text
stringlengths 144
682k
|
---|
Frequently Asked Questions
Quarter depicting the first flight
How did they decide who would fly first?
Though Orville made the first successful flight on December 17, 1903, Wilbur had actually won the coin toss on December 14 for who would get to make the first attempt to fly. However, Wilbur's attempt to fly on the 14th was unsuccessful, so when they were ready to try again on December 17, it was Orville's turn.
A granite monument stands on top of a grassy hill.
How tall is the hill where the monument stands?
Big Kill Devil Hill is a 90-foot stabilized sand dune. It was the site of many of Wilbur and Orville's gliding experiments from 1900 to 1902.
Last updated: November 23, 2020
Contact the Park
Mailing Address:
Wright Brothers National Memorial
1401 National Park Drive
Manteo , NC 27954
252 473-2111
Contact Us
Stay Connected
|
Drink up, or dehydration might catch you by surprise | PostIndependent.com
Drink up, or dehydration might catch you by surprise
We seem to forget how important drinking water is to staying healthy.
An older relative visiting us on a trip through Colorado told how not drinking enough water while she was in Paonia had landed her in the hospital with dehydration.
From childhood through middle-age, drinking water when you are thirsty usually gives your system as much water as it requires. But if adults over 60 drink water only when thirsty, chances are they are getting about 90 percent of the fluid they need.
Simply stated, dehydration is the loss of water and salts essential for normal body function.
Seniors and even younger people visiting our area from climates with higher humidity don’t realize how easy it is to become dehydrated here in our drought-parched western Colorado.
Visitors and residents alike need to make it a practice of drinking water on a regular basis, thirsty or not, especially with the record high temperatures we have been experiencing throughout Colorado.
Those who exercise outdoors this time of year, whatever activity it might be, significantly increase the need for water intake.
Often you don’t notice the first symptoms of mild dehydration: decreased coordination, fatigue and impaired judgment. Remember, the ability of our body to cool off decreases as we sweat less. Heat exhaustion usually comes next in only a few hours.
By drinking enough water during frequent and long rest breaks, heat exhaustion can be self-treated or avoided. Eating salty foods or drinking an electrolyte solution like Gatorade also helps.
Though one’s life is not in danger with heat exhaustion, ignored it can lead to the life-threatening emergency called heat stroke.
As the body begins to generate heat faster than it can be shed, our core body temperature rises rapidly. The brain begins to fail since it can only function within a narrow temperature range.
Heat stroke can produce disorientation, combativeness and hallucinations. If the body is not cooled off rapidly, death can result is as few as 30 minutes.
Cool the victim as fast as you can, soaking their whole body with water after removing all non-cotton clothing. Massage extremities so cooler blood will flow to the core.
If available, place ice packs first around the neck, then under armpits and finally to the groin area. Transport victim to the closest hospital.
Give them water by mouth if they are conscious while you continue to cool their body.
The closest scare I’ve had with dehydration came while doing field work with friends in the desert country of Chaco Canyon.
Returning to base camp at dusk, one member of our party who wasn’t feeling well went to lie down in her tent. It took us awhile to figure out that she was suffering from dehydration. After all, she had lots of water.
But by taking occasional sips from her CamelBak water pack’s convenient tube, her intake had not equaled her loss.
Me? I take a minimum of four big water bottles whenever I go into the great outdoors. And I drink a lot. Water that is.
Writing from 25 years of experience in federal land management agencies, Bill Kight, of Glenwood Springs, shares his stories with readers every other week.
Support Local Journalism
Support Local Journalism
Start a dialogue, stay on topic and be civil.
User Legend: iconModerator iconTrusted User
|
Skip to main content
Verified by Psychology Today
How Traumas Create Negative Patterns in Relationships
Unresolved traumas can create challenges in communication, intimacy, and trust.
Source: tiburi/Pixabay
Traumas are extreme life events that threaten your physical or psychological survival. A percentage of people who experience traumas have clinically diagnosable post-traumatic stress disorder (PTSD), but many more have trauma-related symptoms like physiological reactivity to triggers, panic attacks, chronic anxiety, feelings of anger or numbness, or a loss of trust.
In addition to traumas like rape, childhood abuse, or military combat, a pileup of negative life events, unresolved chronic stress (e.g., prolonged unemployment), past abusive relationships, or growing up in a dysfunctional family can also lead to trauma-like reactions and susceptibility to emotional triggering and reactivity.
Trauma professionals often refer to these types of events as "little t" traumas to differentiate them from the "big T" of life-threatening events. But either can impact your relationships in negative ways if you don't deal with them through therapy or self-help.
Following are four ways traumas can negatively affect romantic relationships:
1. Getting triggered into traumatized states
Our brain wiring is such that if you have unprocessed trauma or PTSD symptoms, or experience chronic, ongoing stressful situations, you are likely to get triggered into states of “fight, flight, or freeze” when you encounter situations that remind you of the original trauma or ongoing stressor or situations which your brain deems important for physical/emotional survival.
Because our ancestors were tribal and depended on the tribe for protection, food, and shelter, we are wired to react to perceived abandonment or rejection in relationships as if they were threats to our physical survival. If you also have past traumas or currently experience situations that are actual threats to survival (e.g., debt, unemployment, serious illness), you may become even more likely to react to relationship conflict or rejection with the brain’s primitive survival mechanisms.
A part of the brain called the amygdala is wired to take over and generate fighting, fleeing, or freezing responses when your brain labels a relationship conflict as an emergency. This can lead you to say things you don’t mean, scream, or lose control, or feel overwhelmed and shut down. All of these responses can cause a partner to feel attacked, rejected, or abandoned, which triggers their emergency response network, and so the cycle continues.
2. Fighting, fleeing, or freezing
Unprocessed traumas or ongoing serious chronic stressors can cause the primitive brain networks involved in survival and threat response to hijack your brain into a “fight, flight, or freeze” state.
If one of these responses helped you survive childhood trauma (e.g., fleeing from a borderline parent or fighting a drunk, angry parent so they wouldn’t harm a younger sibling), your brain will give that type of response priority and automatically generate fighting, fleeing, or freezing when the amygdala signals a relationship emergency.
This can result in the following behaviors which are damaging to relationships:
• Fight. Attacking your partner verbally or physically, raging at them, blaming them for all of your problems, expressing contempt, being controlling or demanding, or not letting things go.
• Flight. Avoiding dealing with problems, panicking and acting impulsively, or running away from intimacy or emotional situations
• Freeze. Feeling helpless, feeling unable to act, or shutting down and disconnecting from your partner.
3. Shame-based responses
Interpersonal traumas or chronic rejection can create toxic shame. Shame is a destructive emotion for relationships (unless you have actually done something terrible). Shame makes you want to hide or feel rage toward people you perceive as having shamed or rejected you. Shame makes you hide important parts of yourself from your partner. You may put up a “wall” or mask your insecurities by attacking others or overcompensating.
Shame also makes it difficult for you to hear criticism, even if it is well-meaning. You are likely to respond defensively because you don’t want your flaws to be exposed. Shame makes you want to give up on relationships rather than fight for them.
You may turn to addictions or compulsive behaviors as a way of self-medicating the shame. You may drink or take drugs, play video games to excess, shop compulsively, act out sexually, or become a workaholic. All of these patterns take you away from being available to a partner because they lead you to prioritize the substance/behavior of choice above your partner’s needs and feelings.
4. Rigid, negative beliefs about relationships
Experiencing relationship trauma or having a dysfunctional family history that you haven’t dealt with can shape your beliefs about relationships in negative ways. These beliefs can then bias how you perceive your partner’s actions, leading you to interpret them in the worst light. You may be unable to trust, and therefore constantly monitor the status of your relationship or try to control your partner.
You may be overly scared of rejection or abandonment and therefore not put yourself out there to find intimacy, or you may reject others before they can reject you. You may feel that your partner will never be able to understand your feelings or be motivated to meet your needs. This can lead you to not express what you want or need and end up resentful when your partner doesn’t read your mind.
5. Traumas can lead you to choose unhealthy partners and stay with them too long
Traumas in your family of origin (both "big T" and "little t") can leave you with insecurities and feelings being undeserving of love. Therefore you may be more likely to tolerate disrespectful behavior or make excuses for a partner, rather than setting boundaries or leaving.
You may feel that a dysfunctional relationship is the best you can do or feel too scared of being alone to leave even an abusive partner. You may take on too much of the guilt and blame or be easily manipulated (as you were by your dysfunctional parent). You may be drawn to abusive or unloving partners because of "trauma bonding": Trauma experience can make you addicted to emotional intensity, so you reject the friendly, honest, respectful person in favor of the inconsistent, rejecting, demeaning, or manipulative one.
Final Words
If any of these patterns sound familiar, it might be a good idea to get an evaluation from a mental health professional. Self-help books and articles may help as well, depending on the level of severity.
Interpersonal traumas leave their legacy through enduring beliefs and patterns of behavior that make it more difficult for you to find and maintain genuinely loving and authentic relationships. By becoming aware of these patterns, you can begin to think and act differently, giving yourself more respect, protection, and self-love and making wiser decisions about relationships and whom to partner with.
You can learn not to have relationship discussions when triggered and to feel increased self-worth that makes you less sensitized to conflict and rejection. Over time, you will be less likely to overreact to relationship ups and downs with primitive, emergency responses.
|
Quality professionals face tough obstacles and unique challenges. They often need special leadership attention but don’t always receive it. That is where mentoring can make a difference.
Mentoring is a leadership tool that helps develop an organization’s managerial talent through interaction between a mentor and a mentee (or protégé). When mentoring, formally or informally, a manager with experience, expertise and wisdom teaches, counsels and helps a less experienced or less knowledgeable person to develop professionally and personally.
Mentors ensure younger or less experienced managers are competent and committed to organizational goals. Mentors also have a vocational and psychological impact on the mentee.
Vocational benefits include:
• Sponsorship. A mentor, who can work best when the mentee is not in a subordinate relationship, supports the mentee with his personal reputation.
• Exposure. Ensure the mentee’s talents are showcased and developed.
• Protection. Shield the mentee from political pitfalls.
• Challenges. Assign the mentee to projects or opportunities that will stretch and develop the mentee.
Some of the psychological benefits include:
• Role modeling. Set an example of how to behave within the organization.
• Confirmation. A mentor can be a risk-free sounding board for the mentee.
• Counseling. Advise the mentee on what to do and what not to do. This helps the current performance but prepares the mentee for future assignments of greater responsibility.
• Friendship. Provide friendship, which makes the mentee feel more like a peer and assists the mentee to get socialized into the organization.
However, mentoring affects more than just the mentee. It also impacts the organization. Studies suggest that effective mentoring can:
• Improve individual and organizational performance.
