text
stringlengths
144
682k
Hiroshima University researchers have identified a specific molecule that maintains pain after a nerve injury and have been able to block it in lab animals. This discovery may reveal a promising therapeutic strategy for treating neuropathic pain. Lab animals with an injury to their sciatic nerve showed less pain after multiple injections of a medication that blocks the activity of a molecule called high-mobility group box-1 (HMGB1). The team also discovered that a single dose of a substance to block the activity of a different molecule, called matrix metalloprotease-9 (MMP-9), could also alleviate pain from the injury. The chemical pathways these substances use to inhibit HMGB1 or MMP-9 are different from common pain releivers, like opioids or acetaminophen. Therefore, the potential for addiction or negative side-effects may be reduced. The results reveal that the substance to block HMGB1, called anti-HMGB1, has the downstream effect of preventing the increase of MMP-9 that would normally be expected when HMGB1 increases. Therefore, an inhibitor of MMP-9 may be a more direct route to produce the same effect. This is the first study to link HMGB1 and MMP-9 together in the cellular process of maintaining pain. These researchers, led by Professor Yoshihiro Nakata, PhD, at Hiroshima Umiversity's Institute of Biomedical and Health Sciences began their investigation of sciatic nerve pain as part of their long-term studies of the central nervous system. Professor Nakata's team demonstrates a pain-relieving effect from injecting anti-HMGB1 into the hip in the slightly broader area around the nerve, called a perineural injection, avoiding the complications of other injectiom methods. A localized injection also avoids the potential side-effects of delivering the medication through larger body systems, like a pill into the digetsive system or an injection into the blood. Blocking HMGB1 lessened pain with no negative impact or healing. Selectively blocking MMP-9 also relieved pain with no obvious changes to the activity of other molecules responding to the injury. It is surmised these results show promise for relieving nerve pain wit a chemically specific approach that is convenient for patients. Source: ScienceDaily, 29 February 2016 from Hiroshima University.
Community Research and Development Information Service - CORDIS NeBRiC Result In Brief Project ID: 301230 Funded under: FP7-PEOPLE Country: Switzerland Cosmology can be surprising when you add more detailed physics Models of the large-scale evolution of the universe start by simplifying the physics to get the big picture. Adding more realism with concepts such as non-linearity and back-reaction can reveal unexpected effects. Cosmology can be surprising when you add more detailed physics Cosmology has gone through a revolution during the last decade owing to the large amount of new precise observational data. These data strongly indicate the existence of two periods of accelerated expansion in the history of the Universe. One is in the primordial universe, the so-called inflationary phase, and one at the present era. Data and models are linked mostly using linear perturbation theory. However, beyond simple linear order many interesting effects such as non-Gaussianity appear. Take for instance, the CMB (Cosmic Microwave Background) and backreaction (BR) effects. Quantum BR of primordial fluctuations can significantly modify the dynamics of the early universe and its observational signatures, while classical BR of large scale structure (LSS) might contribute to the observed late time acceleration. The goal of the NEBRIC (Non-linear effects and backreaction in classical and quantum cosmology) project was to quantify these non-linear effects more precisely. There has been a lot of recent interest in the generation of cosmological seeds for the magnetic fields observed in galaxies and clusters during inflation. The project has demonstrated how the adiabatic renormalisation of the two-point function of the magnetic field is not viable for the generation of an inflationary magnetic field. In a chaotic inflationary model, the backreaction effects due to long wavelength scalar and tensor fluctuations on the effective Hubble factor and equation of state (with respect to different classes of observers) were investigated. It was shown how the observed dynamic for a test field observer can be different from the background equivalent. NEBRIC research has led to the formulation of new tools. This has applications in the field of relativistic cosmology, particularly in the study of the non-linear and relativistic physics to extract information from LSS surveys and CMB experiments. The project has shown how the impact of stochastic inhomogeneities on LSS cosmological observables cannot be responsible for the present acceleration of the Universe. The bispectrum of the galaxy number counts has been calculated for comparison with observations from LSS surveys. The study has shown how to take into consideration the impact of inhomogeneities on local measurements. This can explain the different values of the Hubble parameter obtained via different measurement techniques. Related information Cosmology, linear perturbation theory, cosmic microwave background, backreaction, Hubble parameter Record Number: 183092 / Last updated on: 2016-07-26 Domain: Industrial Technologies
Creating Step-wise Forms with ASP.NET MVC and Kendo UI For forms with complex procedures, a step-by-step assistant (often called a wizard) can be helpful. In this article we’ll identify some basic scenarios where a step-wise form is beneficial, identify the working pieces and learn to build a step-wise form with Kendo UI and Telerik UI for ASP.NET MVC. Wizard Scenarios Step-wise forms, multi-step forms, or wizards, are a heavy UI, best used for multi-step, infrequently performed tasks. The decision to use a step-wise form shouldn’t be taken lightly. Still, they are practical for many scenarios, which is why they are still found frequently in software today. Prime examples of step-wise forms are seen in e-commerce check out processes and registration forms. And anyone who has used tax software before can admit that entire applications can be made up of many wizards. Anatomy of a step-wise form The goal of a step-wise form is to guide the user through a process, so it’s important to understand what makes up the form and why each piece is needed. 1. First, the form should always let the user know where they are in the process. A progress bar should be used to indicate which step the user is on and how much of the process remains to be completed. 2. The form should be grouped into tasks that are made up of related inputs. By breaking a long process into smaller related tasks, the user can move through the process with less distraction. Steps for the form should be identified at the top to provide context to the group and it’s location in the overall process. 3. Buttons may seem trivial, but they serve a very important role in a step-wise form. Buttons are the primary source of navigation for the form and the buttons should be labeled according to their purpose. Previous, Next, and Finish are all excellent examples. 4. Finally, each step in the process should be validated independently. Validating at each step helps keep the form concise and ensures that users wont need to return to previous steps to fix an error. Knowing the makeup of a step-wise form will help understand what is needed to create one. By looking over the pieces, familiar UI concepts can be identified, all of which can be found in Telerik UI for ASP.NET MVC. Putting it together A step-wise form can be accomplished by using a combination of just three Kendo UI widgets: the progress bar,; tab strip; and buttons. The progress bar will track the overall status of the form, the tab strip provides a container for each step and organizes the inputs into groups, and the buttons offer simple navigation between steps. First, we’ll setup a progress bar using Telerik UI for ASP.NET MVC’s HTML Helper. Configuration of the progress bar is important because there are various types of progress bars supported by Kendo UI. In this example, we’ll be using the Value type progress bar. The Value progress bar is easier to use in this circumstance because it relies on whole number values rather than percentages. Using whole number values we can simply set the value of the current step to the value of the progress bar, no calculations required. .ShowStatus(false) // Don't display the value, we'll let the tab strip do that. .Max(4) // Number of steps in the form .Value(1) // Start at step 1 Next we’ll open up a form tag using the BeginForm helper. The form will contain all of the steps so that when it is submitted we can capture all of the data on the server through model binding. { ... } Inside the form, initialize a TabStrip helper, each Item in the tab strip will be a step in the form. .Items(tabstrip => { ... }) Partial views can be used with the tab strip to keep them clean. When using strongly typed models, the model can easily be passed to the partial in the content property of the tab strip item. .Items(tabstrip => tabstrip.Add().Text("Account Setup") .Selected(true) // select the first tab // Set the tab content to a partial view using a strongly typed model .Content(m => Html.Partial("_RegistrationStep1", m)); tabstrip.Add().Text("Social Networks") .Enabled(false) // Disable the tab to prevent skipping ahead. .Content(m => Html.Partial("_RegistrationStep2", m)); tabstrip.Add().Text("Personal Details") .Content(m => Html.Partial("_RegistrationStep3", m)); .Content(m => Html.Partial("_RegistrationStep4", m)); The partial view can contain as many inputs from the model as needed for that step. Because the model is being passed into the partial strongly typed helpers can be utilized within the partial. // _RegistrationStep1.cshtml @{ Layout = null; } @model KendoWizardTutorial.Models.RegisterViewModel <h2>Account Setup</h2> <div class="form-group"> @Html.LabelFor(m => m.Email) @(Html.Kendo().TextBoxFor(m => m.Email) .HtmlAttributes(new { placeholder = "", type = "email", @class = "k-textbox required" }) Connecting the Steps With the tab strip and partial views in place, we can start wiring up the step-by-step behavior. We’ll need to write some client-side code to handle how the form handles moving back and forth between steps. We’ll also keep track of the current tab index so that we can tell which direction the user is moving through the form. var progress, currentIndex = 0; $(document).ready(function () { progress = $("#profileCompleteness").data("kendoProgressBar"); tabs = $("#tabstrip").data("kendoTabStrip"); Next we’ll create event handlers for tab strip’s Show and Select events. .Items(tabstrip => { ... }) .Events(ev => The Select event will trigger when a tab is being selected by both the UI and the API. In the event handler, onSelect, we’ll validate each step before allowing the form to move in a forward direction. Each tab’s content element is selected and validated independently ensuring only fields in the users view can cause validation errors. function onSelect(e) { var selectedIndex = tabIndexOfElement(e.item), isMovingBack = selectedIndex < currentIndex; if (isMovingBack || isTabValidAt(currentIndex)) { console.log("tab passed validation") currentIndex = selectedIndex; tabs.enable(getTabAtIndex(currentIndex), true); else { function tabIndexOfElement(element) { return tabs.element.find(element).index(); function isTabValidAt(tabIndex) { var el = tabs.contentElement(tabIndex), val = $(el).kendoValidator().data("kendoValidator"); return val.validate(); function getTabAtIndex(index) { return tabs.tabGroup.children().eq(index); The onShow event handler syncs the progress bar with the current tab. This will ensure that, when a tab is shown, the progress bar updates with the appropriate value. function onShow(e) { progress.value(currentIndex + 1); Adding Navigation With the tab behaviors in place, let’s add buttons to each step. Each step will have its own “Next” and “Previous” buttons, except for the first and last step. The first step should only have a “Next” button, while the last button should have a “Previous” and “Finish” button. All of the “Next” buttons will have a common onNextClick event handler for the Click event. Likewise all “Previous” buttons will have a common onPreviousClick event handler for the Click event. The “Finish” button will be responsible for posting the form and will be allowed to perform its default behavior. function onPreviousClick(e) { function onNextClick(e) { e.preventDefault(); + 1)); <footer class="col-xs-12 form-group text-right"> .Events(ev => ev.Click("onPreviousClick"))) .HtmlAttributes(new { @class = "k-primary" }) .Events(ev => ev.Click("onNextClick"))) Under the right circumstances, step-wise forms can simplify a lengthy process. The implementation only takes a few controls from Telerik UI for ASP.NET MVC and a little client-side API. If you find yourself using this setup on multiple projects, a reusable wizard control could be created with a few extra abstractions. The code for this article is available on GitHub to help get you started. If you’d like to try Telerik UI for ASP.NET MVC, you can download a 30 day trial here. Header image courtesy of telmo32 • Pingback: Dew Drop – March 15, 2016 (#2208) | Morning Dew() • Pingback: The week in .NET – 3/29/2016 | .NET Blog() • sicnarfngo this is great! im new to web development and am trying to build a similar step form but instead of mvc i am using html. any chance on writing an article on how to do that? thanks! • arun Hi Ed, I need to save data for each step and pass the id to next step and I have a editor template for list of radio buttons for which validations are not firing. Please help… ARun A • FlukyWotsit Your example is very pretty but do you have an example of getting the data back from all the partial views to the server side for saving on to a database?
Monday, February 09, 2009 Hinduism II of III Making it Personal A Hindu accepts the Vedic (one who accepts the Veda teachings) scriptures as his or her religious guidance. Anyone can certainly gain benefit from the wisdom of the Hindu tradition. It does not demand religious affiliation. However, the benefit of the church is a long-standing tradition (it is the world's oldest religion) that benefits a community as a whole. Harmony exists in those communities where Avaidika schools are specifically non-Hindu (while geographically Indian) — Buddhism, Jainism and the atheistic Charvaka school. None of these schools accept the Veda. This interpretation of Veda and non-Veda seems contrary to the position of an "accepting" religion. After all, there's no confusion that Hindus and Muslims do not get along. Hinduism considers the world we live a projection of God. It is unreal (an illusion). It is unreal because it is unstable, unreliable, impermanent, and illusory. It is unreal because it hides the truth and shows us things that lead to Ajnana (ignorance). It is unreal because it changes every moment. What is now is not what is next. Hindu believe it unwise to base our lives around such an unstable world. If you spend your precious life for the sake of impermanent and unreliable things, you are bound to regret in the end having wasted your life in the pursuit of emptiness. The real world lies beyond our ordinary senses where our existence would be eternal and where things would not change the way they do in this plane. This particular Hindu philosophy is very simple, but enormously difficult to pursue. After all, what is illusion? Does it mislead you into wrong thinking and wrong actions, which conversely leads to wickedness. This world precisely does that. Is that the illusion? The world also offers happiness. But this too is an illusion. Happiness and want lead to suffering (no Yoda jokes). Did the ancient yogi know something about the transparent nature of "getting what you want." Principles and Commandments Hinduism can be distilled into five principles and ten commandments and these form the foundation of the Sanatana Dharma. Five Principles 1. God Exists. There is one absolute OM. There is one Trinity — Brahma, Maheshwara (Shiva), Vishnu Several divine forms 2. All human beings are divine. 3. Unity of existence through love. 4. Religious harmony. 5. Knowledge of the three Gs. Ten Commandments/Disciplines 1. Satya (Truth) 2. Ahimsa (Non-violence) 3. Brahmacharya (Celibacy, non-adultery) 4. Asteya (No desire to possess or steal) 5. Aparighara (Non-corrupt) 6. Shaucha (Cleanliness) 7. Santosh (Contentment) 8. Swadhyaya (Reading of scriptures) 9. Tapas (Austerity, perseverance, penance) 10. Ishwarpranidhan (Regular prayers) Caste System The caste system was abolished by Indian law in 1949. Older people and those still living in rural India, still respect this very non-Western tradition. Each Hindu belongs to one of four Varna (social castes), plus a fifth group called the "untouchables." They also are born into a Jãtis. One's Jat determines much. It tells him what work he can take on, who he may associate with, and even whether or not he can marry someone. The system is so rigid, a person is born into the Jat and Varna of their family, marries into it, and dies within it, with no possibility of upward mobility. In decreasing status, the Varna: Brahmins (the priests and academics) Kshatriyas (rulers, military) Vaishyas (farmers, landlords, and merchants) Sudras (peasants, servants, and workers in non-polluting jobs). The Dalit are considered outcasts, outside the caste system. Sometimes called Harijan (children of God), they are the polluted… the untouchables. Some believe that even contact with the shadow of a Dalit polluts ones soul. Check out Slumdog Millionaire for more of this. Despite the government's attempts to outlaw the practice, the caste system still keeps the Dalit down. Considering it a form a slavery, many Dalit have converted to Buddhism and Christianity, angering Hindu radicals who have turned to violence and murder as a way of shuning proselytizing religions. And while this is abhorrent, it's important to note that Hindu culture still (to this day) does not value women. The rates of infanticides of children is rampant. Ironic, given the sheer volume of babies born in India. Whether this comes into play in your games… well… let's hope it doesn't.
slideshow 1 Carcassonne is a fortified medieval walled city in southwestern France. This unique city with two UNESCO World Heritage sites is imbued with the spirit of the past and embraces the future. The medieval city heritage of Unesco Situated on the right bank of a river, the Medieval City is a fortified city unlike any other in Europe, on account of its size and its state of preservation. Its history is marked by 2000 years of conquest and by the imprint of Catharism and the Crusades. cité carcassonne 1Cité Carcassonne 2 City history blason carcassonneThe oldest traces of man - 6th century B.C.- were found on the promontory where the Cité lies. In 122 B.C., the Romans conquered the Provence and the Languedoc. They fortified the oppidum which took the name of Carcaso. After the death of Charlemagne, the dismembering of the Empire gave birth to the feudal system. It was under the dynasty of the Trencavels, from 1082 to 1209, that the town began to gain tremendous influence. During this prosperous period, Catharism grew rapidly. Raymond Roger Trencavel, vicomte of Carcassonne (1194-1209) both tolerated and protected the heretics on his own lands. He suffered the first impact of the crusade preached by Pope Innocent III and on August 15th, 1209, after a two-week siege, it was all over. The Cité and the lands of Trencavel were first handed to the military commander of the crusade, Simon de Montfort, then to the King of France in 1224. It takes its present appearance with a new town born in 1262 on the left bank. An oral legend to a name Dame CarcaThe legend takes place in the 8th century, during the wars between Christians and Muslims in the southwest of Europe. At the time, Carcassonne was under Saracen rule and Charlemagne's army was at the gates to reconquer the city for the Franks. A Saracen princess named Carcas ruled the Knights of the City after the death of her husband. Charlemagne lifted the siege, believing that the city had enough food to the point of wasting pigs fed with wheat. Overjoyed by the success of her plan, Lady Carcas decided to sound all the bells in the city. One of Charlemagne's men then exclaimed: "Carcas sonne!" (which means “Carcas sounds”). Hence the name of the city. More information:
Related BBC sites Page last updated at 09:43 GMT, Thursday, 23 July 2009 10:43 UK Honeybees sterilise their hives Matt Walker Editor, Earth News Honeybee hive Bees thrive in a clean colony Honeybees sterilise their hives with antimicrobial resin, scientists have discovered. In doing so, they give the whole colony a form of "social immunity", which lessens the need for each individual bee to have a strong immune system. Although honeybee resin is known to kill a range of pathogens, this is the first time that bees themselves have been shown to utilise its properties. The team published details of their discovery in the journal Evolution. Honeybees in the wild nest in tree cavities. When founding a new colony, they line the entire nest interior with a thin layer of resins that they mix with wax. This mixture is known as propolis. They also use propolis to smooth surfaces in the hive, close holes or cracks in the nest, reduce the size of the entrances to keep out intruders, and to embalm intruders that they've killed in the hive that are too big to remove. A number of studies have shown that propolis has a range of antimicrobial properties, but mostly in relation to human health. For example, numerous publications cite its effectiveness against viruses, bacteria and even cancer cells. Honeybee hive with propolis Honeybees store propolis inside their hives That is how Mike Simone, a PhD student from the University of Minnesota in St Paul, US, and his supervisor Professor Marla Spivak became interested. Spivak and her colleagues had tested the effectiveness of honeybee propolis against the HIV-1 virus. They then progressed to see how it impacted bee pathogens, such as American foulbrood. "This led us to wonder what other things propolis might be doing for the bees," said Simone. In experiments funded by the US National Science Foundation, Simone's team painted the inside walls of hives with an extract of propolis collected from Brazil or Minnesota. This inside layer mimicked how propolis or resins would be distributed in a feral colony nesting in a tree cavity. They then created colonies of honeybees and housed either in hives enriched with resin, or hives without the resin layer - to act as a control. After one week of exposure they collected bees that had been born in each colony. Honeybee propolis Propolis is a mixture of resins and wax Genetic tests on these 7-day-old bees showed that those growing in the resin-rich colonies had less active immune systems. "The resins likely inhibited bacterial growth. Therefore the bees did not have to activate their immune systems as much," said Simone. "Our finding that propolis in the nest allows bees to invest less in their immune systems after such a short exposure was surprising. Resins in the hive have been thought of as a potential benefit to a honey bee colony, but this has never been tested directly." Using resins to help sterilise the colony can be thought of as a type of "social immunity" said the researchers. And it may partly explain why bees and other social insects, such as ants, collect resins to build their nests in the first place. Mouse skull embalmed in resin Bees will embalm anything, including this mouse skull found inside a hive "Honeybees can use wax, which they produce themselves, to do all the things that they use resin for in the nest. So it is interesting to think about why they might go and collect resins," said Simone. "Especially since resins, being sticky, are hard to manipulate and take a lot of energy for individual bees to gather in very small quantities." There is also some evidence that some mammals and birds coat themselves in naturally-occurring plant resin in a bid to reduce infestations with parasites. Print Sponsor Honeybee mobs overpower hornets 03 Jul 09 |  Science & Environment Thousands of bees return to Kew 16 Jun 09 |  London Bees use bridges in daily commute 22 May 09 |  Tyne Velcro petals help bees hang on 15 May 09 |  Science & Environment US fears over honey bee collapse 25 Mar 08 |  Science & Environment Honey 'could help fight cancer' 05 Dec 04 |  Health Harnessing honey's healing power 08 Jun 04 |  Health From Science/Environment in the past week Sign in BBC navigation Americas Africa Europe Middle East South Asia Asia Pacific
Tuesday, November 15, 2011 Priya's Pay It Forward WHAT IS "PAY IT FORWARD"? "Pay It Forward" is a movie about a boy named Trevor that has an assignment to do all year, to make a difference in the world. Trevor's idea was to help 3 people for the act of kindness. Those 3 people Trevor help also help 3 other people, and it goes on and on. Trevor told them to "Pay It Forward". Trevor Payed It Forward too. By Paying It Forward, anyone can make a difference in the world by doing just one good thing. WHAT WAS YOUR "PAY IT FORWARD" ACT OF KINDNESS? My act of kindness was donating toys at the Salvation Army with my dad. WHY DID YOU CHOOSE THIS ACTIVITY? I choose this activity because I wanted to get rid of my old children/baby toys that I don't even play with anymore plus the toys that I donated, the money goes to families that are in need. Example: Food, clothes, books, toys, drug help etc. WHO DID YOU HELP? I helped people or families that are in need. I even helped children and babies that don't have a lot of money, they can buy my toys. What I did was I donated my baby and children toys that I no longer play with anymore. WHEN DID YOU DO YOUR ACT OF KINDNESS? I did my act of kindness on Monday November 14, 2011 sometime in the evening. HOW DID YOUR ACT OF KINDNESS GO? My act of kindness went great. WHAT HAPPENED? What happened is I went in Salvation Army and at first I didn't know where to put the bag of toys ( because I never donated anything from there before) so I asked the lady at the front counter and she told me to put it in the wagon so that's what I did. HOW DID YOU FEEL? I felt proud too donate my used toys because I still made a difference even if I didn't do more. Doing one thing can still make a difference just like what I did. I only delivered the toys, so kids can buy my toys. Also, the toys I donated, the money goes to families that don't or can't afford any food or anything. I have made a BIG difference right there. HOW DID THE PERSON OR PEOPLE REACT? The person that was working there did not react. She knew right away when I brought in the bag that she was expecting donations. DID YOU ASK THE PERSON OR PEOPLE TO "PAY IT FORWARD''? No, I did not ask the lady to "Pay It Forward". The reason why is because she was already Paying it Forward by spending her time working at Salvation Army. WHY IS THE IDEA OF "PAY IT FORWARD" IMPORTANT? The idea of "Pay It Forward" is important because by Paying It Forward, your helping someone or families. HAS YOUR ACT OF KINDNESS MADE A DIFFERENCE? Yes, I think I have made a difference. I Payed It Forward. 1. Good Job Priya! (: I like your act of kindness by helping other children and families. I think that donating your old toys is a great idea because most families just throw them out, which is a waste of money! I like how you answered all the questions given, but i think you should put more detail into them, not just answering it with one sentence. Also you couldve took more pictures at the Salvation Army! You couldve took a picture with the lady and maybe, you putting your toys in the wagon! I really enjoyed reading your blog! Great Job Priya! Keep it up(: 2. Good Job! I think it was a really good idea to donate the toys you didn't want anymore instead of throwing it away. At least, some other family could also use the toys. Some of your responses were a bit short, though. You maybe could've put more details. Other than that, you did really well! Keep up the great job! :) 3. Good Job Priya! That was a really great idea on donating your old baby toys to the Salvation Army instead of throwing it away. It will be good for those children who won't be able to afford toys. It was a good thing that you donated your toys so children will get to enjoy playing with them and have a normal child hood with having toys. One thing you were missing is that you didn't give enough details. But everything else seemed to be good. :) Great Job! 4. Hey Pryia. Great job on donateing to Salvation Army.
The Million Dollar Space Pen In the 1960’s NASA needed a writ­ing instru­ment that could be used in the vacume of space. In order to com­bat this prob­lem, they spent over a mil­lion dol­lars on R&D in devel­op­ing the Astro­naut Pen. When faced with the same prob­lem, the Rus­sians used a pen­cil. Or so the leg­end goes. Actu­ally the truth is a bit dif­fer­ent. In the begin­ning of the space race, both NASA and the Soviet Union used pen­cils. But pen­cils break, and they are also inflam­mable. In space, both of these things are very bad. In a zero-g envi­ron­ment, tiny float­ing pen­cil tips can eas­ily get caught in an astro­naut’s eye, and a blind astro­naut is a major dis­as­ter. Even worse, in a pure oxy­gen envi­ron­ment like those of the early space cap­sules, it’s very easy for objects to set fire. A dry wood object like a pen­cil is just look­ing for an excuse. Nev­er­the­less NASA never actu­ally devel­oped the space pen. That was actu­ally designed by the Fisher Pen Co: After much exper­i­men­ta­tion he per­fected a refill using thixotropic ink-semisolid until the shear­ing action of the rolling ball liq­ue­fied it-that would flow only when need­ed. The car­tridge was pres­sur­ized with nitro­gen so that it did­n’t rely on grav­ity to make it work. It was depend­able in freez­ing cold and desert heat. It could also write under­wa­ter and upside down. The trick was to have the ink flow when you wanted it to, and not to flow the rest of the time, a prob­lem Fisher solved. … The Fisher car­tridge did work in the weight­less­ness of outer space and the astro­nauts, begin­ning with the Octo­ber, 1968 Apollo 7 mis­sion began using the Fisher AG-7 Space Pen and car­tridge devel­oped in 1966. So in fact, the space pen is nei­ther the exam­ple of over-engi­neer­ing or gov­ern­ment waste it is some­times made out to be. In fact, it’s an impres­sive exam­ple of inge­nu­ity and pri­vate enter­prise. Paul Fisher invested his own money to develop the pen when it’s mar­ketabil­ity was not clear, and in so doing man­aged to cor­ner the mar­ket on orbital writ­ing instru­ments. Even the Soviet Union pur­chased a batch for the Russian space pro­gram. It is still used to this day. Last update: 07/05/2012 blog comments powered by Disqus
United Church of God, ia Portland and Hood River Oregon Preaching the Gospel, Preparing a People God's Government will be directed toward the Perfecting of Man All governments need a singular guiding purpose to endure. For example, a goal of the U.S. government, as stated in the Declaration of Independence, is to enable its citizens to enjoy life, liberty and the pursuit of happiness. This is a lofty, wonderful and inspiring purpose of government. However, such purposes are all too often thwarted because of the limitations of human nature expressed through human politicians with personal character flaws. And sadly, the pursuit of happiness now is often taken to mean merely the pursuit of materialistic pleasures, which the Bible labels as covetousness and lust. Human governments tend to become corrupt simply because both the rulers and the ruled citizens are inherently flawed. For that reason, the framers of the U.S. Constitution designed a government of checks and balances between three distinct power-sharing institutions—the presidency, the Congress and the court system. A governmental headed by a singular despotic ruler, it was believed, would inherently tend to abuse power. The same appraisal of human nature led to the Constitution establishing the country as a republic, with representative government, rather than as a straight majority-rule democracy. The idea was to blunt the negative tendencies of “mob” rule. Similar thinking was involved in the creation of two legislative bodies in the Congress—the Senate and the House of Representatives. The framers of the Constitution understood from the Bible and the wisdom of experience that human nature was corruptible. They also knew that human government could not change human nature. The prophet Isaiah describes the corruption that bad leadership can bring to all levels of social structure: “For the leaders of this people cause them to err, and those who are led by them are destroyed…For everyone is a hypocrite and an evildoer, and every mouth speaks folly.” • Isaiah 9:16-17 But the Kingdom of God, in contrast, will be ruled by perfect, righteous rulers. The goal of government will not be “the pursuit of happiness” as it has typically been interpreted—the pursuit of pleasure. Rather, it will have a much higher purpose, which involves bringing people true happiness and joy. Under Christ’s administration of the Kingdom of God, all government activity will be designed for one universal purpose–the development of righteous character in every person through conversation toward God’s divine nature. This purpose is superlatively greater than the purpose of human government. As Jesus said in the Sermon on the Mount: “You shall be perfect, just as your Father in heaven is perfect” (Matthew 5:48). Christ’s purpose will be the perfecting of human character through the remaking of the human heart—changing its motives, intents thinking, desires, decisions and actions. As a result, humanity will become governable for the first time in a way that can permanently sustain progress, peace and prosperity—and real happiness. This progress will be sustained continuously for 1,000 years. This change of the human heart and character can come only by receiving God’s own divine nature through the gift of His Holy Spirit. The Spirit of God is not generally accessible to mankind now. But God will change all that: “and it shall come to pass afterward that I will pour out My Spirit on all flesh.” • Joel 2:28 The Spirit of God, available only from Him, is the essential nature of God Himself, somewhat as DNA is the code that contains the essence of the human being. The Spirit’s role in a person’s life is to perfect the person’s character, to make him like God. Its fruits, being shown in human behavior, are the divine attributes of God: “The fruit of the Spirit is love, joy, peace, longsuffering, kindness, goodness, faithfulness, gentleness, self-control…And those who are Christ’s have crucified the flesh with its passions and desires.” • Galatians 5:22-24 In due time, the opportunity to receive the Holy Spirit will be extended to everyone on earth so that all will be able to have God’s laws written in their hearts and minds. One nation after another will be converted to God’s way of thinking. God’s laws of loving God and loving your neighbor as yourself (Luke 10:27) will be written into the human character through the Spirit of God. As God says, • Hebrews 8:10 - H Davis Print Study Close window
Skip in Skip A new U.S. Census Bureau report analyzing changes in trends among American adults between the ages of 18 and 34 reveals that millennials differ fro other generations in almost every way. USA TODAY Hating younger generations is an American tradition, but the kids always turn out fine. In 1749, a cantankerous Benjamin Franklin engaged in a tradition older than America itself: Throwing shade at a younger generation. Franklin, referring to the common complaint that the youth of America were not of "equal ability" to their predecessors, said that, "The best capacities require cultivation, it being truly with them, as with the best ground, which unless well tilled and sowed with profitable seed, produces only ranker weeds." Imagine what Franklin would have had to say about Millennials. One does not have to scan the news too vigorously to find endless condemnations of the latest crop of American youth. Children born from the mid-1980s to the early 2000s are now routinely derided as "snowflakes," as if each thinks he or she is a unique gift to the world. Raised in a culture of "trigger warnings" and "microaggressions," Millennials have been accused of fostering a culture of hypersensitivity, unable to connect with the naked realities of the real world. Nowhere has this transition been more evident than on college campuses, which have taken racial and sexual balkanization to new extremes. For instance, who can forget when the University of Minnesota banned the use of female cheerleaders, believing their routines fostered demeaning "sexual stereotypes?" Or when University of Wisconsin-Milwaukee officials distributed a list of 49 "Ways to Experience Diversity," including urging students to "Hold hands publicly with someone of a different race or someone of the same sex as you" and "Go to a toy store and investigate the availability of racially diverse dolls?" Or when the University of Connecticut banned "inappropriately directed laughter?" You may think you saw these examples fly by on Twitter over the past few months. But they all actually took place in the late 1980s and early 1990s, when campuses were at the pinnacle of the first era of "political correctness." At one point, the University of Arizona instituted a "Diversity Action Plan" that banned discrimination on the grounds of things like age, color, ethnicity, race, religion, sexual orientation and "personal style." A campus "diversity specialist" clarified that "personal style" would include "nerds and people who dress differently." (All these examples can be found in Charlie Sykes' prescient book A Nation of Victims, released way back in 1992.) Amid the modern tumult, it's easy to forget that we've been here before. And it's probably now safe to say that college students of my generation (I started school in 1991) made it through this era of progressive inculcation okay. Generation X was literally known as the "slacker generation" — an ironically detached group of kids raised in the 1970s that couldn't be bothered to muster up enthusiasm for anything other than flannel shirts and Winona Ryder. A Washington Postheadline from the early 1990s perfectly represented the enmity Baby Boomers felt against Gen Xers: "The Boring Twenties: Grow Up, Crybabies." And yet Gen Xers — the neglected middle child between the Baby Boomers and the Millennials — have now inhabited the cultural and political positions of power they once disdained. Speaker of the House Paul Ryan is a Gen-Xer, as are United Nations Ambassador Nikki Haley and rising Senators Marco Rubio and Cory Booker. Among their members, Xers also count the founders of tech giants like Twitter and Google — tools which, ironically, can aid interested Millennials in finding out more about Gen X. (Suggested first search: "Who is Pauly Shore?") Predictably, now it's Gen X's turn to heap disdain upon the younger generation. (As Michael Kinsley once quipped about Gen X, "These kids today. They're soft. They don't know how good they have it. Not only did they never have to fight in a war . . . they never even had to dodge one.'') It is true that Millennials differ from other generations in some important regards. A report released by the U.S. Census Bureau on Wednesday of this week demonstrated that today’s young people are far more likely to live at home and delay getting married and having children. But Gen X is also heavily influenced by major demographic and cultural changes that took place during the 1970’s — with more women in the workplace and increased access to birth control, Generation X is far smaller than the two generations that sandwich it on either side. But while their styles are different — Gen X went out of its way to prove it didn't care about anything while Millennials seem to care way too much about everything — the two groups share a lot more in common other than the fact that Jennifer Aniston appears to not have aged during the transition. For instance, both groups experienced a campus climate with an excruciating emphasis on identity politics. Perhaps most notable for the Gen Xers was the "speech code" enacted by the University of Wisconsin-Madison in the late 1980s. "The university is institutionally racist," declared Chancellor Donna Shalala at the time, adding that the campus simply reflected American society, which is "racist and sexist." Not surprisingly, conservative speakers at the state's other campuses were soon pelted with hard objects and shouted down — a scene that would become common once again in 2017. In fact, the last few years on college campuses have become a virtual "I Love the '80s" of grievance and victimhood. A group of students at Pomona College recently wrote a letter to their school's administration claiming “the idea that there is a single truth . . . is a myth and white supremacy.” Earlier this month, Rice University stopped using the term "master" to refer to the heads of its residential colleges, as they feared the term was too closely associated with slavery. And on and on. Thankfully, the cyclical nature of the political correctness movement offers hope for the Millennial generation. For one, the mere process of growing up, becoming an adult, getting a job, having kids and paying taxes typically has the effect of grounding people in reality. It happens with every generation. POLICING THE USA: A look at race, justice, media Further, if the PC movement of the late 1980s and early 1990s is any sort of blueprint, there will soon be a backlash to the modern buffoonery happening on campuses. Society typically has a way of finding its water level — the political correctness of decades ago was followed by cultural figures devoted to shattering that oversensitivity. It was no coincidence that 1990 saw the rise in Andrew Dice Clay and 2 Live Crew — middling artists that reveled in tastelessness and taboo-shattering. Soon, Adam Sandler movies were making hundreds of millions of dollars. Culture eventually corrects itself. (That is not to say Clay or the 2 Live Crew made the world a better place, but there's always good money to be made in a well-timed backlash.) Most importantly, we should have learned by now that dividing up individual people by birthdate is a wildly inaccurate way of judging a generation's relative quality. Every age group is going to have their leftist radicals and their religious conservatives. My generation managed to birth both Janeane Garofalo and Ted Cruz. Yet the internet is always going to devote more pixels to the attention-seekers shouting into bullhorns than the students putting their heads down and gritting their way through their studies. During recent campus incidents in which conservative speakers were accosted by groups of protesters, the fact has been lost that a good number of students actually showed up at these events to see what the speakers had to say. In fact, there's ample evidence that campus activism might be provoking a silent backlash. While Millennials clearly do support "liberal" positions such as same-sex marriage, young people now are less likely than their parents to support legal abortion and at least as likely as older people in their support for gun rights. Although new technology may seem like we're in unchartered territory, history tells us that the kids that scare us now will one day be just fine. Swap in Lena Dunham for Kurt Cobain, Lady Gaga for Madonna, and the cycle grinds on. And if we don't do enough to help Millennials to succeed, it will be the older generations that will have failed them, not the other way around. Read or Share this story:
Wednesday, January 16, 2013 Indonesia Volcano Seulawah Agam Rumbles, New Solfatara Forms Indonesia is one place on the planet where active volcanoes are simply a part of life. With more volcanic activity than virtually any other place on the planet (at least above water), and more concurrent active volcanoes than any other nation, it typically doesn't make for great volcano blogging to mention the obvious, that some volcano in Indonesia with a hard-to-pronounce-name is erupting. But this week's Smithsonian GVP report caught my eye in regards to one Sumatran volcanoes rumblings. Seulawah Agam volcano, one of the Northernmost volcanoes in the Indonesian archipelago has apparently begun to rumble. This volcano is of interest given that it has no 'confirmed' reports of historical eruptions, however this is uncertain. An eruption was reported int he 16th and 19th centuries, but no evidence has been found such as tephra layers, or any obvious lava flows that correspond to these dates. One theory posited by the GVP is that those mentioned eruptions could have been phreatic (water/steam driven) rather than magma related, which would make the eruptions very brief, and much less destructive. However the nature of this volcano could change, as it is now becoming clear that magma is entering  the system. New solfataras (cracks that emit sulphurous gases and water vapor) have opened, and deformation is occuring. This means that if the volcano is going to erupt, it won't simply be a small phreatic eruption this time, and given the fact that we just don't know the last time it erupted, it could be a lot bigger than some of the normal eruptions in Indonesia. More interesting still, it is located at the Northern tip of Sumatra, which has not experienced a whole heck of a lot of historical eruptions. It could be that the subduction of the plates underneath coupled with the recent spate of very large (7.0-9.1 magnitude) earthquakes has generated more fuel for the various magma chambers in the area. Indonesia site on the Pacific Ring of Fire, which 'rings' the Pacific ocean with volcanoes. The bulk of these formed as a result of subduction, where one plate slides under another, creating magma through intense friction, heating of water at high pressure, and eventually creating a magma conduit to the surface. Most volcanoes that form on this subduction zone, like Seulawah Agam, are 'stratovolcanoes', which typically form into large, conical structures that look very much like our typical idea of a volcano. This volcano, should it erupt (it is always possible that nothing will happen, as many magama intrustions do not result in an eruption at all!) has the potential to generate large explosions, heavy ashfall, pyroclastic flows, lahars, and other dangers to the surrounding population. Here is the exact statement from the Smithsonian: "SEULAWAH AGAM Sumatra (Indonesia) 5.448°N, 95.658°E; summit elev. 1810 m CVGHM reported that visual observations of Seulawah Agam during 27 December-2 January seismicity increased. Visual observations were prevented due to fog, although on 2 January scientists observed a new solfatara that produced roaring noises and was within 20 m of van Heutsz Crater on the NNE flank. The Alert Level was raised to 2 (on a scale of 1-4) on 3 January. Geologic Summary. Wednesday, January 9, 2013 Campi Flegrei Inflating Again The massive Campi Flegrei caldera, one of a few large and active caldera systems in the world, seems to be inflating at an accelerated rate, and new data suggests that it is also heating up. reports that the area has been uplifted by an astonishing 8cm during their study period of July-August of 2012, until now, and that the uplift seems to be holding steady. Even more disconcerting is that gas emissions and fumerole temperatures are also on the rise. cites this Italian goeology journal as the source. Campi Flegrei's last eruption produced the Monte Nuevo cinder cone during the year 1538 A.D. While this was not a very large eruption, a similar eruption today would find itself in a very densely populated area, where it would be extremely difficult to evacuate everyone (scenes from that horrid movie "Volcano" with Tommy Lee Jones comes to mind), and damage to life and property could be severe. While it is far, far too early to begin ringing alarm bells, lets keep in mind that many of Italy's famed eruptions have resulted in fatalities on massive scales before. When Mt. Vesuvius erupted in Roman times, it completely wiped out the cities of Pompeii and Herculaneum. Little warning was issued by the volcano, and the sudden onst of ashfall and pyroclastic flow gave people little or no time at all to escape the doom. Preserved in pyroclastic flow, the bodies were later unearthed in exactrly the positions they were in when the pyroclastic cloud swept over the terrified city. An eruption today, from virtually ANY mainland Italy volcano could even be worse. However, given that volcanologists and geologists exist today, we have a slight edge, and therefore should be able to at least give a couple hours of warning before any main event. The other issue with attempting to identify risks of Italian geology is the Italian government itself. Late last year, several italian scientists were convicted for manslaughter for 'failiing to predict an earthquake'. It seems the Italian government puts more faith in calirvoyance than good science, and unfortunately, if an eruption were to occur and there was loss of life and property, it is likely (now that there is precedent) that the Italian government would again attempt to hold scientists responsible for an 'act of god', so to speak. Truly insane if you ask me. It would be like suing the weather man for every time the wind shifted. In any case, check out's article on the goings-on at this fascinating, yet slightly terrifying volcano.   Monday, January 7, 2013 What's Ahead for 2013? The year 2012 was a pretty wimpy one, volcanically speaking of course. About the biggest (and most spectacular) eruptions occurred from the 'usual suspects' (Kilauea, Etna, etc), and really only a couple of eruptions happened that were noteworthy at all. Tolbachik in Kamchatka, Russia has put on arguably one of the most stunning displays of fissure activity, while Kilauea and Etna keep on proving that you can't take your eyes off of them for any real length of time. But other than that, there were no eruptions whatsoever in Iceland (unless you count some very minor hydrothermal/Jokullhlaup activity), barely a puff from Cleveland volcano in the USA, and really nothing terribly unusual. 2012, for all the hype about volcanic disasters, was actually one of the calmest years for eruptions in recent memory. But waht will 2013 portend? While predicting eruptions is definitely a silly thing to pretend to do, there are some volcanoes that are expected to be way 'overdue' for an eruption (as if volcanoes check out our schedules and adhere to them). Katla, Iceland. it has long been suspected that there is some sort of link between Katla and its smaller neighbor Eyjafjallajökull, however the theory is beginning to look like a dud, as it has now been over two years since Eyja erupted, and despite some rubling and weak deformation from Katla, it has remained mostly silent and stable. But this could change quickly, as Katla typically erupts about every 50 years - and its last eruption was over 60 years ago now. Scientists, and bloggers alike are watching this volcano closely. A large eruption from Katla has the potential to be quite devastating for Iceland and Europe, as it is known to produce large ashfall zones, and emit many hundreds of thousands of tons of sulphur dioxide gas (SO2), which some scientists say can be larger in amount than the famed 1700's eruption of the Laki fissure system, which was quite damaging to Europe and has even been cited as one of the catalysts for the French Revolution. An eruption today would devastate Europe, and possibly Russia, and North America with noxious clouds of SO2. Hekla, Iceland Hekla has long been thought to be overdue for a much larger eruption than we typiclly see. Indeed, when looking at ash layers, and craters, you can see that Hekla has produced much, much larger eruptions in the past than are historically recorded. Hekla last erupted in 2000, but has since been relatively quiet. This volcano is not typically known for giving much advance warning. Vesuvius, Italy While most people think of Vesuvius' massive Plinian eruption that destroyed Pompeii as the last time the volcano erupted, it was actually active as recently as WWII. Since then, people seem to have forgotten about the sheer might of this monster volcano, and the lesson from Pompeii. Vesuvius towers over the city of Naples, and many geologists say that the volcano could be primed for an eruption at any time. While it is impossible to say when or if it will erupt, many scientists and geologists (especially ones in Italy who are now apparently accountable for failing to predict geological events...) are watching Vesuvius with nervous anticipation of it's next move. Will it blow in 2013? Nobody can say. Santorini, Greece For about two years now, the massive Sanotrini caldera, and neighboring Kolombos volcano have been showing signs of unrest. from increased underwater fumerolic activity at Kolombos, to a massive inflation of the magma chamber under Santorini, some suspect that this area is also ready for some eruptive action. But don't worry... while both volcanoes are indeed active and have a history of some major eruptions, those major eruptions are so geologically recent that it is unlikely (if not impossible) for either volcano to top their 'greatest hits'. If an eruption at Santorini were to occur, it would probably occur on its central island/lava dome of Nea Kameni, repeating past events like the ones in the 1950's. Effusion of lava/lava domes, and small ash producing explosions. While this could upset tourism on the island, it would pose very little danger to people, and they would most likely have plenty of time to evacuate if it were deemed necessary. Scientist are watching the area cloasely for any swift deformation, and harmonic tremor, which would likely indicate something is getting ready to happen. Alaska (Aleutian Islands) While Alaska's Aleutian islands are usually a hotbed for volcanic activity, containing some of the most active volcanoes in the United States, 2012 was a relatively calm year with only Cleveland Volcano producing any real activity. Two other volcanoes, Little Sitkin, and Illiamna, have rumbled away but did not produce any eruptions. Typically, there are 1-2 volcanoes erupting on the aleutian peninsula in a given year, sometimes more. The remoteness of the islands, lack of equipment, bad weather, etc all make monitoring these volcanoes a bit difficult for the USGS, but it would not surprise me in the least to have some big earthquakes (A 7.5 mag quake occurred today off the Southern coast of Alaksa) and a couple volcanoes erupt (Cleveland, probably will continue its cycle, and I am watching a couple others that seem to be rumbling a bit more than ususal). Cascades Rangs, West Coast, USA While the last volcano to erupt on the West Coast of the US was Mt St Helens (which completed its last eruptive cycle in 2008 with the extrusion of more lava dome material), there are several other volcanoes to really keep an eye on. Mammoth Mountain has shown some increased seismicity, and the area of suspected magma dike intrusion/tree kill still emits heavy concentrations of CO2. Mt. St. Helens is definitely always worth watching (as history shows). Lassen Volcanic Center has not had an eruption since 1913, but recent seismicity tells us not to take our eye off of that area. Shasta is always a nervous volcano to watch, and Rainier could defnitely surprise us. I could go on forever about which volcanoes to watch (I say watch them all!) but truthfully, anyone who would claim to predict the future of eruptions in the world is not worht listening to. Instead I will quietly hope that 2013 brings some awe inspiring (and non-deadly) eruptions for our vieweing pleasure. 2012 was just not that great for blogging!
Home Page Doggy Biscuit Subtraction  This term our focus has been subtraction. We have been working out take away number sentences using dog biscuits. The children had to follow the number sentences using the doggy biscuits, first counting out an amount and then taking away the correct amount of biscuits to work out how many are left.
Study your flashcards anywhere! Download the official Cram app for free > • Shuffle Toggle On Toggle Off • Alphabetize Toggle On Toggle Off • Front First Toggle On Toggle Off • Both Sides Toggle On Toggle Off • Read Toggle On Toggle Off How to study your flashcards. H key: Show hint (3rd side).h key A key: Read text to speech.a key Play button Play button Click to flip 56 Cards in this Set • Front • Back renal cortex outer region of kidney, where renal artery divides into many branches, supplying blood to nephrons located in the cortex- nephrons in the renal cortex means that this is where the majority of renal filtration takes place renal medulla location of the collecting ducts, where nephrons empty their contents tubular structures within kidney that are specialized for transport of water and solutes between interstitial fluid and urinary filtrate large tuft of specialized capillaries specialized for fluid filtration. glomerulus is located within bowmans capule of each nephron. octopus-like large structures surrounding the glomerular capillary basement membrane and serving as a barrier to large molecular solutes - part of the filtration structure of the glomerulus. bowmans capsule interior of the cuplike structure surrounding the glomerulus at the end of each tubular membrane. proximal tubule tubule closest to the glomerulus, responsible for reabsroption of low molecular weight molecules important to metabolism, and water. distal tubule major regulator of Na+ and water excretion, and K+. afferent arteriole carries arterial blood to glomerulus efferent arteriole carries blood flowing from the glomerulus to the peritubular capillary. peritubular capillaries surround the tubular portions of the nephron and are important in reabsorbing and excreting products from and to the interstitial space to assist the nephron in carrying out its function Loops of henle concentrates urine through a counter-current multiplier system - concentrated at tip, dilute at base. proximal convoluted tubule completely reabsorbs metabolically useful molecules, secretes others (urea, creatinine, histamine, penicillin) collecting duct where nephrons merge to carry end products of tubules via the ureter, to the bladder tubes leading from kidneys to bladder which carry waste products to be expelled from the body temporary storage point for urinary waste products before urination tube runs from bladder --> outside, through which urine is expelled. How much fluid is reabsorbed, and at what rate? 99% is reabsorbed: 110ml of water in = 1 ml of urine out. rate of bloodflow through organs expressed how? pressure in - pressure out/resistance = blood flow. glomerular filtration rate volume of fluid filtered in one minute through the glomerulus. on average, about 20% of the total volume of plasma passing through the glomerulus. Glomerular filtration is because of fluid pressure differentials, forcing blood plasma out of the capillaries of the glomerulus and into bowman’s capsule tubular reabsorption tubular cells taking filtered molecules from tubular fluid and placing them back into the interstitial fluid tubular secretion tubular cells carry molecules that have diffused out of the peri-tubular capillaries INTO renal tubular fluid. total filtration, less reabsorption, PLUS secretion = excretion. Filtration = about 20% of blood going through glomerulus. Less reabsorption = molecules that are sent back into interstitial space and reabsorbed into the blood via the peritubular capillaries. Plus secretion = molecules that pass from blood TO urine (creatinine, penicillin, histamine, urea, etc.) plasma colloid pressure inherent pressure of the plasma due to the continued presence of large ions, proteins and other molecules that can't readily diffuse out. hydrostatic pressure effected by arteriole pressure (both efferent and afferent) hydrostatic pressure in the glomerulus effects glomerular filtration rates. The pressure exerted by the blood plasma. This pressure assists in forcing the filtration of plasma through the glomerular capillaries. At about 60mg Hg, this is much higher within the kidneys than in any other somatic capillary net filtration pressure Within the glomerulus, net filtration pressure is the resultant pressure through the capillaries, taking the gross input pressure minus the opposing forces. The opposing pressure forces are the colloid osmotic pressure of the plasma, plus the inherent hydrostatic pressure of the bowman’s capsule renal blood flow fluid filtered through the glomerular capillaries- helps to determine renal function - polysaccharide -not normally found in plasma - used as a way of measuring glomerular filtration rates - nontoxic -Filters through the glomerulus and is neither absorbed nor secreted - THEREFORE, 100% of inulin filtered = GFR. Na+ K+ pump maintains Na+ K+ concentrations in proximal tubular cells which allows reabsorption of metabolic products from glomerular filtrate. glucose reabsorption 1mg/ml = 100 mg glucose filtered / minute. Usually ALL glucose is reabsorbed. renal threshold plasma glucose level at which glucose begins to escape complete reabsorption and enter urine. (as in diabetes.) osmotic diuresis increases in solute concentration necessitates additional water to carry solutes away. Increases in solute excretion causing additional water and diuresis is osmotic diuresis. solute normally found in plasma which is filtered and mostly reabsorbed. if GFR falls to below normal rates, kidneys ability to secrete acid is reduced. Acid is retained, body pH fluid falls, body functions may not work properly. vasopressin / antidiuretic hormone (ADH) hormone inhibits diuresis synthesized by hypothalamus. stored in posterior pituitary. secreted by cortical layer of adrenal gland stimulates activity of Na+K+ transport --> important regulator of BLOOD PRESSURE protein which initiates reactions in renin-angiotensin system. Causes the formation of angiotensin I from angiotensinogen, secreted by the liver. Angiotensin converting enzyme: ACE ACE, angiotensin converting enzyme has an important role in determining blood pressure, as it splits angiotensin I to produce angiotensin II, which increases blood pressure by constricting small vessels. The lungs contain the highest concentration of ACE in the body and it is here that the majority of angiotensin is converted by ACE, however ACE is also present in most other cells of the body renin angiotensin system 1. Kidney senses low blood pressure or reduced Na+ filtration of glomerulus 2. kidney secretes renin 3. liver continuously secretes angiotensinogen to blood. 4. renin contacts angiotensinogen in blood, it becomes angiotensin I 5. Angiotensin I contacting ACE (present in most cells, but highest concentration in lungs) converts it to Angiotensin II 6. Angiotensin II causes: - vasoconstriction of small vessels (rise in blood pressure) - Increased ADH secretion by posterior pituitary = increased thirst --> increased thirst = increased: drinking + fluids --> increased blood pressure - increased ALDOSTERONE secretion by Adrenal gland --> SALT reabsorption and potassium secretion increase by KIDNEY--> INCREASES BLOOD PRESSURE. diabetes insipidus causes high volumes of urine production - can't drink enough to keep up -> this causes LOW blood pressure. No irregularity of glucose in blood plasma, urine, nor any impairment of insulin secretion. CAUSED BY LACK OF ADH (ANTI-DIURETIC HORMONE) production by hypothalamus, so PREVENTION of urination doesn't happen. receptors in brain which sense osmolality of plasma, which serves as information which influences secretion rates of ADH. -->Plasma osmolality up, ADH up, Urine down. more concentrated urine = more diluted bodily fluids = plasma osmolality down to normal. Atrial natriuretic peptide (ANP) released when atrial stretch-receptors sense too much blood volume. Causes kidney to excrete more Na+, and therefore more H2O, bringing blood volume back down to normal. countercurrent multiplier system system in the nephrons which concentrates urine through the exchange of ion back and forth across the interstitial space between close together parallel tubules. separating fluids by a selectively permeable membrane which is bathed in an ideal plasma substitute so that water and small solutes pass across the membrane, thus filtering out. Filters out K+, urea, etc. class of drugs which, through the inhibition of Na+ transport through renal tubules, cause increased natriuresis (salt excretion) as well as increased overall urine excretion by the kidneys. The resultant decrease in blood volume is effective for lowering blood pressure. Thus, diuretics are used to treat both hypertension and heart disorders mechanism which maintains acid-base balance in the body kidneys secrete acid into tubules along the length of the nephron. hypertension effects on urine production increased pressure = increased fluid volume = atrial release of atrial natriuretic peptide = increased excretion of Na+, H2O, i.e. MORE urine production. Hypotension = opposite effect. amino acids Nephron components Afferent arteriole efferent arteriole bowmans capsule proximal tubule peritubular capillaries distal tubule loop of henle collecting duct Structural factors which allow filtration through glomerulus 1. glomerulus being served not by one but by TWO arterioles, resulting in a HIGHER than normal pressure going into the glomerulus. 2. despite the thickness of the filtration barrier made up of the: - podocytes which restrict cell filtration - basement membrane which blocks proteins and large solutes, and - the interdigitating foot processes of the podocytes, this barrier remains PERMEABLE, physically allowing filtration Pressure gradients which allow glomerular filtration pressure of the arterial blood coming in does so at a higher pressure, of about 60 mm Hg. There are inherent pressures within the structure of the glomerulus, however. The bowmans’ capsule has an inherent pressure of about 20 mm Hg, while the colloid osmotic process creates an opposing force of about 30 mm Hg. The incoming pressure of 60 mm Hg, versus the 50 mm Hg of opposing pressures, means that there is still a net pressure of 10 mm Hg which is forcing the capillary filtration of the glomerulus Diabetes mellitus symptoms sugary urine high urine flow can't drink enough improper insulin levels too much glucose for kidney to reabsorb trouble maintaining plasma osmolality Diabetes insipidus NOT sugary urine high urine flow have trouble drinking enough glucose uptake fine VERY LOW blood pressure ADH levels low --> urination not being prevented by hypothalamus hormone. How glucose absorbed out of proximal tubule? Na+ concentration HIGHER in tubular fluid than in cells lining tubule --> allows glucose transport via facilitated diffusion of Na+ with Na+'s carrier molecule. glucose then goes into interstitial fluid, and into peritubular capillaries (blood) --> is completely reabsorbed. decrease in aldosterone affect water reabsorption and sodium reabsorption how? decreased Na+ reabsorption, increased K+ absorption. Decreased Na+ = decreased H2O. If 20% of water is lost, death results. Increased Aldosterone production causes? increased Na+ retention increased H2O retention increased fluid/blood volume increased blood pressure - hypertension.
