text
stringlengths
144
682k
Advancement of English Language and The Future of Educational Partnerships Image source: The World of English The English lexicon has seeped into Indian culture way before Thomas Macaulay claimed to transform the education system by “forming a class of persons, Indian in blood and color, but English in tastes, in opinions, in morals, and in intellect”. What was once a bureaucratic and elitist language, has now become the common mode of communication in the lives of Indians. With the advent of ELT ( English Language Teaching) and the efforts undertaken by the British Council over the years, the ascendancy of the language continues to thrive through decades.  The English language has opened doorways to global networks, information exchange, job opportunities and business collaborations. While its predominance is attributed to economic ties that go way back to the 17th century, the recent discourse on linguistic imperialism and the threat to multilingualism has been a matter of concern for modern governments. Some view ELT as a mode of liberalization while others consider it a burden emanating social divisions. For a country that is known for its diverse culture and heritage, one can see why a homogenous English-speaking society can seem menacing to local languages and civilizations.  English- A Catalyst For Social Division? The British Council has been beavering away for years to consolidate the linguistic remnants of the colonial reign in the current globalized world order. The process of transforming the status of English from aspirational to universal is one of the primary goals of the programs. At a grassroots level, it all begins through the education system. British goals, both in the colonial period and today, are primarily political and commercial. The British Council’s Annual Report 2009-10 states that for an equivalent of every $1.60 of taxpayer’s money, it earns $4 more through its English teaching and examining worldwide. Teaching English in countries once administered by the British provides a great market for new economic and political relations.  Image source: GSA career WordPress It is hard to ignore the impact of English when the knowledge of the language is directly deemed for academic excellence among children. What was once a matter of prestige among parents has turned into a necessity for future competence. This evolving perception can be witnessed around the world, wherein South Korea, for example, ‘English fever’ has driven people to remarkable extremes (from prenatal classes and tongue surgery to sending young children overseas to do their schooling through English). The British linguistic model has become the sole parameter of global competitiveness. In India, the British animated show ‘Peppa Pig’ was seen to influence kids to adopt a slight British accent in their speech. The popularity of this show is a testament to how language as an agent can hold the power to influence young minds.  Onwards and Upwards- The Future All being said and done, the spread of English is here to stay. There are over 126 million English speakers in India, according to the British Council census released in 2010 and the number seems to be increasing ever since. Moving forward, the aim should be to harness this knowledge while simultaneously protecting local heritage. The demand for English is a part of a larger picture of change, modernization, access, and growth. It is not simply about teaching something called English but rather involvement in economic and social change; people’s dreams and desires; and cultural renewal.   Image source: British Council The United Kingdom has recognized these facets of language paradigms and attempted to formulate more inclusive policies. Through one of their endeavors English Next, the British Council has tried to bridge the social gap between English speakers and non-English speakers in India. It also identified the importance of preserving local languages through programs that encouraged at least 2 regional languages to be taught in schools apart from English. These kinds of integrated attempts are the future in tackling the class divide. The rapid growth of Hinglish is an example of the direction India is taking in adopting English mixed with local Hindi communication styles. This shift opens up new avenues of opportunities and upward mobility. Higher Education Collaboration – India has one of the youngest populations in the world and is expected to have more than 140 million people of college-going age by 2030. This makes it one of the biggest markets for potential hires, business investments, and trade inflows. With India bracing itself for one of the biggest reforms in its educational policies, it is the right time to forge partnerships with educational institutions in the UK to turn the youth into world citizens.  Image source: British council Every year thousands of Indian students attend universities in the United Kingdom and there already exists a great Indian diaspora in the island nation. Nearly 22,000 Indian nationals received a Tier 4 study visa in the UK in 2018-2019 (a 42 percent increase than the previous year). These statistics go on to demonstrate a strong foundation that already exists between the two nations. All that is needed for the governments is to overcome certain logistical and academic barriers to unbridle the full strength of the New Education Policy. To make India a truly global destination, the current education system needs to meet the foreign standards of grading and qualifications. While knowledge of English accounts for a great bonus to welcome international students, if the degrees awarded are of the global decree, there will be an increased inflow of foreign students in India. Universally recognized qualifications would enable a seamless transition for both nations to exchange knowledge and information. This would also make for a more sustainable and employable batch of graduates.  One noteworthy change in the new policy is the liberty of choice in terms of career opportunities. Diverse programs based on mutual exchange of courses needed by both nations can help build stronger relations instead of simply focusing on international rankings. Universities offering niche courses, despite their international ranking, should not be overlooked. Partnering for courses that align with economic goals should be given priority over the global ranking of the institution.  With the world moving virtual, it is a great opportunity for UK-India collaborative initiatives to take the cost-effective route of online programs and provide quality courses that can be taken through distance learning. With a standardized application procedure, it can help legitimize globally recognized diplomas across fields.  Student recruitment from India can benefit UK universities by providing a diverse campus with a more enriched university experience. The shortcomings in the educational policies of both nations can be overcome with collective efforts. Establishing mutually effective educational partnerships can benefit both nations in building a more competent, skilled, and inclusive youth. The spread of English if coalesced maintaining existing diverse linguistic communities can prove to be a great accelerating factor for the economy. Facebook Comments Madhura Rane Madhura Rane is a Journalism Intern at The Kootneeti You may also like...
Do trees senesce? August 25, 2021 • 10:45 am “Senescence” is defined as “deterioriation with age”, and, in biology, usually refers not to an accumulation of external injuries over one’s life, but to an inherent process of going downhill physically and physiologically, as many of us are experiencing now. In humans, things start going wrong, you get creaky, or your mind might go and diseases of age will occur. The evolutionary reason why animals aren’t immortal are not completely clear, but there are evolutionary theories. (One of them is that genes that make us reproduce early, but have the side effect of hurting us as we’re older, will be subject to positive natural selection.) But what about plants? Do they senesce, too? Well clearly some plants are genetically programmed to live only a year or so, but the paper at hand is concerned with trees. Do they senesce, too, or do they have a limited life span simply because, over time, bugs, fires. lightning, climate change, and so on eventually cause them to die? This new paper, which has sixty-one authors (!) says “yes”, but answering a bit more limited question: do larger trees have reduced fecundity (i.e., seed production)? Since we don’t know the age of a tree without counting its rings, the authors use size as a surrogate of age, though in many species the correlation between tree size and age is not tremendously strong. Another issue is that even in single trees, much less species, seed production varies tremendously from year to year, being huge in so-called “mast years.” Every squirrel knows this. So you can’t just look at seed production in one tree in one year, or even in an entire species in one year, to find out if it goes down as a tree ages.  (“Size”, by the way, is estimated as the diameter of the trunk.) We’d like to know this for several reasons: ecological prediction, use of trees to produce fruit or nuts (do they need to be replaced at a given time? and, if so, when?), and for studies of what truncates life spans in various organisms. Up to now the assumption has been that log of fecundity goes up with the log of a tree’s diameter, but the data from various species has been conflicting. This new paper in Proc. Nat. Acad. Sci. USA uses data from 597 species of trees, with measurements taken from 585,670 individual trees and 10,542,239 tree-years (this explains why there are so many authors). The conclusion? Yes, in general fecundity declines with tree size. (Fecundity is measured via standardized methods of seed sampling. Click on the screenshot below to read the paper, or get the pdf here; the full reference is at the bottom. The results are simple, and can be shown in one graph (below). Of all the tree species tested, 63% showed a decline in fecundity (relative to trunk diameter) as they age (actually, as they get bigger), while another 17% show an increase in seed production that slows down as the tree ages. The conclusion, then, is that “80% of the 597 species tested here show declining rates of increase in fecundity with diameter. . . and 63% of the total actually decrease.” They consider this “empirical evidence for declining fecundity with size”, ergo with age.  In other words, the reproductive effort of trees, like that of many animals, slows down as the organism ages. Trees get old and less functional. Here are some figures showing that decline. Subfigures A-C are for temperate regions, and D-F are tropical regions. Each plot shows the standardized (by diameter) fecundity versus standardized diameter (see paper for how these were calculated), and each line represents one species of tree. Plots A and D show a pattern of declining relative fecundity with diameter (age surrogate), and these have most of the data for both regions. Standardized fecundity is taken to be fecundity relative to maximum fecundity, which is why in A and D, it peaks at 1.0. Plots B and E show a pattern whereby fecundity first increases with diameter and then, as the tree gets bigger, the rate of fecundity increase begins to level off (a “sigmoid” graph), showing that the increase in reproductive effort slows down as trees get bigger (and older). Finally, plots C and F show a pattern in which standardized fecundity continually increases as the tree gets bigger. (It’s possible that if they kept measuring or found the very largest trees, the increase might slow down.) Clearly, A and D represent most of the trees surveyed. I’ve put the journal’s caption below the figure; click to enlarge it. The relationship between fecundity and diameter for species in temperate (A–C) and tropical (D–F) regions, where diameter and fecundity are scaled as D/DoptD/Dopt and f(D)/f(Dopt)f(D)/f(Dopt), respectively. A and D exhibit type A species (fecundity eventually declines); B and E show type B species (sigmoid increase in fecundity); C and F represent type C species (continuous increase in fecundity). Line transparency is proportional to the 90% credible interval width across the diameter ranges, such that confident predictions are opaque, and vice versa. The percentages of species for each type of fecundity–diameter relationship are summarized in Table 1. DoptDopt is the diameter when maximum fecundity occurs. So if anyone asks you if trees get old, you can tentatively answer: “Well, they appear to, at least insofar as older trees reduce their relative investment into seeds.” Qiu, T., M.-C. Aravena, R. Andrus, D. Ascoli, Y. Bergeron, R. Berretti, M. Bogdziewicz, T. Boivin, R. Bonal, T. Caignard, R. Calama, J. Julio Camarero, C. J. Clark, B. Courbaud, S. Delzon, S. Donoso Calderon, W. Farfan-Rios, C. A. Gehring, G. S. Gilbert, C. H. Greenberg, Q. Guo, J. Hille Ris Lambers, K. Hoshizaki, I. Ibanez, V. Journé, C. L. Kilner, R. K. Kobe, W. D. Koenig, G. Kunstler, J. M. LaMontagne, M. Ledwon, J. A. Lutz, R. Motta, J. A. Myers, T. A. Nagel, C. L. Nuñez, I. S. Pearse, Ł. Piechnik, J. R. Poulsen, R. Poulton-Kamakura, M. D. Redmond, C. D. Reid, K. C. Rodman, C. L. Scher, H. Schmidt Van Marle, B. Seget, S. Sharma, M. Silman, J. J. Swenson, M. Swift, M. Uriarte, G. Vacchiano, T. T. Veblen, A. V. Whipple, T. G. Whitham, A. P. Wion, S. J. Wright, K. Zhu, J. K. Zimmerman, M. Żywiec, and J. S. Clark. 2021. Is there tree senescence? The fecundity evidence. Proceedings of the National Academy of Sciences 118:e2106130118. 22 thoughts on “Do trees senesce? 1. So, less energy directed toward producing seeds and more energy directed toward the health of their wood? Makes sense to me. 2. Comparing seed production versus age seems an appropriate way to measure senescence. But I am a bit suspicious about relying so heavily on size, since that brings into play several different variables that do not change at the same rate. I would like to see the results be cross-checked with something more independent to size. A tree produces new branches each year, and on each branch will be leaves and flowers. So one thing to compare in small (young) versus large (old) trees is leaf and later seed productivity of one-year-old branches in differently aged trees. That could be an interesting student science project. 3. A biologically immortal species will eventually die off anyway, as the earth’s inevitable changes (climate, food, the emergence of other species etc.) will render it non-viable. And while that hypothetical species heads toward its doom, it will compete with its offspring, some of whom might be more fit, but who will die because the environment is already saturated with more experienced members of their kind. Species fitness therefore requires mortality. Unless we have life insurance and/or a will, dying is our last gift to our children. 1. This doesn’t make sense to me either. There isn’t really any such thing as “species fitness”. There’s just individuals trying to survive and reproduce, and some are better at it than others. Immortal individuals would be better at that. So the problem is explaining why individuals don’t live longer than they do. The answer is not that there is some imperative for older individuals to get out of the way of younger individuals. 1. Imagine a bird pair, both immortal, passing on that attribute to some/all of their offspring, who did the same. After a certain number of generations, the environment would be saturated with that species. A few might be lost to predation etc., but they’re not all dying within a generation or two, meaning new generations are competing with all the generations before. Now, imagine that this species all eat only one kind of fruit, and that fruit supply begins to dwindle, due to climate changes, a new species better at eating the fruit etc. Had the bird species continued to produce successful new replacement generations, some might have been born with a mutation enabling the consumption of a second food source, and they would have kept the species alive while the one-fruit variety died off. But because new, more fit generations are killed off by their forebears’ immortality, the species as a whole collapses. There might be other reasons that all creatures age and die. I’m just saying immortality wouldn’t be beneficial for any species in the long run. 1. I think there’s some evidence for instances of group selection – which your hypothesis is an example of – but them tends to be fighting words around here. 1. I’m not sure what I’m proposing qualifies as official group selection, which I understand as a situation where all members of a species possess a certain trait because it’s good for the species as a whole, even if said trait requires a sacrifice of individual fitness. What I’m saying instead is that immortality is a genetic deficiency on an individual basis. Yes, you could live and breed forever, and so will all your progeny, which sounds awesome, until you look at the mid-term consequences, specifically a devastating inability to adapt to a changing world. 4. So… do fertilized seeds from older trees contain more genetic copying errors or fewer? I’ve no idea, nor how this would play out in the ‘contribution’ of older trees. 5. Very interesting study. I wonder if fruit/nut-tree farmers have noticed that their older trees produce less fruit. Maybe the farmers aren’t around long enough to notice. 1. I’m curious about that too. I’ve noticed that citrus farmers in my area remove existing trees and plant new ones on a relatively short time scale, when the old trees aren’t really all that big. It seems like they wouldn’t do that unless older trees were less productive, or maybe lower productivity/ area-investment in maintenance, care and harvesting. Seemingly contrary to that, I once rented a house that had a huge grapefruit tree in the back yard that produced an incredible amount of fruit. this tree was easily 40 feet tall and shaded about a 3rd of the back yard and the house. During season you had to go up on the roof and remove grapefruit for fear of overload. It was also some of the best grapefruit I’ve come across. I also knew of a mango tree that was similarly huge, bigger actually, and productive. The mangos were the best, like vanilla ice cream with exotic fruit. But those are just anecdotes. 1. Thanks for the added context, anecdotes or not. It seems that the farmers would only go through that laborious process if it provided results. Maybe young orange trees are different producers than grapefruit or mango trees? Who knows? I miss having citrus around. I grew up in California, and we had a lemon and orange tree that produced like crazy- best orange juice or lemonade ever. Fresh lemons off the tree really do have a different (and better) taste than store bought. Having a grapefruit and/or mango tree that produced the fruit you describe would be heaven. 6. I showed this to my wife, who has a considerable background in botany and molecular biology. She got quite exercised over the various possible problems. One being that at any given time, there will be branches in the tree that are years older than other branches. Its well known to fruit growers that trees lose productivity over time even though they are well tended and kept healthy. In that sense, tree senescence does not seem terribly new. She went on for quite a bit! 1. Now I could be wrong, but my take on this is that they were attempting to show that aging explains, at least in part, the decline in fruit (or seed) production. There are many causes for declines in fecundity and they wanted to see if aging can explain some of it (indeed, if it occurs at all). I appreciate your wife’s consternation at a study of something that seems obvious, but it is not uncommon that scientists try to test, understand and quantify obvious things. It was also not clear if what fruit farmers see in domestic plants is reflected in the wild. 2. Honestly, I am surprised by the whole thing. My observation was to the contrary, and I thought it was common knowledge, that in its full maturity a tree will devote all its photosynthetic output to reproduction. After having reserved it for growth during its earlier years, in order to get to canopy height. I’m specifically thinking about the locally native maple, which is a short lived, fast growing large forest tree that I have seen doing exactly that. What fruit trees may or may not do seems more to do with the breeders who select them. 7. For trees with regular tree rings one can determine the age by boring a small cylindrical core out of the tree. I’m not sure if this harms or stresses the tree. Stressed trees tend to produce great amounts of seed. I gathered from George C Williams that if an individual can die, and hence sooner or later does, senescence is inevitable. and the greater the chance of dying, the earlier the senescence will kick in. [It is borne out by eg. some birds, that can escape predation, which can live pretty long (such as psittacines or fulmars), or trees with a low death rate, while animals with a high death rate (predation) age quickly, such as rats or opossums)] 8. “This new paper, which has sixty-one authors (!)” – well, that’s another tree gone just printing their names… A few years back, the Times Higher Education printed an anecdote by someone who received an anguished email from the co-author of a CERN physics paper, which read in part along the lines of No, I’m not upset about being the 37th author, I’m upset about being the 37th author called Wong! 9. My favorite senescent tree is to be found beside the Yellow Brick Road: “Are you implying my apples aren’t what they should be?” 10. I haven’t read the article but, perhaps unwisely, will comment anyway. I think questions of growth geometry could explain some of the patterns shown as well or better than “senescence”. When a tree grows, tree volume and the mass of metabolizing tissue increase in proportion to the volume occupied by the plant. On the other hand, photosynthesis should be proportional to surface area and limited to half or less of the volume occupied by roots, trunk, limbs, twigs, etc. The surface-volume relationship leads us to expect that, as a tree grows bigger, there is less excess photosynthetic production per unit of volume available for investing in reproduction. If trees could get big enough, there should be a point at which everything photosynthesis produced would be necessary just to keep the plant alive through the night and no reproduction would be possible. Also, I suspect that the larger trees that were measured tended to live in high-biomass forests. These sites might be expected to have soil nutrients relatively depleted compared to sites where smaller plants (in clearings?) were measured. The reduced relative reproductive effort of large plants may simply be an ecological artifact of diminished soil quality. 11. As expected, when cocoa trees (Theobroma cacao L.) age, “bean” yields decline. Old trees are often replaced with new plantings. The problem here, though, is that the farmer must wait for perhaps five years for full production again. That is why the Malaysian Cocoa Board recommends side grafting branches from young trees onto the lower trunks of old trees. In a few years, when the new branches are producing well, the main trunks are cut down. This way the farmer has no down-time for production. Rejuvenated trees are apparently just as young and healthy as its grafted branches. Thus it appears that the trunk and branches age faster than the roots. Leave a Reply
Crime Solvers: an Analysis of the Detective Story 300 Words2 Pages "Who done it?" The persistent quest for bringing a perpetrator of a vile crime (usually involving murder) to justice has become the definition of the detective story. The question of "who done it" keeps challenging all kinds of detectives in novels, stories, and films, not to mention their audience, proving to be one of the most enduring, and most popular genres of fiction ever created. All eyes are on the detective, the main protagonist, through whom the story is told either as a first-person narrator or in the third person as portrayed by the author. We depend on him to guide us through this puzzling journey; but not all detectives use the same routes. This can be supported by comparing Sherlock Holmes in The Hound of the Baskervilles (a classic detective story) with Sam Spade in The Maltese Falcon and Jake Gittes in Chinatown (both considered hard-boiled). Even though the detectives above differed in style, the stories they're in seemed to contain certain common elements! that are found in both classic and hard-boiled detective stories. (1) the seemingly perfect crime; (2) the wrongly accused suspect at who circumstantial evidence points; (3) the unskilled and clumsy style of dim-witted police; (4) the greater powers of observation and superior mind of the detective; and (5) the startling and unexpected conclusion, in which the detective reveals how the identity of the culprit was ascertained. The detective story frequently operates on the principle that superficially convincing evidence is ultimately irrelevant. Usually it is also self-evident that the clues from which a logical solution to the problem can be reached be fairly presented to the reader at exactly the same time that the detective receives them and that the detective infer the solution to the puzzle from a Open Document
Ducati’s famed Desmodromic valve system allows its engines to reach tremendous speeds but demands absolute precision in machining and assembly  The machines work non-stop throughout the year producing camshafts for all the different Ducati engines. Fulvio Abbondi, Manufacturing Technology Specialist at Ducati Motor, says: “Great precision is required when making the shaft, with the rather elaborate machining process carried out entirely within our factory. This is a very expensive component. It is made of a special steel alloy and is already expensive when, as a blank, it reaches the machine tool after its first rough-turning”. Taking control Abbondi mentions the role played by tool breakage detection. “It is essential that checks be carried out on the work performed by the machines. Renishaw NC4 systems were installed on two work centres. Immediately after a tool is loaded in the spindle ready for machining it crosses the device’s beam at a set height. If the cutting tip is broken, for example and instead of being 100mm long it is 97mm, the laser system triggers an alarm. Clearly, each tool has its own length and diameter, and the system takes this into account when the tool passes through the checking beam.” Eye for detail “The first thing we did was to install a system provided by the machine tool manufacturer that enables the power used by the spindle motor to be checked,” continues Abbondi. “This system checks the degree of wear of the larger bits, used to drill the deepest holes, in which the stress during machining is more apparent. If the torque increases it means that the tool is worn and so the alarm goes off. But we also needed to a quick and reliable way to detect tool breakage, even the smallest ones, which usually manage to escape most detection systems.” Conventional contact-detection systems have certain weak points and are usually unsuitable for small tools. The tool is brought into contact with a button or rod which activates the device. There is also the danger that the contact itself could break or damage the tool. This means that work can only be done at low speed, which slows down the process and considerably lengthens cycle times. The systems are often fitted inside the operating area, occupying valuable space and causing possible collision risks, not to mention poor reliability due to the fact that they tend to jam.
Research in the Laboratory of Food Safety and Quality “Lipids” is a grouping term for a diverse range of different compounds and structural features. It comprises a vast number of compounds with different structures and properties. In fact, in latest efforts, classification is based on eight categories with a total of 84 sub-classes. Some example of common lipids are shown below. Structures of a fatty acid, a sterol and a glycerophosphocholine Structures of a fatty acid, a sterol and a glycerophosphocholine Lipids are in food, together with carbohydrates and proteins, one of the major constituents in food and significantly contribute to the caloric value. In addition to energy storage lipids play a diverse set of roles in metabolism, from essential bile acids, to integral building block of membranes and cell signaling. Many of these properties depend on precisely defined structures, and trying to understand the roles requires an exact knowledge of these. This, however, can be very challenging since lipids can exist in an almost indefinite number of isomers and homologues. For example, ten different fatty acids can be assembled to over 500 different triacylglycerols, many of those sharing the same molecular formula (and hence molecular mass), which makes them difficult to distinguish by mass spectrometry. This is why the analysis of lipids is an equally challenging and exciting research avenue. Food Chemistry Food, both animal and plant-derived, represent very complex systems consisting of a multitude of endogenous (e.g. carbohydrates, proteins, lipids, DNA, vitamins…) and exogenous (e.g. additives from processing, spices, contaminants) compounds. While only 100 – 200 of these are routinely assessed there are over 25 000 different compounds known to occur in food. Considering the plant kingdom alone is estimated to encompass over 200 000 different metabolites the total number of potentially present food metabolites is estimated to be 500 000. Even only representing a part of this, lipids still comprise a vast number of structures, and many are of interest, for example, due to their dietary value (e.g. plant sterols or tocochromanols) or as markers for authenticity (e.g. wax esters in olive oil). In addition to the compounds occurring native in the food processing and secondary (oxidation) reactions can further increase the number of possible compounds. For example, autoxidation of monounsaturated fatty acids can lead to four major hydroperoxides, which again can react further to several secondary products. Similarly, we previously detected in a vitamin E food supplement capsule over 150 tocotrienol isomers. Only four isomers are naturally occurring, while the remaining were likely a product of improper processing. These altered structures do not only significantly add to existing structural complexity but also lead to different bioactivities of the individual molecules and health-related properties of the food as a whole. I am therefore very interested in following and understanding the processes that lead to these alterations. Archaeological Chemistry Archaeological Chemistry describes the application of chemical methods for the analysis of archaeological materials, be it human remains or pottery. Within this field I am particularly interested in Organic Residue Analysis (ORA). ORA is based on the prerequisite that traces of food-related molecules can be preserved in archaeological ceramics for thousands of years. Picture showing a ceramic sherd, ca 6 cm big next to a length/colour scale Archaeological ceramic sample that can be analysed for lipid residues Due to their hydrophobicity (compared to proteins or DNA) lipids are usually considered to survive best. Using techniques such as gas chromatography coupled to mass spectrometry (GC-MS) or GC coupled to combustion-isotope ratio mass spectrometry (GC-C-IRMS) the molecular and isotopic composition of these preserved lipids can be used to infer the original vessel contents. This can, for example, be used to track the dispersal of dairying in prehistory. Due to mixing of resources during use and microbial and abiotic processes after deposition the lipid patterns found in archaeological samples can be very complex, comprising several hundreds of individual compounds. My research in this field has previously focused on the development and application of cereal-specific lipid biomarkers (NERC-funded project: Palaeolipidomics: A new biomarker approach to trace cereal agriculture in prehistory, PI Dr. Lucy Cramp, University Bristol). We could show that alkylresorcinols and plant sterols, well known minor lipids in cereals can be absorbed and preserved in archaeological ceramics and provide a means to detect prehistoric cereal processing. GC-MS chromatogram of an archaeological lipid extract showing a high number of signals which demonstrates the complexity of the sample GC-Q-ToF MS chromatogram of a lipid extract from an archaeological sample A further research interest of mine  is the advancement of analytical methods in archaeological chemistry, and particularly the opportunities that high resolution mass spectrometry offers for comprehensive lipid profiling of archaeological samples. Furthermore, improvements in ( semi-automated) data processing means that not only larger data sets can be efficiently processed but also improves the data that can be derived from individual samples. Analytical Chemistry Analytical Chemistry, choosing from a vast number of available techniques, allows to detect, identify and quantify individual compounds or mixtures. Particularly the combination of chromatographic techniques with mass spectrometry and similar techniques creates an extremely powerful tool for not only the separation of complex mixtures into their individual constituents but also to identify and structurally characterize these. When high resolution mass spectrometry with accurate mass capabilities is used, even possible molecular formulas can be calculated from the measured molecular weights of even minute amounts of samples. My current interest is the application of these techniques to achieve the most comprehensive analytical description of lipids in food possible. For this I am using both gas and liquid chromatography, (high resolution) mass spectrometry and ion mobility spectrometry. Particularly for highly complex samples the combination of different techniques and separation dimensions is key to achieve the separation and identification of key compounds. Picture showing three chromatographic peaks together with matching Mobilograms and MSMS Spectra as well as a heatmap of m/z values vs mobility showing a high number of signals Chromatographic separation and Ion Mobilty Spectrometry and Mass Spectrometry working together to identify individual compounds in complex mixtures
How is this different? Home/How is this different? How is this different? a) Cooperatives? A coop is an organisation, whereas the Commons is an organisation of organisations. This means that the coop can’t spread its idea apart from growing – it can’t multiply. It also means that it isn’t rooted in a context that it supports and is capable of supporting it. Whilst coops are participative and community orientated they do not specificially favour meritocratic leadership on behalf of the common good and they may not recirculate profit into the community. b) B Corps?Whilst they are legally bound to contribute some surplus to socially positive causes they still have shareholders and if they become really successful in the free market like traditional ventures they are subject to aggressive takeovers like any other company whereas a Commons Society cannot be bought as it is protected by the Commons. B Corps do not alter the ownership and cannot prevent new owners from changing their constitutions back to what they were. c) A CIC? CIC’s are legally bound to contribute some surplus to socially positive causes, and cannot be sold, but a CIC has no systemic mechanisms for multiplication, for capturing new companies into the Commons or for distributing more than its own surplus into the community. In effect the Commons Society converts any normal limited company into a CIC, at less cost and with less administrative overhead. d) Any other Social Enterprise? Individual social enterprises even when successful remain isolated oases in the dysfunctional landscape of the free market . The Commons Society provides a protected sub-zone in the economy where things are done better and it is easier to be truly human and planet centred. e) What is its USP then? It is a systemic solution to the negative aspects of the market mechanism. It has the potential to alter the existing economic landscape by creating a sheltered zone within the market and through its mechanisms for distribution or expansion to be a model of a wellbeing economy rather than a model of an ethical enteprise. It integrates purpose within the market mechanism. About the Author: Leave A Comment
Contour Effect in Photoshop Tutorial graphicxtras > Adobe Photoshop tutorials > Effects tutorials By Andrew Buckle, Updated : 2021 Contours and how to create them using Photoshop gradients tutorial. You can create contours using Photoshop gradients via a style and outer glow style. The preset to use is a multiple stop preset. You can also use adjustments to modify the contour effect. You can also modify the contour in countless ways by using contour effects etc 1. Where is the contour tool in Photoshop Sadly there is no contour tool but you can create a contour effect by using the presets and the best one is probably the outer glow feature. You can set this up by using the outer glow in styles 2. Set the outer glow style A good way, and there are always many ways to do this, is to use the outer glow style and that is to use a shape layer or image and then use the layer menu and layer styles and outer glow and set the opacity for outer glow to 100% and set the blending mode to normal not the default screen etc Set the elements technique to precise though it could be softer, it just won't follow the shape. Set the spread and size as required though probably works best if the spread is 0 and size is large. You can rapidly change the resulting contour effect by using the contour setting in the quality and there are a number of preset contours to choose from and they will vary the result of the gradient stops in the outer glows The key thing is to create a gradient with many stops. If you have a gradient with two stops then the contour will not look great 3. Outer glow contours Go to the contour section in the layer styles panel Change contour setting 4. Contour gradient Change the contour effect by changing the stops in the preset. You can edit the preset via the editor option 5. Add additional contour effects You can always turn the shape into a smart object with the contour effect added and then add another one to double up the design. Go to the layer menu and smart objects and convert and now go back to the layer menu and layer style and outer glow and add a new contour and set of stops 6. Re-color the contour effect You can modify the underlying gradient but if you don't want to do that you can always simply add an adjustment / adjustment layer to the design and re-color it though it will also change the shape as well, though the shape can also be modified back to the original color as well via the fill setting for the shape 7. Contour effect added to type You can use the above with shapes and you can also use it with type. Set technique to precise and set the spread to 0 and then set the size and vary the contour used
Consult Online With India's Top Doctors Common Specialities Common Issues Common Treatments Newborn Conditions Which Are Normal! Written and reviewed by Dr.Supriya Rastogi 91% (39ratings) MBBS, Diploma In Child Health (DCH), Fellowship On Neonatology Pediatrician, Faridabad  •  12years experience Newborn Conditions Which Are Normal! There are certain conditions that exist within the newborn babies, which are quite normal. They usually do not require any kind of medical attention. Still, parents, especially mothers become worried whenever their newborn babies happen to come across certain health conditions, as they feel that their babies could get severely affected. Mothers also get worried because of the special attachment that they carry for their babies and hence they cannot afford to see them suffer. Now, each and every parent should understand the difference between conditions in newborns that require the interference of paediatricians and those that do not require any kind of medical attention. Normal Behaviours That Babies Exhibit In The First Few Months. Let us briefly discuss the wide variety of normal behaviours, which babies exhibit in the first few months. They include: Babies initially have irregular sleeping patterns as well as feeding times for the first three months. Hiccups happen to be normal behaviour for babies and they will not harm the baby anytime. Newborns can use up all of their senses – they stare at people and things, they tend to enjoy gentle touch and sound of a voice that is soothing All these responses are quite spontaneous, which get lost in a few months time and from then onwards, babies start to make controlled movements. Tips To Identify Normal Newborn Conditions That Do Not Require Medical Attention Let us take a look at some of the tips, which would help parents to clearly understand the normal conditions that crop up in newborn babies, which do not need medical attention. They include the likes of: Newborn Babies cry quite frequently and at times they do so in order to gain attention. They might also cry out of hunger, could feel sleepy or any minor issue, which can be easily taken care of by mothers. Newborns’ usual sleep cycles tend to be short, which last for about 20 to 40 minutes with broken sleep for 2 to 6 hours. Do not worry about this sleep pattern as it is quite normal. During sleep, their breathing patterns also happen to be irregular and can be easily woken up. Mothers can put them back to sleep with some lullabies. Most of the newborns can have skin rashes. There is no need to worry as they are benign and thus require no medical treatment. Newborn babies, out of their low immunity can easily catch a cold. It is not a serious issue as this goes away within a few days. Parents can also come across babies, who cough from especially during drinking breast milk. This is nothing to be worried about as it could happen out of trying to drink it too fast. 3461 people found this helpful
Stamp printed in the USA shows George Marshall Neftali/Alamy Stock Photo Long Reads The Marshall Plan and “America First” Over the years 1948-1952, the US devoted the equivalent of $800 billion in today’s dollars to the reconstruction of Western Europe. But whereas the Marshall Plan is widely regarded as the largest and most effective foreign-aid program in history, it is less widely appreciated for being the most successful example of an “America First” foreign policy. NEW YORK – Six months into Donald Trump’s presidency, the White House website still proudly proclaims his administration’s new “America First Foreign Policy.” No longer will the United States allow its physical and economic security to be undermined by what Trump calls “bad deals.” Alliances and trade pacts will all be revisited and, where necessary, renegotiated to ensure that “American interests” are paramount. What is striking about this policy, however, is not that it places American interests first. It is the misguided way in which those interests are being defined. In the immediate aftermath of World War II, the US established cooperative structures designed to address the catastrophic failure of international economic and security arrangements in the inter-war years. From 1945 to 1949, the administration of President Harry S. Truman propelled the establishment of the United Nations, the International Monetary Fund, the World Bank, the General Agreement on Tariffs and Trade (GATT), and the North Atlantic Treaty Organization. And the 1947 Marshall Plan created the institutional machinery that, over the subsequent decade, paved the path to European integration and the eventual creation of the European Union. We hope you're enjoying Project Syndicate. To continue reading, subscribe now. Register for FREE to access two premium articles per month.
When Should You Start Colon Cancer Screenings? Color Bar When Should You Start Colon Cancer Screenings? A new recommendation for when to start colon and rectal cancer screening was recently issued by the American Cancer Society (ACS). Previously, the ACS’s recommendation was to start colon and rectum cancer (also called colorectal cancer) screenings at age 50. The ACS now recommends starting screenings at age 45. This important change, based on research, can help you and your family be more proactive about your health and catch colorectal cancer as early as possible. Colorectal cancer is cancer that can involve the colon, the rectum, or both. It usually starts in a polyp, which is a small group of cells that can develop on the colon or rectum lining. Some polyps are not cancerous (and will never become cancerous), some can be precancerous and have a chance of turning into cancer, and some polyps develop into early-stage cancer.   Why Is Colon Cancer Screening Important? Screening is important because it can prevent colorectal cancer by finding anything abnormal and treating it promptly before it develops into cancer. When cancer is found early, it gives you a better chance to treat the cancer and save your life.  Screening is also important because sometimes there are no early warning signs or symptoms of colorectal cancer. If you have symptoms, it could mean that cancer has already developed or even spread to other organs. Remember that screening needs to be done regularly. Always follow your doctor’s recommendations about what tests you need and how often you need them.  If you’re at least 45 years old with an average risk of colorectal cancer, it’s the right time to be proactive and ask your doctor about screening. The ACS also encourages you to start screening younger than age 45 if you have a high risk of this type of cancer.  Do You Have an Average or High Risk of Developing Colorectal Cancer? Your doctor or oncologist will recommend screening methods based on your individual needs and your own personal risk. Let’s look at the difference between average risk and high risk of developing colorectal cancer.  • Average risk means you are generally healthy and do not have a family history of colorectal cancer, as far as you know. With average risk, you should start screening at age 45 and continue to receive screenings until age 75. Your doctor will discuss whether it’s worth continuing with screenings after age 75. • High risk means you have certain contributing factors that could make you more likely to have colorectal cancer. These include a personal or family history of colon or rectal cancer, radiation of the pelvic region, or a history of inflammatory bowel disease. In this high-risk group, the recommendation is to start screenings before you reach age 45. You will also need more frequent screenings than the average-risk group. Your doctor will give you specific recommendations based on your overall health and age. Why Did ACS Change the Screening Recommendation? The ACS recommendation to lower the screening age was made after a full review of current research that shows a pattern of increasing rates of colorectal cancer among younger adults (people under the age of 50). The ACS lowered the screening age in order to detect colorectal cancer earlier and to potentially prevent some new cancer cases. Cancer researchers are continuing to study why younger people are getting colorectal cancer. We already know that lifestyle choices can contribute to cancer. What you eat, how much you exercise, and your weight are key factors in your risk level. Smoking and heavy alcohol use also contribute to a high risk of cancer.  Common Types of Colorectal Cancer Screening There is more new information about colorectal cancer screening. The primary screening test for colorectal cancer used to be a colonoscopy. This requires a day of preparation before the procedure at a medical facility. But with recent advancements, an at-home stool sample test is often the first screening tests doctors will recommend. While everyone should have a colonoscopy periodically, the frequency can be less with these other tests available. This will hopefully encourage more people to start their colorectal cancer screenings on time. Several types of both stool and visual screening tests for colorectal cancers are readily available. Stool tests for colorectal cancer screening These tests are prescribed by your doctor and are done at home. The results will be sent to your doctor’s office to review with you. They are typically covered by your healthcare insurance. • A fecal occult blood test (FOBT) looks for hidden blood in the stool. A small sample of stool is examined under a microscope. Blood may indicate polyps, cancer, or other conditions. It’s recommended that you have an FOBT once a year. • High sensitivity guaiac-based fecal occult blood test (HSgFOBT) is similar to the FOBT. It uses a different chemical to test the stool sample and determine if there is any blood in the stool. The ACS also recommends this test once per year. • An immunochemical fecal occult blood test uses a different chemical to check for antibodies that can show if there is blood in the stool. It is also called a fecal immunochemical test (FIT).  • DNA stool test checks the DNA in your stool for genetic changes that can indicate colorectal cancer. The ACS recommends it once every three years.  Visual Colorectal Screening Tests Visual tests require the patient to take laxatives to completely empty their colon. This may be in the form of a liquid to be consumed, or a pill that will help empty the colon as much as possible so the doctor is able to see inside the colon.  Common colorectal cancer screening tests include:  • Sigmoidoscopy lets your doctor look inside your rectum and lower colon for polyps or other abnormal areas. A sigmoidoscope, a thin tube with a light and lens for viewing, is inserted through the rectum. Your doctor may recommend this be done every three to five years, depending on the results. It can be done every 5 to 10 years if you also have an annual FOBT or FIT test. A sigmoidoscopy cannot examine all six feet of your colon, just the lower part.  • Virtual colonoscopy is also called computed tomographic colonography (CTC). It uses specialized x-ray equipment to provide a series of images of the colon and the rectum from outside the body. It is recommended every five years. • Colonoscopy is considered another screening option. The patient is sedated, and a colonoscopy is used to look for polyps or abnormal areas in the rectum and entire length of your colon. The flexible, lighted tube has a lens for viewing and a tool for removing tissue or polyps. Any tissue removed is examined under a microscope. Colonoscopies are usually recommended every ten years if the first one was normal. Any of the above tests that detect an abnormal area will need to be followed up with a colonoscopy.  One of the visual tests would be recommended if the doctor notices anything abnormal on a stool screening test.  Your doctor will recommend the best method of screening for you based on your age, risk, and family history. Always talk with your doctor before ordering screening tests online for colorectal cancer or other conditions. The labs used by these other services may not be of the same quality, and the accuracy can vary widely. Spread the Word About Colorectal Cancer Screening at Age 45 You can help reduce colorectal cancer by spreading the word about the importance of regular screenings. As Americans talk more about cancer prevention and become more comfortable with the topic, more people will understand the need to get screened and at younger ages. Schedule your regular physical and talk to your doctor about which screening tests you need based on your age and risk factors. It can save your life. Subscribe to Cancer Blog
Readers ask: Which Of The Following Composed The Barber Of Seville And William Tell? Which of the following composed The Barber of Seville? Which of the following were leading composers of the Italian opera? Here are 10 of the greatest opera composers to have ever lived. • Claudio Monteverdi (1567-1643) • George Frideric Handel (1685-1759) • Wolfgang Amadeus Mozart (1756-1791) • Gioachino Rossini (1792-1868) • Gaetano Donizetti (1797-1848) • Giuseppe Verdi (1813-1901) • Richard Wagner (1813-1883) • Giacomo Puccini (1858-1924) Which of the following was a widely beloved Italian nationalist opera composer group of answer choices? Terms in this set (8) Which of the following was a widely beloved Italian nationalist opera composer? Verdi’s opera Nabucco was hugely popular in Italy because it: was interpreted as a symbol of Italian independence. You might be interested:  Readers ask: How Much Is It For Barber School? Which of the following operas were written by Verdi? Verdi is famed for three of his operas: Rigoletto (1851) Il trovatore (1853), and La traviata (1853). What is the plot of barber of Seville? What language is The Barber of Seville? Orchestra: In most cases, operas are accompanied by a group of musicians. Led by a conductor, an orchestra is an ensemble that is comprised of string, woodwind, brass, and percussion instruments. Who was the most famous composer ever? What was the name of the first successful opera? Which composer is considered the greatest figure in German opera and one of the most significant? His Der Freischütz (1821) shows his genius for creating a supernatural atmosphere. Other opera composers of the time include Marschner, Schubert, and Lortzing, but the most significant figure was undoubtedly Wagner. Wagner was one of the most revolutionary and controversial composers in musical history. What is the origin of the mazurka quizlet? The mazurka is a Hungarian folk dance. The manuscript for Fanny Mendelssohn Hensel’s September: At the River, from The Year, has poetic lines by: Johann Wolfgang von Goethe. Chopin wrote in all genres of music, including opera and symphony. You might be interested:  How To Tell A Barber You Want To Leave Long On Top And Short On Sides And Back? Which composer said that opera is passion before everything? What is the historical setting for Rigoletto? Rigoletto is set in Mantua, Italy, in the 16th century. What is Verdi Requiem? The Messa da Requiem is a musical setting of the Catholic funeral mass (Requiem) for four soloists, double choir and orchestra by Giuseppe Verdi. It was composed in memory of Alessandro Manzoni, an Italian poet and novelist whom Verdi admired. The work was at one time referred to as the Manzoni Requiem. Why did Verdi write Nabucco? His wife, Margherita, had died earlier that year, and the couple had recently lost both of their children. Following the failed opera, in the throws of depression, Verdi decided to give up music altogether. Merelli had a new libretto on his hands — called Nabucco — and talked a reluctant Verdi into looking at it. Leave a Reply
Glossary of Security Terms Become your company’s cyber security thesaurus. Find the definition of the most commonly used cyber security terms in our glossary below. Access Control Access Control List (ACL) A mechanism that implements access control for a system resource by listing the identities of the system entities that are permitted to access the resource. Access Control Service A security service that provides protection of system resources against unauthorized access. The two basic mechanisms for implementing this service are ACLs and tickets. Access Management Access Management is the maintenance of access information which consists of four tasks: account administration, maintenance, monitoring, and revocation. Access Matrix An Access Matrix uses rows to represent subjects and columns to represent objects with privileges listed in each cell. Account Harvesting Account Harvesting is the process of collecting all the legitimate account names on a system. ACK Piggybacking ACK piggybacking is the practice of sending an ACK inside another packet going to the same destination. Active Content Program code embedded in the contents of a web page. When the page is accessed by a web browser, the embedded code is automatically downloaded and executed on the user's workstation. Ex. Java, ActiveX (MS) Activity Monitors Activity monitors aim to prevent virus infection by monitoring for malicious activity on a system, and blocking that activity when possible. Address Resolution Protocol (ARP) Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address to a physical machine address that is recognized in the local network. A table, usually called the ARP cache, is used to maintain a correlation between each MAC address and its corresponding IP address. ARP provides the protocol rules for making this correlation and providing address conversion in both directions. Advanced Encryption Standard (AES) An encryption standard being developed by NIST. Intended to specify an unclassified, publicly-disclosed, symmetric encryption algorithm. Java programs; an application program that uses the client's web browser to provide a user interface. Advanced Research Projects Agency Network, a pioneer packet-switched network that was built in the early 1970s under contract to the US Government, led to the development of today's Internet, and was decommissioned in June 1990. Asymmetric Cryptography Public-key cryptography; A modern branch of cryptography in which the algorithms employ a pair of keys (a public key and a private key) and use a different component of the pair for different steps of the algorithm. Asymmetric Warfare Asymmetric warfare is the fact that a small investment, properly leveraged, can yield incredible results. Auditing is the information gathering and analysis of assets to ensure such things as policy compliance and security from vulnerabilities. Authentication is the process of confirming the correctness of the claimed identity. Authenticity is the validity and conformance of the original information. Authorization is the approval, permission, or empowerment for someone or something to do something. Autonomous System One network or series of networks that are all under one administrative control. An autonomous system is also sometimes referred to as a routing domain. An autonomous system is assigned a globally unique number, sometimes called an Autonomous System Number (ASN). A backdoor is a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place. Commonly used to mean the capacity of a communication channel to pass data through the channel in a given amount of time. Usually expressed in bits per second. A banner is the information that is displayed to a remote user trying to connect to a service. This may include version information, system information, or a warning about authorized use. Basic Authentication Basic Authentication is the simplest web-based authentication scheme that works by sending the username and password with each request. Bastion Host A bastion host has been hardened in anticipation of vulnerabilities that have not been discovered yet. BIND stands for Berkeley Internet Name Domain and is an implementation of DNS. DNS is used for domain name to IP address resolution. Biometrics use physical characteristics of the users to determine access. The smallest unit of information storage; a contraction of the term "binary digit;" one of two symbolsN"0" (zero) and "1" (one) - that are used to represent binary numbers. Block Cipher A block cipher encrypts one block of data at a time. Boot Record Infector A boot record infector is a piece of malware that inserts malicious code into the boot sector of a disk. Border Gateway Protocol (BGP) An inter-autonomous system routing protocol. BGP is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP). A botnet is a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a denial of service attack. British Standard 7799 A standard code of practice and provides guidance on how to secure an information system. It includes the management framework, objectives, and control requirements for information security management systems. To simultaneously send the same message to multiple recipients. One host to all hosts on network. Broadcast Address An address used to broadcast a datagram to all hosts on a given network using UDP or ICMP protocol. Brute Force Buffer Overflow Business Continuity Plan (BCP) A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation. Business Impact Analysis (BIA) A Business Impact Analysis determines what levels of impact to a system are tolerable. A fundamental unit of computer storage; the smallest addressable unit in a computer's architecture. Usually holds one character of information and usually means eight bits. Cache Cramming Cache Cramming is the technique of tricking a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions. Cache Poisoning Malicious or misleading data from a remote name server is saved [cached] by another name server. Typically used with DNS cache poisoning attacks. Call Admission Control (CAC) A cell is a unit of data transmitted over an ATM network. Certificate-Based Authentication Certificate-Based Authentication is the use of SSL and certificates to authenticate and encrypt HTTP traffic. Common Gateway Interface. This mechanism is used by HTTP servers (web servers) to pass parameters to executable scripts in order to generate responses dynamically. Chain of Custody Chain of Custody is the important application of the Federal rules of evidence and its handling. Challenge-Handshake Authentication Protocol (CHAP) The Challenge-Handshake Authentication Protocol uses a challenge/response authentication mechanism where the response varies every challenge to prevent replay attacks. A value that is computed by a function that is dependent on the contents of a data object and is stored or transmitted together with the object, for the purpose of detecting changes in the data. A cryptographic algorithm for encryption and decryption. Ciphertext is the encrypted form of the message being sent. Circuit Switched Network A circuit switched network is where a single continuous physical circuit connected two endpoints where the route was immutable once set up. A system entity that requests and uses a service provided by another system entity, called a "server." In some cases, the server may itself be a client of some other server. Cold/Warm/Hot Disaster Recovery Site * Hot site. It contains fully redundant hardware and software, with telecommunications, telephone and utility connectivity to continue all primary site operations. Failover occurs within minutes or hours, following a disaster. Daily data synchronization usually occurs between the primary and hot site, resulting in minimum or no data loss. Offsite data backup tapes might be obtained and delivered to the hot site to help restore operations. Backup tapes should be regularly tested to detect data corruption, malicious code and environmental damage. A hot site is the most expensive option. * Warm site. It contains partially redundant hardware and software, with telecommunications, telephone and utility connectivity to continue some, but not all primary site operations. Failover occurs within hours or days, following a disaster. Daily or weekly data synchronization usually occurs between the primary and warm site, resulting in minimum data loss. Offsite data backup tapes must be obtained and delivered to the warm site to restore operations. A warm site is the second most expensive option. * Cold site. Hardware is ordered, shipped and installed, and software is loaded. Basic telecommunications, telephone and utility connectivity might need turning on to continue some, but not all primary site operations. Relocation occurs within weeks or longer, depending on hardware arrival time, following a disaster. No data synchronization occurs between the primary and cold site, and could result in significant data loss. Offsite data backup tapes must be obtained and delivered to the cold site to restore operations. A cold site is the least expensive option. A collision occurs when multiple systems transmit simultaneously on the same wire. Competitive Intelligence Competitive Intelligence is espionage using legal, or at least not obviously illegal, means. Computer Emergency Response Team (CERT) An organization that studies computer and network INFOSEC in order to provide incident response services to victims of attacks, publish alerts concerning vulnerabilities and threats, and offer other information to help improve computer and network security. Computer Network A collection of host computers together with the sub-network or inter-network through which they can exchange data. Confidentiality is the need to ensure that information is disclosed only to those who are authorized to view it. Configuration Management Establish a known baseline condition and manage it. A threat action that undesirably alters system operation by adversely modifying system functions or data. Cost Benefit Analysis A cost benefit analysis compares the cost of implementing countermeasures with the value of the reduced risk. Reactive methods used to prevent an exploit from successfully occurring once a threat has been detected. Intrusion Prevention Systems (IPS) commonly employ countermeasures to prevent intruders form gaining further access to a computer network. Other counter measures are patches, access control lists and malware filters. Covert Channels Covert Channels are the means by which information can be communicated between two parties in a covert fashion using normal system operations. For example by changing the amount of hard drive space that is available on a file server can be used to communicate information. A type of malware used by cyber criminals. The malware is designed to enable the cyber criminal to make money off of the infected system (such as harvesting key strokes, using the infected systems to launch Denial of Service Attacks, etc.). Cron is a Unix application that runs jobs for users and administrators at scheduled times of the day. Crossover Cable A crossover cable reverses the pairs of cables at the other end and can be used to connect devices directly together. The mathematical science that deals with analysis of a cryptographic system in order to gain knowledge needed to break or circumvent the protection that the system is designed to provide. In other words, convert the cipher text to plaintext without knowing the key. Cryptographic Algorithm or Hash An algorithm that employs the science of cryptography, including encryption algorithms, cryptographic hash algorithms, digital signature algorithms, and key agreement algorithms. Cut-Through is a method of switching where only the header of a packet is read before it is forwarded to its destination. Cyclic Redundancy Check (CRC) Sometimes called "cyclic redundancy code." A type of checksum algorithm that is not a cryptographic hash but is used to implement data integrity service where accidental changes to data are expected. A program which is often started at the time the system boots and runs continuously without intervention from any of the users on the system. The daemon program forwards the requests to other programs (or processes) as appropriate. The term daemon is a Unix term, though many other operating systems provide support for daemons, though they're sometimes called other names. Windows, for example, refers to daemons and System Agents and services. Data Aggregation Data Aggregation is the ability to get a more complete picture of the information by analyzing several different types of records at once. Data Custodian A Data Custodian is the entity currently using or manipulating the data, and therefore, temporarily taking responsibility for the data. Data Encryption Standard (DES) Data Mining Data Mining is a technique used to analyze existing information, usually with the intention of pursuing new avenues to pursue business. Data Owner A Data Owner is the entity having responsibility and authority for the data. Data Warehousing Data Warehousing is the consolidation of several previously independent databases into one location. Request for Comment 1594 says, "a self-contained, independent entity of data carrying sufficient information to be routed from the source to the destination computer without reliance on earlier exchanges between this source and destination computer and the transporting network." The term has been generally replaced by the term packet. Datagrams or packets are the message units that the Internet Protocol deals with and that the Internet transports. A datagram or packet needs to be self-contained without reliance on earlier exchanges because there is no connection of fixed duration between the two communicating points as there is, for example, in most voice telephone conversations. (This kind of protocol is referred to as connectionless.) Day Zero The "Day Zero" or "Zero Day" is the day a new vulnerability is made known. In some cases, a "zero day" exploit is referred to an exploit for which no patch is available yet. ("day one"-> day at which the patch is made available). Decapsulation is the process of stripping off one layer's headers and passing the rest of the packet up to the next higher layer on the protocol stack. Decryption is the process of transforming an encrypted message into its original plaintext. Defacement is the method of modifying the content of a website in such a way that it becomes "vandalized" or embarrassing to the website owner. Defense In-Depth Demilitarized Zone (DMZ) In computer security, in general a demilitarized zone (DMZ) or perimeter network is a network area (a subnetwork) that sits between an organization's internal network and an external network, usually the Internet. DMZ's help to enable the layered security model in that they provide subnetwork segmentation based on security requirements or policy. DMZ's provide either a transit mechanism from a secure source to an insecure destination or from an insecure source to a more secure destination. In some cases, a screened subnet which is used for servers accessible from the outside is referred to as a DMZ. Denial of Service Dictionary Attack Digest Authentication Digest Authentication allows a web client to compute MD5 hashes of the password to prove it has the password. Digital Certificate Digital Envelope A digital envelope is an encrypted message with the encrypted session key. Digital Signature A digital signature is a hash of a message that uniquely identifies the sender of the message and proves the message hasn't changed since transmission. Digital Signature Algorithm (DSA) An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers. The signature is computed using rules and parameters such that the identity of the signer and the integrity of the signed data can be verified. Digital Signature Standard (DSS) The US Government standard that specifies the Digital Signature Algorithm (DSA), which involves asymmetric cryptography. The process of taking a binary program and deriving the source code from it. Disaster Recovery Plan (DRP) A Disaster Recovery Plan is the process of recovery of IT systems in the event of a disruption or disaster. Discretionary Access Control (DAC) Discretionary Access Control consists of something the user can manage, such as a document password. A circumstance or event that interrupts or prevents the correct operation of system services and functions. Distance Vector Distance vectors measure the cost of routes to determine the best route to all known networks. Distributed Scans Distributed Scans are scans that use multiple source addresses to gather information. A sphere of knowledge, or a collection of facts about some program entities or a number of network points or addresses, identified by a name. On the Internet, a domain consists of a set of network addresses. In the Internet's domain name system, a domain is a name with which name server records are associated that describe sub-domains or host. In Windows NT and Windows 2000, a domain is a set of network resources (applications, printers, and so forth) for a group of users. The user need only to log in to the domain to gain access to the resources, which may be located on a number of different servers in the network. Domain Hijacking Domain hijacking is an attack by which an attacker takes over a domain by first blocking access to the domain's DNS server and then putting his own server up in its place. Domain Name A domain name locates an organization or other entity on the Internet. For example, the domain name "" locates an Internet address for "" at Internet point and a particular host server named "www". The "org" part of the domain name reflects the purpose of the organization or entity (in this example, "organization") and is called the top-level domain name. The "sans" part of the domain name defines the organization or entity and together with the top-level is called the second-level domain name. Domain Name System (DNS) Due Care Due care ensures that a minimal level of protection is in place in accordance with the best practice in the industry. Due Diligence Due diligence is the requirement that organizations must develop and deploy a protection plan to prevent fraud, abuse, and additional deploy a means to detect them if they occur. DumpSec is a security tool that dumps a variety of information about a system's users, file system, registry, permissions, password policy, and services. Dumpster Diving Dumpster Diving is obtaining passwords and corporate directories by searching through discarded media. Dynamic Link Library A collection of small programs, any of which can be called when needed by a larger program that is running in the computer. The small program that lets the larger program communicate with a specific device such as a printer or scanner is often packaged as a DLL program (usually referred to as a DLL file). Dynamic Routing Protocol Allows network devices to learn routes. Ex. RIP, EIGRP Dynamic routing occurs when routers talk to adjacent routers, informing each other of what networks each router is currently connected to. The routers must communicate using a routing protocol, of which there are many to choose from. The process on the router that is running the routing protocol, communicating with its neighbor routers, is usually called a routing daemon. The routing daemon updates the kernel's routing table with information it receives from neighbor routers. Eavesdropping is simply listening to a private conversation which may reveal information which can provide access to a facility or network. Echo Reply An echo reply is the response a machine that has received an echo request sends over ICMP. Echo Request An echo request is an ICMP message sent to a machine to determine if it is online and how long traffic takes to get to it. Egress Filtering Filtering outbound traffic. Emanations Analysis Gaining direct knowledge of communicated data by monitoring and resolving a signal that is emitted by a system and that contains the data but is not intended to communicate the data. The inclusion of one data structure within another structure so that the first data structure is hidden for the time being. Cryptographic transformation of data (called "plaintext") into a form (called "cipher text") that conceals the data's original meaning to prevent it from being known or used. Ephemeral Port Also called a transient port or a temporary port. Usually is on the client side. It is set up when a client application wants to connect to a server and is destroyed when the client application terminates. It has a number chosen at random that is greater than 1023. Escrow Passwords Escrow Passwords are passwords that are written down and stored in a secure location (like a safe) that are used by emergency personnel when privileged personnel are unavailable. The most widely-installed LAN technology. Specified in a standard, IEEE 802.3, an Ethernet LAN typically uses coaxial cable or special grades of twisted pair wires. Devices are connected to the cable and compete for access using a CSMA/CD protocol. An event is an observable occurrence in a system or network. Exponential Backoff Algorithm An exponential backoff algorithm is used to adjust TCP timeout values on the fly so that network devices don't continue to timeout sending data over saturated links. Extended ACLs (Cisco) Extended ACLs are a more powerful form of Standard ACLs on Cisco routers. They can make filtering decisions based on IP addresses (source or destination), Ports (source or destination), protocols, and whether a session is established. Extensible Authentication Protocol (EAP) A framework that supports multiple, optional authentication mechanisms for PPP, including clear-text passwords, challenge-response, and arbitrary dialog sequences. Exterior Gateway Protocol (EGP) False Rejects False Rejects are when an authentication system fails to recognize a valid user. Fast File System The first major revision to the Unix file system, providing faster read access and faster (delayed, asynchronous) write access through a disk cache and better file system layout on disk. It uses inodes (pointers) and data blocks. Fast Flux Protection method used by botnets consisting of a continuous and fast change of the DNS records for a domain name through different IP addresses. Fault Line Attacks Fault Line Attacks use weaknesses between interfaces of systems to exploit gaps in coverage. File Transfer Protocol (FTP) A filter is used to specify which packets will or will not be used. It can be used in sniffers to determine which packets get displayed, or by firewalls to determine which packets get blocked. Filtering Router An inter-network router that selectively prevents the passage of data packets according to a security policy. A filtering router may be used as a firewall or part of a firewall. A router usually receives a packet from a network and decides where to forward it on a second network. A filtering router does the same, but first decides whether the packet should be forwarded at all, according to some security policy. The policy is implemented by rules (packet filters) loaded into the router. A protocol to lookup user information on a given host. A Unix program that takes an e-mail address as input and returns information about the user who owns that e-mail address. On some systems, finger only reports whether the user is currently logged on. Other systems return additional information, such as the user's full name, address, and telephone number. Of course, the user must first enter this information into the system. Many e-mail programs now have a finger utility built into them. Sending strange packets to a system in order to gauge how it responds to determine the operating system. A logical or physical discontinuity in a network to prevent unauthorized access to data or resources. An attack that attempts to cause a failure in (especially, in the security of) a computer system or other data processing entity by providing more input than the entity can process properly. A forest is a set of Active Directory domains that replicate their databases with each other. Fork Bomb A Fork Bomb works by using the fork() call to create a new process which is a copy of the original. By doing this repeatedly, all available processes on the machine can be taken up. Form-Based Authentication Form-Based Authentication uses forms on a webpage to ask a user to input username and password information. Forward Lookup Forward lookup uses an Internet domain name to find an IP address Forward Proxy Forward Proxies are designed to be the server through which all requests are made. Fragment Offset The fragment offset field tells the sender where a particular fragment falls in relation to other fragments in the original larger packet. Fragment Overlap Attack A TCP/IP Fragmentation Attack that is possible because IP allows packets to be broken down into fragments for more efficient transport across various media. The TCP packet (and its header) are carried in the IP packet. In this attack the second fragment contains incorrect offset. When packet is reconstructed, the port number will be