• Result in higher employee retention.
• Achieve higher promotion rates.
• Identify people with high potential more easily and earlier.
• Maintain greater organizational loyalty.
There are many mentoring techniques, but here are six that can positively influence the implementation of a mentoring program:
• Legitimacy. Having a well-respected mentor in a relationship with an inexperienced quality professional lends credibility to the mentee.
• Relevance. When a mentor sponsors a quality professional, he is showing that quality initiatives are valuable to the organization.
• Protection. Quality initiatives typically require time before they can deliver significant results. Not all operational managers are patient and supportive with short-term results. Mentors can use their positional power to protect the mentee and quality initiatives from premature elimination.
• Networking. Most initiatives come at a cost. Because a mentor tends to be well-connected within an organization, his network can become a resource for the mentee.
• Soft skill development. Many quality professionals are well-trained in their technical field. However, successful quality professionals can simplify and communicate the numerical benefits of quality initiatives to others. Mentors can teach their mentees the importance of skills not well defined in textbooks, such as persuasion, reflective listening and consensus building.
• Transference. Mentoring is a great way to leave a legacy. Mentors pass on knowledge and experience which is a win-win for the mentee and the organization.
Continuous improvement is enhanced through the technical and the human side of quality. An excellent way to accomplish this improvement and ensure longer-term growth is through seasoned mentors who are willing to make a commitment in a caring way, which involves taking part in the learning process side-by-side with the mentee.
|
A virtual beachcomb at Bawdsey Quay – how many treasures can you find?
by Kate Osborne
This photograph was taken around the winter solstice in 2017. During the last lockdown I found myself studying it intensely longing for the day when I could go back to the beach. Beach-combing may appeal in sunnier weather but it’s the winter winds and storms that cast up the most treasure.
How many treasures can you find? – There are at least eight.
1. Overturned shore crab shell
2. Edible crab claw
3. Common whelk shell
4. Limpet
5. Driftwood
6. Sea kale root
7. Toothed rack
8. Egg rack
You can find the answers at the end of this article.
Enlarged photos are shown below to make it easier to spot the treasures.
There is evidence of just 2 of the over 50 species of crab to be found in the UK. The shell of a shore crab (1) is overturned, likely moulted rather than eaten. The crab will grow until it is almost bursting out of its shell, then “unzip” itself out of its shell, hiding somewhere until its soft skin hardens into a new shell. There is also the distinctive black tipped claw (2) of the edible crab.
The white common whelk shell (3) dominates this strandline. Although not appearing in the photograph, look out for its bundles of egg cases resembling a clump of Rice Krispies. The first few of these eggs to hatch out will cannibalise their siblings as they are the first available food source! When wet the egg cases become soft sponges which sailors would use to wash, so they are also known as sea wash balls.
Limpets (4) are another common shell. They have a home “scar” on a rock which their shell fits; they may even grind their shell to make the perfect accommodation. They return “home” as the tide goes out, and as it comes back in and covers them, they graze on algae growing on the rocks. Did you know that limpet teeth are the strongest natural substance in the world? Yes, stronger even than diamonds!
The driftwood (5) in the photo shows markings on its left hand side of the shipworm, destroyer of wooden boats and known as “calamitas navium” by Linnaeus. Not a worm at all but a bivalve with greatly adapted shells and an abnormally elongated body. The shipworm leaves perfectly circular chalk lined tubes behind as it eats its way through the wood. The chalk is actually the shipworm’s excrement which helps protect its soft, vulnerable body which would never fit into the modified shells. Shipworm burrows never meet, they seem able to detect the presence of a neighbour and turn to avoid them.
Driftwood and seaweed are both critical components of the beach life cycle. Please leave them on the beach. They provide food, shelter and habitat for tiny creatures, which in turn are a food source for spiders, beetles and other bugs, some unique to shingle beaches. These, in their turn, are food for smaller mammals and birds. And, as the seaweed and driftwood decompose they provide just enough humus in the stony desert to allow the seeds of shingle plants to germinate.
You can also see a dislodged sea kale root (6) and its tiny, magenta tip emerging at the end of one of the roots. Sea kale pushing through the shingle stones in spring is the most extraordinary sight. Bright purply-red where you would expect green, eventually fading to the glaucous, leafy mounds of sea cabbage. Sea kale adapts to the dry, windswept, salty conditions with thick, fleshy roots that can extend up to two metres into the shingle, absorbing and holding on to any precious fresh water.
Again, just 2 of the over 700 species of seaweed in the UK can be seen. The serrated or toothed wrack (7) has been washed up in a clump from the lower shore. It spends most of its time underwater providing habitat for marine animals and encrusting tube worms. The air bladders (8) of the egg wrack allow it to float upwards in the water, closer towards the sunlight which it uses to photosynthesise. This is one of the longer lived seaweeds and is possible to age, as it only grows one new air bladder along its length each year. Someone found a piece of egg wrack on one of my Felixstowe beachcombs that was thirteen years old!
And of course there’s the inevitable plastic trash, in this case a piece of bubble wrap (9), but happily there is far more treasure than trash in this photograph.
Please beachcomb sustainably. Take away as much rubbish and sea glass/pottery as you like but everything else belongs on the beach. Our shingle beaches are a complex & fragile habitat – the plants & animals that live there need that driftwood, shell or stone far more than you. Thank you!
Kate Osborne
Kate Osborne is the founder of Beach Bonkers, using beachcombing to inspire people about Suffolk’s shingle beaches. She does this by leading guided beachcombs, giving talks and taking the beach to people. See www.beachbonkers.org.uk for details or call Kate on 0751 255 7200
|
Turbine Flow meter
Turbine flow meters are volumetric in-line sensor to detect gas or liquid flow rate; it detects low to middle flow rate, clean, low corrosive and viscosity fluids. Turbine flow metre is divided into gas turbine flow meter and liquid turbine flow meter. Silver Automation Instruments supply electronic turbine meter with a variety of outputs, such as frequency, current for PLC or batch dispensing operation. It can take measurement of fuel, gasoline, diesel, water, RO water, milk, natural gas, biogas, compressed air and so on.
It is operated with simple well understood technology; measured medium is going to the sensor body, making the rotor to rotate at a speed proportional to medium velocity and flow rate. As each blade passes through the magnetic field generated by the flow meter’s magnetic pickup, an alternating current voltage pulse is produced.
Features of LWGY Turbine flow meter
Stainless steel flow meter
High accuracy
Low price cost
Variable sensor size available, such as 1 inch, 2 inch, 3 inch, 4 inch turbine flow meter
Rugged quality and small compact design for easy mounting
Fast response time
Can work for conductive or non-conductive liquid
Many process connection available: thread, wafer, flange, tri-clamp sanitary turbine flow meter for hygienic industry
Flowmeters works in various ways and it measures different elements. Therefore,in this article i have provided everything that will help you to understand more about turbine flowmeter. The design is comprehensive and it will help you to get more insight about its funtionalituy. Read on and find out.
turbine flow meter working?
There is a shaft that is mounted inside inline turbine flow meter to support the other. This helps in minimizing negative turbulence attack. The support provided also houses the open bearings which allow for lubrication of the brushes hence prolonging the lifespan of the turbin flow meter. These supports have locking rings that are used to fasten it.
The shaft plays a crucial role in supporting the rotor. Therefore, when there is a flow it induces a force on rator wings which will, in turn, rotate because its shape and angle enhance force. Additionally, there is a mounted turbine flow transmitter above the rotor which generated signals for passing blades. The sensors located externally to the glowing stream to avoid the occurrence of constraints in a case whereby wetted sensors are used. The pulse signal which is processed by the flow transmitter is used in determining the flowrate of the liquid or gas. The sending and transmitter systems sense the forward flow directions.
The most important element that keeps it to move freely is the propeller located in the tube. This turbine flowmeter has been designed to ensure there is little drop in pressure hence it is regarded as one of the best measurement tools.
-High accuracy
-The cost is moderate and low price
-It is reliable performance
-Very good at clean fluids measurement
-Turndown is impressive
-Bearings wearing out
-It is not reliable when measuring steam
Turbine flow meter price
Turbine flow meter price is determined by many factors
a. Gas turbine or liquid turbine flow meters are different
b. Different turbine flow meter sensor size ,different price
c. Different turbine flow transmitters, different cost, such as whether need digital turbine flow meter , whether need HART or RS485.
d. High temperature or high pressure also affect turbine flow meter price a lot
Turbin meter Manufacture
There are many top brands turbin flow meter factories, such as cameron nuflo turbine meter,blancett flow meter,daniel turbine meter,omega turbine flow meter,badger turbine meter,helical turbine meter,Emerson turbine flow meter,k24 electronic turbine meter, they are rugged turbine flow meters with not cheap price .However Silver Automation Instruments sell economical flow meters as alternative or low price replacement.
turbine flow meter accuracy
SGW Gas turbine flow meter with accuracy 1.5% or 1.0%,liquid turbine flow meter with accuracy 0.5~1.0%
How to operate
It takes flow measurements on velocity of gases and liquids. A functionality flow computer can be used to correct the temperature, pressure and fluid properties that ensure the desired accuracy is achieved. Non-lubricating fluids can wear out its bearing and it influences the flowmeter to lose its accuracy levels. However, some have grease fittings that allow them to be used with non-lubricating fluids. Additionally, these turbine Flowmeters are designed to operate with a limited temperature range of up to 60 c which implies it is susceptible to being damaged when exposed to a temperature that exceeds this value.
It is used for liquids up to 10 inches (DN250 Turbine flow meter). The weight and the size of a larger turbine might require supports and concrete foundations.. When dealing with corrosive fluids Attention should also be paid to materials, such as fittings, bearings, rotor, and body.
Chemical, petroleum and water industries largely use turbine Flowmeters. Some chemical, food, and beverage industries can also use this type of Flowmeters. It serves custody of the transfer of hydrocarbons in the petroleum industry and a distribution system for water plants. We often use this flow instrumentation as natural gas flow meter, diesel flow meter, fuel flow meter.,etc
Industries where turbine flow meter used
Turbine Flowmeters are used in the following industries as per the largest to the smallest magnitude.
-Oil and gas
-Water and wastewater
-Gas utility
-Food and beverage
-Pulp and paper
Application and Risks
The accuracy is compromised at slow flow rates. Therefore, there is a need to ensure the flowmeter is operated at above 5 %. High speeds can also lead to wearing out. Non-lubricating fluids can also make it less accurate that is why you should be cautious enough to avoid such inconveniences. It should also not be used I dirty fluids to reduce occurrences of bearing damage.