Are smartphones and social media the antidote to loneliness? Smartphones, tablets, social media. All of these things are supposed to better connect us to other people, and to the world. But is the opposite happening? We discussed the issue with Dilip Jeste, director of the UC San Diego Center for Healthy Aging. Q: I heard someone say on a talk show that people have less physical and emotional contact with each other because so many of us are obsessed with our cellphones and social media. Do you think that's true? A: It is probably true that a number of younger people experience less physical and emotional contact with one another because of cellphone and social media use. I have seen groups of teenagers walking together while texting to one another rather than speaking directly. There has been a growing concern that the social fabric of society is being destroyed because of excessive use of technology and social media. I believe that this fear is exaggerated. We need to take a more nuanced view of technology use. For one thing, whether we like it or not, technology, including social media, is here to stay. By itself technology is not inherently good or bad, but the question is how we use it. It can have positive or negative implications for our physical and mental health and well-being depending on how it is employed. I see the use of cell phones and social media in moderation and in combination with in-person contact as a good thing. Older adults are less prone to use new technology or social media. In recent years, this trend has been changing to some extent. A study of social media usage by older adults found that social media users and non-social media users did not differ in the number of phone calls and face-to-face communications they have, suggesting that for older adults, social media is augmenting more traditional forms of communication. My take on technology and social media is more positive than that of many others. I feel we should not be too judgmental in the use of technology by younger folks. Every new generation is an engine of innovation, thinking outside the box, and continually seeking further improvement. Furthermore, technology use can be a social equalizer, helping to reduce social disparities. In India, when I was growing up, we had to wait 20 years to get a phone line installed at home, and it was a luxury to own a phone. Today even people living in ghettos have cellphones, markedly enhancing their ability to communicate with others. Social media use has downsides such as excessive preoccupation with it or use for antisocial purposes. However, it can also be beneficial for health over the long-run. It has been known for a long time that greater social support and social engagement in the real world lead to better health outcomes and longer lifespan. Research suggests that online-technology and social media can promote real world social activities. A recent study by Hobbs and colleagues at UC San Diego, Harvard and Yale has found that mortality risk declines with increased numbers of photos posted on Facebook, and was lowest for those who are tagged in many photos and who use Facebook at a moderate level for directed communication (posting tags and sending messages). These findings suggest that the off-line activities may be responsible for decreased mortality risk in Facebook users. Q: Millions of people sleep within arm's length of their cellphones. Some keep the phones next to their pillows. Are we afraid we're going to miss something in the middle of the night? A: Portable technology – i.e., cellphone use into the night right up until bedtime and even during sleep does imply that, yes, many people are afraid of being unplugged during all hours of the day. 97% of teens in the US have at least one technological device (e.g., TV, computer, cell phone) in their bedroom, and 90% of Americans use a technological device (usually TV) in the bedroom one hour before trying to sleep. There are important age differences: 72% of adolescents, but only 16% of adults 46-64 years of age use cellphones in the hour before bed. For teens and younger adults, I think there is a fear of missing out on something at any point, including during the night. During this phase of life, social prestige within your peer-group is linked to being the first to know what is happening. If you are not the first to get the news, especially sensational news (which may be fake news!), you become worried about not being perceived as “in the know.” Unfortunately, the more media are used in the bedroom, the greater the frequency of reporting disturbed and unrefreshed sleep. This is especially the case for interactive technological devices such as cellphones. Q: You've often said that loneliness is one of the biggest problems faced by older people. Is there compelling evidence that cellphones and social media are part of the solution to this problem? A: There is a distinction between objective solitude or social isolation and subjective loneliness. Loneliness (subjective) is the perceived absence of positive social relationships. It is a major risk factor for physical and mental illness in later life, including increased risk for all-cause mortality. Reported prevalence of loneliness in older adults varies from 20-40%, and usually hovers around 30%. One may be surrounded by people and yet feel lonely, or one seems isolated but is enjoying the time alone and not feel lonely. In other words, subjective feeling of loneliness is the main problem. I have not found any randomized controlled trials of cellphone or social media use as interventions for self-perceived loneliness in older people, but there is some evidence (not conclusive, by any means) that social media users are more satisfied with their current social roles and endorse more social satisfaction than non-social media users. Among the older adults who use social media, engaging in activities such as writing messages, is correlated with reduced loneliness and increased current social role satisfaction, whereas broadcast communication and passive consumption, such as posting photos or reading posts of others are not. We are currently developing studies in which we plan to look at data on loneliness across the adult lifespan. The technology industry is beginning to wake-up to the needs of older people and it is our hope that this trend will continue. Here at the UC San Diego Center for Healthy Aging, we are bringing senior living communities together with the technology (including social media) and healthcare experts to improve health and well-being of older adults. Q: I noticed that there are many "digital afterlife" sites on the Internet. The sites make it easy for a person to upload videos and photos that tell the story of their lives. These stories are distributed online after the person dies. What do you make of that? A: Afterlife is obviously an unsolved mystery that has been around since humans became aware of their inevitable death. People have been attempting to grapple with death through times and across cultures. Death is one thing that the modern “can-do” society has difficulty accepting. Consequently, there is an avoidance of discussing death. People don’t want to talk about death in a realistic manner. Our group recently published a paper on what constitutes a good death or successful dying as a call for public dialogue on death. Different societies have struggled to find ways of conceptualizing life after death. In some religions including Hinduism, reincarnation is considered a way people are reborn after death, in the form of another living thing. Some people imagine continuing life through their children and grandchildren, and some leave a legacy. Some people have even turned to the hope of “cryonics” and cloning as ways of getting around death. These are very expensive and totally unproven strategies. Digital afterlife sites are a much cheaper way of satisfying this need! I think they can be helpful. I believe we are going to be seeing more and more of them in the years ahead. Digital afterlife is one way in which people can express themselves, leaving a type of legacy to be publicly “present” online for eternity. It is also a way to “plan” for a method to be in control of one’s afterlife. However, there are cautions we need to take into account before moving forward rapidly in this arena. Ethics rules and regulations will need to play a role in the use of digital afterlife sites since people other than the deceased may be mentioned on these sites, and it will need to be determined how to handle confidential information and other privacy issues regarding who owns what. Also, it will need to be decided how to handle digital afterlife when “memorialized” profiles can be changed by family members or friends of the deceased without that person’s consent — or hacked by outsiders. Caveat emptor! Twitter: @grobbins Copyright © 2017, The San Diego Union-Tribune
Brain Facts #1: Foundations of Cellular and Molecular Neuroscience 1. The Brain is an organ. It is a machine. It can be medicated and controlled. Now, on a lighter note, the brain is the most complex and sophisticated organ in the world. Even in fruit fly brains, there are so many pathways and connections that we still don’t know about! 1. It is made up of 50% glia and 50% neurons. Glia are cells that aren’t neurons. These can be anything from radial cells which guide neurons to the zones in the brain they’ve reside in for the whole of your life during fetal development. 2. Neurons sense changes in the environment and fire off action potentials to muscles/glands that control our reactions to the environment. Can you believe that the basis of your thoughts and your mind are all coded on through the action potentials of the neurons? Of course, it’s not as simple as the neurons ‘seeing’ the world and telling your mind about it. It’s neurotransmitters, its agonists, and antagonists, its saltatory conduction, and it’s only the beginning. 3. Your brain is an organic computer. It collects, distributes and integrates information from within your body and outside of your body, across time and space. It uses neurons instead of wires, ions instead of electrons. 4. The Action Potential that is used all neurons all follow the All or Nothing rule and is pickier than a perfect 10 looking for a husband. Like the maximum quantum of 80% in plants, the brain is fussy. It will take the threshold potential to start off; no more, no less. This is a post on thinking about the first third of my Neuro 100 class. Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
Teeth And Bones Raw meaty bones? Raw meaty bones are an integral part of feeding a raw diet and are the principal source of calcium. They are also a complex source of a wide variety of nutrients including minerals, essential fatty acids and vitamins. The central parts of large bones contain marrow, which is a highly nutritious mix of elements, including iron, used to form red blood cells. Raw bones also provide natural antioxidants and enzymes. Dogs fed raw meaty bones rarely suffer from diarrhoea and produce smaller quantities of solid, minimally offensive stools. It is likely that bones play a similar role to dietary fibre removing toxins and promoting general bowel health. Bones are full of nutrients. It is easy to understand why the dog wants the meat and marrow, but what makes the bone itself so desirable? The answer is threefold. Firstly, bones contain a number of nutrients that are vital to your dog's health. Secondly, meaty bones are nature’s toothbrushes. They keep your dog's teeth clean and gums healthy. Plaque can't build up and decay is prevented. The third benefit of giving your dog a bone is more psychosomatic. Dogs that have a bone to chew are happier and calmer, chewing a bone releases endomorphines which provide a sense of well-being. Why do you include ground bone in Cotswold RAW complete meals? Our recipes include ground raw bone which will provide all the above mentioned nutrients. However, in order to promote healthy teeth and gums and provide all the behavioural and emotional benefits of chewing on a bone you should still feed raw meaty bones at regular intervals. Is it safe to feed bones? Only if they are raw. Cooked bones are low in moisture and can easily split or cause choking. Raw bones are rich in natural moisture, softer, more flexible and easily digested in the low pH of a dog stomach. Simply give one to your dog at regular intervals for them to gnaw at and improve tooth, mouth and gum health. Bones and chews also provide your dog with an outlet for natural species-appropriate behaviour and chewing releases calming endorphins. Some bones may last longer than others and some may be too hard for young dogs or older dogs with weaker teeth. Please choose the most appropriate bone or chew for your dog from the selection we offer. Choose a bone about as big as the dog’s head – too big to swallow but small enough to handle. Always supervise your dog with a bone. See our range of Bones & Treats...
MEEN%20315%20-%20HW%2001 - 6 Can you carry 1 m 3 of liquid... View Full Document Right Arrow Icon MEEN 315-501 Fall 2010 Problem Set 01 Due: Monday September 6, 2010, 13:50 1.) An object whose mass is 6.8 kg occupies a volume of 0.7 m 3 . Determine its: a.) Weight in N at a location on earth where g = 9.45 m/s 2 b.) Weight on the moon where g = 1.7 m/s 2 2.) Determine the mass, in pounds mass, of an object whose weight is 20 lb f at a location where the acceleration of gravity is 31.1 ft/s 2 . 3.) Atomic and molecular weights of some common substances are listed in the book and other reference sources. Using reliable sources determine: a.) The number of kmol in 50 kg of each of the following: H 2 , N 2 , NH 3 , C 3 H 8 b.) The mass, in lb m , of 20 lbmol of each of the following: air, C, H 2 O, CO 2 4.) A body whose mass is 2 lb experiences an increase in velocity from 20 fps to 50 fps (fps = ft/s). Determine the change in kinetic energy in : a.) ft-lb f b.) Btu 5.) A spring stretches 0.2 cm per newton of applied force. An object is suspended from the spring and a deflection of 3 cm is observed. If g = 9.81 m/s 2 , what is the mass of the object, in kg? Background image of page 1 Unformatted text preview: 6.) Can you carry 1 m 3 of liquid water? Why or why not? 7.) A steel cylinder of mass 2 kg contains 4.0 L of liquid water at 25 degrees centigrade at 200 kPa. Find the total mass and volume of the system. List two extensive and three intensive properties of the water. 8.) A tank has two room separated by a membrane. Room A has 1 kg air and a volume 0.5 m 3 . Room B has 0.75 m 3 air with density 0.8 kg/m 3 . The membrane is broken and the air comes to a uniform state. Find the final density of the air. 9.) One kilogram of diatomic oxygen (O 2 , molecular weight 32) is contained in a 500-L tank. Find the specific volume on both a mass and mole basis (v and v ). 10.) Are you an equilibrium system? Why or why not? 11.) Evaluate the following: + x 1xdx + 4x3 1 dx +-x 13x 2dx 0π4sec2x dx dxx 12.) Evaluate the derivatives of the following: = ( -+ ) fx x4 1 2x 1 =(- ) hs s3 2 2 = + fθ θ 1cosθ = fx sinxx = fx x2tan x... View Full Document This note was uploaded on 01/03/2011 for the course MEEN 315 taught by Professor Ramussen during the Fall '07 term at Texas A&M. Ask a homework question - tutors are online
Accessibility links Biotech Crops: Critics Call Them Frankenfoods, Supporters Lifesafers - 2003-06-25 The global debate on genetically engineered food is reaching a fever pitch this week as agricultural ministers, scientists, executives and politicians from around the world meet at pro-biotechnology conferences on both the East and West coasts of the United States. The United States is the biggest producer and consumer of genetically improved crops, but many countries avoid them on the grounds that they may be harmful to humans and animals. The European Union has imposed a ban on genetically modified foods. As a result of the ban, the world’s largest developer of genetically altered crops, the U.S.-based Monsanto Company, has been losing profitable deals. For centuries, humans have tried to improve plants by selective breeding and controlled pollination. Through these conventional methods hundreds of thousands of genes are transferred randomly from one plant to another to combine their traits. Today, scientists can be much more precise. They can select only one or two genes with desired traits and transfer them to a plant to enhance its growth, its resistance to drought or disease or its tolerance to chemicals. This new technology has been used in agriculture to increase production of crop plants such as corn, wheat, soybean or cotton. The Monsanto Company also produces pesticides and herbicides that kill insects or weeds, but do not harm the genetically modified plants. At Monsanto’s Life Sciences Research Center in St. Louis, Missouri, nearly 1,000 researchers work in some 300 laboratories on the site. Robotic arms, like the ones on a space shuttle, travel up and down a three-meter track. They pick up trays that look like CD’s stacked in a CD rack and place them in slots on the laboratory bench. Bill Kosinski, a biotechnology educator at Monsanto, says these stacked trays are sets of test tubes for discovering new drugs, pesticides and herbicides. “You first identify a key enzyme responsible for a particular disease,” he says. “You extract that enzyme and then you challenge it with as many chemical compounds, as many potential drugs as you can get your hands on.” Mr. Kosinski says each test tube contains a different chemical molecule and each undergoes a set of biological procedures. The data for each sample is fed into the computer and it tells scientists whether or not a particular molecule has the potential to be used to fight a crop or livestock disease. Some 20 years ago, it would take one scientist a whole day to process five samples. Today, the three robotic arms at Monsanto can process 40,000 to 50,000 samples a day. Once a pharmaceutical company, Monsanto focuses mainly on agriculture today, with the goal of increasing global food production. Mr. Kosinski says the St. Louis research center is capable of producing custom-made plants to grow in less than favorable climates or fight a particular pest. “We will take your insect," he says, "the one that’s eating your crop plant, and feed it as many different protein materials as we can get our hands on and we will work with academics. In St. Louis, we work with the Missouri Botanical Gardens." "These folks go out and collect novel biological specimens," he says. "We’ll take those materials back to this site, extract all the possible proteins - all living things are composed of proteins - then we’ll put one unique protein in each of one of these wells on this research muffin-pan type system. We’ll then overlay them with egg or larva of your insect pest, the one that’s giving you the problem. We’ll cover the plate, we’ll incubate for seven days, then we’ll come back and evaluate the plates.” Once the scientists identify the protein that kills or slows down the growth of larvae, they extract its pest-killing genes, which will be inserted into a crop plant, such as corn (maize), soybean, or cotton to make it resistant to the pest. Monsanto has developed a number of disease-free plants that grow better in poorer soil, produce more crops and even taste better. Many scientists believe such crops could reduce the global problem of famine. But many people oppose the company’s genetic manipulation of food plants for fear they may be unhealthy for humans or animals. Mark Buckingham, a British scientist at Monsanto, says the company’s products have been thoroughly tested to make sure they deliver benefits without risks. He says traditional broad-spectrum herbicides and pesticides are much more harmful than Monsanto’s best-selling Roundup brand. “In order to control one insect,” he says, “under a traditional system a farmer might spray the whole field, maybe more than once, maybe several times. That would kill all the insects in the field, whether they were just passing through, whether they were pest species, whether they were beneficial insects. One of the beauties of biotechnology is that you can specifically target the pest insect and the products. The crops that we have developed are very carefully tested to make sure that it is just that insect that is targeted.” Mr. Buckingham says Monsanto makes sure that plants contain nothing harmful to people by carefully choosing the genes. Those for insect-protected crops largely come from natural bacteria that have been used in agriculture for many years. “We have taken that technology one step further,” he says, “by taking a gene from that natural bacterium and putting it into the crop. We’ve given the crop the ability to protect itself. So that understanding where that gene comes from is an important reassurance that it is from something that has been used in crop production and food production for many years with the history of safe use.” But these assurances have not pacified critics who point to the company’s earlier products that have been found harmful or potentially harmful. One is Agent Orange, which was used in the Vietnam War to defoliate the jungle and later determined to be harmful to humans. Monsanto’s artificial sweetener NutraSweet has been under attack as potentially harmful. Although there is no scientific evidence that genetically engineered plants cause any harm, the European Union has banned the import of genetically altered food, saying the technology is too new to be sufficiently tested. As a result, countries depending on their food exports to Europe refuse to grow Monsanto crops. Even some of those that suffer from severe famine have rejected them. The United States has filed a complaint with the World Trade Organization against the European Union for its moratorium on biotech products. It is now pushing its biotechnology on the international stage. Speaking to biotechnology scientists from developed countries at the Biotechnology Conference this week in Washington, President Bush said genetically modified crops are needed to reduce famine in Africa. “In our own country we see the benefits of biotech with food prices and good land conservation practices,” he says. “Yet the great advantages of biotechnology have yet to reach developing nations in Africa and other lands where these innovations are now most needed.” But even as Mr. Bush spoke on the East Coast, anti-biotech activists protested at the Ministerial Conference on Agricultural Science and Technology on the other side of the country in Sacramento, California.
Nutrition Packaging Claims: Free, Low, Lean and Light Once just advertising hype, nutritional claims on food packaging have specific definitions according to the Food and Drug Administration and the U.S. Department of Agriculture’s Food Safety and Inspection Service. The true meanings behind the approved terms are not always obvious to the shopper however, and deserve some explanation. There are 11 core terms that are allowed on packaging: free, low, lean, extra lean, high, good source, reduced, less, light, fewer, and more. I will define free, low, lean, extra lean and light as key to understanding those statements on your food packaging. “Free” means a product is either absolutely free of the nutrient in question, or, the amount is considered “dietetically trivial” or “physiologically insignificant”. For example, “fat-free” is allowed on foods with less than .5 grams of fat per serving, because it is impossible to measure fat below a certain amount. “Free” can also be used in reference to fat, saturated fat, cholesterol, sodium, sugars, and calories. Foods that don’t contain a certain nutrient in the first place, must be labeled in a particular way. A fat-free claim on applesauce must read, “applesauce, a fat-free food” because apples don’t contain fat. You will often see vegetable oil, such as soy, canola or corn oil labeled, “Corn oil, a cholesterol-free food” because no foods of plant origin contain cholesterol. “Low” on a label means a person can eat a large amount of the food without exceeding the daily value for the nutrient. Bearitos chili has a “low fat” claim, for example, and contains 2 grams of fat per serving. A person would have to eat a lot of chili to exceed the daily value of 65 grams of fat for a 2,000 calorie a day diet. “Percent free” is another claim in this category. Products bearing “percent fat free” claims must meet the definition of “low” per 100 grams of food. For example, if a food contains 2.5 grams of fat per 50 grams of the food, the claim can be “95% fat free.” “Lean” and “Extra lean” are used to describe the fat content of meat, poultry, seafood, and game meats. “Lean” means the food has less than 10 grams of fat, less than 4 grams saturated fat and less than 95 milligrams of cholesterol per serving and per 100 grams. “Extra lean” means the food has less than 5 grams of fat, less than 2 grams of saturated fat, and less than 95 milligrams of cholesterol per serving or per 100 grams. “Light” or “lite” can mean one of two things. First, that a nutritionally altered product contains one-third fewer calories or half the fat of the food it is being compared to. If the food derives 50% or more of its calories from fat, the reduction must be 50 percent of the fat. Second, that the sodium content of a low-calorie, low-fat food has been reduced by 50%. The term “light in sodium” is allowed if the food has at least 50 percent less sodium than a reference food. Labels can be confusing and misleading if the terms are not clearly understood, and the definitions are not always intuitive. For complete information on food labeling, visit the USDA website at and find Food Labels. Join our mailing list Stay updated on the latest news from Harvest Co-op Open 7am - 10pm, 7 days a week Copyright © 2017 Harvest Co-op Markets Privacy - Terms of Use Web Design by GoingClear Interactive
More Shapely Star Clusters Jack Kramer Back some time ago, I did an article on open star clusters in the winter skies that have recognizable shapes. Here are some more such clusters and asterisms that are in the sky at other times of the year. As a reminder, asterisms are not true clusters; they include stars that appear near each other but are not physically associated. "The Stargate" is an asterism in Corvus, near M104, the Sombrero Galaxy (which is actually in Virgo). It appears as a small triangle within a larger triangle. It's located at coordinates: RA: 12h 35m 45.0s; Dec: -12° 01' 41" Cr399 (Vulpecula) - this is the Coathanger, or Brocchi's Cluster, which is not a true cluster at all - just a chance juxtaposition of stars ranging from 220 to 1,100 light years distant. It does sort of look like a coathanger, albeit upside down in the sky. Because of its large size, it's best seen in binoculars just to the northwest of the little arrow-shaped constellation Sagitta. "Butterfly Cluster" - a true cluster better known as M6, located above the tip of Scorpius' stinger. The fact that it's a Messier cluster tells you it's an easy object in any telescope and it's actually a rich cluster that some are able to spot with the naked eye from a dark site. To me the "body" part looks fatter than a butterfly's - more like a cicada. Whatever, I suppose we could simply call it the "Flying Bug" cluster! Published in the July 2006 issue of the NightTimes
He claims that modern humans would lose to prehistoric people in contests of power, as well. Ancient man ‘faster than Usain Bolt and stronger than Schwarzenegger’He won this race, but then Usain Bolt wasn’t up against ancient man In his book Manthropology: The Science of Inadequate Modern Man, Peter McAllister says that a Neanderthal woman would beat Arnold Schwarzenegger in an arm wrestle. In a javelin contest, the aboriginal would claim the gold medal. The world record is 98.4m, but they could throw a spear a staggering 110m. He said: ‘As a class, we are in fact the sorriest cohort of masculine Homo Sapiens to ever walk the planet.’ His conclusion about aboriginals’ astonishing speed comes from analysis of 20,000-year-old footprints preserved in a fossilised claypan lake bed in Australia. The prints are of six men chasing prey and Mr McAllister’s study of them leads him to believe they could hit 23mph on muddy ground. Meanwhile, Neanderthal women would win a battle of strength with Arnie because they had 10 per cent more muscle than modern European man. With some weight work in the gym, a Neanderthal woman would reach 90 per cent of Schwarzenegger’s bulk at his peak in the 1970s. However, because a Neanderthal woman had a much shorter lower arm, Mr McAllister believes she would ‘slam him to the table without a problem’. He says in his book: ‘At the start of the industrial revolution there are statistics about how much harder people worked then. The human body is very plastic, and it responds to stress. ‘We have lost 40 per cent of the shafts of our long bones, because we have much less of a muscular load placed upon them these days.’
Saturday, December 04, 2004 Murphy's Laws Murphy's Laws symbolize the error-prone nature of people and processes. Given below is a top 10 list of Murphy's Laws. Murphy's Law 1) If something can go wrong, it will. 2) If anything simply cannot go wrong, it will anyway. 3) Left to themselves, things tend to go from bad to worse. 4) Matter will be damaged in direct proportion to its value. 6) The buddy system is essential to your survival; it gives the enemy somebody else to shoot at. 7) Technology is dominated by those who manage what they do not understand. 8) The opulence of the front office decor varies inversely with the fundamental solvency of the firm. 10) The first myth of management is that it exists. No comments: Related Posts with Thumbnails
Thursday, September 1, 2016 How Psychiatry Diagnoses Bi-polar and how this diagnosis always gets one on drugs for life. Bi-polar is sometimes called manic depression, bipolar disorder causes extreme shifts in mood. According to psych’s it may make someone feel splendid for weeks and then topple into depression. According to these same psychiatrists without treatment, a person with bipolar disorder may have intense episodes of depression, and also symptoms of sadness, anxiety, loss of energy, hopelessness, and trouble concentrating. So What Causes Bipolar Disorder, According to Psychiatry? Psychiatry indicates the exact biological mechanisms are unknown. They say "it's probably genetic? This is what they say. We are not making this up, or it is vulnerability with whatever happens in one's life. Psychiatry’s pays for research. They pay universities to do tests with the “expected” conclusion what psychiatry wants the results to be. If the university gets the wrong result then that university will not get these grants in the future. See the scheme? So psychiatry suggests bipolar disorder is 60 percent hereditary. So blame your mother. The other factors that they say likely contributes is an imbalance of chemicals in the brain. This gives psychiatry and pharma license to give you drugs to “correct” this imbalance. So these are the two areas they say causes bi-polar disorder. Both causes or so called causes are grasping at straws. The answer is they don’t know. Lets look at the first cause which they say that bi-polar is 60% genetic. This in the psych world means your mother or father was bi-polar and passed it on like passing on the genes for the way you look, or skin color or height. Bi-polar is in your genes according to them. I mean really! This is what psych’s come up with. The unique thing for them is that it allows them to diagnose you and then drug you for the rest of your life. If your born with bi-polar according to them then we drug you into wellness. Well not wellness, but the just bill your insurance, which increases your costs. Or if you are the 40% then you have a chemical imbalance, so they just drug you into chemical balance. Are you buying any of this? It is all billable to pharma from psychiatry to the drug company to your insurance company to you. To psychiatry and the pharmaceutical companies you are just chemicals they can play with. They don’t have to have a clue as to why someone is bi-polar. They just can make it up. Oh, it must be from your mother. They go to all this training and education and all they come up with is chemicals that just make you more depressed. And if the drugs don’t work then they electrocute you into wellness. That is correct ECT is Electrocution Therapy. This treatment, done while you are “asleep” under general anesthesia, can rapidly improve mood symptoms of bipolar disorder according to them and WebMD. If you believe that? It shocks the brain. They say it is safe. But do you want your child to be shocked into wellness. Do you honestly believe that sending 450 volts or .9 amps into an adolescent will cure them? Sounds like ISIS works in your psych-hospital. No comments:
Home > Resources > Glossary > Definitions - P > Photomontage 1. A composite image, made by cutting and pasting, or by projecting several images in sequence on different parts of the receiving photographic material, such as photographic paper. 2.  Any technique of making composite or multiple photographic images.
Cooking With The Sun If you don't want to heat up the stove or grill on a really hot day, there's another source of energy to cook food with — and it's directly overhead: the sun! Solar cookers, devices that use the sun prepare food, are drawing increased attention because of the fuel they employ, and because they add a lot of flavor to meals. The public broadcasting show "America's Test Kitchen" ( gave solar cookers a try, and the program's host, Chris Kimball, filled in Early Show viewers on the results Monday. Kimball, the creator and editor in chief of Cook's Illustrated magazine (, explained that solar cookers not only use nothing more than the sun's rays to work, they don't emit smoky fumes, and use only minimal amounts of water. They're environmentally friendly, economical, and over 100,000 of them are now in use in India and China. But are solar ovens nothing more than eco-toys? At America's Test Kitchen, we put this proposition to the test to find out just how well they roast a chicken, cook rice and broccoli, and bake chocolate chip cookies. The first solar cooker was invented by a Swiss naturalist in the 18th century. But even in Roman times, the notion of reflecting and/or trapping the sun's rays to produce heat was common. In fact, greenhouses are large-scale solar ovens in that they trap the heat of the sun, enabling horticulturists in northern countries to grow plants usually found only in the tropics and other warmer climates. The impetus for using solar cookers today is largely political and environmental. Since solar cookers don't require any fuel, don't create smoke pollution, and cook using a minimum of water, they're attractive for use in low-income regions around the world and are useful for people who have limited access to any sort of cooking device other than fire. Most solar cookers are produced by non-for-profit organizations; profits from cookers sold in the United States or Europe subsidize cookers shipped elsewhere. In the U.S., sales are geared to several audiences: those who advocate environmentally sound practices, people (especially those in sunnier climates) who want a fuel-efficient way to cook that doesn't heat up the kitchen, outdoor recreationists who like their portability, and food hobbyists who enjoy cooking in a different fashion. How Do They Work? To cook effectively, it's necessary to understand some of the science that makes solar cookers work, primarily that it's not the sun's heat that cooks the food, rather, the sun's ultraviolet rays. The sun must be high in the sky for the ultraviolet radiation to penetrate the atmosphere. For example, from November through March, the sun is so low on the horizon that the light passes through more atmosphere, screening out most of the UV rays (that's why it's difficult to get a tan in winter). When the sun is overhead, the light rays pass through less atmosphere, and screen out less UV radiation. Once the UV rays enter the cookers, they act as a filter/converter, letting the shorter UV light rays in and converting them to longer, infrared light rays that can't escape (like a one-way lobster trap). Infrared radiation has the right energy to make molecules vibrate very vigorously, which causes the water, fat, and protein molecules in the food to vibrate very vigorously and get very hot. In practice, this means that successful cooking requires a clear sky, with the sun at least 45 degrees or more above the horizon for a reasonable amount of time (depending on what you're cooking, from two to eight hours). There are two easy ways to test for suitable conditions — if your shadow is shorter than your height, or if the UV index in your area is seven or higher (see below for a Web source of the daily index as well as other information). There are two main types of solar cookers: concentrating (or parabolic) cookers and hot boxes (or ovens). Concentrating cookers simply reflect the sun's rays onto a cooking vessel and, in our tests, internal temperatures tend to stay at 200 degrees or less. Hot boxes simply trap the sun's rays much like a greenhouse, and temperatures reached 250 degrees or so. There are also hybrid models that both reflect and trap the sun's rays, and these can reach internal temperatures in excess of 300 degrees, at least based on our testing. We purchased one of each model. The Hot Pot Solar Cooker ($100) is a large, insulated pot that sits on and is surrounded by reflector shields (metallic panels that concentrate the sun's rays at the pot). Our hot-box model, the SOS Sport solar oven ($140), is a box with a specially molded insulating lid and insulated sides. The Sun Oven ($200) is a hybrid: the box has insulated sides, a glass top and, additionally, is ringed by reflectors Solar Cooker Test Results Our test kitchens are located just outside of Boston, which isn't the ideal location for solar cookers (our UV index rarely gets above seven, and cloudless, haze-free days aren't a given) but, with a little planning, we had ample testing days. One additional challenge was finding a place in our urban setting that had uninterrupted sun for at least six hours; a pilgrimage to the roof provided the solution. Once on the roof, all three cookers were easy to set up and use. The hot pot required no additional equipment and the SOS Sports oven came with two that we used in the two ovens. (Ideally, you should use a dark, light-weight, metal, shallow pot — Graniteware is a good choice). To conduct our testing, we'd open the stoves or set up the reflectors on the hot pot, put the food in the pots, and orient the cookers toward the sun; once every hour or so, we'd reposition the ovens to follow the sun and check on the food. Over several weeks, we tested (and retested) a variety of food items, including rice, whole chickens, broccoli, marinated pork, roasted garlic, potatoes, and chocolate chip cookies. Our conclusions? What the cookers cooked well, they cooked very well, especially those items that appreciated long, slow cooking and could generate sufficient internal moisture to stay moist and tender, such as the whole chicken, baked potatoes, garlic, and marinated pork. But time-sensitive and/or drier food presented a challenge, especially since the cookers proved very sensitive to temperature fluctuation, either from being opened to check doneness or from passing clouds. The cookies were the only time-sensitive food we liked, largely because we could check on their progress without opening the ovens (we could see through the lids), and we were conscientious about checking them frequently. But, despite checking frequently, we never got the rice right — we couldn't catch it before it was blown out and starchy, nor the broccoli, which turned army green and had a skunky smell by the time it was tender. A Word About Food Safety We reserved cooking meat and poultry for cloudless days and peak cooking times (between 10 a.m. and 2 p.m.), which kept our food safe (internal food temperatures shouldn't remain between 40 degrees and 140 degrees for more than two hours). However, during less-than-perfect days, we would have reservations, especially if you're not able to monitor internal food temperatures. The U. S. Department of Agriculture has published a caution about solar cookers, noting possible problems both with how long it takes for the food to start cooking and how hot the cooking temperature becomes. If you want more information, you can go to this Web site. For those who live where cloudless days can be predicted reliably, solar cookers can be good secondary cooking sources. For others, especially food hobbyists, they can be a lot of fun. But there are drawbacks that keep solar from becoming a reliable or primary cooking source: • Timing any food item is difficult; it requires a lot of trial and error to determine what food cooks well and what doesn't. Foods such as stews or soups that are pretty forgiving work best. • Cooking at midday, the best time to use these ovens, isn't terribly practical if you work or when you're preparing evening meals. • Cooking meat and fish when the sun isn't at its peak (partly sunny days or not at midday) can present safety issues. • Planning is difficult; even a partially cloudy day can slow or even prevent cooking. For those tempted to purchase a solar cooker, we would recommend the SOS Sport Oven. It had the greatest capacity (it could hold a small baking sheet, while we had to use the pot lid to bake the cookies in the Sun Oven), and kept the most level temperature: Since it doesn't have reflectors, it wasn't as sensitive to being pointed at the sun or a passing cloud and was less finicky about being positioned to follow the sun. The Hot Pot is simply too limiting; it can't bake, and it did the worst job of holding heat against a passing cloud or when not oriented properly. With its reflectors, the Sun Oven attained the hottest temperatures; if you plan to do short-term baking, this is an advantage over the SOS Sport. But it was more susceptible to temperature fluctuations, making it difficult to judge cooking time; in some cases, it actually overcooked food. The panels (which can't be removed) made it awkward to clean, and the size of the oven was limiting. It was also $60 more expensive than the Sport. For more information: We purchased all three solar ovens from one source: Nityam Privette PO Box 1163 Rough and Ready, CA 95975 (530) 273-9378 Solar Cookers International is a not-for-profit organization dedicated to spreading the word about solar cookers and supplying the third world with solar cookers. Their Web site has an extensive amount of information, along with a newsletter, and available ovens and other products to purchase. The Solar Oven Society manufactures the Sport Solar Oven; it's also a not-for-profit organization that promotes solar cooking in the U.S. as a way to raise funds to encourage solar cooking overseas. You can buy the Sport directly from this site; it is also a good site for recipes. (The SOS was the only solar cooker that came with a cookbook). Bill Potts Solar Oven Society Marketing and Sales Consultant, Volunteer For more information about solar ovens, including the technology, from an independent source, click here. To Determine Your Local UV Index: The Environmental Protection Agency has a Web site that will calculate the local UV index for that day based on ZIP codes. To visit, click here.
To me, Wendigo’s are the most unique and terrifying creature of all time because nothing makes you more fearful than a creature that was once human  but now is a flesh-eating beast. Through literature studies in college, I remember briefly reading about the creatures (it was in the middle of North American Trickster tales that sent me on quite the search online) and then later seeing them through films and a video game. They are extremely fascinating, especially how other artists/writers/filmmakers have provided their own interpretations of them. "Attack of the Wendigo" “Attack of the Wendigo” Wendigo’s are described physically in many ways, but the creature itself is a demonic spirit. According to Algonquian Indians, the creature would possess a human in the traumatic aftermath of when the human resorted to cannibalism. This would often happen when individuals got lost in the woods, separated from their tribe. Upon returning, the individual would be violent towards other humans, soon becoming anti-social. However, there are conflicting reports saying it’s the demon itself that forces the host to become a cannibal. Not only is the possessed person emotionally changed, but also physically. Depending on different folklore, or interpretations, the creature itself is gaunt and large, half human with a deer head and antlers and fifteen feet tall. With protruding bones almost piercing its yellow/grey skin,  and with the insides made of ice. Their eyes are sunken in, their lips bloody and tattered. From the literal sense, a Wendigo is more representative of a psychosis. Individuals killing and consuming another person fall right into the sin of gluttony. This is appropriate because the creatures’ hunger is never satisfied – though through consumption, the creatures would grow larger. Despite the differences in folklore/interpretations, killing and burning the creature seems to destroy it – fire being the key. This could be due to the ice innards or just plain fire kills everything. Wendigo’s come mainly from the northern United States and Canada in the Algonquin tribes mythology. Though the myths vary, first accounts of these creatures (or this condition) were seen as early as the 17th century.   Luckily, there are many examples I can note for the Wendigos for novels, movies, TV shows and even video games: Wendigo from "Supernatural" Wendigo from “Supernatural” "The Wendigo" by Algernon Blackwood “The Wendigo” by Algernon Blackwood Wendigo from "Grimm" Wendigo from “Grimm” Another Wendigo from "Grimm" Another Wendigo from “Grimm” Wendigo from the video game "Until Dawn" Wendigo from the video game “Until Dawn” Wendigo from "Sleepy Hollow" Wendigo from “Sleepy Hollow” This subject can be endless, and considering the legend of the creature dwells in the woods, it’s a great scare factor. Many books cover this creature, but let me tell you – there are still ways to build a story around Wendigos: • Wendigos not in their usual habitat. Despite loving the video game “Until Dawn,” I was curious how the story would play out in a city, the creature lurking in areas you use everyday – a subway, in the park at night, a college campus during winter break. • Inside the mind of the character turning into the creature. • Wendigo apocalypse. Booooom. Enough said. Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
Joe’s AS Work : Practice Project Western Genre Research 1. What is a western film? Western films are films that revolve around stories that are mostly set in the late 19th century in the American old west. Most Westerns are set between the American civil war (1865) and the early 1900s. 1. What are the key codes and conventions of a western? • Stetson hats • Sheriff badges • Stock horses • Winchester Rifle • Smith and Wesson revolver • Barrels • Whips • Sheriff • Hero • Sidekick • Gunslinger • Outlaw • Indians • Bartender • Lady The setting also often has a lack of people in the surrounding area. Narratives- generally good vs evil (maintaining law and order), where in the end the evil is defeated by the hero in a final shootout. There is often a woman that the hero saves at some point in the film. Camera techniques: • Tracking shots • Close ups • Longshots • Tilt shots • Eye level • Birds eye view Editing techniques: • Jump cuts • Flash backs Messages- generally the message comes from the moral aspect of the storey such as the ides of maintaining law and order and good overcoming evil. 1. Name 3 key western films made in the last 50 years. Why are they key? Butch Cassidy and The Sundandce Kid The Good The Bad and The Ugly 1. Name 2 westerns made in the past 5 years. How were they received? Cowboys & Aliens- not very well received averaging a rating of 5.6/10 by critics on the website Rotten Tomatoes. The Homesman- mostly positive reviews from critic’s average rating of 7.2/10 on the website Rotten Tomatoes. 1. Name 3 key iconic western actors. Why are they key? John Wayne- famous for his accent and the way that he spoke. Clint Eastwood- known for being tough. Gary Cooper-  known for his natural and authentic acting style. 1. Name 3 key iconic western directors/producer. Why are they key? Anthony Man- directed El Cid (a famous western film) John Ford- directed Stagecoach (often considered one of the best westerns ever made). Clint Eastwood- he was known for both directing and starring in westerns. 1. Why do westerns seem to appeal to audiences? -3 reasons 1. Westerns made good stories. The idea of good vs evil is very appealing as there is a lot of anticipation regarding the outcome of the film (will the evil be defeated). 2. They appealed a lot to American audience because they were rapidly leaving behind rugged individualism and moving towards a more modernised identity. Therefore, watching westerns brought back a nostalgic feeling of living off the land and fending for themselves. 3. They represented an idealised version of the lonely life of someone living in those times. 1. Why did the genre fall out of favour? 1. The idea of “cowboys” is often dismissed as being childish meaning that people become very reluctant to buy into the genre. 2. Well done westerners can be expensive to create. 1. Why do you think it has a resurgence in recent years? People could be missing the idea of fending for themselves without all of the technology we have today. Just living in the most basic way possible with little to no distraction. Western Storyboards Health and Safety Summary Hazard Risk Safety Measure Filming from the bridge Camera falling over the side onto somebody. Making sure that someone is next to the camera at all times. Filming near the road Tri-pod being blown over if a large vehicle drives past. Make sure that someone is holding onto the tri-pod while it is near the road. Wet/slippery ground. Risk of slipping over. Not running & taking care while walking around the wet/slippery areas of the ground. People walking near to the road. Being hit by a car. Keeping on the pavement. Tree roots on the ground Tripping over had injuring yourself Being careful when walking around Sharp objects left on the ground Cutting yourself Look out for these objects and if you see them put them into a bin Bricks on the ground from the fire pit Tripping over and injuring yourself Making sure not to walk through/over the old fire pit.  Final Film – Death in the Woods Burford School Media Arts
Every year software company Intel Security release a research paper titled Teens, Tweens and Technology. The Research aims to examine the behaviour and opinions of young Australians and their parents regarding the use of technology and the Internet, with a main focus on social media usage, safety, and cyberbullying. Intel Security conducted 1000 interviews, 500 with Australian parents of children aged 8-16, and 500 with children aged 8-16. The research splits young Australians into two separate groups: • Tweens: 8-12 year olds • Teens: 13-16 year olds The survey found some very worrying statistics regarding the ways in which young children are engaging with social media services and other technologies 41% of 8-16 years olds are spending more than 2 hours per day in front of a mobile device 46% of parents are more worried about online behaviour due to the use of mobile devices 39% of children aged between 8-12 are active on social media, despite the minimum required age for signing up to most social media services being 13 36% of boys and 64% of girls aged between 8-12 reported having an account on Facebook, Twitter or Instagram Parents are becoming increasingly worried about their child’s digital reputation, with 50% of parents reporting they worry about how their child’s digital reputation may influence their education and employment prospects in the future. Most parents also agree that the need for education is becoming increasingly important, with 83% stating education is required to teach children how to manage their digital reputation and personal information on the Internet. The research also found that children are still hiding their online activity form their parents and are continuing to take risks online. One in three children aged between 8-12 hide their online activity form their parents using the following methods: 34% change their online behaviour when in the presence of their parents 16% delete their messages to prevent their parents form viewing them 16% clear their browser history so their parents cannot track their online behaviour 11% use a mobile device instead of a laptop or desktop as it makes it harder for their parents to monitor their behaviour Children are continuing to post personal content on social media, despite 62% of children believing that the worst thing that can happen to them online is other people finding out their whereabouts or personal information. 39% of children have posted the name of their school 25% have posted their email address 17% have posted their full birth date Australian children continue to indicate a willingness to participate in risk taking activities using social media, with 11% of children saying that they would meet, or have met someone in person who they first met online. Surveyed children revealed a willingness to use social media to deceive authority figures such as parents and teachers, a worrying trend as issues such as cyberbullying become increasingly problematic for young Australians. 38% of children have a social media account using a fake name or alias, the two main motivations behind this are as follows 51% want to hide their identity from friends and classmates when posting comments 31% want to hide inappropriate content from their parents and school staff There are many ways that parents can limit the risk posed to their child on social media, the two most important factors are supervision and an understanding of the social media services they are using. Make sure you are actively monitoring your child’s Instagram account, check who they are following and who is following them. Check their Instagram Direct feed  and monitor who is getting in contact with them. It does not take long for children to stumble across something inappropriate on Instagram ensure you are actively supervising your child when they are on Instagram, and do not let them have access to their mobile devices alone in their bedroom, particularly at night. Communicate openly with your child about what they are seeing on Instagram, remind them it is important to tell an adult if they see something on Instagram that offends them or worries them. Establish ground rules outlining when your child is allowed to use Instagram, how long they are allowed to use it for, and your expectations regarding their behaviour on social media. Paedophile’s and predators can strike at any time, a young child with a social media account is a full time job for a parent. Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
Make the Casino Work for You rouletteNothing is more hair raising than exposure to risk without a sense of the level of that exposure.  This is especially true in capital investment decisions. Monte Carlo simulations perform risk analysis by building models of possible results by substituting a range of values—a probability distribution—for any factor that has inherent uncertainty and significant impact on the final result. By using probability distributions, variables can have different probabilities of different outcomes occurring.  Probability distributions are a much more realistic way of describing uncertainty in variables of a risk analysis and improve the quality of sensitivity analysis. During a Monte Carlo simulation, values are sampled at random from input probability distributions.  This is done hundreds or thousands of times, and results in a probability distribution of possible outcomes.  It provides a much more comprehensive view of what may happen. Advantages over deterministic, or “single-point estimate” analysis include: • Probabilistic Results. Showing how likely each outcome is. • Clearer Graphical Results. Visual presentation of probabilities. • Improved Sensitivity Analysis. Sharper sensitivity analysis to show what counts. • Scenario Analysis: Model repeated variations in combinations of factors to show which scenarios need further investigation. • Correlation of Inputs. Represent how, in reality, when some factors goes up, others go up or down accordingly. Done poorly or with low quality input data, the results can be potentially misleading – producing a level of certainty on the basis of some very uncertain assumptions. Lytton Advisory holds an @Risk software licence which enable us to provide this type of probabilistic analysis to clients, helping them make better informed decisions. Examples of how we have applied this for clients include: • Estimating financial costs of schedule delay on a major metropolitan public transport project. • Assessing probability of breaching a cost contingency levels on a +$500 million infrastructure program. • Building probabilistic NPV profiles in cost benefit analyses given uncertainty about key economic inputs. Contact us today to find out how we might be able to help you. Reducing Red Tape Red tape reduction remains on the Government’s agenda in Queensland. Significant work has been done on a social and human services blueprint by the Department of Communities, Child Safety and Disability Services. See: I am pleased to have played a small part in this. See: Introducing Cost Benefit Analysis How do you find out what an economic cost benefit analysis should contain? Reference materials run to hundreds of pages, with detailed explanations depending on the nature and purpose of the investigation and the field under consideration. I thought a simple introduction would help explain what is involved and prepared Intro to CBA for my clients. Cheat Sheet for Reviewing a Cost Benefit Analysis Report Suppose you are given a cost benefit analysis.  Without an economics degree, how do you know it has been properly completed? Economic CBAs are a decision support tool used to determine the net benefit to an economy of a proposed course of action, a policy or a project.  A ‘do something’ case is typically compared to a ‘business as usual’ case to identify incremental changes in benefits and costs, explicitly recognising that not doing a project has implications as well.  Costs and benefits occur in different time periods and values are brought to the present to enable comparison of net economic benefits. If you are wading through one of these reports here is a cheat sheet with questions you can ask the analyst to pierce the veil of certainty these reports often convey.  It is based on longstanding advice the Commonwealth Government has given its own agencies when confronted with this kind of economic analysis. Ask the following questions: 1. What questions does the study attempt to answer? 2. What alternative strategies are considered? 1. Do you have any comments on the way the choices could have been set out? 2. Are there other choices that could/should have been considered at the same time? 3. Are you happy with the cost estimates made? 1. Are the methods of evaluation satisfactory? 2. Are any relevant costs omitted? 4. Is the study based on reliable evidence? 1. What further information would you require? 2. Is such information available and, if so, where and from whom? 5. Are you happy with the methods of benefit measurement employed in the study? 1. If not, what method or approach would you propose? 2. If yes, are you content with the values derived? 6. Does the study allow for: 1. Uncertainty (or errors) in the expected costs and benefits? 2. The differential timing of costs and benefits? 7. Finally, assuming you were advising the decision makers, what would be your recommendation? Any analyst should have no problems or hesitancy answering these.  If they do, the report probably needs more work. How Would We Know? How would we know?