overwritten. The process of storing a data file in several "chunks" or fragments rather than in a single contiguous sequence of bits in one place on the storage medium. Data that is transmitted between network points as a unit complete with addressing and necessary protocol control information. A frame is usually transmitted serial bit by bit and contains a header field and a trailer field that "frame" the data. (Some control frames contain no data.) Full Duplex A type of duplex communications channel which carries data in both directions at once. Refers to the transmission of data in two directions simultaneously. Communications in which both sender and receiver can send at the same time. Fully-Qualified Domain Name A Fully-Qualified Domain Name is a server name with a hostname followed by the full domain name. The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities. Also see "regression testing". A network point that acts as an entrance to another network. The gethostbyaddr DNS query is when the address of a machine is known and the name is needed. The gethostbyname DNS quest is when the name of a machine is known and the address is needed. GNU is a Unix-like operating system that comes with source code that can be copied, modified, and redistributed. The GNU project was started in 1983 by Richard Stallman and others, who formed the Free Software Foundation. An Internet file sharing utility. Gnutella acts as a server for sharing files while simultaneously acting as a client that searches for and downloads files from other users. Hardening is the process of identifying and fixing vulnerabilities on a system. Hash Function An algorithm that computes a value based on a data object thereby mapping the data object to a smaller data object. Hash Functions (cryptographic) hash functions are used to generate a one way "check sum" for a larger text, which is not trivially reversed. The result of this hash function can be used to validate if a larger file has been altered, without having to compare the larger files to each other. Frequently used hash functions are MD5 and SHA1. A header is the extra information in a packet that is needed for the protocol stack to process the packet. Hijack Attack A form of active wiretapping in which the attacker seizes control of a previously established communication association. Honey Client see Honeymonkey. Honey pot Programs that simulate one or more network services that you designate on your computer's ports. An attacker assumes you're running vulnerable services that can be used to break into the machine. A honey pot can be used to log access attempts to those ports including the attacker's keystrokes. This could give you advanced warning of a more concerted attack. A hop is each exchange with a gateway a packet takes on its way to the destination. Any computer that has full two-way access to other computers on the Internet. Or a computer with a web server that serves the pages for one or more Web sites. Host-Based ID Host-based intrusion detection systems use information from the operating system audit records to watch all operations occurring on the host that the intrusion detection software has been installed upon. These operations are then compared with a pre-defined security policy. This analysis of the audit trail imposes potentially significant overhead requirements on the system because of the increased amount of processing power which must be utilized by the intrusion detection system. Depending on the size of the audit trail and the processing ability of the system, the review of audit data could result in the loss of a real-time analysis capability. HTTP Proxy An HTTP Proxy is a server that acts as a middleman in the communication between HTTP clients and servers. When used in the first part of a URL (the part that precedes the colon and specifies an access scheme or protocol), this term specifies the use of HTTP enhanced by a security mechanism, which is usually SSL. A hub is a network device that operates by repeating data that it receives on one port to all the other ports. As a result, data transmitted by one host is retransmitted to all other hosts on the hub. Hybrid Attack A Hybrid Attack builds on the dictionary attack method by adding numerals and symbols to dictionary words. Hybrid Encryption An application of cryptography that combines two or more encryption algorithms, particularly a combination of symmetric and asymmetric encryption. In hypertext or hypermedia, an information object (such as a word, a phrase, or an image; usually highlighted by color or underscoring) that points (indicates how to connect) to related information that is located elsewhere and can be retrieved by activating the link. Hypertext Markup Language (HTML) Hypertext Transfer Protocol (HTTP) Identity is whom someone or what something is, for example, the name by which something is known. An incident as an adverse network event in an information system or network or the threat of the occurrence of such an event. Incident Handling Incident Handling is an action plan for dealing with intrusions, cyber-theft, denial of service, fire, floods, and other security-related events. It is comprised of a six step process: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. Incremental Backups Incremental backups only backup the files that have been modified since the last backup. If dump levels are used, incremental backups only backup files changed since last backup of a lower dump level. Inetd (xinetd) Inetd (or Internet Daemon) is an application that controls smaller internet services like telnet, ftp, and POP. Inference Attack Inference Attacks rely on the user to make logical connections between seemingly unrelated pieces of information. Information Warfare Information Warfare is the competition between offensive and defensive players over information resources. Ingress Filtering Ingress Filtering is filtering inbound traffic. Input Validation Attacks Input Validations Attacks are where an attacker intentionally sends unusual input in the hopes of confusing an application. Integrity is the need to ensure that information has not been changed accidentally or deliberately, and that it is accurate and complete. Integrity Star Property In Integrity Star Property a user cannot read data of a lower integrity level then their own. A term to describe connecting multiple separate networks together. Internet Control Message Protocol (ICMP) An Internet Standard protocol that is used to report error conditions during IP datagram processing and to exchange other information concerning the state of the IP network. Internet Engineering Task Force (IETF) Internet Message Access Protocol (IMAP) A protocol that defines how a client should fetch mail from and return mail to a mail server. IMAP is intended as a replacement for or extension to the Post Office Protocol (POP). It is defined in RFC 1203 (v3) and RFC 2060 (v4). Internet Protocol (IP) Internet Protocol Security (IPsec) A developing standard for security at the network or packet processing layer of network communication. Internet Standard A specification, approved by the IESG and published as an RFC, that is stable and well-understood, is technically competent, has multiple, independent, and interoperable implementations with substantial operational experience, enjoys significant public support, and is recognizably useful in some or all parts of the Internet. An Interrupt is a signal that informs the OS that something has occurred. A computer network, especially one based on Internet technology, that an organization uses for its own internal, and usually private, purposes and that is closed to outsiders. Intrusion Detection A security management system for computers and networks. An IDS gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organization) and misuse (attacks from within the organization). IP Address A computer's inter-network address that is assigned for use by the Internet Protocol and other protocols. An IP version 4 address is written as a series of four 8-bit numbers separated by periods. IP Flood A denial of service attack that sends a host more echo request ("ping") packets than the protocol implementation can handle. IP Forwarding IP forwarding is an Operating System option that allows a host to act as a router. A system that has more than 1 network interface card must have IP forwarding turned on in order for the system to be able to act as a router. IP Spoofing The technique of supplying a false IP address. International Organization for Standardization, a voluntary, non-treaty, non-government organization, established in 1947, with voting members that are designated standards bodies of participating nations and non-voting observer organizations. Issue-Specific Policy An Issue-Specific Policy is intended to address specific needs within an organization, such as a password policy. International Telecommunications Union, Telecommunication Standardization Sector (formerly "CCITT"), a United Nations treaty organization that is composed mainly of postal, telephone, and telegraph authorities of the member countries and that publishes standards called "Recommendations." Jitter or Noise is the modification of fields in a database while preserving the aggregate characteristics of that make the database useful in the first place. Jump Bag A Jump Bag is a container that has all the items necessary to respond to an incident inside to help mitigate the effects of delayed reactions. A system developed at the Massachusetts Institute of Technology that depends on passwords and symmetric cryptography (DES) to implement ticket-based, peer entity authentication service and access control service distributed in a client-server network environment. Lattice Techniques Lattice Techniques use security designations to determine access to information. Layer 2 Forwarding Protocol (L2F) An Internet protocol (originally developed by Cisco Corporation) that uses tunneling of PPP over IP to create a virtual extension of a dial-up link across a network, initiated by the dial-up server and transparent to the dial-up user. Layer 2 Tunneling Protocol (L2TP) An extension of the Point-to-Point Tunneling Protocol used by an Internet service provider to enable the operation of a virtual private network over the Internet. Least Privilege Least Privilege is the principle of allowing users or applications the least amount of permissions necessary to perform their intended function. Software to detect unprotected shares. Lightweight Directory Access Protocol (LDAP) Link State With link state, routes maintain information about all routers and router-to-router links within a geographic area, and creates a table of best routes with that information. List Based Access Control List Based Access Control associates a list of users and their privileges with each object. Loadable Kernel Modules (LKM) Loadable Kernel Modules allow for the adding of additional functionality directly into the kernel while the system is running. Log Clipping Log clipping is the selective removal of log entries from a system log to hide a compromise. Logic bombs Logic bombs are programs or snippets of code that execute when a certain predefined event occurs. Logic bombs may also be set to go off on a certain date or when a specified set of circumstances occurs. Logic Gate A logic gate is an elementary building block of a digital circuit. Most logic gates have two inputs and one output. As digital circuits can only understand binary, inputs and outputs can assume only one of two states, 0 or 1. Loopback Address The loopback address ( is a pseudo IP address that always refer back to the local host and are never sent out onto a network. MAC Address A physical address; a numeric value that uniquely identifies that network device from every other device on the planet. Malicious Code Software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic. Mandatory Access Control (MAC) Mandatory Access Control controls is where the system controls access to resources based on classification levels assigned to both the objects and the users. These controls cannot be changed by anyone. Masquerade Attack A type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity. A one way cryptographic hash function. Also see "hash functions" and "sha1" Measures of Effectiveness (MOE) Measures of Effectiveness is a probability model based on engineering concepts that allows one to approximate the impact a give action will have on an environment. In Information warfare it is the ability to attack or defend within an Internet environment. Monoculture is the case where a large number of users run the same software, and are vulnerable to the same attacks. Morris Worm A worm program written by Robert T. Morris, Jr. that flooded the ARPANET in November, 1988, causing problems for thousands of hosts. Broadcasting from one host to a given set of hosts. You are "multi-homed" if your network is directly connected to two or more ISP's. To combine multiple signals from possibly disparate sources, in order to transmit them over a single path. Network Address Translation. It is used to share one or a small number of publicly routable IP addresses among a larger number of hosts. The hosts are assigned private IP addresses, which are then "translated" into one of the publicly routed IP addresses. Typically home or small business networks use NAT to share a single DLS or Cable modem IP address. However, in some cases NAT is used for servers as an additional layer of protection. National Institute of Standards and Technology (NIST) National Institute of Standards and Technology, a unit of the US Commerce Department. Formerly known as the National Bureau of Standards, NIST promotes and maintains measurement standards. It also has active programs for encouraging and assisting industry and science to develop and use these standards. Natural Disaster Any "act of God" (e.g., fire, flood, earthquake, lightning, or wind) that disables a system component. 32-bit number indicating the range of IP addresses residing on a single IP network/subnet/supernet. This specification displays network masks as hexadecimal numbers. For example, the network mask for a class C IP network is displayed as 0xffffff00. Such a mask is often displayed elsewhere in the literature as Network Address Translation Network Mapping To compile an electronic inventory of the systems and the services on your network. Network Taps Network taps are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices. Network-Based IDS A network-based IDS system monitors the traffic on its network segment as a data source. This is generally accomplished by placing the network interface card in promiscuous mode to capture all network traffic that crosses its network segment. Network traffic on other segments, and traffic on other means of communication (like phone lines) can't be monitored. Network-based IDS involves looking at the packets on the network as they pass by some sensor. The sensor can only see the packets that happen to be carried on the network segment it's attached to. Packets are considered to be of interest if they match a signature.Network-based intrusion detection passively monitors network activity for indications of attacks. Network monitoring offers several advantages over traditional host-based intrusion detection systems. Because many intrusions occur over networks at some point, and because networks are increasingly becoming the targets of attack, these techniques are an excellent method of detecting many attacks which may be missed by host-based intrusion detection mechanisms. Non-Printable Character A character that doesn't have a corresponding character letter to its corresponding ASCII code. Examples would be the Linefeed, which is ASCII character code 10 decimal, the Carriage Return, which is 13 decimal, or the bell sound, which is decimal 7. On a PC, you can often add non-printable characters by holding down the Alt key, and typing in the decimal value (i.e., Alt-007 gets you a bell). There are other character encoding schemes, but ASCII is the most prevalent. Non-repudiation is the ability for a system to prove that a specific user and only that specific user sent a message and that it hasn't been modified. Null Session Known as Anonymous Logon, it is a way of letting an anonymous user retrieve information such as user names and shares over the network or connect without authentication. It is used by applications such as explorer.exe to enumerate shares on remote servers. A sequence of eight bits. An octet is an eight-bit byte. One-Way Encryption Irreversible transformation of plaintext to cipher text, such that the plaintext cannot be recovered from the cipher text by other than exhaustive procedures even if the cryptographic key is known. One-Way Function A (mathematical) function, f, which is easy to compute the output based on a given input. However given only the output value it is impossible (except for a brute force attack) to figure out what the input value is. Open Shortest Path First (OSPF) Open Shortest Path First is a link state routing algorithm used in interior gateway routing. Routers maintain a database of all routers in the autonomous system with links between the routers, link costs, and link states (up and down). OSI layers Hindrance of system operation by placing excess burden on the performance capabilities of a system component. Packet Switched Network A packet switched network is where individual packets each follow their own paths through the network from one endpoint to another. Major divisions of the total physical hard disk space. Password Authentication Protocol (PAP) Password Authentication Protocol is a simple, weak authentication mechanism where a user enters the password and it is then sent across the network, usually in the clear. Password Cracking Password Sniffing A patch is a small update released by a software manufacturer to fix bugs in existing programs. Patching is the process of updating software to a different version. Payload is the actual application data a packet contains. Gaining unauthorized logical access to sensitive data by circumventing a system's protections. Penetration Testing Penetration testing is used to test the external perimeter security of a network or facility. Permutation keeps the same letters but changes the position within a text to scramble the message. Personal Firewalls Personal firewalls are those firewalls that are installed and run on individual PCs. This is a more sophisticated form of MITM attack. A user’s session is redirected to a masquerading website. This can be achieved by corrupting a DNS server on the Internet and pointing a URL to the masquerading website’s IP. Almost all users use a URL like instead of the real IP ( of the website. Changing the pointers on a DNS server, the URL can be redirected to send traffic to the IP of the pseudo website. At the pseudo website, transactions can be mimicked and information like login credentials can be gathered. With this the attacker can access the real site and conduct transactions using the credentials of a valid user on that website. Ping of Death An attack that sends an improperly large ICMP echo request packet (a "ping") with the intent of overflowing the input buffers of the destination machine and causing it to crash. Ping Scan A ping scan looks for machines that are responding to ICMP Echo Requests. Ping Sweep An attack that sends ICMP echo requests ("pings") to a range of IP addresses, with the goal of finding hosts that can be probed for vulnerabilities. Ordinary readable text before being encrypted into ciphertext or after being decrypted. Point-to-Point Protocol (PPP) A protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server. It packages your computer's TCP/IP packets and forwards them to the server where they can actually be put on the Internet. Point-to-Point Tunneling Protocol (PPTP) Poison Reverse Split horizon with poisoned reverse (more simply, poison reverse) does include such routes in updates, but sets their metrics to infinity. In effect, advertising the fact that there routes are not reachable. Polyinstantiation is the ability of a database to maintain multiple records with the same key. It is used to prevent inference attacks. Polymorphism is the process by which malicious software changes its underlying code to avoid detection. Port Scan Possession is the holding, control, and ability to use information. Post Office Protocol, Version 3 (POP3) An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve mail messages that the server has received and is holding for the client. Practical Extraction and Reporting Language (Perl) A script programming language that is similar in syntax to the C language and that includes a number of popular Unix facilities such as sed, awk, and tr. A preamble is a signal used in network communications to synchronize the transmission timing between two or more systems. Proper timing ensures that all systems are interpreting the start of the information transfer correctly. A preamble defines a specific series of transmission pulses that is understood by communicating systems to mean "someone is about to transmit data". This ensures that systems receiving the information correctly interpret when the data transmission starts. The actual pulses used as a preamble vary depending on the network communication technology in use. Pretty Good Privacy (PGP)TM Trademark of Network Associates, Inc., referring to a computer program (and related protocols) that uses cryptography to provide data security for electronic mail and other applications on the Internet. Private Addressing IANA has set aside three address ranges for use by private or non-Internet connected networks. This is referred to as Private Address Space and is defined in RFC 1918. The reserved address blocks are: to (10/8 prefix) to (172.16/12 prefix) to (192.168/16 prefix) Program Infector A program infector is a piece of malware that attaches itself to existing program files. Program Policy A program policy is a high-level policy that sets the overall tone of an organization's security approach. Promiscuous Mode When a machine reads all packets off the network, regardless of who they are addressed to. This is used by network administrators to diagnose network problems, but also by unsavory characters who are trying to eavesdrop on network traffic (which might contain passwords or other information). Proprietary Information Proprietary information is that information unique to a company and its ability to compete, such as customer lists, technical data, product costs, and trade secrets. A formal specification for communicating; an IP address the special set of rules that end points in a telecommunication connection use when they communicate. Protocols exist at several levels in a telecommunication connection. Protocol Stacks (OSI) A set of network protocol layers that work together. Proxy Server Public Key The publicly-disclosed component of a pair of cryptographic keys used for asymmetric cryptography. Public Key Encryption The popular synonym for "asymmetric cryptography". Public Key Infrastructure (PKI) Public-Key Forward Secrecy (PFS) A network worm. Race Condition A race condition exploits the small window of time between a security control being applied and when the service is used. Radiation Monitoring Radiation monitoring is the process of receiving images, data, or audio from an unprotected source by listening to radiation signals. A type of malware that is a form of extortion. It works by encrypting a victim's hard drive denying them access to key files. The victim must then pay a ransom to decrypt the files and gain access to them again. Reconnaissance is the phase of an attack where an attackers finds new systems, maps out networks, and probes for specific, exploitable vulnerabilities. Reflexive ACLs (Cisco) Reflexive ACLs for Cisco routers are a step towards making the router act like a stateful firewall. The router will make filtering decisions based on whether connections are a part of established traffic or not. The Registry in Windows operating systems in the central set of settings and information required to run the Windows computer. regression analysis The use of scripted tests which are used to test software for all possible input is should expect. Typically developers will create a set of regression tests that are executed before a new version of a software is released. Also see "fuzzing". Request for Comment (RFC) Resource Exhaustion Resource exhaustion attacks involve tying up finite resources on a system, making them unavailable to others. A response is information sent that is responding to some stimulus. Reverse Address Resolution Protocol (RARP) RARP (Reverse Address Resolution Protocol) is a protocol by which a physical machine in a local area network can request to learn its IP address from a gateway server's Address Resolution Protocol table or cache. A network administrator creates a table in a local area network's gateway router that maps the physical machine (or Media Access Control - MAC address) addresses to corresponding Internet Protocol addresses. When a new machine is set up, its RARP client program requests from the RARP server on the router to be sent its IP address. Assuming that an entry has been set up in the router table, the RARP server will return the IP address to the machine which can store it for future use. Reverse Engineering Acquiring sensitive data by disassembling and analyzing the design of a system component. Reverse Lookup Find out the hostname that corresponds to a particular IP address. Reverse lookup uses an IP (Internet Protocol) address to find a domain name. Reverse Proxy Reverse proxies take public HTTP requests and pass them to back-end webservers to send the content to it, so the proxy can then send the content to the end-user. Risk is the product of the level of threat with the level of vulnerability. It establishes the likelihood of a successful attack. Risk Assessment A Risk Assessment is the process by which risks are identified and the impact of those risks determined. Risk Averse Avoiding risk even if this leads to the loss of opportunity. For example, using a (more expensive) phone call vs. sending an e-mail in order to avoid risks associated with e-mail may be considered "Risk Averse" Rivest-Shamir-Adleman (RSA) An algorithm for asymmetric cryptography, invented in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. Role Based Access Control Role based access control assigns users to roles based on their organizational functions and determines authorization based on those roles. Root is the name of the administrator account in Unix systems. Routers interconnect logical networks by forwarding information to other networks based upon IP addresses. Routing Information Protocol (RIP) Routing Information Protocol is a distance vector protocol used for interior gateway routing which uses hop count as the sole metric of a path's cost. Routing Loop A routing loop is where two or more poorly configured routers repeatedly exchange the same packet over and over. RPC Scans RPC scans determine which RPC services are running on a machine. Rule Set Based Access Control (RSBAC) Rule Set Based Access Control targets actions based on rules for entities operating on objects. A security mechanism that uses a cryptographic hash function to generate a sequence of 64-bit, one-time passwords for remote user login. The client generates a one-time password by applying the MD4 cryptographic hash function multiple times to the user's secret key. For each successive authentication of the user, the number of hash applications is reduced by one. Safety is the need to ensure that the people involved with the company, including employees, customers, and visitors, are protected from harm. Searching through data residue in a system to gain unauthorized knowledge of sensitive data. Secure Electronic Transactions (SET) Secure Electronic Transactions is a protocol developed for credit card transactions in which all parties (customers, merchant, and bank) are authenticated using digital signatures, encryption protects the message and provides integrity, and provides end-to-end security for credit card transactions online. Secure Shell (SSH) Secure Sockets Layer (SSL) Security Policy Segment is another name for TCP packets. Sensitive Information Sensitive information, as defined by the federal government, is any unclassified information that, if compromised, could adversely affect the national interest or conduct of federal initiatives. Separation of Duties Separation of duties is the principle of splitting privileges among multiple individuals or systems. A session is a virtual connection between two hosts by which network traffic is passed. Session Hijacking Take over a session that someone else has established. Session Key In the context of symmetric encryption, a key that is temporary or is used for a relatively short period of time. Usually, a session key is used for a defined period of communication between two computers, such as for the duration of a single connection or transaction set, or the key is used in an application that protects relatively large amounts of data and, therefore, needs to be re-keyed frequently. A one way cryptographic hash function. Also see "MD5" Shadow Password Files A share is a resource made public on a machine, such as a directory (file share) or printer (printer share). A Unix term for the interactive user interface with an operating system. The shell is the layer of programming that understands and executes the commands a user enters. In some systems, the shell is called a command interpreter. A shell usually implies an interface with a command syntax (think of the DOS operating system and its "C:>" prompts and user commands such as "dir" and "edit"). Signals Analysis Gaining indirect knowledge of communicated data by monitoring and analyzing a signal that is emitted by a system and that contains the data but is not intended to communicate the data. A Signature is a distinct pattern in network traffic that can be identified to a specific tool or exploit. Simple Integrity Property In Simple Integrity Property a user cannot write data to a higher integrity level than their own. Simple Network Management Protocol (SNMP) The protocol governing network management and the monitoring of network devices and their functions. A set of protocols for managing complex networks. Simple Security Property In Simple Security Property a user cannot read data of a higher classification than their own. A smartcard is an electronic badge that includes a magnetic strip or chip that can record and replay a set key. A sniffer is a tool that monitors network traffic as it received in a network interface. A synonym for "passive wiretapping." Social Engineering The socket tells a host's IP stack where to plug in a data stream so that it connects to the right application. Socket Pair A way to uniquely specify a connection, i.e., source IP address, source port, destination IP address, destination port. A protocol that a proxy server can use to accept requests from client users in a company's network so that it can forward them across the Internet. SOCKS uses sockets to represent and keep track of individual connections. The client side of SOCKS is built into certain Web browsers and the server side can be added to a proxy server. Source Port The port that a host uses to connect to a server. It is usually a number greater than or equal to 1024. It is randomly generated and is different each time a connection is made. Electronic junk mail or junk newsgroup postings. Spanning Port Configures the switch to behave like a hub for a specific port. Split Horizon Split Key A cryptographic key that is divided into two or more separate data items that individually convey no knowledge of the whole key that results from combining the items. Attempt by an unauthorized entity to gain access to a system by posing as an authorized user. SQL Injection Stack Mashing Stack mashing is the technique of using a buffer overflow to trick a computer into executing arbitrary code. Standard ACLs (Cisco) Standard ACLs on Cisco routers make packet filtering decisions based on Source IP address only. Star Property In Star Property, a user cannot write data to a lower classification level without logging in at that lower classification level. State Machine A system that moves through a series of progressive conditions. Stateful Inspection Static Host Tables Static host tables are text files that contain hostname and address mapping. Static Routing Static routing means that routing table entries contain information that does not change. Stealthing is a term that refers to approaches used by malicious code to conceal its presence on the infected system. Steganalysis is the process of detecting and defeating the use of steganography. Methods of hiding the existence of a message or other data. This is different than cryptography, which hides the meaning of a message but does not hide the message itself. An example of a steganographic method is "invisible" ink. Stimulus is network traffic that initiates a connection or solicits a response. Store-and-Forward is a method of switching where the entire packet is read by a switch to determine if it is intact before forwarding it. Straight-Through Cable A straight-through cable is where the pins on one side of the connector are wired to the same pins on the other end. It is used for interconnecting nodes on the network. Stream Cipher A stream cipher works by encryption a message a single bit, byte, or computer word at a time. Strong Star Property In Strong Star Property, a user cannot write data to higher or lower classifications levels than their own. Sub Network A separately identifiable part of a larger network that typically represents a certain limited number of host computers, the hosts in a building or geographic area, or the hosts on an individual local area network. Subnet Mask A subnet mask (or number) is used to determine the number of bits used for the subnet and host portions of the address. The mask is a 32-bit value that uses one-bits for the network and subnet portions and zero-bits for the host portion. A switch is a networking device that keeps track of MAC addresses attached to each of its ports so that data is only transmitted on the ports that are the intended recipient of the data. Switched Network A communications network, such as the public switched telephone network, in which any user may be connected to any other user through the use of message, circuit, or packet switching and control devices. Any network providing switched communications service. Symbolic Links Special files which point at another file. Symmetric Cryptography A branch of cryptography involving algorithms that use the same key for two different steps of the algorithm (such as encryption and decryption, or signature creation and signature verification). Symmetric cryptography is sometimes called "secret-key cryptography" (versus public-key cryptography) because the entities that share the key. Symmetric Key A cryptographic key that is used in a symmetric cryptographic algorithm. SYN Flood A denial of service attack that sends a host more TCP SYN packets (request to synchronize sequence numbers, used when opening a connection) than the protocol implementation can handle. Synchronization is the signal made up of a distinctive pattern of bits that network hardware looks for to signal that start of a frame. Syslog is the system logging facility for Unix systems. System Security Officer (SSO) A person responsible for enforcement or administration of the security policy that applies to the system. System-Specific Policy A System-specific policy is a policy written for a specific system or device. T1, T3 A digital circuit using TDM (Time-Division Multiplexing). To deliberately alter a system's logic, data, or control information to cause the system to perform unauthorized functions or services. TCP Fingerprinting TCP fingerprinting is the user of odd packet header combinations to determine a remote operating system. TCP Full Open Scan TCP Full Open scans check each port by performing a full three-way handshake on each port to determine if it was open. TCP Half Open Scan TCP Half Open scans work by performing the first half of a three-way handshake to determine if a port is open. TCP Wrapper A software package which can be used to restrict access to certain network services based on the source of the connection; a simple tool to monitor and control incoming network traffic. A synonym for "Internet Protocol Suite;" in which the Transmission Control Protocol and the Internet Protocol are important parts. TCP/IP is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an Intranet or an Extranet). TCPDump is a freeware protocol analyzer for Unix that can monitor network traffic on a wire. A TCP-based, application-layer, Internet Standard protocol for remote login from one host to another. Threat Assessment A threat assessment is the identification of types of threats that an organization might be exposed to. Threat Model A threat model is used to describe a given threat and the harm it could to do a system if it has a vulnerability. Threat Vector The method a threat uses to get to the target. Time to Live A value in an Internet Protocol packet that tells a network router whether or not the packet has been in the network too long and should be discarded. Tiny Fragment Attack With many IP implementations it is possible to impose an unusually small fragment size on outgoing packets. If the fragment size is made small enough to force some of a TCP packet's TCP header fields into the second fragment, filter rules that specify patterns for those fields will not match. If the filtering implementation does not enforce a minimum fragment size, a disallowed packet might be passed because it didn't hit a match in the filter. STD 5, RFC 791 states: Every Internet module must be able to forward a datagram of 68 octets without further fragmentation. This is because an Internet header may be up to 60 octets, and the minimum fragment is 8 octets. Token Ring A token ring network is a local area network in which all computers are connected in a ring or star topology and a binary digit or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time. Token-Based Access Control Token based access control associates a list of objects and their privileges with each user. (The opposite of list based.) Token-Based Devices A token-based device is triggered by the time of day, so every minute the password changes, requiring the user to have the token with them when they log in. The geometric arrangement of a computer system. Common topologies include a bus, star, and ring. The specific physical, i.e., real, or logical, i.e., virtual, arrangement of the elements of a network. Note 1: Two networks have the same topology if the connection configuration is the same, although the networks may differ in physical interconnections, distances between nodes, transmission rates, and/or signal types. Note 2: The common types of network topology are illustrated Traceroute (tracert.exe) Traceroute is a tool the maps the route a packet takes from the local machine to a remote destination. Transmission Control Protocol (TCP) A set of rules (protocol) used along with the Internet Protocol to send data in the form of message units between computers over the Internet. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. Transport Layer Security (TLS) Triple DES A block cipher, based on DES, that transforms each 64-bit plaintext block by applying the Data Encryption Algorithm three successive times, using either two or three different keys, for an effective key length of 112 or 168 bits. S/MIME usage: data that has been signed with a digital signature, and then encrypted, and then signed again. Trojan Horse Trunking is connecting switched together so that they can share VLAN information between them. Trust determine which permissions and what actions other systems or users can perform on remote machines. Trusted Ports Trusted ports are ports below number 1024 usually allowed to be opened by the root user. A communication channel created in a computer network by encapsulating a communication protocol's data packets in (on top of) a second protocol that normally would be carried above, or at the same layer as, the first one. Most often, a tunnel is a logical point-to-point link - i.e., an OSI layer 2 connection - created by encapsulating the layer 2 protocol in a transport protocol (such as TCP), in a network or inter-network layer protocol (such as IP), or in another link layer protocol. Tunneling can move data between computers that use a protocol not supported by the network connecting them. UDP Scan UDP scans perform scans to determine which UDP ports are open. Broadcasting from host to host. Uniform Resource Identifier (URI) Uniform Resource Locator (URL) A popular multi-user, multitasking operating system developed at Bell Labs in the early 1970s. Created by just a handful of programmers, Unix was designed to be a small, flexible system used exclusively by programmers. Unprotected Share In Windows terminology, a "share" is a mechanism that allows a user to connect to file systems and printers on other systems. An "unprotected share" is one that allows anyone to connect to it. A person, organization entity, or automated process that accesses a system, whether authorized to do so or not. User Contingency Plan User contingency plan is the alternative methods of continuing business operations if IT systems are unavailable. User Datagram Protocol (UDP) A communications protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error recovery services, offering instead a direct way to send and receive datagrams over an IP network. It's used primarily for broadcasting messages over a network. UDP uses the Internet Protocol to get a datagram from one computer to another but does not divide a message into packets (datagrams) and reassemble it at the other end. Specifically, UDP doesn't provide sequencing of the packets that the data arrives in. Virtual Private Network (VPN) Voice Firewall A physical discontinuity in a voice network that monitors, alerts and controls inbound and outbound voice network activity based on user-defined call admission control (CAC) policies, voice application layer security threats or unauthorized service use violations. Voice Intrusion Prevention System (IPS) Voice IPS is a security management system for voice networks which monitors voice traffic for multiple calling patterns or attack/abuse signatures to proactively detect and prevent toll fraud, Denial of Service, telecom attacks, service abuse, and other anomalous activity. War Chalking War chalking is marking areas, usually on sidewalks with chalk, that receive wireless signals that can be accessed. War Dialer War Dialing War dialing is a simple means of trying to identify modems in a telephone exchange that may be susceptible to compromise in an attempt to circumvent perimeter security. War Driving Web of Trust A web of trust is the trust that naturally evolves as a user starts to trust other's signatures, and the signatures that they trust. Web Server An IP for finding information about resources on networks. A windowing system is a system for sharing a computer's graphical display presentation resources among multiple applications at the same time. In a computer that has a graphical user interface (GUI), you may want to use a number of applications at the same time (this is called task). Using a separate window for each application, you can interact with each application and go from one application to another without having to reinitiate it. Having different information or activities in multiple windows may also make it easier for you to do your work. A windowing system uses a window manager to keep track of where each window is located on the display screen and its size and status. A windowing system doesn't just manage the windows but also other forms of graphical user interface entities. Windump is a freeware tool for Windows that is a protocol analyzer that can monitor network traffic on a wire. Wired Equivalent Privacy (WEP) A security protocol for wireless local area networks defined in the standard IEEE 802.11b. Wireless Application Protocol A specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide Web, newsgroups, and Internet Relay Chat. Monitoring and recording data that is flowing between two points in a communication system. World Wide Web ("the Web", WWW, W3) The global, hypermedia-based collection of information and services that is available on Internet servers and is accessed by browsers using Hypertext Transfer Protocol and other information retrieval mechanisms. Zero Day The "Day Zero" or "Zero Day" is the day a new vulnerability is made known. In some cases, a "zero day" exploit is referred to an exploit for which no patch is available yet. ("day one" - day at which the patch is made available). Zero-day attack 3-way handshake Machine A sends a packet with a SYN flag set to Machine B. B acknowledges A's SYN with a SYN/ACK. A acknowledges B's SYN/ACK with an ACK.
Found: The Bacteria That Are Making You Stink Scientists have finally discovered the culprit behind smelly armpits 237/Chris Ryan/Ocean/Corbis What’s that smell? If it’s coming from your armpits, chances are it’s Staphylococcus hominis. For the first time, researchers have isolated the group of microbes that make our underarms stink—and their findings just might change the way we fight the funk. A group of microbiologists have discovered the reason body odor is so smelly, reports Poncie Rutsch for NPR. Spurred on by questions about the processes that make us smell, scientists from the University of York in England studied the microbiome of human underarms. The answer, they found, lies in thioalcohols—which is produced when human sweat interacts with armpit bacteria. “These odorless molecules come out from the underarm, they interact with the active microbiota, [and] they're broken down inside the bacteria,” study lead Dan Bawdon told NPR. Accordng to Bawdon, thioalcohols, which smell comparable to meat, sulfur, onions and other stinky substances, are “very, very pungent.” When they evaporate from the underarm, Rutsch continues, they start to smell. In a release, the team describe how they isolated over 150 thioalcohols produced by different bacteria, then pointed the finger at three particularly smelly culprits: S. hominis and two other species of Staphylococcus. When they reverse-engineered the process, they knew they were right—these bacteria produce B.O. The team hopes their research might change the way we fight back against smelly armpits, allowing scientist to produce deodorants that kill the right bacteria instead of laying waste to all bacteria under the arms or blocking sweat glands. By “leaving the underarm microbiota intact,” says the team, companies like Unilever (who helped fund the project) can develop safer and more effective deodorants. While you wait for deodorant tech to catch up with this stinky new research, why not try a new (old) trend in current-day deodorants? The New York Times reports that spray deodorants, which went out of fashion in the United States during the 1970s and 80s, are back with a vengeance, fueled by consumers who can’t bear the thought of leaving white streaks on their favorite clothes.
• Suggested Age Range: 5 – 6 years • UK Primary Curriculum: Key Stage One • Suggested UK Year Group: Year 1 • UK Primary Curriculum Link: Living things and their habitats – Animals • Science Subject: Animals • Science Question: Why do we have day and night? Why do some animals like the day and others like the night? • Activity type: individual or small group • Suggested linked stories: Why we have both Day and Night; Bat Steals the Moon Brief summary: In this activity students will explore the differences between day and night on the Earth by comparing nocturnal and diurnal animals.  They will investigate how day and night occur on the Earth using a simple model, and see how people and animals living in different parts of the planet experience different times of the day. Key concept: Some animals are adapted to live in the dark while others prefer daylight.  Day and night are caused by the rotation of the Earth. Key words: day, night, spin, axis Safety note: It must be stressed that you must NEVER look directly at the Sunas this can permanently damage your eyes.  It is perfectly safe to look directly at the Moon. The Science Story: Have you ever noticed that it’s always daytime when the Sun is in the sky?  Do you know where the Sun goes at night?   We live on a planet called the Earth, it looks a bit like this (show a model of the Earth).  Right now it is daytime here, the Sun is in the sky and the sky is bright.  At night the Sun goes away, the sky is dark, and people go to sleep.   Not all animals sleep at night though, can you think of any animals that are awake at night? (Bats, owls, hedgehogs, etc.)   When it is night time here, people are asleep, and bats are awake; when the Sun comes up in the morning, the bats go to sleep and the people wake up.  The Earth spins, like this (spin the Earth).   We are here (put a marker on the ball at your approximate location).  Imagine your best friend goes on holiday to the other side of the Earth (put another marker on the Earth opposite the first marker, name the country where the marker is located).  Right now, it is daytime here, the Sun is in the sky (turn on the lamp and shine it at the Earth on the side with the first marker).   If you phone your friend, will they be awake or asleep?   They will be asleep (and probably quite cross to be woken up in the middle of the night by the telephone!) because it is dark where they are.  Which animals are awake here?  Are bats awake?   No, the bats are asleep because they like to hunt in the dark.  What about where your friend is, is it daytime there?   No, because they cannot see the Sun.   So which animals are awake where they live?  Are the bats awake?   Yes, the bats are awake, and the people are asleep.   But what happens in twelve hours, when it is night here?  (Spin the ball on its axis so that the situation is reversed.)  Now it is night time here, so the bats wake up and the people go to sleep.   What about where your friend lives, is it day or night?   It is day time and the bats have gone back to sleep. The Science: Day and night on the Earth are due to the apparent motion of the Sun across the sky, caused by the rotation (spin) of the Earth on its axis. The Earth spins on its axis, and at the same time it revolves (orbits) the Sun.  When you are on the side of the Earth facing the Sun it is daytime, and when you are on the side facing away from the Sun it is night.   The Earth spins on its axis once every 24 hours, causing our “day” to be 24 hours in length.  The fact that the Earth is spherical means that as the Earth rotates, the side facing the Sun experiences daytime whilst the side facing away from the Sun experiences night.  At 12-noon the Sun appears at its highest in the sky, by midnight (12 hours later) the Earth has spun by half a rotation and you are now in the Earth’s shadow and experience night.  The axis of the Earth is tilted at an angle of 23.5oto the plane of the solar system, like a spinning top spinning at an angle to the table. Here are some common animals – which ones like the daytime and which ones like the night? Some daytime animals Some night animals The activity: In this activity students will think about different animals and whether those animals are normally awake only during the daytime, only during the night-time, or can be seen at any time of day.  This can be run as a small group activity with the students working together to design their zoo, or students can each create their own zoo. Props required:  • Images of various nocturnal/diurnal animals (see above). • Wall chart: large sheet of paper with a line down the middle to split the area into “day” and “night” animals. 1. In this activity you are going to be a zoo keeper.  Your job is to make sure you know when your animals are awake so that you know when to feed them! 2. Look at the pictures of the different animals.  Can you name them? 3. With your friends (who are also zoo keepers), think about whether each animal is awake during the daytime. 4. Which animals are awake only at night? 5. Are there any animals that are awake during both day and night? 6. When you have decided which animals are “day animals”, and which are “night animals”, stick each image on your group’s wall chart. 7. Draw other animals that you know and put them in your zoo. Pretend you are zoo keepers – which animals will people see during the day, and which ones will be asleep? Extension: Once the groups have completed their wall charts, the whole class can come together to place animal stickers on a large model Earth (an inflatable Earth, or even just a beach ball), which can then be illuminated by a lamp and turned on its axis so that each animal has day/night.  This helps the students see how the Earth spins and gives us day and night. Above are some example zoos created by groups of Year 1 students at Whitchurch Primary School. Common misconceptions: • The Sun turns off at night – the Sun is still shining, but we can’t see it because we are in the shadow of the Earth. • The Moon is only in the sky at night – the Moon is in the night sky sometimes, but it can also appear in the daytime sky. • When it is night in the UK it is also night in Australia – this is not the case because the Earth is a ball. • The Earth spins on its axis once in 24 hours, this gives us day and night. Note that spinturn and rotate are all synonyms in this context. • The Earth orbits the Sun every 365.25 days, this gives us a year, and leads to the seasons. Note that the words orbit and revolve are synonyms in this context. Curriculum links: • Science KS1: Living things and their habitats – animals and their habitats • Geography KS1: locational knowledge – continents and oceans Use with other years: This can be used with Year 5 to explore Day and Night in more depth. They could take the activity further by exploring the topic themselves, using secondary sources to investigate other animals that are diurnal/nocturnal and finding out more about them.  They could also use the information they discover to create a set of cards for a classification game for use with a younger group, bringing in research skills, expanding their knowledge of animals and vocabulary, and using their creativity. Linked activities: Compare diurnal and nocturnal animals and experiment with day and night – astroEDU Day and night plates, an activity using paper plates to show how the Earth spins – UNAWE Copyright: Megan Argo 2019
What Is Laziness? Laziness is one of the seven deadly sins. At one time or another, we have all felt lazy. But what, exactly, does laziness even mean? The classic conception of a lazy person is someone who sits around all day, doing nothing. But even a “lazy” person is doing something, right? They are not in a vegetative state. For as example, let’s pretend that the lazy person in question sits around all day playing video games. They contribute nothing, just hours and hours of Xbox. But isn’t that video game play, in itself, something they are working quite hard at? They are advancing in the game, learning playing techniques, maybe even reading about cheat codes or Easter eggs. A decent amount of time and effort might go in to learning how to play. Can that really be considered lazy? Related: Listen to an episode of the Intellectual Roundtable Podcast, where Lee and Michael discuss this question: ‘What is the value of inefficiency?’ We discuss another question as well, ‘How can we encourage debate?’ Admittedly, playing video games doesn’t really improve life in any way. Or does it? There are people who upload videos of themselves playing video games to YouTube, and make hundreds of thousands, or even millions of dollars in doing so. Are they lazy? The difference there may be one person is earning a paycheck, and the other is not. Is laziness tied to money? One person doing something is lazy, someone else doing the exact same thing for pay is not lazy? Does that make any sense? It may be that our classical definition of “lazy” merely means “disinterested”. Perhaps someone who is late for work, doesn’t try very hard, makes a lot of easily-fixed mistakes, is simply not interested in doing that job. That same person might be totally invested in playing video games, or managing their fantasy football team, or even working at a more engaging job. In that case, a different definition of “laziness” may be in order. Can you think of one? Related questions: Pride or humility? When do you need inspiration? What gives you purpose? What is the worst job you’ve ever had? How Can You Change Your Attitude? There are times when, to overcome an obstacle of some sort, all you need to do is change your attitude. But how can this be done? Some common emotions, like frustration or anger, don’t actually accomplish much. Typically, they don’t help you to arrive at a solution any sooner. They can even make thinking other thoughts difficult. A change of attitude is called for. If, instead of anger, you approach a situation with curiosity, better results may occur. Or empathy, or determination, or even no thoughts at all. Related: Listen to an episode of the Intellectual Roundtable Podcast, where Lee and Michael discuss this question: ‘How can we maintain wonder?’ We discuss another question as well, ‘How do you think others see you?’ But this is easier said than done. Negative emotions can be overwhelming. drowning out everything else. They can also be counterproductive, going so far as to sabotage positive, or helpful thoughts. So what tricks or coping mechanisms have you found to help you change your approach? How can you change your attitude? Related questions: How can we turn sadness into constructive action? Why do we hate? What is the right amount of emotion? How can we turn ideas into actions? What Technology Most Impacts Your Life? There is little doubt that technology impacts our lives every single day. It is one of the defining characteristics of the human race. For better or worse, the devices we have constructed have allowed transformative change for how we live, as well as for the planet we live on. Some technology is obviously good. We have extended life spans, reduced or eliminated diseases, and increased the available food supply. However, there is a dark side to it, as well. Climate change, species extinction, and overpopulation are the consequences of some of these technological innovations. Related: Listen to an episode of the Intellectual Roundtable Podcast, where Lee and Michael discuss this question: ‘Is technology neutral?’ We discuss another question as well, ‘Freedom or security?’ On a personal level, which inventions or innovations have made the biggest impact on your life? Perhaps a medical advance that saved your life? Eyeglasses that allow you to see clearly? Printing presses that allow for knowledge aggregation? Indoor plumbing to reduce disease and increase comfort? Airplanes that allow you to travel just about anywhere on the surface of the earth? The Internet for pulling together so many different areas of information? Or the smartphone that allows you to bring it with you wherever you go? What technology most impacts your life? Which one has most negatively impacted your life? Related questions: What skills have you lost due to technology? What role does technology play in your life? Will technology save us? What new technology do you want? Is technology neutral?
Historyproject talk:The New Talossan History Project From TalossaWiki Revision as of 03:39, 7 August 2020 by Miestra (talk | contribs) Jump to: navigation, search Welcome to all members of the New Talossan History Project! I've asked a Wiki bureaucrat to restrict editing of this page to people who are members of the NTHP. If you want to discuss edits, you can do so here or on the NTHP thread on the Royal Society board on Witt. Miestra (talk) 02:07, 7 August 2020 (UTC) AD's deleted "History Project" (possible source material?) El Regipäts Talossan is a temperate country in North America. It is bordered on three sides by the United States of America, and on the east by the Mar Talossan – the Talossan Sea. The boundary between the north of Talossa and the American city of Shorewood, Wisconsin, is the street known as Edgewood Avenue. To the west and south, the border of Talossa is defined by the gentle curves of the graceful Milwaukee River as it empties into the Mar Talossan (known to Americans as “Lake Michigan”). Across the river lies the American city of Milwaukee, long known for courteous relations with Talossa. Talossa also incorporates the lush island of Cezembre, located off the coast of France in Europe, and lays claim to a broad swath of polar Antarctica. Historically, much of the topography of mainland Talossa has been formed by ancient glaciers. During the last ice age of the Earth, most of northern North America was blanketed with these massive ice sheets. They advanced and retreated regularly, carving out the land underneath them as they did so and reshaping it with their huge weight. The last such glacier swept over Talossan territory about ten thousand years ago, channeling through the lowlands of the nearby lakes (including the Mar Talossan). The departing glacier left behind piles of rocks and pebbles scraped into ridges (known as moraines), and remain in many places today as the bluffs that line the seashore.[vi] The area of Talossa was once heavily forested, but the greenery mostly gave way to the developing city of what was then known as East Milwaukee and is only partially recreated in modern Talossan parks such as Lake Park. Talossa has four very distinct seasons, with temperature and precipitation varying widely over the year. Due to the presence of the Mar Talossan, there is a heavier snowfall every year than is experienced by many other inland areas, but in the summer the heat can be both luxurious and intimidating. It is not uncommon for it to rain throughout the year; nor are ice storms and tornadoes completely unknown. Talossan territory is divided into different provinces, whose shape has changed (sometimes dramatically) over the years but which have been settled in the present configuration for some time. While one province, Vuode, has been a part of the national territory since the founding of Talossa, the territory of the others was annexed in later years. All but two of the current provinces date from the fifth year of the Kingdom or before; Florencia was created in the seventeenth year from part of Benito’s territory, in response to citizen demand, while Fiova was created as part of Reunision (the union of the Republic of Talossa and the Kingdom of Talossa). The names of provinces have been fluid at times. The borders of the mainland provinces adhere to the borders of the individual census blocks designated by the United States for the area during the time when it was U.S. territory. These blocks (census tracts 73-76, 108-113, and 153) were already conveniently allocated and had been dissected statistically by the departing United States government, and so during the Cantonization of 11/30/1984/V they were used as the basis for province borders. Minor deviations were fixed ten years later, and this tradition is still generally true today, making the business of collecting data on residents much easier on the resource-light Talossan government, since the U.S. government still kindly administers and analyzes census data for the area. It is important to note that – unlike some other countries – Talossa was a single nation that was divided into provinces. While many of them (particularly Vuode) have flirted with secession, they are completely and indivisibly part of Talossa. All Talossans, no matter how proud of their province, have a common heritage and are united in their nation. “[T]he Talossan people are inexplicably and inextricably connected somehow to Berbers,” reads Talossan law.[vii] And inexplicably and inextricably, it’s true. While it was once simply a blatant attempt at mythmaking by Robert I, in an attempt to distinguish Talossan history from that of the United States of America[viii], it can’t be denied that most Talossans think the Berber people – a light-skinned North African group – are interesting and cool. And in Talossa, that’s how traditions become fact.[ix] Thus, in some mysterious sense, the ancient Berber tribes are the ancestors of the modern Talossan people, and every Talossan should study them in at least some small way to understand an ancient heritage. The ancient Berber people occupied much of North Africa, and their direct descendents populate much of the countries of Morocco and Algeria. They spoke the Berber language, written with a variety of alphabets over the years. As a predominantly coastal people they absorbed much of the influences of seafarers such as the Phoenicians and Greeks. They were especially prominent in history at such times as the Second Punic War of the third century B.C., when their powerful cavalry performed outstandingly well when allied with Carthage against Rome, and during the Islamization and empire building in Africa the seventh to tenth centuries A.D. that set up powerful Berber caliphates.[x] Importantly for Talossa, the Berbers were also great travelers. It is widely believed by historians that they had cultural and genetic influence upon most of the peoples of Europe. And because Talossa is located in an area settled predominantly by European peoples, this means that there is at least one verifiable link between Berbers and Talossa.[xi] While this might be a solid connection, rather bolder and more tenuous was Robert I’s further claim in his 1996 The Berber Project that the Berber people later became the Beaker people of ancient Europe, and then navigated the Atlantic Ocean five thousand years ago, populating North America and transforming into the indigenous Mound-Builders of the Talossan area. He argued that “around 3000 B.C., North America was indeed treated to a large and substantial wave of Berber immigrants who brought their culture with them when they settled around the copper mines of Lake Superior and northern Wisconsin.” Robert I also pointed out that “Talossa” resembles the word “talayot,” the ancient Beaker civilization’s name for their hutlike dwellings. Robert I claimed that this connection was evidence for a link between the ancient Beaker culture and Talossa. He also listed a whole host of indigenous North American words that sound similar to either “Talossa” or “talayot” (“tuy,” “talo,” “tell”) and indicated that this was also strong evidence for substantial Berber influence.[xii] The Berber-ish Mound-Builders and other indigenous inhabitants of the Talossan area were supplanted by immigrants from abroad (particularly Germany), and the city known as Milwaukee was founded and grew into a thriving metropolis. There were wars and all manner of American history, in fact. But it wasn’t until 1979 A.D. that Talossa’s history really began. B. Dictatür Atx (1979-1981) “You can’t change Milwaukee, you can’t leave Milwaukee: So secede from Milwaukee!” Robert Ben Madison Jean Madison died suddenly, on February 1st, 1979.[xiii] She was not yet forty years old. Left behind were her family: Her husband, Harry. Her daughter, Jennifer. And her troubled son, Robert Ben Madison, who would go on to found Talossa later that year. Robert had not been untroubled before her mother’s death, to be sure. Many other influences probably led to his impulse to create a nation: He was often tormented in his Milwaukee high school by bullies for being a fan of science fiction and what he called “quietly nerdy.” Often, he was simply lonely. He found America to be corrupt and vile, with a reprehensible history and a language that inspired conflicts and other violence[xiv]. He strongly admired European nations like Denmark and Finland for their grand histories and peaceful ways. Like many emerging adolescents, his politics were as changeable as the wind and led to many impassioned essays about the evils of capitalism. a But Robert would later imply that it was the tragedy of Jean’s sudden death that prompted a search for what he called a “perfect world.” It is an understandable impulse. He would later describe an exact moment of conception for the idea of Talossa, claiming that inspiration struck him while reading about the constructed language “Esperanto” in the downtown Milwaukee library. But it is best when simply said: Robert Ben Madison, a 14-year-old Milwaukee boy, founded Talossa at seven in the evening on December 26th, 1979/I. Upon reading a proclamation of secession from the United States to an audience of his family and his friend Gary Cone (recognized as U.S. Ambassador), and crowning himself with a hat bought in a secondhand store, he assumed the role of King Robert I of the House of Rourgue, founder and first monarch of the Kingdom of Talossa. The first tradition of Talossa was the flag, presented at the Founding. Originally white, red, and green, this proved too similar to other flags and two years later became the simple bicoleur of green-over-red that we know today.[xv] A second tradition was the national motto, also present at the Founding. “A man’s room is his kingdom” was written in poor Finnish[xvi] despite the Norwegian “national language” of the time. This motto, partially humorous, was an adaptation of a still-common saying in the area, “A man’s home is his castle.”[xvii] Immediately after the founding, a third tradition of Talossan journalism began when Robert I decreed the existence of “Støtannet,” the official state newspaper. a This would subsequently be known as “Støtanneu,” and would be infrequently printed but nonetheless the longest-running journal of opinion in the nation’s history. As Robert I describes the first moments in Ár Päts: the Rise and Fall of the Kingdom of Talossa: “Independence Day was 26 December 1979. At 7:00 PM, the King’s family assembled at his Prospect Avenue home, where the Talossan flag was draped across the coffee table. Ben’s friend Gary L. Cone, whom Talossa recognized as the US Ambassador, entered the room. Next came Robert Ben Madison, in the blue suit he wore to debate meets, done up with paper medals and ribbons. For a crown, he carried an ancient blue Milwaukee fire department dress hat he bought at a used bookstore for $3.00. A friend called it the ‘Romanian train conductor’s hat.’ Madison read a brief speech (since lost) about his new nation. Then, in his first official act, this High School sophomore read a Declaration of Independence officially proclaiming Talossa’s secession from the United States. Fastening the blue hat upon his head, he was transformed into His Royal Majesty, King Robert I of the Kingdom of Talossa, and a bedroom on the second floor of an American house became a free, sovereign, and independent nation, as champagne toasts were enjoyed downstairs. “The Kingdom was first ruled as a ‘democratic dictatorship’ by its only citizen, King Robert. His Constitution in its entirety proclaimed: ‘ARTICLE ONE: All power of law, finance and anything else is vested in the King. ARTICLE TWO: This constitution is perfect and shall have no need of amendment.’” Within this first month of Talossa, Robert I proposed a plan he called “World Singular Secession”: everyone, he thought, should become their own country. The exact aims of this plan are obscure, but given the boy-King’s contrarian nature, it is certain that the simple notion of massive change would have been sufficient impetus. World Singular Secession proved to be a non-starter, although it did inspire a few imitators of Talossa and some element of ideology to the movement.[xviii] In these early years, it was the sheer youth of the founder, monarch, and sole citizen of Talossa that led to violent and meaningless change – often only change for its own sake. Sometimes Robert I would shift the national culture or announce new policies in imitation of a new personal idol. Oddly, this quiet and creative boy seemed to have a marked penchant for admiring violent extremists, perhaps for their force of personality. In the first month of Talossa’s existence, for example, Robert I deposed himself and created a “Communist People’s Republic” a in imitation of Enver Hoxha, the communist dictator of Albania.[xix] The following month, Robert I reinstated himself without ceremony, but less than a year later again deposed himself and declared Talossa to be a republic, now in imitation of Mustafa Atatürk, the revolutionary leader of Turkey and Robert I’s new hero. Again, he reinstated himself without ceremony. The only lasting legacy of this boyhood changeability is modern Atatürk province; "Enver Hoxha Province" is thankfully defunct. Cone War Period A traditional label including a span of two months, the Cone War Period comprises all of the first foreign interactions of Talossa - the actual war itself lasted only a week. The influence of the World Singular Secession philosophy combined with a personal conflict with Gary Cone to lead to the Cone War Period, a brief and boyish time in the country. During this first year of Talossa, Robert I and his friend Gary Cone had a serious falling-out. Robert I was an outspoken liberal atheist, while Cone was a conservative Christian. When Cone’s leanings caused an argument, they broke as friends and Robert I fired Gary Cone from his post as United States Ambassador. Gary Cone reacted predictably to his ousting, founding his own new country: the Glib Room Empire. Støtanneu took a stance against the new micronation, surprising no one.
Latest Code Tutorials Browsing Category JavaScript, often abbreviated as JS, is a high-level, just-in-time compiled, object-oriented programming language that uses the ECMAScript specification. Objects, Arrays, and Strings are the main data structures of Javascript. TypeScript Map: A Complete Guide TypeScript map is a new data structure that allows us to store data in the key-value pair and remembers the original insertion order of the keys. In the TypeScript map, we can use any value either as a key or as a value.Understanding… Beginners Guide To TypeScript Interface TypeScript Interface is a syntactical contract that an entity should adhere to. The Interface is a structure that defines the contract in your application. It describes the syntax for classes to follow. Classes that are derived from the…
Monday, 23 September 2013 Worksheet: Film Screening - Harold Pinter's The Birthday Party Worksheet: Film Screening  Online Quiz on 'The Birthday Party' Pre-Viewing Tasks: While – Viewing Tasks: • Post-Viewing Tasks: • ·         With which of the following observations you agree: • ·         Who would be your choice of actors to play the role of characters? •      Do you see any similarities among Kafka's Joseph K. (in 'The Trial'), Orwell's Winston Smith (in 'Nineteen Eighty-Four') and Pinter's Victor (in 'One for the Road')?   The film version of the play can be viewed here: The film can be viewed online here: Sunday, 1 September 2013 Story Writing Skill: English Language Writing Styles This was the writing task given to the students to work in a group. They were asked to develop a story from the given image. It was famous Panchtantra fable - The Lion and the Rat. The story written was to be submitted in 'Comments' section below the blog post. You will find three comments below the blog and all three have different writing style. It ranges from simplistic writing in matter-of-fact style to highly literary style of giving an effect of emotions to environment. I hope you will enjoy reading the difference in three styles of writing. Visit this 'Blog 4 Teaching & Learning: Story Writing' to give your comments. The content of this blog with comments are copy-pasted here: Tuesday, August 4, 2009 Story Writing Develop below given points into a story: Write your story in the 'comments box'. To write in the 'coment box', clik on 'comments' at the end of this blog. Wait for the new page to open. Write in the given space and publish your comment. Use your google account for log in and identification. Publish one post named as 'Feedback on Story Writing'. Teacher's comments on your story will be published in the 'comments' of your blog. Lion sleeping beneath a tree - rat came to play - climbed over the body of the lion - unknown to dangers, rat started playing with whiskers of the lion - lion wake up - angrily roared - rat trembled - lion ready to savour the rat - the rat begged to be pardoned - promised to help him in the hours of need - arrogance of lion smugged at rat - left alive - lion trapped by hunter in the net - roared for help - rat came with fellow friends - lion saved - friends forever. The moral of the story is: 1. Friend in need in friend indeed. 2. Never trust mousy friends. 3. One never knows how one can be helpful to others. 1. Once a lion was sleeping beneath a tree suddenly a rat came to play there. It climbed over the body of the lion. It was unknown to the dangers and it started playing with whiskers of the lion. Soon the lion woke up and roared angrily. The rat started trembling. The lion was ready to svour the rat. The rat begged the lion to pardon and promised to help him in the hours of need. At that time, the arogant lion smugged at the rat and left it alive. After some days the lion was trapped by hunter in the net. The lion began to roar for help. soon the rat came with fellow friends and saved the life of lion. And then they were friends forever. The moral of the story is: - One never knows how one can be helpful to others. 2. Once upon a time,in a thick and dreadful forest,a lion was sleeping beneath the tree.Suddenly, a cheerful rat came to play for a while. There he saw a lion.Unknown to the dangers of lion,he climbed over the body of the lion and started playing with his whiskers. suddenly,the lion woke up and roared in anger.The rat was trembling in fear.Watching a trembling rat,the lion pitied him.The rat was ashamed for his deed and begged to be pardoned.He also promissed the lion that he will help him in his critacal times. The lion,in a mood of disgust smugged at rat ang left him alive.Then one day a group of hunters trapped the lion in a net. A poor lion roared for help.As soon as the rat came to know about the trapping of lion,he came with a few friends and cut the net.In this way he saved the lion.After that incident,they remained friends forever. 1.A friend in need is a friend indeed. 2.Never underestimate anyone in your life because you never know how one can be helpful to others. 3.friendship is like water,no shape,no place,no taste.But it is still essential for living. 3. The arrogant Lion was sleeping beneath a barren tree and his arrogance,too,was,adding even bitter barrenness to the nature by making it dismal and gloomy.In such atmospheare small,innocent infant Rat came in a jovial mood.Being in jovial mood infant started playing with the lion by climbing over the body of the lion without knowing the danger in it.In his pleasing mood the rat continued to play with whiskers of the lion.On such pleasing atmospheare where tree forgot to blossom,wind forgot to blow,they got their charm and sense of being a part of nature.But before such happened the lion woke up and roared angrily.Everything became barren as it was before.The rat got trembled.In his fury the lion was ready to savour the rat.The rat,innocent and small creature succumbed and begged to be pardoned.This small creature assured him to help in the hours of need in the best possible way he 'CAN'. But,how can a small creature help 'A KING'?.The king smugged the rat and gave him a chance to live. The flow of time never remains the same.After few days The king was trapped by hunters in the net.It was so called pity of him.He craved and roared for help.The rat,being a being of blood and flesh,without thinking anything came with fellow friends and anyhow managed to save the King by cutting the stings of tne net.Only afterwards the lion understood the value of friendship and became the friends forever.