It can get damaged or become less accurate when there is an abrupt transition from gas to liquid flow. This scenario can occur when it is under slug flow or filing the pipe. You should also avoid two-phase flow because there will be inaccurate measurements. Gas turbine flow meter and liquid turbine flow meters are different, customers should specify the fluids when buy the turbine flow meter to the manufacture.
If you are unfortunate enough to experience some breakdowns with your flowmeter you need to choose replacements wisely. You should look at the levels of accuracy that you need. It is better to settle on an expensive but reliable system.
Lastly, before you purchase ensures it has a warranty in case of unexpected breakdowns. Most cases that have led to breakdowns is using it the wrong way. As I had earlier said that Non-lubricant are kit recommended because it makes this system to lose its accuracy. Therefore,it is important to use it for the right purpose to ensure you get reliable and accurate results.
Product Category
• 1/4" turbine flow meter
1/4” turbine flow sensor overviewIt’s a type of volumetric flow meter thatmeasures the rate of fluid flow in a pipe or a cylinder. It impedes the fluidflow wh...
• Turbine flow meter stainless steel
Turbine flow meter stainless steel
Turbine flow meter is an electronic flow measurementinstrument that provides the function of measurement of fluid flow rate. Theprecision and accuracy of this v...
• High pressure turbine flow meter
High pressure turbine flow meter
Turbine flow meter is a volumetric flowrate measurement instrument that electronically measures the flow of fluids,Silver Instruments sell high pressure rating ...
• Turbine water flow meter
Turbine water flow meter
Turbine water flow meter is a flow sensingdevice that measures the water flowrate from the calculation of the rotationsof a rotor blade placed in the direction ...
• Inline turbine flow meter
Inline turbine flow meter
Inline turbine flow meter is a precisionflow measuring instrument that can be used to measure the flow and total volumeof the media. Inline turbine flow meter h...
• Turbine air flow meter
Turbine air flow meter
Air turbine flow meter overviewTurbine air flowmeter is almost independentof air density, pressure, temperature and other parameters when measuring thevolumetri...
• 8” Gas turbine flow meter
8” Gas turbine flow meter
Gas turbine flowmeter is intended for volumetric flow rate measurement of natural gas, LPG, nitrogen, gas, biogas, air, etc.Features High accuracy, good repeat...
• 3/8 inch liquid turbine flow meter
3/8 inch liquid turbine flow meter
SLW series liquid turbine flow meter is used to detect the instantaneous flow rate of the liquid and the total flow, and its output signal is 4-20 mA, frequency... Protection Status
|
What is log4j: Untangling the Biggest Cybersecurity Vulnerability in History
Find out why security experts are calling the newly-discovered log4j vulnerability “apocalyptic” — and discover what the vulnerability means for you.
From the SolarWinds hack that came to light in December 2020 to the February 2021 attack on a Florida water treatment plant, there have been a number of high-profile cybersecurity incidents over the past year. On December 9th, whispers of a new vulnerability worse than all those that preceded it began rippling through the cybersecurity community. Within a day software companies the world over were in crisis mode desperately trying to figure out what the vulnerability meant for their products and how they could patch it before hackers could take advantage.
It wasn’t long before words like “apocalyptic” were being thrown around to describe the vulnerability, which is in an extremely common section of Java code called log4j that’s used in millions of systems running everything from Amazon and Google to hospitals and militaries. With that much reach, it’s no surprise that U.S. Cybersecurity and Infrastructure Security Agency director Jen Easterly called log4j “The most serious vulnerability I have seen in my decades-long career.”
But what exactly is the log4j vulnerability and what does it mean for regular businesses and computer users? Read on to get the answers to these and other pressing questions about the biggest cybersecurity vulnerability in history.
What is the log4j Vulnerability and Why is it so Dangerous?
The Apache log4j vulnerability, also called “Log4Shell,” is a vulnerability discovered in the log4j logging framework. Because log4j is an open-source code designed to be used by any application running the incredibly popular Java, it has been used by millions of websites and services around the world. All of these are now at risk due to the vulnerability.
There are three reasons why the log4j vulnerability is particularly dangerous. The first is the ubiquity of log4j. The Java programming language has been a basis for software since the mid-1990s. The vulnerability means that huge swaths of the computer code that forms the basis for modern life is now open to attack. The potential impact cannot be overstated. Cloud storage companies like Amazon, Microsoft, and Google, whose programs are the digital backbone of millions of other applications, are all affected. Software giants like IMB, Salesforce, and Oracle are also seeing the impact.
The second reason for the danger is that the log4j vulnerability is very straightforward to take advantage of. All a bad actor has to do to take over a device or system is to type in a line of bad code. It’s so simple that in the Minecraft video game (where some believe the vulnerability was first identified), all you have to do to take advantage of the vulnerability is type a line of malicious code into the public chat box during the game. And those lines of malicious code are available everywhere, with some Twitter users even changing their names to lines of bad code.
The final reason is that the vulnerability is incredibly powerful. While some vulnerabilities will let bad actors get past parts of a system’s defenses, a single vulnerability typically won’t eliminate the strength of all of a system’s defenses. Not so with log4j. The vulnerability gives threat actors access to the heart of whatever system they get into, bypassing all of the standard defenses software companies put in place to block attacks.
It is for all of these reasons that the log4j vulnerability has been given the highest possible risk rating
How Are Hackers Responding to the log4j Vulnerability?
Although the log4j vulnerability was present for years, it is unlikely that criminal hackers knew about it before it went public a couple weeks ago. Now that it’s on their radars, though, it should come as no surprise that threat actors are jumping on the opportunity to exploit the vulnerability. Its ease and power make it too good to ignore. Reports show that hackers are trying out dozens of variations of the original exploit to try to get past device and system defenses. There were over 1.8 million attempts to exploit the vulnerability just in the first week after it came to global attention.
While most of the initial hacking has focused on hijacking computers to run bitcoin mining software, we are now seeing the rise of state-backed hackers trying to leverage the vulnerability. On December 15th, there were reports Iranian state-backed hackers tried to break into Israeli government and business targets using the vulnerability.
For more everyday hackers looking to exploit businesses and organizations, log4j also offers new opportunities for ransomware attacks that freeze owners out of their networks. Phishing emails present a particularly simple way for hackers to plant bad code.
Staying Secure in the Face of the log4j Vulnerability
Since the log4j vulnerability came to public attention, computer programmers and security experts have been working around the clock to identify and address the vulnerability in their software. What makes tackling this vulnerability particularly challenging is the fact that so many systems of all shapes and sizes run it. Finding and addressing each and every appearance of log4j code is a Herculean task that has even spawned its own memes
Even if it’s a challenge, it’s essential that businesses devote the necessary resources to identifying the vulnerability in their systems and addressing it right away, whether that means patching the code or replacing it. Fortunately, the big guys like Google and Amazon are working hard to eliminate the vulnerability in their services — but that doesn’t leave smaller organizations off the hook. It’s important to continue practicing cybersecurity best practices in the face of log4j, including identifying and avoiding social engineering emails — which will likely be on the rise in the coming weeks — ensuring all your applications and software are up to date with the latest upgrades and patches, and making sure you have a multi-layer security posture in place.
If you’re worried about what the log4j vulnerability means for your business and what you can do to stay secure, reach out to the team at Turn-key Technologies, Inc. (TTI). Our experts will work with you to ensure your organization is cyber secure in the face of this and other cyber threats that may arise in the future. Get started today!
By Tony Pugielli
January 10, 2022
Sign up for the TTI Newsletter
TTI logo
Please, rotate your device
|
Theodoros Ntakouris
Dec 10, 2020
6 min read
A quick overview of compression methods for Convolutional Neural Networks
Namely: Hyperparameter Search, Convolution Variants, Network-in-Network, Weight Sharing, Pruning, Quantization
The following is a very, very brief and non-technical summary of a chapter in the author’s dissertation.
Picture by stevepb on Pixabay
A very deep neural network that is designed to solve hard problems might take a few seconds to run on modern computers with hardware accelerators for linear algebra operations. Similarly, smaller neural networks that do not take that much time to run, still do not meet realtime constraints. Hardware resources and execution time constraints is what drives the research community to investigate different methods of neural network compression. In the next few sections, common compression methods are presented.
Hyperparameter Search
In this specific problem, we do not only optimize for accuracy (or the metric of your choice), but also for efficiency. Typical techniques for hyperparameter search include Random Search, Grid Search, Bayesian Optimization and Bandit/Tourament based methods.
Hyperparameter Search Visualization
For CNNs, one of such methods is EfficientNet (top of the leaderboards at Papers With Code). Given the constraint of memory and FLOPS, it scales your typical convolutional network on several dimensions: width, depth, compound and resolution (number of layers, number of filters per layer, convolution dimensions).
Efficient Net Scaling Dimensions
Convolutional Variants
Besides hyperparameter search methods, there are some hand-made computational schemes that depend on mathematical tricks to reduce the parameter count of each layer while they proportionally keep a larger amount of their computational capacity.
Group Convolution
Split the convolutional filters of each layer into equal sized groups. Apply to them to equal sized groups. You can end up with a more computationally demanding network if you choose too large group and filter sizes.
Group Convolution
It’s not in one’s benefit to keep the output groups aligned as — is. This is a topological constraint that has no reason to exist. Treat it like ShuffleNets do, and mix the output channel groups.
Output Channel Group Shuffling
Hyperparameter search? Special convolution ‘variants’? Empirical network design? Actually, this technique sits right in the middle. Let’s focus on the Inception-v{1,2,3,4} model family. Those replace the typical convolutional layer stack in classic convoltional networks like ResNets and VGG, with layer groups that are aimed to have a greater knowledge capacity with regards to their slight increase in parameters and computational cost.
Naive Inception v1 Block
Inception v1 Block with less input channels
Inception v{2,3}
The larger convolutional kernels of size (5, 5) are replaced as a cheaper alternative: 2 layers with kernels of size (3, 3). Then, the layers which contain kernel sizes (n, n) with n > 1, are replaced by 2 layers with the first one having filter size of (n, 1) and the second one having filter size of (1, n). In order to reduce the depth of the total network (you typically stack 10s of these layer groups together), the (1, n) and (n, 1) filters are computed in parallel.
Inception v2 Group
The main difference of Inception v3 is that it uses greater convolutional filter sizes (7, 7).
Inception v4
This revision of the Inception family ivnestigated a lot of filter size and arrangement configurations in order to be more efficient. Special steps were taken to reduce computational overhead where less knowledge capacity is needed. In brief, downsize layers were created in order to work better with residual networks.
Weight Sharing
We can keep a smaller number of the weights required to train a neural network and project them into virtual weight matrices that are used to perform forward pass. Then, on the backward pass we just accumulate (or average) the loss for each real one, based on the virtual ones! This is typically achieved with some sort of hash function.
