Quarto and Folio, also provided a conflated version for the sake of convenience in teaching the play. In each case, the editors acknowledge the importance of providing readers with a version of the play that includes the widest possible range of information about what Shakespeare wrote, however different the extant versions may be. In a choice that echoes the Arden 3 edition of Hamlet where Q2 is privileged by having the first volume to itself, the New Oxford Modern Critical Edition (2017) provides its readers with a text of the Quarto only (King Lear and his Three Daughters, edited by John Jowett). The rationale for this choice gestures towards the same need for a reading text that is as inclusive as possible: the Quarto has been selected because it is "the longest early text" (2350). 10The question of the audience for any new edition of King Lear will be at the forefront of a publisher's mind, but will not necessarily be a primary concern for the scholar. At the core of the problem is the question: given the complex variation between the two versions of the play that have survived, what is Shakespeare's King Lear? In his remarkable experiment in multiple facsimiles and movable pages in the medium of print, The Complete King Lear, Michael Warren concludes the first paragraph of his General Introduction with this very fundamental question: "What is the work called King Lear?" (xi). Foakes picks up the same terminology in his Introduction, where he defines King Lear as a "work" divided into two separate versions: "there is every reason to think that we have two versions of the same play, not two different plays" (119). It does seem that scholars tacitly or openly acknowledge that culturally Lear is considered a single concept rather than two separate texts, even if this is the result of an editorial tradition that evolved many years after the play was written, rewritten, and published. Along these lines I have argued elsewhere that the variant texts of Shakespeare have acquired a "play-function" equivalent to Foucault's "author-function" (Best), with the result that an edition of King Lear that will actually be useful to those who consult it must in some fashion provide an accessible text that includes passages from both Q1 and F. A vital point has too readily become obscured by the debate on the causes of the differences between the versions: the network of alternative readings offers the reader remarkable riches. For the critic, the actor, or the student, it is both fascinating and teasing to consider the effect on mood, character, and tone implied by even minor changes, whatever their origin. Lear's opening speech is a useful example. This quotation privileges the Quarto text, highlighting variants in italics, with those of the Folio in square brackets (these are made more elegantly available by mouseover in both extended texts of this edition): The map there. Know we have divided In three our kingdom; and 'tis our first [fast] intent To shake all cares and business of our state [age], Confirming [Conferring] them on younger years [strengths]. While state/age and years/strengths are clearly differentiated, the variants first/fast and confirming/conferring might be the result of some kind of error. Stone considers confirming a misreading and first/fast a "true" variant (178, 224; see also Foakes 160), but the resonance between the words possibly differentiated by accident remains interesting from a critical perspective: the Folio's fast is more authoritative than the Quarto's first, and confirming reinforces other indications in the text that the actual division of the kingdom has already been made, making the "love-test" a pageant rather than a competition; conferring (like fast) expresses the sense of power that Lear is exemplifying in his actions. The digital space is ideal for creating a comprehensive revisioning of the rich multiplicity that is generated by the two versions of Lear. All texts on the Internet Shakespeare site offer multiple levels of information: facsimiles of early printed editions, searchable transcriptions of those documents, and one or more modern-spelling editions generated from them. King Lear is one of the plays that requires more than one modern-spelling version, one each for Q1 and F; only Hamlet, with David Bevington's modern texts of Q1, Q2, and F demands more. The challenge is in finding a way to make the "work" that is King Lear readily available without asking readers to open multiple windows or trying to read two texts in parallel. With his long experience of the text to call upon, David Bevington's solution with Hamlet was to compile an "Editor's Choice" version, one that combines from the originary versions what he believes to be the most effective and complete text. My approach in this edition of King Lear is rather different. From the modern-spelling versions of both Q1 and F I have generated "extended" texts; each retains the integrity of the base text by leaving it unchanged, and clearly indicates material that has been added from the alternative version. There are, not surprisingly, some important passages where simply adding chunks from another source will radically change the nature of the base text, and where the two base versions differ in ways that addition will not signal. The climax of the play—Lear's last moments—provides a good example. 15 Quarto 1, TLN 3279-86. Courtesy British Library, shelf mark BL C.34.k.18. Folio 1, TLN 3279-86. Courtesy Brandeis University. The passage includes single words that might possibly be added to each extended text. F has an extra "no" to Q1's "No, no life" (TLN 3277). Q adds an "Oh" before F's "Thou'lt come no more" (TLN 3279). In Q Lear says "never" three times, in F, five. Q alone records the dramatic moan of Lear's not-quite-dying moment, "O, o, o, o" (TLN 3281). The Folio substitutes the deeply moving addition of Lear's last vision, "Do you see this? Look on her. Look, her lips— / Look there, look there" (TLN 3282-3283). R.A. Foakes valiantly tries to conflate the texts while distinguishing which provides which section: King Lear ed. R.A. Foakes, 5.2.304-11. However, any editorial combination of these dramatically different sequences will confuse and diffuse the dramatic and critical effect of each original version of the passage. In the very few instances of this kind my solution is an enhancement of the often-used visual display of the two passages side by side. In the horizontal margin of each text are three tabs. The default shows the current base text; clicking on the second displays the alternative text for the given passage; and a third tab displays both passages in columns with the base text on the left. The result is a convenient and visually attractive reminder of variant passages, rather than a focus simply on variant readings. Horizontal tabs of this kind are used elsewhere in the edition, as I will discuss in the section below of editorial changes in lineation. The printing of the texts There is no doubt that Q1 King Lear is a difficult and puzzling publication. It remains so even after decades of intensive research, from Doran (1931), Greg (Variants, 1940), and Stone (1980), to the remarkably meticulous scholarship of Peter W. M. Blayney (1982). Blayney discovered a great deal about the practices of Nicholas Okes's printing house and about the process involved in printing the Quarto. He has established that the manuscript was sufficiently difficult to read that the compositors set it seriatim—page by page—instead of by the more efficient method of "casting off"—a process of estimating where pages would be completed so that they could be set in the order of printing rather than the order of reading. In addition, he has demonstrated that Lear was the first play Okes printed, with the result that his compositors were inexperienced in reading the characteristics of play manuscripts; two compositors were involved in setting the play, one very possibly an apprentice. The manuscript Okes was working from clearly puzzled his compositors: a collation of the twelve extant copies shows that there were an unusual number of "stop press" changes made as it was being printed (see Greg Variants, Blayney, Warren Complete). I use the word "changes" carefully, because some attempted corrections rather muddy the waters than clear them. Most improve the sense and appear to reflect the original more accurately, but some look more like sophistications—attempts by the proofreader to make sense of a passage, rather than the substitution of a correct reading from the original. The pervasive problem is that it is ultimately impossible to be certain which reading was the original, which the result of the stop-press change. At TLN 1204 uncorrected Q1 has the nonsense word ausrent; in this instance it is more likely that the proofreader changed this to the plausible miscreant rather than the other way around (the whole phrase becomes "You stubburne miscreant knaue"). The Folio reading is probably the correct one: ancient. The consensus of recent scholarship is that the rather messy manuscript from which the Quarto was printed was an authorial draft in Shakespeare's own hand. Madeleine Doran first made the argument (1931) that the copy for Q1 was Shakespeare's rough draft, made difficult to read from corrections and revisions in the text. Steven Urkowitz (Revision, 1980) cogently supported and expanded her initial position. Blayney's detailed research has established a plausible bibliographical explanation for the unusually poor quality of the Quarto's text, essentially making it unnecessary to accept the more radical theories of transmission proposed by earlier scholars, that its imperfections were the result of some kind of memorial record of a performance or a reconstruction of a shorthand version of the play. Recent editors of the play have accepted the probability that an authorial manuscript was used by Okes in the production of the Quarto (Halio, Quarto 4-7, Taylor Textual Companion 510, Weis 3, Foakes 199-121, Wells 3, Jowett Reference Edition, New Oxford 1244-5). 20Q1 became the basis for a second quarto (Q2) issued as one of the "Pavier" quartos of 1619. The fact that the title page falsely gives the date of publication as 1608 led Greg to argue that the group of plays published by Pavier were fraudulently published against the wishes of the players (Greg Folio 11-17); more recent consideration of the evidence has challenged this assumption (Johnson; Massai, Rise; Clegg). Massai argues that the false dating was intended to allow publication of the plays both individually and as a "nonce" collection; she also suggests that it may have been intended to provide advance publicity for the future Folio (Rise 112-21). While there is no certain indication that Q2 introduced any authoritative changes, it is valuable as a witness to the kinds of corrections a contemporary apparently found necessary and reasonable (See Massai, Rise, 121ff). It is striking that Q2 was printed by Jaggard, the printer of the First Folio; a copy was almost certainly available in Jaggard's shop at the time his compositors began work on King Lear in its Folio version. It is therefore not surprising that there is evidence that the Folio version of King Lear was in some form influenced by Q1, most probably through Q2, though the process by which the texts interacted is contested. Thomas L. Berger, in a review of the Oxford Works published in 1986, commented that "Just as we create fictions to get through the day, bibliographers and editors create fictions to get through texts" (161); fictions they may be, and editors would do well not to believe too much in them (see also Werstine "Narratives"), but some kind of fiction is inevitable as a guide to consistent editorial choices. There are two narratives that have gained some degree of currency: that the compositors worked from a version of Q2 that had been annotated by consultation with a manuscript used in the theater, or that they worked directly from such a manuscript, consulting Q2 where they ran into difficulties in reading it. Trevor Howard-Hill argues that the copy for the Folio was a manuscript rather than an annotated print copy of either Q1 or Q2; his preferred narrative is that a "collator" used a print copy of Q2 to clarify difficulties in the playbook he was asked to transcribe for the printer ("Problem" 23; see also Doran Text 112 and Halio Tragedy 73). An alternative, perhaps simpler narrative is offered by Richard Knowles ("Evolution"; see also Halio Tragedy 75). He suggests that Q1 was derived from foul papers that were copied by a scribe for the theater, and that this fair copy was then subjected to the usual process of evolution within the theater with cuts and revisions undertaken by Shakespeare or others; the final copy of this manuscript was used to set F, with the compositors referring with some frequency to Q2 to clarify difficulties in the manuscript. The crucial point in all these narratives is that each surviving text had some direct contact with Shakespeare's original draft or drafts. Q1 is very close to Shakespeare but is muddied by messiness in the manuscript and ineptitude in the printing house. F, in its turn, probably began its life in the theater as a scribal or authorial copy of Shakespeare's final draft, but it was subsequently modified by hands that might or might not have been Shakespeare's. Whatever the origin of the printer's copy for Q1, the modern editor must intrude to a significant degree to make the text accessible to today's reader and to find acceptable readings for many difficult passages. It remains true that the specific causes of many of Q1's obscurities remain unexplained, or, in many cases, capable of multiple, and conflicting explanations. The Folio text is a far better printed text than the Quarto, with fewer obvious errors, but it has been reworked in a number of important ways. The reviser, or revisers, cut some quite long passages, added a number of generally shorter passages, altered some speech assignments, changed a large number of individual words, and shifted the dramatic and critical effect of some passages through a series of smaller changes. Differences between the Quarto and Folio texts The nature of the changes between the two versions can be summarized thus: 1. passages, phrases, and words that appear in the Quarto but not in the Folio; 2. passages, phrases, and words that appear in the Folio but not in the Quarto; 3. changes in lineation of verse; 4. speech assignments that are changed between the two versions; 5. restructuring of speeches and staging; 6. cumulative changes to roles; 7. words and short phrases that are different in the two versions. I have phrased points 1 and 2 in such a way that I make no assumptions about the priority of the two texts. In practical terms, however, it is simpler to think of most passages missing from the Folio to be cuts, and passages appearing in the Folio only, in most cases, to be later additions by person or persons undefined—though there have been arguments that propose alternative reasons for the differences. 251. Cuts to the Folio text The changes least amenable to the identification of the agent who caused them are the many cuts. By their nature, however significant their effect on the structure of the play and the nature of the actors' roles, cuts leave no stylistic fingerprints; thus it is unfortunately impossible to subject cuts to any kind of authorial test. Cuts may be made for many reasons: to placate the censor, to shorten performance time, to accommodate changes in casting, or to adapt to changing tastes in the audience. Some short omissions may be the result of simple error. Given the gap of roughly eighteen years between the first performance of the play and its publication in the Folio, it is certainly possible that the cuts were made at different times and for different reasons. There has long been a debate concerning who made the cuts. Before the claims made by those in The Division of the Kingdoms arguing that Shakespeare himself was responsible for many of them, the general assumption was that they were made by the players, the book-maker, or the prompter. The understanding was therefore that the play had been corrupted by ignorant interference. There is indeed good evidence that authors from the period were pleased when they were able to publish plays in a form that was more complete than the versions in which they had been staged. Ben Jonson and John Webster both published versions of their plays in which the title page trumpets the fact that the printed version contains more than was ever acted on stage (see Rasmussen 442). The preface to the collected works of Beaumont and Fletcher (1647) by the printer, Humphrey Moseley, is especially informative: When these Comedies and Tragedies were presented on Stage, the Actours omitted some Scenes and Passages (with the Authour's consent) as occasion led them; and when private friends desir'd a Copy, they then (and justly too) transcribed what they Acted. But now you have both All that was Acted, and all that was not; even the perfect full Originalls wihout the least mutilation. (A4r) What is particularly fascinating about this passage is that it not only reinforces the comments of Jonson and Webster concerning cuts to their works, but that it also includes the parenthetical comment that the omissions were made with the author's consent. The implication is that the author might well be involved in the choice of cuts as well as the players. Since Fletcher was a collaborator with Shakespeare in at least two of his last plays, there is a distinct possibility that within the company that performed their plays there was a culture that involved some level of consultation, even collaboration, between author and actor. It is very much human nature for authors to want the complete sweat of their labors to be made available to their readers, and it is entirely possible, even probable, that Shakespeare would have had some fondness for the sections that were cut, however effective the changes. I do think, however, that there is reason to believe that the agents who made the cuts would have been far from blind to literary and dramatic sensibilities. The actors who made up the Chamberlain's Men/King's Men were a generally stable group, would have performed with Shakespeare, and would have become accustomed to his style. While there is no evidence that Shakespeare in any way "directed" the performances of his plays, the members of the company will have absorbed, if only by a kind of osmosis, a sense of the dramatic structures and overall emotional directions he embedded in his plays. If members of the company were those responsible for the cuts, there is no reason to believe that they were not to a significant degree in harmony with Shakespeare's overall vision for the play even if they did not actively consult with him. I discuss this issue further in the General Introduction. The net effect of all cuts and additions is to shorten the play by some 200 lines, a significant but not major reduction of the time required for performance. Some minor cuts and modifications (especially of stage directions) refer to the French army. They may have been made in order to soften the references to invasion, with the intention of making the battle between Lear and his sons-in-law seem more a civil war than a war between nations. It is not clear whether this change was made as the result of actual censorship, was an act of self-censorship intended to bring the politics of the play more into line with changing attitudes, or was intended to focus on the dangers of internal rather than external threats to political stability (see Taylor "Monopolies," Halio Tragedy 83, Worden). The two most significant of these changes involve Kent, as he chats in each case to a Gentleman. In neither instance is Kent instigating or advancing plots; he is simply reporting on them. In the more substantial change—Q scene 17, omitted entirely from the Folio—Kent passes on news that the King of France has returned to his country, leaving a lieutenant in charge, and he instructs the Gentleman to head to Dover to pass on news about Lear's current state. The main emphasis in the scene, however, is on the description of Cordelia's response to news of her father's distress. In the earlier scene (Q 8, F 3.1, TLN 1614), the first in which the French presence is mentioned, Kent informs the Gentleman of the division between the dukes and the presence of French spies in the country. He is more informative in the Quarto, and gives the Gentleman instructions on travelling to Dover to pass on the information; in the Folio he is more circumspect and indirect. This sequence is the only instance where a significant number of lines in one version are replaced rather than cut in the other; it is discussed more fully below. 30In presenting their case for Shakespearean revision, several contributors to The Division of the Kingdoms rely on arguments that the Folio version was revised by Shakespeare specifically to improve stage-worthiness and to make deliberate changes in characterization. The critical debate about the relative theatrical value of the Quarto and Folio texts illustrates the way that arguments of this kind can be made to work in both directions (compare Urkowitz, and Clare "Who is it"). It might be unkind to point out that the argument that cuts were made to improve the play's effectiveness on stage could readily become an argument in favor of "the players" as the agents who cut sections of the play since their concern would presumably be in favor of heightening the play's dramatic force. Productions of the play have varied enormously in the kinds of cuts and modifications that directors have historically made; one actor's/director's/critic's high point is another's candidate for the axe. The empirical test of production over many years argues rather against the clear superiority of the Folio text in the theater, since only those directors who have deliberately decided to produce a Folio version have followed its cuts. Michael Dobson, in a review of the Bate/Rasmussen Folio Lear in the Royal Shakespeare Company Works, commented that "Even now Ian McKellen is performing King Lear in Stratford using a text including the mock-trial scene, here relegated to an appendix. . . . Perhaps Bate and Rasmussen would have preferred McKellen to perform the mock-trial scene in King Lear only as an encore." In all fairness, someone should have directed Dobson to Rasmussen's more strictly bibliographical discussion on the nature of cuts in F Lear ("Revision of Scripts"). The cut that deletes the mock trial is one of the longest (30 lines). Other than reducing performance time it is not easy to see why the lines were deleted. The shortened scene does still provide a suitably moving exploration of the nature of Lear's loss of mental control, but modern productions tend overwhelmingly to include the omitted passage, perhaps because our tastes favor its combination of black humor and pathos. Eric Rasmussen insightfully discusses the nature of cuts in Lear, comparing them to those in Hamlet and The Second Maiden's Tragedy, a play performed by the same actors at about the same time. The manuscript of The Second Maiden's Tragedy records cuts made for performance. Rasmussen points out that cuts in Hamlet and The Second Maiden's Tragedy are generally made in the middle of long speeches; from the point of view of the actors in the company, the advantage of this approach is that cue lines remain the same so that only one actor has to remember the change. In Lear, however, "lines are generally cut from the ends of speeches," and from the conclusions of scenes ("The Revision of Scripts" 445). One possibility is that the introduction of act breaks in the theater invited cuts at the end of two acts: nine lines of dialog between two servants commenting on Gloucester's blinding at the end of act 3 (3.7, TLN 2176.1-2176.9), and eleven lines at the end of act 4, when Kent and a Gentleman discuss the current state of affairs in the kingdom and the forthcoming battle (TLN 2843.1-2843.11). My analysis of 33 significant cuts/omissions in the Folio indicates that two-thirds (23) create new cue lines, two (possibly three) involving cues for entrances or exits. Only ten leave the cue lines unchanged. The equivalent figures for Hamlet are 20 cuts, half requiring cue changes and five involving an entry. Rasmussen rightly cautions that "we cannot conclude that one type of cut necessarily points to a revising author and that another points to a non-author" (446). A reviser conscious of actors' needs and aware of the relative convenience of leaving cue lines unchanged might focus more on cutting within speeches; an author might focus more on changes he wanted for dramatic or literary reasons; but Shakespeare was, or had been, actor as well as author. Longer cuts accumulate in the latter half of the play, principally in acts 4 and 5. Two significant cuts delete passages that provide glimmers of light in the growing darkness: the passage at the end of the scene of Gloucester's blinding where two servants react to the cruelty they have witnessed by deciding how best to help the old man (2176.1-2176.9), and the entirety of scene 17 (4.2a in the Extended Folio) between Kent and a Gentleman where they discuss the current state of affairs, focusing on the pathos of Cordelia's response to news of her father's predicament. In the General Introduction I suggest that some cuts follow the emotional trajectory Shakespeare began by creating a hard-edged tragedy from the romance plot he found in his sources. 2. Additions If cuts leave no clear sign of the agent who did the cutting, additions are more forthcoming and may leave potential stylistic fingerprints. The extent of the additions, however, is modest, so evidence of authorship will of necessity be tentative. By studying the possible sources and the vocabulary of rare words in the added passages, Gary Taylor has argued that Shakespeare added the passages "between the completion of Coriolanus and the beginning of Cymbeline" ("Date" 428); Richard Knowles suggests that the rare words in the additions "suggest a reviser with an idiosyncratic vocabulary, perhaps in some cases reflecting a familiarity with the contemporary theater, but probably not Sh[hakespeare]'s lexicon (King Lear Variorum "Appendix," 183). Studies of rare words have long been suggestive, but are far from conclusive, especially in the present instance where the size of the text samples is very small indeed. Studies that look at an author's use of common words using large samples have made some important, if occasionally controversial, contributions to authorship studies (see, for example, MacDonald P. Jackson Defining, Taylor and Egan Authorship Companion), but the whole point of looking at rare words is that they occur in small samples. The textual analysis I find more persuasive on the issue of the authorship of the additions to the Folio is Arthur F. Kinney's "Transforming King Lear" (Craig and Kinney 181-201). Working with Hugh Craig, Kinney has taken the additions as a block of 900 words (902, to be precise) and compared them with the word usage of other writers of the period who have been proposed as possible authors: Massinger, Fletcher, Middleton, Jonson, Chapman, and Webster—and Shakespeare's other works. Using tests that look at blocks of 900 words in the various candidates for authorship of the additions, Craig and Kinney applied two tests: patterns of usage within common "function" words (the basic building blocks of sentences that authors use unconsciously), and one test that looks for common words and word forms one author favours but the other does not. Kinney and Craig find that the additions accord closely with Shakespeare's usage on both tests, but differ significantly from all the other candidates. The important feature of this approach is that the test samples are statistically large enough to rule out chance as the reason for the differences. 35As with the cuts, additions that appear in the Folio text are of varying lengths and importance, and are very possibly the result of differing circumstances. Some probably record instances where the Quarto text was deficient and omitted short passages from the manuscript, either because of the messy manuscript or as the result of eye-skip: Albany's speech, "My lord, I am guiltless as I am ignorant" makes sense, but gains in clarity with the Folio's addition ". . . Of what hath moved you" (TLN 786-7); in contrast, Regan's speech in the final scene reads well with or without the additional line at TLN 3019, here italicized: Lady, I am not well, else I should answer From a full-flowing stomach. [To Edmund the Bastard] General, Take thou my soldiers, prisoners, patrimony. Dispose of them, of me. The walls are thine. Witness the world that I create thee here My lord and master. (TLN 3016-21) The line may have been omitted from the Quarto in error or added later to enhance the passage with a suitably martial image. There are several other instances, especially where a short speech has been interpolated, that may have been added to the Folio by either original omission or later revision: TLN 94-5, 176, 774, 1281, 1798, and 2243. The Fool's last speech in the Folio (TLN 2043) could possibly be another omission from the Quarto, and there may be others. Two more substantial additions to the Fool's role have long been considered interpolations, possibly by someone other than Shakespeare. The first of these, at TLN 1322-1327, according to Doran (Text 66) "appear[s] to have been an afterthought given to the Fool to enhance his part." Certainly the added passage is interpolated between two intense speeches by Kent and Lear, as Lear learns of his servant's treatment by Cornwall and Regan; whether this is seen as an enhancement of the tension or an irritating interruption to it is both a matter of critical taste and of stage direction. It certainly fits well into both the Fool's role elsewhere and the general tenor of the play: Winter's not gone yet if the wild geese fly that way. Fathers that wear rags Do make their children blind, But fathers that bear bags Shall see their children kind. Fortune, that arrant whore, Ne'er turns the key to th'poor. (TLN 1322-1327) The later, longer addition (TLN 1734-1750) when the Fool makes an enigmatic and parodic prophecy also fits to some extent as a commentary on a world turned upside down, but could possibly be the result of a star actor panting for more stage time. Kerrigan and Taylor ("Date" 396) defend both passages as Shakespearean. The statistical tests of Craig and Kinney cannot provide evidence one way or the other, because of the small size of the sample. The lines are certainly not the kind of improvisational language associated with clowns from an earlier period (see Stern, 245-52), though Rasmussen provides evidence for one way that material of this kind could be added to a theatrical manuscript ("Setting Down"). If some of the additions I have been discussing can be explained as the restoration of passages accidentally omitted from Q, or as non-Shakespearean interpolation, there are some crucial and eloquent additions that were either written by Shakespeare or by someone who was good at Shakespeare pastiche. In the opening scene there are three telling and eloquent additions to Lear's speeches, giving additional motivation for his crucial decision to divide the kingdom and enriching his commentary on the nature of the lands he is planning to bequeath to Cordelia (TLN 45-50, TLN 54-55, TLN 89-91). The tenor of these changes is so consistent that it takes significant ingenuity to argue that they are somehow omissions from Q rather than additions to F—and therefore actual revisions. Further passages later in the play give Goneril an opportunity to establish stronger motivation for her actions (TLN 842-857), and heighten one of Edgar's soliloquies (TLN 2184-2187). Lear gains a powerful addition in the section where in his mental breakdown he achieves insight into the human condition (TLN 2608-2612); most strikingly, there is a brief addition to the scene of his death when he fleetingly believes, just before he dies, that he sees Cordelia alive. 403. Lineation The Quarto The most obviously intrusive intervention required from an editor of Q1 Lear is the process of making sense of Q1's erratic typesetting of Shakespeare's verse. Many verse lines are simply set as prose, while others appear as a kind of "false" verse, where lines are set without justification and dutifully start with a capital letter, but create hypermetric lines with widely varying numbers of syllables. We can be confident that Shakespeare was writing in verse for most of the play; the Folio text and other plays from the period when he was writing King Lear are predominantly in verse. There is no simple answer as to why so many verse lines were set as prose or false verse. It is true that Okes's inexperienced compositors were working with a difficult manuscript, and it is also true that it was common for printers to try to save paper by scrimping on space in one way or another. The final page of the Quarto is a good example; four short speeches are recorded in the middle of a line rather on a new line and a substantial section of verse is set as prose; on the other hand the final large-font "FINIS" is set off by ample space before and after. Ironically, it is likely that the reason for this particular instance of space-saving was to keep the last page blank—a common but not universal practice. Vickers bases his fundamental argument for the "One King Lear" on the assumption that Okes underestimated the amount of paper he would need and therefore cut lines that later turned up in the Folio. Syme ("The Text is Foolish," III A Printer Abridges) and Blayney ("Quadrat" 86) dismiss Vickers's arguments, but agree that Okes's compositors tried to save space and may not fully have understood the manuscript they were working with. The inescapable conclusion is that editors of the Quarto version must intervene to a substantial degree if they are to provide a text consistent with Shakespeare's work at the time he was writing King Lear. Because the level of editorial intervention in creating verse from prose is substantial, I provide a visual method of seeing the difference between the original and the edited verse: horizontal tabs permit readers quickly to switch back and forth. Where it is relevant, a third tab shows the difference between the edited modern text and both Quarto and Folio line breaks. While this approach is almost arrestingly simple as a method of recording and visualizing differences in lineation, there are some limitations. Divided lines are not rejoined, and I have not modified capitalization to accord with the alternative line breaks. Variant lineation is not recorded in a tab when the length of lines in the two texts is significantly different because of additional material in one of them. These are the principles I have followed in lineating the Quarto text: 1. I follow Q1 wherever its lines create reasonably regular verse, whatever the Folio does. 2. 45I follow the Folio where Q1 makes prose of passages that are verse in F, preferably avoiding further smoothing of the rhythm. Paul Werstine has convincingly implicated compositorial intervention in modifying lineation from the copy used for the Folio ("Lineation" 111); thus Folio lineation may itself be sophisticated. 3. In some passages (notably those of Lear's madness when he is speaking to Edgar and Gloucester in scene Q 20, F 4.5, TLN 2554) the editorial tradition has, since Johnson, been to set the prose as irregular verse; I follow this tradition with some reservations. Any verse that is created from the prose will be somewhat irregular; the question is where to break irregular lines without forcing the passages into a rhythmic straitjacket. In all such cases, however, the horizontal tabs permit the reader to see the extent of editorial intervention. The Folio I have followed the Folio's original lineation unless there is a clear case for emending it; there are several places where the compositor set short lines to fill up space, for example. As with the Quarto text, wherever I depart from the Folio, horizontal tabs recreate Folio line breaks. The Folio text also provides horizontal tabs that allow the reader to switch to Quarto lineation wherever it is reasonably regular but differs from the Folio; the intention is both to underline the uncertainty of editorial decisions (mine and those of the Folio compositors) and to offer additional rhythmic alternatives for actors, critics, and readers. 4. Changes to speech assignments Many of the changes to speech prefixes are relatively minor: a Servant in Q becomes a Knight in F, a Gentleman in Q becomes a Messenger in F, a Doctor in Q becomes a Gentleman in F, and so on. Changes of this kind carry meaning and have an influence on staging and costuming, but they make no change to the major roles in the play. There are a total of 45 changes involving minor characters of this kind. 50Speeches for major characters are changed on twelve occasions. All but two involve speeches of one line; one is of two lines, and the longest (the last speech of the play) is four lines. Some changes have relatively little effect: in the first scene Kent and Lear swap speeches, each of one line directed at the Fool. The remaining changes cluster in two scenes, both of which show signs of revision. In Q scene 7, F 2.2, where Goneril's arrival at Gloucester's residence is significantly revised, the query addressed to Regan, "Who struck [Q] / stocked [F] my servant?" is spoken in Q by Goneril, who is enquiring about Oswald's treatment, and in F by Lear, asking about Kent. The combination of the speech reassignment and the very significant variant radically changes the stage dynamic at this point. The second cluster, of six changes, is in the final scene of the play; all make changes both to roles and to staging. 1. After Albany's strong response to Edmund, "I hold you but a subject of this war, / Not as a brother" (TLN 2999-3000), the line "That were the most, if he should husband you" (TLN 3012) is spoken by Goneril in the Quarto, by Albany in the Folio. The effect in the Folio is to lessen Goneril's antagonism and to give further strength to Albany. 2. In Q Edmund's further response is to threaten military action: "Let the drum strike, and prove my title good" (TLN 3026). In the Folio it is Regan who threatens, necessitating a rewording of the passage: "Let the drum strike, and prove my title thine." 3. When Albany produces the incriminating letter retrieved from Oswald by Edgar, in the Quarto he demands of Goneril, "Know'st thou this paper?" (TLN 3118); she replies "Ask me not what I know." In the Folio it is Edmund who is confronted, and who replies in the same words. 4. Towards the end of the scene, two important speeches are reassigned from Albany to Edgar. When Edmund confesses his plot against Lear and Cordelia, it is the Folio Edgar who urges speed (by Q's 2 Captain, F's Gentleman) in rescuing them; and in a radical switch of speakers, Edgar, rather than Albany, is given the last lines of the play. 5. Perhaps the most surprising switch involves the last moments of Lear's life where what is in the Quarto Lear's last speech, "Break heart, I prithee break," is given to Kent. This sequence is discussed in the next section. 5. Restructuring of speeches and staging Five sequences of varying length present particularly interesting challenges in the construction of the two extended texts of King Lear. In each case, the two versions differ in ways that generate significantly different experiences on stage, and any attempt to combine them will only create yet a third version. For this reason, my solution has been to provide readers with horizontal tabs that allow them to switch between the two versions, or to view them in parallel. 1. When Lear arrives at Gloucester's castle (Q 7, F 2.2, TLN 1466-1484) he suffers two shocks. He sees his servant Caius (Kent in disguise) in the stocks, and, as he seeks to find an answer to this extraordinary situation, Goneril arrives ready to team up with her sister. In the two versions Oswald's entrance is signaled at a slightly different point, and Goneril then enters; in the Quarto she immediately asks who "struck" her servant; in the Folio she is silent and it is Lear who asks who "stocked" his servant, without noticing Goneril. Both versions are dramatic, and the textual differences seem minor—a speech reassignment and one of those strikingly near-pun variants (struck/stocked), but in the Quarto Goneril is given an opportunity to be once again assertive by seizing the opportunity to attack, while in the Folio, Lear, ironically oblivious to the entry of his now disowned elder daughter, attempts to enforce his dwindling authority by once again demanding an answer to the humiliation Caius/Kent has suffered. 2. The two versions of King Lear diverge in an especially interesting way as Kent imparts news of recent events to a Gentleman (Q 8, F 3.1, TLN 1626-1638, discussed above in the section on possible censorship). The Folio sequence is somewhat shorter than the Quarto, but rather than a straightforward cut (or omission), it replaces the longer discussion in the Quarto of thirteen lines with a different, shorter speech of eight lines. In the Quarto, Kent mentions that French spies have been gathering information about the dissention between Cornwall and Albany and that an invasion is imminent. He accordingly sends the Gentleman to Dover to communicate the ill-treatment Lear has received at the hands of his daughters. In the Folio, Kent, in rather indirect language, discusses spies reporting to France (the king rather than the country) concerning rumors of the division between the dukes and their ill-treatment of Lear, but makes no mention of preparations for an invasion or of Dover. In both sequences, the general intention is to communicate that war between the sisters is threatened, and that France (and thus Cordelia) has been kept informed. Textual scholars have long debated the reasons for the change, which has presented editors wishing to conflate the two versions with a challenge, since simply to combine the two speeches in in some fashion leads to a rather awkward, somewhat repetitive speech. R.A. Foakes points out that the text "from the ending of 2.2 into 3.1 appears to have been subject to some deliberate reworking" (397); his solution is to replace some Quarto lines with those from the Folio, retaining the longer instructions to the Gentleman from the Quarto. Mowat and Werstine, on the other hand, combine both versions. In the process of summarizing the various arguments concerning the usefulness or vagueness of the two versions in terms of plot and language ("Revision Awry" 39-40), Richard Knowles (following Blayney) argues at length that the Folio version is "stylistically awkward if not unintelligible" (37). Arguments about the usefulness of Kent's speeches in either version in terms of plot seem curiously out of place in a play where both the passage of time and the landscape are more mythical than literal (see the General Introduction); the general purpose in each case is to provide the audience with both a sense of foreboding, in that conflicts are developing on two fronts, and a more comforting awareness that aid in some form is likely to be forthcoming. The Folio Kent's much-criticized indirection of language communicates, in addition, a deep sense of uncertainty and instability. 3. In the final scene there are three occasions where the Folio text reworks the staging at especially dramatic moments. The first of these involves the trumpet calls to summon a challenger to answer Edgar's accusation that Edmund is a traitor (Q 4, F 5.3, TLN 3063-3067). In the Quarto, it is the Bastard who calls on the trumpet to sound, and there are no specific stage directions that indicate when the trumpet is to sound. The Folio is much clearer, with the Herald calling three times for the trumpet. 4. The second reworking comes when a Gentleman (both texts) announces the offstage deaths of both Goneril and Regan (Q 4, F 5.3, TLN 3170-3178). The Folio version adds two short interjections from Edgar (TLN 3171, 3173), and heightens the suspense by momentarily delaying the revelation of the deaths. 5. The final reworking of this scene is during the final moments of Lear's life (Q 4, F 5.3, TLN 3277-3286), in a passage discussed at the beginning of this introduction. The Quarto Lear asks for a bystander to undo a button, presumably to allow him to breathe more freely (a fascinating moment for the director, deciding who is the one to assist him), then groans; Edgar implores him to look up (another indirect stage direction), and Lear speaks again, "Break heart, I prithee break" (TLN 3285). Though the Quarto does not provide a stage direction, it is clear that the speech is followed by Lear's death. The Folio Lear, given additional, deeply moving lines where he believes he sees life in Cordelia, dies (there is a specific stage direction) immediately. Edgar's speech remains the same, as he hopes, no doubt, that Lear still lives, and then it is Kent who speaks the line "Break heart, I prithee break" (TLN 3285). 6. Cumulative changes to roles The cumulative effect of cuts, additions, and speech reassignments has a significant impact on some of the actors' roles. I earlier expressed some doubt about the extent to which cuts do or do not improve the theatrical effectiveness of the play; in a similar vein, I am skeptical about arguments for consistent revision based on character rather than role. Character, as conceived in current criticism, is largely a construct of late nineteenth-century critics and twentieth-century acting traditions (see, for example the discussions by Slights and Holland). A number of arguments in favor of revision detail changes in characterization between the two versions. Many of these critics are subtle in their analyses, but I feel that their critical approach tends to over-value small changes in wording over the kinds of variation a good actor can instill into any passage by shifting emphasis. Lukas Erne astutely points out the profound influence that punctuation—of necessity very largely the responsibility of the compositor and/or editor—can have on meaning, and hence of the construction of character (Collaborators 18-19). In a modern production of Lear, a director can cut significant parts of a character's role without inducing changes in the interpretation of the character, since both the director and actor will have read the entire play (often in a conflated version) and can thus adduce motive to actions that are only obliquely referred to in the redacted stage version. Changes in roles, however, can be more reasonably explained as the result of revision. The roles of Kent, Albany, Goneril and the Fool are significantly changed in the Folio (Michael Warren, "Diminution"; Urkowitz, Kerrigan, Clayton; see also Hornback 337 on the possibility that the Fool's role was revised after Shakespeare's death to accommodate a new clown in the company); Cordelia's role is also sufficiently changed that Ioppolo finds evidence to suggest that she becomes a stronger character in F (Revising 167-83). The fundamental question remains: why were the changes made? Given (as I have suggested) that it is somewhat anachronistic to speak of character in its modern sense, how likely is it that Shakespeare, or someone else, decided specifically to make Cordelia a stronger character? Michael Warren provides a model in his essay on "The Diminution of Kent." He points out that even in the Quarto Kent's role in the play becomes progressively less important as others take over his role of supporting Lear in his distress—both Gloucester and Edgar care for him in the storm, then after his solitary madness he is sheltered and healed by Cordelia. Warren points out that Kent's diminution is almost wholly the result of the deletion of lines that provide "choric" (63), morally centered commentary on the events in the play. Warren's assessment of the rationale for the cuts is that they were made for theatrical reasons, to sharpen and speed up the action. So they do; but it is no less possible that audiences later in the seventeenth century lost their taste for this kind of meditative and poetic speech, and that the cuts were made more for the sake of this change in fashion. 