Lined Seahorse Hippocampus erectus - Lined Seahorse Lined Seahorse. Photo © Anne DuPont Hippocampus erectus These specialized fish are poor swimmers and rely on their coloring and texture to camouflage themselves among coral, seagrass, or mangroves where they ambush much smaller prey by sucking them into their toothless snouts. They choose a mate for a season or a lifetime, have complex courting and bonding rituals, and the male carries the embryos to term in his brood pouch. The lined seahorses grow to over 7 inches long and live one to four years. Because of their excellent camouflage, and their body structure of bony plates, they have little danger of predation, but humans collect them for traditional medicine and the aquarium trade. Order - Syngnathiformes Family - Syngnathidae Genus - Hippocampus Species - erectus Common Names English language common names are lined seahorse, horsefish, northern seahorse, sea horse, seahorse, spotted sea horse, and spotted seahorse. Other common names include Amerikansk Jättesjöhäst (Swedish), caballito punteado (Spanish), caballito estriado (Spanish),caballito erecto (Spanish), caballito de mar (Spanish), cavalo-marinho (Portuguese), cavalo-do-mar (Portuguese), cavalinho-do-mar (Portuguese), cabai di awa (Papiamento), hippocampe rayé (French), vestatlantisk søhest (Danish), and zeepaardje (Dutch). Importance to Humans Hippocampus erectus - Lined Seahorse Lined seahorse coloration can vary considerably. Photo © Anne DuPont Seahorses are not targeted in fisheries in the western Atlantic Ocean, however they are a targeted fish in other regions where they are commonly traded for ornamental display, aquarium fishes, and traditional Chinese medicine. It is also commonly taken as bycatch in the shrimp trawl and other fisheries off of Florida, Mexico, Central America, and South America. It is also susceptible to habitat degradation due to coastal development and marine pollution. The lined seahorse is listed by the World Conservation Union (IUCN) Red List as "Vulnerable" due primarily to indirect evidence that numbers are continuing to decline which has raised concern. In addition, all species within the genus of Hippocampus were listed in Appendix II of CITES in 2002. In Florida, this species is targeted within the aquarium trade fishery which is monitored and regulated by the state including a limitation on the number of commercial harvesters. However, non-selective in not monitored in any state. > Check the status of the lined seahorse at the IUCN website. Geographical Distribution Hippocampus erectus - Lined Seahorse, Map World distribution map for the lined seahorse This seahorse is found from Cape Cod (and rarely Nova Scotia, Canada) southward to Bermuda, the Bahamas, shores of the Gulf of Mexico, Cuba, Haiti, Lesser Antilles, Caribbean coast of Panama, and Columbia, and the Atlantic coast of South America to Uruguay. In addition, there exists a southern form that appears to be genetically distinct from the north Atlantic specimens. This form, residing from Rio de Janeiro, Brazil, and possibly Suriname, may prove to be a separate species. The lined seahorse occurs at depths from 2-230 feet (.5-70 m) and is often observed clinging to aquatic vegetation including mangroves, seagrasses, sponges, corals, and floating sargassum. Those that reside with sargassum often have protuberances and fleshy tabs that aid in camouflage. This seahorse is also found associated with man-made structures. Adults may be associated with vegetation or swimming freely in the midwater while newborn and juvenile lined seahorses tend to swim close to the surface of the water. During the winter months, this species moves into deeper waters. Hippocampus erectus - Lined Seahorse Lined seahorse. Photo © George Burgess Distinctive Features The large and hardy lined seahorse is deep-chested and robust. Instead of scales, this seahorse has skin that is stretched tightly over a bony armor that is arranged as a series of rings. At the end of the tubular snouth is a small, toothless mouth. The gills are tufted and lobe-like with gill openings restricted to the upper border of the operculum. The pelvic and anal fins are absent, the dorsal fin is spineless, and the tail is prehensile. The coronet is variable and low and appears as a triangular wedge or ridge-like with sharp edges or spines. The first, third, fifth, seventh and eleventh trunk rings are enlarged which distinguishes it from other species of seahorses that typically have enlarged first, fourth, seventh, and eleventh trunk rings. The basic color of the lined seahorse varies from gray, orange, brown, yellow and red to black while brown specimens tend to be paler on their front side. The body often has a characteristic pattern of white lines following the neck contour from which this fish gets its common name of "lined seahorse". Small white dots are located on the tail along with darker or paler saddles across the back. Seahorses lack teeth however they do have a long snout to accommodate their diet of small shrimp, very small fish, plants, and plankton which they swallow whole (see "Food Habits" section for more details). Size, Age, and Growth The maximum reported length of the lined seahorse is 7.5 inches (19.0 cm). Maturity is reached at lengths of 2.2-2.8 inches (5.6-7.0 cm) with males developing brood pouches at 5-7 months of age. The lifespan of this seahorse is approximately one year in length. Food Habits Seahorses are slow-moving so rather than chasing down prey, they use their elongated snout as a pipette to suck in small crustaceans including shrimp. Other prey items include amphipods, copepods, polychaetes, and gastropods. Hippocampus erectus - Lined Seahorse Lined seahorses. Photo © Anne DuPont Seahorses are sexually dimorphic, with the presence of a brood pouch at the base of the abdomen of males the most obvious structural difference. Males also have proportionally longer tails than do the females. Mating with a single partner for an entire season or lifetime, the majority of seahorse species are sexually and socially monogamous. The courtship behaviors are complex with partners displaying changes in color becoming pale to whitish. The male inflates his pouch prior to pursing the female, signaling his readiness to mate. The female then transfers between 250-650 eggs to the brood pouch of the male which he then promptly seals and fertilizes the eggs. The brood pouch protects the developing embryos and provides them with oxygen through a capillary network. Development in the brood pouch is 20-21 days followed by hatching. The hatched embryos are carried within the pouch until they can actively swim. The father seahorse holds fast to an object with his tail, then bends backward and forward rapidly, opening the pouch to let a young seahorse out. These motions are repeated until the pouch is emptied. Each young seahorse emerges from the pouch head-first and able to swim freely. Each is an miniature copy of the adult lined seahorse, measuring about 0.4 inches (11 mm) in length. Lined seahorses reach their maximum size about approximately 8-10 months of age. In general, seahorses are believed to have few natural predators due to their ability to camouflage along with their unpalatable boney plates and spines. Although lined seahorses are well-camouflaged among aquatic vegetation, mobility is limited making this species somewhat vulnerable to predation. Larger fishes prey on adults and juveniles including dolphinfish, tuna, and sharks. In captive situations, parental males have been documented as cannibalizing small numbers of their own young. Captive lined seahorses are especially vulnerable to parasitic infections including microsporidians, including Glugea heraldi; a myxosporidian of the genus Sphaeromyxa; fungi; ciliates, including Uronema marinum; and nematodes. The lined seahorse was first described in 1810 by Perry as Hippocampus erectus. Synonyms include H. hudsonius DeKay 1842, H. punctulatus Guichenot 1853, H. marginalis Kaup 1856, H. laevicaudatus Kay 1856, H. fascicularis Kay 1856, H. villosus Günther 1880, H. stylifer Jordan & Gilbert 1882, H. kincaidi Townsend & Barbour 1906, H. brunneus Bean 1906. This fish is a member of the family Syngnathidae which includes seahorses along with pipefishes. The etymology of this family name is from the Greek syn meaning "with" and "together" along with gnathos translated as "jaw". The genus name Hippocampus is derived from ancient Greek, translated as "horse/sea monster". It includes three species of seahorses found in the western North Atlantic including the longsnout seahorse (H. reidi). Prepared by: Cathleen Bester
 Random experiment   Elementary finance Random experiment long term stability example 1: a drawer of socks reproduction of a series of experiments example 2: a wheel of chance numerical measures, and average law of large numbers terminology and notations simplicity and complexity of probabilities an example of paradox We are all familiar with situations in life where we can note or measure some feature, and also: • we can reproduce the situation • the values noted or measured, from one reproduction of the situation to the next, may be different If you feel uneasy talking about something "which changes all the time", notice that when we consider objects in a room, we are not disturbed by the fact that their actual location may change from time to time (when we move them from the table to the shelf of books for instance, or when we take them in our hands). Yet some fascinating long term stability is observed: if we reproduce the situation many times, the actual values taken by the feature noted or measured will show stability, in the sense that we shall describe. Example 1: Suppose we have a chest of drawers, with socks in the bottom drawer we pick a sock "at random" without looking into the drawer. Here we picked a yellow sock. We put it back, and then pick again a sock at random. Now we picked a green sock. We put it back again. If we reproduce the same experiment many times, we shall get a sequence (or series) of colours, with a certain proportion of yellow, a certain proportion of green, of black, of red perhaps (we assume that we don't know a priori what's in the drawer). Next day, we ask a friend to perform the same series of experiments with the same chest of drawers. She will not get the same series of colours, but she will get roughly the same proportions. That is the stability we were talking about. Example 2: We build a "wheel of chance". It is a disk which can turn around an axle fixed to a frame. On the frame, fixed too is an index. We mark two sectors, one with angle 1/3 of the disc, the other with angle 2/3. The first sector carries the value 200€, and the second 50€. The random experiment is "spin the wheel", and the value we record at the end of a spin is the sum of money in the sector on which the index points. If we spin the wheel many times, we shall get a sequence of outcomes. For instance: 200, 50, 50, 200, 50, 50, 50, 50... The proportion of 50€'s and 200€'s will be "stable" in the sense that if we produce, the next day, a second long sequence of spins and measures, we shall get approximately the same proportions. We can even telephone a friend, and ask him to build the same device, and perform a series of experiments. Again, he won't get the same series of results, but he will get approximately the same proportions as us. In this second example, what we record is a number (the sum of money), so we can do calculations. For instance we can compute the average result in a long sequence of spins. We shall always (we, as well as our friend) get roughly 100€. The stability of the proportions, and of the average, are instances of what is called "the law of large numbers". We shall see in a later lesson that it has a simple and strong explanation, without any magic. Terminology and notations: • the production of the situation is called "the experiment". It is usually noted . • the feature we note or measure (when it is numerical) is called a "random variable". It is usually noted X. When we measure several random variables at the end of one experiment, we note them X, Y, Z... • the set of possible values of the random variable X, when it is discrete, will be denoted A = { a1, a2, .... am } • an instance of the RV (= random variable) X, that is an actual measure at the end of , will be denoted x. It is also called an "outcome" of X. • if we reproduce several times (say a large number N of times), the series of outcomes of X will be denoted x1, x2, x3,... ... ... xN each xi being a possible outcome, that is belonging to the set A. We try to make probabilistic settings as simple as possible. But one must admit that it takes some time and thinking before we feel at ease with it. There are plenty of apparent paradoxes. We finish this lesson with one of them. An example of paradox Consider the following game: there are three doors, A, B and C. Behind one of them, there is a prize. You have to try and guess where, in order to win it. Suppose you guess "door A". Then before we check, the master of the game, who knows where the prize is, opens one of the 2 other doors where the prize is not. Say he opens B. Now, to finish up the game, you are invited to guess again, if you want. Question: should you change your guess (from A to C) or it doesn't matter? Answer: you should change your guess and now guess C. Explanation of the paradox. Screens of the video screen number display zone Course table of contents
Virtual Private Network deadpannectarineNetworking and Communications Oct 26, 2013 (3 years and 8 months ago) Virtual Private Network IS 311 Dr. Gray Tuesday 7pm November 19, 2002 By: Germaine B Lizzi Beduya Jun Mitsuoka Betty Huang Juliet Polintan Table of Contents VPN Topology Types of VPNs Components of VPNs Productivity and Cost Benefit Quality of Service The Future of VPN Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public netw ork the Internet. Therefore, the communication is virtually but not physically there. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is third party who can interrupt this communication or receive any data that is exchanged between them. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a netwo rk. It can transmit information over long distances effectively and efficiently. The term VPN has been associated in the past with such remote connectivity services as the (PSTN), Public Switched Telephone Network but VPN networks have finally started to b e linked with IP based data networking. Before IP based networking orporations had expended considerable amounts of time and resources, to set up complex private networks, now commonly called Intranets. These networks were installed using costly leased li ne services, Frame Relay, and ATM to incorporate remote users. For the smaller sites and mobile workers on the remote end, companies supplemented their networks with remote access servers or ISDN. Small to medium sized companies, who could not afford dedic ated leased lines, used speed switched services. As the Internet became more and more accessible and bandwidth capacities grew, companies began to put their Intranets onto the web and create what are now known as Extranets to link internal and external users. However, as effective and quick deploy as the Internet is, there is one fundamental problem security. Today’s VPN solutions overcome the security factor using special tunneling protocols and complex encryption procedures, data integrity a nd privacy is achieved, and the new connection produces what seems to be a dedicated point to point connection. And, because these operations occur over a public network, VPNs can cost significantly less to implement than privately owned or leased services . Although early VPNs required extensive expertise to implement, technology has matured to a level where deployment can be a simple and affordable solution for businesses of all sizes. Simply put, a VPN, Virtual Private Network, is defined as a ne twork that uses public network paths but maintains the security and protection of private networks. For example, Delta Company has two locations, one in Los Angeles, CA (A) and Las Vegas, Nevada (B). In order for both locations to communicate efficiently, Delta Company has the choice to set up private lines between the two locations. Although private lines would restrict public access and extend the use of their bandwidth, it will cost Delta Company a great deal of money since they would have to purchase th e communication lines per mile. The more viable option is to implement a VPN. Delta Company can hook their communication lines with a local ISP in both cities. The ISP would act as a middleman, connecting the two locations. This would create an affordable small area network for Delta Company. VPNs were are broken into 4 categories Trusted VPN: A customer “trusted” the leased circuits of a service provider and used it to communicate without interruption. Although it is “trusted” it is not VPN: With security becoming more of an issue for users, encryption and decryption was used on both ends to safeguard the information passed to and fro. This ensured the security needed to satisfy corporations, customers, and providers. Hybrid VPN: A mix of a secure and trusted VPN. A customer controls the secure parts of the VPN while the provider, such as an ISP, guarantees the trusted aspect. provisioned VPN: A VPN that is administered by a service provider. VPN Topology Next we will look at ho w a VPN works internally: To begin using a VPN, an Internet connection is needed; the Internet connection can be leased from an ISP and range from a dial up connection for home users to faster connections for businesses. A specially designed router or swi tch is then connected to each Internet access circuit to provide access from the origin networks to the VPN. The VPN devices create PVCs ( Permanent Virtual Circuit a virtual circuit that resembles a leased line because it can be dedicated to a single use r) through tunnels allowing senders to encapsulate their data in IP packets that hide the underlying routing and switching infrastructure of the Internet from both the senders and receivers. The VPN device at the sending facility takes the outgoing pa cket or frame and encapsulates it to move through the VPN tunnel across the Internet to the receiving end. The process of moving the packet using VPN is transparent to both the users, Internet Service Providers and the Internet as a whole. When the packe t arrives on the receiving end, another device will strip off the VPN frame and deliver the original packet to the destination network. VPNs operate at either layer 2 or layer 3 of the OSI model (Open Systems Interconnection). Layer 2 VPN uses the layer 2 frame such as the Ethernet while layer uses layer 3 packets such as IP. Layer 3 VPN starts at layer 3, where it discards the incoming layer 2 frame and generates a new layer 2 frame at the destination. Two of the most widely used protocols for creati ng layer 2 VPNs over the Internet are: layer tunneling protocol (L2TP) and point point tunneling protocol (PPTP). The newly emerged protocol, called Multiprotocol Label Switching (MPLS) is used exclusively in 3 VPNs. See Figure 1 Figure 1. Defined VPN Note: From A Primer for implementing a Cisco Virtual Private Network © 1999 Cisco systems, Inc All rights Reserved Types of VPNs There are currently three types of VPN in use: remote access VPN, intranet VPN, extranet VPN. Remote access V see figure 2 enables mobile users to establish a connection to an organization server by using the infrastructure provided by an ISP (Internet Services Provider). Remote access VPN allows users to connect to their corporate intranets or extranets w herever or whenever is needed. Users have access to all the resources on the organization’s network as if they are physically located in organization. The user connects to a local ISP that supports VPN using plain old telephone services (POTS), integrate d services digital network (ISDN), digital subscriber line (DSL), etc. The VPN device at the ISP accepts the user’s login, then establishes the tunnel to the VPN device at the organization’s office and finally begins forwarding packets over the Internet. Remote access VPN offers advantages such as: Reduced capital costs associated with modem and terminal server equipment Greater scalability and easy to add new users Reduced long distance telecommunications costs, nationwide toll free 800 number is no lon ger needed to connect to the organization’s modems Figure 2. Remote Access VPNs A Primer for implementing a Cisco Virtual Private Network © 1999 Cisco systems, Inc All rights Reserved Intranet VPNs, provides virtual circuits between organization office s over the Internet (see figure 3). They are built using the Internet, service provider IP, Frame Relay, or ATM networks. An IP WAN infrastructure uses IPSec or GRE to create secure traffic tunnels across the network. Benefits of an intranet VPN include the following: Reduced WAN bandwidth costs, efficient use of WAN bandwidth Flexible topologies Congestion avoidance with the use of bandwidth management traffic shaping Figure 3. Intranet VPNs A Primer for implementing a Cisco Virtual Private Network 1999 Cisco systems, Inc All rights Reserved The concept of setting up extranet VPN are the same as intranet VPN. The only difference is the users. Extranet VPN are built for users such as customers, suppliers, or different organizations over the Intern et. See Figure 4 Figure 4. Extranet VPNs A Primer for implementing a Cisco Virtual Private Network © 1999 Cisco systems, Inc All rights Reserved Components of the VPN In order for a VPN to be beneficial a VPN platform needs to be reliable, manageable across the enterprise and secure from intrusion. The VPN solution also needs to have Platform Scalability the ability to adapt the VPN to meet increasing requirements ranging from small office configuration to large enterprise implementations. A key ecision the enterprise should make before starting their implementation is to consider how the VPN will grow to meet the requirement of the enterprise network and if VPN will be compatible with the legacy networks already in place. Companies n eed to keep their VPNs secure from tampering and unauthorized users. Some examples of technologies that VPN’s use are; IP Security (IPSec), Point Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol and Multiprotocol Label Switching (MPLS) along with Data Encryption Standard (DES), and others to manage security. A further description of these technologies is detailed PPTP uses Point Point Protocol (PPP) to provide remote access that can be tunneled through the Internet to a desired site. Tunneling allows senders to of the Internet from both senders and receivers to ensure data security against unwanted viewers, or hackers. PPTP can also handle Interne t packet exchange (IPX) and network basic input/output system extended user interface (NetBEUI). PPTP is designed to run on the Network layer of the Open systems interconnection (OSI). It uses a voluntary tunneling method, where connection is only estab lished when the individual user request to logon to the server. PPTP tunnels are transparent to the service provider and there is no advance configuration required by the Network Access Server, this allows PPTP to use multiple service providers without an y explicit configuration. For example, the client dials up to the ISP and makes a PPP session. Then, the client dials again to the same PPP session, to contact with the destination remote access server (RAS). After contact is made with the RAS, packets are then tunneled through the new connection and the client is now connected to the corporate server virtually. Layer Two Tunneling Protocol (L2TP) exists at the data link layer of the OSI model. L2TP is a combination of the PPTP and Layer two Forwarding (L2F). (Layer two forwarding was also designed for traffic tunneling from mobile users to their corporate server. L2F is able to work with media such as frame relay or asynchronous transfer mode (ATM) because it does not dependent on IP. L2F also PPP authentication methods for dial up users, and it also allows a tunnel to support more than one connection.) L2TP uses a compulsory tunneling method, where a tunnel is created without any action from the user, and without allowing the user to choose a t unnel. A L2TP tunnel is dynamically established to a predetermined end point based on the Network Access Server (NAS) negotiation with a policy server and the configured profile. L2TP also uses IPSec for computer encryption and data authentication IPSec uses data encryption standard (DES) and other algorithms for encrypting data, public key cryptography to guarantee the identities of the two parties to avoid man middle attack, and digital certificates for validating public keys. is focused on Web applications, but it can be used with a variety of application layer protocols. It sits between IP at the network layer and TCP/UDP at the transport layer. Both parties negotiated the encryption technique and the key before data is sferred. IPSec can operate in either transport mode or tunnel mode. In tunnel model, intruders can only see where the end points of the tunnel are, but not the destinations of the packet and the sources. IPSec encrypts the whole packet and adds a new I P packet that contains the encrypted packet. The new IP packet only identifies the destination’s encryption agent. When the IPSec packet arrives at the encryption agent, the new encrypted packet is stripped and the original packet continues to its destin In Transport mode IPSec leaves the IP packet header unchanged and only encrypts the IP payload to ease the transmission through the Internet. IPSec here adds an encapsulating security payload at the start of the IP packet for security through the Internet. The payload header provides the source and destination addresses and control information. Multiprotocol Label Switching (MPLS) uses a label swapping forwarding structure. It is a hybrid architecture which attempts to combine the use of net layer routing structures and per packet switching, and link layer circuits and per switching. MPLS operates by making the inter switch transport infrastructure visible to routing and it can also be operated as a peer VPN model for switching a va riety of layer and layer 2 switching environments. When the packets enter the MPLS, it is assigned a local label and an outbound interface based on the local forwarding decision. The forwarding decision is based on the incoming label, where it mines the next interface and next hop label. The MPLS uses a look up table to create end end transmission pathway through the network for each packet. Packet authentication prevents data from being viewed, intercepted, or modified by unauthori zed users. Packet authentication applies header to the IP packet to ensure its integrity. When the receiving end gets the packet, it needs to check for the header for matching packet and to see if the packet has any error. User authentication is used to determine authorized users and unauthorized users. It is necessary to verify the identity of users that are trying to access resources from the enterprise network before they are given the access. User authentication also determines the access levels; data retrieved or viewed by the users, and grant permission to certain areas of the resources from the enterprise. intrusion detection firewalls Firewalls monitors traffic crossing network parameter, and protect enterprises from unautho rized access. The organization should design a network that has a firewall in place on every network connection between the organization and the Internet. Two commonly used types of firewalls are packet level firewalls and level firewalls. level firewall checks the source and destination address of every packet that is trying to passes through the network. Packet level firewall only lets the user in and out of the organization’s network only if the users have an acceptable packet wit h the correspondent source and destination address. The packet is checked individually through their TCP port ID and IP address, so that it knows where the packet is heading. Disadvantage of packet level firewall is that it does not check the packet cont ents, or why they are being transmitted, and resources that are not disabled are available to all users. level firewall acts as a host computer between the organization’s network and the Internet. Users who want to access the organization’s ne twork must first log in to the application level firewall and only allow the information they are authorized for. Advantages for using application level firewall are: users access level control, and resources authorization level. Only resources that are authorized are accessible. In contrast, the user will have to remember extra set of passwords when they try to login through the Internet. managing security policies, access allowances, and traffic VPN’s need to be flexible to a companies management, some companies chooses to manage all deployment and daily operation of their VPN, while others might choose to outsource it to service providers. In our next section we will discuss how businesses might benefit from a productive VP N and the cost benefits of implementing a VPN. Productivity and Cost Benefit In terms of productivity VPN’s have come a long way. In the past, concerns over security and manageability overshadowed the benefits of mobility. Smaller organizations had to onsider the additional time and cost associated with providing IT support to employees on the move. Larger companies worried, with good cause, about the possibility that providing mobile workers with remote network access would inadvertently provide rs with a “back door” entry to corporate information resources. But as end technologies like personal digital assistants (PDAs) and cell phones have made mobility more compelling for employees, technology advances on the networking side have helped ad dress IT concerns as we saw in the previous section. With these advancements in technology comes better productivity. VPN’s have become increasingly important because they enable companies to create economical, temporary, secure communications channels acr oss the public Internet so that mobile workers can connect to the corporate VPN’s Benefit a company in the following ways Extends Geographic Connectivity a VPN connects remote workers to central resources, making it easier to set up global operati Boosts Employee Productivity VPN solution enables telecommuters to boost their productivity by 22% 45% (Gallup Organization and Opinion Research) by eliminating time consuming commutes and by creating uninterrupted time for focused work. s Internet Security An always on broadband connection to the Internet makes a network vulnerable to hacker attacks. Many VPN solutions include additional security measures, such as firewalls and anti virus checks to counteract the different types of netw ork security threats. Scales Easily A VPN allows companies to utilize the remote access infrastructure within ISPs. Therefore, companies are able to add a virtually unlimited amount of capacity without adding significant infrastructure. Even though VPN’ s are a cheaper way of having remote users connect to a company’s network over the Internet there are still costs associated with implementing the VPN. Some of the typical costs include hardware, ISP subscription fees, network upgrading costs and end user support costs. These costs aren’t standard they vary depending on many factors, some of which include, size or corporation, number of remote users, type of network systems already in place and Internet Service Provider source. When it comes to decision mak ing time IT managers or Executive officers should take these costs into consideration. Also these decision makers must decide whether to develop their VPN solution in house or to outsource to a total service provider. There are a few ways to approach this In House Implementation companies decide that for their needs an in solution is all they need. These companies would rather set up individual tunnels and devices one at a time and once this is established the company can have their own IT st aff take care of the monitoring and upkeep. Outsourced Implementation companies can choose to outsource if they are large scaled or lack the IT staff to fully implement an in house VPN. When a company outsources the service provider usually designs the V PN and manages it on the company’s behalf. Middle Ground Implementation Some companies would rather have a service provider install the VPN but have their IT staff monitor the specifics such as tunnel traffic. This type of implementation is a compromise between a company and the service provider. After Implementation the company must make sure that it has adequate support for its end users. That’s where quality of service comes in. Quality of Service (QOS) Users of a widely scattered VPN do not usually care about the network topology or the high level of security/encryption or firewalls that handle their traffic. They don’t care if the network implementers have incorporated IPSec tunnels or GRE tunnels. What they care about is something more fundamental, such as: “Do I get acceptable response times when I access my mission critical applications from a remote office?” Acceptance levels for delays vary. While a user would be willing to put up with a few additional seconds for a file transfer to compl ete, the same user would have less tolerance for similar delays when accessing a database or when running voice over an IP data network. QoS (Quality of Service) aims to ensure that your mission critical traffic has acceptable performance. In the real worl d where bandwidth is limited and diverse applications from videoconferencing to ERP database lookups must all strive for scarce resources, QoS becomes a vital tool to ensure that all applications can coexist and function at acceptable levels of performance Quality of Service (QOS) is a key component of any VPN service. In MPLS/BGP VPNs, existing L3 QoS capabilities can be applied to labeled packets through the use of the “experimental” bits in the header, or, where ATM is used as the backbone, through th e use of ATM QoS capabilities. The traffic engineering work discussed in is also directly applicable to MPLS/BGP VPNs. Traffic engineering could even be used to establish LSPs with particular QoS characteristics between particular pairs of sites, if that is desirable. Where an MPLS/BGP VPN spans multiple SPs, the architecture described may be useful. An SP may apply either intserv or diffserv capabilities to a particular VPN, as appropriate. The Future of VPN As more and more businesses demand a high er level of network access, the business is migrating from a private network environment to a new model in which information is distributed throughout the enterprise network. Thus, expanding their network in the near future and actually seeing the benefits of using the Internet as the backbone to create Virtual Private Networks (VPN). VPN is designed to meet the demands for information access in a secure, cost effective environment. vendor interoperability for VPN is crucial in today’s networking ironment due to the nature of business successes, the need to extend corporate networks to contractors and partners, and the diverse equipment within company networks. The Microsoft Windows operating system has integrated VPN technology that helps provide secure, low cost remote access and branch office connectivity over the The future is in integrated VPNs which depend on how VPNs industry will improve their unique qualities that will enable consumers to communicate effectively with other consum ers. Therefore, a VPN creates a large, multi site, company wide data network which allows for every device to be uniquely addressed from anywhere on the network. This means that central resources can be accessed from any site in the organization or from an y Internet connected location around the world. The technical problems involved in connecting hundreds of remote sites to a central network are extensive. It often involves the purchase of very expensive high density backbone routers or the use of costly f relay services. These systems are seldom easy to support and often require specialist skills. Also, it depends on the ability of intranets and extranets to deliver on their promises. First of all VPN companies must consider to cost saving for g of VPNs. Generally speaking the more the companies supply cheaper cost of services, the more products or demands increase for them on the markets. Therefore, they will earn high profit then spend a lot of money for developing much higher quality VPN. e is a diagram for U.S. companies with IP VPN. Table 1. Companies with VPN Source: IDC’s 2001 U.S. WAN Manager Survey, IDC #26462, February 2002 According to IDC’s 2001 U.S. WAN manager survey as table 1, approximately fifty s of companies in U.S. have been adopted IP VPN in their companies. Demand for VPN has been increasing even though economy is going down and especially IT business companies have not succeeded at present. More then 20 percents of companies will plan to hav e IP VPN services in the future so those in near future more than 70 percents of companies are going to use IP VPN services. More companies will adopt IP VPN services and increasing more demand in the U.S. Also many companies have been using IP VPN for rem ote access as LAN. The companies for servicing VPN will consider meeting consumer’s demands that is voice over IP and other VPN as VOIP VPN. Currently very a few companies have been using this VPN and a few companies will plan to use it in the future. Ho contrary to their demands, most produces are standing on difficult situation for improving VOIP VPN because the voice is a kind of special requirement of low latency and jitter. Most of people will continue to use voice communication by telephone th at is successfully improving with low costs. The 21st century invites new ways of viewing the communication networks. Companies that previously managed their own communications requirements are uniting with service providers that can help build up, impr ove, and manage their networks on a global scale. This opens up opportunities for continued growth, increased profitability, and the greatest achievement for both service providers and subscribers. In the past, service providers drew attention to lower el transport, such as leased lines and frame relay. Nowadays, service providers team with business customers to meet their networking requirements through virtual private networks (VPNs). VPNs are the source of future services. When properly implemented, they can simplify network operations while reducing capital expenses. For most companies, the starting point is to connect widely separated workgroups in an efficient, moneymaking manner. From there, service providers can influence the main technology as a foundation for offering additional services such as application hosting, videoconferencing, and packet telephony. VPN help service providers build customer loyalties while delivering network services that are valuable to their customers' business opera tions. This indicates an opportunity to capture new customers, as companies switch from yesterday's data communications strategies to today's more comprehensive at hand solutions. VPN is an emerging technology that has come a long way. From a n insecure break off of Public Telephone networks to a powerful business aid that uses the Internet as its gateway. VPN’s technology is still developing, and this is a great advantage to businesses, which need to have technology that is able to scale and g row along with them. With VPN businesses now have alternative benefits to offer to their employees, employees can work from home, take care of children while still doing productive, and have access work related information at anytime. VPN will also help to make the possibility of a business expanding its services over long distances and globally, more of a reality. primer for Implementing a Cisco Virtual Private Network. (1999). Cisco Systems. Retrieved October 5, 2002, from A Technology Guide from ADTRAN. (2001, September). Understanding Virtual Private Networking. ADTRAN. Retrieved October 25, 2002, from Connolly, P.J., (2002, January 21). Taming the VPN. . Retrieved September 18, 2002, from,10801,6739 Dix, John. (2001, April 9). Is an integrated VPN in your future? Network World Retrieved October 1, 2002, from Ferguson & Huston. (1998, April). What is a VPN? Retrieved September 19, 2002, from g Technologies Handbook, Virtual Private Networks. Cisco Systems. Retrieved September 22, 2002, from Introduction to VPN: VPNs utilize special purpose network protocols. Retrieved September 14, 2002, from Generation Networking: The Future of Greater Performance and Flexibility. (2002, July). IDC Analyze the Future. Retrieved September 28, 2002, from Remote Access VPN Solutions. (2001, June). Check Point Software Technologies Ltd. Retrieved September 20, 2002, from Salamone, Salvato re. (1998, December). VPN Implementation Calls For A Tunnel Trip. Internet Week . Retrieved October 30, 2002, from Sandick, H., Nair, R., Rajagopalan, B., Crawley, E., (1998, August). A Framework for Routing in the Internet. Retrieved October 1, 2002, from Sweeney, T., (2000, April 3). Businesses Lock In On VPN Outsourcing Options Providers of vi rtual private network services put a new spin on the outsourcing Retrieved September 20, 2002, from Using Point to Point Tunne ling Protocol. (2001, July). Microsoft. Retrieved September 20, 2002, from Virtual Private N etworks (VPNs). International Engineering Consortium October 19, 2002, from VPN Technologies: Definitions and Requirements . International Engineering Consortium. Retrieved October 19, 2002, from What is VPN? What is tunneling? What is the difference between outsourcing and in house development, and ground implementation? What are the difference between remote access VPNs, Intranet VPNs, and Extranet VPNs? What are the benefits of remote access VPNs?
Legacy Educational Resources Forum Blog Links About Us To Smoke or Not to Smoke? What We Can Learn from Marijuana Users By Steve Miller When I began to suspect that some of my son's friends (I have five boys at home over 13-years-old) were using marijuana, I put up a poster board in the basement. One side I entitled: "Why Use Marijuana?" The other side I entitled "Why Avoid Marijuana?" Finally, I wrote a comment or two in each category to get the ball rolling and encouraged my kids and their friends to add anonymous comments at their leisure. Their comments let me see that after years of health education in top-notch public schools, their beliefs on this hugely important issue were largely nonsense, collected from their peer "experts." I challenged them to research the facts, only to discover that some of the best-ranked sites were pro-marijuana, containing select studies to give the veneer of objective research. I took action by researching the following to try to get the facts straight and present it in a way that might appeal to them. Perhaps this will be helpful to you with your kids or students doing research as well. You've got my permission to copy it or personalize it for your needs.  Since marijuana contains about 400 chemicals, there's no way to know every long-term effect. But we can know a lot because hundreds and thousands of regular users have been surveyed and studied. Knowing the facts about how marijuana has affected others helps me to make a wise decision concerning using it. As we look at some facts, let's each ask ourselves, "Does the potential reward outweigh the potential consequences?" Here are the facts as I understand them. If you disagree about any of these points, give me the basis of your opinion. As hard as it is, let's try hard to put our personal opinions aside and get at the facts. Do I Prefer Poor Health? 1. Lung problems. Marijuana causes five times more carbon monoxide to accumulate in the blood than cigarettes. Three times more tar is inhaled and one third more tar settles into the respiratory tract. One joint does the damage of five cigarettes. 2. Problems from unknown additives. It's sometimes contaminated with the Herbicide Paraquat, which damages many body organs. 3. Effects on the heart. It "speeds up the heart rate, increasing the need for oxygen. At the same time, it reduces that amount of oxygen available to the heart and stresses the cardiovascular system." 4. It depresses the immune system, weakening the body's ability to fight off other diseases. You'll get sick more often. 5. Concerning reproduction, it reduces the male sperm count. I don't want anything to risk my future sex life. Babies born to women who smoked two joints per week were less responsive, less able to recover from crying and generally had an immature nervous system. Pregnant women risk birth defects. 6. Concerning cancer, marijuana contains some of the same, and sometimes even more, of the cancer-causing chemicals found in tobacco smoke. My Conclusion: The potential reward of smoking pot (a temporary good feeling and good time with friends) isn't worth risking my health over the short and long haul. My health gives me much more options for fun. Do I Want to Get Dumber and "Dumberer?" 1. It hurts our ability to concentrate. 2. It hurts our ability to remember things. 3. It slows our reactions, hurting us in sports and all activities calling for fast reactions. 4. It makes us less coordinated, hurting our ability to do sports and activities that require coordination. 5. "All my mistakes -- all my stupid f---ups -- I can categorically tell you are a direct result of alcohol and drugs or both." (Ozzy Osborne) My Conclusion: I don't want to put my thinking at risk. My ability to think impacts the respect I get from others, my ability to make money and succeed in business, my relationships and ultimately my ability to acquire the things I want in life. Do I Want to Risk Ruining My Shot at Success? 1. Marijuana causes "amotivational syndrome," where a person begins to show "lack of concern about the future; lessening of ambition, drive, and will; diminished physical activity; apathy; and self-neglect." 2. People who test positive for marijuana are absent from work 30% more than those who don't. 3. Marijuana becomes an expensive habit, especially those who get addicted and can't function without it. It's not just the cost of the marijuana, but the cost of rehabilitation for the addicted. The habit can easily run up expenses in the hundreds of thousands of dollars. I can think of lots of other things I'd rather have for that kind of money. 4. Addicts ruin many of their relationships. 5. If you get caught, a bad Police record can keep you from landing that dream job, or getting many scholarships. A hair analysis can prove marijuana use for two years following use. My Conclusion: Motivated people - those who want to get ahead in a vocation, have great and lasting relationships with the opposite sex, are motivated to become skilled at an instrument or a hobby, seem to enjoy life and get a lot more out of life. I don't want to do anything that might de-motivate me over time. Do I Want to Risk Ruining My Individual Freedom? 1. There's no question that marijuana is addicting. I don't want to risk being controlled by something. 2. Do you want to risk prison or other limitations imposed by the law? 3. Although all users say that they would never drive while impaired by drugs, it's almost impossible to time your highs where you'll never have to drive while high. If your driver falls through or you're called into work unexpectedly, you end up driving while under the influence. If you hit a child, you live with that guilt the rest of your life. If you get caught, you risk losing your license or serving time. Again, less freedom. "Marijuana controls our lives! We lose interest in all else; our dreams go up in smoke. Ours is a progressive illness often leading us to addictions to other drugs, including alcohol. Our lives, our thinking, and our desires center around marijuana---scoring it, dealing it, and finding ways to stay high." (From "Marijuana-Anonymous" Site) My Conclusion: I want to be free - free to drive, free from addiction, free from the restrictions of authorities. To me, using marijuana isn't worth the risk of losing these freedoms. Do I Want Less Long-term Pleasure? 1. Users risk long-term relationship losses. 2. Some people won't hang out with you. Why limit your field of friends, especially when some of them might be exceptionally hot?  3. Although immediately after a smoke you may experience a laid-back state, over the long-haul it often depresses. 4. A research team studied over 1600 Australian school youth aged 14 to 15 for seven years. Daily cannabis use was associated with a five-fold increased risk of depression at the age of 20. Weekly use was linked to a two-fold increase. My Conclusion: The short-lived pleasure of smoking marijuana must be weighed against the long-term pleasure I get from not smoking it. Losing my health, losing my motivation, losing my ability to think well - all these bring about a lasting loss of pleasure. Do I Want to Risk Ruining My Important Relationships? 1. The relationship with parents becomes strained with mistrust and lies. 2. Your closest friends often become limited to other drug users. 3. A person I may really want to date won't go out with me because of her standards. My Conclusion: My relationships are important to me. I know many relationships that have been ruined through the use of drugs or drinking. For me, it's not worth the risk. And that's not all… 1. I become much more at risk to use even more dangerous drugs."The risk of using cocaine is 104 times greater for those who have tried marijuana than for those who have never tried it." "There is no doubt about it. Almost every drug addict I've talked to said he started with marijuana." (Chief John Enright, Federal Bureau of Narcotics and Dangerous Drugs) 2. I risk auto accidents. Sober friends won't always be around to help drive. Marijuana lessens your ability to be alert, concentrate, be coordinated and react quickly. These effects can last up to 24 hours after smoking marijuana. 3. It's easier to get into risky sex, get an STD and lose your ability to enjoy sex for a lifetime. One in three people in metro Atlanta recently tested positive for Herpes Simplex II, which has no known cure. 4. You can make unwise decisions (for example, ride with driver who's under the influence) "…marijuana has been correlated with low levels of social achievement, criminal activity, higher college drop-out rates, and use of other drugs and alcohol." (Marijuana: Its Effects on Mind & Body, The Encyclopedia of Psychoactive Drugs, William J. Hermes and Anne Galperin, p. 75) My Conclusion: I'm willing to take risks in life. I relish the risk of starting a new business, moving to another country, trying challenging sports or activities. But these risks hold the very real potential of great future gains. If marijuana promised a huge lifetime payoff in pleasure (incredibly increased pleasure over time), relationships (I get many more quality friends), health, etc., then the benefits might outweigh the risks. For me, there is too high a chance of ruining my life, for something that gives such minimal short-term benefit. Frequent Comebacks and Questions "I'd rather learn by my own experience." Sometimes this is a good idea, like in trying a new food or trying a new sport. I might like a food that most others tell me is horrible. When the risk is small (I might not like the food and waste a little money), why not go ahead and experience it? But when the stakes are high, I'd be a fool to rely solely on my own experience. Example: If science tells me that drinking antifreeze will likely kill me, I'll trust science (which has collected a large enough sampling of cases of antifreeze poisoning to make a strong case) than experience it myself. If thousands of people a year are loosing all their money to certain "get-rick-quick" schemes, I'd rather learn from their experience rather than lose my own money. Similarly, why not learn from what thousands of long-term users of marijuana are saying, rather than have to learn the same lessons from my own experience? "Nobody can speak with authority unless they've tried it themselves." Would you trust a doctor's diagnosis of a disease only if he himself had had this disease? Often the greatest experts on a disease have never had it themselves. Similarly, the greatest authorities on the moon have probably never been there. They learn from the research and experiences of others. We don't have to experience things to know a lot about them. What I stand to learn from smoking a joint each weekend for several months is very little. First, I may learn that it temporarily relaxes me, helps me have a good time, etc. But I learn very little about how my thinking or physical reflexes are impaired, since we know that it affects our judgment about such things. In other words, most people who drink and drive or smoke pot and drive don't think they're impaired at all. So, just because I experience marijuana and think that I'm not impaired doesn't mean that I'm not. Second, by smoking it for a short time I still know nothing about the long-term affects. Just like smoking cigarettes, the effects are incremental and I may not realize what's happening to my body for a long time. 120,000 marijuana addicts are telling me from their experience to not get involved with Marijuana. Sure, I might be the exception. But how can I ignore this vast, cumulative experience? "It's no worse than beer." 1. If you're caught smoking pot, the penalties will be much worse than if you're caught with beer. 2. You're assuming that beer has very little ill effects on people. Once you know scores of people who have ruined their marriages, families and others' lives through impaired driving or alcoholism, beer may not look so innocent. But that's another subject… 3. Beer doesn't harm your cardio-vascular system in the same way that pot does. 4. Because pot is not regulated, it often contains contaminants that cause additional harm. "I'm not hurting anyone but myself." 1. Everything we do influences others. A little brother or friend or neighbor will start using it if you do it first.  2. Impaired driving from marijuana and alcohol are killing and maiming many every day. "The chief cause of death among young people (ages 15 to 24) is now drunk or drug-impaired driving.'' (Youthletter) 3. Addicts drain their family'sassets "It's not addicting." "A drug is addicting if it causes compulsive, often uncontrollable drug craving, seeking, and use, even in the face of negative health and social consequences." This is a classic definition of drug addiction. Many marijuana users experience all these symptoms. More than 120,000 people seek treatment each year for their primary marijuana addiction. Why would 120,000 people pay tons of money to go into rehab for marijuana addiction if they could simply stop any time? Only 1 in 3 marijuana addicts stay drug free after going through the expense and rigor of rehabilitation. "Cultivate only the habits that you are willing should master you.'' (Elbert Hubbard) Reflections on Decision-Making: Las Vegas Style In a sense, life's decisions are a lot like gambling. A wise gambler (if that's not a contradiction of terms) weighs the potential for reward on one side with the potential for loss on the other. For example, if the odds are against him 50 to 1 in winning at a certain game, he might risk dollar coins over and over in order to get the chance to get a greater gain. Even if he loses 50 times in a row, he's still only lost $50.00 total. He'd never bet his entire life savings for a one time shot at fifty to one odds. Although the potential gain would be incredible, the odds of losing it all would cause the wise person to not even consider the bet. Sometimes this is a good way to look at life's decisions. When I marry a person, it's a gamble. She might turn into a witch over the next five years. She may spend all my money. By getting to know the woman well I minimize my risk and believe that I've got great odds of having a great life together. But it's still a gamble. (If you’ve read this far in this paper, I applaud your interest. Ask me and I’ll give you five dollars. Please don’t tell anyone else about this.) (Author's note: I put this in for my kids to see if they really read this!) Let's say you find a girl who's got a history of dishonesty, thievery and drug use. But she's hot and she loves you. You say, "Odds are, this girl's gonna get tired of me pretty soon, will eventually take all my money, then she'll divorce me and I'll have to pay her money every month for the rest of my life." On the other hand, you think marrying her might be really fun for the few months it might last. But in my mind, it wouldn't be worth the risk. So let's apply this decision-making model to Marijuana. On the plus side, you get a pretty cool feeling of euphoria for a few hours each time you use it. Add to that good feeling that you've got some fellow smokers to hang out with. Not bad. But look at the potential of risk: losing your zest for life, going on to more powerful drugs to get the same feeling, loss of your driver's license, losing a job you really wanted, losing a girl you really wanted, losing all your money for drugs and rehab, making decisions your regret, etc. And unlike the "wise" gambler betting against 50 to 1 odds, there's no huge pay-off even if you "won" by avoiding trouble and stopping before you got addicted. To me there's no way I'd take the risk. Reflections on Decision-Making: Reaching Long-Term Goals Many thinkers note that truly happy people have a purpose in their lives, something to shoot for that keeps them interested in life. If we can define a purpose in our lives, then we can better choose the activities that best help us achieve those goals. Some of my goals involve making a decent living, keeping my health, being wise rather than a fool, being respected rather than laughed at, making a positive impact in the world rather than contributing to it's misery. In that light of where I'm heading in life, I must ask several questions before trying Marijuana. Does it help me achieve my goals? If so, then I go for it. Does it put my goals at risk? Then I abstain. From my understanding of the facts, marijuana does nothing to help me achieve my goals. In fact, if I use it, it will almost certainly make my goals more difficult, if not make them impossible to achieve. What are some things you want out of life? I challenge you to look at Marijuana in the light of what you want to achieve in life and see if it's worth it. Copyright by Steve Miller, President, Legacy Educational Resources, Acworth, Georgia, Fall, 2003, all rights reserved. Feel free to copy and distribute in your school or home, if not for profit.
No10 : analogue III Communism & Renaissance /ˈkɑːmjunɪzəm/ & /ˈrenəsɑːns/ French: communisme, from commun common. A form of socialism that abolishes private ownership. A political theory favoring collectivism in a classless society. Revolutionary socialism based on the theories of the political philosophers Karl Marx and Friedrich Engels, emphasizing common ownership of the means of production and a planned economy. The principle held is that each should work according to his or her capacity and receive according to his or her needs.
Go Down Topic: Easy question about a boolean return value (Read 1 time) previous topic - next topic Feb 15, 2013, 11:50 pm Last Edit: Feb 16, 2013, 12:00 am by lambss Reason: 1 Code: [Select] Arduino Tutorials Episode 3 Switch4 Program (pwm) Written by: Jeremy Blum int switchPin = 8; int ledPin = 11; boolean lastButton = LOW; boolean currentButton = LOW; int ledLevel = 0; void setup()   pinMode(switchPin, INPUT);   pinMode(ledPin, OUTPUT); boolean debounce(boolean last)   boolean current = digitalRead(switchPin);   if (last != current)     current = digitalRead(switchPin);   return current; void loop()   currentButton = debounce(lastButton);   if (lastButton == LOW && currentButton == HIGH)     ledLevel = ledLevel + 51;   lastButton = currentButton;   if (ledLevel > 255) ledLevel = 0;   analogWrite(ledPin, ledLevel); First of all, thanks for your time. The part of this code I dont really understand is the part of the beginning of the loop. currentButton calls for the debounce return, but what is (lastButton); doing? Video I am watching says he passes it to lastButton ,but I have no idea what that really means. I realize this is on the lowend of programming, I promise I ordered an intro to programming book and plan to use it when it comes. In the mean time, can anyone help me understand this? Much appreciated. Looks like the code was cut-off, but it's likely the variable that hold the last reading, of the button so that you can detect a signal edge, rather than just the state of the input pin. currentButton does not "call for the debounce return". currentButton is assigned the value returned by the call to debounce(). The argument to that function call is lastButton. The art of getting good answers lies in asking good questions. did a lil more digging on the forums, found this answer to the same issue i was having. last in debounce() is the same as lastButton in loop() ... lastButton in loop() is the stored value of currentButton from the last iteration of loop(). What does this mean exactly? To me it means lastbutton will become HIGH after running it once. Is that right? Wouldnt that cancel out the button press next time? I figured it out, thank you all for the help Go Up
วันพฤหัสบดีที่ 8 พฤษภาคม พ.ศ. 2551 Windows XP - Getting the Correct Time ALL computers need to know the time. Many applications, from sending an email to storing information are reliant on the PC knowing when the event took place. In some environments timing is even more crucial where a single second can make all the difference between profit and loss - just think of the stock exchange. Most computers have internal clocks which are battery backed, so the computer can still keep time when the machine is off. However, are these clocks really that reliable? The answer of course is no. Computers are mass marketed and designed for multi functions, timing not being that high on the manufacturer's agenda. The internal clocks (called RTC real time chips) are normally adequate for home computing or when workstations run alone. However, when computers run in a network, then a lack of synchronization can cause problems. It may be a minor thing such as an email arriving somewhere before it was sent (according to a PC clock) but with some time sensitive transactions and applications, a lack of synchronisation can cause imaginable problems: Imagine turning up at an airport only to find the airline seat you had bought weeks before was in fact sold to somebody else afterwards as their booking agent had a slower clock on their computer! To get around these problems most computers on a network are synchronised to a single time source using NTP (network time protocol) this time source can be either relative (a computer's clock or wrist watch) or an absolute time source like UTC. UTC (Coordinated Universal Time) was developed after the emergence of atomic clocks and is a standard time scale used globally, allowing machines all over the world to use a single time source. Windows XP can easily set the system clock to use UTC by accessing an Internet source for UTC (either: time.windows.com or time.nist.gov). To achieve this, a user merely has to double click the clock on their desktop and adjust the settings in the Internet Time tab. However, Microsoft and other operating system manufacturers strongly advise that external timing references should be used as Internet sources can't be authenticated, making systems vulnerable to a malicious attack. If you wish to run a network time server Windows XP, then specialist NTP servers are available that can receive a time reference via the GPS satellite system or specialist national transmissions To allow Windows XP to operate as a network time server, the NTP service needs to be switched on. To activate NTP simply find the following subkey in the registry editor (regedit): HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer\ Right click enabled (in the right-hand window) then Modify. Edit the DWORD Value and type 1. Right-click NtpServer, then Modify and in the Edit DWORD Value under Value Data type Peers, then click OK. Exit the registry and start windows time service by clicking Start/Run and typing: net stop w32time && net start w32time.; Then on each computer on the network (other than the domain controller which can't be synchronised with itself) type: W32tm/resync/rediscover. Copyright 2008 © Richard N Williams Richard N Williams is a technical author and a specialist in the telecommunications and network time synchronisation industry helping to develop dedicated time server products; ethernet clocks, GPS time servers, NTP servers, digital wall clocks, atomic clock servers and SNTP time servers. Please visit us for more information about NTP products and NTP servers. This article may be republished and reprinted in its complete form or in part without seeking permission providing a relevant link to this site is maintained. It is a violation of copyright law to reprint or publish this content without following these terms. Article Source: http://EzineArticles.com/?expert=Richard_N_Williams
About Uttra Kannada Uttara Kannada was the home of the Kadamba kingdom from the 350 - 525CE. They ruled from Banavasi. After the subjugation of the Kadambas by the Chalukyas, Uttara Kannada district came under successive rule of empires like Chalukyas, Rashtrakutas, Hoysalas and Vijayanagar empire.The district came under the rule of Maratha empire from around 1700 CE. to 1800 CE. It was ceded to the British at the conclusion of the Third Anglo-Maratha War in 1818. The British established North Kanara district as a part of the Bombay Presidency. After India's independence in 1947, Bombay Presidency was reconstituted as Bombay state. In 1956 the southern portion of Bombay state was added to Mysore state, which was renamed Karnataka in 1972. General Profile Number of Gram Panchayat                                    163 Number of Taluk Panchayat                                    123 Number of Zilla Panchayat Constituencies                   35 Number of Revenue Villages                                   207 Number of Towns (CMC 6, TMC 4, TPC 1)                 11 Rivers : Kali,Gangavali,Aghanashini,Sharavati,Venkatapur,Varada and Bedti flow in the district. Language :The languages of the district are Kannada, Konkani, Marathi, Tulu and Urdu.Religion ,Castes & tribes : The population is predominantly Hindu comprising of many communities called as Bhandaris, Gramavokkaliga, Havyaka, Konkan Maratha, Goud Saraswat Brahmins, Daivajna Brahmins, Chitrapur Saraswat Brahmins, Vokkaligas, Sherugars, Namadhari naik, Nadavara and Vaishya (Vanis). Muslims in the district are mainly of Nawayath descent. They live mostly in taluks of Bhatkal and Honnavar and speak Nawayathi. The Konkani speaking people include Christians also.The main tribes of the district are Sidhi, Kunabi, Halakki Vokkaliga, Gonda and Gouli. Om Beach,Murdeshwar,Idagunji,Marikamba Temple,Banavasi,Sonda,Jenukallu Gudda,Yana and Satodi Falls Om Beach named because of its shape, is 11 kms from Gokarn. Murdeshwar 16 Kms from Bhatkal to the north on Honnavar-Bhatkal NH 17. The famous Mahtobara Temple can today boast of the tallest Shiva statue in the world. Idagunji 15 Kms from Honnavar and around 23 kms from Murudeshwar is the ancient Idagunji Ganapati Temple. Marikamba Temple. This is one of the most popular places of religious significance. The present statue of ‘Devi’ was installed in 1669. The temple itself is more than 300 years old. Banavasi24 kms from Sirsi, Banavasi is a historical village. Madhukeswar Temple and Madhumathi (Parvati) Temple are summit of Kadamba art. The tall Nandis of the temple are famous.Sonda 20 Kms from Sirsi towards yellapur is Sonda village which was the capital of Sondhe Kings.Jenukallu Gudda Situated at a distance of 20 kms from Yellapur, it offers break taking view of valley covered with virgin forests and majestically flowing River Bedti. The view point is atop a sheer cliff of 450 mtrs high. Yana28 Kms from Kumta and 65 Km from Sirsi,is a nature’s wonder.Satodi Falls 30 Kms from Yellapur, at village Kattige, rivulet Dabbisal jumps in two stages from a height of 32 meters forming a beautiful brad water fall. Art And Culture The district's high rainfall supports lush forests, which cover approximately 70% of the district. Anshi National Park near Dandeli, preserves approximately 250 km² of semi-evergreen forest, which is home to the tiger, black panther, leopard cat, gaur, Asian Elephant, sambar and a range of birds and reptiles. Dandeli Wildlife Sanctuary protects 834 km² of semi-evergreen and bamboo forest in the watershed of the Kali river. Attiveri bird sanctuary is home to 79 species of birds including migratory birds from 22 countries.There are many dams in this district namely Supa Dam,Kodasalli Dam and Kadra Dam. The famous Atomic energy station at Kaiga is on the beautiful banks of river Kal . Uttara Kannada in Karnata Uttra Kannada Ankola, Bhatkal, Haliyal, Honnavar, Joida, Karwar, Kumta, Mundgod, Siddapur, Sirsi, Yellapur 132 /km2 (342 /sq mi) Time zone IST (UTC+5:30) 10,250 km2 (3,958 sq mi) Pincode 581xxx Vehicle KA-30, KA-47, KA-31 Telephone ++ 91 (0) 8386
Tuesday, October 26, 2010 Knowledge about Lolita Fashion Lolita fashion is a fashion subculture originating in Japan that is primarily influenced by Victorian clothing as well as costumes from the Rococo period. Lolita has made this into a unique fashion by adding gothic and original design elements to the look. From this, Lolita fashion has evolved into several different sub styles and has created a devoted subculture in Japan. The Lolita look consists primarily of a knee length skirt or dress, headdress, blouse, petticoat, knee high socks or stockings and rocking horse or high heel/platform shoes. The name is ironic since the fashion was created to fight the growing exposure of the body and skin in today's society, specifically in regard to young women. Lolita fashion can even be considered a movement where girls ranging from pre-teens to late 20s fight the current fashion with modesty. It allows a woman to feel young, cute, beautiful or off-limits, depending on which type of Lolita a girl chooses to be. Usually Lolita fashion is mainly fall into the following four styles: Gothic Lolita Gothic Lolita, is a combination of the Gothic and Lolita fashion. The fashion originated in the late 1990s and has been speculated to be "the social backlash" in response to the Japanese fashion Gyaru; however, many adherents of the Gothic Lolita fashion are inspired by music, especially visual kei," the visual rock genre" in which musicians combine rock music with visual effects and costumes. Gothic Lolita fashion is characterized by a darker make-up and clothing. Red lipstick and smoky or neatly defined eyes, created using black eyeliner, are typical styles. Though Gothic make-up is associated with a white powdered face, this is usually considered bad taste within the Lolita fashion. There are two types of Gothic Lolita outfits; one that calls "Elegant Gothic Lolita" it usually uses dark color schemes like black, dark blues and purples. The other type is black with white accents. These dresses have been compared to French maid costumes and they're generally not thought of as being very Gothic, at least by Western standards. As with some Western Gothic styles, cross jewelry and other religious symbols are also used to accessorize the Gothic Lolita look. Other accessories in the Gothic Lolita style include bags and purses which are often in modernly common shapes like bats, coffins, and crucifixes. Like many other Lolita fashions, the visual kei movement was responsible for helping to introduce and popularize the Gothic Lolita style. Sweet Lolita Sweet Lolita, is heavily influenced by Rococo styles as well as Victorian and Edwardian clothing. Focusing on the child and fantasy aspects of Lolita, the Sweet Lolita style adopts the basic Lolita format and uses lighter colors and child Candy girl in its design. Makeup used in sweet Lolita is common throughout most Lolita styles. Pink, Peach, or Pearl make up styles are highly 'sweet' and used by many Sweet Lolitas. This look, paired with a shade of bright pink, red, or orange lipstick, is commonly used as well. Outfits consist of pastels, fruit themes (Cherries or strawberries, or any type of sugary fruit), flowers (Roses, jasmines, lily, cherry blossoms) lace, bows, animal themes (Cats, bunnies, angels, mice) and ribbons to emphasize the cuteness in the design. Popular themes in the sweet Lolita are references to Alice in Wonderland, fruits, sweets, and classic fairy tales. Jewelry often reflects this fantasy theme. Headdresses and bows are a popular hair accessory to the sweet Lolita look. Bags and purses are usually have a princess-like design and often take the shape of strawberries, crowns, hearts, and stuffed animals. Classic Lolita Classic Lolita is a more mature style of Lolita that focuses on Baroque, Regency, and Rococo styles. Colors and patterns used in classic Lolita can be seen as somewhere between the Gothic and sweet styles; it is not as dark as Gothic Lolita, but not as cutesy as sweet Lolita. This look can be seen as the more sophisticated, mature Lolita style because of its use of small, intricate patterns, as well more muted colors on the fabric and in the overall design. Designs containing a-lines, as well as Empire waists are also used to add to the more mature look of the classic style. Most classic Lolita outfits, however, still stick to the basic Lolita silhouette. Shoes and accessories are less whimsical and more functional. Jewelry with intricate designs is also common. The makeup used in classic Lolita is often a more muted version of the sweet Lolita makeup, with an emphasis placed on natural coloring. Punk Lolita Punk Lolita (or Lolita Punk) adds punk fashion elements to Lolita fashion. Motifs that are usually found in punk clothing, such as tattered fabric, ties, safety pins and chains, screen-printed fabrics, plaids, and short, androgynous hairstyles are incorporated into the Lolita look. The most popular garments are blouses and skirts, although dresses and jumper skirts are also worn. Males have known to take up Punk Lolita fashion, and as well as Victorian style Lolita fashion. And we offers many styles of lolita dresses ,you can visit here :http://www.victoriasbox.com/lolita-clothing-lolita-dresses-c-11_35.html Sweet Lolita Dresses -www.victoriasbox.com Nowadays,many youny people even the children are glad to wear the Lolita clothing all over the world.Actually,the word "Lolita" became popular and famous,thanks for the novel written by Vladimir Nabokov. Japanese borrowed it from English,and came up with a movie "kamikaze girls" which made the Lolita clothing more favorable. Sweet Lolita dresses are most popular in Japan and is the original lolita style. Pink and white are the main colors with lots of frills and lace. Outfits are heavily trimmed with lace, pleats or other intricate details and are almost always in bright or pastel colours - baby pink, baby blue and white are often seen.This is related to the concept of kawaii or cuteness which can be related to a desire to return to a more innocent past time, a sort of reaction against the psychological pressures of present-day life that the young people have to contend with. Sweet Lolitas often dress around a theme, for example the colours of cupcakes or fruit. For example: A strawberry-themed outfit might be a white dress with a strawberry pattern and lace around the collar, a straw hat and strawberry shaped accessories.The young women will carry around teddy bears, parasols and other things which increase even further the cuteness quotient. It has a very, very innocent look to it, nothing challenging or nasty at all. If you are going to purchase the sweet Lolita dresses,you are able to visit the online store -- Victoriasbox .There are abundent of this kind of items with a low price,what's more,several discount events are going on in this site,and crazy and time-limited promotion before Halloween, it's worth for you to have a look.