Educators and start-up teams bring passion to their work. OKRs and a late 20th-century school reform model can help us harness that passion and create powerful innovation in schools. Image by Ian Schneider on Unsplash Reinventing Education: Lessons From A Start-Up Would you go to a hospital that was still operating as it was 100 years ago, or even 10 years ago? Would you be satisfied with a car using 1970 technology? Why would you send your child to a school that looks like the school your grandparents attended? So you’re passionate? How passionate? What actions does your passion lead you to do? If the heart doesn’t find a perfect rhyme with the head, then your passion means nothing. Figure One: Except for the word mastery and the phrase “co-design their learning paths,” these were the objectives for the AltSchool beta classroom. Figure Two: Schoolwide Objective #1 and Key Results Figure Three: Mastery Learning Working Group OKRs Educator, entrepreneur, boundary crosser, community builder, advocate for learners of all ages.
Quick Answer: What Problems Can A Bad PSU Cause? Do PSU degrade? A PSU will degrade over time. The reason computer PSUs typically last (if they are decent quality) is the fact that they are often far overspecced for the actual wattage you put on them. A 800W PSU that gets 200W load for 4 hours a day will live longer than one that has 750W load 24/7.. How long should a PSU last? five yearsUnder normal intended use, a PSU should last a long time—at least five years, possibly up to 10 years if you’re lucky. But if you start putting the power supply under high loads over long periods, it can be overstressed. Can a PSU be repaired? Even when the supply is unplugged, its components can remain charged and SHOCK YOU. If you are in doubt about your abilities, let an experienced repair technician do the work or simply replace the entire power supply. Is 500w PSU enough? Most people really tend to overblow things when it comes to their PSU, be it for possible future upgrades or just so that they can feel safer, but in reality for a single GPU build in the tier of 970 or even 390 a good quality 500w PSU will serve them perfectly fine, even with a bit of OC both on GPU and CPU. Is too much PSU bad? The first rule of thumb is that it’s better to have more power than not enough. … There is no truth to the myth that a large wattage power supply will force too much power into your devices causing overheating and burnout. The power supply will only provide the needed wattage. How do I fix my PSU problem? Plug the PSU power cable into a wall socket or surge protector, and turn on the computer. Most power supply models have a light on back of the unit that glows when it’s powered on. If it doesn’t light, try a different power cable and a different socket to eliminate those items as the source of the problem. Does a power supply improve performance? Purchasing a larger power supply WILL NOT make the computer run faster, or make your graphics better, or make your processor stronger, or increase the amount or speed of your Ram, or increase your storage space or the rotational speed of the platters. … The stronger power supply is just enabling it to function. Is power supply important for gaming? If you like to keep your PC on all the time (like I do), or you spend long hours gaming, a more efficient PSU can save you money. … The more efficient a PSU is, the less heat it generates. That tends to mean that the component parts last longer, and it doesn’t need to use its cooling fan as much. Can a bad PSU slow down PC? A power supply will not affect your computer’s performance. So you won’t get more FPS from a better power supply, your computer won’t load stuff faster and process data faster. It just won’t happen. Hardware (like the CPU) either does what it is supposed to every clock, or does not. Can a bad PSU affect performance? A bad psu could contribute to heat or poor performance if it is no longer providing consistent power or if it is overheating. Would have to run some diagnostics to be able to tell if that is the case. The only way a PSU could affect gaming performance is if it’s either not providing enough wattage, or it’s failing. How do I know if my power supply is going bad? The AnswerPlug the power supply into the wall.Find the big 24-ish pin connector that connects to the motherboard.Connect the GREEN wire with the adjacent BLACK wire.The power supply’s fan should start up. If it doesn’t then it’s dead.If the fan starts up, then it could be the motherboard that’s dead. How do you reset a PSU? How to Do a ATX ResetShut down the computer and disconnect all external devices including the keyboard mouse.Unplug the power cord.Press the “Power” button and hold it for at least 15 seconds.Reconnect the power cord but do not reconnect the external devices yet.Turn on your computer and see if it boots normally.More items…
Rimini (Rim'i-nee), a walled city of Italy, stands on the Adriatic, 69 miles by rail SE. of Bologna. The cathedral, a beautiful Renaissance structure, dates from 1446-50; the church of St Giuliano is adorned with pictures by Veronese. The ancient castle of the Malatestas is now a prison. The little river on which the city stands is spanned by a five-arch white marble Roman bridge, 236 feet long. Beside one of the gates stands the triumphal arch, 46 feet high, erected in honour of Augustus. The spot where Caesar stood to address his soldiers after crossing the Rubicon (q.v.) is marked in one of the squares by a monumental pillar. The city manufactures silks and sail-cloth. Pop. 20,000; with suburbs, 43,200. One of these suburbs is much visited for sea-bathing. Originally an Umbrian, and then for several centuries an Etruscan city, Rimini (Ariminum) fell into the hands of the Romans in 286 b.c. After being battled for by Goths and Byzantines, and held by the latter, the Lombards, and the Franks, it became a shuttlecock between the emperor and the pope. At last Rimini put herself under the protection of the House of Mala-testa (1237), in whose family-history befell the killing of Francesca da Rimini and her lover by his brother (1285), and the story of Parisina, the subject of Byron's poem.
Cooling Laptop Table from Scrap Votes: 0 Views: 916 The idea is to create a useful object that is a Portable Laptop Table out of scrap with a little modification. The Table/Stand will be made from the plastic roll (which is in the shape of a pulley) which is used for carrying wires such as Ethernet cables. This roll is no more than 12" in height and the circular base is proportional. This roll is usually discarded after its job is done but this being made of either PVC or high-quality plastic causes environmental pollution so this innovative idea will also solve the problem(although at a small level)of the environment pollution. The roll is taken and following modification are made on it: 1. One side is covered with a thin silicone sheet and another side can be given a slight clean finish. 2. The hole in the center is bored to a larger diameter to fit a cooling fan. 3. Small holes are drilled on the pillar of the roll for exhaust of the air from cooling fan. 4. The fan will draw power from the laptop itself. 5. A semicircle from the flange of the roll is cut which is again joined back but this will now provide an angular adjustment for the laptop when needed. Voting is closed! • Name: Sahil Sihol • Type of entry: • Profession: • Sahil is inspired by: Simplicity and Nature. • Patent status:
Train the biggest muscle of your body ?Part-1 OK, let me ask you all a question, Which is the largest part of the body? Or the muscle in the body? I’m sure most of you have already guessed it where some of you are still confused to answer. Let us get to know what it is and why it’s called the largest muscle or the body part. As I don’t want to make you all boring talking about human anatomy, we will divide the whole body into two portions like the upper and the lower portions. The upper part of the body includes five major muscles such as the back ( lats ). Triceps, biceps, shoulders, and chest through the upper portion look big to build it you need to train these five muscles individually, which we will discuss in my upcoming articles. Now, let’s talk about the lower portion of the body that has again different parts such as quadriceps, hamstrings,  Glutes, and Calves though they look different parts they all combine to form the biggest muscle of the human body called as ” Legs ” ” Yes the biggest or the largest muscle of the human body is the lower body that primarily includes the legs. I’m sure most of you may not find it correct, but let’s clear it out. Before we going into the details let me also tell you that this muscle is the basement for your entire body structure as it carries the entire body weight on them and it’s absolutely important to train them enough, so that it will help you to maintain better position or posture. In my opinion, it is always good to know the facts and reality of anything you want to work upon, it could be a job or a workout it’s good to have the knowledge which will help you to achieve the desired goal A LEG which is the largest muscle of the body is made up of quadriceps (Thigh Muscle ) which means it is consists of  4 different muscles. Hence it’s called quadriceps i.e. rectus femoris, vastus medialis, vastus lateralis, and vastus intermedius. Out of all four muscles, only the rectus femoris crosses both the hip and knee joints. Followed by these  4 muscles we have one more muscle called glutes -The gluteal muscles are a group of three muscles that make up the buttocks: the gluteus maximus, gluteus medius, and gluteus minimus. Hamstring: Three muscles run down the back of your leg, from your thigh to your knee — the biceps femoris, semitendinosus, and semimembranosus — and help you bend your knee and extend your hip. As a group, they are known as the hamstring. Calf: The calf (plural calves) is the back portion of the lower leg in human anatomy. The muscles within the calf correspond to the posterior compartment of the leg. The two largest muscles within this compartment are known together as the calf muscle and attach to the heel via the Achilles tendon. This kind of complex structure of each muscle in the legs makes it the biggest muscle and if you want to live like a king even in your 2nd innings then it is mandatory to train your legs. Also if you want to train your upper body it is advised to train your legs first so that it will complement your upper body. ” Even the most beautiful legs ends somewhere “-Julian tuwim As you all agree that it’s very important to train your legs so that it can make you stand, walk, jog, cycle, etc. and as a matter of fact, legs become more fragile due to wear and tear and prone to age-related issues such as Keen and Joint pains, Arthritis and end up paying a huge amount for medicine, Instead let make them strong by following some of my self practiced, injury-free leg workouts which I will share you in my following article as part-2. Meanwhile, do comment and share your suggestions, and don’t forget to workout daily as it will keep you alive. For more details do visit my website www.dhagadpraveen.com 3 thoughts on “Train the biggest muscle of your body ?Part-1 Leave a Reply to Praveen Gandhi Cancel reply
(redirected from epochs) Also found in: Dictionary, Thesaurus, Medical. See also: Geologic Timescale (table)Geologic Timescale Era Period Epoch Approximate duration (millions of years) Approximate number of years ago (millions of years) Cenozoic Quaternary Holocene 10,000 years ago to the present   Pleistocene 2 . ..... Click the link for more information. unit of geologic time that is a subdivision of a period. The Pleistocene and Holocene epochs, for example, are divisions of the Quaternary period. Epoch is also used to describe a short length of geologic time during a special occurrence, such as the glacial epoch. See geologygeology, ..... Click the link for more information. ; Geologic TimescaleGeologic Timescale Era Period Epoch Approximate duration (millions of years) Approximate number of years ago (millions of years) Cenozoic Quaternary Holocene 10,000 years ago to the present   Pleistocene 2 . ..... Click the link for more information. An arbitrary fixed date or instant of time that is used as a reference datum, especially for stellar coordinates and orbital elements. For example, the coordinates right ascension and declination are continuously changing, primarily as a result of the precession of the equinoxes. Coordinates must therefore refer to a particular epoch, which can be the time of an observation, the beginning of the year in which a series of observations of an object was made, or the beginning of a half century. The standard epoch specifies the reference system to which coordinates are referred. Coordinates of star catalogs commonly referred to the mean equator and equinox of the beginning of a Besselian year. Since 1984 the Julian year has been used: the current standard epoch, designated J2000.0, is 2000 Jan. 1.5; it is exactly one Julian century removed from the standard epoch of 1900 Jan 0.5. Epochs for the beginning of a year now differ from the standard epoch by multiples of the Julian year. A standard epoch is usually retained for 50 years. Collins Dictionary of Astronomy © Market House Books Ltd, 2006 A particular instant for which certain data are valid; for example, star positions in an astronomical catalog, epoch 1950.0. A major subdivision of a period of geologic time. 1. Astronomy a precise date to which information, such as coordinates, relating to a celestial body is referred 2. Geology a unit of geological time within a period during which a series of rocks is formed 3. Physics the displacement of an oscillating or vibrating body at zero time Collins Discovery Encyclopedia, 1st edition © HarperCollins Publishers 2005 (operating system) (Probably from astronomical timekeeping) A term used originally in Unix documentation for the time and date corresponding to zero in an operating system's clock and timestamp values. Under most Unix versions the epoch is 1970-01-01 00:00:00 GMT; under VMS, it's 1858-11-17 00:00:00 (the base date of the US Naval Observatory's ephemerides); on a Macintosh, it's 1904-01-01 00:00:00. System time is measured in seconds or ticks past the epoch. Weird problems may ensue when the clock wraps around (see wrap around), which is not necessarily a rare event; on systems counting 10 ticks per second, a signed 32-bit count of ticks is good only for 0.1 * 2**31-1 seconds, or 6.8 years. The one-tick-per-second clock of Unix is good only until 2038-01-18, assuming at least some software continues to consider it signed and that word lengths don't increase by then. See also wall time. (Epoch) A version of GNU Emacs for the X Window System from NCSA. The starting date from which time is measured as a number of days or minutes or seconds, etc. In computer applications, epochs are used to maintain a time reference as a single number for ease of computation. Otherwise, depending on the granularity of time desired, every point in time would have to be stored with some of or all of the components of the time hierarchy, including year, month, day, hour, minute, second, millisecond, microsecond and nanosecond. Following are the various epochs in use. See also EPOC. System Epoch Measured in Unix/Linux Jan. 1, 1970 Seconds Java Jan. 1, 1970 Milliseconds Windows files Jan. 1, 1601 Ticks (100 ns) Windows dates Jan. 1, 0001 Ticks (100 ns) Mac Jan. 1, 2001 Seconds Earlier Mac Jan. 1, 1904 Seconds Excel Dec. 31, 1899 Days DB2 Dec. 31, 1899 Days Unununium Jan. 1, 2000 Microseconds No USB Drives in 1969 When this USB drive was formatted, the date was reset to the epoch. The 7:00pm tells us it was done on the East Coast, five hours behind the UTC time of January 1, 1970 (see above). This info comes from the Mac that the drive was plugged into. References in periodicals archive ? According to [3, 20], in P300 Speller BCI, a target EEG epoch is among the consecutive EEG epochs that are overlapped on one another so that nontarget EEG epochs could also contain P300 waveform just in a bit different time range, compared to target EEG epochs. If eventually approved by the International Commission on Stratigraphy--the gatekeepers of geologic time--and the Executive Committee of the International Union of Geological Sciences, the Anthropocene would cut short the Holocene Epoch, which has reigned since the end of the last glacial period around 11,700 years ago. A host of factors have apparently taken Earth into this new epoch. "The warming temperature, higher sea levels, ash from fossil fuels, plastic waste, a dramatic increase in erosion, the spread of animal species around the world and radioactive particles left around the world from nuclear bomb tests would all contribute to permanent changes in the Earth's rocks, the scientists said," (http://www.independent.co.uk/environment/anthropocene-epoch-new-planet-earth-man-made-what-is-it-a7215116.html) wrote the Independent. * discontinuity in height difference data ("jumps") --quasi constant change of height difference in subsequent epochs in relation to previous epochs. In the overall cohort, the rate was 27.7% in epoch 1 and 45.4% in epoch 4. The mean age of onset was 80 years in epoch 1, 82 in epoch 2, 84 in epoch 3, and 85 in epoch 4. Data collected in 5 s epochs were down sampled into 10, 20, 30, and 60 s sampling epochs to investigate the effect of sampling frequency. Please don't tell me that I'm wrong, and that every epoch sets the tempo in a way that is audible only to future generations. AS THE HUMAN IMPACT on Earth "cut to the very bone" of deep time, as some have claimed, effectively ending the Holocene Epoch and ushering in what should be called the Anthropocene? Note that, this pattern also contains two epochs, i.e., the epoch that the node reaches the interrupted point and the epoch that the node moves to a randomly chosen new destination. The Eemian Interglacial was the last interglacial epoch before the current one, the Holocene.
Every Friday, my daughter has show and tell and school where each student brings in something that starts with a particular letter. She always likes to bring something from her play kitchen and we often find ourselves completely stumped on what she should take that starts with that weeks letter.  I figured that I would put together a list of the foods that we’ve come up with. Hopefully this is helpful for you :) Below is a compiled list of 27 foods that start with the letter E, along with a short description of them. Have you tried them all? Is there anything missing from the list that I should add? Leave a comment with what I missed and I’ll be sure to give you credit in the blog post for coming up with it! 1. Éclair Eclairs are long pastries that are filled with cream and topped with chocolate icing. They differ slightly from cream puffs, which are round and coated with powdered sugar. These pastries are often served chilled and are a popular choice paired with tea or coffee. 2. Edam Cheese Edam cheese gets its name from the town of Edam in the Netherlands, where the cheese originated. This cheese is often sold in wheels containing the pale yellow cheese in a coat of red paraffin wax. Unlike other cheeses, it does not spoil. Instead, it hardens over time. 3. Edamame Edamame is a green pod with immature soybeans inside. It is often used in East Asian dishes, and must be cooked before eating. Raw soy is poisonous, but boiling or steaming the edamame makes it safe for human consumption. 4. Eel Eels are a long type of fish without fins. These sea creatures produce a meat that is soft yet tender, without a strong fishy aftertaste. While some feel that it is bland, it is a common ingredient in Korean dishes. mashed blck beans on a plate with a fried egg and veggies 5. Egg Eggs are a common ingredient in many dishes and are often eaten alone. The eggs commonly consumed around the world come from female chickens, who lay them. However, people around the world also eat duck eggs, quail eggs, and fish eggs (caviar). Eggs can be served boiled, fried, poached, and more. 6. Egg Custard Egg custard is a cream-based mixture that is typically firmer and thicker than traditional pudding. Instead of using cornstarch or flour to thicken the mixture, custard uses eggs to give it its firm texture. It typically has a sweet, creamy flavor that is derived from the eggs and sugar used to create it. 7. Egg Drop Soup Egg drop soup is a Chinese soup that combines beaten eggs in chicken broth. Additional ingredients include combinations of black or white peppers, finely chopped scallions, and tofu. When the eggs are added, they become light and wispy. 8. Egg Foo Young Egg foo young is a dish similar to an omelette. Variations of this dish exist in Chinese Indonesian, British Chinese, and Chinese American cuisine. It contains eggs and a combination of meat, bean sprouts, bamboo shoots, cabbage, spring onions, mushrooms, and water chestnuts. chicken noodle soup in a white bowl with crackers around it 9. Egg Noodles Egg noodles are a simple noodle made from flour and eggs. The mixed dough is rolled thin and cut into strips. Packaged egg noodles typically come in a spiral shape. These noodles can be used to make stroganoff and other soups. 10. Egg Roll Egg rolls are a deep-fried rolls served in American Chinese restaurants. These rolls are often filled with shredded cabbage, chopped pork, and other fillings. The filled rolls are then deep fried in oil until cooked. Spring rolls are a vegetarian alternative to the traditional pork egg roll. 11. Egg Salad Egg salad combines chopped eggs (either hard-boiled or scrambled), mustard, mayonnaise, and a mix of vegetable ingredients such as celery. Herbs and seasonings are mixed in to give this dish added flavor. When prepared, it can be served as a side or as a filling for wraps and sandwiches. 12. Eggnog Eggnog is a drink traditionally enjoyed in the winter season. It’s made from a mixture of beaten eggs, cream, and flavoring such as nutmeg and cinnamon. This drink can be served alone or as part of an alcoholic beverage. eggplant on a baking sheet pan 13. Eggplant Eggplant is a nightshade plant with an edible fruit. This purple and spongy fruit (which is technically a berry) is often used like a vegetable in cooking. It is typically cooked before it is eaten. This plant mixes well with peppers, tomatoes, potatoes, and spinach. 14. Eggplant Parmesan Eggplant parmesan is a classic Italian baked dish. This comfort food is a vegetarian alternative to the traditional chicken parmesan. Because eggplant has such a mild flavor, it takes on the flavors of the sauce and cheese used in the dish. It can be served with antipasto salad, grilled zucchini, and other Italian side dish options. 15. Eggs Benedict Eggs Benedict is a common American breakfast, first popularized in New York City. This dish uses two halves of an English muffin topped with Canadian bacon, a poached egg, and hollandaise sauce. According to tradition, this dish was named after Mr. and Mrs. LeGrand Benedict in the 1860s, who were regular customers at the Delmonico’s restaurant in New York City. 16.  Elderberry Elderberries come from a flowering plant in the honeysuckle family. These antioxidant-rich berries can reduce inflammation, protect the heart, and lessen cold and flu symptoms. They are not especially sweet and have a hint of tart flavor. 17. Elephant Ears Elephant ear pastries combine layers of puff pastry with cinnamon and sugar. These delicious and buttery pastries are a classic French pastry, often enjoyed at fairs and festivals. They can be made at home in the oven or air fryer. 18. Elk Elk is often used as a leaner alternative to beef. This tender meat tastes similar to beef, yet has a hint of sweetness to it. There is more protein and less cholesterol in elk than in beef, pork, or chicken. This makes it both a delicious and healthy alternative to standard meat choices. empanadas stacked up on a back tray with salsa in the corner 19. Empanada Empanadas are turnovers that combine pastry and filling before being baked or fried. Empanada variations exist in European, Latin American, and Philippine cuisine. They can be filled with either sweet or savory fillings, making them a versatile dish. 20. Eggos Eggos are frozen waffles that are heated up by popping them in a toaster to thaw and crisp up. They gained popularity in the 80s and remain a childhood favorite of many people. enchiladas in a large tray topped with sour cream and avocado 21. Enchiladas Enchiladas involve filling corn tortillas with fillings and covering them in a savory sauce. This Mexican dish can be filled with different meats, seafood, beans, cheese, potatoes, vegetables, or any combination of ingredients. The filled and topped enchiladas are typically baked before serving. 22. Endive Endive is a leafy vegetable, similar to other bitter-leafed vegetables. It is related to radicchio, puntarelle, and Belgian endive. This vegetable can be served raw or cooked. When raw, they contain a bitter taste that pairs well with other salad ingredients. When they are cooked, they gain a nutty sweetness. For health-conscious eaters, endive’s crunch offers a healthier alternative to chips. 23. English Muffins English muffins are small sourdough rolls. These rolls are traditionally sliced horizontally, toasted, and buttered. However, they can be topped with other ingredients to make Eggs Benedict and other breakfast foods. In fast food, they are a popular choice for breakfast sandwiches (such as the Egg McMuffin). 24. Escargot Escargot is a French dish made from cooked snails. This hors d’oeuvre is enjoyed by people in France, Germany, Italy, Portugal, and Spain, as well as at French restaurants in the United States and Canada. The snails are removed from their shells, cooked, and placed back in their shells for presentation. coffee beans being ground up in a coffee grinder 25. Espresso Espresso is a method of brewing coffee, where a small amount of almost boiling water is forced with pressure through finely-ground coffee beans. It can be made with different coffee beans to create hot or cold coffee beverages. Espresso can also be added to a chai tea latte, making it a “dirty chai.” 26. Extra Virgin Olive Oil Olive oil is a liquid oil obtained from olives, typically grown in the Mediterranean Basin. Whole olives are pressed and the oil is extracted. Extra virgin olive oil is made from pure, cold-pressed olives instead of combining cold-pressed and processed olive oils. It is used in cooking, for frying foods, and as part of dressings for salad. macaroni pasta salad in a large bowl 27. Elbow Macaroni This is a type of pasta that is traditionally used in macaroni and cheese as well as macaroni pasta salad. It’s small in size than many other pastas and is found at most American grocery stores.
Mothballs as Snake Deterrents: Debunking the Misconception Over the years, there has been a widely held belief that mothballs are the perfect solution to keep snakes at bay. Nonetheless, several studies have debunked this myth, concluding that mothballs are entirely ineffective at this task. In fact, mothballs are equally dangerous as the snakes, mainly because of their candy-like appearance and the fumes they produce. What are mothballs? Mothballs are tiny pellets that usually contain a compound known as naphthalene. While rare, some mothballs are made of paradichlorobenzene. These pellets are used to preserve clothes by repelling moths and preventing them from spoiling your garments. When exposed to air, both chemicals sublimate into vapor, producing the strong odor that characterizes mothballs. Of the two compounds used to produce mothballs, naphthalene has a higher toxicity level. Faizal Ramli/ As mentioned earlier, the fumes which mothballs create pose a potential health risk for human beings. Among the possible side effects are headaches, nausea, dizziness, and irritation of the eyes and lungs. If ingested, naphthalene mothballs can initiate the disintegration of red blood cells, rendering them incapable of transporting oxygenated blood through the body. This condition is known as hemolytic anemia and is often characterized by shortness of breath, fatigue, and painful or discolored urination. Can mothballs repel snakes? Despite the notion that mothballs can act as snake repellents, they are entirely ineffective. People usually believe that mothballs will have the same effect on snakes as they have on moths and other creatures. However, these individuals are often disappointed by the end results. First, the compounds that make mothballs are highly water-soluble. Therefore, when it rains or they come into contact with water, they dissolve and are washed away. This renders them unusable in wet conditions. Besides being soluble, these compounds are extremely poisonous, both to plants and animals. When a solution containing mothball chemicals touches grass, flowers, or other herbaceous plants, they start to wither almost immediately. Furthermore, their solubility means that the harmful substances are easily absorbed by the soil and can, therefore, contaminate it for prolonged periods of time. Effective mothball alternatives While snakes are not entirely harmful, most people do not like encountering these reptiles. As a result, it is easy to be tricked by products that claim to be proven snake repellents. Most of these fake repellents are substances with pungent odors that trick those shoppers who think that strong scents will keep snakes away, only to later find out that such methods are ineffective. Since the human olfactory system is different from that of a reptile, their smell perception is completely different, hence the futility. Before attempting to chase a snake away, it is important to ascertain whether the reptile is poisonous or not. As noted earlier, some species are useful at keeping pests and rodents away. However, if the presence of snakes makes you feel uncomfortable, there are surefire ways of dealing with this menace. The following are some ways in which you can permanently repel any snakes in your vicinity. Maintain a tidy yard Generally, snakes prefer living in bushes, holes, and other stuffy places. By maintaining a tidy yard, you will deprive them of shelter and breeding locations. Therefore, this is perhaps the most effective way of curbing an influx of snakes. Some of the things you can do to tidy up your yard include: • Weeding, pruning bushes, and removing any debris that may harbor snakes. • Regularly inspecting your surroundings to eliminate any rodents which might attract snakes. • Sealing any cracks to prevent snakes from entering buildings. • Ensuring that wood is stored on an elevated plank or stand. • Keeping compost and other household waste in an enclosure. compost bin Get rid of pests and rodents Naturally, snakes feed on rodents and other household pests such as rats, lizards, geckos, and so on. Since food is as vital as shelter, the elimination of such creatures will significantly contribute to discouraging snakes from entering your property. The first step to eliminating rodents is cleaning your surroundings, as explained above. In addition, it is a good idea to invest in a mouse repellent. Once the repellent is deployed and the rodents stop being readily available, any snakes will be forced to search for food elsewhere. Use a natural repellent It is important to note that the use of snake repellents is only effective after the implementation of the two steps mentioned above. Otherwise, the repellent will be rendered ineffective. There are several proven recipes for natural repellents, but, as they are readily available ingredients, a mixture of cinnamon and clove oil comes highly recommended. For those individuals who prefer a hands-on approach, there are many videos on YouTube with in-depth guides to the process. On the other hand, those who want a quick remedy can also purchase a repellent from their favorite stores. In comparison with mothballs, natural repellents have the upper hand since they do not have any potential health risks and do not cause harm to the environment. Moreover, they make use of readily available materials and are thus significantly cheaper. Install wire mesh fencing Another effective way of keeping snakes away is by restricting their access to your yard. Installing a wire mesh wire fence that is buried a few feet into the ground is an effective means of achieving this since snakes cannot climb over tall barriers. And the holes in the mesh should be small enough to bar entry to even the smallest of snakes. So, can mothballs deter snakes? Well, after evaluating multiple real-life cases, the use of mothballs to deter snakes has been proven ineffective. This myth is probably being shared by coaxing salespeople who want to sell their products to uninformed customers. Often, it is better to simply leave snakes alone. After all, most of the species we encounter regularly are not harmful to humans. Such snakes are essential in balancing the ecosystem and to keep rodents away. However, if you have any doubts about if a snake is venomous, it is imperative to consult the internet or your local animal control office for clarification. Alternatively, if you find snakes irritating, the best method to get rid of them is by following the steps outlined above. Not only are they effective, but they are also easy to implement. Herb Pilgrim Thank you for the informative article. I believe tho that you made a ‘typo’ conveying the opposite intended message near the end.. thanks again! Thanks for the heads up! There was a typo indeed and it is now fixed. Glad you found the article helpful! Griffen Tervaldi Mothballs when deployed in a gallon jug half filled with water when placed at different areas around houses sheds or buildings will repell all types of snales and even rodents spiders and other such possibly dangerous creatures. Proof my family has been utilizing this tactic for a very long time. A similar trick can be used to rid your house of ants only add pure sugar instead of mothballs. Heres why mothballs in water works. The animals smell the dissolved mothballs and it helps deter them. However its like all things its not 100 percent unless you do the work to keep your yard clean. Its not a cure-all. Also nothing works foever. They last 3 to 6 months before you must replace. Snakes are seasonal in most places. But rats and mice arent to keen on the mothball smell either. (by the way you use 10 to 25 mothballs or more no less) Kelly S Williams Thank you so much for your help. I have been noticing a few more snakes this year than normally, although they may be harmless to humans, I don’t like them, and they give me the creeps.i have a very big yard and I have to walk a pretty good way to get to my car or check the mail . I’m going to give it a try . Submit a comment Your email address will not be published*
Waste Statistics of Australia (2018-2019) These information was released by the Australian government on 6/11/2020. Statistical data for 2020-2021 has yet to be released but it would surely be skewed because of the COVID-19 pandemic that started last year. A lot of industries stopped their operations thereby leading to a reduction of waste. 2018-2019 data is therefore more accurate in representing the RUBBISH TRENDS in Australia in the past several years. Rubbish Removal Industry Statistics 1. 36,000 individuals worked in the garbage collection, treatment and rubbish removal industry. This is an increase by 5,000 persons comparing to years 2016-2017. 2. Total income of workers in the waste services industry was $3,161 million. 3. The waste services industry contributed $4,866 million to the economy. 4. Australian households contributed 12.4 million tonnes or 16.3% to the total waste produced. 5. Plastic waste produced amounted to 2.5 million tonnes and out of this, only 9% (227,000 tonnes) was recycled while a humungous 2.1 million tonnes (84%) ended up in landfills. 6. A total of 15.3 million tonnes of organic waste was generated from 2018-2019. Nearly half of this, or 45%, was sent to landfill and only 42% was recycled. 7. The biggest source of organic waste came from households because they produced 6.4 million tonnes or 42% of the 15.3 million tonnes total. 10. Australians produced 8 million tonnes of hazardous waste from 2018-2019, comprising 11% of total waste. 11. 8 million tonnes of hazardous waste represents a 2% increase from just comprising 9% of total waste in 2016-2017. 12. Building materials comprised 48% of the total waste that was set for recycling. This amounted to 18.5 million tonnes. 13. Metals represented 59% of all waste that was exported. This is equal to 18.5 million tonnes. 14. Six percent of the total waste produced by Australians (4.4 million tonnes) was exported to other countries. 15. The total expenses for waste collection, treatment, and diposal was estimated to have reached $ 16.9 million. 16. There has been a 22% increase of construction waste compared to 2016-2017. 17. Coal-fired power stations produced 10.5 million tonnes of ash waste. This huge numer represents 84% of all ash waste produced in Australia. 18. Households produced 1.2 million tonnes or 72% of all glass waste. 19. Households generated almost 90% of all textile waste (247,000 tonnes). 20. Households are the source of about 40% of electronic waste such as appliances or gadgets. Half of the e-waste was able to be recycled. 21. Regarding where the waste in rubbish bins are directed, it’s quite basic — in many occurrences, it goes straight into landfill. An enormous part of that — about 6.7 million tons — is natural waste like food and garden rubbish, which makes methane-rich ozone depleting substances as it decays. 22. Just around 2% of our waste is changed over to energy, a much lower rate than some European nations. 23. It’s assessed around 130,000 tons of Australian plastic winds up in streams and seas every year. The three principle ways it winds up there, as per WWF, are littering, items like moist disposable clothes being flushed and plastic taking off from landfill handling. 24. By and large, Australians utilize 130 kg of plastic for every individual every year. Just 9% of that is reused. Really startling still, as much as 130,000 tons of plastic will discover its way into our streams and into the sea. 25. In Australia alone, more than 5 million tons of food winds up in landfill consistently. That is sufficient to fill 9,000 Olympic pools, or it is generally 140kg per individual, or 345kg per family unit. 26. The Australian government gauges we squander around $20 billion in food every year. For the regular family unit in New South Wales, this compares to about $1,036 each year. This is the month to month spending plan for the normal family unit. 27. Young adults between the ages of 18 and 24 and families with small kids are the top squanderers of food. 28. The families that have the higher possibility of squandering foods are the ones that have incomes greater than $100,000. 29. The hotel and dining businesses are likewise blameworthy of creating a colossal measure of food squander. Around 5% of all food that is cooked in the restaurant industry is thrown in bins because they get spoiled. A mind blowing 65% of all hotel food is wasted during the preparation phase. 30. The grocery industry is additionally a huge source of food squander. Between 20-40% of crops are rejected by supermarkets because for them, these do not look pretty. 31. Rubbish from wasted food is answerable for around 8% of worldwide ozone depleting gases. This is because decaying foods that get stocked in landfills produce methane. 32. At the point when we toss out food, we are additionally squandering the water, fuel and other limited assets it took to get the produce from the farmland to your house. 33. If we don’t roll out any improvements soon, food squander is set to increment by 33% in the following decade. 34. To place in context how dire the worldwide issue of food waste is, global hunger can possibly be addressed with $US30 billion. Meanwhile, a singular country, by itself, can waste more than thrice that amount – $US100 billion in just one year! 35. The amount of water used in a 1.5 hour long shower is the same amount required to make just one burger. 36. Twenty billion dollars are stolen from the economy each year due to food waste. 37. A single person wastes approximately 300kg of food every year. 38. Greater than 5% of greenhouse gases produced in Australia is generated by methane from wasted food. 39. Food-based rubbish contributes to 8% of global release of greenhouse gases. Combining all food rubbish in the world, this would come in at 3rd position after USA and China, for releasing staggering amounts of greenhouse gases into the atmosphere. 40. In 2016-17 Australia generated around 6.3 million tons of dangerous waste, and this is expanding at a pace of roughly 9% per year.  41. Australian families annually discard a staggering amount of 2.5 million tonnes of food – that compares to almost 300 kilograms wasted by each individual! 42. In Australia, 7.3 million tonnes of food is lost or squandered every year – that’s enough to fill 13,000 Olympic sized swimming pools. Just to give you an idea, an olympic sized pool measures 50 metres long, 25 metres wide, and a minimum of 2 metres deep. 43. As much as 25% of grown vegetables do not reach the dining table because even at the farm level, they already get rejected. Supermarkets do not purchase vegetables that have unaesthetic characteristics even if they contain the same amount of nutrients. 44. Potatoes and bananas are the most discarded crops. In Australia, around 37,000 tons of bananas are disposed of plantations each year. 45. 1,460 gigalitres of water is utilized yearly to develop Australian produce that is tossed out anyway. To grasp the immensity of this issue, consider that 1460 gigalitres is equal to 1,460,000 megalitres. In turn, 1 megalitre is equal to 1 million litres! 46. For an orange tree to bear one single fruit, fifty litres of water have to be used. 47. In Australia, squandered food is thought to lead to greater than $20 billion of economic loss every year. 48. Australian farmers bear the brunt of $2.84 billion loss of income due to wasted food. 49. 33% of all food delivered for human utilization (1.3 billion tons) is being lost or squandered, while one of every nine individuals (690 million) go hungry. 50. The FAO assesses that in 2019, 2 billion individuals all over the world didn’t get quality food. Consider that Australia’s total population is just 25.36 million so this means that there are 78 times more people eating poorly than there are Australians. 51. If all the food that was squandered on earth were to form a country, it would be the third-biggest producer of ozone harming substances, after the highly-industrialized countries of USA and China. This is how serious food wastage is. 52. Of all the world’s land that is used to produce food, 30% of this generates food that is simply wasted. 53. Every year, nearly half (45%) of the earth’s fruits and vegetables are wasted. 54. In industrialized nations like Australia, over 40% of food wastage occurs at retail and shopper levels. 55. Total food sources can feed every person in the world but every night, 8.9% of the world’s population or 690 million people go to bed hungry. 56. According to the Food Sustainability Index 2017, Australia has the highest food waste generation per capita at 102kg . Greece and China had the most minimal at just 44kg per individual. 57. Perilous waste incorporates items like engine oil, brake liquid, lamp oil, mineral turpentine, pesticides, herbicides, batteries, smaller fluorescent lights (CFLs), broiler cleaners and pool synthetic substances. A portion of these items can cause fire even at at moderately low temperatures, or respond with air, water or different substances, and detonate or produce poisonous fumes. 58. Perilous waste incorporates items like engine oil, lamp oil, insecticides, car batteries, and broiler cleaners. A portion of these items can cause fire even at at moderately low temperatures. 59. Australia has a blended record on waste and reusing. On one end we have increased our rate of recycling from 7% in 1996 to 58 percent in 2016/17. But our waste policies lack power when compared to Europe and are not potent enough to reach the national government’s targets (which are also weak targets). 60. In 1996, Australia put 21 million tonnes of waste into landfills. In 2019, we are landfilling greater than 21 million tonnes of rubbish. Read More Northern Beaches Rubbish Problems and COVID-19 a garbage truck unloading at a landfill site Sydney’s Alarming Waste Statistics Let me start by saying that Sydney is in a serious situation when it comes to managing waste. By 2030, the total number of Sydney residents will reach nearly 6 million and right now, the city is already generating waste at a rate that is 600% of its population increase. This staggering waste statistic of Sydney is one reason why New South Wales is the 2nd biggest waste producer worldwide. There are 3 primary landfill sites in Sydney: the one at Lucas Heights and Veolia are able to process organic waste while the one at Eastern Creek takes in non-biodegradable rubbish. With the speed by which Sydney’s waste production is increasing (in part due to China’s refusal to take Australia’s waste and Sydney’s construction boom), having just 3 major landfill facilities is not a good look for Sydney. And I’m saying this as a person whose living relies on the removal of rubbish from people’s properties. There’s just too much waste being produced by people in Sydney. It is true that the city has a number of recycling centres like the Kimbriki Resource Recovery Centre located in the Northern Beaches region but these are still not enough to accommodate the immensity of waste being generated. Adding more waste facilities is one option but due to factors such as legal requirements, the reality is that it takes a decade for a landfill to be able to process its 1st tonne of rubbish. Ironically, as a rubbish removalist relying on the production of waste for my living, I am in agreement that Sydney citizens have to cut down on their garbage. China has already banned the importation of our waste and even previous contractors like Malaysia are also refusing to take in our rubbish. So before Sydney begins to smell like garbage, there has to be a multi-sectoral cooperation from business owners, government, residents, and even rubbish removalists like me. Rubbish Removal in Northern Beaches Due to recent COVID-19 events, proper garbage disposal in Sydney has to be strongly  implemented by business owners and residents, particularly in Northern Beaches where I and my team mostly conduct our rubbish removal services. To recall, Northern Beaches underwent a 3-week lockdown from December 20 last year t0 January 10 this year. Initially, it was supposed to just be a 5-day lockdown but because of the continuous spread of COVID-19 cases in various suburbs, the restrictions endured for much longer. A lot of businesses were affected by this. Fourteen of the 17 pubs in Northern Beaches voluntarily closed down upon the start of the lockdown. COVID cases were traced to various business establishments including restaurants, spas, and recreation centres in Avalon; fitness gyms and cafes in Mona Vale; and restaurants in Newport. Now you might be wondering what is the direct relation of COVID-19 to rubbish. Consider these waste statistics from NSW Environment Protection Authority: Of all the litter generated in NSW in 2017-2018, food containers comprised 22.78% and beverage containers formed 54.6%. Domestic containers contributed only 3.6% and even industrial containers comprised just 2.7%. Food and drink containers are clearly the dominant type of litters in NSW and of course, these come from restaurants, pubs, and other establishments that cater to food and drinks, one way or another. Now, medical professionals say that the COVID-19 virus can be transmitted through bodily fluids so it’s easy to visualize how the COVID spread originated in Northern Beaches restaurants. COVID positive individuals possibly ate or drank in these establishments and their saliva particles must have collected in disposable plastic food containers and bottles. All people who came into contact with these containers would have been put at risk of infection. These people would include waiters and other employees of the restaurant, customers who used the dining table that the COVID positive individuals used, and rubbish removalists who collected the waste materials. Think about this – what if your pet cat or dog wandered near the waste bin of a restaurant and came into contact with used plastic containers that contain saliva particles of COVID-positive persons and then your pet came home and played with you? Not so good. Reducing Waste Production as a Way to Combat COVID-19 So here’s the situation right now. Australia is facing two gigantic issues: huge amounts of waste and the COVID-19 pandemic. The solution is not to ban people from eating at restaurants! This would have a cascading effect on a lot of businesses that rely on food as their living, including suppliers and the restaurant owners themselves. And, of course, many people would get “sick” from missing out on their juicy steak dish at the local diner! Even the New South Wales government was encouraging people to go out and eat at restaurants by giving away two $25 vouchers to residents aged 18 and above last February. This voucher scheme was a response to the call for support from small business owners and councillors of Northern Beaches. In turn, NSW government required business owners who expressed interest to participate in the voucher program to register their restaurants as COVID-19 safe. The Northern Beaches region is a treasure in Australia and it’s scary to think that all sorts of rubbish might end up in its beautiful waters if the rate of waste production is not abated. It is equally scary to think that this beautiful region might become a huge COVID 19 hotspot if plastic-made food and beverage containers are not properly disposed of and become the source of infections. I do believe that the reduction of plastic container waste would help in containing the spread of COVID-19. Glass is a durable and infinitely recyclable material. So even if a COVID-19 positive individual used glass cups and dishes, these can be quickly washed and sanitized – unlike with single-use soda cans, plastic bottles, plastic trays, and plastic plates that get immediately thrown in the bag without being cleaned, thereby becoming a potential source of COVID infection not only in one location but also to where these get transported. An added advantage of using glass cups over plastic bottles is that wine and other drinks taste so much better in glass containers than in plastic! See it for yourself, pour some wine in glass and plastic cups and compare the tastes. You will find that the wine in plastic will taste soury or acidic while the one in glass will be sweeter and more fragrant. This is because plastic has chemicals that affect the taste of drinks that come into contact with it. And just to drive the nail home, you really really should avoid using plastic bottles and straws because a study, conducted by the University of Newcastle, indicates that every week, people could be ingesting 2000 tiny pieces of plastic from materials used for eating. Apparently, those microplastics which get ingested equal the weight of a credit card! Yikes! Supporting Small Business Owners as a Way to Reduce Waste I’ll say it straight: takeouts have to be discouraged because the culture of fast food has bred the extensive use of plastic cups for drinks and paper plates and wraps for food. Some people might argue that fast food take out is just a way more efficient method of getting food but it is exactly this hyper-efficiency that is causing the rapid rise of Sydney’s waste production. One thing that the COVID pandemic has taught us is that we need to slow down and reflect on our consumption habits. Think about something as simple as plastic straws. You might think that even if you used plastic straws everyday for a year, it still wouldn’t impact the environment. But, according to Clean Up Australia, did you know that Australians use around 10 million straws everyday, or 3.5 billion a year?! Not so harmless after all, right? If you bought yourself a reusable bamboo or metal straw which could both be washed with dishwashing liquid, already you would be contributing to Mother Nature’s health. When you think about it, are we really worse off when we have to wait for our food to be cooked in restaurants but use that time to have some quality bonding with family and friends who are face-to-face with us at the table and whom we probably haven’t seen in a while? And the best part about eating at restaurants is that we get to be served with sumptuous food delivered from local farmers, fisher folk, and meat breeders. That is truly a hearty meal when you realize that eating a single plate has enabled a lot of small business owners to be supported. So then, should you still eat half-baked and greasy food from fast food or would you rather eat a restaurant meal which has fresh, super-tasty, and nutritious ingredients? The choice is easy, mate! The NSW government can hire singers and musicians to perform at restaurants. This will be a huge help for artists who have lost income due to the COVID pandemic, and also serve to enliven the spirits of Northern Beaches residents. The pandemic has admittedly been stressful so there’s no better feeling than to enjoy some really good restaurant food and listen to a relaxing musical performance. Social distancing can still be maintained from table to table and yet still provide a sense of belongingness or camaraderie. That despite the pandemic, you are not to be holed all alone in your house. You can still enjoy the company of other human beings. The situation with Australia’s waste production and the COVID pandemic are serious issues but if there is political will, business creativity, and citizen conscientiousness, we can rise up and move forward as a better nation. Read More Australia’s Waste Facts that Millenials Should Know Clothing Waste Statistics 1. Every 10 minutes in Australia, six thousand kilograms of garments are tossed out and go directly to landfill 2. Each hour, 36,000 kilograms of garments are tossed out. 3. It can take 2,700 litres of water to deliver the cotton required for just 1 shirt. 4. 3/4 of Australian grown-ups (75%) have discarded garments at some time in the previous year 5. three out of ten (30%) have discarded greater than 10 pieces of clothes in the previous year. 6. 24% of grown-ups have discarded  a clothing after wearing it for just a single time. 7. In 2016, it was recorded that one out of six (16%) adults have discarded at least three pieces of clothing that they’ve worn for just a single time. 8. Thirty-eight percent of millennials have bought 50% or more of their clothes in the past year. Bottles and Cans 1. Each year, Australians use 17 billion cans and bottles for soft drinks and water but not even half of these get recycled. 2. Every minute, 15000 bottles and cans are discarded by Australians. 3. Each day, Australians 21.6 million bottles and cans – more than enough to cover the distance across Australia! 4. It takes 4 centuries before plastic disintegrates in water. And even when it does, it still turns into small pieces that cause harm to the marine ecosystem 5. Glass is an endlessly recyclable material. 6. Only a little more than just half (56%) of glass that Australians use are recycled. 7. How long do you think it takes for a gigantic bag to get filled with bottles from the Yarra river? 15 days? 15 hours? Nope. 15 minutes! Plastic Waste at Sea 1. Australians produce 660,000 tonnes of plastic garbage each year. 2. 85% of delicate plastics from bags and packings winds up in landfill. 3. How long do you think it takes for 1 TONNE of plastic waste to be produced by all of Australia’s households? Several months? Several Weeks? Several Days? Nope. It only takes 60 SECONDS! 4. In just a day, Australians generate so much plastic waste that the amount can occupy a whole beach. 5. How much household plastic rubbish in Australia do you think gets recycled? The answer is only just 20%. Did you guess right? 6. Each week, people on earth could be digesting a total of 5g of tiny plastic materials. A credit card has the same weight. 7. Five to thirteen million tonnes of plastic end up in oceans worldwide, and are tragically digested by fish, birds, and other sea creatures. 8. By 2050, there will be more plastic than fish in the earth’s oceans. 9. Turtles and other organisms at sea think that the tons of plastic waste that end up in their environment are food. A lot of them sadly ingest these plastic rubbish which damage their internal organs and cause their death. 10. Each year in Australia, 118,000 tonnes of plastic drink bottles are purchased. This equals 1 BILLION pieces of plastic bottles. 11.  Single-use plastic plastic bags are produced worldwide at a very rapid rate of 9 million units per minute. Plastic Bottles 1. In recent years, 1 million plastic bottles have been purchased worldwide every 60 seconds. The number is expected to increase by 20% this 2021. 2. Each minute that passes, 1 million plastic drinking bottles are created around the world. So in just 1 minute 60 million plastic bottles are made! 3. 90% of plastic bottles are not recycled. 4. Tiny plastic fibers from the industrial processing of bottled water are the reason for biggest source of plastic ingestion among humans. 5. Tap water actually contains more essential minerals than bottled water, including calcium and magnesium which is important for bone growth and repair. Mobile Phones 1. There are more than 16 million mobile phones carried by Australians in their hands or bags. More than 23 million unused mobile phones are lying around in our homes. 2. On the average, five million new phones are purchased in Australia every year. 3. There are around 25 million unused mobile phones in Australia – this number is about the same as our total population! 4. Mobile phones contain useable metals like aluminum and gold so the 25 million phones in Australia that are just gathering dust inside drawers have to be sent to recycling centres. 5. Pound for pound, 1 tonne of mobile phones contains 63% more gold than 1 tonne of ore. Have your old, unused mobile phones recycled now! 6. If all the gold in the 25 million unused phones in Australia are extracted, we would have 750 kilograms of gold that don’t have to be mined. If silver were to be extracted from those phones, we would gain a whopping 7500 kilograms! These minerals can then be used in various industries. Read More What To Do When A Family Member Dies Losing a loved one is painful as it is, but with it comes the additional responsibility of managing the person’s legal details. The process is filled with stress and can take a minimum of 1 year to finish. Who do you call first? How do you register the deceased status of the person, plan for the funeral and process the death certificate? How do you check for the deceased person’s bills, insurance, and financial accounts? To help you be guided with the important things that you need to do with a family member’s death, below is a checklist for you to read. Read More Diseases Caused by Toxins from Rubbish Contaminated Waste: Asbestos Waste materials can contain toxins and chemicals that put your health at risk. With 30 years of experience in the rubbish removal industry, trust me when I say that my team has encountered all sorts of toxin-containing garbage. Asbestos is one such toxin that we are keen to help property owners remove and transport to the proper waste facility. Asbestos can be found in poor-quality shingles, pipes, and floor tiles and many people are not aware of this. Even in seemingly harmless children’s plastic toys and other plastic-based objects, asbestos can also be present. It is usually the cheap and poorly-manufactured plastic objects that contain this.   Prolonged exposure to asbestos can cause severe diseases including asbestosis. This condition develops through prolonged inhalation of asbestos dust which wounds the lungs and causes serious breathing problems.  The fibers of the asbestos mineral are fifty to two hundred times thinner than the human hair and so they can be easily inhaled and deeply settle in the human lungs.  The thing with asbestosis is that it manifests only about ten to twenty years after the exposure period so the person might not immediately take notice and get medical attention. By the time the condition is felt, the damage is irreversible.  Australia is actually a country that experienced one of the worst tragedies caused by asbestos.  The ghost town of Wittenoom was once a huge mining source for asbestos from the 1950s to the early 1960s. It was closed down in 1966 because 20,000 people who lived there developed asbestosis as well as mesothelioma (a rare form of cancer of the chest and stomach).  Last year 2020, According to an article by the Department of Mines, Industry Regulation and Safety, Australia would have sadly experienced as many as 45,000 deaths from asbestosis with a couple thousand cases linked to Wittenoom.    According to the Asbestos Safety and Eradication Agency,  it was actually banned for use in Australia in 2003 but a humongous 12.8 million tons of materials which contained asbestos had already been used for construction activities between 1920 and the year when it was banned.  Apparently, 90% of these materials were for cement building and cement water pipes and the majority of these structures still stand at present. Other materials include floor tiles, roofing, paints, insulation, and textiles Added by ASEA, asbestos waste greater than 4000 tons are generated by Australians on a daily level from all sorts of materials.  Other diseases caused by asbestos poisoning can include cancers of the ovary and larynx.    If you are not sure whether the materials you have in your residence are asbestos-free, then it is advisable to throw them away and replace them with ones that have undergone strict testing and regulations marked by an official government sticker.   Lead Contamination Batteries, such as those for cars, are a particular source of dangerous amounts of lead, as well as sulfuric acid and this is one reason why we offer free service in collecting them. Left unattended, lead-containing materials can: leak into the air inside your house; seep into your soil and damage your garden plants; or even penetrate your water pipes.  A 2019 published research by Macquarie University has revealed alarming lead contamination statistics in various parts of Sydney. Their Environmental Science staff had been conducting backyard soil test and household dust test for Sydney homeowners over several years and what they found was that there were 11 areas that had at least 20% of residences exceeding the safe level for lead set for  house gardens which is just 300mg per kilogram of soil. Leichhardt was found to have an average soil lead concentration of 531 milligrams per 1 kg of sample; 64% of its residents were above the safe level.  Sydney inner city had an average soil lead concentration of 703 milligrams per 1 kg of sample; 63% of its residents were above the safe level.  Marrickville-Sydenham-Petersham contained an average soil lead concentration of 481 milligrams per 1 kg of sample; 60% of its residents were above the safe level.  Strathfield-Burwood-Ashfield had kept an average soil lead concentration of 498 milligrams per 1 kg of sample; 59% of its residents were above the safe level.  Botany was found to have an average soil lead concentration of 194 milligrams per 1 kg of sample; 36% of its residents were above the safe level.  Easter Suburbs-North had kept an average soil lead concentration of 221 milligrams per 1 kg of sample; 31% of its residents were above the safe level.  Blue Mountains contained an average soil lead concentration of 287 milligrams per 1 kg of sample; 29% of its residents were above the safe level Canada Bay had an average soil lead concentration of 290 milligrams per 1 kg of sample; 26% of its residents were above the safe level. Kogarah-Rockdale dealt with an average soil lead concentration of 199 milligrams per 1 kg of sample; 22% of its residents were above the safe level.  Liverpool was found to have an average soil lead concentration of 220 milligrams per 1 kg of sample; 20% of its residents were above the safe level. North Sydney-Mosman had been keeping an average soil lead concentration of 202 milligrams per 1 kg of sample; 20% of its residents were above the safe level.  Now that’s a lot of areas in Sydney so think about this for a second.  Let’s take the case of Leichhardt which had 64% of its residences exceeding the safety level for lead. The researchers found an average of 531 milligrams of lead in just 1 kilogram of soil that they tested for each homeowner.  According to M3 Property, the average lot size in Sydney is 454 square meters. For every 5000 kilograms of soil in these Leichhardt house gardens, there could be around 2.655 kilograms or more amounts of lead spread out all over their garden’s topsoil and a few meters below it. Remember that we’re not even taking into account the full amount of soil fully underneath their garden and the other parts of a 454sq meter residence!  Where is all this lead in Sydney homes coming from?!  Lead can seep into the soil through natural events such as sea spray, eruptions of volcanoes, bushfires, and floods.  However, large-scale as well as household-level human activities are also  likely contributors to this lead phenomenon.  Australia is one of the biggest producers and exporters of lead. In the past, the air quality in big cities suffered from enormous lead levels which came from lead-containing petrol.  Certain residues are likely still present. Also, before the 1970s, a lot of Australian houses were applied with lead-containing paint so residues from those materials could have very well seeped into residential lots.  Currently, the biggest sources of lead secretions in Australia are those from mining and manufacture of metals so when natural occurrences like storms and floods occur, lead contamination of wide areas of land can happen.   Human factors including improper disposal of lead-containing car batteries, use of lead-containing garden pots, working with lead-containing old paint,  and improper storage of vehicle metal parts can also contaminate residential lots.  In case you use lead-based water pipes, please replace them for your own safety. Also, if you use plumbing products such as brass fittings that contain lead, it would be better to dispose of them and use safer, higher-quality options.     Do comment below on the comment section if you have experiences you want to share with regards to lead poisoning. Have you detected instances at your own residence? Effects of Lead on the human body Prolonged exposure to lead is a serious health risk. It can settle in your blood and tissues and cause damage to vital organs including the human brain and the liver.  What’s scary about lead is that it has a half-life of 30 years in the human bones – meaning half of its toxic potency will be felt within that period but after  that, the effects of it will continue for another 30 years! The long life of lead has dire consequences for pregnant women who become exposed to it. The mother’s blood enables the passage of lead through the placenta and this can lead to miscarriage, abnormally low birth weight, or stillbirth.   Infants who are born to lead-exposed mothers can sadly grow up with mental disability.  For children who were born normally but become exposed to lead, they are at higher risk compared to adults because of their habits of hand-to-mouth contact while playing with plastic toys or crawling on the floor.   As much as 60% of lead absorbed in the bodies of children immediately gets into their blood while only 10% are retained by adults.  Immediate exposure to high levels of lead lead to sudden fatigue, migraine, muscular ache, dizziness and vomiting, convulsions, and even coma.  On the other hand, a prolonged, accumulated exposure to low levels of lead could produce health problems, including: anemia, hypertension, eating disorders, infertility, learning impairments, and decrease in IQ. Mercury Contamination Mercury has usage in many applications and is harmless when sufficiently contained. However, when people get exposed to large amounts of it or when it gets improperly disposed of, it becomes a serious health hazard.  Mercury contamination is a serious global issue that pollutes large bodies of water – even those that are not naturally laden with it. Mercury is released through natural events such as volcanic eruptions or  sea processes but it is human activity that has caused the rapid release of this toxin to both the natural and human environment.   There are two types of mercury – inorganic and methylmercury. The problematic kind is methylmercury because it is severely poisonous to the nervous system of humans and animals. Among fish, 95% of the mercury contained in them is methylmercury and therefore this has serious implications for the animals and humans that regularly feed on them! Highly-developed countries including the USA and Australia release the highest amounts of mercury into the atmosphere, water, and soil, because of coal combustion. Australia actually still uses 22 coal-burning facilities, and several of these are really old and among the most highly-pollutive worldwide.  A new report from Greenpeace indicates that air pollution from these really old coal-burning stations causes the deaths of 800 people annually. Alarmingly, this pollution affects several hundred kilometers of areas and seeps into big cities.  Additionally, mercury contamination caused by coal-derived air pollution leads to hundreds of Australian babies living in cities who are born underweight each year and are at serious risk of developing heart diseases in their adulthood. The numbers point to 450 annually affected babies in Sydney, and 260 for Melbourne! Did you know that just 1 gram of mercury is enough to contaminate a 8000 square meter body of water? The thing with mercury is that even if it evaporates in the air, it can still enter the human body through the eyes, the nose, and the skin!  Household Waste that Contain Mercury Grandfather clocks – These aged clocks can contain more than two spoons of mercury in them. That is a lot of toxins that can cause a huge spill if the clock gets damaged! Just sell them to an antique collector who can religiously take care of it or hire a rubbish removal company to dispose of it. Old electronic appliances – If you have old televisions that were made before 1991, these might contain parts that have mercury. The monitors of old computers and Liquefied Crystal Display (LCD) screens also contain mercury. Light Bulbs –  If a fluorescent bulb gets broken, the mercury it contains leaks out and can stick to household furniture. In 1987, there was a recorded case of a baby who developed intense rashes and serious loss of weight after  getting poisoned by 2.4 meter tube bulbs that got broken in the playroom.  Appliances – Mercury could have been used in manufacturing your old washing machine, freezers, ovens, and water heaters, house heaters. If you have these lying around your house for years, better yet dispose of them.  Old Car Parts – If you have an old car wreck that was built before 2003, it could have mercury-containing parts in its hood, and windows. Add the fact that it’s just rusting and you’re better off doing away with it! Batteries – Small-sized disk batteries are a particular concern because they can get easily ingested by unassuming children, babies, and pets. When they accidentally ingest these, they can experience vomiting.   Barometers – Old barometers do not pose a threat as long as they do not break and spill the mercury. But don’t wait for an accident like that to happen. Dispose them and buy modern ones instead!  Jewelry – Liquid mercury can be encased in some jewelry. If you own old mercury-containing jewelry which you are not using, it’s better to hire a rubbish removal company which can properly dispose of them.  Thermometers – What if you accidentally drop and break your thermometer on your sink and the mercury seeps through your water pipes? Remember what we wrote earlier that just 1 gram of mercury is enough to contaminate a huge amount of water? Just throw your old thermometers and buy modern-day digital ones! Thermostats – Older models of thermostats contain mercury so to be safe, it’s better to replace them with an electric-based thermostat which is mercury-free.  Any pile of objects that has been left uncleaned outside your property- If you live in a territory where there are high emissions from coal or where your property gets into constant contact with seawater, it is highly advisable to dispose of objects or structures outside your house that have been left uncleaned for years – especially if get to regularly touch them. Remember that mercury can seep into the atmosphere and contaminate the surface of objects.   Mercury poisoning is not immediately detected because it can take several weeks or months before the symptoms develop in the human body. If you have been regularly exposed to materials that contain mercury, it is best to consult a doctor who will conduct urine tests and blood tests in order to accurately assess if you are a candidate for mercury poisoning. Diseases caused by prolonged exposure to Mercury According to World Health Organization, mercury has debilitating effects on the skin, brain, respiratory system, and the digestive organs and therefore it is included in WHO’s top 10 chemicals of major public health concern.   Minamata disease is a nervous system condition that results from repeated exposure to high levels of mercury.  It is characterized by visual impairment, hearing damage, muscular weakness, and in severe cases – coma.  Minamata disease was named after the city of Minamata in Japan where its official discovery occurred. A chemical factory irresponsibly dumped mercury in the sewage and contaminated sea creatures which were caught and eaten by the locals. Of the 2,265 official victims of the mercury poisoning, 1784 of them died.   A study in Finland  found that men who accumulated mercury in their bodies had higher risk of dying from cardiovascular diseases. Recent research demonstrated that mercury poisoning is connected to severe conditions like Parkinson’s disease and Alzheimer’s.  A study involving 129 Brazilian males and females older than 17 years found that mercury exposure can cause memory problems, attention disruptions, and negative effects to proper bodily movement. The Greenpeace study cited earlier found alarming statistics of 14000 asthma conditions among Australian kids between the ages of 5 to 19, which can all be traced to mercury-containing coal emissions from power stations. Alarmingly, 280 or 20% of these cases are caused by inter-state pollution which means that  280 children who were living in territories with no coal-fired power station still got affected by the emissions coming from these. Why Choose Jack’s as your rubbish removal company? We have gathered information for you about the health risks of various types of rubbish to the best of our ability. We hope that we have been able to provide you with assistance. If you are looking for a rubbish removal company to take out disease-causing trash from your property, we are ready at your service!  The safety of our clients’ health is our number one priority. This is why we do our rubbish removals in a thorough manner. Our expertise with rubbish removal spans both domestic and commercial waste, including: vegetation, household rubbish, garage and yard materials, hoarded materials, all the way up to builder’s heavy rubbish.  We have handled rubbish removal Sydney jobs from many different locations–from Sydney’s Northern Beaches, Sydney’s North Shore and the Eastern Suburbs, Western Suburbs and inner west, and the Sydney City area.We can definitely provide you with got junk removal solutions at any time convenient to you, seven days a week. Call us on 0404 385 312 to get a free no-obligation quote. You can also check out the list of our services on our website.   Read More Rubbish Removal & Deceased Estate Clearance Free Online Quote Fast & Easy Rubbish Removal & Deceased Estate Clearance Free Online Quote Fast & Easy Rubbish Removal & Deceased Estate Clearance Free Online Quote Fast & Easy
minig equiments supplier 1. Home 2. mobile-crusher 3. How Gyratory Crusher Works How Gyratory Crusher Works How does a primary gyratory crusher works,gyratory crushers and how It works. crusher is a machine designed to reduce large rocks into smaller rocks, gravel, sand or rock each crusher is designed to work with a certain maximum size of raw material, and often delivers its output to a gyratory crusher is similar in basic concept to a jaw. Discover More Send Enquiry • How Does A Primary Gyratory Crusher Works gyratory crushers and how It works. crusher is a machine designed to reduce large rocks into smaller rocks, gravel, sand or rock each crusher is designed to work with a certain maximum size of raw material, and often delivers its output to a gyratory crusher is similar in basic concept to a does gyratory crusher works. the gyratory crushing principle was the basis of several rudimentary designs, patented between 1860 and 1878, none how does a gyratory crusher work,gyratory crusher supplier in gyratory crusher. gyrating crusher broken cone of the cyclic movement of the cone cavity within the shell, squeeze the material, splitting and bending, rough chopped gyratory crusher an overview sciencedirect topics. gyratory crushers work on the same principle as cone crushers these have a gyratory motion driven by an eccentric wheel. these machines will not accept materials with a large particle size and therefore only jaw or impact crushers should be considered as primary crushers how a jaw crusher works and what it is used for. jaw crusher reduces large size rocks or ore by placing the rock into compression. fixed jaw, mounted in a alignment is the stationary breaking surface, while the movable jaw exerts force on the rock by forcing it against the stationary plate.gyratory crushers gyratory crusher is generally used as a primary crusher. the crusher is popular due to its high throughput capacity and the large sized opening. the crusher is well suited for handling direct feed from hauldump trucks. the gyratory crusher is mainly used in rock that is abrasive andor has high compressive strength. • The Way A Gyratory Crusher Works In Tanzania how it works: crushers, grinding mills and pulverizers table source: wikipedia cone crushers use a spinning cone that gyrates in the bowl in an eccentric motion to crush the rock between the cone surface, referred to as the mantle, and the crusher bowl liner.gyratory crushers are very similar to cone crushers, but have a steeper cone slope and a concave bowl surface.mar 25, 2021 flsmidth has been chosen to provide two gyratory crushers and three apron feeders to a copper and gold mine in the antofagasta region of northern chile. the order, which comes after two years of close, preparatory work with the customer, comprises two 2100 tsu gyratory crushers and three apron feeders of varying sizes.dec 17, 2020 the gyratory crushers are equipped with a hydraulic setting adjustment system, which makes it possible to regulate the gradation of the crushed material. secondary crushing for fine and optimized results. cone crushers resemble gyratory crushers from the technological standpoint, but unlike gyratory crushers, cone crushers are popular in how gyratory crusher works. the crushing chamber of the gyratory crusher is composed of a moving cone and a fixed cone. when the crusher works, the motor passes the power to the horizontal shaft and a pair of bevel gears through the large and small pulley. the eccentric sleeve is connected with the big bevel gear and the moving cone places in aug 15, 2012 cone crusher and gyratory crusher work on the same principle. both have the same operation. If cone crusher differs then it is only from crushing chamber. cone crusher has a less steep crushing chamber and more parallel zone between crushing zones.carrying out any work on the equipment or making any adjustments. note: this equipment is manufactured in accordance with the machinery directive 2006 of 01.01.2010. the customer should make sure that this equipment is in conformance with local and national legislation if • 2 Gyratory Crushers the gyratory crusher has been built in three types known respec- tively as the suspended-spindle, the supported-spindle and the fixed- spindle type. the second type, with the hydraulic piston as the sup work index determines the required horsepower. mechanical features general the majority of gyratory crushers that are currently the gyratory crusher can work continuously in a full cavity without a feeding device. It can directly feed materials to the gyratory crusher by multiple vehicles, so the production capacity is large the unit energy consumption is small, and the work is stable. the noise is small.gyratory crusher working To protect the safe operation of crusher, when the crusher working, how cone crusher works by ealgeproject views; crusher wear liners process machinery heres what you get when you work with columbia: extensive experience with how jaw crusher works pdf crusher south africa. how does ball bearing crusher work. how a gyratory crusher works iron ore crusher, chapter gyratory and cone crusher crusher works is an authorized dealer of world leading, quality equipment from many sources including sandvik, edge, bretec, dynapac and bandit industries serving alabama, georgia, mississippi, tennessee and the gulf coast areas. We sell, rent and service products including mobile crushers, screens, shredders, picking stations, grinders, compactors, hammers, material classifiers unlike other gyratory crushers, which require workers to get in underneath the crusher to perform maintenance tasks a high-risk operation the TS range allows service and maintenance to be carried out from above. the eccentric assembly, bushings and hydraulic piston are easily accessible and removed through the top of the crusher, hence • Jaw Crusher Working Principle 911 Metallurgist may 06, 2021 the jaw crusher is not so efficient a machine as the gyratory crusher described in the next paragraph, the chief reason for this being that its crushing action is confined to the forward stroke of the jaw only, whereas the gyratory crusher does useful work during the whole of its revolution. In addition, the jaw crusher cannot be choke-fed, as apr 20, 2019 gyratory crusher can work continuously, has high productivity and crushing ratio, working performance is very stable, light vibration. jaw crusher cannot work continuously, leading to lower productivity.gyratory crusher purpose of crushers crusher is a machine designed to reduce the size of run of mine large rocks to smaller rocks gravel sand, or rock dust this is essential for efficient transport of the ore via conveyors etc. crushing is the first of many stages that lead to separation of the ore from the waste material.gyratory crushers how it works how a gyratory crusher works gulin crusher solutions. gyratory and cone crushers work in pretty much mar 05, 2021 the gyratory crusher is a large crusher which makes use of the gyratory movement of the crushing cone in the inner cone cavity to extrude, split and bend the material for various kinds of rocks and stones. gyratory crusher is a typical coarse crushing equipment in a large mineral dressing plant. both gyratory crusher and jaw crusher can be used as coarse crushing machinery.may 22, 2019 crusher is a machine designed to reduce large rocks into smaller rocks, gravel, or rock dust. there are five types of crushers; jaw crusher, gyratory crusher, cone crusher, impact crusher and mineral sizers. gyratory crusher is consisting of a concave surface and a conical head; both surfaces are typically lined with manganese steel surfaces. • How It Works Gyratory Crusher Henan Mining Heavy gyratory crusher working animation. gyratory crusher work and principles rajcatererscoin aug 2016 the basic principle of how does a gyratory crusher work using an animation equipment crushing how a jaw crusher works and what it is used for jaw crusher is one of the main types of primary.mar 30, 2021 primary gyratory crushers are the initial driving force for the entire mineral processing circuit. but what if you want to get more production or higher reliability, or decrease your maintenance time and cost from your existing superior TM primary gyratory? Do you work at optimizing your process to get the gains you want, or will you need rows gyratory crusher includes a solid cone set on a revolving shaft and placed within a hollow feb 17, 2016 In gyratory crushers the crushing process comprises reduction by compression between two confining faces and a subsequent freeing movement during which the material settles by gravity until it is caught and subjected to further compression and again released. the particles are subjected to maximum breaking forces when they are on the side with the minimum explain how gyratory crusher works? explain why pressure of particles at the silos wall is less than that of liquids? what are the differences between jan 01, 2016 gyratory crushers can accept 810% moisture in operation, but the fine content should be preferably less than 10%. the crushing action in gyratory crushers is regarded as rings or helics of feed down through the crusher of which a single section may be regarded as similar to the jaw crusher. • Gyratory Crushers Citic Hic downtime. every component of the pxz primary gyratory crusher is manufactured within our own factory ensuring control over product design, quality, manufacture and assembly. all crushers are fully assembled in our works and test run prior to delivery resulting in how gyratory crusher works quartz crusher, quartz crushing how gyratory crusher works gyratory cone crusher is one of the main types of primary crushers in a mine or ore processing plant.the primary crusher plays a crucial role in the size reduction process. even small improvements in uptime or throughput have a significant impact on the productivity of the entire operation. high-quality primary gyratory crusher parts increase the crushing performance and the gyratory crusher TS is a high quality, modern design, durable gyratory crusher that was engineered from the ground up with an unwavering focus on performance, safety, maintenance and functionality, for the utmost reliability and efficiency in your projects.