7. Changes to individual words Individual readings may provide more palpable clues to the question of revision. Many differing readings are trivial in their effect: changing words from singular to plural (kingdomes / Kingdome, TLN 7); changing similar words with similar functions (into / to, TLN 24); changing the order of words with little, if any effect on the meaning or meter (Sir a sonne / a Sonne, Sir, TLN 22), and many more. At the other extreme are individual words that are clearly distinct, modify the meaning of a passage in a significant way, and cannot reasonably be said to be the result of corruption: yonger yeares / yonger strengths (TLN 45). Between these two poles are a multitude of alterations that might be either the result of error or of deliberate change. Knowles sees no evidence of revision: "most of these changes are explainable as editorial, scribal, or compositorial error, correction, or sophistication," and he dismisses them as making "no practical difference. . . They are local improvements, not significant revisions" (Knowles, "Revision Awry" 32, 45). No doubt some of the non-trivial changes are indeed errors of the compositors, misreadings of the manuscript, or changes introduced by someone other than Shakespeare. But the sheer number of variants that carry distinct semantic meaning (anything from about 150 to 200, depending on the criteria) means that a great deal of ingenuity is needed in order to claim that the difficulty of the Q1 manuscript is a sufficient cause for the changes. 55An important advantage of the digital edition is that it is possible to create unambiguous and accessible visual signals of textual variation using well-understood conventions associated with linking protocols. The two extended texts of Lear provide an ideal canvas for the display: each variant is indicated by a dotted underline; hovering the mouse over it triggers a pop-up with the variant reading and its source. A useful side-effect of this design is that it shows clearly on the screen the way that individual variants tend to cluster. To use an appropriately digital analogy, in a standard collation of variants, online or in print, one sees the pixels; on the pages of one of the extended texts we can see the image the pixels create. Each variant of the kind Knowles identifies as the result of error (editorial, scribal, compositorial) can be explained in one way or another; but if there is cluster of variants requiring different explanations it may well become more reasonable to establish a collective explanation. Perhaps a section of the manuscript was exceptionally difficult for some reason, or a compositor was hungry and wanted to finish quickly, or perhaps a reviser was "tinkering" with the text in some fashion (Kerrigan 195; see also Jackson 331). At the point in the play where Lear has realized that both his elder daughters are determined to strip him of his retinue and he has stormed off stage into the night, Gloucester, alone on stage, speaks sympathetically of the king's plight (Quarto text, Folio variants in square brackets): Alack, the night comes on, and the bleak [high] winds Do sorely rustle [ruffle]. For many miles about There's not [scarce] a bush. (Q 7, F 2.2, TLN 1603-1605) In the Folio, rustle becomes ruffle. It is easy to see that this change could be the result of a simple misreading in the Quarto manuscript, as Stone (180) suggests. But the context makes this less certain. In the previous line the Folio text also changes bleak to high, and in the following line not a bush becomes scarce a bush. It is difficult to see how either of these could be the result of misreading or compositorial error. Both passages are evocative. The Quarto passage provides support for the moody bleak wind with an image of sound, as it rustles through grasses or reeds, since the landscape is empty of bushes. The Folio passage is more intense, as the wind becomes stronger and the landscape, though less bare, is ruffled—disturbed and made uneven (OED I.1.a). Perhaps the most remarkable point about variants between the two versions is that few of them are necessary in any obvious way. While some, perhaps many, can be explained as errors of some kind, there are clear cases where someone decided to make some changes, to tinker with the wording, possibly, in this example, to heighten sympathy for Lear. And if that person happened to be a writer who was an inveterate player with words, the switch from rustle to ruffle could have been part of that process of tinkering (compare the change from fickle to sickly earlier in the scene at TLN 1473). Gloucester's speech follows soon after the reassignments of two speeches and another alteration difficult to explain as an accident (good/best, TLN 1601); somewhat earlier in this pivotal scene there is also some significant rearrangement of speeches, entrances, and individual variants as Goneril enters to join the fray. No single change in this cluster could be said to alter the play in any dramatic way. Even when they are taken together the difference does not substantially change the direction of the play or the roles within it. The important point, however, is that it is difficult to come up with a coherent explanation for the variants other than that there was some degree of conscious revision, even if it was only on the level of tinkering. And it is not easy to imagine an actor or compositor making these kinds of modifications. They are sensitive, and granular at the level of the word, such that the most likely candidate is a writer confident enough to make "pixel-level" changes in Shakespeare's text. The passage I have been discussing comes at the end of the long, painful scene where Lear discovers the truth that both Goneril and Regan are determined to strip him of his remaining powers. Though changes within this scene are patchy, there are several extended passages where there are clusters of multiple variants. It is also true that not all clusters of variants make particularly interesting or consistent changes. It seems very likely that the compositors had problems with the copy they was working with. In scene Q 6, F 2.1, there is a series of interesting, but quite possibly accidental variants of this kind: pretense/practise (TLN 1010), spurs/spirits (TLN 1013), Strong/Oh, strange (TLN 1015), strange news/strangeness (TLN 1026). Some variants seem to update or simplify the language: bussing/kissing (TLN 936), warbling/mumbling (TLN 999), caitiff/coward (TLN 999), rash/stick (TLN 2130), dearn/stern (TLN 2135). A constant problem in separating the accidental from the deliberate is that the general messiness of the Quarto creates a level of noise that makes it harder to discern an underlying signal; however careful an editor may wish to be, the process of distinguishing between noise and signal is ultimately a critical rather than an objectively bibliographical act. With this caveat in mind, it remains true that some clusters have the cumulative effect of suggesting strongly that a revising hand was at work, playing, at times almost punning with wording. In the opening scene we may dismiss equalities/qualities (TLN 9) as accidental, but first/fast (TLN 43), of our state/from our age (TLN 44) are difficult to explain in the same way; Confirming/Conferring and years/strengths (TLN 45) follow hard upon, and there are at least twelve similar pairs later in the scene. The same can be said of the passage in scene Q 6, F 2.1 and of the final scene of the play. 60The question of revision: summary Richard Knowles, a deeply knowledgeable supporter of Q1 as the only reliable base text for King Lear, nonetheless comments: "The question is not whether there was revision—of course there was—but who did it, and when, and why" ("Two Lears?" 58). In the last forty years these three questions have elicited a wide variety of responses, and, as I have suggested above, a surprising level of passion. The truth, of course, is that none of the questions can be answered with any resounding confidence, and it takes a good deal of speculation and supposition to reach a consistent conclusion, especially concerning the why; any answer requires looking into the minds of those who might have been involved, all too often finding exactly what the enquirer is looking for. When the changes were made is interesting but not of overpowering importance: some could have been made almost immediately as Shakespeare prepared a fair copy for the company or read over a scribe's transcription of his draft, as Steven Urkowitz suggests (Revision 147); they could, as Taylor argues, have been made later when the play was being prepared for presentation at the indoors Blackfriars theater ("Date" 428); they could have been made when circumstances of some kind made it desirable that the French connection with the invasion of French forces headed by Cordelia be downplayed; or at some other time and for some other reason. The crucial question is who made the changes. Lying behind the whole discussion of the difference between the two versions of King Lear is a very simple question: was it likely that Shakespeare revised this, or any, of his plays? Two decades ago, Trevor Howard-Hill succinctly responded to this basic issue: . . . modern scholarship is disposed to entertain the conception of a Shakespeare whose compositional process was more usual than the conventional compliment of his colleagues Heminge and Condell suggests: if they "scarce receiued from him a blot in his papers" it was, we may assume, because having finished his rough draft . . . Shakespeare found it necessary to write out his play fairly (or, to have a transcript made). The preparation of a fair copy gave him an opportunity (or site) for second thoughts as well as to sort out certain unfinalized details in the first draft, that is, to tinker with forms of expression or rewrite certain speeches or parts of scenes. ("Two-Text" 32) Despite Paul Werstine's confident assertion that "the controversy over Shakespeare’s possible revision of his tragedies has largely passed" ("Authorial Revision" 301), the discussion continues, for the very good reason that no incontrovertible evidence has surfaced to show either that Shakespeare's hand was indeed involved in the changes to the Folio text, or that his hand was absent from those changes. If only some of the changes were made by Shakespeare, it means that the Folio in some measure records a later version of the play as he created it. My construction of a narrative to explain the variations between the two texts relies to a significant degree on a belief that the Folio, at least in some respects and in some passages, represents a conscious revision of the play by Shakespeare, though his is almost certainly not the only agency in the changes. The well-attested influence of a copy of Q2 on the Folio text sharpens the case for revision, since it would have been easier in the printing house simply to reproduce a version of Q2 than to work from manuscript or a heavily annotated print text; the motive for printing the modified text may have been that it was simply more current, but it is certainly possible that Hemminge and Condell chose it because they knew that it recorded more recent work by Shakespeare. It should be clear that I do not find it convincing or probable to assign all changes to the kinds of corruption and interference that Knowles lists ("editorial, scribal, or compositorial error, correction, or sophistication"); even he acknowledges that these errors cumulatively can only account for "most" of the changes. The evidence for revision rests on two kinds of differences between Quarto and Folio: a relatively small but arresting number of additions difficult to pass off as errors of omission or contributions by another hand; and demonstrable clusters of individual variants, with each group showing evidence of some variants that cannot readily be explained away and a multitude of others that could either be chronic error (not impossible, given the state of the Quarto text) or tinkering and touching-up by a writer who was habitually given to word play of one kind or another. The opening and closing scenes of the play combine both kinds of change—additions and changes to individual words—and there are sequences in scene Q 6, F 2.1, where there are significant changes to staging coupled with clusters of variants. The incidence of changes suggest that whoever made them did so in a kind of "hit and run" pattern, focusing interest on specific sections, leaving long sections of the play unchanged. It is my conclusion that the Folio version of King Lear records some second thoughts by Shakespeare as he revisited the play at some stage after he originally wrote it. He tinkered with wording in passages that caught his eye and added some generally short passages to enrich or modify key passages. In some places his may have been the hand that reworked the staging of some sequences; I also think it likely that some minor additions to the Folio text were made by other hands. Though I do not believe that the cuts can with confidence be assigned to any specific agent, many of them create fascinating critical and staging questions. Collectively they have a substantial effect on the play, in some ways intensifying the kinds of changes that Shakespeare wrought on the old story of King Leir. Although the revisions by themselves do not make the Folio King Lear a significantly different play, they do, as I discuss in the General Introduction, change its patterns of meaning and emphasis in critically and theatrically interesting ways. 65General editorial principles Despite my conclusion that the Folio preserves some Shakespearean revisions, my approach in editing King Lear, with the creation of two base and two extended texts, is effectively agnostic about the primacy of the two versions and makes no assumptions about the nature of the revision that created the differences between them. The one instance where I privilege the Folio over the Quarto is on the title page for this edition, where the "Quick start" link takes the reader to the Extended Folio version of the play, and the Folio texts are listed before those of the Quarto. Implicit in this choice is a belief that the Folio to a modest degree represents the most recent thoughts of the author. Readers of the Extended Quarto, however, will have access to a text in which Q1 is privileged. Quarto and Folio texts My aim has been with both base versions to create an accurate, sound, and readable text. Where the versions differ, I follow each text wherever possible so long as it makes reasonable sense; I do not, however, strain unduly with a difficult passage if the alternative text provides a clear reading. In my earlier discussion of the possible evolution of the texts, I pointed out that all narratives that attempt to explain the relationship between the texts agree that in some fashion each is in a position potentially to clarify the other. My intention is to use the digital medium in such a way that it visually distinguishes the components of the two composite—extended—texts, making the richness of variance immediately and intuitively available to the reader. For the student or teacher the play abounds in "teaching moments" where there is room for discussion about the cumulative effect of what seem to be small changes in wording or speech assignments. For the scholar and critic the interface facilitates the disambiguation of questions of characterization, imagery, and more general issues as they vary between the versions. For the actor or director there is a convenient way of choosing an eclectic acting edition, with each choice informed by its alternative. The extended texts Each extended text combines the base text with sections from the alternative text that do not appear in it; the extended text retains the structure and individual readings of the base text. Passages that are added from the alternative text are included with as little change to the base text as possible; I have made no attempt to relineate or adjust the base text to accommodate the additions other than occasional necessary changes in punctuation. In the extended texts I make no attempt to create rhythmically neat lines where there are added part lines or phrases. In other words, I have not provided metrical conflation when the alternative text adds material to the base text. The interface is designed to make clear at all times which text is the source of a passage, at the same time making readily available, and visually apparent, where there are potentially significant and interesting differences in individual readings. • The base text appears in the normal font. • Added sections appear with a light gray background; in each case the source text is noted on the right. • Sections that are unique to the base text are indicated with a vertical line on the right of the text, with the explanation "Not in [F or Q]"; when the mouse is hovered over the text or the note in the margin, the unique text is then highlighted in gray. • Where passages in the two versions differ in such a way that adding material from the alternative text would create a hybrid that would confuse rather than extend the text, the two equivalent passages can be viewed separately with the assistance of horizontal tabs, or in parallel. There are five such parallels, discussed above. • Notable variants between the texts are indicated throughout with a dotted underline; hovering the mouse over the word brings up a pop-up with the alternative reading and its source. In general, I include only phrases or longer passages from the alternative text. Thus, at TLN 115 where the Quarto reads "Well, let it be so" and the Folio "Let it be so" the Folio does not add the initial "Well." A more interesting case of a single word missing from one text is when a Doctor (Quarto) or Gentleman (Folio) informs Cordelia that her father has been sleeping, asking her to be near when he awakens; he then speaks of Lear's probable state of mind: the Quarto Lear will be calm ("I doubt not of his temperance"), the Folio Lear unpredictable ("I doubt of his temperance"). In this instance I have chosen to use the mouseover hover to indicate the alternative reading rather than adding "not" to the Folio extended text. See also TLN 315. The overall aims of the extended texts are twofold: to make available two ways of reading the complete work that is King Lear while retaining the integrity of the individual Quarto and Folio versions, and to make visually and intuitively evident the relationship between them. In the process, it is my hope that the extended texts will make evident some of the bones of the "social" network that produced the texts—the Folio especially—and stimulate exploration of the semantic and dramatic richness that the two versions, considered together rather than apart, make available. Speech prefixes In this edition I have departed from recent editorial practice by using more generic speech prefixes for two roles: Bastard for Edmund, and Steward for Oswald. The Quarto uses "Bast" for Edmund throughout; the Folio uses "Edm" only six times, "Bast" the remaining 67. Speech prefixes for the role of Oswald are roughly similar. In the Quarto his speech prefix is "Steward/Stew/Ste" except for two instances where they are "Oswald" and "Osw" just after he has been called by name (TLN 848FF); in the Folio he is "Ste" or "Stew" throughout. There are critical, as well as bibliographical, reasons to make the change from specific names to generic classes. Edmund's illegitimacy is strongly stressed in the opening scene of the play (unlike Don John in Much Ado, whose bastardy is only mentioned relatively late in the play), and Oswald's status as mere servant is highlighted both in his initial interaction with Lear and in the confrontation with Kent before Gloucester's castle. The question is, of course, a readerly matter, since on stage we learn names and roles by a kind of aural osmosis. 70Individual readings Further discussion of individual readings will be found in the commentary. Collations record, where possible, the first editor who adopted a particular reading; in some instances where I have been unable to see an early edition myself I have relied on earlier editors for this information. In some instances I have included speculative emendations from early editors because of their interest in understanding the reception of his work. Q1 first; F1 fast (TLN 43) Q1's first may well be a simple misreading of fast, the reading of the Folio, but, as I have discussed above, it makes excellent sense as it stands and is retained in the Quarto text. F1 only forests and wide skirted meads (TLN 69-70) The additional text in the Folio may possibly have been omitted by eye-skip if it was in the Quarto MS, but the Quarto line makes sense and scans effectively; Halio includes the F1 material in his edition of the Quarto; Wells, Orgel, Ioppolo, and Weis, as here, omit it. F2 mysteries; Q1 mistresse; F1 miseries (TLN 117) Q1 records "The mistresse of Heccat," F1 "The miseries of Heccat." F2 gets it right, without the added information of the Quarto, reading "mysteries." See Halio, Quarto, 20. Q1 strayed; F1 strain'd (TLN 183) I follow Halio, Orgel, Weis, Wells, and Ioppolo in keeping the Q1 reading in the Quarto modern text, though it may well be a simple misreading of strain'd. 75Q1 not been little; F1 been little (TLN 315) Randal McLeod (167-9) argues that the quieter effect of Goneril's speech in the Folio, where her omission of Q1's not implies that Lear's erratic behaviour is recent, fits well with her more measured suggestion that the sisters sit together rather than the more aggressive hit of the Quarto. In the extended modern texts the variant is indicated by a mouse-hover. Q, F modern to the legitimate; Q1 tooth'le-gitimate; F1 to'th'Legitimate (TLN 355) Although Capell's emendation, "top the" is attractive, the original readings of both Q1 and F1 make complete sense. Q1 [Exit a servant.]; F [Exit an attendant.] (TLN 539-540ff.) The exits and entrances from this point until TLN 606 are variously signaled by editors. The overall movement of characters/messengers is consistent in both texts, though wording differs. Q modern Lady the brach; Q1 Ladie oth'e brach; F1 the Lady Brach (TLN 642) Q1's reading is an odd one, difficult to explain. Halio points out that Hotspur refers to "Lady, my brach" (1H4 TLN 1780), providing solid support for Steevens's emendation, followed here. Taylor (Textual Companion 533) points out that omitting the "o" makes the reading clear. F1's reading is slightly variant but similar in effect. Q1 accent; F1 cadent (TLN 799) I follow Taylor (Textual Companion 512) and Halio, Quarto (131) in accepting the F1's cadent in both texts, assuming that a difficult MS led to a misreading. 80Q modern thee; / Untented; Q1 (state 1) the vntender; Q1 (state 2) the vntented; F1 thee: / Th'vntented (TLN 819) Possibly the original read "the the" (Blayney, see Textual Companion 512); the Q1 compositor then omitted the second article, while F1 retains it as "thee / Th'." Q modern attasked; Q1 (state 2) attaskt; Q1 (state 1) alapt; F1 at task (TLN 867) Halio, Quarto follows Greg (Variants 153-5) in reading "ataxed." I accept the correction and leave F unchanged. Q modern This out-of-season, threatening; F modern Thus out of season, threading; Q1 Thus out of season, threatning; F1 Thus out of season, thredding (TLN 1062) Halio, Wells, and I follow Stone's conjecture (see 193-4). Halio suggests an evolution from a simple misreading in Q1 to an erroneous correction in the Folio to "thredding." Since the Folio reading makes good (and attractive) sense, it is unchanged. Q modern too entrenched to unloose; Q1 to intrench, to inloose; F1 t'intice, t'vnloose (TLN 1148) Q1's reading is clear (it lacks only a final "t") and makes good sense. F1 (as Halio points out) clearly revises the wording; it becomes a critical judgement to decide whether F1's intice (intrince—Malone) carries a richer meaning than Q. Q1 dialogue; F1 dialect (TLN 1185) The Folio's dialect has more immediate appeal, and emphasizes the play of language that Kent is apparently enjoying. But Q1's reading is defensible; the word is used by Shakespeare both in the sense of a formal dialogue between two people (a literary tradition of some weight), and in metadramatic reference to the dialogue of a play. For the first usage, see the Bastard's ironical dialogue with himself in King John: "Answer knows what Question would, / Saving in dialogue of compliment" (Jn TLN 205-6); for the second, see Ursula's reassurance that she knows her role in the baiting of Beatrice: "Fear you not my part of the dialogue." (Ado TLN 1119). 85F1 ancient; Q1 (state 1) ausrent; Q1 (state 2) miscreant (TLN 1204) Q1's ausrent (state 1), was "corrected" in state 2 to miscreant, but the word is so different that it seems likely that the compositor simply found a word that makes more sense. F1's reading, whatever its source, is clearly more likely to be correct and is adopted in the Quarto. Q, F modern tomb; Q1 (state 1) fruit; Q1 (state 2) tombe; F1 Tombe (TLN 1409) Both the second state of Q1 and the Folio readings read naturally in the context. The oddity is state 1 of Q1, fruit. It's hard to see how one word could be mistaken for the other; Taylor ("Four New Readings" 122) suggests that the initial change was simply a plausible guess by the proofreader, and that the original word misread as fruit was scrine, a variant of shrine. Q, F modern depraved; Q1 (state 1) deptoued; Q1 (state 2) depriued; F1 deprau'd (TLN 1415) The Folio reading is very close to the second state of Q1. Wells argues for deplored (following Stone, 1980: 201) as a way of making sense of the Q1 reading without reference to F (see Wells 169). Q1 lamely; F1 tamely (TLN 1576) Editors have universally adopted the Folio's fiercer tamely as appropriate to Lear's anger and frustration. Nonetheless, lamely makes admirable sense if Lear's wish is that he not be inept in his rhetoric as he calls upon the gods to take his side. Shakespeare uses the word several times, most often referring to language or verse that is clearly awkward. Rosalind makes fun of Orlando's poems scattered throughout the forest. "the feet were lame, and could not bear themselves without the verse, and therefore stood lamely in the verse" (AYL TLN 1367); in Two Gentlemen of Verona, Speed responds to Valentines promise of poetry asking "Are they not lamely writ?" (TGV TLN 484). While the likelihood of a simple error or misreading is high, the advantage both of the two separate modern texts, and of the mouseover that indicates the alternative reading is that this possibility can be promoted from the commentary and collation to the text itself. F modern look [for]; F1 look, Q1 seek (TLN 1765) Most editions that use F1 as copy text retain look, glossing it as "look for" (or equivalent). Since it is probable that for was omitted in error, I include the missing word in square brackets. 90F1 contentious; Q1 (state 1) crulentious; Q1 (state 2) tempestious (TLN 1786) The attempted correction of Q1 seems to have been made as an intelligent guess, with no direct reference to the MS. The Folio's reading very probably records the original accurately. Q modern and there, and there again; Q2 and there, and there againe; Q1 and there, and / and there againe; F1 and there / againe, and there (TLN 1842-1843) While the Q1 compositor may well have missed a second there at the turn of the line, the second and may be an accidental repetition. This text follows Q2 in omitting the second and. Q1 words iustly; F words Iustice (TLN 1861) See Foakes textual notes and annotation (276). F sesey; Q1 ceaese; Q1M Cease! (TLN 1880) See the collation for guesses. There seems little point in adopting Q1's reading in the Folio modern text or "correcting" what is clearly intended to be nonsense. Halio, (Quarto) Come, unbutton—; Q1 (state 1), come on bee true.; Q1 (state 2) come on; F1 Come, vn-/button heere. (TLN 1888-1889) There is no simple explanation of the relationship between the readings of the Quarto and Folio. The Q1 (state 2) reading is possibly a sign that the proofreader could not improve on the original compositor's attempt, but found it unlikely and chose to leave the line unfinished. Halio sensibly suggests that "on bee true" may have been an attempt to decipher a garbled or obscured "vnbutton." 95Q modern Smolking; Q1 snulbug; F1 Smulkin (TLN 1919) The name Shakespeare would have found in Harsnett is Smolkin, very close to the reading of the Folio. Since, however the Q1 attempt includes a final "g" I have retained it in the Q text. See Halio, Quarto, 133. Q modern Importune him [once more] (TLN 1940) The missing words are provided from the Folio. Although the line makes sense without them, the context provides strong support for adding them, and they create a metrically complete line. I follow Halio (Quarto 133), who follows Blayney; see Halio's summary of Blayney's explanation of the mechanism by which the compositor could readily have missed the words as he set the type. Q1 (state 2) Take up the King; Q1 (state 1) Take vp to keepe; F1 Take vp, take vp (TLN 2054) Although Q1 state 1 might be a misreading of a repetition of "take up," as in the Folio, the correction makes good sense, and need not be dismissed as a guess by the proofreader. Q modern intelligent; Q1 intelligence; F intelligent (TLN 2070) With Halio, I adopt the reading from F1. Wells prefers Q1's intelligence, punctuating the line as an incomplete sentence, interrupted by his farewell to Goneril. Weis on his bowed; Q1 (state 1) of his lou'd; Q1 (state 2) on his lowd; F1 as his bare (TLN 2131) I accept Blayney's argument in favor of bowd as the word the proofreader was trying to decipher, but prefer to keep the preposition on recorded in both states of Q1, as does Weis. 100Q modern parti-eyed; Q1 (state 2) parti,eyd Q1 (state 1) poorlie,leed; Q2 poorely led; F1 poorely led (TLN 2189) The single error of substituting a comma for a hyphen makes the reading of the second state of Q1 to be preferred. It also provides an appropriately shocking visual image, and suggests that Edgar was immediately aware of his father's blinding. Q2 and F1 do their best to make sense of the first state of Q1; since the result makes sense, I retain it in F modern. Q modern A fool usurps my bed, Q1 (state 2) A foole vsurps my bed; Q1 (state 1) My foote vsurps my body, Q2 My foote vsurps my head, F1 My Foole vsurpes my body (TLN 2297) The early editions provide the editor with a splendid array of scornful jibes from Goneril to choose from, each, in its way convincing and critically stimulating. In the face of such riches, I follow the proofreader of Q1 as the most likely to have contact with Shakespeare's original, however possible it is that he was guessing rather than deciphering. The Folio's body can then be seen as a possible revision, avoiding the near-euphemism of bed. Q modern benefited Q1 (state 2) benifited, Q1 (state 1) beniflicted (TLN 2303.14) While I find Taylor's argument for benefacted attractive ("Four Readings" 121-122), I follow the proofreader's choice, reserving the discussion of the alternative reading to the commentary. Taylor flaxen biggin threats, Q1 (state 1) slayer begin threats, Q1 (state 2) state begins thereat (TLN 2307.3) In this instance, the second state of this Q1-only phrase is most likely to involve some guessing on the part of the proofreader, whether or not he consulted the MS. I accept Taylor's emendation (see Division 488 and Stone 184). Q modern shows; Q1 (state 2) shewes; Q1 (state 1) seemes; F1 seemes (TLN 2309) F1 Follows Q1 (state 1) and Q2; Q1 (state 2) reads shewes, followed in this edition of Q1. In the Folio text, however, I retain the F reading, since it makes good sense. 105Q modern Let pity not be believed; Q1 Let pitie not be beleeft (TLN 2347.30. ) The typesetting at this point suggests some confusion by the compositor, a fact that has may have led to a number of attempts to emend the passage; most recently Taylor and Wells adopt piety for pity. Wells's gloss on the phrase, "Do not believe that filial piety exists (if this be true)," however, can just as readily be adapted to "Do not believe that pity (in any form) exists, if this be true." See Halio, Quarto 21-22, Textual Companion 520-521. Q modern And clamor-moistened her, Q1 And clamour moystened her (TLN 2347.32) Though the language is dense, it it not impenetrable, especially with the addition of the hyphen (Steevens). Some editors omit her, in order to regularize the meter. Emendations include And clamor mastered (Stone 184g). F modern A century send forth; Q1 a centurie is sent forth; F A Centery send forth (TLN 2356) Taylor and Wells (Textual Companion 521, and Wells 226) argue for The centuries send forth, but in this instance the reading of the Folio requires less tinkering with the text. Q2 Gent. Good Sir. (TLN 2640) This short interruption of Lear's speech appears for the first time in Q2, but appears in neither Q1 nor F. For this reason it appears only in the two extended texts. It is worth noting that in Q1 there are two consecutive speeches assigned to Lear, with the interpolation coming between them; one distinct possibility is that Q2 was set from a version of Q1 with a corrected leaf, now missing, that included the speech. F modern on speedy foot. The main descry / Stands on the hourly thought; Q1 on speed fort the maine descryes, / Standst on the howerly thoughts; F1 the maine descry / Stands on the hourely thought (TLN 2657) Taylor argues at length for the Oxford reading "on speedy foot, the main; descriers / Stands on the hourly thoughts" (Textual Companion 523), the Folio reading makes good sense, however, though the syntax is somewhat elliptical, and it seems unnecessary to undertake more forceful emendation. 110Q modern The bounty and benison of heaven / Send thee boot, to boot; Q1 (state 2) the bounty and benizon of heauen to boot to boot; Q1 (state 1) the bornet and beniz of heauen to saue thee; F1 The bountie, and the benizon of Heauen / To boot, and boot (TLN 2673-2674) The oddity of the significant difference between the first and second states of Q1 is discussed extensively by Blayney (Texts, 250-2), and summarized helpfully by Halio (18). See also Halio Tragedy 231n, Greg Variants 176, Textual Companion 537; Blayney, Texts, 250-2; Foakes 344. Q1 I doubt not of his temperance; F1 I doubt of his temperance (TLN 2775) Although the omission of not may well be a simple accident of eye-skip on the part of the compositor, the line makes sense, and metrically will be a short line in any case since F1 also omits the following response by Cordelia recorded in Q1. Q modern injurious; Q1 iniurious; F1 Enemies (TLN 2784) As Halio points out, there is no need to emend the Q reading. Cordelia claims that even a dog that injured its owner would be better protected than her father on such a night. F modern goodyears; F1 good yeares; Q1 good (TLN 2966) Q1 has clearly omitted years. Taylor and Wells suggest goodyear, a phrase that "came to be used for 'devil'" (Oxford Q 258; see Taylor "Addendum" in Division, 488-9). Jowett returns to the simpler good years. Like Halio (246) I retain the plural, listed as a variant of goodyear in OED. Q modern Yet, ere I move't, / Where is; Q1 yet are I mou't / Where is; F1 Yet am I noble as (TLN 3075) Q1 makes good sense ("before I explain the reasons for my action"); F1 is most likely a revision. Halio, Quarto adopts F, substantively. 115Q1 By right of knighthood; F By rule of Knight-hood (TLN 3101) Wells adopts "My right of knighthood" (see also Stone 69-70). I retain the original reading since it makes sense, though perhaps does not read as smoothly. Q1 being, F1 tongue (TLN 3099) Halio adopts F's tongue, taking being as a misreading of tong. See HalioQ 136, and Duthie 424. Q modern vices; Q1 vertues, F1 vices (TLN 3131) This seems to be an odd, but not unique, substitution by the compositor of a word's antonym. See Textual Companion 526. 1. Berger, Thomas L. "The Oxford Shakespeare [Review]." Analytical & Enumerative Bibliography 3.3-4 (1989). Print. 2. Best, Michael. "Variation and Mutabilities: Representing Variants in Shakespeare's Texts." New Ways of Looking at Old Texts, V. Ed. Michael Denbo. Tempe, Arizona: Renaissance English Text Society, 2015. 91-112. Print. 3. Blayney, Peter W. M. "Quadrat Demonstrandum." PBSA 111.1 (2017): 61-101. Print. 4. -----. The Texts of 'King Lear' and their origins, Vol. 1: Nicholas Okes and the First Quarto. Cambridge: Cambridge UP, 1982. Print. 5. Braunmuller, A. R. "On Not Looking Back: Sight and Sound and Text." From Performance to Print in Shakespeare's England. Eds. Peter Holland and Stephen Orgel. Basingstoke and New York: Palgrave Macmillan, 2006. Print. 6. Clare, Robert. "'Who Is It That Can Tell Me Who I Am?': The Theory of Authorial Revision between the Quarto and Folio Texts of King Lear." Library Series 6-17.1 (1995): 34-59. Print. 7. -----. "Quarto and Folio: A Case for Conflation." Lear from Study to Stage: Essays in Criticism. Eds. James Ogden and Arthur H. Scouten. Madison: Fairleigh Dickinson UP, 1997. Print. 8. Clayton, Thomas. "'Is This the Promis'd End?': Revision in the Role of the King." The Division of the Kingdoms: Shakespeare's Two Versions of King Lear. Eds. Gary Taylor and Michael Warren. Oxford: Clarendon Press, 1983. 121-42. Print. 9. Clegg, Cyndia, S. "King Lear and Early Seventeenth-Century Print Culture." King Lear: New Critical Essays. Ed. Jeffrey Kahan. New York and London: Routledge, 2008. 104-23. Print. 10. Craig, Hugh, and Arthur F Kinney. Shakespeare, Computers, and the Mystery of Authorship. Cambridge: Cambridge UP, 2009. Print. 13. Doran, Madeleine. "W.W. Greg, the Variants in the First Quarto of 'King Lear' (Review)." Review of English Studies 17 (1941): 474. Print. 14. -----. The Text of King Lear. London and Stanford: Oxford UP and Stanford UP, 1931. Print. 15. Egan, Gabriel. "Shakespeare: Editions and Textual Matters." The Year's Work in English Studies 90.1 (2011): 297–471. Print. Also available online at 16. Erne, Lukas. "Editing the Real Lear." Shakespeare's Modern Collaborators. London: Continuum. 87-102. Print. 17. -----. Shakespeare's Modern Collaborators. Shakespeare Now! Eds. Simon Palfrey and Ewan Fernie. New York and London: Continuum, 2008. Print. 18. Foakes. See Shakespeare, King Lear, 1997. 19. Foster, Donald W. "Shaxicon 1995." The Shakespeare Newsletter 45.2 (1995): 27+. Print. 21. -----. The Variants in the First Quarto of "King Lear": A Bibliographical and Criticial Inquiry. London: Bibliographical Society, 1940. Print. 23. Halio, Quarto. See the Cambridge edition of the Quarto version of King Lear. 24. Halio, Tragedy. See the Cambridge edition of the Folio version of King Lear. 25. Holderness, Graham. "Introduction." Shakespeare, William. M. William Shakespeare: His True Chronicle Historie of the Life and Death of King Lear and His Three Daughters. Hemel Hempstead: Prentice Hall, 1995. Print. 26. Holland, Peter. "'A Kind of Character in Thy Life': Shakespeare and the Character of History." SEDERI 23 (2013): 7-31. Print. 27. Honigmann, E. A. J. "The New Bibliography and Its Critics." Textual Performances: The Modern Reproduction of Shakespeare's Drama. Eds. Lukas Erne and Margaret Jane Kidnie. Cambridge, UK: Cambridge University Press, 2004. Print. 28. Hornback, Robert. "The Fool in Quarto and Folio King Lear." English Literary Renaissance 34 (2004): 306-38. Print. 30. Howard-Hill, Trevor. "The Two-Text Controversy." Lear from Study to Stage: Essays in Criticism. Eds. James Ogden and Arthur H. Scouten. Madison: Fairleigh Dickinson UP, 1997. 31-41. Print. 31. Ioppolo, Grace. Revising Shakespeare. Cambridge, Mass: Harvard UP, 1991. Print. 32. Jackson, MacDonald P. Defining Shakespeare: "Pericles" as Test Case. Oxford; New York: Oxford University Press, 2003. Print. 33. Jackson, MacDonald. P. "Fluctuating Variation: Author, Annotator, or Actor?" The Division of the Kingdoms: Shakespeare's Two Versions of King Lear. Eds. Gary Taylor and Michael Warren. Oxford: Clarendon Press, 1983. 313-50. Print. 34. Johnson, Gerald D. "Thomas Pavier, Publisher, 1600-1625." The Library 6th series 14 (1992): 12-48. Print. 35. Jowett, John. Shakespeare and Text. Oxford Shakespeare Topics. Eds. Peter Holland and Stanley Wells. Oxford: Oxford UP, 2007. Print. 36. Kerrigan, John. "Revision, Adaptation, and the Fool in King Lear." The Division of the Kingdoms: Shakespeare's Two Versions of King Lear. Eds. Gary Taylor and Michael Warren. Oxford: Clarendon Press, 1983. 195-246. Print. 37. Kinney, Arthur F. "Transforming King Lear." Shakespeare, Computers, and the Mystery of Authorship. Eds. Hugh Craig and Arthur Kinney. Cambridge: Cambridge UP, 2009. 181-201. Print. 38. Knowles, Richard, ed. King Lear. New York: Modern Language Association, 2018 forthcoming. Print. 39. Knowles, Richard. "Merging the Kingdoms: King Lear." The Shakespearean International Yearbook 1: Where Are We Now in Shakespearean Studies?. Eds. W. R. Elton and John M. Mucciolo. Vol. 1. Vermont: Aldershot & Brookfield, 1999. 266-86. Print. 40. -----. "Revision Awry in Folio Lear 3.1." Shakespeare Quarterly 46.1 (1995): 32-46. Print. 41. -----. "Shakespeare and Shorthand Once Again." Papers of the Bibliographical Society of America 104.2 (2010): 141-80. Print. 42. -----. "The Evolution of the Texts of Lear." King Lear: New Critical Essays. Ed. Jeffrey Kahan. New York and London: Routledge, 2008. 124-54. Print. 43. -----. "Two Lears? By Shakespeare?" Lear from Study to Stage: Essays in Criticism. Eds. James Ogden and Arthur H. Scouten. Madison: Fairleigh Dickinson UP, 1997. Print. 44. Massai, Sonia. "Working with the Texts: Differential Readings." A Concise Companion to Shakespeare and the Text. Ed. Andrew Murphy. Malden, MA: Blackwell Publishing, 2007. Print. 45. -----. Shakespeare and the Rise of the Editor. Cambridge: Cambridge UP, 2007. Print. 46. McEachern, Claire. "Early Modern Punctuation and Modern Editions: Shakespeare's Serial Colon." The Book in History, the Book as History: New Intersections of the Material Text. Eds. Heidi Brayman, Jesse M. Lander and Zachary Lesser. New Haven, Connecticut: Yale UP, 2016. Print. 47. McGann, Jerome J. The Textual Condition. Princeton, NJ: Princeton University Press, 1991. Print. 48. McKenzie, D. F. Bibliography and the Sociology of Texts. London: British Library, 1986. Print. 49. McLeod, Randall. "Gon. No More, the Text Is Foolish." The Division of the Kingdoms: Shakespeare's Two Versions of King Lear. Eds. Gary Taylor and Michael Warren. Oxford: Clarendon Press, 1983. 153-94. Print. 50. Moseley, Humphrey. "The Stationer to the Readers." Comedies and Tragedies. Francis Beaumont and John Fletcher. London 1647. A4r-A4v. Print. 51. Mowat and Werstine. See Shakespeare, The Tragedy of King Lear, 1993. 52. Rizvi, Pervez. "The Use of Spellings for Compositor Attribution in the First Folio." Papers of the Bibliographical Society of America 110 (2016): 1-53. Print. 53. Rasmussen, Eric. "The Revision of Scripts." A New History of Early English Drama. Eds. John D. Cox and David Scott Kastan. New York: Columbia University Press, 1997. 441-60. Print. 54. Rasmussen, Eric. "Setting Down What the Clown Spoke: Improvisation, Hand B, and The Book of Sir Thomas More." The Library 6th ser. 13 (1991): 126-36. Print. 55. Shakespeare, William. King Lear and His Three Daughters. In The New Oxford Shakespeare: Modern Critical Edition: The Complete Works. Ed. John Jowett. Oxford: Oxford UP, 2016. Print. 56. -----. King Lear: A Parallel Text Edition. Ed. René Weis. London and New York: Longman, 1993. Print. 57. -----. King Lear. The New Oxford Shakespeare: Critical Reference Edition: The Complete Works. Ed. John Jowett. Oxford: Oxford UP, 2016. Print. 58. -----. King Lear. The New Oxford Shakespeare: Modern Critical Edition: The Complete Works. Ed. John Jowett. Oxford: Oxford UP, 2016. Print. 59. -----. King Lear. Ed. Foakes, R. A. London: Thomas Nelson and Sons Ltd, 1997. Print. 60. -----. King Lear. The Norton Shakespeare: Tragedies. Ed. Grace Ioppolo. New York: W.W. Norton & Company, 2016. Print. 61. -----. The Complete King Lear. Ed. Michael Warren. Berkeley, CA: University of California Press, 1989. Print. 62. -----. Complete Works: The RSC Shakespeare. Eds. Jonathan Bate and Eric Rasmussen: Macmillan, 2007. Print. 63. -----. The First Folio of Shakespeare: The Norton Facsimile. Ed. Peter W. M. Blayney. 2nd ed. New York: Norton, 1996. Print. 64. -----. The First Quarto of King Lear. Ed. Jay L. Halio. Cambridge and New York: Cambridge UP, 1994. Print. 65. -----. The New Oxford Shakespeare: Modern Critical Edition: The Complete Works. Eds. Gary Taylor, John Jowett, et al. Oxford: Oxford UP, 2016. Print. 66. -----. The Oxford Shakespeare: The Complete Works. Eds. John Jowett, et al. Oxford: Oxford U Press, 1986, 2005. Print. 67. -----. The Tragedy of King Lear. Ed. Jay L. Halio. Cambridge: Cambridge UP, 1992, 2005. Print. 68. -----. The Tragedy of King Lear. Folger Shakespeare Library. Eds. Barbara A. Mowat and Paul Werstine. New York: Simon and Schuster, 1993. Print. 69. Shaksper. Listserv. Web. 70. Shapiro, James. The Year of Lear: Shakespeare in 1606. New York: Simon & Schuster, 2015. Print. 71. Slights, Camille. "When Is a Bastard Not a Bastard? Character and Conscience in King John." Shakespeare and Character: Theory, History, Performance and Theatrical Persons. Eds. Paul Yachnin and Jessica. Slights. Basingstoke: Palgrave Macmillan, 2009. 214-31. Print. 72. Stern, Tiffany. Documents of Performance in Early Modern England . Cambridge: Cambridge UP, 2009. Print. 73. Stone, P. W. K. The Textual History of King Lear. London: Scolar Press, 1980. Print. 74. Syme, Holger S. "'King Lear' at the Stationers, Again: A Response to Brian Vickers." Los Angeles Review of Books (2016). Web. 2017-07-20. 75. -----. "Prose and Verse in the 1608 King Lear Quarto: An Alternative Explanation." Dispositio [blog] 2016. Web. 76. -----. "Syme on Vickers, the One King Lear, Preface." Storify 2016. Web. 2017-07-20. 77. -----. "The Text Is Foolish: Brian Vickers's 'the One King Lear'." Los Angeles Review of Books (2016). Web. 2017-07-20. 78. Taylor, Gary, and Gabriel Egan, eds. The New Oxford Shakespeare: Authorship Companion. Oxford: Oxford UP, 2017. Print. 79. Taylor, Gary, and Michael Warren, eds. The Division of the Kingdoms: Shakespeare's Two Versions of King Lear. Oxford: Clarendon Press, 1983. Print. 80. Taylor, Gary. "Four New Readings in King Lear." Notes and Queries NS 29.2 (1982): 212-3. Print. 81. Taylor, Gary. "King Lear, the Date and Authorship of the Folio Version." The Division of the Kingdoms: Shakespeare's Two Versions of King Lear. Eds. Gary Taylor and Michael Warren. Oxford: Clarendon Press, 1983. 351-451. Print. 82. -----. "Monopolies, Show Trials, Disaster, and Invasion." The Division of the Kingdoms: Shakespeare's Two Versions of King Lear. Eds. Gary Taylor and Michael Warren. Oxford: Clarendon Press, 1983. 75-120. Print. 83. Textual Companion. See Wells, 1986 84. Urkowitz, Steven. "'The Base Shall to Th' Legitimate': The Growth of an Editorial Tradition." The Division of the Kingdoms: Shakespeare's Two Versions of King Lear. Eds. Taylor, Gary and Michael Warren. Oxford: Clarendon Press, 1983. 23-44. Print. 85. Urkowitz, Steven. Shakespeare's Revision of King Lear. Princeton, NJ: Princeton UP, 1980. Print. 86. Vickers, Brian. "A Response to Holger Syme." Los Angeles Review of Books (2017). Web. 87. Vickers, Brian. The One King Lear. Cambridge, MA: Harvard University Press, 2016. Print. 88. Warren, Michael J. "Quarto and Folio King Lear: The Interpretation of Albany and Edgar." Shakespeare, Pattern of Excelling Nature. Eds. David Bevington and Jay L Halio. Newark DE: Delaware UP, 1978. Print. 89. Warren, Michael J. "The Diminution of Kent." The Division of the Kingdoms: Shakespeare's Two Versions of King Lear. Eds. Gary Taylor and Michael Warren. Oxford: Clarendon Press, 1983. 59-74. Print. 90. Wells, Stanley W, et al. William Shakespeare, a Textual Companion. Oxford: Clarendon Press, 1986. Print.[Textual Companion] 91. Wells, Stanley, Gary Taylor, et al. William Shakespeare, a Textual Companion. Oxford: Clarendon Press, 1986. Print. 92. Werstine, Paul. "Authorial Revision in the Tragedies." The Oxford Handbook of Shakespearean Tragedy. Eds. Michael Neill and David Schalkwyk. Oxford: Oxford UP, 2016. 301-05. Print. 93. -----. Early Modern Playhouse Manuscripts and the Editing of Shakespeare. Cambridge: Cambridge University Press, 2013. Print. 94. -----. "Line Division in Shakespeare's Dramatic Verse: An Editorial Problem." Analytical and Enumerative Bibliography 8 (1984): 73-125. Print. 95. -----. "Narratives About Printed Shakespeare Texts: 'Foul Papers' and 'Bad' Quartos." Shakespeare Quarterly 41 (1990): 65-86. Print. 96. Worden, A. B. "Literature and Political Censorship in Early Modern England." Too Mighty to Be Free: Censorship and the Press in Britain and the Netherlands. Eds. A. C. Duke and C. A. Tamse. Zutphen 1987. Print. 97. Woudhuysen, H. R. "Adele Davidson, Shakespeare in Shorthand: The Textual Mystery of "King Lear." (Review)." Shakespeare Quarterly 62.4 (2011): 604-09. Print.