Weight Sharing Visualization
Sparsity and Pruning
Not every neuron is created (or trained) equal. Some may contribute practically zero information to the total output of the network (due to very small weight values). These can be pruned away, leading to a sparse (lots of zeros) network. Then, special matrix storage types (CSC, CSR) and linear algebra subroutines can be used to accelerate computation and reduce storage space by a huge margin. Loading the whole network on on-chip SRAM is a huge advantage. There are lots of techniques to do such thing:
Keep in mind that a high perceptage of sparsity does not always correspond to full hardware utilization. You can get matrices with > 50% sparsity that are so dense in general that can not be multiplied effectively with special hardware. The most easy way to take advantage of pruning is to remove specific filters as a whole when possible.
You don’t need 32 bits to represent weights. You might not even need 16! Google and nVidia already use less bits for precision (16 bits) for their neural computers. Weights are typically small and need high precision close to zero and one. You can use less bits to do that. Sometimes even 1 (XNORNet)!
IEEE 754
Google TPUs bfloat16
Quantizing less than 16 bits
It’s not efficient to stick with the typical sign — exponent — mantissa representation for very low bit width (≤ 8 bits). The usual ‘trick’ employed is to first project the weights to the [0, 1] range, using tanh(.) , then to quantize (map to nearest number) and then to re — project back to [-1, 1]. In the 1-bit scenario you expect the values to be either -1 or 1.
Due to the non — differentiable nature of quantizers (thresholding operations), we need to somehow calculate the gradient on the backward pass. We just set the gradient to 1 where the quantization intervals are used and 0 otherwise (Straight Through Estimator). For training, we do use shadow/virtual weights that are the ones to get updated during back propagation, while quantization is done on-the-fly while the network executes. Then, when training is complete and we have reached convergence, we can just quantize and store the weights.
You can use the methodology of knowledge distillation to train networks with multiple bit modes jointly.
Learnable Quantization
You can also learn the quantizer parameters stochastically along with the networks weights! Specific constraints/design considerations can be put in place in order to ensure bit-operation compatible output format. Modern CPUs (even without a signal processing or graphic accelerator module) support these operations in a vectorized manner, being able to process > 64 batches of data at once!
I won’t dive deeper in this matter, due to the fact that I am going to get way more technical than I originally intended to.
I hope that this blog post was food for thought and provided enough resources for the interested reader to look into later.
Thanks for reading all the way to the end!
|
Do Women Recite Hallel?
Besides the Hallel that is recited during the Seder, the Shulhan Aruch (Orah Haim 487:4) writes that on the first night of Pesah (and on the second night as well, in the diaspora), Hallel is chanted at the synagogue with a blessing. The basis of this practice is written in Masechet Sofrim (20:9) and is as a commemoration for the miracles that took place in Egypt. Rabbi Itzhak Soloveitchik (Sefer HaGriz on the Rambam) explains that this particular Hallel has the special status of a Shira (commemorative song). The Rama (ibid.) records that there was no such custom in the Ashkenazic lands to recite the Hallel at the synagogue.
There is debate among the Poskim as to the obligation of women in this particular Hallel. Rabbi Ovadia Yosef (Yehave Da’at, vol. V, § 34) rules that, since women were also involved in the miracles of Pesah and are therefore obligated in all the Mitzvot of the Seder, they are similarly obligated in the recital of Hallel, with a blessing. Nevertheless, the Ish Matzliah edition of the Mishna Berura (§ 487) cites several Rishonim, including the Meiri (Pesahim 117a), who explain that in the time of the Bet Hamikdash, Hallel was recited during the slaughtering of the Korban Pesah. Although women partook of the Korban Pesah, they were not involved in its slaughtering, and therefore, would be exempt from reciting Hallel. If they wish to recite the Hallel, they explain, they may do so without a blessing.
Another consideration is that the Hallel at night was only instituted to be recited at the synagogue after Arvit. Although the Kaf HaHaim (O.H. § 487) states that even an individual who does not pray at the synagogue on the night of Pesah nevertheless recites Hallel, since women are typically not at the synagogue at this time nor are they part of the Minyan, this Hallel never applied to them. Additionally, Rabbi Yehuda Ayash (Bet Yehuda, vol. II) writes that a person not praying with a Minyan does not recite a blessing on this Hallel and therefore, all the more so a women who does not pray with a Minyan should not recite it.
Furthermore, many Poskim, including Rabbi Pesah Eliyahu Falk (Mahze Eliyahu, § 22), rule that even though women are obligated in the Mitzvah of the Hanukkah candles because they were part of the miracle, they are nevertheless exempt women from Hallel of Hanukkah. Similarly, they should be exempt from Hallel after Arvit on the night of Pesah. The Moroccan custom appear to be that women do not recite Hallel at night, and if they wish to do so it would certainly not be with a blessing.
Summary: Besides the Hallel of the actual Seder, women are not obligated in reciting Hallel on the night of Pesah. If they wish to recite it, they should do so without a blessing.
|
Is there a fuse for the AC in a car?
Where is the car AC fuse located?
Inspect your car’s fuses.
Check your owner’s manual for the location of your car’s fuse panel, as it may be under the hood, in the trunk, or even in the driver’s foot well area. A blown fuse can cause your AC to stop working.
Can a fuse cause your AC not to work?
First of all, your electrical system might be having problems. … While this prevents serious trouble such as electrical fires, it also means that a single blown fuse can cause the entire air conditioner to stop working.
Why would AC suddenly stop working?
When your air conditioner suddenly stops working, it can be cause for alarm or it can be something as simple as a blown fuse or tripped circuit breaker. … It is important to note that many common problems with air conditioners can be caused by inadequate maintenance.
What are the symptoms of a bad AC relay?
What are the symptoms of a bad AC relay?
• Inconsistent cooling. The AC compressor is powered by the relay.
• AC compressor is not turning on. One of the most obvious signs that the AC relay may have a problem is that the compressor is not coming on at all.
• No cold air.
IT IS INTERESTING: Is it bad to let your car battery die?
Why did my AC stop blowing cold air in my car?
What fuses can cause a car not to start?
How much does it cost to fix a blown fuse in a car?
How much does it cost to replace a fuse box in a car? On average, a fuse box will cost anywhere from $5 to as much as $60, depending on the retailer, what it’s made from and the car you drive. If a mechanic has to install it for you, then the labor costs can range anywhere from $65 to $110.
How long does an AC fuse last?
The lifespan of a fuse can be up to 20 years. AC fuses are usually what is known as ‘slo-blow’ or ‘time delay’ fuses. This means that they are at work every time you turn the machine on and off and eventually, will simply wear out due to the strain of the operation.
Is there a fuse for AC compressor?
You can use your car’s owner’s manual to help locate the fuse. If the new fuse blows once it’s been replaced there is a short in the system. This relay supplies main power to the compressor via the system fuse. Locate the relay in the fuse panel or power distribution center using the owners manual.
IT IS INTERESTING: Your question: Do car seats prevent death?
How do I know if my AC compressor fuse is bad?
If you suspect that your AC may have blown a fuse, the first thing you shall notice is that the outside unit of your AC is not doing anything. You may hear a minor humming sound, but that is the extent of it. The humming sound is produced because, despite no power, the furnace keeps asking the AC to run.
|
The US House Committee on Energy and Commerce announced a hearing on the energy consumption of the cryptocurrency industry.
The hearing, titled “Cleaning Up Cryptocurrency: The Energy Impacts of Blockchains” (or “Cleaning Up Cryptocurrency: The Energy Impacts of Blockchains”), will take place on the 20th.
“In just a few years, cryptocurrencies have had a meteoric rise in popularity. It’s time to understand and address the massive energy and environmental impacts they have on our communities and our planet,” said Frank Pallone, chair of the committee, and Diana DeGette, chair of Control and Investigations.
Both added that a focus of this audience will be on proof of work (or PoW) blockchains such as Bitcoin and Ethereum, and how such cryptocurrencies can migrate to cleaner alternatives.
“We look forward to examining the growing energy footprint of crypto mining and how proof of work blockchains, in particular, can migrate to cleaner alternatives and renewable energy solutions.”
Cryptocurrencies and the environment
The environmental impact of PoW blockchains is well documented.
PoW blockchains require powerful computers to perform complex mathematical calculations 24 hours a day to ensure network security. This computational activity requires a lot of energy.
According to the University of Cambridge, the Bitcoin network consumes approximately 120 terawatt hours (or TWh) of energy per year, a figure higher than the consumption of many countries around the world.
If only 39% of the Bitcoin network is powered by renewable energy, according to Cambridge data, that level of energy consumption largely translates to millions of tons of coal burned or the average annual electricity consumption by millions of homes.
Bitcoin is the only PoW-based cryptocurrency to consume a lot of energy. According to the website Digiconomist, which tracks the technology’s unintended consequences, the Ethereum network consumes around 106 TWh per year.
However, there are alternatives to this approach, such as proof of stake (or PoS) consensus algorithms.
The security of cryptocurrencies built on PoS blockchains is ensured by having validators lock their own cryptocurrencies instead of having power-hungry computers to perform calculations.
PoS blockchains are widely considered to be more environmentally friendly. Alex de Vries, founder of the Digiconomist, recently told the decrypt that “if more companies import, the alternatives may become more widely used”.
*Translated and edited by Daniela Pereira do Nascimento with permission from
Please enter your comment!
Please enter your name here
|
Kung Fu
Chinese martial arts, often named under the umbrella terms kung fu (/ˈkʊŋ ˈfuː/; Chinese: 功夫; pinyin: gōngfu; Cantonese Yale: gūng fū), kuoshu (國術; guóshù) or wushu (武術; wǔshù), are several hundred fighting styles that have developed over the centuries in China. These fighting styles are often classified according to common traits, identified as “families” of martial arts. Examples of such traits include Shaolinquan (少林拳) physical exercises involving Five Animals (五形) mimicry or training methods inspired by Old Chinese philosophies, religions and legends. Styles that focus on qi manipulation are called internal (内家拳; nèijiāquán), while others that concentrate on improving muscle and cardiovascular fitness are called external (外家拳; wàijiāquán). Geographical association, as in northern (北拳; běiquán) and southern (南拳; nánquán), is another popular classification method.