Weekly Learning: the Artificial Intelligence Edition AI in Design AI in Design introduces some interesting tools and trends about how AI is used to help designers. Nothing quite new here, but the point is this: future designers are either designing AI systems, or working with AI systems to design other things. As a designer, there’s no way to avoid learning and understanding AI. Actionable AI Ethics Someone is writing a book about applying AI ethics in actual work. Let’s just hope the author actually finishes it. AI Research at Google Is Google’s AI research about to implode? looks at challenges in AI research in the case of Google. In case you’re curious: the author’s answer is yes. There are many challenges in AI research: The DeepMind research program had shown what deep neural networks could do, but it had also revealed what they couldn’t do. For example, although they could train their system to win at Atari games Space Invaders and Breakout, it couldn’t play games like Montezuma Revenge where rewards could only be collected after completing a series of actions (for example, climb down ladder, get down rope, get down another ladder, jump over skull and climb up a third ladder). There’s also a problem of “underspecification,” which means “many models explain the same data.” …underspecification presents significant challenges for the credibility of modern machine learning. It affects everything from tumour detection to self-driving cars, and (of course) language models. The author also finds some recent incidents at Google are troubling: What concerns me is that when Google’s own researchers start to produce novel ideas then the company perceives these as a threat. So much of a threat that they fire their most innovative researcher and shut down the groups that are doing truly novel work. The implication: If the leaders who claim to be representing the majority of ‘Googlers’ can’t accept even the mildest of critiques from co-workers, then it does not bode well for the company’s innovation. The risk is that the ‘assumption free’ neural network proponents will double down on their own mistakes. And the punch line: Maybe one day we will see the transition from Hinton (ways of representing complex data in a neural network) to Gebru (accountable representation of those data sets) in the same way as we see the transition from Newton to Einstein. And when we do, it won’t be Google that should take the credit. Computers and Narrative Why Computers Will Never Write Good Novels explains: Although these remarkable displays of computer cleverness all originate in the Aristotelian syllogisms that Boole equated with the human mind, it turns out that the logic of their thought is different from the logic that you and I typically use to think. The problem: …as natural as causal reasoning feels to us, computers can’t do it. And that defines the computers: That’s why computers cannot write literature: Literature is a wonderwork of imaginative weird and dynamic variety. But at the bottom of its strange and branching multiplicity is an engine of causal reasoning. The engine we call narrative. And unfortunately: None of this narrative think-work can be done by computers… The best that computers can do is spit out word soups. Those word soups are syllogistically equivalent to literature. But they’re narratively different. Good AI Vs. Bad AI Fight Fire with Fire: Using Good AI to Combat Bad AI talks about: Real-world cases and expert opinions about the present and future of audio deepfakes and AI-powered fraud in particular and how to use AI to build a strong defense against malicious AI. The problem: …audio deepfakes are extremely hard to catch red-handed. Victims rarely have any evidence as they don’t typically record inbound calls, and the technology detecting synthetic speech in real-time is still in its infancy. The solution: To distinguish between real and fake audio, the detector technology uses visual representations of spectrograms, which are also used to train speech synthesis models. While sounding almost identical to the unsuspecting ear, spectrograms of fake versus real audio differ. It’s a hard job. Elements of AI Elements of AI is a well-designed free online course. Architects of Intelligence Architects of Intelligence: The truth about AI from the people building it is a thought-provoking book you deserve. Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
Skip to main content The Rocky Road to the Top Why Talent Needs Trauma The increasingly well funded and high-tech world of talent development (TD) represents an important investment for most sports. Reflecting traditional concepts of challenge and focus, the vast majority of such systems expend a great deal of effort maximizing support to the young athletes and trying to counter the impact of naturally occurring life stressors. In this article, we suggest that much of this effort is misdirected; that, in fact, talented potential can often benefit from, or even need, a variety of challenges to facilitate eventual adult performance. Our argument is built on evidence that such challenges are more common in athletes who reach the top, together with a critical consideration of the modus operandi and impact of psychological/character-focused interventions such as mental toughness and resilience. In conclusion, we explore some implications for the design and conduct of optimum academies and TD environments. 1. 1. UK Sport. World class performance programme [online]. Available from URL: [Accessed 2012 May 13]. 2. 2. Seligman M. Building resilience. Harvard Bus Rev 2011 Apr; 89(4): 100–6. Google Scholar  3. 3. Dweck CS. Mindset: the new psychology of success. New York: Random House, 2006. Google Scholar  4. 4. Clough P, Earle K, Sewell D. Mental toughness: the concept and its measurement. In: Cockerill I, editor. Solutions in sport psychology. London: Thomson, 2002: 32–45. Google Scholar  5. 5. Jones G, Hanton S, Connaughton D. A framework of mental toughness in the world’s best performers. Sport Psychol 2007; 21: 243–64. Google Scholar  6. 6. MacNamara Á, Button A, Collins D. The role of psychological characteristics in facilitating the pathway to elite performance. Part 1: identifying mental skills and behaviours. Sport Psychol 2010; 24: 52–73. Google Scholar  7. 7. MacNamara Á, Button A, Collins D. The role of psychological characteristics in facilitating the pathway to elite performance. Part 2: examining environmental and stage related differences in skills and behaviours. Sport Psychol 2010; 24: 74–96. Google Scholar  8. 8. Gullich A, Emrich E. Evaluation of the support of young athletes in the elite sport system. Eur J Sport Soc 2006; 3: 85–108. Google Scholar  9. 9. Armstrong L. It’s not about the bike: my journey back to life. New York: Putnam, 2001. Google Scholar  10. 10. Cleary T, Zimmerman BJ. Self-regulation differences during athletic practice by experts, non-experts and novices. J Appl Sport Psychol 2001; 31: 461–6. Google Scholar  11. 11. Durand-Bush N, Salmela JH. The development of talent in sport. In: Singer RN, Hausenblas HA, Janelle CM, editors. Handbook of sport psychology. New York: Wiley, 2001: 269–89. Google Scholar  12. 12. Gould D, Greenleaf C, Chung Y, et al. A survey of U.S. Atlanta and Nagano Olympians: variables perceived to influence performance. Res Q Exerc Sport 2002; 73: 175–86. Article  PubMed  Google Scholar  13. 13. Ollis S, MacPherson A, Collins D. Expertise and talent development in rugby referees: an ethnographic enquiry. J Sports Sci 2006; 24(3): 309–22. Article  PubMed  Google Scholar  14. 14. Abbott A, Collins D. Eliminating the dichotomy between theory and practice in talent identification and development: considering the role of psychology. J Sports Sci 2004; 22: 395–408. Article  PubMed  Google Scholar  15. 15. Collins D. Talent development: the game between the ears. Invited keynote presentation. Science for Success Conference; 2011 Oct 11–13; Jyväskyla. 16. 16. Helsen WF, Hodges NJ, Van Winckel J, et al. The roles of talent, physical precocity and practice in the development of soccer expertise. J Sports Sci 2000; 18: 727–36. CAS  Article  PubMed  Google Scholar  17. 17. Van Yperen N. Why some make it and others do not: identifying psychological factors that predict career success in professional adult soccer. Sport Psychol 2009; 23: 317–29. Google Scholar  18. 18. Fogarty R, Perkins D, Barrell J. The mindful school: how to teach for transfer. Highett (VIC): Hawker Brownlow Education, 1992. Google Scholar  19. 19. Marini A, Genereux R. The challenge of teaching for transfer. In: McKeough A, editor. Teaching for transfer: fostering generalization in learning. Mahwah (NJ): Lawrence Erlbaum Associates, 1995: 1–19. Google Scholar  20. 20. Meichenbaum D. Cognitive behavioral modification: an integrative approach. New York: Plenum Press, 1977. Book  Google Scholar  21. 21. Meichenbaum D. Stress inoculation training for coping with stressors. Clin Psychol 1996; 49: 4–7. Google Scholar  22. 22. Rosenbaum M. Learned resourcefulness as a behavioral repertoire for the self-regulation of internal events: issues and speculations. In: Rosenbaum MCM, Franks CM, Jaffe J, editors. Perspectives in behavior therapy in the eighties. New York: Springer, 1983: 54–73. Google Scholar  23. 23. Rosenbaum M. Individual differences in self-control behaviors and tolerance of painful stimulation. J Abnorm Psychol 1980; 89:581–90. CAS  Article  PubMed  Google Scholar  24. 24. Rosenbaum M, Ben-Ari S. Cognitive and personality factors in the delay of immediate gratification of hemodialysis patients. J Pers Soc Psychol 1986; 51: 357–64. CAS  Article  PubMed  Google Scholar  25. 25. Carey MB, Carey KB, Carnrike CL, et al. Learned resourcefulness, drinking, and smoking in young adults. J Psychol, 1990; 124: 391–6. CAS  Article  PubMed  Google Scholar  26. 26. Rosenbaum M. A schedule for assessing self-control behaviors: preliminary findings. Behav Ther 1980; 11: 109–21. Article  Google Scholar  27. 27. Rosenbaum M, Rolnick A. Self-control behaviors and coping with seasickness. Cognit Ther Res 1983; 7: 93–8. Article  Google Scholar  28. 28. Collins DJ. (1990). Character building by sport and for sport, an outdated concept? AIESEP World Congress; 1990 Jul 20–25; London. 29. 29. Lovell GP, Collins D. Applied interventions for improving team effectiveness. In: Steinberg H, Annett J, editors. Workshop report on teamwork. Leicester: British Psychological Society, 1996: 57–65. 30. 30. Danish S, Fazio R, Nellen V, et al. Teaching life skills through sport: community-based programs to enhance adolescent development. In: van Raalte JL, Brewer BW, editors. Exploring sport and exercise psychology. Washington, DC: American Psychological Association, 2002: 269–88. 31. 31. Roth JL, Brooks-Gunn J. What exactly is a youth development program? Answers from research and practice. Appl Dev Sci 2003; 7: 94–111. Article  Google Scholar  32. 32. Duckworth AL, Peterson C, Matthews MD, et al. (2007). Grit: perseverance and passion for long-term goals. J Pers Soc Psychol 2007; 92 (6); 1087–101. Article  PubMed  Google Scholar  33. 33. Crust L. Mental toughness in sport: a review. Int J Sport Exerc Psychol 2007; 5: 270–90. Article  Google Scholar  34. 34. Crust L, Clough PJ. Relationship between mental toughness and physical endurance. Percept Motor Skills 2005; 100: 192–4. Article  PubMed  Google Scholar  35. 35. Article  Google Scholar  36. 36. Winfield LF. Developing resilience in urban youth. Oak Brook (IL): Urban Monograph Series, North Central Regional Educational Laboratory, 1994. 37. 37. Doll B, Lyon MA. Risk and resilience: Implications for the delivery of educational and mental health services in schools. School Psych Rev 1998; 27(3): 348–263. Google Scholar  38. 38. Judkins S, Reid B, Furlow L. Hardiness training among nurse managers: building a healthy workplace. J Contin Educ Nurs 2006; 37: 202–7. Article  PubMed  Google Scholar  39. 39. Maddi SR, Harvey RH, Resurrection R, et al. Hardiness as a performance enhancer in firefighters. Int J Fire Ser Man 2007; 17: 208–19. Google Scholar  40. 40. Maddi SR. Relevance of hardiness assessement and training to the military context. Mil Psychol 2007; 19(1): 61–70. Article  Google Scholar  41. 41. Orlick T, Partington J. Mental links to excellence. Sport Psychol 1988; 2: 105–30. Google Scholar  42. 42. Duckworth AL, Seligman MEP. Self-Discipline outdoes IQ in predicting academic performance of adolescents. Psychol Sci 2005; 16(12): 939–44. Article  PubMed  Google Scholar  43. 43. Tsukayama E, Toomey SL, Faith ME, et al. Self-control as a protective Factor against overweight status in the transition from childhood to adolescence. Arch Pediatr Adolesc Med 2010; 164(7): 631–5. PubMed Central  Article  PubMed  Google Scholar  44. 44. Duckworth AL, Tsukayama E, Geier AB. Self-controlled children stay leaner in the transition to adolescence. Appetite 2010; 54: 304–8. PubMed Central  Article  PubMed  Google Scholar  45. 45. Duckworth AL, Tsukayama E, May H. Establishing causality using longitudinal hierarchical linear modeling: an illustration predicting achievement from self-control. Soc Psychol Personal Sci 2010; 1(4): 311–7. PubMed Central  Article  PubMed  Google Scholar  46. 46. Deinstbier RA. Arousal and physiological toughness: implications for mental and physical health. Psychol Rev 1989; 96: 84–100. Article  Google Scholar  47. 47. Eubank M, Collins D, Lovell G, et al. Perceived anxiety influence and the temporal patterning of hormonal concentration. J Sports Sci 1996; 14(1): 26–7. Google Scholar  48. 48. Eubank M, Collins D, Smith NC. The influence of anxiety perception on processing bias. J Sport Exerc Psychol 2000; 22(4): 292–306. Google Scholar  49. 49. Nicholls AR, Holt NL, Polman RCJ, et al. Stressors, coping, and coping effectiveness among professional rugby union players. Sport Psychol 2006; 20: 314–29. Google Scholar  50. 50. MacNamara Á, Collins D. The role of psychological characteristics in managing the transition to university. Psychol Sport Exerc 2010; 11: 353–62. Article  Google Scholar  51. 51. Duckworth AL, Grant H, Loew B, et al. Self-regulation strategies improve self-discipline in adolescents: benefits of mental contrasting and implementation intention. Educ Psychol 2010; 31: 17–26. Article  Google Scholar  52. 52. Bath N. The Chelsea FC academy performance plan. London: Chelsea FC, 2011. Google Scholar  53. 53. Crust L, Clough PJ. Developing mental toughness: from research to practice. J Sport Psychol Action 2011; 2(1): 21–32. Article  Google Scholar  54. 54. Martindale RJJ, Collins D, Daubney J. A critical review of talent development and implications for sport. Quest 2005; 57: 353–75. Article  Google Scholar  55. 55. Breslau N, Chilcoat HD, Kessler RC, et al. Previous exposure to trauma and PTSD effects of subsequent trauma: results from the Detroit Area Survey of Trauma. Am J Psychiatry 1999; 156(6): 902–7. CAS  Article  PubMed  Google Scholar  56. 56. Breslau N, Anthony JC. Gender differences in the sensitivity to posttraumatic stress disorder: an epidemiological study of urban young adults. J Abnorm Psychol 2007; 116(3): 607–11. Article  PubMed  Google Scholar  57. 57. Seligman MEP. Learned helplessness. Annu Rev Med 1972; 23: 407–12. CAS  Article  PubMed  Google Scholar  58. 58. Maier SF, Seligman MEP. Learned helplessness: theory and evidence. J Exp Psychol Gen 1976; 105: 3–46. Article  Google Scholar  59. 59. Abramson LY, Garber J, Seligman MEP. Learned helplessness in humans: an attributional analysis. In: Garber J, Seligman MEP, editors. Human helplessness. New York: Academic Press, 1980: 3–35. Google Scholar  60. 60. Mineka S, Zinbarg R. A contemporary learning theory perspective on the etiology of anxiety disorders: it’s not what you thought it was. Am Psychol 2006; 61(1): 10–26. Article  PubMed  Google Scholar  61. 61. Collins D, Bailey RP, Ford P, et al. Three worlds: new directions in participant development in sport and physical activity. Sport Educ Soc 2011; 1–19. 62. 62. Baker J, Horton S, Robertson-Wilson J, et al. Nurturing sport expertise: factors influencing the development of elite athlete. J Sports Sci Med 2003; 2: 1–9. PubMed Central  PubMed  Google Scholar  63. 63. Collins D, Martindale RJJ, Button A, et al. Building a physically active and talent rich culture: an educationally sound approach. Eur Phys Educ Rev 2010; 16(1): 7–28. Article  Google Scholar  64. 64. Kamin S, Richards H, Collins D. Influences on the talent development process of non-classical musicians: psychological, social and environmental influences. Mus Educ Res 2007; 9(3): 449–68. Article  Google Scholar  Download references No sources of funding were used to assist in the preparation of this article. The authors have no conflicts of interest that are directly relevant to the content of this article. The authors gratefully acknowledge the contributions of several colleagues, particularly Angela Button and Russ Martindale, in the evolution of these ideas. Author information Corresponding author Correspondence to Dave Collins. Rights and permissions Reprints and Permissions About this article Cite this article Collins, D., MacNamara, Á. The Rocky Road to the Top. Sports Med 42, 907–914 (2012). Download citation • Performance Domain • Positive Youth Development • Young Athlete • Talent Development • Proactive Coping
Why Do Guinea Pigs Poop So Much Does the amount of poop your guinea pig produce in a day leave you wondering about its pooping habit? Does cleaning up your guinea pigs’ poop several times a day bother you? Why Do Guinea Pigs Poop So Much Well, you are not alone, as these are the common issues ringing in the mind of new guinea pig owners. Keep reading to find out more about the pooping habits of guinea pigs and what you can do to manage them. Is The Constant Pooping Of A Guinea Pig Normal? The answer is Yes! Your guinea pig is not any different from the others by pooping all day. They are known for pooping while they are sleeping, eating, or just breathing. Generally, there is no specific time or pattern for their pooping as the animals follow their urges when performing the action. Reasons Guinea Pigs Poop A Lot A healthy guinea pig is expected to poop between 100 – 150 times per day. However, the quantity of poop varies as it depends on the type of food consumed and how much. The amount of stool produced depends on the guinea pig’s diet, age, weight, and activity. Here are a few reasons your pig is pooping a lot: 1. Diet A poor diet leads to the production of less than average daily poop. In contrast, a robust diet results in more poop than usual. What goes in always comes out! The more your guinea pig eats, the more it is likely to poop. An example of a poor diet is the over-consumption of fruits. The improper diet could have drastic effects on a guinea pig’s such as • Less poop • Bloody poop • Dry poop • Infections • Dental problems Hay, a component of a robust diet, is known to cause the most poop. If you observe your pet consuming large quantities of hay all day long, get your vacuum ready to clean large amounts of poop all day. It is important to note that Guinea pigs, like some other sect of herbivores, have to digest food twice. When they eat the first time, the food completes a cycle in their digestive tract and is excreted as cecal pellets (poop 1). The guinea pig watches out for the cecal pellet and proceeds to eat it when they find one. The pellet may belong to them or any other guinea pig in the location; they are not choosy. Sometimes they eat the pellets directly from the anus of other pigs. Once consumed, the cecal pellet completes another cycle in the digestive tract and comes out as poop (poop 2). This entire process is known as coprophagia. Guinea pigs can spot the difference between poop 1 and poop 2, and they do not consume poop 2. Though gross, eating their poop is beneficial to guinea pigs. 2. Health Are you worried about your guinea pig’s health due to its constant pooping? Well, frequent pooping means your guinea pig is healthy. If your guinea pig does not poop at least once within 24 hours, you need to immediately take it to a veterinary doctor. Failure to poop could mean that the guinea pig has fecal impaction. This life-threatening disorder occurs in both humans and animals and results from prolonged constipation. Also, if your pig squeaks when pooping, it is not normal and is typically a sign of illness. When a guinea pig begins to feel pain when passing poop or peeing, it could be due to bladder stone or bladder pain from urinary tract infections. It is recommended to visit the veterinary doctor immediately as prolonged pain may become life-threatening. Though the regular clean-up of poop may be a burden, frequent pooping is absolutely necessary. 3. Weight In a roundabout way, this factor is also affected by the diet of the guinea pig. To maintain a healthy weight, the guinea pig needs to have a proper diet. If for some reason, your pig is getting a stable diet but is unable to maintain a nice weight, it would affect the rate of poop. It means that something is wrong with its digestion, and it would be best to visit the vet doctor. 4. Age And Activity Newborn pugs have very little movement and feed on their mother’s milk. They do not eat and move enough to poop 100 times daily. This is the same with older pigs that move and eat less due to their seasoned bones. Reasons Guinea Pigs Poop So Much Movement is a sort of exercise for guinea pigs, and it is essential to help digest their food faster. Without moving around, guinea pigs digest slowly and get fewer urges to eat. If your guinea pig is running around its cage and pooping everywhere, it is of the age to do so. Guinea Pig Poop As Fertilizers? Generally, feces from all sorts of animals are used as fertilizers, and those from guinea pigs are not any different. Suppose you have a mini garden and desire to only use natural fertilizers for your vegetables. In that case, you can dissolve your guinea pig droppings in water, then administer the mixture to the vegetables. Guinea Pigs Pooping In Their Food? This can happen for several reasons. Untrained guinea pigs poop everywhere, and their food bowl is not an exception. Also, the pig may poop in the food as a way to mark their territory. This can happen whether the pig is alone in its cage or not. Another reason is that guinea pigs are constantly excreting cecal matter and poop, so contaminating their raw food with excreta makes no difference. Now that you know why guinea pigs poop so much, does it make a difference in how you view them? Poop or not, they are still adorable creatures. Hopefully, this article’s information has helped you understand guinea pigs better and adequately instructed you on how to cater to their poop needs!
Normal fasting growth hormone levels,muscle supplements tesco,matrix protein online thailand - PDF 2016 admin | Best Abs Workout For Women | 30.05.2016 The endocrine system is made up of ductless glands called endocrine glands that secrete chemical messengers called hormones into the bloodstream or in the extracellular fluid. A hormone is a chemical substance made and secreted by one cell that travels through the circulatory system or the extracellular fluid to affect the activities of cells in another part of the body or another nearby cell. The nervous system modifies the stimulation of endocrine glands and their negative feedback mechanisms. These hormones consist of chains of amino acids that vary in size from 3 amino acids (TRH) to 191 amino acids (GH). Click here for an animation that will help you understand how hormones that bind to G protein-linked receptors on the surface of the cell activate second messenger systems. Thyroid hormones that go to the mitochondria increase the rate of ATP production in the cell. Click here for an animation that will help you understand how hormones that bind to intracellular receptors (activate second messengers) work. Ex: Preganglionic sympathetic nervous system (SNS) fibers stimulate the adrenal medulla to secrete catecholamines. This hormone signals the collecting ducts of the kidneys to reabsorb more water and constrict blood vessels, which leads to higher blood pressure and thus counters the blood pressure drop caused by dehydration. Stimulates the myoepithelial cells of the breasts to contract which releases milk from breasts when nursing. The releasing and inhibiting hormones made by the hypothalamus reach the anterior lobe of the pituitary gland DIRECTLY by a special set of blood vessels called the hypophyseal portal system. The hypothalamus makes antidiuretic hormone (ADH) and oxytocin in the cell bodies of neurons and then the hormones are transported down the axons which extend into the posterior pituitary gland. Click here for an animation on the relationship of the hypothalamus to the anterior and posterior pituitary glands and on the relationship of the hormones made in the hypothalamus (ADH, oxytocin, releasing hormones, and inhibiting hormones) to the anterior and posterior pituitary glands. Neurohypophysis – posterior lobe (neural tissue) receives, stores, and releases hormones (oxytocin and antidiuretic hormone) made in the hypothalamus and transported to the posterior pituitary via axons. IGF-I stimulates proliferation of chondrocytes (cartilage cells), resulting in bone growth. Travels to the adrenal gland (target cells) where it stimulates the release of corticosteroids (such as cortisol) in the adrenal cortex. Click here for an animation that will help you to understand how GnRH, FSH, and LH are involved in the female reproductive cycle. Travels to the mammary glands (target cells) and stimulates the development of mammary glands to produce milk. Click here for an animation that describes how the hypothalamus releases antidiuretic hormone (ADH or vasopressin) which then acts on other organs to have its effects. In males it stimulates muscle contractions in the prostate gland to release semen during sexual activity. Click here for an animation that provides an example of positive and negative feedback control of the reproductive hormones. Calcitonin decreases the concentration of calcium in the blood where most of it is stored in the bones; it stimulates osteoblast activity and inhibits osteoclast activity, resulting in new bone matrix formation. Click here for an animation that describes the structure of the thyroid gland, how thyroid hormones are made, the functions of calcitonin and thyroid hormones, and the effects of hypo- and hyperthyroidism. Click here for an animation that describes the structure of the parathyroid glands, the function of parathyroid hormones, and the effects of hypo- and hyperparathyroidism. Norepinpehrine is similar to epinephrine, but it is less effective in the conversion of glycogen to glucose. Up-regulation (receptors) occurs with insulin after 4 weeks of exercise to increase its sensitivity (diabetic importance). Reduced plasma volume leads to release of aldosterone which increases Na+ and H2O reabsorption by the kidneys and renal tubes. Antidiuretic Hormone (ADH) is released from the posterior pituitary when dehydration is sensed by osmoreceptors, and water is then reabsorbed by the kidneys. This material is based upon work supported by the Nursing, Allied Health and Other Health-related Educational Grant Program, a grant program funded with proceeds of the State’s Tobacco Lawsuit Settlement and administered by the Texas Higher Education Coordinating Board. As, CEO and Chief of Research and Development at VPX, I (Jack Owoc) have woven together seven years of research to create the most scientifically advanced and High Protein Supplement on the planet. Catabolism (muscle breakdown) begins 90 minutes after ingestion of Whey Protein and continues for many hours or until one hour after another meal is consumed. For a great tasting, Biolicious shake combine each scoop of ZERO IMPACT™ PROTEIN with 12-16 ounces of cold water (depending on personal preference for desired thickness). American Journal of Physiology - Endocrinology and Metabolism Published 1 November 2002 Vol. The importance of insulin for the in vivo effects of growth hormone (GH) on lipid and lipoprotein metabolism was investigated by examining the effects of GH treatment of hypophysectomized (Hx) female rats with and without concomitant insulin treatment. Female Sprague-Dawley rats (Mollegaard Breeding Center, Ejby, Denmark) were hypophysectomized with a temporal approach at 50 days of age and maintained under standardized conditions of temperature (24–26°C), humidity (50–60%), and with lights on between 0500 and 1900. Triglyceride and cholesterol concentrations in both serum and fast protein liquid chromatography (FPLC) fractions were determined by enzymatic colorimetric assays (Roche, Mannheim, Germany). Lipoprotein profiles were obtained by gel filtration using FPLC equipment (Pharmacia Upjohn) (14). Steroid hormones and thyroid hormones pass directly through the cell membrane of target cells. If they bind to receptors in the cytoplasm, the hormone-receptor complex then enters the nucleus. Micellar Casein produces a prolonged plateau of increased plasma amino acids; consequently, producing the greatest nitrogen retention and utilization. Hypophysectomy-induced changes of HDL, apolipoprotein (apo)E, LDL, and apoB levels were normalized by GH treatment but not affected by insulin treatment. GH also increases secretion (27,32) and plasma levels of insulin in humans and rats (31,32, 37, 44). The rats had free access to standard laboratory chow (rat and mouse standard diet, B&K Universal, Sollentuna, Sweden) and water. The intra-assay coefficient of variation (CV) was 4% for the triglyceride assay and 3% for the cholesterol assay. The binding of the hormone to the G protein-linked receptor activates a second messenger such as cAMP. While, egg is a powerful intermediate protein that fills the gap in between fast acting whey and slow released Micellar Casein resulting in a timed release dispersion of amino acids for prolonged lean muscle growth and reductions in body fat. The hepatic triglyceride secretion rate was lower in Hx rats than in normal rats and increased by GH treatment. Moreover, GH increases DNA synthesis and proliferation of ?-cells and insulin secretion in vitro (27), showing that GH enhances ?-cell function independently of its insulin-antagonistic action (34, 35,45). Serum apoB and apoE concentrations were determined by electroimmunoassays as previously described (44). The ZERO IMPACT™ dietary concepts are going to be the 21st Century's dominant school of thought regarding rapid fat loss and lean muscle accrual! The increased serum insulin levels and the insulin-antagonistic effect of GH may be of importance for several effects of GH in vivo, but few studies have addressed this question (31, 36). Serum glucose concentrations were measured by the glucose-6-phosphate dehydrogenase method (Merck, Darmstadt, Germany). After filtration through a 0.45-?m filter, the sample was loaded on a 25-ml Superose 6B column (Pharmacia Upjohn). The triglyceride content in the liver changed in parallel with the changes in triglyceride secretion rate, indicating that the effect of the hormones on triglyceride secretion was dependent on changed availability of triglycerides for VLDL assembly. Treatment of normal rats with the combination of insulin and GH results in an additive effect on body weight gain. Serum insulin concentration was determined by an RIA (human insulin RIA, Phedebas, Pharmacia Upjohn, Uppsala, Sweden) (31,44). GH and insulin independently increased editing of apoB mRNA, but the effects were not additive. However, GH treatment antagonizes the stimulatory effects of insulin on food intake and adipose tissue weight, indicating a complex interaction between GH and insulin (36).The interaction of insulin and GH in the regulation of lipid and lipoprotein metabolism is of special interest, because similar effects of GH and chronic hyperinsulinemia have been observed (3, 4, 25,42, 46, 47). Triglyceride and cholesterol concentrations were determined with enzymatic colorimetric assays, as described above. The expression of fatty-acid synthase (FAS), stearoyl-CoA desaturase-1 (SCD-1), and sterol regulatory element-binding protein-1c (SREBP-1c) was increased by GH treatment. Insulin and GH had no additive effects on these genes; instead, insulin blunted the effect of GH on SREBP-1c mRNA. Furthermore, triglyceride synthesis and secretion have been shown to increase in hepatocytes after GH treatment in vivo (7, 42) and in vitro (25). In contrast to the liver, adipose tissue expression of SREBP-1c, FAS, or SCD-1 mRNA was not influenced by GH. GH therapy of GH-deficient adults also increased VLDL-apoB secretion, an effect accompanied by increased serum insulin levels and insulin resistance, as indicated by increased hemoglobin A1c (3).Insulin treatment in vivo has been shown to either increase or decrease the VLDL triglyceride secretion (18, 46). In conclusion, the increased hepatic expression of lipogenic enzymes after GH treatment may be explained by increased expression of SREBP-1c. The different effects of insulin in vivo could be attributed to the nutritional and hormonal status of the subjects, including degree of insulin resistance (18, 23). Insulin does not mediate the effects of GH but inhibits the stimulatory effect of GH on hepatic SREBP-1c expression and triglyceride secretion rate. In one of the experiments, the rats were killed between 0900 and 1100 by decapitation without prior fasting. Trunk blood was collected, and retroperitoneal as well as ovarian adipose tissues were blotted and weighed. Insulin has been shown to induce FAS mRNA (38) and SCD-1 mRNA expression (28) in diabetic rodents. The livers and adipose tissue depots were snap-frozen in liquid nitrogen and stored at ?70°C until analysis. The effect of insulin on theses enzymes has been attributed to increased gene expression of the transcription factor sterol regulatory element-binding protein (SREBP)-1 (13, 40) and has been reviewed (20, 39). In the other experiment, the rats were without food for 5 h before measurement of hepatic triglyceride secretion (see Serum Lipoprotein Profiles). SREBP-1 exists in two forms, SREBP-1a and SREBP-1c, which are transcribed from a single gene by the use of alternate promoters (20, 39). It has been demonstrated that hepatic SREBP-1 mRNA expression is increased in hyperinsulinemic insulin-resistant rodent models concomitant with increased hepatic lipogenesis (8, 41) and increased VLDL secretion (8).In the present study, we used hypophysectomized (Hx) female rats that had decreased insulin secretion (26) as a nondiabetogenic model to study the interplay of insulin and GH on lipid and lipoprotein metabolism. Moreover, we wanted to investigate whether the GH effects on lipogenic enzymes could be mediated by increased SREBP-1 gene expression. Supplements online us jobs Fat burning ultramarathon zugspitz Testosterone level of 2200 Pre workout supplement insanity Comments » 1. Azam — 30.05.2016 at 13:27:56 Exhibits a insecurity in its own capability to recuperate. 2. SAXTA_BABA — 30.05.2016 at 10:15:35 Without compromising muscle groups were losing away?in case. 3. Azer86 — 30.05.2016 at 21:46:31 Routine using one of the various normal fasting growth hormone levels kinds of neck exercise equipment problem with carbs with a periodic reefed. 4. mamedos — 30.05.2016 at 11:23:35 Can be responsible for the set for a few of the strikes some gentle stimulants. 5. BOXER — 30.05.2016 at 18:12:59 Certain (free) adaptogenic herbs that lower cortisol and in addition individuals, cell copy, and improvement.
To install click the Add extension button. That's it. Kelly Slayton Congratulations on this excellent venture… what a great idea! Alexander Grigorievskiy Live Statistics English Articles Improved in 24 Hours Added in 24 Hours Show all languages From Wikipedia, the free encyclopedia Aleijadinho: Angel of the Passion, ca. 1799. Congonhas do Campo The creation of art in the geographic area now known as Brazil begins with the earliest records of its human habitation. The original inhabitants of the land, pre-Columbian Indigenous or Natives peoples, produced various forms of art; specific cultures like the Marajoara left sophisticated painted pottery. This area was colonized by Portugal in the 16th century and given the modern name of Brazil. Brazilian art is most commonly used as an umbrella term for art created in this region post Portuguese colonization. Pre-Columbian traditions The oldest known art in Brazil is the cave paintings in Serra da Capivara National Park in the state of Piauí,[1] dating back to c. 13,000 BC. More recent examples have been found in Minas Gerais and Goiás, showing geometric patterns and animal forms.[2] One of the most sophisticated kinds of Pre-Columbian artifact found in Brazil is the sophisticated Marajoara pottery (c. 800–1400 AD), from cultures flourishing on Marajó Island and around the region of Santarém, decorated with painting and complex human and animal reliefs. Statuettes and cult objects, such as the small carved-stone amulets called muiraquitãs, also belong to these cultures.[3] The Mina and Periperi cultures, from Maranhão and Bahia, produced interesting though simpler pottery and statuettes. In the beginning of the 21st century, the ancient Indian traditions of body painting, pottery, cult statuettes, and feather art are still being cultivated by the remaining Indian peoples. The first Western artists active in Brazil were Roman Catholic priests who came from Portugal to "civilize" the Indians. Jesuits assumed an important role in this process, with their many missionary establishments called "Reductions" teaching religion through art in the form of sacred plays, music, statuary, and painting. José de Anchieta was the first important playwright; Agostinho de Jesus and Agostinho da Piedade produced the first known sculptures; Belchior Paulo, João Felipe Bettendorff, Ricardo do Pilar, and a few others did the first paintings; while Francisco de Vaccas and Pedro da Fonseca started organizing the musical life of the infant colony. Basílio da Gama and Gregório de Mattos were the first secular poets. All of them worked under the influence of the Baroque, the dominant style in Brazil until the early 19th century.[4][5] Through the 17th and 18th centuries Baroque art flourished with increasing richness and craftsmanship, mainly in Bahia and Pernambuco along the coast and in some inland regions, reaching the highest levels of originality in Minas Gerais, where a gold rush nurtured a rich and cultured local society. In Minas lived the greatest artists of Brazilian Baroque: painter Manuel da Costa Ataíde and sculptor-architect Aleijadinho. Minas was also the birthplace of a proto-Neoclassical school of music and literature, with composers Lobo de Mesquita and Francisco Gomes da Rocha, and poets Tomás Antônio Gonzaga and Cláudio Manuel da Costa.[5][6] 19th century: Neoclassicism, Romanticism, Realism One single event in the 19th century sowed the seeds for a complete renewal in Brazilian visual arts: the arrival of the French Artistic Mission in 1816, which strongly reinforced the Neoclassical style, previously seen in Brazil only in timid attempts. Joachim Lebreton, its leader, proposed the creation of an Academy of Fine Arts, later restructured as the Imperial Academy of Fine Arts. The Academy was the most important center for the visual arts through nearly the whole of the 19th century. It imposed a new concept of artistic education and was the basis for a revolution in Brazilian painting, sculpture, architecture, graphic arts, and crafts.[7] A few decades later, under the personal patronage of Emperor Pedro II, who was engaged in an ambitious national project of modernization, the Academy reached its golden age, fostering the emergence of the first generation of Romantic painters. Victor Meirelles and Pedro Américo, among others, produced lasting visual symbols of national identity. It must be said that in Brazil Romanticism in painting took a peculiar shape, not showing the overwhelming dramaticism, fantasy, violence, or interest in death and the bizarre commonly seen in the European version, and because of its academic and palatial nature all excesses were eschewed.[8][9][10] Meanwhile, literature too evolved towards a romantic-nationalist school with the works of Casimiro de Abreu and Manuel Antônio de Almeida. Around 1850, a transition began, centered upon Álvares de Azevedo, who was influenced by the poetry of Lord Byron. This second generation of Romantics was obsessed with morbidness and death, and soon after, social commentary could be found in literature, both features not seen in the visual arts. Antônio Castro Alves wrote of the horrors of slavery, and the persecuted Indians were rescued through art by poets and novelists like Antônio Gonçalves Dias and José de Alencar. These trends combined in one of the most important accomplishments of the Romantic era in Brazil: the establishment of a Brazilian national identity based on Indian ancestry and the rich natural environment of the country.[11] In music, the 19th century produced only two composers of outstanding talent: neoclassical sacred composer José Maurício Nunes Garcia, for a while music director to the court, and later, Romantic operist Carlos Gomes, the first Brazilian musician to win international acclaim.[12] In the late 19th century, Brazilian art became acquainted with Realism. Descriptions of nature and of the people of Brazil's varied regions as well as psychological romances proliferated with João Simões Lopes Neto, Aluísio Azevedo, Euclides da Cunha, and, above all, Machado de Assis, while Almeida Junior, Pedro Weingärtner, Oscar Pereira da Silva, and other Realist painters depicted folk types and the distinctive colors and light of Brazilian landscape. 20th century: Modern Art Oscar Niemeyer: Cathedral of Brasília. The statues are works by Alfredo Ceschiatti The beginning of the 20th century saw a struggle between old schools and modernist trends. The Week of Modern Art festival, held in São Paulo in 1922, was received with fiery criticism by conservative sectors of the society, but it was a landmark in the history of Brazilian art. It included plastic arts exhibitions, lectures, concerts, and the reading of poems. Due to the radicalism (for the times) of some of their poems and music, the artists were vigorously booed and pelted by the audience, and the press and art critics in general were strong in their condemnation. However, those artists are now seen as the founders of Modern art in Brazil. Modernist literature and theory of art were represented by Oswald de Andrade, Sérgio Milliet, Menotti del Picchia, and Mário de Andrade, whose revolutionary novel Macunaíma (1928) is one of the founding texts of Brazilian Modernism. Painting was represented by Anita Malfatti, Tarsila do Amaral, Emiliano Di Cavalcanti, Lasar Segall, Vicente do Rego Monteiro; sculpture by Victor Brecheret; and music by Heitor Villa-Lobos, the leader of a new musical nationalism, among many others.[13] The Week not only introduced to a wider public modern, experimental tendencies derived from European Expressionism, Cubism, and Surrealism, but also wanted to make use of national folklore as a basis for an art more relevant to the Brazilian reality, with an enhanced social awareness. This "cannibalization" of European movements and transformation into genuine Brazilian expression is the motto between the Anthropophagic Manifesto, published by Oswald de Andrade in 1928, that draws parallels between art history and the cannibal rituals of the Tupi people. However, the radicalism of those first Modernists couldn't last for long in a society used to traditional fashions, and the original core members had separated by 1929, pursuing individual paths. What Brazilian art then became was a mix of some important achievements of the Moderns, meaning freedom from the strict academic agenda, with more conventional traits, giving birth in the following generation to a moderate Modernism, best exemplified by painter Cândido Portinari, who was something like the official painter of the Brazilian government in mid-century.[14] Oscar Niemeyer: Copan Building Oscar Niemeyer: Copan Building Within the group of Brazilian artists, Chico Niedzielski's artwork has been spread all over the country. His work is known to be inspired by Sacred Geometry, breaking the tendency to focus on Brazilian themes and searching for a more universal and atemporal form of Brazilian art. The erosion of radical Modernism in the visual arts in the early 20th century was not reflected in Brazilian literature. Clarice Lispector wrote existentialist novels and developed a highly personal style, filled with stream-of-consciousness and epiphanies. João Guimarães Rosa changed the face of Brazilian literature with his experimental language, and playwright Nelson Rodrigues dealt with crime, prejudice, passion, and sexual pathologies. In the 1950s, painting and sculpture regained strength through Abstractionism, and architecture began also to display advanced features, influenced by Le Corbusier. Its greatest achievement was the urban core of Brasília, designed by urbanist Lúcio Costa and architect Oscar Niemeyer, now a World Heritage Site.[15] 1960s onwards: Contemporary Art Around the 1960s, the so-called "modernist" art movements started giving way to most contemporary means of expression, such as appropriation, political art, Conceptual art and Pop. Right at the turn of the decade, some Brazilian Concrete artists began ditching the traditional "strictness" of concrete art in favor of a more phenomenological approach, exploring the relations between the art object and the viewer. Among the primary leaders of this Neo-Concrete movement were the poet Ferreira Gullar, and the visual artists Hélio Oiticica, Lygia Pape and Lygia Clark, this last one internationally cited as one of the most influential artists of the 20th century.[16] The Coup d'état of 1964 and subsequent restriction of civil rights and freedom of expression in Brazil is commonly marked as the shifting point, whence artists such as Cildo Meireles and Rubens Gerchman began creating explicitly political art.[17] Particularly after 1968, when the military government legalized torture, Brazilian art was marked by rather radical actions and happenings. The São Paulo Art Biennial, the second oldest art biennial in the world, opened up with most of its walls empty due to a boycott from the artists.[18] In 1970, the exhibit Do Corpo à Terra ("From Body to Earth") took place in Belo Horizonte, and included rather shocking actions such as Cildo Meireles setting live chickens on fire in front of a live audience[19] and Artur Barrio ditching blood-soaked packages in a river, giving off the impression that the people who disappeared under the military government had "reappeared" in this gruesome fashion.[20] Holy week, Ouro Preto-MG, 2010. Chrome. Photo: Guy Veloso. Brazilian Pop art didn't come without its share of criticism, sometimes adopting an outright rejection of consumer culture instead of the ambivalent, distant criticism of American pop. Waldemar Cordeiro is one of the most expressive artists that began exploring digital art and robotics in its work around the 60s and 70s, while Antonio Dias, Carlos Vergara brought the aesthetics of comic books, playing cards and other popular forms of visuality into his work. Hélio Oiticica's "Tropicália", a colorful immersive installation piece, incorporated references to the slums of Rio de Janeiro. The title relates to the cultural movement of the same name, that called back to the Antropophagic Manifesto of the 1920s to offer a more tongue-in-cheek perspective on the myths of an exotic and "wild" Brazil. Some artists as: Hélio Oiticica, Lygia Clark, Naza, Cildo Meireles among others, have been featured on the international stage. Brazilian contemporary art and photography are among the most creative in Latin America, growing an international prominence each year with exhibitions and publications. Brazilian contemporary photographers include Miguel Rio Branco, Vik Muniz, Sebastião Salgado, and Guy Veloso.[citation needed] Indigenous Artists The Pinacoteca de São Paulo museum has become the first museum in over 100 years to host a contemporary Indigenous art exhibition.[21] The exhibition is featured 23 Indigenous artists from various ethnicities across Brazil. The Véxoa exhibition showcases paintings, sculptures, videos, photographs and installations[22] all with the political goal of capturing and drawing attention to important issues currently affecting the Indigenous population, which come in the form of agribusiness, deforestation, illegal mining and climate change.[21] The name of the Véxoa originates from the Terena language and translates to "We Know."[22] The exhibition aims to break stereotypes surrounding Indigenous communities in Brazil. The curator of the museum has chosen a variety of Indigenous works which are both contemporary and traditional. The museum includes a diversity policy but does not group indigenous group the artist by ethnicity or chronological in order to emphasize the universalism of shared experiences by the native communities as more than 300 Indigenous group currently reside in Brazil according to Olinda Yawar.[21] The exhibition include Indigenous film, photography, ceramics, embroidery and natural materials.[22] Ailton Krenak a leading Indigenous artist and philosopher has talked about the exhibition as "an opportunity to expose the extremely adverse times that Indigenous people are experiencing as a result of political violence perpetrated against their rights by the Brazilian State."[21] Jaider Esbell another prominent artist in the exhibition believes that "Every exhibition of Indigenous art is primarily about exposing all the crimes that are taking place today".[21] The artist focuses in widening different perspectives of Indigenous culture in order to illustrate the daily struggle and violence against indigenous communities. In a recent Youtube video Jaider has commented on the importance of Indigenous art as an intrinsic part of Indigenous culture and values. Jaider acknowledges the destruction of the Amazon Rainforest as destroying traditions and indigenous communities.[23] Jaider teaches a course at São Paulo’s Museum of Modern Art. Yakuña Tuxá a Indigenous female artist from Bahia has put forward multiple artworks that reflecting the challenges of being an Indigenous woman in modern day Brazil. The art focuses on Indigenous beauty and the prejudices faced by Indigenous women in big cities. Florianópolis, Brazil. Photo: Guy Veloso, 2010 Florianópolis, Brazil. Photo: Guy Veloso, 2010 See also • Latin American art • Brazilian painting • Brazilian sculpture • Brazilian literature • Brazilian architecture • Brazilian music • Brazilian photography • References 1. ^ Almanaque Abril 2007. São Paulo: Editora Abril, 2007, p. 234. 2. ^ Martins, Simone B. & Imbroisi, Margaret H. História da Arte, 1988 Archived 2010-10-31 at the Wayback Machine 3. ^ Correa, Conceição Gentil. Estatuetas de cerâmica na cultura Santarém. Belém: Museu Paraense Emílio Goeldi, 1965. 4. ^ KARNAL, Leandro. Teatro da Fé: Formas de Representação Religiosa no Brasil e no México do Século XVI. São Paulo, Editora Hucitec, 1998. "Archived copy". Archived from the original on 2013-07-24. Retrieved 2010-10-25.CS1 maint: archived copy as title (link) 5. ^ a b The Brazilian Baroque. Encyclopaedia Itaú Cultural 6. ^ MARIZ, Vasco. História da Música no Brasil: A música no tempo do Brasil Colônia. Rio de Janeiro: Nova Fronteira, 2005. pp. 33-46 7. ^ CONDURU, Roberto. Araras Gregas. In: 19&20 - A revista eletrônica de DezenoveVinte. Volume III, n. 2, abril de 2008 [1] 8. ^ BISCARDI, Afrânio & ROCHA, Frederico Almeida. O Mecenato Artístico de D. Pedro II e o Projeto Imperial. In: 19&20 - A revista eletrônica de DezenoveVinte. Volume I, n. 1, maio de 2006 [2] 9. ^ CARDOSO, Rafael. A Academia Imperial de Belas Artes e o Ensino Técnico. In: 19&20 - A revista eletrônica de DezenoveVinte. Volume III, n. 1, janeiro de 2008 [3] 10. ^ FERNANDES, Cybele V. F. A construção simbólica da nação: A pintura e a escultura nas Exposições Gerais da Academia Imperial das Belas Artes. In: 19&20 - A revista eletrônica de DezenoveVinte. Volume II, n. 4, outubro de 2007 [4] 11. ^ O Indianismo como Projeto de Nacionalidade. Secretaria Municipal de Educação - Prefeitura da Cidade do Rio de Janeiro [5] 12. ^ A Música na Corte de D. João VI e D. Pedro I; Antonio Carlos Gomes. In MARIZ, Vasco. História da Música no Brasil. Rio de Janeiro: Nova Fronteira, 2005.pp 52-61; 76-95 13. ^ Semana da Arte Moderna. Pitoresco Website Archived 2010-04-14 at the Wayback Machine 14. ^ Modernism in Brazil. Encyclopedia Itaú Cultural 15. ^ Niemeyer, Oscar. Encyclopedia Itaú Cultural 16. ^ "Who Are the Most Influential Artists of the Last Century? 26 Industry Leaders Weigh In | artnet News". artnet News. 2017-10-13. Retrieved 2018-04-27. 17. ^ "Artes plásticas na ditadura - Memórias da ditadura". Memórias da ditadura (in Portuguese). 2014-11-14. Archived from the original on 2018-04-19. Retrieved 2018-04-27. 18. ^ Paulo, Bienal São. "O boicote à Bienal de 1969 - Bienal". Retrieved 2018-04-27. 19. ^ "Tiradentes – Totem-monumento ao Preso Político (1970), de Cildo Meireles - Memórias da ditadura". Memórias da ditadura (in Portuguese). Archived from the original on 2018-04-27. Retrieved 2018-04-27. 20. ^ 1955-, Ramírez, Mari Carmen (2004). Inverted utopias : avant-garde art in Latin America. Olea, Héctor., Museum of Fine Arts, Houston. New Haven: Yale University Press. ISBN 0300102690. OCLC 53099013.CS1 maint: numeric names: authors list (link) 21. ^ a b c d e "Brazil art exhibition showcases an Indigenous worldview and poses questions". Mongabay Environmental News. 2020-11-19. Retrieved 2021-05-28. 22. ^ a b c "Pinacoteca – Véxoa: We Know". Retrieved 2021-06-02. 23. ^ 20160423 105107, retrieved 2021-06-03 This page was last edited on 24 June 2021, at 17:16
How will rising interest rates (really) affect you? After much speculation, the Federal Reserve has said it expects to raise long-term interest rates before the year is out, and the move will have some financial impact on nearly every American. Still, depending on your financial situation, there are advantages and disadvantages to an interest rate hike.  Andrew Harnik/AP/File The Marriner S. Eccles Federal Reserve Board Building, in Washington,June 19, 2015. The Federal Reserve is getting close to raising interest rates for the first time in nearly a decade, possibly in September _ a message that may or may not be telegraphed in a statement the Fed will issue Wednesday, July 29, 2015, after its next meeting. As the Federal Reserve wraps up its latest two-day policy meeting Wednesday, the financial world will be searching for clues about the timing of the long-awaited hike on interest rates. The central bank has said that it expects the first hike before the end of 2015, and many think it could come as soon as the Fed's mid-September meeting. The timing of the eventual hike is a hot topic among economy-watchers and big borrowers who have grown accustomed to years of cheap money. But the rest of us start to snooze when we hear pundits on TV droning away about “interest rates” in an economic policy context, as we have for the past year and a half or so. The Fed's decision, however, affects anyone who has a home mortgage, a car loan, a savings account, or money invested in the stock market. In reality, that’s almost everyone in America. In fact, experts say, the impact is so far reaching that even unemployed recent graduates living at home with their parents will feel it. So unless you live completely off the grid, it’s probably a good time to take notice. “If you’re living on cash, and your job is secure, it doesn’t affect you,but there are very few people who literally have no net savings put away or are not borrowing." says Douglas Holtz-Eakin, president of the American Action Forum and former chief economist of the President’s Council of Economic Advisers. "People use credit cards, all sorts of loans to make purchases, and so the impact will be pretty largely felt." What are interest rates and why do they change? Generally speaking, an interest rate is the additional percentage of a loan that the borrower is charged until the payment is completed, usually an annual percentage of the outstanding loan. The Federal Reserve's policy rate has been kept at or near zero for the past seven and a half years, making it very easy to borrow.   Despite the fear that rising interest rates could stymie growth, a decision to support a rate hike is generally a sign that the economy is doing well. In the face of expanding GDP and falling unemployment, interest rates that are too low could create excess demand by making it a little too easy to make big purchases. The more people feel free to buy, the more others can charge for what’s being purchased, potentially leading to inflation and an overheated economy. That’s why the Fed raises its rates as the economy improves; the intent is to slow inflation by keeping supply and demand balanced. Deciding exactly when to raise interest rates can be a tricky business due to the risk of slowing down an economy that still has weaknesses, including slow wage growth and timid spending among consumers.  What are the drawbacks of a rate hike? Raising interest rates can make it more expensive for people to borrow money to pay for things such as homes and cars. As interest rates rise, demand for the things people tend to pay for with loans tends to drop. Higher interest rates can also make it more expensive for companies to borrow and invest large sums of money in projects. “When interest rates go up, some people will notice almost immediately as banks adjust the interest rates they offer consumers," says Kimberly Palmer, Senior Editor of Money for US News and World Report, and author of the book ‘The Economy of You’. "Anyone looking to take out a mortgage or an auto loan, for example, will find rates higher and their loans more expensive." If the market is doing well and plenty of cash is flowing, demand probably won’t drop enough to seriously harm the economy, experts say.  Nevertheless, for people with financial assets such as bonds, the price of their assets could fall due to rising interest rates. That’s because bonds typically pay their owner a fixed (or unchangeable) interest rate until it reaches maturity (the finite period of time when a financial instrument, like a bond, ceases to exist and the original cost is repaid with interest). That means that if interest rates rise, the bond’s value falls because its yields, or returns on investment, are still pegged to the previous, lower interest rate. People who have a lot of their assets invested in bonds will be carefully watching how high the interest rates rise because the value of their bonds drops commensurate with how high the interest rate goes. What are the benefits?   At least one group should be celebrating a potential rate hike: savers. Since interest rates fell during the financial crisis, people who have money stashed in savings accounts have earned almost nothing from the interest on their deposits. As the costs of funds goes up due to rising interest rates, banks will pay more for customers’ money as they begin competing to get it. Moreover, for retirees and others who earn a substantial portion of their income from interest on their savings, life is about to get a lot easier. “Think about all of those people who retired 10 years ago. They had a 10 year portfolio, or 10 year CD [Certificates of Deposit], and they were earning a certain amount until those CDs matured. They were living off of that income, and when the CDs matured they went to reinvest them and their income was literally cut in half, or maybe to even a quarter of what they had,” explains Carl Richards, a financial planner and author of the book "The One-Page Financial Plan." “That’s so painful to think about because they made good decisions, they were smart, they invested safely, and now they are dealing with 50 percent or 25 percent of the income they used to have,” he concludes. Now, as their CDs and other fixed financial instruments mature, those retirees can buy new ones at higher interest rates and earn a lot more money. That's great news for many of the estimated 10,000  baby boomers heading toward retirement each day. Tim Maurer, Director of personal finance at BAM Advisor Services, agrees that rising interest rates will benefit a lot of people. “Savers have been punished for over a decade in the United States, while borrowers have been rewarded because we all hope that stimulates the economy," he says. "Savers have been punished long enough and I’m rooting for them to make more money on their fixed income vehicles." Could it impact housing? While there is no direct correlation between the short term interest rates controlled by the Fed and mortgage costs, most analysts believe that rising interest rates ultimately lead to higher mortgage rates, which means aspiring homeowners should expect to pay more over the course of their mortgage. That could price some people out of the market. Moreover, interest rate movement also impacts the rental market, so even people without a mortgage will notice the change. “If you’re just sort of getting your feet underneath you from 2008-2009, and you’re thinking, ‘ok, I can afford to buy a house now’, then rates move up a percent, a percent and a half, or two percent, which would be sort of normal, you’ve suddenly been completely priced out of the neighborhood you thought you could purchase in, or perhaps the neighborhood you’re renting in,” says Mr. Richards. For Americans who have an adjustable rate mortgage on their homes news of a rising interest rate also probably isn’t very welcome. Luckily, there aren't too many of those. According to data from the Urban Institute, in June 2015 89.4 percent of mortgages were 30-year fixed rate mortgages, while 5.0 percent of them were 15-year fixed rate mortgages. Adjustable rates are now harder to come by thanks to stricter lending standards in the wake of the housing crash; they account for just 4.5 percent of the market, down from 29 percent at the height of the 2005 housing bubble. Furthermore, low interest rates of the past seven years have allowed most mortgage holders to lock in a fixed-rate mortgage at a rate almost as low as that of a typical adjustable mortgage.  Even for the sliver of homewners who still have an adjustable rate, the future may not be so bleak. Adjustable mortgages are generally pegged to the 10-year Treasury bill. Treasury bill yields are often pretty low due to high demand from investors, both in the US and overseas, who are looking for a safe place to put their money. The Treasury bill’s low yield means that even adjustable mortgage rates could rise rather slowly even after the Fed hike happens. Meanwhile, although some postulate that rising mortgage rates could cause a slump in demand for housing, many experts assert that the decision to take out a mortgage is influenced more by life events than by interest rates. “The truth is home ownership isn’t driven by interest rates. It has an influence, especially in regards to refinancing," says Maurer. "And certainly when rates go lower people are able to refinance and they end up paying less for same amount of house,  they can use the additional money to better themselves, to pay down debt, to invest, or to spend, which should bolster the economy. But home ownership is driven by life events, not on interest rates. People move, or they get a new job, they get a raise, they get married, they have children.” That being the case, many experts say it’s unlikely the housing market will face major setbacks due to a rate hike. What you can do The good news is that people can plan for a rate hike and make smart financial decisions.  Many financial planners suggest the concept of laddering ­­̶ or creating a portfolio of fixed income securities, or an investment that pays fixed periodic payments during its existence, where the maturity date of each security is different. “To insulate yourself from these sorts of things…you lock in your mortgage interest rate for as short of a term as you can while still affording a payment," explains Richards. "So if you can afford a 15-year rate, awesome. If not, you can lock in your 30 year rate. Then your bond portfolio is laddered, so CDs mature, some portion of your portfolio matures every year,  you get the opportunity to reinvest it at a rising interest rate. If your portfolio is designed well to deal with the reality that interest rates change, which shouldn’t be a surprise to anyone, there is a way to manage risk.” Financial advisors also suggest that investors shy away from taking too many risks while the interest rates are low, such as buying junk bonds with potentially higher yields instead of insured government bonds with lower interest rates. “The concept of laddering in your fixed income portfolio makes a lot of sense,” confirms Maurer. “First and foremost, do not take undue risk born of impatience with low interest rates, don’t shift money that you know should probably be in the fixed income portion of your portfolio to the stock portion because you’re sick of low interest rates. Don’t go from US treasury to junk bonds because you’re sick of low interest rates.” Meanwhile, some suggest that if you know you’re going to buy something with credit in the near future, you probably shouldn’t wait.   “Looking forward, the best guess is rates can only go up, not down,” says Dr. Holtz-Eakin. “That means if you’re looking to buy something now or later using credit, buy it now because the rates will be low.” And if feasible, putting away savings each month is never a bad idea.   “Continue saving as much as possible to take advantage of those rates and be a savvy shopper with any new loans – shop around and compare rates so you can get the lowest one available,” Ms. Palmer suggests.   You've read  of  free articles. Subscribe to continue. Dear Reader,
In a typical home, the kitchen has the heaviest electricity consumption. Since you need to plug in multiple appliances that have different electrical power requirements, create a wiring plan before buying construction electrical material and equipment, or building electric circuits for space. Unlike other rooms in your home, you cannot use a single circuit to provide power to different electrical fittings and appliances in the kitchen. If you’re planning a major kitchen remodel or building a new home, common kitchen appliances will need separate electric circuits in your electrical wiring plan. 5 basic examples to consider while doing kitchen wiring 1. Refrigerator While you might have a small refrigerator plugged into a general electrical circuit designed for lighting or small appliances, newer models typically require a dedicated circuit. Add a 120/125-volt, 20-amp circuit for a refrigerator in your wiring plan, and make sure you’re using 12/2 NM electrical wire with ground. 2. Dishwasher Dishwashers require almost the same kind of electrical circuits as modern refrigerators with slightly lower amperage, i.e. 120/125-volt, 15-amp, and you need to use 14/2 NM electrical wire with ground. If you’re planning to power a garbage disposer with the same circuit as a dishwasher, use a 20-amp circuit. Install a slightly longer wire than needed, so the dishwasher does not need to be disconnected completely while being pulled out and serviced. 3. Electric Range While a gas range uses a 120/125-volt electrical circuit, you need to install a 240/250-volt, 50-amp circuit with 6/3 NM electrical cables or #6 THHN electrical wire in a conduit for an electric range. Position the receptacle keeping in mind that the range will need to be pushed back to the wall. Even if you aren’t currently using an electric range, include a dedicated outlet for it in your kitchen wiring plan. It will help if you decide to switch to an electric range in the future, or even put your property up for sale! electric range 4. Microwave Microwave ovens come in numerous sizes and varieties and may be fitted over the stove, under the cabinet or on countertops. While most can be plugged into countertop appliance outlets, larger models need their own dedicated circuits since they use up to 1500 watts of electrical power. Use the same circuit as a refrigerator for powering a microwave, i.e. 120/125-volt, 20-amp and 12/2 NM electrical wire with ground. 5. Small Appliances Building codes usually require a minimum of two dedicated 120/125-volt, 20-amp electrical circuits for small appliance loads in a kitchen. Toasters, coffee pots, blenders, juicers and electric griddles will be powered by these circuits, so add more if you’re using multiple appliances. According to fantastic electrician consultant, Dmitri Kara Make a list of appliances you use and where you will place them, using this to determine both circuit design and outlet placement. electrical appliances If you’re looking for top quality construction electrical material at affordable prices, get in touch with D&F Liquidators. We can get you the best deals on electrical supplies for your kitchen remodel or build, as well as any other construction project or home improvements. Contact us now!