Bride of Frankenstein The Mummy (1932) The Mummy 1932 (poster) Today’s cinema adventure: The Mummy, Karl Freund’s 1932 horror classic about an ancient Egyptian priest, returned to life by the power of a sacred spell after his tomb is discovered by archaeologists, and his efforts to reunite with the reincarnated soul of the woman he loved thousands of years before. One of the three iconic monster movies- with Dracula and Frankenstein– made by genre-champion Universal Studios during its golden age of the early thirties- it was the only one not derived from a pre-existing literary source, instead being developed in a deliberate effort to capitalize on the then-current craze for Egyptology and the sensationalistic popularity of the “Curse of King Tut,” of which rumors had been circulating since the discovery of the young Pharaoh’s tomb, ten years before, and the seemingly mysterious deaths of several of those who participated in its excavation. It was also intended to capitalize on the newfound stardom of Boris Karloff, who had been a virtual unknown barely a year before, but thanks to his success as the monster in Frankenstein was now so popular that he could be billed in the movie’s ads by his surname alone (“KARLOFF is THE MUMMY“) and still guarantee the film’s status as a box office hit. Charged by Universal studio chief Carl Laemmle, Jr. with the task of finding a suitable story for an Egypt-themed thriller, story editor Richard Shayer came up empty-handed; drawing inspiration from the real-life history of Alessandro di Cagliostro, an 18th-Century occultist and charlatan who claimed- among other things- to have used arcane mystical practices to prolong his life for centuries, he teamed with writer Nina Wilcox Putnam to write a story treatment entitled Cagliostro. Laemmle was pleased with the essence of their narrative, but still determined to make his Egyptian picture, he brought in Dracula and Frankenstein screenwriter John L. Balderston to transform the idea into a script that suited his needs. The Italian magician became an Ancient Egyptian priest, and the rest of the details fell into place. The movie begins in 1921, at the base camp for the British Museum’s archaeological expedition in Egypt. Renowned Egyptologist Sir Joseph Whemple and his young assistant, Ralph Norton, have discovered the 3000-year-old Mummy of a High Priest named Imhotep, buried in an unmarked tomb with a mysterious box inscribed with a curse which promises destruction to any who open it. Whemple has called in his old friend, psychiatrist and occult expert Dr. Muller, as a consultant; the doctor recommends that both mummy and box be returned to the earth and forgotten, but while the older men debate the issue outside, the younger Norton cannot contain his curiosity, and he opens the box. There, he finds an ancient scroll, and as he begins to read out the hieroglyphs it contains, the mummy of Imhotep awakens. The sight of the ancient corpse come to life drives the young archaeologist instantly mad, and the mummy leaves him crumpled on the floor, hysterical, as it takes the scroll and wanders slowly out into the desert night. Ten years later, the disappearance of these artifacts is still a mystery, and a new British expedition, in which Whemple’s son Frank (who has followed in his father’s footsteps) is involved, is having scant luck finding anything of note in their digging- until Ardath Bey, an Egyptian scholar with an odd, aloof manner, arrives unexpectedly and leads them to the undiscovered tomb of Princess Anck-es-en-Amon. The British soon have the Princess and her relics on display at the Cairo Museum, reaping the scientific rewards of their find- but the mysterious Bey has his own purposes. He is, in fact, Imhotep himself, and he has spent the decade since his resurrection planning to use the stolen scroll to restore life to the Princess- his former love- so that they may at last be reunited. Using spells and incantations in the museum after hours, he summons the reincarnated soul of Anck-es-en-Amon- now inhabiting the body of young, beautiful Helen Grosvenor (coincidentally, a patient of Dr. Muller’s)- to come to his side. Muller, however, immediately surmises the truth behind the girl’s strange attraction to Bey, and with the help of young Frank Whemple, attempts to thwart the ancient priest’s dark purpose by taking her under his protection. Imhotep’s mastery of the scroll, however, makes him a powerful adversary, and with it he exerts his will to break down the mortals’ defenses, despite Muller’s vast knowledge and understanding of these archaic forces- and despite the love that is blossoming between Frank Whemple and the object of his millennia-old obsession. I’ve said it before in relation to other horror films from this classic era, and perhaps it seems an obvious point hardly worth mentioning at all, but for today’s audiences- conditioned as we are to the oceans of gore and unspeakable violence that permeates the genre and so familiar with its standard conventions of plot and character that they have achieved for us the level of cliché- The Mummy offers little in the way of genuine thrills or chills. The script is laden with clunky exposition, the necessary conditions of the plot are unconvincingly established and accepted by rote, and the most directly terrifying moments are portrayed either by sound effects or reaction shots as they take place offscreen. Its plot is formulaic, borrowing more than a little from Dracula– unsurprisingly, perhaps, considering that this film is a product of the same studio, written by the same screenwriter, and directed by the previous movie’s cinematographer- with its scenario of an ancient horror using arcane powers to lure a young and vital female to the doom of an unholy union. Even so, The Mummy can scarcely be dismissed as an irrelevant or inferior work; indeed, dated though it may seem to the casual viewer today, it was and continues to be a vastly influential film, helping to define the genre at least as much as the others in the Universal canon and casting its dusty shadow over every archaeological fantasy film to follow, right on down to Spielberg’s Indiana Jones movies and beyond. It is every bit the equal of Frankenstein and Dracula in terms of artistry and surpasses them in technical prowess, setting new standards in makeup and special effects. More importantly, in terms of lasting effect, its then-novel conceit of a resuscitated mummy has become an iconic pop culture trope, joining the ranks of such legendary monsters- with lengthier pedigrees- as vampires and werewolves as inspiration for imaginative tales and Halloween costumes the world over.This last item will no doubt be the source of most interest for the casual modern movie viewer, a chance to see the original incarnation of a much-loved and imitated celluloid spook that has terrorized everyone from Abbot and Costello to Scooby-Doo and his gang. Painstakingly executed by make-up pioneer Jack Pierce (who also crafted Karloff’s frightening countenance for his star-making role in Frankenstein), the mummified Imhotep was created in an excruciating 8-hour process involving clay, cotton, spirit gum, and linen. Karloff went before the cameras for another 5 hours, and then spent 2 hours having the make-up removed; the actor- who famously complained to Pierce that in all his attention to intricate detail, he had nevertheless forgotten to include a fly- later called it the most “trying ordeal” of his life. He had only to endure it once, however; Imhotep is seen in his fully-wrapped mummy regalia for only few minutes, during the opening sequence in which he is studied and inadvertently revived, and the character spends the rest of the film in the simpler- but no less effective- make-up required to give him the desiccated, shriveled look one might expect from a man who has spent three millennia beneath the desert sands. This brief appearance may disappoint those hoping for a whole movie’s worth of moaning, shambling, bandage-wrapped menace- a device not introduced until several years later, when the studio re-introduced the character for a series of inferior, unrelated pseudo-sequels- but it offers a classic look for this particular ghoul that has never been supplanted or surpassed, and it was enough to electrify audiences in 1932; indeed, the chilling moment when Karloff slowly opens his eyes for the first time remains one of the most singularly ominous few seconds in the history of the horror genre. It is Karloff’s performance, too, that gives The Mummy its classic stature, for without his elegant presence in the title role the film would be little more than a stylish-but-hollow melodrama; though his character is less directly menacing than Dracula and less brutal than the creature of Frankenstein, Karloff nevertheless infuses him with a palpably terrifying power, exuding the absolute confidence of invincibility with every underplayed line. Always a master of physical performance, his brittle, slow and deliberate movement gives us not only a sense of Imhotep’s antiquity, but emphasizes a soft and careful gentility that contrasts the destructive intent that hides beneath his staid persona. It’s a difficult task to convincingly portray the ability to enslave and destroy with the power of a mere thought, but Karloff does so. More crucial than that, however, is his gift for revealing the tender soul that dwells inside the monster; though he makes clear the treacherous nature of Imhotep, and leaves no doubt of his callous disregard for the suffering of mere mortals, so too does he show, with utmost sincerity and simplicity, the deep and desperate pangs of love that have driven him across centuries and motivated him to defy the gods themselves in order to recapture the woman he has lost. Karloff gives us a villain who is, at his most private core, an almost touchingly naive romantic- something to which we can all relate, at some level- and therefore one we can feel sorry for, particularly in light of the vaguely smug sense of anglo-centricism, a product of the less-culturally-sensitive era in which the film was produced, projected by the protagonists. It’s a masterful performance, and one that takes its place alongside the other classic characterizations that made this gifted actor into a screen legend well-known and respected even today, when so many of his fellows from the early days of cinema have long faded into obscurity. Sharing the screen with Karloff are a handful of other capable performers of the time, an A-list selection of actors who help, in their own ways, to make The Mummy stand the test of time. Most notable, of course, is Edward Van Sloan, the horror stalwart who here completes his triumvirate of monster-fighters (having previously portrayed the title character’s mentor in Frankenstein and the intrepid vampire-hunter, Van Helsing, in Dracula) as Dr. Muller; wise, intense, and steely at the core, he cements his own legend with a solid and believable performance that may not be as showy or compelling as those offered by some who have followed his footsteps in similar roles, but nonetheless sets the standard for this indispensable archetype of the genre. The most memorable supporting player, however, is perhaps Bramwell Fletcher, as the unfortunate and overly-enthusiastic archaeologists’ assistant who unwittingly speaks the words which return Imhotep to the world of the living; as the central figure in the film’s most famous sequence, he is burned into popular consciousness by virtue of the chilling, hysterical laughter into which he descends as the sight of the reanimated relic turns his mind to permanent jelly. Much of the authenticity of the film’s conceit, though, hinges on the performance of Zita Johann, the exotic and beautiful actress with the difficult task of portraying Helen, a young woman rooted simultaneously in both the modern and the ancient world; she exudes warmth and intelligence even as she is convincingly mesmerized by her ancient lover’s mystical powers. and she successfully conveys both the sophisticated candor of a contemporary woman and the haughty formality of an Ancient Egyptian princess. She was no doubt aided with the latter by a deeply-held personal belief in reincarnation; indeed, she protested vehemently when a lengthy flashback sequence, portraying her character’s journey through the centuries in a series of lives during different historical periods, was cut from the film in an effort to reduce its running time- though sadly, her efforts to have the scenes reinstated were unsuccessful and the footage has been long-since lost. Even so, her contribution to The Mummy is a performance worthy of being matched with the great Karloff, from an actress whose screen career- abandoned after only five films for a life in the theater, working with then-husband John Houseman and his cohort Orson Welles- was all too brief. The third corner of the movie’s bizarre love triangle is David Manners, a popular and respected stage-actor-turned-movie-star who had played essentially the same role in Dracula, a year earlier; while the character is not particularly compelling and is mostly required to perform the obligatory acts of passionate (if ineffectual) heroism inherent to the film’s formula, this handsome, likable actor gives him much more personality than many of the others who have played his equivalent in countless creature features. Manners, though primarily known for his twin roles in these iconic horror films, also appeared with Katharine Hepburn in her screen debut (A Bill of Divorcement) as well as several other important leading ladies of the time; he was a star in the making, well-liked by colleagues who spoke very highly of his professionalism and supportive attitude- but, like his female co-star in The Mummy, he retired young from Hollywood, saying it was “a false place.” He moved to a ranch in Victorville, California with his life partner, writer Bill Mercer, and returned to a successful stage career; at one point in the 1940s, he worked in Maxwell Anderson’s play Truckline Cafe with fledgling actor Marlon Brando, who later said he owed Manners his “entire career.” The fine cast and artful production values of The Mummy were supervised by director Karl Freund; a legendary cinematographer from Germany, where he had photographed such visually stunning masterworks as The Last Laugh and Fritz Lang’s Metropolis, he had emigrated to Hollywood a few years earlier. Hired to lens Dracula, he had been left in charge of many of the scenes in that film due to director Tod Browning’s frequent absences from the set; consequently, Universal officially gave him the job of directing this follow-up. It proved a wise choice, for Freund approaches the story with a photographer’s eye; wisely recognizing the weakness of the narrative, he relies on mood and atmosphere to carry his film, using an elegant visual style- replete with exotic locales, majestic sets, sumptuous costumes, and gorgeous black-and-white cinematography (executed by Charles Stumar, no doubt under close supervision from Freund himself)- to give us imagery that transcends the plot and transports and unsettles our imagination almost independently of the script. Freund would go on to direct a handful of other films, and photograph many others, but his greatest success would come much later in his career, when he was hired by Desi Arnaz to supervise the photography on the series I Love Lucy; he developed a use of lighting that would allow multiple cameras to shoot the same scene simultaneously, eliminating the need for cutting the action to change angles and thereby allowing for an uninterrupted performance to be filmed in front of a live audience. It was a ground-breaking technique that changed the future of television sitcoms forever, and Freund received much well-deserved acclaim and respect for it, giving him a sizable feather in the cap of an already-illustrious career. It would be overstating the case to say that The Mummy is a great film, in the sense of other early talkies such as The Public Enemy or All Quiet on the Western Front; it was, and remains, a piece of glossy pulp cinema, a sensationalistic crowd-pleaser aimed primarily at providing scares and making money. It did both in 1932, making it a successful film, whether or not it was a great one. Just because it is, essentially, schlock entertainment, however, doesn’t mean it is not also a fine example of the filmmaking art as it was at the time; indeed, the primal, timeless nature of its subject matter- and even its relatively lowbrow intent- means that it is more easily accessible to modern audiences, playing better today than many of the more prestigious “art” pictures of its day. If nothing else, it’s a treat to look at, but more than that, there is something intangibly resonant about it; perhaps it is its theme of undying love opposed by the inexorable march of time and the irresistible winds of fate, or its evocation of ancient memories buried deep within our psyches through its exploration of reincarnation and arcane magic, but The Mummy, creaky and corny as it may be to our modern sensibilities, still has the power to move us. There are lots of good reasons why this golden-age potboiler remains a classic, worthy of watching for those who have never seen it and of repeated returns for those who have; but the best of these reasons, and the one which makes The Mummy a truly essential piece of cinema, is Boris Karloff. The man had a rare ability to find the monster within us all, and show it to us with the dignity, honesty, and pathos it deserves; he did so many times- and did it well- throughout his long career, even in films far inferior to this and his other early classics. To see him here is to understand why, so many generations later, and despite his association with depraved, monstrous characters, he is still one of those rare actors who can genuinely be called “beloved.” Bride of Frankenstein (1935) Today’s cinema adventure: Bride of Frankenstein, the classic 1935 sequel to James Whale’s Frankenstein, once more directed by Whale and starring Boris Karloff as the iconic monster and Colin Clive as his creator, as well as featuring Elsa Lanchester and Ernest Thesiger in new roles.  Though it did have its detractors, it was mostly seen as a triumph even upon its initial release, and it is widely hailed today as one of the few movie sequels to surpass the original, not only representing the artistic pinnacle of Universal’s cycle of horror films, but considered by many to be the defining masterwork of Whale’s short career. After a sumptuous prologue in which Mary Shelley- author of the original Frankenstein novel, for those who don’t know- regales her husband Percy and their friend Lord Byron with the continuation of her macabre tale, Bride of Frankenstein picks up where the first film left off, at the smoldering wreckage of the windmill in which, after throwing his creator to an almost certain death, the monster has presumably been burned alive.  As the mob which had trapped him there disperses, the parents of a child he had murdered linger to assure themselves of the creature’s demise, only to make the fatal discovery that, having found refuge in the mill’s flooded basement, he has survived after all.  Meanwhile, after being transported back to his baronial castle, Dr. Frankenstein is also found to have survived, much to the joy of his fiancée Elizabeth, who vows to nurse him back to full health so that they may finally celebrate the wedding postponed by the rampage of his marauding creation.  His recuperation is interrupted by a visit from his former professor, Dr. Pretorius, who reveals that his own experiments in the creation of life have also met with success and insists that the two join forces in order to continue the work; Frankenstein, despite the horrific experiences that resulted from his previous efforts, is fascinated and drawn in by the possibilities.  In the outside world, the monster wanders the countryside, seeking safe haven and experiencing disastrous encounters with terrified townspeople.  Eventually captured and imprisoned, he breaks his chains and escapes into the woods, where he finally finds refuge with a lonely blind hermit, who treats him with kindness and teaches him to speak and to enjoy the simple pleasures of life.  This idyllic respite is short-lived, however; a pair of hunters discover the creature, the hermit’s cottage is accidentally set ablaze in the ensuing struggle, and the forlorn fugitive flees as his new friend is led away to safety by the interlopers.  With the entire countryside on his heels, the monster hides away in a dilapidated crypt, where he unexpectedly encounters none other than Dr. Pretorius.  The scientist befriends him, and promises that, with his help, he can persuade Dr. Frankenstein to make a new creature, a female that will at last offer the lonely outcast the companionship for which he longs.  When the good doctor, newly married and about to embark on his honeymoon, refuses to cooperate, Pretorius instructs the monster to abduct Elizabeth, and promises Frankenstein her safe return upon the completion of the new creation.  Though he has been forced into participation, the doctor becomes enthusiastic about the project in spite of himself, and soon- thanks to some unsavory assistance procured secretly by Pretorius to find a suitable heart for the new creature- the experiment reaches its successful fruition.  The original monster’s intended mate, however, has a mind of her own, an unexpected development which leads to disastrous complications. Following the success of the original Frankenstein in 1931, Universal was eager to produce a sequel; they publicized their intention to make one almost immediately, but director Whale was uninterested in returning to the material, feeling that he had exhausted the possibilities with his first effort.  It took several years for the pieces to come together, during which time the filmmaker was persuaded to helm the project as part of a package deal- he was given the chance to direct another film in which he was interested (the now-virtually-forgotten One More River) in exchange for accepting the assignment on the Frankenstein sequel, over which he was also promised absolute artistic control- and work commenced at last on the long-awaited film.  Whale believed, however, that a sequel would be unable to surpass his original movie, so he decided to take a different approach; seeking to turn the film into a black comedy, he rejected several scripts before settling on an adaptation by John Balderston (who had adapted the first film for the screen) of an episode in the original novel in which Frankenstein is coerced into building a mate for his creation.  Another writer, William Hurlbut, was brought in to add the macabre touches of humor desired by Whale, and it was ultimately his screenplay from which Bride of Frankenstein was made; it is clear, however, that he worked in close collaboration with the director, for the film bears Whale’s unmistakable stamp on every frame. With his background in design and direction for the theatre and his taste for the techniques of German Expressionism, James Whale was an ideal choice as a creator of gothic horror films, something Universal- and its chief executive, Carl Laemmle, Jr.- fully appreciated; the director himself, however, was bored with the genre by the time he made Bride, and frustrated with being pigeonholed into the category of “horror director.”  This conflict seems to have created the perfect foundation for Whale’s precocious creativity to manifest itself on film.  With the rare artistic freedom that was his price for doing the job, he turned the project into something more interesting for himself than just another A-list shocker.  His movie is rich with subversive subtext, taking the accepted conventions of horror melodrama and slyly turning them inside out; he infuses the plot with sly social commentary, finding a sense of the absurd in every scenario and exploiting it for dry comic effect even as he takes delight in its horrific elements.  The representatives of decency and normality are presented as grotesque caricatures, exhibiting ignorance, intolerance, hypocrisy and cruelty at every turn, while the film’s outsiders are treated with dignity and sympathy; whereas in the original film, Frankenstein himself is the main protagonist, a misguided but well-intentioned visionary who takes on the role of Prometheus, in Bride of Frankenstein there can be no mistake about the fact that it is the monster who is our hero.  The angry mobs- a cliché ripe for satire even in 1935- are here the enemy, and the unfortunate victims of the monster’s wrath are merely collateral damage in a reactionary war against the unknown and misunderstood.  As for the doctor himself, he is now an overwrought, uptight coward, denying his true nature to pose as a bastion of decent society; he has been supplanted instead by Pretorius, a figure of dubious motivation but possessed of an undeniable charm which makes us like him despite the shadier aspects of his character.  Pretorius is clearly bent on the destruction of the status quo, and given the unflattering portrait we are given of the society around him, such a goal cannot help but seem reasonably understandable; thus he, like the lonesome creature he befriends and ultimately exploits, becomes a focus for audience identification. Whale’s film is filled with deliciously subtle wit, even in its most horrifying scenes- Pretorius is a major source of the verbal comedy, although other characters deliver some intentionally unintentional zingers, such as the stodgy burgomaster’s assertion that it’s time for decent men and their wives to be in bed.  This kind of tongue-in-cheek naughtiness is largely responsible for the film’s status as a “camp” classic, which further has given it a reputation for having a heavy homosexual subtext.  Whale was openly gay, and other members of his cast and crew were either known or rumored also to be so; it is not surprising that a connection could be made between the movie’s dominant theme of social ostracism and an expression of gay experience in 1930s culture, and the film’s ironic tone and anti-social perspective certainly suggest an alternative sensibility.  The most obviously gay element, of course, is the prominence of Dr. Pretorius, whose arch attitude and fey demeanor go beyond the level of the typical codified “sissy” characters of the period to make him clearly identifiable as gay to all but the least sophisticated audiences, even in 1935.  Many of Whale’s contemporaries have vehemently dismissed the notion that he deliberately intended the film’s content to be read as “gay,” either overtly or by inference; watching Bride of Frankenstein, however, it is hard to imagine that a director of such obvious intelligence and command of his art would be unaware of the implications inherent in many of the movie’s situations.  Perhaps it is an overstatement, based on a retro-fitting of modern ideas, to interpret (for example) the extended sequence of the monster’s relationship with the blind hermit as an allegory for same-sex unions; but it seems equally unlikely to think that Whale and his associates were not aware of the obvious metaphor of an “unnatural monster” being persecuted and driven to the fringes of society to find acceptance.  Of course, social isolation is a universal experience, and one of Bride‘s great strengths is the clarity with which it is portrayed; Whale’s acute personal connection to the monster’s plight no doubt played an important role in his ability to bring it to the screen with such powerful resonance.  Like all great artists, he drew inspiration from his own psyche to infuse his work with a conviction and authenticity that is accessible to all. Whether or not the supposed gay subtext was intentional, Bride of Frankenstein contains a considerable amount of sexual innuendo which most definitely was meant to be there.  Nevertheless, these elements were not the source of the film’s difficulty with the Hays Office; rather, the censors objected to the film’s heavy use of religious iconography and its extreme (for the time) violence.  Whale loaded his movie with crosses and crucifixes, at one point even featuring a scene in which the monster, captured by the irate villagers, is lashed to a post and raised is an unmistakably Christ-like pose before being loaded into a cart for transport to a jail cell; while much of this material remains, the Hays censors insisted on the removal of some even more overt scenes which they deemed to be blasphemous.  The director was known by his colleagues to be irreligious, but even so it is doubtful he intended disrespect by including these aspects in the film; more likely, it was a pointed observation on the irony of the decidedly un-Christian treatment visited on the monster by the supposedly righteous mob, and perhaps also, subtly, an inversion of the Christ story, in which a being raised from the dead is persecuted and rejected by an fearful and inhospitable populace.  As for the violence, it probably goes without saying that it is hard to see, by today’s standards, how there could be any objection to the few brief moments in which the monster dispatches yet another irate villager; there is no visible bloodshed, we are given no gruesome close-ups or buckets of gore, and most of the killings are over before we even realize they are happening.  Still, the body count in Bride of Frankenstein is considerably higher than that of the original film, and quick as they may be, some of the murders are admittedly disturbing on a psychic level that has nothing to do with the gross-out factor which has today replaced the deeper shocks favored by horror filmmakers of old.  Consequently, extensive cutting was necessary to obtain a passing certification from the Hays Office, and at least one new scene had to be hurriedly added before release in order to bridge the story gaps created by these edits.  Thanks to Hollywood’s self-imposed decency standards, therefore, Whale did not quite achieve the complete artistic control he had been offered; indeed, the studio also reneged on its promise in one key instance, demanding a happy ending (and one which might facilitate the possibility of yet another sequel) to replace the one Whale shot, in which (“spoiler” alert) all the principal characters perished.  Consequently, new footage was shot at the last minute, depicting the escape of Dr. Frankenstein and Elizabeth (who is technically, of course, the actual title character of the film); however, due to budgetary constraints, it was not possible to reshoot already finished footage of the exploding laboratory, so that in the final version, the good doctor can still be seen pressed against the wall as the room collapses into rubble.  Though this was contrary to the director’s plan, there is a certain ambiguity to the hollowness of this tacked on reprieve, which evokes questions of how this hopelessly scarred couple can ever hope to free themselves of the nightmarish experiences they have lived through- particularly the doctor, already a visibly broken man, who was at least partly responsible for the preceding events having ever taken place.  In any case, the survival of these two characters does nothing to alleviate the sense of tragedy which permeates the film’s final moments; if anything, it underscores the sadness we feel at the fate of the film’s true protagonist. Analytical discussion aside, there is much to praise in Bride of Frankenstein; Universal considered it one of their most important productions, having established a lucrative domination of the horror market and fully anticipating a major hit with the eagerly awaited continuation of one of their most popular films.  Consequently, the production values are sumptuous, from the elegant period decor and costumes of the Romantic Era prologue to the elaborate blend of gothic futurism that dominates the laboratory in the movie’s climactic scenes.  The special effects were top-notch for their time, and black-and-white cinematography (by John J. Mescall) is a glorious example of the bygone aesthetic of light and shadow that made films of this era such a magnificent, ethereal beauty.  Franz Waxman’s eerie, unresolved score provides a darkly romantic atmosphere throughout and drives the story relentlessly towards its cataclysmic finale.  Whale’s skill as a director manifests itself not only through his overseeing and coordination of all these elements, but in his edgy visual style; with rapid cutting, extreme angles, and a highly mobile camera, he manages to build a film that keeps the viewer breathlessly off balance, ensuring that it works as a horror movie independently of the black comedy that simultaneously exists for those audiences savvy enough to see it. To paraphrase the ending credits, a good cast is worth mentioning, and no discussion of Bride of Frankenstein would be complete without mention of its star, Boris Karloff, whose fame and popularity were so great at the time that he was billed simply by his last name.  The pathos which he brought, somewhat unexpectedly, to his portrayal of the monster in the original film, is here brought to the front and center of the proceedings, and he provides genuine heart to the story, which prevents the loopy comedy from undermining the movie’s seriousness and keeps the sensationalism of the horror elements from overpowering its deeper message.  It is well-known that the actor objected to the creature’s development of speech within this movie, feeling that it would create an awkward and jarring effect that might alienate the audience- or worse, make them laugh; even so, he rose to the occasion well, delivering his stilted, remedial dialogue with as much conviction and sincerity as he performed the physicality of the monster.  The addition of speaking did have a somewhat unfortunate side effect, in that Karloff was unable to remove his dental plate as he had in Frankenstein, which meant that the formerly sunken-cheeked monster had a fuller face this time around; but the iconic makeup (designed by the uncredited Jack Pierce) was adapted to reflect the damage caused by the windmill fire that ended the original film, so the change was perhaps less noticeable than it might have been.  As for Colin Clive, the other returnee from the first film, his severe alcoholism had progressed considerably, and its ravages were plainly visible onscreen- the actor looks considerably older this time around, and his distraught, unfocused persona is a far cry from the clear-eyed drive and passion of his former appearance as Dr. Frankenstein.  His deterioration was doubtless made all the more evident by the fact that he broke his leg in a horseback riding accident shortly after filming began, requiring him to be seated for most of his scenes and in excruciating pain for the ones in which it was not possible.  Though this was obviously a tragic state of affairs for Clive, who would die at the age of 37 just a few months after the release of Bride, it gave him a decidedly convincing edge in his nerve-wracked, tormented performance as the unfortunate doctor.  Replacing Mae Clarke, who was battling health problems and unable to return as the hapless Elizabeth, was 17-year-old Valerie Hobson, whose melodramatic performance, while hardly memorable, adds an appropriate touch of the hysterical to the mix; and the aforementioned Ernest Thesiger, an English stage actor of considerable reputation who was a friend of Whale’s, makes one of the most memorable appearances in the history of horror as Dr. Pretorius, dripping with prissy irony and presenting a veneer of good-natured gentility which magnifies, rather than masks, the malevolent intent behind it.  As for the justly famous appearance by Elsa Lanchester as the monster’s would-be mate, it is without question the film’s electrifying highlight- not just because of the iconic design of the character, with her Nefertiti-inspired lightning bolt hairstyle, but because of the actress’ brilliant, jerky performance (which she said was based on angry swans), punctuated by shrill shrieks, deadly hissing, and other sub-human vocalizations.  Often overlooked, however, is Lanchester’s other performance as Mary Shelley in the film’s opening scenes; she sets the tone for the entire movie, offering up a demure and delicate persona with the unmistakable glimmer of a twisted and demonic imagination underneath it.  Rounding out the cast is the delightful Una O’Connor, as Frankenstein’s busybody housemaid, whose encounter with the monster early on is another of the film’s highlights; she provides comic relief, of course, but there is an undercurrent of ugliness within her character that continually reminds us of the small-minded baseness of the common throng. Bride of Frankensteinin (which was referred to in publicity material with “The” in front of the title, though the word is absent in the credits), by today’s standards, is not a scary movie.  Modern audiences expect much more gruesome and explicit shocks, and the lingering Victorian morality which pervades horror movies of the past now seems quaint and laughable.  Nevertheless, it is, by any standards, a superb movie.  Once its conditions are accepted, it offers a compelling and surprisingly affecting story while laughing with us at the ridiculous conceits the genre requires.  Regardless of whether Whale intended it or not, it contains a rich subtext that reflects both his personal experiences and the larger social fabric of the time, and touches on a universal nerve that is timeless in its relevance.  Most importantly, it contains a treasure of rich, indelible images that transcend the material itself to become icons of the popular cultural imagination.  On top of all that, it is what Whale himself declared it would be: a “hoot.”
What Is One Of The Newest Ways To Receive Education And Training For Your Career? Similarly, What is the latest way to receive education and training for your career? One of the newest methods to get education and training for your job is via online learning. Also, it is asked, What are four important factors to remember before making a career decision? When deciding on a career path, there are four things to think about. Personality. The kind of your personality and the amount of enjoyment you want to attain from your profession are two of the most important factors to consider. Lifestyle. Skills that may be used in a variety of situations. Secondly, How can you make sure you are being realistic when setting goals quizlet? How do you make sure you’re creating objectives that are realistic? You must carefully evaluate yourself and your profession choice while creating realistic objectives. You must be absolutely truthful to yourself about your abilities, interests, and personality. Also, Why is it important to keep your career plans flexible at this point in your life? Why is it critical to have flexibility in your professional objectives at this stage of your life? Choosing a single job path today may restrict your options in the future. Now is the time to experiment with various options. People also ask, How do you plan to educate yourself about your future career list at least two ways? What is the best way to begin planning your professional path? Find out about possible career paths. Find more about employment markets that are expanding. Find jobs that are a good fit for your talents. Recognize your professional credentials. Examine salary and other perks. Examine many job options. Set SMART objectives. Make a strategy for your future career. Related Questions and Answers Students may use career planning to discover their talents, abilities, and interests, which will help them choose the ideal job route for their future. High school students are asked what they want to do when they grow up in every grade. It’s a regular question that every student faces in their early years. What are the key influences in your career to date? Positive experiences and role models in various professions may impact the list of vocations we evaluate as possibilities for ourselves. One feature of Social Cognitive Career Theory tackles the notion that if we have had a favorable experience with an activity, we are more inclined to consider doing it again. How will you develop the needed abilities for your chosen career? How do you learn new skills? Make a list of your objectives. Look for a mentor. Inquire about your strengths and shortcomings. Examine the job descriptions for the occupations you’re interested in. Enroll in a distance learning program. Enroll in career-related continuing education courses. Take advantage of the company’s training opportunities. Take part in a work shadowing program. What types of assistance can you receive if you apply for financial aid quizlet? Anyone seeking federal financial help must complete the Free Application for Federal Student Aid (FAFSA) (FAFSA). Grants, scholarships, work-study funding, state loans, and tuition help are all available from state governments. How can you make sure you are being realistic when setting goals? Use this template to make sure you pick objectives you can achieve: Make your objective specific. Give your objectives a deadline. Always shoot for the stars. 4but not too high. Make a well-thought-out strategy. Make your objectives public and hold yourself responsible. What are four ways in which a person can start or own a business with an existing company? Starting a new company is one of the four options. Purchasing an established company. Investing in a franchise. Taking over a family company is a big step. What are the benefits of planning your future career? The following are six advantages of having a professional plan: Knowledge. Career planning allows a person to become more aware of numerous career options. Self-awareness is important. Self-improvement. Job satisfaction. Visibility. Plan for your retirement. What makes me think that my choice of career is affected by my interests? I believe that your passions influence your profession decision since you will be more driven and effective at work. When a vocation aligns with one’s interests, there is a greater level of motivation. Individuals who transform their passions into careers are committed to improving necessary skills and are focused on achieving their objectives. What is the key to satisfaction and success when choosing a career? 1) Career Interests – Which careers will you be enthusiastic about? Doing things that you are enthusiastic about and thrilled about is perhaps the most crucial factor in developing your ideal profession. When you like the things you perform and the sort of job you do, it doesn’t seem like work at all. How do you plan your future career? What is the best way to build a career plan? Choose a topic that interests you. Learn about your options for a future job. Find more about employment markets that are expanding. Recognize your professional credentials. Examine salary and other perks. Examine many job options. Make a strategy for your future career. Professional aspiration. What must you do to prepare yourself for the future essay? Getting Ready for the Future Every choice you make now has an influence on your life in the future. Have a vision in your mind. Consider what’s most important to you and where you want to go. Make a list of objectives. To achieve progress, divide your strategy into realistic targets. Inquire for assistance. Speaking with a financial professional might assist you in developing your strategy. Why is a career plan important for a high school student? Students should learn how to discover professional interests and follow a process to finally choose a career path in an effective career-planning program. It should teach pupils about the importance of competitiveness in the job and which abilities companies appreciate. What is the proper order of steps in the career planning process? The steps of the career-planning process are as follows: Self-examination and evaluation. Investigate your career options. Experimentation and exploration. Making decisions and deciding on a career path. Action and final planning. The process of looking for and accepting a job. What are the two kinds of career planning? There are two sorts of career exploration, according to author J. Zikic: self-exploration and environmental investigation. Environmental exploration is a more active method of gathering fresh knowledge about jobs, organizations, vocations, or sectors in order to make better career decisions. What are different influences in the career choice of Grade 12 students? The following seven primary elements in selecting profession choice were identified using factor analysis: high earnings expectations, career expectations, employment experience, knowledge and ability, family environment, social standing, and education environment. Does your academic achievement affects your choice of the career in what way? Career choices are influenced by an individual’s surroundings, abilities, skills, and academic accomplishment. If you make the incorrect decision, you may experience failure and disappointment as a consequence. According to research, a person’s profession choice is influenced by their family, school, and social environment. How do learning & development opportunities influence your decision when choosing an employer? The Importance of Opportunities for Learning and Development Companies that have strong learning and development programs boost their chances of not just recruiting but also keeping outstanding people. Allowing individuals to mature encourages them to trust in their own abilities and generates a feeling of loyalty that encourages them to remain. What is an important skill to develop in order to appear qualified proficient and skilled to potential employers? You will become more appealing to many companies if you practice and use critical thinking, collaboration, professionalism and work ethic, oral and written communication, and leadership abilities. What are four important factors before making a career decision? How can being more aware of your personality and values help you in your career or when job hunting? You’ll be a better applicant and more likely to obtain the job when you have a clear grasp of your own abilities, personality, and interests as they apply to your job hunt. Miriam Salpeter, the owner of Keppie Careers, is often featured in major media sites for her experience in job hunting and social networking. What are the different types of financial aid quizlet? This collection of terms includes (12) Direct Subsidized Loans from the Federal Government. A government loan for undergrad students in financial need when the US Dept. of Education is involved. Unsubsidized Federal Direct Loans Deferment.\sForbearance. PLUS Loans are a kind of direct loan. Direct Consolidation Loans are a kind of loan that allows you to pay off your debts Pell Grants are federally funded scholarships. Grants for Supplemental Educational Opportunity from the federal government (FSEOG) Which of the following are 3 types of student loans provided by the federal government? Direct subsidized loans are one of four kinds of federal student loans accessible. Unsubsidized direct loans. Direct PLUS loans are a kind of loan that allows you to borrow money Loans for debt consolidation directly. Which of the following types of financial aid must be repaid? There are three sorts of financial help available from the federal government for students. Grants: Financial assistance that does not have to be returned in most cases. Loans: If you took out a loan to pay for college or professional school, you must repay it with interest. What makes my goals believable and possible? Goals should be clear and unambiguous, realistic, have a beginning and an end point, relate to your life vision, and be measurable. When it comes to setting goals, most people have a general idea of what they want to achieve in life. How can I achieve my goals? 10 Steps to Achieving Your Goals More Effortlessly Make a commitment to something you believe in. The first recommendation on our list is to attempt to improve in the area that you consider is most important to you. Concentrate on the most important tasks. Be realistic in your expectations. Make a note of it. Dismantle it. Make an activity calendar. Tell your friends and family about it. Seek professional assistance. One of the newest ways to receive education and training for your career is by creating a personal career profile form. The form will evaluate two sets of data: your skills, abilities, and interests on one side, and your desired career path on the other. This Video Should Help: When considering the education and training a career requires you must be aware of _____. Reference: when considering the education and training a career requires you must be aware of _____.. • once you make a career choice, you should set short, medium, and long-term goals. • once you make a career choice, it should never be changed. • an apprenticeship involves _____. • most jobs today require post-secondary training. • if you are interested in joining the military, you can attend college _____. Leave a Comment Your email address will not be published. Scroll to Top
Ruud van der Pas Ruud van der Pas is Distinguished Engineer in the SPARC Processor Organization at Oracle and coauthor of Using OpenMP: Portable Shared Memory Parallel Programming. • Using OpenMP—The Next Step Using OpenMP—The Next Step Affinity, Accelerators, Tasking, and SIMD Ruud van der Pas, Eric Stotzer, and Christian Terboven • Paperback $50.00 • Using OpenMP Using OpenMP Portable Shared Memory Parallel Programming Barbara Chapman, Gabriele Jost, and Ruud van der Pas A comprehensive overview of OpenMP, the standard application programming interface for shared memory parallel computing—a reference for students and professionals. OpenMP, a portable programming interface for shared memory parallel computers, was adopted as an informal standard in 1997 by computer scientists who wanted a unified model on which to base programs for shared memory systems. OpenMP is now used by many software developers; it offers significant advantages over both hand-threading and MPI. Using OpenMP offers a comprehensive introduction to parallel programming concepts and a detailed overview of OpenMP. Using OpenMP discusses hardware developments, describes where OpenMP is applicable, and compares OpenMP to other programming interfaces for shared and distributed memory parallel architectures. It introduces the individual features of OpenMP, provides many source code examples that demonstrate the use and functionality of the language constructs, and offers tips on writing an efficient OpenMP program. It describes how to use OpenMP in full-scale applications to achieve high performance on large-scale architectures, discussing several case studies in detail, and offers in-depth troubleshooting advice. It explains how OpenMP is translated into explicitly multithreaded code, providing a valuable behind-the-scenes account of OpenMP program performance. Finally, Using OpenMP considers trends likely to influence OpenMP development, offering a glimpse of the possibilities of a future OpenMP 3.0 from the vantage point of the current OpenMP 2.5. With multicore computer use increasing, the need for a comprehensive introduction and overview of the standard interface is clear. • Paperback $50.00
Wide Selection of Essay Samples on Politics & Government The contemporary world is based on politics and its principles. Global and local governments exercise control over all processes of society. At the same time, politics is a tool for establishing order and manifesting democratic principles. Current education offers many opportunities for students seeking to pursue political careers. However, college or university studies can often be challenging due to difficult written assignments. We offer a free database of sample essays that you can use in your learning process. On our website, you can find samples of academic papers or exam preparation materials. Writing on Politics and Goverment Students can come across many issues when writing about politics. Writing a good assignment requires thorough research and knowledge of the format requirements. Even if you have a real interest in a given topic, it can be difficult to decide on the content and structure. If you are writing a short essay, it can be difficult to fit everything into 1 page and use 250 words. You need to clearly plan 5 paragraphs that accurately and in detail reflect the essence of the discussion. This can be especially difficult when the topic of your paper is extremely broad, such as international relations. However, no matter whether you have to write 500 words for the college assignment or a 10000 word article, our website can help you. Our database contains hundreds of examples of different types of essays that you can use for your consultation. Perhaps you are writing about media effect on censorship and trust in society today or discussing the influence of a well-known corporation on political processes. Regardless of volume and topic, we offer a variety of papers focusing on the political field and related areas: • US foreign policy; • Prominent American politicians; • Unitary government; • Global privacy policies; • Social responsibility; • And others. If you have not yet decided on the topic of your writing, then you can also use our examples. Turning to samples, you can find broad and narrow topics for discussion, whether to discover new sources of information. You will also be able to understand which aspects you need to include in your paper. You need to choose the assignment that most closely matches all your requirements. In particular, we can help you with: • Argumentative essay; • Persuasive essay; • Descriptive essay; • Comparative essay; • Analysis; • And others. Using our samples, you can learn how to write effective introductions and make extended outlines. You can also refer to our sample for various academic papers, including personal statements, applications for scholarship, or admission papers. Additionally, you can also find preparation materials for international standardized exams such as IELTS or TOEFL. We provide materials in various formats for download, including PDF, DOC, and others. Thus, you can choose the one that suits you and is convenient to use. We offer you guaranteed high-quality examples of work that will help you in your studies. Using our materials, you will learn how to cite academic resources correctly. All the essays contain expository notes to help you highlight critical aspects. Please note that you can rest assured that our essays are absolutely free from plagiarism. Education at a university or college can be a challenging task for many students. Especially if it is related to the study of complex topics such as politics. However, using our database, you will be able to find examples of quality essays and consult them for writing your assignments. You can use them to find the information you need by structure, format, or content. Additionally, you can utilize them for research and exam preparation. All materials are absolutely free and available in various formats for your convenience. Toogle Subject's Description 1186 Perfect Paper Examples on Politics & Government for Improved Grades Pros and cons of administration dichotomy The supporters of administrative dichotomy believe that since one primary objective of politicians in a democratic society is to get elected, so if the politics and administration are not separated, the politicians may misuse their influence to make public administrators function in a manner that may attract immediate public support and popularity, though not being most beneficial and Performance measurement in the public sector Performance measurement inprivate sector For the private sector, such as the profit-oriented organization, the primary measure of performance is profit and the majority of performance measurement activities are still based on the financial statements. Nevertheless, the values of goods and services in public sector are more difficult to identify and measure than the one in private sector, how Canadian multiculturalism The change in context influences the government's policies towards migrants, which integration to a multicultural policy is the basis of the approach in Canada. Looking further at some benefits of multiculturalism, the policies that it encourages migrants to be able to retain their culture thus benefitting a new national culture in Canada. The most difficult traps to overcome by the poor states This is due to the fact that institutional structures play a role in the management and utilization of this wealth. Institutional patterns of poverty and wealth are usually controlled by a limited number of people, meaning that the outcome of these results can be managed as compared to the cultural and geographical patterns, which are complex in specific Western civilization reflection paper # 5 That in and of its self shows that Otto was a legit ruler! He finally takes back his kingdom and is recognized as the first official King of England. Royal dutch shell The Problem The Guardian News has run an article reporting on the inconsistencies of what the Royal Dutch Shell has committed to and the reality of the situation. Improvements have been done with little regard to the needs of the people and were primarily done so that it can be said that the company was committed to the Advertising Need help writing an essay? We can do that with ease! Get Academic Assistance Get Academic Assistance End of communism cheered but now with more reservations The main cause for cutting the gas supplies to Ukraine is to raise the demand for gas and, consequently, push the prices up. Even though Russia is rich in natural resources and has a competitive advantage in fuels and mineral, its cost of production is tremendously high mainly due to the high labor costs. Should federal government bailout the financial institutions and multinational corporations? essay sample This act allows the treasury to spend up to $700 billion in the rescue the financial and the mortgage industry. According to the supporters of the bailout plan, the economy needs rescue and helping out banks and other institutions in financial crisis will go far in reviving the economy as well. Position paper ap government Obama plans to end the war by 2014 and use half themoneythat would be spent on the war, and use it for roads, bridges, runways and schools and the other half on paying the deficit. Obama plans to lower the costs on prescription drugs, and monthly premiums. Forms of government The principle of democracy is political virtue, by which Montesquieu means " the love of the laws and of our country", including its democratic constitution. It requires " a constant preference of public to private interest"; it " limits ambition to the sole desire, to the solehappiness, of doing greater services to our country than the rest of The kuomintang and the chinese communist party – group spirit and activities of opposing political coalitions The party was initiated in 1971 as a result of the learned people going against the Chinese traditions in politics, literature, and culture. From the reasoning of the framework, the party gained strength from the Western-style educational organizations where most of the participants were students. Turkey pkk case essay sample Today, PKK's initial claim for the establishment of an independent Kurdistan has shifted to that of the recognition of the political and cultural rights for the ethnic Kurdish population in Turkey only. The organization was based in Ankara but Ocalan decided that it was better to shift the base of operations to the southeastern part of Turkey because Obesity and government control The government should have some in not all control or regulations on what the people of the country decide to eat. Because of the increase in the amount of people who are being diagnosed with diabetes, the amount ofmoneyspent on health care costs is a surprising one hundred billion a year. The bourne ultimatum The Bourne ultimatum is a movie that transfers the corruption of the CIA. Later in the movie the CIA officials sent an assassin to kill the reporter, and the cameras assisted in locating the position of the reporter. This is about the pros essay The Coalition of Americans for Research Ethics argues the case like this " The destruction of human embryonic life is unnecessary for medical progress, as alternative methods of obtaining human stem cells and of repairing and regenerating human tissue exist and continue to be developed. It is these people that feel that a few-day old embryo is a The role of political parties in the american democratic The choice of the candidate that the party supports is determined by the issues and agendas presented by the candidate. During the campaign, the party organizes for a campaign team charged with the responsibility of mobilizing voters and financial support to the party's preferred candidate. The case for health care reform The Medicare program is intended to cater to the healthcare needs of senior American citizens as well as disabled persons. The Medicaid program, on the other hand was created to take care of the healthcare needs of those who are economically disadvantaged, but exceptions are made for special cases and circumstances. The meaning of citizenship I like the Dictionary definition of citizenship is the state of being vested with the rights, privileges, and duties of a citizen. We must stand firm that this is what it takes to be a citizen of the United States. State security and peoples liberty: the us policy As a result of this occurrence, the US Department of Homeland Security, the agency in charge of the security of the US, border patrol, counter-terrorism planning and implementation, as well as the other agencies of the government had to review and overhaul the intelligence system and strategies so that same or similar attacks would not happen again. The Comparative economic systems Communist also deals with a government in which the state plans and controls the economy and a single, often authoriatain party holds power, claiming to make progress toward a higher social order in which all goods are equally shared by the people. Some differences between the three would be that capitalism is the ownership and control of the Liberal reforms 1906-1914 The Liberals claimed that the Lords were the selfish rich who were not willing to help the country, whereas the Conservatives tried to appeal to the wealthy stating that this would lead to social revolution and that is was the duty of the House of Lords to block controversial policy that the public had not voted on. The Evaluation of “politics and the english language” essay sample George Orwell's article, " Politics and the English Language," explores the increasing misuse of the English language and its possible political causes. In the end of the article, George Orwell lists rules that cover most causes, and I think they are useful especially for someone who is in the earliest stage of writing: i. The disputes. although lord woolf had deployed The key aspects focused on where the cost of litigation, the delay from cases being brought to court, and the complexity of the process of litigation. Lord Woolf was successful to an extent in addressing the 3 main aspects causing dissatisfaction, through the use of ADR as an alternative and CPR as a deterrent to both the judge Indian democracy essay sample Though the four pillars of our democracy are strong enough to carry the burden of the country, whether Indian democracy itself is still strong and credible, is a matter of debate. Democracy has been successful in India because we are a tolerant people and have proper regard for the others' point of view. To what extent was the liberal election victory of 1906 Chinese Slavery, the decision by the Conservative Government to send thousands of Chinese labourers to South Africa to work the goldmines to rebuild the economy after the Boer War angered many of the working class. As the Liberals explained it this meant that with Tariff Reform, for the money they paid for a large loaf of bread then, Political science Schumer policies on national development enabled him face the federal government and insisted on development that the national government and the federal government had earlier promised communities and towns within New York City. Schumer believes in transparency and accountability of the government in accomplishing some of their duties promised to the natives. Imperialism dbq During this era expansionism in the United States kept the same principle but, it departed from previous expansions regarding to geography, politics and the economy. The U. Essay on persuasive letter to the dean of sociology The major aim of a sociology study of a society is to determine the way of life of human beings to understand how the individuals of the society relate to each other. The major areas of study in political science include; political theories and practice and critical study of political systems in a society The goal of studying Citizenship coursework- illegal downloading Many people do not see the problem it causes and many do not realise the effect of what they are doing, some do not even seem to know that it is illegal. It is illegal and the consequences are real - for you and for the music. Analysis of the totalitarianism in a soviet society Industrialization was the key element of Stalin's revolution Rejecting the prior Bolshevik conviction with the bourgeois institution, he sought to embrace " socialist realism," 5 denouncing anything that was remotely of " bourgeois intellect." 6 However, these cultural changes were minor in comparison to the vast changes of his economic policies. 14 The success was due to the Domestic & international market BMW comes In top 25 companies of best brand value in the world, today Its brand value exceeded to 25 Billion dollar because of Its R and Innovative Ideas of luxury cars. The structure of company's culture are more emphasis on differentiate and innovative ideas, and there is no doubt that BMW is holding one of the best Examining government regulations The elderly are members of the population who are considered to have lived for long. Impact of current regulations on the elderly and elderly abuse, neglect and exploitation The elderly are a needy group in the community. Bicameral parliamentary system essay sample Grenada-Parliament Senate House of Representatives 14. Jamaica-Parliament Senate House of Representatives 19. Diary entries of napoleon bonaparte essay sample Thanks to the Revolution, I advanced from the position of lieutenant in the artillery to a full-fledged general, which changed my life entirely and gave me a world full of power. I am going to be the world's best and most successful ruler, and will rule all of Europe... Technology and civilization: course description You will then be asked to fill out Work's Attending Physician's Statement and submit it before you are allowed to write the exam at an alternate date and time. If your explanation is accepted, you will be asked to provide further documentation. U.s. is ready to lead on climate An article from the NY Times revealed that Secretary of State Hilary Clinton would like to create a global warming treaty on behalf of the United States. Ironically, the United States was never a signatory to this treaty; however, the United States is trying to lead this new treaty that would aid in the constant struggle of global Jabwood international essay sample Problem statement: After reading the case study I believe that despite other issues, the main problem that exists for this company is the lack of revenue, which lead them to make a decision on expansion to the relatively unknown. Weaknesses: Since China is in dire need of the timber resource, Jabwood would not be the only supplier in Free movie review on politics of nature Despite the pain that is depicted in the movie, the most interesting part is how the town dwellers decided to think over the issue to obtain the attention they needed. This is because of the environmental effects, which affects the generations to come. Abstract— cast specimen also showed an increase. The refinement of grains of the hypo-eutecticalloys results in the formation of fine equiaxed?-Al dendrites and theimprovement of the mechanical properties. 15 Bal The present paper aims to study the effect of Al 5Ti Bgrain refiner on microstructure and mechanical properties of Al 336 aluminiumalloy on the account of grain refinement. Tort assignment narrative essay The act of unlawful photographing would not constitute an assault itself, however, blocking someone with a " display of force" would carry means of threat into effect, which was reasonable for Rosins to apprehended that the threat would be carried out without her consent. Therefore, Fred would be liable for the tort of assault and Rosins likely to Politics and society of latin america Politics and society in Latin America Encomienda period or the age of colonialism and slavery in Latin America, which lasted for almost 350 years, made its influence on contemporary state of affairs in Peru, Guatemala, Nicaragua and other countries. Brenner and Lisovsky, for instance, underlines the influence of slavery on the racial structure of colonial society, which led Auditor independence – 2 The Nature of other services provided by the auditors In the classification from APB, non-audit services is composed of any engagement where an audit firm provides professional services to an audited client other than the audit of financial statements, and pursuant to those other roles which legislation or regulation specify can be performed by the auditor of the Life of quaid e azam after independence Jinnah uthorized force to achieve the annexation of the princely state of Kalat and suppress the insurgency in Baluchistan. Jinnah in Karachi, Pakistan Through the 1940s, Jinnah suffered from tuberculosis; only his sister and a few others close to him were aware of his condition. Reaction paper: comprehensive agrarian reform program (carp) The Comprehensive Agrarian Reform Law is the basis of the Comprehensive Agrarian Reform Program which was the centerpiece program of President Corazon Aquino's Administration. The sources of the Agrarian Reform Fund was proceeds of the sale of the Assets of the Asset Privatization Trust, the sale of the ill-gotten wealth recovered through the Presidential Commission on Good Government What is the difference between presidential and parliamentary form of government The fact that he is not subjected to the legislature in the selection means that he can choose wise men and women with extensive experience. Parliamentary leaders often depend on others to perform their duties because they lack the knowledge of the changing world. U.s.’s tactics to persude north korea to abandon its development of a nuclear weapons program China relations, in spite of the fact the two countries have engaged in cold war politics since China's revolution in 1949 and China provided military support to North Korea during the U.S. So the U.S.seems to rely on engaging in a primarily soft power approach to relations with China and Pakistan although these are clearly countries that the African american and racial generalization essay So if the advocate of colored people is tricked into thinking that African Americans are bad as a result of the popular trend of racial profiling, imagine the impact that racial profiling has on the average American citizen. I had an experience with racial profiling where I was riding in the passenger eat on my way to the Civil disobedience definition Bartleby is merely a lonely guy who does not wish to work and has nothing to do with civil disobedience. King and Thoreau" s ideas of what civil disobedience is do not match up with the actions of Bartleby. Political economy This is because in the two instances that A is the preferred candidate, the head-to-head results show that 42% of the voters prefer the candidate. In a plurality formula the candidates would get their votes as A; B; C; and D. Fahrenheit 451 analysis This is one of the many ways in the book that the government controls. In the third section of the book Bradbury creates the chase between the law and Montag to show how technology is poisoning the people. Canadian government The Canadian parliamentary system is mainly based on that of the UK and the USA. Moreover, Canada adopted the federal system of the US; and the Canadian federal government maintains a division of responsibilities between the national government and ten provincial governments and three territorial governments. Western civilization Developments in agriculture were not enough to feed the whole French nation, especially in the cities, because the poor has always sufferred. Despite the advancement in agriculture and the use of modern agricultural techniques and " expected" increase infoodsupply, the prices of the food was still going up. Julius caesar: corruption in the government Yet another example, especially more recent, in the state of Ohio, the state refused to place the religious state motto in the plaza of the political state building. As a result, people in the state have begun to cry corruption in the government, stating that the government has been corrupting both religion and morality for quite some time The ethics and politics of human experimentation Participation should be allowed for anyone who can benefit from the research and they should not be denied the benefits. Benefits should be distributed fairly according to individual contribution, merit, and role during the research. Would bmw benefit if the uk government took us into the euro by january 2004? essay sample To answer this question, I am going to use various sources to research the British part of the BMW company, their finance system to see if they can cope with a change of currency and send a survey through e-mail to see what the managers and employees think about the situation. The value of the euro beyond the The formation of authoritarian governments The idea behind striving for 'community' is the notion of the united nation-state, and the homogeneity of that state, which is the ultimate ideal. The Western assumption that all societies seek to be democratic is dangerous, as cultural factors are essential in the explanation of nondemocratic rule and the origin of authoritarian governments. Henry ‘that government is best which governs least’”, It heavily criticizes the American institution of government at the time and is also defined as a text to live by. Thoreau encourages civil disobedience because it is the ability to have a sense of rightness and moral conscience. Dubai to host the national achievers congress 2016 in november In a first for the Middle East region, a conference aiming to " educate, equip, and empower" attendees to achieve their professional and personalgoals, comes to Dubai this year. In its 23 rd edition, the global event brings together a line-up of international speakers and influencers to address participants in the region to inspire them in their entrepreneurial Analysis of finding hope and reality in obamas speech at selma by gwen ifil Nia-Malika views that part of the speech as a way by which the president is making a call that people need to be cowards but focus on the past and not just the events of Ferguson to justify the existence of racial discrimination. The president acknowledged the fact that the voting rights Act was one of the greatest The government should not enforce cellphone restrictions on drivers essay sample After the passage of the first law banning cellphone use on the road in New York in 2001, there has been intense debate concerning the level of danger and correct nature. The people no longer need a new law or legislation relating to the use of cellphone while driving. Gladstone’s liberalism This was initially one of his most liberal measures as it gave a lot of the protection to the tenant, the individual, but it was diluted so its effectiveness was reduced. The most important part of this at was the compensation if the rent was deemed excessive; Lord Salisbury objected to this clause as he said that no A social analysis of child support policy in the u.s History and provisions of Child Support policy in US The concern for child support policy in the United States can be traced back to the 19th century. Social value of child Support policy in the community Child support policy in the United States has been marked with numerous controversies among members of the political, social, and economic fronts Politics and the media: a crisis of trust The overall topic of the article 'Politics and the Media: A Crisis of Trust? ' is the crisis of trust that was created by misleading information, which came from both the media and Downing Street reports. The purpose of this operation was to provide the world's news media with the latest information on the conflict and the staff Google form who really acknowledged the world could Those words, featured in the organization's basicpublic offering in 2004, underscored how in a surprising way Google should bethought of contrasted and the typical association. Opening an office within Chinawould expect it to take after local laws as for the spread of information onthe Web, yet Google trusted it could advance access to data in China just bybeing Disadvantages of missing school essay Many of the poor blacks have to look to the government for a why to live causing them to be slaved to the government because with out the government there is know way for there survival in life. Missing school cause you to lack in education the more you know the better off you will be in life. A sociological explanation of irish people essay In the past over twenty years, the situation of the Church has changed considerably, both in terms of the influence of the political class and the hierarchy of political leaders. In the present day, secularization has found its way in the society of the Irish people due to strong political influences and the general contemporary trends of the Example of essay on a girl named antigone: her past and present In the Ancient Greek tragedy, Antigone is a girl who witnesses within the historical context of a political civil war in the city of Thebes the death of both her brothers. Because it is simply the tragedy of Sophocles, ' Antigone', the play that Judy decides to study as part of her studies in college. Contemporary quebec nationalism The Quite Revolution in the 1960s is viewed as the turning point of the Quebec's after the victory of the liberal party in the provincial elections. The evolving parameters of Quebec nationalism. If for example, german jews could not have The Holocaust is the genocide of the Jews led by anti-Semetic German Nazi leader Adolf Hitler which resulted in the killing of six million innocent European Jews. I think that if this event was changed, people would also not know nearly as many of the dangers of running a dictatorship government. On the world! most of people know its But, I believe that the Loch Ness monster or Nessie does not exist because there is not evidence confirm that Loch Ness may exist. So, if there is Loch ness monster in the Scottish lake, we can know easily. Protecting borders on a national level The costs of increased security at our borders are only one of the costs. Most countries are in the throes of a deep recession. Eli whitney and interchangable parts History - Presentation for 10/25/11 on " Eli Whitney and interchangeable parts" In the late 1700s, in addition to inventing the cotton gin, Eli Whitney also came up with the idea for interchangeable parts. He applied the idea of interchangeable parts to the production of firearms and created a machine that could make exact copies of individual components The plaintiff wendling essay sample The Plaintiff Wendling was originally awarded damages for the breach of an oral contract for the purchase and sale of cattle to the Defendants Puls and Watson by the Harvey District Court; which the Defendants turned around and later appealed. Disposition The judgment was affirmed due to the fact that Defendants, Watson and Puls both agreed that there Party of liberals But we strongly support the arguments of a section of society that pregnancy can be terminated if a woman desires even in the absence of any health hazard. We are strongly of the view that abortion can be resorted to only in extreme cases when the life the pregnant woman is in jeopardy due to any health hazards. Good reply to 2nd classmate research paper example Offering support to the view of better infrastructure facilities as a primary advantage of Moscow being a major financial center, I agree with the view of my classmate as the city is witnessing high rise skyscrapers to attract foreign companies in Russia. Hence, extensive government interference in the private sector and low transparency of legal system are surely Emergency management essays examples Nevertheless, the paper discussion is bias with regard to oversight of the federal laboratories. Governance and Biosecurity: Strengthening Security and Oversight of the Nation's Biological Agent Laboratories. Farming subsidies or industrial complex essay Taking away liberty and making the existence impossible will be of no use and his remedy would become more of a problem rather than the original disease; The latent causes of faction are sown in the nature of man. The reason put forward is that a system of representation is more capable of protecting the rights of individuals Nt government fin However, the territory suits a shoulder below the rest in terms of authority and the structure of the government. One of the unique characteristics of the responsibility that the territorial government has in conserving and developing cultural diversity springs from the history of the people of the Northern Territory. Analyzing situation in syria Moreover, the article highlights the diplomacy role of the Obama administration in addressing the situation. Moreover, the article addresses the reluctance of the Obama administration to engaging directly in the political situation, in the country. The government is obliged to consider the interest of the public Although Domat means God by the sovereign in the first place, yet he extends the definition of the sovereign to the government arguing that since an individual has been given the power to rule over people by God Himself so that individual becomes a god and thus becomes sovereign also. He asserts that since God is the natural Border patrol business impact analysis The Border Patrol is an agency responsible for monitoring the US land border in the north and in the south. Conclusion The task of maintaining effective border surveillance in the U.S.is going to be a very expensive undertaking. The merits of technology essay Technologies such as the radio, the computer and the automobile have created many economic booms of the past. As technology improves, more of the physical problems of humanity cease to be an issue. American exceptionalism Throughout the history of America, many historians have referred to America's role in the world as being exceptional. The founding fathers of America strived to make freedom the backbone of the country. Since its inception the print media has never served It is important from the outset to mention that it not entirely true to say that the print media has never served the interests of the common people. There are also a number of theories around the issue of the print media serving the interests of the common people. Is coalition government here to stay? This means no one party usually can gain more than 30% of the seats in the parliament or national assembly, so it is necessary for several parties to come together to form a viable government, generally under the premiership of the leader of the largest party involved. Possible examples of this might include the role of religious parties The ohio gang Harry Daugherty never seemed to be out of the action in all of the scandals that ' The Ohio Gang' was a part of. It was the case that eventually leads to the demise of the head of ' The Ohio Gang'. The different types of new governments From the complete control of Totalitarian style to the reigns of royal monarchies, to the all powerful tyranny of a Dictatorship to the complete absence of order and organization found in Anarchy. In order to meet the needs of a modern diverse world is to apply a new style of government all together; it would be more a Criminal two types of trials: jury trial and If the person is not prosecuted then the evidence and anything that was found associating to that evidence will be thrown out, but if they continue with the proceedings, then the suspect will be given the right to acquire lawyers to support the defendant's case in the arraignment hearing. Also during this hearing, a defendant enters a guilty, Agrarian reform issues The formulation of social policies is based on the needs of the status quo, it is deeply associated by the present condition of the society. Unequal distribution of land is the root cause of the landlessness of the farmers, this could be traced in the Spanish colonization wherein the encomienda system were put into practice wherein the landowners Free essay about worldview analysis paper: process philosophy Whitehead and Hartshorne suggest that the habit of dynamic in the society is due to ongoing interaction with processes. Martin views the contribution of political philosophy as one that ensures equality and democracy. Sir thomas more’s utopia: a text of universality It is the novels use of Utopic/Dystopic conventions, intermingling of fact and fiction and comparison, which heightens the believability of Utopia, in that it arises on the emphasis of his concerns on the concept of the rich vs.poor, and religious tolerance. Thomas More's Utopian society was characterized to be the ideal world, a place of uniformity where " Important factor is us government energy 2 Economic Economic factors include economic growth in the alternative energy industries and increase in the cost of using the cars mainly due to the rise in fuel prices in the short period. Moreover, undoubtedly the current society Judges people based on the type of the car they own and the idea of having electric vehicles improves the Public administration in america In their pursuit of power, bureaucratic agencies seek assistance from interest groups. In order to maintain a power base within the government, administrative agencies must be able to maintain fundamental sources of bureaucratic power.