Using Prepared Statement with PHP and MySQL Posted in Tutorials In the previous tutorial, we used mysqli API that comes with PHP to query a MySQL database.  In this tutorial, instead of sending a SQL query statement, we are going to use prepared statement to query the database.  By using prepared statements we no longer need to do mysqli_real_escape_string as we did in the update database tutorial. Basing off of the same code as previous tutorial linked here, we continue as before with opening a database connection with mysqli_connect() and getting an database handle $db… prepared statements prepared statements Like before, we construct a query string called $query.  But this time, we have a question mark instead of ‘publish’.  The question mark is a placeholder for binding params.  You can have more than one question marks.  Using the question mark, we also don’t need the quotes around the string param. We pass that $query string into mysqli_prepare and it gives us back a “prepared statement” which we store in $stmt. We then pass that prepared statement into mysqli_stmt_bind_param(), telling it the string type “s”, and the variable $status which holds the value to be passed into the “question mark” placeholder in the statement. The string type “s” means that the question mark placeholder is supposed to take a string.  And we a passing in variable $status by reference. Because it is by reference, we can then assign a value “publish” to the variable “$status” and it will use the value in the query string where the question mark is — as long as you make the assignment before calling mysqli_stmt_execute(). When we call mysqli_stmt_execute(), it will return false if the query fails.  But other wise, we can retrieve the resultset by binding the preparted statement and the fields of the resultset with mysqli_stmt_bind_result(). The two fields returned in the result set, will come out as $post_title and $post_date which we display in a loop … display resultset display resultset mysqli_stmt_fetch will return false when it can no longer retrieve a record. And that is when we end the while loop. Finally, close the statement and close the db handle with mysqli_stmt_close and mysqli_close.
Adjective "apparat" definition and examples Definitions and examples The administrative system of a communist party, especially in a communist country. 1. 'There is no need of a monolithic party if the effective apparat is in general agreement, makes the same assumptions.' 2. 'When Soviet communism fell, nobody beyond a handful of military and apparat raised a hand to retrieve it.' More definitions 1. an organization or existing power structure, especially a political one: a position of leadership within the party apparat; The chess apparat is not eager to change tournament rules. More examples(as adjective) "deses can be apparat." Russian, from German, literally ‘apparatus’.
Adjective "conservative" definition and examples Definitions and examples Averse to change or innovation and holding traditional values. 1. 'This contrasts with a stronger assertion of identity and values among conservative church bodies.' 2. 'Here again there is a fine balance to be struck between the use of doctrine to enforce innovation and its more conservative function as the bearer of professional values and institutional memories.' 3. 'What are referred to as the Christian right in the USA are mainly people with very conservative values about issues such as homosexuality and abortion.' 4. 'An orchestrated return to traditional family values has pressured conservative men to explicitly re-valorize women who accept traditional roles.' 5. 'Kenyan homes are traditionally conservative and strictly patriarchal.' 6. 'His parents weren't party-political, but he was certainly brought up with traditionally conservative values.' 7. 'Betty may only be a character, but she's part of a much larger trend toward conservative values and traditional female roles.' 8. 'If the deceased fisherman has relatives and belongs to a conservative religious tradition, his ambiguous death is more likely to be judged an accident than if he is single and secular.' 9. 'There he embarked on a covert anti-devolution campaign and many respected journalists left as he imposed his middle-market editorial content and conservative values on the paper.' 10. 'Will it mean that the tide of traditional patriarchal values, of conservative religiosity, will become irreversible?' 11. 'a conservative suit' 12. 'The traditional range is still being sold, particularly into America where tastes are more conservative.' 13. 'It was a kind of sweet and sour sauce, possibly of lemon and mustard, that just didn't hit it off with my conservative taste buds.' 14. 'Otherwise, he has dressed in a conservative gray suit, with a crisp white shirt and perfectly creased trousers.' 15. 'The best advice I was always given by peers was to dress in a conservative suit with modest accessories at the interview.' 16. 'Not only are the quantities of meat large, but the fact that there are people who want to eat dried rat bat, or even monkey meat comes as a surprise to those of us whose tastes are more conservative.' 17. 'Not wanting to bowl him over completely on their first date, she'd donned a fairly conservative dress of navy blue, with white trim and buttons.' 18. 'The real viewers are likely to be over 50, married and of broadly conservative tastes.' 19. 'The many suits and ties and other conservative dress worn by the crowd yesterday reflected the upscale membership of much of the organisation.' 20. 'For women, the look is conservative - ladylike suits, sophisticated pantsuits, subtle dark dresses.' 21. 'The hectic design would hardly have conformed with Philip's conservative taste.' (in a political context) favouring free enterprise, private ownership, and socially conservative ideas. 1. 'None of these people could remotely be described as liberals, meaning that the Republican Party and conservative America is itself split on the question.' 2. 'A return to the traditional conservative values of non-intervention and prudence is called for.' 3. 'My idea of a conservative is somebody who thinks taxes are too high.' 4. 'Such developments would presumably be envied by genuine libertarians in socially conservative countries - even if their taxes are lower.' 5. 'The resulting paradox - a transgressive aesthetic supporting a conservative social and political status quo - would endure until the end of the Old Regime.' 6. 'However, there is a tendency for European electorates to move to the right or left in a manner that may not be co-ordinated, but does produce clusters of conservative or Socialist governments at any one time.' 7. 'In this context, conservative governments sought to transform social security into an insurance-based system.' 8. 'The Labour, Conservative and Liberal Democrat parties are contesting every seat.' 9. 'Vendettas and character assassination have wrecked the last three Conservative leaderships.' 10. 'If Labour wins its expected second landslide it will mark the end of a century of Conservative hegemony.' 11. 'An important factor in this was the experience of eighteen years of Conservative government.' 12. 'The Conservative governments bypassed local authorities in many policy fields.' 13. 'The suggestion has not, however, been welcomed by Conservative headquarters.' 14. 'In the county elections, there was one Conservative gain, which gives them an overall majority of three.' 15. 'The Labour Government rigidly stuck to Conservative spending targets in its first two years of office.' 16. 'The blame lies fairly and squarely at the door of this Conservative council.' 17. 'The three MPs said it is official Conservative policy to increase the size of the Army and it would keep the regiment.' (of an estimate) purposely low for the sake of caution. 1. 'He said it was not possible to say how long the pressure would have lasted: ‘A conservative estimate would be about a minute, maybe two.’' 2. 'However, this is a conservative estimate that suggests at most just one in eight of all non-resident accounts opened over the period in question were bogus.' 3. 'However, with conservative estimates putting the figure at almost £40 million, cabinet approval will be required.' 4. 'One conservative estimate put the number of protesters at more than six million people, making it largest ever simultaneous demonstration since the Vietnam War.' 5. 'A conservative estimate would surely be closer to 60,000.' 6. 'A conservative estimate suggested that mistaken identification contributed to the wrongful conviction of more than 300 people a year in England and Wales.' 7. 'Despite the fact that a conservative estimate for the overall cost of the project is in the region of 40 million both men believe now is the time to make such an investment.' 8. 'Forty years is a ridiculously conservative estimate, as can now be demonstrated, and it turns out that microfiche's shelf-life is limited too, far more than paper.' 9. 'It appears this may have been a conservative estimate.' 10. 'Those sorts of considerations are why I said $440 billion was a conservative estimate, which is admittedly a bit crazy just to say, but there it is.' (of surgery or medical treatment) intended to control rather than eliminate a condition, with existing tissue preserved as far as possible. 1. 'Initial treatment of both conditions is conservative, but when conservative treatment fails, the surgical approach to the two problems differs markedly.' 2. 'Fortunately, conservative treatments such as ice, rest and physical therapy can often relieve symptoms.' 3. 'The trial randomized 1,033 patients in 27 countries to early surgery or conservative treatment.' 4. 'Mild symptoms may be helped by conservative treatments such as pain relievers, physical therapy or a supportive brace.' 5. 'Early surgery also avoids complications when conservative treatment fails.' 6. 'Surgical referral may be indicated after conservative treatment has failed, although the exact timing of surgery should be decided on an individual basis.' 7. 'Mammography, bilateral in patients who had had conservative surgery, was scheduled once a year.' 8. 'The surgical alternatives to medical treatment range from minor conservative procedures to hysterectomy.' 9. 'If conservative treatment fails, surgery to excise any bone spurs and debridement of the retrocalcaneal bursa may be helpful.' 10. 'Surgeons are traditionalists, and the early experience of our peers has coloured current surgical opinion and slowed the introduction of conservative surgery for the benign parotid lump.' A person who is averse to change and holds traditional values. 1. 'This is not to say that any one group of conservatives are strictly to blame.' 2. 'When divorce came along, the same conservatives argued it would mean an end to the institution.' 3. 'Once Africa was no longer a site of superpower competition, conservatives largely lost interest as well.' 4. 'The suggestion was immediately set upon by conservatives who argued it was all exaggerated.' 5. 'They saw fascists as more patriotic and determined than traditional conservatives.' 6. 'In liberal mythology it's conservatives and reactionaries who take the simplistic view.' 7. 'There are a lot of conservatives who have held their tongue for the better part of two years.' 8. 'That line seems to be working pretty well now among some of my fellow conservatives.' 9. 'She proceeded to lay out her views on a range of issues that rub conservatives raw.' 10. 'Many conservatives expect a Supreme Court justice whose opinions they can predict.' A supporter or member of the Conservative Party of Great Britain or a similar party elsewhere. 1. 'Unlike the Liberal Democrats and Conservatives we do not make promises we cannot keep.' 2. 'Throughout that period the Conservatives remained a minority party in the Commons.' 3. 'Next year the chair will be a Liberal Democrat and the Conservatives will take the deputy chair.' 4. 'I'd never vote for the Conservatives unless they became a radically different party.' 5. 'Around them stand officials and party workers from the Conservatives and Lib Dems.' 6. 'The letter was also signed by a handful who revealed they had in the past supported the Conservatives.' 7. 'The polls refuse to shift and the Conservatives are seen as a single-issue party.' 8. 'The Liberals and the Conservatives have made the same sort of cuts when they have been in charge.' 9. 'Nor is it right for the Conservatives and the Liberal Democrats to connive with that purpose.' 2. cautiously moderate or purposefully low: a conservative estimate. 3. traditional in style or manner; avoiding novelty or showiness: conservative suit. 4. (often initial capital letter) of or relating to the Conservative party. 5. (initial capital letter) of, relating to, or characteristic of Conservative Jews or Conservative Judaism. 6. having the power o More examples(as adjective) "courts can be conservative over years." "views can be conservative for districts." "producers can be conservative in plans." "people can be conservative in ways." "people can be conservative in runnings." More examples++ Late Middle English (in the sense ‘aiming to preserve’): from late Latin conservativus, from conservat- ‘conserved’, from the verb conservare (see conserve). Current senses date from the mid 19th century. conservative with a small ‘c’
Presentation is loading. Please wait. Presentation is loading. Please wait.  Had a problem with the church in England (late 1500’s - think Shakespeare)  Wanted the church to be more “pure” They felt the Church leadership (bishops) Similar presentations Presentation on theme: " Had a problem with the church in England (late 1500’s - think Shakespeare)  Wanted the church to be more “pure” They felt the Church leadership (bishops)"— Presentation transcript: 2  Had a problem with the church in England (late 1500’s - think Shakespeare)  Wanted the church to be more “pure” They felt the Church leadership (bishops) were too greedy and not spiritual enough.  Two ways to deal with the problem: 1. Change the church 2. Leave the church 3  The government (Queens and Kings) sometimes listened to the Puritans but most of the time they didn’t.  Eventually the Puritans ended up in two groups: 1. Reformers : stayed in the Church of England and tried to “fix” it from within 2. Separatists : wanted out of the church and to form their own church 4 The village of Scrooby, England, home to the Puritans until 1607 5  Church and government officials started persecuting the Puritans for not supporting the Church – fining them, putting them in prison, and even killing some of them. 6  So… the Puritans started leaving England – some went to the New World. The first Puritans ended up in what is now Massachusetts - The Plymouth Bay Colony 7  The Mayflower, carrying 102 settlers, left Plymouth on September 6, 1620 and anchored at Provincetown Harbor on November 11, 1620.  They weren’t all Puritans. Roughly 40% of the adults and 56% of the family groupings were Puritans. The rest were people hired by the Merchant Adventurers (the company that was sponsoring the venture) to provide leadership for the colony and additional hands to work for the colony's ventures. 8 The Mayflower and the Speedwell in Dartmouth Harbor 9  The colonists (Puritans and non-Puritans), still aboard the ship as it lay off-shore, drafted and ratified the first governing document of the colony (really the first of the New World), the Mayflower Compact 11  They scouted around until they found a suitable site for their settlement and on December 21, 1620, the first landing party arrived at the site of what would become the settlement of Plymouth. Some had been on board for six months.  Supposedly they first touched ground at what is called “Plymouth Rock”. 14  During the first winter in the New World, the Mayflower colonists suffered greatly from diseases like scurvy, lack of shelter and general conditions on board ship.  45 of the 102 emigrants died the first winter and were buried on Cole's Hill. Additional deaths during the first year meant that only 53 people were alive in November 1621 to celebrate the harvest feast which modern Americans know as "The First Thanksgiving.“  Of the 18 adult women, 13 died the first winter while another died in May. Only four adult women were left alive for the Thanksgiving. 16  Some Native Americans eventually helped the colony – Samoset was the first to contact the Englishmen, though he actually wasn’t from the area.  Other Native Americans: Squanto (Tisquantum ): had already been in Europe as a result of being kidnapped by English explorers (ended up in England via Spain) Massasoit : Big Chief of the area These two began to deal with the Colony and eventually a treaty was enacted. 17  Women : relative social equality (with the exception of church leadership)  Children : it was believed that they were born sinful, and raising them meant breaking their will until they were able to sublimate their own desires to those of the family and community  Elders (men): viewed as cherished saints, entitled by their wisdom to govern 19  Rights: Individuals could only have privileges. Rights belonged to institutions and governments -- and chief among them was the right of the institution to do what it must to maintain civil order and see to it that people met their responsibilities.  Education: Banned: drama, religious music and most poetry. Encouraged: Bible, Greek classics, some poetry and Latin verse. They were encouraged to create their own poetry, always religious in content. 20 Free schooling was offered for all children. Reading was emphasized. "Ciphering" (math) and writing were emphasized less  Bible: The Puritans believed that the Bible was God's true law, and that it provided a plan for living. 22  Spirituality was very important, and everyone would go to long services at the local meetinghouse on Sunday. The Bible would be read at home, and other forms of religious literature were popular, like published sermons, and religious poetry. People would expect to pray at home as well as at church.  The Puritans generally disapproved of many activities, like music, dancing, etc, but people would dance and make merry at weddings, christenings, and other social occasions. People got together for events like barn-raisings and corn-huskings, and women organized spinning and sewing bees. Girls enjoyed berry-picking parties. Ball games were disapproved of, but men were expected to do military training, and this included sports like wrestling and boxing. 23  Children would be expected to help their parents as soon as they were old enough. They might learn to read and write at home, or they might attend a ‘dame school’ which taught simple reading, writing and arithmetic.  Older boys might go to a grammar school, but many children would leave school early to go to work, either to work in the family farm or business, or to be apprenticed to a trade.  Girls often worked as servants until they married, or they might be apprenticed for a trade: dressmaking, millinery, and some other trades like printing. 24  Parents decided who you would “court” and when. The good news is you might start courting at 14 or 15 – if you were a girl – and might be married at 16.  The bad news? Boys wouldn’t get married until they were done with their apprenticeships and were established in their trade or business – in their mid to late 20’s 26  Puritans did not view marriage as an occasion for festivities nor as a religious or sacred union. A marriage served strictly as a civil contract and was conducted in a simple civil ceremony that ended in a quiet dinner.  Marriage was preceded by a supervised period of courting that included rather strange practices. For example, the couple was often given a long tube called a courting stick. The man and woman would whisper to each other through the tube while the rest of the family was in another room. 28 Another unusual custom was "bundling." The couple would share a bed for the night, but with a large wooden board, called a bundling board, separating their bodies and preventing any physical contact. 30  When the couple was ready to get married, they were required to subject their proposal of marriage to the scrutiny of Puritan leaders, who would either object or approve of their union. 32  The most prestigious occupation for men was minister or doctor  The most prestigious “occupation” for girls was housewife or midwife 33  Given great responsibilities.  Given great freedom.  Moved from childhood to adulthood w/o much or any adolescence. Similar presentations Ads by Google
Tuesday, October 26, 2010 Square Root Square Root is an inverse of squaring: The square root of 25 is SxS or what times itself has a product of 25. 5x5=25 Finding the square root using a calculator: We also learned how to find the square root of a number. From what I've learned so far the only real way to get the square root of a number is to use your trusty old calculator. Of course, each calculator is different, so you may have to punch in a few things before you get the answer. Let's take the number 3. I know what you're thinking, "but, it's impossible to make a square out of that!" If you remember from last class, it is possible, just a lot less simple to find. So, that's where square root comes in. Okay then, now punch in the square root function on your calculator and you should get: 1.414213562. Well, that's not a nice number to work with, so let's just take the numbers up to the thousandths place, no rounding please. So, now we should have 1.41. 1.41 x 1.41=1.9881 Not exactly a perfect square, but it's close. Estimating the square root using fractions: Remember the number line we made for homework? That would come in handy right about now. As you can see the space between the two perfect squares is divided into 3. So then we will be using 3 as the denominator for the following fractions. It won't be as exact as the calculator, but it's close. 1: 1 2: 1 1/3 3: 1 2/3 4: 1 3/3 or 2 See how that works? Remember, we won't just use 3 as the denominator. For example the next fraction should be out of 5, since the space between the 2nd perfect square and the 3rd perfect square is divided into 5. Estimating the square root using perfect squares: Either the number line or the chart we did would be useful for this activity. First let's take a number like, 439, and find the square root. Now don't panic, it's a lot easier than you think. Find on the chart 2 numbers where 439 falls between. It should be 400 and 441. Next we look on our chart to find the square root or side lengths of both numbers, which would be, 20 and 21. This means the square root of 439 would lie between 20 and 21. The number can't be 20 or 21 so it should be 1 of those two numbers and a decimal. But which number should be used? 20 of course! If you used 21 and a decimal it would no longer be a number in between the two. So the answer is 20.___ You don't need the rest, this is an estimation after all. Now that you know this the homework shouldn't be much of a problem. Use fractions to estimate the square roots of 1-25. Use perfect squares to estimate the square roots of 200, 37, 850, and 77. If you're still having trouble with this, here is a site I think you should look at. This probably isn't the best site out there, so leave links to other sites in the comments section and I'll be sure to change it. Also, here is a video. Also not the best video, so a link or two to another one would be just great. 1. Wonderful post Anabelle ! I really liked how you made the important words stand out ! I kind of forgot about the homework, so thanks for putting it up. I also liked the picture, video and link you put ! 2. Great post, Anabelle! The picture of the numberline is clear and easy to understand, and I also liked how you made the important words stand out with only 2 colors, not anymore than that so it wouldn't be distracting. The video and link are quite helpful to me, so thanks for putting that up. 3. Great job Anabelle! Your post was very detailed and neat. I see you used a link, a video, and an image, and that helped me understand your post a lot. I also liked how you highlighted the important words in your post. It made the post both colourful and neat. By the way, it's 'a link of two' not 'a link or too'. Aside from that your post was awesome. 4. A link of two? Do you mean, a link or two? Anyway, I changed it, so thanks for pointing it out for me. 5. Very detailed post Annabelle, I liked that you used the colors to makes some stand out but I think you used it too much.I liked that you explained about the inverse of square and explained it. The part about figuring out the estimate square root is very detailed and also the video, great job. 6. Very great post, Anabelle. It was very detailed and a great explaination. I liked how you picked two colors on your post and reminding us what is our homework for today. The video and pictures helped me alot. Good job. 7. This comment has been removed by the author. 8. Good Job! Annabelle. Your work was neat, and you didn't leave anything out. The important things were highlighted in only 2 colours, and I liked that it wouldn't get people distracted. I liked the link, but don't you mean 'a link of two'? i don't know, but it was a really good post! :) 9. Another great post Anabelle! Your post was neat and organized and you explained everything in great detail. I liked how you used colours to emphasize key words and I liked how you didn't go overboard with them. Your post was easy to comprehend and the video and website was very helpful as well. Thanks for putting the homework, I'm sure that was helpful for allot of people. Your post was really good, keep up the good work! 10. You did a great job. One thing I noticed was that when you were talking about the square root function your example was 3 but you ended with 1.41x1.41=1.9881 which is 2 not 3. Anyway I loved the picture that you had and the post was very helpful. I think the estimating will be very as soon as I memorize all the perfect squares and that's not an insult I'm just really bad at estimating. Thanks for the homework and I bet that the link will help people who need it. 11. Awesome post, Anabelle! I really liked how you explained everything. It was really easy to understand. I also like that you had pictures, a link, and a video. I thought you did an awesome job! 12. Great job, Anabelle! You really took your time to add videos. Also it's really colorful and well organized. 13. Great post Anabelle. You explained it really well. I like your picture and the video was helpful. You also colored the important things. Good job and keep up the good work Anabelle. 14. Great post Anabelle. I like how you used only two colours to highlight what's important so it's not that distracting. You explained it very well. Great job. Keep up the good work.
Hard Water Vs Soft Water Water is a basic necessity for every living being. Many people may not have an idea on what hard water and soft water mean. Well, water is classified based on its chemical content as hard water and soft water. This article explains clearly about hard water vs soft water . The calcium content in the water determines the hardness of the water. If the calcium content in the water is below 160 ppm, then it is known as soft water and if the calcium content is above 160 ppm then it is hard water. Let us have a quick look on what hard water and soft water are individually, before moving on to the differences between them. Hard Water This water is generally high in mineral content. Hard water mostly consists of lime, chalk, magnesium, calcium etc. Magnesium and calcium minerals are found in huge amounts in hard water. Sometimes, it can also be rich in sulfates or bi-carbonates. Many people prefer drinking this water for its high mineral content and in spite of its bad taste. This water may have bad effects on clothes and soap as well. Soft Water This water is absolutely free from minerals. However, it may consist very little amounts of magnesium and other minerals. Soft water is generally got from sandstone which can be either a granite or a sedimentary rock and from igneous rocks as well. Soft water can also be obtained by getting rid of all the minerals from the hard water. This water is easy to drink and also tastes good. Hard Water Vs Soft Water Every individual has a doubt whether hard water is better or soft water. The most prominent difference is that hard water may not work good lather as much as soft water does. This usually occurs when the dissolved ions in the water react with the the soap chemicals resulting in the formation of insoluble residue. While, soap and soft water work very well making your skin smooth and it also gives glow to your skin. Plumbing systems in the house can get damaged due to hard water. Therefore, for long lasting plumbing systems hard water should be treated. For the consumption purpose, high mineral content water ie. hard water is good for the body than the soft water. However, some researchers say that soft water has good effects on the body than hard water. This was all about hard water vs soft water . However, at the end of the day, a person may prefer using water to which he/she is used to. Leave a reply
How to Prevent Injuries when Using Wakeboarding Neck injuries are very common wakeboarding injuries and need to be prevented at all costs. Neck injuries happen when you are not well versed with the rudimentary safety guards and you crash on the water at a wrong angle this would result in neck injuries which may be fatal or can be rectified by using a neck brace. These injuries happen when the wakeboarder are not trained enough and do not adhere to the safety precautions given out by the boat rider. Head injuries While wake boarding head injuries can be very common and you need to be aware of the balance and concentration that you need to practice while indulging in this sport. Head injuries happen when the rider misinterprets the boat driver instruction and many crash in tho the water or the boat while trying to make a turn or slice. You need to practice your body balance and practice hand signals which are essential to communicate with the driver. Muscle injuries Wakeboarding requires extra balance skills and strong muscles to keep you on the board. You need to keep the body drawn in and muscles taut to keep the balance. When you leave the muscles it may make you slip from the board and cause severe tendon or ligament pull. Muscle injuries can happen during the course of the wake boarding process and need to be attended to by a paramedic immediately. The preliminary lessons of wakeboarding and skateboarding are similar and you may lose you fear and anxiety while practicing on land. Ronix wakeboards have many products to offer such as sky skis, wetsuits, gloves, etc.
What Is Popular Fiction? Article Details • Written By: E. Reeder • Edited By: A. Joseph • Last Modified Date: 01 June 2017 • Copyright Protected: Conjecture Corporation • Print this Article Free Widgets for your Site/Blog Popular fiction, also known as genre fiction, refers to the various fiction genres and types that have proved to be popular with wide audiences. This is opposite from literary fiction, which tends to be more academic, invites analyses and has a more narrow market among the scholarly. Also known as mass market fiction, this type of work is typically divided into genres such as mystery, romance, horror, adventure, science fiction and fantasy. The focus of most popular fiction is the plot. Readers want to see a well-defined and interesting plot, with plenty of complications and conflicts to keep them entertained. The conflicts might be physical between characters or might involve problems that characters must solve. Characters in these types of works might be embroiled in verbal fights with one another or might have a murder mystery that they must solve. Unlike some literary fiction, conflict in pop fiction must either be resolved totally or at least wind down toward a resolution by the end. It tends to have more of a clearly defined resolution of conflict by the end of the story. Literary fiction might end without any resolution whatsoever to the conflicts presented. Since the purpose of popular fiction is to appeal to the general public, it has to be written in a way that sells. It is marketed toward the interests of the public. Pop fiction authors who are serious about being published might have to make sure that their writing conforms to the guidelines of publishers who develop their guidelines based on what the general public will buy. The opposite of this type of fiction is literary fiction. Literary fiction can be said to come more from the writer than popular fiction, which comes directly from the desires of the general public to increase its sales. Also, literary fiction is concerned with ideas and deep thought, and it is a manifestation of self-expression for the author as opposed to being driven by popularity in the market. Literary fiction tends to focus more on the characters, giving them considerable psychological depth, and on the universal issues of life and existence, whereas popular fiction is more concerned with keeping audiences interested through the plot and might sometimes have characters who lack depth. You might also Like Discuss this Article Post 3 @umbra21 - There are books that are written specifically to appeal to the masses though. They all have to be about something, so they all fit into other categories. Stephen King's books are another example. But the publisher markets them to the masses with mass advertising and they are bought by a lot of people. And they aren't usually literary fiction. People might buy a lot of literary fiction as well, but popular fiction is like the junk food of reading. It's light and quick and easy to understand and easy to engage with. There's not much effort to them. And there's nothing wrong with that, quite frankly. Life doesn't always have to be difficult and some people prefer reading to be an escape from the heavier aspects of life. Popular fiction books give them that escape. Post 2 @pastanaga - I think it's just a really easy way of classifying books. I mean, there are all the different genres as well. You might stick the Twilight series in the "popular fiction" section, but it could just as easily go into romance, or more likely, fantasy or young adult. But it often doesn't get put in those sections, just because it's popular. Just as the Lord of the Rings doesn't always get put into the fantasy section, but goes out with the popular fiction because it's been very well read over the years. Post 1 I think both literary and popular fiction can be hard to pin down and there can be overlaps between the two. There are quite a few examples of a so-called literary novel becoming very popular. Catcher in the Rye is a good example, but there are more modern ones like "I Know This Much is True". I was working in a bookstore when that came out and it was difficult to keep it on the shelves even though it's massive and quite a dense read. Now, if you're talking about fiction which is written and published solely for a certain demographic, I don't think there are many cases of that, or at least fewer than is in the popular imagination . Every author at least starts out thinking they are writing the best book ever written, not just a book for people to read and throw away afterwards. Fiction books are almost always someone's baby. They might have ended up being "only" popular fiction, but that's got more to do with the publisher rather than the author. Post your comments Post Anonymously forgot password?
About Us | Help Videos | Contact Us | Subscriptions This article in AJ 1. Vol. 86 No. 2, p. 362-364 Received: May 28, 1993 * Corresponding author(s): Request Permissions Cereal Grain Yield: Biblical Aspirations and Modern Experience in the Middle East 1. J. Amir and 2. T. R. Sinclair  1. A gric. Res. Organization, Gilat Exp. Stn., M.P. Negev 85280, Israel; A RS-USDA, Univ. of Florida, Gainesville, FL 32611-0840. Very little information exists on crop yields in antiquity. Examination of some of the earliest yield records may give some insight about crop productivity among ancient peoples and a historical perspective on the progress achieved in modern agronomic practices. The Book of Genesis contains one of the earliest recorded expressions of a concern for the yielding potential of cultivated crops. In this paper, we translate the ambiguous biblical reference to crop yield into a modern expression of crop yield per unit land area. Because the yield aspirations of these ancient people are equivalent to modern yields achieved under rainfed conditions at the same location, we undertook an analysis of the agronomic practices used by these ancient people to determine the likelihood that such yields could be achieved. In fact, it appears possible that maximum cereal yields in the ancient Middle East could have approximated modern yields. This analysis may highlight the great advances in modern agriculture to bring high crop yields to large land areas by overcoming various stresses, but the inherent physiological yielding potential may not have been substantially altered over the millennia. Copyright © .
How can we help? You can also find more resources in our Help Center. 83 terms Respiratory System nasal cavity the areas above the oral cavity and continuous with the sinuses of the skull; described as the opening to the respiratory system functions of nasal cavity lined with ciliated columnar epithelium and mucus secreting goblet cells; "filters" incoming air; moisten incoming air and warms incoming air; holds olfactory (smell) sensory epithelium components of nasal cavity (nasal bones) skull bones that form the bridge of the nose components of nasal cavity (nasal septum) a perpendicular bony plate that separates the nose into the right and left sides components of nasal cavity (nasal conchae) scroll-like bony processes that project medially into the nasal cavity; function to increase the surface area of nasal epithelium components of nasal cavity (nostrils/nares) openings to the nasal cavity to conduct air inward and outward during breathing phraynx (throat) the posterior continuation of the oral and nasal cavitities; composed of muscle and walls lined with ciliated epithelium and mucus secreting goblet cells; serves a a passageway for the respiratory and digestive tracts subdivisions of pharynx (oropharynx) directly continuous with oral cavity subdivisions of pharynx (nasopharynx) directly continuous with nasal cavity subdivisions of pharynx (laryngopharynx) most posterior and includes the openings to the esophagus and the trachea (glottis) subdivisions of pharynx (lymph glands) within the phraynx there are several masses of lymph glands that function in defense; tonsils (palatine tonsils in the oropharynx), adenoids (pharyngeal tonsils in the nasopharynx), lingual tonsils (near the root of the tongue in the oropharynx) the windpipe or major airway of the respiratory system; structure is maintained by supporting rings of cartilage function of trachea conducts air to and from the lungs as it opens into the pharynx; filters incoming air by having a ciliated and mucus secreting epithelial lining function of trachea (ciliated epithelial lining) rhythmic beating of the cilia transport any particles up and out of the airway; particles conducted up to pharynx are swallowed or coughed out cartilaginous structure at the opening of the trachea; also called the voice box; houses the vocal cords the opening of the larynx/trachea in the laryngopharynx; described as the slit-like opening between the vocal cords cartilage structure (epiglottis) flap-like laryngeal cartilage that overlays the glottis that prevents food from entering the trachea during swallowing cartilage structure (thyroid cartilage) upper and lower cartilage of the larynx that forms the "adam's apple" cartilage structure (cricoid cartilage) smaller and lower band-like cartilage of the larynx vocal cords strands of ligaments of connective tissues covered by laryngeal epithelium in the walls of the larynx; vibrate as air passes through the larynx to produce sounds; vibrations vary with thickness and length the major airways that continue from the trachea as it bifurcates towards the right and left lungs major multilobed organs of the respiratory system; described as "spongy" tissue created by air sacs; incorporates the pulmonary circulation; site for carbon dioxide and oxygen exchanges bronchial system as each bronchus enters the lung it branches into a network of smaller and smaller tubes (bronchioles) until reaching cell level for gas exchanges with blood capillaries (air sacs) air sacs terminal ends of the bronchioles at the cell level; gas exchange; simple one layer refers to wall structure of air sac in proximity to blood capillaries for gas exchange thoracic cavity chest cavity or thorax; includes the right and left pleural cavities that house the lungs; also includes the interpleural cavity that houses the trachea, major heart vessels, and esophagus; also includes the pericardial cavity that houses the heart epithelial membrane that envelopes the pleural cavities; consists of a parietal and visceral component parietal pleura part of the pleura that lines the walls of the pleural cavities visceral pleura part of the pleura that unfolds to cover the surface of each lung within the pleural cavities processes that are described on the cellular level and on the organismic level cellular respiration metabolic processes that involve the oxidation of glucose to produce energy in the form of ATP as well as CO2; occurs in the cell's mitochondria organismic respiration processes that involve the exchange of carbon dioxide and oxygen across cell membranes that may be defined as internal or external internal respiration exchange of oxygen and carbon dioxide that occurs between blood capillaries and cells in the general body organs and tissues external respiration exchange of carbon dioxide and oxygen that occurs between pulmonary blood capillaries and teh alveolar walls of air sacs in the lungs pulmonary system pulmonary circulation pathway between the heart and the lungs and the function of external respiration; includes the pulmonary vessels and bronchial system within the framework of the lungs pulmonary artery major artery that transports deoxygenated blood from the right ventricles to the lungs pulmonary capillaries cell level vessels derived from the incoming pulmonary artery that are associated with the air sacs; for carbon dioxide; oxygen exchange during external respiration pulmonary vein major vein transports oxygenated blood from the lungs to the left atrium blood gas transport refers to the forms in which oxygen and carbon dioxide are "carried" in the blood; approximately 5 liters of blood pass through the lungs per minute oxygen transport most of the oxygen transported in oxygenated blood is chemically bound to the hemoglobin in red blood cells carbon monoxide poisoning the gas carbon monoxide has a greater affinity for hemoglobin than oxygen and when present, will bind faster than oxygen to hemoglobin carbon dioxide transport most carbon dioxide is transported in the blood in the form of bicarbonate ions (HCO3-) which form through chemical blood reactions as carbon dioxide reacts with water in plasma regulated by authonomic functions of the nervous system and chemical feedback mechanisms; involves the mechanical processes of inspiration and expiration mechanical process by which oxygen (air) is drawn into the respiratory system through the oral and nasal cavities and directed into the air sacs of the lungs mechanical process by which carbon dioxide and water vapor (air) are drawn out from the air sacs of the lungs and directed out through to the oral and nasal cavities thoracic pressure the air pressure in the thoracic cavity relative to the outside atmospheric pressure is involved in the mechanics of breathing changes in pressure an increase in thoracic cavity size lowers the thoracic cavity pressure and a decrease in thoracic cavity size increases the thoracic cavity pressure relative to the atmosphere; controlled by the diaphragm, intercoastral muscles, and abdominal muscles breathing muscles contractions and relaxation allow the thoracic cavity to change overall size sheet of dome-shaped skeletal that separates the thoracic and abdominal cavities; contraction lowers the position of the diaphragm which increases the thoracic cavity size; relaxation returns diaphragm to its dome-shaped position which decreases the thoracic cavity size intercostal muscles external and internal muscles between the ribs; contract to move the position of the rib cage which affects thoracic cavity size abdominal muscles relaxation allows organs such as the liver and stomach to lower as the diaphragm contracts and lowers (inspiration mechanics) thoracic cavity changes thoracic cavity pressure must increase relative to the atmosphere pressure so that air will move inward from higher perssure (outside) to lower pressure (inside) (inspiration mechanics) diaphragm contracts and lowers position from its dome-shaped position to increase overall thoracic cavity size (inspiration mechanics) intercostal muscles intercostals contract to move rib cage upward and outward to increase thoracic cavity size (inspiration mechanics) abdmoninal muscles relax to allow body orgams to lower as the diaphragm lowers into the abdominal cavity (expiration mechanics) thoracic cavity changes thoracic cavity pressure must increase relative to the atmosphere pressure so that air will move outward from higher pressure (inside) to lower pressure (outside) (expiration mechanics) diaphragm relaes and resumes its upward dome-shape position to decrease the thoracic cavity size (expiration mechanics) intercoastal muscles intercostals relax to return rib cage inward and down to decrease the overall thoracic cavity size (expiration mechanics) abdominal muscles contract to hold body organs up in positions under the diaphragm altered breathing During activities such as singing and speaking, the breathing pattern changes. There are explosive movements of air into and out of the lungs during sneezing, coughing, and laughing. In addition, hiccups result from the involuntary spasms of the diaphragm muscle. neutral controls breathing is controlled by involuntary and volutnary components of the autonomic, peripheral, and central nervous systems medulla oblongata brain centers that regulate breathing mechanics cerebral cortex conscious voluntary inputs from higher centers in the cerebral cortex; allows for some volutnary control over breathing vagus nerve carnial nerve; transmits sensory information from the lungs and thoracic cavity to centers in the medulla oblongata phrenic nerve motor nerves that center the diaphragm; autonomic motor responses from the medullary centers intercostal nerves motor nerves that enters the intercostal muscles that control the movement of the rib cage; autnomic motor responses from medullary centers carbon dioxide feedback chemical receptors monitor bicarbonate levels; the medulla oblongata breathing centers receive chemical information that affects the rate of breathing; decreased breathing rate allows more carbon dioxide to remain in the blood system which faster breathing reduces carbon dioxide content lung volume the capacity of the lung with regard to air volume associated with breathing instrument used to measure air volume in lungs during breathing patterns tidal air (300-500 cc) amount of air exchanged during normal and relaxed adult breathing expiratory reserve (1000-2000 cc) amount of air that can be forced out f the lungs after a normal relaxed exhalation inspiratory reserve (1500-3000 cc) amount of air that can be forcibly taken into the lungs after a normal relaxed inhalation vital capacity (2500-6000 cc) sum total air volume of tidal air and expiratory reserves residual air (1000-1500 cc) volume of air that cannot be exhaled; remains in the lungs after all forced exhalation hypernea; forced breathing or involuntary increase in the rate and/or depth of breathing which may be due to excessive CO2 in the blood or a deficiency of CO2 also described as abnormal "rapid breathing" condition related to a lack of oxygen, may also be referred as hypoxia; may be local or systemic; may result from inadequate supply of oxygen to respiratory system or the inability of blood to carry oxygen to tissues condition characterized by a "bluish" coloration of the skin and mucous membranes due to an excessive amount of deoxygenated blood in blood vessels of the skin infection of the lungs from bacteria, virus, chemical pollutant, or physical gent that results in inflammation of alveoli and pooling of fluids in spaces normally filled with air condition in which there is difficulty in breathing, labored breathing, or uncomfortable breathing; alsodescribed as shortness of breath that may be caused by anxiety, stress, or heart condition condition of inflammation of the epithelial lining of the nasal passages usually accompanied by swelling and nasal discharge repiratory condition in which alveolar walls lose elasticity, decreased gas capacity and eventual destrution of the air sacs; may be associated with bronchial infection or inflammation swelling of repiratory tract due to allergen swelling of bronchial tube due to allergen, infection, viral infection
Learn Webpack in 15 Minutes Build tools have become an integral part of web development, mainly due to the ever-increasing complexity of JavaScript apps. Bundlers allow us to package, compile, and organize the many assets and libraries needed for a modern web project. In this tutorial we will take a look at webpack, a powerful open-source bundler and preprocessor that can handle a huge variety of different tasks. We'll show you how to write modules, bundle code, and use some of the loader plugins. The tutorial is designed for total beginners to webpack, but having some JavaScript knowledge is advised. Why webpack? Much like any other aspect of web development, there isn't a standard for which build tool to use. Right now, developers have to choose between webpack, Gulp, Browserify, NPM scripts, Grunt, and like 10 others. There are many in-depth comparisons out there, but all of these tools are very similar, so most of the time it comes down to personal preference and what project you are working on. Here are some pros and cons to help you decide whether webpack is the tool for you: • Great for working with singe-page apps • Accepts both require() and import module syntaxes • Allows for very advanced code splitting • Hot Reload for quicker development with React, Vue.js and similar frameworks • Мost popular build tool according to the 2016 JavaScript survey • Not suitable for beginners in web development • Working with CSS files, images, and other non-JS resources is confusing at first • Documentation could be better • Changes a lot, even most 2016 tutorials are already outdated 1. Installation The easiest way to install webpack is by using a package manager. We will go with npm but feel free to use Yarn or another hip alternative. In both cases you need to have Node.js on your machine and a package.json ready to go. It is preferred to install it locally (without the -g tag). This will make sure everyone working on your project has the same version of webpack. npm install webpack --save-dev Once we have it installed, it's best to run webpack via a Node.js script. Add these lines to your package.json: "scripts": { "build": "webpack -p", "watch": "webpack --watch" Now by calling npm run build from the terminal we can make webpack bundle our files (the -p option stands for production and minifies the bundled code). Running npm run watch will start a process that automatically bundles our files when any of them change. The last part of the setup is to tell webpack which files to bundle up. The recommended way to do this is by creating a config file. 2. Webpack Config File Here we will look at the config file in its most basic form but don't let that fool you - the webpack config file is quite powerful, varies a lot from project to project, and can become super complex in some cases. In the root directory of your project add a file called webpack.config.js. var path = require('path'); module.exports = { entry: './assets/js/index.js', output: { filename: 'bundle.js', path: path.resolve(__dirname, 'dist') The entry option tells webpack which is our main JavaScript file. There are many different strategies for configuring entry points but in most cases a single entry is enough. In output we specify the name and path of our bundle. After running webpack we will have all our JavaScript in a file called bundle.js. This is the only script file that we will link in our HTML: <script src="./dist/bundle.js"></script> This setup should be enough to get us started. Later we will add some more stuff to it, but first let's see how modules work. 3. Webpack Modules Webpack provides multiple ways to work with modules, and most of the time you are free to go with whichever one you like. For this tutorial we will use the ES6 import syntax. We want to add a module that greets our users. We create a file called greeter.js and make it export a simple function: function greet() { console.log('Have a great day!'); export default greet; To use this module, we have to import it and call it in our entry point, which if you look back at the config file is index.js. import greet from './greeter.js'; console.log("I'm the entry point"); Now when we run the bundler with npm run build, and open our HTML in the browser, we see this: Our entry point and our greeter module were compiled into one file called bundle.js and it was executed by the browser. Here is a simple flow chart of what's happening so far: 4. Requiring Libraries We want our app to specify which day of the week it is when it greets users. To do so we will use moment.js by directly importing it into our greeter module. First we need to install the library via npm: npm install moment --save Then in our greeting module, we simply import the library exactly the same way we imported local modules in the previous point: import moment from 'moment'; function greet() { var day = moment().format('dddd'); console.log('Have a great ' + day + '!'); export default greet; After we bundle up again to apply the changes, in the browser console we will have the following messages: Our flow diagram now looks like this: Note: There are other, more advanced techniques for including libraries but they are outside the scope of this article. You can read more about them here. 5. Loaders Loaders are webpack's way to execute tasks during bundling and pre- or post-process the files in some manner. For example, they can compile TypeScript, load Vue.js components, render templates, and much more. Most loaders are written by the community, for a list of popular loaders go here. Let's say we want to add a linter to our project that checks our JS code for errors. We can do so by including the JSHint loader, which will catch all kinds of bad practices and code smells. First we need to install both JSHint and the webpack JSHint loader: npm install jshint jshint-loader --save-dev Afterwords, we are going to add a few lines to our webpack config file. This will initialize the loader, tell it what type of files to check, and which files to ignore. var path = require('path'); module.exports = { entry: './assets/js/index.js', output: { filename: 'bundle.js', path: path.resolve(__dirname, 'dist') // Add the JSHint loader module: { rules: [{ test: /\.js$/, // Run the loader on all .js files exclude: /node_modules/, // ignore all files in the node_modules folder use: 'jshint-loader' Now when webpack is started, it will show us a list of warnings in the terminal (which we will ignore): Since moment.js is located in the node_modules folder, it won't be linted by the JSHint loader: Further Reading This concludes our introduction to webpack! Since this is a lesson for beginners, we tried to cover only the most useful and must-know concepts of webpack. We hope the tutorial has been helpful, not too confusing, and within the 15 minute limit from the title. In the near future, we are planning to add a second part to this tutorial, explaining how to work with CSS modules and other more-advanced features. In the meantime, if you want to learn more about webpack (and there is a lot more) we recommend checking out these awesome resources: Presenting Bootstrap Studio a revolutionary tool that developers and designers use to create beautiful interfaces using the Bootstrap Framework. Learn more Web Browser Frame DevKit Box Mouse Cursor Related Articles Comments 3 This is a great intro to Webpack. One thing I didn't understand is why you use the --save flag : npm install jshint jshint-loader --save Isn't jshint a dev-dependency? That's a fair point, JSHint is better off as a devDependency. Webpack itself should also be a devDependency if it's going to be used only as a build tool. Good job man. There are a few updated and simple Webpack 2 tutorials out there.
Mental Health - Edmonton Psychologist - Mental Illness What is the difference between having a down day, or week, and clinical depression? What is the difference between reasonable worry, and clinical anxiety?  Depression and anxiety have become words in popular culture that may describe an 'in-the-moment' experience, or a long-standing issue.  The intensity, duration, and commonness of the experience is entirely subjective. In other words, one person's 'depression' may be considered a 'bad moment' by someone else.  One person's 'anxiety' may be a passing worry or complete non-issue for others.  While the internet, self-help books, friends and family may all have ideas about what is 'wrong' with you, if the tried and true strategies that got you feeling better before are not working, it may be time to see psychologist.   In either case, a mental health therapist can work with you in counselling to help you get back on track. If you think something more is going on the psychologist can determine if you are just going through a rough spot, or you actually meet criteria for a clinical diagnosis. Such a determination may be done through a clinical interview and/or psychometric assessment.  If the findings show you are really struggling, the results may help you obtain a medical or stress leave from work, be able to access disability funding (e.g. insurance funding or gain entry into a public health program), or for meeting legal standards in civil actions or criminal trials.  Clinical depression or clinical anxiety, along with other psychiatric disorders, can only be diagnosed by a physician or mental health professional such as a psychologist or clinical social worker.  And, of course, not every physician, psychologist, or clinical social worker is an expert in every mental illness.  Just like you want to see a cardiologist when you have a heart problem, and a oncologist if you are worried about cancer, you want to be treated by a mental health professional who is an expert in the mental health issue you are facing. As you would with other important things in your life, its worth doing some research to make the best decision possible. Take the time to be sure you are working with someone who has the training, education, experience, and interest in learning about you, and things you are worried about.  Many mental health therapists have basic training in helping people who are feeling down, worry about things, have communication issues, or are frustrated by their children's behavior.  Some clinicians have additional training in particular mental health issues such as PTSD, trauma, depression or anxiety, or in working with couples / families / individuals, or with certain age groups.  No clinician 'can do it all'.  A good clinician will refer a client to a specialist for work in certain areas.  Once that specialty work is done, a client may return to their original therapist to work on bigger picture items.  Research shows that the best outcomes happen when you work with a clinician who really understands you, your concerns, and who has the skills and experience to help you feel healthy again.  Karin, Stephanie, and Donna provide mental health counselling at our South Edmonton office
Can dogs eat broccoli? Quick Answer The Dog Channel says that broccoli is an excellent vegetable to feed to dogs. It should be steamed or microwaved before feeding because dogs have difficulty digesting raw vegetables. One or two bite-sized portions is the appropriate serving size for a dog. Continue Reading Full Answer Trupanion suggests cutting vegetables such as steamed broccoli into pea-sized pieces to use as low-calorie dog treats or snacks. Most vegetables are fine to feed to dogs, but onions and garlic must be avoided because they are toxic to dogs. Trupanion also recommends not feeding grapes, rhubarb, mushrooms, corn or citrus fruits to dogs. Grapes, mushrooms and rhubarb can be toxic, and citrus fruits can cause stomach upset. Corn is a common allergen among dogs. Learn more about Dogs Related Questions • Q: Why do dogs' noses turn pink? A: Several factors can cause a dog's nose to turn pink, including temperature changes or nasal depigmentation, also known as "Dudley nose." Certain breeds are... Full Answer > Filed Under: • Q: How do dogs hear? A: Dogs hear through a combination of the auricle, external ear canal, eardrum, bony tympanic cavity and the inner ear. The auricle is the visible outside por... Full Answer > Filed Under: • Q: How do you adopt schnoodle dogs? A: The best places to adopt schnoodle dogs are dog breeder directories, pet shops, online puppy finders and dog-for-sale ads, according to SchnoodleDog.com. T... Full Answer > Filed Under: • Q: Are dogs omnivores? A: Many scientists consider dogs omnivores rather than carnivores, but there is considerable debate. Dogs often eat fruits and vegetables, and even wolves eat... Full Answer > Filed Under:
As Congress continues to debate health care insurance coverage formats, great concern is felt by individuals and families impacted by Sickle Cell Disease, an inherited blood disorder that is serious in nature and life-shortening. Identified in 1910 by Chicago physician  James B. Herrick, who first published a description of sickled cells in a blood sample from a 20-year-old dental student, the term “sickle cell anemia" was coined on paper. It is a pre-existing condition that was covered under the Affordable Care Act.  Now, debate has been heard about how much pre-existing conditions should be covered; should the states determine what and if pre-existing conditions should be covered and current changes are being discussed about Medicaid and how that should be reduced. Sickle Cell Disease is the result of one abnormal gene, from each parent, which results in the protein, hemoglobin, the substance causing the red color in red blood cells to go through a chemical process resulting in change from a round red cell and take on a sickle shape. While the body, specifically the spleen, struggles to produce needed red blood cells, those that are sickle shape break down in 18 to 20 days whereas normal red blood cells remain about 120 days. Most importantly, sickled cells aggregate, in the blood vessels, blocking the flow of blood and oxygen delivery to all parts of the body. The significance is that normal red blood cells take oxygen to all organs and parts of the body.  Without oxygen, organs are damaged and disabilities occur beginning with early childhood, such as infections, strokes, joint pain and destruction, blindness, kidney failure, acute chest syndrome and constant anemia. Persons so affected suffer painful crises which often necessitate days to weeks of hospitalization.  The crises can often interfere with education, work and life plans. Sickle Cell Disorders vary in type and severity and are a global issue, affecting primarily people of color.  Why is it that, since 1910, only one medication has been studied and is in use to reduce the cascade of destructive events during a sickle cell crisis?  Why is it that Hydroxyurea is the only medication that is available that keeps red blood cells round and increases fetal hemoglobin which everyone has at some low level since birth? Why is there a paucity of research to find new medications and even a universal cure for Sickle Cell Disease? Why is it that care for children in hospital pediatric units is available but appropriate care for persons who have aged out of pediatric care must be sought by the individual and is hard to locate?  Why is it that Sickle Cell Disease is under-researched, under-funded for hospital care and poorly supported by the general community? June 19 of every year was declared World Sickle Cell Disease Day by the United Nations in 2008.  It is time for this inherited and pre-existing condition to be adequately supported by the general community and any federal health plan developed by the U.S. Congress. Betty W. Carrington is a vice president of Queens Sickle Cell Advocacy Network, Inc. Read or Share this story: http://on.rocne.ws/2t9LUzU
Historical beliefs Believer or skeptic, how methods of spiritual communication came about is an interesting subject. Here we look at beliefs of days gone by and the methods used to protect or communicate. Electric voice phenomena Posted by Cally on Thursday, October 8, 2009 EVP voices are not heard during recording, only on playback. They typically speak in short, cryptic and sometimes grammatically incorrect phrases. They speak in a variety of languages, regardless of the listeners, and sometimes are heard to sing songs. Sometimes the voices sound natural other times mechanical. Sometimes one or two voices are head, at other times a multitude of them. The voices are identifiable as men; women or children and animals sounds have also been picked up by EVP recordings E.V.P researchers believe they capture on tape the voices of the dead, spirits and extraterrestrials, but sceptics conclude that the voices come from radio, television and citizen band (CB) radio transmissions or are imagined from static or white sound. EVP is one of the first high-technology attempts to communicate with the dead and other paranormal beings. Thomas Edison believed that an electronic device could be built for paranormal communication. He was fascinated by spirit photography and believed that if spirits could be captured on film, they could be captured electronically. Edison announced in the October 1920 issue of scientific American that he was working on a device that could capture the voices of the dead, however it was still not completed by the time he died in 1931, No machine and no plans for one were found after his death. In 1936, Attila von Szalay began experimenting with a record cutter and player in an attempt to capture voice on phonograph records. He said that he began to hear a "tiny voice" in the air near him in 1938. He believed the voice belonged to his dead son, Edson. The experiments yielded what sounded like male and female voices, a whistling and rapping. In 1947, Von Szalay tried using a wire recorder in an effort to improve his results but had difficulty with the wire. In the 1950s, George Hunt Williamson attempted to tape paranormal voices, particularly of extraterrestrials. In 1956, Von Szalay began experiments with researchers to capture voices on electromagnetic tape. The EVP remained obscure until the unexpected discovery of Friedrich Jurgenson, A Swedish opera singer, painter and film producer. In 1959, Jurgenson tape-recorded bird songs in the countryside near his villa. On playback, he heard a male voice discuss "nocturnal bird songs" in Norwegian. At first he thought it was from a radio show, to determine the source of the voice he made other recordings to see if the same thing happened. Though he heard no voices during taping, when he played back the recordings he heard a multitude of voices. The voices gave personal information about Jurgenson, plus instructions on how to record even more voices. By the 1980s, thousands of EVP researchers around the world were recording messages from the dead. Many engineers and electronics experts had devised sophisticated experimental equipment for catching these spirit voices. In Germany, the association for voice taping research was founded in the 1970s, followed by a second organization a few years later, the research association for voice taping. In 1982, Sarah Estep founded the American association-electronic voice phenomena in the United States. Estep rates voices according to three categories: Class C: faint, whispery voices that can be barely be heard and are sometimes indecipherable, Class B: Voices are louder and clearer and can be sometimes heard without headphones Class A: Voices are clear, can be heard without headphones and can be duplicated onto other tapes. In 1982, the EVP field received a worldwide publicity boost with the announcement of George Meek, a retired engineer, that he and a medium and electronics expert, William O’Neill had built a device called the spiricom that could communicate with the dead. Both Meek and O’Neill claim to have been helped in the development of the spiricom by two spirit beings. Meek was contacted by a dead scientist that gave him instructions, then in 1977 Meek met O’Neill who claimed to have been contacted by a dead ham radio operator going by the name of "Doc Nick" who gave them the technical information that they needed. Meek founded the metascience foundation of North Carolina and invested more than half a million dollars of his own money into the research they needed. Spiricom allegedly helped two way conversations between the living and the dead. Meek made available the plans for spiricom to anyone who wanted them free of charge, unfortunately everyone who was given the plans reported no success. EVP researcher’s theorized that spiricom’s success was largely due to the unique mediumistic abilities of O’Neill. Meek went on to pursue more and more sophisticated systems to "reach astral levels where higher minds resided". Many investigators doubt EVP voices are paranormal. Between 1970 and 1972 the society for psychical research, in London, commissioned D.J Ellis to investigate EVP voices. He concluded that the interpretation of the sounds was highly subjective and was susceptible to imagination, and that the voices were more likely natural phenomena. His conclusions were supported by the Rorschach sound test, which shows that a person can listen to a variety of sounds and can hear what they wish to hear. Tags: evp  para sounds  paranormal
Cambridge English: First ( FCE) Writing Difficulty level: B2 /Upper Intermediate What is the First (FCE) Writing test like? The test has two sections and takes about 80 minutes: 1. Part 1 -write an essay based on prompts 2. Part 2 - write one from a choice of 4 questions: an article, an essay, a letter, a report, a review, a story Each part has the same number of marks How to prepare for the First (FCE) Writing test • Choose a question that you are interested in. You will write better if you know the subject. • Read the instructions carefully before you start. Make notes. You must include all the points in the instructions • Make a plan before you start writing. Decide what information to put in each paragraph • Think about who you are writing to and use an appropriate style of language • Try to use a range of complex language Read this explanation of how to write an article for FCE Writing part 2.