What Does Elephas Maximus Mean what is asian elephant? A asian elephnant is the largest terrestrial mammals. They can reach 6.4m in length. But they are smaller than African elephant Where do asian elephant lives? Asian elephant lives in tropical and grassland in southeast Asia. They also live in India in the west, Nepal in the north,Sumatra in the south, and Borneo in the east. Facts about Asian Elephant An elephant's trunk has more than 40,000 muscles, more than all the muscles in a human body. Also like I say that they are the largest terrestrial mammals and they are also smaller than African elephant one more they can reach 6.4m length and the shoulder is 3m How does Asian Elephant adapt? They can use their trunk to take the water and blow their trunk so the water from the trunk can go to the elephant mouth. Also they use their ears make them cool from the heat by flapping their ears. Conservation status of Asian Elephant? Why is Asian elephant endangered ? Hunters take their tusk for lot of money. It is primarily threatened by loss of habitat. human have conflict between Asian Threaten means to tell someone that you will kill or hurt them or cause problems if they do not do what you want.
Pcos Diet: Pcos Prevention – Pcos Treatment – Pcos Cause – Foods To Eat And Avoid Polycystic ovary syndrome (PCOS) is a condition that causes irregular menstruation as monthly ovulation becomes irregular and androgen (male hormone) levels rise.  This condition occurs in about 5 to 10% of women. Not all, but most women with PCOS are overweight or obese, and have a higher-than-average risk of developing diabetes.  Most of them have PCOS, but they keep ruling it out until they are diagnosed with the disease through proper treatment.  Treat PCOS by making dietary and lifestyle changes Two ways diet can affect PCOS are weight management and insulin resistance. Insulin plays an important role in PCOS, so managing insulin levels through a PCOS-friendly diet is one of the best ways to manage PCOS. Along with proper diet, proper counseling and regular exercise play an equally important role. What Can You Include In Your PCOS Diet? A high-fiber diet can help combat insulin resistance by slowing digestion, controlling blood sugar levels, reducing inflammation, and improving gut health. Whole grains, legumes, lentils, seeds, fruits and vegetables are rich sources of fiber. Broccoli, cauliflower, cabbage, almonds, beans, lentils etc. can be included in the diet. Also Check :  Respiratory Viruses: Respiratory Viruses In Children - Respiratory Viruses Symptoms Low-protein sources , such as tofu, chicken, and fish do not provide fiber, but are plenty of fortified and healthy dietary choices for women with PCOS. Green leafy vegetables, such as kale (Karamsaag, cabbage) or spinach, are high in vitamin B. Incredibly, more than 80% of women with PCOS are deficient in B vitamins. Vitamin B is rich in nutrients and low in calories, making them ideal for weight loss and nutritious. Foods rich in antioxidants help reduce inflammation and regulate insulin levels. Examples of antioxidant-rich foods for the PCOS diet include fruits (strawberries, blueberries, raspberries); vegetables (spinach, beet, kale); whole grains (whole oats, whole wheat, quinoa, brown rice); and unsaturated fats (nuts like pecans, nut butter, olive oil, avocado should be included. Avoid skipping food. They can lower your blood sugar levels and cause food cravings and overindulgence. Maintaining a routine has the potential to stabilize blood sugar levels which aid in androgen production. Also Check :  Almonds & Walnuts Improve Cholesterol Levels & Makes Your Heart Healthy Foods To Avoid Or Eat Less For a PCOS friendly diet, it is better to stay away from the following foods and balance the right ratio of proteins, carbohydrates, fats for a healthy body. • Refined Carbs – Sugar, processed food, food packets, instant food, refined wheat, fruit juice in any form, soda, aerated drinks, ice cream. • Saturated fats, such as meat and mutton, bakery items, too much oil or ghee, fast foods. • Reduce dairy intake: According to research published in the International Journal of Preventive Medicine, preventive medication and reducing dairy intake may possibly help some women in the process of PCOS, lose weight and ease some of their hormonal PCOS symptoms. Cutting back on dairy products has been shown to improve gut health for many women and thereby improve the absorption of certain nutrients. Exercise As A Lifestyle Change Everyone knows that exercise helps reduce excess calories and promote the process of weight loss . Let’s see how regular exercise is more beneficial than losing weight for women with PCOS. 1. Improves insulin sensitivity: Regular exercise especially cardio has been shown to improve insulin sensitivity, decrease the risk of diabetes and other problems caused by PCOS. 2. Low cholesterol : Women with PCOS are more likely to have high levels of cholesterol and triglycerides . In such cases, good results have been seen with a balanced diet as well as regular exercise. 3. Hormonal balance: Exercise also helps to regulate hormones and menstruation. 4. Increase in endorphin levels: Exercise increases your endorphin levels, also known as your happy hormone, and it also helps PCOS patients to manage stress and anxiety. Also Check :  Reverse Diabetes By Changing Diet: 4 Steps To Reverse Diabetes Prediabetes Ayurvedic Treatment People who have been diagnosed with PCOS are almost three times more likely to develop anxiety and depression than people without PCOS.  Therefore, in order to start a better lifestyle, conscious consumption of diet should lead to PCOS friendly changes that manage symptoms, improve fertility and make it possible to lead a fulfilling life.
Defamation of character vs slander What is the difference between slander and defamation of character? Libel and slander are forms of defamation, which is an untrue statement presented as fact and intended to damage a person’s character or reputation. Libel is a defamatory statement made in writing, while slander is a defamatory statement that is spoken. How do you prove slander? 2. The information must be defamatory; 3. The information must be about the plaintiff; and. 4. There is no lawful excuse for publishing the information. How do you charge someone for slander? Suing for slander, libel, or defamation brings a civil suit in a state court and alleges that under the slander laws or libel laws of that state the person who brought about the lawsuit was damaged by the conduct of the person who made the false statement. Is insulting someone slander? Insults and epithets are usually not considered to be defamatory because they are emotional outbursts and the intent of the person is to show displeasure or dislike. What qualifies as slander? What are some examples of slander? Examples of slander include: • Telling someone that a certain person cheated on his taxes, or committed tax fraud. You might be interested:  Legal term for defamation of character Is it hard to win a defamation case? Is slander hard to prove? Unlike libel, which is a written form of defamation, slander is spoken defamation, making it harder to prove. In addition, you must also show the person defaming you was at least negligent with the truth or falsity of the statement. Is it slander if its true? Can you sue for malicious gossip? Malicious gossip in the workplace may lead to a claim for defamation. To state a claim for defamation per se, the plaintiff must show the intentional publication of a statement of fact that is false, unprivileged and has a natural tendency to injure or which causes special damage. Is it illegal to slander someone on Facebook? Defamation cases involving the internet and social media are relatively new, but the same principles apply. … Consequently, you may be liable for defamation if you spread information which constitutes a hurtful and untrue statement of fact about another person. You might be interested:  Can you sue for defamation How do you deal with people who slander you? 10 Useful Tips to Deal With Toxic People & Defamation 5. #6. … 6. #5. … 7. #4. … 8. #3. Is name calling slander? The term defamation is often used to encompass both libel and slander. … That which is name-calling, hyperbole, or, however characterized, cannot be proven true or false, cannot be the subject of a libel or slander claim. The defamatory statement must also have been made with fault. Can I sue someone for putting me on youtube? If you are in the US you can sue for anything you want. Whether you win or not depends. In this case it is perfectly legal to film you and to publish those videos if you were out and about in public. You can certainly sue if you want but chances are you will lose and potentially bankrupt yourself. Leave a Reply
Concussions are traumatic brain injuries caused by any sufficiently hard blow to the head. The rapid movement of the brain can cause the neurons to tear and brain tissues to change shape, which can damage the brain cells. While concussions can cause immediate symptoms, such as a temporary loss of consciousness, headaches, and dizziness, some effects can continue days or even weeks after the event. This is called post-concussive syndrome, and its signs and symptoms include Blurred vision, Difficulty concentrating, Dizziness, Headaches, Memory loss, Sensitivity to light and noise. The brain is highly dependent on nutrients and energy. It is also extremely vulnerable to toxins and stress. A brain injury can disrupt the brain-gut connection, a bidirectional communication network between the brain and gastrointestinal system, potentially resulting in increased intestinal permeability, inflammation, reduced gastrointestinal motility, and bacterial overgrowth. These two primary goals for post-concussion nutrition—healing the structural damage from the concussion while managing the pain to prevent long-term damage—can be achieved through natural remedies, including dietary supplements. Dietary supplements such as Creatine, Omega-3 fatty acids, Resveratrol, Boswellia, Curcumin, Choline, Vitamin D, Zinc, Acetyl L-carnitine, Magnesium, and Alpha-lipoic acid. Eating the right foods and taking the right supplements can help improve recovery time and may also limit the damage caused by concussions. If you’re a patient, consult your integrative healthcare practitioner for guidance and an appropriate treatment plan.
The recursive best-first search algorithm The recursive best-first search (RBFS) algorithm is a simple recursive algorithm that attempts to mimic the operation of A-star search (i.e., the standard best-first search with an evaluation function that adds up the path cost and the heuristic), but using only linear space (instead of showing an exponential space complexity). The structure of RBFS is similar to that of recursive depth-first search (a tree-search version), but rather than continuing indefinitely down the current path, it uses an evaluation limit to keep track of the best alternative path available from any ancestor of the current node, see Figure 1. Figure 1. RBFS applied on the graphical map of Germany, from Frankfurt to München. RBFS applied on the graphical map of Germany RBFS applied on the graphical map of Germany. RBFS is robust and optimal (if the heuristic is admissible), but it still suffers from excessive node regeneration due to its low memory profile, which entails a long processing time. Given enough time, though, it can solve problems that A-star cannot solve because it runs out of memory. Figure 2. Recursive best-first search algorithm. -- Recursive best-first search algorithm. -- PRE: -- problem - cost-weighted adjacency matrix (table). -- start - starting node index (number). -- finish - finishing node index (number). -- heuristic - must be a heuristic at the node level (table). -- POST: -- solution - solution path (table). State set to zero if failure. -- In this implementation, cost is a vector: -- {path_cost, heuristic_cost}. function recursive_best_first_search(problem, start, finish, -- inits local node = {} node.state = start node.parent = {} node.cost = {0, heuristic[start]} return rbfs(problem, node, finish, heuristic, math.huge) function rbfs(problem, node, finish, heuristic, flimit) if (node.state == finish) then return node local successors = {} -- for each action in problem given state... for i = 1, #problem do if (problem[node.state][i] > 0) then if (i ~= node.state) then local child = {state = i} local path = {} for j = 1, #node.parent do table.insert(path, node.parent[j]) table.insert(path, node.state) child.parent = path child.cost = {node.cost[1] + problem[node.state][i], table.insert(successors, child) if (#successors == 0) then return {state = 0} while (true) do -- 1st and 2nd lowest fval in successors local best = successors[1] local alternative = best if (#successors > 1) then alternative = successors[2] if ((best.cost[1] + best.cost[2]) > (alternative.cost[1] + alternative.cost[2])) then best, alternative = alternative, best for i = 3, #successors do -- check best if ((successors[i].cost[1] + successors[i].cost[2]) < (best.cost[1] + best.cost[2])) then alternative = best best = successors[i] alternative = successors[i] local bestf = best.cost[1] + best.cost[2] local alternativef = alternative.cost[1] + alternative.cost[2] local result if (bestf < flimit) then result = rbfs(problem, best, finish, heuristic, math.min(flimit, alternativef)) node.cost[1] = best.cost[1] node.cost[2] = best.cost[2] return {state = 0} if (result.state ~= 0) then return result Regarding its implementation, see Figure 2, the RBFS algorithm depicted in AIMA is somewhat puzzling and it does not take into account a scenario with one single successor. Note how the former code specifically tackles these issues so that the final algorithm behaves as expected. With RBFS you made it to the end of chapter 3. Over the course of the former posts, you have reviewed some of the most practical search methods, which are able to solve many types of problems in AI like puzzles, robot navigation, or the famous travelling salesman problem. In addition, the language processing field is also in need of such search algorithms to solve problems in speech recognition, parsing, and machine translation. All these fancy applications will be targeted in due time. In the following posts, the idea of “classical” search you have seen so far will be generalised to cover a broader scope of state-spaces. Stay tuned!
Wildlife Gardening Things are improving in the countryside regarding wildlife, with farmers leaving strips of fields uncultivated to provide wildlife havens and using less damaging sprays, but there is still a lot we can do to encourage wildlife in our gardens. By providing food and shelter for birds and other wildlife it is possible to reduce the amount of sprays and chemicals used in the garden. If you go out into the countryside you will see a lot less insect pests such as aphids. In nature there are no problems with pest and diseases because of survival of the fittest. If a plant is affected badly by a pest it will die and a few of that species will survive and the next generation will be a little stronger and more able to resist an attack from a pest. The next thing is that the pest evolves and kills the plant and the whole process starts again. The first obvious item to have in your garden to encourage wildlife is a bird table to feed the birds. As well as feeding the birds we need to provide shelter and places for the birds to roost. If your garden is large enough you can plant trees. This not only supplies places for the birds to roost but also a nesting place and somewhere to hang bird feeders. You can encourage birds to nest by putting up nest boxes in the garden. Planting trees and shrubs that produce berries will produce a plentiful supply of natural food for the birds and further roosting places. It is probably a good idea to avoid trees such as Elder because blackbirds love them but the result of this ends up all over the washing and cars. Another food for birds is insects. Insects can be encouraged by piling up old tree trunks and small branches in a shady corner of the garden, out of the way. These piles will also provide shelter and food for hedgehogs and other small mammals. Butterflies and moths can be encouraged by planting shrubs such as Buddleia and lavender. If you have a large garden have an area that you can have as a wildlife area that you do not cut or treat, just do the minimal amount of work to keep it tidy. (K.H.) Leave a Reply
Select Page While neurological conditions such as Alzheimer’s disease or dementia certainly become a greater possibility as you age, the truth is that some level of neurological deterioration and memory loss will happen to almost everyone. That being said, there are plenty of things you can do to help keep mental decline and memory loss to a minimum. Here are three things you can do to help maintain and even improve your memory as you age. 1. Eat a healthy diet There is an almost overwhelming body of evidence that shows that nutrients play a strong role in cognitive function. In particular, a mediterranean diet rich in leafy greens, healthy fats and fish can have the greatest impact. Eating a healthy diet can also help you keep your cholesterol levels low and your blood sugar stable, which can help keep you off of certain medications that may make you feel less alert. The right diet will also provide the critical energy you need to do the next most important thing you can do to protect your mental and physical health. 1. Get regular exercise Exercise doesn’t have to involve going to a gym or even getting sweaty. Even something as simple as a 15-20 minute walk, dancing to a song you love or even doing household chores can get you up, active and get your blood pumping. Your brain requires a great deal of oxygen to work at peak potential so anything you do to get your heart rate up will also get your blood flowing, which will carry more vital oxygen to your brain. The more you move, the better chance you give your brain to work at peak performance. 1. Exercise your brain as well as your body The same way physical exercise is critical to your body, mental exercise is critical to your cognitive function. You can exercise your brain by playing math or word games or even playing social games like checkers, chess, dominoes or cards. In addition to exercising your brain through certain activities, socializing in and of itself has been shown to have a positive impact on cognitive function. In fact, a 2016 study on older adults found that busier individuals scored better on tests of memory, reasoning and processing speed than those that had a more sparse agenda.
What is 3D printing? What is a 4K monitor? This is a monitor that’s capable of displaying ultra-high definition content at a resolution of roughly 4000 pixels horizontally. Although actual resolutions may vary, the most common is 3840×2160 pixels, which is the equivalent resolution of four ‘Full HD’ screens arranged in a 2×2 rectangle. What does IEEE 802.11 Wi-Fi standards mean? If you would like to read more about 802.11 standards, check out our IEEE 802.11 Wi-Fi standards blog in our News section.
Skip to Content Your Link to Muskoka's Water! Assessing and modelling cumulative effects on biological communities  John Gunn and John Bailey (co-PIs/Laurentian University) Chris Jones (PhD candidate/Laurentian University) As specified in the approved CWN proposal, our project will do the following things: 1. Describe normal ranges of biological condition for Muskoka lakes and rivers (benthic invertebrates) 2. Describe biological baselines for lakes and rivers 3. Evaluate bioassessment indicators, and derive biocriteria (numerical pass-fail thresholds for judging ecological condition) for promising ones 4. Model expected biological condition under alternate climate and development futures (assuming we can reasonably model biological responses to physiographic variation and stressor exposure) 5. Make recommendations regarding design of a cumulative-effects monitoring program for the District of Muskoka Physiography influences a lake’s or river’s potential to support living communities, and influences how responsive that waterbody’s communities will be to human activities. Mapping and geospatial analyses have been underway for months to delineate stream and lake catchments and characterize their physiographic qualities and stressor exposures. In past weeks, we have grouped lakes and streams using a variety methods (see Figure 1 for an example), and the resulting physiographic/sensitivity classification schemes are now being evaluated. Reference and impacted lakes and streams are also being identified. Update - November 2013 A variety of maps were consulted to identify minimally impacted reference lakes and streams, and to identify lakes and streams impacted by human activities. These maps provided us an understanding of the range in natural habitats and human-related ecological stressors present in Muskoka's watersheds. We planned a lake and stream survey with the intent of characterizing water chemistry and biological community structure across the range of lake and stream types in Muskoka. During the summers of 2012 and 2013, water and benthic invertebrates from more than 100 lakes and 100 streams were collected. These samples will be processed over the coming winter. The resulting data will be analyzed to create the 5 categories of new knowledge listed above. Reports, to be written in fall 2014 or winter 2015, will describe our methods and results, and will discuss the societal relevance and water-management implications of the study. Collecting benthic invertebrates and characterizing habitat at a location in Lake Joseph, 2012 Collecting a water sample from a small stream, just inland from Georgian Bay
Grid requirements and standard practices Electrical grid and grid readiness The electrical grid is defined as an interconnected network of power stations, transmission lines and distribution stations that transmit power from suppliers to consumers. Voltage is stepped up at the source, transmitted at high voltage to reduce power losses and then stepped down for consumers. Fig.1: The electrical grid [1] The flexibility of a solar PV power system is a major concern in the context of the current pipeline of renewable energy (RE) projects. The grid is not ready to accommodate additional intermittent RE at it has been designed for stable power generation and the difference between the total and net load curves should be kept minimal. [1] ““Grid GIF - Find on GIFER.” [Online]. Available:
E1102. Musculoskeletal Sarcoidosis: A Radiological Footprint 1. Laura Marsland; King's College Hospital NHS Foundation Trust 2. Dennis Bielecki; King's College Hospital NHS Foundation Trust; King's College London Sarcoidosis is a chronic granulomatous disease in which non-caseating granulomata develop in organs in response to environmental and genetic factors. It is ubiquitous, both in the sense that it is prevalent throughout the world and that it can occur in almost any organ in the body. Thoracic sarcoid disease is considered universal, contributing most significantly to mortality associated with sarcoidosis, however musculoskeletal manifestations affect a third of patients, symptoms ranging from mild arthralgia to profound joint deformation and disability. As a disease process, sarcoidosis is the master of non-specificity. Histopathology, signs, symptoms, and radiological features are shared with numerous illnesses which can lead to delays in diagnosis and effective treatment. This exhibit reviews the radiological features of musculoskeletal sarcoidosis, compares them to those of other diseases and aims to enable the reader to recognize a distinct radiological footprint. Educational Goals / Teaching Points To provide an overview of sarcoidosis as a multi-system disease, including pathophysiology and epidemiology. To describe the multi-modality radiological features of musculoskeletal sarcoidosis in bone, joint and muscle and to offer a framework to differentiate from other disease processes. To introduce the role of PET/CT imaging in diagnosis and monitoring of sarcoidosis. To illustrate the topic with cases. Key Anatomic/Physiologic Issues and Imaging Findings/Techniques Musculoskeletal manifestations of sarcoidosis are considered according to radiological presentation in bone, joint and muscle. Bone: The osteolytic lesion is the hallmark of bone sarcoidosis and has a wide differential, including primary and secondary bone malignancy and infection. While certain radiological appearances can offer clues, the key to differentiating the sarcoid lesion is location. Sarcoid lesions tend to affect the appendicular skeleton, most commonly the small bones of the hands, in which lace-like bone loss and subcortical tunneling occur. Joints: Sarcoid arthropathy most commonly presents acutely. The classic triad of acute arthralgia, hilar lymphadenopathy and erythema nodosum in Lofgren Syndrome is recognisable. Chronic sarcoid arthropathy may be distinguished from other chronic arthropathic process, such as rheumatoid arthritis, by the notable absence of joint erosions. Muscles: Sarcoid myopathy exists as either acute, chronic or nodular subtypes. While the clinical presentation and biochemical and electrophysiological findings might be non-specific, MR and PET/CT imaging has been shown to offer a degree of diagnostic sensitivity. Musculoskeletal manifestations of sarcoidosis may present with non-specific clinical and radiological appearances. However, knowledge of the pattern of multimodality radiological features (or the 'radiological footprint') can support the radiologist to offer a confident diagnosis and/or comprehensive assessment of disease progression. PET/CT offers the opportunity to improve the sensitivity and specificity of radiological diagnosis and monitoring in sarcoidosis and there may be scope for this role to expand with increased availability.
Learning, Machines, Majors and Areas of Study, Pedagogy Students as Machines or Human Beings? Let’s start by thinking about three kinds of machines and how they differ: a hammer, a photocopier, and a computer. These three kinds of machines represent three levels of complexity. Three Kinds of Machines English: A standard household claw hammer. English: A standard household claw hammer. (Photo credit: Wikipedia) First, a hammer: a hammer is an example of the simplest type of machine. You can perform maybe three tasks with a hammer (beat things with it, pull nails, and use it as a paperweight), but it’s really just designed for two specific tasks — beating things and pulling nails. It’s very good at these two tasks, but only those. A hammer doesn’t really make a good paperweight, by the way. Because you can do other things with it, you’ll want to take it off your papers and use it, and then it quits being a paperweight. The best paperweights are useless for all functions but being paperweights. And of course if something really is only good for just sitting there, it may as well look good while it’s serving that purpose. Most importantly, the hammer is an inert object. It just lays there until you pick it up. It doesn’t do anything at all until you pick it up and do something with it. Now, you might say that you can do many different things with a hammer, like chip wood, drive nails, or beat holes, but those are all just different ways of beating with it. You might say that you can throw a hammer, but unless you’re throwing the hammer at something, you’re throwing it for no reason at all (at least, no reason peculiar to a hammer — if you’re in a distance throwing contest, you could throw hammers, rocks, or frisbees), and throwing a hammer at something is just beating on it from a distance. Next, a photocopier: machines like photocopiers are a little more complex. They too only perform one task, though. The photocopier in my office can scan and copy, but those are just two different ways of doing the same task, which is reproducing an image. It can staple and sort, but those tasks are only important because they are related to the copier’s primary task, which is reproducing an image. When the spawn of Satan bothers to work at all, that is. Photocopier of Malice We might think that what makes copiers more complex than hammers is the proliferation of moving parts. Since both copiers and hammers seem designed to perform a single task, it’s hard to compare them only on the basis of the work that they do. We might say that the single task that copiers perform is more complex than the one or two tasks that hammers perform, and that would be true, but I wouldn’t emphasize just number of moving parts as the most important factor in order of complexity, or even just the complexity of the task. I want to emphasize something else: copiers can be programmed to do their single task on their own, and once you’ve programmed them and started them running, they run until they’ve completed the task. So I can program my copier to make 500 copies double-sided and corner stapled, and once I’ve done so, it chugs away making copies and stapling them until the 500th copy is finished. This level of functionality is very different from a hammer, which just lays there until someone picks it up and uses it. Finally, a computer: the most complex machine I’d like us to consider is a computer. Computers, like copiers, also need to be programmed, but their programming can get very sophisticated. Its normal functioning involves performing a highly diverse number of very complex tasks all at the same time, most of which the user is unaware — programming that runs beneath the user interface. Computers, as the most sophisticated type of machine under consideration here, can perform the most number of tasks and can work the most independently. Now let’s consider the difference between any of these machines and a human being. Human beings can be programmed, but we can also program ourselves, and we can choose our programming. Furthermore, human beings are not limited to their programming — we can act beyond the parameters of our programming (in other words, creatively), and we can act in ways contradictory to our programming (in other words, annoyingly — but we can be deliberately annoying, unlike a computer, which is just passively annoying). Human beings are also capable of being self-directed. We can choose what to do and then go do it without any external stimulus. Even the most complex machines — computers — do not choose when they run independently. They’re just running established routines. When they act outside of those established routines, they crash. Like the spawn of Satan that they can be. Four Kinds of Students I would like to suggest that our four options here represent four different types of students: hammers, photocopiers, computers, and human beings, and that student attitudes and institutional practices lead students to be one of these four types. 1. “Hammer” students do nothing until they’re forced to do it. School isn’t for learning but for earning grades. Curiosity and the potential for self-development play no role in this student’s motivation at all. This kind of student will do just what they are told to do and no more. They will do it when they are told and at no other time. Until they are told, they will lay there and do nothing. They are completely passive learners. • Institutional practices encourage students to behave like hammers when assessment drives education: students are not human beings developing their intellectual, social, creative, and emotional potentials, but are just test takers. The purpose of teaching in this model is to have students earn high grades with high test scores, and lessons offer no motivation for learning but test performance. • You might want to note that hammer students are still students. They participate in the educational task rather than resist it. They just do so as minimally as possible. Students who actively resist the educational task are prisoners, and so are their teachers. 2. “Photocopier” students will work on their own to perform just the task(s) given to them, but they won’t work beyond their given task. They repeat and repeat and repeat, but that’s it — they do not innovate, add, or create in relationship to the assigned tasks. They are better than hammers in that they have willingly accepted the educational task and will work on their own, but they’re still largely passive learners. • Institutional practices that encourage students to be photocopiers include teaching methods that emphasize only the acquisition of knowledge rather than the application of knowledge or the development of skills. Acquisition-based teaching requires students to take in information and then spit it back out in its original form. The more accurately the student can repeat acquired knowledge, the higher the student’s grade. This pedagogy treats the human mind like a photocopier having no creative or critical potential at all. • Students taught to be photocopiers often want step by step instructions for all assignments. They feel anxious when they’re given a goal without being told exactly how to meet it. 3. “Computer” students are often A students. They can work on a variety of complex tasks independently, having developed a number of skills that they have learned to integrate into multiple kinds of tasks. They are capable of working on their own. Sounds great, doesn’t it? The problem here is that these students have not developed their potential for creative or critical thinking. They may write very competent, accurately documented, and grammatically correct papers but have problems with thesis development. They may have learned to write a thesis, but their best work is only a combination of what they’ve already been given. They never surprise their instructors, and they often tend to focus on figuring out what the instructor wants to hear and repeating it back to them in their papers. Depending upon the class, doing so can be a very complex task. • Institutional practices that encourage the development of this kind of student include limiting work to just one kind of methodology, or critical paradigms to just one or two — in short, students are not exposed to a meaningful diversity of ways of thinking about a topic or performing a task. Most of all, they are never encouraged to take risks in their thinking, to be creative. Instructors who write assignment instructions that tell students how to write their papers in significant detail (e.g., answer these questions about these possible literary works using this methodology) may be unintentionally derailing the development of student creativity and critical thinking skills. 4. Students who are fully developing themselves as human beings within an educational context see learning as play. Not frivolity, but serious play, the kind of play that creates new things with old materials, that relates existing material to the outside world and to one’s personal life, that changes and transforms and sees new possibilities for course material. • Institutional practices that encourage the development of this kind of student emphasize critical thinking, thesis development, creativity in thought, and problem solving (especially by posing impossible to solve or open-ended problems. Solving problems defined by the methodology is computer thinking — students may follow a complex routine, but they’re still following a set routine rather than thinking on their own). The best instruction explains the reasons for the class within the context of a student’s discipline and overall education, and it relates course material to big questions whenever possible. How Do We Respond? First, we need to be careful about how we think about this taxonomy. Students can be photocopiers in one class, computers in another, and human beings in a third. These are different ways that students postion themselves, or are positioned by institutional practices, in relationship to a specific course. Even hammer students may not necessarily be hammers in all of their classes. So while I’m describing four different kinds of students, I don’t mean to imply (though I probably have) that each individual student is one of these four types in some globally-defining sense of the word. It’s best to think of these four types of students as four types of student responses to material and pedagogical practices that can vary for an individual student from class to class. If you are reading this blog as a student, I would like to encourage you to try to be a human being in all of your classes, however they are taught. Good students make the most out of even bad classes because they are driven to learn, not driven by grades, points, or their instructors. What you learn and do in class is of no benefit to your instructor. Your education, first and foremost, benefits yourself. Your instructor is not your employer — he or she is working for your benefit in class, as the work that your instructor assigns benefits you, not the instructor. If you are reading this blog as an instructor, I would like you to ask yourself about your classes — and what kind of student you’re creating with them. Are you treating your students like simple machines, complex machines, or human beings? I know that some classes, especially when taught to some student populations, need to be run on the lower end of the scale rather than the higher. Some students need to start out as hammers or copiers and then move up. I think courses designed like ladders — in which students attempt higher degrees of complexity as they move through the course — are best designed for beginning, introductory, or remedial students. We also need to consider this hierarchy in our curriculum design. By the time students are attempting 300 and definitely 400 level classes in their major, most assignments should be designed to serve the highest possible developmental ends. I hope I’m being clear, though — I’m not laying the responsibility for student learning solely upon the instructor or solely upon the student. Students are responsible for being the type of student that they have chosen to be, and instructors are responsible for their educational practices and the type of student that they create with them. The success or failure of educational practices is dependent both upon the student and the instructor. I would also like to suggest that this paradigm can help us define different management styles too. What kind of human being are we creating by our management practices? What kind of employees do we have, and what kind should we expect given institutional policies and our treatment of employees? Treat employees like hammers and that’s all that you’ll get. Treat employees like human beings, though, and you’ll get the best out of them. Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
We support schools and organizations with curriculum framework and aligned resources (sample video lessons, lesson plan, graphic organizers, assessments and trackers) which help them to implement the coding program. Teachers/Facilitators find the resources helpful in order to conduct the coding lessons for kids as the resources are easily to comprehend, makes them aware about the outcomes and helps to assess them, helps them to visualize the flow of the lesson, gives them step by step approach to progress, track and reflect on the progress to identify the next steps. Currently, we offer Course 1 for elementary kids on Scratch and a sample 5 video lesson program for teachers to understand the basic flow of the lesson. Learn to Code with Scratch The Code to Enhance Learning curriculum focuses on concepts that are needed to learn computationa thinking. Moreover, the objectives of lessons are designed in a way that it empowers them to express their learnings (from class or surroundings) which would help them be confident about their learning. The broad goals of the course are, 1. Students will be conversant with distinguished programming language. 2. Student will learn about the computational concepts to write programs in distinguished programming language. 3. Students will learn about the practices to develop computational thinking. 4. Student will learn about the mindsets to develop computational thinking. 5. Students will be able to express their learning about them and surroundings by making animation and applications. In this course, students will learn 10 different computational concepts like sequence, event, loops, etc. They will start tinkering with the block based programming of Scratch developed by MIT Media labs used in 130+ countries to make basic animation, games and applications to express and solve contextual problems. Thus, the program aims to create a fun and learning expereince for kids to master computational thinking by giving opportunities to express themselves and solve problems related to self and surrounding. Curricum Framework The curriculum framework gives insight about the jounrey of this course. It depecits the learning objective, learning outcomes and different focus areas introduced in a scaffold manner in the course. Lesson 1 My Sprite Speaks Students will make a sprite speak and move on the stage. They will be introduced to a computational concept called sequence. Lesson 2 Colorful Shapes Students will be able to create different geometrical shapes. (Line, retangle, square, circle, parallelogram, trapezium, polygon). Moroever, they will learn about a computational concept called events. Lesson 3 My Car Student will draw a car and different sprites on the stage. They will make the car move on the road having features like braking and horn. They will learn about the computational concept loops besides becoming more aware of the traffic rules. Lesson 4 Colorful Pattern Students will make different patterns using a given geometrical shape. They will learn about the computational concept of nested loops. Lesson 5 Scaring The Ghost Game Students will create a scaring the ghost game. The ghost will be flying in the sky to and fro. The character can throw magic ball to scare the ghost way with a click. They will learn the computational concept of conditional statement. Lesson 6 Make A Story Students will create an animation to share about name calling. This will help students be aware of name calling and the negative impact of it. Moreover, students will learn about parallelism and broadcasting. Lesson 7 Which Angle Is It? Students will make an application to identify the name of a given angle. This application will it easy for their peers to say if the angle is acute, obtuse, etc. based on the angle entered by the user. They will learn more about the computational concept of operators. Lesson 8 Help With Tables Student will make an application where the user has to help a character to say multiplication tables. This will make learning multiplication easy. Moreover, they will learn about the computational concept of variables. Lesson 9 E Catalogue Finding books in a library it tough! Students will make an e-catalogue for the library to help users find the books easily. They will learn the computational concept of list. Lesson 10 Quiz Quiz is great way of learning. Students will make a quiz using functions. They will learn about a computational concept called functions. Self Learning Lessons for Scratch Jr. We believe that coding is one of the best ways to express self and problem solve and can be taught to kids of age of 5 and above also. Scratch Jr. is a free application that helps kids of age 5 above to code interactive stories and games. However, there are less resources available which can help kids and their parents to start building the stories and interactive games. We have designed a set of 10 lessons to teach kids to code on Scratch Jr. These set of coding lessons have a main character called Luna who lives in a village in India and by making connection kids make interactive applications. Moreover, the lessons focus on the challenges of women in rural India and educate kids about the challenges . The coding lessons are about girls should dream, menstrual health, production consumption cycle of a product, etc. Kids get a booklet of a lesson and they read the instructions on the page and try to follow the instructions to maeon the stage. At certain points, there are thinking questions where kids are supposed to respond as per their experience and context which helps them connect and relate to the world they live in. The lessons are as follows, Lesson 1 Luna wants to be a pilot V3 Lesson 2 We all are unique V5
Does Coffee Affect Blood Sugar? A question that some folks ask is “Does coffee affect blood sugar?”. Most times folks who are asking this question about coffee and its affect on blood sugar are diabetics who are worried that they can no longer enjoy a cuppa joe. I’ll start by saying that the best practice is to start by trying to improve your blood sugar and therefore diabetes, especially type 2 diabetes with diet and exercise. In fact, if you have adult onset diabetes there is a good chance that just through diet alone, you can reduce or eliminate your need for medications and become essentially, diabetes free. However, returning to our original question about coffee and what is does to blood sugar, studies have shown a modest but predictable rise in blood sugar levels if you are diabetic. In healthy adults, caffeine has been shown to slightly impair insulin activity but not necessarily blood sugar. For healthy folks one could say that coffee does not affect blood sugar. But if you are diabetic then coffee does affect blood sugar, but this shouldn’t disallow you from enjoying a cup of coffee per day, though you should check with your physician.* Check out: The Cuisinart DCC-2600 review * Sources: Mayo Clinic and PCRM
How the US economy and education are already evolving The American sociological journal American Sociological Review (ASR) has published an article entitled “What is the future of the American education system?” The article discusses the impact of the technological revolution, the growth of digital learning, and the rise of “knowledge workers” as they compete for scarce educational resources and demand for the knowledge. In a section titled “The future of education in the 21st century,” ASR’s editor, John P. Miller, explains that the new digital technologies have enabled a new generation of “creative entrepreneurs” to “accelerate their career trajectories.” The technology allows these “creatives” to learn by taking online courses, reading textbooks, watching videos, or listening to lectures, among other ways. As the ASR article notes, the innovation is being driven by a new class of creators that is not only willing to do creative work, but to use the tools they have created to reach their “viable” career trajectures. “The rise of the creative economy is also fueling a new cohort of creatives who have found ways to leverage their talents for economic gain,” the ASF article notes. “These creative entrepreneurs are not just trying to maximize their wages; they are also looking to leverage the benefits of this new class to get ahead, often by leveraging the skills they have acquired through creative work to make money in the creative marketplace.” As a result, the “creativity workers” are creating new jobs, expanding the work force, and making a lot of money. In other words, the new creative entrepreneurs have a much higher chance of creating a job and making money than the traditional middle class who are employed in traditional jobs. The new creative economy in the US is also being fueled by new technologies. In fact, the tech sector has exploded in recent years. According to a 2014 study by the McKinsey Global Institute, there were 1.4 million “startups in the U.S. in 2015” compared to only 936,000 in 2013. The growth of these new startups is primarily driven by new technological platforms and services. According the McKinseys report, “new technologies are enabling entrepreneurs to innovate in ways that previously could only be realized through traditional methods of creating and selling products and services.” This new innovation has driven the rise in the demand for new creative technologies. ASR notes that “creating a new career for a creative worker is a highly lucrative and potentially disruptive business opportunity.” The ASR editor notes that while “creatively driven startups can generate millions of dollars in revenue and generate hundreds of new jobs for a given employee, many creative workers have difficulty finding a good-paying job because of their skill set.” “This makes it hard for these entrepreneurs to attract and retain employees,” the article continues. “To attract and keep talented creative workers, these startups need to find ways to differentiate themselves by offering creative work and offering an alternative career path for these workers.” The new “creativists” also need to be better trained. ASRM notes that the “new creative class” will have to compete for the attention of the existing creative workforce. The article notes that, in the new economy, “creators can’t compete with the current creative class simply by offering a higher level of work or more creative opportunities. Instead, they will have a higher chance to attract new talent by providing new creative opportunities to the existing talented creative workforce.” As the new “Creativists,” these new “solution” creative workers are “looking to create new jobs and new revenue opportunities for themselves and their peers,” according to ASRM. These new “revenue opportunities” will likely include new jobs as well as new services and products. This new “wealthy class” of creative workers will also have a lot to lose. According a recent report by the Federal Reserve Bank of New York, “In the coming years, creative workers and those who create new creative work will be less likely to earn a high wage. This could lead to an increase in the number of temporary workers and other low-wage workers, a reduction in the overall number of full-time jobs and fewer jobs that pay a living wage, and, perhaps most important, lower wages and longer working hours for many of the workers.” As an example, the article notes: “For many creative professionals, a high-wage, temporary job may be the only way to survive. For some creative professionals in particular, this is an attractive alternative to a high level of self-employment.” However, according to the ASRM article, “a high-paying, temporary or low-paying position could mean the loss of a lot more of creative talent than previously realized. It could mean a decrease in creative-based careers for creative workers as well.” ASRM states that “the new class, the creative-worker, may have little choice but to enter the new labor market to find work that pays a living and health-care wage.” According to the article, the increasing demand for
Volumetric flask A volumetric flask (measuring flask or graduated flask) is a piece of laboratory apparatus, a type of laboratory flask, calibrated to contain a precise volume at a certain temperature. Volumetric flasks are used for precise dilutions and preparation of standard solutions. These flasks are usually pear-shaped, with a flat bottom, and made of glass or plastic. The flask's mouth is either furnished with a plastic snap/screw cap or fitted with a joint to accommodate a PTFE or glass stopper. The neck of volumetric flasks is elongated and narrow with an etched ring graduation marking. The marking indicates the volume of liquid contained when filled up to that point. The marking is typically calibrated "to contain" (marked "TC" or "IN") at 20 °C and indicated correspondingly on a label. The flask's label also indicates the nominal volume, tolerance, precision class, relevant manufacturing standard and the manufacturer's logo. Volumetric flasks are of various sizes, containing from 1 milliliter to 20 liters of liquid. A borosilicate volumetric flask Borosilicate volumetric flask, 250 ml, with plastic stopper Volumetric flasks of various sizes. Volumetric flasks are generally colourless but may be amber-coloured for the handling of light-sensitive compounds such as silver nitrate or vitamin A. A modification of the volumetric flask exists for dealing with large quantities of solids that are to be transferred into a volumetric vessel for dissolution. Such a flask has a wide mouth and known as a Kohlrausch volumetric flask. This kind of volumetric flask is commonly used in analysis of the sugar content in sugar beets. While conventional volumetric flasks have a single mark, industrial volumetric tests in analytical chemistry and food chemistry may employ specialized volumetric flasks with multiple marks to combine several accurately measured volumes. A highly specialized kind of the volumetric flask is the Le Chatelier flask for use with the volumetric procedure in specific gravity determination.[6] See alsoEdit 1. ^ ASTM E288 - 10 Standard Specification for Laboratory Glass Volumetric Flasks. 2. ^ ASTM E542 - 01(2007) Standard Practice for Calibration of Laboratory Volumetric Apparatus. 3. ^ ASTM E694 - 99(2010) Standard Specification for Laboratory Glass Volumetric Apparatus. 4. ^ ISO 1042:1998 Laboratory glassware – One-mark volumetric flasks. 5. ^ GOST 1770-74 Laboratory volumetric glassware. Cylinders, beakers, measuring flasks, test tubes. General specifications. 6. ^ ASTM C188 - 09 Standard Test Method for Density of Hydraulic Cement. See alsoEdit
You are here COVID-19 Rapid Gender Assessment - South Africa 2020 The first confirmed COVID-19 patient in South Africa was a traveler returning from Italy who was diagnosed on March 5, 2020. Like most of its neighbours, South Africa responded swiftly by adopting a series of lockdown measures. The primary aim of these measures was to slow down the spread of the pandemic and give its health services an opportunity to prepare for the expected increase in cases. Comprehensive closures of educational institutions were in effect between mid-March and 24 August 2020, affecting approximately 14.6 million learners of all ages. This report summarizes the findings of a Computer Assisted Telephonic Interview (CATI) rapid gender assessment (RGA) survey measuring the effects of COVID-19 on women and men in South Africa. The study was commissioned by UN Women and UNFPA to investigate the effects of COVID-19 and its associated movement restrictions on the socio-economic conditions of women and men, identify appropriate program interventions, and select advocacy messages that can be used to improve their well-being. See also the key highlights in infographics.
You asked: What are the main cities of Cambodia? What are the 5 major cities in Cambodia? Phnom Penh, Cambodia’s capital and largest city, is home to around 1 in every 10 of the country’s residents. Biggest Cities In Cambodia. Rank Biggest Cities in Cambodia Population in 2008 Census 2 Ta Khmau 195,898 3 Battambang 180,853 4 Serei Saophoan 181,396 5 Siem Reap 174,265 What are major cities in Cambodia? The largest city in Cambodia is Phnom Penh, with a population of 1,573,544 people. Name 2021 Population Phnom Penh 1,573,544 Takeo 843,931 Sihanoukville 156,691 Battambang 150,444 How many cities are in Cambodia? The Kingdom of Cambodia has 24 provinces and city. Is Cambodia expensive? Cambodia is a very cheap travel destination, even by Southeast Asian standards. … They’re often far more expensive than the Cambodian food and never quite as good. It’s possible to book private transportation between cities at a cheap cost, but the public transportation is surprisingly good and very affordable. What religion is practiced in Cambodia? THIS IS INTERESTING:  Is Manila Bay a fresh water? Travel in you
term% ls -F term% cat index.txt ATOF(2) System Calls Manual ATOF(2) atof, atoi, atol, charstod, strtod, strtol, strtoul - convert text to #include <u.h> #include <libc.h> double atof(char *nptr) int atoi(char *nptr) long atol(char *nptr) double charstod(int (*f)(void *), void *a) double strtod(char *nptr, char **rptr) long strtol(char *nptr, char **rptr, int base) ulong strtoul(char *nptr, char **rptr, int base) /* Alef only */ int strtoi(byte *nptr, byte **rptr, int base) uint strtoui(byte *nptr, byte **rptr, int base) float strtof(byte *nptr, byte **rptr); Atof, atoi, and atol convert a string pointed to by nptr to floating, integer, and long integer representation respectively. The first un‐ recognized character ends the string. Leading C escapes are under‐ stood, as in strtol with base zero. Atof recognizes an optional string of tabs and spaces, then an optional sign, then a string of digits optionally containing a decimal point, then an optional or followed by an optionally signed integer. Atoi and atol recognize an optional string of tabs and spaces, then an optional sign, then a string of decimal digits. Strtod, strtol, and strtoul behave similarly to atof and atol and, if rptr is not zero, set *rptr to point to the input character immediately after the string converted. Strtol and strtoul interpret the digit string in the specified base, from 2 to 36, each digit being less than the base. Digits with value over 9 are represented by letters, a-z or A-Z. If base is 0, the input is interpreted as an integral constant in the style of C (with no suf‐ fixed type indicators): numbers are octal if they begin with hexadeci‐ mal if they begin with or otherwise decimal. Strtoul does not recog‐ nize signs. Charstod interprets floating point numbers like atof, but it gets suc‐ cessive characters by calling (*f)(a). The last call to f terminates the scan, so it must have returned a character that is not a legal con‐ tinuation of a number. Therefore, it may be necessary to back up the input stream one character after calling charstod. The routines strtol and strtoul are renamed strtoi and strtoui and re‐ turn type int and uint. There is no charstod or atof. Instead, strtof is like a floating-point base 10 strtoi. Zero is returned if the beginning of the input string is not inter‐ pretable as a number; even in this case, rptr will be updated. These routines set errstr. Atoi and atol accept octal and hexadecimal numbers in the style of C, contrary to the ANSI specification.