Martial Arts
Although the term martial art has become associated with the fighting arts of East Asia, it originally referred to the combat systems of Europe as early as the 1550s. The term is derived from Latin and means “arts of Mars“, the Roman god of war.[2] Some authors have argued that fighting arts or fighting systems would be more appropriate on the basis that many martial arts were never “martial” in the sense of being used or created by professional warriors.[3]
Bruce Lee The Legend
Lee Jun-fan (Chinese: 李振藩; November 27, 1940 – July 20, 1973), commonly known as Bruce Lee (Chinese: 李小龍), was a Chinese-American martial artist, actor, director, martial arts instructor and philosopher.[2] He was the founder of Jeet Kune Do, a hybrid martial arts philosophy drawing from different combat disciplines that is often credited with paving the way for modern mixed martial arts (MMA). Lee is considered by commentators, critics, media, and other martial artists to be the most influential martial artist of all time and a pop culture icon of the 20th century, who bridged the gap between East and West. He is credited with helping to change the way Asians were presented in American films.
|
For a man, a bald head may be a sign of maturity, wisdom or even masculinity, but it might also be a sign of something else—something much worse.
According to a new study, a bald head could signal a higher risk of developing prostate cancer.
In the study, men being referred for prostate biopsies were asked to describe how bald they were by ranking their pattern of hair loss using a five-point scale. Zero meant no baldness…1 meant a minimally receding hairline…2 meant a little bald spot on the top of the head…3 meant a large bald spot on the top…and 4 meant no hair on top of the head. (For a visual scale, see the accompanying illustration.)
DHN Bald_ScaleThe researchers found that the more bald that a man was (the higher he ranked on the scale), the more likely it was that his biopsy would come back positive—showing that he had prostate cancer. In fact, men with minor baldness—a minimally receding hairline, level 1—were twice as likely to have prostate cancer as men with full heads of hair (level 0)…and men with the most severe baldness—no hair on their heads, level 4—were almost three times as likely to have prostate cancer, compared with men with full heads of hair.
To learn more, I called the lead author of the study, Neil Fleshner, MD.
Keep in mind that it’s unknown whether baldness causes prostate cancer. This study showed only an association. Why? Dr. Fleshner’s theory is that being hypersensitive to a hormone that’s partly responsible for the development of male sex organs and masculine characteristics, dihydrotestosterone, may be what both stops hair growth and prompts the development of prostate cancer, because some prior studies have hinted at a link between the hormone and baldness.
I asked Dr. Fleshner whether he thinks that men should get screened for prostate cancer the minute they start losing hair, and he said that it’s not necessary, because most men start losing hair in their 20s and prostate cancer is rare among men in that age group. When healthy men should start getting screened for prostate cancer is, of course, a controversial topic.
If you already get a regular screening, such as a PSA test that detects the level of a prostate-specific antigen in the blood or a rectal exam, during which a doctor uses a gloved finger to feel for abnormalities in the texture, shape or size of the gland, then continue getting screened, said Dr. Fleshner. A high PSA score or an abnormal rectal exam almost always requires further testing. But if your PSA score is on the borderline, assessing your level of baldness might be helpful. If you’re fully bald or balding, you may want to be extra-cautious and ask your doctor to monitor you more frequently or more intensely (doctors can also perform further tests, such as ultrasounds or biopsies of prostate tissue), he added.
Whether you get screened or not, if you’re bald or balding, be on the lookout for symptoms of prostate cancer, such as trouble urinating (difficulty starting a urine stream and/or decreased force of the urine stream) or the presence of blood in your urine or semen.
|
The Fall of Anne Bolleyn
During the spring of 1536 in Tudor England, events conspire to bring down Anne Boleyn, the Queen of England. The coup against the Queen results in the brutal executions of six innocent people - Anne Boleyn herself, her brother, and four courtiers - and the rise of a new Queen.
• Why was Anne Boleyn executed?
• Who was responsible for Anne Boleyn's fall?
• Was Anne Boleyn's execution a foregone conclusion and was she framed?
ISBN: 978-8494457432
|
Edwina Benner Plaza_2 © Bruce Damonte
Reaching for Zero Energy in High Density Housing
Buildings contribute nearly 40% of greenhouse gases to the atmosphere, so the push is on to “get to zero” on many fronts. What happens when ambitious goals like zero energy meet a conventional building industry that’s structured on repetition and cost, in a market that struggles to keep up with massive demand? This is often—too often—our challenge.
But housing is a special building type. It defines how people live, determines access to vital services, even predicts the general health, welfare, and resilience of entire communities. Clearly, housing must be part of the solution to climate change, but carbon emissions directly related to a building’s design are only part of that picture. It isn’t easy for conventional sustainable design standards to accurately define what “good” looks like for any given housing project; the right priorities are inherently complex and site-specific.
The quest to get to zero poses a dilemma for housing. On the one hand, it sends a clear and compelling message about what we strive for: housing that stands on its own and is “part of the solution.” But if it dominates the conversation, zero-energy goals can also limit a design team’s ability to recognize strategies that may be equally or more impactful for a community and come at little or no cost.
A zero-energy building is most commonly understood to mean a highly energy-efficient building that generates as much energy as it uses on an annual basis, usually from on-site solar panels. The most obvious challenge with this housing concept is density. A strict “on-site” definition of zero runs counter to the goal of denser construction, which reduces transit emissions and displacement by adding more stories and creating more compact units. Although taller buildings use more energy overall relative to the room they have for solar panels, height tends to drive energy use intensity down, which is advantageous at a regional scale. (Energy use intensity, or EUI, is the total amount of energy used, over a year, per square foot of building.) Meanwhile, denser buildings typically increase EUI and make it harder to hit a zero energy target, because even though they provide more homes in the same amount of space, there are more refrigerators and televisions per square foot in more compact units. Hitting zero would mean making investments in more elaborate renewable technologies or off-site renewable sources, which may not be the most strategic use of resources.
Taller, denser buildings are also more carbon-intensive to build on a per-building basis. But many are likely a net win for the climate, as long as they are used as primary homes, keep people in their community, and are safe and healthy places. This does not minimize the ethical obligation of architects to work to reduce operational and embodied emissions on all projects, but the context of land use, planning, and equity matters.
When it comes to energy targets in our work, we want to focus on an efficiency target: the “lowest attainable” gross EUI for a dense, urban multifamily building. Loosely defined, this is an estimate based on what current technology can reasonably achieve, informed by the latest industry benchmark modeling for mid rise multifamily buildings.
Coliseum Place a six-story, 59-unit affordable housing project recently completed in Oakland, California.
The firm I work at, David Baker Architects, now has two completed projects that meet these “lowest attainable” energy benchmarks: Coliseum Place and Edwina Benner Plaza, both all-electric with significant solar production. The predicted EUI for Coliseum Place, a six-story, 59-unit affordable housing project just completed in Oakland, California, is 17 kbtu/sf-year, which falls to 9 kbtu/sf-year with on-site solar PV. While this might sound commendable, we will hold our applause. We’ve found that it is not uncommon for completed buildings to use as much as 20% to 50% more energy than predicted. Historically, some of this can be attributed to inaccurate initial modeling, combined with the use of cheap, natural gas to fuel hot-water systems. We also think this significant disparity is due in large part to a lack of testing, verification, and commissioning, which are puzzlingly uncommon in the multifamily sector.
Edwina Benner Plaza, our first all-electric building, with a predicted EUI of 15, has been occupied for three years and is operating nearly as predicted, at 16.7 kbtu/sf-year before accounting for PV. This success is most likely owed to a special focus on monitoring the building’s energy use and making sure its super-efficient heat pump hot-water system worked optimally. There are no other emerging technologies on this project. It is important to remember that for conventional multifamily housing, it’s still the little innovations that may offer the most powerful emissions reduction opportunities. This points us back to why pursuing “zero” may not be as much about new technologies and renewable energy solutions as it is about driving a change in process: a closer examination of the purpose and goals of climate-responsive housing.
1: Set clear goals.
The first step toward successful, climate-responsive multifamily housing is setting a set of clear, achievable goals, making sure they’re the right goals, and ensuring that they are backed up by a firm commitment. The goal should be the answer to this question: What would it look like for this project to “stand on its own” and be “part of the climate solution”? Energy accountability is certainly a part of the answer, and the goal should probably include a target EUI and as much PV as the owner can possibly afford. But the goals must be a natural fit for the strengths and vulnerabilities confronting a specific community.
2: Evaluate value with cost.
The next step is to use design tools that allow the team to evaluate design options on the basis of value—a measure’s ability to serve the goals of the project—rather than cost and compliance by themselves. Cost and basic compliance dominate as decision-making factors without having a clear purpose that extends beyond providing “four walls and a roof.” For example, comfort models and resilience- planning rubrics are two tools we use to track predicted outcomes of the decisions we make.
3: Connect value to social equity.
How the team defines “value” should be based on an examination of residents’ improved access to opportunity and be mindful of the complicated relationship between social equity and technological innovation.
Coliseum Place taught us that energy efficiency was actually the least-important selection criterion for residential heating, cooling, and ventilation systems. Because HVAC system options are limited and bring enormous cost implications, resident health, comfort, resilience, and sense of dignity and control must take precedence. The good news is that you usually don’t have to trade efficiency for human benefits. But the attitude and the approach matter. This logic should extend to all areas of design if we recognize all the ways in which the design of our homes and neighborhoods impacts our quality of life. The more that residents have to cope with a home that is isolating, unhealthy, or unsafe—or that becomes unsafe in a disruptive event—the harder it will be to reduce the overall, long-term footprint of housing.
To successfully reduce emissions in multifamily housing, we should strive to give people of all incomes and abilities equal and fair access to technologies that allow them to adapt and thrive in a changing world. The pandemic has thrown this imbalance of access into high relief. It also highlights a relatively cheap measure that might seem far outside the scope of a zero energy discussion, such as high-speed internet and virtual mobility. Many low-income households lack access to this essential service, which, pandemic or not, limits the community’s ability to thrive. Buildings can’t solve systemic inequities, but this represents the kind of blind spot we can have when global, greenhouse gas–reduction goals define how we think about sustainable housing.
4: Remember carbon!
It’s important to remember that zero-energy buildings can have very different carbon-reduction profiles because they still use grid electricity, even though they contribute to an overall greener grid. Strategies to load shift and add storage can not only deepen future emissions reduction, but also save the owner utility costs and contribute to community resilience. You can do these things without “getting to zero.”
Embodied emissions are another critical factor. Coliseum Place taught us that, while we might assume there is not much room to reduce embodied emissions in a typical multifamily building, we can’t forget to have a conversation about our options. For a wood-framed building with one level of concrete, our structural engineer, KPFF, told us that reducing the emissions of the concrete foundation alone by replacing as much cement as we could get away with, using lower-carbon alternatives, would save about 175 metric tons of CO2, which happened to be the very same reduction our zero energy measures would achieve by 2030, based on a crude, back-of-the-envelope estimation.
5: Commit to verification and training.