Consumer opinion divided on smart grid technology Click to follow The Independent Online While the Americans and Chinese are positive about smart grids, Europeans and Australians remain more skeptical despite the environmental benefits of the new technology. Smart grids are power systems which deliver electricity from suppliers to consumers, much like conventional power systems. However smart grids utilize two-way digital technologies in order to reduce electricity consumption and increase efficiency of use; for example, a smart grid using a smart meter could tell a householder the best time to turn on an energy-consuming home appliance such as a washing machine. This would allow the user to avoid periods of high energy demand and take pressure off the power grid. Smart grids also use different power lines than traditional systems in order to minimize energy loss. Electricity monitors such as smart meters could also be used to provide information about power consumption relevant to climate change.  Energy-efficient smart grids would need less power and release fewer CO2 emissions into the atmosphere. General Electric has an interactive website showing the relationship between the percentages of US homes with a smart meter and CO2 emissions. However international consumer opinion is divided on the issue and in particular on smart meters - while some support the environmental benefits others struggle to trust the electricity companies. A new survey published July 22 by American power company General Electric shows that overall 88 percent of American consumers trust the smart grid and agree that "money spent on making capital improvements to today's energy infrastructure is necessary." A survey by Smart Grid Observer found that 41 percent of Chinese are also positive about the technology and support its implementation. However 70 percent of British households claim they would ignore any information provided by smart meters, while only 10 percent of respondents in Germany, and 16 percent in Sweden would trust the electrical companies and smart meters. There has also been friction in Australia between residents and electrical companies over the installation of the meters. The European Union predicts an 80 percent Europe-wide rollout for smart meters by 2020. Research and consulting company ZPryme released a report in February of this year detailing the top ten countries by investment in smart grid technology. China's number one status was assured after heavy investment in smart grid technology to offset high predicted future power demands. 1. China $7,323 (US millions) 2. US $7,092 3. Japan $849 4. South Korea $825 5. Spain $807 6. Germany $397 7. Australia $360 8. UK $290 9. France $265 10. Brazil $204
Symptoms and causes Pericarditis has different classification types, depending on the pattern of symptoms and how long symptoms last. Acute pericarditis usually lasts less than three weeks. Incessant pericarditis lasts about four to six weeks but less than three months and is continuous. Pericarditis is described as recurrent if it occurs about four to six weeks after an episode of acute pericarditis with a symptom-free interval in between. Pericarditis is considered chronic if symptoms last longer than three months. If you have acute pericarditis, the most common symptom is sharp, stabbing chest pain behind the breastbone or in the left side of your chest. However, some people with acute pericarditis describe their chest pain as dull, achy or pressure-like instead, and of varying intensity. The pain of acute pericarditis may travel into your left shoulder and neck. It often intensifies when you cough, lie down or inhale deeply. Sitting up and leaning forward can often ease the pain. At times, it may be difficult to distinguish pericardial pain from the pain that occurs with a heart attack. Chronic pericarditis is usually associated with chronic inflammation and may result in fluid around the heart (pericardial effusion). The most common symptom of chronic pericarditis is chest pain. Depending on the type, signs and symptoms of pericarditis may include some or all of the following: • Sharp, piercing chest pain over the center or left side of the chest, which is generally more intense when breathing in • Shortness of breath when reclining • Heart palpitations • Low-grade fever • An overall sense of weakness, fatigue or feeling sick • Cough • Abdominal or leg swelling When to see a doctor Seek immediate medical care if you develop new symptoms of chest pain. Many of the symptoms of pericarditis are similar to those of other heart and lung conditions. The sooner you are evaluated, the sooner you can receive proper diagnosis and treatment. For example, although the cause of acute chest pain may be pericarditis, the original cause could have been a heart attack or a blood clot of the lungs (pulmonary embolus). This delayed pericarditis is known as Dressler's syndrome. Dressler's syndrome may also be called postpericardiotomy syndrome, post-myocardial infarction syndrome and post-cardiac injury syndrome. Other causes of pericarditis include: Complications of pericarditis may include: • Constrictive pericarditis. Although uncommon, some people with pericarditis, particularly those with long-term inflammation and chronic recurrences, can develop permanent thickening, scarring and contraction of the pericardium. In these people, the pericardium loses much of its elasticity and resembles a rigid case that's tight around the heart, which keeps the heart from working properly. This condition is called constrictive pericarditis and often leads to severe swelling of the legs and abdomen, as well as shortness of breath. • Cardiac tamponade. When too much fluid collects in the pericardium, a dangerous condition called cardiac tamponade can develop. Excess fluid puts pressure on the heart and doesn't allow it to fill properly. That means less blood leaves the heart, which causes a dramatic drop in blood pressure. Cardiac tamponade can be fatal if it isn't promptly treated. Early diagnosis and treatment of pericarditis usually reduces the risk of the long-term complications.
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted or decrypted right before it is loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc). Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on the fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on the fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for TrueCrypt. For an illustration of how this is accomplished, see the following paragraph. Note that TrueCrypt never saves any decrypted data to a disk – it only stores them temporarily in RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted. When you restart Windows or turn off your computer, the volume will be dismounted and files stored in it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), files stored in the volume are inaccessible (and encrypted). To make them accessible again, you have to mount the volume (and provide the correct password and/or keyfile). IMPORTANT. TrueCrypt is now discontinued and is regarded as non-secure using Windows XP. We have updated and included the latest version for existing TrueCrypt users only. Powerful, free, tool that enables you to create an encrypted volume on your computer, where you can keep data safe and secure
Edit Article wikiHow to Make Right, Left, and U Turns Three Methods:Making a Right TurnTurning LeftMaking a U-TurnCommunity Q&A Making proper right turns, left turns, and U-turns just takes practice. When making turns, always remember to turn on your blinker, reduce your speed, and check for oncoming traffic and pedestrians. When making U-turns, make sure to check for road signs to see if they are allowed. Making a Right Turn 1. 1 Put your blinker on. Turn it on 100 feet (30 meters) or one whole city block before the turn. As you approach the turn, drive closer to the right side of the street. This will signal to cars that you are preparing to turn ahead.[1] 2. 2 Reduce your speed to 10 to 15 mph (16 to 24 kph). Do this by placing your foot on the brake pedal. As you reduce your speed, glance at your rear view and right-hand mirror to see if the cars behind you are slowing down.[2] • If you notice that the cars behind you are not slowing down, tap your break pedal a couple times to signal that you are breaking. 3. 3 Check for pedestrians, cyclists, motorcycles, and other vehicles. Do this by looking into your right-hand mirror and by looking back over your right shoulder. Once your path is clear, make the right turn by turning your steering wheel to the right.[3] 4. 4 Turn into the right lane. Not the left lane if you are turning into a two-lane street. Try to make your turn as tight as possible without hitting the curb. In other words, do not make a wide, sweeping turn. Making wide turns may cause you to go into the lanes of oncoming traffic.[4] • Do not make a right turn from a left lane. Turning Left 1. 1 Pay attention to the road signs. You want to do this because left turns aren’t always allowed. If you see a sign saying that a left turn is illegal, then keep driving until you can make a legal left turn.[5] • For example, some traffic lights and intersections prohibit left turns. 2. 2 Turn on your blinker. Do this at least 100 feet (30 meters) before the actual turn. As you approach the turn, reduce your speed to 10 to 15 miles per hour (16 to 24 kph) by pressing the break pedal. Get as close to the centerline or median as possible.[6] • Use the center left lane if one is available to make your left turn. • Do not attempt to make a left turn from a right lane. 3. 3 Come to a complete stop and yield to oncoming traffic. As you are yielding, keep your wheels straight by holding your steering wheel straight. If your wheels are slightly turned to the left while waiting, you may be shoved into oncoming traffic if a car hits you from behind.[7] 4. 4 Turn left once the oncoming lanes are clear. As a rule of thumb, do not turn if oncoming vehicles are less than 200 feet (60 meters) away from you. Once the lanes are clear, you may turn into either the left or right-hand lane if you are turning into a two-lane street.[8] • If you are turning into a single-lane street, make sure to not cut the corner of the oncoming traffic’s lane. In other words, do not make your left turn too tight. Making a U-Turn 1. 1 Check for signs prohibiting U-turns. You may make U-turns only if you are crossing a double yellow line, there is a “U-turn Only” sign, you are in a residential area, and if you are in the far left lane and no sign is prohibiting U-turns.[9] • You may also make a U-turn on a divided highway if there is an opening in the center divider and the opening is not reserved for law enforcement or emergency vehicles. 2. 2 Turn your left signal on and reduce your speed. Once you approach your turn, get as close to the centerline of the road as possible and come to a complete stop. Observe the traffic and check for oncoming vehicles and motorcycles, as well as pedestrians and bicycles.[10] • Oncoming vehicles must be more than 200 feet (60 meters) away before making a U-turn. • Do not make a U-turn from the right lane. 3. 3 Turn you steering wheel to the left as far as you can. Do this to prepare for the U-turn. Once the lanes are clear, slightly accelerate and let the steering wheel correct itself to a straight position. Then turn into the left lane.[11] • Do not turn into the far right lane. 4. 4 Avoid making illegal U-turns. U-turns are prohibited when there is a “No U-turn” sign, you are on a one-way street, and when you cannot see 200 feet (60 meters) in either direction (because of hills, curves, rain, snow, fog, and other obstacles).[12] • Additionally, do not make U-turns on highways that are split by curbs, two sets of double yellow lines, and other dividing mechanisms. Community Q&A Add New Question • How do I use the brake and the gas pedal when I am turning? wikiHow Contributor When preparing to turn, put your foot on the brake. Ease off the brake and press the gas pedal lightly as you begin to turn. Merge into the flow of traffic as quickly as possible. • Is it against the law to not signal when making turns or changing lanes? wikiHow Contributor It depends on which state you are residing in. Check your state's driving guidelines. However, as a general rule of thumb, you should always turn on your blinker when turning. • How soon can I enter the right lane after making a left turn? wikiHow Contributor Once the right lane is clear, you can proceed to enter the right lane. • How do I turn without being close to the curb or almost running into the other car? wikiHow Contributor If you're going to make a turn, drive until the curb is in line with the side of your car. Once you've done that, you can start to steer around making your turn. Unanswered Questions Show more unanswered questions Ask a Question 200 characters left Made Recently Did you try these steps? Upload a picture for other readers to see. Upload error Article Info Categories: Driving Techniques Thanks to all authors for creating a page that has been read 174,149 times. Did this article help you?
(Translated from the French by Richard Howard) First published 1964 Subtitled ‘A history of insanity in the age of reason’, this densely argued and fascinating book shows how madness as a spectacle and disability has fascinated and haunted the history of mankind since the 15th century. In this meticulously researched, controversial, study Foucault observes how “fear of madness grew at the same time as fear of unreason”. This was represented in Goya’s famous etching ‘The Sleep of reason produces monsters‘. Hieronymus Bosch was another artist who depicted madness to symbolise the fall of man. This book begins at the end of the Middle Ages after a cure for leprosy had been found. Foucault shows how the role of the leper in society was replaced by the poor, the criminals and the insane. Madness represents the direct opposite of strength, purpose and reason so is associated with weakness, dreams and illusions. In this context, idleness was deemed a form of rebellion which is why, in houses of confinement, those denied their liberty were forced into labour “without utility or profit” as an “ethical exercise and moral guarantee”. Discipline and brutality were the crude tools deployed to prevent deranged minds deteriorating into a state of “unchained animality”. Madness was conceived as a threat to moral order and signified a fear that, without diligence and self-control man could become no better than beasts : “Madness begins where the relation of man to truth is disturbed and darkened”. Michel Foucault Foucault details the main causes of insanity. Passion always contains the possibility of madness wherein reason becomes depraved and dismantled. The simplest (simplified?) classical definition of madness is as a state of “delirium”. Melancholics are more intelligent yet also more susceptible to insanity whereby sadness and fear is replaced by audacity and fury. Religion is another cause due to the strong emotions it arouses and the fears of the Beyond; Foucault notes dryly that “Catholicism frequently provokes madness”. Asylums helped madness to be controlled but not cured as a kind of institutionalised alternatives to the family, a religious domain but with pure morality and not religion.: “Madness will be punished in the asylum even if it is innocent outside of it”. Freud’s breakthroughs in the field of psychotherapy led to a slightly greater level of compassion for insanity but, even today, medicine and psychology is often used to regulate and punish, not to cure. Foucault’s work is no light read but worth the effort. It’s a book that  forces you to question accepted notions about how  ‘madness’ and ‘civilisation’ have been defined throughout history..
What is a state? The concept of a state that we’re carrying into the 21st century is out of date. We need to examine what a state is today and, to the extent that we need governance, what form a state should take in a globally connected world. The state that we think we have, the nation state, has only had a short and brutish existence. European nation states took their present form in the 18th or 19th century. Before this there were other forms of governance — empires, city states, feudalism — with varying degrees of size, ethnic cohesion, strict or lax laws, open or closed borders, etc. The most striking difference though has been the relationship of people with government, ranging from equal partnership to open exploitation. The nation state brought three centuries of coercive policy making coupled with paternalistic welfare. Today the nation state is in crisis, not so much because of open borders or because the clan wars that it caused threaten to tear the world apart, but because its social contract is in crisis. The modern state can neither enforce policy nor provide welfare with credibility, and we’re not collectively sure if it should. We need a clear model of the state and its role. What is a state supposed to be then? From the perspective of the social contract, in other words the deal between the citizens and government, we have three prevailing models in the West: • The state as kin. The state is a large family. You’re accepted as a member if you are biologically related as offspring or mate of another. The state looks after the collective good of the kin, to the detriment of those non-kin. That may mean coercion within the state to make sacrifices, and war against foreigners. Since the membership of the state is closed, the state may wish to participate in relationships with other states but does not wish to open borders or be subsumed in greater entities. Examples: Israel, Japan. • The state as a charter. The state has a territory in which certain rules apply, to everyone. The belief is that prosperity, justice, and human flourishing follows from an open society based on good rules. The charter state is open to all people, but needs to defend its jurisdiction and its charter in order for the latter to be meaningful. The state sometimes has to intervene between people to defend the promise made to all, and may wish to export its charter or create a greater chartist structure. Example: France. • The state as a service. The state collects subscriptions, usually called taxes, builds infrastructure, and provides services: Defense, health, information, transport, banking, pensions, communications, etc. It retains a monopoly for some of these services, it’s a wholesales for others, and a retailer for some more. It prefers being a monopoly-wholesaler, leaving retail to private firms. The state doesn’t care that much about kin or territory, but rather cares about solvency, revenue, and entitlement or otherwise of service users. This state sees itself first among equals in relation with private firms. Example: Britain. These conceptions of the state are very different, but we don’t usually see that because we’re used to the kind of state that we live in. In a world going through rapid globalization, we need active debate on the types and roles of states that we want to bring about in the future. In my opinion, the state as kin is indefensible after 1945. Most of Europe has accepted this as consensus and thus the EU was created, largely on a chartist vision from France. A few notable nation states remain, due to their exceptional circumstances: • Japan remains as nation state due to the long period of isolation in its past. Eventually I think it will become chartist, over many generations. • Israel created a nation state after 1945, ironically to escape the horrors vested upon the Jews by the rampant nation states of Europe. It’s simply late to the game. Nation states are over, and Israel has to become either a chartist government of the region with a responsibility to all people, or a welfare state for Jews that can co-exist with a similar one for others. • South Africa was a clearly indefensible state of the Afrikaans kin, and that structure was dismantled. The United States is divided among all three influences. The founding of the American state was clearly chartist, and France even gave them a nice statue as a gift to celebrate this. For most of its history, however, the US acted as the state of the Anglo-Saxon kin. It embraced those Europeans who were closest to the kin, such as Germans, tolerated others such as Italians, and abused those who were clearly not kin: Blacks, latinos, asians. The Anglo-Saxon America clearly had no qualms about attacking distant, non-white people. The third influence, which is gaining ground, is to see sates and the federal government as financial services firms, with a few R&D departments, that provide a kind of backbone to private enterprise. The EU stated out with the explicit claim to end the clan wars that ravaged the region for millennia. In this it brilliantly succeeded. The earlier years of the EU, and most of its architecture, is chartist. It unifies rules, creates enforcement mechanisms, and tries to ensure openness. In my opinion it lacks corresponding development of its services role. There has to be a unified approach to taxation, citizen’s obligations, and citizen’s entitlements between member states. That doen’t mean they should be the same, but rather they all need to be comparable and equally fair, and there needs to be an open way for citizens to join, leave, and transfer between welfare systems as they move through the EU. I don’t know enough about China and India to characterise them. From a western perspective, China appears to be a kin state. It’s organised as a patriarchal family, where citizens are supposed to respect authority and work on common goals, in exchange for protection. Dissidents are severely punished. If that’s really true, China’s saving grace its lack of expansionist or imperialist tendencies. Even so I worry that a kin state containing one fifth of the word’s people will lead to conflict or exploitation depending on how those outside the kin organize themselves. By comparison, India appears to be so variegated that it’s not a credible kin state. It has strong chartist and some services elements, which I think is better for the long term welfare of the people in the region. I don’t know enough about it though. These are important questions that need to be at the center of policy. If we ignore them the growth and diversification of private firms into providers of everything, from search to phones and from groceries to mortgages, will push states into a similar and shrinking role. You’ll buy healthcare from Tesco or from the NHS. You’ll use an infrastructure made by Google or by DARPA. You’ll pay your debt to the fed, or HSBC, or GE. What is the difference? That is a de-facto libertarian society. A libertarian society may be a valid vision for the future. I sincerely doubt it, but the point is the world’s citizens shouldn’t sleepwalk into it while capital pushes it. Leave a Reply WordPress.com Logo Twitter picture Facebook photo Google+ photo Connecting to %s
Monthly Archives: June 2017 The Incredible Power of Praise presented by the ceo, matthew gray Every time we interact with our children, we create a bond of love and nit the relationship with our children, the way parents speak and the words they say to them stay with them forever and creates a lifelong impression on the child. A growing number of parents are aware about the impacts of their words leave on the children. A large number of population of parents have understood the importance of praise and have adopted to praise and motivate their children, yet the is lot more to the technique of praising children, it is not only to say ‘Wow you did a good job!’. It is the amount of praise and the way we appreciate them makes a huge difference and brings a massive difference on how they behave and deliver the best results. Below are outlined some of  the basic and most common scenarios to praise and appreciate children and also outlining best way of communicating, that helps the little child to not only feel proud and confident about themselves but also gives them deeper understanding about their strengths and weakness. Scenario 1: General praise: Wow, you are  excellent at maths! Impact: The idea that creeps into the child’s mind, through general praise maybe that he/she is excellent at maths, and do not need to focus or maybe not pay further attention in maths. These kinds of open ended sentences can maybe misleading or sometimes damaging to a child’s future ability in any particular subject. Descriptive praise: I have noticed you have been working out hard to work out the right answers, to these problems, you have greatly improved your skills in maths. Scenario 2: General praise: You were being really amazing today! Impact: makes a child to be self obsessed and overstating his/her own abilities. Does not give specific information on what they did well and how to repeat the good action again. Descriptive praise: I really liked that you shared your toys with your friends and siblings, I can see that you are getting more responsible and caring, I am so happy about it. Scenario 3: General praise: You are quite active, You will be winning all the competitions on the sports day! Impact: These praises might negatively effect the moral of children, when they do not win, and make them weak and morally vulnerable in the event of failure. Descriptive praise: On most of the practice sessions you had a good concentration, which meant you could run fast than last time, well done! Scenario 4: General praise: You are a superstar in the class! Impact:These praises can excessively boost moral of the child and may also lead to behavioural issues, as for little children are not completely experienced to handle vague and bogus talks. These praises also don’t give specifics to a child on his/her areas of improvements. Descriptive praise: You pronounced the words clearly having a constant smile on your face and facing towards the audience, you looked very excited saying your lines. I loved to watch your performance. Scenario 5: General Praise: You could be an excellent painter when you grow up! Impact: Doesn’t focus on efforts and present abilities of a child. Descriptive praise:  You seem to have good knowledge about the colours and canvas, would you show me how to mix, these colours? It is important that parents and carers are mindful of their praises and the idea they convey through their words. A descriptive praise is often more useful as it gives more understanding of the family values and rules, and gives children greater understanding of their weakness and areas of improvements. Descriptive praises are a powerful tool to help children become willing to accept failure and stand back up for a new challenge.
Black vocal cadence: when our tone can mean life or death The deaths of Trayvon Martin and Jordan Davis (do I need to say there have been many more?) has prompted some important discussion about the way we view these young men in public spaces and how we interpret the way they speak. John McWhorter recently examined the Black male vocal cadence in an article at The Root, in a piece titled, “Do White Folks Fear Violence When Black Folks Are Just Being Blunt?” He writes, “Yet in an honest, and perhaps more productive, discussion of this topic, we have to allow something uncomfortable— the possibility that language plays a part in the stereotype. To whites, I highly suspect that often, black boys and men have a way of sounding violent.” And I would add to this: the stereotypes of Black women being thought of as confrontational, aggressive, loud, and angry. I experienced this directly during my undergraduate degree on Long Island. I was on a Peer Counselor team for a few of the summers. PCs were in charge of the incoming students during their 3-day overnight orientation for the school. It was the first time I was ever put on a staff that was roughly half Black and half White. The first year I did the job, it didn’t take very long for racial tensions to begin. The White women were complaining that the Black team members were too loud and aggressive during the staff meetings and they found it intimidating. The Black women responded with frustration and resistance as they were “just talking how they normally do and didn’t mean anything personal by it.” But others were interpreting it differently and taking offense. Despite the tensions, the upper management did a fairly decent job forcing us to talk this out openly and come to level of understanding that allowed us to work together and forge friendship with each other for the rest of the summer. But that experience taught me a valuable lesson about tone, communication signals, and assumption. McWhorter writes, “However, if outsiders hearing it don’t get the joke and wonder whether black people, especially boys, are feisty souls, then the problem is less racism than an intercultural misinterpretation.” As someone who teaches accents, dialects, and EFL pronunciation, I try to engage my students and clients with this idea of intercultural misinterpretation. I talk about the prejudice of our listening and try to make explicit how our communication is heavy with cultural signals. To an American, Mandarin speakers can sound angry, British people sound posh, Eastern European speakers can sound serious. We make judgements based on people’s vocal tone all the time. I liken our use of language and tone as a type of computer program or a genre of music. When another person hits the notes or code in a different way, we misinterpret the emotional state, personality and/or intentions of the listener. If you add in a healthy dose of privilege, hegemony, and Standard Language Ideology, now you have a sense that an interpretation of how someone speaks is right or wrong, correct or incorrect, appropriate or inappropriate. Suddenly there is an authority, whether it is the justice system, teachers, businesses, or the media. But perhaps more importantly, we need to share and teach this idea to those from a dominant White culture, so they can critically reflect a bit more about language, tone, and identity instead of interpreting things through their own privileged experience and lens. When we work with the voices of actors of color or those from a pluralistic background, we must bear all of this in mind as educators. Hegemony and the privilege of our own interpretation do not stop at the door of our classrooms and rehearsal studios. And in trying to find our students’ “true” voices, we must acknowledge that this navigation may be complicated given the socio-political dynamics between classmates and faculty. And we must acknowledge that we may not always like what their “true” voice sounds like and are potentially prone to misinterpret it culturally. Lastly, sometimes People of Color ARE actually angry. And that is totally okay too. Considering the severe inequity in our country, there is a lot to be upset about. McWhorter points out that “for a people whose history has been so confrontational, maybe it isn’t surprising that their speech reflects it.” “Isn’t it sad that I can’t use my real voice with White people?” Someone asked me recently what strategies I propose or support in encouraging effective and progressive engagement about race and identity. One such way I often respond with is different types of comedy and performance. Some of the most interesting cultural criticism and reflection can come from comedians, particularly comedians of color or from pluralistic backgrounds like Aziz Ansari, W. Kamau Bell, Wanda Sykes, Margaret Cho, Hannibal Buress, etc (although it should never be a PoC’s responsibility to discuss or educate others about these issues and people like Louis CK are doing a great job talking about Whiteness). Aamer Rahman is a stand-up comic of Bangladeshi descent who spent much of his life in Australia and a lot of his material deals with identity, race, and White privilege. I first heard of him through this brilliant bit debunking the myth of reverse racism, which is I think still one of the most concise ways of commenting on this idea thus far. Rahman has another bit from his show, Fear of a Brown Planet, where he talks about what workshops he wants to create for White people. As a voice teacher, this part struck a particular chord. You know, we actually have speak differently, to White women? If I’m in a bank or any kinda of job interview, any kind of professional setting, I have speak differently, to a White woman, just so she doesn’t get scared. I have to smile more, I have to appear less threatening. I don’t pull out a knife or a gun, suddenly I actually have to make my voice higher, this is not even my real voice, this is my White voice. Isn’t that sad I can’t use my real voice with White people? I think a lot of PoCs have a “White people voice.” It can vary depending on our background. Women in general can often change their resonance or pitch to be taken more seriously by men as well. My “White people voice” is actually louder and more forceful and masculine to convince White people that I’m not a passive, subservient geisha-type of Asian person. I believe that as a result, accessing a more vulnerable-sounding head, face, and mouth resonance has been most challenging for me in my personal voicework journey and that I tend to push or create unnecessary tension in my throat. Rahman’s point here is important as many voice teachers in the US/UK/Australia, etc still are nice White ladies. And acting students of color are often trying to assimilate and code-switch in order to successfully navigate the socio-cultural constructs that still continue to play out in our education systems. Given the goals of many voice teachers to free the voice and make it a reflection of who a person truly is, I would say that we must be aware of the power relationship our own identities create and how they impact our students, no matter how caring and well-meaning we may be. And this is not to say, of course, that ALL PoCs have a “White people voice” or that people from White, monocultural backgrounds don’t have socially induced vocal hang-ups. But I think what Rahman’s talking about is a very real phenomenon and we should be dialoguing and reflecting about it more. Can Shakespeare be ‘timeless’ and hegemonic at the same time? …Let’s hope not? I was fight coach for Julius Caesar and my BFF was Cassius. aaamaaazinggggg. In her recent article in The Guardian, ‘Did Shakespeare sell women short?’ Vanessa Thorpe examines the limitations of Shakespeare’s female characters and namely the RSC’s recent response to this concern. The RSC has announced that they will be producing three Jacobean dramas that feature major female roles. Brigid Larmour, has this to say: “The impact of Shakespeare is still inspiring, of course, but it can also be limiting,” she said. “There are huge characters, such as Cleopatra or Beatrice, that we reference all the time in the rehearsal room. But the problem is that we have kept the same gender balance in today’s theatre because of the success and genius of his plays. It created a blueprint that means playwrights do not notice when they have written something for nine men and one woman.” My emphasis. I can’t be sure how intentional, but it was great to see women’s opinions sought after for this piece (albeit they all appear to be White women, but I guess the scope of this article was made pretty clear). There is also some comprehensive summaries of some of Shakespeare’s ladies actual line counts vs. their male counterparts. And how did I not know that only Cleapatra had what is closest to an actual soliloquy!?!?! Jesus. I’m glad the article mentions Volumnia, Lady Macbeth, and Gertrude – all powerful women in their own right, but at the end of the day, how many of the Bard’s plays pass the Bechdal Test? Two sources, here and here, say that things look pretty grim. Orlando, the writer of that second examination of my link, has this to add: The great strength of what Shakespeare does for women lies less in their number than in their complexity. At first glance they seem easily classifiable as ingénue, matron, villainess and so on, but always reveal themselves as much more when examined closely. In addition, one of the scenarios he returns to most often is of women supporting each other, even in the ranks of death, which belongs to that quirky category of things that happen all the time in life, but hardly ever in the movies. Ok, I’d agree with that, and maybe even one could say that Shakespeare was one of the original, Western, writers to employ a sense of “Trojan Horse Television,” where “using characters and ideas with whom audiences think they’re familiar to lure viewers in, and then taking them to entirely unpredictable places.” But so what? Why should we be applying modern social criticism to a White, male writer who died 397 years ago? Because a lot of people teaching Shakespeare’s text to both literature students and actors (and also our theatre industry but don’t get me started) tend to perpetuate that Shakespeare is a voice for timelessness and the scope of human nature.  Shakespeare Scholar Sarah Werner cautions: This emphasis on individuals and common humanity distances the actor from any type political action or sense of history, and naturalizes the social order found in Shakespeare… I would clarify here and say it has the potential to do that. And that it’s been done a lot. I’ve been co-teaching a Shakespeare text workshop over the past few weeks in Seoul to participants who have mostly had limited experience with the performance of his writing. In my enthusiasm to make his words less academic, more egalitarian, more accessible – I have found myself tempted to go into universalist overtures. The well-intentioned platitudes like “Shakespeare is for everyone!” “His stories and characters are timeless!” and “they speak for us all” allow us to efface Shakespeare’s identity locations of being White, male, and English and decontextualizes the society he lived in, which was patriarchal and colonialist. Thorpe writes in her Guardian piece, In Shakespeare’s time, gender politics was a perilous subject, with Elizabeth I’s power waning at the end of her reign. Women were forbidden to appear on stage and this may well have dampened Shakespeare’s enthusiasm for female roles. Larmour suggests that had this dramatic genius been born later, British theatre would be different now. “If Shakespeare had been writing during the freer Restoration era, we would have far more women’s parts.” Of course, the fact that women weren’t even allowed to play his characters onstage during his lifetime is going to have an impact on his writing. How could it not? I remember seeing Much Ado about nothing for the first time, and watching Hero choose to ultimately marry Claudio after all the humiliating bullshit he puts her through. I was filled with rage. Rage and disgust. Shakespeare was not speaking for ME in that moment. And of course, one could say that the theatre was staging this play or that we have our students play these parts in order to raise concern, discussion, debate, reaction. But that justification isn’t exactly going well for The Ordway in Minneapolis, who is referencing those very same things in defense of their upcoming production of the very racist musical, Miss Saigon. Things are starting to become tangential (but important tangents nonetheless) so I will move forward. What are the implications, then, for our students? ‘What postcolonial actors need to develop is a theory and practice of actorly agency – a way of achieving interpretive and performative autonomy – by means of, within, through,and finally, outside of, clearly separate(d) from the will to power represented by the Shakespearean text’ – Denis Salter, ‘Acting Shakespeare in Postcolonial Space’ Shockingly, I keep returning to the idea of context and the rejection of lazy binaries that Shakespeare is either universal or an ignorant misogynist. I like to think that all of our voice, text, acting work is an invitation. We invite and the students have every right to engage or not. And as teachers, we hope to empower them through their choice of engagement. We are also responsible for finding other texts that offer us more diverse and powerful woman characters. That, and playing with more cross-gender casting, in both productions and class scene work. Let’s honor the shifting of gender identity locations and how they can shift in both Shakespeare’s work and in the literal bodies of our students. Calling all ‘self-professed egalitarians’… Tamar Szabo Gendler (Yale University) and Mahzarin Banaji (Harvard University, Blindspot) discuss the Implicit Association Test, which I highly recommend taking. I took this test for the first time when I was in high school (I discovered that I was incredibly racist, to my embarrassment). They also look at how one can address these implicit biases and discuss how attitudes are and aren’t changing across age groups. bloggingheads1 WordPress and bloggingheads.tv appear to be frenemies, so apologies for not being able to fully embed the video. You can either click the image above or go here. This ain’t a short clip, but really good and super important, especially if you are interested in exploring your own implicit biases when it comes to identity locations (psssst: you should be interested!). Also, bloggingheads.tv does that cool thing where you can jump to different parts of the video based on topics discussed. After describing the background of the IAT and how it works, Gendler and Banaji discuss the difference between explicit and implicit bias and how implicit bias can impact those around us in quotidian situations. Banaji points out …You and I are teachers- Who we call on in a classroom, how we might judge a paper- these are all possible instances in which our beliefs about groups of people can enter into our assessments of them. She’s even had her classes audited where someone counts the instances she calls on students based on gender, and her implicit biases still show. Banaji seems to get a bit frustrated when she discusses how many studies have been done with regards to the IAT and yet there is still resistance. She says, To me, what’s amazing is that each group refuses to be persuaded that they are capable of making these errors until a study is done with their population of people. And that itself to me is interesting  that somehow if I know that lawyers or judges or [inaudible] say “I can’t believe that it could be me. I have to be shown that it is my group that is doing this or I am doing this. Which makes me wonder when someone will specifically research IAT within the context of drama conservatoire/BFA program faculty and staff. Will that be necessary? Gendler and Banaji discuss some effective ways to combat implicit biases. One of them is to view images and other forms of media that contain anti-stereotypical messages. Banaji challenges us to take full advantage of our choices: And of course, the question for person, especially a young person, is, now that the world is at your feet, now that you can listen to Mongolian children making rap music – what will you choose to listen to? What now? – It’s not the three TV stations anymore and the one newspaper at your doorstep… The conversation closes with this lovely nugget, a point raised by Banaji: In modern minds like ours, discrimination does not unfold by harming the out-group. But rather, that discrimination has its effects by helping the in-group. What a concise, clear way to explain privilege. Mmmmmm. I urge you to take some of the tests over at the IAT website. You might feel really gross afterwards (like I did) but as these two professors discuss, awareness is really the only way to start addressing bias. As ‘self-professed egalitarians,’ we owe it to our students to continually examine our more implicit biases. Hiiiiiiiiiiiiiii, how are youuuuuuu? I’ve heard a few voice teachers, particularly accent coaches, bemoan technology such as texting and chatting and how it’s clearly the dearth of good speech. We often present a foundational binary to our students, that vowels are emotion and consonants add sense to speech. And those whippersnappers these days, are sending texts like, ” r u gtg 2 the prT?,”  which is sucking all the feeling and emotion out of written speech and negatively affecting spoken trends. In her article, “Why Drag It Out?,” Jen Doll explores the linguistic phenomenon of the written text elongation through the adding of extra vowels (and sometimes consonants). She writes, But why is anyone adding extra letters in the first place? Blame our ever-loosening standards for written language, our desire to express ourselves independently and uniquely, and the brief time we devote to creating an electronic message. Perhaps, suggests Michael Erard, a linguist and the author of Babel No More, we’re simply trying to incorporate aspects of verbal speech into our digital communications. “When people talk, they use intonation in a number of varied and subtle ways,” he told me. “There’s a lot of emotional nuance that can be conveyed that you can’t do in writing.” My emphasis. A desire to express ourselves independently and uniquely sounds pretty great to me. It sounds like something I am working towards in all my voice students/clients. I think there some legitimacy to the narrative that texting/chatting is has a potentially negative impact on our speech (especially if these young thangs are trying to work with something as challenging as heightened text). However, it’s important to also see that people are using also technology to explore intonation and other verbal nuance. They are finding ways to put that shit back in. The reference to extra vowels in texting is a great way to practice vowel explorations with students. Some of them might even benefit from examples or seeing them typed out. Henry Giroux encourages teachers to include popular culture (like texting) within a student’s learning experience. He warns, “By ignoring the cultural and social forms that are both authorized by youth and simultaneously serve to empower to disempower them, educators run the risk of complicity in silencing and negating their students. This is unwittingly accomplished by educators’ refusing to recognize the important of these sites and social practices outside of schools that actively shape student experiences and through which students often define and construct their sense of identity, politics, and culture. The issue at stake is not one of relevance but of empowerment.” (2005, 159) I’m aware of the implications of my point here. It might sound a bit dramatic to equate the poo-pooing of texting to the disempowerment of students. But if texting and chatting is something I do all the time and is embedded within my view and experience of popular culture, I might be more motivated to learn voice work if the teacher is finding positive examples within said popular culture example. Doll’s article is a nice reminder that there are such positive and dimensional things about our interactions with speech and technology and that our spoken cultural norms continue to evolve as a result. Yesssssssssss! Why blog? After 2 decades of playing Puerto Ricans and Mexicans, my first role as a Korean-American. photo by Jeanne Modderman I’ve started this blog for a number of reasons. 1. I like to share stuff. Like good poems. And avocado recipes. 2. After years of collecting internet bits and bobs, it will be helpful for my research for me to have them all in one place. 3. Talking about race, identity, and privilege is hard. There is still an outdated belief that if you bring these things up, you are racist yourself. So instead, as educators and those working in the theatre industry, we stay silent, we don’t engage. If we are teaching our students to use their literal and figurative voices, shouldn’t we be using ours to pursue our epistemological curiosities? 4. I’ve found that teachers and those in the creative arts can actually be the most resistant to examining privilege in their own practice. Working in theatre or working in higher education can give someone a grand sense of progressiveness that can convince us that we are the ‘good guys’ when it comes to horrible things like cultural marginalization. After all, we are smart and we are artsy! I’ve been guilty of this in the past, myself. This can be incredibly insidious and therefore, much harder to address and examine. I hope that some readers will be able to reflect on their own practice within some of the contexts I present or in light of some of the questions I raise. And I invite you to engage and call me on my own bullshit. Because this is still a process for me, and I openly and happily admit that I know very, very little. 5. If I am to support and nurture my students in a way that encourages them to use their own voices in a truthful way, I find it difficult to reconcile the fact that I must assimilate my own figurative voice for a still very conservative academic context. If I want to write for a journal or give a presentation, I often need to adhere to specific guidelines in order to legitimize myself academically (there are some enclaves of academics and creatives who are getting together to revolutionize this! More on that soon!) I know I’ll need to assimilate at times, but this blog allows me to write in a way that is free from such constrictions. And perhaps there I will be able to experiment with other ways to legitimately express oneself academically while still being creative, unconventional, and myself. 6. bell hooks was devastated when her White teachers told her that people who looked like her didn’t have much to offer when it came to good writing. I hope to post lots of amazing text, voicework, and poetry from all over the world. This begs the question, however, of cultural appropriation in our classrooms and when/how it is okay to use something from another place. I’m looking forward to this discussion! You will probably dig this blog if you: • are a voice teacher. Or if you just are interested in the voice. Or sociolinguistics. Or accents. I  will post loads of voicey things and good poems to use in your classes that are hopefully not mostly written by White, dead, men (maybe some, though. I do love me some Jack Gilbert. And he is newly dead, so). • are interested in exploring your own identity and relationship to privilege. • are an English language teacher and are concerned with your role within an international context. Are you empowering or disempowering your students by continuing to teach English as a tool for success? • are someone with a pluralistic background and are interested to see how identity and voice intersect. I’m interested in this myself. It’s pretty much my jam. • like interculturalism. Or if you really hate the term ‘interculturalism’ because it connotes that cultures can manifest some sort of authentic essentialism and borders (pssst: I don’t think they can). • are a pedagogue who is interested in ways to be more inclusive to diverse student bodies. • aren’t too easily offended. My household is full of New York/Glasgwegian cussin’. • like avocados as much as me. If that’s the case, we’re pretty much BFFs already. Soooooo enjoy. And engage. I’m looking forward to hearing from you.
Is nine years distant enough? The need to tackle climate change is urgent. Here in Britain, it is still seen by too many people as a rather distant concern – distant in terms of time, and distant geographically. But the effects of climate change are being felt right here, right now.” David Cameron, Change our political system and our lifestyles, Independent Online, 1.11.2005 To some, the threat of climate change seems to have gone away again. Last week former Chancellor and prominent climate change sceptic Lord Lawson condemned as “absurd” the pronouncement by Professor Dame Julia Slingo that there was a link between recent floods and climate change. By questioning the considered and informed opinion of the Met Office’s respected chief scientist, Lawson’s comments expose a fundamental problem with addressing climate change: it doesn’t fit with the political cycle. David Cameron has promised a return to dredging, despite the advice of the Environment Agency and others that this isn’t the answer. Many commentators have noted that this is simply a short term fix to wrestle control over an issue that was damaging the Government’s political credibility, a quick win to score the necessary political points to secure electoral victory in 2015. In contrast, spending money now on something that might not pay off for decades isn’t seen as a vote winner: we get all the pain now and none of the benefits. The conclusion? It’s better politically to offer “money no object” solutions to climate impacts rather than invest in longer term mitigation which won’t kick in until the coalition Government is but a distant memory. Time and tide wait for no man The need to adapt to our changing climate is clear. But so too should the need to mitigate, or limit, the extent of global warming in the future. The planet has warmed by just 0.85⁰C since 1880. The World Bank recently warned that we are at risk of increased damage from extreme weather, yet has also acknowledged that we are on a pathway that cannot exclude warming of 4⁰C. And that doesn’t mean that the impacts will be merely four times worse: the planet’s climate responds in non-linear ways to change and scientists predict that beyond a 2⁰C rise feedback loops could become established that lead to runaway processes – global warming will start to stoke itself. Mitigation means changing our behaviour, just as David Cameron urged back in those pre-elected days. But it’s not just about changing patterns of consumption, it’s about how we manage our land. This is where we think that trees have a vital role to play. Indeed, it was encouraging to hear Eric Pickles say that trees can be part of the solution. Is it possible he’s read our 2006 publication “Adapt or die”? “The diversity of our environment is a reflection of its health and pivotal to its proper functioning. Creating and restoring a more sympathetic landscape will improve the environmental services on which humankind depends and reduce the impacts of climate change for human society. Whilst we must embrace the knowledge we take from science and use judiciously the technology that will help our societies adapt to climate change, a greater respect for the lessons from the natural world can provide immediate and immeasurable benefits. “Experience from elsewhere in the world shows that when water catchments are denuded of their vegetation cover in winter through the intensification of land use, flash flooding and soil erosion is often the result.  By working with nature, adaptation attempts to reduce the frequency and intensity of these events for instance by planting woodland and re-creating grassland. Given the strong evidence from abroad, in a country with such low woodland cover as Britain it is indeed ironic and almost negligent that there is no research underway to investigate the potentially positive impacts of afforestation of water catchments and floodplain woodland in relieving flood risks and benefiting both wildlife and society.  “By reducing or avoiding those actions we know to cause jeopardy, and increasing or maintaining those which increase stability and well-being within the ecosystem, of which we are a part, and increase its ability to adapt to uncertain change. Adaptation should develop resilient natural systems that can absorb and respond to change. By making natural systems more resilient, not only will biodiversity gain but human society can also benefit from the ‘services’ which natural ecosystems provide such as flood relief, healthy soils, carbon pools and future sequestration, improved water quality and renewable natural resources.  Woodland, as the most widespread semi-natural habitat in the UK, is uniquely placed to act as a key component of a more sympathetic and receptive landscape for wildlife and the improvement of environmental services for society in the face of climate change.” Nick Atkinson, Senior Advisor About Kay Haw Assistant Conservation Adviser, Woodland Trust. Nature is my passion, especially woods and trees which are just amazing elements of life. One day (soon) I hope we humans learn to work in harmony with Mother Earth. This entry was posted in Climate Change and tagged , , , , , . Bookmark the permalink. 5 Responses to Is nine years distant enough? 1. Ash says: If we don’t adapt we will die along with our planet. Why keep spending money and focusing on schemes like HS2, or flights to Mars for that matter? Are those in charge afraid to stand up for straight-forward common sense? 2. Peter Kyte says: Perhaps if David Cameron was to spend the 50 billion, he is happy to spend on HS2, on proper flood defence and other extreme weather situations, we would not keep on getting caught out by our climate. 3. Vegetation holds the soil and absorbs water. When I studied geography at A-level we read about the effects of stripping trees etc in the USA . It is called the ‘Dust bowl’. 4. Derek West says: Nick Atkinson report is spot on,what a pity he is not environmental minister,Nuclear power is incredibly expensive and needs vast subsidies from the taxpayers,The changes the world needs to make for climate stability are at the moment not politicaly aceptable and the hard right will make sure they never are. 5. Ken Brown says: I don’t disagree for a moment with propositions about the importance of preserving and extending our woodlands as part of a strategy to combat climate change and for their intrinsic values. However, we have spent the last quarter of a century fiddling around with pseudo-solutions which have manifestly failed to work. If we are serious about climate change, we’d do well to remember that imminent catastrophe was once viewed as a matter that required a coordinated response by the state in the interests of the nation and the international community. While we all have our reservations about nuclear weapons, the US government’s Manhattan project at least illustrated the appropriate scale, urgency and sophistication of the response needed to the prospect of a nuclear armed Nazi state. Climate change is potentially even more dangerous than that. We urgently need government to establish an expert, independent commission to investigate solutions to climate change; a commission that would be free from manipulation by corporate lobbies demanding short term profits and politicians concerned about their short term prospects of reelection. This might appear to be a highly ambitious demand in an international culture that is so deeply contaminated by neo-liberal economic ideology but it is essential that such a key area of decision making should be rescued from the machinations of the ‘free market’. Carbon emissions are rising inexorably while we trash vast areas of our wildest countryside with wind turbines at huge and disproportionate expense to the poorest members of society. The European Commission is getting cold feet about the wholesale but ineffectual commitment to renewable energy; Germany, with its wall to wall wind turbines, is reintroducing coal-fired power stations in an attempt to stabilise a chaotic energy market and her carbon emissions recently increased by 2%. The effective solution is looking more and more like a switch to civil nuclear power – indeed, that is probably inevitable. And the delays in research and innovation caused by a ‘quick-fix’ scramble for wind power almost certainly mean that fracking for shale gas will be an intermediate means of reducing carbon output and ensuring that ‘the lights stay on’. Fortunately, the footprint of a fracking site is likely to be several hundred times smaller than that of a rash of wind farms with an equivalent power-output. But if nuclear is to be the long term future, and developments in India and China suggest it will be, it is vital that all options are considered dispassionately in the long term interests of the planet and that safer, cleaner technologies like the Thorium reactor are not sidelined by vested interests as once happened. Margaret Thatcher’s favourite nostrum was, ‘You can’t buck the market’. Well, we’ve spend 30 years not bucking the market and look where it’s got us! Time for democracy to reassert itself against the corporate world and act on behalf of all the people. You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
Why is the Ace of Spades Called the Death Card? People have associated this card with death for centuries, but why? During the Vietnam War, card decks like this one were used as a form of psychological warfare. Photo © Chris Raymond Every month, Ohio's Horseshoe Casino Cleveland uses and discards roughly 16,000 decks of playing cards, or more than 192,000 decks annually. Given that the estimated number of casinos in the U.S. exceeds 15,000, the number of decks of playing cards used each year in American casinos alone assumes mind-boggling proportions. Yet, whether you frequent the gaming tables in Cleveland, Las Vegas or elsewhere, you probably give little thought to the symbols and history associated with the playing cards in your hand. This article explores the symbolism and meaning behind the ace of spades, and explains why many people consider it the "death card." A Brief History of Playing Cards In order to understand why the ace of spades is considered the death card, it's necessary to know a little about the origin of playing cards and the symbols we generally take for granted. While the history of playing cards is somewhat clouded, it's generally accepted that the Chinese started using "paper dominoes" sometime in the 10th century in their recreational games. Eventually, trade spread from Central Asia westward, and imported playing cards appeared in Europe before the end of the 1400s. At that time, playing cards were handcrafted and individually hand painted, ensuring only royalty and the wealthy could afford them. But, in time, French manufacturers standardized the four playing-card suits, their shapes and their colors in order to make playing-card production easier and less expensive. This increased the widespread usage of playing cards throughout Europe, England and, ultimately, the British colonies in North America. Sometime around the start of the 19th century, Americans started producing their own playing cards and, over the years, continued to refine and standardize the decks. This included innovations such as rounding the corners to reduce wear and tear, and using varnish on the surfaces to make them easier to shuffle and increase durability, among other things. In 1867, three men founded a printing business in Cincinnati, Ohio, that would ultimately evolve into the United States Playing Card Company. Today, that company holds the number-one market position in terms of U.S. sales, and its Bicycle brand has become synonymous with playing cards. The Origin of the Ace of Spades as the Death Card As noted above, playing cards gradually evolved over time from the sets first developed by the Chinese in the 900s. As playing cards spread westward over the centuries, the look and depiction of the four card suits and face cards, among other things, were subject to individual, regional and cultural tastes and refinements. For instance, the Italians depicted the forerunner of the modern spade symbol as a sword, while playing cards produced in Germanic countries used a leaf standing on its stem for the same symbol/suit. In order to simplify the design of playing-card suits to aid in their mass-production, the French used the silhouette of the Germanic upturned leaf, which resembles the modern spade, but the spade symbol likely retained its association with war, killing and death. In Latin, the word spatha, the forerunner of the modern English word spade, means "broad, flat weapon or tool." In addition, the French referred to this suit as piques, meaning pikes. A pike was a two-handed stabbing weapon of warfare comprising a long wooden shaft topped by a flat, pointed blade. It's not difficult to see in our modern spade symbol the image of a pike blade. Just as linguistically significant, however, is the fact that a spade also refers to a type of shovel with a wide, flat, thin blade, often used to dig a grave. Even in today's era of mechanical excavators, spades are still used by cemetery workers to crisply cut the grave outline in sod and/or to finish the sides/floor of the grave. What forever sealed the association of the ace of spades as the "death card," however, occurred during the Vietnam War. According to the United States Playing Card Company (USPCC), a pair of American lieutenants serving overseas wrote the company in February 1966 and asked USPCC to send them entire decks consisting of the ace of spades. Allegedly, the Viet Cong feared this card because of the superstitions surrounding it as a harbinger of death. In addition, The Bicycle brand uses Lady Liberty within its ace of spades symbol, which the enemy also reportedly considered the "goddess of death." Similar to the deck shown in the photograph above, USPCC shipped thousands of these specialty decks overseas, where American troops used them as a form of psychological warfare against enemy forces in Vietnam. (The packaging housing each deck was even labeled: "Bicycle Secret Weapon.") Scattering these death cards in real or suspected hostile areas reportedly caused the Viet Cong to "flee." In addition, some American troops left a single ace of spades card on the body of an enemy kill as a calling card to indicate "We were here" or "We're coming for you" to inflict additional fear. You Might Also Enjoy: Death and Dying Superstitions Halloween Death Myths, Omens & Superstitions "Horseshoe Casino Cleveland will soon use pre-shuffled cards," by Karen Farkas, September 22, 2014. The Plain Dealer. Retrieved February 9, 2015. http://www.cleveland.com/casino/index.ssf/2014/09/horseshoe_casino_cleveland_wil.html "Statistics and facts about U.S. Casinos." www.statista.com. Retrieved February 9, 2015. http://www.statista.com/topics/1053/casinos "A Brief History of Playing Cards." www.bicyclecards.ca. Retrieved February 9, 2015. http://www.bicyclecards.ca/pages/playing_card_history/37.php "Jarden Overview and Performance," January 15, 2015. "Investor Presentation January 2015." Retrieved February 10, 2015. http://www.jarden.com/for-investors/events-presentations "spade (n.2)." Online Etymology Dictionary. Retrieved February 10, 2015. http://www.etymonline.com/index.php?term=spade "Man with the special spade is Gravedigger of the Year," by Pete Hughes, September 20, 2014. Oxford Mail. Retrieved February 10, 2015. http://www.oxfordmail.co.uk/news/11485923.Man_with_the_special_spade_is_Gravedigger_of_the_Year "The History of Bicycle Cards." www.bicyclecards.com. Retrieved February 10, 2015. http://www.bicyclecards.com/about/bicycle-cards Continue Reading
1840 Arrival In 1840 John and Elizabeth Maynard made the three month long and difficult journey from the Port of Chatham, Kent, United Kingdom across the seas to arrive in the early settlement of Adelaide, South Australia. In 1840, the colony was only four years old and as there was no shipping wharf, John & Elizabeth arrived via Holdfast Bay, Glenelg, having to wade ashore. There was no one to greet them, and one would think at the time that this would be a tough country to live in. Once ashore, John and Elizabeth had to travel the seven miles (11.26 km’s) from the area now known as Glenelg to the new settlement of Adelaide. It is thought that it would have followed a route similar to where ANZAC Highway is today. In 1840, there was no tram line, just barely a dirt track. John and Elizabeth lived on Hindley Street, when they first arrived, however eventually moved to the now suburb of Beaumont and subsequently migrated and were instrumental in being the first settlers of Clare, South Australia. Photo courtesy Clare National Trust Through their large family, there are an estimated 10,000 relatives alive today and very proud of what John & Elizabeth Maynard sacrificed to come and settle in South Australia. This is a very broad and brief history of the endeavors that John & Elizabeth Maynard had to confront moving from one side of the world to South Australia, and one of the reasons they made the journey was because it was near impossible for a working man or woman to become a land owner in their home country. Here at 1840 Real Estate, we would like to assist in making that dream come true for all! Thank you to Leonie Kohlhagen of ‘Of Maynards Past and Present’.