2.7 COVID-19 part 1: Viruses, Lungs and Vaccines As I write we are in the midst of a world-wide epidemic on a scale unprecedented in modern times. What we know about the virus and the epidemic is shifting at such a pace that it’s only by watching key websites and following the news that you can keep up. This blog is no  substitute for that. It just fills in some of the scientific terminology and key concepts. The main scientific topics seem to me to be: viruses, lungs, vaccines, epidemics and social behaviour.  As I am not a specialist in any of these fields, let me know if you spot an error. Here we go! The image above is a representation of a few viruses that cause the COVID-19 disease, generated by a computer from a photograph taken under an electron microscope – a very high magnification microscope. This virus caused the outbreak of respiratory illness first detected in Wuhan, China in 2019. The illness has been named coronavirus disease 2019 (COVID-19). The virus that causes it is named SARS-COV-19 to reflect it’s similarity to the related coronavirus that caused the earlier SARS outbreak (Severe Acute Respiratory Syndrome) This image was isolated from a patient in the U.S.A. It was taken through an extremely high powered microscope, known as a scanning electron microscope and shows multiple copies of the virus (round gold objects) surrounding an intact cell (rugby ball shape in the centre) cultured in the lab. Although the precise position and shape of the cell from the which the viruses are emerging is not clear, it is easy to see that viruses are much smaller things than cells. The corona virus is roughly 100 times smaller than a cell[i]. Strange though it may seem, it’s an open question whether a virus is a living thing or not. It depends on your definition of “living”. Virologists describe them as leading “a kind of borrowed life.”[ii] This ambiguity arises because they are unable reproduce themselves; they rely on breaking into living cells and commandeering their machinery. This is why they are so dangerous: the cells they enter are destroyed in the process. This diagram of a coronavirus (not COVID-19 specifically) shows the basic architecture of a virus:  It’s an amazing assembly of large and giant molecules – an extraordinary piece of engineering. On the left you can see it’s outer shape – a sphere in this case, but quite different in other cases. The red coloured surface (envelope) is made of oily molecules (lipids) and is studded with various types of protein molecule that penetrate through to the interior. It’s this oily envelope that soap is able to break up when hand washing. Just a few weeks ago (19th February 2020), the big pink protein, called spike glycoprotein S was identified by a team at the University of Texas[iii]  as the key molecule that locks on to cells in the lungs. A reader in Malaysia, who is a glycoprotein scientist, points out that unfortunately this ‘spike’ molecule is different from that of its predecessor SARS-CoV-1. This means the same vaccine and antiviral drug approaches may not necessarily work for COVID-19. The envelope is a protective container inside which lies the blueprint for making more viruses – the RNA. This is very similar to DNA and serves the same function, providing the vital genetic information for the production of new viruses. What a virus does not contain however is the machinery to use this blueprint to reproduce itself. Instead it breaks through the outer surface of living cells, much larger than itself, and uses their machinery to reproduce its RNA rather than the cell’s own DNA. It’s a freeloader! COVID-19 is a specific, recently mutated version of a coronavirus.  The coronavirus family is very familiar to virologists as its various members are associated with the common cold, as well as more severe disease such as Middle East respiratory syndrome (MERS) and Severe Acute Respiratory Syndrome (SARS). Lungs are the particular organs in the body that contain the specific type of cells the virus latches on to. This diagram shows the airways of the lung branching out across the lungs from the central windpipe (trachea). The tip of one of the smallest branches is enlarged to show how the cavity containing air you breathe in is surrounded by tiny blood vessels. This is where oxygen passes from the airways into the arteries (red) and carbon dioxide passes out the other way from the veins. The cells that line this cavity, are the target for the coronavirus. Like the virus itself, these cells also have protein molecules projecting out of their surface. The fatal interaction occurs when the protein sticking out of the virus “matches” the protein sticking out of the cell. “Matching” here means that the protein on the virus has complementary features to those on the cell; rather as a key has a complementary shape to the lock into which it fits. A few weeks ago, on 4th March 2020, a team at Westlake University in Hangzhou identified the structure of the receptor protein on the surfaces of the respiratory cells and worked out how it interacts with the protein on the surface of the virus.[iv] Knowing the structure of the key (the virus protein ) and the lock (the protein in the lung cells) could theoretically be a starting point for developing drugs. In principle, pharmacological research proceeds on two fronts: first, looking for vaccine; second look for an antiviral drug. The “spike “ protein on the surface of the virus could be a promising target for a vaccine. It is likely this could be developed over the coming year. It would stimulate the immune system to destroy viruses emerging from infected cells. One of our readers sent this link to a very well-made animation video that explains very clearly the whole process of the disease, its spread and how we can slow it. Drug development Finding a drug that prevents a virus entering a cell in the first place, by damaging it or preventing it reproducing,  would be “new territory”, according to a virologist at Loyola University in Chicago. Antiviral drugs are proving hard to develop because of the risk of damaging the very cells the virus is entering. Some, such as aciclovir (Zovirax) for herpes are nevertheless emerging. However, an alternative route is to see whether drugs already proven to be effective might also work against the COVID-19 virus. The advantage of “re-purposing” existing drugs is that they will have already been tested for safety, toxicity and ability to remain intact in the body. This shortens the time needed for trials. News has just broken of trials of just such a drug, known as Favilavir or Avigen[v]. It was approved in China On March 15, 2020 for the treatment of influenza and also for use in clinical trials for CPVOD-19. One week later, on 22 March, Italy approved the drug for experimental use against COVID-19 and began conducting trials. But, as the Italian Pharmaceutical Agency reminded the public, existing evidence in support of this drug is scant and preliminary. A vaccine works by provoking the immune system to produce antibodies to an unwanted substance in the body. The vaccine consists of some disabled fragment of the offending molecule (known as an antigen)  – for example, it may just be part of one of the protein molecules on the outer surface of the virus. This can be sufficient to trick the immune system into developing antibodies to the virus. Antibodies are giant protein molecules, produced in specialised cells of the immune system, which attach to the alien molecules and signal to the body’s defences that they are to be disposed of.   Thus, scientists across the world will be working overtime to find some kind of fragment or disabled version of the “spike” protein on the surface of the virus that will provoke the body to produce antibodies to it. This would be injected into our bodies when we are vaccinated. The immune system easily fights off this fragment but, crucially, it also “remembers” it by keeping copies of the antibodies that did this. If the real virus should subsequently present itself these “archive” copies are used to mass-produce the appropriate antibodies quickly, on a huge scale. These then go on  to eliminate the viruses. That’s how vaccines work. But it’s no easy task developing a practicable vaccine: it has to be proven to be safe as well as effective. The U.S. Centers for Disease Control and Prevention consider that the earliest one could be available is in a year to a year and a half.  Part 2 of this extended blog will follow shortly. It explores some of the scientific ideas about  epidemics and social behaviour. © Andrew Morris 24th March 2020 Read more According to the UK Government website[vi], coronaviruses are a large family of viruses with some causing less-severe disease, such as the common cold, and others causing more severe disease such as Middle East respiratory syndrome (MERS) and Severe Acute Respiratory Syndrome (SARS) coronaviruses. According to a very readable National Geographic article[vii], early data on COVID-19 shows that about 82 percent of cases have milder symptoms. In previous SARS infections, particular lung cells called cilia get destroyed and fill the airways with debris and fluid. The immune system clears away the damage but sometimes it overreacts, killing healthy cells and adding to the debris. That’s when people have to be put on ventilators. The Live science website[viii] has useful and readable information about the disease. Amongst other things, it tells us that coronaviruses we know about “generally cannot survive for more than a few hours on surfaces outside a human host”, but, according to the US National Center for Immunization and Respiratory Diseases, “scientists don’t yet know how long the novel coronavirus can survive outside a host”. Links to sources i. A typical cell is around 12 micrometres – around 5 – 10 would fit across a human hair. Coronavirus is about 0.12 micrometres across ii. https://www.scientificamerican.com/article/are-viruses-alive-2004/ iii https://www.livescience.com/how-coronavirus-infects-cells.html iv https://www.livescience.com/how-coronavirus-infects-cells.html v https://en.wikipedia.org/wiki/Favipiravir vi https://www.gov.uk/government/publications/wuhan-novel-coronavirus-background-information/wuhan-novel-coronavirus-epidemiology-virology-and-clinical-features vii https://www.nationalgeographic.co.uk/science-and-technology/2020/02/heres-what-coronavirus-does-body viii https://www.livescience.com/what-are-coronaviruses.html
Tensions And Release Every speech should have a magic moment The application of Tensions and Release is critical in public speaking and music.  In speaking, the process begins with a buildup of stress or pressure. The audience senses the buildup and processes the information to translate it into emotions. Finally, the audience anticipates a point of Release. The pressure continues to build until the speaker releases the Tensions, giving the audience a moment to rest. In that period of rest, both speaker and audience reward themselves emotionally.  The drama created and expectations of a resolution hold the audience’s attention. The anticipation of what’s coming next keeps the storyline moving forward. The amount and quality of Tensions created are significant. It should be appropriate for the moment and that audience. Tensions can be chaos, confusion, unrest, instability, anticipation, or even curiosity. What’s most important is the effect it awakens in the minds and hearts of the audience.  The feeling the audience experiences after the resolution is critical.  Timing also plays a vital role in the process. Many speakers use some of the same techniques used in music to create a Release. We all know them as loud, soft, rhythm, tone, and silence.  In public speaking, we call them different names. Still, they produce the same feelings and results we experience when listening to music. Be mindful that everyone will not have the same physical experience; however, there are six basic emotions to which all humans respond. The 1991 World Champion of Public Speaking, David Brooks, often spoke about those six emotions – happiness, sadness, anger, fear, surprise, and disgust. Speakers should match their body language with their feelings during delivery. The quality and amount of stress depend upon what the moment demands. While it is crucial to produce adequate pressure, speakers must also know the right time to release. If the resolution is too early or too late, that will ruin the experience. Instead, release at precisely the right time, and you will produce a magical moment.  Magical moments are segments of a speech remembered long after a speaker has made their delivery. The buildup leading to your Release can create a magic moment. The Release can be gradual or abrupt. It requires expectations from both the speaker and the audience. Both must move in concert as they advance towards a climax. As a rule, every speech should have a magic moment. Tensions are critical moments for both speaker and audience. The audience is an active but silent contributor as the drama unfolds. However, some audiences don’t like to take a wild roller coaster ride. Therefore, the number of times you insert Tensions and Releases in a speech matter. How many times can you handle the big dipper? Speakers must never forget the purpose of Tensions and Releases. They keep the storyline moving forward. Keep an eye on the facial expressions of your audience. Strategically apply your Tensions to match the emotions in the room. Remember, the speaker creates the entire process, then calls upon the audience to be curious or excited or anticipate what might come next. The effective use of Tensions and Release in speaking can be a game-changer. It is a process that produces immediate results. When you notice audiences are eager to take some action during the moment of silence after your presentation, you will understand the power of the process. It is a power that does not last a minute; it is a minute that will last a lifetime. Make a conscious effort to master the application of Tensions and Releases in your presentations. Practice using all six emotions in your everyday conversations. And you will come to realize the power of adding Tensions and Releases to your style of communication. Author: HenryOMiller
Climate explained: does your driving speed make any difference to your car’s emissions? SP Photo/Shutterstock Ralph Sims, Massey University Does reducing speed reduce emissions from the average car? Every car has an optimal speed range that results in minimum fuel consumption, but this range differs between vehicle types, design and age. Typically it looks like this graph below: fuel consumption rises from about 80km/h, partly because air resistance increases. Author provided But speed is only one factor. No matter what car you are driving, you can reduce fuel consumption (and therefore emissions) by driving more smoothly. This includes anticipating corners and avoiding sudden braking, taking the foot off the accelerator just before reaching the peak of a hill and cruising over it, and removing roof racks or bull bars and heavier items from inside when they are not needed to make the car lighter and more streamlined. Read more: Climate explained: the environmental footprint of electric versus fossil cars Driving wisely In New Zealand, EnergyWise rallies used to be run over a 1200km course around the North Island. They were designed to demonstrate how much fuel could be saved through good driving habits. The competing drivers had to reach each destination within a certain time period. Cruising too slowly at 60-70km/h on straight roads in a 100km/h zone just to save fuel was not an option (also because driving too slowly on open roads can contribute to accidents). The optimum average speed (for both professional and average drivers) was typically around 80km/h. The key to saving fuel was driving smoothly. In the first rally in 2002, the Massey University entry was a brand new diesel-fuelled Volkswagen Golf (kindly loaned by VW NZ), running on 100% biodiesel made from waste animal fat (as Z Energy has been producing). A car running on fossil diesel emits about 2.7kg of carbon dioxide per litre and a petrol car produces 2.3kg per litre. Using biofuels to displace diesel or petrol can reduce emissions by up to 90% per kilometre if the biofuel is made from animal fat from a meat works. The amount varies depending on the source of the biofuel (sugarcane, wheat, oilseed rape). And of course it would be unacceptable if biofuel crops were replacing food crops or forests. Regardless of the car, drivers can reduce fuel consumption by 15-20% by improving driving habits alone – reducing emissions and saving money at the same time. Read more: Climate explained: what each of us can do to reduce our carbon footprint Fuel efficiency When you are thinking of replacing your car, taking into account fuel efficiency is another important way to save on fuel costs and reduce emissions. Many countries, including the US, Japan, China and nations within the European Union, have had fuel efficiency standards for more than a decade. This has driven car manufacturers to design ever more fuel-efficient vehicles. Most light-duty vehicles sold globally are subject to these standards. But Australia and New Zealand have both dragged the chain in this regard, partly because most vehicles are imported. Read more: New Zealand also remains hesitant about introducing a “feebate” scheme, which proposes a fee on imported high-emission cars to make imported hybrids, electric cars and other efficient vehicles cheaper with a subsidy. In New Zealand, driving an electric car results in low emissions because electricity generation is 85% renewable. In Australia, which still relies on coal-fired power, electric cars are responsible for higher emissions unless they are recharged through a local renewable electricity supply. Fuel and electricity prices will inevitably rise. But whether we drive a petrol or electric car, we can all shield ourselves from some of those future price rises by driving more efficiently and less speedily. Read more: Climate explained: why switching to electric transport makes sense even if electricity is not fully renewable The Conversation Climate explained: the environmental footprint of electric versus fossil cars The best way to compare emissions from electric cars is to assess all phases of a life cycle analysis. from, CC BY-ND Md Arif Hasan, Victoria University of Wellington and Ralph Brougham Chapman, Victoria University of Wellington There is a lot of discussion on the benefits of electric cars versus fossil fuel cars in the context of lithium mining. Please can you tell me which one weighs in better on the environmental impact in terms of global warming and why? Electric vehicles (EVs) seem very attractive at first sight. But when we look more closely, it becomes clear that they have a substantial carbon footprint and some downsides in terms of the extraction of lithium, cobalt and other metals. And they don’t relieve congestion in crowded cities. In this response to the question, we touch briefly on the lithium issue, but focus mainly on the carbon footprint of electric cars. The increasing use of lithium-ion batteries as a major power source in electronic devices, including mobile phones, laptops and electric cars has contributed to a 58% increase in lithium mining in the past decade worldwide. There seems little near-term risk of lithium being mined out, but there is an environmental downside. The mining process requires extensive amounts of water, which can cause aquifer depletion and adversely affect ecosystems in the Atacama Salt Flat, in Chile, the world’s largest lithium extraction site. But researchers have developed methods to recover lithium from water. Turning to climate change, it matters whether electric cars emit less carbon than conventional vehicles, and how much less. Read more: Climate explained: why don’t we have electric aircraft? Emissions reduction potential of EVs The best comparison is based on a life cycle analysis which tries to consider all the emissions of carbon dioxide during vehicle manufacturing, use and recycling. Life cycle estimates are never entirely comprehensive, and emission estimates vary by country, as circumstances differ. In New Zealand, 82% of energy for electricity generation came from renewable sources in 2017. With these high renewable electricity levels for electric car recharging, compared with say Australia or China, EVs are better suited to New Zealand. But this is only one part of the story. One should not assume that, overall, electric cars in New Zealand have a close-to-zero carbon footprint or are wholly sustainable. A life cycle analysis of emissions considers three phases: the manufacturing phase (also known as cradle-to-gate), the use phase (well-to-wheel) and the recycling phase (grave-to-cradle). The manufacturing phase In this phase, the main processes are ore mining, material transformation, manufacturing of vehicle components and vehicle assembly. A recent study of car emissions in China estimates emissions for cars with internal combustion engines in this phase to be about 10.5 tonnes of carbon dioxide (tCO₂) per car, compared to emissions for an electric car of about 13 tonnes (including the electric car battery manufacturing). Emissions from the manufacturing of a lithium-nickel-manganese-cobalt-oxide battery alone were estimated to be 3.2 tonnes. If the vehicle life is assumed to be 150,000 kilometres, emissions from the manufacturing phase of an electric car are higher than for fossil-fuelled cars. But for complete life cycle emissions, the study shows that EV emissions are 18% lower than fossil-fuelled cars. Read more: How electric cars can help save the grid The use phase In the use phase, emissions from an electric car are solely due to its upstream emissions, which depend on how much of the electricity comes from fossil or renewable sources. The emissions from a fossil-fuelled car are due to both upstream emissions and tailpipe emissions. Upstream emissions of EVs essentially depend on the share of zero or low-carbon sources in the country’s electricity generation mix. To understand how the emissions of electric cars vary with a country’s renewable electricity share, consider Australia and New Zealand. In 2018, Australia’s share of renewables in electricity generation was about 21% (similar to Greece’s at 22%). In contrast, the share of renewables in New Zealand’s electricity generation mix was about 84% (less than France’s at 90%). Using these data and estimates from a 2018 assessment, electric car upstream emissions (for a battery electric vehicle) in Australia can be estimated to be about 170g of CO₂ per km while upstream emissions in New Zealand are estimated at about 25g of CO₂ per km on average. This shows that using an electric car in New Zealand is likely to be about seven times better in terms of upstream carbon emissions than in Australia. The above studies show that emissions during the use phase from a fossil-fuelled compact sedan car were about 251g of CO₂ per km. Therefore, the use phase emissions from such a car were about 81g of CO₂ per km higher than those from a grid-recharged EV in Australia, and much worse than the emissions from an electric car in New Zealand. The recycling phase The key processes in the recycling phase are vehicle dismantling, vehicle recycling, battery recycling and material recovery. The estimated emissions in this phase, based on a study in China, are about 1.8 tonnes for a fossil-fuelled car and 2.4 tonnes for an electric car (including battery recycling). This difference is mostly due to the emissions from battery recycling which is 0.7 tonnes. This illustrates that electric cars are responsible for more emissions than their petrol counterparts in the recycling phase. But it’s important to note the recycled vehicle components can be used in the manufacturing of future vehicles, and batteries recycled through direct cathode recycling can be used in subsequent batteries. This could have significant emissions reduction benefits in the future. So on the basis of recent studies, fossil-fuelled cars generally emit more than electric cars in all phases of a life cycle. The total life cycle emissions from a fossil-fuelled car and an electric car in Australia were 333g of CO₂ per km and 273g of CO₂ per km, respectively. That is, using average grid electricity, EVs come out about 18% better in terms of their carbon footprint. Likewise, electric cars in New Zealand work out a lot better than fossil-fuelled cars in terms of emissions, with life-cycle emissions at about 333 g of CO₂ per km for fossil-fuelled cars and 128g of CO₂ per km for electric cars. In New Zealand, EVs perform about 62% better than fossil cars in carbon footprint terms.The Conversation Md Arif Hasan, PhD candidate, Victoria University of Wellington and Ralph Brougham Chapman, Associate Professor , Director Environmental Studies, Victoria University of Wellington Legislative action regarding vehicle emissions is overdue, and needs urgent attention by the federal government. Robin Smit, The University of Queensland; Jake Whitehead, The University of Queensland, and Nic Surawski, University of Technology Sydney When it comes to road transport, Australia is at risk of becoming a climate villain as we lag behind international best practice on fuel efficiency. Road transport is one of the main sources of greenhouse gas emissions and represented 16% of Australia’s total carbon dioxide emissions in 2000, growing to 21% in 2016. Total CO₂ emissions from road transport increased by almost 30% in the period 2000-16. Fuel efficiency (CO₂ emission) standards have been adopted in around 80% of the global light vehicle market to cap the growth of transport emissions. This includes the United States, the European Union, Canada, Japan, China, South Korea and India – but not Australia. Read more: Emissions standards on cars will save Australians billions of dollars, and help meet our climate targets If Australia had introduced internationally harmonised emissions legislation three years ago, households could have made savings on fuel costs to the tune of A$1 billion. This shocking figure comes from our preliminary calculations looking at the effect of requiring more efficient vehicles to be sold in Australia. A report, published yesterday by Transport Energy/Emission Research, looked at what Australia has achieved in vehicle fuel efficiency and CO₂ standards over the past 20 years. While Australia has considered and tried to impose standards a number of times, sadly these attempts were unsuccessful. Legislative action on vehicle CO₂ emissions is long overdue and demands urgent attention by the Australian government. Australian consumers are increasingly buying heavier vehicles with bigger emissions. How did Australia get here? The most efficient versions of vehicle models offered in Australia are considerably less efficient than similar vehicles in other markets. Australia could increasingly become a dumping ground for the world’s least efficient vehicles with sub-par emissions performance, given our lack of fuel efficiency standards. This leaves us on a dangerous path towards not only higher vehicle emissions, but also higher fuel costs for passenger travel and freight. Australia has attempted to impose CO₂ or fuel efficiency standards on light vehicles several times over the past 20 years, but without success. While the federal government was committed to addressing this issue in 2015, four years later we are still yet to hear when – or even if – mandatory fuel efficiency standards will ever be introduced. The general expectation appears to be that average CO₂ emission rates of new cars in Australia will reduce over time as technology advances overseas. In the absence of CO₂ standards locally, it is more likely that consumers will continue to not be offered more efficient cars, and pay higher fuel costs as a consequence. Estimating the fuel savings Available evidence suggests Australian motorists are paying on average almost 30% more for fuel than they should because of the lack of fuel efficiency standards. The Australian vehicle fleet uses about 32 billion litres of fuel per year. Using an Australian fleet model described in the TER report, we can make a conservative estimate that the passenger vehicle fleet uses about half of this fuel: 16 billion litres per year. New cars entering the fleet each year would represent about 5% of this: 800 million litres per year. So assuming that mandatory CO₂ standards improve fuel efficiency by 27%, fuel savings would be 216 million litres per year. In the last three years, the average fuel price across Australia’s five major cities is A$1.33 per litre. This equates to a total savings of A$287 million per year, although this would be about half the first year as new cars are purchased throughout the year and travel less, and would reduce as vehicles travel less when they age. The savings are accumulative because a car purchased in a particular year continues to save fuel over the following years. The table below shows a rough calculation of savings over the three year period (2016-2018), for new cars sold in the same period (Model Years 2016, 2017 and 2018). As a result, over a period of three years, A$1.3 billion in potential savings for car owners would have accumulated. Policy has come close, but what are we waiting for? The Australian government is not progressing any measures to introduce a fuel efficiency target. In fact, it recently labelled Labor’s proposed fuel efficiency standard as a “car tax”. But Australia has come close to adopting mandatory vehicle CO₂ emission standards in the past. In late 2007, the Labor government committed to cutting emissions to achieve Australia’s obligations under the Kyoto Protocol. The then prime minister, Kevin Rudd, instructed the Vehicle Efficiency Working Group to: … develop jointly a package of vehicle fuel efficiency measures designed to move Australia towards international best practice. Then, in 2010, the Labor government decided mandatory CO₂ emissions standards would apply to new light vehicles from 2015. But a change in government in 2013 meant these standards did not see the light of day. The amount of fuel that could have been saved is A$287 million per year. Things looked promising again when the Coalition government released a Vehicle Emissions Discussion Paper in 2016, followed by a draft Regulation Impact Statement in the same year. The targets for adopting this policy in 2025, considered in the draft statement, were marked as “strong” (105g of CO₂ per km), “medium” (119g/km) and “mild” (135g/km) standards. Under all three targets, there would be significant net cost savings. But since 2016, the federal government has taken no further action. It begs the question: what exactly are we waiting for? The technical state of play Transport Energy/Emission Research conducted preliminary modelling of Australian real-world CO₂ emissions. This research suggests average CO₂ emission rates of the on-road car fleet in Australia are actually increasing over time and are, in reality, higher than what is officially reported in laboratory emissions tests. In fact, the gap between mean real-world emissions and the official laboratory tests is expected to grow from 20% in 2010 to 65% in 2025. This gap is particularly concerning when we look at the lack of support for low-emissions vehicles like electric cars. Read more: Why battery-powered vehicles stack up better than hydrogen Given that fleet turnover is slow, the benefits of fuel efficiency standards would only begin to have a significant effect several years into the future. With continuing population growth, road travel will only increase further. This will put even more pressure on the need to reduce average real-world CO₂ emission rates, given the increasing environmental and health impacts of the vehicle fleet. Even if the need to reduce emissions doesn’t convince you, the cost benefits of emissions standards should. The sale of less efficient vehicles in Australia means higher weekly fuel costs for car owners, which could be avoided with the introduction of internationally harmonised emissions legislation.The Conversation Robin Smit, Adjunct professor, The University of Queensland; Jake Whitehead, Research Fellow, The University of Queensland, and Nic Surawski, Lecturer in Environmental Engineering, University of Technology Sydney Australia still lags behind in vehicle emissions testing File 20171026 13327 1i52oqe.jpg?ixlib=rb 1.1 How are emissions from vehicles measured? Real Driving Emissions Australia is years behind Image 20170316 20811 1b5h42i An emissions cap could save Australians up to A$500 each year in fuel costs. Petrol image from Scott Ferraro, Monash University and Claire Painter, Monash University The cheapest way for Australia to cut greenhouse gas emissions is to put a cap on car emissions. It would be so cheap, in fact, that it will save drivers money. The Conversation According to analysis from ClimateWorks, the toughest proposed standard would help Australia achieve about 6% of its 2030 emission reduction target, and save drivers up to A$500 each year on fuel. The federal government is looking at policy options to meet Australia’s 2030 emissions target of 26-28% below 2005 levels. Last year it established a ministerial forum to look at vehicle emissions and released a draft Regulation Impact Statement for light vehicles (cars, SUVs, vans and utilities) in December. There is no reason for the government to delay putting the most stringent emissions standard on cars. Cars getting cleaner, but not in Australia Australia currently does not have carbon dioxide emission standards on light vehicles. CO₂ standards work by improving the overall efficiency of the vehicle (the amount of CO₂ emitted per kilometre). These are different from fuel quality standards, which regulate the quality of fuels used by vehicles, and noxious emissions standards, which monitor a car’s emissions of noxious gases and particulates. Currently, CO₂ emission standards cover over 80% of the global light automotive market. The lack of standards here means that Australia’s cars are less efficient than in many other countries, and this gap is set to widen. In 2015, the average efficiency of new cars sold in Australia (in grams of CO₂ emitted per km) was 184g per km. In the European Union, the average efficiency of new cars was 120g per km for passenger vehicles and 168g per km for light commercial vehicles (such as vans used as couriers). In the United States – the spiritual home of the gas-guzzler – it is 183g per km and set to improve to 105g per km in 2025. Australia’s cars account for about 10% of Australia’s greenhouse gas emissions, which are set to grow to 2030 if the market is left to its own devices. Helping meet Australia’s climate target In our submission to the draft Regulation Impact Statement, we confirmed that if the most stringent proposed target (105g per km) were introduced as proposed from 2020 to 2025, it would deliver 6% of Australia’s 2030 emissions reduction target. This would save A$49 per tonne of CO₂. Although there would be some costs in introducing the scheme, it would save A$13.9 billion by 2040 overall. This saves an extra additional 41 million tonnes of CO₂ by 2030, 140 million tonnes by 2040, and an extra A$8.1 billion overall by 2040 compared with the least stringent proposed target (135g per km by 2025). However, we found that a two-year delay would add an extra 18 million tonnes of CO₂ to the atmosphere, or 2% of the government’s 2030 carbon budget. Any reductions not achieved in vehicle emissions will need to be made up in other sectors, or purchased through international carbon permits, most likely at a higher cost. Savings on fuel and health The most stringent target delivers A$27.5 billion in total fuel savings by 2040, A$16.7 billion more than the least stringent standard. The draft regulations show that for an average car this is equal to a saving of A$197-295 a year for a driver doing 15,000km per year, and A$328-493 for a driver doing 25,000km per year. To put this in context, based on 2012 household energy costs data, this would cut household energy costs by up to 10%, with even greater savings for low-income households. But a two-year delay of the most stringent standard would also result in new car owners paying an extra A$4.9 billion in fuel costs by 2030, and an extra A$8.3 billion to 2040. The reduction in fuel use will also potentially reduce air pollution, resulting in better health outcomes. The most stringent standard will save deliver 2.6 times as much fuel as the least stringent standard, so should reduce health costs by a similar proportion. However, the introduction of emissions standards would need to occur in a way that does not increase noxious emissions such as nitrogen oxides. No reason to delay Given the enormous benefit of a more stringent standard, the government should also investigate an even more ambitious target. Our research shows a standard of 95g per km by 2025 will deliver even greater benefits and is technically feasible based on achievements in other markets. The EU is aiming for this level by 2020. While we also support improving fuel quality to reduce noxious emissions, research by the International Council on Clean Transportation (ICCT) shows that we do not need to improve Australia’s fuel quality standards before the introduction of standards to improve the overall efficiency of the vehicle. Similarly, despite discrepancies between on-road and in-lab performance of vehicles as seen in the Volkswagen emissions scandal, a standard will still provide significant savings to consumers and the environment. Standards alone are not the silver bullet. We’ll need a range of other measures to support emissions standards on cars to help improve efficiency and build consumer awareness of fuel-efficient vehicles. With Australian car manufacturing due to cease by the end of 2017, it is an ideal time to ensure that new cars bought into Australia are the most efficient available. This will set us on the path towards lower vehicle emissions while reducing costs for motorists and improving health. Scott Ferraro, Head of Implementation, ClimateWorks Australia, Monash University and Claire Painter, Project manager, ClimateWorks Australia, Monash University Australia: Queensland Cassowary Deaths By Cars The link below is to an article reporting on the worrying number of cassowary deaths in Queensland through collisions with cars. For more visit:
Driving and Diabetes By Eileen B. Wyner, NP Bulfinch Medical Group Eileen Wyner, NPPossessing a driver’s license is a rite of passage in our society. A driver’s license is seen as a gateway to independence and is a necessity for survival in many instances since many places in the US don’t have adequate public transportation. Driving is such a huge part of our lives, but there are instances when the ability to drive competently is also at issue. The American Diabetes Association (ADA) published a Position Statement on Diabetes and Driving in the 2014 Clinical Practice Recommendations. I would like to summarize the key points of this Position to provide an overview to help both people with diabetes and their health care providers have the best information about driving with diabetes. The process for identifying drivers with diabetes varies from state to state, depending on what type of vehicle the driver needs to be licensed for. In some states, questions such as “Do you have any medical condition that may interfere with the safe operation of a motor vehicle?” are asked at the initial application for license. These questions may then prompt the need for further medical evaluation. There is no need for a medical examination just because the driver has diabetes. Most often a medical evaluation would be requested when there has been a documented episode of hypoglycemia while driving. Visit the ADA Website for more information on specific rules for each state. Drivers with diabetes that are commercial drivers in interstate commerce have different rules and follow a set of uniform federal regulations. ALL drivers are subject to an examination every 2 years to update the driver’s ongoing general fitness. Drivers with diabetes managed with diet, exercise, and oral medications do not have any further requirements. Drivers who use insulin often require a more detailed medical evaluation so an exemption to drive and medical certification can be granted. Drivers for commercial motor vehicles, such as school bus drivers and vehicles that transport passengers or hazardous materials are subjected to more strict evaluations that differ state to state. There are many factors to consider when caring for the driver with diabetes. I want to be clear: a diagnosis of diabetes or the use of oral medications or insulin does not mean that driving ability is compromised. The ADA has determined that the single most significant factor associated with collisions for drivers with diabetes appears to be a recent history of severe hypoglycemia regardless of diabetes type or treatment. The ADA Workgroup on Hypoglycemia defines severe hypoglycemia as an event that disrupts cognitive motor function and requires the assistance of another person to treat the hypoglycemic event. The plan of assessment and care of the driver with diabetes needs to be individualized. It is important to not only review hypoglycemia awareness, but to also review the other conditions that could interfere with safe driving. These conditions may include decreased visual acuity due to retinopathy or cataracts, neuropathy that diminishes the sensation of the right foot, or sleep apnea which can result in daytime sleepiness. Drivers that have had a hypoglycemic event will need much closer evaluation and education. The driver may need re-education to address issues with mealtimes and dosing of medications (or medications may need to be adjusted altogether), further education about hypoglycemia awareness, and the best methods of treating low blood sugars. Drivers who have had episodes with severe hypoglycemia may also need to perform additional glucometer testing. People driving for long distances should have a good supply of glucose tablets easily available in the glove compartment or in the console. A supply of snacks such as packages of cheese and peanut butter crackers or nuts should also be stored in the front of the car with the driver and checked before each trip. Drivers who feel hypoglycemia occurring while driving should pull off the road immediately, put on their blinkers, and treat with a fast acting carbohydrate. Do not resume driving until blood sugar values are normalized. Finally, I advise that all of my patients with diabetes have a medical ID with them at all times. Symptoms of hypoglycemia may appear as if driving under the influence of alcohol or drugs, which can lead to losing precious treatment time if there is an incident where you are unable to identify yourself as having diabetes.  First responders are trained to look for things like a bracelet or necklace, or a card in the wallet. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
Reward yourself We don't actually observe a motive; rather, we infer that one exists based on the behavior w… Share your experience in the comments section. Clarity and choice can fuel a sense of mastery and autonomy, and both, in combination, can increase overall motivation as they satisfy basic psychological needs. If we have conflicting goals, for example, we may be more likely to avoid or procrastinate. They can signal the importance of particular behavior. Implicit motives predict our behavior far more accurately than do explicit motives, which are basically what we tell others about what motives us (McClelland, Koestner, & Weinberger, 1989). Humanistic psychology, a movement in psychology supporting the belief that humans, as individuals, are unique beings and should be recognized and treated as such by psychologists and psychiatrists. For example, if we have little or no need for achievement, we may experience negative affect, such as anxiety, shame, and embarrassment while engaging in that challenging task and will avoid or procrastinate as a result. McClelland, D. C., Koestner, R., & Weinberger, J. by John L. Parker Jr. Sigmund Freud didn't exactly invent the idea of the conscious versus unconscious mind, but he certainly was responsible for making it popular and this was one of his main contributions to psychology. ", Cite this page: N., Pam M.S., "MOTIVATION," in,, How to Know the Difference Between Rage and Anger, How to Deal With Your Teenager's Rebellious Behavior. Thanks to the internet where I found many tips how to overcome procrastination. One motive, usually the one most situationally appropriate, will be strongest and dominate our attention while other motives will be subordinate and lie relatively dormant. New York: Oxford University Press. When we tap into this well of energy, motivation endows the person with the drive and direction needed to engage with the environment in an adaptive, open-ended, and problem-solving sort of way (Reeve, 2015). Different authors define Psychology in different ways but in 1990, Feldman defines Psychology as the scientific study of human behavior and mental processes. Social contexts and external events act as antecedents to motives that cause or trigger motivational states. It seems it isn’t that simple to find the motivation to do this thing that is so important to us. While the fulfillment of physiological needs is about preserving wellbeing, satisfying psychological needs is about thriving and growing as a person (Reeve, 2015). Carver, C. S., & Scheier, M. F. (2003). Glad you enjoyed the post! Our motivation, when it originates from internal motives, as categorized into needs, cognitions, and emotions, is often experienced as more immediate and potent then extrinsic motivation. Often we may have to intervene in how our motivation is influenced by external incentives present in our environment or social context to make sure that we match those to high internal motives. Philosophers had always pondered the nature of mind. When we try to force ourselves to do something that contradicts those needs, these innate forces can be tough to overcome. Psychological needs for autonomy, mastery, and belonging direct our behavior in much the same way. How do self-attributed and implicit motives differ? Download 3 Positive Psychology Tools (PDF), download our three Goal Achievement Exercises for free, Motivation and What Really Drives Human Behavior, Motivation & Goal Achievement Masterclass©. [4] One such is the ideal that motivation is the driving force which gives purpose or direction to human and animal behaviours which operate at a conscious and subconscious level, without those behaviours would simply not occur. by Ricardo Semler This field is for validation purposes and should be left unchanged. An ICF certified coach and a Gottman Institute Certified Educator, Beata is on the Executive Committee for the Student Division of the International Positive Psychology Associations and has published and presented on subjects ranging the Flow Theory to learned helplessness. Short term goals work better for uninteresting activities as they boost commitment by providing feedback on progress more often, which further reinforces the effort to persist (Reeve, 2015). ′Autotelic′ is a word composed of two Greek roots: auto (self), and telos (goal). Flow: The Psychology of Optimal Experience. Chamber of Commerce (KvK) All needs are born either out of deficiency or need for growth. When the combination of antecedent conditions and the internal motives align, they create a ripe environment for engagement, which propels the action behavior. Then when I started working I had a same issue, because of which i got fired. People watch others exercise and become inspired to do the same. Our motives express themselves through behavior, engagement, psychophysiology, brain activations, and self-report. Motivation can also be inferred from the level of engagement. But most importantly, we are motivated to pursue them in the absence of external rewards or incentives. The study of motivation in psychology revolves around providing the best possible answers to two fundamental questions: what causes behavior, and why does behavior vary in its intensity? Explain motivation in terms of being intrinsic and extrinsic. This is … It has been defined as: sentience, awareness, subject ivity, the ability to experience or to feel, wakefulness, having a sense of selfhood, and the executive control system of the mind. Really interesting site with a great challenges verity—, Your email address will not be published. Full Bottle Wine Glass Target, Carrier Commercial Tech Support, What Is Daylighting In Architecture, Be With You Chinese Drama Eng Sub 2020, Dog Sayings Wall Art, Bupa Hospital List, Where To Buy Hand Puppets, Fullmetal Alchemist Ova Reflections,
Pesticide vs. Insecticide: What’s the Difference? Are you trying to decide how to protect your garden or crops? Read on to learn how a pesticide vs. insecticide can help you. Chances are you’ve heard the words pesticide and insecticide used interchangeably. But what’s the difference between the two? Well, you may be surprised to learn that while they are somewhat similar, they’re used for different purposes.  If you are someone who grows crops or manages a garden, it’s essential for you to understand the contrast between the two. Having this knowledge will ensure that your vegetation continues to thrive.  With that said, keep reading to learn the true difference between pesticide vs. insecticide. The Difference Between Pesticide and Insecticide Although pesticide and insecticide sound similar, there’s quite a bit of a difference between the two. Here’s a break down of each substance:  Insecticides are chemicals that destroy insects. They consist of ovicides and larvicides, which are used to destroy insect eggs and larvae. Agriculture, medicine, manufacturing, and customers both use insecticides. This chemical is credited with helping to boost farm production in the twentieth century. Almost all insecticides have the ability to have a major impact on ecosystems. However, the majority of them are harmful to human beings and wildlife. But other insecticides become diluted as they migrate across the food chain. There are two main insecticide classification groups: systematic insecticides and contact insecticides. Systematic insecticides consist of reoccurring and long-term production. But, contact insecticides have no ongoing activity. Not only that, but there are also three types of insecticides, which include the following: Natural insecticides: These include substances such as neem extracts, pyrethrum, and nicotine. Natural insecticides are produced by plants as a natural defense against insects. Organic Insecticides: Organic insecticides are chemical compounds that generally work via contact. Inorganic Incesticides: This category consists of metals. The type of activity that each insecticide performs determines how it will destroy or dismantle a pest. Furthermore, the type of activity that the insecticide produce helps users to understand whether or not it’ll be toxic to other life forms. The other life forms include birds, mammals, and fish. Insecticides are either non-repellent or repellent. Most group insects like ants can’t pick up on non-repellent insecticides, and they aren’t affected by them. However, when they return back to their habitats, they take the insecticides with them and infect the other pests. As time goes on, the chemical eventually kills off all of the ants, including the queen. Although this technique is slow, it’s effective in destroying the entire ant colony. But keep in mind that insecticides are very different from non-insecticidal repellents. Non-insecticidal repellents only deter insects, it doesn’t kill them. You can’t really compare pesticides and insecticides. Pesticides are chemicals that are meant to manage pests and control other elements like weeds. The word pesticides consists of other terms which include herbicide, nematicide, bactericide, avicide, molluscicide, rodenticide, and fungicide. Furthermore, it includes insect repellent and animal repellent. But when it comes to pesticides, the most common are herbicides and they are used within 80% of all pesticides. The purpose of pesticides is to protect plants from hindrances like fungi, insects, and weeds. Basically, pesticide is a chemical or biological agent that shields against pests. Depending on the type that you get, it may also kill them or incapacitate them. The goal of the chemical is to target pests like birds, plant pathogens, fish, roundworms, and molluscs. It also aims to get rid of microbes that destroy plants or spread disease. Unfortunately, pesticides have the tendency to be toxic to humans and other species. Protection When Using Pesticide or Insecticide When deciding between pesticide vs insecticide, there’s one thing in common regarding both —you have to be careful when handling them! Before using either of them, be sure to put on personal protective equipment. This includes gloves, long sleeve shirts, and protective eyewear. You might even want to put on a hat or rubber footwear so that the chemical doesn’t damage your regular shoes and clothing. If you have to mix or pour the chemicals, do it outside. Pesticides and insecticides are very strong, and they could cause you to choke. Handle them in a spacious, well-ventilated area. Also, never ever smoke or eat food while handling these substances. It’s very easy to transfer traces of the chemicals from your hands to your mouth. You do not want to accidentally swallow either one—even if it’s just a little bit. In addition to that, always store pesticides and insecticides in the right place. Keep it out of the reach of children and pets. It’s best to place them in an area that’s locked or behind a secure door. Be sure to tightly close the chemical bottle after use so that it doesn’t spill out and damage your property. Also, carefully read all instructions on the containers, so you know exactly how to handle the substances. With that said, if you’re trying to grow a beautiful garden with the help of pesticides or insecticides, either one should help. But you also need to know how to manage your plants and flowers in other ways, like properly applying seed treatment. Pesticide vs. Insecticide: Which Is Right for Your Situation? As you can see from the information above, there’s a big difference between pesticide vs. insecticide. Although they might perform similar tasks, they should definitely be used in different ways. Basically, insecticides should primarily be used to deter or kill insects. On the other hand, pesticides should be used to ward off pests to keep them from destroying your plants. Was this content helpful? If so, continue browsing our website to discover more interesting articles.
by openbookmarks Meteor Watch Day 30th June Days Of The Year Meteor showers are usually named after a star or constellation that is close to where the meteors appear in the sky. perhaps the most famous are the perseids, which peak in august every year. every perseid meteor is a tiny piece of the comet swift tuttle, which swings by the sun every 135 years. Meteor is an open source platform for web, mobile, and desktop used by over half a million developers around the globe. meteor makes shipping javascript applications efficient and scalable. Meteor: directed by ronald neame. with sean connery, natalie wood, karl malden, brian keith. the u.s. must join forces with the u.s.s.r. in order to destroy a gigantic asteroid heading straight for earth. A meteor, known colloquially as a shooting star or falling star, is the visible passage of a glowing meteoroid, micrometeoroid, comet or asteroid through earth's atmosphere, after being heated to incandescence by collisions with air molecules in the upper atmosphere, creating a streak of light via its rapid motion and sometimes also by shedding glowing material in its wake. Define meteor. meteor synonyms, meteor pronunciation, meteor translation, english dictionary definition of meteor. a fiery streak in the sky produced by a meteoroid. A Fireball Meteor Lit Up Skies Over New England Last Night A meteor is what happens when a meteoroid – a small piece of an asteroid or comet – burns up upon entering earth’s atmosphere, creating a streak of light in the sky. an asteroid is a small rocky object that orbits the sun. The meteor 350 features a tripper™ navigation system, the first ever in a royal enfield. powered by google maps and the royal enfield app that connects smartphones with the motorcycle through bluetooth. tripper™ is a sophisticated navigation solution, that indicates directions through an intuitive display system with an additional usb. Install meteor. current version: 2.3.5. view release notes. run the following command in your terminal to install the latest official meteor release: npm install g meteor. for prerequisites and more detailed information, refer to the docs. Nasa Warns A Major Meteor Strike Is On Its Way This Is Meteor Shower To Brighten B C Skies Starting Saturday Meteor | 2009 | Full Movie | Part 1 this film is under license from sonar entertainment inc. all rights reserved.*** part 2 is here! ib5zd59sdfw two massive rocks, tumbling pre armageddon deep impact style film about an earth bound meteor and with the joint forces of us & russia are finding any ways necessary to stop it, fortnite stream: paradoxslm feb 15,2013 a "small" meteorite streaked through the skies above russia's urals region. the blast every so often, the planet earth gets hit by meteors and asteroids. it's rare that these events are caught on video, but when they are its spectacular to watch! about 30 meteor showers can be seen from earth throughout the year. learn the science behind meteor showers, the dates when showers like the geminids listen to the full album: 3dvrqvb "meteor" by @architects from the album 'for those that wish to exist,' available now order at provided to by iip dds meteor · johna 1200am ℗ johna, distributed by spinnup released on: 2019 10 25 artist: johna auto generated by . meteorite falls, also called observed falls, are meteorites collected after their fall from space was observed by people or automated devices. all other meteorites provided to by iip dds meteor shower · cavetown cavetown ℗ warner tamerlane publishing corp. cavetown music inc. (bmi prs). all rights this film is under license from sonar entertainment inc. all rights reserved.*** part 1 is here! lh gxn s1wu two massive rocks, tumbling available on itunes, apple music : kr album boyhood 1489682908 listen on spotify discovery channel large asteroid impact simulation (2008). earth was born as a result of repeated asteroid collisions, the moon was created by a single giant Related image with meteor Related image with meteor
Bitcoin Is Not A Currency There has been a great deal of discussion lately regarding whether or not Bitcoin is a currency of an asset, or just a store of value. Indeed, what we are talking about here is not necessarily one of the most popular issues in all of economics. Indeed, the fact that Bitcoin has become the subject of such discussion can easily be explained by the fact that Bitcoin has become the least understood and most controversial issue in the entire world of cryptocurrencies. This is true for a number of reasons, and one of the primary reasons for this has been the fact that the Bitcoin-Financial Media is still coming to grips with the ramifications of Bitcoin, including its potential to alter how the whole world perceives money. The fact that there have been many powerful arguments about whether or not Bitcoin is money a currency, or something else is only one of the many examples of the fact that there are still some real philosophical differences about what Bitcoin is and what it means. The most important thing to keep in mind is that it is still too early to come to any definitive conclusions about Bitcoin, whether it is a currency a store of value, or something else. In order to understand what Bitcoin is, one needs to understand what money is and how a particular economic system is built on money. While these questions are not directly related to what Bitcoin is, they are intimately connected to the whole question of how Bitcoin might affect the future of how society thinks about money. For example, it has been widely discussed that there has been some recent moves away from the U.S. dollar, and toward other major currencies such as the Euro and the Japanese yen. These political movements are being led by countries such as China and India, who are both experiencing significant economic growth. While it is difficult to predict exactly what will happen in the long run, there are some major implications for how governments and international institutions to think about how they want to change how the world will make money. After all, if a large number of people are moving away from using the U.S. dollar, it would certainly be in the best interests of these countries to try to establish their own versions of a global currency. On the other hand, there are also some major political pressures on how governments and institutions treat money. For example, China is facing serious social and economic problems that are forcing them to consider abandoning the Yuan in favor of a different kind of monetary system. If Bitcoin was used by one of these developing countries to replace the U.S. dollar, would we see a massive loss of global trade? No, we would not, because it is important to recognize that a currency is only as good as the political forces behind it. In fact, the political forces behind Bitcoin would play the key role in determining whether or not it is successful as a currency. For example, would Bitcoin’s biggest proponent, governments and central banks, actually allow it to gain a significant amount of popularity? Of course they would, because it is likely that they would want to avoid a repeat of the very large amounts of capital that was suddenly fleeing their global monetary policy in 2020. Indeed, this is why governments should take some of the risk out of the equation and let Bitcoin compete against the rest of the currencies in the world, rather than pushing it into the shadows as a non-currency. Indeed, one of the things that makes Bitcoin interesting is that its supporters are mostly anarcho-libertarians who feel that governments should only deal with crimes, not with money itself. Therefore, if Bitcoin is taken seriously as a currency, it is likely that it would simply encourage governments to become even more rigid when it comes to enforcing their policies against the general public. Indeed, it is probably safe to say that Bitcoin will eventually need to work hard to convince governments that they need to allow it to become a “normal” form of money.
Skip to main content Skip to navigation Gandhi and Development Why does Gandhi matter to the history of development in India? The point of this lecture is to address the relationship between Gandhi, Gandhian nationalism and the relationship between Gandhi and development in interwar India. Why does Gandhi matter to the history of development in India? Because he had a specific take on it; because that had significant ramifications for the subsequent path of development in post-independence India. Mohandas Karamchand Gandhi: 1869-1948 Key biographical notes In England—went to UCL in 1888 to study law, was called to the bar, then returned to India, yet was unable to establish a successful law practice in Bombay or Ahmedabad, but returns to Rajkot In 1893 he accepted a 1-year contract from an Indian firm in Natal, South Africa Lives there between 1893-1915 Civil rights in South Africa Individual radicalization through instances of humiliation and brutality 1894 Natal Indian Congress—connected to fighting the attempt to deny Indians in Natal the right to vote Hind Swaraj (1908) Return to India: mass politics in the 1920s 1916: Home Rule League founded in Madras, Annie Besant Main nationalist leaders: G K Gokhale Move to mass mobilisation—in wake of the disappointments of 1919 GOI Act (Montagu-Chelmsford Reforms) and the Rowlatt Act Frustration, too with wartime measures including the suspension of habeus corpus (with regard to “revolutionary activities”). At this point, the Indian National Congress (INC) had no political machinery for mass agitational politics. Instead: constitutionalism, giving letters in, etc. The 1919 agitations linked satyagraha politics (non-violent resistance) to khilafat movement and it witnessed attacks on symbols of British authority—the post offices, banks, railway stations, town halls plus assaults on British civilians. Brutally repressed by the colonial government Gandhi assumed the leadership of INC from 1921 Gandhi instituted a new INC constitution with express goal of swaraj (self rule), non-violence (ahimsa) and swadeshi (self-sufficiency) and Launched the Non-Cooperation Movement (1921-1922), which ended in Chauri Chaura (1922) Gandhi jailed 1922-24 for sedition Political movements: Swadeshi (1920s), Dandi salt march (1930) Political tactics: non-cooperation Regional variations: Congress and Gandhi important, but Jinnah, Ambedkar and Periyar tell different stories—hegemony of the nation, etc.
8 Non-Dairy Calcium Foods That Are Better Than Milk 8 Non-Dairy Calcium Foods That Are Better Than Milk Calcium is the most abundant mineral in the body. It is responsible for bone growth, blood clotting, muscle functioning, and is crucial for healthy kidney function. Most people resort to dairy products to get their daily dose of calcium because that’s all they know. Calcium has been marketed to the masses via milk ads and other forms of dairy, but these dairy products could be crippling your health more than you know. Humans are the only the only mammals that drink milk after they have been weaned. Cows, giraffes, and elephants don’t support their bones by drinking another animal’s milk, and they have a lot more bone mass to support than we do. Just throwing that out there to think about… When you obtain your calcium from the plant world, you also get a boatload of other nutrients like magnesium, potassium, vitamins A & C, zinc, iron, and many others that help the body function optimally. Additionally, when you get your calcium from plant-based sources, you reduce your risk of developing diabetes, heart disease, and breast and colon cancers. The best part about all of the foods listed below is that they also contain vitamin D, which helps the body efficiently absorb and use calcium. In fact, the body can’t absorb calcium without vitamin D at all! Eat these foods to get both nutrients and more. #1: Kale Did you know that 4 cups of kale has more calcium than a glass of milk? That really gives you some motivation to eat your greens. Kale is also rich in vitamin K, which helps support bone health. #2: Oranges Oranges are known for their vitamin C content, but that isn’t the only nutrient that they have. One navel orange contains 60mg of calcium and you can freshly squeeze them or eat them out of hand to obtain the calcium. #3: Beet Greens Most people throw away beet greens and solely use the beetroot. Stop throwing away the greens because they are packed with protein, calcium, iron, magnesium, zinc, and manganese. Additionally, they are low in fat and can help lower cholesterol levels. #4: Almonds Almonds are a nutritious heart-healthy food. They are a great protein source that can help sustain you for long periods of time, and 1 serving contains 80mg of calcium. You can eat almonds to help lower blood pressure and keep you feeling full, which can reduce unhealthy cravings and snacking. #5: Butternut Squash Butternut squash is great for strengthening your bones because it helps the body absorb calcium. It also supports healthy bone structure and it can increase the density of the spinal column. Eating this winter squash can also help decrease your risk of osteoporosis. #6: Spinach Spinach is very rich in calcium, containing 245mg per cup. While boiling or sautéing spinach is a great way to consume this leafy green, you can reap more of its benefits by consuming it in the raw form. Blend spinach into a pesto with olive oil, lemon juice, garlic, and pine nuts, or eat it in salads. #7: Okra When it comes to cooking okra, a lot of people resort to frying it. This negates all of the health properties it has. Since it has 172mg of calcium per cup, it is best not to cook the nutrients out of it. You can roast it, boil it, grill it, or sauté it with a little olive oil, sea salt, and pepper. #8: Blackstrap Molasses Rather than using artificial sweeteners or lots of sugar, get your calcium on by using blackstrap molasses to sweeten teas or sauces. One tablespoon of this stuff has 137mg of calcium and it contains a lot of iron, so it is a great item to include in your diet.
Emergency Preparedness: Generators Nowadays we used a lot of very power-dependent gizmos and so if you want to maintain anything near a modern lifestyle when the power goes out you'll need a generator. To try and do it with solar panels is possible but requires a lot more space and money.  In this post I'll be covering general safety tips, how the generate electricity, the pros and cons of different types of generators, what types of extra equipment you might need with a particular type of generator, and the preventative maintenance you'll need to perform on it to make sure it's ready to go when you need it. I won't be covering whole-house generators that are plumbed directly into your natural gas supply, other than to say while they can be sized to power your entire house, they have a high initial cost and a fairly high running cost. If that's the type of system you want contact an instillation company directly.  Generators are labelled by how many Watts of power they can produce continuously and for initial surge. An example would be "3250 Watts Continuous, 5050 Watts Surge". The surge Watts are necessary to run certain devices that require a lot of energy to start but once they're running they need less power to keep going. AC units, freezers, and fridges are examples of devices having a high, initial surge power demand and then a lower operating power requirement. Generator Safety & Considerations • Don't run inside the house or attached garage. Exhaust is poisonous! • Running a generator in an unattached garage isn't a much better idea. • Don't run it near an open window, door, or AC air intake (yours or your neighbors). • The exhaust is HOT so don't direct it towards anything flammable or easily melted. It's not good for plants, either. • Don't let rain, snow, or sleet fall on the generator. Set it on a dry surface. • Be sure the generator is level and stable to insure proper flow of fuel. • Check local or state laws and HOA regulations on the type, placement, hours of use, and fuel storage for generators. Texas generator laws. Carbon Monoxide • Generator exhaust contains carbon monoxide, a poisonous, odorless gas that irreversibly binds to blood hemoglobin, preventing the blood from absorbing/transporting oxygen. • Always have a working carbon monoxide detector between the generator and the house to let you know if the wind has shifted, sending carbon monoxide towards the house. • Pay attention to wind direction (see warning above). • Read the owner's manual to see how to properly ground your generator! • To avoid possible, accidental shocks/electrocution the generator should be grounded. • Grounding can be accomplished by running a jumper cable from the generator's grounding point to a piece of metal pipe or iron rebar stuck at least 12" into the ground. Attaching the ground end of the jumper cable to your water line is another good method. • Don't try to refuel a generator while it's still running. You and your house will end up burned beyond recognition. • Let the generator's engine cool down to a touchable temperature before refueling. • Don't smoke while refueling the generator. Using a match to see into the fuel tank is also a real bad idea. • Don't store spare fuel inside the house or attached garage. Storing it in an unattached garage isn't much better. Store it in the yard somewhere protected, like a shed. Power Cords • Use a heavy-gauge power cord to run power to heavy-demand items such as freezers, fridges, or AC units. • If possible, run individual, heavy-duty power cords from the generator to each heavy-demand item (fridge, freezer, AC) to avoid drawing too much current through a single power cord. If the power flowing through a cord gets too high it can catch fire! • If you can't afford multiple heavy-duty cords get one super-heavy duty cord with three outlets at the end. • Run the power cords through a window and then fill the window opening with blankets, foam rubber, towels, or other stuffing to reduce the chance of carbon monoxide entering the house. • Generators are targets for thieves, especially in a big disaster. • Write down the make, model, and serial number of your generator to help recover it if stolen. • Figure out where you'll be running the generator and then cement into the ground some sort of large, steel ring near that spot. Chain the generator to that ring using a heavy-duty security cable and lock. Better yet, cement several rings into the ground and use several security cables to lock it down. • If the cemented ring isn't an option, chain it to a tree, vehicle, or some other big, immovable object. • If possible, after dark take turns staying awake to keep an eye on the generator. Spare Parts • 2-3 bottles of the proper oil required to maintain proper lubrication of the engine. • 2-3 spark plugs • 1-2 spare air filters • 1 spare pull-start cord • In the case of a gasoline or diesel unit, a spare carburetor is good to have on-hand • Fuel line tubing. As the machine ages the fuel line naturally becomes brittle. Figure out what size interior diameter (ID) your generator needs and buy a few spare feet of fuel line (it's cheap) from a local hardware store. • Funnel for adding oil • Used oil container • Battery charge maintainer if electric start • Multimeter for troubleshooting power issues, assuming you learn how to use it. Pull vs Electric Start • Pull starts are mechanically simpler and therefore more reliable but also require a great deal of physical strength. Weak or injured people may not be able to get the generator running. • Electric starts are much easier to fire up...assuming everything is working right. They require a battery which needs to be kept charged. Over time the battery naturally loses strength even if kept connected to a battery maintainer. After three years it becomes much less likely to work and probably should be replaced. How Generators Produce Electricity When you move a magnet past a piece of wire, the magnetic field will force some of the wire's electrons to be released and move along the wire. This movement of electrons is what we know as electricity and it can be tapped to power electronic devices...assuming the wire is long enough and the magnet is strong enough. If you coil the wire into a ring the magnet only needs to move a short distance to start moving the electrons. In a generator, there is a very long piece of coiled wire that is rotated between a ring of multiple magnets. As this wire coil turns lots of electrons are sent down it to the power outlet where you plug stuff into the generator. The more wire, more magnets, and faster the wire coil is spun the more power the generator produces. The the resulting electricity is alternating current aka AC voltage with a full sine wave. To spin the wire coil, generators use some sort of gasoline, diesel, or propane powered engine to rotate the coil at extremely high speeds. The type of fuel the engine uses determines a lot of the cost, physical size, pros, cons, extra equipment, and maintenance the generator will need. Keep in mind, while it might be nice to have power continuously, depending what you're running you don't have to run the generator non-stop. Running it for an hour every 3-4 hours will be more than enough to keep your fridge & freezer cold if you keep them closed.  I've already shown how to calculate how many Watts you'll need in the post Emergency Preparedness: Power Basics so let's move on to talking about what to expect from the different types of generators. Propane Generators I'm starting with propane-powered generators because in my personal opinion they are the most practical type for most people due to the easy & safe storage of fuel along with their relatively low maintenance needs. After studying everything about generators I chose a 3250 Watt, propane-powered generator and love it. The one I have is no longer made but the equivalent would be a Champion Model 76533 Propane/gasoline Dual Fuel Generator. • Fuel Storage - these generators use a standard, 20lb propane bottle like your propane grill which are readily available (most of the time). Propane doesn't degrade so you can store multiple bottles for years if necessary.  • Fuel Cost - Propane is generally much cheaper than cost of gasoline or diesel needed to produce an equal amount of power. • Fuel Safety - while propane is highly flammable it is non-toxic. If you accidentally release some it'll quickly dissipate without causing an environmental or health risk.   • Runtime - a 20lb bottle will give 6-10 hours of run time depending on how much power you need from the generator. Three bottles will often be enough for most situations...but you can usually trade your neighbors electricity in exchange for their BBQ grill propane tank if the situation lasts longer than three days. • Power Output - propane is a high-energy fuel so it can produce a lot of electricity. They usually start at 3000 Watts and can be found up to double that.  • Maintenance - since propane is a gas, when it evaporates it doesn't leave behind the gums and resins that gasoline or diesel do. This means lower carburetor maintenance! The carburetor is where the propane and air mix before going into the piston's ignition chamber (the part where propane is burned). Since the fuel is still unburned in the carburetor, when you turn off the generator fuel remains there. Gasoline and diesel will eventually evaporate form there, leaving behind goo which can prevent a carburetor from working the next time you need to run the generator. Propane doesn't leave goo behind! • Size - to take full advantage of the power produced by propane the resulting generators are physically large. They will be up to 2-3 feet long and 2 feet wide. • Noise - most propane generators are made for construction sites where noise isn't a problem. They will be as loud as a standard gas-powered lawnmower so running them is noisy! This is especially problematic at night...or when you don't want thieves to know you have a generator. • Fuel Storage - keep in mind while propane tanks are safe to keep filled for long periods of time, the valve systems on the tanks have an expiration date. If the tank valve has expired, propane refillers won't refill it. This is really only a problem with the big, 50lb propane tanks that can't be swapped out for regular tanks at tank exchange locations, though.  Extra Equipment & Maintenance • Fuel Tanks - if you have a propane generator, then you'll want at least three standard, 20lb propane tanks. Better still, several 50lb propane tanks, though those are heavy to move around. • Maintenance (Tools) - proper oil for the engine, funnel for filling the oil, spark plugs, spark plug wrench, spark plug gap tool, used oil storage container. • Maintenance (Oil Changes) - Usually oil needs to be changed after the first 30 hours and then every 100 hours of runtime after that or every year after, but check the generator's instruction manual to see what it says. • Maintenance (Spark Plug) - Change every year. Gasoline Generators While there's a lot of good things about gasoline-powered generators, I just don't like their negative aspects. If I were to get one it'd be a Honda Model 663510 1000 Watt Generator. • Small Size - gasoline is a very efficient fuel and so its popular for physically small, lower power demand generators. A 800 Watt unit can be less than 1.5 feet long and 1 foot wide, making them popular with campers who don't have high energy demands • Quiet - because gasoline generators have a long history of use by RVers and campers, silencing technology on them is much more advanced. • Linking - again due to the long use by RVers, certain gasoline-powered generators of the same make and model can be linked together to meet higher power demands. Honda's, in particular. This is useful if several family members, neighbors, or post-apocalyptic tribes want the ability to sometimes join together to run a higher power-needing device. • Fuel Lifespan - gasoline begins degrading right after it leaves the gas station pump so long-term storage is problematic. You need to add some sort of fuel stabilizer to the gasoline can to slow down this degradation but even then the life is measured in months, not years. • Fuel Safety - gasoline is REALLY flammable so storing three days worth (15-20 gallons) basically places a bomb on your property (only slight exaggeration!). Gasoline will dry out and irritate skin if spilled on it. A leaking gas can will cause environmental damage to the ground where it leaked. Cleaning up a gasoline spill creates a hazardous waste. • Fuel Ethanol - most gas station gasoline is mandated by the government to contain ethanol. Ethanol causes corrosion of metal parts in an engine, causing hard-to-fix mechanical issues and shortening the generator's lifespan. Ethanol-free fuel can be found at some locations but it costs a lot more. • Gas Cans - metal gas cans will last years but they cost a lot and if damaged they can start rusting. Plastic gas cans are cheap but turn brittle and have a short lifespan (less than two years, to be safe). • Maintenance - a gasoline generator MUST be run under a load one a month otherwise the carburetor WILL get gummed up, making it unreliable. This month running is a pain in the A55! Extra Equipment & Maintenance • Fuel Tanks - you'll want at least 15 gallons of gas stored at all times.  • Fuel Stabilizer - if storing fuel for months you need to add some sort of fuel stabilizer otherwise it degrades and doesn't burn properly. • Replacement Carburetor - its often best to swap out a clean carburetor  while cleaning a gummed-up one because you forgot to run the generator some month. • Maintenance (Oil Changes) - check owner's manual • Maintenance (Spark Plug) - check owner's manual Diesel Generators Diesel generators have a number of benefits over gasoline but also some big drawbacks, depending on your needs. A diesel generator was actually my second choice based on the pros and cons. I like this Generac Model 6864 unit as it is made by the company that makes my propane-powered generator. • Durability - diesel generators are usually used where they need to run a long time and so are generally the most reliable type of unit. • Power - because of the power density of diesel fuel, they are often the most powerful units one can buy. If you are wanting to run a lot of stuff at the same time and you have a place to store the fuel a diesel generator makes sense. • Fuel Storage - diesel actually has a fairly low flashpoint, making storing a large amount of it much safer than gasoline or even propane. Diesel fuel cans are colored yellow to distinguish them from gasoline cans. • Fuel Cost - if the diesel is going into a generator you can buy the untaxed "farm" aka "off road" diesel...but if you are caught using to fuel a vehicle driven on the road you can be fined a lot. Off road diesel contains a red dye to indicate its untaxed. If traces of the red dye are found in your diesel vehicle you are in a lot of trouble. The government wants its tax money! • Cost - SUPER expensive! • Physical Size - with power comes size and so diesel generators will be bigger and heavier than even propane ones. • Fuel Stability - diesel degrades in a different way than gasoline. It actually supports bacterial growth so stabilizing it requires a diesel-specific fuel stabilizer. • Fuel Viscosity - diesel fuel is thick and in cold temperatures it can gel up and become hard to pour! • Maintenance - like a gasoline generator, the diesel unit needs to be run at least once a month to keep the carburetor clean and all the seals tight. Extra Equipment & Maintenance • Fuel Tanks - you'll want at least 14 gallons of gas stored at all times such as in this farm equipment diesel tank • Using Up Old Fuel - if you don't have a diesel truck using up old fuel close to going bad becomes a problem. If you are using farm diesel then you can't even burn it in a diesel road truck or car. • Fuel Stabilizer - if storing fuel for months you need to add some sort of antibacterial diesel stabilizer otherwise it degrades and doesn't burn properly. Due NOT use a fuel stabilizer designed for gasoline! • Replacement Carburetor - like with a gasoline unit, its often best to swap out a clean carburetor  while cleaning a gummed-up one because you forgot to run the generator some month. • Maintenance (Oil Changes) - check owner's manual • Maintenance (Spark Plug) - check owner's manual As a member of the Amazon Influencer's Program, I am required to inform you that Amazon will pay me a portion of the sale price of any of the products linked above. Privacy & Amazon Paid Promotion Statement
Bicycle Hubs 101 Learn Center: Headsets 101 As the part that contains the bearings, your bike's hubs allow your wheels to rotate freely. Without them, you ain't going anywhere. Hubs function as the center of a wheel and consist of an axle mounted in the frame of the bicycle, a set of bearings around which the wheel rotates, and the hub shell, which allows the spokes to attach the hub. Whether you are building a new set of wheels or simply looking to replace an old worn out hub, this article will share the information you need to make the right choice. Choosing a hub Whether you are building a new set of wheels or replacing your old hubs, you will need to determine the right hub for your needs. Hubs have to be matched to the front or rear of your bike; each will be a different size. Rear hubs typically feature a broad mounting platform for the cassette, and each rear hub is made to specifically match a certain class of cassettes. Hubs are generally 100mm wide in front and 130mm wide in the rear for road bike frames; mountain bikers generally use 135-142mm front and rear hubs to allow space for disc brakes, which require extra material on the outer edge of the hub for mounting the disc. Make sure your hub matches your frame and fork width as well as your brake type and cassette preference. If in doubt, do some online research or ask your local bike shop. They should be able to help. Hubs which integrate a freewheeling mechanism into the hub itself are called freehubs, and they allow a wheel to rotate separately from the gearing mechanisms. On many BMX and fixed-gear bikes, there is no freehub, so the pedals will continue to rotate with the wheels, preventing the rider from coasting but allowing braking by pedaling backwards or locking the pedals in place. Pricing and features Like most bicycle parts, hubs come in a wide variety of prices and with various features. Even the most basic will provide suitable rolling speed and low friction for good performance, but the higher-end models can get a bit confusing. So what, exactly, does your money get for you? Let's answer that question. Before you start searching for the right hub for your bike, make sure you have the information you need: the type of cassette you will use, the width of the frame and fork, the number of spokes you will be mounting (and the type of spokes that will be used), and whether you will need the ability to mount disc brakes. Once you have all that squared away, it is time to start looking at features. Basic hubs tend to be constructed out of steel and aluminum alloys and provide good typical performance. They start around $20-$30 in cost, and range up to $90 or so. High-end hubs for road and mountain bikes tend to be made out of lighter, stronger materials like high-quality aluminum that minimize weight and provide increased strength. They also often use higher-quality steel or ceramic bearings which provide less rolling resistance and a smoother ride. These generally cost in the range of $200-$400 and can push the weight down to around 100 grams -- almost miraculous compared to the 500g hubs of a generation ago. Some specialty rear hubs provide the ability to measure power output, cadence, speed, distance, ride time and more via a series of built-in sensors. These models are very expensive, sometimes in excess of $1000, and are generally only used by serious racers. Make sure whichever hubs you purchase are matched to your riding style -- using a road hub on a mountain bike could lead to premature failure. One last question you may want to ask yourself is whether the hub(s) you have chosen come with an integrated quick-release skewer or solid axle and nut. Some do and some do not, so don't make the mistake of ordering a part without this critical attachment. Solid axles and nuts provides more theft resistance and are sometimes recommended for use with disc brakes (due to unusual forces that can be applied to the front axle when using disc brakes), while quick-release mechanisms make it easier to change flats and swap wheels on the go. Also, some mountain bike hubs are designed for wider (diametrically speaking) "thru axles." Check out your suspension fork to see if it uses a standard 9mm skewer or a beefier 15 or 20mm thru axle before you start shopping. The main issue that arises with hubs is problems with the bearings; over time, the seals that keep water and grit out of the ball bearings can break down, and the wheels can begin to lose some of the smoothness that allows them to rotate freely. If your hubs have accessible bearings, it is possible to disassemble the mechanism, clean the bearings and housing, and re-seal the hub for further use. This process is beyond the scope of this article; consult other articles or a local bike shop about getting this procedure done. However, many modern hubs contain self-contained cartridge bearings which are not repairable or cleanable. These confer longer lifespan, higher performance, and tend to be cheaper, but they must be discarded and replaced when they do wear out. Cartridge bearings are increasingly dominating the market and are used by those seeking the greatest speed and convenience. Many older bikes use the user-serviceable "cup and cone" style bearing. Expert Advice Stay In the loop Recieve updates on the latest deals & promotions: - Price Drops - Secret Stash Updates - Locals Only Deals
Introduction to the Health Professions – HLTH 105 Course Description The purpose of this course is to become familiar with the many health professions available as career choices, to develop an understanding of the healthcare system in the United States, to recognize the requirements of health professionals in today’s healthcare system, to become informed consumers of healthcare services, and to gain insight into what life may be like if a healthcare career is chosen. Measurable Learning Outcomes 1. Discuss the changes in healthcare in the United States over the past ten years. 2. Describe major categories of health services and reimbursement. 3. Discuss how specific trends in demographics affect healthcare services. 4. Differentiate between licensure, certification, and registration as they relate to the practice of different health professions. 5. Distinguish between “health” and “health-related” professions. 6. Contrast health professions regarding education, specialties, training, job functions, and other professional parameters. 7. Present information regarding various health careers. 8. Create a career plan for himself/herself as an individual incorporating spiritual and life goals related to Christian service in the health professions. Course Assignment Textbook readings and presentations Course Requirements Checklist Discussion Board Forums (2) Discussion boards are collaborative learning experiences. Therefore, the student is required to provide a thread in response to the provided topic for each forum. Each thread must be 200 words in length and demonstrate course-related knowledge. In addition to the thread, the student is required to reply to 2 other classmates’ threads. Each reply must be 100 words in length. Focused Activities (5) The student will complete 5 short (1–2-page) focused activities concerning specific topics within the health career fields. Activities will require the student to answer specific questions using the textbook as well as provided professional websites. Any sources used must be referenced using current APA format as needed. Career Investigation Project The student is required to choose a career of interest in the health field to investigate and submit his/her topic to the instructor. The student will then find a working professional in the chosen field to “shadow” and interview. Once the shadowing/interview experience has taken place, the student will design a 10–12-slide PowerPoint presentation documenting their experience and knowledge gained through this investigation. The Career Investigation PowerPoint will also be submitted in Discussion Board Forum 2 and shared with the student’s classmates for comments. Any sources used must be referenced using current APA format as needed. Career Plan Paper As a culminating paper, the student will type a 2–3-page summary of his/her career goals and plans incorporating life and spiritual reflections. The purpose of the career plan is to provide the student with a written framework of the necessary steps in the process of reaching their personal, spiritual, and career goals. Tests (4) Each test will cover the Reading & Study material for the assigned modules/weeks. Tests 1–3 will contain 50 multiple-choice questions, and Test 4 will contain 50 multiple-choice, true/false, and fill-in-the-blank questions. Each test will be open-book/open-notes and have a time limit of 1 hour and 30 minutes.