Home » Security » Smart Computing How Pranksters Play Your IP is divided up into four different fields, and the values in each of these fields indicate which subnet you belong to and where on this globe you are located. Pranksters can play with this information in a variety of ways. One of the simplest and most insidious methods is to just scan a range of addresses and see if anybody is out there. For example, your current IP might be: And the prankster might have a program which scans the entire block 123.123.123.*, in other words all addresses between and The prankster would send a signal to all IPs in this range and see if any respond. It might be a simple 'PING' - a sort of echo - which your computer will most likely recognize and send back. If your computer does respond to a scan, then the prankster knows someone is there and alive at that IP address and can probe further. What is the prankster up to? No good, that's for sure. Why bother with such shenanigans? Good question. Why tag the IRT for that matter? And no one ever put an age limit on online computing. Your prankster might or might not be over the age of twelve. Your prankster most likely has a warped mind already. The prankster might be trying to exploit your file and printer sharing. Microsoft boxes often have this NetBIOS service turned on. If your prankster can access your file and printer sharing, then your complete hard drive is open to access and possible destruction. The prankster might also be looking for trojans on your machine. Next: Trojans Copyright © Radsoft. All rights reserved.
When we talk about workplace safety we commonly refer to part of the Risk Management process as being to identify hazards and assess risks. To enable us to do this, it’s important to clearly understand the difference between a hazard and a risk. Confusion between these two terms is quite common and the effective application of risk management strategies in workplaces can be compromised as a result. Very simple definitions and explanations that we can use to unpack these two terms. Hazard – A situation or thing that has the potential to harm. A hazard is something that is tangible. Essentially, we can think about a hazard as being the ‘source’ or ’cause’ of potential harm. When we’re identifying hazards, we don’t always restrict our thoughts to people; we may extend hazard identification to include hazards that could potentially harm animals, equipment, buildings, or the environment etc. Risk – The possibility that harm (death, injury, or illness) might occur when exposed to a hazard. Risk is identified as being the possible harm that ‘results’ from exposure to a hazard. When we assess risks, we need to determine what sort of harm could happen, how likely it is this harm occurs, what the severity of the harm could be, and how frequently someone is exposed to the hazard. When determining the level of risk associated with our workplace, the following steps need to occur: 1. What is the hazard? 2. What are the risks associated with that hazard? 3. Access the risk (likelihood x consequences x frequency) Here are some examples of potential hazards and risks in Self Storage facilities. • Hazard = moving vehicles • Risk = run over or hit by moving vehicle resulting in death or serious injuries • Hazard = cleaning chemicals • Risk = chemical poisoning, allergic reactions, chemical reaction causing chemical burns, or eye injuries • Hazard = violence • Risk = psychological illness or physical injury • Hazard = electricity • Risk = electrocution or electric shock As you can see from these examples, there can be more than one risk resulting from a single hazard. It’s an interesting exercise in a workplace to give the above information to your workers, and see if they can identify more risks that are associated with each of these hazards listed in our example. This is a simple yet effective exercise that can help people actively think about the hazards and risks in your workplace. To learn more about the hazards and risks in Self Storage facilities, contact the WHS experts at Safety Makers.
• 24 hours a day, from Monday to Sunday. The Best Industrial Solution Provider Certified Company ISO 9001-2020 Request a quote The flatness of wafers used to manufacture integrated circuits needs to be controlled within strict tolerances to help ensure that the entire wafer is flat enough for photolithography processing. Wafer flatness is characterized by measuring bow, warp, and total thickness variation (TTV). A low value indicates better wafer flatness. Alfa Chemistry can provide customers with accurate wafer flatness testing services to verify process tolerances and eliminate expensive waste wafers. Our non-contact capacitive sensing is a highly accurate and cost-effective method for measuring TTV/WARP/BOW of wafers. Detectable Samples Include: • Wafer specification diameter: 150mm, 200mm, 300mm. • Surface: cutting, grinding, etching, polishing, patterned. • Flat/notch: All SEMI standard flat or notch. • Conductivity: P or N type. • Material: Materials with a volume resistivity less than 20 K Ohm/cm, including Si, GaAs, Ge, SiC, InP. Non-contact Measurement Method Total Thickness Variation (TTV) TTV is the difference between the maximum and minimum thickness encountered during a scan pattern or series of point measurements. Place a wafer of a known thickness (Tw) between the probes for calibration, and obtain an upper probe-to-wafer gap (A) and a lower probe-to-wafer gap (B). The total gap between the upper and lower probes: Gtotal = A + B + Tw. When the sample wafer is placed between the probes during measurement, new values of A and B will be obtained, and Tw = Gtotal -(A + B). During the automatic scanning of the wafer, a series of points are measured and stored. After the scan is completed, TTV = Tmax - Tmin. Bow is the deviation of the center point of the center surface of a free, unclamped wafer from the center surface reference plane. When measuring and calculating the curvature, the position of the wafer must be known to the center surface. The bow value is calculated by measuring the position of the middle surface of the wafer center and determining the distance from the three-point reference plane. A positive bow indicates that the center point of the middle surface is above the three-point reference plane. Negative means that the center point of the intermediate surface is below the three-point reference plane. Warp is the difference between the maximum and minimum distances of the median surface of a free, unclamped wafer from a reference place. Warp uses the entire middle surface of the wafer, which can provide a more useful measurement of true wafer shape. There are two options for the reference plane: one is the same three-point plane around the edge of the wafer. The other is to perform least squares fitting calculation on the median surface data obtained during the measurement scan. Then the warp age is calculated by the maximum deviation (RPD max) and the minimum difference (RPD min) from the reference plane. Testing Standard • ASTM F657-92 Standard Test Method for Measuring Warp and Total Thickness Variation on Silicon Wafers by Noncontact Scanning • ASTM F533-2002 Standard Test Method for Thickness and Thickness Change of Silicon Wafer • ASTM F534-2002 Standard Test Method for Flexure of Silicon Wafer • GB/T 6620-1995 Non-contact Testing Method for Silicon Wafer Warpage Not finding what you're looking for? Ask Your Question Verification code
What does it imply when someone states their data is on the cloud? We have all heard of the cloud, but what exactly is it? In this article, we will learn about different types of Cloud Computing and how they differ. So, let us get started. What is Cloud computing? Cloud computing refers to various applications and several types of data storage. The cloud keeps the storage on the internet, has a deep connection with the clients, and helps organizations develop and grow their business. Therefore, there is great demand for professionals with cloud computing certification. There are several types of clouds that individuals and companies utilize, depending on whether they are for storage or computation. Examples of these clouds include public, private, and hybrid clouds. We will go through all of these kinds of cloud computing. Kinds of cloud computing There are four kinds of cloud computing: 1. Private cloud It is the single-oriented cloud with only one user, i.e., the only customer with totally isolated access to the IT Structure. Organizations nowadays launched a private cloud to work in a very private and constrained environment. The IT Structure of the private cloud helps the understaffed to provide a better IT structure. The private information is kept with the organization, and this cloud provides a special work target for system monitoring and maintenance. 1. Public cloud computing These are designed with the help of third parties that provide cloud services to the masses on the internet, and these are available to every department and at a large level. They provide answers and results for reducing IT infrastructure expense, thereby becoming the best choice for handling top work pressure on the top framework. Public clouds are the best option for small and mid-sized firms and organizations to help them develop the IT infrastructure to grow at peak, and massive storage helps them work efficiently. 1. Hybrid Cloud computing This is a heterogeneous distributed system developed by mixing public and private cloud services. Therefore, they are also known as heterogeneous cloud computing. The major risk of this cloud is very high demands and a severe workload; however, where the load is overloaded there, only hybrids are used. 1. Community cloud This is a distributed system established by combining the services of many clouds to meet the special demands of an industry, community, or business sector. Companies with similar interests or responsibilities can share the infrastructure in the community cloud, and an organization or a third party can administer the cloud. Cloud computing has changed the way businesses do business in ways that many people are unaware of. Understanding the differences between various kinds of cloud computing and determining which is the best match for a developing organization is vital. If you want to know more about the cloud in detail, Great learning offers several cloud courses. Do check out cloud computing courses eligibility before enrolling in any program. Like it? Share with your friends! Your email address will not be published.
Martín Perfecto de Cos (1800–1854) Martiín Perfecto de Cos was a key individual in Santa Anna’s leadership. Born in Veracruz in 1800, he is usually described as being a career military soldier and accounts have him entering the military at around the age of twenty. Little about his personal life is usually written in American or Texas history books. Cos has been called the brother in law of Santa Anna, married to Lucinda López de Santa Anna, usually noted to be a sibling of Antonio López de Santa Anna, but this is not easily verified with online American genealogy records. Mary Austin Holley, a niece of Stephen F. Austin, is said to have referred to Cos as a brother in law of Santa Anna in her 1830s book about Texas. Other accounts present Cos as having been a single man during the years of the Texas Revolution, but suggest that he could have either been a cousin or a nephew of Santa Anna, or that he could have later married Santa Ana’s sister after the Texas Revolution, perhaps around 1840. Cos appears to have risen through the ranks after beginning his career as a military cadet. By the time the unrest in Texas on the part of the Texas “rebels” had come to armed conflict, he was a general. He was sent to Texas to Béxar (San Antonio) to try to deal with the matter there and to also investigate the reported tax evasion at Anahuac to the east. He and his troops occupied Béxar in the fall of 1835 and were soon surrounded by rebel Texas forces in what is called the Siege of Béxar. After two months, Cos surrendered and was permitted to return to Mexico under terms that included a pledge that neither he nor his officers would oppose the reestablishment of the Mexican federalist constitution of 1824. It can be argued that Cos did not violate that agreement when he took arms again against Texas forces, since the rebels were not expressly trying to reinstate the 1824 Mexican constitution, but Cos participated in numerous battles with Texas forces after his release. Cos was serving under Santa Anna during the Battle of the Alamo and is believed to have commanded Mexican troops during that conflict. Shortly afterward, General Cos is mentioned as March, 1836 approached with his being ordered to go with his troops to the fort at Velasco, also known as Velazco, on the Gulf Coast and now part of Freeport. He was to supply the fort with an 8 inch artillery piece and other munitions. Along the way, he appears to have been redirected to join Santa Anna as Mexican troops attempted to engage Sam Houston and his Texas forces. The next major engagement was the Battle of San Jacinto where Cos is said to have arrived with five hundred troops after Texas forces burned Vince’s Bridge and just before the San Jacinto engagement. Cos was taken prisoner, probably the day after the battle, as was Santa Anna. Cos was ultimately released to return to Mexico. Prisoners who were enlisted men may have generally been confined in the Galveston area where they performed some manual labor whereas officers were relocated to the Liberty area. Regardless, all had been released to return to Mexico within about a year of the Battle of San Jacinto. Cos is later mentioned as having been a Mexican officer during the Mexican-American war during the mid 1840s and is noted as having died in 1854 in Veracruz, Mexico where he was born. © 2022, all rights reserved. Leave a Reply You are commenting using your account. Log Out /  Change ) Twitter picture Facebook photo Connecting to %s
Menu Close Understanding the Crusades from an Islamic perspective Twentieth-century depiction of a victorious Saladin with Guy de Lusignan after battle of Hattin in 1187. Said Tahsine (1904-1985 Syria) - What if the Crusades’ history was told from an Arab perspective? In fact, in 2016 al-Jazeera TV did just that. It released a four-episode documentary on the Crusades, and the trailer introduced the subject in the following words: “In the history of conflict between East and West. The mightiest battle between Christianity and Islam; a holy war in the name of religion. For the first time, the story of the Crusades from an Arab perspective.” It is clear that the producers of the al-Jazeera documentary wanted their viewers to understand the Crusades as one out of many episodes in the continuous clash between two civilizations: East/Islam and West/Christianity. The trailer of Al-Jazeera documentary series. The al-Jazeera documentary was inspired by two earlier widely watched documentaries: The Crusades: Crescent and the Cross (History Channel, 2005) and The Crusades (BBC, 2012). All three documentaries share the same plot about the clash of civilizations fuelled by the religious ideologies of holy war and jihad. The only difference is that the al-Jazeera documentary alleges to tell the story of the Crusades “for the first time” from an Arab perspective, which actually means that it is the turn of the Muslim Arabs to tell, not a different story, but rather the same story of the clash of civilisations. Crusaders as Christian barbarians Actually, this is not the first time Muslims have told their story of the Crusades, and the story has changed over time. In the Muslim public imagination of today, the crusaders are remembered as medieval Christian barbarians who assaulted the Muslim world and slaughtered tens of thousands of innocent people before the Muslims could mount an effective jihad campaign to drive them away. They are also seen as medieval ancestors of modern Western colonialists and imperialists. What is left out of the modern narrative – conceptualized as such by Europeans in the 18th and 19th centuries, such as, for example, in Joseph-François Michaud’s Histoire des Croisades (the first volume was published in 1812) – is that the crusaders were not as fanatic as modern scholars allege, and they had good relations with the Muslims. Idealized portrait of Ibn Yubair. Painted by Guillermo Muñoz Vera. Aroconchichon/Wikimedia, CC BY-NC For example, while travelling through northern Palestine in late summer of 1184, the medieval scholar Ibn Jubayr (d. 1217) described countless farming villages inhabited by Muslims who seemed to him to live in complete harmony with the Crusaders. What irritated him the most was not only that the Crusaders were not harming them, he actually bemoaned the fact that those Muslims did not seem to be bothered by their mingling with what he described as “Christian pigs and filth”. An ignored reality of alliances Indeed, medieval Muslim sources tell a different story about the Crusades. No doubt they speak of countless battles, but they also describe innumerable political and military alliances, systematic sharing of sacred spaces, commercial dealings, exchange of science and ideas, etc., between Muslims and crusaders. Muslim chronicler and historian Ibn Wasil (d. 1298) spent two years in southern Italy on a diplomatic mission in early 1260s, during which he authored a book on logic, which he dedicated to emperor Manfred of Hohenstaufen. Manfred’s father, emperor Frederick II, used to regularly write to Muslim scientists asking for scientific information, and when he led the Sixth Crusade in 1228-1229, he negotiate a peace with Sultan al-Kamil that allowed the Muslims and Crusaders to share Jerusalem. The Christians had full control of their religious places while the Muslims maintained control over their sacred places in the city and the surrounding villages. Frederick II, Holy Roman Emperor (left) meets al-Kamil Muhammad al-Malik (right), from a manuscript of the Nuova Cronica, between circa 1341 and circa 1348. Vatican Library/Wikimedia This complex reality is generally ignored, and if modern scholars acknowledge some of it, they do so only to emphasize its abnormality. The focus on violence has dominated modern interest in the Crusades (the area most researched by scholars is crusader military orders and Holy war/Jihad). In other words, modern scholars (and the media), inadvertently for the most part, have put at the disposal of modern hate groups and terrorists a very suitable narrative that these groups have effectively employed to anchor and spread the discourse about an inevitable clash of civilizations. The result is Islamophobia and anti-immigrant sentiments in the West, as well as “Westophobia” (hate of the West) and paranoia in the Muslim world. Inspiring modern jihadists Conceiving themselves adherents and protectors of “true” Islam, modern jihadists are inspired by a selective reading of Islamic foundational texts (Qurʾan, Sunna, etc.) and history, and by modern grievances (relating to direct or indirect colonial and hegemonic subjugation of the Muslims). For them, the crusader period was not different from the current clash between the Muslim world and the Christian West. This theme has been generally adopted by Muslim scholars in the last century. We can see it clearly in Saʿid ʿAshur’s influential book on the history of the Crusades, published in 1963, and in Ahmad Halwani’s 1991 popular book that examines the role of Ibn ʿAsakir of Damascus (d. 1176) in the promotion of jihad against the Crusaders. Both scholars draw the parallel struggle of the Muslims during the Crusader period and today. Leaders such as Nur al-Din and Saladin, and scholars such as Ibn ʿAsakir and Ibn Taymiyya are revered because they battled and rallied the Muslims to wage jihad against the crusaders and their Muslim cronies. It is no surprise then that stories of such heroes and writings of activist scholars of the crusader period are very popular in the Muslim world today, especially among militants, as can be seen in the issues of Dabiq, the online magazine of Daesh. Equestrian statue of Saladin in the Citadel, Damascus, Syria, 2008. Graham van der Wielen/Wikimedia, CC BY-SA Rethinking our approach as historians Had we done our job as historians properly, we would not have counted out as anomalies the enormous evidence that speaks of co-existence between crusaders and Muslims. (Had the media done its job properly, it would not have valorised violence.) The narrative of the Crusades should have been presented as a complicated chapter in medieval history where people fought each other and also tolerated each other. But because scholars tend to examine the past with modern eyes (theories, assumptions, conventions, biases, etc.), they could not see this complex reality of the crusader period. The Crusades is not the only chapter misrepresented in modern scholarship and imagination. The way we think of Islam is too governed by modern agendas, so much so that every narrative we offer is a mirror of our modern concerns. Ridley Scott’s Kingdom of Heaven (2015) questions the Crusades and western perspectives. We often fail to realize that what is invariable presented as “Islam” is the collective opinion of an affluent class of male elites (mostly Sunnis) whose views did not agree with the way other groups saw and practiced Islam (Shiʿis, Sufis, women, uneducated masses, etc.). Deciphering complex layers We also tend to valorise certain groups, thinking that they are best suited to fit a modern garb. For instance, many today praise Sufism (mysticism) for its idea of spiritual jihad that focuses on internal struggle to become a better person. This is not what medieval Sufis, and Muslims generally, understood jihad to mean, namely the act of waging war against Islam’s enemies; some, especially the Sufis, insisted it includes a religious dimension in order for physical jihad to lead to success in this world and the next. Saladin had in his army a brigade of Sufis who demanded that crusader captivates be turned over to them to slaughter. The Ottoman army employed Sufis, who still today practice their rituals with weapons. The point here is not to say that Sufism is violent, it is to draw attention to the fact that Sufism has also a very complex history and legacy. Saying this does not imply that Muslims cared much about jihad. Actually, the majority of Muslims historically have refused to contribute to jihad, even when under attack. This is rather clear from the tone of many jihad advocates who blame the Muslims harshly for not fulfilling the duty, such as in the Book of Jihad by al-Sulami (d. 1105). As historians, we might not be able to free ourselves completely from modern biases. At least we can try to listen more to what history tells us: it is always much more complex than any contemporary conclusions we derive from it. This article has first appeared in the French Network of Institutes for Advanced Study (RFIEA)‘s publication Fellows n°41 as “Islamic interpretation of past Holy wars”. RFIEA has hosted more than 500 researchers from around the world since 2007. This article was published with the collaboration of Aurélie Louchart. Want to write? Register now
Friday, May 27, 2022 PCs damage pockets, environment PC and software companies are expressing concern for the environment and natural surroundings like never before. Leading PC maker Fujitsu Siemens has come up with an interesting observation. The PC maker pointed out that a whopping 123 million pounds is wasted every year throughout UK simply because the PCs are not properly shut down. This is a gross human error and simply being too lazy. A lot of hard earned money and energy is getting wasted. All this due to sheer negligence on the part of the individuals. Leaving the computers on for the entire night can prove to be extremely hazardous. The surrounding environment gets affected to a great extent. The financial losses are also staggering. A survey was carried out wherein a majority of people confessed that they never shut down the PCs. Experts feel that shutting down the PCs after work should become a policy and a priority for all the companies. As the world in general grapples with energy deficit, UK too laid a broad framework for energy conservation. The beginning of the “Energy Saving Week” saw a nationwide campaign aimed at educating the people regarding the hazards and its effects on the environment, if the computers and other electrical appliances are not shut down properly. These hazards have a great impact on the climate too. The energy prices have shot up in the recent past and the wastage of precious energy by not switching off the computers has come in for severe criticism. The magnitude of the problem can be ascertained from the fact that the European Union had to pass a legislation to curb the wastage of energy. This has certainly become a raging topic in Europe. The computers emit thousands of tons of carbon dioxide which is detrimental to human health. A lot of other electrical appliances such as chargers, digital boxes too emit carbon dioxide. Too much emission of carbon dioxide in the atmosphere causes climatic changes. It also results in global warming. Excess emissions can also lead to skin diseases and respiratory problems. The “Independent “has made an interesting observation. When left on standby, the homes PCs emit carbon dioxide to the tune of 220,000 tons. This coupled with the emission from other devices results in the generation of millions of tons of carbon dioxide. People living in London are already facing this hazard by getting black patches on their nose. A lot of energy and power that can be put to productive use is getting wasted. A good 75 percent of the energy consumed by the PCs could be saved, simply by switching off the computer after work. Recent Articles Related Stories
Destigmatising disability Destigmatising disability Many people shy away from the topic of disability because it makes them uncomfortable. For people living with a disability, this is an added barrier to their potential for enjoy fulfilling lives. They may have learned to thrive and live alongside their disability, but then come up against constant stigma and stereotypes that hold them back. The bottom line, however, is that people with disabilities want the same respect, rights, and opportunities as everyone else. The stigma surrounding disability often comes from a lack of understanding and familiarity with the subject. It is the fear of the unknown. People with a disability are largely underrepresented in media and society, and that lack of visibility plays a major role in reinforcing stigmas. According to the Australian Institute of Health and Welfare, however, around 1 in 6 (18%) people living in Australia has a disability. That is about 4.4 million people, which is a sizeable chunk of the population. In this article, we’d like to shine a light on disability and make it a conversation starter instead of an avoided subject. In this article, you will learn: What is a disability? What types of disabilities are there? What is a stigma? What types of stigmas do people with disabilities face? 5 ways to interact with people with disabilities. What is a disability? A disability, by definition, is ‘any condition of the body or mind (impairment) that makes it more difficult for the person with the condition to do certain activities (activity limitation) and interact with the world around them (participation restrictions)’. So, basically, some sort of impairment that presents a challenge to daily living and social interaction. What types of disabilities are there? There are many types of disabilities and many ways of grouping them. The National Disability Service (NDS) groups them as follows: Intellectual disabilities These include cognitive disabilities, learning disabilities and Autism: • Cognitive disabilities involve impaired mental function manifested before 18 years old. Examples are Down Syndrome, Fragile X syndrome and Fetal Alcohol syndrome. • Learning disorders are thought to be a central nervous system dysfunction and include conditions like ADD (attention deficit disorder), ADHD (attention deficit hyperactivity disorder), and dyslexia. • Autism is a developmental disorder that affects cognition, communication and behaviour and includes Asperger’s syndrome and Pervasive Developmental Delay. Physical disabilities These are any disabilities that affect the physical function of the body and include muscular dystrophy, motor neurone disease, paraplegia, quadriplegia, neuromuscular disorders, spina bifida, arthritis, back disorders, cerebral palsy, absence or deformities of limbs, ataxia, bone formation or degeneration, and scoliosis. Acquired brain injury These are disabilities caused by brain damage occurring after birth. Neurological disabilities These are nervous system impairments, such as epilepsy, Alzheimer’s, multiple sclerosis, and Parkinson’s. Deafblind (dual sensory) or visual, hearing or speech impairments Psychiatric disabilities These include schizophrenia, personality disorders, affective disorders, anxiety disorders, addictive behaviours, stress, psychosis, depression, and adjustment disorders. Developmental delay These are conditions in children aged 0-5 that have not yet been specifically diagnosed. What is a stigma? Stigma is a word used to describe putting a negative mark on someone in your mind. If someone sees a person with a disability in a negative light because of their disability, that is stigma. If someone then treats a person with a disability in a negative way, that is discrimination. Stigma happens in the mind and is an attitude that can very easily lead to discrimination. In many cultures, disability is seen as a curse, a punishment, and contagious. This is why education is so important in attempting to remove the stigma around it. What types of stigmas do people with disabilities face? Social exclusion – People with a disability are sometimes left out of social occasions or avoided at social occasions because other people don’t know how to speak to them. Stereotyping – People with disabilities are often lumped in one category and considered to be less intellectually capable, even if their disability isn’t intellectual. Discrimination – Laws are in place to avoid this, but there may still be many situations where people with disabilities are overlooked for a job role or opportunity. Condescension – When people without disabilities speak to someone with a disability, they sometimes speak down to them or coddle them. Blaming – When people have disabilities that aren’t clearly visible, they may be accused of overplaying their disability to their advantage. Internalisation – This is when outside stigma turns internal and the person with a disability feels shame about themselves and their disability. Violence – People with disabilities are more likely to be victims of sexual or physical assault as they are often less able to protect themselves. 5 ways to interact with people with disabilities The way to really remove the stigma around disability is to bring it into the light, educate people on what disability is and how to interact with people living with disabilities. This will go a long way to lessen the awkwardness and discomfort many people without disabilities feel around the subject. 1. Person first, disability second – This is a mindset as well as a way of speaking. When speaking, avoid using ‘disabled person’ and instead use ‘person with a disability’. What this does is put the individual first in the equation. They are not their disability; it is just one of many aspects of their identity. 2. Ask before lending a helping hand – People with disabilities, like everyone else, want to have independence and dignity. If you think someone might need help with something, rather than jumping in and coming to their ‘rescue’, ask them if they would like or need help first. Very often, they are perfectly capable on their own. 3. Don’t speak down to a person with a disability – Very often, people speak down to people with disabilities, patronise them, use a baby voice, or overcompensate in some way. This is probably just due to a lack of understanding but can be very offensive and disrespectful. Speak to people with a disability like you would speak to anyone else and if they have a communication disability, ask them how they prefer to communicate. If they have a translator or carer, don’t speak to the carer/translator, speak to them directly. 4. Keep your mitts off their mobility device – People with a physical disability often spend most of their time using their mobility device, whether it is a wheelchair, crutches, a cane, or a scooter. This almost becomes an extension of their person, so don’t lean on their wheelchair or use their crutch to push something. This can often feel confronting and is akin to you leaning directly on them. 5. Don’t throw a pity party they didn’t ask for – Very often, people without disabilities make the mistake of feeling sorry for or pitying people with disabilities. They are seen as, for example, victims confined to their wheelchairs. This is not the case. Many people with disabilities have fully accepted their disability as a part of their identity and are living their best life possible. They don’t see themselves or want to be seen as victims. Final thought As Amy Oulton in her Ted Talk Changing the Way We Talk About Disability notes, when you have a disability, you feel ‘hyper visible but completely invisible as a person’. This is because what other people see first is the disability and then the person. We need to work to change that so that we see the disability as just one part of the unique, talented, contributing, and independent whole of the person. Stereotypes are hard to break, but with open-mindedness and an open heart, we can create more opportunities and possibilities for people with disabilities to grow and live full lives by creating an enabling environment for all. Get genuine high quality disability supports and services to help you thrive Let Advance Disability Services & Respite help you achieve your NDIS goals Advance Disabilities Services and Respite - Western Sydney Disability Services Skip to content
0 Items What is a Cleanroom? what is a cleanroom A clean room in your house? Quite contrary, a cleanroom is much more than that. A cleanroom is a contained space where the air is “scrubbed” or “highly filtered.” Cleanrooms can be found in many industries for various processes that demand critically clean spaces.  They are often found in manufacturing facilities for various types of products that demand critically clean processes. Cleanrooms create a controlled environment by reducing the particle contamination in the air and by the ability to control the temperature, humidity, and pressure of the cleanroom. The Source of Cleanroom Contamination What is contamination and where does it come from? Looking through the sun rays coming through your bedroom window, you can probably see the light reflecting off of all of the dust floating in the room. Where does the dust come from? Believe it or not, dust particles often contain dead human skin cells, pollen, and insect fecal matter. Needless to say, cleanrooms work really hard to remove these contaminants from the air, hence their extensive cleaning processes. Particles are measured in the unit of microns, which is an extremely small unit of measure. To paint a picture of just how small a micron is, the diameter of a single strand of hair is the size of about 80-100 microns. Humans can see particles 50-60 microns and bigger, but any particle smaller than that is invisible to the naked eye. Scrubbing the air is literally to wash it clean, which is done through special air filters, designed specifically for cleanrooms, which can filter particles as small as .3 microns. So, needless to say, these filters could come in handy for those dust particles that you see and don’t see in your bedroom. Cleanrooms are complex spaces, requiring numerous high levels of cleanliness and control. Knowing the basics of what makes a cleanroom a cleanroom is always helpful, but what else is there to know? We can take you further into why each cleanroom is controlled at the level it is through the explanation of ISO cleanroom standards, the classification system that determines the level of contamination control for each cleanroom. Want to learn more? Stay tuned for our cleanroom classification guide, coming soon! More helpful links: Modular Cleanrooms Selecting Cleanroom Garments for your Cleanroom Selecting Cleanroom Garment Material for your Cleanroom Learn more about cleanroom cleaning and maintenance  Cleanroom Questions? If you have any other questions about cleanrooms, visit our education guides on our website here. Still need some help? Our customer support team is here as well at 616-719-4470. Still have questions? Our team of cleanroom experts are here to help. Call us at 877-719-4470 or send us a message. Explore More! We strive to bring you the latest relevant information.
10 tips for creating an effective scientific infographic scientific infographic with a compass ruler and pencils Scientific infographics are great for explaining complex topics without overwhelming your reader. As a visual tool, they’re effective at communicating big picture ideas to a non-specialist audience, or to new members of your lab who might not be familiar with the literature. There are many great ways to make use of infographics in research. Now, you may be thinking: That’s cool and all, but I’m no graphic designer. How would I even make one? scientist confused about making art and infographics No problem at all! To get started, all you need is a message or a story, and a very basic proficiency in your software of choice. Having some extra graphic sense is just a bonus, and we’re here to fill in some of the gaps for you. We’ll unpack what makes a great infographic with a rundown of our 10 tips for creating your very own 👇 Tip 1: Define your infographic’s purpose “Trying to please everyone, pleases no one.” When thinking about the purpose of your graphic, the first thing to do is identifying your target audience. Is it the general public? Is it other scientists in your field? Or is it for a non-specialist, but informed audience? Depending on whom this is will affect your choice of words, images, and level of scientific complexity presented on your infographic. Would you expect your audience to have prior assumed knowledge? Would they be familiar with the images you have in mind? It’s a good idea to have a chat with someone from your target audience and see if your ideas align with theirs. Plan, plan, plan! batman slap meme about target audiences Tip 2: Choose a reliable software If you’re in a romantic relationship with PowerPoint, that’s perfectly fine. I won’t get in the way. PowerPoint is pretty reliable for a start, and you’re likely already very proficient in it. But if you’re looking for some more powerful options to bring your design to life, I highly recommend checking out these free or paid alternatives. We’ve also included some tips on how to make greater use out of PowerPoint! graphic design meme on a billboard But nothing can save you if you’re an avid fan of Microsoft Paint 😏 Tip 3: Choose dimensions that make sense This is a case where size does matter. When you considered your infographic’s purpose, did you also consider where you would use it? Is it going to be posted on social media? Is it a print-out for a lab manual or protocol? Does it form part of a scientific poster? Here’s a rundown of different sizes to match different purposes. dimensions and sizes for images for social media and printing Tip 4: Consider your style of infographic The options are truly endless here, but to make things simpler, I’ll recommend three multipurpose styles. Though as a disclaimer, your infographic does not need to conform exclusively to one of these styles. We encourage mixing and matching ideas! Process infographic Arrows leading from one idea to the next is what makes this style very effective. Your reader will know where to start looking, where to look next, and where to end. A process infographic is particularly great for illustrating anything with steps, like a method or a cycle. Timeline infographic If you’re working with chronological concepts and/or data, a timeline infographic is for you. Lines connecting key events labelled with an indicator of time makes this very intuitive to follow. Fact sheet infographic This is the most versatile style. The main thing you’ll have to consider is most pieces of text should be supported by a visual aid. Easily recognisable icons are great ways to supplement your text, and gives your reader an impression of what they’re about to read. Infographic layout options Tip 5: Make your title a main feature Titles should be BIG and IMPOSING. It’s not just a line of text that drapes over your graphic. It’s a main feature, and we encourage you to take the time to choose a great font for it. Whether you place your title at the top, or have it elsewhere is completely up to you. Just make sure it’s one of the first things your audience should see. But first, let’s figure out how to write a good one. A well-written title can be constructed in different ways. Let’s try out these ideas: Question titles These are thought-provoking statements that poke at your audience’s curiosity. You present them a question, and your infographic provides the answer. It’s a neat all-in-one package! “How does gravity work?” “Why is the mitochondria the powerhouse of the cell?” “What evidence is there for extraterrestrial life?” Short or single word titles These are great if your infographic is explaining a single central concept. A single word or phrase should ideally be in larger font. “Human viruses” “Plastic waste” Catchy titles You have the opportunity to add some humour, an idiom, or a play on words in your title. People love snappy and witty titles. “Fish out of water” - describing the fishing industry. “In the heat of the moment” - describing increasing global temperatures. “It takes two to tango” - describing any process with 2 components. You can also have a subtitle I’m not talking about a reading aid. I’m talking about a short phrase to accompany your main title. Ideally, this is included with a short or single word title, and can be written, for example, in the style of a catchy title. “CRISPR: there’s method to the madness” “Stray populations: it’s raining cats and dogs” “Solar power: better late than never!” Tip 6: Limit your word count All those in favour of banning walls of text say “I” 🙋🏻‍♂️ Scientific infographics are all about balancing the amount of written information with eye-catching visuals. While we won’t set a hard and fast limit on the word count, we highly recommend aiming for less than 200 words if you can for an A1 print. This gives you just enough to incorporate a good title, and pushes you to explain your ideas in the most concise way possible. And most of all, you’re effectively allocating more room for pictures. Of course, fit this according to the purpose of your graphic. I highly recommend writing out the text of your infographic in a separate document before you get to the design part. If you have a plan written up, you’ll be less tempted to deviate from it. word limit meme crying lady Tip 7: Work with a consistent colour scheme With great colours, comes great responsibility. When we’re designing anything, we can often get carried away with colour choices. Pop some red on that graph, some blue for the text, some green on the background… bad colour scheme meme red blue green Perhaps not. We’ve created an extensive guide on how to create a colour scheme for scientific posters, and thankfully all of the principles are all the same for all types of graphics. We’re not burning any retinas today! 👀 Tip 8: Use symbols and icons Symbols and icons are fantastic if you’re looking for a simple graphic to supplement your text. You can either make them yourself, or access the ready-made ones in the Icons and SmartArt tools in PowerPoint for example. Certain software packages will also have their own library of icons you can access. If you’re looking for very specific icons, try out an icon depository website. These sites are either free (like FlatIcon), offer a free trial (like Shutterstock), or paid (like NounProject - we love this one!) You can customise these icons with the colour scheme you’ve decided on before, and then watch them blend seamlessly into your scientific infographic. Here are a few ideas for using icons. using icons in infographics examples Extra tip: Use them sparingly! It can be tempting to clutter an infographic with icons too! Tip 9: Wrap text around your images Making an infographic with text can be like playing a game of Tetris, or completing a jigsaw puzzle. Once you’ve placed your images, you’ll have some space remaining to fill in the text. Or perhaps you’ve done it the other way around? You can place text in a way that it fits snug into the natural shape of your images. You can play with the left, centre, and right justify settings in your software to make them fit, or even better, if you work in Adobe Illustrator, you can place text inside any shape and see it magically fit! wrapping text in an infographic before and after Tip 10: Experiment with data visualisation! Is there a more interesting or intuitive way to display data, without making it misleading? Or have you got too much data, but want to condense it down to 1 or 2 charts? Is there a way to creatively merge charts together? Check out these great examples from the Visual Capitalist to get you inspired about data visualisation: A Decade of Elon Musk Aesthetic of a pie chart + timeline + histogram. The Best and Worst Pension Plans by Country Scatterplot, where each country is represented by flags instead of dots. Lithium Production by Country Area plot with a timeline. Global Attitudes Towards COVID-19 Vaccines Annotated donut chart + factsheet. data visualisation in scientific infographics Looking to get your infographic professionally made? Making an infographic is a time commitment. There’s only so many hours in the day for pursuing the next groundbreaking scientific discovery after all. And that’s why Animate Your Science is here to take that burden off your shoulders! Have you got an itching idea for a scientific infographic for your research and want to bring it to life? Contact us today about turning that idea into a graphic that’ll turn heads in the hallway. ️ Until next time! Dr Juan Miguel Balbin Dr Tullio Rossi Alvin Yanga subscribe button animate your science Poster course banner_Vertical.png
Cybersecurity: A Necessary Right Ensuring security in a cyber environment — a virtual frontier that was conceived without physical barriers and defied the rules of nature — has become a key topic around the globe. As cyber consciousness continues to rise, so do the risks that have emerged of a highly connected cyber world and the need for cyber-safety. What can enterprises do to be safe? Our digital data has become a highly valuable resource, and we are aware of data breaches from tech giants. In that sense, we can feel that if big tech companies can be breached, then there is no hope for the average enterprise. But this kind of attack can be prevented by investing in cybersecurity not only by entrusting this new basic need to companies that are specialized in providing the infrastructure, human talent, and resources needed for all the data is under constant monitoring and secure, but also by focusing on developing their own capacity to be cyber aware. We can all have a safer cyber experience when these factors are involved: • Members of an enterprise are conscious about what is exactly being done with the data and the level of criticality of the data they are entrusted with. • Members of the enterprise are cyber aware and cautious of basic cyber threats. • The staff knows how to notify a cyber breach and the protocols around what to do and how to act. • A company holds cybersecurity capacities whether they are in-house or outsourced. A company should always consider their human talent as a priority. In this sense, companies should invest in basic cyber security training with a wide scope that can teach the average person to be safe and the high-tech IT guru how to monitor and prevent cyber incidents. This will allows them to determine how well the company can perform, how to react and act when a cybersecurity breach occurs, and most importantly what to do to prevent them. Cybersecurity as a Necessary Right According to a 2020 Cybersecurity Report,  a third of Latin American countries have no legal regulations for cybercrime, which means that there’s a lot of legislative work to be done. Governments are trying to address the issues and solve them by making better choices, educating people capable of dealing with them, and also being able to regulate everything so most of the cybercrimes actually get punished by the law. In order to make this happen, we need to be aware of how these criminals act and how to best respond. We need to communicate with the people in our cities and in our companies and make them understand how they can use the internet in a way that will not compromise their experience or safety. This way, we can prevent them from falling into attacks that involve phishing, ransomware, and malware. Most of the time we can actually prevent these attacks by simply knowing how they work and what they seek from us. Everyone should know exactly what they are giving to all the services and platforms they hire through the internet. Our information is valuable and that is also the reason why most companies are currently getting better at cybersecurity. They need to guarantee the privacy and be clear about what they are doing with their customer’s data. Cybersecurity: A process that involves everyone If we want to ensure a cyber-secure environment for everyone, we must involve everyone in cyber-security. This means making strategic alliances that can provide us with results that we’ve never seen before by making sure that government, private, and citizens work together towards this process that definitely will help to provide safer services. Even though we are making progress, there’s a lot of work that needs to get done. Fortunately in INFOTEC, we are making sure this won’t take long to be fully developed. Prevent Cybersecurity Breaches with INFOTEC Even though technology evolves and it has become safer every year, new and better ways to commit a cybercrime emerge from people who are actively looking for innovative methods to steal all kinds of data within any small, medium, or big company, public, and private. As a way to help companies increase their information security in INFOTEC we offer the following: • Business Impact Analysis (BIA) • Risk Analysis • Impact Analysis • Disaster Recovery Plan (DRB) • Secure Delete Processes • Antivirus • Cyber Training • Administered IT Services INFOTEC, as an institution that promotes the digital transformation of Mexico, cannot ignore the technological trends that emerge and change every day. Its main activities are aimed at generating favorable environments for the optimal development of ICTs, so that everyone can have access to them and so that their implementation offers prevailing security to its users, thus achieving the purpose for which they were created.
What are the Different Types of Stamp Duty in India? Buying a home involves a number of costs. The cost of the property is just one part. There are other charges to consider as well. Among these are stamp duty and registration charges. You bear these charges when carrying out transactions related to the property. These include sale, lease, and renting out of the property. First-time homebuyers are often unfamiliar with these charges. Thus, facing stamp duty and registration charges often brings financial stress in their life. But a stamp duty calculator can help you to manage your funds in a better way. Things become easy once you learn what these charges entail. What is Stamp Duty? Stamp duty is a tax levied by the government with respect to your property documents. These include conveyance deed, sale deed, and power of attorney. The tax comes into play when you buy, sell, or transfer a house. A document on which stamp duty has been paid is considered to be a valid legal document. Such a document can be produced in court and it has evidentiary value. So, you will be liable to pay stamp duty when acquiring a new home. Stamp duty will also apply when you sell or transfer the property in someone else’s name. Types of Stamp Generally, there are two types of stamps used for official purposes in India: • Impressed stamp • Adhesive stamp An impressed stamp duty is produced by impressing a stamp on a document. Like any other stamp, it shows that the required tax has been paid for the document. There are several ways of creating an impressed stamp. One example might be labels affixed and impressed by the authorised official. Franking machines in banks can also create an impressed stamp. This is used when someone deposits the necessary amount of stamp duty to the bank. As the name suggests, an adhesive stamp has glue on its back, which makes it easy to stick. Adhesive stamps are more convenient than impressed stamps. It becomes easy to fix the labels on the various documents. Adhesive stamps can be divided into two parts: • Postal stamps • Non-postal stamps The use of postal stamps is limited to transactions related to the post office. However, a non-postal adhesive stamp has no such restriction. Thus, the usage is limited. Some examples are court fee stamp, revenue stamp, notarial stamp, special adhesive stamp, foreign bill stamp, and brokers’ note. How is Stamp Duty Calculated? The amount of stamp duty you need to pay will depend on two things: • The location of the property • The valuation of the property The state government does the calculation and decides the applicable fee depending on the circle rate of the property. This rate tends to vary from state to state. Besides, the charges differ based on the nature of the property. For example, the stamp duty for a residential property is different from that of a commercial property. Whether the property is in a rural or an urban area will also have an impact on the stamp duty fee. Use a stamp duty calculator to assess the overall costs of the transaction. Factor this in when seeking a home loan. If you are eligible, you could get a large loan. Non-banking financial companies (NBFCs) offer home loans of up to Rs.5 crore. You can pay the stamp duty for your new home in a number of ways. The payment options include the use of non-judicial stamp paper and e-stamping. You could also pay through an authorised franking agency or a bank. Summing Up These days, getting a home loan is easy. And if you are aware of all the different charges it becomes even easier. You can approach several banks and NBFCs for attractive deals. Leave your vote
Body mass index health tip How to get your BMI down: 8 body mass index health tips According to the Centers for Disease Control and Prevention, more than one-third of American adults are obese1. That’s more than a third of our adult population. The good news is that we have the power to impact and reduce the amount of obesity in our community. It starts with knowing what to look for and sharing that knowledge with others so we can make steps toward a healthier future together.  Your body mass index (BMI) is a key player in reducing obesity. Calculating your BMI can help you have a better idea of your risk for weight-related diseases and complications, and can help you learn how to get your BMI down to a healthy place. By knowing your BMI, you and your doctor can make a plan for how you can stay healthy for years to come. What is body mass index? First things first: you need to know that body mass index, or BMI, is not a term intended to scare you. Quite simply, your BMI is a number based on your height and weight. It’s a fairly accurate indicator that lets you know if your total body fat is at a healthy level.  Since excess body fat is so closely tied to health risks and problems that can be reduced or prevented, your BMI is a pretty important figure. While it’s not a diagnostic tool, your BMI gives you and your doctor a good idea of your level of weight-related health risks. Knowing this number and keeping it at or within the “normal” range can help you keep your weight under control, reduce your risks and protect your overall health. High BMI risks Our bodies are not meant to carry more than a normal amount of weight and body fat. If you maintain a healthy weight, you can reduce your risk of weight-related diseases and health conditions, such as:  • Stroke • Elevated blood pressure • Diabetes (Type 2) • Heart attacks • Arthritis • High cholesterol • Gallstones • Sleep problems • Some Cancers Ask your doctor if you have any high BMI risks or weight-related health concerns in your medical history, and how to implement some healthy new habits into your daily routine. How to calculate body mass index Your physician or a member of your healthcare team can help you learn how to calculate body mass index2. Or, if you know your height and weight, calculating your BMI only takes some simple math. Weigh in, measure up and use this simple formula:  • Multiply your weight in pounds by 703  • Divide that answer by your height in inches  • Divide that answer by your height in inches again  Again, your BMI is not an exact indicator of your health, and it doesn’t diagnose weight-related diseases. However, it’s pretty accurate, and it gives you an idea of where you stand with your weight. Compare your BMI to this chart:  BMI Weight   Status   18.5 or lower   Underweight   18.5 - 24.9  Normal  25.0 - 29.9  Overweight  30.0 or above   Obese How to get your BMI down Maintaining a healthy weight isn’t about dieting. It’s a lifestyle. There are simple things you can do each and every day to keep your weight at a healthy level and reduce your risk of weight-related diseases and health problems. Here are some ideas to keep you moving in the right direction:  1. Get 30 minutes of aerobic exercise 5 times per week3 2. Limit saturated fats to no more than 7% of your total calories  3. Enjoy a low-cholesterol diet with lean meats, fruits, vegetables, and whole grains  4. Limit consumption of red meat and sugary foods and drinks  5. Avoid tobacco smoke and limit alcohol consumption  6. Set small and manageable goals for weight loss  7. Keep a close eye on portion sizes 8. Balance your calorie consumption with your physical activity  Always remember, you’re not alone in your journey to wellness. If you have specific questions or want more information about how to get your BMI down, talk to your doctor or nutritionist for tips on getting and staying your healthiest. If you don’t know where to turn, come see if CenterWell Senior Primary Care is right for you.  3. Office of Disease Prevention and Health Promotion, “Physical Activity Guidelines: Older Adults,” You belong at CenterWell Need more information? Let us help.