War 1939-45 War 1939-45 In 1942, Bougainville was occupied by the Japanese, and was used as a base to attack Guadalcanal and other Allied territory.The 3rd Marine Division landed on the west coast of Bougainville in November 1943, and shortly afterwards the Battle of Empress Augusta Bay was fought between cruisers and destroyers of the U.S. Navy and the Imperial Japanese Navy The Americans routed the Japanese and were never bothered again in this area by the I.J.N.It took a concerted Allied land offensive between November 1943 and April 1944 to occupy and hold the part of the island along the western shore in an area called “Torokina”.The Americans set about establishing a wide defensive perimeter, draining swamps, and building multiple airfields for defense, and for attacking the Japanese on New Britain Island. The Marines were replaced by US Army troops. The Japanese infiltrated the mountains and jungles of Bougainville, and launched a counteroffensive against the Americans in 1944. The critical focus of their attack was at a place called “Hellsapoppin Ridge” by the Americans. In repulsing this attack, the American soldiers and airmen broke the back of the Japanese Army on Bougainville. The survivors retreated to their bases on northern and southern Bougainville, and the Americans left them to “wither on the vine” for the remainder of the war. During the 1943-45 period, more than 17,500 Japanese soldiers were either killed in combat, died of disease, or died of malnutrition . In 1945, the Australian Army took over occupation from the Americans, and Australia resumed control of Bougainville and Papua New Guinea, which became a United Nations trusteeship. The remaining Japanese on Bougainville refused to surrender, but rather held out until the surrender of the Japanese Empire on 2 September 1945. They were then commanded by the Emperor to surrender to the Allied Australians, Americans, and New Zealanders, and they were then repatriated to Japan. Japanese Admiral Yamamotos Plane Crash Site Torokina WWII Sites Torokina, on the West Coast of Bougainville is the site of important invasions and land and sea battles between Allied and Japanese Forces. You can find a lot of WWII relics here including unexploded ordinances.There is an airstrip here and much of the road network built during WWII is still intact. Torokina was also famous in pre-crisis days for the heavy surf that could be found there. To get to Torokina you can organize a charter boat in Buka. Little Tokyo Little Tokyo is an underground military base that the Japanese Forces, who held Bougainville for much of World War II, wanted to resettle a larger number of civilian Japanese at. According to the locals the big white bunkers are all now covered in very thick jungle and it looks like a place that time forgot. Little Tokyo can be accessed via Buin, South Bougainville. Nissan Island For War buffs, this island 100 km north of Buka has an American WWII airstrip and other relics including a WW2 swimming pool. There is a guest house there. You can hire a speed boat or catch one of the regular shipping boats that travel out that way. If I was you, time your visit well, hire a speed boat out there and catch the regular ship back. You can do this for Catarats as well. Read, Mason, Tashiro and the Bougainville mystery: Ken Wright During World War 2, two  groups of Australian Coast Watchers operating independently of each other  played a decisive part in the battle for Guadalcanal  and the subsequent Allied advance through the South Pacific. The first group  was led by W.J. [Jack] Read, an assistant district officer from near Buka  Passage, a one kilometre wide sea passage separating the islands of Buka and  Bougainville. The second group was led by Paul E. Mason, the Inus plantation manager  75 kilometres North West of Kieta in Bougainville. The concept of the Coast Watchers originally began in 1919  when selected personnel were organised on a voluntary basis to report in time  of war any unusual or suspicious events along the Australian coastline. This  concept was quickly extended to include New   Guinea [not Dutch New Guinea] as well as Papua and the Solomon Islands.  In 1939 when World War 2 commenced, approximately 800 Coast Watchers came under  the control of the Royal Australian Navy Intelligence Division. Lieutenant  Commander Eric Feldt had operational control of the Coast Watchers in the north  eastern area of defence which encompassed the Australian  Mandated Territories,  Papua, the Solomon Islands  and Australia. While negotiations to avoid a possible war in the Pacific  were taking place on 7 December    1941 between Japanese and American diplomats, Vice Admiral  Chuichi Nagumo launched, without an official declaration of war, a carefully  planned and well executed surprise attack on the American naval base at Pearl  Harbor in Hawaii.  Planes from the aircraft carriers Akagi, Kaga, Koryu, Hiryu, Shokaku and Zuikaku killed 2,350 Americans and severely crippled the US fleet. President Roosevelt told  a stunned congress December 7 was ‘a  date which will live in infamy.’ The next morning, the Japanese attacked Malaya but this was  before the attack on Pearl   Harbour because of the  International Dateline. The Emperor’s Imperial troops then invaded Hong Kong,  the Philippines  and continued sweeping all before them. Guam, Wake Island, the Netherlands East  Indies, Rabaul, Malaya and Singapore,  the colonial jewel of the British Empire. An  enemy had arrived on Australia’s  doorstep and the country was now at war with both Germany  and Japan. Rabaul was the peace-time capital of the mandated Australian Territory  of New Guinea.  The 2/22 Battalion of about 900 men and 38 officers which formed the bulk of  Lark Force had arrived on Anzac Day 1941. By December this number had increased  to about 1,400 and was tasked with the impossible job of defending the capital.  When the Japanese attacked Rabaul on 23 January 1942, the small garrison was overwhelmed and within  hours Rabaul was under Japanese control. The Japanese made a public  announcement of the capture of Rabaul on the afternoon of  24 January. It  was now up to the Coast Watchers plus the Independent Company men on  Bougainville, the Government officers transferred into ANGAU (Australian New  Guinea Administrative Unit), the New Guinea Volunteer Rifles (who were doing much  of the monitoring of the Japanese in Lae and Salamaua) to be the eyes and ears  of the Allies. Another group of ‘spotters’ [New Guinea Air Warning Wireless  Company] also stayed. Keith McCarthy, Alan Timperley and Ivan Champion and  others who did so much to report what had happened after the fall of Rabaul and  rescue the remnants of Lark Force were all pre-war field officers of Papua and New Guinea.  The spotters had posts at Kokoda (from about February 1942), on the north coast  of Papua, and in the Milne   Bay Islands.  They alerted Moresby to incoming aircraft and the landings at Buna and Gona. The 1st Independent Company was Australia’s first experimentation  into British style commando operations. After initial training at Wilson’s Promontory on Victoria’s  rugged coastline, they arrived at Kavieng in New Ireland  on 24 July 1941.  Between August and October, certain sections were reassigned to strategic  locations on Manus Island, Tulagi Vila and Buka before the war with Japan  began. No 3 section, comprising 25 men commanded by Lieutenant Jack Mackie, arrived on Buka Island on 4 October but the  group were reassigned to Bougainville to help the Coast Watchers in their role  after the Japanese attacked Kavieng on 23 January 1942. [2] Early in July 1942 information about the construction of a  large Japanese airstrip taking place on the island  of Guadalcanal hurried the American  amphibious move into the southern Solomons and, on 7 August, American forces totalling  19,000 mostly the 1st Marine  Division, began landing on Guadalcanal and  nearby Tulagi. The small Japanese garrison of 2,200 on Guadalcanal  and 1,500 on Tulagi were taken completely by surprise and quickly scattered. In  the days following the landings, Japanese air attacks severely interfered with  the unloading of supplies. To make matters worse, the Japanese achieved a  stunning naval victory off Savo Island in the southern Solomon Islands during the early  morning of 9 August. A group of powerful Allied cruisers was almost annihilated  by a Japanese force obliged to travel hundreds of miles through waters that  were patrolled by Allied reconnaissance aircraft. Given the air strength  available to the Allies due to the presence of American aircraft carriers it  was amazing that the Japanese were able to escape after the battle almost  unscathed leaving more than  1000 dead or missing Allied seamen in their wake. This defeat caused the American Admirals Fletcher and Turner  to withdraw their forces leaving the Marines ashore on both Guadalcanal  and Tulagi short of supplies and isolated. American engineers rushed to  complete the partially constructed Japanese airfield now renamed Henderson  Field and as soon as the airfield was completed, a squadron of 31 Marine aircraft  arrived to provide direct support and air cover. Towards the end of August aircraft  strength on Henderson  field had been increased to almost 100. Throughout the island, clashes between American and Japanese  patrols became more frequent and intensive as Japanese reinforcements and  supplies began to arrive on Guadalcanal via the  ‘Tokyo Express.’ This term was used by the Americans to describe the nightly  runs by Japanese destroyers and light cruisers down the ‘slot,’ [the channel  between the north-eastern and south-western chains of Solomon Islands] With the  Americans also pouring men and supplies onto the island, the fighting on Guadalcanal escalated from short sharp exchanges between  each others patrols into a larger vicious and hard fought battle for the control  of what was now a strategically important island for both sides. To the  Japanese, Guadalcanal was ‘Jigoku no shima’ [hells island] and to  the Americans it was, ‘our time in hell’. Slowly, the American forces gained more and more ground wearing the Japanese forces  down. By the end of October, a large Japanese naval force had  assembled in the Caroline Islands and began moving to launch a massive counter-attack  to retake Guadalcanal from the Americans. On the  southern coast of Bougainville, the two groups of Australian  Coast Watchers led by Read and Mason  independently radioed early warnings to the United States Navy of a number of Japanese warship and  aircraft movements enroute possibly towards Guadalcanal. Read from his position inland reported twelve large  passenger ships, each over 10,000 tons headed south-east. Mason, from his  position at the southern end of Bougainville on  10 November 1942,  reported the passage of sixty one ships comprising six assorted class cruisers,  two sloops, thirty three destroyers, seventeen cargo, two tankers and one  passenger liner of 8,000 tons. Forewarned by these reports, the US forces  launched air and sea strikes against the enemy shipping resulting in a major  defeat for the Japanese and shattered any hope of their retaking Guadalcanal. Now unable to resupply their forces, Japanese high ranking  army and navy staff from the Imperial General Headquarters conceded that they  had no hope of winning this particular battle and proposed Guadalcanal  be abandoned and a new defensive line be established in the central Solomons. Emperor  Hirohito gave permission for his troops to withdraw and, from 31 December, the  Japanese began gradually withdrawing from the contest as to who owned the  island and began evacuating their remaining forces from the island which they  completed by early February 1943. As  soon as it was confirmed the Japanese had left, US forces began preparations to  continue their move slowly northwards towards Tokyo. It had taken a little over 6 months of  vicious bloody fighting before the Americans were finally able to call the  island theirs. Most American military historians write about Guadalcanal as  a victory due to the tenacity and bravery of American soldiers, sailors and  airmen which of course it was, but very rarely do they mention that it was the  vital contribution of the Australian Coast Watchers  which made the victory possible. Fortunately  for recorded history, the Australians were paid a high tribute when the United  States Admiral of the Fleet, William. F. Halsey Jr, said: ‘The Coast watchers saved Guadalcanal and Guadalcanal  saved the South Pacific.’  Additional  praise was sent by other important American military commanders. On Saturday 3 April 1943, copies  of congratulatory messages from Guadalcanal were  sent to the Coastwatchers: ‘Have much  pleasure relaying these to messages to Coastwatchers also thanking you on  behalf of Naval Intelligence. Keep up the good work.’ From Admiral Turner,  US Navy: ‘Large share credit our success  against enemy due to splendid men in Coast watching service.’ From General  Patch US Army: ‘Your magnificent and  courageous work has contributed in great measure success of operation on Guadalcanal.’ With just these four congratulatory  messages alone, there is no historical excuse not to give credit where credit  is due. One significant effect of the fighting on Guadalcanal was  that it committed and then destroyed troops, aircraft and ships that would  otherwise have been used in the Kokoda and Milne Bay  campaigns. A very vital factor that allowed the Coast Watchers to operate throughout  the Pacific was the cooperation of the local people. It would have been almost  impossible for the Coast Watching operations to have started, let alone continued,  without their cooperation. As the influence of the victorious Japanese military  spread throughout the islands, the Japanese exploited conflicts that began  between the natives who enthusiastically or reluctantly supported the Japanese  and those who remained loyal to the Allies. By December 1942, the Japanese in  the southern part of Bougainville in the Buin/Kahili area began applying  pressure on the Bougainvillians to disclose the whereabouts of the Australians  they knew were somewhere on Bougainville. Propaganda  was spread amongst the natives telling them that Nippon was now the new government  and they would receive many good things if they cooperated but if they didn’t  help the ‘man bilong Japan’ they  would be killed. As a result, an ever-increasing number of natives, either out  of fear or willingly, became pro-Japanese creating an increasingly hostile  environment for the Coast Watchers to operate in. One prime example is that of the  tribal Chief of Sadi, a coastal village, who began fully cooperating with the  Japanese.  Members of his tribe were  given arms and ammunition to hunt down the Australians. In the southern part of  Bougainville, the people remained friendly  until Kieta, the capital, was occupied by the Japanese on 18 February 1943 and the problem of allegiances  began to appear there too. Old feuds were an additional factor that caused  friction between the various tribes choosing sides and were used as an excuse  to fight each other. In this time of tribal conflict and divided loyalties, one  organised group of pro-Japanese natives known as the ‘Black Dogs’ chased the  Coastwatchers and over an extended period of time, murdered, raped, pillaged  and burnt the villages of those who assisted the Australians. Mentioned very  briefly in several books on the subject of Coastwatchers, a Japanese civilian  named Tashiro was reputed to have established and controlled the Black Dogs. [1] During this turbulent time, Coast Watcher Jack Read had attempted  to assure the natives on Bougainville the Allies would be back to liberate them  but the Japanese had been in control for quite a while and there were still no  signs of the Allies returning. Tashiro, who would have been under the minsei-bu commander—officer in charge of civil affairs in Rabaul—began a propaganda  campaign to ensure the natives continued to join the Japanese. Part of his  campaign was to convince the natives that the old days were gone forever and  pointed out the number of Japanese airfields and bases that were expanding on  the island. With his argument, he mixed in allusions to past white exploitation  which had some basis of truth and the more he talked, the more the natives  listened. It was not only the pro-Japanese natives that Coast Watchers  had to contend with. Religious missionaries were originally approached to  become Coast Watchers and one assumes that for religious and ethical reasons most  declined. Overall, most missionaries either attempted to stay neutral or  supported the Allies and some were executed for their real or imaginary Allied support.  Many Lutheran and Roman Catholic missionaries at the time were German and, as  the Allies were at war with Germany,  their loyalty was naturally to the Fatherland. Some German missionaries were  interned and some of them were members of the Nazi party. But others, such as  Franke on New Britain,  risked their lives for Australians. On Bougainville  the Catholic mission was Marist and the Bishop was American (14 of the staff  were American in 1939). There were French (the most numerous), Germans, a few  Australians, a Belgian and a couple from Luxembourg.  At least one German Roman Catholic missionary  in the Sepik District region [Aitape-Wewak] in New Guinea is known to have  actively worked with the Japanese and had his native staff searching for  Australians working behind Japanese lines. One of the native ‘catechists’ as  the converted natives were called working for this priest was summarily  executed by a member of the ANGAU operating in the Aitape hinterland behind the  Japanese lines. There may have been many unrecorded deaths of this type. One such  execution was carried out by 3 section of the 1st Independent  Company. A native who had led the Japanese to their camp had been caught. He  was killed and the village   of Kiveri where he had  come from was burnt to the ground as a warning to others not to spy or work for  the Japanese. [3] Who was this mysterious Japanese civilian who was alleged to  be stirring up the natives and giving the Coast Watchers and members of No 3  section headaches? He deserves a little more attention than just a mere line or  two in a few books about the Coast Watchers. Tashiro Tsunesuke [the Japanese put  the family name first] had migrated to Rabaul in 1917 at aged 16 to trade in  Copra and engage in coastal transport. On Bougainville,  he had been a popular trochus sheller and trader. In March 1941 he went back to  Japan  on a business trip aboard the last liner prior to the outbreak of war between  the Japanese and the Allies. He was conscripted 13 December to serve in the  navy as a gunzoku [civilian] in the  Japanese Navy Civil Administration at a time when the navy was recruiting  Japanese civilians who had experience in the South Seas.  Tashiro returned to Rabaul with the Japanese forces on 23 January 1942 assigned to the 8th  Base Force which controlled operations in New Guinea from Rabaul. As the Japanese navy had very little knowledge of New Guinea,  Tashiro was placed under the command of the minsei-bu where he became a political officer working mainly as an interpreter as he  spoke fluent English and Pidgin English. He was very valuable for his local  knowledge and ability to engage in tasks such as investigating construction  sites for airstrips, recruiting native labour, gaining the co-operation of the  natives as guides for the Japanese forces and having them report any enemy  movements as well as placating the local people. Tashiro worked hard for the  Japanese Navy in Milne Bay, Nakanai, Talasea, Rabaul, Bougainville  and Manus but whilst carrying out his duties he may have been torn between  loyalty to his country and his long standing friendship with the people in the area  who he had known before the war. He always cherished his relationship with  them. [4] Tashiro came to Bougainville  possibly in February 1943 on  orders from the Commander of the 1st Naval Force located in the  Burns Philp building in Kieta. He was assigned to 1 Base Force to work with  Petty Officer Harada who was in charge of the propaganda department which  included the Native Pacification Section dealing with natives and information. Tashiro’s  assignment was to assemble natives for the enlargement of the Buin airstrip and  assist Harada with propaganda duties. Harada spoke English and a simple version  of Pigin English and was responsible for investigating any anti-Japanese  activities on Bougainville. Any suspects were  brought to him for questioning. Harada told Tashiro that there were some Europeans  [Australians] with a wireless set hiding in the mountains and that a Mr Mason  commanded the party. Possibly on orders from the Kieta Commanding officer, Harada  had a native chief from Kuromira executed for warning the Europeans hiding in  the hills that a Japanese force was on their way to capture them. [5] Paul Mason and Tashiro had been friends before the war and,  even though Tashiro knew Mason had become an enemy spy, he was never too  serious about interfering with Mason’s activities although he knew was operating in  the area. With Tashiro’s local contacts, expertise in dealing with the natives  and the pro-Japanese loyalties of many of the tribes, he could have caught  Mason had he really wanted to do so. Nor was there any real effort at the time by  the Japanese to round up civilians or the 25 commandos of the 1st  Independent Company under Lt Mackie who were still on Bougainville.  Perhaps the reason for their half hearted attempts was that the Japanese failed  to make a connection between their losses at Guadalcanal  and the presence of the Coast Watchers. As the war progressed, Mason and Read continued reporting  enemy ships and aircraft that were enroute to the Solomon Islands but now Japanese  pressure increased on the two Coast Watchers’ activities. Jack Read after the  war wrote; ‘By early 1943, Guadalcanal  had been won back and the Japs in Bougainville  knew that an American attack was on the way. Tashiro addressed a huge native  congregation at Buka Passage including some of my undercover scouts among them.  In effect Tashiro said that they were expecting to come under American attack  shortly and the Japanese forces may have to retire temporarily but that they  would be back. He said they were digging slit-trenches away from the village to  avoid any bombings. He urged the natives that it was not their war and that is  was one between the Japanese and the Americans and to stay out of it. He did  however, ask the natives to warn the Japanese if they saw any ships  approaching.’ Mason made a reference to the marauding bands of Black Dogs  that were now harassing both the Coast watchers and villages that assisted  them. Most of these natives came from coastal areas of which many were  pro-Japanese. He said, ‘It appeared to be  Tashiro’s method of getting the natives to plunder or kill or rape so as to get  them so they are afraid to come over to our side for fear of punishment.’ The harassment of the Coast Watchers by the Black Dogs has also  been attributed to Tashiro by Lt Commander Feldt in his excellent book about  Coast Watching but there is no positive proof of Tashiro’s actual involvement  with these renegade natives. There is a possibility that Petty Officer Harada  was, in fact, the man responsible for the creation and use of the Black Dogs to  pacify the area. Nothing was known at the time about Harada and Feldt and other  historians may have mistakenly associated Tashiro with the Black Dogs simply  because he was well known in the area and in an excellent position to influence  the natives. Another possibility is that Harada was a member the Tokkei-Tai, the  Navy secret police which was the Navy’s version of the infamous Kempei-Tai. [6] The Tokkei-Tai was attached to Navy units and  served as Colonial police in some Pacific areas. They were responsible for  recovering and analysing information and for the execution of undercover  operations. It is known that one of Harada’s assignments was to recruit natives  to help him track down and eliminate all anti Japanese elements and even Tashiro  himself stated he was deeply impressed with Harada’s detailed knowledge of the  operations of the Europeans on Bougainville. By early June, the positions of both Mason and Read  on Bougainville were becoming too precarious. So much so  that on the 25 June 1943,  Read signalled Naval Intelligence in Australia; ‘My duty to report that position all here vitally serious. After  fifteen months occupation almost whole island now pro-Japanese. Initial enemy  patrols plus hordes of pro-Japanese natives have completely disorganised us.  Position will not ease. Believe no hope reorganise. Our intelligence value nil.  In last fortnight all parties have been either attacked or forced to quit.  Reluctantly urge immediate evacuation.’ In two subsequent rescues, the  United States Navy submarine, USS Guardfish, on the night of 24 July, took on board 62 assorted military,  Chinese and native personnel  [including  Lt Paul Mason] and trans-shipped them to the waiting US  Naval submarine chaser SS 761 which transported them  to American occupied Guadalcanal. Four days later USS Guardfish returned and picked up Lt  Read, Captain E.D. Robinson, AIF,  who had arrived with reinforcements on 29 April 1943, and 22 natives.  [One of the ‘natives’ was the Fijian Methodist  missionary Usaia Sotutu. Read wrote strong praise of him and recommended him  for a medal] This was the last party to leave Bougainville and again they were  trans-shipped to the sub chaser for the journey to Guadalcanal.  [7] When  the members of 3 section under Corporal Don McLean arrived at Lunga on Guadalcanal they were summoned to be paraded before US General Alexander Patch. They looked a  motley crew but had to parade anyway. The General was late but addressed the men  ‘Gentlemen, on behalf of the American nation and my self personally, I wish to  thank you. For without your information from Bougainville, this [Guadalcanal campaign] would have been a much longer and  bloodier business. Gentlemen, I wished to give you all you men on Bougainville a decoration, but your government would not  permit me.’ After the war ended and the Japanese surrender, there were 807  alleged Japanese B and C class war criminals tried for war crimes in trials  conducted by Australian military courts between 30 November 1945 and 9 April 1951. The trials were conducted  at eight venues, Labuan, Wewak, Morotai, Darwin,  Singapore, Hong Kong, Manus Island  and Rabaul. Of those charged 579 were found guilty on one or more charges and  137 were sentenced to death and executed. In Rabaul, Tashiro Tsunesuke who had  been in Australian custody for some months was one of those placed on trial for  committing a war crime. He was charged under the heading Violation of the Laws  and Usages of War, and the charge was that at Kieta-Soloman Islands in or about  the month of March 1943 he ill treated Kerosin, a native resident of Buka  Island by beating him with his fists and an axe handle. Strangely, the  complaint by Kerosin was made one year after the war was over. Robert Stewart was a plantation owner on Bougainville  and Kerosin was Stewart’s ‘boss boy’ who had remained on Stewart’s ‘Tenakau’ plantation  after Stewart went into the mountains to escape the Japanese. [8] Kerosin bravely remained in contact with  Stewart reporting any Japanese activities. Knowing that the Japanese forces  were asking the whereabouts of ‘Europeans’ renegade natives from the village of  Muk Muk captured Kerosin and took him to  the Japanese HQ in Kieta. Kerosin was able to escape and avoiding contact with  any other natives eventually made it to Coast Watcher Jack Read’s camp where  Stewart was hiding at the time. [9] Kerosin told Stewart that he was questioned by Tashiro as to  his [Stewart’s] whereabouts and that he had answered that he didn’t know. He  said that Tashiro had him tied to a verandah post and had beaten him for a  number of days with his fists and an axe handle. When the beatings didn’t work,  he was told he would be executed. [10] Much later, Read questioned Kerosin about the alleged beatings  and was told that he was taken to Kieta and placed in a shed, had his wrists  tied together and a guard placed outside. Every morning he was taken before  Tashiro and asked to lead him to where Stewart was hiding. Each time he refused.  Finally after a week of this, Tashiro one morning told him that he would be  executed the next day and personally took him back to the shed and tied his  wrists. Kerosin said he later managed to untie his wrists, found the usual  guard was not outside and escaped. Kerosin also admitted to Read that he was  never beaten by Tashiro or any other Japanese. Read wrote after the war that it  was his personal opinion that Tashiro  may have actually assisted Kerosin to escape but if Tashiro had actually caught  Stewart then the events may have taken a different turn as both Tashiro and  Stewart were business rivals before the war and there was an ongoing feud  between them both. [11] During the trial, which took place in Rabaul from 7 to 16 July  1947, evidence showed that the defendant Tashiro did all he could to protect  natives and Europeans from ill treatment by the occupying Japanese forces. In  Rabaul, he protected the interests of the mixed races and the Chinese. Jack Read wrote in a letter to the Commandant, Headquarters  8th Military District a character reference for Tashiro on 7 July.  He said in part; ‘The defendant Tashiro  had assembled the village chiefs of the Buka Passage area and addressed them  regarding the leaking of information by them to the Allies. He warned them to  keep clear of Japanese installations and specifically mentioned that as the war  was not theirs they should adopt a neutral attitude. Tashiro’s urging of native  neutrality must be regarded very significantly in the assessment of his  character. In Bougainville before the war,  Tashiro enjoyed widespread good repute amongst both the natives and European  residents. Most incidences which occurred in the Bougainville area during  1942-43 were known to me and that I was not aware of anything attributable to  Tashiro which fell beyond the normal scope of war.’ Another of the many character references submitted by  Tashiro’s defence counsel at the trial was a letter from the Catholic Vicar  Apostolic of Rabaul, Bishop Leo Scharmach, which was dated 16 July. In part,  the letter stated; he [Tashiro] in contrast to many other Japanese was  decidedly friendly and courteous. The missionaries who had to deal with Tashiro  indicated that he never ill treated the natives and that he handled the natives  with firmness and justice even those who, from his point of view, were  rebellious. In December, 1942, Father Franke at the mission in Bitokara in the district of Talasea had extended all  assistance and hospitality in his power to a group of Australian troops for  about 3 weeks. When the Japanese forces arrived at the mission, the  Australians had just left two days beforehand but a native traitor told the  Japanese of Father Franke’s assistance to the Australians. Fortunately, Tashiro  was amongst the Japanese troops and he used all his influence to stop Father  Franke being executed for aiding the enemy. The Japanese Officer in Charge was  so impressed by Tashiro’s explanation about Father Franke’s actions that he  completely exonerated the good Father. Also included in the Vicar Apostolic’s  letter was statement by Bishop Wade [US citizen] of the Northern  Solomon’s that; ‘Tashiro was of the  greatest service to him during the Japanese occupation.’ Based on the evidence given by Kerosin and other witnesses  both for and against the defendant, the court found Tashiro guilty and sentenced  him to 10 years in prison. The question that has to be asked is not so much whether  Tashiro was guilty or not of beating Kerosin, but why the sentence was so manifestly  excessive for ‘ill treatment’. Other Japanese had been tried for torture,  whippings, beatings, failure to provide medical care and treatment, food and so  on, and many  received only 1 to 3 months in addition to the time they had already  spent in Australian custody. [12] In the  transcripts of his trial there is no mention whatsoever of his involvement with  the Black Dogs nor was there was there any evidence presented of spying  activities by Tashiro. The prosecuting officer, possibly trying to influence  the court early in his cross examination, did ask Tashiro if he had been a  Japanese agent spying in the Bougainville and Rabaul area. Tashiro denied the  accusation. Both Read and Mason were of the opinion that Tashiro was some sort  of Intelligence agent prior to the war but nothing has been proven to date as  to whether or not he was engaged in intelligence work. The Judge–Advocate General reviewed the trial proceedings  and the petition for a sentence reduction in light of the accused character  references on 28 October   1947. He observed that while there was evidence before the court  from which the court could have arrived at the finding of guilty and while it  was not his ‘province’ to substitute his own   mind for that of the court, he could not help ‘avoid expressing the  view’ that he would ‘not have found the accused guilty on the evidence.’ [11] So why was the court so heavy handed with the Tashiro’s  sentence? Was Kerosin telling the truth or was there a hidden agenda behind the  allegations he made 12 months after the war was over. He was extremely loyal to  Stewart and may have thought removing Tashiro was a good move in case he came  back and the business rivalry began again. Although only conjecture, there are two possible  explanations as to why the court took the action it did. The first is that with  the memory of Japanese war atrocities still raw in the public memory, the court  may have been under pressure from the press and the public for not being harsh  enough with the prison sentences being given to Japanese war criminals and Tashiro  was simply an unfortunate victim of that public pressure. In fairness this  public pressure could be equally applied to those Japanese given more lenient  treatment. Secondly, the complaint of the ill treatment of Kerosin may have  been a very convenient way to punish Tashiro for other crimes that the  authorities did not have sufficient evidence to charge him with. After Tashiro  had been sentenced, there were moves based on Tashiro’s character references to  have his jail term reduced. Not everyone agreed with any sentence reduction. In early January 1948, the Director of Prisoners of War and  Internees wrote in part; ‘With reference  to the accused’s character, he is strongly suspected of being involved in other  war crimes and has been interrogated on numerous occasions but so far by  evasions and denials and lack of corroborative evidence, no case has been  established against him. These other crimes generally deal with the disappearance  of several civilians and servicemen from the Rabaul area during the Japanese  occupation and in this connection Mr J.H. Ellis, a recovered internee from the  Rabaul areas has stated; “Tashiro would be sure to know many of the untold  stories with regard to murders and atrocities committed on both Allied civilian  and service person in the Rabaul area from Japanese occupation date to the  Allied re-occupation date, because, apart from the fact he arrived in Rabaul  after with the initial landing force on 23 January 1942 and with the exception  of various trips to the Solomon’s area, Bougainville, New Ireland and  surrounding districts, was in Rabaul continuously. He was attached to the  Japanese Civil Administration under Naval direction and was very close to all  the information which was going on in war time.’ I recommend that the sentence  of a court should not be lightly interfered with and that this sentence should  be confirmed.” The Head of the Catholic Sacred Heart Mission in Kokopo in New Britain, Bishop  Schumach, visited Read and said he had heard of the controversy associated with  the Tashiro case and said he was contemplating getting the case reopened. Would  Read be prepared to come forward and give evidence? Read told the Bishop that he  would be prepared to tell all he knew on the matter. Some time later, the  Bishop wrote to Read saying that the sentence had been reduced and he  considered it now inadvisable to proceed with reopening the case. Tashiro’s sentence  had been reduced to 5 years on 13   January 1948. Jack Read met a mutual Bougainville  friend Fred Archer after the war crimes trials were over and in conversation  Archer said that he had met a Colonel Smith who was on the war crimes trial of  Tashiro and had boasted of having gaoled Tashiro. Archer also met Captain Watt,  who was also present at the trial, who had said that it was his opinion that a  great injustice had been inflicted on Tashiro. [13] Most Japanese who were sentenced to terms of imprisonment by  the Australian War Crimes Tribunal served their time initially in the Number  One Australian War Criminals Compound in Rabaul. They were later transferred to  Manus Island and used as labour to clean up  war damage and restore the island to some resemblance of its original condition.  Tashiro was repatriated to Japan  in February 1952 while on 11 July 1953 the remaining prisoners  embarked on the SS Hakuryu Maru and were returned to Japan.  There they were to serve the remainder of their sentences in Sugamo prison near  Tokyo in an  agreement between the Australian and Japanese governments. As for Tashiro,  there remains the question based on available documentation, as to his actual  innocence or guilt for the crime he was charged with or the crimes he was suspected  to have committed will most likely never be known. Perhaps the final summary of the Tashiro affair comes from Jack  Read who once said that he received communications passed via natives from  village to village from a Japanese ‘officer’ whom he knew pre-war guaranteeing  him safe conduct and good treatment if he gave himself up. Jack said, ‘that while he trusted the word of the bloke  who contacted him but he didn’t trust his mates.’ [1] In Eric Feldt’s  book The Coast watchers and Walter Lord’s book Lonely Vigil (The Viking  Press, 1977), both mention the name Tashira as being the instigator of the Black  Dogs. It would be very unusual for a surname to be Tashira, therefore the ‘a’  is a typographical error and should read Tashiro. A few other historians  writing on the subject also mention Tashira. [2] When the Japanese  invasion of the Pacific   Islands began, most of  the isolated sections were either overrun or forced to retire to safer  locations.  Many of the men at Kavieng  attempted to escape by sea but were captured and taken to Rabaul. More than 130  of the NCOs and men were killed when the American submarine USS Sturgeon sank their prison ship, the Montevideo Maru, enroute to on Hainan Island  located at the southern end of China  on 1 July 1942. [3] McNab, Alexander. We  Were The First. The Unit History of No 1 Independent Company. Page 149, Bougainville Section 3, Behind Enemy Lines. Australian  Military History Publications, 1998. [4] Iwamoto, Hiromitsu.  “The War in Relation to Japanese Settlers in Papua and New Guinea”. South Pacific Study, Vol  17, No 2, 1997. [5] It is not known who ordered the execution. [6] Japanese version of  the German Gestapo. Des Martin. E-Mail to author. [7]  Read, Jack. Coast Watcher  1941-42. His Bougainville  Reports. Papua New Guinea   Printing Company   Ltd. Port  Moresby, 2006. [8] Stewart, Robert. Nuts  to You. Wentworth Books. Sydney,  1977. Pages 156-7. [9] Kerosin was the name  used during the War Crimes Trial but other documentation has his name as  Kerosene and Kerasin. The author has maintained the name used in the trial reports.  National Archives, Melbourne.  Series B5569/1 Box 12  container B863744. [10] Read memoirs. [Unpublished] [11] War Crimes trial of Tashiro Tsunesuke. Australian War  Memorial, Canberra, Act, Australia. [12] Dr Narrelle Morris [13] Read memoirs. [Unpublished] Special thanks to the following for their invaluable  assistance Dr Narrelle Morris, Research Fellow, Asia  Pacific Centre for Military Law, The University  of Melbourne, Melbourne, Victoria, Australia.       Professor Tim McCormack, Asia  Pacific Centre for Military Law, The University of Melbourne, Melbourne, Victoria, Australia.       Des Martin, Field Staff Officer, 6 Division, AIF, PNG,  1944-45 Aitape-Wewak campaign.       Albert Kinani, Bougainville  Tourist Development Office, Buka, Bougainville.       Alexander [Sandy]  McNab, Frankston, Victoria, Australia.       Andrea Williams, Editor; Papua   New Guinea Association of Australia.       Keith Jackson, PNG  Attitudes Blog page. http://asopa.typepad.com       Donald Hook, Canberra, ACT, Australia.       Emeritus Professor James Griffin, Spence, New South Wales,   Australia.       Dr Geoffrey Gray, Research Fellow, Australian Institute of Aboriginal  and Torres Strait Islander Studies, Canberra, ACT, Australia.       Emeritus Professor Hank Nelson, Division of  Pacific and Asian History, Australian National   University, Canberra, ACT, Australia.       Judith Fairhurst [neé Read], Ballarat, Victoria, Australia.
Adu Achi Women Co-Operative Union The Women Co-operative Union, aims at empowerment of people, promotion of integral development, challenging structures of injustice, creating hope and working for peace. The membership of the co-operative is voluntary, non-discriminatory, non-religious and governed by a constitution made by the women. Insufficient funding: this is a major challenge for the women. For instance, a huge amount of money is being paid for the processing of the palm fruits thereby leaving them with little or no profit. They hire and pay some capable hands (labour) for the cultivation and processing of some of their farm produce. The cassava plants are sometimes attacked by pests, making them to be less productive. This is because there is not enough money to buy pesticides and good fertilizers. The women have not received any other fund apart from the one sent in 2010, therefore they are somehow drawn backwards financially. This has had a discouraging effect on them because of the recent economic challenges in the country. Most of them have lost hope and are still worried about how to pay back the funds they already received for continuous circulation. They are also faced with transportation challenges and poor market sales. Not many people in the village are willing to buy the palm oil at the rate which can fetch the women some profit. Therefore, in order not to loose completely, they carry the goods to bigger towns where they can meet people who are ready to afford the amount they are asking for. Transportation costs, therefore, become a major factor for them. What Canadian Samaritans for Africa has Done: • Completed the building and equipping of the skills center for women • Given micro credit to 60 women all of whom are now running their own businesses • Completed training of over 150 women in the co-operative union in the following areas: baking, soap-making, and production of bottled water • In the process of establishing a business center at the center and producing bottled water, making soap, and establishing a bakery We Need Donations to give more micro-credit for deserving small scale women driven businesses; and to equip the skills centre with more machines for food production and for the planned soap making unit. Donate Now
Wednesday, 20 May 2015 Multi-catch statement in Java 7 There has always been criticism of checked exceptions in Java exception handling for being verbose and cluttering the code with try-catch blocks. In Java 7 two features - Try-with-resources (Automatic resource management) and Multi-catch statement have been added to mitigate that problem to certain extent. In this post we'll talk about multi-catch statement. Handling more than one type of exception without Java 7 multi-catch Before Java 7 multi-catch statement, if two or more exceptions were handled in the same way, we still had to write separate catch blocks for handling them. catch(IOException exp){ throw exp; }catch(SQLException exp){ throw exp; It can be noted here that; though the catch blocks are doing the same thing, it is difficult to create a common catch block to eliminate duplicate code because variable exp has different types in both of the catch block. Handling more than one type of exception with Java 7 multi-catch statement With Java 7 and later it is possible to catch multiple exceptions in one catch block, which eliminates the duplicated code. Each exception type within the multi-catch statement is separated by Pipe symbol (|). catch(IOException | SQLException exp){ throw exp; Note that If a catch block handles more than one exception type, then the catch parameter is implicitly final. In this example, the catch parameter exp is final and therefore you cannot assign any values to it within the catch block. Multi-catch statement & Exception hierarchy // This will give compiler error catch(Exception | ArithmeticException | ArrayIndexOutOfBoundsException ex){ Here first exception itself is Exception which is up in the hierarchy than the other two exceptions. Thus it will give compile time error. Also, specifying two or more exceptions of the same hierarchy in the multi-catch statement will result in compile time error. As exp. - the following catch statement will give compile error because FileNotFoundException is a subtype of the IOException class. catch (FileNotFoundException | IOException ex) { That's all for this topic Multi-catch statement. If you have any doubt or any suggestions to make please drop a comment. Thanks! Related Topics 1. try-with-resources in Java 7 2. Difference between Checked exception & Unchecked exception 3. Difference between throw and throws 4. final Vs finally Vs finalize 5. finally block 6. Multiple catch blocks 7. Java Exception Handling interview questions You may also like - References : 1 comment:
Mediator's Role What is the Mediator's Function? The function of the mediator, an expert in dispute resolution, is to assist the parties to reach an amicable settlement of their dispute. The mediator does not force the parties to attend, cannot impose a solution; instead works to support and guide the parties to a mutually beneficial agreement. Mediation is now in popular use by couples seeking to change their marital relationship, resolve personal and financial issues, and make sensitive child sharing and custody arrangements outside of the formal, public courtroom arena. What is the Mediator's Role? • Provide an overview of what will happen in the mediation. • Including the steps in obtaining a judgment in court. • Evaluate each party's ability to represent their own wants and needs. • Define the ground rules for open and honest communications between the parties. • Establish the parties' mediation goals and obtain agreement about ground rules to facilitate communication. • Explore and define areas of mutual concern and potential conflict. • Clarify the parties' position on important issues by encouraging each to realize and express what they want and care about. • Challenge unnecessarily limiting assumptions and identify creative options, thus eliminating blocks to creating resolution. • Recommend and assist with the selection of professionals and coordinate information they provide during the mediation process, insuring your mediation goals are honored. • Draft a settlement agreement with the parties and consult with the attorneys who will finalize the documents with the Court. A Mediator is: Educator: Helps parties understand the divorce process Guide: Orients parties in transition process Idea Generator: Adds creative options and breaks stalemates Translator: Clarifies words and meanings Message Carrier: Go-between for the parties Facilitator: Keeps mediation on track Face-Saver: Helps parties resolve with dignity Lightning Rod: Diffuses anger Re-builder of Relationships: Supports mutual understanding Agent of reality: Assists parties assessing the practicality of options Collaborator: Coordinates other professionals assisting transition What a Mediator is NOT: Therapist / Counselor Lawyer / Advisor Judge / Arbitrator Princeton Mediation Inc. New Hope, PA 18938
*mandatory fields are marked with an asterisk Verify Password:*   E-mail ID:* ?     Contact Number: Are you human? You are here:  Skip Navigation LinksHome » Articles » Show Article Tribal houses of North East India Moupee Debroy  :  Mar/20/2017 08:30:PM Print  Text Size Arunachal Pradesh, Assam, Meghalaya, Manipur, Mizoram, Nagaland and Tripura in the North East are home to over 200 tribes tracing their ethnic roots to diverse parts of Asia. Down the years the lesser and larger tribes such as Jaintias, Apatamis, Khasis, Garos, Mizos, Angami Nagas, Bodos and Kacharis have sustained their cultures and traditions. Tribal houses are representative of their way of life and the environment into which they settled. Arunachal tribal house The Apatamis living in the Ziro valley in Arunachal blend harmoniously with their environment and their houses are an extension of nature. A typical house is made of bamboo or other naturally and easily available materials. The fireplace occupies centre stage with the middle of the house serving as the kitchen and a meeting point for family members. Houses may be constructed on flat lands but it is more common to build house on sloping land to avoid flooding. The Adi tribes build houses of wood, cane, bamboo and leaves of trees with no metal being used in the construction. The house is built on wooden stilts and a wooden floor is built using grass or paddy straw. Usually a hut has no windows and there are only two doors: one in the front used by men and one at the back used by women. A large hall serves as living, cooking and sleeping quarters.  Larger houses may have different chambers for members of the family. Domestic animals may also live inside the tribal house alongside a store of firewood and tools. An Adi tribal house may have an open verandah in the front. Bamboo houses deteriorate with time and are usually rebuilt after 5 to 7 years. Assam is home to the Bodos, Miris, Misimis, Karbi and Rajbanshi tribes, some of them of Indo-Mongolian extraction. The Mising tribes build their settlements on river banks.  A typical house may be made of bamboo or wood and is built on strong wooden stilts, a practice followed by the Deoris and Bodos.  The portion below the stilts is used for livestock. A tribal house has a fireplace around which family members meet, cook and chat with areas designated for sleeping, usually along the walls. Garos and Khasis are the dominant tribes of Meghalaya. The Garos are a hill tribe and use bamboo, cane and wood to build their houses for various purposes. A family house is termed Nokmong and it has separate areas for kitchen, toilet, sleeping and for storage as well as an adjoining cattle shed. Unmarried male youth live together in bachelor quarters termed Nokpante, usually built in the court yard of the tribal head. Apart from these regular houses the Garos also build temporary small huts in their fields and on tree tops. The Meitis are the dominant tribe in Manipur but the State is also home to Nagas, Kukis and Rongmeis. Hill tribes and tribes living in the plains usually follow the general pattern of house architecture prevalent in the North East. Tribes that have settled, such as the Rongmeis, build houses according to their status. A common man’s house is made using bamboo, cane, wood and thatch. A house may have a verandah as a gathering place, sleeping quarters, a kitchen fireplace and outhouses for livestock. Houses are usually rectangular in shape with the front part of the house comprising of the living room being larger than the other sections. Wooden planks are used as beds in the sleeping room. Strange as it may seem, they do incorporate some principles of vaastu. The bed in the bedroom is usually on the northern side. The fireplace is in the south-east corner. The kitchen, however, has a fireplace right in the center of the room above which are racks to hang meat and fish that dry over the fire. Sometimes the kitchen also doubles as a sleeping quarter. A storehouse outside the house is used to store grains, usually built on a platform above the ground level. The Mizos are usually settled which means they have a well organized community and houses that reflect this lifestyle. Hill tribes usually build houses on top of hills with the house of the tribal chief at the centre. The bachelor’s quarter known as Zawlbuk is located close the chief’s house and serves as the centre of activity since the youth work, learn and are trained at these centers. The Lushais are another major tribe living in Mizoram. They use wood and bamboo to build tribal houses on sloping land. The houses have wooden supports and bamboo matting is affixed to the frames and to the floor. The roof may be made of split bamboo covered by thick thatch, leaves or straw. Some houses may be built on stilts with a small ladder for access. Houses are rectangular in shape and the interior is partitioned into rooms using bamboo screens or mats, with separate sections for married and unmarried members of the family. A raised fireplace is at one corner next to the front door. Nagaland is home to over 17 tribes, majority of them with Indo-Tibetan roots and a warlike nature. Mainly hunters and fighters, their village architecture and house construction reflect their lifestyles. Villages were usually heavily fortified. A tribal house is built on leveled earth with the interior divided into three sections. The living room in the front is large and also serves as a storehouse. The second section is divided by partition of wooden planks and it contains the fireplace build on the leveled earth. This room also serves as the bedroom. A third section at the back runs the entire length and has an entrance at the rear. Houses usually have open space at the front with seating arrangements and lookout platforms. Tripura is home to Bhutias, Bhils, Chakma, Garo, Lepcha, Kuki, Lushai, Jamatia, Halam and Chaimals with a number of sub-sects, each with distinctive ethnic origins and lifestyles. The Halams live in houses made of bamboo and chan grass. Most of the tribes practice jhum cultivation and are nomadic, which means their houses are not made of masonry or stone but of natural wood, bamboo and thatch straw with mud walls in a simple fashion. First Prize Winner of the Week Drawings of the Week
Teen Car Accidents > Practice Areas > Car Accidents > Teen Car Accidents The risk of being involved in a car accident the highest for drivers aged 16- to 19-year-olds than it is for any other age group. For each mile driven, teen drivers ages 16 to 19 are about four times more likely than other drivers to crash. Teenagers are about 10% of the US population but account for 12% of all fatal crashes. Each year over 5,000 teens ages 16 to 20 die due to fatal injuries caused car accidents. About 400,000 drivers age 16 to 20 will be seriously injured. Teens are more likely than older drivers to underestimate or not recognize dangerous situations. Teens are more likely than older drivers to speed and allow shorter headways, the distance from the front of one vehicle to the front of the next. Teenage boys are more likely than teenage girls to get into a deadly accident. About 2 out of every 3 teenagers killed in car accidents in 2009 were male. Crash risks are much higher during the first year that teenagers are allowed to drive than at any other time. There is a correlation between the age of the driver and the speed with which the accident occurred. The crash rate per mile driven is twice as high for 16-year-olds as it is for 18- and 19-year-olds. Distracted driving presents a major reason why there are so many accidents among teenage drivers. Hand-held cell phone use was highest among 16- to 24-year-olds The presence of teen passengers increases the crash risk of unsupervised teen drivers. Teenage drivers and passengers are the least likely demographic to wear seat belts. In 2008, 55 percent of passenger vehicles occupants ages 16-20 who were killed in crashes were not buckled up. In addition to speeding, and distracted driving, a significant portion of teenage car accidents are the result of driving drunk. In 2009, 33% of teenage drivers who were killed in crashes had a blood alcohol concentration higher than .01 and 28% had a BAC of .08 or higher. Most teenage accidents occur on the weekends, in 2009 55% of teenage related driving deaths occurred. The Massachusetts Junior Operator Law states drivers under 18 cannot drive with another passenger under 18. The only exception is for for siblings. Teen drivers are also not allowed to drive between 12:30 a.m. and 5 a.m. In September 2010, the Safe Driver Law took effect, prohibiting drivers under 18 from using cell phones while driving. Massachusetts’ Graduated Driver’s Licensing Program attempts to address some of the issue by granting driving rights in three stages: learner’s permit, junior operator’s license and full license. However studies continue to show that parents can have the greatest impact on the driving habits of their teenagers by staying actively involved long after a young driver climbs behind the wheel. Motor vehicle crashes are the leading cause of death for U.S. teens, accounting for more than one in three deaths in this age group.1 In 2009, eight teens ages 16 to 19 died every day from motor vehicle injuries.
Buula (polo) Here, today I’m sharing some glimpse of past and present of the adventurous and the most popular galloping horse sport, POLO!!!  It may give an impression that this great adventurous sport “ Polo” may belong to the British or some developed country as they have the greatest players but no, it never belong to them, it’s our own sport, a game of the highlander of central Asia. A game played by the great rulers like Alexander the great while his rule in Persia, the Persian rulers and the Delhi Sultans. Historians say that its origin goes back to the 6th Century BC but it may be much older than that. Initially it was designed to train the troops for war against enemies but later people adopted it as a sport of leisure and today it is an Olympic sport. In Gilgit Baltistan it has been the most favorite sport of the royal families and general public of different regions prior to the amalgamation of Gilgit Baltistan with Pakistan when there use to be different small states. Polo’s actual name is buula and is known by this name in the region. However British while introducing it in the Great Britain gave it the name Polo which is a Balti word meaning ” Ball” and the rest of the world know it by the name Polo. The equipments use in the polo game are Thari (Shina name for the wooden ball), Finchi (Shina word for the wooden stick) and the players ride on a horse and hit the ball to make goal. Every player in the team tries in pass the ball to its member so the opponent can’t make goals against them. Previously there was no limit of minimum players in each team and the winner team was the one who succeeded to make first nine goals. With time rules were added and now it’s played for an hour with two halves and a ten minute break. In different parts of the world other than Gilgit Baltistan. There are six team players in each team. These rule do not apply to the game played in Gilgit Baltistan. Almost every household have polo player in prior to the coming of new ways of living to the remote areas of Gilgit Baltistan. The central villages have their own Polo grounds where the players from nearby villages get together to play. The royal family was invited. They use to play with the royal family as will. Time is changing really fast and we are oblivious of the fact that the game is dying and merely becoming a symbolic game of 3 day Shandur Polo festival game which is set in the month of July every year on the roof top the world the world’s highest polo ground in Chitral, Pakistan.  I’m of the opinion that the majority of the natives belonging to the new generation are ignorant regarding the importance of this High Asia sport and the pride of our forefathers. We are mainly responsible for not communicating and training as well as encouraging our own sports which are far better that the games we have adopted. P.s. the pictures i shared in this article are taken from public domain and editing credit goes to my love friend Javeria :)
Media Literacy‎ > ‎Blogs‎ > ‎Sarah R.‎ > ‎ Are you blogging responsibly? posted Aug 30, 2011, 2:12 PM by sarah ruwe What are some of the potential dangers of blogging discussed in these texts? Which of these concerns are legitimate? Why or why not? What other dangers are there in blogging that were not discussed in the texts? What should students keep in mind in order to practice responsible blogging? Suggest 2-3 rules you think would be appropriate for the class to follow as part of a blog policy. Blogging can lead to predators stalking a young person. If you aren't careful the things you say in a blog could come back to hurt you when you apply for a job later in life. These concerns are legitimate because if your personal info is out there for anyone to see it could attract the wrong type of attention. Also, if a job wants to hire you and then reads a blog that you wrote that is inappropriate they might not hire you. Blogging can be a way to bully someone. The blog can be a person's outlet, but if the person says mean and hurtful things then it isn't actually helping anyone. Students should remember that this stuff is out there for everyone to see and it stays out there for a really long time.  Rules for the blog policy:  1. Use the same language you would use towards your teachers. 2. Never use your full name or personal info in your blog (address, phone, etc.)
New Year’s Roman Style I wish you a very Happy New Year! Better yet, on this Iani Kalendai, I present to you, my readers, a gift of dates and honey and I pray to the god Janus for a prosperous New Year! Which, of course, brings us to the question, how did the Romans celebrate the New Year? Their New Year, like ours, was celebrated on January 1st, which they called the Kalends of January or Iani Kalendai.  Actually, originally the Roman new year was in the spring, but as the Roman calendar got out of synchronicity with the  seasons, the New Year got associated with  the Kalends of January.  January was the month named for the two-faced god Janus and on January first, he was lord for a day.  Janus is the god of beginnings and endings and his name means “gate” or “door”.  In times of war, the gates of his temple were kept open and in peacetime they were barred. Here are ten things the ancient Romans did on the first of January to celebrate the New Year: 1. Think good thoughts all day long 2. Greet each other cheerfully, avoiding gossip or negative speech 3. Sprinkle saffron on the hearth, as incense 4. Sacrifice to Janus before any other god in household shrine 5. Join or watch a procession to the Capitoline hill 6. Watch a priest sacrifice a heifer 7. Swear in the officials elected to serve in that year 8. Do a bit of business (it was unlucky not to work on this day and if one did not work, it was a bad omen for the entire new year and the person so not working might be consumed by idleness) 9. Give gifts of honey, dates, or coins to friends, family, patrons, and clients 10. Pray to the god Janus for peace Ovid described the celebrations of the New Year in his work entitled Fasti.  The word Fasti means ‘list’ in Latin, but Ovid meant it in this context to be a list or schedule of public holidays.  In Fasti, he invoked “Two-headed Janus, the only one of the gods who can see your own back…”  Ponder that for a moment! Ovid asks the god why he has two heads, to which the god replies “I sit at Heaven’s Gate and supervise the comings and goings of everybody including Jupiter himself. I need two faces or I’d get my neck in a twist.”  Taking the carrot and stick approach, the god first threatens that, because he is the gatekeeper, he might not open the door to the gods preventing one’s petition to the gods from reaching the gods; and then Janus dangles the carrot by  imploring the good Roman only to say  good things at the beginning of the year, because on the first day of the year, the ears of the gods are open and a petitioner’s prayer would carry more weight. Ovid then has Janus explain that the new year begins with the death of the old sun and the birth of the new sun, that is the lengthening of the days during winter after the winter solstice.  Roman honey – a good omen While a gift of honey or dates is good, Janus warns the good Roman to know the era in which he lives and to recognize that, while honey and dates are sweet, money is all the more sweeter. A Coin showing the god JanusHITH-NEW-YEARS-ROME1. Janus was seen as symbolically reflecting upon the old, while looking ahead to the new. Romans would celebrate January 1 by giving offerings to Janus in the hope of gaining good fortune for the New Year. This day was seen as setting the stage for the next twelve months, and it was common for friends and neighbors to make a positive start to the year by exchanging well wishes and gifts of figs and honey with one another. The Romans would create stamps which would make impressions on loaves of bread.  For example, the one below. Image source: The stamp’s inscription, enclosed in a tabula ansata (the iconic ‘winged tablet’ of the Romans), reads as follows : Accipio | annu(m) | novu(m) | felice(m). I receive a happy new year. Here is but one example for the same kind of inscription on a clay lamp: Image source:$Campobasso-162.jpg. It is inscribed as follows: Annum | novum | faustum | felicem | mihi. Happy, Auspicious New Year to me! It should be noted in both of these cases that the wish for a happy New Year is not made to a friend, family member, or loved one, it is made to me!  So, in the end should we be like the Romans and wish ourselves a happy new year?  Yes, but I think the god Janus might prefer that we do not think only of ourselves but also of others too.  For otherwise, there would be no reason for the god to have two heads! Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
Skip to Content Medical Term: Pronunciation: en-an'te-om'er-izm chemistry isomerism in which the molecules in their configuration are related to one another like an object and its mirror image (enantiomers) and, consequently, are not superimposable; enantiomerism entails optical activity, both enantiomers (in identical amounts) rotating the plane of polarized light equally, but in opposite directions.