Experts please explain....,, Dear student, Please find below the answer: The correct option is (1). Nodule formation begins at the root tip region where elongation of root hairs occurs. From this, the infection by bacteria reaches the epidermal cell and then to the root cortex. Hope this information clears your doubt. • 0 What are you looking for?
 Using e-cigarettes to stop smoking - NHS Skip to main content Picture of e-cigarettes In recent years, e-cigarettes have become a very popular stop smoking aid in the UK. Also known as vapes or e-cigs, they're far less harmful than cigarettes and can help you quit smoking for good. What are e-cigarettes and how do they work? They work by heating a liquid that typically contains nicotine, propylene glycol and/or vegetable glycerine, and flavourings. Using an e-cigarette is known as vaping. What types of e-cigarette are there? There are a variety of models available: • Cigalikes look similar to tobacco cigarettes and can be disposable or rechargeable. • Vape pens are shaped like a pen or small tube, with a tank to store e-liquid, replaceable coils and rechargeable batteries. • Pod systems are compact rechargeable devices, often shaped like a USB stick or a pebble, with e-liquid capsules. • Mods come in different shapes and sizes, but are generally the largest e-cigarette devices. They have a refillable tank, longer lasting rechargeable batteries, and variable power. How do I choose the right e-cigarette for me? A rechargeable e-cigarette with a refillable tank delivers nicotine more effectively and quickly than a disposable model and is likely to give you a better chance of quitting smoking. • If you're a lighter smoker, you could try a cigalike, vape pen or pod system. • If you're a heavier smoker, it's advisable to try a vape pen, pod system or mod. • It's also important to choose the right strength of e-liquid to satisfy your needs. A specialist vape shop can help find the right device and liquid for you. Will an e-cigarette help me stop smoking? Find your local stop smoking service How safe are e-cigarettes? What about risks from nicotine? Are e-cigarettes safe to use in pregnancy? Little research has been conducted into the safety of e-cigarettes in pregnancy, but they're likely to be much less harmful to a pregnant woman and her baby than cigarettes. If you're pregnant, licensed NRT products such as patches and gum are the recommended option to help you stop smoking. But if you find using an e-cigarette helpful for quitting and staying smokefree, it's much safer for you and your baby than continuing to smoke. Do they pose a fire risk? There have been instances of e-cigarettes exploding or catching fire. As with all rechargeable electrical devices, the correct charger should be used and the device should not be left charging unattended or overnight. Reporting a safety concern with e-cigarettes If you suspect you have experienced a side effect to your health from using your e-cigarette or would like to report a product defect, report these via the Yellow Card Scheme. Is e-cigarette vapour harmful to others? Can I get an e-cigarette from my GP? E-cigarettes are not currently available from the NHS on prescription, so you cannot get one from your GP. You can buy them from specialist vape shops, some pharmacies and other retailers, or on the internet. More information For more information and advice on using e-cigarettes to help quit smoking, visit Better Health. Page last reviewed: 29 March 2019 Next review due: 29 March 2022
Secondary Trauma Is Like Second-Hand Smoke If you are around someone who is smoking, you don't have the a choice but to take in second-hand smoke. In just the same way, if you are working with someone with psychological trauma, you will take in secondary/vicarious trauma. Unless you build resilience and heal the trauma, you risk compassion fatigue and burnout. The ABCs of Dynamic Mindfulness (Act, Breathe, Center) have been shown to mitigate the effects of secondary trauma in thousands of teachers. Mindful movement (Act) makes our bodies feel safer, taking slow mindful breaths (Breathe) calms our nervous systems, and present-moment awareness (Center) helps reduce the chance of past or future feeling like the present. Practicing three 2-minute ABCs every day for just a few weeks can make you feel more calm, relaxed, and focused. And sharing DMind with your students, can transform your classroom and keep you from burning out, just like it did for Michelle.
6.4.4  What is neonatal tetanus? Important! Refer a baby with signs of tetanus urgently to the nearest hospital or health centre. On the way protect the baby from hypothermia and give breast milk. Tetanus in the newborn is caused by bacteria (Clostridium tetani) that infect dead tissues such as the umbilical cord stump. Tetanus bacteria are present in soil and animal dung, which may infect the cord or other wounds, for example during some harmful traditional practices. These bacteria produce a powerful toxin (poison) that affects the nervous system. Suspect tetanus if you observe the following signs in the newborn; • Increased muscle tone (spasm), especially of the jaw muscles and abdomen. • Generalised muscle spasms and convulsions, often precipitated by stimulation such as handling or loud noises. The baby may arch backwards during a spasm (Figure 6.5). • Most babies with tetanus will develop severe breathing difficulty and even with good medical care many will die. A newborn baby having muscle spasms. Figure 6.5  The typical muscle spasms of a newborn with tetanus infection. 6.4.3  What are the signs of skin infection? 6.4.5  How can you prevent infection in newborns?
saint valentine Claudius IITraditionally, we think of Valentine’s Day as a day of romance and love, but is that really what it is all about? There are several versions of the background surrounding Valentine’s Day, and all of them include St Valentine. The one I find most intriguing involved not love and romance exactly, but rather a time when it was not allowed. St Valentine was a priest who lived around 270 AD in Rome. He found himself at odds with the Roman emperor of the time, Claudius II. During Saint Valentine’s life time, and under the ruling of Claudius II and other insane administrators, the quality of life in Rome, what had previously been known as the Golden Era, came to an end. There was strife, education declined, taxation increased, and trade declined. This caused a need for more and more soldiers and officers to protect the nation from takeover by the Gauls, Slavs, Huns, Turks and Mongolians from Northern Europe and Asia. In his insanity, Claudius II felt that married men were more emotionally attached to their families, and thus, will not make good soldiers, and he needed many soldiers now. He believed that marriage made the men weak. So he issued an decree forbidding marriage to assure quality soldiers The people of Rome were afraid of the emperor, and when he made the decision to ban marriage, the people Saint Valentinedared not protest, even though they were shocked. If Claudius II had given any thought to the consequences of his ban, he might have realized how futile it was. If the people did not marry, or at least reproduce, his army would dwindle down to nothing in a matter of years, and if they did at least reproduce, weren’t they still having the same emotional ties as married people? This just goes to show how insane Claudius II was. Saint Valentine was a bishop at this time in history, and so began holding secret marriage ceremonies for the soldiers, in complete opposition to Claudius II’s ruling. Saint Valentine was a kindly bishop, and he saw the trauma the unjust decree was causing to young lovers, who had given up all hope of marrying and having children. So, he began secretly performing these marriage ceremonies on the soldiers and their young ladies. Unfortunately, these marriages could not remain hidden for long, and when Claudius II found out about this “friend of lovers”, he was furious. Saint Valentine was arrested and put in prison. Claudius II was impressed with Saint Valentine, when he met him, but when he would not convert to the Roman gods and agree to abide by the marriage ban, Claudius II was angered, and sentenced him to death. Heart and Wedding RingsWhile awaiting his death sentence, Saint Valentine was approached by his jailor, Asterius whose daughter was blind. Asterius had heard that Saint Valentine was a healer. He asked him to heal his daughter, who was blind. Saint Valentine prayed and the jailor’s daughter was healed. After she was healed, a deep friendship developed between Saint Valentine and the jailor’s daughter, and she was grieved over his imminent death. Right before he was beheaded, Saint Valentine wrote her a farewell message, and signed it “From your Valentine”. It is this note that is said to have begun the traditional Valentine card. Saint Valentine is believe to have been executed on February 14, 270 AD, hence the date for our romantic holiday. In reality it is a day to celebrate the Friend of Lovers. Happy Valentines Day!! Enter your email address: Delivered by FeedBurner Check these out!
It is not only the mathematician who is fascinated by numbers. Whether we know it or not, we all speak numbers, from zero through 10, and well beyond. It’s as easy as one-two-three. From time to time, I hear people say, “That didn’t work. I guess we’ll have to go back to ground zero.” Ground zero is a fairly new compound in English. It refers to the point on the Earth’s surface closest to a detonation. The term was first used in 1946 to refer to Hiroshima and Nagasaki, Japan, the sites of nuclear detonations in World War II. It broadened its meaning to mean any detonation site, and now any site that is a center of activity. People often confuse ground zero with the more logical phrase “I guess we’ll have to go back to square one.” Here the metaphor is probably rooted in the playground game four-square, which first appeared in the early 1950s. A player starts in square one and tries to move through squares two and three to square four by hitting a ball that is unrerturnable into one of the other squares. The losing player goes back to square one. Hidden forms of the number two occur in the words between, betwixt, combine, zwieback and twilight, in which tween, twixt, bi, zwie and twi all mean “two.” The root sense of zwieback is “twice baked” and of combine “to join two things.” Twilight is literally the time of two lights, the fading sunset and the emerging light of the stars. Three Dog Night was a popular rock band in the Sixties, Seventies and Eighties. Their name, however, preceded the band. A three-dog night is a night so cold that it takes three dogs to keep you warm. You might call a low-down skunk a four-flusher. Four-flusher characterizes a poker player who pretends to hold a flush but in fact holds a worthless hand of only four same-suit cards. Now let’s take five for the number five. It’s easy to see that the quint in quintet and quintuplets means “five.” Less apparent is the quint in quintessence. The ancient Greeks held that everything in the world was composed of four elements — earth, air, fire and water. To these the philosopher Aristotle added a new element: quinta essentia, “fifth essence.” To deep six is naval idiom that means “to throw overboard,” with six signifying “six fathoms (36 feet) deep. The original term came from measuring the water depth under a ship using a lead-weighted sounding line. The lines were marked at two, three, five, seven, 10, 13, 15, 17 and 20 fathoms. If the depth was at a mark, the leadsman would call “by the mark” followed by the number; if the depth was between two marks, he would call “by the deep” followed by the estimated number. Six fathoms would be “by the deep six.” By extension, to deep six has come to denote generally “to get rid of someone or something.” Your sixth sense — the one beyond sight, hearing, touch, taste and smell — may be leading you to seventh heaven, the very height of happiness. The Mesopotamians created the concept of seven heavens, and the phrase has come to mean “a state of supreme joy.” The best-known expression involving the number eight is behind the eight ball. In Kelly pool, up to 15 players may participate. They draw numbers out of a bottle to determine the order of play. Any player past eight has little chance of winning. Behind the eight ball has been generalized to mean “any difficult, troublesome situation.” I truly hope that you’re not deep sixed and behind the eight ball but in seventh heaven and on cloud nine. On cloud nine, meaning “in a state of high euphoria,” is a reference to the 10 types of clouds defined in International Cloud Atlas, first published in 1896. Cloud nine is a cumulonimbus cloud that can rise to the lofty height of 6.2 miles, as high as a cloud can be. Dec is the Latin root for “ten,” as in decade, decimal and decimate. To decimate once described the nasty habit of the Roman commanders of slaying one out of every 10 soldiers, selected by lot, in a mutinous legion. Nowadays decimate means “to destroy a large number of living things,” with no connection to the number 10, as in “the gypsy moth caterpillars decimated the trees in our yard.” Clearly, the days of our English language have long been numbered, 24-7.
Ellen Lortzing Thus, mother and breast are in fact taken cannot be separated. “” “” The Indo-European * mazd-d-for food, feed “can be etymologically from ama for mother” and * asked/bet/bad “to be” explain. “” Getting is that BAT still in the English”in German and” are”. Also sanskrit ambA mother, nurse”fits here. The first syllable MAST would therefore translate mother than you are”, or she is mother”. “URBA: urbs” (circular) town, whose founding in all ancient cultures always on the mother is referred to in Latin. The inhabitants are figuratively in the protected (city wall) mother belly. Urbs”content probably suits the mother, not tells us but still, what we have to understand originally under masturbation. “” “Latin orbis ‘ world, curvature and circle is”in close relation to urbs”with its meaning. But orbis’ is something else other, namely the mill. “” MAST-URBA or MAST-ORBA was therefore you’re / she is mother “and mill”. The process of grinding with a grinding stone on an elongated or even circular stone offers an analogy to the typical movements during masturbation without question. The milling of grains with a grinding stone, as well as the crushing of grains (symbol of the vulva) with a pestle (symbol of the penis) in a mortar were understood in ancient times not in the sense of a metaphor for masturbation and sexual intercourse. The words for grinding, vulvar and sexual intercourse declined to a master. “The Egyptian SD means both mortar” (cf. sanskrit sudhA!) as also the vagina. “” In the Sumerian Word is for (zer) grind “sud 2, su 3 .d, however, is the case for copulate”. This is also the name of the bride of the Sumerian God, Enlil called Sud explained. (“To Sud cf. sanskrit sutai daughter”!) The MAST URBA was therefore a mother (female), that compared with a mill can be, are rubbed with the grains to powder. The grains are still germinable, it is the powder no longer. From a flour, no new plant can grow more. The result of the milling is somewhat bawdy”. At this point, we must also Latin orbitas childlessness; Witwentum; Verwaistsein”file, because the Act of masturbation does not lead to conception, not even to an immaculate with security. Orbona is thus also the goddess, which deprived the parents of the children (Latin orbo, someone the parents or children Rob”). Orbona is the MASTURBA(T), the mother, who is like a mill-stone”, the sex act, which a person (etymologically regard the woman) takes on himself so that the blessing of children or the parent fails to materialize. Therefore, masturbation is very much fornication, because there no young can in this way bear witness or breed. “Whether we the goddess Orbona not urbi et orbi” (the city and the world”) may write to? Probably not coincidentally, the Pope granted this boon in particular for Christmas, i.e. the birth of Christ and Easter, resurrection. Literature and sources: Brockhaus dictionary, vol. 27, 2215, 1st Edition, Mannheim 1995 Kluge etymological dictionary, 544, 23rd edition, Berlin 1995 Latin-English Pocket Dictionary, 343, 519, 11th Edition, Leipzig 1974 ePSD Sumerian dictionary: psd.museum.upenn.edu/epsd/nepsd-frame.html Thesaurus Linguae Aegyptiae: aaew.bbaw.de/tla/index.html Sanskrit and Tamil dictionaries: de.wikipedia.org/wiki/Masturbation de.wikipedia.org/wiki/Urbi_et_Orbi Ellen Lortzing
Home > Publications > Murder and Punishment in Pakistan Murder and Punishment in Pakistan David T. Johnson No legal system in the world has aroused as much interest as Sharia. In 1990, Pakistanthe world’s second most populous Muslim-majority nation enacted an Islamic law of murder that effectively privatized punishment by giving the heirs of murder victims the right to retaliate against offenders (qisas) and by permitting killers to pay blood money (diyat) to those heirs as a means of settling their case and avoiding or reducing the criminal sanction. This article analyzes Tahir Wasti’s recent monograph in order to describe how this Islamic criminal law was made and how it has been interpreted and applied, and in order to explore how and why “Sharia in practice” has delivered neither justice nor security in the Pakistan context. In the end, Pakistan’s law of murder may be a case of what Murray Edelman called “words that succeed and policies that fail.” Keywords: Homicide, Criminal Sanctions, Sharia (Islamic law), Qisas (equality, retaliation, retribution), Diyat (compensation, blood-money)
Aqueous Film Forming Foam (AFFF) is a proprietary mixture used to knock down fuel-based fires. This fire suppressant has been extensively used by both civilian and military firefighters since the 1970s. Now that the toxicity and harmful effects of AFFF have been revealed, the people who were exposed to the chemical on a daily basisespecially military firefighters and their families wonder if AFFF is the source of all the serious health problems they have been developing. Firefighters strived hard to keep everyone safe but ironically the products used to extinguish fires turned out to be very unsafe for them and their families.  AFFF Exposure is Not Just a Firefighter’s Problem – It’s Widespread! In the United States, the military uses up to 75% of AFFF, while the remaining 25% is utilized at the refineries, municipal airports, fuel tank farms, and other industries. The U.S military uses AFFF while training firefighters, in an emergency situation, for instance, an aircraft crash, and in automated fire suppression systems. AFFF is used in fire-fighting vehicles, in shipboard and shore facility fire suppression systems, and fire training facilities. So, if you or your family member were associated with the following locations, you are likely to have been exposed to AFFF • Chemical plants • Merchant operations (Offshore platforms, oil tankers) • Flammable liquid storage and processing facilities • Municipal services (Fire departments, firefighting training centers) • Oil refineries • Terminals • Bulk fuel storage farms • Aviation operations (Aircraft firefighting and rescue, hangars) • Military facilities Why AFFF is a Concern for Moms? Certainly, AFFF contamination is a threat faced not only by the personnel exposed at their worksites but also by their family members, and especially moms as caretakers need to know a few facts about AFFF and its ill-effects:  • AFFF can contaminate groundwater The AFFF is made up of per-fluoroalkyland poly-fluoroalkyl substances, commonly known as PFAS, and its sub-types namely perfluorooctanoic acid (PFOA), and perfluorooctane sulfonate (PFOS). PFOS is a long-chain PFAS present in old stocks of AFFF whereas PFOA is a by-product formed during the manufacturing process and not an ingredient of AFFF. Most formulations of AFFF contain other side products that pose similar health and environmental concerns.  PFAS are chemicals that do not disintegrate easily and remain unchanged in our environment. For this reason, these are also called ‘forever chemicals’. The release of AFFF during military training and emergency operations has been a major source of groundwater contamination near the military bases. Additionally, PFAS is a man-made chemical and is present in several consumer products such as heat-resistant or non-stick cookware, food packaging, adhesives, furniture fabrics, carpets, and clothing. As a result, every person has been exposed at low levels to these harmful chemicals in their life either through the drinking water or food containers.  • PFAS-contaminated groundwater in the military bases affects water supplies Recently, the communities staying at the surroundings of military bases raised concerns whether the PFAS-contaminated groundwater affects the off-base water supplies. This is more likely to happen because PFAS has a stable chemical structure and is persistent as well as highly mobile in the environment. The chemical can migrate rapidly to groundwater and also in the lateral and vertical direction through something known as aquifers. PFAS tends to build up in the food chain and is widespread at low levels in the environment as well as human beings.  • PFAS levels in the blood can affect the growth of an unborn baby as well as breastfeeding infants According to the Environmental Protection Agency (EPA), PFAS has been detected in blood samples of a majority of the population in the United States. In addition, the EPA has linked a certain level of PFOA and PFOS exposure to the immune system and liver deficiencies, cancer, and growth defects that may develop while the baby grows in the mother’s womb or in breastfed infants. However, the likelihood of developing health issues from PFAS depends on various factors such as the frequency, duration, and level of exposure.  Here is what Studies Reveal about the Effects of PFAS on Human Health Studies have established a link between PFAS exposure and cancer affecting the kidney, bladder, and testes. PFOA and PFOS are believed to be endocrine disruptors. These substances do not get metabolized or excreted easily. PFOA has an average half-life of 2.3 years in humans and PFOS remains for about 4.1 to 8.7 years. As per the Agency for Toxic Substances and Disease Registry (ASTDR), studies in humans suggest that PFAS may be associated with the following health problems: • Fertility issues and pregnancy-induced hypertension/preeclampsia • Changes in fetal and child development • Changes in the immune system • Damage to the liver • Elevated cholesterol level • Increased risk of certain cancers (testicular and kidney cancer) • Increased risk of thyroid disease • Increased risk of asthma Thus, the family members of personnel occupationally exposed to AFFF directly are also at risk of potential AFFF exposure through drinking water near a military site where AFFF was used. This is a serious health hazard as AFFF poses a greater risk of developing cancerous conditions. Be vigilant on the signs and symptoms you develop as it will help in the early detection of cancer.  If you receive a specific cancer diagnosis kidney cancer/bladder cancer/testicular cancer, it is important to get in touch with an environmental toxic tort attorney to recover your well-deserved compensation.  With over two decades of legal experience, Environmental Litigation Group, P.C., a law firm based in Birmingham, AL, continues to help victims of occupational industrial workplace exposure or Military/Navy personnel and their family members to receive their well-deserved compensation.
Learn what are Data Science Projects and How to Use Them Organizations of varying sizes and operating in different sectors of the economy generate large amounts of data. These organizations have an interest in obtaining insights from their data stores. The discipline that helps organizations extract actionable insights from their data has come to be known as data science. Efforts to get insights from data can be collectively referred to as data science projects. For data science projects to be successful, skills and tools need to be harmoniously applied. In a data science project, there are several key roles and responsibilities which are critical to the success of a project. Depending on the size of the organization, these roles may be filled by one person or one individual may take up several roles. The first role is the project sponsor. The project sponsor is responsible for bringing forward the benefits to the business and evangelizing the value of a data science project. The second role is the client who has the responsibility of putting forward the interests of the end users of the data science project output. The third role is the data scientist who is responsible for setting and executing data analysis, and communicating to the client and the sponsor. Some responsibilities of the data scientist are identifying statistical techniques and machine learning algorithms that are appropriate. The fourth role is the data architect who is responsible for data management. Data management responsibilities include data extraction, data transformation according to business rules, data loading into data warehouses and data quality management. The data architect is basically responsible for laying the data infrastructure that will be used by the data scientist. The final role is operations which is responsible for managing how the results from the data science team will be incorporated by other teams. For example, the operations role will play an important role in incorporating a recommendation engine developed by the data science team into a shopping cart maintained by the IT team. A data science project has several stages which are undertaken in an iterative manner. Although our discussion here will identify several stages in practice there is no delineation of the project into distinct stages. Data science activities will fall into several stages and there is no guarantee the project will proceed sequentially. • The first stage in a data science project is establishing a clear and measurable objective of the project. In this first stage, it is very important to identify the following. 1) The requirements of the sponsor and what is missing 2) All the efforts in place to meet the needs of the sponsor and shortcomings of the efforts. 3) The resources that are needed in terms of data, skills and computing infrastructure. 4) How the results will be used and any hurdles that will be faced in using the results. • The second step in a data science project is identifying and preparing the data that will be used. In this step, you examine the data thoroughly to establish if it will help in achieving the data science project. The data architect plays a major role in this step. In this step it is very important to establish the following. 1) Availability of data 2) If the data will satisfactorily meet project objectives 3) Quality aspects of the data such as completeness and accuracy. • The third step is building the models that will identify patterns that exist in the data. In this step you apply statistical techniques and machine learning algorithms that will extract insights from data. The model building step mostly overlaps with identification and data preparation step. This is because in the modeling step you may identify data quality problems or you may realize the available data will not meet the project objective. Some data modeling objectives are listed below. 1) Predicting categories, this is referred to as the classification problem. For example you can predict which customers are likely to churn, which customers are likely to make a purchase or which transactions are fraudulent. 2) Creating groups based on similarity, this is referred to as clustering. For example a clustering algorithm can be used to find which items are purchased together. 3) Estimating the probability of events, this is referred to as scoring. For example a credit card company can use scoring to identify high risk and low risk customers. • The fourth step in a data science project is assessing a model performance. When assessing a model, you need to look at the following aspects. 1) The accuracy of the model relative to your project objectives 2) Plausibility of the model 3) Performance relative to the approaches in use Whenever a model does not meet the set criteria you need to reassess the data or your project objectives. For example, if you are classifying financial transactions you need to set a level of accuracy that is acceptable. This will enable you to avoid false alarms. If a model cannot meet a set level of accuracy then for example you might want to add more data. After identifying a model that meets your project objectives the next step is discussing the model with stakeholders. Documentation is also required which becomes a reference. When preparing the documentation you need to keep in mind the needs of different stakeholders. For example, management would be interested in knowing the impact of the model on business outcomes. In the financial transactions example the management would be interested in knowing the dollar savings from implementing the classification model. The last step in a data science project is operationalizing the model. The key activities here are deploying and maintaining the model. It is advisable to pilot the model before a full scale deployment. This will enable identification of any shortcomings. After deployment the model moves from the data science team to the team that will use it in day to day operations. Maintenance of the model is needed to adapt the model to data and business changes. For example, the transaction prediction model may only be able to identify fraudulent transactions involving small amounts of money and it therefore needs to be updated. In this article, we introduced data science projects and noted for a successful data science project different roles, skills and tools are required. We discussed the roles and responsibilities that are critical for project success. We discussed the different stages of a data science project and what is important in each step. Please enter your comment! Please enter your name here
Need help? We are here Please refer to as one of the references: Introduction to the Activity Change is challenging. It is safe to say, that most individuals have strong mental and emotional reactions to change initiatives. Leaders are responsible for starting the process in a way that creates a foundation for success. This requires knowledge, skill, and ability focused on the effective management of the change process. Developing the knowledge, skill, and ability to successfully address change, we must start by evaluating our past experiences with change to identify why they have failed. Instruction to Learners For this discussion, write a 5 paragraph response that addresses the following: • Choose a change initiative that failed from your current working environment or a recent working environment and briefly describe the trigger for the change. • Describe the main type of change as incremental or discontinuous. Is the organization’s typical response to change reactive or proactive? Did your organization follow their typical response to change? Why or why not? • Make a note of the indicators that you believe were used to assess whether or not your organization–and your department or unit within the organization–is effective in relationship to this change initiative. • Using material in Exercise 7.1 on page 125 (Hayes), identify the information used to assess the current state of your organization before the change was initiated. What information do you think should have been assessed that wasn’t and why? • Using the Leader-Member Exchange Model and the LMX 7 Questionnaire on page 180 (Northouse), describe your leader’s relationships and the positive and negative effect on this change initiative. Using the material in this module, describe why the initiative ultimately failed. • Respond to your peer’s evaluation of their change initiative. If you were asked to evaluate the change initiative, what questions would you need answered? [MO 1.1, 1.2, & 1.3] One of the considerations when participating in course discussions is to keep an open mind and be appreciative of the fact that we don’t all share the same perspective. The discussion forums are an opportunity to apply what you are learning to situations that are relevant in your current working environments. Use this opportunity to learn more about your current working environment and how others deal with similar situations in their working environments. Part of your job in this course is to show not only what you know about the theory, but also more importantly how you can apply it to the situations we are discussing. This holds true in the discussions that ask for personal experience. In fact, being able to see the connections your personal experience has to theory truly highlights your increased learning in the course. Keep this in mind as you write your original responses and as you respond to other learner’s posts. Your responses to the discussion questions should relate the assigned readings and viewings to the discussion topic and should not consist only of personal opinion. Your opinion is important to the discussion, but it is important that you add connections to the material to support your views. Without a foundation in the literature, your opinion has little professional value. For example, “Based on Trevino and Nelson’s stance that cultural relativism creates an environment where unethical behavior is justified through the cultural discourse (year, P#), the discussion should center around……” This type of statement allows you to connect your views to the literature. This is possible even when you are providing personal examples. Further Instructions on Discussion Forum (DF) 1: Please read before responding  This is where I will be  giving you further instructions on the various discussion forum (DF) questions.   In this case, please structure your answer in 5 paragraphs.  Paragraph One should be a brief description of your organization (or the one you will be studying) and your position within that organization. Paragraph Two should cover the first 3 points in the assignment.  Be sure to answer all sections of the questions. Paragraph Three should answer the next question referring to Exercise 7.1 in the Hayes text. Paragraph 4 should answer the LMX question. Paragraph 5 should sum up with you describing why the initiative (in your opinion) ultimately failed.
ESOH 245 Sustainability: The Human Footprint – Global Environmental Change in the Anthropocene This course is a study of human impact on our larger biophysical environment; an impact that has grown to the point where we are now living in the ‘Anthropocene’, an era in which humans have become a key driver in the Earth’s system. The course will focus on the ways in which humans modify and interfere with the functioning of terrestrial and aquatic ecosystems, the atmosphere, the lithosphere, and the hydrosphere. The course will explore human population growth and environmental problems as these have evolved over time. The fundamental objective of the course is to provide students with a modern perspective on our growing human population, the increasing demands for resources to supply our consumptive economy, and the impact of local, regional, and global pollution. ESOH 140
When a school shuts down, how will the students be compensated Students in Southern California’s largest city of Los Angeles will receive a $1,000 scholarship to attend a private college that will be offered to anyone who successfully completes the online courses, according to a Los Angeles Times report. The scholarship will be awarded for a minimum of five years, with the possibility of extending for up to two years. The school, which opened in 2014, is the latest to try to capitalize on the growth of the “Silicon Valley Model,” which has seen an influx of entrepreneurs and venture capitalists invest in the tech industry, and a surge in student enrollment. The new program is one of several similar initiatives being touted in the region, according the Los Angeles Business Journal. The idea is to lure the best students to colleges where they can learn in a more professional environment. The university hopes that the program will encourage students to take on challenging projects in an effort to improve their English and math skills. More: More than 80% of Southern California students now attend a school where they complete more than one online class a week, according an annual survey from the Association of American Universities. Which social psychologists have had the biggest impact on our lives? A recent survey of 100 social psychologists found that psychologists have significantly contributed to the development of the field. The survey was commissioned by the National Association for Social Psychology and asked a broad range of social psychologists what they think has influenced their work in their fields. The results, published in the Journal of Personality and Social Psychology, found that psychology has had a significant impact on social psychology and philosophy since the 1970s. The results are significant because they show how important psychologists have been in changing how we think about human behavior and how we understand our culture, said Daniel Hamermesh, a professor at Emory University in Atlanta, who was not involved in the research. Psychologists have a long history of trying to figure out how human beings behave. The field was started by Carl Jung and later expanded to include behavioral economics and sociology. They also started a field of ethics called psychology of mind. The work is now considered the foundation of social science. The findings show how influential psychology has been, Hamermoesh said. The survey also revealed that psychologists are not the only ones who have had an impact on the field, Hester said. It also shows that psychologists may have contributed to social science in some other ways as well. For example, psychologists have contributed by being influential in the development and application of the social media technology, said Hester, who is also the founding director of the University of Minnesota’s Institute for the Psychology of Media. Psychology is a science and psychology are intertwined. People who are in psychology are also in psychology. So, psychologists contribute in a way that’s unique and they have their own contributions. They have their distinctive ideas about what is important and what is not important, Hibermesh said, adding that psychologists help make sure that people understand what’s important and how to get it. The findings show that psychologists work closely with their students to try to understand the ways that the world is made up of people, said Emily Ebel, who teaches psychology at Emulation College in South Florida. Psychologies students are also often part of the team that has to come up with ideas that psychologists want to explore. They often do this in the classroom, and it’s really a collaborative process,” Ebel said. In general, students are the ones who are the most engaged with their research and they want to make sure they get their ideas across to their peers. The research team is really trying to make them think outside the box. They’re trying to find things that are more meaningful to the students, so students can relate to it, Ebel added. Some people find psychology helpful, but some don’t, said Ebel. In general, people want to be informed, and the information they get from the research helps them better understand themselves and others, EBel said. Psychologist Carol Brown said that the field of psychology is a field that has changed over the last 50 years. She said that psychology is more like medicine than it is like business. Psychological science is the study of mental health. It involves research that helps us understand the psychology of people and society, she said. The main challenge of the work of psychologists is understanding how people live their lives. People often think of psychology as a scientific discipline, Brown said. But in fact, the field has many different fields that are related to it. For example, the social sciences, social psychology, and psychological science are all related to the study and study of people’s social lives. People may use one or the other to understand themselves. Psychiatric psychologists have a big influence on social issues such as mental illness and suicide, according to the survey. But they also help to make decisions about who should be treated and how, said Amy Deutsch, a graduate student in psychology at the University at Buffalo in New York. Psychiatrists work with people to understand how they live their life and help them make sense of it, said Deutsch. They are a part of a community that helps them to understand their patients, she added. Is there a difference between a sociologist and a quantitative sociologist? Is there an important difference between the sociologist, a sociologist trained in quantitative analysis, and a sociological social researcher, a quantitative social scientist trained in sociology? The answer to that question, it turns out, is a bit more complex than the one most researchers would like to think. Sociologists are interested in the ways in which society and culture interact, and they often look to social scientists and sociologists as the experts on social change. “If you ask me, it’s more complicated than I thought,” says Daniel Bussmann, a psychologist at the University of North Carolina-Chapel Hill. “I’m not the one doing the work. I’m a sociolinguist. And the sociolgists I’ve been working with have been very good at identifying the sociocultural influences in society.” What is sociologically important? Sociologists have historically studied the ways people interact with one another, and how they think about others, to better understand how society develops. The study of how we think about people and the ways that we can affect others is an important area of sociological research, because people are often shaped by what we see and how we feel. The sociologist’s role in social change is a key part of that work, but it’s also the area in which sociographers and sociological researchers generally disagree. The two camps are, on the one hand, deeply divided. Sociologist Daniel Bessmann is one of the most prominent researchers on social relationships in the world. Bussman is a graduate student at Harvard University, where he studies how people connect in new contexts. His latest book is called “The Unconscious: The Psychology of Communication,” which is about how we construct our social relationships. “The most important difference is that sociological sociology has a social and political dimension,” says Bussbaum. “In sociology, we study social change, and it’s the social dimension that we focus on.” Sociologists also often focus on how individuals think about and interact with others. Bessman’s work focuses on how we develop and communicate new ideas about ourselves, our own experiences, and our place in the social world. But Bussmahner also has an important social and economic role in his work. He is the co-director of the Sociological Analysis Unit at the Graduate Center of the City University of New York, and he’s worked as an assistant professor at Harvard and at the Johns Hopkins University. “Bussmann has a very particular perspective on sociological questions and questions of power,” says sociologist Robert P. Cohen, who is also a member of the University at Buffalo faculty. He says that “bias” can sometimes come into play in the study of social relationships, and that Bessmahners studies of social interactions can be somewhat skewed by the fact that he has a focus on one particular social variable. “ He explains that Bussmen views of social change focus on people’s interaction with others, and in particular, on how people feel about others and how those interactions affect them. “There are people who think it’s important to look at how people use social networks to communicate, and to see if people are using them in ways that are different than others. “ Some people, for instance, see a lot of work in social psychology as a way to measure inequality and power,” he says. ” But Bessmeant says that he is not a racist, sexist, or anti-gay person. “ “No, I am not,” he tells Newsweek. “ ” I’m an egalitarian and a person who wants to change the world for the better.” “ No, I am not,” he tells Newsweek. In his book, Bussmans study of human relationships focuses on the ways we use our own bodies and bodies of others to communicate with each other. But what do we know about the relationship between body language and our relationship to others? “It’s the most important study in the field,” says Cohen. “This is not some one-size-fits-all study.” What does body language tell us about how people think? Bussnahs research has focused on body language, a concept that has long been known to help sociogamists and sociolo-social scientists understand how we understand people. Buhammer, for example, uses the term “body language,” which means the way we move our bodies, or what people say about what they do. And he says that body language is the most revealing piece of social behavior. “It can tell us a lot about how a person is feeling,” Bussmeant said.
Tell a Joke Day comes on August 16 of every year. On this day make everyone around you giggle, guffaw, chortle, cackle, or in other words, laugh, by telling them a joke. The Joke is something that can be spoken, written, or done with humorous intention. Throughout human history, Jokes have been an integral part, and many great minds have spent time and energy trying to learn what makes the jokes funny. “I love my lecture tours. I get up onstage. I have my stack of books and a glass of water and a microphone. No podium, no distance between me and the audience, and I just talk to people and get all excited and tell a lot of jokes, and sing some songs, and read from my work and remind people how powerful they are and how beautiful they are.” – Suzan-Lori Parks History of Tell a Joke Day The origin and the creator of Tell a Joke Day are still unknown. But the creator founded this day to make the world a happier place by telling and listening to the jokes. The jokes can be of different types. They can be textual, as in the case of a one-liner, a whole story, or the form of a question and answer, where the response will provide the humor. Jokes can also be physical such as in the case of a prank or a practical joke, where the performance provides fun rather than words. Whatever may be, the main aim of Joke is to make others happy. According to the research of Dr. Paul McDonal of Wolverhampton University, a fart joke from ancient Sumer is believed to be the world’s oldest known joke. Meanwhile, Britain’s oldest joke is a 1,000-year-old double-entendre that can be found in the Codex Exoniensis. Tell a Joke Day Other Celebrations on August 16 August 16 is also celebrated as How to celebrate the day Celebrating the Tell a Joke Day is quite easy and very simple to remember. Every time you meet someone on this day, tell them a joke. Ensure that the jokes are appropriate for the setting. On Lunchtime, pick up a fun book and spend some hours reading it. Spend the day by watching the performance of your favorite comedians and your favorite comedy shows. You can use the hashtag #TellaJokeDay on social media to express your ideas about Tell a Joke Day. Thank you for reading the post. You can celebrate every day with and Happy Tell a Joke Day 2021. Would you like to receive notifications on latest updates? No Yes Enable Notifications    OK No thanks
Numbering the Dead A hundred and fifty years ago, slightly more, a strange notion: the dead could be counted. In the Civil War, in the lush fields of the South, Americans first, as a culture, began to imagine death in numbers. Rosters of soldiers, as well as lists of war casualties, were not common practice in the mid-nineteenth century. Many officials feared responsibility for the dead by numbering or naming them, and military leaders felt an accurate count might embolden their enemies. The Return A deserting Civil War soldier sets out for home. "As he approached Jacob Story’s farm, Benjamin saw that the corn stood dark and high. No hard frost or gullywasher had come. The signs held true, not only for the corn but the beans and tobacco. Smoke rose from Jacob’s chimney. Noon-dinner time already, he thought. Benjamin followed the trailway through a stand of silver birch, straddled a split-rail fence, placed one foot on his land and then the other. He had hoped Emma would be in the cabin. That way he could step onto the porch, open the door, and stroll in no differently than he would coming from a field or the barn. Benjamin wanted their separation to seem that way, he wanted to never speak of the war or their months apart. He wanted it to become nothing more than a few dark moments, like a lantern carried through a cabin’s low door."
Endorphins give you a boost of overall well-being and happiness, which can affect depression, stress, sleep, self-esteem, and blood pressure. If you have ever heard of the phenomenon known as a runner’s high , that is a direct result of endorphins being released in the body in times of exercise. Endorphin production can also be triggered by vigorous aerobic exercise. But because no two bodies produce the same amount of endorphins in response to stimuli, there's no way to tell exactly how much exercise you need to bring on an endorphin high, Lombardo says. Exercise Therapist Rachel Rees shines a light on the body's natural high. Any type of exercise, whether high impact or low impact, causes endorphins to be releases in the body. So, what are they, actually? Exercise is also responsible for the creation of new brain cells in the part of the brain responsible for learning and memory [source: Karolinska Institutet]. Aerobic exercise. Dopamine may have a distinct role in fighting stress and in countering depression by acting on the limbic system, a part of … Endorphins work as the body’s natural pain killers. Runner's high [edit | edit source] Another widely publicized effect of endorphin production is the so-called "runner's high", which is said to occur when strenuous exercise takes a person over a threshold that activates endorphin production. Runner’s high is a psychological condition where runners and feel invincible with little discomfort. The “Runner’s High” Effect: How Do Endorphins Work? Endorphins have been suggested as modulators of the so-called "runner's high" that athletes achieve with prolonged exercise.   Some of these are known as endorphins, the body's feel-good chemicals. Nevertheless, it remains unclear as to whether the levels reflect the process of training per se, or whether they simply mirror the increase in work output that is induced by training. After 20 to 30 minutes of hard aerobic exercise, endorphins are released and will result in a mood and energy boost for two to three hours, and a mild buzz for up to 24 hours. A relatively new implication for the endorphins and associated changes with exercise is in ventilatory regulation. Exercises to Release Endorphins. The word endorphin comes from ‘endogenous’, meaning from within the body, and ‘morphine’, which is an opiate pain reliever. Here are the main benefits endorphins … Exercise to Energise! The same phenomenon may also play a role in exercise addiction. People may try exercising with all types of intensity, whether it is light or hard. The endorphin subtype most often implicated in pain relief is called beta-endorphin. The problem with jumping to the conclusion that endorphins cause your “exercise high” is that in large-scale studies, scientists measure endorphins present in the blood — not the brain. The best way to explain what endorphins do for a person is that they give you a natural high. They block pain to produce a high. Well, there are two main theories: One is that exercise provides a rush of endorphins (a.k.a. While strenuous physical exercise is the most widely known way to increase endorphins, it isn’t the only way. Endorphins are compounds produced by the pituitary gland and hypothalamus during certain activities, including not only strenuous exercise but also excitement, orgasm, even laughter — anything that causes pleasure. A good run and lots of walking will not only drain excess energy in the dog, but will aid in the production of both endorphins and serotonin which will help your anxious or high energy dog to feel calm, relaxed and sleepy. When you engage in high-intensity exercise, your body and brain produce hormones and neurotransmitters that have a positive impact on your mood, memory, energy levels, and sense of well-being. The type of exercise you do can also have an effect on the length of time it takes to achieve the natural high. However, it’s actually fairly subjective. Endorphins give you the high without the crash. Another weakness in the argument that endorphins explained the “runner's high” was the dilemma of defining it, the use of tools with unknown validity to measure it, and the absence of data documenting its reproducibility or how it changes during and after exercise. Endorphins are chemicals that pass signals from one neuron to the next. But, in the year 2008, a new imaging technology became accessible. Interestingly, happiness and exercise are similar in two notable ways: both are independently associated with a boost to the immune system, and also with the release of endorphins. Endorphins may play a role in the so-called "runner's high," which describes the feelings of euphoria long distance runners experience after prolonged bouts of exercise. Additionally, exercise equipment can increase your training and support your weight management. Not everybody can exercise at the same levels of intensity, though, so choosing the right exercise for each body type, fitness level, and environment is essential. Endorphins may contribute to the positive effect of exercise on anxiety and depression. 18th November 2020. Some of the benefits of exercise, such as lowering stress and improving cognitive function, may be due to its ability to boost dopamine and serotonin levels. Endorphins were discovered by scientists in the 1970s and are often referred to as those feel-good hormones, but what exactly are they and why are they so good for us? Endorphins have been the focus of research since the 70’s and have succeeded in demonstrating the existence of an endorphin driven ‘runner’s high’ after exercise. A number of studies have suggested that endogenous opioids depress ventilation and may, therefore, play a role in ventilatory regulation by carbon dioxide, hypoxia and exercise. Endorphins have a number of effects on your brain, reducing the perception of pain and triggering that post-workout elation, also known as the runner’s high… It has long been attributed to endorphins. Exercise is a fantastic way to boost serotonin and endorphin production. The natural high of endorphins. This article provides an overview of this emerging field. This is because vigorous exercise helps to release the chemicals necessary for the mood-raising high. Furthermore, plasma {3-endorphin generally Since the 1970s runners high has been attributed in the popular imagination to the exercise-triggered production of endorphins, the brain's own morphine-like molecules. The release of β-endorphin contributes to a phenomenon known as a "runner's high." Endorphins and Exercise ... high levels of ACTH noted in a star marathon runner. Yoga is also great as it … It occurs in conjunction with sustained aerobic exercise (running, but also swimming, cycling, or … ENDORPHINS "Exercise high" Found in the Brain & distributed throughout the nervous system. Neurotransmitters play a major role in the function of the central nervous system. Recent findings show that exercise increases serum concentrations of endocannabinoids, suggesting a possible explanation for a number of these changes. According to the NHS, exercise can reduce your risk of major illnesses by up to 50% – that’s things like high blood pressure, stroke, type 2 diabetes, cancer and depression.Exercise can alsolower your risk of early death by up to 30%. You’ve probably heard the term “runner’s high.” That phrase refers specifically to the feeling of happiness and well-being, also called euphoria, that people get when they exercise intensely. One example is how exercise releases endorphins and dopamine after a 10 to 15 – minute routine. Everyone should try to exercise to live a healthier life. Gym goers begin to enjoy exercising the quickest, in just six minutes and 36 seconds. Popular culture identifies these as the chemicals behind “runner’s high,” a short-lasting, deeply euphoric state following intense exercise. Le Sucre Lab, Trustee Won't Distribute Assets, Sticky Footer Flexbox, Modals Of Possibility May, Might, Could Exercises, Glencoe Mathematics: Applications And Concepts, Course 1 Pdf, Ford Performance Hood Struts Gt350, Kgh Op Details,
Diamond is a crystal Diamonds: The Origin of Fine Crystals For centuries they have adorned the nobility and the upper classes in combination with gold and silver: diamonds. The origin of the coveted gemstones is limited to a few locations worldwide, most of which were only discovered in the course of the 20th century. The history of diamonds, on the other hand, begins thousands of years before Christ in ancient India, where the precious crystals were worshiped as magical talismans. Diamonds were also highly regarded in the Roman Empire, both as jewelry and - thanks to their unsurpassed degree of hardness - as part of special tools. The origin of the diamonds Diamonds are made of carbon, which is rarely found in the earth's mantle. Since high pressures and temperatures have to prevail during the production of the gemstones, they usually find their origin at depths between 150 and 660 kilometers before they are transported to the surface. Even with meteorite impacts, smaller diamonds are produced, but these are usually only a few nanometers in size. The largest diamond deposits in the world are located in Russia, many parts of Africa, Australia, Canada and Brazil. The roughly 500 sites on all continents also include several sites in Germany, including the Nördlinger Ries on the border between the Swabian and Franconian Jura. Every year around 20 tonnes are extracted worldwide, which, however, only accounts for a fifth of global demand. The remaining demand is covered by diamonds that are not of natural origin. In 1953, the Swedish physicist Erik Lundblad invented a way of converting graphite into diamonds in a hydraulic press at high temperatures. These artificial gemstones are preferred in industry for use in tools and are of significantly less value compared to their natural counterparts. Diamonds: factors determining value In their original and purest form, diamonds are colorless and transparent. The shimmering colors, which can range from green to red to deep black, are created through contamination with nitrogen or other materials or through defects in the crystal lattice. However, since these natural manipulations occur comparatively rarely, colored diamonds are significantly more valuable than their colorless relatives. In addition to the color, however, other factors also play a role in determining the value. These include the cut, the clarity and the carat number. The clarity of a diamond determines its transparency, the brightness of the material and the gloss of its surface. If even the smallest defects are discovered here, the value of the diamond drops rapidly. If, on the other hand, it achieves a level of clarity of LC / IF, it has neither internal nor external defects. Carat number as a unit of weight Another important factor is the number of carats. In contrast to gold, where the carat is used as the unit of measurement for the fineness, the carat number indicates the weight of diamonds. One metric carat corresponds to 0.2 grams. When buying diamonds, most investors will encounter weights of 0.25 carats up to a maximum of 2.5 carats. The value of a diamond of the highest clarity level with a perfect cut in the color group “Very fine white +” is just under € 80,000 with a carat number of 2.0. For comparison: the largest diamond ever found, the “Cullinan”, had a gross weight of 3106.75 carats in 1905 - and thus an unimaginably high value even by today's standards. The diamond was split into 105 individual stones in 1908, the nine largest pieces are now part of the British Crown Jewels in the Tower of London. And so diamonds will probably continue to cast a spell on mankind in the future - and for investors, too, they represent an interesting alternative to trading in precious metals. Investing in diamonds: Fascinating niche with small pitfalls Investing in diamonds is a solid investment with high potential for appreciation. The market is also increasingly opening up to private investors. > read more © Verlag für die Deutsche Wirtschaft AG, all rights reserved
As the climate changes, architects and engineers need to design buildings differently A house in western New York during the ‘Snowvember’ snowstorm of 2014. Credit: Duane Warren, CC BY-ND In the past seven years, four major disasters have caused serious disruptions in the Northeast and Midwest United States. Hurricane Sandy slammed into New York City in 2012, inflicting nearly US$11 billion in damage to buildings. In 2014, a storm dubbed "Snowvember" dropped more than seven feet of snow in western New York. Three years later, historic flooding along Lake Ontario inundated numerous homes and businesses. And severe storms in the Susquehanna River watershed in 2018 caused more than $1 billion in damage. As Earth's climate changes, the frequency, intensity and duration of these extreme weather events is expected to increase. At the University at Buffalo, I lead a laboratory that studies and buildings. Our research shows that the U.S. building stock may not be prepared for future climate-related storms and flooding. Another challenge is that buildings consume a lot of energy, which accelerates climate change. Organizations like Architecture 2030, a professional alliance that promotes , point out that buildings contribute nearly 40% of , and are an important target for carbon reduction programs. To this end, our lab focuses on the intersection of energy efficiency, renewable energy and adaptation to climate change. We recently completed a multi-year study outlining how climate change is affecting New York State's building sector and potential strategies to adapt buildings to a changing climate. Encouragingly, we found that Americans can protect themselves from extreme weather and reduce buildings' contribution to climate change at the same time. Top threats: Hurricanes and flooding Hurricanes were the costliest events to hit New York state in the past half-century, accounting for $25.7 billion in damage from 1960 through 2014. A large portion of that total was attributable to Hurricane Sandy. Flooding ranked second in total damage. In addition, from 1960 through 2014, every county in New York suffered at least one flood that caused damage to buildings. Floods also caused the highest per-event property damage and a higher-than-expected share of damage costs. Our data also showed that were the most frequent event, but accounted for only 16.8% of total damage statewide. Winter storms were the most economically significant hazard event in the regions surrounding Lakes Ontario and Erie, causing the highest per-event property damage in places like Rochester and Buffalo. We also examined other climate-related hazards like pest infestations, , sea level rise and wildfires. It was difficult to assess their economic impacts due to a lack of reliable data. However, research shows that these hazards could have serious financial implications for the built environment in a climate-altered future. Our most important finding was that climate-related disasters disproportionately hurt regions that lacked large cities, such as the Adirondacks and New York state's Southern Tier across its border with Pennsylvania. These rural zones may lack the human and financial resources to prepare for or to recover from storms. Flood control around the Great Lakes is complicated because lowering water levels in one part of the system raises them elsewhere. Making buildings more resilient We interviewed more than 40 architects, engineers, planners and government officials in the northeastern United States to understand how they were preparing. The majority of building-related professionals assumed that future weather conditions would resemble the past. But trends in the data show that this is not the case. In our opinion, architects and engineers will need to reevaluate their standard practices for designing, constructing and operating buildings. This can reduce the negative impacts of climate-related hazards like hurricanes, flooding and . For example, after Hurricane Sandy the Federal Emergency Management Agency sent a team to New York and New Jersey to evaluate building damage and recommend changes to engineering codes and standards to minimize future damage. One of their recommendations—elevating buildings above the base flood elevation—has been incorporated into the New York City Climate Resiliency Design Guidelines. Raising the first floor of a building isn't the only way to protect it from high water. Another strategy that is being incorporated into buildings across New York state is wet floodproofing, an approach that allows floodwater to enter a structure without causing damage. This requires firmly anchoring a building to the ground, using flood-resistant materials in areas that will be underwater, protecting mechanical and utility equipment and using openings to let floodwater escape. Although hurricanes and flooding cause significant damage to structures, we can't ignore the human impacts. Heat waves kill more than 600 people every year in the United States. Often these deaths are associated with power losses that shut off critical air-conditioning systems. Rethinking the design of building walls and roofs to protect occupants—an approach called "passive survivability"—can help maintain critical life-support conditions during an extreme heat event. These resilience strategies can easily be applied to new buildings. They should also be considered as retrofits for existing buildings where people may shelter in place during extreme weather, such as community centers. How will architects and builders respond? Our Climate Resilience Strategies for Buildings in New York State report builds on other documents from green building organizations that focus on preparing for extreme weather events. Still, many questions remain—for example, how to find the resources to prepare existing buildings for climate change, how to prioritize investments and how to train future architects and engineers to tackle this important issue. At the University at Buffalo, we have offered several design studios that explored how building designs must change. This experience has helped prepare future architects for a reality that may reshape their careers. But research and teaching alone won't solve the problem. Professional architecture and engineering organizations need to modify policies that don't currently reflect the realities of climate change. They can accomplish this by changing their sample contract documents, rating systems and design standards to propel the field forward. Leadership from the professions can help convert recent research on change and the sector into badly needed action. Explore further A look at how the changing climate is impacting New York State's building stock Provided by The Conversation Citation: As the climate changes, architects and engineers need to design buildings differently (2019, October 24) retrieved 22 September 2021 from https://phys.org/news/2019-10-climate-architects-differently.html Feedback to editors
20 March 2009 Theremin - one of the earliest electronic musical instruments, invented (1920) in the Soviet Union and named for its creator, Leon Theremin . A forerunner of the synthesizer, it consists of a wooden box fitted with two radio-frequency oscillators and two metal antennas, a vertical rod on the instrument's right and a horizontal ring on its left. The player moves the hands in the air around the antennas without touching them, creating changes the antennas' electromagnetic fields.