Daily Yajna/Sacrifice: An Imperative for a Sustainable World Living Dharma Daily yajna/sacrifice: an imperative for a sustainable world By June 2, 2020 September 21st, 2020 No Comments The art of storytelling is thousands of years old. From oral traditions passed down in small villages, to modern epics like “Star Wars” and “Lord of the Rings,” the narration of the journey an ordinary person takes to attain the extraordinary is something human beings of all eras have identified with in a profound way. While a variety of themes help to shape a character’s growth, the one that is, perhaps, most pronounced in transforming him or her, is that of sacrifice.  Sacrifice, or offering the fruits of one’s labor, otherwise known as yajna (yagya) in the Vedas, is a fundamental principle of Hindu teachings and practice.  To fully understand its significance, however, one must have a basic understanding of karma.  Karma is the universal system that responds to our own free will. With each action a soul performs, an equally proportionate reaction is delivered. Through the law of karma, benevolent acts can raise a person to a more altruistic plane of living, as malevolent acts lower one to a more egocentric plane. These reactions are experienced through a series of lives. Thus, the soul goes on, stuck in a cycle of birth and death, known as samsara, attempting to comprehend and enjoy the world, until it finally achieves liberation.  But how is such liberation procured? If every action, whether good or bad, further binds a soul in karmic chains, how is it possible to be released?  This is where sacrifice comes in. Through the simple technique of yajna, an individual can transform thoughts, words and actions, spiritualizing all aspects of his or her life.  The impetus to offer sacrifice is built into the soul’s deepest nature, according to the Bhagavad Gita. It is its dharma or innate quality. Aware of it or not, everyone engages in yajna. Sacrifice is service, and sincere service is the practice of love.  To attain or achieve anything in this world, a sacrifice must be made. It may be your money, energy, or time, it doesn’t matter. In order to get something, you must give something.  It is important to note the goal of sacrifice is not merely to mechanistically give something in order to receive and, thereby, enjoy. The real purpose is to acknowledge and honor, through gratitude, the source from which you obtained your fruit.  A practical and easy-to-understand example of this act of acknowledging can be seen all over the world in Hindu temples. By offering food to a particular deity, Hindus express gratitude to the Divine. After paying their sincere respects, Hindus eat the food themselves with a deep recognition for, not only the hard work it took to produce said food, but also the higher power that facilitated its production.  Even if one is an atheist, it is undeniable that most achievements in this world are impossible without the help of some collective power. Teachers help students to get college educations, sensei’s train fighters to attain blackbelt status, employers enable workers to make livelihoods.  Experiencing gratitude garners appreciation, and that appreciation raises a soul’s consciousness, allowing it to become more mindful of its own self-centeredness. When this occurs, a person naturally becomes more aware that everything in creation is sacred, and that nothing and no one should be exploited. The earth’s environmental situation, unfortunately, reflects poorly the status of society’s current global consciousness. Forests are being cut down at an exorbitant rate, plastic is destroying oceans, and sewage is contaminating rivers. The most pertinent issue, however, given the current pandemic is, perhaps, mankind’s treatment of animals.  A 2016 report by the United Nations found approximately 60 percent of known infectious diseases in humans to be zoonotic, which is a type of disease passed to humans from animals or insects. The same report not only found 75 percent of emerging diseases to be zoonotic as well, but also said these diseases are “opportunistic and tend to affect hosts that are already stressed by environmental, social, or economic conditions.” Considering this fact, it is no surprise wet markets and factory farms – where animals are so confined they are on top of not only each other but also their own feces, is a breeding ground for viruses like COVID-19.  Sadly, despite being a major public health threat, these practices continue to go on because they are extremely efficient and highly profitable. In light of the present pandemic, however, it is clear that such maximum efficiency is not tenable over a long period of time. Coffee may spike one’s energy level for a few hours, but there is usually a burnout resulting in commensurate fatigue. Similarly, though the fossil fuel industry is worth billions of dollars, it has majorly contributed to the degradation of the environment in a short length of time, historically speaking.  Hence, the wheel of karma spins on and on.  The act of mindlessly taking with no regard for its consequence is distinctly unsustainable. Humans have been destroying the rainforest – the lungs of the earth, and now there is a widespread virus attacking the lungs and bodies of people. Humans cage animals in factory farms, and now people are being confined in their own homes.  Dictionary.com defines “selfishness” as “devoted to or caring only for oneself.” Fortunately, this “selfishness” can be combated through yajna, because offering sacrifice instills gratitude, which coincides with appreciation. Having realized appreciation inevitably lifts one out of self-centeredness, allowing a person to become more conscious of how his or her actions affect the rest of the world.  This level of consciousness must be attained in order for humans to live more sustainably and avoid severe ecological repercussions.  As a pendulum swings, nature’s law also seems to always have a way of striking a balance. Leave a Reply Stay up to dateSign up to Our Newsletter Get the latest updates and news from The Hindu American Foundation.
Industry Articles From Kaempf and Harris 20 Facts About Steel That You Probably Didn't Know Steel is a low-carbon alloy that’s typically made of iron, tin, and carbon. With its ability to withstand corrosion (thanks to the inorganic compound chromium oxide), heat, and pressure, it’s one of the most popular metals in fabrication shops. Download the Introduction to Sheet Metal Fabrication So, why do we like steel in our fab shop? Check out a few of our fast facts: Recyclability & Renewable Energy 1. Almost 69 percent of steel is recycled in North America each year, which is more than paper, aluminum, plastic, and glass combined. 2. More than 80 million tons of steel are recycled in North America every year. 3. Steel is roughly 1,000 times stronger than iron in its purest form, and it can be recycled without loss of strength. 4. Steel is the main material used in delivering renewable energy like solar, hydro, and wind power. 5. Since World War II, the North American steel industry has reduced its energy use by 60 percent, which has contributed to a significant reduction in carbon dioxide generation. Global Involvement 1. In developing countries, steel companies are the most involved trade with the provision of healthcare services and community-wide education. 3. Steel is used in almost every industry, including energy, construction and housing (the largest consumer of steel), automotive and transportation, infrastructure, packing, and machinery. 4. The United States is the third leading producer of steel behind Japan and China. 5. The steel industry directly employs more than 2 million people worldwide -- and it’s growing. Steel Projects 1. Steel roofs last more than 50 years while traditional roofs last about 17 years. 2. 75 percent of all major appliances are comprised of steel. 3. The average computer is about 25 percent steel. 4. Steel was first used for skyscrapers in 1884 with the Home Insurance Building in Chicago. Modern steel buildings, like The Empire State Building (1930) in New York and U.S. Steel Tower (1971) in Pittsburgh, are designed to easily assemble and disassemble. 5. Because steel and iron expand when heated, the Eiffel Tower (1887), is about 6 inches taller in the summer than the winter. 6. The first steel-made automobile was produced in 1918. Since then, steel seatbelts are required due to their consistent ability to withstand high-impact crashes. 7. Steel bridges are four to eight times lighter than those built from concrete. The Golden Gate Bridge (1937) required 83,000 tons of steel whereas half of that amount would be required today. 8. Two-thirds of all canned goods' packaging are made out of steel. 9. More than 600 steels cans are recycled every second in the United States. 10. Recycling a single steel can saves enough energy to power a 60-watt light bulb for almost 4 years. Steel is undoubtedly the best metal for sheet metal fabrication shops. Among the many reasons to mass-produce steel, it’s easy to recycle, strong, and globally prosperous. For more fast facts about tools, techniques, and local apprenticeship opportunities from Kaempf & Harris, subscribe to our monthly newsletter: Subscribe to the Kaempf and Harris Blog This blog was written with help from the World Steel Association; the American Iron and Steel Institute; Capital Steel & Wire, Inc.; and AIM Steel International. Topics: Metals, Sheet Metal Fabrication Subscribe to Email Updates Recent News Download K&H's Metal Fabrication Techniques Cheat Sheet Download K&H's Metal Fabrication Techniques Cheat Sheet Download the Cheat Sheet
Quick Answer: How Did Classical Music Began? Who started the classical music? What inspired classical music? When did the classical music period begin? Introduction. The dates of the classical period in Western music are generally accepted as being between about 1750 and 1820. What influenced the classical period? Classical Ideals The Classical period in Western Music was relatively short, lasting from about 1750 to about 1800. So eighteenth-century composers interested in classical ideas did not have any ancient music to learn from or imitate. Nevertheless, they were very strongly influenced by neoclassical ideals. You might be interested:  How To Learn Indian Classical Music On Guitar? Who is the father of classical music? What is the oldest classical music? The evolution of music: The earliest score to classical • Example of a monophonic Gregorian chant, “Deum Verum” Was classical music for the rich? How do you define classical music? What is difference between Baroque and classical music? What was classical music called back then? Galant referred to what we might call early classical music. Learned referred to polyphonic music like fugues. In the 18th century galant would have been the current or modern style, and learned would have been an old fashioned style. You can even look to the Bach family. You might be interested:  What Is The Benefit Of 432 Hz Classical Musics? Why is it called the classical era? The name classical is applied to the period because in art and literature, there was keen interest in, admiration for, and emulation of the classical artistic and literary heritage of Greece and Rome. Intellectually, this era has also been labeled the Age of Enlightenment. Who are the composers of classical period? 10 Classical Music Composers to Know • Ludwig van Beethoven (1770–1827) • Johann Sebastian Bach (1685–1750) • Wolfgang Amadeus Mozart (1756–91) • Johannes Brahms (1833–97) • Richard Wagner (1813–83) • Claude Debussy (1862–1918) • Pyotr Ilyich Tchaikovsky (1840–93) • Frédéric Chopin (1810–49) What are the 5 basic characteristics of classical music? The Classical period • an emphasis on elegance and balance. • mainly simple diatonic harmony. • use of contrasting moods. How did the Enlightenment influence classical music? Leave a Reply
“Fuzzy”: vocabulary meaning. About vision, when you can’t see things clearly, they become blurry and you can’t see clear edges. It’s similar to when you forget to put on your glasses, and the automatic reaction is to squint our eyes in order to try to see things more focused. It also happens sometimes when you lose sleep and all you have to do is go to bed. Other examples of “fuzzy” vocabulary in a sentence • The picture on the monitor is fuzzy. • I see everything fuzzy without my glasses on. “Fuzzy”: use in context explanation The husband has to work for long hours on the computer. The wife is a thoughtful and loving person and asks him if he wants her to get him something to drink. He replies he would like some alcohol, beer. She brings him some beer. He keeps working in front of the screen. After many hours he is still sitting in the same chair, working. The wife is concerned and comes to see if her husband is fine. He is confused and not able to think clearly at the moment. He is too tired. What’s more, he can’t see his wife clearly. His vision is fuzzy, like when you forget to put on your glasses. He definitely needs to go to sleep.
Reign of Terror • Robespierre Early Life Robespierre Early Life Robespierre was born in France, on May 6, 1758. He was the oldest of four children. His mother died when he was six years old. After that, his dad left. And he was forced to live with his maternal grandparents. • Estates Generals Estates Generals He was advocating for the poor people when the king summon the estate's generals. He was elected to represent the Third Estate of Artois in the Pre-Revolutionary Estates-General. As a representative of the Third Estate. • The Tennis Court Oath The Tennis Court Oath There they took an oath never to separate until a written constitution had been established for France. This was important to the french revolution because this is talking authority came from the nation's people and not from the monarchy. Without the tennis court oath, the revolution might never exist or it would be more difficult to end the monarchy. • Jacoblin Club Jacoblin Club Maxmillian Robespierre was a has ideals of this Rousseau's ideas. So he had other fans make the club and slowly climb the ranks until he made it to the top. Also, Robespierre was connected to the National Convention and the Committee of Public Safety. And the Jacobins was later on called The Society of the Friends of the Constitution. • Forced Louis Forced Louis The king did enough even for Robespierre he has killed enough people a when France is in crumbles he calls for the estate's generals he had 98 percent of the people have one vote. So now National Constituent Assembly forced King Louis XVI to accept the French Constitution. • Public Safety Committee Public Safety Committee The public safety committee was a group led by Robespierre. This group was a dictatorship over. Its goal was to protect France from it enemies. • King Execution King Execution Robespierre excuses King Louis of being a traitor for trying to flee the country. Robespierre was the one Robespierre had a vote to execute the king. The vote was 380 to 310 and the king was executed. • Reign of Terror Reign of Terror The reign of terror was created mainly due to Robespierre's influence is where Robespierre wanted to create a government through fear. Over 17,000 people died because Robespierre thinks they were a traitor. The Committee could accuse anyone it and the person would be send them to the guillotine. • Robespierre speech Robespierre speech In one of his speeches he says “To found and consolidate democracy, to achieve the peaceable reign of the constitutional laws, we must end the war of liberty against tyranny and pass safely across the storms of the revolution.¨ • Robespierre death Robespierre death Robespierre has gone too far even for his allies to realize what happens. He has been killing anyone who is not deemed fit for this revolution. He killed thousand and started chaos. The only way this will end is Robespierre's death. So his allies sentence him to death.
Previous | Next --- Slide 38 of 40 Back to Lecture Thumbnails How have supercomputers responded to the power wall? Several factors off the top of my head: • It seems like supercomputers can vary power among individual units with much higher variance because of custom cooling. Could this be used to dynamically alter clock frequency to combat dynamic load imbalance? • Communication latency and bandwidth are huge problems for supercomputer workloads and also huge power hogs. What are the tradeoffs between latency, bandwidth, and power for interconnects? • Are there quantitative ways to schedule supercomputing programs to minimize power usage? • Does VLIW make sense in a supercomputing context? If so and not in use, why not? There are definite power advantages to having simpler hardware. Somewhat off topic, but as supercomputers increase in number of nodes, and failures become more common, has the SC community started to adopt distributed systems techniques (specifically fault-tolerance)?
Kids Learning Zone Coloring pages Virtual Zoo Parenting Zone Baby Names Parenting Articles Kid's Learning Zone   »   Virtual Zoo   »   Bear Bears are the mammals with enormous huge size and great power and they are easily found in the Asia, Europe, and America and in Artic regions. They are capable of living in the very extreme cold regions because of their body which is covered with a very thick fur. Bears have hairy head, small rounded ears with small eyes and short and powerful legs with large feet. They have extreme strong claws that they can rip, dig and catch very strongly. Bears have an excellent sense of smelling and more over rather than having bulky body they can run very quickly and at the same time can swim and climb swiftly. Bears defense them selves by their teeth and claws which are very strong and acts as a weapon to them. They usually like to live alone and they live in caves. Some bears build their den under brush piles, and in logs or in dig holes in hill sides. Bears are flesh eating animals; they usually will travel at a longer distance for food. They hunt in day or night time depending upon the situation and expectation of humans nearby. Apart from that they like to consume fish, squirrels and sometimes mice, lambs, pigs, bird's egg. Bears do really like honey. Most Cubs stay with their mother for one to two years. Life span of a bear ranges up to a maximum of 30 years. They have been hunted by many people for enjoyment and for eating. Photos with Bear: See Bear Coloring pages
TS Elliot Belly Dance Music The rhythms of belly dance music and Middle Eastern music are inspired by the gaits of animals... the donkey, horse and camel. This may not ring true for all of them but you can definitely hear it in a lot of the rhythms played out by the Darabouka or Duff (both typical of Egyptian music). Reflecting on the way of life of the desert nomads, mountain warriors and delta dwellers of the East, and their close companionship with the animals that allowed and allow them to survive in harsh conditions, we witness the intimate relationship between human and the natural environment and can understand how belly dance music was brought to life. These three animals, among others such as the goat and sheep, perform a vital role in the lives of the majority of the people living in the Middle East, for transport, food and other bi-products such as leather, bone and hair. Their lives depend on these animals in primary ways and a deep and ancient relationship with the animals exists at the root of their existence, livelihood and society, much like the cow in African cultures. I feel this is one of the reasons why belly dance music is so soul-filled, moving, emotive and powerful, for it's roots are ancient and speak many stories about experiences' sweet and harsh moments, the ebbs and flows of this beautiful symphony we call life. Listening to the Nai, the reed flute, brings to me feelings and images of water and river reeds and the movement of the snake. The gait of a camel can be felt in the ayoub rhythm... D-tD-T, D-tD-T ...which is one of the rhythms of the Zar, the trance dance ceremony used for healing. These are just a few examples of the rich images and feelings held in belly dance music, that with our bodies we can bring to the realm of movement, to the visual. When dancing, the skilled dancer will communicate impeccably with the music, bringing out as much of the music as possible with her body. Using the core, arms, legs, head, fingers eyes, and hair, to engage as wholly as possible with the music. When dancing with a live band, the dancer will inspire the musicians and visa-versa. A close, even intimate, relationship between dancer and musician is formed, incorporating certain signals and familiarities as a means of guiding each other through the performance. Middle Eastern and belly dance music are created from the Arabic scale, which is fundamentally different from the western music scale in that it includes quartertones. Arabic music emphasises melody and rhythm rather than harmony. Middle Eastern rhythms Rhythm (Greek = flow) is the variation of the accentuation of sounds or other events over time. "Rhythm involves patterns of duration that are phenomenally present in the music" with duration perceived by interonset* interval. When governed by rule, it is called meter. It is inherent in any time-dependent medium, but it is most associated with music, dance, and the majority of poetry. *In music the interonset interval or IOI is the time between the beginnings or attack-points of successive events or notes, the interval between onsets, not including the duration of the events. (Referenced from: en.wikipedia.org) I have compiled a list of some of the basic rhythms you will hear in belly dance music. I do this for you to help enrich your understanding and appreciation for this world of music and dance. I am not a professional musician, what you will see is compiled from what I have learned through musicians in Egypt and research I have done into this field. Enjoy the information... use it to deepen your understanding of belly dance music and dance by clicking here. Don't forget that the music is as important as the movements. Do you have a question or message for me?
IELTS Listening Test Preparation IELTS listening tests are pretty much similar to IELTS academic and general tests. All you need to do is to listen to a few audio recordings played by the examiner and answer some questions provided in the listening of the IELTS test. These audio recordings will be in the form of dialogues. OIS assists individuals with the IELTS listening test preparation and provides full IELTS course preparation with our experienced online tutors. Understanding the IELTS Listening Test • The IELTS British Council listening test is divided into four sections, with each section more difficult than the previous one. • Each section contains ten (10) questions, and you can listen to the recording only once. • The total time duration for the test is 30 minutes, and extra 10 minutes are given to transfer your answers to an answer sheet. For an online test, you will be provided two more minutes to cross-check your answers. • The examiner will give you some time to check the questions before you start listening to the audio recording. You will also be provided with some time to review the answers before submission. • The audio recording will be made of different questions that you will have to answer. For fully correct answers, you must have a good understanding of what type of discussion is usually followed. It will help you evaluate them and write precisely. You must be very careful while listening because the words in the questions and the recording might not be the same. • Be mindful of the word count limit and directions. As in most cases, these directions will indicate whether your answer ought to be a word, two words, a number, or several numbers. Tips for IELTS Listening Test Cambridge IELTS listening test is considered one of the easiest tests comparatively. You can easily get high bands in the IELTS test if you follow the below-listed tips for striving the section: • During the IELTS listening test, you can listen to the audio recording only once. Therefore, it is essential for you listening the IELTS test practice to complete the test and preparing yourself to answer the questions correctly. • Before the examiner plays a recording, you will be given one minute to understand your questions. Make sure you read the questions thoroughly and are aware of the detail you need to write the answer with full precision. • Read the guidelines carefully about the questions so that you know clearly what to write in the blanks. 1. A date/number is defined as one word. 2. A hyphenated word is considered a single word. 3. A compound noun that isn’t hyphenated is defined as two words. • SPELLINGS – Correct spellings are as significant as are the right answers. You must always concentrate on the spellings while moving your answers to the answer sheet. • Examiners usually skip the plural words, which usually prompt wrong answers. It would be ideal for you to be mindful about the plural words. • There might be chances of twists and turns in the recording, i.e., the information might be the change you’re searching for, so be sure you listen keenly to detect the correct answer. • Try not to lose your FOCUS! Listening to the recording keenly for 30 minutes maybe a tiring task but don’t lose concentration as you might skip the most significant data. OIS provides an online IELTS listening practice and helps you to tackle these kinds of listening hurdles with the help of an experienced IELTS teacher. What are the Key Points to Keep in Mind on the Day of IELTS? Below are some key points you must keep in mind on the day of the listening of IELTS tests: a. Ensure your headphones are working properly. If you face any difficulty, ask your examiner right in the interim. b. Make sure the recording is clear and loud. If it is not, address your issue to the examiner. c. Carefully listen to all the instructions and guidelines before the test begins. d. Always use capital words to write the answers. e. You are not allowed to wear a watch inside. Instead, keep an eye on the wall clock of the hall. f. Don’t try to cheat. Otherwise, the examiner will disqualify you from the test. Instantly stop writing the answer after the invigilator asks you to do so. Failure to follow the instructions will discard your paper. IELTS Listening Test Preparation
Giant Salamander Last updated: June 19, 2021 Verified by: AZ Animals Staff Image Credit Jay Ondreicka/ Cryptobranchus giant salamanders breathe mostly through their skin. Giant Salamander Scientific Classification Read our Complete Guide to Classification of Animals. Giant Salamander Conservation Status Giant Salamander Locations Giant Salamander Locations Giant Salamander Facts Aquatic life, including crabs, fish, frogs and giant salamanders Name Of Young Group Behavior • Solitary Fun Fact Cryptobranchus giant salamanders breathe mostly through their skin. Estimated Population Size The South China giant salamander may be extinct, and there are less than 50,000 Chinese giant salamanders and 590 Ozark hellbenders left in the wild. Biologists aren't quite sure how many Japanese giant salamanders are left in the wild though its conservation status is near threatened. There are about 13,000 Pacific giant salamanders in British Columbia. Biggest Threat Pollution, habitat destruction, over-harvesting Most Distinctive Feature Their size Other Name(s) Hellbenders are called hellbender salamander, devil dog, water dog, mud dog, grampus, mud devil, Allegheny alligator and leverian water newt. Chinese giant salamanders are called infant fish because they make a noise like a baby’s cry. The Japanese giant salamander is called the giant pepper fish, or Ōsanshōuo because of the smell it gives off. Gestation Period 40 to 210 days before eggs hatch Litter Size 83 to 600 eggs Common Name Giant salamander, hellbender, Japanese giant salamander, Chinese giant salamander, South China giant salamander, Pacific giant salamander East Asia, eastern United States, Canada Giant Salamander Physical Characteristics • Brown • Grey • Black Skin Type Up to 50 years, though oldest specimen lived 72 years 0.89 to 130 pounds Up to 6.5 feet Age of Sexual Maturity Five to eight years View all of the Giant Salamander images! Though the sight or even the thought of a nearly six-foot-long salamander may be off-putting to some people, giant salamanders play a vital role in their ecosystems. The Chinese and Japanese giant salamanders are apex predators and keep the populations of other aquatic animals in balance. The health of the much smaller hellbender and Pacific giant salamander shows humans whether the water they live in is healthy. Still, populations of giant salamander are under pressure due to pollution and habitat destruction. Not only this, many people aren’t so put off by a giant salamander that they won’t eat them in great numbers. This is why the Chinese giant salamander, the world’s largest amphibian, is critically endangered and why the South China giant salamander is possibly extinct in the wild. 5 Incredible Giant Salamander Facts! • Giant salamanders are cannibalistic. • Unlike many other kinds of salamanders, at least two species of giant salamanders can vocalize. • They are ambush predators. • Cryptobrachus giant salamanders use sensors in their heads to detect changes in water pressure. This leads them to their prey. • Some people keep hellbenders as a pet, but keeping this amphibian as a pet may be illegal in some places. Giant Salamander Scientific Name Some giant salamanders belong to the Cryptobranchidae family. Cryptobrachus is Greek for “hidden gill” because these salamanders lose their gills when they become adults. There are two genera in the family. The hellbender belongs to the Cryptobranchus genus, and its scientific name is Cryptobranchus alleganiensis. Alleganiensis means that the animal is of the Allegheny Mountain area of the United States. The hellbender has two subspecies: • C. a. alleganiensis • C. a. bishopi Other giant salamanders are members of the Andrias genus. Andrias is Greek for “statue.” Andrias davidianus is the Chinese giant salamander, though some biologists claim this is a catchall name for five species. The epithet is named for Father Jean Pierre Armand David, a French missionary. Andrias sligoi is the South China giant salamander. It was named for the Marquess of Sligo, George Ulick Browne, in 1924. Andrias japonica is the Japanese giant salamander. Its Latin epithet japonicus just means that it’s from Japan. The Pacific giant salamander belongs to the Dicamptodon genus. Dicamptodon is from the Greek and means “having teeth with double curves.” There are four species: • Dicamptodon aterrimus • Dicamptodon copei • Dicamptodon ensatus • Dicamptodon ensatus Giant Salamander Appearance The hellbender is between 1.0 and about 2.5 feet in length and weighs between 0.90 and 2.2 pounds. It has a flat body with frills of loose skin on its sides that help the animal pull oxygen from the water. The hellbender’s head is also flat, and it has tiny eyes with no eyelids. It has five webbed toes on its back feet and four webbed toes on its front feet. Its legs are short and stubby, but the tail is strong and helps propel the animal through the water. The ground color of the body is black or brown and some specimens have orange spots. The larvae of the hellbender look very much like tadpoles. The Chinese giant salamander is much bigger than the hellbender at close to 3.8 feet in length, average. It usually weighs between 55 and 66 pounds but can weigh as much as 110 pounds. The largest Chinese giant salamander weighed 130 pounds and was 5.9 feet long. Its skin is dark, mottled, loose, and wrinkled, and it has lidless eyes and a large, flat head. There are tubercles around its throat and head. The Japanese giant salamander isn’t as large as the Chinese giant salamander but can grow to 5 feet in length and weigh around 55 pounds. Its body can be brown, yellowish or reddish-brown, or black, with splotches that help camouflage it. The South China giant salamander is even larger than the Chinese giant salamander. It can grow to nearly 6.56 feet long. Like the other salamanders, it has a flat head and loose frills of skin on the sides of its body to help it breathe. Its overall coloring is mottled gray. The Pacific giant salamander can grow to about 13.39 inches long and weigh up to 4 ounces. Its body is dark brown and spotted or marbled, and its belly is white. Unlike the Cryptobranchus species, it has bulging eyes and freckled irises. Its legs are strong, and its toes are not webbed. Males have longer tails than females. A Coastal Giant Salamander (Dicamptodon tenebrosus) sitting on a mossy log. Michael Benard/ Giant Salamander Behavior Giant salamanders are solitary and will see off other giant salamanders that come into their territory save during their breeding season. During the day they sleep under rocks. All giant salamanders secrete a substance that deters would-be predators, and in the case of the Japanese giant salamander, the secretion has a smell like the Japanese pepper plant. Since Cryptobrachus salamanders have tiny, lidless eyes, they mostly use smell and touch to get around. The Chinese giant salamander is notorious for its vocalizations, which not only include hisses, whistles, and barks but a noise that sounds very much like the cry of a human baby. The Pacific giant salamander barks like a dog. Both the Japanese giant salamander and the hellbender have a lateral line along their bodies to detect light, vibrations, and water pressure. Giant salamanders have lots of tiny teeth, and they can and do bite. A Japanese salamander’s jaws are strong enough to take off part of a human finger. Pacific giant salamanders also won’t hesitate to bite a would-be predator. Giant Salamander Habitat Because they have to work rather hard to breathe through their skin, Cryptobrachus giant salamanders prefer clear, clean cool water that can hold on to a lot of oxygen. The Japanese salamander is only found in Japan and lives in rivers in the southwestern part of the country. The hellbenders are found in the Appalachian Mountains from New York to northern Alabama, and there’s an isolated population of hellbenders in Missouri. The Chinese giant salamander, which may comprise five clades, is found in south, southwestern and central China. Some have also been found in Taiwan, but biologists suspect they were introduced there. The South China giant salamander is only found in southern China, mostly in the Pearl River basin. The Pacific giant salamander is able to live on land but must stay close to wet places to keep its skin from drying out. It’s only found in the Pacific Northwest area of North America. Giant Salamander Diet The Japanese and Chinese giant salamanders eat insects, other amphibians including each other, fish, crabs, crustaceans, worms, and millipedes. They will also eat small mammals such as the Asiatic water shrew. The hellbender eats the crayfish that shares its habitat as well as small fish, tadpoles, insects, and salamanders that are small enough for it to handle. Because it is a bottom feeder, it will also take in mud and other debris. Since the Pacific giant salamander can live on land, it will sometimes climb trees for as far as six and a half feet off the ground to find prey. Giant Salamander Predators and Threats Japanese and Chinese giant salamanders are top predators where they live, and nothing eats a grown, sizable individual but a human and another member of their species. Larvae are subject to predation by fish and adult members of their species. The much smaller hellbenders are also eaten by large fish and by members of their own species. People do not eat hellbenders, but sometimes they are by-catch of fishermen. Pacific giant salamanders are eaten by mustelids, snakes, and fish such as salmon. Hellbenders are also subject to parasites such as tapeworms, leeches, and nematodes. If they are healthy, they can fight off disorders brought by these parasites. Polluted waters weaken the giant salamander’s immune system and make it harder to fight parasites and diseases. Chinese giant salamanders are overhunted, and most of the other Cryptobrachus salamanders are endangered due to habitat destruction. What Eats the Giant Salamander? Giant salamander larvae are eaten by fish and other salamanders. Adult Chinese giant salamanders are eaten by people and other Chinese giant salamanders. Hellbenders can be taken by fish, and Pacific giant salamanders are on the menu for water shrews, snakes, fish, river otters, and weasels. What Does the Giant Salamander eat? Giant salamanders eat other amphibians, worms, crayfish, fish, insects, other aquatic invertebrates, and occasionally aquatic mammals such as water shrews. Giant Salamander Reproduction and Life Cycle The male Cryptobrachus salamander guards the eggs and sometimes the larvae. He may eat some of the eggs, but these eggs are usually defective. Japanese giant salamanders’ breeding season is in the fall. By the end of August, they swim to spawning pits, which are just hollows in the bottom of the stream or rock-lined crevices or burrows. Males fight over the best spawning pits and can hold on to one for decades. Then, females arrive. After a bit of courting, she’ll lay 400 to 500 eggs in the pit, and the male fertilizes them. The male Japanese giant salamander can fertilize the eggs of more than one female, and he will guard all the eggs until they hatch after about 12 to 15 weeks. The breeding season for the hellbender is from late summer to early autumn, and the female lays between 150 to 450 eggs in his pit. The eggs hatch between 45 and 80 days. The Chinese giant salamander breeds in late summer, when the water temperature is at least 68 degrees Fahrenheit. The female deposits between 400 and 500 eggs in the male’s spawning pit and her eggs hatch 50 to 60 days after they’ve been fertilized. The Pacific giant salamander breeds beginning in spring and ending in fall, and females swim upstream to lay their eggs. In the case of this salamander, the female guards her eggs and may do so for as long as seven months. It takes about five to six years for a Pacific giant salamander to grow large enough to breed. Chinese giant tadpole larvae lose their gills when they’re about three years old. They reach adulthood when they are five to six years old and can have a lifespan of 60 years or longer. No one knows when Japanese giant salamanders reach sexual maturity, but it’s assumed they have to be of a decent size. They can have a lifespan of over 50 years. Hellbenders become mature when they’re between five and eight years old and can live more than 30 years. Pacific giant salamanders probably become mature when they’re five or six. Biologists aren’t sure how long they live. Giant Salamander Population Though no one knows exactly how many Japanese giant salamanders live in the wild, the species is considered near threatened. There are about 50,000 Chinese giant salamanders, but it is critically endangered, as is the South Chinese giant salamander. Indeed, this salamander may be already extinct. The hellbender, of which there are only 590 left in the Ozarks, is near threatened. There are about 30,000 Pacific giant salamanders in British Columbia, and their conservation status is least concern. View all 110 animals that start with G About the Author Giant Salamander FAQs (Frequently Asked Questions)  Do giant salamanders bite? Yes, giant salamanders do bite, but they are not aggressive towards humans and may take a bite out of a hand that’s trying to pet them because they mistake it for food. What do giant salamanders eat? Giant salamanders eat insects, shrimp, fish, worms, millipedes, tadpoles, smaller salamanders and frogs, small aquatic mammals and each other. What is the largest salamander called? The largest salamander in the world is the South Chinese salamander, which can grow to 6.5 feet long. How many giant salamanders are left in the world? According to scientists, there may be only tens of thousands of giant salamanders left in the wild, though millions of Chinese giant salamanders are bred for their meat. 1. Wikipedia, Available here: 2. US Fish & Wildlife Service, Available here: 3. Macro Evolution, Available here: 4. Animal Diversity Web, Available here: 5. New Scientist, Available here: 6. National Geographic, Available here: 7. Smithsonian National Zoo, Available here: Newly Added Animals A Phorusrhacos It's a genus of terror birds A Cabbage Moth Cabbage Moth Cabbage moths are named after the vegetable they find the tastiest. Most Recently Updated Animals A Atlantic Salmon Atlantic Salmon A Pipe Snake Pipe Snake A Australian Flathead Perch Australian Flathead Perch
What is a World Heritage site? By: Jennifer Horton Famous Landmarks Image Gallery After UNESCO launched a campaign to save the Abu Simbel temples in Egypt from damage associated with construction of a dam, the massive relics were transported to safety. See more pictures of famous landmarks. Time & Life Pictures/Getty Images When you hear the word heritage, you might think about faded photos of long-forgotten relatives crumbling in the attic or the dusty comic book collection that you inherited from your dad. But beyond individual heritage, there exists a global heritage that belongs to everyone. At least that's the idea behind the United Nations' Convention Concerning the Protection of the World Cultural and Natural Heritage. That's a long title for an international treaty that attempts to identify and protect some of the world's greatest cultural and natural sites. The World Heritage Committee, a group of 21 representatives from countries who have agreed to abide by the convention, decides which sites of "outstanding universal value" qualify for World Heritage status. UNESCO, or the United Nations Educational, Scientific and Cultural Organization, adopted the World Heritage designation in 1972 after it was uncertain if some of the world's landmarks would survive into the future. The catalyst came when the ancient Abu Simbel Egyptian temples were threatened by a proposed dam that would flood the valley in which they rested. UNESCO launched a successful campaign to save the temples and had them transferred to dry ground. The effort, which raised $80 million with the help of about 50 different countries, illustrated that interest in preserving significant landmarks defies boundaries. Energized by success, UNESCO drafted a proposal to protect more of the world's cultural heritage. Soon after, the president of the United States called a conference that encouraged creating a trust to safeguard natural and scenic areas. The International Union for Conservation of Nature, or the IUCN, had a similar idea. The separate proposals were merged into one all-encompassing document in 1962. The resulting World Heritage Convention, the short title of that international treaty we mentioned earlier, stressed the importance of both culture and the environment, and declared it a global responsibility to protect areas that were outstanding examples of either one. As of October 2017, 1,073 properties from 167 different countries were listed as World Heritage sites [source: UNESCO]. Many of them you have probably heard of, such as the Galapagos Islands or the Taj Mahal. Others are not so well known: Jiuzhaigou Valley? Choirokoitia? On the next page, you'll find out how places like these came to be World Heritage sites, and what they might gain from their elite status. Selecting UNESCO World Heritage Sites The Sydney Opera House is recognized as a World Heritage site for its excellence in design. Doug Menuez/Getty Images Although a country technically retains official ownership of World Heritage sites within its borders, UNESCO states that the sites belong to everybody. Using that definition, you and I hold stock in 832 cultural sites, 206 natural sites and 35 mixed properties [source: UNESCO], as of October 2017. We are partial owners of the Great Wall, Venice and Vatican City. Feeling giddy yet? You can also lay claim to Independence Hall, the Grand Canyon and the Great Barrier Reef. Pretty cool. A site must meet at least one of these ten selection criteria to make the World Heritage List. The first six criteria relate to cultural sites, while the remainder relate to natural ones. A summary of these criteria is listed below, followed by an example of a site that qualifies in that category. 1. Represents an architectural masterpiece, such as the Sydney Opera House, which illustrates a feat of engineering and modern design with its shell structure. 2. Displays an important exchange of human values, like the Speyer Cathedral, which dates back to the Holy Roman Empire and served as the burial place of German emperors. 3. Bears unique or exceptional testimony to a cultural tradition or civilization. An example is the Agra Fort in India, a 16th century monument that houses a number of palaces and mosques. 4. Exemplifies a type of building that illustrates a significant stage in human history. The Megalithic Temples of Malta, a group of seven giant temples on the islands of Malta and Gozo that show the importance of temple-building, qualified for this criteria. 5. A traditional human settlement that is an outstanding representation of a culture, especially one that has survived despite environmental pressure. The Curonian Spit, a long sand peninsula in the Baltic Sea, was made a World Heritage site for people's efforts to stop its erosion since prehistoric times. 6. Associated with events or living traditions of outstanding universal significance, such as the Hiroshima Peace Memorial, the only building standing after the atomic bomb exploded over the city in 1945. 7. Contains fantastic natural phenomena or areas of exceptional natural beauty, such as the majestic Kilimanjaro National Park, which is home to myriad endangered species. 8. Ilustrates major stages of earth's history, such as the Messel Pit Fossil Site in Germany, which contains well-preserved fossils from the Eocene period that are more than 30 million years old. 9. Captures significant ongoing ecological and biological processes in the development of communities of plants and animals. Shirakami-Sanchi, the last remaining stand of Siebold's beech trees in northern Japan where 87 species of birds live, meets this criteria. 10. ­Contains important natural habitats for conserving biological diversity, such as the Okapi Wildlife Reserve, which is home to some of the last remaining okapi -- a relative of the giraffe -- among other animals. [source: UNESCO] Along with the above criteria, management, protection and integrity of nominated sites also factor into the decision. So who decides what gets on the list and what doesn't? Find out who's behind the decision-making process on the next page. World Heritage Organization Evidently, Oman didn't protect its natural heritage enough. The country's Arabian Oryx Sanctuary was removed from the World Heritage List after endangered oryx started declining. Joseph Van Os/Getty Images It turns out just being an outstanding example of universal value isn't enough to gain World Heritage status. First of all, only those countries that have agreed to protect their natural and cultural heritage by signing the World Heritage Convention can nominate sites. As of Jan. 31, 2017, there were 193 member countries, or states parties [source: UNESCO].Several perks come with signing the convention. Besides being able to submit sites for the World Heritage List, a state party can receive money from the World Heritage Fund to assist it in identifying, preserving and promoting sites. The fund holds approximately $4 million at any given time [source: UNESCO Information Kit]. In addition to financial assistance, having a UNESCO World Heritage site usually generates tourism dollars. The states parties, collectively known as the general assembly, meet once every two years to elect members to the World Heritage Committee -- the body responsible for selecting sites, as you might remember. The committee tries to ensure the continuous preservation of sites by evaluating site reviews every six years, and it also allocates financial assistance to countries that need it. Once a country has submitted a comprehensive nomination file with all of the necessary paperwork, several specialized organizations assist the committee by reviewing the files. Two nongovernmental groups, the International Council on Monuments and Sites (ICOMOS) and the World Conservation Union (IUCN), respectively judge cultural and natural nominees. As if that's not enough acronyms, the International Centre for the Study of the Preservation and Restoration of Cultural Property (ICCROM) offers the committee its expertise on how to conserve the selected sites. Although states parties are the official submitters of sites for possible inclusion on the World Heritage List, individual people can suggest one by contacting their country's representative. Who knows, maybe you'll be responsible for the next World Heritage site. Lots More Information Related HowStuffWorks Articles More Great Links • UNESCO World Heritage Center. "World Heritage." 2008. (April 24, 2008)http://whc.unesco.org/ • UNESCO World Heritage Center. "World Heritage Information Kit." March 2005. (April 24, 2008)http://whc.unesco.org/documents/publi_infokit_en.pdf