The last and most important change to our process is not new, but, again, puzzlingly new to this sector: verification. This would include basic but thorough examinations of things like envelope-framing efficiency, insulation installation and air tightness, efficient hot water distribution, and systems commissioning. It may extend to pre-programming thermostats and giving residents clear information about the systems in their apartments. The cost of this work is minor within the context of large systems decisions, and setting the tone influences everything from more effective pre-construction meetings to successful handoffs with building operators and residents. If Coliseum Place meets its ambitious EUI goals, for example, it will be because residents understand their comfort systems,and the distributed hot water system works as intended, which relies on thoughtful and intentional communication with the building manager about the design.
We have many immediate changes to make and more to strive for in the coming years. To draw down emissions and begin to reverse global warming, we have to rethink how we work on every project starting now. Part of that is recognizing that climate-responsive design is not about meeting singular, absolute goals like zero energy. The power of housing providers to fight climate change starts locally, in securing and expanding direct benefit (stability, health, adaptation) to the communities where they operate. This calls us to find a broader understanding about what “zero” energy (and carbon) means for housing.
Featured image: Edwina Benner Plaza was completed in Sunnyvale, California in 2019. Photo by Bruce Damonte.
|
The Benefits of Feverfew: What is Feverfew & What Are Feverfew Uses?
Feverfew uses have spread far and wide from their original roots in Asia Minor. Today, the plant is grown worldwide and is often used to treat migraines thanks to a potent chemical called parthenolide. The plant is commonly dried for medicinal use and extracts are also made. But what is feverfew and what are the benefits of feverfew? Keep reading to find out!
Benefits of Feverfew
Feverfew has been called “medieval aspirin” because it was widely used to reduce fevers and also treat inflammatory conditions. The compounds in feverfew that promote these properties include parthenolide, flavonoids, and other oils.
Feverfew also contains the flavonoid glycosides luteolin and apigenin. There are some reports that the plant’s leaves contain melatonin, an important hormone that promotes sleep.
Parthenolide is the main compound and the major contributor to the benefits of feverfew.
Extensive studies are lacking on many of the benefits that are linked to this extract, but there are a lot of anecdotal benefits that people have boasted about for centuries. The key most important benefits are:
Fights Against Migraines
the benefits of feverfew what is feverfew what are feverfew uses person man frowning frustrated in pain from a migraine headache holding his head wearing red shirt white background
Migraines are the main reason people have used feverfew for centuries. Feverfew appears to work so well for migraine relief that it has been the focus of most studies on the plant. The studies conducted include:
• 2011 systematic review into feverfew found that the migraine benefits were first listed in 1978 in the British Health Magazine. The person, 68 years old, was completely able to stop her migraines after eating three leaves daily for ten months. Another study found that after taking feverfew for a period of six months, participants reported fewer headaches than the placebo group.
• 2013 study examined transient receptor potential (TRP) and ankyrin 1 (TRPA1) due to their involvement in migraines. The study suggests that feverfew was able to target TRPA1. It was found that feverfew was able to desensitize the TRPA1 channel in rats. Overall, the study found that feverfew was able to provide adequate relief from migraines. The antimigraine effect is associated with parthenolide.
There are mixed results in other studies where participants noted only slightly higher levels of migraine and headache relief compared to the placebo group. While the research seems to be mixed, the majority of studies do show a high level of efficacy in reducing migraines and headaches.
Anticancer Properties
Feverfew may also have cancer-fighting properties, according to numerous studies. One study from 2017 found that the compounds in this plant were able to suppress non-small cell lung cancer growth.
A slightly older study from 2012 looked at the cytotoxic effects of parthenolide on two breast cancer cell lines. The study found that the compound had anticancer properties, leading to the potential as a drug candidate for breast cancer treatment.
There have been a number of additional studies showing that this compound promotes apoptotic cell death and also prevents SW620 cells from migrating.
While feverfew should not be the only treatment for a person with cancer, it is a strong alternative that can be used alongside traditional medicine to reduce cancer risks. If you’re on medication, speak to your doctor before taking any supplements.
Pain Relief
Anti-inflammatory properties have been linked to feverfew since medieval times, and there is now evidence that this plant can help fight inflammation. The study, conducted in 2015 found that widespread pain relief was possible when using the flower extract of Tanacetum parthenium, or feverfew.
The study’s goal was to find new therapeutic strategies that control pain.
Dosage ranges were vast, from 30mg to 1,000mg. Participants in the study suffered from a list of conditions, and tests show that the extract was able to:
• Reduce hypersensitivity
• Significantly reduce osteoarthritis pain in 30 minutes
The study found that in all cases, feverfew acted as a potent pain reliever and helped with inflammation, neuropathic pain, acute pain, and articular pain. Leaf extracts were less effective in some studies versus direct injections or other feverfew uses.
Mood Increase
Anxiety and depression are two things most people will experience throughout their lives. Feverfew has been shown to provide a general mood increase, with the ability to help combat both anxiety and depression.
A study from 2017 found that feverfew was able to provide anxiety relief in people that were evaluated during a forced swimming test. Mice exhibited lower depression and anxiety in the test, too.
Mood increases are an added benefit of taking feverfew and can also help people that are suffering from pain.
Rosacea Treatment
Feverfew can be applied topically to help treat rosacea, which is a common skin condition that causes redness and visible blood vessels in the face. In some cases, rosacea produces small pus-filled bumps.
Topical creams containing feverfew can help reduce inflammation, which is a major contributor to the development of rosacea.
Feverfew Uses
Feverfew has a variety of uses, and while the extract or leaf are both potent, dosing varies greatly based on the desired result. Feverfew can be used in several key ways, including:
• Extract: The extract can be taken orally and should be consumed in amounts no more than 50 to 100mg per day.
• Fresh Leaf: You can consume two leaves per day.
• Topical: Topical applications are far less common, but they can help treat skin conditions. The extracts often have parthenolide removed because it is known for irritating the skin.
Feverfew Side Effects
the benefits of feverfew what is feverfew what are feverfew uses person man sitting at table trying to work on laptop fatigued wearing black suit striped shirt glasses
Dosage levels may vary from person to person. Be sure to monitor for any potential side effects during the first few dosages and cease taking feverfew if you do notice any adverse reactions that may present themselves.
Side effects of feverfew are not serious, and when taken orally, the leaf or extract is considered likely safe. Short-term usage is considered taking feverfew for four months or less. Safety beyond this duration hasn’t been adequately studied.
The most common side effects include:
• Bloating
• Diarrhea
• Fatigue or tiredness
• Gas
• Headaches
• Heartburn
• Nausea
• Rashes
• Stiffness
• Vomiting
Final Thoughts
Feverfew benefits can help you combat migraines and headaches – among many other things discussed above. If you suffer from migraines, using Feverfew may help ease the migraines or stop them completely.
Shop now
|
The heat and energy that radiates from a data centre is quite substantial. The average data centre uses a lot of electricity to keep all of its systems up and running. They have to worry about networking power, backup systems, security, cooling, and more. All of these components need electricity to operate and this gives off a lot of heat. Having a hot data centre is not efficient as the network and infrastructure needs a cool environment for optimal output.
Demanding Power
Data centres house powerful computers, IT components, and infrastructure that must be kept at a certain temperature to ensure efficiency. An organisation that moves into a data centre must first assess their power demands. When searching for data center solutions, a business must consider their needs and choose accordingly.
A data centres electrical system demands a huge amount of power, it also needs an uninterrupted power supply and backup generators to ensure there are no issues when the main grid goes off. The UPS system protect the computers and keep them running until the main generator is back online.
Cooling Data Centres
Some data centres, the ones that are bigger than aircraft hangars and manage data for big companies like Facebook, Microsoft, and Google require a tremendous amount of energy to operate each year. Some of them actually consume more energy than a small country as information and communication filter through the centre every day.
To ensure they are running at an optimal level, all of this IT infrastructure must be kept cool. A warm environment affects the computers and productivity. Conventional data centres use a variety of cooling techniques to modify the environment, ranging from raised floors to computer room air conditioners (CRAC).
The raised floors are put in place, so computer room air conditioning infrastructure can push cold air through the servers and cool the components of the computer. This works well for smaller data centres but is inefficient for a larger building.
Modern facilities use innovative data centres that use state of the art cooling devices that are specifically made for the building.
Data centres use an enormous amount of electricity, generating huge energy requirements. This should not come as a surprise as some of the biggest data centres can dwarf football stadiums or airplane hangars. All in all, data centres consume close to 3% of the world’s electricity. All of this power needs to be kept cool using innovative systems.
|
Japan had contact with China, India and the Mongols, among others. Is there a term they used for Asia (in the sense of "land mass where China is" or such) before "アジア"?
Short Answer:
As for the Japanese language, we didn't have such a word and I don't think we should have had. Ancient Japanese only knew as far as India, that means they only knew one "landmass" in their world. Just like the Nile means "river", or the Sahara means "desert", it was not supposed to have a name, except "outside of Japan".
Long Explanation:
Most geographic knowledge outside of Japan was introduced with Buddhism in olden times. As a result, ordinary Japanese were said to only recognize roughly three regions in this world: Japan, China, and India. Japan has had constant communication with the Chinese cultural sphere, but India was close to a religious "Promised Land" which is too remote to see with your own eyes. We have an old-fashioned idiom 唐天竺の果てまでも "to the very end of China and India" which is like saying "to the Timbuktu" (see Metaphorical equivalent of Timbuktu or Outer Mongolia). The names of both China and India are often used as synonyms of any far-off land, in a way we call guinea pigs テンジクネズミ ("Indian mouse"; but from South America), or maize corn トウモロコシ (confusingly "Chinese China", because モロコシ already means sorghum; also from Americas).
Though numerous places related to China and India (as far as Eastern Rome) were recorded in Chinese chronicles, it is doubtful if Japanese made to grasp them as geographic entities more than accessories of those realms. According to this paper, at the early stage of the contact with Spanish and Portuguese, Japanese were unable to identify the subcontinent where they said their intermediate ports were located as "India" (天竺), by the time Buddhism was almost perished. They, including overseas merchants, instead believed that Southeast Asia, which was the center of Buddhism at that time, was their "India".
After the acceptance of the Western geography, there still sometimes was manifestation of the traditional world view. An interesting example is 南瞻部洲萬國掌菓之圖 (click for the original map) drawn in 1710. In this map, the idealized India occupies the center one-third, and another one-third to right is South-to-East Asian areas. The whole other half of Eurasia is crammed into the top-left of India, with Europe seen at the very corner like a cluttered marshland (the Netherlands seems to have a high mountain! :D). Of course, this is rather a conceptual image like T and O maps of Christianity.
enter image description here
Compare it to 喎蘭新譯地球全圖, a faithful reproduction of the state-of-art Dutch cartography, drawn in 1796. Most of the geographical features and descriptions were correct as much as what modern people expect. It employs a vast amount of Western concepts as well, including the division "Asia".
enter image description here
We can see that Japanese in the middle ages never had a chance to know the world to the west of India, thus impossible to objectively recognize the concept of "continent" unless it means "land outside of the islands of Japan", which would be equal to "all other parts of world". We do have a word now, namely 東洋 "the East", typically equivalent with that traditional range of world we used to imagine, but this is obviously an idea after the contact with the European civilization.