Regulation of Fluid and Electrolyte Balance by Carlo Raj, MD Questions about the lecture My Notes • Required. Save Cancel Learning Material 2 • PDF Slides RegulationofFluidandElectrolyteBalance IntegratedRenalPathology.pdf • PDF Download Lecture Overview Report mistake Continuing our discussion of sodium and water pathophys. Well, we are going to take this information, stuff that we have seen and really put onto clinical setting. That at this point I would say this is more of an advanced type of application of what we have seen earlier. But trust me it's not too bad. So two carefully regulated parameters. Regulated. We have effective circulating volume. What does that mean to you? The plasma. In other words, that is your intravascular volume, isn't it? And you have tonicity. Tonicity, of course, representing the osmolarity. Effective circulating volume is found in the extracellular fluid. The tonicity is then determined by, here you go again, serum sodium concentration. The serum sodium concentration as we discussed in previous lectures, was the fact that it is your total body sodium over your total body water. And we went through all of your isotonic, hypotonic, hypertonic disorders. Effective circulating volume, the operative term here portion of the intravascular volume that then, of course, perfuses your organs. Hence, there has to be constant regulation. These two bullet points as simple as it may seem have profound meaning. Listen. Normally body fluid volume, how do you control this? Let me bring in the hormone aldosterone. With aldosterone, when it kicks in, it wants to do what? Reabsorb the sodium. As soon as you reabsorb the sodium, does it affect osmolarity or does it affect more of the volume? Interesting. For example, if you talk about aldosterone and increasing blood pressure and you are reabsorbing your sodium, does that increase more of your systolic or diastolic blood pressure? Mean to say that sodium fluid comes in. It puts more fluid or volume into the heart. You increase your stretch thus you increase your systolic blood pressure. So... About the Lecture The lecture Regulation of Fluid and Electrolyte Balance by Carlo Raj, MD is from the course Fluid and Electrolyte Balance. It contains the following chapters: • Regulation of Water and Sodium Balance • Key Points • Regulation Wheels Included Quiz Questions 1. Aldosterone and ADH 2. Renin and Aldosterone 3. Renin and ADH 4. Renin and Angiotensin II 5. Aldosterone and Angiotensin II 1. ADH increases urine osmolarity 2. Aldosterone increases plasma osmolarity 3. None are correct 4. ADH increases effective circulating volume 5. Aldosterone decreases effective circulating volume 1. Under most conditions osmolarity is more tightly regulated than volume. 2. Volume is mainly regulated by antidiuretic hormone. 3. None of the statements are correct. 4. All of the statements are correct. 5. Osmolarity is mainly regulated by aldosterone. 1. Suppresion of ADH release 2. Renin release 3. None are correct 4. Angiotensin II activation 5. Aldosterone activation 1. Angiotensin II 2. Renin 3. None are correct 4. ADH 5. Aldosterone 1. If greater than 10% of effective circulating volume is lost. 2. Volume regulation is always more tightly regulated than osmolarity. 3. Only when plasma osmolarity is in the normal range. 4. When systolic blood pressure has fallen by at least 10 mmHg. 5. Only when antidiuretic hormone is released. 1. Systolic blood pressure 2. Diastolic blood pressure 3. Sodium excretion 4. Renin release 5. Plasma osmolarity Author of lecture Regulation of Fluid and Electrolyte Balance Carlo Raj, MD Carlo Raj, MD Customer reviews 5,0 of 5 stars 5 Stars 4 Stars 3 Stars 2 Stars 1  Star
Orwell - 1984 - Psychoanalytic approach The theory of psychoanalysis, primarily identified with Freud can be applied to the literature in the same way as Freud studied dreams and tried to understand human behavior. Psychoanalytic views the subject not as a unique essence, but as the result of a combination of psychic, sexual and linguistic mechanism. Feud made that the literary work can be seen like the unconscious, does not speak directly, but indirectly through metaphor, image and symbol. This type of criticism deals with literary characters as if they were living human beings and tries to find their unconscious motivation by analyzing the language they use and specific Freudian imagery. The psychoanalytic approach understands us from the point of view of our unconscious and early childhood experiences. Freud’s psychoanalysis suggests that our behavior is influenced by ID, EGO, and SUPEREGO. Psychoanalytic approach adopts the method of “reading” employed by Freud. It is important to find a “key” to decode the text. We can think about a novel in terms of dreams. Like dreams, novels are fictions, inventions of somebody’s mind, although based on reality. Like novel, a dream can have a truth inside, but also like a novel, must be interpreted. The metaphors in a text are like dreams condensations. Freud’s style of psychoanalysis involves talk therapy. Freud also describes anxiety as an emotional condition where human feels uncomfortable and always feels so scared. Freud states that anxiety is the function of ego which alerts the person to sources of impeding danger. Anxiety is the effect of the conflicts of the elements of personality changes, when a person does unusual things. Anxiety changes the personality and may also influence someone to be courageous. The courage appears even is pressed by something or someone he/she dislikes. Psychoanalytic approach can be applied to” 1984” on specific aspects of ego psychology. “1984” is a network of patterns, images, and numbers. In the book the main character, fictional character, Winston is the object of the study. At the beginning of the novel, Winston is seen as having limited ego autonomy. He achieves having a greater degree autonomy and then looses it almost entirely by becoming a re-fused with primitive parental image in a process of brainwashing conceptualized as a reverse of separation individual. The failure of superego and ego ideal formation in Winston Smith is seen as the psychological turning point. In the book are some images from Winston’s childhood connected with his mother. In dream he has a last glimpse of his mother. It was a memory that he must have deliberately pushed out of his conscious over many years, and also he suffered from his mother disappearance. Winston’s mother appears in his dreams in different ways. At the beginning his mother appears with his sister in arms. He was out in the light and air while his mother and sister were sucked down to death. When he joins to Brotherhood, in dream his mother tried to shelter the boy (Winston). The dream can be interpreted by Winston’s blame by his mother disappearance at the hands of Brotherhood. Since he does not how to deal with guilt he has repressed his memories. When Winston continues to rebel against Big Brother, as an effect of his anxiety, his dreams access his memories while conscious and he realizes the death of his mother was not his fault. Winston’s dreams influence his action in reality. Also in the book, the Minister of Love, is aware by dreams, because the dreams can influence people actions. For example, Parson was incarcerated because of what he did in sleep. Big Brother uses nightmare to its advantage. We can see how Winston’s nightmare about rats was used by Big Brother and this caused his break. Dystopia is a place of nightmare, where everything is bad and utopia is a place of good dreams, where everything is good. “1984”written by G. Orwell is a dystopia, so a psychoanalytic approach fits perfectly. Sign up to vote on this title UsefulNot useful
"As a child reads, so a child becomes". In  Lit!, Tony Reinke helps us to understand how to read, what to read, and why to read. At no point is this more important than in childhood, and as he indicates in his quote, the books a child reads (or doesn't read) will fundamentally impact the trajectory of the child's life. With that in view, he devotes one chapter in his book to 'Raising Readers'. He includes a number of practical tips that will help parents ignite in their children a desire to read. In essence, the goal is "to make books prominent and reading delightful". Here we list some of his suggestions. You should read the whole book to flesh out the details: 1. Fill your home with books. Always there in overflowing quantities; always to hand. Visible, prominent. 2. Read to your kids. Pause and reflect as you go, to help them learn how to make exciting discoveries in their reading. 3. Don't stop reading to your kids. Even teenagers benefit from hearing books read aloud. 4. Read your books in front of your kids. Children will value what they see their parents valuing. It's no good telling them that reading is important if they see that you never do it yourself! 5. Push entertainment into the background. For boys in particular. Reinke quotes Thomas Spence who writes, (in 'How to raise boys who read'): "The secret to raising boys who read, I submit, is pretty simple - keep electronic media, especially video games and recreational internet, under control (that is to say, almost completely absent). Then fill your shelves with good books." 6. Listen to audio books in the car. For any road trip, borrow CD's from the library and download audio books online. 7. Help interpret worldview as you read to your children. Whatever book you are reading, engage with it with a Christian worldview; pause to help the child interpret the realities the book is bringing to his imagination in light of Scripture. 8. Invite your children to read to the family. When they find a passage they like, encourage them to bring it to the dinner table and explain what caught their attention. And when they read something they disagree with, it's good to get them to share those thoughts too, for they need to learn to be critical readers.
Wednesday, July 29, 2009 Black-footed Ferret There are three classifications for animal species in danger of becoming extinct. 1. Endangered. Species require direct human protection for survival. 2. Threatened. Species also referred to as vulnerable. They are abundant in some areas, but their numbers are decreasing or they face serious dangers. 3. Rare. Species either have small populations within a narrow geographic area or are thinly scattered throughout a wider range. Many factors contribute to an animal’s endangerment. These include but are not limited to the destruction of habitat, disease, and pollution, trade in animal products, overhunting, and the growing human population. The Black-footed Ferret (Mustela nigripes) might have slipped into extinction without notice had it not been for John James Audubon and Reverend John Bachmman, who described a specimen they had found near the lower Platte River in Nebraska in Viviparous Quadrupeds of North America published in 1851. The elusiveness of the Black-footed Ferret (BFF) and the fact that the original specimen disappeared sparked controversy over its existence. In 1874, Dr. Elliot Coues made a request for specimens through the American Sportsman magazine and received several specimens in response. The BFF is an obligate carnivore meaning that they have one main food source and 90% of that is the prairie dog. Not only is the prairie dog the Black-footed ferret’s food it’s burrow provides the ferret with shelter and a home. The Black-footed Ferret's territory started diminishing in the late 1800’s as farmers actively killed prairie dogs that competed with livestock for the grasslands. By the 1950’s, the BFFs were thought to occur in low density throughout most of their historical range. historical BFF territory1 The U.S. Fish and Game Commission put the BFF on the endangered list in 1967. A small colony in South West South Dakota was found and was studied from 1964 until its disappearance in 1974. Biologists feared that the BFFs had lost their fight with humankind and no longer existed. The BFF was placed on the extinct list in 1978. Three years later in a North West Wyoming town, a rancher’s dog killed and brought home a strange animal that the owner had not seen before. He took it to the local taxidermist who identified it as a Black-footed Ferret and called the wildlife professionals. A colony of 120 BFFs was found near Meeteetse, Wyoming and was studied. An outbreak of canine distemper killed all but 18 ferrets by 1985. The remaining BFFs were captured and taken to the Sybille Wildlife Research and Conservation Education Unit. Seven of the captured ferrets reproduced in 1986 and all black-footed ferrets are related to those offspring. A recovery program was developed with the goal of getting the Black-footed Ferret off the endangered list and back into the wilds. Reintroduction began in 1991 in Shirly Basin, Wyoming with 228 released over a four-year period. There are eight release sites in five states: Wyoming, Utah, South Dakota, Montana, along with Mexico. blackfooted release areas The recovery plan was to have a minimum of 1500 Black-footed ferrets back in the wild with 30 breeding pairs per site by the year 2010. All Black-footed ferrets released into the wild carry a passive integrated transmitter (PIT) PIT inserted under the skin. This transmitter is like the chip we use for our pets. When located in the wild a transponder ring is placed around the prairie dog hole so that when the ferret pops his head up it will read the PIT and record the number. Any wild born BFFs are captured using a specialized trap and a PIT is inserted this takes approximately 30 minutes. PIT is used in conjunction with geographic information systems (GIS). This is the process of taking information, like topographical maps, and over laying them. This helps to calculate or correlate things. BFFs are fed prey (prairie dogs) to imprint on that food source. They are also preconditioned (i.e. BFF School) for 45 days in outdoor pens where they live in dirt burrows and learn how to kill prairie dogs before being released into the wild. This gives them a better chance of survival. The life span for a BFF in the wild is 2 years although there was one Old girl that made it long enough to have five litters. The recovery goal is being hampered by the outbreak of Sylvatic plague, which is similar to the human black plague, and canine distemper in many of the release sites. BFFs are vaccinated against distemper before being released. In hope of controlling the Sylvatic plague, crews are dusting prairie dog town with a product called DeltaDust as a way to kill fleas and in the past, it has been effective in halting the plague. A vaccine has been developed by the U.S. Army and 216 BFFs have been vaccinated by November 2008. The recovery goal is being revised and the date maybe pushed back to 2020. It is believed that they are a quarter of the way towards the goal, which is a lot more than the 18 BFFs rescued in 1985. Thank you Travis M. Livieri of Prairie Wildlife Research for the use of the PIT picture and for answering my questions. Adopt a Black-footed Ferret Travis Livieri's Blog BFFs Facts: Can travel 5-7 miles per hour First release site was Shirly Basin, Wy 317 kits were born in captivity by June 28 2009 300 BFFs reside in zoos and breeding centers An average family of four will consume appoxomitely 763 prairie dogs per year Only one person knows the answer to this question. Is No. 005-041-115 still around or when was the last recorded appearance? 1 comment: buzzd said... I have never heard of a black footed ferret. This was interesting. They eat alot of prairie dogs each year.
Monday, September 21, 2015 Renaissance Etiquette and Manners Etiquette and manners were a response to the violence and crude behaviors run rampant in burgeoning European cities. They were  the means of reinforcing social order and distinguishing the privileged class from everyone else. It was at the dinner table, that these newly defined codes of conduct were especially important. Italy was one of the leaders of the 16th century and 17th century cultural revolution, and that included table manners. Italian poet Giovanni della Casa advised in "Galateo," his 1558 book on manners: "One should not comb his hair nor wash his hands in public... The exception to this is the washing of the hands when done before sitting down to dinner, for then it should be done in full sight of others, even if you do not need to wash them at all, so that whoever dips into the same bowl as you will be certain of your cleanliness."  Taking into account that one's hands were also one's "utensils" for hundreds of years, this advice was truly of utmost importance. In his study on the social customs of this period, sociologist Norbert Elias noted that "In good society one does not put both hands into the dish. It is most refined to use only three fingers of the hand. ... Forks scarcely exist, or at most for taking meat from the dish."  Some of the earliest known uses of forks with food occurred in Ancient Egypt, where large forks were used as cooking utensils. The personal table fork was most likely invented in the Eastern Roman or Byzantine Empire, where they were in common use by the 4th century, though the origins may even go back to Ancient Greece, before the Roman period. By the 9th century, according to records, a similar utensil known as a barjyn was in limited use in Persia within some elite circles. By the 10th century, the table fork was in common use throughout the Middle East. Forks were originally viewed by most in Western Europe, as excessively refined. Forks were also viewed, in the case of men, as a sign of effeminacy. The custom of Western Europeans using table forks as dining implements began in Italy. They were at first a hit, but forks were slow to catch on in Northern Europe. The use of forks in to get food from plate to mouth didn't didn't gain wide acceptance in Northern Europe until the 17th century—and even then, only the well-to-do could afford them.  Spoons were communally used—making the etiquette of eating soups a delicate matter. "If what is given is rather fluid," Dutch theologian Erasmus of Rotterdam writes, "take it on a spoon for tasting and return the spoon after wiping it on a napkin. Some human behaviors were deemed permissible at the dinner table. On passing gas, Erasmus wrote, "If it is possible to withdraw, it should be done alone. But if not, in accordance with the ancient proverb, let a cough hide the sound." Most modern etiquette books advise that "civilized folk will protect others from any sounds or smells that may be displeasing." This isn't to say that all Renaissance manners are indeed outdated. On respecting fellow diners' personal space, Giovanni Della Casa wrote, "It is also an unsuitable habit to put one's nose over someone else's glass of wine or food to smell it." And Erasmus advised, "It is rude to offer someone what you have half eaten yourself; it is boorish to redip half-eaten bread into the soup."  Even modern science shows that a great means of spreading bacteria, is re-dipping partially-eaten foods. It certainly gives you an idea of what Renaissance society was trying to improve upon—and how far we've come since that time period. –Some of our sources;, 2011 and Etiquette Enthusiast, Maura J. Graber is the Site Moderator for Etiquipedia© Etiquette Encyclopedia
Saturday, December 10, 2016 Was such a thing even possible, when nuclear technology is so new that it has yet to penetrate around the globe in our times? When the smallest malfunction in equipment or process wrecks total havoc, last seen at Fukushima in 2011. Researchers examining Vyas’  Mahabharat, Vedic and Jain scriptures  often agree with the findings of  Micheal Cremo  that there is archeological evidence of the use of  WMD, weapons of Mass Destruction perhaps 15,000 years ago.  Cremo is an American freelance researcher known as a Vedic creationist and an "alternative archeologist".  His book Forbidden Archeology holds that humans have been on the earth for millions of years. Cremo’s team worked in tandem with India’s leading archeologist, Dr. S R Rao, working on Mahabharatan sites. Time tracking with thermoluminenscence dating methods with Radio carbon isotopes, that offer accuracy dating back billions of years, was done on various archeological finds. The Vedas often turned out to be an accurate resource when they stripped down to the bare facts of the story of Mahabharata, from the initial incident to the war that ended of the descendants of Pandu and Dhrithrastra. Michael Cremo focused on sites at Indraprasta, the Pandav showcase capital, Hastinapura, the Kuru seat and Kurusethra, the battle ground.   The evidence was stunning.  Moorland at Kurukshetra bore no vegetation, reminiscent of residual radioactive contamination caused by large-scale thermonuclear explosions, according to a thermonuclear expert, Dr. Inderjit. A free translation of the Vedic context reads  "the heroic Arjuna seated in a Vimana, landed in the water, then lifted the Gandiva to launch an arrow that could simultaneously release the flame shining brightly over enemy territory and  surround the enemy with great power. Arriving at target, the  arrow formed a thick shadow-like giant mushroom over the Kauravas. That weapon created a storm of fire with an explosion followed by toxic dust (radioactive). "  “Total darkness made enemy dysfunctional as a powerful wind storm began to blow wuuus .. wuuus, with  burning sand. It was as if the sky fell and broke up the earth. Meanwhile the sun seemed to be swaying, red-hot air emitting awful sounds, with the shaking of the earth.” "Over a vast area, countless died, burnt and deformed. Rivers dried, killing fish, shrimp and other marine animals. When the arrow (rocket) exploded, the thunder sound felled enemy soldiers like charred tree trunks. UNICEF and the NASA Landsat Satellite images helped to broaden and deepen the study, with images focused on the upper Ganges.    Archaeologists found charred debris of remnants of stone buildings. Pieced together indicted large stone with uneven protruding and concave surfaces. Testing on stones has shown that they need a minimum temperature of 1,800 degrees C to melt! Usually impossible, except in event of nuclear radiation. Primitive jungles of India yielded more such charred ruins. More surprising was the discovery of similar radiated stones in ancient Babylon, the Sahara Desert and the Gobi Desert in Mongolia. Were Hiroshima and Nagasaki of World War II vintage actually the first?
The Future of Sleep The future of sleep research holds great promise. We will most likely see some truly significant discoveries in the genomics and molecular biology of sleep in the near future. These discoveries will help us resolve questions about the function and evolution of sleep. Knowing the cellular/molecular processes that are involved in sleep will definitely give us clues as to function. And once we identify a cellular function of sleep in one species, we can then determine whether that same function occurs in species that do not share EEG features with mammals. In other words, we will be able to see the homologies between sleep in mammals and rest in other species, despite differences in brain structure and EEG patterns. The Goal: Understanding Sleep • Expanded, improved, and universal education about sleep is critical to our future. • There are three essential components of a healthy life: nutrition, fitness, and sleep. Good nutrition is an emphasis in education from elementary school on. Classes in nutrition are common in colleges and universities. Shoppers are faced with mandatory nutrition labels on every prepared food they buy in the grocery store. The same is true for education in fitness. In addition to sports in high school and college, there is a multibillion-dollar fitness industry aimed at keeping us in shape. • When it comes to sleep, however, the dearth of public attention and education is appalling. Aside from mandatory naptime in kindergarten, elementary school students learn nothing about sleep. In high school, attitudes about sleep are tainted by the experiences resulting from the sleep phase delay that occurs with adolescents. The general public knows next to nothing about sleep, other than the fact that they can’t sleep. Industry usually handles shift work in the worst possible way. • Too often the level of knowledge about sleep is not much better in the medical community. Many physicians simply conclude from an insomnia complaint that the patient is depressed. For most individuals, sleepiness is simply an inconvenience, and quality sleep is elusive. Knowledge about sleep, good sleep habits, and the value of good sleep is essential. Monitoring Your Own Sleep • Monitoring one’s own sleep health is now possible. Just as you can buy devices to monitor your blood pressure, your blood oxygenation, and your blood glucose, you can now buy devices to monitor your sleep. A wrist actigraph, which records movement throughout the day and night, is fairly reliable in revealing total sleep time and sleep efficiency. • Newer systems also are analyzing sleep structure. There is even new technology that enables you to record and analyze your own EEG. The electrodes, incorporated into a headband, communicate wirelessly to a recording device that sits by the bed. Associated software interprets the data for you. The Consequences of Sleep Loss • A critical issue in sleep research is the long-term consequence of sleep loss or poor sleep. One laboratory that has made Knowledge about sleep, good sleep habits, and the value of good sleep is scarce, but paying attention to sleep is an important step on the path to good health. ○ Some years back, Dinges developed a simple method for measuring alertness that has become a standard technique in the field of human sleep research. It is called the psychomotor vigilance test (PVT). ○ The basic form of this test is that the subject hears a tone or sees a light flash on a screen and has to respond by pushing a button. The individual must pay close attention to the task. The computer registers several metrics of performance: time to respond, failure to respond, and false responses. Typically, after some sleep manipulation, subjects perform the PVT during the subsequent day. • In an experiment, groups of subjects were restricted to 4, 6, or 8 hours of time in bed per night for 2 weeks. ○ After 6 nights of restricted sleep, the 4-hour group had an error rate equivalent to what was seen after 1 day of total sleep deprivation. ○ After 12 nights, the error rate of the 4-hour group was the same as what was seen after 2 days of total sleep deprivation. ○ After 11 nights, the group receiving 6 hours of sleep each night had an error rate equivalent to what was seen after 1 day of total sleep deprivation. ○ The important aspect of these results is that the rise in error rate for any of the sleep-restricted groups showed no sign of a plateau. The trajectory was a straight line of continuing decrement in performance. ○ Further, the groups did not recover to baseline after even 2 nights of unlimited recovery sleep. • Two important results from this study are that sleep debt is cumulative and that 1 or 2 nights of recovery sleep do not return vigilance to the optimal level. Further experiments by Dinges also found that not only did the recovery from 2 weeks of restricted sleep require multiple days, but the susceptibility for further impairment was elevated even after the allowed 3 days of recovery. PTSD Therapy • Understanding the role of sleep can help in treatments for post- traumatic stress disorder (PTSD). PTSD is an anxiety disorder that results from a severely traumatic event, such as a life-threatening accident, sudden death of a loved one, natural disaster, or terrifying personal attack. • Typically, vivid memories of the event will recur, sometimes triggered by some specific stimulus. The individual will be hypervigilant and will try to avoid situations that might trigger the mental playbacks. Sufferers also experience terrifying nightmares. • PTSD involves overactivity in circuits in the hippocampus, amygdala, and frontal cortex. It can be thought of as superconsolidation of the memory and its emotional valence. As a result, this emotional memory is not only resistant to extinction, but it may even strengthen with time. • If PTSD stems from a REM sleep disorder, we should be able to treat it through sleep. ○ The hypothesis here is that in PTSD, traumatic nightmares are so severe that they arouse the individual from sleep. The individual then replays the dream in the waking state, which is almost like reexperiencing it. If he or she then goes back to sleep, that new version of the memory gets consolidated. ○ However, we may be able to use these same mechanisms to cure the problem by altering the memory that is reactivated and by interfering with reconsolidation. Sleep in the Future and the Future of Sleep ○ This hypothesis is consistent with ideas about the process of memory consolidation during sleep. If a memory is selectively and repeatedly reactivated during sleep, it should be selectively and repeatedly reconsolidated and, therefore, strengthened. ○ However, sleep fragmentation following learning disrupts memory formation. This effect is presumably because of interference with the memory consolidation. It may be possible to use reactivation during sleep to weaken the emotional valence of the memory. Sleep and Learning • Learning during sleep is an intriguing possibility. When portable tape recorders were first introduced, the idea was that if you played, for example, a foreign language tape while you slept, you would learn the language. • These attempts were not successful at the time—perhaps because the memory transcript was not there to be reactivated. But now that we know specific memories can be reactivated and strengthened during sleep, the possibility of sleep learning should be reinvestigated. • Language learning might be an excellent research focus. As with the experiment in which sounds were paired with images, here, the sounds could be the spoken words. If a student studied a list of phrases in a foreign language and then some of those phrases were replayed during sleep, they might be more likely to be recalled during the subsequent day. • Language learning is a mixture of procedural and declarative memory formation, so it would also be of interest to see whether reactivation during sleep is effective for both types of memory alone. ○ In experiments using the computer mouse to move a cursor on the screen to a target, clearly, performance improvement on that task was a function of nonREM slow-wave activity in the appropriate region of the motor cortex. ○ That activity might be stimulated during sleep by a cue that reactivates the memory. Researchers in the lab of Robert Stickgold are studying how the skills of subjects in a virtual reality task—downhill skiing—are improved during sleep. The researchers are also correlating the subjects’ reports of dream imagery with the observed improvements. ○ The indications are that the experience of training before sleep is reflected in mental processes during early sleep. In any of these experimental paradigms, it would be of interest to have multiple tasks associated with different stimuli to see if they could be selectively improved during sleep. • A recent study in Israel showed that humans can acquire new information during sleep, at least at the level of conditioned reflexes. ○ When humans experience a new odor, they sniff. If the odor is good, they sniff deeper, and if the odor is bad, they sniff more shallowly. ○ The investigators introduced good and bad odors to subjects during sleep and paired them with tones. They showed that during sleep, the subjects learned to associate the tones with deep or shallow sniffing responses. ○ Training in early sleep resulted in appropriate responses to the tones during late sleep. The conditioning during nonREM sleep carried over to subsequent wake. • Experiments in slow-wave activity—the nonREM processes apparently involved in memory consolidation—have indicated that potentiating slow-wave activity improved learning. Also, slow- wave activity can be enhanced with drugs that mimic the action of adenosine. What is the possibility that we could we speed up the rate of training and learning by enhancing the quality of sleep or make sleep more efficient so that we could get the benefit of 8 hours of sleep in 6 hours?
Stress - Ch 10 Which of the following events can cause Taking out a loan Failing a test Graduating from college Watching a hockey game  ALL FOUR. Stress-producing factors can be pleasant or unpleasant and can include physical challenges and goal achievement as well as events that are perceived as negative. Moderate exercise can stimulate which of the following: › Analgesia (pain relief) › Birth of new brain cells › Relaxation  ALL THREE. Regular exercise is linked to improvement in many dimensions of wellness Which of the following can be a result of chronic stress? › Violence › Heart attack › Stroke  ALL THREE. Chronic stress can last for years. People who suffer from long-term stress may ultimately become violent toward themselves or others. They also run a greater than normal risk for certain ailments, especially cardiovascular disease. Stress refers to two different things: › Situations that trigger physical and emotional reactions  stressor  A first date  A final exam › The reaction itself stress response  Sweaty palms  Pounding heart Stress describes the general physical and emotional state that accompanies a stress Systems in our body responsible for physical response to stressors: › Nervous system  brain, spinal cord, nerves. › Endocrine system  glands, tissues and cells Somatic nervous system: under conscious supervision › Moving your arm away from a Autonomic nervous system: not under conscious supervision › Heart rate, breathing, blood Parasympathetic division › In control when you are › Aids in digestion, storing energy, promoting growth. Sympathetic division › Activated during times of arousal, including exercise and when there is an › Sympathetic nerves use the norepinephrine to exert their actions on emergency related During stress, the sympathetic nervous system triggers the endocrine system. Functions by releasing hormones and other chemical messengers into the bloodstream to influence metabolism and other body Is specific, acting on target organs Chemical messages and actions of sympathetic nerves cause the release of key hormones that trigger physiological changes: › Heart and respiration rates increase › Hearing and vision become more acute › The liver releases extra sugar into the › Perspiration increases to cool the skin › The brain releases endorphins – chemicals that inhibit or block sensations of pain Once the stressful situation ends, the parasympathetic division of the autonomous nervous system takes command and restores The parasympathetic nervous system calms your body down, slowing a rapid heartbeat, drying sweaty palms and returning breathing to normal. Is a survival mechanism  Becomes inappropriate in some Stop lights or traphic When someone bothers you. The physical response to stressors may vary in intensity from person to Several factors help to explain these differences, all related to your cognitive (mental ) appraisal of a potential stressor. This appraisal is: Highly individual Strongly related to emotions The facts of a situation typically are evaluated consistently from person to person, but the personal outcome varies Effective and ineffective responses › Common emotional responses to stressors include anxiety, depression and fear › Behavioral responses to stressors are entirely under our control. (Somatic Nervous System) Effective responses Ineffective responses Learning timemanagement skills Using tobacco, alcohol or other drugs. Personality and Stress › Personality is the sum of cognitive behavioral and emotional tendencies › Clearly affects how people perceive and react to stressors. › Personality types:  Type A  Ultracompetitive, controlling, impatient, aggressive and even hostile  Reacts explosively to stressors and are upset by events that others would consider only  Type B  Relaxed and contemplative  Less frustrated by daily events and more tolerant of the behavior of others.  Type C  Characterized by anger suppression, difficulty expressing emotions, feelings of hopelessness and despair and an exaggerated response to minor stressors. Gender and Stress › Behavioral responses to stressors, such as crying or openly expressing anger may be deemed more appropriate for one gender than other. › Strict adherence to gender roles can limit one’s response to stress and can itself become a source of stress. Past Experiences › Can profoundly influence the evaluation of a potential stressor. Physical, emotional and behavioral responses to stress are intimately Symptoms of Excess Stress Physical symptoms Emotional Symptoms Behavioral Symptoms •Dry mouth •Excessive perspiration •Frequent illnesses •Gastrointestinal problems •Grinding of teeth •High blood pressure •Pounding heart •Stiff neck or aching lower •Anxiety or edginess •Hyper vigilance •Inability to concentrate •Trouble remembering things. •Disrupted eating habits •Disrupted sleeping habits •Harsh treatment of others •Problems communicating •Sexual problems •Social isolation •Increased use of tobacco, alcohol or other drugs. Stress can increase vulnerability to many  Several theories have been proposed to explain the relationship between stress and disease › The general adaptation syndrome › Allostatic load › Psychoneuroimmunology Hans Selye (1930 – 1940) Described an universal and predictablee response pattern to all stressors Recognized that stressors can be either pleasant (eustress) or unpleasant (distress). The sequence of physical responses occurs in three Fight- or-flight Long term overexposure to stress hormones such as cortisol has been linked with health problems. The long – term wear and tear of the stress response is called allostatic load. Depends on many factors including genetics, life experiences, and emotional and behavioral responses to stressors When your allostatic load exceeds your ability to cope, you are more likely to get sick. The study of the interactions among the nervous system, the endocrine system and the immune system  Stress, through the actions of the nervous and endocrine systems, impairs the immune system and thereby affects health. › Hormones and chemical messengers released during stress response influence the immune system by affecting the number and efficiency of immune system cells or lymphocytes › Neuropeptides, the biochemical language between brain and the immune system (also language of emotions) can strongly influence the functioning of the immune system. › During stress response, blood pressure rises › Emotional responses increase a person’s risk of CVD Altered functioning of the immune system › Changes in the immune system function include vulnerability to colds and other infections, asthma, allergy attacks, susceptibility to cancer and flare – ups chronic diseases (HIV, herpes). Other health problems Digestive problems Tension headaches and migraines Insomnia and fatigue Menstrual irregularities, impotence and pregnancy › Psychological problems: depression, anxiety, panic attacks, eating disorders, post traumatic stress disorder. Major life changes › New jobs, graduation, marriage, moving out. Daily hassles › Losing your keys or wallet College stressors › Academic stress › Interpersonal stress › Time pressures › Financial concerns › Worries abut the future Job-related stressors › Tight schedules and overtime › Worries about performance, salary, job security and interactions with bosses, coworkers and › Helping professions Interpersonal and social stressors › Community and society › Prejudice and discrimination › Language Other stressors › Environmental stressors: loud noises, unpleasant smells, industrial accidents, violence and natural › Internal stressors: personal goals, evaluate our progress and performance, physical and emotional states such as illness and exhaustion. The best way to manage stress is by pursuing a wellness lifestyle: › Being physically active and doing exercise  People who exercise react with milder physical stress responses before, during and after exposure to stressors › Eating well  Healthy, balanced diet helps to cope with stress › Getting enough sleep  Lack of sleep can be both a cause and an effect of excess stress › Finding social support  Sharing fears, frustrations and joys makes life richer and seems to contribute to the well being of body and mind. › Communicating in an assertive way  Respect the rights of others as well as your own rights to prevent potentially stressful situations from getting out of control › Striving for spiritual wellness  Spiritual wellness is associated with greater coping skills and higher levels of overall wellness. Learning to manage your time Set priorities Schedule tasks Set realistic goals Budget enough time Break up long term goals into short term ones Visualize the achievement of your goals Keep track of the tasks you put off. Consider doing your least favorite tasks first. Consolidate tasks when possible Identify quick transitional tasks Delegate responsibility Say no when necessary Give yourself a break Avoid your personal “time sinks” Stop thinking or talking about what you’re going to do and just do it Changing destructive thinking Reduce hostile, critical, suspicious and self-deprecating thoughts Modify your expectations Live in the present Go with the flow Cultivate your sense of humor Writing a diary › Helpful for those who are shy or introverted and find it difficult to open up to others. Relaxation techniques › Progressive relaxation › Visualization › Listening to music › Deep breathing › Meditation › Taijiquan Other techniques › Biofeedback:  Measure of stress (heart rate, skin temperature or muscle tensions) mechanically monitored. Feedback is given using sound. › Hypnosis and self-hypnosis:  An attentive perception and concentration, which leads to controlled imagination.  Lets participants choose to feel something other than anxiety or stress or pain. › Massage:  Reduces the stress response, depression and even increases Peer counseling › Student health center or counseling centers Professional help › Psychotherapy Find out if it’s stress or something more serious such as depression, anxiety or other emotional problems. › Symptoms for depression include  Negative self concept  Prevasive feelings of sadness and hopelessness  Loss of peasure in usual activities  Poor appetite and weight loss  Insomnia or disrturbed sleep  Restlessness or fatigue  Thoughts of worthlessness and guilt  Throuble concentrating or making decisions  Throughts of death or suicide. LAB 10,1 LAB 10.2 Identify your stress level an key stressors LAB 10,3 Developing spiritual similar documents
Grammar Tip: On to vs. Onto How do you know whether to use “onto,” or “on to” in your sentence? I find authors often confuse these two in work I edit, so here’s the tip I use to decide which one would be correct in any particular sentence. Onto is a preposition that indicates either movement to a position on or in a state of awareness about. On to is a combination of an adverb (“on”) and a preposition (“to”). The adverb “on” indicates position and the preposition “to” indicates movement. You can see why these two may be frequently confused. Yet the following two sentences have very different end results: • I drove up Broadway and on to the bank to deposit my check. • I drove up Broadway and onto the bank to deposit my check. In the first sentence, I’m just running an everyday errand, taking Broadway to get to my bank. In the second sentence, I’ve still driven up Broadway but I parked my car on top of the bank to deposit a check. I actually picked up a trick from The Chicago Manual of Style on how to determine which of these two options to choose. If you can insert the word “up” before “on” and the sentence still makes sense, “onto” would be the correct choice to make. Hall of Shame: Missing prepositions Today’s Hall of Shame is brought to you by another online newspaper headline. Rare tumor robs young woman’s voice My first thought was wondering how the young woman’s voice was robbed? Was it at gunpoint? Maybe it was robbed of a register of vocal range. No – what really happened was that a tumor caused surgeons to remove the young woman’s larynx. Her voice was not robbed. Instead she was robbed OF her voice. The author of the headline should have used a preposition (“of”) to show the correct relationship between “young woman” and “voice”.
In the globe of nutrition, it is crucial to know what it is that your entire body requirements to get from your foods on a every day basis. That is where the proper diet advertising and marketing kicks in. Go through on for some concepts on how to have a healthy, solid diet program with all the necessary nutritional vitamins and minerals. Make total grains a part of your every day foods ingestion. In general folks who include complete grains as an alternative of refined carbs are more healthy. Exchange white breads and pastas with ones that contain a hundred% entire wheat or yet another total grain of your decision. Brown rice is also a wonderful meals that will insert much more nourishment to your diet regime. Your digestive tract will thank you for eating entire grains by functioning properly. Entire grains also supply a steadier energy supply. Refined carbohydrates give a rapid burst of vitality and a spike in glucose stages, but this is adopted by a fast decline in power. Try to eat your broccoli. Broccoli is a wonderful way to get your nutritional vitamins, particularly vitamin K. Eating a single medium-sized stalk of broccoli requires treatment of your everyday vitamin K necessity. Furthermore, it also contains nearly two days’ well worth of vitamin C. Each of these nutritional vitamins aid minimize cancer hazards and develop sturdy healthy bones. In buy to get the best dietary value, cook broccoli in a steamer as opposed to boiling or microwaving. Insert salmon to your diet. Omega-3 fatty acids and niacin amounts are higher in salmon. Study has joined niacin in the avoidance of Alzheimer’s disease, and Omega-3’s can assist to reduce the chances of building coronary heart illness and most cancers. In purchase to lessen exposure to harmful harmful toxins, decide on wild salmon alternatively of farmed. Adopting a much healthier diet program will definitely boost your top quality of life. Great nourishment will take fairly a whole lot of aware interest, but in the end, it is really worth it for the greater overall health and more time existence you get out of it.
The Little Gray Fergie Tractor Tales from Wales A Ferguson tractor with a standard engine. Note the shorter dashboard and lower bonnet than on the model with the Perkins conversion. Courtesy Josephine Roberts Content Tools The Ferguson TE-20 (or “the Little Gray Fergie” as we affectionately call it) means a great deal to us Brits. In Wales we call it the Ffergi bach (“the Little Fergie”). Like red phone boxes, London Routemaster buses and black taxicabs, it’s something of a British icon. To us, it probably means something along the lines of what the John Deere means to you Americans. It is a big part of our agricultural history, and it is really “where it all began.” Of course there had been tractors before, but the Little Gray Fergie was the first tractor to really hit the big time. It was mass-produced like no other tractor before, and above all, it had the Ferguson 3-point linkage system, making it a more useful and adaptable tractor than anything that had ever gone before. A vast range of Ferguson implements meant that the Little Gray Fergie had the right tool for just about every job conceivable. Many of the smaller farms in the U.K. continued using horses for farm work long after tractors became commonplace, so for a great many farmers, the Little Gray Fergies of the late 1940s and ’50s were their very first tractors. When I speak to people who grew up on farms back in those days, it’s amazing how many of them say the Little Gray Fergie was the first tractor they ever drove. Harry Ferguson is famous for the revolutionary tractor hitch system known as the 3-point linkage. Even the most modern, top-of-the-range tractor today still uses that same linkage system patented by the Irish-born Ferguson. Passion for the mechanical Henry George (Harry) Ferguson was born in 1884 on a farm in County Down, Ireland. As an engineer/inventor, he had a passion for all things mechanical, not just tractors. He was a teenage apprentice in his brother’s car and bicycle repair business and before long he developed his own motorbike and racing car. He dedicated much of his life to promoting car and motorcycle racing. By 1909 he had designed a plane of his own and flown it, and in 1911 he opened a car business in Belfast. In 1914 he started selling American tractors, but it is said he found them heavy and somewhat dangerous to operate (sorry, guys). So he designed and built a plough that could be attached to the tractor via the famous 3-point linkage, namely the Ferguson System. In 1936 he started building his own tractors, and three years later he went into partnership with Henry Ford and more than 300,000 Ford-Ferguson tractors were made. In 1947 there was a falling out with Ford’s grandson and the partnership was dissolved. Alone, Ferguson designed the TE-20 (the Little Gray Fergie), which was assembled in Coventry by the Standard Motor Co. Some half a million of these little tractors were made beginning in 1946, making them Britain’s most popular tractor. The fact so many are still around and still working today is evidence of what simple, well-engineered machines they are. The Massey connection Later, Ferguson entered another partnership, this time with Massey-Harris of Toronto, Canada, forming the Massey Ferguson Co. This was another rather stormy partnership, illustrating that while Ferguson was obviously a genius, perhaps he wasn’t the easiest person to work alongside. Ferguson died at age 76 in Stow on the Wold, England, in 1960. The early Ferguson TE-20s ran on petrol, but some later models ran on TVO (tractor vaporizing oil) or diesel. TE was an abbreviation for Tractor England. There was also a TO-20 (TO was an abbreviation for Tractor Overseas, the designation given to those tractors built for the overseas market), but apart from the name there was virtually no difference between a TE-20 and a TO-20. Ferguson TO-20s were made in Detroit, but there must also be a large number of TE-20s to be found in the U.S. because Ferguson had some 25,000 Coventry-built TE-20s sent out to the U.S. and Canada. When the break happened between Ford and Ferguson in 1947, it meant the U.S. company had an abundance of implements to sell, but no tractors. To solve that problem Ferguson had the 25,000 Coventry-built TE-20s shipped over and these bridged the gap until the Detroit factory was up and running. If we include in our figures all the TO-20s built, then the number of Ferguson System tractors built between 1936 and 1956 comes to around one million. Ferguson tractors conquer Antarctic In 1955, seven Ferguson tractors accompanied the Commonwealth Trans-Antarctic Expedition to the Antarctic. Under the leadership of Sir Edmund Hillary, these tractors (four petrol models and three diesel) were driven to the South Pole. This was the first overland journey to the pole since that of Captain Scott, and these Little Gray Fergies became the first ever vehicles to be driven to the pole. Some of the tractors used on the expedition were on half-tracks with front skis, and some were fitted with an extra wheel on each side and full caterpillar-style tracks. All track kits were removable, and where conditions were favorable, the tractors were driven on standard wheels and tires. Other than fitted canvas cabs, the tractors were standard, with two being fitted with agricultural front loaders for lifting supplies. The tractors were reported to be capable of ascending a 1-in-7 slope of hard ice “where a man cannot walk without crampons,” and of operating in subzero temperatures. These famous little tractors never came home: They were left at the pole and were used by the American researchers there. I wonder if any can still be seen there today. A popular collectible So by now the Little Gray Fergie is 63 years old. Despite its fame, it is still one of the more affordable of the vintage tractors in the U.K. The reason for this, of course, is that so many of these little tractors were made and so many are still around today. Exhibitors love them because they are relatively simple to restore, they are light to transport from show to show, and it’s easy to obtain parts and implements for them. In the U.K., special classes are held for Ferguson tractors and ploughs in most of our ploughing matches, and at some shows a race is often held to see who can assemble a Fergie in the best time. George McAleer, an Irish showman with a top hat and witty repertoire, brought a totally dismantled Fergie to a show I recently attended. A local team of four mechanically minded chaps made it their mission to rebuild the tractor in record time, and have it running and driving on completion. I think the record currently stands at about 20 minutes. I suppose this can be seen as proof of what a simple (and user-friendly) machine the TE-20 is to work on. The P3 conversion The simplicity of the Ferguson tractor is completely at odds with the machines we have today. These tractors recall an era when every owner was deemed capable of maintaining his own machines without the need for expert help. It was even possible to upgrade your Fergie without much in the way of assistance, because a company called Perkins of Peterborough sold a 3-cylinder diesel engine and conversion kit for TE-20s. The Perkins engine offered not only more power than the original Fergie engine, but also better economy, and the kit would have included everything required for the changeover: engine, battery box, adapter plate, modified electronics and the extended dashboard required to raise the bonnet to accommodate the larger engine (the Gray Fergies with P3 conversions can always be identified by the fact that their bonnets are higher up than those on the standard Fergies). A detailed step-by-step guide would explain to the owner (or mechanic) exactly how to fit this new improved engine. The booklet claims that as long as instructions are followed to the letter, no problems should be encountered. How much more accessible mechanical knowledge was back in those early days! Imagine a company today offering step-by-step instructions on how to fit a new improved engine into your car in order to save you the cost of going to a dealership. That would be unthinkable in today’s throw-away world, where everything that’s broken is too complicated or too expensive to fix. The Gray Fergie does truly hark back to a golden era when British engineering was at its best, when machines didn’t break as soon as the warranty ran out, and when life was much, much simpler. FC
Brewery Processing and Packaging Equipment For consumers brewery might seem to be a niche industry, but the needs of the industry in terms of processing and packaging are immense. It’s not just that beer is the most widely consumed alcoholic beverage in the world, but also because there are so many different types of beer that are brewed, and also a variety of ways to package it. While beer is commonly made from barley, it can also be made from wheat, corn, or even rice. Whichever grain ingredient is chosen, hops are added to flavor the brew, act as a natural preservative, and to help clarify the beer. Carbonation is created during the fermentation process that results in an alcohol content that is usually between four and six percent, but can be a lot higher. While there are two major types of beer lager and ale, within these categories there are numerous varieties, including porter and stout which are dark ales, and bock, a dark German lager, as well as malts and pilsners. SMB customers range from mainstream global brewers that make brand names recognized throughout most of the world, to microbreweries that make their own special craft beers. All have their own special needs that relate specifically to the types of beers they produce, and the way these are supplied to retail outlets. The Brewing Process While ales take less time to produce than lagers, the typical brewing process has eight steps, from milling to filtering, after which it is packaged by filling into bottles, cans, barrels, smaller kegs or tanks for dispensing draught beer. The process, simplified includes: 1. Milling, during which the barley or other grain is crushed. 2. Malting, when malt is added to the grain. 3. Mashing which involves mixing the crushed malted grain with water, heating the mix, and then allowing the starches to break down and form a mash. 4. Lautering, when the spent grain is separated to form liquid wort that contains the sugar that will be fermented when brewing yeast is added. First the undiluted wort is extracted from the grains; then what remains is rinsed with hot water to extract the sugars in a process known as sparging. 5. Boiling of the wort for one or two hours to ensure it is sterile and won’t be contaminated. Hops are added at this stage. 6. Fermentation that is initiated by adding yeast to the boiled wort in a large vat, resulting in its alcohol content. 7. Conditioning which causes protein and remaining yeast cells to settle at the bottom of the fermentation tank. 8. Filtering, to clarify the beer prior to bottling, canning or filled into another vessel. Tanks and Containers for Brewing Different tanks and containers are required for different parts of the brewing process. These include grain silos, mills, weighing systems, mash tuns, pumps, lauter tuns, wort grants, coolers and aerators, brew kettles, yeast handling systems, fermenters, bright beer tanks, filters, and a variety of other tanks for mixing and storage. There are also CIP systems, carbo-coolers, home brewing kits, and distillation systems. And within each of these categories there are multiple choices in terms of size and precise operation. When it comes to fermentation, this is normally done in stainless steel tanks that have a valve that regulates the pressure required to produce different types of beer. If these tanks have cooling jackets, conditioning can be done in the same tanks. If not, and the fermentation cellar is cooled, then the beer must be conditioned in separate tanks in another cellar. SMB Machinery Brewery Processing and Packaging Equipment The kind of equipment used for filling and packaging depends on the type of primary packaging required. If glass bottles are used, then pressure fillers with crowners may be used. Various gravity fillers are also suitable. Valve can fillers, on the other hand, are used for canned beer. Breweries also use various tanks depending on their needs. In addition, there are palletizers and depalletizers, case as well as can and bottle conveyors, uncasers, can and bottle rinsers, can closers, crowns and cappers, pasteurizers, inspection systems, keg washers and fillers, and more. SMB Machinery is a one-stop-shop for all of your beer production needs, regardless of how big or small your operation is. Let us take care of your equipment needs while you focus on what you do best – producing top quality beer your customers will love. SMB Machinery Proudly Serves:
Stop the food confusion Last updated 10:40 02/04/2012 IS THIS GLUTEN-FREE?: Confused about what food allergy labels mean? You're not alone. Relevant offers Food & Wine It seems that many people get confused by all the allergy-free terms out there. And while yes, there are loads of people who are vegan, avoiding all meat, dairy and eggs, there are also people like me who are gluten-free vegetarians who eat very limited amounts of dairy but love eggs. Confused? I don't blame you. To help clarify a few things I thought I'd share my explanations for all the different terms used to describe a person by what they eat, or don't eat. Lactose-free: For  some people it is the sugar found in milk, called lactose, that causes problems. It is thought that lactose intolerance may occur because of some peoples' inability to produce enough of the digestive enzyme lactase, which breaks down lactose in the small intestines.  Many dairy products are actually low in lactose and can still be enjoyed in small, infrequent amounts. Generally speaking, dairy products that are tolerated in small amounts are; natural yoghurt, homemade milk kefir, ghee, hard cheeses and sometimes butter. Some people also find that eating goat and sheep products is not a problem. It's best to experiment with this yourself and figure out what your body does and does not cope with. We were once completely dairy-free, but after a few years can now tolerate ghee, yoghurt and feta cheese daily and butter in small amounts, occasionally.  Ad Feedback Egg-free: People who suffer from egg allergies can be allergic to the protein found in the egg whites and/or the egg yolks. They must avoid all foods containing whole eggs, egg whites or egg yolks depending on their allergies. Some people choose to avoid eggs because of personal beliefs also, see 'vegan/vegetarian' below. Vegetarian: Vegetarians eat a plant-based diet with or without the inclusion of dairy products or eggs. Some vegetarians also avoid eating foods containing rennet and gelatine. Vegetarians can be further defined by the following terms: Ovo-vegetarian: includes eggs but not dairy products. Lacto-vegetarian: includes dairy products but not eggs. Lacto-ovo vegetarian: includes both eggs and dairy products. Vegan: avoids all animal products including eggs, dairy products and honey. Pescetarian: includes fish but no meat. Semi-vegetarian:  includes fish and chicken. Raw foodists: Eat a raw food diet most generally consisting of raw fruits, vegetables and nuts that are heated to a temperature of no more than 40C/104F- 47C/118F, but some also include raw dairy products, seafood and meat. Some people eat 100 per cent raw food, while many others simply eat a predominately raw food diet. For delicious - and often gluten or dairy-free recipes, visit Emma's blog at My Darling Lemon Thyme. Recipe search Special offers Opinion poll How does a strong cup of coffee make you feel? More alert and awake Jittery, anxious It gives me an upset tummy I feel no effect Vote Result Featured Promotions Sponsored Content Laura Faire Cookbook Promotion
Cocaine - Effects, Risks, Crack, Overdose. Essay by beer_punk666Junior High, 9th grade January 2004 download word file, 1 pages 4.0 2 reviews Downloaded 84 times Cocaine is a harmful drug that has destroyed millions of lives and will hurt many more in the years to come. I am going to talk to you about what it is, short term effects, long term effects, physical and psychological risks, another form of cocaine and overdose. Cocaine is a drug extracted from the leaves of the coca plant. It is one of the most powerfully addictive drugs. It can be inhaled through the nose, dissolved into water and injected into the veins, or it can be chemically altered into a form of cocaine that can be smoked. It is possible for a person to overdose on cocaine the first time they use it. Some of the short-term effects include dilated pupils, increased blood pressure, increased energy, decreased appetite, increased blood pressure and increased heart rate. Some of the long-term effects include paranoia, irritability and auditory hallucinations. The physical and psychological risks of abusing cocaine are very serious. Brain seizures, stroke, heart attack and damage to the nervous system are physical risks. Hallucinations, confusion and imaginary insects crawling on the skin are a few of the psychological risks. Crack is another form of cocaine that had been altered chemically. It creates the same effects as cocaine but in a more intense way. It is in a form of crystals and it is smoked. Cocaine overdose is uncommon, but people do die from it. The amount of cocaine that causes an overdose varies from person to person. Some symptoms of overdose include stroke, seizures, heart attack, kidney failure, fatal rise in body temperature, and lastly death. Would you let a drug destroy your health, your mind and even your life? A white powder is not worth more than everything you have.