Version classiqueVersion mobile Modernism: Representations of National Culture Ahmet Ersoy Maciej Górny Vangelis Kechriotis Chapter IV. Aesthetic modernism and collective identities Art and nationalism Antun Gustav Matoš Traduction de Iva Polak Texte intégral 1Title: Umjetnost i nacionalizam (Art and nationalism) 2Originally published: Zagreb, Obzor, 28 January 1912 3Language: Croatian 4The excerpt used is from Dragutin Tadijanović, ed., Antun Gustav Matoš III: Kritike, eseji, studije i članci, polemike, putopisi, feljtoni i impresije (Zagreb: Zora – Matica Hrvatska, 1967), pp. 117–122. About the author 5Antun Gustav Matoš [1873, Tovarnik (near Vukovar, east Croatia) – 1914, Zagreb]: writer and journalist. After graduating from the gymnasium in Zagreb, he attended the Military Veterinary Academy in Vienna in 1893. In 1894 he defected from the Austro-Hungarian army and fled to Belgrade. Between 1894 and 1898, Matoš lived in Belgrade as a freelance journalist, and later, left for Paris, where he would spend five years living a bohemian life. He was heavily influenced by Paul Verlaine, Charles Baudelaire and Stendhal. Besides, Maurice Barrès’s doctrine of nationalism had a formative impact on his work. Between 1904 and 1908, he lived again in Belgrade, where he became known as an outstanding writer and essayist, an outspoken critic of realism and naturalism in art and the Yugoslav idea in politics. After the Austro-Hungarian government granted an amnesty in 1908, Matoš went back to Zagreb. He was cherished as one of the leading Croatian artists and as one of the most outstanding ‘opinion makers’ of the time. In 1914, he died of lung cancer. In the Croatian national canon, Matoš is labeled as the most outstanding modern Croatian writer after Miroslav Krleža. He is regarded as the founder of full-fledged artistic modernism, and especially of modern Croatian literary criticism, as well as being a pioneer of essay and travel writing. In the 1990s, he was highly praised as the founding figure of turn-of-the-century Croatian liberal nationalism, since he argued for Croatian independence and against the idea of South Slav unity, simultaneously recognizing the Serbs and other national minorities in Croatia as self-standing political subjects. 6Main works: Iverje [Fragments] (1899); Novo iverje [New fragments] (1900); Ogledi [Essays] (1905); Vidici i putovi [Horizons and roads] (1907); Umorne priče [Tired tales] (1909); Naši ljudi i krajevi [Our people and lands] (1910); Sabrana djela [Collected works] (1935–1940, 1973). 7Turn-of-the-century Croatia experienced tightly intertwined political and cultural transformations. These were launched by the so called Napredna Omladina (Progressive youth), the group of students who left Zagreb to continue their studies in Prague after the anti-Hungarian riots in 1895. Inspired by Tomáš Masaryk’s political thought, the ‘Youth’ shifted from the exclusivist political Croatism advocated by the Stranka prava (Party of Rights) back to the idea of Croat–Serb national oneness, becoming thus the spiritus movens of the foundation of the Hrvatsko-Srpska koalicija (Croat–Serb coalition), the political coalition which dominated Croatian politics up until the South Slav unification of 1918 (see Frano Supilo, The memorandum to sir Edward Grey). The ‘Youth’ contested the late romanticist canon dominant in contemporary Croatian literature, which glorified the Croatian medieval state right tradition. Initially, the ‘Youth’ had launched an appeal for the autonomy of art. However, inspired by Hippolyte Taine’s positivist definition of literature as a mirror of specific socio-political contexts, they soon began to propagate the social-nationalist canon. The ‘Youth’ envisioned literature as the mirror of national life, namely the living conditions of the people, and of the views of the so called ‘national intellectuals.’ For them, literature was an instrument for spreading the democratic national idea. However, by the late 1800s, when the Croat–Serb coalition advocating the South Slav political project entered a coalition alliance with the Budapest government, their political and literary ideas were contested by the Mladohrvati (Young Croats), the group of young intellectuals gathered around Antun Gustav Matoš. Politically, the ‘Young Croats’ followed the original Stranka prava idea of the Croatian political nation (see Franjo Rački, Yugoslavism). At the same time, however, they recognized the political subjectivity of Croatian Serbs, thus distancing themselves from the exclusivist ethnic and Catholic idea of Croatism advocated by the contemporaneous mainstream faction of Stranka prava, the so called Čista stranka prava (Pure Party of Rights). 8Under Matoš’s influence, the ‘Young Croats’ explicitly separated politics from literature, embracing simultaneously the principle of aesthetic autonomy, and understanding art as the expression of the extraordinary, talented individual. However, Matoš’s followers in the early 1910s, such as Tin Ujević, Ivo Andrić and Miroslav Krleža, abandoned him both artistically and politically. Artistically, they became inclined towards the rising avant-garde trends, especially futurism, all of which Matoš refused due to their presumed anti-aestheticism and disdain for national history and tradition. Politically, at the climax of the popularity of the idea of South Slav unity on the eve of the First World War, the next generation of ‘Young Croats’ adopted the idea of the integral Yugoslav nation, subsequently becoming the leaders of the Nacionalistička omladina, the successor group of the ‘Progressive Youth’ (see August Cesarec, The national question and our missions). The ‘Nationalistic Youth’ developed the idea of an integral Yugoslav nation, subsequently supplementing it with the cultural idea of the Yugoslav heroic character. Heroism was allegedly embodied in the Serbian warrior character, and was to be imposed on the Croats and Slovenes with the aim to replace their legalist statehood ideas. These ideas were seen not only as the obsolete feudal obstacles to south Slav unification, but also as the results of “degenerative” foreign (primarily Austrian and Hungarian) influences on Croat and Slovene “national mentalities.” 9Matoš’s entire life and work, especially his Zagreb years (1907–1914), were mostly characterized by a constant polemic with his political and artistic opponents from the ‘Progressive Youth’ generation, and especially with its two leaders, Milan Marjanović and his Serbian counterpart Jovan Skerlić. Although the political dispute between Yugoslavism and Croatism constituted the background, the polemic was based primarily on different views of the national significance of art, although all three figures were influenced by social-Darwinist theories about an ongoing contest for the survival of unique national cultures. Hence, although Marjanović and Skerlić advocated a rationalistic understanding of art, they both stressed the notion of a South Slav folk culture, considered as the only authentic expression of South Slav mentality, and hence perceived to be the only true source of artistic inspiration. In particular, Skerlić denounced aestheticism, which he perceived as an expression of decadent individualism. He advocated instead the social and national function of literature, as well as the role of the artist as the leader of national awakening. Folk culture was perceived by the ‘Progressive Youth’ to be at the root of national mentality, as it was uncorrupted, in their view, by German and Magyar influence. Skerlić, therefore, pleaded for a popular literature which would tap into folk culture and, at the same time, shape it according to the dictates of the national spirit. 10The article ‘Art and nationalism’ presented here summarizes the arguments which Matoš used to contest the views of Skerlić and Marjanović. It was written when the claims for the pro-Yugoslav role of art reached its peak due to Serbia’s political agitation on the eve of the First Balkan War (1912). Matoš believed that his opponents’ claims about art neglected its aesthetic essence. He, instead, saw the national role of literature in the expression of the autonomous aesthetic sensibilities of the individual. This view is informed by Maurice Barrès’s conception of national character as the cumulative achievement of talented individuals grounded in tradition. Matoš refused both the notion of “autonomous folk spirit,” as well as the ethnic idea of the nation. Hence, he rejected the concept of Croat–Serb national oneness, grounded in the idea of the linguistic and ethnic sameness of the South Slavs. Inspired by the original Stranka Prava idea of the Croatian political nation, Matoš located national identity in its historical-political traditions, which, he argued, constituted the basis of national mentality. As he regarded traditions to be to some extent the result of foreign influences on national life, Matoš advocated Croatian receptiveness towards the influences of foreign cultures. He claimed that the artist should always adapt foreign influences to the mentality of the nation, thus elevating national culture, even if the people were unwilling to accept these appropriated ideas. The only case where Matoš made an exception was the German one, since he was afraid that the ongoing process of Germanization would finally destroy the Croatian national mentality. In fact, Matoš’s discourse testifies to the ambivalence of aesthetic modernism, which was also witnessed by the ‘rationalist positivism’ of Skerlić and Marjanović. Under the influence of Barrès’s earlier writings, Matoš contested the mediocrity and anti-religious materialism of bourgeois society, whose incarnation in Croatia he had found in the political circles of the ‘Progressive Youth.’ Instead, he emphasized the idea of the Croatian soil and the notion of aristocratic personality, embodied in the historical tradition of Croatian nobility. However, Matoš did not follow Barrès’s later shift toward the anti-democratic organic perception of society and toward imperialism, remaining a strenuous advocate of democracy, which he perceived as having been corrupted by the oligarchic ruling classes. 11During socialist Yugoslavia, ‘Art and nationalism’ was interpreted as an appeal for the autonomy of art and literature. However, in the 1990s, the text was reframed in the overall interpretation of Matoš as the apogee of Croatian liberal nationalism, opposed to the prevailing Yugoslav idea. Hence, the text was read as the expression of the liberal-democratic conception of the role of literature in the nation-building process. Art and nationalism • 1 Branimir Wiesner-Livadić (1871–1949): Croatian literary critic and theoretician. One of the most p (...) 13Discussing recently nationality and art in the journal Savremenik, Dr. B. Wiesner Livadić1 complained about exaggerated nationalist tendencies in our art criticism and—as is usually the case—he is and is not right. Our criticism really is too nationalistic when it evaluates works of art through a purely or even a party nationalistic-oriented lens (which seems to be true in most cases), and is not nationalistic enough because in its analysis of art for people’s sake, it does not question whether the artist is in accordance with the soul and style of the people. This is because an artifact is only an expression, a symbol of specific features of a complicated and mysterious but uniform and individual psyche of the people. Notwithstanding Mr. Wiesner Livadić’s standpoint, Hamlet is an Englishman as are Shakespeare’s other protagonists: an Englishman by virtue of his spleen, his humor, his Puritanism and his canto. All real art is national simply because international art cannot exist since there is no international artistic expression: an expression that would be understandable to the same degree to all nations around the world and that would not have a national genesis. 14Not all forms of art are national in the same way. Literature and poetry are the most national forms because they are connected to national languages. Music, architecture and plastic arts are not so much determined by expression, but are, as literature, an expression of a special national character and soul. It is true that some styles of architecture (Classical, Romanesque, Gothic) have become international, but they originated as national. Nationalism and internationalism are not contradictory terms in art as they are not always contradictory in politics. 15Since each great work of art which is primarily a national product can always become an international commodity, artistic nationalism (unlike political nationalism) does not imply negation of foreign values. On the contrary, it is exactly the richness and diversity of various national cultures which represent a precondition for a major symphony of the comprehensive international development. Today, Europe is more cultured than in the era when it had to have just one language and one style. Since each nation represents a string of the national lyre of humanity, each representative of the specific national soul is, accordingly, also a representative of humanity. Molière, Dante, Goethe, major poets and artist are bearers of the genius of their race. Only as such could these crystallized national souls have become lighthouses of humanity. 16This national moment in art was established long ago, and Taine has tried to systematize it in his theory, according to which an artist and a work of art are the result of race, milieu and moment, in other words, primarily national circumstances. Leaving aside to what extent this method is correct for analyzing an artist as a member of a society and insufficient for establishing all that is individual, special, distinctive and unique in an artist, there is no doubt that a work of art can be national even if it is not a result of national influences. A work of art is not the simple result of the social action of an artist, but an expression of his reaction. 17An artist is not merely a consequence but is, at the same time, the cause of social influences. Accordingly, the greater the artist, the greater the discrepancy among these influences. Hence, we could say that a great artist is the one who has influenced people more than people have influenced him. Consequently, a national artist can be a representative of national opinion and feeling, but can also be a reaction against such ideals and tastes of the people. Moreover, he will remain national because he is that nation for the simple reason that he is a member of that nation. Edgar Poe was against all American values of his age. He was a visionary in contrast to utilitarianism, an idealist in contrast to positivism, and an aristocrat in contrast to American democracy. He died without being understood by anybody, but he has still become the most national American writer with pure American values such as originality, the desire to bluff, a sense of the unseen, a bizarre, utmost individualism, and a sense for technical and scientific development. Popularity does not equal nationality. Goethe was not popular. The nation is an artist only via its individuals, frequently unknown and unacknowledged. The nation as a collective is a barbarian. Folk songs have not been made by a nation but buy an unknown individual and the value of a nation is measured in the extent to which production of better individual values is higher. There are souls that contain the national soul of the whole nation, yet there are nations without a national soul. 18The Croatian nation has had such periods among its unintelligent intelligentsia. An artist can be more national that the nation itself because he is the expression of the emphasized features of the national temperament. 19Hence, every art is national and demanding art to be national equals demanding ice to be cold or fire to be hot. 20Since every nationalism is a form of fight, art also participates in that fight either directly or indirectly. Art is also a form of dominance, conquest, international cultural conflict, it is an expression of vitality and living national ability, and a form of resistance of the national soul, but only as long as it remains pure art, as long as it is not biased by serving inartistic purposes. Shakespeare has conquered Europe. He has done more for spreading the English language than all the English admirals and politicians put together. He has been the most important vehicle for spreading English nationalism not because he is the greatest English nationalist, but because he is the first playwright of modern humanity. The Italian plastic Renaissance has not conquered the world because it is nationalistic, but because it has become the model for humanist beauty as the most refined form of the Italian soul. 21French literature could not have conquered Europe before and after Napoleon if it had only spread the ideal of French nationalism. Its major impact occurred exactly at the time of the French classicist authors and the Encyclopaedists, in the era of Racine and Diderot, when there was practically no nationalist thread in French writing. Among the German writers who have contributed most to the spreading of the German spirit and thought, and accordingly to the indirect spread of German nationalism, are exactly those souls who have challenged German nationalism: writers such as Goethe, Heine, Schopenhauer and Nietzsche. In other words, every major art is patriotic, but a major artist need not be a patriot. 22Recently nationalism has been replaced by patriotism, so since every great art is supposed to be nationalistic, now it is demanded that all art should be patriotic. This does not only mean demanding from art, which primarily represents a free expression of beauty, to be biased and inartistic, but it also means limiting the emotional means of artistic expression. This is as if Liszt or Paganini were not allowed to use more than one musical scale. The artist successfully presents life and humanity in its totality and affects the whole being of the man because he refers to the total human sensibility and the totality of the soul in which patriotic impulse is just a single note, a single string. Accordingly, art that is only patriotic only fulfills a small, minimal need of our emotional life. Poets who are only patriotic are minor poets, but, in this respect, we should not confuse poets of freedom with patriotic ones, because the homeland and nation can be the very negation of true freedom without which there is no art. The whole England rose against Byron, and Heine is not highly regarded by a huge number of Germans. 23Recently there have been nationalist, patriotic doctrines that, ostensibly in the interest of the pure national style, are against all non-national artistic influences, as if there were such thing as pure national art and a racially pure and unique nation. The basic motifs of folk poetry are the same all over the world. There is no such thing as authentic folk poetry as there is no such thing as authentic aesthetic poetry. Hence, to preserve folk tradition means to remain under external and extra-national influences which contributed to the very creation of the tradition. Basic emotions such as fear, love, religious ecstasy, courage, etc., as well as aesthetic needs are the same among all peoples, which means that the content of art is mostly the same and what changes is its form, its expression to determine a specific national soul. Hence, it is completely irrelevant whether the content of art is developed under national or extra-national influences. All Indo-European and Arian tribes share the same mythos in their folk tales. Shakespeare used plots from all literatures and Hamlet was written under the influence of Montaigne’s philosophy; Corneille was a pupil of the Spaniards, Racine was influenced by Euripides, the French classicist authors were pupils of classical antiquity, the romanticists were under the influence of German and English literature, and yet nobody will dispute the purely national features of the poetry of La Fontaine and Musset. The Russian novel developed under the influence of non-Russian literary movements, but still bears a measure of Russian nationalism because each non-national term can be transformed with a retort of a strong national artistic temperament into a new national artistic value, a new expression. 24The strongest and the most vital are those artistic cultures that are—as is the case of Goethe—available to a growing number of influences, giving them forms of specific national expression because the content is subordinated to the form since the latter represents just a new modification of the former. Accordingly, imitation, a mere appropriation of foreign artistic models, is superfluous because it represents repetition and not analysis, a formality and not experience, a mere copy and not creation—as is the case with many of our ancient Dalmatian books. Our art will become national when it becomes European, i.e. when it will reflect authentic Croatian expression, a special national form of the spirit filled with European contents. Only the weak spirits—as a weak economy—are afraid of foreign competition, which is why they use protectionist methods of exclusive nationalism. 25There are strong artistic temperaments which use powerful patriotic feelings to evaluate domestic and undermine foreign art. Dostoevsky admired only that which was Russian. During his travels, he belittled Paris, Italy and Germany in comparison to Russia. Gogol, too, turned into a chauvinist of a similar kind, but it was exactly these two authors that depicted Russia as hell. The same kind of exclusive nationalism has recently appeared in the most cultured of nations, but only as a consequence of antinational and even inartistic imported doctrines. Kipling is an imperialist as is the former socialist D’Annunzio. 26Barrès and Maurras in France fight against collective, antinationalist tendencies and German cultural influence because this German influence on a higher French culture and art can only seem inferior, hence destructive. Major national cultures such as the French and English ones can be exclusively national; they can build the Great Wall of China around themselves because they are the leading cultures of the world. However, they are still influenced by foreign cultures: Shaw by German and Russian culture, Rodin by Italian, while Beethoven’s music is all over Paris. 27If this is the case with major cultures, how can it be different with smaller nations such as ours since we cannot even imagine artistic national exclusiveness? 28Hence, our art shall become national in the proper sense of the word only when it becomes great, when it is written in a great and pure Croatian style. Our folk tunes have not been processed artistically and have not found their Chopin. • 2 Ivan Meštrović (1883–1962): the most outstanding Croatian sculptor at the turn of the century, pro (...) • 3 Robert Frangeš-Mihanović (1872–1940): one of the most outstanding pupils of Meštrović. 29Our painters are already studying the Croatian landscape, and our sculpture has found a new expression for historic heroism in Meštrović2 and new forms for our field work and our contemporary energy in Frangeš3. In literature, there is a growing awareness of the purity of the Croatian language and style. Our nation is among the first in Europe according to its artistic talent, mostly in poetry, music and the plastic arts, but we are hardly making ends meet in art because our own language and national life is in danger. These terrible conditions affect every Croat and, accordingly, every artist, the defender of the honor and destiny of his homeland because free national art can emerge only in a free homeland. It is the very need to establish free Croatian art that compels the artist to become first and foremost patriotic, and if our criticism warns our artists to fulfill this duty above all other duties, it does not breach the principles of free art, but does just the opposite: it defends them. 1 Branimir Wiesner-Livadić (1871–1949): Croatian literary critic and theoretician. One of the most prominent members of Croatian literary modernism in the 1880s and 1890s. He advocated the autonomy of art and cosmopolitanism, against tendencies that favored the instrumentalization of art for national purposes. 2 Ivan Meštrović (1883–1962): the most outstanding Croatian sculptor at the turn of the century, promoter of the “South Slav heroic racial soul.” Iva Polak (Traducteur) © Central European University Press, 2010 Conditions d’utilisation : Volume papier Rechercher dans OpenEdition Search Vous allez être redirigé vers OpenEdition Search
Important Questions Class 12 Economics Chapter 1 - Introduction to Macro Economics Important questions with answers for CBSE Class 12 Economics Chapter 1 – Introduction to Macroeconomics, which is outlined by expert economics teachers from the latest version of CBSE (NCERT) books. CBSE Class 12 Macro Economics Chapter-1 Important Questions Question 1 What is a good in economics a. It is a service. b. It can be a service. c. It is something that appears appealing. d. It is something that satisfies wants and needs. Answer: d. It is something that satisfies wants and needs. Question 2 What is export? Answer: Exports are the goods and services manufactured in one nation and bought by the residents of another nation. It does not matter what the good or service is. It can be shipped, sent by email, or carried in personal luggage on a ship or a plane. If it is manufactured domestically and traded to someone in a foreign country, then it is known as an export. Question 3 Who is called the father of modern economics? Answer: Adam Smith Question 4 Differentiate between microeconomics and macroeconomics. Microeconomics Macroeconomics The individual economic unit is studied. The aggregate economic unit is studied. It deals with ascertainment of cost price and output in the individual markets. It deals with ascertainment of general price and output in the whole economy. Here, the main issues are ascertainment of price and allocation of resources. Here, the main issues are ascertainment of income level and tackling unemployment in the economy. Question 5 What are Macroeconomics and Microeconomics? What is the association between the two? Macroeconomics, like a discrete part of economics, surfaced after the British economist, John Maynard Keynes issued and published his book, ‘The General Theory of Employment, Interest and Money in 1936. The ascendant thinking in economics before Keynes was that all the workers who are willing to work would find employment and all the plants (factories) will be functioning at their comprehensive capacity. This school of notion is known as the classical tradition. Microeconomics is a branch of economics that contemplates the attributes of decision makers within the economy, such as households, individuals, and enterprises. The term ‘firm’ is generally used to refer to all sorts of trade. Microeconomics is distinct from the study of macroeconomics, which considers the economy as an entity. Whilst these two studies of the subject economics appear to look different, they complement each other and are interdependent, since there are several overlapping issues between these two segments. For instance, raised inflation (macro effect) would be the reason for the increase in the price of raw materials. Question 6 What is entrepreneurship? Answer: The meaning of entrepreneurship includes an entrepreneur who takes actions to create a change in the world. Whether startup entrepreneurs solve an issue that many struggle every day and bring people together in a way no one has before, or build something revolutionary that advances society, they all have one thing in common: action. Question 7 A resource is, • Goods only • Services only • Goods or services • Neither goods nor services Answer: Good or a service Question 8 Cash paid against trade payable belongs to which of the following? a. No effect b. Operating activities c. Financing activities d. Investing activities Answer: b. Operating activities Question 9 The basic factors of production are land, labour, capital, and _____. a. Enterprise b. Investment c. Machinery d. Resources Answer: a. Enterprise Question 10 Positive economics states which of the following? a. What is supposed to be b. Central problems of an economy c. What is d. What will be Answer: c. What is Question 11 Define Great Depression. Answer: Economists usually attribute the beginning of the Great Depression to the sudden devastating collapse of the US stock market prices on October 29, 1929, known as Black Tuesday. However, a few conflicts have arisen and checked the stock crash as a symptom rather than a cause, which is known as the Great Depression. Question 12 Interest received on investment will be a. Added (Financing activities) b. Deducted (Investing activities) c. Added (Investing activities) d. Deducted (Financing activities) Answer: c. Added (Investing activities) Question 13 What is an import? Answer: An import is goods or services that are brought into one country from another. The word import is derived from the word ‘port’ since the commodities are often shipped via boat to the abroad countries. Along with the exports, imports form the backbone of international trade. Question 14 a. Financing activity b. Investing and financing c. Operating activity d. Investing activity Answer: d. Investing activity Question 15 What is the name of the John Maynard Keynes celebrated book? Answer: The name of the book is ‘The General Theory of Employment, Interest and Money’ which was published in the year 1936. Also Check: Economics MCQs 1 Comment 1. It’s an amazing app for students . It helps a lot 😊 in our doubts . Leave a Comment
Please note that links to the discussion no longer work directly. If this doesn't work, click here. Learn Write Read Home About Us Discuss Search Subscribe Contact by program area by region by category by recency United Nations and Culture of Peace Global Movement for a Culture of Peace Values, Attitudes, Actions Rules of the Game Submit an Article Become a CPNN Reporter Education for Conflict Prevention and Peacebuilding: Meeting the global challenges of the 21st century an article by IIEP-UNESCO This new publication from IIEP and UNESCO on conflict prevention and peacebuilding may be downloaded here. click on photo to enlarge Conflicts can have devastating effects on education systems and impair the ability of governments to provide quality education for their citizens. Yet, when governments and ministries of education analyse and anticipate the risk of such events through careful planning, education can play an important role in preventing violent conflict, and in supporting peacebuilding efforts. The paper describes a range of conflict prevention initiatives and examines the role of policy-makers, youth, women, and the media in maintaining and restoring peace as part of a holistic vision of education. International institutions, governments and civil society are increasingly developing conflict prevention mechanisms and utilizing political and economic incentives to avoid conflicts. The paper argues that educational planning must go beyond traditional mechanisms and take into consideration the unpredictable nature of our times, be flexible and rapid in implementation and responsive to local needs. Training and research in sustainable development; and skills for peaceful relations, good governance, the prevention of conflict and peacebuilding are among the priorities elaborated in the paper. In addition, specific recommendations are highlighted such as: capacity development for conflict prevention within the education sector and other ministries, analysing the root causes of conflict and the role that education can play in mitigating tensions. Included are contributions from Federico Mayor, Anwarul Chowdhury, Layashi Yaker, Rima Salah, Betty Reardon and others. The author, Phyllis Kotite, is an International Consultant and a former staff member of the United Nations at UNESCWA, Beirut. She has worked in: the Cabinet of the Director-General of UNESCO from 1989 to 1991; with the Executive Secretary of UNECA; and was consultant to the Commissioner General of UNRWA. She has also worked for UNEP in the Arab Region, UNICEF in New York, and as consultant to UNDP and other international institutions. She has undertaken missions in over 15 countries, and is the author of over 30 publications, articles and reports. Question(s) related to this article: What are the most important books about the culture of peace?, * * * * * Latest reader comment: Johan Galtung is indeed the most perceptive peace researcher of our time. Not only did he predict the fall of the Soviet Union quite precisely, but he has also predicted the fall of the American empire.  Here are excerpts from his 2004 article, On the Coming Decline and Fall of the US Empire The prediction of the decline and fall of the US Empire is based on the synergy of 14 contradictions, and the time span for the contradictions to work their way through decline to fall was estimated at 25 years in the year 2000. There are more contradictions because the US Empire is more complex, and the time span is longer also because it is more sophisticated. After the first months of President George W. Bush (selected) the time span was reduced to 20 years because of the way in which he sharpened so many of the contradictions posited the year before, and because his extreme singlemindedness made him blind to the negative, complex synergies. . . . Here is the list of 14 contradictions posited in 2000: I. Economic Contradictions(US led system WB/IMF/WTO NYSE Pentagon) II. Military Contradictions (US led system NATO/TIAP/USA-Japan) 4. between US state terrorism and terrorism: Blowback 5. between US and allies (except UK, D, Japan), saying enough 6. between US hegemony in Eurasia and the Russia India China triangle, with 40% of humanity 7. between US led NATO and EU army: The Tindemans follow-up III. Political Contradictions (US exceptionalism under God) 8. between USA and the UN: The UN hitting back 9. between USA and the EU: vying for Orthodox/Muslim support IV. Cultural Contradictions (US triumphant plebeian culture) 10. between US Judeo-Christianity and Islam (25% of humanity; UNSC nucleus has four Christian and none of the 56 Muslim countries). 11. between US and the oldest civilizations (Chinese, Indian, Mesopotamian, Aztec/Inca/Maya) 12. between US and European elite culture: France, Germany, etc. V. Social Contradictions (US led world elites vs the rest: World Economic Forum, Davos vs World Social Forum, Porto Alegre) 13. between state corporate elites and working classes of unemployed and contract workers. The middle classes? 14. between older generation and youth: Seattle, Washington, Praha, Genova and ever younger youth. The middle generation? 15. To this could be added: between myth and reality. This report was posted on January 22, 2013.
01 / 13 / 2022 Marine plants, either marine algae or seaweeds, were part of the daily diet of our ancestors and have been consumed in different parts of Asia for centuries. Although plants like kelp, nori, dulce, and spirulina are more commonly used in sushi, Asian soups, snacks, or seasonings, there are many other varieties of sea plants packed with important nutrients. These sea vegetables absorb beneficial nutrients from the ocean and are very good sources of protein, fiber, healthy polyunsaturated fats, antioxidants, and vitamins and minerals. For example, after iodized salt they are the second richest source of iodine, and it is well known that iodine is critical for a healthy thyroid gland. Thyroid hormones - thyroxine (T4) and tri-iodothyronine (T3) - play a vital role in growth and development of the body and in regulating various metabolic processes, including basic metabolic rate, healthy functioning of the brain, heart, immune and digestive systems, and building strong muscles and bones. Two sea plants which contain critical nutrients for overall health are Irish moss and bladderwrack. 12 / 16 / 2021 In addition to the continuing COVID-19 pandemic and the omicron wave, the flu season is also upon us. As we have already learned, the RNA/DNA vaccines have severe limitations in preventing coronavirus infections, emerging viral mutants and their spread, and seasonal anti-flu vaccines cannot keep up with the viral mutations. It is difficult to protect ourselves from every single infectious agent unless our own immunity is strong. Most of the antivirals weaken the immune system and cause other side effects. It is critical to address the fundamental mechanisms of infection and increase the immunity of the human population. 11 / 05 / 2021 Diabetes is the one of the fastest growing non-communicable diseases worldwide. It is associated with high blood sugar levels, which increases the risk of cardiovascular disease and kidney problems. It increases one’s risk of serious COVID-19 outcomes, as 40% of people who have died of COVID-19 also had diabetes. Currently, 1 in 11 adults in the world has diabetes, and it is estimated that by 2050 almost 1 in 3 people will have diabetes or pre-diabetes. More than 34 million Americans have diabetes and 7.5 million have pre-diabetes. With such staggering statistics, the National Institutes of Health (NIH) has declared November as Diabetes Awareness Month to prevent and effectively manage this disease. 10 / 01 / 2021 Despite availability of vaccines, more than 2000 people die every day in the US alone due to COVID-19 and approximately 133,000 new cases are reported daily.1 Currently, more than 182 million Americans, or 54%, are considered fully vaccinated against SARS-CoV-2, and approximately 64% of the population has received at least one vaccine dose. However, reports indicate that vaccine efficacy reduces with time and booster doses are now recommended despite a lack of unity from the FDA and CDC experts in accepting this step. Moreover, new variants of the coronavirus further complicate the picture, and “breakthrough infections” in the fully vaccinated are on the rise. This situation calls for the revision of current approaches and incorporation of innovative health strategies that are effective, economic, and accepted by the majority of people worldwide. 02 / 04 / 2021 09 / 18 / 2020 09 / 04 / 2020 Here we outline the health benefits of key phytobiological components: 08 / 19 / 2020 08 / 08 / 2020 07 / 16 / 2020 Page 1 of 2
What Are Terrible Operators inMathematics? </p h1 Exactly Are Logical Operators inMathematics? Which Exactly Are Legitimate Operators inMathematics? There is A well-designed personal computer system application really a logical individual, as opposed to a poorly constructed 1. The current illogicalities taken off, although A program that is logical has every one of the centers of logic. This means it is created for that incorrect causes and results in as much more intelligent than it actually is that. Math is like this. The logical operators in math are specially designed so that they function to the appropriate purposes of the rationale mathematical operators. Logical reasoning mathematics takes the illogical college papers out of mathematics. Instead of providing the illogical computations, a logical machine works for the correct reasons of the logical reasoning. Rational mathematics isn’t working against logic; it is working for logic. Like it or not, logic and reason are all elements of reasoning. Logical mathematics requires a process of thinking than the manner logic is presumed. The machine must be prepared into some of mathematics equations and then require people math equations to be resolved to get the results that the mathematics equations were meant to offer. Logic is only a portion of logic reasoning, while math would be the whole story. Leave a comment Copyrighted Image
Designing an Autonomously Platooning Golf Cart for Short Distance Campus Travel; An Exploration of the Influences on the Integration of Unmanned Robotics into Law Enforcement Breza, Gregory, School of Engineering and Applied Science, University of Virginia Unmanned and autonomous robotics are a rapidly developing industry that has been circulating beyond the traditional manufacturing robot into countless aspects of people’s daily life. The technical research project focused on developing a platooning system for a pair of golf carts. Platooning is a simplified method of implementing autonomy in vehicles by having the autonomous vehicle follow a manually driven vehicle. This platooning system is important to refine because by reducing the amount of autonomous capability required for functionality, it is a useful step in the process of developing the technology for fully autonomous vehicles. While developing new technology is important, it is also important to understand how similar devices are currently being used, and how people are reacting to them. In robotics it is especially important to consider the potential outcomes of a technique as it is implemented because it is removing a potential safeguard by automating processes that were previously done by humans. The STS portion of this research project focused on the approaches various groups have taken to integrate unmanned robotics into law enforcement, and the reactions of various groups to those attempts. Platooning is an important technique for creating fully autonomous vehicles. By having a manually driven vehicle guide one or more autonomous vehicle, it simplifies the amount of decision making needed from the autonomous vehicle. It also has noticeable advantages over manually operated vehicles because it reduces the risk from human error while driving, increases traffic flow, and decreases fuel consumption. This technical project focused on developing the platooning system by tracking the motion data of the braking, acceleration, and steering for the lead vehicle and transmitting it to the follower vehicle. That information was then corrected by tracking a series of heat lamp bulbs on the lead vehicle using an infrared camera on the follower, which was processed to get the distance between the two vehicles. The distance between the two vehicles and the motion data from the lead vehicle were then combined by using a particle filter to track the motion of the leader and follower vehicles over time. A particle filter works by taking the current sensor data and matching it with which positions in the environment could lead to that sensor output. Then, after a time step, the next batch of sensor data is matched again, but it also uses the previous step’s estimate to find the new matching positions that would be reachable over the length of the time step. The STS research project worked to answer the question of what factors influence the success of attempts to integrate unmanned robots into law enforcement. There have been several projects aiming to use robots in policing that failed or had limited success due to failing to consider a broader perspective beyond the technical problem. Law and Callon’s Actor-Network Theory was used to demonstrate some alternative perspectives that could be utilized and the influences that these perspectives highlight. This paper analyzed the implementation of robots in law enforcement with an emphasis on the design, the marketing, and the legality of the project. These categories were explained through comparative analysis of case studies from attempts to integrate robots into law enforcement that had similar goals, but differing approaches. The cases in the design section emphasized the importance of understanding the desires of the intended user because while one project created a more technologically complex device, the other group interacted with law enforcement officers to better understand what features were important. The marketing section compares two groups that tried to make use of patrol robots with one that focused on maximizing the utilization of the robot, while the other also prioritized gaining the surrounding community’s support and trust. This trust was vital when the project faced setbacks because people still thought positively of it the attempt, while the first case faced public disapproval without any actual failure in its duties. The legality section differed from the other two because it broke down the theories of legal scholars on how robots in law enforcement will affect the relationship between law enforcement and society. Overall, these attempts show that there is not a singular path to making a project succeed, but it is important to consider the people who will be using law enforcement robots and the broader community they will be integrated into. BS (Bachelor of Science) Actor-Network Theory, Robotics, Autonomy, Law Enforcement School of Engineering and Applied Science Bachelor of Science in Mechanical Engineering Technical Advisor: Tomonari Furukawa STS Advisor: Catherine Baritaud Technical Team Members: Janani Chander, Sara Khatouri, Zach Kim, Charles Rushton, Harjot Singh All rights reserved (no additional license for public reuse) Issued Date:
Energy Demand Clashes with Restrictive Regulations Wed, 02/19/2014 - 10:12 There is no single recipe that is certain to strengthen a country’s renewable energy sector. Each country presents particular social, cultural, economic, physical and regulatory traits which require a tailor-made regulatory framework and planning. Emerging economies and developing markets that possess the quantity and quality of resources needed for renewable energy development often lack a clear regulatory framework, long-term policies, or even the needed infrastructure to ensure smooth progress for sector. A murky framework does not necessarily stifle the expansion of the industry but does make growth harder, riskier and more uncertain. Mexico is unique in its regulatory and cultural traits. Schemes that found success in Brazil or China would not have the same effect in Mexico. Any Mexican framework would have to contend with the country’s size, geographical position, diverse communities and regional conditions. Furthermore, the constitutional and regulatory implications of the energy sector are quite particular in Mexico. The constitutional conceptualization of public goods and energy resources stems from the actions of President Lázaro Cardenas in 1938 which led to the creation of two state monopolies: CFE and PEMEX. As a result, the Mexican government is the only party that can be involved in so-called strategic areas of the energy sector. Another particular challenge facing the market is the regulation concerning usage rights and land ownership. These regulations also derive from historical events, starting with the Reform Laws promoted by Benito Juárez more than 150 years ago. The reform in 1922 established the concept of ejidos, or communal lands, to protect indigenous communities and their property. But as the lack of a clear framework was not resolved, the ejidos have become places where rights of ownership or land usage remain uncertain. The energy regulatory framework in Mexico is full of provisions which can act as barriers to growth. CFE has a monopoly over the provision of electricity as a “public service” and handling transportation, which necessarily implies the building and designing of grid infrastructure. This presents issues for CFE and for project developers alike. Many sites are located far from the grid, greatly raising initial project costs, with many becoming downright financially unfeasible. At the same time, CFE needs to considerably expand its grid infrastructure in order to sustain further economic growth. However it lacks the resources – both human and economic – to facilitate such growth in tandem with meeting growing energy demand. To deviate from the restrictive regulatory framework, the Open Season scheme was created. This public bidding process invites private interests to pay for the expansion of transmission infrastructure that CFE will eventually build and own. This process aims to develop projects that would otherwise not be financially viable for CFE to carry out alone. The self-supply scheme can only provide growth under certain conditions and is principally an option for large companies that can afford to invest millions of dollars to secure a source of renewable energy. Unlike some European countries, where feed-in tariffs and subsidies have played an important role in the development of the renewable energy sector, the growth of the Mexican wind energy industry has been driven by market forces. However, the private sector is seeking for the Mexican government to support growth via a scheme that works around existing restrictive regulations, allowing for expanded infrastructure and the creation of a longterm planning strategy. The establishment of such a longterm plan would help to speed along the creation of a local supply chain. However, without guarantees about enforcement, it might not be enough to spark confidence in continued government support of the industry or dispel uncertainty regarding future growth. Fortunately, Mexico’s GDP is expected to grow at more than 3% in 2014, a rate that is expected to continue matched or exceeded in the years ahead. In order for this to happen, the energy supply needs to be guaranteed in the medium and long-term. Relying solely on hydrocarbons is neither secure nor wise, given that Mexico has already become a net importer of natural gas and can support its energy independence by transitioning towards a low-emission energy industry. Therefore, ensuring the growth of viable and competitive renewable energy sources is destined to be one of the pillars of Mexico’s sustainable economic development.
Experimentation with resource constraints Greg Novak, Sven Schmit, and Dave Spiegel - San Francisco, CA A thought experiment: squirrels Suppose a group of squirrels is considering two possible strategies to survive a harsh winter: either (A) gorge themselves on acorns in the fall and try to make it through the winter on whatever they can find, or (B) bury some acorns in the fall which will then be ready to be dug up in the winter. Having read a bit about data science, they might choose to A/B test these strategies, randomizing squirrels into two groups. Of course, if the squirrels are sharing the same part of the woods, we can immediately see which group will have a better chance of remaining well fed until springtime — the squirrels of group A with their “greedy” strategy (always optimizing instantaneous rate of calorie consumption) get to stuff themselves all autumn long without setting aside any nuts for the future and continue the eating through the winter by digging up the nuts from their thrifty buddies in group B who have saved acorns throughout the forest floor 1. Group B has a strategy that actually might be superior if it were rolled out to all squirrels, but if they share the same region as group A, their sacrificing some feasting in the fall won’t lead them to be any better off in the winter. In contrast, if the two experimental groups were placed in separate forests, they would get a better measure of what it would be like to roll out a strategy for all squirrels. Maybe strategy B — saving some acorns for later — is better for squirreldom than greedy strategy A, and maybe not; but the only way an A/B test could possibly reveal B as the winner is if the two groups are not competing for the same underlying resource. Thus, the randomized assignment of squirrels to the two strategies is not good enough; we also have to ensure resources of the two groups are independent. The importance of getting experiments right For squirrels, storing acorns is an arduous task. Likewise, creating a new feature or algorithm, setting up a test, and running an experiment is often equally hard work. While it’s not a life-or-death situation for most data scientists, we are still motivated to ensure that our results are correct and that we make optimal business decisions. Beyond a particular experiment, a data-driven culture requires buy-in across the wider organization, and, by arriving at demonstrably correct decisions, we maintain organizational trust. To this end it’s very important that we identify ways that experiment results can be incorrect in that they don’t indicate what will happen when a change is rolled out fully. One way that experiments can produce erroneous results is when experimental units are not independent, e.g. due to resource constraints, or a network structure. We explore those problems in this blog post, and discuss in particular how we at Stitch Fix have built a solution based on our own unique situation, which we call the virtual warehouse. Experimentation and resource constraints The basics of an experiment Suppose there are two variants, let’s call them variant A and B, of an experience (a website layout, an algorithm, etc) and we wish to know which one performs best according to some metric we care about (conversion, revenue, client feedback). To that end, we would like to estimate the values of the metric in the case we roll out variant A and when we roll out B. Then we could compare the two and make a decision about which variant to use. The standard A/B testing approach would be to assign half the experimental units (such as users) to variant A and the other half to variant B. When the experimental units are independent, we can estimate the relevant metric on the two groups to compare and finally make a decision. One of the central assumptions that underlies this approach to making decisions is that the outcomes we observe during the experiment accurately reflect what would happen when either cell is rolled out to all users. However, different business models and companies face unique challenges for which the above assumption breaks down, because naive randomization does not accurately reflect what would happen if one of the variants is fully adopted. Let’s discuss a few contemporary examples Network structure Network structure is a well studied example of when issues arise. The classic example is testing a video chat feature in a social network. If we naively randomize users into “access” and “no access” groups then we will have awkward situations where you have access to video chat but the friend with whom you want to chat does not. One solution to this problem is to find dense clusters in the network and randomize the clusters. In this way, it’s likely that either all friends have access to video, or none of the friends do [1, 2, 3]. Two sided markets Another set of issues arise in two-sided markets, such as ride-sharing and short-term rentals. Consider an experiment on one side of the market — in this case, one variant of the experiment may affect the other variant through its effects on the other side of the market. To make this a bit more concrete, suppose that the intervention favors the most profitable matches; then the treatment cell may gobble up all of those matches quickly, leaving the control cell to deal with less profitable matches. This might make the treatment cell look really good when compared to the control, but once it is fully rolled out it has to compete with itself rather than the control cell and the gains could vanish. To deal with this issue, companies such as Lyft and Uber have proposed crossover experiments: rather than randomly assigning units to variant A or B for a fixed amount of time, all units are assigned to one variant for some amount of time, and then we crossover to assigning all units to the other variant. This process can be repeated multiple times [4, 5, 6, 7]. Of course, depending on the time-effects on the system, there may still be some interference between the two variants in crossover effects, as it takes a bit of time for the system to reset to its equilibrium under the new variant. To combat this effect, one could ignore data right after the crossover until the system has settled again. Resource constraints Issues arising from resource constraints are closely related to those in two-sided markets; the resource constraint ties the two experimental variants together just like the other side of a two-sided market does. In our case, the resource constraint is inventory, though other constraints are also possible, such as monetary ones. To make it more clear: if we decide to add a piece of clothing to a shipment of one client, say under experimental variant A, that particular item is no longer available for future clients, both in variants A and B: whether this is consequential depends on how many other similar items we have in inventory. That it impacts other clients in condition A adds a dependency between observations but this is not the primary concern (in fact, we do want to understand the impact of this dependence). The more problematic aspect is that clients in condition B are also affected, but these should really be independent from those in variant A. That is, we face exactly the same problem in a single warehouse as the squirrels do in a single forest. Building a second warehouse next to our existing one is rather expensive, and geographical differences make it difficult to compare across different warehouses we operate. In our case, a crossover design does not work because the effects of selecting an item are not short-lived; inventory evolves slowly and thus settling into a new equilibrium after switching to another variant would take a prohibitively long time. So much time that unrelated factors may affect relevant metrics more than the effect from the differences between variants! For example, you can imagine people spending more on clothing in winter because jackets are more expensive than t-shirts. trend changes Treatment can affect the outcome directly, or through inventory. Without a virtual warehouse, the latter effect is not contained to the treatment, leading to bias. The virtual warehouse Instead of a cross-over experiment, we use what we call the virtual warehouse to deal with the interference issues from inventory constraints. Recall that we’re considering two variants of an experience — in our case, this might represent versions of a recommendation algorithm. The main idea of the virtual warehouse is simple: we enforce inventory constraints on each variant, cutting the dependence through inventory. In the simplest case, suppose we have 100 identical shirts and two variants to test. Instead of allowing each variant to access however many shirts it is capable of using, we limit each variant to 50 shirts. Of course, in practice it gets a bit more complicated; during the experiment new merchandise arrives in the warehouse, and inventory can be assigned to clients that are not part of the experiment at all, but that simply adds some accounting complexity. Recall the key property we are aiming for: for each variant, we want to simulate what would happen if it were rolled out across all users, which means we need to ensure the variants do not influence each other. With the virtual warehouse, both the direct treatment effect, as well as the indirect effect due to changes in the inventory equilibrium, are properly separated between treatment and control. trend changes Beyond accounting, there are other complexities. First of all, by splitting the inventory, we are more susceptible to variance due to the square root law of inventory. Secondly, it’s not immediately clear whether it’s possible to run multiple experiments using virtual warehouses at the same time. These topics are out of scope for this blog post, but it is clear that, just like with network clustering and crossover designs, there are downsides to virtual warehouses. At Stitch Fix we have learned that aiming for perfection is not possible when it comes to experimental design, but we can optimize across trade-offs, and the virtual warehouse is a great mechanism for doing so. Testing inventory strategies with a Virtual Warehouses So far, we’ve presented the virtual warehouse as a technique for improving the treatment effect estimates and to make better decisions. However, this is not its only benefit. Instead of changing the “treatment” in the form of personalized ranking or curation algorithms, we can leave the treatment identical but change the underlying inventory. In other words, so far, we have treated the inventory as a nuisance variable which, if we don’t handle it correctly (via virtual warehouses) can ruin inferences about something else that we actually care about (e.g. the ranking algorithm). But inventory is much more than that! It is crucially important in its own right. Getting our inventory to match our clients’ preferences vs getting it wrong can mean a huge difference in how happy our clients (and our company bank account!) are. Reflecting this importance, we have both a large merchandising organization, and a team of over 30 (of our 130+) data scientists optimizing various aspects of the “inventory side”. And the virtual warehouse can help us figure out how to get our inventory right. In general, finding optimal strategies to inventory problems is challenging. Without a virtual warehouse, it’s hard, if not impossible, to run standard experiments, pitting one strategy against the other and comparing client outcomes; our ultimate metric. But the virtual warehouse enables us to run experiments by creating different inventory conditions virtually. Similar to the above example with 100 shirts, if we have 100 identical shoes in our warehouse, we could split them 50/50 in the virtual warehouses, but we can also divide these 70 to virtual warehouse A and 30 to virtual warehouse B. For a single model of shoe, this might not seem very compelling, but at a larger scale one can imagine rather interesting experiments. For example, what would the impact be on clients and business metrics if we had twice as many shoes in our inventory? Or what is the right amount (as measured by client metrics) of “fall colors” clothing to have in the inventory during the autumn? Or how would the business perform if we had some “loss leaders” in the inventory? Or should we add more depth of our best styles or more breadth of different styles? For the first time in retail history, we can actually answer these questions causally. If we run a simple split of our inventory into two variants, however, (i.e., if we run a standard “A/B” test) then neither of the experimental variants matches the overall inventory distribution of the company — one variant is skewed in one direction and the other variant is skewed in the other direction from our overall inventory position. We leave as an exercise for the reader the problem of how to use virtual warehouse technology to enable tests of inventory strategies that include a true Control, so that we can compare not just “skewed-one-way” vs “skewed-the-other-way” but also compare to what we’re actually doing as a company. We’ll go into more detail on this and other virtual warehouse implementation topics in a future post. When it comes to experimentation, different business models face unique challenges that require thinking beyond the simple randomized control trial to inform decisions critical to the success of companies. At Stitch Fix, we are no exception. Inventory constraints create an undesirable link between observations under different experimental variations. To deal with this, we use the virtual warehouse to split the inventory virtually across variants of an experiment. Furthermore, virtual warehouses also make it easy for us to test different inventory management strategies empirically. [1] J. Ugander et al. - Graph Cluster Randomization: Network Exposure to Multiple Universes [2] D. Eckles et al. - Design and analysis of experiments in networks: Reducing bias from interference [3] S. Taylor and D. Eckles - Randomized experiments to detect and estimate social influence in networks [4] N. Chamandy - Experimentation in a Ridesharing Marketplace [5] D. Kastelman and R. Ramesh - Switchback Tests and Randomized Experimentation Under Network Effects at DoorDash [6] R. Johari et al. - Experimental design in two-sided platforms: An analysis of bias [7] Bojinov et al. - Design and Analysis of Switchback Experiments 1↩ For the sake of this toy model, we imagine that squirrels find buried acorns in the winter by some combination of scent and digging randomly (even though recent research indicates that in fact they at least partly remember where they buried them). In other words, when they share the same forest, squirrels in group A have just as much access to the acorns that group-B squirrels buried as those in group B have. Tweet this post! Post on LinkedIn Come Work with Us!