• Really good description of the historical context. Good stuff! Dec 6 '19 at 16:56
• I see a 長毛国小人. I wonder if that's Scandanavia. Very interesting
– Ringil
Dec 7 '19 at 22:52
• @Ringil Dunno. Among European countries seem to be names of Indonesian cities who sent tribute to the Mongol, so something may have really gone wrong. I doubt they're trolls and goblins if those really have European origin :D btw there's another 小人國 south of the Greco-Egypt island to the south of Europe. Dec 8 '19 at 4:13
Your Answer
|
Bödvar Bjarki:The Real Beowulf
Beowulf, it is one of the most important and most often translated, published and realized works of Old Anglo-Saxon literature . But did he really live or were all his deeds only the fantasies of an anglo-saxon poet or is it based on real events?
It is now a fact that the story didn` t actually take place in England but in
the original homeland of the Anglo-Saxons, i.e. in Northern Germany and modern Denmark.
But what do the Northern European and Scandinavian sources say about this “Beowulf”, such a famous hero like him must have left his mark on the continental homeland of the Anglo-Saxons.
It is astonishing that in the Scandinavian sources you can find almost all of the secondary characters from the poem Beowulf such as King Hrothgar his nephew Hrolf etc, but Beowulf himself is missing. But there is an another saga hero named Bödvar Bjarki, the champion of the danish king Hrolf Kraki (nephew of king Hrothgar), whose deeds and adventures are so similar to Beowulf’s, that is why many scholars now say that these two
characters must be identical. even the hero’s names are almost identical:
Beowulf: Bee-wolf, a kenning for Bear.
Bödvar Bjarki: Warlike Little-Bear
The scandinavian sources portray a more realistic version of the story of Beowulf (alias Bödvar Bjarki) and is untouched by christian point of view and its moral concepts.
My story is a historical fiction based on Old Norse Poem “Bjarkamál”, Icelandic rhyme “Bjarkarimur” and Hrólfr Kraki’s Saga, not a fantasy story like the well-known Beowulf. This old sagas relate to the adventures of the great warrior Bödvar Bjarki and the clan wars between the Migration Period Danes, Swedes and the Geats.
This is the story of Bödvar Bjarki, with the greatest probability the real Beowulf!
|
Al. GHEŢE, Ana COPÂNDEAN, I. HAŞ, M. DUDA, Voichița HAȘ, Emilia TINCA, Roxana E. CĂLUGĂR, A. VARGA, Cristina MOLDOVAN None
The main purpose of the research was to characterize the inbred lines from the capacity of moisture loss point of view, in the shortest amount of time after the cob reached maturity. Recently the search for hybrids that have the capacity to lose a lot of moisture in a short amount of time has increased, the research in the field being more focused in the favor of harvest and storage at lower costs. The originality and the degree of novelty of the research made are derived from the lack of research on the dynamics of moisture loss in maize inbred lines, from the existent germplasm at ARDS-TURDA. The limiting factor of research was represented by the weather conditions that can negatively influence the experience. The biological material taken into the study was represented by five inbred maize lines, parental forms, created at ARDS Turda , current lines used to obtain hybrids that show a high potential in creating new hybrids. The experiment was conducted in the form of an observation field. The determination of moisture loss was made in dynamic after 5 measurements were made at different time dates. Moisture loss in the biological material studied was measured using the Granomat device. The date obtained from the determination was analyzed and interpreted using a specialized software. Three different lines were noted that presented a good moisture loss rhythm, one being an early line and another a late line compared to the average of the studied inbred lines. The obtained results can be useful, especially in the improvement of maize lines and in creating new hybrids that can reach a high level of competitiveness on the agricultural market. Creating new hybrids that have a good moisture loss rhythm is very important because a high rate of drying in the field can reduce the costs of production for farmers and growers, meaning reduced costs in artificial drying and reducing economic loss due to late harvest. Alongside the economic loss there is also the added loss of impairments in seed quality.
inbred lines, maize, hybrids, moisture loss, dynamics
Presentation: oral
|
Every year, the financial experts will be highly excited in generating report on the world economy. But it can be said that the year 2020 will the worst economy report they have handled. This can be considered as the result of the pandemic situation created by the corona virus. Even though this virus originated in China, the entire world was severely affected because of it. Many developed and developing countries like US, China, Canada, UK and India were severely affected because of this harmful virus. The other most unfortunate thing apart from health risk is the rise of financial crisis.
Many nations announced a long lockdown and because of which people lost their source of income to a greater extent. Even the big companies were unable to manage their financial needs and their production got affected. To reveal the fact, many people migrated to their native from their work place. More number of people lost their jobs. And even the Governments were unable to tackle the medical needs of their people. Since the count of the victims got increased rapidly, many Government relayed on World Bank and other Nations to overcome the medical needs of their nation.
US economy
As we all know, US tend to play a major role in the world economy. The most astonishing fact is even the US government was unable to tackle their financial needs in the most effective way. According to the economy survey, more number of people was bankrupted in US. More number of people had relied on their personal savings in order to overcome their expenses at the time of complete lockdown. The survey also stated that the economy of small business was down by 20%. More number of people limited their needs to a greater extent and this also affected the routine sales rate around the sellers.
The experts say that China has recovered from this financial crisis shortly than expected. But this is not possible with all the countries that are severely affected by corona virus. Especially the African countries are supposed to work right from the bottom of their economy and they may also consume a very long time period for stabilizing their economy. The most unfortunate thing is they must keep their fingers crossed that they should not be attacked by any other natural calamities or diseases that may pull their economy down to a greater extent.
|
What is Time Travel Debugging?
4 minute read
Time Travel Debugging Defined
Time travel debugging offers a strategic capability for accelerating software delivery and gaining competitive advantage.
Integrated into a CI/CD workflow, time travel debugging is used to automatically and systematically record a program under test.
Time travel debugging is used to record the execution of a program (down to instruction level) as it fails and capture bugs in the act. The output - a recording artifact - provides developers with all the data they need to understand what happened - without wasting days or weeks trying to reproduce the issue.
Developers can replay the recording forward and backward - at any time and on any machine - to diagnose the root-cause of the issue. Replay can be likened to "winding the tape" back and forth in real-time in order to get a clear picture of a program's execution.
time travel debugging explained
Time Travel Debugging vs. Traditional Debugging
While there have been huge advances in building software over the last few decades, the way developers approach debugging has hardly changed.
Unlike traditional debugging, which is predominantly based on guesswork, time travel debugging provides data-driven, actionable insights. Developers get full visibility into what their software actually did before it failed or behaved unexpectedly.
By offering a systematic, repeatable debugging workflow, time travel debugging is proven to reduce the Mean Time to Resolution (MTTR) of test failures by 4-10x.
As well as enabling engineers to resolve typical defects faster, it also helps them to rapidly diagnose flaky tests caused by intermittent failures. Flaky tests are known to be a major cause of frustration and time wastage. Due to their intermittent nature, it is impossible to predict how long it will take to fix them. Time travel debugging makes bug fixing predictable in a way that is not possible with logging or standard debuggers.
Development teams building complex enterprise software typically spend over 50% of their engineering effort in addressing software failures.
10 Benefits of Time Travel Debugging
Whether the failures occur in test, development, or production, time travel debugging provides many benefits.
Time travel debugging helps developers to:
1. Enhance automation efficiency
Improve test automation efficiency by acquiring actionable data for promptly resolving failing tests
2. Boost productivity
Time spent debugging can be drastically reduced, enabling teams to focus on new feature delivery
3. Debug locally or remotely
Portable recordings allow developers to debug anytime and on any machine
4. Enable cross-team collaboration
Shareable recording files improve collaboration efficiency is improved between developers and testers/QA
5. Increase understandability
Code can be effectively debugged and maintained without the need for prior codebase knowledge
At a strategic business level, time travel debugging offers enables businesses to:
1. Shorten development cycles and accelerate product delivery
2. Gain a competitive edge by reducing time to market
3. Improve operational efficiency and reduce engineering costs
4. Minimize customer disruption by resolving customer issues faster
5. Protect brand reputation and revenue
Time travel debugging provides a net positive impact across all stages of the development lifecycle. Crucially, it is being used as a strategic investment to gain competitive advantage.
Time Travel Debugging and CI pipelines
Time travel debugging helps software development teams achieve continuous delivery across the software development lifecycle, whether in test, development or production phases, as outlined in the model below.CI-CD-Workflow-Image
Where and how time travel debugging is deployed depends on the specific needs of the development team. The common thread throughout is the ability to obtain all the data needed to quickly resolve software failures.
LiveRecorder - a Time Travel Debugging Platform
LiveRecorder is a powerful time travel debugging platform for C/C++/Go/Java. It is an essential ingredient in CI/CD workflows for accelerating Time to Resolution of failing tests, speeding up product delivery.
Put simply, LiveRecorder is the solution to failing tests.
The diagram below provides an example of how LiveRecorder can integrate into a modern CI pipeline.
LiveRecorder record CI test failures
This video explains in more detail how LiveRecorder integrates with automated CI test suites.
With LiveRecorder, time spent on root cause detection is significantly reduced. Developers can get straight to debugging the recording artifact - reducing the number of loops in agile development cycles and increasing development velocity.
LiveRecorder can be used to resolve software failures in C/C++ and Java applications built on Linux x86.
In Conclusion
Time travel debugging transforms software failure resolution from a slow process of elimination into a systematic, repeatable workflow.
Time travel debugging:
• Makes bug fixing predictable and improves CI/CD pipeline efficiency
• Accelerates defect resolution and therefore product delivery
• Enables adopters to gain competitive advantage
To discuss how LiveRecorder could work in your environment and see it in action, request a call or team demo by filling in the form below.
Request a demo
|
What are the 7 Division in Myanmar?
How is Myanmar divided?
Myanmar is divided into seven yin (regions), seven pyine (states), and one union territory. Generally speaking, states are semi-autonomous areas allocated to particular ethnic groups.
Which division is biggest in Myanmar?
Yangon Region is the most densely populated and Mandalay Region has the largest population. The smallest population is Kayah State. In terms of land area, Shan State is the largest and Yangon Region is the smallest. States and Regions are divided into districts (kha yai).
What is the main religion of Myanmar?