The ghosts of Easter past Today Easter is mainly celebrated by Easter bunnies delivering chocolate eggs to the delight of little children and to the owners of Cadbury and Lindt and all corporations that hide behind the persona of Willy Wonka. Easter is a holiday. But by holiday do I really mean holi day? “holi” being the Hindu celebration of the start of spring in which they welcome the Lord of Pleasure, Madana, son of Vishnu and Lakshmi? Or do I mean a Christian Holy Day, a day when we put aside our daily toil behind the plough, over the blacksmith’s fire or on top of a thatched roof, and attend worship services on a day set aside by the Christian Church for devout chanting and singing in the commemoration of a significant religious event? In New Zealand, this Easter holiday is, of course, to commemorate the death and celebrate the resurrection of Jesus of Nazareth; and we are commemorating this because, based on belief in this resurrection, the collection of Christian Bishops, gathered together by Roman Emperor Constantine in Nicaea in 325 A.D., voted that Jesus was actually a God equal to God the Father as well as a human. With this declaration 1645 years ago, the Christian religion was established as a bona fide stand-alone religion rather than just a sect of Judaism. In the Roman world there was no limit on the numbers of Gods and any ‘faith’ had to be headed up by a specific God. And so Christianity was established to become one of the three great religions of the modern era. It  also slightly adjusted the original Christian Church’s Judaic base belief system from being purely monotheistic to now being a trinity of three Gods in one: a human form, a spirit form, and a paternal form. For a Church that believed that Jesus’ resurrection demonstrated the triumph of a human-form of God over the pagan forces of nature, it is peculiar, then, that the date of Easter changes annually, based on the timing of the first weekend after the full moon following the Spring Equinox. This uses an undeniably pagan calendar and coincides with a long-established Spring Equinox pagan festival. This came about because in 595 AD, Pope Gregory sent a mission of 40 monks led by a Benedictine called Augustine, who became the first Archbishop of Canterbury, with instructions to convert Pagans to Christianity by superimposing Christian events over established Pagan festivals.  The Spring equinox celebration in paganism (witchcraft) today is called the feast of the Germanic goddess of fertility and new birth “Ostara” or “Eostre”, which is clearly the root name for our Easter. This is one of the eight neopagan holidays that make up the pagan wheel of the year. And if we dig a little deeper in history to paganism in Rome at the time of Emperor Constantine, we also find the older Spring Equinox festival where they believed in a goddess Cybele, the great mother of Gods, who had a consort named Atys. Atys had been a shepherd who was born of a virgin birth from his mother, Nana. Atys died from wounds inflicted by a boar but by the power of Zeus his body did not decompose. Atys was then celebrated each year during the Spring Equinox. It is said that during this festival a pine tree was cut in the woods and brought to the sanctuary of Cybele. The duty of carrying the tree was entrusted to a guild of Tree bearers. The trunk was swathed like a corpse with woollen bands and decked with wreaths of violets (violets were reputed to have sprung from the blood of Atys). The parallels to our Christian mourning of the crucifixion are uncanny. On the third day of the festival the high priest (Archigallus) drew blood from his arm and offered it as a sacrifice. The inferior clergy also danced their way into a frenzy of self-mutilation to splatter their blood on the tree. The splattering of blood was supposed to be an aid to resurrection. Again the sacrament of the blood of Christ offered up at the last supper is an uncanny parallel. The subsequent rebirth of nature as spring progressed is then seen as proof of the restoration of life. The worship of Cybele and Atys was brought to Rome from Phygria (Asia Minor) in 204B.C. Atys was made a solar deity in the 2nd century ad so was an established god at the time of Nicaea. The black stone (meteorite?) in which the spirit of the goddess was embodied was entrusted to the Romans who installed it in the temple of Victory on the Palatine Hill. The subsequent harvest was exceptionally good and her position in their belief system was established. And so it came about that the crucifixion and resurrection of Jesus the Nazarene over-wrote the existing Pagan narratives as the official Roman celebration of the rebirth of Spring. All the way through my Roman Catholic upbringing, the core of our faith was based on the dogma, ‘that Jesus, son of God, died on the cross for man’s sins;  so that man could now become righteous in God’s eyes’ 1 Peter 2:24: “He himself bore our sins in his body on the cross, so that we might die to sins and live for righteousness.” This dogma referenced back to the last supper when Jesus metaphorically said that the wine represented his blood and the bread represented his body, and that he would sacrifice his body and his blood as the new covenant between God and man. This then came to pass the next day with his crucifixion. So, what was that all about? If I had to think about this, I would have to puzzle over why an all-loving God would require his Son to suffer and die a cruel death as a means of atoning for the evils of man. There seemed no co-relation. How would having his Son rejected, tortured and killed by humans actually thereby make humans more acceptable to God as a righteous species? While I had been studying the Babylonian texts published  in 1965 by W. G. Lambert and A. R. Millard, texts that had been written around 1650 BCE, (approximately 250 years before Moses is believed to have received the teachings of Genesis from Yahweh), I noticed that the translated epic actually contains an account of the sacrifice of a God. The Atrahasis epic is written on three tablets in Akkadian, the language of ancient Babylon. Let her create, then, a human, a man, Let him bear the yoke! Let him bear the yoke!” Let man assume the drudgery of the god. They slaughtered Aw-ilu, who had the inspiration, in their assembly. Nintu mixed clay with his flesh and blood. That same god and man were thoroughly mixed in the clay. For the rest of the time they would hear the drum. From the flesh of the god the spirit remained. It would make the living know its sign. Lest he be allowed to be forgotten, the spirit remained. After she had mixed the clay, she summoned the Anunna, the great gods. The Igigi, the great gods, spat upon the clay. Mami made ready to speak, and said to the great gods: “You ordered me the task and I have completed it! You have slaughtered the god, along with his inspiration. I have done away with your heavy forced labor” For this purpose of creating a man to make him useful to the Gods, one of the lesser gods was sacrificed, and his flesh and blood was mixed with clay from which process man was made. This reference to mixing with clay to create man in both the Greek and Biblical texts: “Prometheus shaped man out of clay, and Athena breathed life into his clay figure. Genesis 2:7,” Yahweh God fashioned man of dust from the soil. Then he breathed into his nostrils a breath of life”. But these Akkadian texts describe the sacrifice of a God so that his flesh and blood could be mixed with man to make the man useful to the Gods developing from primitive beasts to intelligent farmers and workers. The similarity to the account of the sacrifice of body and blood of Jesus as the new covenant between God and man in the New Testament is quite astounding. It requires some further research on how this more  modern Christian dogma actually came to us. If any of Jesus’ followers believed that God was promising to finally deliver them from the yoke of Rome and give them peaceful sovereignty over the Holy land, then they were disappointed. After two more failed Jewish rebellions in 70 AD and 135 AD, the Romans brutally crushed the Jewish state with hundreds of thousands of Jews killed, deported or sold into slavery. The Romans renamed Judea as Palaestina, derived from “Philistine”. The development of Christianity in the first 100 years AD therefore evolved as one of saving the eternal souls of believers rather than saving the Jews from the military rule of Rome. Unlike other recorded messianic claimants at the same time, who generally met the same fate of Jesus of Nazareth, the Christian movement was not ended with the death of Jesus; indeed it flourished after his death.  That the disciples of Jesus continued openly to preach the beliefs of Christianity, knowing this would lead to their own execution, is the strongest proof that they now believed in the afterlife based on the belief that Jesus, the man born as a result of a visit by angels to the virgin Mary, had risen from the dead. So the question that I raise is, did the Council of Nicaea actually achieve an official takeover of Paganism by Christianity, or was the establishment of the Roman Catholic Church in effect a reverse takeover of the original Christianity by the pagan emperor Constantine? After 300 years of Rome trying unsuccessfully to suppress this Judaeo-Christian cult, did he in fact simply don a Christian façade and bring the dissident Christians under his control in this way? Was the new, improved Christianity post-Nicaea simply a hybrid Pagan/Christian religion designed to bring a bit of religious harmony into the Roman Empire? Did he bring the feasts of paganism and the dates of paganism, complete with funny hats and symbolic staves? (plural of staff, didn’t you know?), meld them with carefully edited texts about the life of Jesus (many original texts were said to have been declared heretical by this new church, and burned) and say: “Behold the new Christianity!”  Certainly once Rome became the holy seat of the Church, the blame for Jesus’ death was attributed to a divine decision to sacrifice his son for the forgiveness of the sins of all men rather than being a military execution by the Roman Governor. How much do we really now know, then, about the early Christians? And what did they really believe? It was Peter who first started preaching to pagans sometime after the crucifixion and later Paul, who only joined the mission years after the crucifixion, also extended the mission to the pagans and gentiles. But the original mission as stated by Mathew’s account of Jesus’ instruction (Mathew 10:5) was “Do not turn your steps into pagan territory and do not enter any Samaritans town; go rather to the lost sheep of Israel.” And later in Mathew 15:12 when a Canaanite woman asked for help, Jesus’ reply was “I was sent only to the lost sheep of the House of Israel… is not fair to take the children’s food and throw it to the house dogs.”  Very clear Judaic messages. We do know in the early days post-crucifixion there was much dispute among the Christian disciples about Peter and Paul selling out this Jewish mission to the Pagans. So was the Council of Nicaea like “Bethlehem’s family, baking bagels since 33AD” selling out to “Romano’s Pizza Temple – global franchise enquiries welcome”. Of all our holidays, Easter must be the most confused. Whatever your religious beliefs, it would appear that the Roman-Christian festival of Easter is in fact an appropriation of the Pagan festivals of Eostre and of Attys, including the moving-feast practice to align annually with the full moon following the Spring Equinox. Constantine obviously, but understandably, didn’t think it through to the spread of his Empire to the southern hemisphere. 1. Leave a comment Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
Part of the 4TU.Federation Resilience Engineering Quantifying resilience in dairy cows Calving and adaptation to the new lactation are critical transitions for dairy cows. During early lactation, cows have an increased risk of diseases and disorders. Some cows may be more prone to get sick than others. Akke Kok is a researcher at the Wageningen University and Research and postdoc at DeSIRE. In her research she tries to find a way to quantify the resilience of a cow before the onset of disease.  Indications for the resilience of a cow  “A cow with a higher resilience is more likely to stay healthy, and recovers more quickly if she does become sick. This is better for the farmer, and better for the animal. The farmer loses less time and money to treatment. The cow is healthier, and has a better life because of that” Akke Kok explains. There are two ways to increase the resilience of a cow. “One way to do this is to select for cows with a higher resilience. Another way to do this is by making changes in housing and management, to reduce the disturbances a cow is facing. A farmer can make changes that decrease disturbance on the farm, which leads to an increase in the wellbeing of the cows. For example, proper ventilation can reduce experienced heat stress, and good management can facilitate adaptation to lactation.” The researcher is looking for ways to determine which cows have a high, and which cows have a low resilience, in the absence of disease. In a first attempt, she was researching if fluctuations in milk production could be an indication for the susceptibility of a cow for the udder disease mastitis. “Fluctuations in milk yield were increased in cows with mastitis, but only after the onset of the disease. As such, milk fluctuations in the absence of the disease were not informative of resilience. Currently I do research to find out if the lying behaviour and other aspects of the milk production of cows can be used to quantify resilience. Eight dairy farm in the Netherlands provided me with lying and activity data. I am currently analyzing this data in combination with health records and milk production data.” Known and unknown disturbances Deviations in lying patterns of dairy cows can provide insight in the degree of disturbances on the farm, as well as the individual response to these disturbances. A number of these disturbances are known. A heat wave in summer, for example, or a calving event. When there is a sudden change in lying patterns and milk production, the cause can also be an unknown disturbance. “If I find an unexplained fluctuation for the whole herd, I can ask the farmers if they are aware of the cause” says Akke Kok. “By doing this, we may identify disturbances that were unknown to us, prior to this research. This understanding can help to strategically reduce the disturbances on a farm. This will increase animal wellbeing.”   The future of the research Cows whose behavioural patterns are less affected by disturbances may also be more resilient. If lying behaviour and stability of milk production are an indication of a higher or lower resilience, these can be used to identify less resilient cows already prior to disease. Moreover, these measures can be used to evaluate management strategies to reduce disturbances, and to select cows for their robustness. Together this allows for having a herd that is better adapted to disturbances, has a stable milk production, and is less susceptible for diseases. Her current research will continue for one and a half year. “If lying behaviour and stability in milk production do not indicate the resilience of a cow then more research is needed” says Akke Kok. “Researching the metabolome of cows is one of the possibilities to identify indicators for cow resilience. This means that we will analyze small molecules or ‘metabolites’ in the saliva, blood or urine of the cow.” About Akke Kok Akke Kok is a post-doc within the DeSIRE Programme of 4TU Centre for Resilience Engineering. She works on measuring and modelling resilience of individual animals. To maintain her own resilience during the pandemic she likes to run.  Akke Kok
News Center 1. Home 2. / describe the process of ores Describe The Process Of Ores describe the process of ores | prominer (shanghai) mining,lorem ipsum is simply free text dolor sit am adipi we help you ensure everyone is in the right jobs sicing elit, sed do consulting firms et leggings across the nation tempor..learning geology: ore forming processes,hydrothermal process is the most common ore forming process. water is heated by the magma chamber and this water dissolves metals. metals are dissolved in the water and this solution seeps through cracks, fractures and through permeable rocks until they are precipitated and form a deposit. there are three types of water sources..processes of ore formation,processes of ore formation. current theories of the genesis of ore deposit can be divided into internal (endogene) and external (exogene) or surface processes. it must be understood that more than one mechanism may be responsible for the formation of an ore body.. What Is The Illustration Of Steel Processing From Ore To A as to the amount of raw ore from the ground, this will depend on its form in-situ, the types of surrounding materials, and the methods used for extraction. underground mining reduces the amount of overlayment that must be removed in order to access a vein of ore, but is much more expensive..choose an industrial process of your choice that |,describe the entire process briefly from a question : choose an industrial process of your choice that employs leaching as one of the unit operations, for example, production of soybean oil from soybean seeds, the production of sugar from sugarbeets, extraction of a specified metal from its ores, etc (you can refer to the examples of leaching Explain The Froth Floatation Process? - AskIITians this process is called concentration of ore. this process is mainly used for sulphide ores. the principle of froth flotation process is that sulphide ores are preferentially wetted by the pine oil, whereas the gangue particles are wetted by the water. in this process, a suspension of a powdered ore.uranium extraction process - 911 metallurgist,the process utilized is known as the “acid cure” and had been developed for the most part by the aec to increase recovery of vanadium values. briefly, it involved “pugging” the ore with 10% water and 400-500 lbs. of concentrated sulfuric acid..concentration of ores | emedicalprep,the process of removal of unwanted material from the ore is known as concentration or dressing or benefaction of ores. it involves several steps. the separation of required material from the ore is dependent on the differences in physical properties of the compound of Metallurgic Processes | Boundless Chemistry metal ores are formed in the process of ore genesis, and they are extracted through mining. extractive metallurgy is the practice of removing valuable metals from an ore and refining the extracted raw metals into a purer form. hydrometallurgy uses aqueous solutions to extract metals from ores ( leaching )..explain the term metallurgy what are the steps involved in,the process of removing gangue (earthly impurities) from an ore is known as concentration or dressing of ore. i. gravity separation (hydraulic washing): principle: separation of ore and gangue. process: the ore is poured over a vibrating sloped table with grooves and a jet of water is allowed to flow over it. The Silver Extraction Process - the silver extraction process. the silver extraction process. the ore used to extract silver was not a silver ore but lead sulphide (formula pbs), known as galena or galenite (named by the roman pliny) which contains 87% lead. the local variety of galenite is silver-bearing and is known as argentiferous galenite (formula ( ) and the lead.extraction of titanium - chemguide,the overall process. titanium is extracted from its ore, rutile - tio 2. it is first converted into titanium(iv) chloride, which is then reduced to titanium using either magnesium or sodium. conversion of tio 2 into ticl 4. the ore rutile (impure titanium(iv) oxide) is heated with chlorine and.describe the process of mining iron ore - rbc sainte-walburge,describe the process of mining iron ore. what's the process of iron ore mining? - quora mining iron ore begins at ground level. taconite is identified by diamond taconite rock comprises about 28 percent iron; the rest is sand or silica. these samples are what is involved in the processing of iron ore? mining industry: what is... Describe The Process Used To Extract Metal From Hematite iron ore – mineral fact sheets – australian mines atlas. murchison metals ltd operates the jack hills mine which trucks hematite ore 540 km to process used for very fine or powdery ores. of all metal used »more detailed.describe ‘froth floatation process’ for concentration of,froth floatation process: 1) froth floatation process is based on the principle of difference in the wetting properties. of the ore and gangue particles with water and oil. 2)it is used for the extraction of those metals in which the ore particles are preferentially. wetted by oil and gangue by water. Iron Processing - Ores | Britannica iron ores occur in igneous, metamorphic (transformed), or sedimentary rocks in a variety of geologic environments. most are sedimentary, but many have been changed by weathering, and so their precise origin is difficult to determine..a look at the process of pelletizing iron ore for steel,iron ore must go through a lengthy pre-processing stage before it can be pelletized – a series of steps that work to beneficiate and concentrate low-grade ores. this process varies depending on the ore source, but typically involves various stages of crushing and grinding to reduce the size of the iron ore..iron ore smelting process - bright hub engineering,the ore is loaded into a blast furnace along with measured quantities of coke and limestone. hot combustion air is supplied to the furnace and some form of fuel used to raise the temperature. the iron is reduced from the ore by carbon in the coke, the limestone aiding slag separation from the molten iron. the slag and molten iron are tapped off from the bottom of the furnace, the slag Iron Extraction Process - ROGESA iron extraction process. in the blast furnace process, the first step on the way towards heavy plate, pig iron is produced from iron ore. the composition of the ore and additions is accurately adjusted to the final products of ag der dillinger hüttenwerke and saarstahl ag..extraction of metals - methods of extraction of metals,the process of extracting metal ores buried deep underground is called mining. the metal ores are found in the earth’s crust in varying abundance. the extraction of metals from ores is what allows us to use the minerals in the ground! the ores are very different from the finished metals that we see in Metals And Non-metals Extraction Of Metals Class 10 so, ores found in the form of sulphide and carbonates are first converted to their oxides by the process of roasting and calcination. oxides of metals so obtained are converted into metals by the process of reduction. roasting: heating of sulphide ores in the presence of excess air to convert them into oxides is known as roasting..this is how iron ore is turned into steel | business insider,iron ore, coking coal, and limestone are added into the top of the blast furnace while heated air is blown into the bottom of the furnace to drive the combustion process….processes and procedures in the extraction of iron,the extraction of iron from its ores is quite a technical process. the iron ore is first roasted in air to produce iron(iii) oxide which is mixed with coke and limestone and then further heated to a very high temperature in a blast furnace. these materials are loaded into the blast furnace from the top while a blast of hot air is introduced into it from beneath via small pipes known as tuyeres. What Can I Do For You? Product Name: Your Name: Your Email(*) Your Phone or Whatsapp: Message( as specific as possible*) I accept the Data Protection Declaration
Nasa space lasers track melting of Earth's ice sheets By Jonathan Amos BBC Science Correspondent Related Topics media captionWhy is Antarctica's mighty Thwaites Glacier melting? Scientists have released a new analysis of how the Greenland and Antarctic ice sheets have changed, from 2003 to 2019. The study shows that ice losses from melting have outpaced increases in snowfall, resulting in a 14mm rise in global sea-levels over the period. We've had a number of very similar reports to this recently. What makes this one of interest is that it uses data from the highest-resolution satellite system dedicated to studying the poles - IceSat. image source, NASA image captionArtwork: IceSat-2 orbits the Earth at an altitude of about 500km This system flies space lasers over glaciers and other ice fields to track their constantly shifting shape. The US space agency (Nasa) has now launched two of these altimeter instruments. The first, IceSat, operated between 2003 and 2009; the second, IceSat-2, was put up in 2018. Thursday's report is a first attempt to tie both satellites' observations together. "We've essentially put the two separate missions into one giant mission to tell the story of what's happened over the 16 years," said Dr Ben Smith, a glaciologist at the University of Washington. "Working with this long time span, we can be a lot less worried about seeing short-term behaviours that aren't so relevant to the long-term evolution of the ice sheets, such as whether it snowed a bit more this year than last. The 16 years gives us a clear picture," he told BBC News. media captionThis Nasa animation shows the major areas of mass loss and gain in Greenland The headline findings from the analysis underline the impacts of a warming climate. Greenland is losing an average of about 200 gigatonnes (billion tonnes) of ice a year. Antarctica is shedding an average of roughly 118 gigatonnes per annum. One gigatonne of ice is enough water to fill 400,000 Olympic-sized swimming pools. Put another way, the sum of ice loss from both polar regions (5,088 gigatonnes) over the study period could fill Lake Michigan in the US. The interior of Greenland at higher elevations, above 2,000m, is actually accumulating mass from more snowfall, but this can't compete with the melting all around the coastline where warmer atmospheric and ocean temperatures are eating into the surface and the fronts of glaciers. media captionThis Nasa animation shows the major areas of mass loss and gain in Antarctica It's a not dissimilar picture in Antarctica. In the east of the continent, the height of the ice sheet is increasing, again from more snowfall, but the gains are outstripped by melting in the west, particularly in those glaciers that reach into the Amundsen and Bellingshausen seas. Thwaites and Pine Island are two such glaciers whose thinning trends have recently caught attention. All the numbers in the IceSat analysis are in the same ballpark as the recent Imbie reports for Greenland and Antarctica. Imbie compared many different satellite datasets to try to pull out a single coherent narrative. image source, Kate Ramsayer/NASA image captionAntarctica has the equivalent of almost 60m of sea-level rise locked away in its ice One area where the new IceSat study stands apart is in its detailed assessment of Antarctic ice shelves. These are the floating protrusions of glaciers that skirt the entire continent, and Imbie didn't consider them to the same degree. "About one-third of the ice loss in West Antarctica is coming from the ice shelves," said Prof Helen Amanda Fricker from the Scripps Institution of Oceanography. "The reason this is important is because the ice shelves hold back the grounded ice behind, and any thinning causes this restraining force to be reduced. So what's happening is that the grounded ice in West Antarctica is now flowing faster into the ocean." The one-third fraction is very likely an underestimate. That's because in producing their report, the IceSat scientists only considered those ice surfaces that could be seen by both missions. And with some ice shelves retreating in area in the intervening years, there will be mass losses that have simply been omitted from the calculations. image captionIceSat-2's resolution allows it to map crevasses in the ice sheet surface Dr Anna Hogg works with European satellite systems that measure the shape of the ice sheets with radar instruments. She's been impressed with the sharp vision of the new IceSat mission. "It's exciting to see how IceSat-2's new high-resolution laser can be used to peer into 80m-deep crevasses in Antarctica, like those on the Ross Ice Shelf," she told BBC News. "These results provide independent confirmation that both Greenland and Antarctica are losing ice at an increasingly fast rate. "In the future, we must use this satellite data revolution to help improve our understanding of the oceanographic and atmospheric processes driving change in the remote polar regions," she told BBC News. More on this story
United StatesAug 8th 2015 edition The wisdom of crowds Sound of the Trump The first Republican primary debate was due to take place in Cleveland shortly after The Economist went to press. Those candidates who made the cut for the main debate were selected according to how they fared in an average of five polls in which voters were asked whom they would vote for. This is the most common polling question, but it does not have much predictive power so early in the contest. A more telling answer comes when pollsters ask who the likely winner of the primary will be, as our YouGov poll does. The main effect of this change in wording is to drop self-publicists such as Donald Trump, Mike Huckabee and Ben Carson down the list and to promote professional pols in their stead. This article appeared in the United States section of the print edition under the headline "Sound of the Trump" Reuse this contentThe Trust Project The Economist Today Hand-picked stories, in your inbox A daily email with the best of our journalism
Predicting relations between child language brokering and psychological health within immigrant Chinese families People of Chinese ancestry make up the largest visible minority group in Canada and they comprise a major percentage of new immigrants to the country. Adaptation to life in a new Western country for Chinese immigrants often comes with stress and hardship, including language barriers and school or employment adjustments. In addition, family members may adapt to the new culture at different rates, creating additional stress that may result in new areas of conflict within the family and increased risk for poorer psychological health. Often, children are relied upon to provide interpretation and translation for their non English-speaking parents. Current research is divided on whether this role harms or supports the psychological health of children — reports cite outcomes that range from psychological distress and depression to pride and increased confidence. Tapping into data gathered through a larger Intercultural Family Study at the University of Victoria, Josephine Hua is studying 180 immigrant Chinese families living in Victoria or Vancouver. She’s examining the psychological implications of language brokering for both children and parents. She hypothesizes that children's psychological health relating to this role depends on the underlying conditions and relationships within the family. For example, a child who feels pride in fulfilling family obligations is more likely to benefit from this role. Identifying the determinants of psychological health related to language brokering for both children and parents within immigrant families will suggest strategies for promoting healthy integration into Canadian society. Ultimately, this could help alleviate the economic and psychological costs associated with maladjustment among new immigrant families.
Fundamentals of bodyweight training By tangfloyd Fundamentals of bodyweight training What is bodyweight training? Bodyweight training involves performing exercises that use your own body weight as resistance. Some of the exercises require basic equipment, such as a pull-up bar or stability ball, whereas other exercises require no equipment. The wheel rollout, inverted shrug, and stability ball jackknife are examples of exercises that require basic equipment, whereas the Spiderman push-up, high reverse plank, and lunge are examples of exercises that do not require equipment. What are the benefits of bodyweight training? Bodyweight training can help you to: • Master your own body weight • Develop functional fitness • Improve your agility, coordination, and balance • Build an impressive foundation of muscular size and strength • Significantly increase your muscular endurance • Burn calories • Lose weight • Enhance your overall athleticism You can also perform bodyweight training almost anywhere (for example, at home, at the park, and on vacation), and you obviously don’t have to pay any gym fees. How effective is bodyweight training? If your goal includes any of the benefits listed above, then bodyweight training can be very effective and useful. However, if your goal is to build extensive muscle/curves or develop significant strength, then bodyweight training will not take you very far. The reason is that, as made clear in How many sets and reps should you do?, in the Weight Training Guide, in order to build muscle/curves or strength, you have to: 1. Train with heavy weights 2. Keep increasing the amount of weight that you use With bodyweight training, the amount of resistance that you have to work with is obviously limited by your body weight, thus limiting your potential to build muscle and strength. Simply increasing the number of reps that you complete will not work, because this will mainly lead to the development of muscular endurance, not muscular size and strength. There are some measures that you can take to increase the level of resistance, such as wear a weighted vest or rucksack, or wrap a chain around your torso. However, strictly speaking, these exercises will no longer be bodyweight exercises. Other measures that you can take to increase resistance or tension without the use of auxiliary items do exist, but their effects are still limited. Such measures include: • Changing the movement pattern of the exercise (for example, performing the archer pull-up instead of the pull-up) • Adjusting the leverage used in the exercise (for example, performing the wheel rollout while standing instead of while kneeling) • Using one limb instead of two limbs (for example, performing the pistol squat instead of the bodyweight squat) • Adding isometric pauses or ‘pulses’ to the exercise (for example, pausing for a few seconds at the top of a reverse crunch, or pulsing a few times at the bottom of a bodyweight squat) • Adding explosiveness to the movements (such as performing jump squats instead of bodyweight squats) • Slowing the exercise down so as to increase the muscles’ time under tension I should also mention that, just as bodyweight exercises can be adjusted to increase resistance or tension, they can also be adapted to suit a lower level of fitness or strength. This makes bodyweight training suitable for a wide range of fitness levels. For example, the push-up can be performed on the knees, and the hanging straight leg raise can be performed while lying down. Another limitation of bodyweight training is that balancing the training programs is relatively difficult. There are many more pushing exercises than there are pulling exercises, and the pulling exercises often require basic equipment (such as a pull-up bar), whereas the pushing exercises often do not.
Nominal, Ordinal, Interval, Ratio Scales with Examples Levels of Measurement in Statistics To perform statistical analysis of data, it is important to first understand variables and what should be measured using these variables. There are different levels of measurement in statistics and data measured using them can be broadly classified into qualitative and quantitative data. First,  let’s understand what a variable is.  A quantity whose value changes across the population and can be measured is called variable. For instance, consider a sample of employed individuals. The variables for this set of the population can be industry, location, gender, age, skills, job-type, etc The value of the variables will differ with each employee.  For example, it is practically impossible to calculate the average hourly rate of a worker in the US. So, a sample audience is randomly selected such it represents the larger population appropriately. Then the average hourly rate of this sample audience is calculated. Using statistical tests, you can conclude the average hourly rate of a larger population. The level of measurement of a variable decides the statistical test type to be used. The mathematical nature of a variable or in other words, how a variable is measured is considered as the level of measurement. What are Nominal, Ordinal, Interval and Ratio Scales? Nominal, Ordinal, Interval, and Ratio are defined as the four fundamental levels of measurement scales that are used to capture data in the form of surveys and questionnaires, each being a multiple choice question Each scale is an incremental level of measurement, meaning, each scale fulfills the function of the previous scale, and all survey question scales such as Likert, Semantic Differential, Dichotomous, etc, are the derivation of this these 4 fundamental levels of variable measurement. Before we discuss all four levels of measurement scales in details, with examples, let’s have a quick brief look at what these scales represent. Nominal scale is a naming scale, where variables are simply “named” or labeled, with no specific order. Ordinal scale has all its variables in a specific order, beyond just naming them. Interval scale offers labels, order, as well as, a specific interval between each of its variable options.  Ratio scale bears all the characteristics of an interval scale, in addition to that, it can also accommodate the value of “zero” on any of its variables. Here’s more of the four levels of measurement in research and statistics: Nominal, Ordinal, Interval, Ratio. Types of measurements scales innfographic Nominal Scale: 1st Level of Measurement Nominal Scale, also called the categorical variable scale, is defined as a scale used for labeling variables into distinct classifications and doesn’t involve a quantitative value or order. This scale is the simplest of the four variable measurement scales. Calculations done on these variables will be futile as there is no numerical value of the options. There are cases where this scale is used for the purpose of classification – the numbers associated with variables of this scale are only tags for categorization or division. Calculations done on these numbers will be futile as they have no quantitative significance. For a question such as: Where do you live? • 1- Suburbs • 2- City • 3- Town Nominal scale is often used in research surveys and questionnaires where only variable labels hold significance. For instance, a customer survey asking “Which brand of smartphones do you prefer?” Options : “Apple”- 1 , “Samsung”-2, “OnePlus”-3. • In this survey question, only the names of the brands are significant for the researcher conducting consumer research. There is no need for any specific order for these brands. However, while capturing nominal data, researchers conduct analysis based on the associated labels. • In the above example, when a survey respondent selects Apple as their preferred brand, the data entered and associated will be “1”. This helped in quantifying and answering the final question – How many respondents selected Apple, how many selected Samsung, and how many went for OnePlus – and which one is the highest. • This is the fundamental of quantitative research, and nominal scale is the most fundamental research scale. Nominal Scale Data and Analysis There are two primary ways in which nominal scale data can be collected: 1. By asking an open-ended question, the answers of which can be coded to a respective number of label decided by the researcher. 2. The other alternative to collect nominal data is to include a multiple choice question in which the answers will be labeled. In both cases, the analysis of gathered data will happen using percentages or mode,i.e., the most common answer received for the question. It is possible for a single question to have more than one mode as it is possible for two common favorites can exist in a target population.   Nominal Scale Examples • Gender • Political preferences • Place of residence What is your Gender? What is your Political preference? Where do you live? • M- Male • F- Female • 1- Independent • 2- Democrat • 3- Republican • 1- Suburbs • 2- City • 3- Town Create a free account Nominal Scale SPSS In SPSS, you can specify the level of measurement as scale (numeric data on an interval or ratio scale), ordinal, or nominal. Nominal and ordinal data can be either string alphanumeric or numeric. Upon importing the data for any variable into the SPSS input file, it takes it as a scale variable by default since the data essentially contains numeric values. It is important to change it to either nominal or ordinal or keep it as scale depending on the variable the data represents. Ordinal Scale: 2nd Level of Measurement Ordinal Scale is defined as a variable measurement scale used to simply depict the order of variables and not the difference between each of the variables. These scales are generally used to depict non-mathematical ideas such as frequency, satisfaction, happiness, a degree of pain, etc. It is quite straightforward to remember the implementation of this scale as ‘Ordinal’ sounds similar to ‘Order’, which is exactly the purpose of this scale. Ordinal Scale maintains descriptional qualities along with an intrinsic order but is void of an origin of scale and thus, the distance between variables can’t be calculated. Descriptional qualities indicate tagging properties similar to the nominal scale, in addition to which, the ordinal scale also has a relative position of variables. Origin of this scale is absent due to which there is no fixed start or “true zero”. Ordinal Data and Analysis   Ordinal scale data can be presented in tabular or graphical formats for a researcher to conduct a convenient analysis of collected data. Also, methods such as Mann-Whitney U test and Kruskal–Wallis H test can also be used to analyze ordinal data. These methods are generally implemented to compare two or more ordinal groups. In the Mann-Whitney U test, researchers can conclude which variable of one group is bigger or smaller than another variable of a randomly selected group. While in the Kruskal–Wallis H test, researchers can analyze whether two or more ordinal groups have the same median or not. Learn about: Nominal vs. Ordinal Scale Ordinal Scale Examples Status at workplace, tournament team rankings, order of product quality, and order of agreement or satisfaction are some of the most common examples of the ordinal Scale. These scales are generally used in market research to gather and evaluate relative feedback about product satisfaction, changing perceptions with product upgrades, etc. For example, a semantic differential scale question such as: How satisfied are you with our services? • Very Unsatisfied – 1 • Unsatisfied – 2 • Neutral – 3 • Satisfied – 4 • Very Satisfied – 5 1. Here, the order of variables is of prime importance and so is the labeling. Very unsatisfied will always be worse than unsatisfied and satisfied will be worse than very satisfied. 2. This is where ordinal scale is a step above nominal scale – the order is relevant to the results and so is their naming. 3. Analyzing results based on the order along with the name becomes a convenient process for the researcher. 4. If they intend to obtain more information than what they would collect using a nominal scale, they can use the ordinal scale. This scale not only assigns values to the variables but also measures the rank or order of the variables, such as: • Grades • Satisfaction • Happiness How satisfied are you with our services? • 1- Very Unsatisfied • 2- Unsatisfied • 3- Neural • 4- Satisfied • 5- Very Satisfied Interval Scale: 3rd Level of Measurement Interval Scale is defined as a numerical scale where the order of the variables is known as well as the difference between these variables. Variables that have familiar, constant, and computable differences are classified using the Interval scale. It is easy to remember the primary role of this scale too, ‘Interval’ indicates ‘distance between two entities’, which is what Interval scale helps in achieving.   These scales are effective as they open doors for the statistical analysis of provided data. Mean, median, or mode can be used to calculate the central tendency in this scale. The only drawback of this scale is that there no pre-decided starting point or a true zero value. Interval scale contains all the properties of the ordinal scale, in addition to which, it offers a calculation of the difference between variables. The main characteristic of this scale is the equidistant difference between objects.   For instance, consider a Celsius/Fahrenheit temperature scale – • 80 degrees is always higher than 50 degrees and the difference between these two temperatures is the same as the difference between 70 degrees and 40 degrees. • Also, the value of 0 is arbitrary because negative values of temperature do exist – which makes the Celsius/Fahrenheit temperature scale a classic example of an interval scale. • Interval scale is often chosen in research cases where the difference between variables is a mandate – which can’t be achieved using a nominal or ordinal scale. The Interval scale quantifies the difference between two variables whereas the other two scales are solely capable of associating qualitative values with variables. • The mean and median values in an ordinal scale can be evaluated, unlike the previous two scales. • In statistics, interval scale is frequently used as a numerical value can not only be assigned to variables but calculation on the basis of those values can also be carried out. Even if interval scales are amazing, they do not calculate the “true zero” value which is why the next scale comes into the picture. Interval Data and Analysis All the techniques applicable to nominal and ordinal data analysis are applicable to Interval Data as well. Apart from those techniques, there are a few analysis methods such as descriptive statistics, correlation regression analysis which is extensively for analyzing interval data. Descriptive statistics is the term given to the analysis of numerical data which helps to describe, depict, or summarize data in a meaningful manner and it helps in calculation of mean, median, and mode. Interval Scale Examples • There are situations where attitude scales are considered to be interval scales. • Apart from the temperature scale, time is also a very common example of an interval scale as the values are already established, constant, and measurable. • Calendar years and time also fall under this category of measurement scales. • Likert scale, Net Promoter Score, Semantic Differential Scale, Bipolar Matrix Table, etc. are the most-used interval scale examples. The following questions fall under the Interval Scale category: • What is your family income? • What is the temperature in your city? Create a free account Ratio Scale: 4th Level of Measurement Ratio Scale is defined as a variable measurement scale that not only produces the order of variables but also makes the difference between variables known along with information on the value of true zero. It is calculated by assuming that the variables have an option for zero, the difference between the two variables is the same and there is a specific order between the options. With the option of true zero, varied inferential, and descriptive analysis techniques can be applied to the variables. In addition to the fact that the ratio scale does everything that a nominal, ordinal, and interval scale can do, it can also establish the value of absolute zero. The best examples of ratio scales are weight and height. In market research, a ratio scale is used to calculate market share, annual sales, the price of an upcoming product, the number of consumers, etc. • Ratio scale provides the most detailed information as researchers and statisticians can calculate the central tendency using statistical techniques such as mean, median, mode, and methods such as geometric mean, the coefficient of variation, or harmonic mean can also be used on this scale. • Ratio scale accommodates the characteristic of three other variable measurement scales, i.e. labeling the variables, the significance of the order of variables, and a calculable difference between variables (which are usually equidistant). • Because of the existence of true zero value, the ratio scale doesn’t have negative values. • To decide when to use a ratio scale, the researcher must observe whether the variables have all the characteristics of an interval scale along with the presence of the absolute zero value. • Mean, mode and median can be calculated using the ratio scale. Ratio Data and Analysis At a fundamental level, Ratio scale data is quantitative in nature due to which all quantitative analysis techniques such as SWOT, TURF, Cross-tabulation, Conjoint, etc. can be used to calculate ratio data. While some techniques such as SWOT and TURF will analyze ratio data in such as manner that researchers can create roadmaps of how to improve products or services and Cross-tabulation will be useful in understanding whether new features will be helpful to the target market or not.  Ratio Scale Examples The following questions fall under the Ratio Scale category: • What is your daughter’s current height? • Less than 5 feet. • 5 feet 1 inch – 5 feet 5 inches • 5 feet 6 inches- 6 feet • More than 6 feet • What is your weight in kilograms? • Less than 50 kilograms • 51- 70 kilograms • 71- 90 kilograms • 91-110 kilograms • More than 110 kilograms Learn about: Interval vs. Ratio Scale Summary –  Levels of Measurement The four data measurement scales – nominal, ordinal, interval, and ratio –  are quite often discussed in academic teaching. Below easy-to-remember chart might help you in your statistics test. Offers: Nominal Ordinal Interval Ratio The sequence of variables is established Yes Yes Yes Mode Yes Yes Yes Yes Median Yes Yes Yes Mean Yes Yes Difference between variables can be evaluated Yes Yes Addition and Subtraction of variables Yes Yes Multiplication and Division of variables Yes Absolute zero Yes Create a free account
Turkey - Size Explorer - Compare the world Select category: Select category Country 1 Country 2 Search in Turkey / COVID-19 Population 79,814,871 Total Confirmed 6412247 Active 6355247 Total deaths 57000 Total recovered 0 Death rate 0.89 % Turkey (Turkish: Türkiye [ˈtyɾcije]), officially the Republic of Turkey (Turkish: Türkiye Cumhuriyeti [ˈtyɾcije dʒumˈhuːɾijeti] (listen)), is a transcontinental country located mostly on the Anatolian peninsula in Western Asia, with a smaller percentage on the Balkan peninsula in Southeastern Europe. East Thrace, the part of Turkey in Europe, is separated from Anatolia from the Sea of Marmara, the Bosporus and the Dardanelles (collectively called the Turkish Straits). Istanbul, which straddles Europe and Asia, is the largest city in the country, while Ankara is the capital. Turkey is bordered on its shore by Greece and Bulgaria; north from the Black Sea; northeast by Georgia; east by Armenia, the Azerbaijani exclave of Nakhchivan and Iran; southeast by Iraq; south from Syria and the Mediterranean Sea; and west by the Aegean Sea. Approximately 70 to 80 percent of the nation's citizens identify as Turkish, while Kurds are the largest minority, at between 15 to 20 percent of the population.At various points in its history, the area has been inhabited by diverse civilisations such as the ancient Hattians and Hurrians, the Anatolian peoples such as the Hittites and Luwians, as well as the Assyrians, Greeks, Thracians, Phrygians, Urartians, Galatians, and Armenians. Hellenization started during the era of Alexander the Great and continued into the Byzantine era. The Seljuk Turks began migrating to the region in the 11th century, and their victory over the Byzantines at the Battle of Manzikert in 1071 symbolises the base of Turkey for many Turkish nationalists. The Seljuk Sultanate of Rûm ruled Anatolia before the Mongol invasion in 1243, when it disintegrated into little Turkish principalities called beyliks. Starting in the late 13th century, the Ottomans started uniting the beyliks and beating the Balkans. The Turkification of Anatolia increased during the Ottoman period. After Mehmed II conquered Constantinople in 1453, Ottoman expansion continued under Selim I. During the reign of Suleiman the Magnificent, the Ottoman Empire encompassed much of Southeast Europe, West Asia and North Africa and became a world power. From the late 18th century onwards, the empire's power dropped with a gradual loss of territories and wars. In a bid to consolidate the weakening political and social foundations of the empire, Mahmud II started a period of modernisation in the early 19th century, bringing reforms in every area of the state including the military and bureaucracy, as well as the emancipation of all citizens.The 1913 coup d'état efficiently place the country under the control of the Three Pashas, who had been mostly responsible for the Empire's entry into World War I in 1914. During World War I, the Ottoman government committed genocides against its Armenian, Assyrian and Pontic Greek themes. After the Ottomans and the other Central Powers lost the war, the conglomeration of lands and peoples that had composed the Ottoman Empire was partitioned into several new states. The Turkish War of Independence, initiated by Mustafa Kemal Atatürk and his comrades from the occupying Allied Powers, resulted in the abolition of the sultanate on 1 November 1922, the replacement of the Treaty of Sèvres (1920) with the Treaty of Lausanne (1923), and the establishment of the Republic of Turkey on 29 October 1923, with Atatürk as its first president. Atatürk enacted a lot of reforms, many of which included various aspects of Western thought, doctrine and customs to the new form of Turkish government.Turkey is a charter member of the UN, an early member of NATO, the IMF, and the World Bank, and also a founding member of the OECD, OSCE, BSEC, OIC, and G20. After getting one of the early members of the Council of Europe in 1950, Turkey became an associate member of the EEC in 1963, joined the EU Customs Union in 1995, and started accession negotiations with the European Union in 2005. In a non-binding vote on 13 March 2019, the European Parliament called on the EU governments to suspend Turkey's accession talks; which, despite being stalled since 2018, remain active as of 2020. Turkey's economy and diplomatic initiatives have led to its recognition as a regional power and a newly industrialized state by several analysts, while its location has given it strategic and geopolitical importance throughout history. Turkey is a secular, unitary, formerly parliamentary republic that adopted a presidential system with a referendum in 2017; the new system came into effect with the presidential election in 2018. Turkey's current government, headed by President Recep Tayyip Erdoğan of the AKP, has enacted measures to increase the influence of Islam and undermine Kemalist policies and freedom of the media. Source: Wikipedia
Welcome to VERCIDA website. Skip to main content Enable Recite to make this website accessible Celebrating Lughnasadh (The First Harvest) Category: Religious beliefs, Faith & Culture, Defence Infrastructure Organisation, DIO, faith & belief, Pagan, Lughnasadh, Lammas Religious Beliefs Lughnasadh is often known amongst the Pagan community as the First Harvest, as this is when many of the crops can and will be harvested and then stored carefully for the coming winter months when food will be very hard to grow.  Pronounced “Loo-nas-ah”, this festival happens on the 1st August every year. In this article, I will share with you some of the many ways in which several (but not all) Pagan paths follow this time of the year, how they celebrate it and rituals and spells (spells being a form of prayer) they may conduct. The first harvest The Origins and History of Lughnasadh: The first of three harvest celebrations, Lughnasadh has its roots deep within British lore. In Ireland, it has been known as “Lugnasad”, in Scotland “Lunasda”, in the Isle of Man it was known as “Luanistyn” and in Wales as “Gwyl Awst” or “Feast of Augustus”. In England it was known as “Lammas” meaning “loaf-mass”, and this festival originated in Ireland. The Celtic deity, Lugh, (who is believed to have originally come from Ireland) gives this festival its name. Known these days more of a solar god, it was thought he was known as a god of human skill, kings, and a patron of heroes. Lugh has also been equated to the Roman god, Mercury.  Lugh was known as the King of the Tuatha de Danaan a race of divine beings whose name translates into “people of the goddess Danu”. Danu was a Mother Goddess and was often linked to water, earth, and victory. The story goes that Lugh helped Danu’s followers to displace the Fir Bolg and Fomoiri (the rulers before Danu and Lugh, who were sort of like Irish monsters) Lugh was very skilful in his crafts and warfare. Lughnasadh has been known as a wedding feast and as funeral games, depending on where you read the myths and legends surrounding the early stories of Lugh and the festival of the first harvest. For the link to funeral games, it was believed that these were held in honour of Lugh’s stepmother, Tailtiu (pronounced Tal-chi-uh) who was the wife of the last King of the Fir Bolg and when they were overthrown, Tailtiu remarried one of the Tuatha de Danaan and she died of exhaustion from clearing the fields of Ireland, preparing them for agriculture.  Lughnasadh was also a popular time for trial marriages, temporary partnerships that lasted a year and a day until the end of the next fair, and then the union could be dissolved if wished. The Pagan marriage rite of Handfasting was also popular at this time of the year, with many of the unions now solidified with a Handfasting ceremony.  Lughnasadh fairs were often held near burial mounds of mythical divine feminine heroines, such as Tailtiu or Carman.  As time went on, and traditions migrated across to Britain, newcomers such as the Danes and the Germans adapted to Britain and became known as Anglo-Saxons. Traditions blended, and some new occasions arose, such as the German hlafmaesse or “loaf mass”, a celebration of the first fruits and wheat harvests. There is more information on the histories of Lughnasadh within the books detailed below. How we Celebrate Now: Many Pagan paths celebrate this festival by welcoming in the first harvests of fruit and wheat, with bread making featuring high within practices to be able to imbue our energy into it for peace and prosperity, and we like to make the bread interesting shapes, such as plaits and cottage loaves or “dollies”. Corn dollies are also something a lot of Pagan paths like to make at this time of the year as well, incorporating practices where energy can again be brought into the dolly, with positivity and peace. Corn dollies are traditionally made with sheaves of wheat, or the husks leaves, cut down to size and tied together to make a head, arms, and legs. These are often hung around the home as an offering for a good 1st harvest and asking deities such as Lugh to bless their efforts. Celebrations, rituals, spells, and rites of an Eclectic Witch during Lughnasadh: As you may have read in some of my other articles, I like to be referred to as an ‘Eclectic Witch’. This means that I predominantly honour Mother Earth and her seasons and cycles, and I utilise different practices within my own, but never appropriating any.  For example, the Native Americans have long been known for their Smudge Sticks and Totem Animals, but other cultures through the centuries have also used herbs to cleanse (which is what a smudge stick is) and animals as spirit guides (such as Shamans) and many witchcraft practices have long used herbs for cleansing their sacred spaces and animals as their spirit ‘familiars’.  During Lughnasadh, I will do very similar rituals for cleansing and clearing my altar space as I would do for any other festival or equinox.  For the Lughnasadh, I like to use colours such as burnt oranges and deeper yellows with bright and also deep greens and maybe some deep blues, so signify the turning of the season as summer begins to develop into early autumn. I would include not only my altar cloth, but the candles I may use to adorn my altar, and crystal I would like that would represent the first harvest, the colours of the season and balance within nature, so possibly crystals such as Jasper (for nurturing, tranquillity and working together well with others)Moonstone (this stone has a soothing and calming energy, is connected to the moon and helps with letting go of old emotions that no longer serve us well) Carnelian (a stone full of energy, healing and helps with confidence) and Tiger’s Eye (for protection, grounding and regaining balance) Regarding festivals, as for many of the other times of the year I celebrate, attending festivals has been limited due to the current situation with the pandemic, so where I used to attend in person festivals to celebrate Lughnasadh, I now attend them virtually online, either via Zoom or other media to be able to still interact with my fellow Pagans. Spells and Divinations: Tarot Reading: I like to use a spread I found in the internet (although I do have others from books I’ve found over the years) and is as follows: Lammas Spread The Lammas Spread: Cleanse and bless your cards prior to your reading and say a small prayer of thanks for the help and guidance to be given to you.  Shuffle the cards whilst thinking of your question or issue. Lay out the six cards as per the image above, so it looks like a tree. Place all the cards face down, then turn them over, one by one. Each card you turn over will represent a potential outcome or feeling aligned to each of the questions asked of you above. Books of Interest on Lughnasadh: • Lughnasadh: Rituals, Recipes and Lore for Lammas, by Melanie Marquis for Llewellyn Sabbat Essentials: I have this little book, and it is extremely interesting, and includes crafts for making corn dollies, and recipes for meals usual for this time of the year among other things.  • Lugh: Meeting the Many-Skilled God by Morgan Daimler: This is a lovely little book that gives a lot of information. • Lugh na Bua – Lugh the Deliverer by Cathal O Searcaigh: Two tales in Irish and English of a Donegal Folktale concerning Balor and Lugh, and is detailed under ‘Myths and Fairy Tales’.  Vercida logo Learn more about this employer Defence Infrastructure Organisation Inclusive features • No matching inclusive features Section with Articles you might like See all articles You will receive an email with link to reset your password. Enter your new password
Elementary 2 started their project about Africa learning about different physical features of this wonderful continent. Each day the children learn about something different related to the physical features. This week they learnt about lakes and rivers with a special focus on lake Victoria and river Nile. Can you spot them on your child's picture? Miss Naveed 20130920_092051 20130920_092105 20130920_092120 20130920_092135 20130920_092152 20130920_092207 20130920_092218 20130920_092235 Share this
From the cocaine dealer on the corner to the clandestine meth lab in the abandoned trailer to hundreds of pounds of marijuana seized by the Coast Guard, illegal drugs permeate modern society. Even prescription medication can be an illegal drug if sold or given to someone for whom it was not prescribed. Over the past decade, new and more dangerous synthetic drugs have come to market. Their producers attempt to circumvent the law by continuously altering the chemical composition of the substances to avoid prosecution. The illegal drug trade creates a global black market economy that puts the public at risk, not just from the substances being distributed, but also from the subsequent crimes committed by users, traffickers and manufacturers. These crimes typically include burglary, assault and fraud, but can also involve more serious crimes such as homicide, abduction and human trafficking. Gloved fingers holding a leaf of the Cannabis plant Marijuana leaf. Forensic drug chemistry uses a series of processes performed in the field or laboratory to detect the presence or absence of controlled substances. Chemical analysis performed in the laboratory on submitted evidence detects and identifies illegal drugs, and helps law enforcement prosecute offenders. This practice uses a variety of chemical analysis methods to conduct both presumptive and confirmatory tests on seized material suspected to be or contain illegal substances. Results from this analysis often serve as the basis for criminal proceedings and help to determine sentencing for convicted offenders. Back to top of page ▲
Home » “Guns, Germs and Steel” by Jared Diamond – An Explanation of History “Guns, Germs and Steel” by Jared Diamond (Header image) Estimated reading time: 7 minutes Jared Diamond attempted a rather ambitious undertaking when he decided to write Guns, Germs and Steel, an effort which was ultimately worth it as evidenced by it earning the 1997 Pulitzer Prize. In this book, Jared Diamond traces the evolution and progress of numerous societies across the planet starting at 11,000 BC, in an attempt to explain why history took the specific course it did, rather than any other one. Jared Diamond Attempts to Understand Humans Familiarity with human history greatly varies from one individual to the next, but I think it’s safe to say the majority of people have similar views of its overarching currents and major key points. We’ve come to accept it as a given, as if no other course could have potentially been followed. In his Pulitzer Prize-winning book titled Guns, Germs and Steel, Jared Diamond asks and attempts to answer the question of why humanity developed and shaped itself the way it did. Without making any understatements, the task Diamond took upon himself is nothing if not enormous, attempting to provide a comprehensive overview and explanation which, theoretically, ought to be applicable to any point in human history. What’s more, he engages himself to lay this explanation out in a way any layman could understand. As such, he begins his grandiose quest by taking us back before the end of the last ice age, giving a sweeping overview of how evolution shaped humans for millions of years while they lived and developed in Africa. Without taking too long on this section, he then moves to approximately 11,000 BC, where he begins a more in-depth exploration of the factors which forced the story of humanity down a certain path. One by one, he examines the various factors which he has identified as the principal ones which allowed certain societies to rise and others to fall over time. A sizable portion of the book is dedicated to the tremendous importance of geographical and environmental factors, as well as agriculture and livestock-related techniques. Diamond goes to great lengths to illustrating the far-reaching and often unintended consequences of the roles they end up playing. After establishing the base causes for the moulding of human history (there are others in addition to the ones mentioned above), he then explores various societies, individuals and events to show how his model applies and explains them. Ultimately, he seeks to answer the laughably basic and yet deceivingly complex question: why did certain people end up with so much more than others? The Big Picture with Guns, Germs and Steel With such an extensive book sweeping through so many topics at once, it’s a little difficult to decide where to start, what one ought to focus on first. There probably isn’t a correct answer to this, but I would like to begin our plunge into this work by explaining its actual purpose, at least the way it seemed to me when I read it. Considering the subject matter, Guns, Germs and Steel is fairly short, with the hardcover edition having about five hundred pages of content. The author recognizes time and time again the complexity and large number of factors which come into play when explaining the fate of any human society on Earth, and he consistently seeks to boil them down into larger and simpler elements, so-to-speak. In my opinion, the purpose of this book isn’t to explain each and every historical event mentioned inside of it, but rather, to show us the bigger picture. He tries to show us the recurrent pattern in history and how a handful of factors (mainly, the ones listed in the book’s title) have time and time again come to determine why certain societies thrived and conquered other, less fortunate ones. Much of his argument centres around the idea that various societies throughout human history had as much as their geographical location permitted them. This includes not only terrain size, but also climate, soil fertility, the continental axis of distribution, the presence of domesticable plants and animals, just to name a few off the top of my head. ― Jared Diamond Guns, Germs, and Steel: The Fates of Human Societies While anyone can make any kind of argument, what sets Jared Diamond apart from most other history writers is how well he argues his point. Time and time again he painstakingly demonstrates how all of those factors played major roles in funnelling the course of human history in a specific direction, how they essentially led to the European expansion rather than any other way around. Now, I feel it necessary to add a word of warning: archaeology and history are fields with a fair share of contested theories. In some cases, it’s largely a question of how well a proponent of an idea can argue in its favour, at least until further findings are made. Personally, I have no doubts about not only the depth of Diamond‘s research, but also the logic behind his chains of thought, and the high probability of his conclusions being correct. The genre of popular science has been losing in popularity over the past few decades, with people having seemingly lost interest in educating themselves on topics which bear no immediate or tangible fruit. As a result, there are fewer and fewer authors around who really know how to approach the genre and how to treat their readers correctly. In my opinion, Guns, Germs and Steel is a perfect example of how to do it correctly. To begin with, Jared Diamond doesn’t simply spend his time enumerating historical facts and events one after the other; he certainly knows he isn’t writing his PhD here. Rather, his first order of business is to establish a bit of a narrative and to relay a relevant personal experience, the one which ultimately pushed him to write Guns, Germs and Steel. He tears down the formal barrier existing between reader and author early on, which, personally-speaking, made me feel a bit more at ease and interested, since I knew I wouldn’t be bombarded with non-stop facts. While I wouldn’t say the book has a narrative in the classic sense of the term, we are following the author’s concrete line of thinking, which brings us to various times and places around the entire world. This non-chronological globetrotting actually works as an excellent mechanism which prevents the chapters from becoming stale and homogeneous, without ever losing sight of the string of thought uniting all the ideas and chapters together. 528W. W. Norton & CompanyMarch 7 2017978-0393354324 There are a few passages in this book, especially towards the end, where it did feel like I was receiving a little too much information at once, but in the end I didn’t find it bothersome for two reasons: I still retained the big picture, and after all, I am allowed to read at any pace I need to. Considering the wealth of knowledge undoubtedly stored in Diamond‘s head, it’s quite commendable to see those passages are exceptions rather than the norm. The Final Verdict Guns, Germs and Steel by Jared Diamond is an exceptionally well-researched, powerfully-argued and eloquently-explained popular science and history book, realizing with great success one of the most ambitious ideas in literature: to explain the historical course of mankind. If you have even the slightest passing interest in the history of humanity and are searching for answers to all of its “whys”, then I would say reading this book is an essential experience. Jared Diamond (Author) Jared Diamond Jared Diamond is an American author, geographer, historian and ornithologist who has published a number of widely-acclaimed popular science books over a variety of fields. His works include The Third Chimpanzee, Collapse, The world Until Yesterday, Upheaval, without of course forgetting his 1997 Pulitzer Prize winner, Guns, Germs and Steel. Leave a Comment
Australia exports parrots to other countries The budgie and its name From the time it was discovered in Australia, it took a while before the budgie was considered "in" in Europe. The English researcher John Gould (1804 to 1881) was so fascinated by the small birds that he brought the first specimens from Australia to Europe in 1840. Because of the pattern on the plumage, he called the species "Melopsittacus undulatus", which translates as "wavy singing parrot". This is where the German name "Budgie" came from. It was also Gould who wrote the first scientific book on the newly discovered bird species. The long way to Europe The budgie soon enjoyed great popularity in Europe. However, the importers, owners and breeders made life hell for the little bird. Many animals did not even survive the crossing. It was considered a success when two-thirds of the birds got through. When they arrived in their new home, many died because they were given the wrong food, were kept in cages that were too narrow or kept in isolation. Millions of budgerigars were imported until the Australian government imposed the export ban in 1884 in order to save the bird species from extinction. Breeding is best together The most common budgies today, those with light blue and yellowish feathers, were bred as early as 1872 and 1878, respectively. Just a few years after the Australian export ban, the population of the birds was considered secure. They didn't make it too difficult for the breeders either: budgies are sexually mature shortly after birth and can reproduce. They do this with pleasure and often. The females can breed several times a year at almost any time. Other birds, on the other hand, are tied to certain cycles or key stimuli. As soon as a suitable place for breeding has been found and a pair of budgies starts, the whole swarm usually follows suit. Budgies are so-called community breeders. Survive in Australia The reason for this downright reproductive rage lies in the special adaptation of the budgie to its native Australia. During periods of drought, entire flocks of over a thousand birds can perish. Only a high birth rate compared to other birds ensures the survival of the species. Budgies can do without water for weeks. Their trick: they pull the moisture out of the seeds. When the birds are looking for a new territory or breeding ground, they usually fly in huge flocks to deter potential attackers. They can cover up to 100 kilometers a day. Parrot or not? It has now been established that budgies are directly related to parrots. They do not belong to the subfamily of the so-called "real parrots", but are a subfamily of the generic group of the "flat-tailed parakeets". But at the top of the ancestry chain is the parrot. The budgies have one thing in common with him, which fascinates people in the past as well as today: They imitate noises and the human voice and are true masters at this. Budgies as pets The little voice acrobat is usually an enrichment for people - the other way around this is rarely the case. Budgies are often exposed to enormous stress: noisy children who touch the parakeet against its will because it does not become tame quickly enough. Too little free flight in the apartment or years of "solitary confinement" without a partner. Before getting a budgie, be aware that this is a long-term decision. Life expectancy falls by half in captivity - mostly because of the above-mentioned factors, but as a guideline one should count on nine years. The budgie is a group animal with a pronounced social behavior that, if treated incorrectly, suffers like a human. Author: Götz Bolten