Softwood Lumber & Plywood Glossary of Common Lumber Terms A B C D Grades of softwood veneer which are combined in the manufacture of plywood. The best grade is A, the lowest D. Most thicknesses of plywood, when laid up, contain layers of various grades. African Mahogany A reddish brown, moderately soft wood used in cabinets, furniture and door/window manufacture. Most comes from Nigeria. After Date of Arrival (ADA) A credit term designation that the invoice on an order is not due until after the shipment arrives at the customer’s destination. After Date of Invoice (ADI) A credit term used to define conditions of sale. Certain discounts are often granted for payment within a specified period ADI. After Deducting Freight (ADF) A credit term used in defining terms of payment of invoices. Certain discounts are allowed after a freight allowance is deducted. Air Dried Seasoned by exposure to the atmosphere, under cover or open to the elements, without artificial heat. Alder A tree or shrub related to the birches, preferring wet areas. Red Alder is a commonly used West Coast specie, a deciduous tree of the Pacific Northwest, having pinkish-brown wood that is typically used in interior finishing, cabinetry, and furniture. All Heart Lumber having all heartwood (portion of the tree contained within the sapwood). Alpine Fir Sometimes referred to as Subalpine Fir, it is a species included in the White Wood grouping. American Lumber Standard (ALS) A voluntary product standard developed by the National Bureau of Standards in cooperation with consumers, architects, distributors, and producers/manufacturers. It establishes the methods of testing, grading and marking of products, the technical requirements, and the dimensions for lumber produced. Annual Ring The layer of growth added to the circumference of a tree in one year. Anti-Stain Treated Wood product treatment with any of various chemicals to retard staining caused by fungi or exposure to weather. APA Trademark A registered trademark of the American Plywood Association. It signifies that a panel has been manufactured under their quality supervision and testing guidelines. Aspen Any of several hardwood species of poplar whose wood is used for pulp, in the manufacture of OSB, roofing shakes, and light-colored lumber. Band Saw A saw consisting of a continuous piece of flexible steel used to cut logs into cants and to rip lumber. Bark The outermost layer of a tree. Basswood A fine-textured, softer hardwood specie used in cabinetry, shutters, and paneling. Birdseye A contortion of the grain in lumber in the shape of a small circle or ellipse, often resembling the eye of a bird. Often this feature is highly desirable for its aesthetic appeal or decorative effect. Blanked Lumber Lumber surfaced two sides to a size in excess of standard “dressed size” but scant of nominal size. It is usually intended for subsequent remanufacture. Blue Stain A discoloration of wood caused by a fungus in the deterioration process of a fallen log, usually occurring in the sapwood. It is a troublesome defect common in Ponderosa Pine logs during warmer months. Board Foot The basic unit of measurement for lumber. One board foot is equal to a 1-inch board 12 inches in width and 1 foot in length. For example, an 8-foot long, 1-inch thick and 12-inch wide board would equal 8 board feet. Nominal sizes are assumed when calculating BF (sometimes referred to as board measure, or BM). Bow Deviation flatwise from a straight line from end to end of a piece of lumber in an arching fashion. Boxed Heart A piece of lumber in which the pith, or heart center, is enclosed within the four sides of the piece of lumber. Bright Free of stain. Brown Stain A brown-colored discoloration of the sapwood of some pine, particularly Sugar pine, caused by a fungus that thrives in a moist condition with minimal air circulation. Bullseye Boxed heart. A timber or piece of dimension lumber cut so as to center the pith. Butt Joint An end joint made by simply joinng the square ends of two pieces of lumber or panel. Cant A large slab cut from a log at the headsaw, usually having one or more rounded edges, and destined for further processing by other saws. CD Exterior (CDX) A grade of plywood; the standard grade of plywood sheathing. The “CD” represents the grades of veneer used for the face and back, respectively. The “X” signifies that an exterior-type glue has been applied. However, despite the exterior-type glue, CDX plywood is classified as an interior type of plywood and is required to withstand only incidental exposure to the weather during construction. Checks A partial separation of veneer fibers, usually small and shallow, running parallel to the grain of the wood, caused chiefly by strains produced in seasoning. Clear Wood Wood that has no or very limited defects. In some cases, grading rules permit very small knots, pitch streaks or other minor imperfections. Close Grain Wood grain characterized by an average of about six, but not more than about 30, annual rings per inch on either end of a piece of lumber. Conifer Any of an order of shrubs or tress (such as pines) that usually are evergreen and bear cones. Core Gap A space between two adjacent pieces of crossband or other inner ply in a piece of plywood. Core Void Voids extending through the thickness of an inner ply, usually consisting of knot holes, worm holes, open splits and open pitch pockets. Minute beetle holes are not included in this category. C-Plugged A C-grade panel face or back that has been patched where there was a defective portion. Such a patch may be sound wood, but is likely to be a synthetic filler of fiber and resin to provide a sound, smooth surface. Crook Deviation edgewise from a straight line from end to end of a piece of lumber, measured at the point of the greatest distance from the straight line. Crossband A construction technique for plywood with five or more plies in which veneer is laid at right angles to the core and front and back faces. This increases the panel’s stability. The crossbands are the even-numbered veneers in such construction. Cross Grain An area in a piece of lumber in which the grain of the wood is distorted so that it runs across the piece from edge to edge rather than along the length of the piece. Often times the deviation of the grain may be around a knot. Cull 1. A tree of log that is less than one-third usable for lumber or plywood because of excessive decay or other defects. 2. Lumber of the lowest quality, usually below Economy of #5 grade, and must be sorted out. Dado A groove cut into one piece to accommodate another piece. A dado is three-sided and cut into a board, usually across the grain, as opposed to a rabbet, which has two sides and is at the edge of a board. Decay Disintegration of wood substance due to action of wood-destroying fungi, also referred to as rot. Defect Any naturally occurring imperfection, or condition of wood, including open checks, decay, shake, pitch, loose knots, open joints, etc., that would make lumber off grade or interrupting the smooth continuity of the surface in a panel product. Demurrage A charge assessed by a carrier for holding a rail car, truck, or ship. Dimension 1. In softwood, lumber from two to four nominal inches thick and two or more inches in width. Also referred to as framing, planks, rafters, and joists. 2. In hardwood, pieces cut to full-inch dimensions. Double-End Trimmed (DET) Passed through saws to be smoothly trimmed at both ends. Douglas Fir (Psuedotsuga menziesii) This softwood is found throughout the Western United States and Canada, but grows most abundantly on the western slopes of the Cascade Mountains in Northern California, Oregon and Washington. Prized for its strength, it is used in general framing construction as well as in finish applications and door manufacturing. Downfall Sometimes referred to as “falldown”, these are pieces that did not meet grade or size requirements. Dry Seasoned, usually to a moisture content of 19% or less. Dry Rot A type of decay in seasoned wood, caused by fungi. Eastern S-P-F Lumber of the S-P-F group produced in the eastern provinces of Canada (i.e., Manitoba and Saskatchewan) and in the northeastern United States. Edge Banding the process of applying various materials to the edges of panel products for appearance or to provide an edge for hardware attachment or machining. The edge bands may be thin, rigid strips of laminates, metal, lumber, or plastics. Encased Knot One not intergrown with the annual rings of the surrounding wood. Enclosed Knot One buried in the wood and not visible on the surface. End Matched Machined lumber that has been matched with a tongue at one end and a groove at the other end to provide a tight end-to-end fit. Exterior 1. Refers to the type of plywood intended for outdoor or marine uses. This type is bonded with adhesives, affording the ultimate in water and moisture resistance. The veneers are C grade or better. 2. A type of glue-laminated lumber. Face The better side of a piece of plywood or lumber in regards to quality and appearance. Fenestral Pertaining to the arrangement or design of windows or doors. Fingerjoint A machining method of joining two or more pieces of lumber end-to-end by sawing into the end of each piece a set of projecting “fingers” that interlock. When glue is applied and the pieces pushed together, it creates a sturdy glue joint. Fir Mostly used to refer to Douglas Fir, but also a general term for a variety of conifers, including the True Firs. Fir&Larch A mixture of Douglas Fir and Western Larch. These species are typically intermixed in the Inland regions of the Western United States and British Columbia. Flat Grain Annual rings, or grain, that form an angle of less than 45 degrees with the surface of a piece of lumber. Flitch 1. Thin layers of veneer sliced from a cross-section of a log, as opposed to turning the log on a lathe and peeling the outer edge in a continuous ribbon. 2. A log sawn on two or more sides from which veneer is sliced. f Rating The measurement of stress, symbolized by the letter “f”, in a piece of lumber. Generally, the higher the rating, the stronger the piece of lumber. Free of Heart Center (FOHC) Lumber sawn to exclude the pith or center of a log. Free on Board (FOB) A reference to the point to which the seller will deliver goods without charge to the buyer. Additional freight or other charges connected with the transporting or handling the product becomes the responsibility of the buyer. Full Sawn A grading term used to describe rough lumber that has been cut to full nominal size. Furring Lumber one inch in nominal thickness and less than four inches in width, mostly 1×2 and 1×3. Typically fastened to wall studs to provide a nailing surface. Fuzzy Grain A term used in surfaced lumber when the fibers are not completely severed in the surfacing process, giving it a fuzzy appearance. Glulam (Glue Laminated) A process in which individual pieces of lumber or veneer are bonded together with an adhesive to make a single piece, with the grain of each piece running parallel to the grain of each of the other pieces. Grade Stamp An ink-dispensing stamp, issued by a grading agency or association to a client mill or remanufacturer, used to indicate the grade of lumber or plywood, along with other information. Typically, the stamp will include the species, grade, producing mill and/or agency number, grading agency, heat treatment (i.e., “HT”) if applicable, and a designation (for lumber) of whether the stock was dry or green when surfaced. Grain A general term referring to the arrangement, direction, and appearance of wood fibers. Types may include fine, coarse, open, curly, straight, flat, spiral and vertical. Green Referring to lumber that is not dry and has a moisture content of 19% or more; unseasoned. Gross Measure The board measure content of lumber calculated from nominal sizes, as contrasted with a measurement form actual dimensions. Hardboard A generic term for a panel manufactured primarily from interfelting lingo-cellulosic fibers consolidated under heat and pressure in a hot press; a very dense fiberboard. Hardwood A general term referring to any of a variety of broad-leaved, deciduous trees. The term has no referral with the actual hardness of the wood-in fact, some hardwood species are softer than evergreen (or softwood) species. Heart Face The face side of a piece of lumber that is free of sapwood. Heartwood That portion of the tree contained within the sapwood. This section is dormant and unnecessary for the tree’s continued life. The living part of the tree is contained in its outer parts. Heat Treatment The process of subjecting wood products to a high temperature for a sufficient or prescribed length or time in order to kill any pests, fungi, etc. Heavy Dressing (or Surfaced Heavy) A thicker than standard piece of factory grade lumber. For example, “heavy” 6/4 Sugar Pine is 1-9/16″ thick, while standard surfacing is net 1-13/32″. Hem-Fir A species combination used by grading agencies to designate any of various species having common characteristics. Species included are Noble Fir, White Fir, Red Fir, Grand Fir, Pacific Silver Fir, Shasta Fir, and Western Hemlock. In terms of volume, White Fir and Western hemlock are most prevalent. Sometimes it is classified further under Hem-Fir (Coast), referring to stock produced in Western Oregon, Western Washington and British Columbia and is generally understood to be primarily Western Hemlock. Hem-Fir (Inland) refers to stock produced in Northern and Central California and the Inland West, and is generally understood to be White Fir or a directly related species. Hit and Miss (H&M) A series of surfaced areas with “skips” not over 1/16-inch scant between them. Idaho White Pine Another name for Western White Pine, a cousin of the Sugar Pine in California. It is easily worked and is favored for furniture, cabinetry, shelving, and a variety of specialized uses. Inland Region (or Inland Empire) This region is generally considered to include those parts of Oregon and Washington east of the Cascades, along with Idaho and Montana. Intergrown Knot One whose annual rings are partially or completely intergrown on one or more faces with the annual rings of the surrounding wood. Jacket Board A board produced incidentally when cutting a log into lumber. It is usually developed from the first slab cut by the head rig. Jack Pine This species is found in East Central Canada and the Great Lakes states. It is generally small in size and is used primarily for pulpwood and studs. Jags Odds and ends left in an inventory; quantities too small to make up a full unit of lumber or plywood. Kiln A chamber in which wood products are seasoned by applying heat and withdrawing moist air. Sometimes referred as a dry kiln. Kiln Burn A darkening or scorching on the surface of lumber that sometimes occurs when the lumber is seasoned in a kiln. Kiln Dried (KD) Lumber that has been seasoned in a kiln to a predetermined moisture content. Kiln Wet Lumber that has been removed from the kiln before it has dried to the required moisture content. Knot A branch or limb embedded in a tree and cut through in the process of manufacturing. Knots are classified according to size, quality and occurrence. Size classifications include: Pin knot-not exceeding one-half inch diameter; Small-larger than one-half inch but not over three-quarter inch; Medium-larger than three-quarter inch but not over one and one-half inch; Large-over one and one-half inch in diameter. Quality classifications include: Unsound-a knot containing decay; Encased-a knot whose rings of annual growth are not intergrown with those of the surrounding wood; Loose-not held tightly in place by growth or position; Intergrown-partially or completely intergrown on one or two faces with the growth rings of the surrounding wood; Fixed-a knot that will hold its place in a dry piece under ordinary conditions; Sound-a knot that is solid across the face and shows no signs of decay; Tight-a knot fixed by growth or position so as to retain its place; Firm-a knot that is solid across its face but contains slight decay; Pith-a sound knot containing a pith hole not over one-quarter inch in diameter. Occurrence classifications include: Branch knots-two or more divergent knots sawed lengthwise; Corner knot-one located at the intersection of adjacent faces; Single knot–one occurring by itself; Spike knot-a knot sawed in a lengthwise direction; Cluster-two or more knots grouped together. Larch (Western Larch) This softwood specie, also called Mountain Larch or Western Tamarack is native to Eastern Oregon and Washington, Idaho, Montana, and the southern interior of British Columbia. It is often intermixed with Douglas Fir since both have similar structural qualities. It is one of two conifers that shed their needles in winter. Light Framing Lumber that is two to four inches thick, two to four inches wide, and graded Construction, Standard, Stud, or Utility. Mostly as 2×4, it is used in a wide variety of general construction applications. Lodgepole Pine (Pinus contorta) This species is found in a wide range in the Northwestern United States and Canada. The primary pine in Spruce-Pine-Fir and Engelmann Spruce, Lodgepole is a principal raw material for studs and smaller-sized dimension. It takes its name from the use various Indian tribes made of it. These tall, straight trees were ideal as frames for their lodges. Low Grade A general term describing framing lumber graded as Utility and #3 Dimension or lower (e.g., Economy, Dunnage). Managed Forest Forested lands supervised and maintained for several purposes, frequently for maximum timber production. Management includes the harvesting and restocking of timber, protection of wildlife and watershed, and fire and disease control. MBF The standard abbreviation for “1,000 board feet” of standing timber, logs, and manufactured lumber. Milling The process of planning or shaping a surface. Mill Run The normal output of a sawmill. When stock is offered for sale as such, it is understood to be the typical grade mix and tally assortment of the mill. Millwork Lumber that has been remanufactured into door and window parts or decorative trim and the like. Minor Bundled Special packaging for smaller pieces of lumber (e.g., 1×2, 1×3) where the pieces are tied together with string, tape, or nylon strapping. The small bundles are then combined in normal-sized units; sometimes referred as sub-bundling. Moisture Content The weight of the water in wood, expressed as the percentage of the weight of the kiln dried or air dried wood. Monterey Pine Another name for Radiata Pine and indigenous to the coastal areas of Central California. It has been widely planted in Australia, New Zealand, South Africa, Chile and Spain. In these areas, plantations produce harvested timber in relatively short times, with thirty-year old trees reaching 100 feet in height and thirty-inch diameters. It is not commercially harvested in significant quantities in California. Moulding & Better (Mldg&Btr) A grade combination purchased by moulding producers. It consists of the grades Moulding, D Select, and C&Btr Select in combination. The percentages of each grade vary from mill to mill. It is primarily graded from stock produced from Ponderosa Pine, Sugar Pine, Radiata Pine, White Fir and Douglas Fir. Much of the lumber is produced in the rough or blanked (i.e., “surfaced heavy”). Nominal Size The size designation for most lumber, plywood, and other panel products, used for convenience. In lumber, the nominal size usually is greater than the actual dimension. For example, a kiln dried 1×12 is ordinarily surfaced to 3/ 4 x 11-1/4 inches. In panel products, the size is generally stated in square feet for the surface dimension and various increments of thickness. No Prior Selection A notation on an offering of lumber that indicates that, if the loading is marked with a grade such as #2 & Better, the higher grades have not been pulled out. Open Grain Lumber which is not restricted as to the number of rings per inch or the rate of growth. Oriented Strand Board (OSB) A structural panel made of narrow strands of fiber oriented lengthwise and crosswise in layers, mixed with a resin binder. Depending on the resin used, this product can be suitable for exterior or interior applications. Paint Grade A description of a wood product that is more suitable for painting than for a clear finish. Paragraph 99 A grade of Ponderosa Pine commons selected to provide shop-type cuttings suitable for fingerjointing by moulding and millwork plants. The name is derived from paragraph 99 of the factory lumber section of the Western Wood Products Association grading rule book. Partially Air Dry (PAD) Seasoned to some extent by exposure to the atmosphere, without artificial heat, but still considered unseasoned or green. Particleboard A generic term to describe panel products made from discrete particles of wood or other lingo-cellulosic material rather than from fibers. The wood particles are mixed with resins and formed into a solid board under heat and pressure. Patches Insertions of a piece of wood or synthetic material to fill defects in plies of plywood; sometimes referred as “plugs”. Pencil End Trimmed Lumber that is not double end trimmed, but rather has been marked by a pencil or crayon to the desired length and tallied accordingly. Pitch Pocket A well-defined opening between rings of annual growth, usually containing, or has contained resin, either solid or liquid. Pith The small, soft core in the structural center of a log. Plywood A flat panel made up of a number of veneers in which the grain direction of each ply is at right angles to the one adjacent to it. The veneers are united, under pressure, by a bonding agent. Ponderosa Pine (Pinus ponderosa) A tall pine of western North America, this species is found in a wide range that reaches from British Columbia to Mexico, and from the Pacific Coast to the Dakotas. The wood is widely used in general construction, most often as boards, but is more valued for its uses in millwork and in cuttings for remanufacture. Poplar Any of a genus of slender quick-growing trees (as a Cottonwood, Aspen, Balsam Poplar) related to the willows. Radiata Pine See Monterey Pine. Also called Kiwi Pine or Insignis Pine. Raised Grain A roughened condition on the surface of dressed lumber in which the hard summerwood is raised above the softer springwood, but not torn loose from it. RWL “Random Width and Length”, an assortment of widths and lengths normally accumulated when manufacturing certain grades and sizes of lumber. Redwood This species (Sequoia sempervirens) is found only in limited areas of coastal Northern California and Southern Oregon. Another species (Sequoia gigantean) grows in the Sierra Nevada Mountains of Central California. The heartwood of Redwood is resistant to decay and its wood (heartwood and sapwood) is used for many of the same purposes as Cedar, especially siding, decking planks, fencing, and paneling. Resawn Lumber Lumber that has been sawn on a horizontal axis to produce two thinner pieces. For example, a 2×6 S4S (smooth four sides) that is resawn center would make two pieces of 1×6 S1S2E (smooth one side two edges). Rotary-Cut Veneer Veneer peeled from a round log by turning the log against a knife to produce a continuous sheet of wood (like a ribbon) of a uniform thickness. Rough Lumber Lumber which has not been dressed or surfaced but has been sawn, edged, and trimmed. Rough Full Sawn Unsurfaced lumber cut to full specified size. Run to Pattern Lumber that has been machined to a particular configuration, such as tongue-and-groove or shiplap. S1S Surfaced one side. S2S Surfaced two sides. S4S Surfaced four sides. S1S1E Surfaced one side, one edge. S1S2E Surfaced one side, two edges. Sapwood The lighter-colored wood occurring in the outer portion of the tree (between the bark and the heartwood), sometimes referred to as “sap”. Sash The portion of a window that holds the glass. Saw-Sized Lumber Lumber uniformly sawn to the net size for surfaced lumber, and not planed on the faces, although the corners may be rounded slightly. Scant Less than standard or required size. Scotch Pine (Pinus sylvestris) European conifer widely used in reforestation. Also referred as Scots Fir or Scots Pine. S-Dry A description of lumber seasoned to a moisture content of 19% or less before surfacing. Seasoned Not green; having a moisture content of 19% or less. Seasoning Checks Small splits that occur in wood grain if moisture is withdrawn too rapidly. Second Growth Timber that has regrown after a virgin stand was logged or burned. Select Tight Knot (STK) A grading term used typically for Cedar lumber. This designates pieces of lumber to have tight knots as differentiated from pieces that may contain loose knots or knotholes. Shake A lengthwise grain separation between growth rings, usually the result of high winds. Shiplap Lumber or plywood that has been machined to make a lapped, or rabbeted, joint on each edge so that pieces may be fitted together snugly for increased strength and stability. Shook Sawn or split pieces of wood used in the construction of barrels or boxes. Shop Lumber that is graded for the number and sizes of cuttings that can be taken from it. By cutting out the knots or other defected areas, this category of graded lumber is often used in the manufacture of door and window parts. Shop Outs Shop-type lumber that falls below the official shop grades (e.g., #3 Shop), but will yield some cuttings. Skip An area on a piece of lumber that a planer fails to surface. Sliced Veneer Veneer that is cut from a block using a knife, with the resulting slices coming off as individual pieces rather than one long, continuous sheet that results from peeling on a lathe. Slope of Grain The deviation of the line of fibers from a straight line parallel to the sides of a piece. Soft Textured A term used by some pine and fir producers, primarily in California and Oregon, to describe their sawn products. Wood from these areas is often finer in grain and softer in texture than wood from areas farther north. Softwood A general term referring to any of a variety of trees having narrow, needle-like or scale-like leaves, generally coniferous. This term has nothing to do with the actual softness of the wood-in fact some “softwoods” are harder than some “hardwood” species. Southern Yellow Pine A species group, composed primarily of Loblolly, Shortleaf, Longleaf, and Slash Pines. The SYP region refers to the southeastern United States, from Texas to Virginia. Spike Knot A knot produced when the limb is cut either lengthwise or diagonally. Split A lengthwise separation of a piece of lumber extending from one surface through the piece to the opposite surface or to an adjoining surface. Spruce-Pine-Fir (S-P-F) Canadian and U.S. woods of similar characteristics that have been grouped for production. These species have moderate strength, are easily worked, take paint readily, and hold nails well. The largest volume comes from Eastern Canada where the principal species may include Red Spruce, Black Spruce, Jack Pine, and Balsam Fir. The principal species originating in Western Canada and the Inland Empire of the U.S. are White Spruce, Lodgepole Pine, Engelmann Spruce, and Alpine Fir. Production in the United States is typically identified as S-P-F (S) for “south”. Square Edged Free of wane and without eased edges. Square Foot A unit of area measurement equal to a square 12 inches on each side. This is the standard unit of measurement for panel products. A 4 foot by 8 foot sheet of plywood of any thickness would contain 32 square feet. Stain Discoloration on or in lumber other than its natural color. Stain may be caused by fungal growth, weathering, or the oxidation of metallic substances in a log. It is classified for grading purposes as light, medium, or heavy. Standard Surfacing The surfaced size of a piece of lumber established in grading rules. This phrase is usually used in reference to shop lumber, which can be surfaced to a variety of thicknesses to meet specific customer needs. For example, 5/4 Shop is 1-5/16″ in thickness when “Surfaced Heavy” and 1-5/32″ in thickness with “Standard Surfacing”. Struc I A grade of strength-rated plywood or OSB often required by building codes in regions of high winds or seismic activity. Struc I plywood requires all Douglas Fir veneer with a C-grade core. OSB Struc I panels require more wax and a longer press time, resulting in a stiffer panel. Sturd-I-Floor A trade name registered by the APA for a panel designed specifically for use as combined subfloor / underlayment in residential floor applications. It is available in several thicknesses, each keyed to a recommended spacing of floor joists from 16 to 48 inches. Sugar Pine (Pinus lambertiana) This species, found principally in Central and Northern California and Southern Oregon, is light, smooth, soft textured, and easily worked. It is popular in millwork, pattern work, and various interior applications. It takes its name from the sugary, sweet-tasting deposits of resin that are exuded from its bark after injury to the tree. Surface Measure A method of measuring an area that gives a measurement of area only and does not take thickness into account. For example, a 2×6 ten feet long would measure five square feet on a surface measure basis, but ten board feet on a board foot basis. Tally Stick A device used to tally shop lumber. It consists of a wooden stick with marks showing widths multiplied by lengths. Torn Grain A surface irregularity in a piece of lumber caused when the wood is torn out during surfacing. Twist A deviation from the flat planes of all four faces of a piece of lumber by a spiraling action, usually the result of drying. Unseasoned Lumber that has not been dried to a specified moisture content before surfacing. Generally, lumber that has a moisture content exceeding 19%. Unsound Wood Containing decay. Veneer A thin sheet of wood, rotary-cut, sliced, or sawn from a log, bolt or fletch. Veneer may be referred to as a ply when assembled into a panel. Veneer Patches Patches inserted in veneer sheet before panel is assembled for pressing. Vertical Grain (VG) Lumber that is sawn at approximately right angles to the annual growth rings so that the rings form an angle of 45 degrees or more with the surface of the piece. V-Groove A pattern applied to tongue-and-groove lumber in which the edges of the pieces are chamfered so that a V-shaped groove is formed on the surface where the two pieces meet. A V-groove may also be machined into the face of a piece of lumber or a panel. Waferboard A structural panel product made of discrete, randomly oriented wafers of wood bound together by resin, heat, and pressure. Waferboard has been largely superseded by OSB. Western Woods A species designation that, under current grading rules, may include any combination of western softwood species, converted to lumber. White Fir (Abies concolor) The most important of the True Firs, this species is found in a wide range in the Western United States. The greatest concentration of production in this species is in Northern California. The wood is straight-grained, fine-textured, and relatively light. It is used in general construction and for such specialized uses as doors and mouldings. White Speck Sometimes referred as honeycomb, it is a condition caused by a fungus in the living tree. It is characterized by small white pits or spots. Honeycomb is an advanced stage of white speck. Neither condition is subject to further decay unless the lumber is used under wet conditions. White Wood A designation applied to a number of species, such as White Fir. Wormy A term used to describe wood that has been attacked by any of a variety of borers. Worst Face The back, or poorer face, on a piece of lumber.
May 27, 2022 ~ Sh BEHUQOTAI. M: NAHWAND. Shabbat Vaera - שבת וארא The Shepherd Name of God Recognition of Good Pharaoh's Heart וַיֶּחֱזַק֙ לֵ֣ב פַּרְעֹ֔ה וְלֹ֥א שָׁמַ֖ע אֲלֵהֶ֑ם - How is Pharaoh punished if it is God who takes away his "free will" and hardens his heart? To answer this, a closer reading is warranted. After the sign of the staff turning into the snake, Exodus 7:13 states "Pharaoh's heart strengthens, and he did not listen to them." The biblical commentator Ibn Ezra (~1090- ~1165) notes that Pharaoh, "on his own," hardens his heart, because he sees that the sorcerers can replicate this same sign. For the first five plagues, it is Pharaoh who hardens his own heart. For these plagues, it says that God "said" that this would happen, but does not say that God actually causes this to happen. It is not until the later plagues (starting with the sixth plague) that the text writes that God hardens Pharaoh's heart and that this was no longer an independent decision made by Pharaoh. By this time, God determines that the Pharaoh already made up his mind and the further hardening of his heart was done in order to further demonstrate God's hand in this event. Beth Torah Bulletin, January 25, 2020. Maqam of the Week: BAYAT-HOSENI For Shabbat Vaera (Exodus 6:2- 9:35), the prayers are conducted in Maqam BAYAT-HOSENI according to at least 14 Syrian sources. HOSENI (Arabic: 'beautiful') is often described as "a high Bayat" and is applied when there is an aspect in the perasha relating to Matan Torah. We are reminded of the beauty of Matan Torah at the opening of this perasha when we read the words "Ani Hashem" which is similar to the opening of the Ten Commandments (Anokhi Hashem). Dissenting opinion is to apply Maqam NAWAH in order to sing Mi Yemallel (page 361), a pizmon about the ten plagues. Sephardic Pizmonim Project,
Shreefal (coconut) is most sacred, satvik, pure, healthy and god’s fruit in the universe; it is used in every ritual and important ceremonies in Hinduism. Coconut resembles the human in many ways, coir outside the coconut resembles hair, hard nut like skull, water is like blood etc. General practice of breaking Shreefal and distributes as Prasad is followed in all rituals, breaking of Shreefal has its own importance in various aspects like removing ego and Nar Bali. God expects devotees to be egoless and pure. The soft white kernel in Shreefal represents our brain which is filled with water and nature of our brain which is sometimes selfish, jealous, and egoist. Before it is offered to God, the inner water is poured out, which means the removal of our selfish thoughts and ego. Hence, breaking a coconut represents our utmost dedication and complete surrender to God. So the most common offering to the God in temple is Shreefal and plays a key role in worship. Long year ago Nar and animal sacrifice after many rituals was in practice, so Adi Sankaracharya had debated and research a lot and convince everyone to stop the sacrifice and use Shreefal in place of Bali and discontinue this inhuman ritual. According to mythology, coconut was created by the sage Vishwamitra to support King Satya Vrat who tried to enter into swarglok as mortal. Coconut is associated with the Lord Ganesha as well so at the beginning of any ritual or ceremonies, Shreefal is used to remove all hurdles. Shreefal is also associated with Ma Devi Laxmi as Shree means Laxmi so in most of the rituals Shreefal is used as symbol of God. There are three eyes like marks on Shreefal refers to the Lord Shiva, hence Shreefal means to fulfill the wishes and desire. Other spirituals aspect of Shreefal is, inner beauty is more important than the outer beauty. No one has control over outside of natural beauty but everyone can become the beautiful from inside. Shreefal teach this message to us that become hard from outside but be always soft from the inside. Coconut absorbs the salty part of see but the water inside the coconut is so sweet. So message is, absorb wrongful from the society and give back the sweet. There is lots of scientific reason behind the use of Shreefal; coconut water is full of nutrient, minerals and vitamin rich fluid. It is easy available fruit and popular food in many regions, where coconuts are grown. There is lots of benefit of coconut water with respect to health; it helps in problem related to intestine, kidneys, urinary track etc. Coconut water helps in dissolving kidney stones and allows their easy passage out of the body. Sport person can use coconut water as sport drink, it reduces high blood pressure during the pregnancy, and it is free of chemical so good for child as well. In short Shreefal is the symbol of sacrifice for the evolution of the human culture and betterment of human kind. It teaches and inspires us to try hard for the duty for God and society.
• 24 hours a day, from Monday to Sunday. The Best Industrial Solution Provider Certified Company ISO 9001-2020 The manufacture of integrated circuits requires various physical and chemical processes performed on semiconductor substrates (for example, silicon wafers). By creating the structure of various integrated circuit components, millions of transistors can be built and wired together to form the complex circuits of modern microelectronic devices. Lithography is defined as "a method of printing from a prepared plane so that the ink only adheres to the design to be printed." In the manufacture of semiconductor devices, the combined effects of photolithography and etching processes can produce desired features. Since photolithography for device manufacturing involves the use of optical exposure to create patterns, semiconductor photolithography is often referred to as "lithography." Lithography is the preferred technique for patterning, which can achieve small size and high wafer yield. Photolithography is a photographic process by which a photosensitive polymer called a photoresist is exposed and developed to form a three-dimensional relief image on a substrate. The general processing steps of a typical photolithography process are as follows: substrate preparation, photoresist spin coating, pre-baking, exposure, post-exposure baking, development and post-baking. After the resist pattern is transferred to the underlying layer, the resist strip is the final operation in the photolithography process. Conventional nanofabrication methods.Fig 1. Conventional nanofabrication methods. (a) Standard photolithography produces a masking layer for etching to fabricate nanoslit structures; (b) A nanochannel array was milled using an FIB on the silicon surface; (c) Nanochannels were fabricated by nanoimprinting. SEM pictures of a 2D silicon nano-mold and its replicated nanochannels; (d) A periodic nanopattern array is fabricated by interference lithography in which two split beams make both constructive and destructive interferences sequentially, producing a periodic nanopattern array. (Ha D, et al. 2016) The importance of lithography can be understood in two ways. First of all, since a large number of photolithography steps are required in the manufacture of integrated circuits, photolithography usually accounts for about 30% of the manufacturing cost. Second, photolithography tends to become a technical limitation, which limits the shrinking of feature sizes, thereby further increasing the speed of transistors and silicon area. Although lithography is not the only technologically important and challenging process in the IC manufacturing process, advances in lithography technology have made progress in controlling IC cost and performance. Alfa Chemistry provides a variety of products to support your research. These products have a wide range of applications, including but not limited to lithography monomers, photoresists, as well as stamps for nanoprint lithography and microcontact printing. 1. Ha D, et al. (2016). "Unconventional Micro-/Nanofabrication Technologies for Hybrid-scale Lab-on-a-chip." Lab Chip. 16: 4296-4312. Not finding what you're looking for?
Reese’s Pinworm Medicine is “poison Ivy medicine” By Alex PfeifferThe Wall Street Journal / November 3, 2019 09:11:06The first ingredient in Reese’s pinworms is a potent neurotoxin called caspase-3, which is an enzyme in your brain that is often mutated. When caspases are damaged, they can damage the cell membranes, which can lead to a range of problems including the formation of clots and blood clots. The first ingredient to come to mind for many people is poison ivy, but that too has been found to have a high degree of toxicity, particularly to mice. In fact, a study published last month in the journal Nature Biotechnology found that some strains of pinworms are more toxic to mice than other pinworms, but the researchers did not find evidence that the toxins were harming humans. The other ingredient in the Reese’s recipe is a form of caspaserin, which scientists have found to be a powerful antioxidant that may help treat some cancers. This is a compound called catechin that can protect your DNA from oxidation by allowing free radicals to be broken down and then being recycled into antioxidants. “In the case of pinworm, this is a precursor for catechins, which may be able to protect against cancer,” says Daniela Sánchez, a molecular biologist at the National Institute of Health, who was not involved in the study. Sánchezz, who has studied catechesis in humans, says that the antioxidant catechel is found in many plant foods, and that this may explain why the pinworms were able to be so effective at protecting against cancer. “It’s quite possible that there’s a lot of catecheryin in some foods that have been eaten before,” Sánciz says. Sanchez and her colleagues found that a strain of pin worms that had the toxin caspas-3 (also known as caspa-3) in their genome were more sensitive to oxidation and less susceptible to DNA damage than a strain that did not have the toxin. They then tested a different strain of the pinworm strain that had not been genetically modified, and found that the toxin also protected against oxidation, even after the strain had been genetically engineered. In their study, the scientists also tested several different forms of casseroles and sausages and found they were all similar in their ability to protect the pin worms against oxidative damage. They also found that it was possible to genetically modify a strain to have the toxins in its genome, and they used this genetic modification to create a new strain that is much more toxic and more resistant to oxidation. Sáez says the results show that “there’s a way to design a toxin that protects against both oxidative and nitrosative damage,” which could potentially help prevent cancer. The team is now studying a number of other toxins, including some known to be toxic to humans, and is hoping to develop new ones to fight the various diseases that pinworms can help prevent. In a statement, a Reese’s spokesperson told TechCrunch that the company has found that caspascariin is “highly toxic to animals and humans” and that it has no use in humans. They added that the pin worm ingredient was derived from an herb that was used in China for centuries, and the company is working with Chinese researchers to ensure that the ingredients used are safe for humans. “The products are safe to eat,” the spokesperson added. “Our goal is to make them available in stores across the U.S.” We reached out to Reese’s for comment, and did not receive a response by publication time. Reese’s will be releasing a pinworm powder called “Pinworm Soup” to celebrate the anniversary of the original Reese’s. We’re also looking to find out what other ingredients are in Reeses new “Pin Worm” brand, which we’ve been told is more potent and better for humans than the original. In the meantime, we’ve included a video from the company showing how the product works. Related Post
Ville Sorrento, the Venice ville and the Vatican In 2015, I visited Venice, Italy, where the villes were once a part of the city. There, I met the famous Ville-Sorrento (Villas of Venice), an iconic architectural and architectural-historical landmark which stood in the center of the town of Venice. The Ville was once the residence of the emperor, the head of state of the Byzantine Empire, the first Pope of Venice, and the home of the first pope of Rome. The original ville was a massive, two-story structure built by the Byzantine emperor in the late 13th century. It was the largest building in the world at the time and was the site of several major events, including the construction of the Palazzo delle St. Peter’s. I also saw the former site of the famous “villa of the two young boys,” a famous Roman villa. The structure of the Ville of the Two Young Boys was originally constructed in the 12th century and was built on a large platform supported by three columns that were originally designed to support a single large boat. The wooden platform was later converted into a massive structure that was designed to stand on three pillars. Today, the structure of this ancient Roman villae is preserved at the Basilica of Santa Maria della Serenata, located in Venice. It is now the largest surviving structure in Venice, with an estimated 500,000 square feet of historic architecture, including mosaics, columns, and a large hall that was the home to the Emperor Augustus. But the Villes were not the only structures built during the early years of the Empire. The city also had a large and very busy cemetery. During the reign of Emperor Leo III, it was known as the “ville of souls.” The cemetery had been established during the reigns of Emperor Augustus and Emperor Constantine, the second Pope of Rome, and during the years following the collapse of the Roman Empire in the years after the First Crusade in the 7th century, it served as the resting place for thousands of dead Romans. During this time period, the cemetery was also the home for the Roman soldiers who had fallen victims to the Black Death. The remains of Roman soldiers were found at the cemetery and the remains of the dead were collected for the burials of Roman Catholics. The cemetery was finally demolished in 1378. Today the site is called the Villa of the Five Dead, and is still a popular tourist attraction. However, after the fall of the Imperial Rome in 1453, the area was divided into two sections, one for the dead and the other for the living. The former cemetery, known as Saint Catherine’s, is now a park and parkland and is an important attraction for visitors. The ville of Saint Catherine, which had a population of around 1,000 in the middle of the 11th century in the early days of the Catholic Church, was one of the largest churches in Europe. It served as a cemetery for thousands and was later demolished by the Church in 1522. However the vile still exists today as an active tourist attraction and remains the site for many people to visit during the week. The Vatican and Basilica, both of which are now part of UNESCO, is the second largest church in the entire world. Located in the Vatican, the Vatican Basilica is the third largest in the Western Hemisphere, with around 6 million square feet in size. It houses the Vatican’s most important collection of papal documents. The Papal Archives and the collection of the Holy See’s most recent treasure, the “Apostolic Papers,” which is considered the most valuable collection of documents of the Papacy in the West, are housed at the Vatican. The archdiocese of Rome is also the largest Catholic diocese in the United States, with more than 1.5 million priests, nuns, and seminarians. While it is the largest of the European Catholic Churches, the papal archives are the only place in the Catholic world where the papacy’s archives are accessible to the general public. These collections are kept by the Holy Office of the Vatican and housed at its main basilica in the Apostolic Palace, which is now called the Vatican Museums. These archives are housed in the same building that is home to all the Vatican museums. The papal offices have been housed in one building since its founding in 1758. Today it has more than 2,000 employees and a total staff of over 6,000. The Pope and the archdiocesan bishops of the archipelago are the highest offices of the Church and are responsible for the management of the entire archipelagic archipelagment. The pope also has two other responsibilities: the administration of the sacraments and the formation of bishops. The Church is also responsible for religious education and outreach and is responsible for establishing a culture of faith. The Holy See also oversees the administration and funding of the public schools and oversees
Isolation cells and Level Shifter cells Isolation Cells Isolation cells are additional cells inserted by the synthesis tools for isolating the buses/wires crossing from power-gated domain of a circuit to its always-on domain. The isolation list is a list which consists of all the buses/wires that needs isolation cells. In the isolation list we specify the clamping value of the nets as logic 0 or logic 1 and accordingly the synthesis tool will insert isolation cells. Why do we need it? Figure 1: A simple circuit having a switchable (or gated) power domain Consider a very simple circuit as shown in Figure 1, where G1 and G2 are in power gated domain. Now in low power mode when the power to the power gated domain is cut off, the output of G1 and G2 becomes unknown (or ‘X’). So the logic in the always-on domain will be affected by it. To prevent corruption of always-on domain, we clamp the nets crossing the power domains to a value depending upon the design. Here we will put the output wire from G1 and G2 in isolation list and clamp the value to logic 0 and logic 1 respectively. After synthesis the circuit will look like the one shown in Figure 2. Figure 2: The circuit shown in Figure 1, after isolation cells are inserted Typically when we clamp a wire to value 0, an AND gate is inserted by the synthesis tool with one of its input connected to an isolation enable signal from the Power Management Unit (PMU) sitting inside your design, as shown in the diagram. Similarly, when we clamp a wire to value 1, an OR gate is inserted by the synthesis tool with one of its input connected to the inverted version of the isolation enable signal. These tool inserted AND and OR gates are known as isolation cells. Since the PMU manages all the power gating inside a design, it enables the isolation enable signal before power gating to make sure there is no ‘X’ value propagated to aon-domain after power is cut off. In the diagram above, isol_pgd_en is the isolation enable signal and is an active low signal. Level Shifter Cells Level Shifters (LS) are special standard cells used in Multi Voltage designs to covert one voltage level to another. As Multi Voltage designs have more than one voltage domain, level shifters are used for all the signals crossing from one voltage domain to another voltage domain. Like isolation cells, level shifters are inserted by the synthesis tool. Low to High Level Shifters Low to High LS are used for signals crossing from a lower voltage domain to higher voltage domain. It basically amplifies the source signal so that it can be interpreted properly in the destination domain. Suppose a 0.7V signal is crossing from 0.7V voltage domain to 1.0V voltage domain. Now in the lower voltage domain it corresponds to logic-1 but in higher voltage domain it is neither logic-1 nor logic-0, so the signal becomes unknown (or ‘X’) in the absence of Low to High LS. High to Low Level Shifters High to Low LS are used for signals crossing from higher voltage domain to lower voltage domain. It basically attenuates the source signal. Although putting a LS for signals crossing from higher voltage domain to lower voltage domain is optional as signals will be interpreted properly in destination domain, but typically we put a LS to avoid stress on the transistors of lower voltage domain due to high voltage of the source signal. Bi-directional Level Shifters When dynamic voltage scaling or dynamic voltage and frequency scaling is used the voltage relation between the source and destination might change over time of operation. In that case we need level shifter which is capable of shifting both low to high voltage signals and high to low voltage signals. %d bloggers like this:
Burning Plasma In August I received an urgent email from my brother with the title “Fusion”. The National Ignition Facility (NIF) had created a burning plasma — a star on Earth — a major milestone on the long road to controlled nuclear fusion. A plasma is an ionized gas, but in this context “burning” does not mean chemically combining with oxygen. Rather it refers to the nuclear reaction {}^2_1 \mathrm{H}^{+} + {}^3_1 \mathrm{H}^{+} \rightarrow {}^4_2 \mathrm{He}^{++} + {}^1_0 \mathrm{n} + 18~\text{MeV}, where hydrogen isotopes deuterium and tritium combine to form helium. Nuclear reactions produce millions of times the energy of chemical reactions, but they are hard to initiate as hydrogen ions repel one another electromagnetically unless they are close enough to allow the short-ranged nuclear force to convert mass energy into kinetic energy. NIF uses the world’s most powerful laser, capable (briefly) of almost 1000 times the power output of the United States’ electrical grid. The ultraviolet laser pulse heats a small gold cavity or hohlraum, which converts the incident radiation into x-rays, which causes an enclosed deuterium-tritium pellet to implode, which increases the pellet’s temperature and density to initiate fusion. After missing its 2012 ignition goal, and steadfastly fine-tuning the experimental design since then, the August shot generated much more energy than was delivered to the pellet (but slightly less energy than was delivered to the hohlraum). NIF director Mark Herrmann reported that, “Everyone has a spring in their step”. To me, controlled nuclear fusion, like humans on Mars, has always seemed 20 years away; with progress at NIF (and elsewhere), today it seems closer. About John F. Lindner John F. Lindner was born in Sleepy Hollow, New York, and educated at the University of Vermont and Caltech. He is an emeritus professor of physics and astronomy at The College of Wooster and a visiting professor at North Carolina State University. He has enjoyed multiple yearlong sabbaticals at Georgia Tech, University of Portland, University of Hawai'i, and NCSU. His research interests include nonlinear dynamics, celestial mechanics, and neural networks. This entry was posted in Physics. Bookmark the permalink. Leave a Reply
Reindeer in the Southern Hemisphere This week’s blog focuses on the introduction of reindeer to obscure places around the world. I will pay particular attention to the introduction of reindeer in the lesser-known Kerguelen Islands. Reindeer and Penguins co-existing on South Georgia Island (image from: The Cairngorm Reindeer Herd is a re-introduced herd. Reindeer were once native to Scotland, and before that they could also be found across England. In fact, cave paintings of reindeer have been found as far south as the Pyrenees in Northern Spain/Southern France. A leftover memory from when the planet was no doubt a lot colder. However, the native reindeer in Scotland were thought to have died out between 800 and 1100 years ago due to both over-hunting and climate change related habitat loss. The story of our current herd of 150 reindeer began in 1949 when a Swedish reindeer herder called Mikel Utsi and his wife, Dr Ethel Lindgren, began their honeymoon in Aviemore. Mr Utsi gazed out at the Cairngorm mountains and saw the perfect conditions for reindeer but, alas, no reindeer. Mr Utsi would have seen cold and windy temperatures, a tundra landscape, and sub-arctic flora. This is because the Cairngorm mountains are the only place in the United Kingdom with sub-arctic conditions. Mr Utsi apparently spent days looking for the reindeer in the hills before dropping down to the local pub to ask the locals about their reindeer. It was here that he found out that there were no reindeer. His honeymoon doesn’t sound like your stereotypical relaxing and romantic honeymoon, at least they got some time in the pub, but his marriage withstood and together Mr Utsi and Dr Lindgren made it their life’s work to reintroduce reindeer to Scotland. It started with 8 reindeer being shipped over from Sweden in 1952 and many subsequent initial imports. And the rest, as they say, is history. We now have a reintroduced herd with a variety of genetic diversity. Mr Utsi and Sarek the reindeer on-board the coincidentally named S.S. Sarek. Circa 1955. Other herds of reindeer have also been introduced to different countries around the world in the not so distant past. Some reindeer have been introduced into locations where there have never been reindeer previously. Iceland is a good example of a country where reindeer have been introduced successfully. Although, this introduction wasn’t without its problems. Predominantly located in the east of Iceland, Icelandic reindeer were once close to extinction having been introduced between the years of 1771-1787. Up until the year of 1940 their numbers had gradually dropped to approximately 100-200 but stocks have now risen to between 6000-7000. The reason for the fluctuations in population is probably due to natural circumstances such as insufficient grazing, range deterioration and volcanic eruptions. More information about reindeer in Iceland can be found in a previous blog post written by Bobby: Most reindeer and caribou around the world live in the arctic and sub-arctic regions of the Northern Hemisphere as these are the conditions that they’ve evolved to thrive in over the course of evolution. But reindeer are incredibly adaptable and resilient, and humans have attempted to introduce them to a variety of places, some even south of the equator. Reindeer were introduced to the South Georgia Islands (about 1000 miles east of Cape Horn, Argentina) by Norwegian whalers, where the reindeer lived alongside penguins for around 100 years. However, in 2010 the government decided to eradicate the reindeer as the number were increasing and putting too much pressure on the island’s native plants and wildlife. By 2017 all reindeer were eradicated from the island. Approximately 6,750 reindeer were culled in total. More information about reindeer in South Georgia can be found here: The South Georgia Islands (image from: The South Georgia Islands (image from: The introduction of reindeer to the Kerguelen Islands, also known as the Desolation Islands, is a slightly happier story. The reindeer remain as residents today in these islands that are located over 2000 miles from their nearest neighbour, Madagascar. The Kerguelen Islands are a group of islands in the sub-Antarctic (southern Indian Ocean) made from igneous (volcanic) rock. They are part of a submerged microcontinent called the Kerguelen Subcontinent. Kerguelen’s climate is considered to be a tundra climate with cold temperatures and high wind speeds. The mountains are frequently covered in snow and the average annual temperature is 4.9 degrees Celsius. Lichens, grasses, and mosses grow plentifully as does the famous, indigenous Kerguelen cabbage which was popular with sailors in their bid to increase their vitamin C intake. The main indigenous animals are wingless insects, seabirds, seals, and penguins but there has been plenty of introduced animals such as cats, rabbits, sheep, and reindeer (interestingly, all cats on the island are black and white because the original 3 introduced cats were black and white). The Kerguelen Islands from afar (image from: The French originally introduced Swedish reindeer to the islands in 1956. The Kerguelen Islands were used as one of the whaling stations, where whalers would bring their catch for processing. Reindeer were introduced to be shot for food, as well as being hunted for sport. However, when the whaling industry collapsed, the reindeer stayed and there is now an estimated 3000 – 5000 reindeer on the islands. The reindeer were originally introduced to Ile des Rennes (Reindeer Island), also called Ile Australia. However, the reindeer eventually swam across to the main island of La Grande Terre a short distance away. Reindeer and Penguins co-existing on the Kerguelen Islands (image from: The conditions in the Kerguelen Islands are very similar to the conditions found in parts of Scandinavia. However, it would be interesting to know how the reindeer adapted to the change in seasons as they moved from the Northern to the Southern hemisphere. And, moreover, the effect that reindeer have had on the island’s vegetation. Researchers have previously believed that very high grazing pressure over time pushes the ecosystem in a positive direction, so that over time, the areas that are grazed become dominated by productive plants, such as nutrient-rich species of grasses. However, The Ecosystem Finnmark project believe that reindeer have a negative effect on grazing areas, even in the most productive summer pastures. The Kerguelen Islands (image from: One Reply to “Reindeer in the Southern Hemisphere” 1. Nice blog. There are also introduced reindeer in the Falklands. Incidentally, the photo at the end is certainly the much-photographed Mt. Kirkjufell in Iceland, not the Kerguelen Islands! Leave a Reply
Why are Spiders Important & What’s Their Purpose? | EarthKind Why are Spiders Important & What’s Their Purpose? | EarthKind Home / Blog / Purpose of Spiders & Why They Exist Purpose of Spiders & Why They Exist By: EarthKind Arachnophobia (the fear of spiders) is the 3rd most common of all phobias in America. Considering that there are at least 4,000 known species of spiders living in the United States, it’s not hard to see why so many people get upset about finding these pests in their homes. Understanding the purpose of spiders and the role they play in our ecosystem can help ease some nerves and make them less scary. Find out more below! What Do Spiders Do? There are many benefits of spiders. First and foremost, spiders eat insects. They are important predators. Maybe you’ve noticed a web by the light outside your front door – consider all the annoying moths, flies, and mosquitoes that have been prevented from entering your home because of a helpful arachnid! Though some spiders may make their way into your home, they will eat other insects that may be inside as well.  While the details can seem a little gruesome if you think about an unsuspecting insect being caught in a sticky cobweb and consumed by an eight-legged arachnid, the fact is that spiders keep the numbers of other pests under control. A few positive results this leads to includes:  • Fewer pests destroying crops • Less disease being spread by insects • Fewer bloodsucking insects stinging, biting, and bothering humans.  Those are things we can all appreciate. Another interesting, and lesser known fact, is the benefits they are providing for medical research and product development. Spider venom has the potential to act as a safer painkiller and may be able to treat strokes, muscular dystrophy, and of course, is used for antivenom in cases of harmful spider bites. Common spider on a webWhy Are Spiders Important? These pests play an important role in our ecosystem as predators to other insects.  Determining the importance of spiders depends on who you ask. A gardener or farmer is likely to recognize how helpful they are at preventing pests from destroying crops. A doctor, scientist, or engineer may appreciate the innovative possibilities related to the study of spiders.  However, the average homeowner would likely argue that spiders don’t belong anywhere near them because they are gross, creepy, and scary! Being scared of them is a normal response, and there are a few types of dangerous spiders, including the black widows and brown recluses. However, most species generally prefer to avoid contact with people. Even in instances of spider bites, healthy adults can usually survive without serious consequences.  Just because you don’t want to see any inside your home doesn’t mean they don’t serve an important purpose. Keeping spiders outside where they belong is the best way to keep everyone safe, happy, and healthy. A Few More Fun Facts Here are a few other interesting facts about spiders:  • They have either six or eight eyes depending on the species. • Despite having so many eyes, many spider species have poor eyesight. They make up for it with the tiny hairs that line their eight legs. The hairs are able to detect scents, helping them find food and potential mates. • Spiders are found on every continent, except Antarctica. • All spiders produce silk, but not all of them spin webs. The silk they use to spin webs is one of the strongest materials ever discovered. It may not seem like much when you’re swatting it away with your hands, but the tensile strength of spider silk is comparable to high-grade alloy steel. • Some spiders are actually kind of cute. Keep Them Away From Your Home Even though we know spiders do serve a purpose and are good for the ecosystem, most homeowners still don’t like the idea of sharing their space with them.  Getting rid of spiders is a common request, but finding a safe and effective method of pest control is crucial. The first thing you can do is keep a clean home, clear of clutter and debris. They prefer to hide in sheltered, undisturbed areas such as behind an old bookshelf, in a rarely used closet, or down in a dark, dusty basement. Next, make sure you maintain a pest-free home. They won’t live somewhere without an adequate food source, so keeping other household pest problems under control will also control spiders. Don’t neglect repairing any damaged window screens, weather-stripping around doors, and any other small gaps or openings around your home that they might use to get inside. Finally, consider using a botanical pest repellent that prevents these pests from creating their home inside your home. Learn more about the habitat of a spider so you can better understand how they get into your home, and other ways to keep them out.