Abdul Muttalib and the well of Zam Zam We begin the story of the life of Muhammad صل الله عليه و سلم with the story of the zamzam well. As many Muslims are familiar with, the Well of Zamzam was a blessing for the sake of Ismail عليه السلام. When the Lady Hajra had run out of milk in the middle of the barren and empty desert, she implored Allah for sustenance. A gushing outpouring of water appeared under the kicking feet of Ismail عليه السلام, and had Sayyidina Hajra not tried to contain it, it would likely have turned into a large river to flow through Makkah. As it happens, she held her hands up the flowing water, and cried “zam zam!” in a surprised attempt to stop it’s flow, and then proceeded to build up a mound of sand to form a wall around it. Thus, it was contained to a well, and did not become that river. At the time, there were two tribes prevalent around Makkah, the Jurhum and Khuza’ah. Sayyidina Hajra permitted the tribes to take water from the well of Zam Zam, but insisted on maintaining rights to the well (a testimony to her mental fortitude–as a woman on her own in the desert, she was certainly strong to be able to negotiate with two tribes that were generally at war with each other, and would have certainly had no qualms about warring with her). Eventually, a time came when the Jurhum tribe was driven out of Makkah by the Khuza’ah. On their way out, the tribe decided to cover up the well, perhaps feeling spiteful towards the Khuza’ah and wanting them to suffer a bit. For a long time thereafter, the well of Zam Zam was no longer visible, and while the general location was know, the specific location was elusive. Eventually, Abdul Muttalib, the grandfather of Muhammad صل الله عليه و سلم, was given the task of providing pilgrims to Makkah with water. Thus began his search for the well of Zam Zam. One night, he saw a dream telling him where the well was located, and he began digging the next day at that spot. The rest of the Quraish resented this, because all this digging happened to be at the spot at which two of their idols (Isaf and Nailah) were standing. Abdul Muttalib continued to dig with his son, and realizing the extent of his isolation (just two of them against a whole tribe), he asked Allah to give him ten sons, and if Allah granted him his wish, he’d sacrifice one of them in the name of Allah. A short time later, the well was discovered, and over the course of his life, Abdul Muttalib was also granted the ten sons he’d asked for. The time came when he had to fulfill his oath to sacrifice one of those sons. He went to the Ka’bah and decided to draw lots to determine which son it would be. The arrows of chance chose Abdullah, the son who was most dear to Abdul Muttalib, and they left for the altar of sacrifice. His family and the various chiefs of the Quraish tried mightily to stop this sacrifice, but Abdul Muttalib was intent on fulfilling his promise to Allah. Ultimately, they all convinced him to take the advice of one of their prominent soothsayers, Saja, who would be able to find a wise solution. Abdul Muttalib agreed to this idea, as I can imagine he was not all too eager to see the demise of his son. The soothsayer advised that the blood money for a single person was ten camels. So, they should put Abdullah on one side, ten camels on the other side, and then draw lots. If the camels were chosen, then they would be slaughtered; but if Abdullah was chosen, then ten more camels should be added and lots should be once again be drawn. This process should continue for as long as it takes for the arrows of chance to fall upon the camels. In the end, ten lots were drawn, for the eventual number of 100 camels. Since then, the blood money for one person killed has been fixed at 100 camels. (In short, killing a human being is expensive business. Contrary to popular opinion, camels in good health are not cheap. A hundred of them, forget about it.) About Digital Nomad Professional blog-hopper This entry was posted in Stories from Seerah and tagged . Bookmark the permalink. 6 Responses to Abdul Muttalib and the well of Zam Zam 1. BuJassem says: Really liked this story and very relevant since I did Umrah last week. Elhamdillah. When I was a kiddo, I remember the zamzam well was under the tawaf area, which I understand is where the Zam Zam well is, however now it’s all closed and instead they use plumbing and other tricks to get the water to the masses. i preferred the old times when you could go down and get the water yourself. I am not that old, but just in this short time there has been tremendous growth in the number of muslim pilgrims.. mashalla.. but i am one of the few (perhaps hated) muslims that believe the number of people allowed to visit mecca (especially during hajj) should be really limited.. this talk of 2.0 or 2.5 million is not good. Drop it gradually to 1.0 million or even less is good with me. At the end of the day not every muslim can afford to do hajj due to money or health or lack of faith. Those who can do hajj do it more than once in their lives which makes me so angry. The prophet pbuh only did it once, so why overdo it and rob other muslims from the chance to celebrate such a fantastic journey? • MashaAllah! I hope you had a fabulous Umrah, and may Allah invite you back many times, ameen! It’s funny that you mention the plumbing of today’s ZamZam well, because my sister was saying, when I was writing this, “How cool would it be if we could go up to the well and scoop out the water directly?” Amazing that you had the chance in your lifetime! Alhamdulillah! I get where you’re coming from with the growth of the Hajj-going population. I also get why so many people can’t stop with just one Hajj. There was one Iraqi man we met, whose family has been living in Iran since the first Gulf war while he lives in Scandinavia…and the only chance he gets to meet his parents is by going for Hajj every couple of years. And then there was one family we met while in Hajj who’d been on their 14th Hajj…mashaAllah, but it really does make it difficult for others. I remember reading somewhere that Saudis are restricted to one Hajj per 5 year period…that would be a pretty good idea to implement for the rest of us, too. It is a fantastic journey…and somehow, over-using it seems to diminish it’s effect on many of the people who go repeatedly, well, the ones I see around me anyhow! Wa salaam 🙂 PS: Have you got a blog? If you do, I would be privileged to get a chance to read it! 2. BuJassem says: Salam sis, ok let me be clear.. i didn’t scoop water from the well, but when i was a kid (i was 5 yrs) i remember definitely going underground UNDER the mataf (where ppl circle the kaaba) and they had a few taps for ppl to fill up with zamzam. The well was not farther than a few feet away. Obviously you couldn’t get access to the well, but we were so close to it. The fact that it was underground was fantastic.. coz u were “closer” to the water. now they have pipes that go for kilometers!!! no more underground! the water is even cooled! i used to blog for about 3 yrs but then closed it for one main reason.. ppl would know more about me than i knew about them. anyway since my life changed a bit now, i have reopened it now.. and i believe u found it 🙂 back in the days, i was listed on itoot.net i wonder if they still recognise me! i will try not to spend the same time i did b4 on my blog.. and also make it more informative and less personal. hope u like it. i need to find a way to upload the old mp3s too!!! my own (haram) piano recordings. 3. Wa’Alaykum Salam 🙂 Well, ok, perhaps dreaming of anyone scooping it out in our lifetime was hoping for too much lol…but getting it from a tap so close to the well, that’s just as fabulous, alhamdulillah! Yes, I did find your blog…I realized the link was in one of the comments when I was editing, and was very pleased to read it. I can understand why you closed it; it’s a blogger’s struggle, maintaining a balance of how much to tell the world about yourself, while not knowing anything about the people who are reading you. Some bloggers have no trouble (or so it seems) with sharing everything, and seem to find a kind of freedom in that level of sharing. I’m not there, yet, and doubt I ever will be! I’m sure itoot people would recognize you…each blogger, even though there are thousands out there in any given community, are instantly recognizable, especially when they resurface, mostly because they are missed so much when they leave. I’m certain you were one of the sorely missed. You’re off to a fabulous reblog, brother 🙂 I look forward to reading more, inshaAllah. 4. Hey salaams! I must say that I wasn’t aware of this incident, so it is knowledge already for me! Thanks for sharing! 🙂 • Wa ‘Alaykum Salaam 🙂 You’re welcome! I found it fascinating when I first read this. The layers of history with regard to the zam-zam well are amazing. Comments are closed.
two or more pages that presents the scientific facts about................ Price: $10 USD Question description Application: The Science of Global Warming Rick Perry, a Texas governor, says that climate change is non-existent and that more and more scientists are challenging the claim that human activity has resulted in global warming (“Perry’s Global Warming Statements,” 2011). Actor Danny Glover blames the 2010 Haiti earthquake on global warming and criticizes a climate summit in Copenhagen for failing to create a significant response to the perils of climate change (Brent, 2010). Politicians, actors, and many other public figures make science-related statements. How do you know which statements are truly based in science, and which are not? In the previous unit, you explored the nature of science and learned about the scientific method. Knowing the fundamentals of the scientific process helps you to evaluate science-related information. Obtaining information from reliable scientific sources—which may not always be a politician or celebrity—is also critical. For this unit's Application Assignment, you respond to a scenario that requires you to identify and analyze scientific facts about global warming. You also describe the carbon cycle processes of photosynthesis and cellular respiration and relate these to global warming. References: Brent, B. (2010, January 16). Actor Danny Glover blames global warming for Haiti earthquake [Web log post]. Retrieved from Perry’s global warming statements. (2011, August 20). Houston Chronicle. Retrieved from To prepare for this Application Assignment: • Review Section 4.2, "Cellular Respiration" (pp. 76–83), in Chapter 4, “Fat: How Much Is Right for You?” in Biology: Science for Life, and focus on the following: • How cellular respiration occurs • How cellular respiration supports the life of an organism • What ATP is and how it functions in cellular respiration • Review Chapter 5, “Life in the Greenhouse,” in Biology: Science for Life, and focus on the following: • What global warming is • How global warming is related to the carbon cycle • How photosynthesis occurs • How photosynthesis supports the life of an organism • How photosynthesis compares and contrasts with cellular respiration • Log on to MasteringBiology (see the Media section of the Required Resources) to view the following BioFlix animations: • Cellular Respiration (approximate length: 4 ½ minutes) Focus on the series of events that occur within the animal cell to provide energy for the cell. • Photosynthesis (approximate length: 4 ½ minutes) Focus on the series of events that occur within the plant cell to provide energy for the cell. • Conduct additional research to identify scientific facts about global warming. (The Optional Resources section lists articles and websites where you could start your research.) • One fact should address the change in atmospheric CO2. For this information, refer to the article “Past Climate Change” listed in the Required Resources section. • Consider this scenario: You are a participant in a city council debate about global warming. During the debate, council members make conflicting statements about climate change, and most members are unsure about the sources of their information. The city council members realize that they do not have the scientific facts on global warming. You have been selected to conduct research on this topic and submit a report that includes these scientific facts. The council also wants you to explain the carbon cycle and how it relates to global warming. The Assignment: Write a report of two or more pages that presents the scientific facts about global warming and explains what the carbon cycle is and how it relates to global warming. Your report should address the following: Part 1: The Carbon Cycle Compare and contrast photosynthesis and cellular respiration by answering the following questions: • How are cellular respiration and photosynthesis alike? • How are cellular respiration and photosynthesis different? • Why are these two processes interdependent? Part 2: Scientific Facts About Global Warming Identify at least three scientific facts related to global warming that include: • How atmospheric CO2 has changed over the last 650,000 years and since the Industrial Revolution (1850) • How scientists measure CO2 levels • At least two of the primary factors thought to be involved in the observed changes in atmospheric CO2levels since the Industrial Revolution Part 3: How the Carbon Cycle Relates to Global Warming Explain how the carbon cycle relates to global warming, describing at least two implications of climate change for biological systems. Be sure to cite all references in APA format. Be sure to support your ideas by connecting them to the unit's Learning Resources and include science-related terms from the Learning Resources in your Application Assignment. Your writing should provide evidence that you understand the terms you include. Questions about this Assignment? Post the questions in the Contact the Instructor area,so all class members may benefit from the Instructor's response. Refer to the Unit 2 Application Assignment Rubric for grading details. Following the instructions below, submit your Application Assignment by Day 14. In order to receive full credit, all assignments are due on time. Should you encounter an unanticipated and uncontrollable life event that may prevent you from meeting an assignment deadline, contact the Instructor immediately to request an extension. Contact information for your Instructor can be found under the Contact the Instructor area. For a full description of the late policy, please refer to the "Policies on Late Assignments" section of your Syllabus Tutor Answer (Top Tutor) Studypool Tutor School: Cornell University Studypool has helped 1,244,100 students Ask your homework questions. Receive quality answers! Type your question here (or upload an image) 1830 tutors are online Brown University 1271 Tutors California Institute of Technology 2131 Tutors Carnegie Mellon University 982 Tutors Columbia University 1256 Tutors Dartmouth University 2113 Tutors Emory University 2279 Tutors Harvard University 599 Tutors Massachusetts Institute of Technology 2319 Tutors New York University 1645 Tutors Notre Dam University 1911 Tutors Oklahoma University 2122 Tutors Pennsylvania State University 932 Tutors Princeton University 1211 Tutors Stanford University 983 Tutors University of California 1282 Tutors Oxford University 123 Tutors Yale University 2325 Tutors
blacksmith alley logo A blacksmith's weld is very different from a normal weld. The pieces to be joined are heated to near melting temperatures and quickly hammered together. The principal is simple, but some practice is needed to become good at it. Welding requires flux. Flux Cleans the meeting surfaces and allows them to run together. The flux combines with the scale so that it melts and then prevents further scaling or oxidization. There are various formulas for making your own welding flux, most are based on borax. Until you get some practice welding it will probably be easier to just buy commercially made flux. That way you know any problems are not caused by the flux. Ends to be joined have to be prepared by scarfing. They are upset and hammered to thick tapered ends. The surfaces to meet are given round shapes. This is so that their centers meet and force out flux an scales. If the meeting centers flow together during the first hammer blows, the weld should be satisfactory. Heat the ends that have been prepared by scarfing. When they have reached an orange heat, pull them from the fire and sprinkle flux on them. Return the ends to the fire, and make sure they are in the center where the heat will be greatest. When the steel glows a light yellow, turn the faces downward. Continue heating the steel. A few sparks coming from the fire will indicate the welding temperature has been reached. Have the anvil face clean and the Hammer ready. Have a helper hold one piece with the scarf upwards, and you position the other over it and hammer the parts together immediately. The cold anvil face will take heat away from the weld. This can be reduced by bringing the parts together at a slight angle.The first blow brings the join to the anvil and also makes the weld. Hammering has to be done systematically. The first few blows are in the center, then towards the ends of the scarfs to close the thin parts. More blows come at the edges, and the work can be turned on it's side to get the width of the weld. It might be necessary to reheat if the weld is not fully closed before it cools. Clean the area with a wire brush before returning it to the fire. Bring it to welding heat again and quickly hammer the parts of the weld that still need treatment.
Monday, February 5 Children's Poetry: Mature Subject Matter? I've already posted one poem from Christina Rossetti's collection of nursery rhymes, Sing-Song. Many of Christina's nursery rhymes are hauntingly profound (like this one), and a few of her rhymes contained subject matter that was later considered inappropriate for young children, so these pieces were edited out of more recent editions. What is the taboo subject? Why death, of course! Perhaps it's right for us to shield our children from this difficult reality. In Christina's time, however, many children would have experienced the death of members of their own family. Protecting children from it was not an option. So Christina wrote rhymes for children about babies dying--and mothers dying, too--and mothers and fathers and aunts and grandmas read or recited them to the little ones. A Baby's Cradle A baby's cradle with no baby in it, A baby's grave where autumn leaves drop sere; The sweet soul gathered home to Paradise, The body waiting here. Why Did Baby Die? Why did baby die, Making Father sigh, Mother cry? Flowers, that bloom to die, Make no reply Of "why?" But bow and die. Motherless Baby Motherless baby and babyless mother, Bring them together to love one another. Notice the suggestions of hope for eternity and purpose in death. I suspect the children exposed to these rhymes, mature subject matter and all, were richer for it. What do you think? Are these sorts of nursery rhymes appropriate for children? February's theme here is children's poetry, and you are invited to join in. Links to this post: Create a Link << Home
Thursday, April 18, 2013 Raising Painted Ladies This past month we have been raising butterflies as part of life science at King's Dominion Academy.  We received our newly hatched caterpillars in the mail on March 13.  They came complete with all the necessary food in the bottom of the container, so our job was easy--watch and wait. Here's Day 1: They started out so small! They grew very quickly, and while they grew, we learned as much about butterflies as we could.  We checked out stacks of books from the library, printed out worksheets online, and made lots of butterfly crafts. Here's a sampling of what she made: AR & J painted wooden butterfly magnets We put together this wooden butterfly, and then painted it to look like a Painted Lady butterfly. stained-glass butterfly made by melting crayon shavings between two sheets of wax paper with a warm iron It was so much fun!  I learned so much I had never know before, and we were both amazed at God's handiwork in these small creatures.  Some things we learned: Anatomy of a butterfly (including scientific names like proboscis, thorax, compound eyes, spiracles, etc.) Life cycle of a butterfly Monarch caterpillars and butterflies are poisonous because of the milkweed plant they eat, and animals know not to eat them because of their bright colors and markings. Painted Lady butterflies (the ones we have) mimic this coloring as a protective measure. Many butterflies have false eyespots to confuse predators. Some butterflies migrate thousands of miles. Butterfly eggs are the size of a pinhead. You can tell apart a male from a female monarch butterfly by looking for a black scent spot on the bottom of their wings. Butterflies emit a special smell to attract mates. The caterpillars shed their skin up to 4 times before their final transformation. They need a body temperature of 85 degrees in order to fly.  They warm themselves up by shivering or basking in the sun. Painted Lady caterpillars love to eat thistle, a common weed. Butterflies taste with their feet. They suck nectar from flowers by unrolling their tongue and using it like a straw. When a Painted Lady butterfly emerges from it's chrysalis, there is a byproduct of metamorphosis that looks like blood called meconium.  (We were glad we learned this one, or else we would have been worried when we saw they red marks all over the cage.) Here they are getting bigger: And bigger... About 10 days after we received the caterpillars, the first caterpillar began making a chrysalis, and the others followed suit shortly after.  It's funny to see them hanging from the top of the container looking like a letter "J" before they shed their final layer of skin, which hardens into the chrysalis.  After they all were settled in, we transferred them from the small plastic container to the netted butterfly keeper. waiting while the mystery transformation happens inside! On the evening of April 4, we noticed at dinner that there was a butterfly on the side of the cage!  We were so excited, but were all a little disappointed that we missed seeing it emerge from it's chrysalis.  But we had fun looking at it with our magnifying glasses, and we even took it out and held it for a bit after it's wings had dried.  Anna Ruth named the butterfly Beautiful, hoping it was a girl. Josiah is learning to be a scientist I held it first to show the kids that it was safe! It tickles me! We actually never witnessed an emergence; it seemed like it happened so quickly!  But I did catch one right out of the chrysalis, with it's wings still crumpled up and wet. See the wings all crumpled up?! Once they were all butterflies, we put orange and banana slices in the cage, as well as some homemade nectar in a container with a paper towel wick for them to suck it out.  It was fun to watch them drink.  They really seemed to like the fresh fruit more than the nectar. enjoying a banana slice With Painted Ladies, you can't tell the males from the females, so you never know what you have, but Anna Ruth decided that we had a couple boys in there in addition to Beautiful, so she and James named the big, obnoxious one Dino.  We also had a butterfly with a large eyespot on the bottom on his wings, so she named him Eyespot.  Another one did not have antennae, had a wierd looking eye, and something wrong with his front left leg, so AR named him Poor Fellow.  About a week ago, we noticed that we had did indeed have some of each, because we got to see them mating! the lovebirds Now, we have teeny tiny little greenish eggs on the leaves and the bottom of the cage.  We'll see if we can have another go-around and witness the miraculous life cycle of the butterfly once again! Monday, March 18, 2013 A Knight with His Princess Our homeschool support group had a sweet event this past weekend--the Daddy/Daughter Dance.  It was a great opportunity for Rich and Anna Ruth to have some time together.  I found a beautiful dress for her at Ross for a great price, and she was so excited to wear it and see Rich's reaction.  I also made her a pearl bracelet to go with it, and she wore the pearl necklace that Daddy gave her for her 5th birthday.  She chose her own hairdo from a website that we use called Babes in Hairland.  If you'd like to try it, click here. She's getting so grown up! Love those dark eyelashes--she has natural God-given mascara! Rich and his princess view of the hairdo close up I also made 100 decorated cookies as favors for the girls at the dance.  It turned out to quite a bit more work and time than I anticipated, but I was glad that they turned out so well, and that the girls enjoyed them. Josiah had a huge fit seeing all these cookies on the table and being told he could not have one! I found some decorating ideas online, and it was fun to try them out I loved using the little pearl decorations Tuesday, March 05, 2013 Happy 2nd Birthday, Josiah! Doggie Decorations We celebrated Josiah's 2nd birthday on Sunday, so that we could spend it with both sets of grandparents and Aunt Jess and Uncle Brian.  The theme was DOGS! because Josiah is obsessed with dogs right now.  He really loves all animals, but he especially loves dogs.  Every time he sees one in a book or movie, he says, "Awwwww, doggie!"  And every bark from a dog when we're on a walk causes him to perk up, and with wide eyes he yells, "Doggie!"  It's so funny how he was just born loving animals, and how he has no fear of dogs, even when they are twice his size.  We do not have a dog, since I am allergic, but we asked Aunt Jess and Uncle Brian if they would bring their dog, Beaufort, for a visit.  All the kids loved seeing him and taking him on a walk.  Anna Ruth even got him to sit, lay down, roll over, and shake her hand--she loved being in charge and having someone actually obey her!  (Her brothers don't usually listen, even though she tries very hard.)  Having Beaufort there was the highlight of the party!  And I think Beaufort thought he had suddenly become royalty with all the petting, attention, and treats. :) "cousin" Beaufort The menu was hotdogs, with 2 different themed toppings along with a variety of chips.  One was called the Carolina Dog:  chili, cheese, and coleslaw (jalapenos and onion were optional additions), and the other was the Cuban Dog:  shredded lettuce, pineapple, diced avocado, and mojo sauce.  Both types were really good!  Of course for dessert, I made a doggie cake, and he seemed to like it a lot. Josiah enjoying his hotdog--he ate 2, plus chips! James and AR enjoying their hotdogs, chips, and root beer. Doggie cake--his eyes and ear got messed up in transit, but he was still pretty cute.  Notice the "2" on the collar. Josiah received lots of stuffed dogs, several of which he sleeps with every night.  He also got a book from Lita and Pop-Pop called I Love Dogs that is written in English and Spanish.  Aunt Jess and Uncle Brian got him two cute outfits, a stuffed dog, and a fun book about animals with buttons that make the animal sounds.  Gramps and Memaw got him a set of wooden building blocks, and he and James have been building with them ever since.  Mommy and Daddy got him a giant dog coloring book, a stuffed dog, and we are looking for a fun outdoor activity toy to get him as well.  Anna Ruth picked out a mini monster truck, since he likes to steal James' trucks.  He has been enjoying all of his gifts!  He is blessed with such a loving and generous family. dalmation pup from AJ and UB He always points to the "eyes" Josiah with all his doggies! He loved the book with animal sounds--so cute! It was a wonderful celebration.  We are so thankful for Josiah's life.  He is a joy and a blessing to our family. We love watching him grow and learn, and we pray that he will become a strong, godly leader and example, just like good King Josiah in the Bible. Here are a few more fun pics from the afternoon: AR had to borrow a sweatshirt for the walk--Thanks Aunt Carol!  James finally wore his doggie ears just for 1 picture. I made the doggie ear headbands, and then the kids weren't too keen on wearing them, so Dad, Jess, and I gave them a try. Thursday, February 28, 2013 If it's quiet, you know Josiah's up to something... James came into my room to let me know that Josiah was doing something bad, and this is what he looked like when I found him.  He had gotten into my lipstick, and knew just what to do with it.  I don't think it's his color though... :) He knows I can't stay upset when I see this face When I took a picture of Josiah, Anna Ruth wanted to join in on the picture.  My 2 blue-eyed beauties!  Can you tell they're related?!  Then James joined in as well.  He knows I get frustrated with him squinting his eyes in every picture, so he did it just to get a rise out of me.  Then, he asked to see the picture, and laughed hysterically at his silly face! I just adore these little cuties--they're growing up way too fast!! Wednesday, February 27, 2013 AR's Room Redo view from the door-- other side of the room-- and cute necklace hanger that happens to go perfectly and pretty framed verse handmade by Aunt Carol
Sunday, January 25, 2009 Martin Wiener's "An Empire on Trial" He applied the “Page 99 Test” to his new book, An Empire on Trial: Race, Murder, and Justice under British Rule, 1870–1935, and reported the following: Page 99 of my book, An Empire on Trial, describes the struggle between Governor Arthur Gordon and Trinidad planters in the 1860s over how the ordinary people of this British colony, formerly enslaved blacks and indentured East Indians, were to be treated. This struggle was repeated later in Trinidad and in many other parts of the British empire. It highlights one of the themes of the book, which is that the empire was not only divided racially, but also divided within the dominant "white" race. British officials, on the one hand, and white settlers, landowners and businessmen on the other, often had very different values and aims; indeed, often two distinct and clashing understandings of what "Britishness" and "the rule of law" meant. These clashing understandings deeply influenced the history of the British empire, more so than historians have as yet appreciated. In the book I use the criminal justice system - the prosecution of inter-racial killing - as a lens through which to explore, in seven different territories of the empire, how this conflict expressed itself over a specific, and highly inflammatory, issue. This conflict was part of a broader conflict than ran through the modern history of the empire, one which has implications even today: between the liberal values that permeated British life and thought and the facts of racial inequality in Britain's empire. Read an excerpt from An Empire on Trial, and learn more about the book from the Cambridge University Press website. --Marshal Zeringue
Friday, January 25, 2013 Even a Democrat Can Write a Decent Book Tom Daschle and Charles Robbin. The U.S. Senate. New York: Thomas Dunne Books, 2013. This book explains that Congress is designed to represent the public yet doing so in a manner that sustains democracy while allowing for the correction of errors (i.e. McCarthyism).. “Congress was created by geniuses so it could be run by idiots” is a Congressional saying. Partisanship and gridlock have long been part of its history yet thought its complex system, laws emerge. As Pennsylvania was the first state to elect its Senators, that made its Senators Robert Morris and William Maclay the first and second Senators. As of 2013, there have been 1,941 Senators. Daschle was the 1,776th Senator. The philosophical differences between the two political parties are not by famous statements of Presidents from both parties. Democrat Franklin Roosevelt noted his fellow Democrats believe “as new conditions and problems arise beyond the power of men and women to meet as individuals, it becomes the duty of government to find new remedies with which to meet them.” Republican Ronald Reagan evoked his the Republican Party’s philosophy that “government is the problem, not the solution.” In the 1970s and prior, Senators in both parties worked and compromised on legislation.  Senate Republican Leader Everett Dirkson stated “I live by my principles, and one of my principles is flexibility.” Today, the Senate is more partisan. Partisanship can be good when strong principles are defended. It can stifle legislative progress. George Washington explained explained the creation of a second Congressional chamber as a means to cool legislation that may have been hotly and improperly passed by one chamber. Washington remarked that “we pour legislation into the senatorial saucer to cool it.” The House Rules Committee establishes debate and amendment rules. The Senate mostly allows open debate unlike the House that places time limits. At times the Senate appears to be a place where somebody stands up to speak, nobody listens, and then everybody disagrees.” The Vice President, from John Adams under Washington to Richard Nixon under Eisenhower, primarily presided over the Senate, rarely spoke on the Senate floor, and seldom attended Cabinet and Executive meetings. Vice President Lyndon Johnson moved the Vice President’s office from the Capitol to the White House. Every subsequent Vice President has taken a White House office. 80% of current Senate correspondence is by email. The Senate has 20 committees, 68 subcommittees, and 4 joint committees with each Senator having 12 or less committee assignments. The author advise making committees “small and manageable.” The Senate had only several Select committees until 1816 when its 11 Select committees were made permanent. The Senate Appropriations Committee began in 1867 by separating out its duties from the Finance Committee. Senate debate is kept formal to try to keep discussions rational and orderly. Majority Leader Alben Barkley once advised “if you think a colleague is stupid, refer to him as ‘the able, learned, and distinguished Senator’, but if you now he is stupid, refer to him as ‘the very able, learned, and distinguished Senator.” A “routine quorum call” is usually a procedure to buy time without adjourning or recessing and can be rescinded by unanimous consent. A “live quorum call” is to hve Senators report to the Senate floor. Attendance can be compelled. The Sergeant at Arms once had Senator Robert Packwood carried to the floor. A Senator placing a hold on a bill is threatening to filibuster it.Holds do not exist under formal Senate rules yet are informally provided to Leaders. Daschle believes the Senator placing a hold should be publicly named, unlike current practice. A cloture motion seeks to limit debate. The number of cloture motions has vastly increased in the last five years compared to the past. This reflects the large increase in the number of holds. The authors observe “government is always better when its leaders hear as many points of view as possible, and gather ideas from the widest possible range of people who will be affected by their decisions.” Legislation is often passed by building bipartisan coalitions, compromises, defending principles, and having a strong message. Senators may agree to support a bill in return for support for another bill, called “logrolling”. Majority Leader Lyndon Johnson often used  non-legislative favors, such as appointments to boost a Senator’s home state popularity, A Majority Leader may bypass the committee system and place a bill directly before the Senate on the Calendar of General Orders. This risks attracting amendments that could have been considered in committee and having opponents claim the bill is being shoved through without due consideration. Legislative can be dual-tracked. A Majority Leader can preclude amendments from other Senators by using the right of first recognition to file all amendments under agreed to rules, an action known as to “fill the amendment tree”. This could be met with a filibuster. A Conference Report is a committee appointed from both chambers to resolves differences on legislation between the two chambers, The bill offered by the Conference Committee cannot be amended and can only be voted upon as is. In recent years, Conference Reports have deleted sections to which both chambers had previously agreed and attached new language. This is a “violate scope” procedure which has become more common. Such actions are reducing the use of Conference Committees. Debate on reconciliation bills is limited to 24 hours. They often have non-spending items attached to them. There is less socialization amongst Senators since airplanes allowed Senators to commute from their home states. Campaigns have become more costly, causing Senators to spend ore time fund raising and less time on Senate work, including socialization with other Senators. House seats have tended to be draw to protect incumbents causing members of Congress to be ore inclined to support their base of supporters then seeking legislative compromises. News reporting has become more slanted, from Fox News slanting right to MSNBC slanting left. Daschle observes that personal relationships between Senators used to overcome partisan barriers It is feared that more Senators today are more fueled by ambition and less by a desire for legislative accomplishment. The authors observe “keeping our republic always requires two things: fighting for ti and working at it. With the right enlightened approach, our best days truly do lie ahead of us.” Monday, January 21, 2013 An Issue Resolved by a Great Republican President Frederick Law Olmsted (author). Arthur M. Schlesinger (editor). The Cotton Kingdom. New York: Alfred A. Knopf. 1970.(originally published in book form in 1860) This book is an important resource as of one of the few journalistic observations of slavery conducted and written before the Civil War. While descriptions of slavery in “Uncle Tom’s Cabin” swept the nation, it described life on one slave farm. These writings were an effort to provide a broader observation of numerous farms in several Southern states. Readers find interviews and descriptions of farms, slaves, slave owners, and farmers using labor methods other than slavery in Southern states. These bring forth many compelling details of 1850s Southern farm lives, without knowledge of the impending war and its outcome that slavery would be abolished. While the descriptions are provided with journalistic integrity, the results helped enrage readers against slavery. While there are slaves expressing varying degrees of satisfaction and misery, and there were slave owners who cared more about their slaves than others (most often in the smaller farms), the brutalities reported about cruel masters and overseers shocked sensibilities. Even Olmsted broke observation neutrality in reporting a debate with a slave owner who noted the law then permitted him to beat both his wife and his slave, so he sees no difference, to which Olmsted felt compelled to reply that the law will act to protect the abused wife but no Southern laws then acted to protect the abused slaves. Olmsted delivered an an mathematically descriptive analysis that slavery was not economically efficient. Paying slave labor low incomes for life produced workers little motivated to work hard. Using violence as a motivation only produced workers who worked at levels just enough to avoid punishment. Slaves farms were further inefficient as owners provided housing and care to slaves for life meant that only a portion of the slave population was economically productive. One farm, rather than risk their life investment in slaves, hired Irish itinerant workers for dangerous work, The author provided examples and data showing that farms that had higher paid non-slave workers were far more productive and more profitable. In addition, the existence of a large number of low income employees was a damper on the Southern economy as they had little purchasing power to purchase goods. The book editor Arthur Schlesinger notes Olmsted hoped the Southern states would recognize the inefficiency of their slave system and end it on their own accord. He observes some abolitionists denounced these writings for not taking a moral stance against slavery. These were meant as depictions as to what was observed without commentary. They remain as a great collection of slave life descriptions published before the Civil War. Saturday, January 05, 2013 Biography of a Man Who Fought Tammany Democrats Among Other Things Thank You for Supporting the Tobacco Industry Sidhartha Mukherjee. The Emperor of Maladies: A Biography of Cancer. New York: Scribner, 2010. This detailed book examining the history of our awareness of cancer and how it is treated contains areas of interest to public policy readers. The Surgeon General Luther Terry report linking cigarettes to cancer wakened the public to the dangers of cigarettes. Millions responded by quitting smoking. this was not without controversy. The tobacco industry was politically strong as an employer of many voters in several states and as a lobbying force. The Food and Drug Administration was persuaded not to declare cigarettes as a drug, The Federal Trade Commission did act to restrict cigarette advertising and required health warnings posted on cigarettes. Congress was persuaded by the tobacco industry to tone down the warnings to not include that they can cause cancer. Anti-tobacco activists was spurred into action by the weakened Congressional action. Mary Lasker led a group, along with others, to lobby Congress. She was aided by Senators Lister Hill and Edward Kennedy. Hill retired and scandal diminished Kennedy’s effectiveness. A government panel issued in 1970 called for a great national investment in cancer research, A lesser program was eventually approved by Congress and President Nixon. Aren't Oceans and Gulfs Meant to Be Where Companies Dump Whatever They Want? Joel Achenbach. A Hole at the Bottom of the Sea: The Face to Kill the BP Oil Gusher. New York: Simon and Shuster, 2011. A 2010 explosion at a Gulf of Mexico oil rig killed 11 people. Several fail safe procedures designed to prevent oil from escaping into the water did not work A massive environmental disaster resulted while increased while experts determined how to stop the oil from continuing gushing out. For readers interested in public policy, this book shows how the Obama Administration tried to handle both public relations to show the President was on top of the situation as well as engaging in a frantic search for ideas to stop the leaking oil while the crisis remained unresolved. The Coast Guard is praised for acting as needed. They responded to their duties without concern for public relations nor possible political fallout. The author observes this was a problem of modern engineering. We need to better comparably assess risks with benefits. We used to be better prepared to know how to act when risks occur and crises result. We need to guarantee that back-up plans will work. When a crisis occurs, accept what the true damage is. Avoiding the truth won’t change reality. Keep “fixers” such as engineers away from the politicians, media, and public relations aspects and let them do their jobs. The author advises to use the Coast Guard’s “Thad Allen Rule: under-promise and over-deliver.” The author advises seeking critical thinking on complex technological problems from various sources As Achenbach writes, “call in the nerds as well as the cowboys.” We Have No Idea How a Democrat Can Be Elected in Romney's Massachusetts Deval Patrick. A Reason to Believe: Lessons From an Improbably Life. New Hork: Broadway 2011. The author expresses his appreciation for people who help others “not because they  had to but because they simply could.” These are values that molded him and that he hopes others share. The author served as Assistant U.S. Attorney General for Civil Rights before being elected Massachusetts’s Governor. Patrick was from a poor family growing up in Chicago. He graduated from Harvard. He received a Michael Clark Rockefeller Traveling Fellowship where he worked in Sudan doing field work regarding construction projects. He graduated from Harvard Law and then clerked for a Federal District Appeals Judge and then worked for the NAACP Legal Defense Fund. Patrick ran for Governor. He was attacked in radio ads, based on his having been a defense attorney, that stated “while lawyers have a right to defend admitted cop killers, do we really want one as Governor?” Patrick learned that politics can hurt oneself and one’s family. He was attacked because 13 years prior his brother in law pled guilty to sexually attacking his sister, even though they had since reconciled and were still together. Patrick, who worked for Coca Coa, was accused of being “involved with coke.” The job of First Lady proved stressful for his wife She had only a Chief of Staff and was attacked for having that, even though First Ladies in most other states and territories had multiple staff members. She was treated for exhaustion and depression. His wife was encouraged by the volume of support people expressed afterwards. Patrick sees public service as an important  calling for public good and improving future generations. He believes Obama has helped bring a bold idealism to politics. This has renewed his faith in politics. What Happens When You Get a Democrat as President Kristine Miller. Ellen and Edith: Woodrow Wilson’s First Ladies. Lawrence, Ky. University of Kansas Press, 2010. Woodrow Wilson was the only President to have two wives while President. Ellen Axson Wilson was First Lady for 18 months before dying. 15 months after Edith’s death, Wilson married Edith Bolling Gait. Wilson told Ellen upfront while dating her that he enjoyed being with other women. Still they married, Wilson became a noted scholar and national speaker. Ellen was very religious. Her faith was shattered when her brother, his wife, and their child drowned when a horse on a carriage was spooked and took their carriage off a ferry. Woodrow tried to revive Ellen’s spirits by having her do landscape painting with an impressionist painters artists colony in Old Lyme, Ct. Wilson’s public speaking led some newspapers to suggest Wilson run for President. Wilson was President of Princeton University. Wilson started a relationship with Mary Peck. He feel in love with her. Ellen went back to Old Lyme and painted as she recognized Woodrow’s “eternal love for Mary. Ellen and her daughters stayed at Florence Griswold’s boarding house. Ellen studied art from Frank DuMond. Woodrow ran for Governor of New Jersey. Ellen agreed to support him. Woodrow with to Old Lyme with Ellen and daily carried her stood and easel for her. Woodrow thought wrote almost daily to Mary. He complained the boarding house required the boarding house required both sexes to dine together to minimize embarrassment of the painters having paint on them. Ellen wanted to travel overseas but Woodrow felt Old Lyme “was good enough for him”. Woodrow probably wanted to remain close to New Jersey political advisors and to Mary in New York. Woodrow received the Democratic Convention’s nomination for Governor. He ran as a progressive. Ellen was a capable New Jersey First Lady. She attended many events with Woodrow and was well liked Wilson had the House pass some reform bills by persuading the Republican majority in the State Senate to approve them. Ellen went to Old Lyme for summer art school. Woodrow went on another speaking tour in Western states. He visited Mary in New York and visit Ellen twice. Woodrow was mentioned for President. A burglar robbed Woodrow and took only a suitcase of letters including love letters from Mary. The letters were never made public and Woodrow insisted they weren’t damaging. The Old Lyme impressionist artists had varying views on Ellen’s paintings. She was pleased when she won a New York exhibition under a pseudonym, so her name had no influence. William Chadwick, a noted painted, felt “she was not really good.” Wilson was nominated for President on the 46th ballot. At one point he thought he had no chance and almost released his delegated until he was persuaded otherwise. Woodrow assured Mary this had not changed his feelings for her. Ellen learned how to deal with reporters and their coverage of her life, including how much she spent on clothing and how se disliked women smoking. Woodrow was elected President. Ellen became an advisor and they discussed the pros and cons of offering a Cabinet position to William Jennings Bryan before making him Secretary of State. The Wilsons were not wealthy and they had to borrow money to move to Washington. Ellen continued her art in the White House. The Wilson Administration kept only two African Americans from the Taft Administration. Government officers were racially segregated, Ellen once wrote the whites were superior. Woodrow mocked the Negro dialect in telling jokes. Ellen fell ill with kidney disease and died. Wilson felt guilty that his career may have troubled her. It is believed by some that Edith Galt sought out the widower President. Wilson was depressed and had always needed female attention. Edith became close to Woodrow. Politically, Edith favored helping the Allied nations and did not like the pacifist views of William Jennings Bryan. He told Wilson she was glad when Bryan resigned and suggested getting rid of all pacifists. Woodrow and Edith became engaged Some advisors wanted the wedding delayed until after the reelection campaign. They feared the wedding would cost Wilson votes. Wilson’s son in law Gibbs McAdoo came up with a scheme. He falsely told Woodrow that someone anonymously claimed Mary was showing her private letters from Woodrow. Woodrow instead decided to tell Edith about Mary. When it was revealed the story was false, the White House aides who knew of the scheme was their powers diminish while Edith’s influence increased. The U.S. went to war. Edith volunteered with the Red Cross. She had the job of renaming captured German ships that were now in American ports. She also demonstrated wartime frugality. Edith joined Woodrow as he toured Europe advocating his proposal for a League of Nations. Woodrow began feeling ill yet pressed on. Several Senators expressed increasing concerns with Wilson’s League of Nations proposal. Woodrow felt head pains that worsened and made him nauseous. Wilson’s left side then went numb from a stroke. Edith decided to hide Woodrow’s illness. She took control of Presidential papers. She attempted to decide what Woodrow would do and then did it. An exception to this was the League of Nations issue where Edith chose loyalty to Woodrow’s long term plan over any likelihood he might have compromised to get it enacted. Edith had the White House physician stated Woodrow had nervous exhaustion. Sen. George Moses correctly charged that Woodrow had a cerebral lesion. Edith claimed Woodrow made dictations and issued orders. Woodrow though could function for a few moments. Edith adopted Woodrow’s style of responding to requests. Routine speeches were drafted by staff. Members of Congress and others demanded to see Woodrow. Edith arranged a staged visit with Woodrow sitting in the dark and avoiding shaking hands to fool people into thinking he was not seriously ill. Woodrow’s health improved and Edith was relieved to not take on so much of his duties. The Senate failed to ratify his League of National proposal. This depressed Woodrow. Woodrow wanted a third term. Yet the Democrats nominated James Cox instead. Woodrow became angry and then depressed when he learned this. Despite Edith’s involvement in White House affairs, she showed little interest in politics after Woodrow died. She declined an offer to be on the Democratic Party’s Women’s Advisory Committee. She did give a speech in favor of Al Smith for President. She later accepted being Honorary President of the Women’s National Democratic Club, yet resigned that after three years over the commercialism of their charity ball. President Franklin Roosevelt convinced her to endorse his National Recovery Administration, and she agreed by noting that this economic plan was similar to what Wilson had done in 1917. She published her autobiography. Woodrow Wilson was unpopular when he left office. Yet his controversial ideas gained popularity over time. Edith Wilson’s popularity increased over time as well. Friday, January 04, 2013 Ramifications From the Death of a Republican President James L. Swanson. Bloody Crimes: The Funeral of Abraham Lincoln and the Chase for Jefferson Davis. New York: Harper Perrenniel. 2010. During Lincoln’s second inaugural address, he foresaw more bloodshed over the slavery issue. His own blood was shed when he was assassinated. There were numerous Northerners who believed that Confederate President Jefferson Davis and others of the Confederacy had committed various “blood crimes”, including conspiring in the Lincoln assassination. The Confederate capital of Richmond, Va., less than 100 miles form Washington, D.C., was one of the last Confederate cities to fall. General Robert E. Lee warned the Confederate leaders that Union troops were approaching Richmond, that he would not be able to stop them, and he advised the Confederate government leaders to flee Richmond. Davis told his Cabinet that fleeing Richmond did not mean surrender. There was much Union debate over what to do with the defeated Confederates. Lincoln stated he wanted the Confederate soldiers to return to their homes and work. While he did not say so directly, Lincoln indicated he wanted Davis to flee the country. Others were revenge and wanted Davis hung. Lincoln seemed more concerned on working towards reconciliation. Lee was perturbed when Davis telegraphed that Davis was concerned about losing valuables. Lee’s men were fighting to protect Richmond as best they could. Lee felt he had given sufficient warning to evacuate while the Confederate leader seemed more concerned about his possessions. Thieves reigned over Richmond in the hours between the Confederate fleeing and Union troops arrival. African Americans gleefully heralded the Union troops as they entered. The Confederates burned supplies to keep them out of Union hands. After they fled, the fires spread out of control. Davis and his Cabinet fled on a train. The Confederate rail system had deteriorated so badly it took 18 hours for the train to reach Danville, 140 miles away. Davis had bee a war wounded Colonel during the Mexican War who served in Congress. He had refused to leave military service after being wounded. He served as President Franklin Pierce’s Secretary of War, when he argued for the U.S. conquering  the continent. He was then elected to the Senate. Davis believed in white racial supremacy. Throughout the 1850s he opposed the South succeeding from the Union David stayed in the Senate until his state of Alabama voted to succeed His farewell speech was notable and helped the Confederacy decide to elect Davis as President by acclamation. On April 4, 1865, Lincoln advised that the Union “let ‘em up easy” in dealing with Southerners. Davis called for “a fresh defiance.” Lincoln used the Confederate White House that Davis just fled to negotiate peace with Richmond residents. Lee had only a few thousand soldiers remaining, was outnumbered 5 to 1, and faced dwindling supplies. His troops were surrounded. Lee surrendered to General Ulysses Grant. Grant allowed Lee’s soldiers to return home with their horses. None were taken prisoner nor charged with treason. Learning of the surrender of Lee, Davis fled Danville. Davis declined to take advice that he flee the nation. He continued seeking a means to continue fighting. He moved to Greensboro and then fled there. He did so unaware the Lincoln had been assassinated Davis did not know of the plot even though many theorized he was behind the murder. A 1,600 mile train route of carrying Lincoln’s body in an open coffin was planned. Davis arrived in Charlotte and met with with little enthusiasm. North Carolina had sent the second largest number of soldiers behind Virginia to the Confederate cause. Many had died Only one person allowed Davis to go inside her house. Davis learned of Lincoln’s death. It was feared this would intensity Northern hostilities towards the Confederacy. It was also believed Lincoln would have treated Southern states better than would President Andrew Johnson. Lincoln’s funeral train was met along the route with many spontaneous public displays of grief. Former Rep. Job Stevenson gave a memorial address in Columbus where he called for vengeance against the South. Anti-Confederacy sentiment rose among many Northerners. Hundreds of people were beaten or killed for making anti-Lincoln or pro-Confederate statements. Hundreds were arrested for many types of suspicion of being involved in Lincoln;s death, including the owners of the Ford Theatre where Lincoln was shot. The Lincoln Funeral Train was met, though,with a majority speaking of reconciliation. President Johnson announced a reward for the arrests of Confederate leaders. The reward for arresting Davis was $100,000. Lincoln had considered capturing Davis to be of little significance. The capturing of Davis became important and a large hunt for Davis begun. After an initial hunt for assassin John Wilkes Booth ended with Booth’s death, attention was focused on finding Davis Davis was captured in Irwinsville, Ga. War Secretary Edward Stanton refused to allow the clothing that Davis wore when captured be put on display. Stanton wanted to not dispel a popular rumor that Davis was trying to escape dressed as a woman. Davis was shackled in prison, a process he resisted. News of this leaked to the press. Stanton ordered the shackles removed. National sympathy was against mistreating Davis in prison. There were fears executing Davis would turn him into a martyr. Davis was released on $100,000 bail, with much of it paid for by abolitionists and Union supporters. Davis refused to reenter politics, for to do so would require his signing a loyalty oath and make an admission his cause had been wrong. He became President of the Carolina Life Insurance Company at $12,000 annual pay, half what he earned as Confederate President. Davis wrote defensively of the Confederate cause in articles and a two volume book. He died in 1893. A funeral train took his body from New Orleans to Richmond. Sympathizers gathered along the train’s route. Tuesday, January 01, 2013 Republicans Like Children (just keep them off our lawns) We need to move from a general policy of incarcerating and detaining people with difficulties adjusting to society to one of providing assistance to people with problems. This should not be that difficult, for it was not so long ago that this was our overall philosophy.  It was former Pennsylvania Governor George Leader who made me aware of this when he cited that, when he was Governor, over 90% of people in a state institution when he was Governor were then in mental health facilities and less then 10% were incarcerated. Today, over 90% of people in state institutions are in prison or jail and less than 10% are in mental health treatment. This does not mean mental health institutionalization is the best option. Indeed, many used to be poorly run.  Progress has provided us with a range of counseling and  mental health services. Sadly, though, these services have been cut while incarceration has risen sharply. These numbers take on greater significance when realizing that a larger proportion of the population today is in some form of state institution. This shift has happened in a matter of a few decades. This is turning out to be a mistake both in term of lives ruined and in taxpayer costs. The lessening of counseling, mental health services, and drug and alcohol dependency services means that people with difficulties adjusting in society are more prone to enter government services in the most costly of services as that as an inmate. It is far better to identify people with mental health difficulties, drug and alcohol dependencies, and intellectual difficulties earlier in their lives and to provide them treatment, counseling, or the appropriate programs to enable them to overcome their problems and improve their lives. This will help them and help the lives of people they affect, from their families to strangers who may otherwise be victimized by their untreated behavioral problems. Our failing to provide this assistance costs us financially. One of the largest increases in state government spending has been on corrections and juvenile detention. These incarcerations cost many more times than the costs of treatment programs and counseling. Unfortunately, government budgeting personnel think in terms of annual budgets and not in reducing long term costs. The trend has been to reduce spending on treatment and counseling programs to help balance annual budgets. Yet we now see these savings are creating far more costs now than what they saved in the past. This trend must be reversed before these costs spiral out of control. I recall speaking with an official at Columbine High School years ago following shootings where several died. He spoke at a conference where it appeared nearly all attending agreed that more early intervention school counseling that could prevent further similar tragedies. Most teachers, school nurses, and school psychologists can identify around fifth grade which students are having problems adjusting. This does not mean each such student will become a murderer. Yet by providing appropriate counseling and treatment these troubled students can learn to adjust, improve their grades, and have better futures. This will include those who in the future may otherwise act out aggressively. With each successive tragedy, I see scholars, academicians, and others getting together and each time they arrive at similar conclusions. We need to get more children into counseling and treatment programs earlier in life, Yet, nothing is done in achieving what needs to be done. It is time we finally stop talking about obvious solutions and create these solutions. We have seen cutbacks in school psychologists, school nurses, and treatment programs for at risk children. School budget officials often find it hard to even consider funding such operations when they are having difficulties funding basic school offerings. It is time, though, that we insist that these programs be restored and properly expanded. It will save lots more money in the long run. It will save a lot of children from future difficulties. A few decades ago, I worked on legislation helping people with physical difficulties. Opponents incorrectly warned that passing laws making places more accessible would bankrupt us all. A large number of advocates joined in successfully fighting to see these proposals passed. The fears of bankruptcies did not occur. Instead, we now live in a nation where people have greater access to places to enjoy life and, which has made some prior cynics happy, spend more money. The lives of millions of people with physical disabilities have been improved. Unfortunately, there is no mass movement of people with mental difficulties and dependencies organizing to obtain support of programs supporting them. We need to advocate for those who can not help themselves or do not yet know they will need these services. We need to speak for those who can not speak for themselves. We do not need more tragedies where we agree something needs to be done and then forget about it until there are more tragedies yet to only repeat this fruitless cycle. We need to act in the interests of people in current and future need as well as in our own interests as long term taxpayers and potential people in harm for people with difficulties. We must act, and we must act now. When people realize they will improve so many lives, and save themselves money, there hopefully will be an outpouring of support.
Presentation is loading. Please wait. Presentation is loading. Please wait. Similar presentations Presentation on theme: "THE ANIMAL KINGDOM Ms. Fisher."— Presentation transcript: 2 Characteristics of ALL Animals… Multi-cellular Eukaryotic (nucleus) Consumers- can’t make their own food, receive energy by eating other organisms Mobility **Most animals have symmetry All animals belong to one of two groups: Invertebrates or vertebrates(chordates) complex This chapter we are discussing invertebrates, simple animals! 3 PART 1: Simple Animals Invertebrates 1. SPONGES: no symmetry Most simple of all animals Feed, breathe, and eliminate waste through pores Traps what it needs as water flows thru Sexual and asexual reproduction Animals have stinging tentacles Sexual reproduction Have “mouth” structure Radial symmetry Anemone Jellyfish Hydra 5 Symmetry Radial Originates from a center point Bilateral Divided into 2 equal sides (all vertebrates & some invertebrates have bilateral) 6 3. Flatworm Flat in shape Bilateral symmetry Cephalization Example: “head” structure Example: a. Tapeworm Parasitic- live on another living thing Intestines Can be very long b. Planarian non-parasitic found in freshwater mouth/anus same structure 7 4. Roundworm Round in shape “hookworm” Separate mouth and anus Bilateral symmetry Example: Ascaris Parasitic roundworm Causes death in 3rd world countries 8 5. Segmented Worms (most complex of all worms) Body divided into “segments” Live anywhere (land, fresh + salt water) Examples: Earthworm Leech parasite 9 Earth Worm Grinds food Digest Holds food 10 Agenda: Friday Objective: Identify the 9 Major phyla of animals and give an example of each Sponges Soft Bodied/Mollusca 2.Stinging Jointed-leg/Arthropoda 3. Flatworms Spiny Skin/Echinoderms 4.Round Worms Chordate 5. Segmented Worms Major Phyla.docx 11 Soft-Bodied Animals (a.k.a. Mollusks) Soft body- have a soft body protected by a hard shell- also invertebrates Usually protected with a hard shell Muscular foot for movement Examples: clam, oyster, scallop, slug, snail octopus 12 Soft bodied Animals: Grouped into 3 classes based off of the following traits: Kind of foot If a shell is present And # of shells 13 1st Class: Snails & Slugs Wide muscular foot Single shell-snails, slugs no shell * differ eyes 14 2nd Class: Clams Two shells Foot shaped like a shovel & is used to bury themselves in sand 15 3rd Class: Octopus & Squid No shell Muscular foot divided into arms Move by shooting a jet of water 16 Review: Features of soft bodied animals/Mollusca: All are invertebrates Most have one or two shells Most have a foot they use to move about 17 INVERTEBRATES 7. Phylum: Arthropods Phylum: Sponges Phylum: Stinging cell Phylum: Flatworm Phylum: Roundworm Simple Animals Phylum: Segmented worms Phylum: Mollusk (soft-bodied) 7. Phylum: Arthropods Class Insecta Arachnid Crustacean Complex, Invertebrates 8. Phylum: Echinoderms Starfish 18 Arthropods (Jointed-legs) Invertebrate Largest phyla (3/4 of all animals on earth!!) Exoskeleton Segmented body Head Thorax Abdomen Bilateral symmetry Appendages Legs, wings, antennae Grow by molting 19 Complex Invertebrates: 7. Arthropod Class: Arachnid 8 legs ( 4 pairs) No antennae 2 body segments Spiders, scorpions, ticks 20 Arthropod Class: Insecta 6 legs (3 pairs) 3 body segments 2 pairs of wings (most) 21 Arthropod Class: Crustacea Mostly Marine animals 2 pairs of Antennae 4 pairs of walking legs Some...1 pair of “pinchers” Crab, lobster, shrimp, crayfish 22 8.Spiny skin/ Echinoderm Radial symmetry “Spines” on skin 5-part body Tube feet used for movement, feeding, attachment. Example: starfish Phylum: Sponges Phylum: Stinging cell Phylum: Flatworm Phylum: Roundworm Phylum: Segmented worms Phylum: Mollusk (soft-bodied) 7. Phylum: Arthropods Class Insecta Arachnid Crustacean 8. Phylum: Echinoderms Starfish NOW, TO DISCUSS VERTEBRATES… 24 9. Vertebrates (Chordates) Complex Animals 9. Vertebrates (Chordates) Download ppt "THE ANIMAL KINGDOM Ms. Fisher." Similar presentations Ads by Google
Wednesday, December 12, 2012 Plato's `Lie in the Soul' and the Importance of Truth The Greek philosopher Plato (427/8-347/8 BCE) claimed that there was an objective, undeniable truth which one needed to recognize in order to live a full life. In his famous work Republic, Plato discusses the importance of justice but, as always, defines `true justice' according to his standard of objective truth. One of the largest obstacles in recognizing either truth or justice, or any good at all, is the lie in the soul which Plato defines in Republic Book II. Simply put, to have `the lie in the soul' means to believe wrongly about the most important things in one's life. To rid oneself of this lie one must, first, acknowledge that it is there and then work towards removing it and replacing with truth and a proper understanding. My article, published through Ancient History Encyclopedia, clarifies this concept further. The link to the article is here: And the article begins: In his famous work Republic, Plato discusses the concept of the `True Lie' or the `Lie in the Soul'. Through a conversation between Socrates and Adeimantus (Plato's brother) Plato defines the `true lie' as believing wrongly about the most important things in one's life. The `lie in the soul' can be understood as Plato's answer to the Sophist Protagoras' famous assertion that "Man is the measure of all things", that, if one believes something to be so, it is so. Plato repudiated Protagoras' claim in virtually every one of his dialogues and Republic is no exception. 1 comment:
Why Do Wet Clothes Appear Darker In Color? Why do clothes appear darker in color when wet? On the contrary water is colorless then how does this happen ? Water increases the scattering angle of light on fabric, and as a result, light is reflected and refracted in a greater number of “directions” than it is from dry fabric. Your retina is therefore receiving less overall reflected light. Since our sense of sight is simply a sophisticated means of making sense of a wide array of complicated light signatures, your brain interprets this as being darker. But wait.. If it’s scattering in all different directions, why would that make it appear darker? Imagine a dry tablecloth sitting on a table. Now pour water on it. No matter which angle you look at it from, it appears darker than when it’s dry. So the extra light must be absorbed somehow, not just scattered. The material itself does not absorb more or less light when it is wet or dry, because at the microscopic level, the strands and fibers of the fabric remain separate from the water itself i.e, water is merely filling all the gaps between the fibers and is held in suspension by its own surface tension. So, now that the fibers are surrounded on all sides (and in between) by thin layers of water, for light to reach the fibers of, say, a light blue shirt, it must pass through that layer of water before it strikes the fibers. There, nearly all of the light is absorbed except for the blue wavelengths, which are reflected. That blue light must again pass through the layer of water, wherein it is again refracted and scattered before leaving the surface altogether. In the end, less light is reflected back to your eye. If you’re wondering, where that “missing light” is going, take a colored shirt, make a wet spot on it, and hold it up between you and a light source. The wet spot will appear noticeably brighter on the reverse side, because the light is being scattered within the water between all the fibers of the shirt, and more of it is leaving through the back side. I’m no scientist, but I’d venture to guess that the amount of light energy coming through the wet spot on the reverse of the shirt is directly proportional to the amount “darker” the spot appears on the front side. Source : Reddit.com Many more interesting question are asked answered on Reddit.com daily. Be the first to comment Leave a Reply Your email address will not be published.
inertial guidance system Also found in: Thesaurus, Acronyms, Encyclopedia. Related to inertial guidance system: inertial platform, inertial navigation system ThesaurusAntonymsRelated WordsSynonymsLegend: Noun1.inertial guidance system - a system to control a plane or spacecraft; uses inertial forces robot pilot, automatic pilot, autopilot - a navigational device that automatically keeps ships or planes or spacecraft on a steady course ballistic capsule, space vehicle, spacecraft - a craft capable of traveling in outer space; technically, a satellite around the sun References in periodicals archive ? up to 18 km) relies on its own inertial guidance system. An inertial guidance system developed for the X-20 was later used on the X-15 rockets, as was an electric, rather than hydraulic, flight control system. Having decided that, the planners now also propose using an inertial guidance system such as flight simulators use for pointing the telescope. Sources said the Prithvi-11 missile was ingenuously developed in India and uses Advanced Inertial Guidance System with maneuvering trajectory to reach targets with reasonable accuracy. A mere four years later, a 28,800-pound, two-stage ballistic missile with a range of 1,200 nautical miles, powered by solid fuel rocket motors and guided by an inertial guidance system, broke the surface of the water like never before. The missile uses advanced inertial guidance system with manoeuvring trajectory. The missile which has the features to deceive any anti-ballistic missiles uses advanced inertial guidance system with manoeuvring trajectory and reaches the targets with a few metres' accuracy. L-3 Communications (NYSE: LLL) announced today that its Space and Navigation division's RIFCA (Redundant Inertial Flight Controller Assembly) inertial guidance system utilized by Boeing on the Delta Rocket has achieved it's 50th consecutive launch with 100% mission success on all 50 launches to date. In addition, its point-and-shoot, fire-and-forget inertial guidance system minimizes gunner operations and corrects for in-flight disturbances such as cross-wind.