Fourteen generations of Mt. 1:17 and the “seventy sevens” of Daniel 9:24 Here is something I’ve never thought of before. It has to do with the relationship between the Daniel 9 prophecy and the genealogy in Matthew 1. I am sure I am not the first, but I was wondering if you ever heard of this and what you think about it. Question asked by a viewer of The Real Jesus: How many generations were there between Abraham and David? Matthew 1:17 lists fourteen generations. Matthew 1:2 lists thirteen generations. My Answer: It’s simply a matter of how you count. You can count each period as fourteen generations first by extending from Abraham to David; secondly, by extending from David to the deportation to Babylon in the time of Jechonias; and thirdly, by extending from Jechonias to Christ. Matthew was aware that he was being inclusive or doubling up on one generation in each case. There is no question that Matthew manipulated the number of generations to get multiples of “two times seven” — seven being the number of perfection in the Hebrew mind. Matthew is also concerned with the idea that there were roughly equal time periods divided into three eras. The coming of the Messiah was an expected event after the end of the last period – according to Daniel 9. Matthew’s concern is the number of years rather than the exact number of literal generations (a generation is 40 years). 14 generations (14*40) = 560 years. Matthew is trying to show that the prophecy of Daniel 9 is fulfilled in Jesus because the captivity lasted 70 years. If we subtract the 70 year captivity, then we get the “seventy sevens” of the Daniel 9 prophecy. Of course, there are not exactly 560 years from the captivity (609 B.C.) to the generation of Jesus Christ (3 B.C. to 30 A.D.) Nor are there exactly 1680 years from Abraham to Jesus. If that were so, these 40 plus people would have had to have borne sons in their 40th year. But Matthew as a Jew is trying to convince other Jews that the genealogy of Jesus “fit” the Daniel prophecy with the number “seven” in mind. This is why he posits the idea of three 560 year periods. 1 Comment where do one go from here after the birth of Christ. Seventy years later, the fall of Jerusalem in 70AD. Is there any connection with this date 1948 and seventy years later? Suggested products Read more
Skip to main content Month Day January 30 Franklin Delano Roosevelt is born On January 30, 1882, future President Franklin Delano Roosevelt is born. Roosevelt grew up the only child in an upper middle-class family in Hyde Park, New York. He graduated from Harvard in 1904 and later received a degree from Columbia Law School. In 1905, Roosevelt married his influential future first lady, Eleanor, a niece of Theodore Roosevelt and a distant cousin. Roosevelt’s early involvement in politics included a seat in the New York State Senate and the role of Woodrow Wilson’s assistant secretary of the Navy during World War I. In 1920, Roosevelt ran for vice president on the unsuccessful Democratic ticket against Warren Harding. He served as governor of New York from 1929 to1932, during which time he tested out various programs to help the needy that would later form the backbone of his New Deal social and economic policies. Roosevelt’s personal appeal and a platform based on Wilsonian policies of a strong federal role in boosting industry and the public welfare led to his election as the 32nd president of the United States in 1933. In 1921 at the age of 39, Roosevelt contracted a rare incidence of adult polio and lost the use of his legs. Although his disability was not a secret, the Roosevelt administration had a tacit agreement with photographers that they would avoid snapping images of the president being carried by assistants or using a wheelchair. During this era the American public still considered paraplegics crippled or weak, a stereotype Roosevelt fought throughout his presidency. Known for his sense of humor and optimism in the face of adversity, it was perhaps his own personal challenges that allowed him to appreciate the struggles of others. In 1938, Roosevelt founded the March of Dimes to raise funds for polio research and rehabilitation. READ MORE: Did New Deal Programs Help End the Great Depression? In 1933, Roosevelt embarked on an ambitious effort to jump-start the economy through federal work and welfare policies, which included the creation of the Work Projects Administration (WPA), the Federal Industrial Recovery Act and the Civilian Conservation Corps (CCC). The New Deal, as he dubbed his policies, was met in some quarters by opposition and controversy—Roosevelt was accused of practicing socialism in an era of rampant anti-communism, overreaching presidential power and being a big government spender. Some of Roosevelt’s programs were even ruled unconstitutional by the Supreme Court. However, many of FDR’s New Deal reforms, including Social Security and the minimum wage, were maintained by successive conservative and liberal administrations. At the same time as he faced unprecedented domestic problems, Roosevelt warily observed the rise of fascist dictatorships in Europe during the mid-1930s. While the German army stormed across Europe, Roosevelt tried to appease the American public’s entrenched isolationism by only gradually increasing U.S. aid to democratic European nations. As the war in Europe progressed, Roosevelt stepped up financial and humanitarian aid to Great Britain and France. When it looked as if Hitler might invade Britain after the saturation bombing of London, Roosevelt boldly launched the lend-lease program early in 1941, which promised massive weapons and war-material exports to Britain.  READ MORE: Franklin D. Roosevelt: The World War II Years During one of his signature fireside chat radio addresses, Roosevelt referred to the U.S. as an arsenal of democracy to help explain America’s increasing involvement in the European war and galvanize public support for the lend-lease program. When Japan bombed Pearl Harbor on December 7, 1941, Roosevelt asked Congress to declare war and American industry then underwent a massive conversion to defense production. During the war, Roosevelt kept a tight rein on labor disputes between management and labor and implemented stringent rationing. He worked closely with Allied leaders to plan the liberation of Europe, which was led by American troops. In delicate war-time negotiations with Stalin, Roosevelt recognized the strategic importance of relying on the Soviet Union to divert Hitler’s attention away from an Allied liberation of Europe. At the same time, Roosevelt earned harsh criticism at home and among the Allies for accommodating the communist leader. Many saw Roosevelt’s concessions to Stalin regarding post-war territorial issues as a violation of democratic principles. Critics blamed Roosevelt for giving Stalin most of Eastern Europe, thus ensuring the Soviet Union’s rise to world-power status during the Cold War. In addition, post-war conspiracy theorists suggested Roosevelt knew of Japan’s plan to bomb Pearl Harbor in advance and let it go forward to galvanize Americans’ support for the war. He was also accused of being insensitive to the plight of Jews during the Holocaust. Yet Roosevelt’s war-time diplomacy did have its successes–it contributed to the defeat of fascist Nazi Germany and Japan and ended in the formation of the United Nations. In all, Roosevelt served four terms–his election to a third and fourth term were unprecedented–and his presidency spanned two of the nation’s greatest crises, the Great Depression and the Second World War, a testament to his popularity and the faith he was able to inspire in the American people. (It was only a decade later that Congress adopted the 22nd Amendment to the Constitution, which limits presidents to two consecutive terms.) Roosevelt’s health deteriorated rapidly toward the end of the war and he died on April 12, 1945, of a stroke at his home in Warm Springs, Georgia, leaving Vice President Harry Truman to see the U.S. to victory. Whether reviled as a near-socialist or a beloved as a New Deal warrior for the people, Roosevelt’s influence on American politics was significant and longstanding–every subsequent president has invoked his name at one point or another in support of their own policies. WATCH: The Presidents on HISTORY Vault Martin Luther King Jr.'s home is bombed On January 30, 1956, an unidentified suspected white supremacist terrorist bombed the Montgomery home of Reverend Dr. Martin Luther King Jr. No one was harmed, but the explosion outraged the community and was a major test of King’s steadfast commitment to non-violence. King was more King Charles I executed for treason In London, King Charles I is beheaded for treason on January 30, 1649. Charles ascended to the English throne in 1625 following the death of his father, King James I. In the first year of his reign, Charles offended his Protestant subjects by marrying Henrietta Maria, a Catholic more Bloody Sunday in Northern Ireland, January 1972 "Bloody Sunday" in Northern Ireland Mazda car company founded Gandhi assassinated Mohandas Karamchand Gandhi, the political and spiritual leader of the Indian independence movement, is assassinated in New Delhi by a Hindu extremist. Born the son of an Indian official in 1869, Gandhi’s Vaishnava mother was deeply religious and early on exposed her son to more Dan Jansen skates world-record 500 meters On January 30, 1994, the American speed skater Dan Jansen sets a new world record of 35.76 at the World Sprint Championships in Calgary, Alberta, Canada. Born in 1965 in Wisconsin, Jansen had been the youngest skater to compete at the 1984 Winter Olympics in Sarajevo, where he more Andrew Jackson narrowly escapes assassination On January 30, 1835, Andrew Jackson becomes the first American president to experience an assassination attempt. Richard Lawrence, an unemployed house painter, approached Jackson as he left a congressional funeral held in the House chamber of the Capitol building and shot at more “The Lone Ranger” debuts on Detroit radio With the stirring notes of the William Tell Overture and a shout of “Hi-yo, Silver! Away!” The Lone Ranger debuts on Detroit’s WXYZ radio station. The creation of station-owner George Trendle and writer Fran Striker, the “masked rider of the plains” became one of the most more Tet Offensive shakes Cold War confidence In coordinated attacks all across South Vietnam, communist forces launch their largest offensive of the Vietnam War against South Vietnamese and U.S. troops. Dozens of cities, towns, and military bases–including the U.S. embassy in Saigon–were attacked. The massive offensive more Maryland finally ratifies Articles of Confederation On January 30, 1781, Maryland becomes the 13th and final state to ratify the Articles of Confederation, almost three years after the official deadline given by Congress of March 10, 1778. The Continental Congress drafted the Article of Confederation in a disjointed process more Adolf Hitler is named chancellor of Germany On January 30, 1933, President Paul von Hindenburg names Adolf Hitler, leader or führer of the National Socialist German Workers Party (or Nazi Party), as chancellor of Germany. The year 1932 had seen Hitler’s meteoric rise to prominence in Germany, spurred largely by the German more
Field Robotics in Agriculture and Life Science Intelligent autonomous spraying robot • A typical sprayer sprays a certain amount of pesticide in all directions considering the surrounding environment. As a result, various problems, such as acceleration of soil acidification and economic loss due to pesticide wastage are prevalent. To overcome these problems, we propose a deep learning-based intelligent spraying system that sprays pesticides only on fruit trees. The RGB image acquired by the camera is divided into a 4x4 area image to acquire the volume of a fruit tree in that area, and each mapped nozzle is controlled through an on/off control and variable flow control. Here, variable flow control applies only the optimum spraying amount according to the orchard environment such as the fruit and tree. Specifically, variable flow control maintains the performance of the conventional spraying method (i.e., all nozzles open) and sprays undesired pesticide to a minimum. Also, SLAM was also applied the intelligent spraying system so that the spraying can be self-driving in orchards. The proposed intelligent spraying system was validated in a pear orchard and, task allocation studies are underway to apply this system to multiple robots to increase spraying efficiency in large orchards. Autonomous Fruit-Vegetable Harvesting Robot • Agricultural work requires a lot of manual labor, and therefore, research on harvesting robots to automate harvesting is active. Research on manual labor replacement with robots is usually focused on the robot’s ability for crop recognition and approaching the crop for harvesting. However, it is also important to develop an end-effector that can harvest a variety of fruits and vegetables. ​In this research, we propose the end-effector of a mechanism that can be stable during a harvest without additional and complex control for the various fruit and vegetables. To achieve the process of catching and cutting crops like humans, an end-effector was developed to suck fruits with suction cups and cut them with scissors or saws, in addition to research conducted on a plucking-type soft gripper that grabs and picks fruits. We designed an end-effector that includes structures that allow a stable catch for collecting falling crops after detachment from the pedicel, reducing the harvesting time and improving productivity Autonomous UAV-based Active Tracking and Mapping of Small Insect • Tracking micro-sized insects to preserve ecosystems and biodiversity is one of the main challenges. To track the location of insects active in a wide area, robot-based active and autonomous tracking systems are required to improve the performance of traditional human-based passive tracking. Therefore, we propose a UAV-based active tracking and mapping system based on radio telemetry. This study introduces a total of three methods of tracking systems consisting of rotational UAV (RU), multi-antenna (MA), and rotational antenna (RA). First, the RU system estimates the relative distance and direction of the target based on the radio signal strength by fixing the directional Yagi-antenna to the rotating UAV. To address the low precision and slow speed of RU-based tracking, we developed the MA tracking system that estimates the three-dimensional position of the target using three omnidirectional whip antennas, consisting of two terrestrial and one aerial type. Finally, we designed the RA-based approach to simplify the tracking system while addressing the tracking distance, precision, and speed. This study covers how the system architecture was configured, which radio propagation models were used considering the insect tracking environments, which filters were designed to reduce measurement error, how radio signals from multiple antennas were synthesized, which control algorithms were developed for autonomous tracking of mobile robots, and which mechanisms were applied to rotational systems. The effectiveness of the proposed system for localization and autonomously tracking the target was verified and evaluated via dynamic simulation and field tests. This study presents a novel approach based on a mobile robot for active and autonomous tracking of micro-sized insects. Autonomous UAV-based Active Tracking and Mapping of Small Insect • Korean cabbage is a head-type plant, similar to cabbage. And therefore, prior research has been conducted on single-row type harvester similar to a cabbage harvester; however, it is difficult to find a commercialized model based on this research. The reason is that while the stem position of a cabbage is located outside the head, meaning that there is a low possibility of damage to the head due to cutting, Korean cabbage has a stem position inside the head. Therefore, Korean cabbage must be cut at an accurate position, as there is a higher possibility of damage to the head. However, farmland environment is highly volatile and difficult to predict. In this research, a mechanism was designed for independently-controlled cutting devices during harvest. The proposed mechanism can move the roll and pitch angle and the x-axis length; non-linear control methods, such as backstepping control, are applied to reduce the degradation of hydraulic systems due to their dynamic properties. To verify the proposed system, a field test was conducted in an actual Korean cabbage field. We harvested sixty heads in total, and as a result, high cutting performance was confirmed with 90.7 out of 100 points. Furthermore, it was confirmed that attitude control was adjusted according to the cabbage field environment. The cutting attitude was maintained within the optimal cutting position range. The proposed backstepping-based attitude control system allows accurate Korean cabbage harvesting and is expected to improve the harvest success rate.
New research takes another step towards self-aware artificial intelligence Ulster University develops the first computational brain model that explains human decision confidence and change of mind Researchers at Ulster University have published the results of their work on developing the first biological neural network model equipped with self-awareness, a form of metacognition. This breakthrough research could have important implications in providing insights into brain disorders related to distorted self-awareness, or the development of self-aware artificial intelligence (AI) machines. The Intelligent Systems Research Centre (ISRC) at Ulster University’s Magee campus in Derry is the site of this pioneering research, which was recently published in the prestigious journal, Nature Communications. For years, researchers at ISRC have been working on developing and applying biologically inspired algorithms that go beyond standard AI algorithms, leveraging the solutions nature provided to solving complex problems in computing and AI. This includes utilising knowledge in brain sciences towards the development of superior and efficient computer algorithms or machines. The field of computational neuroscience helps to bridge these two areas of study by using computational models informed by biological features of the brain. In this recently published work, the computational model can automatically monitor decision uncertainty level in real-time, which can in turn improve decision-making, on average, correcting an impending error on the fly with change-of-mind, especially when decision uncertainty is high, or decision confidence is low. The model can replicate behavioural and brain activity data of humans and animals, seen in several previous studies. Overall, this computational brain modelling work is an unprecedented contribution to the field. Dr. KongFatt Wong-Lin, a senior lecturer in the School of Computing, Engineering and Intelligent Systems, a member of the ISRC, and senior author of the published work, explains. “We make thousands of decisions every day, some of which are conscious, while others are seemingly automatic, such as driving your car. Every decision is accompanied by a level of confidence which requires self-awareness, however, it is unclear how the brain can perform such calculations. Lots of people have speculated about this, including philosophers,” he says. “For the first time we have shown that we can create a neural network model, enhanced with some biological features, that can automatically detect in real-time when there is indecisiveness, giving us a degree of decision confidence or decision uncertainty,” Wong-Lin adds. “For example, if you’re browsing two rather similar items in a shop but can’t decide which one you prefer, then you will have some internal conflict and therefore a very high level of decision uncertainty. When you have high decision uncertainty, studies have shown that certain parts of the brain’s activity increase, and our model was able to replicate that whilst also accounting for behaviour concerning choice.” “We have developed a computational brain network model that can automatically detect indecisiveness on the fly, which may subsequently also lead to change-of-mind,” says Wong-Lin. The research reveals the plausible brain circuit mechanisms underlying how we calculate decision uncertainty, which could in turn influence our actions, such as change-of-mind, he explains. “In fact, this is the first time that a computational model unifies these two separate areas of research: decision confidence and change-of-mind. “When we look at the output of our neural network model it turns out that if the level of decision uncertainty is very high, the network model has a higher tendency to change its mind – as observed in humans. This is the first time anyone has demonstrated that change-of-mind behaviour is mechanistically linked to high decision uncertainty,” says Wong-Lin. “It’s not surprising when you think back about it, but we have clearly shown the relationship between decision uncertainty (or confidence) and change-of-mind. Importantly, when we used mathematical tools to analyse our network model, we showed that the mechanism of change-of-mind is due to the presence of a transient decision uncertainty-induced state which helps to override the initial decision,” he says. This fundamental research will lead to many areas of application, not least in the field of AI. Wong-Lin and colleagues at Ulster University are now working with cognitive scientists and brain scientists to further validate and develop their computer model, while forming the early stage of developing conscious machines that are self-aware of their decisions and actions. This work could in turn make AI more intelligent and interpretable. “Currently, the most popular type of AI algorithms, artificial neural networks (using black box algorithms), are being used to make important decisions, including medical diagnosis, and yet they are often difficult, if not impossible, to understand. There is no process as yet for identifying in real-time whether the algorithm was confident in the decision made. “Now, we may potentially be able to glimpse into the black box algorithms and have some understanding of their inner workings,” says Wong-Lin. Ultimately, this breakthrough technology could lead to the development of self-aware AI machines, or robots, equipped with higher forms of cognitions. “In reality, that means we will know the level of confidence before the decision is made, which will allow the users to better trust the machines,” says Wong-Lin. “Let’s take a self-driving car cruising suddenly into foggy condition. Due to the reduced visibility, the uncertainty level would be high and therefore it would be unable to make effective decisions. With algorithms similar to the one in the new model, controls could be put in place based on decision confidence level. For example the manufacturer could add an emergency signal for specific road conditions and automatically move the car to the side of the road - while explaining its decision to the passengers.” Wong-Lin believes the research may also have important applications in the study of certain psychiatric disorders, linking computational neuroscience to psychiatry – an emerging research area named computational psychiatry. For example, in some psychiatric disorders such as obsessive compulsive disorder, or addiction, there is dysfunction or distortion of a person’s self-awareness. This work could form the basis for studying distorted self-awareness, given our deeper understanding of metacognitive abilities. For more information on our projects, or to collaborate with us, contact Ulster University at enquiry@ulster.ac.uk
How long is the life of the wheel bearing What is the performance of broken wallpapers Industry 2020-10-27 Wheel bearing, do you know what it is? Bearings are a kind of basic parts used in industry. Since it is basic, its importance is of course self-evident. In a car, there are bearings where there is rotation, and there are dozens of wheel bearings in the engine gearbox. So what exactly is a wheel bearing? Today I will take everyone to get to know this tightly hidden wheel bearing! What is a wheel bearing? Wheel bearing is a key component of the car, it is the part that connects the tire/brake disc and the steering knuckle. Its main function is to carry weight and provide precise guidance for the rotation of the hub. Its mission determines that it must not only be able to bear axial load, but also need to bear radial load. The development history of wheel bearings There is always a historical process for the existence of a thing, and the same is true for wheel bearings. Parts of products will also be constantly updated and iterated to adapt to various machine applications. Hub bearings are developed on the basis of the other two types of bearings, namely tapered roller bearings and standard angular contact ball bearings. These two sets of bearings are integrated into one body, making it light in weight, large in load capacity and assembly performance. Good, compact structure, can omit clearance adjustment, omit the advantages of external hub density, etc., which also determines that it will be widely used in auto parts. Daily maintenance of wheel bearings The wheel bearing maintains the important task of driving the car and is responsible for reducing the frictional resistance when the chassis is running. Routine maintenance is definitely indispensable. Once the hub bearing fails, the most direct cause of noise, bearing heating and other phenomena.
Find us on: Possum Fur Trade History New Zealand Home Possum Fur Trade History New Zealand grey possum fur blanket There’s no telling to what lengths people will go in order to gain monetary, governmental, or personal benefit. In many instances, worldwide land, wildlife, and the ecological system itself have reaped the disastrous fruit from the seed of havoc planted by these greedy acts done by mankind. This happens all too often in this world and, unfortunately, is no exception in the current modern day of possum fur trade in  New Zealand. The Australian Brushtail Possum was first shipped over from Australia’s shore to be released in New Zealand in 1837 and became fully established in the environment in 1858. The original intent was to commence a fur trade industry which was expected to bring booming industry throughout the growing land of New Zealand. The tradesmen, who were colonial forefathers of New Zealand, were unfortunately extremely ignorant of the horrible implications these possums would bring to the balance of their delicate ecosystem. This marsupial thrives in New Zealand’s lush habitat with no predators, with the exception of mankind, to keep a natural balance. It did not take long for the possum to compete with the native plants and animals surviving in the shared habitat. This has only brought destruction and, in some cases, endangerment of species. Having no self-control, the possum consumes the leaves of entire trees which leaves the poor trees nothing to photosynthesize off of and eventually they die before their naturally allotted time. These creatures also find their select choices of nourishment before other animals, who consume the same food. On a larger scale, this could eventually cause some forest canopies to collapse. The more these animals miss out on their essentials to life the sooner the time will come that we will see the entire degradation of many species of plants and animals throughout the beautiful country of New Zealand. possum on a tree branchAlthough possums are primarily vegetarian, observations have been made that they also tend to enjoy the occasional bird egg or even baby chick along with different kinds of insects. This has given them the name of “reluctant folivores”. This means that they survive on foliage, and consume other food types every-so-often. The habits of the Australian Brushtail Possum have put species of birds, such as the Tui, Kereru, and the already endangered Kokako, in more danger than they have ever been in the history of their being. Currently, there are so many angles against this precious animal. The possum is a beautiful animal and should never have been put into this position of survival in a land that is not its own, only to be hated and hunted. The primary purpose that the possum was brought over to New Zealand’s green rolling hills was to begin a regular business of hunting and skinning of their hyde to sell the fur for trade and significant profit. Acclimatization Societies first released 36 batches of possums between the years 1858-1921. The possums were allotted that specific time frame for multiplication before the hunting began. After 1921 further release was prohibited. Records show that 21 grey possums were released in the South Island near Dunedin in 1894. After only 18 years well over 10,000 possum skins were taken from that area during the temporary regulation lift of 1912. This is a tremendous jump in population and perhaps should have been the warning signal needed, but revelation did not come so easily. trapped possumIt was not long before heavily licensed possum trapping commenced and became legal for three months annually. Despite this decree, poaching continued throughout the entirety of the year. When numbers grew uncontrollable it seems the government finally had enough. In 1946 all regulations were completely lifted and the possum was declared to be a noxious pest. The New Zealand Department of Conservation and National Possum Control Agencies declared possums pests and encourage the eradication in hopes this would control the population numbers. It was soon obvious that this plan was coming to a very different outcome. Once this occurrence took place, the New Zealand government had come to terms in realizing this animal would never be eradicated. Now, the primary goal morphed to be recovering the balance with the native wildlife of New Zealand. $80 million of the government’s annual income is used for possum control around the country. Besides the three months legal hunting season, government workers are set out to use 1080 poison in areas where the possum population is more substantial. This type of poison is prohibited in some countries around the world. When the government sweeps through to poison the helpless creatures, the remains of the animals are thrown away in the bush and left to rot. An unfortunate alternative to the fur trade is to use their meat. It is not likely to be found on a menu, possum meat is not often eaten by humans except in select Asian countries. Some possum meat is sent from strictly controlled areas to Taiwan, Hong Kong, and Malaysia and is being served as a delicacy called “Kiwi Bear”. A small amount of possum meat is used for cat and dog food. This meat is harvested only from the TB and poison free areas. Laws regarding using possum meat have now been changed. However, they continue to be under strict conditions. Fertility control has been suggested as an alternative to eradicate the possum population more slowly over time in hopes that using more natural means would prove to be more effective and simultaneously more humane. The fur industry is an extreme and cruel way to balance the numbers of the population of possums in New Zealand. Labeled as “ethical fur”, the extremists involved in this act of species eradication, attempts to change people’s’ perspectives in favor of their own objective as a ploy to destroy the possum population once and for all, or to allow the business of fur trade to continually flourish. Despite all this, the solution is not necessarily to outlaw the possum industry. This would take away the incentive for possum hunting which, in turn, would greatly increase governmental effort and budget for possum control, meaning extensive mass slaughter by poison and other means. possum on a tree branchFarmers are likely one of the people groups most affected by this controversial epidemic. It is a well-known fact that possums are carriers of the bovine Tuberculosis virus. This is extremely threatening to the farming industries raising cattle and deer. In their best efforts, possum control programs have reduced TB levels in deer and cattle herds by 60% in the last five years. There are roughly 30-40 million possums and they typically devour nearly 8 million tons of vegetation every year. With all these negativities against the possum, unfortunately, the line is thinly drawn between the morality focus of both the Australian Brushtail Possum and the health and safety of people, plants, and other animals of New Zealand. On average, 1.5 million possums are killed each year due to the fur trade industry. This is not a huge dent in the overall population, thus forcing the government of New Zealand to seek drastic measures for the betterment of their people and ecological system. There is not yet a concrete solution to this unique situation that plagues the minds and sanity of the New Zealand government, people, and ecosystem. The decisions we make in life can drastically alter broader reaches of humanity and nature more than we can possibly even realize in our own lifetime. To choose life also comes with the conundrum of which life is the priority to choose when the lives being hunted are the ones causing the annihilation of more lives and bringing the possibility of complete destruction. Life is full of choices. Let us learn from those of our forefathers and move forward into a better tomorrow.
44 2033180199 Nanotechnology Letters Zhao Sugiyama* Department of Material and Fiber Innovation, Deakin University, Geelong Campus, Victoria 3217, Australia, Email: [email protected] *Correspondence: Zhao Sugiyama, Department of Material and Fiber Innovation, Deakin University, Geelong Campus, Victoria 3217, Australia, Email: [email protected] Received: 01-Nov-2021 Accepted Date: Nov 15, 2021; Published: 22-Nov-2021 Citation: Sugiyama Z. The optical properties and the uses of nanoceramics. Nanotechnol Lett 2021;6(2):4. select fc.p_content,fh.head_name from ft_content fc left join ft_headings fh on fh.head_id=fc.head_id where fc.art_id='9547' and fc.head_id not in(12) ORDER BY fc.recordListingID ASC Nanoceramics are a type of nanoparticle first discovered in the early 1980s composed of ceramics. Industrial or high-performance ceramics are made from high-purity, carefully selected materials such as silicon carbide and aluminum oxide, far from the traditional clay tile pots and dishes that come to mind when it comes to "ceramics." The term nanoceramic refers to materials made from ultrafine particles less than 100 nm in diameter and is classified as non-metallic solids, inorganics and heat resistant. The most important ceramic materials are systems made from carbides, metal oxides, borides and nitrides, which are small in size and rarely defective. Nanoceramics were initially manufactured using the sol-gel method. This sol-gel process is a form of chemical solution deposition that mixes nanoparticles and gel in solution to form nanoceramics. Nanoceramics have unique chemical, physical, mechanical and magnetic properties that make them different from other materials such as plastics, metals and traditional ceramic bulk materials. These unique and often improved properties of ferromagnetism, dielectric, ferroelectric, pyro electricity, piezoelectric, reluctance, and superconductivity are the types and quantities of materials that make up nanoceramics, and the size of the raw materials. Nanoceramics also have excellent machining, mechanical and surface properties such as ultrastrength and toughness, plasticity, machinability and bioactivity, all of which depend on the size of the particles used to construct them. Nanoceramic properties The bulk behavior of a material can change dramatically, for example, if it is made from nanoscale building blocks that affect the properties of the final product. Nanoceramics are extremely strong and have high compressive and bending strength. Their strength is similar to that of steel, and most ceramics retain their strength at high temperatures. However, their brittleness is the biggest technical obstacle to their practical application, especially in load-bearing applications. The physical and mechanical strength of nanoceramics depends on the size of the particles used to make them, as traditional brittle materials can increase ductility by reducing the size of the particles used. Ceramics made from nanoparticles can be superplastically deformed at moderate temperatures before being heat treated at high temperatures for high temperature solidification. Nanoceramics are relatively inert, and when they become reactive, they develop desaturation and defects. Some iron-based or nickel, barium, and chrome ceramics have metallic properties and are highly resistant to demagnetization. Nanoceramic applications One of the main applications of nanoceramics is biomedical and medical technology, especially bone shaping. Bioactive nanoceramics are similar to bone packages and can function as nano-altars that support bone regeneration. It has also been suggested that nanoceramics can be found in transportation systems, fuels and warehousing, transportation, aerospace, and construction applications. They also use electronic equipment as semiconductors, insulators, operators and attractions. Nanoceramics can also be used in armor to replace the hard, tough layers of shock-absorbing fibers. Hard body armor, including ceramic inserts and swords or titanium plates, is under development and has weak protection against blunt trauma and may provide high security in a hurry. The insert absorbs kinetic energy from the shot and can dissipate it with local fragmentation of the ceramic insert. Google Scholar citation report Nanotechnology Letters peer review process verified at publons
The Best Way to Mince Garlic Does the method of mincing garlic matter? We tested various methods to find out. Overhead photo of peeled garlic. Daniel Gritzer "the more cells we rupture when cutting garlic, the more potent it is." The fact that microplaned garlic is more pungent than minced isn't particularly shocking in and of itself. We all know that garlic's intensity in a dish isn't just dependent on how much garlic there is, but also how it's been prepared: a single whole clove will deliver less intensity than a crushed one, a crushed clove will be milder than a sliced clove, and a sliced one isn't as pungent as a chopped or pureed one—the more cells we rupture when cutting garlic, the more potent it is. What shocked me, though, was the degree of difference between finely minced garlic and grated garlic. The microplaned garlic wasn't just more intense than minced, it was downright noxious. You could defeat an army with its mustard gas-like punch. I've been curious about this effect ever since, so I decided to dig a little deeper with some more focused testing. The results are helpful, because they shed light on just how important the mincing method can be. Deciding whether to finely chop, crush in a mortar and pestle, pass through a garlic press, or reach for that microplane isn't just a question of which you find most convenient: it can have a major effect on how your food tastes. The Best Defense is a Good Offense If you're wondering why garlic smells the way it does, the answer is biological warfare. When its cells are damaged, say, by a pest, two molecules, one called alliin and an enzyme named alliinase come into contact with each other, and together produce a new compound called allicin, which is responsible for the pungent, vampire-repelling smell we associate with garlic. The more cell damage that occurs, the more allicin is produced, and the stinkier the garlic becomes, which is why a single clove can have such varying impact on a dish depending on its form. According to McGee, there are plenty of other forces at play that also have an effect on the potency of garlic. Everything from the variety of the garlic, to the temperature where it's grown (cold apparently makes for stronger garlic), and what kind of fat it's cooked in (butter leads to milder garlic flavors while unsaturated vegetable oils unleash more assertive ones) can change how it smells and tastes. Despite garlic's best self-defense efforts, though, we humans can't seem to get enough of it. Mincing Raw Garlic Labeled photo showing garlic cut in different ways. Daniel Gritzer To start my garlic tasting, I first wanted to focus on the flavors of raw garlic minced several different ways. They included hand-chopping, garlic press, mortar and pestle, knife-blade pureeing, and microplane. I tasted each method multiple times and in different orders to give each a fair shake. Unfortunately for my girlfriend Kate, I ate all this raw garlic before heading to an evening salsa class with her. (Sorry, baby!) Hand-Minced With a Knife Mincing garlic with a knife. Daniel Gritzer This is the technique I use most often in my own cooking, passing the knife repeatedly over the garlic until it's been reduced to a pile of fine bits. While tiny, the knife-minced garlic has the largest and most discrete pieces than any of the other methods I tested. It's also the driest—hand mincing doesn't break open and release the fluids of as many cells as the other methods. Overhead photo showing pile of minced garlic. Knife-minced garlic. Daniel Gritzer As for taste, the hand-minced garlic was relatively mild (relatively is a key term here). It had a nice garlicky flavor that, even after chewing, remained on the mellow side. A subtle burn eventually kicked in, but it was slow and never really hit unpleasant levels. Garlic Press Garlic press on cutting board next to garlic cloves. Daniel Gritzer The garlic press has gotten a pretty bad rap, and a lot of cooks would be ashamed to be caught with one (others have come to its defense). I haven't owned one in years, but I picked one up for these tests, and it honestly wasn't as bad as I was expecting. It wasn't great either: the garlic came out in a pile of irregular squiggles and juice sprayed as I squeezed the handles. Minced garlic coming out of garlic press. Daniel Gritzer The flavor was more aggressive than the hand-minced cloves, and started to burn my tongue after about five seconds. Here's one notable word from my tasting notes: "farty". Still, it wasn't the abomination some folks have claimed it to be. Overhead photo of pile of minced garlic. Garlic-pressed garlic; some of the sprayed juices can be seen on the cutting board. Daniel Gritzer Mortar and Pestle Mortar and pestle on cutting board. Daniel Gritzer I was bracing for a really intense garlic flavor from the mortar and pestle, given how thoroughly you can pulverize garlic in it, but I was surprised to find it not much more aggressive than the garlic press. Crushed garlic in mortar. Daniel Gritzer It emitted some sulfur notes, but it also had a sweetness to it, with a not-too-strong burn. Pile of crushed garlic on cutting board. Mortar and pestle garlic; note that while wet, mortar-and-pestle garlic does not weep juices in a puddle below. Daniel Gritzer Knife-Blade Pureeing Crushing garlic with the side of a knife. Daniel Gritzer This isn't the easiest technique to learn, but with a little practice anyone can master it. To do it, start by roughly mincing the garlic. Then, with the side of the blade's edge, you push down to crush the little bits into a puree. Try to smash too much under the blade at once and it becomes incredibly difficult if not impossible. Normally, I sprinkle salt on top of the garlic, which acts as grit to break the garlic down, but for this test I left to salt out to keep it similar to the other samples. Crushed garlic on cutting board. Knife-blade pureed garlic. Daniel Gritzer The flavor of this raw puree was tolerable, but it had a burn that kicked in fast and then started to feel painful. This is intense stuff. Microplane on cutting board next to whole garlic. Daniel Gritzer I'll quote myself from my tasting notes here: THIS HURTS OH MY GOD SAVE ME MY TONGUE WAAAAAHHHHHH! Next thing I knew I had my head in the sink, whimpering as cold water splashed over my extended tongue. When I repeated this test later, I was immediately back under the sink. Grating garlic on a microplane. Daniel Gritzer Without the aid of a microscope and all sorts of other tools, I can't say with any certainty why the microplane produces raw garlic that is so dramatically different from the others, but it really does seem to. To the naked eye, it certainly looks the most pureed of all the samples. Crushed garlic on a cutting board. Microplaned garlic. Daniel Gritzer Overall, what I took away from this raw-garlic test is that on the mincing spectrum, knife-minced garlic is by far the mildest, microplaned garlic is so aggressive it could be charged with assault, and the other three are in the middle with very different textures but not remarkably different flavors. Pile of garlic grated with microplane. The amount of liquid that bleeds from microplaned garlic is an indication of just how thoroughly the cells are shredded. Daniel Gritzer Quick Cooking Next, I wanted to see how the flavor of each method changed when exposed to high heat for a short amount of time. To test it, I cooked one teaspoon of each type of garlic in one tablespoon of melted butter over high heat. Here's what I found: • Knife-Minced: Once again mild, with little bits of chewable garlic that are tender and sweet. • Garlic Press: Stronger overall flavor than the knife minced, with a medium burn in the throat. It's a little sweet but also a little harsh. • Mortar and Pestle: Quite sweet with tender mashed chunks. Pretty tasty, with a very mild burn that sets in late in the back of the mouth. • Knife Pureed: The baby bear—neither too sweet nor too harsh, too mild nor too strong. • Microplane: The burn sets in faster than the others, with a slightly acrid taste, but not nearly as bad as raw. Unpleasant bitter aftertaste hangs in the mouth, but it's not severe. What I think is important here are the broad-stroke observations: heat appears to tame the strength of the raw garlic in all cases, but those aggressive allicins (and whatever compounds they turn into over time and when exposed to heat) are still stronger with more finely minced/pureed garlic, while the microplane sample continues to stand out as the strongest of them all, though not nearly as much as when it was raw.* *To go back to my shrimp scampi experience, it's worth noting that I was sautéing the microplaned garlic in olive oil, an unsaturated vegetable oil, which McGee says produces stronger flavors; this may explain the more extreme effect in that case as compared to the butter in this test. We still have a spectrum, but it's getting compressed. Long Cooking For my final test, I wanted to see what extended cooking did to the flavor of the minced garlic. For this one, I only looked at hand-minced and microplaned garlic, since they had proven themselves to be the extremes that define the spectrum. I had a bunch of beef shanks in my fridge, so I decided to do a braise with plenty of onion, carrot, garlic, and red wine, making two batches simultaneously, the only difference being the method of garlic prep. I started by searing the shanks, then put them to the side while I sautéed the aromatics. Side-by-side, I could smell the difference: the microplaned garlic was once again producing an acrid, stronger smell, even after 20 minutes of cooking, by which time the carrots were very tender and the onions golden. Minced garlic and knife on cutting board. I added red wine to the two pots and continued to taste while it simmered. The batch with minced garlic had a sweeter flavor, with a more subtle, rounded presence of garlic, while the other pot had an edge of bitterness to it. By the time the beef was back in the pots and I was ready to move them to the oven, I could still smell and taste the difference. But three hours later, when I took the tender shanks out and blended the braising liquid and aromatics into a sauce, I found that they tasted exactly the same; if there was a difference, I wasn't detecting it. With a long enough cooking time, that broad range of garlic flavors had finally been reduced to a single mellow garlic base note, regardless of preparation method. Lessons Learned Reading this, it may sound like I think microplaning garlic is a terrible thing. But that's not the case. I can imagine plenty of scenarios where we might want a garlic flavor that's strong enough to kick us in the cloves. Mayonnaise, for example, with all its rich egg-and-oil creaminess, could benefit from that assertiveness. Other times, we may want to take a more gentle approach. The key, I think, is to proceed deliberately, with the realization that the various options for mincing or pureeing garlic are not as interchangeable as they might seem. If a recipe calls for minced garlic, it's not just a matter of deciding which method is most convenient, or which method we happen to personally find easiest. There's an important decision to be made, since each approach will produce a different set of textures and flavors that, when raw or quick-cooked, will have a significant impact on the final dish. The next time you cook something, don't stop considering your options after choosing whether to leave the garlic whole, crushed, sliced, or minced: think about the exact mincing method, if that's the direction you end up taking. Crushing garlic with the side of a knife.
what causes severe brain fog? what causes severe brain fog? Brain fog can be a symptom of a variety of medical conditions, including: • infections • inflammation • tumors • nutritional deficiencies • drug side effects What are the common causes of severe brain fog? Brain fog can have many different causes, some more severe than others. Some of the most common causes of severe brain fog include: • infections such as meningitis or encephalitis • inflammatory conditions such as lupus or rheumatoid arthritis • tumors such as gliomas or metastatic cancer • nutritional deficiencies such as low levels of vitamin B12 or iron • drug side effects such as those caused by antibiotics, statins, or opioid pain medications How do I know if I have brain fog? Brain fog can be difficult to recognize, since it often coincides with other symptoms. However, there are some key signs that may indicate you are experiencing brain fog. These include: • Feeling forgetful or having trouble concentrating. li>Having problems processing information or speaking fluently. li>Feeling mentally confused, slowed down, or groggy. li>Feeling disoriented or dizzy. li>Experiencing changes in vision, hearing, taste, or smell. li>Having a headache or feeling generally ill. li>If you are experiencing any of these symptoms on a regular basis, it is important to see a doctor to determine the cause. ul> If you think you might be experiencing brain fog, it is important to see a doctor for diagnosis and treatment. Brain fog can have a variety of causes, some more serious than others. Early diagnosis and treatment can help reduce its severity and improve your quality of life.
Every parent in the world is looking for interesting hobbies and things they can do with their children. We tend to bond over movies or music but if you want to implement something more interesting, unique, and a healthier option than just sitting inside the home and staring at a screen, then you might want to explore horticulture. There are many conveniences that come with the process, and you don’t have to have a huge yard or space to grow some herbs. If you think that your child has the potential to be interested in this, then you can use this 2022 guide to learn how to get your kids started with gardening. Don’t Make Them Use Your Equipment Once your little ones show some interest in agriculture, be prepared to teach them about the tools they would need, how they can be used, and what they need to do to make sure they stay safe. If you let them use your tools, it is highly likely that they are going to be too big for their little hands, or they can be too heavy or even too sharp. To avoid any injuries or discomfort while using them, invest in separate tools and equipment for your kids and teach them how to use them with ease. You can even go shopping together and let your little ones pick the colors and the size they are comfortable with. This way they will feel like they are making decisions and they are going to be more likely to look forward to the horticulture. Don’t Confuse Them With Too Many Things When we reach a certain age, we learn that some types of fruits and vegetables thrive when they have a lot of attention, when they get a lot of water, and when they are put directly in the sun. On the other hand, there are other types that are going to get diseased and perish if they are subjected to more nutrients than they want, and all these things defer depending on the type of flora. If you try and teach your child all these things right away, or if you give them many different types of vegetation to care about, they are going to get confused. Start slowly, and plant things that are similar when it comes to watering and nurturing. As your child’s interest cultivates and as their understanding increases, you can introduce more varieties of fruits and vegetables. Do Separate Research As a parent, and as a grownup, you need to be the one who does the research and chooses the right time to start this process. Depending on what you want to seed, you will need to do it at separate times of the year. Some vegetation needs to be planted in the early spring, while others will thrive if you seed it in late summer or early fall. Do your research to ensure that the seeds will develop and cultivate, and don’t forget to check how much water that exact type of plant needs, where they need to be placed; if they need a lot of watering, or just once or twice per week and so on. Do your homework if you don’t want your little one to get discouraged thinking that the greenery is not flourishing because of their mistakes. Know What to Start With There are hundreds of different seeds, fruits, and vegetables that you can cultivate in your garden, and if you live in an area where the winters are not too cold, and the summers are not too hot, it means that only the sky is the limit when it comes to options. However, just because something can grow in your backyard, does not mean that all of those things are going to be interesting for your little ones. Experts suggest that you should opt for vegetations that are easy to maintain and that will cultivate fast. This way you can keep your little ones interested and they can enjoy their shrubs faster. If you are not sure which plants are the best, you can check this website to see which are the top five fruits and vegetables that are easy to grow and interesting for kids. Allocate Separate Spaces When you give your kids their own space for horticulture, they are going to feel like they have more control and like they have a special place for their shrubs. We are all much more invested in things when they are separate and when they are not put alongside everything else. So, be smart right from the start, and allot a place in your main garden where your little one will be able to seed their own herbs and see them cultivate. If you have two or more children, give every one of them a special place where they can grow the herbs and vegetables and if possible, make it a competitive game, or encourage them to help each other. Explain the Flourishing Process Finally, you will need to make sure your little ones understand the process of flourishing and that things don’t happen overnight. We all know that children want things to happen right away, and if they don’t see the result immediately, they can get discouraged or lose interest. Because of this, you need to talk to them about this process and give them a timeline on how long they will need to wait until they can see the fruits of their labor. It is recommended to opt for vegetation that is going to cultivate above the ground, not inside, so the little ones can notice even the smallest difference. Work with them, let them see the changes, and encourage them to be patient. Every child, just like every adult takes interest in different ways. Depending on the age of your little one, you may need to include games, different toys, equipment, and different floras. Start small and let your kids get interested on their own. If you see that they are not interested in agriculture, don’t push them. Keep in mind that it is better to start small, with just one seed and one small herb, and cultivate the garden as your child’s interest in it cultivates as well. Previous articleReading Reviews Before Purchasing Service Online – Why it is Important?  Next article6 Reasons Why are Headband Wigs Going Viral in 2022
Where Does The President Of Brazil Live? Palácio da Alvorada, Brasilia. Editorial credit: Wagner Santos de Almeida / Shutterstock.com. The President of Brazil is the head of government, head of state, commander-in-chief, and head of the executive branch of government in Brazil. The office of the president was established in 1889 after the military overthrew Emperor Pedro II. The country’s constitution and constitutional amendments establish the requirements, responsibilities, and powers of the president, as well as the method of selection and term of office. Current laws require a presidential candidate to be at least 35 years and a native citizen of Brazil. The president is voted into office by popular majority and must garner at least 50% of the votes to be declared the winner in the first round. If none of the presidential candidates reach this threshold, the top two are subjected to a runoff vote. Each presidential term has a duration of four years, and a president can be re-elected for a single consecutive term. However, a former president is eligible to run again after at least one term elapses. After the president is sworn in, he or she moves to the official presidential palace in the nation's capital, Brasilia. Official Presidential Residence The official residence of the President of Brazil is the Palácio da Alvorada. Located on a peninsula along the shore of Paraná Lake, within the nation's capital city, Brasilia, construction of the building began on April 3, 1957 and was completed on June 30, 1958. Juscelino Kubitschek was the first president to occupy the residence, and it has been occupied by every Brazilian president since. The building was designed in a modernist style by Brazilian architect Oscar Niemeyer and is now designated as a National Historic Heritage Site of Brazil. History of the Palácio da Alvorada The Palácio da Alvorada was the first government building to be constructed in the newly established capital of Brasilia. Originally designed by architect Oscar Niemeyer based on principles of modernity and simplicity, the building underwent a massive renovation and restoration process in 2004 at a cost of about $18.5 million. Rooms, decor, and furniture were all restored to their original style, while electronic equipment including air conditioners were replaced. The cost of the restoration was not paid for by the government, but by the National Institute of Historic and Artistic Heritage using funds donated by private corporations. Building Architecture  The building has a total area of about 75,000 sq ft distributed across three floors: a basement, landing, and second floor. A heliport and chapel are also located within the palace grounds. The basement contains the kitchen, game room, movie theatre, medical center, administration, and laundry rooms. The ground floor features state rooms used for official presidential receptions, a waiting room, library, noble room, mezzanine, music room, and banquet room. The second floor houses the residential part of the building. The president’s apartment consists of four suites, guest apartments, and several private rooms. About 160 employees work to keep the presidential residence in operation. Staff include doctors, cooks, waiters, secretaries, assistants, and security personnel. More in World Facts
© 2021 WYPR 20th Anniversary Background Play Live Radio Next Up: Available On Air Stations 'Everyone Would Have Left': Putting Lessons From Hurricane Michael To Work A boat moved by Hurricane Michael rests near a canal in May in Mexico Beach, Fla. Seven months after the hurricane made landfall, the town is still littered with heavily damaged or destroyed homes and businesses. Scott Olson/Getty Images Michael was a Category 5 storm that ripped through Florida's Panhandle with 160 mph winds. The night before it made landfall, Lynn Haven, Fla., Mayor Margo Anderson was in the city's administrative building preparing to ride out the storm. The National Hurricane Center warned that Michael was strengthening and was now likely to come ashore as a Category 4 storm with winds over 150 mph. She went on Facebook Live with a message for the town's 20,000 residents: "If you are in a house that you don't think will take sustained winds of 100 miles per hour for several hours tomorrow," she warned, "you still have time to go to a shelter." As it turned out, Anderson and other officials in the city's administrative building should have followed that advice. A temporary pavilion now occupies the ground where the administrative building stood. Showing a picture on her cellphone, Anderson points out "the hallway where myself and the 40 members of the police department ... ended up at the end of the storm." The roof of the building where they sought shelter is gone. Debris is everywhere. Insulation and wires hang from the ceiling. A concrete building, she says, and Hurricane Michael "ripped it away around us. We survived in the last standing hallway." The brick-and-concrete building, built in 1928, was reduced mostly to rubble. Nearly every building in Lynn Haven suffered severe damage. More than 250 homes were completely destroyed. Now, eight months later, Anderson says with better information and a bit more time, she would have done things differently. "Had we known it was going to be a Category 4 before we did, then everyone would have left," she says. "If I had known that it would strengthen and we had that kind of forecast before it came ashore, I would have had my police and fire [departments] evacuate as well." For emergency managers in charge of evacuations, there's a well-worn adage: hide from wind; run from water. That's because the vast majority of deaths in hurricanes are people who drown in flooding, including storm surge. Because of that, as Hurricane Michael approached the Panama City area, Joby Smith, the chief of emergency management in Bay County, says evacuations were ordered mostly for areas near the water. "Storm surge is what most evacuation models are based on," he says. "And we also take into consideration though within our walls here, what do the winds look like?" Because of last-minute warnings that Hurricane Michael might intensify, Bay County increased the areas under mandatory evacuation. A traffic assessment done after the storm suggested just one-fifth of the county residents ordered to evacuate actually did so. In Mexico Beach, Fla., the community where Hurricane Michael made landfall, the percentage of those who evacuated was much higher. Only 50 people were known to have been there at landfall. "Police went door to door in Mexico Beach," says Jay Baker, a researcher and retired Florida State University professor who studies hurricane evacuations. "Now it's a small community. But that is by far the most effective way to disseminate evacuation notices." Unfortunately, three of those who remained in Mexico Beach died in the storm surge. Elsewhere, several people died after being hit by falling trees or debris. Baker says that's one of Michael's reminders: high winds also kill. "I do think that there are a lot of people ... reassessing whether or not it's advisable to stay behind if you're going to have winds like this," Baker says. "A lot of the damage that was done wasn't to wind just blowing houses away. It was blowing big trees down onto houses." Two people died during the storm in Jackson County, a rural area more than 40 miles from the coast with just 50,000 residents. Mandatory evacuation was ordered for people who live in mobile homes, which is almost a third of the county. But Rodney Andreasen, the director of emergency management in Jackson County, says even those who lived in permanent wood or stone structures weren't safe. "We saw a lot of the older buildings, brick buildings in town that collapsed and were destroyed," Andreasen says. "Some others were heavily damaged just from the wind, collapsing. The building next to us, it just came apart." Andreasen says buildings on Florida's Panhandle simply aren't designed for winds like those seen in Hurricane Michael. "I think it woke up a lot of people to that fact," he says. "And we're going to start seeing a lot of things change because of that." Among those likely changes: how people prepare for storms, how many evacuate and how strong new construction on Florida's Panhandle will need to be to survive hurricanes like Michael.
Provided by: manpages-dev_4.15-1_all bug getpeername - get name of connected peer socket #include <sys/socket.h> amount of space pointed to by addr. On return it contains the actual size of the name returned (in bytes). The name is truncated if the buffer provided is too small. EBADF The argument sockfd is not a valid file descriptor. EFAULT The addr argument points to memory not in a valid part of the process address EINVAL addrlen is invalid (e.g., is negative). Insufficient resources were available in the system to perform the operation. The socket is not connected. The file descriptor sockfd does not refer to a socket. POSIX.1-2001, POSIX.1-2008, SVr4, 4.4BSD (getpeername() first appeared in 4.2BSD). getpeername() to obtain the address of the peer socket. On the other hand, datagram sender when using recvfrom(2). accept(2), bind(2), getsockname(2), ip(7), socket(7), unix(7) found at