There is significant demographic correlation between ethnicity and religion. Theravada Buddhism is the dominant religion among the majority Bamar ethnic group and among the Shan, Rakhine, Mon, and numerous other ethnic groups.
Is Myanmar a poor country?
The economy of Myanmar has a nominal GDP of USD $76.09 billion in 2019 and an estimated purchasing power adjusted GDP of USD $327.629 billion in 2017 according to the World Bank. … This would make Myanmar one of the poorest countries in Southeast Asia.
What are people from Myanmar called?
THIS IS INTERESTING: Is Lisa the most popular Thai?
Which is capital of Myanmar?
Is Yangon and Rangoon the same?
|
What are sleepers in history?
Sleepers are the box made up of wood.It was made by British in colonial India for development in transport.It was used in manufacturing the train. kason11wd and 68 more users found this answer helpful...
Answer continues on this webpage
Answer provided by brainly.in
Question viewed 6,544 times
Related Questions
What are sleepers Class 9?
Sleepers are wooden boxes put across railway tracks which hold the tracks in position. They hold the iron tracks on their positions when trains move over them. The sleepers are made of beech and oak. .. read more
What are sleepers in gardening?
Traditionally used to lay rail tracks on, railway sleepers are large rectangular sawn pieces of timber that are now used in a variety of landscaping and gardening environments, such as raised beds, la.. read more
What does sleeper mean in slang?
Informal. something or someone that becomes unexpectedly successful or important after a period of being unnoticed, ignored, or considered unpromising or a failure: The play was the sleeper of the sea.. read more
More "What are" Questions
What are sand flies attracted to? (3,219 views)
What are examples of visual tasks? (2,340 views)
What are the Phillies known for? (5,360 views)
What are the pieces in Chex Mix? (1,828 views)
What are the brown circles in Gardetto's? (4,972 views)
What are mosquitoes most attracted too? (4,995 views)
What are baseboards in a house? (1,714 views)
What are the purpose of baseboards? (6,385 views)
|
Pteridophytes (Spore Producing Plants: Ferns and More) •
Culcita macrocarpa
(Culcita macrocarpa)
Culcita macrocarpa C.Presl 1836 known by the common names of the fetus or feto-abrum is a species of pteridophyte belonging to the family Culcitaceae (formerly included in the family Dicksoniaceae ) with distribution restricted to the Macaronesian biogeographic region and to the southwest of EuropeC. macrocarpa is a perennial homosporous fetus with a thick, crawling rhizome characteristically covered by piliform lamellae of reddish color with protective function. The rhizomes can reach more than one meter in length and be forked. The fronds can exceed 2 meters in length, with bi-pentapinated blades with lanceolate lobes of choreaceous consistency. The petiole is generally the same length as the blade. It produces marginal reniform sera at the end of the ribs protected by an indusio formed by two valves, one formed by a true industry and another formed by an extension of the own blade. The sporangia are pyriform with basipetal maturation and oblique ring, spores triléticos
Taxonomic tree:
Kingdom: Plantae
Class: Polypodiopsida
News coming your way
The biggest news about our planet delivered to you each day
|
Jump to content
Electronics-Lab.com Community
• Posts
• Joined
• Last visited
metal's Achievements
Newbie (1/14)
1. Hello I just wantes to know what is the purpose of REF HI and REF LO pins, also does the above schematic has a 2.000 volt full scale or not . In AN023 application note, it is said that to obtain 2.000 volt full scale, pin 29 cap must be 47nF, pin 28 resistor must be 470 K, and pin 27 cap must be 220nF. Is that right. I noticed that you done the opposite. Thanks
2. Hi everybody I am designing a power supply using LM317KCS,and from the datasheet I have downloaded from TI's technical documentaions,this regulator IC is capable of delivering 1.5 Ampere @1.25 to 35 volt output,considering the condition that the voltage drop accross the IC multiplied by the consumed current does not exceed 20 watts,the power dissipation. I am using 15-0-15 volt transformer rated at 2 Ampere,and to avoid exceeding the power dissipation rated for the IC,I used a switch to select between 15 volt and 30 volt input to the IC,so when I need 10 volt output for example,I switch it to 15 volt input,but this is seriously impractical,so I tried many times "but failed" to design a circuit that senses the input-output voltage drop,and the current consuption,so that when the votage drop accross the IC exceeds 11 volt and the multiplication of both values exceeds 16.5 watts,a switching occurs from 30 volt input to 15 volts input to the IC,so that means a low voltage is needed at high current,and when I need higher voltages "say 20 volt" it automatically switches to 30 volt input. How can you help me friends,as using external current booster transistor to overcome dissipation is excluded from my options,and some times I hear a relay clicking in commercial supplies when turning the voltage wiper to higher output voltages. Best regards.
3. Thank you for the reply I think those ICs are out of production lines these days,but the manufacturer is mitsubishi. I meant if any body got their datasheets from the old days of internet,anyway thank you for every body.
4. Hello What happened with LM350 is as follows: As its designed to dissipate a power of 30 watts,and it can be calculated using the formula: P=V(drop)*I(consumed) So when you are using 24 volts transformer,and want 12 volts,the maximum current that you can draw is 2.5 Amp.
5. metal
amplifier hum
Hi ;) The chassis may be connected to the tape head wire shielding ,so when you touch it the speakers start humming,because you form a source of 50Hz or 60Hz mains hum as you being human,and affected by electromagnetics,as antennas are,just to make the image closer.
6. Dear Everybody :) Imade A mistake when quoted the ICs numbers,but here are the right numbers,would any one has a datasheet for them. Best regards
• Create New...
|
Comment section Share on LinkedIn Share on Pinterest Copy link Link copied
Neil Armstrong's LEGENDARY 1969 landing on the Moon
landed the first humans on the Moon during the Apollo 11 mission on July 20, 1969. The historic Moon landing consisted of astronauts Neil Armstrong, Michael Collins and Edwin “Buzz” Aldrin. Commander Armstrong and Lunar Module Pilot Aldrin flew down to the Moon while Command Module Pilot stayed in lunar orbit. The incredible achievement was televised around the world, with an estimated 650 million people tuning in live on their TVs.
And one of the more astounding aspects of the mission was the seeming simplicity of the technology used to get man to the Moon.
According to Oliver Gassmann, a professor of Technology Management at the University of St Gallen in Switzerland, the mobile phone in your pocket is millions of times more powerful than Apollo 11’s Lunar Lander.
Because of this, in his opinion, the success of Apollo 11 is a monumental testament to the ingenuity and passion of the 400,000 people who made the Moon landing a reality.
Professor Gassmann told “Today, actually, every average smartphone has a higher storage capacity of many millions and processing capacity of several billions of the original Apollo mission computer.
NASA Moon landing: Apollo 11 landing on the Moon
NASA Moon landing: Apollo 11 landed on the Moon with very little computing power available (Image: NASA)
“Now, if we just think at the time what was needed, I think it was an extreme courage.
“And trying to look a little bit into the future, I think it’s tough to look even more than 10 to 15 years ahead because we can't forecast the technological development for certain perspectives.
“But if you think about quantum computing, I think we can have a certain perspective but we can hardly forecast what we can do with the computing power.”
Professor Gassmann said one of the main drivers behind the “information technology” of the Apollo mission was the Massachusetts Institute of Technology (MIT).
The world-famous institution designed the original Apollo Guidance Computer (AGC) and was instrumental in developing guidance and control systems.
The Software Engineering Division of MIT’s Instrumentation Laboratory at the time was lead by mathematician and software engineer Margaret Hamilton.
Just before Apollo 11’s crew landed on the Moon, a failure of the onboard computer warned Commander Armstrong and pilot Aldrin of an error with the navigation systems.
The Eagle Lunar Lander’s computers were simply being fed too much radar and landing information to compute.
With the power of today’s technology, such errors seem highly unlikely, but a clever failsafe in the computer systems, coded in by Ms Hamilton, made the mission a success.
Every average smartphone has a higher storage capacity of many millions
Oliver Gassmann, University of St Gallen
When presented with the option of landing or aborting, Commander Armstrong’s decision to carry on with the mission helped the computer prioritise which information to process.
In the end, the astronaut hand glided the Eagle lander to a safe landing spot after being thrown off-course towards a boulder-strewn field.
The Lunar Lander landed on the Moon’s Sea of Tranquility with less than 30 seconds of fuel left.
NASA Moon landing: Apollo 11 astronauts
NASA Moon landing: Neil Armstrong, Michael Collins and Buzz Aldrin (Image: NASA)
NASA Moon landing: Apollo 11 astronauts
NASA Moon landing: The three astronauts were hailed national heroes (Image: NASA)
Professor Gassmann said: “If we look to the computers at the time, that was still amazing to me if you think about it because there was no signal reception from the dark side of the Moon.
“And at the time of the landing a huge computer was needed and if you talk about the huge computer, we talk about the storage capacity of 74 kilobytes and the processing capacity of four kilobytes.”
NASA’s astronauts spent nearly 24 hours on the surface of the Moon, two-and-a-half of which were spent outside of the Lunar Module.
All three astronauts safely returned to Earth on July 24, 1969, and splashed down in the Pacific Ocean.
NASA Moon landing: Margaret Hamilton
NASA Moon landing: Margaret Hamilton built the software for Apollo 11's computers (Image: NASA)
NASA Moon landing: Apollo 11 on the Moon
NASA Moon landing: Apollo 11 landed on the Moon on July 20, 1969 (Image: NASA)
Neil Armstrong, Buzz Aldrin and Michael Collins were awarded the Presidential Medal of Freedom by President Richard Nixon upon their return – Ms Hamilton was awarded the same medal by Barack Obama in 2016.
Describing her contribution to the Moon landing, President Obama said: “Three minutes before Armstrong and Aldrin touched down on the Moon, Apollo 11’s Lunar Lander alarms triggered.
“Red and yellow lights across the board. Our astronauts did not have much time but thankfully, they had Margaret Hamilton – a young MIT scientist and a working mum in the 60s.
“Margaret lead the team that created the onboard flight software that allowed the Eagle to land safely and keep in mind that at this time software engineering wasn’t even a field yet.”
|
JOK Notebook
A Year Like Bamboo
Last weekend, my language partner Kensuke couldn't talk on our regularly scheduled day (my Saturday, his Sunday), but he happened to have a holiday on his Monday, so we shifted our Skype chat accordingly. Once we had begun the conversation, the first thing I needed to know was which holiday Japan was celebrating. As I learned, it's known as follows:
春分の日 (しゅんぶんのひ: Vernal Equinox Holiday) spring + division + day
The breakdown tells us that the holiday divides winter from spring. But, I asked, isn't that the purpose of another holiday in early February? I'm talking about this one:
節分 (せつぶん: Setsubun, the last day of winter in the traditional Japanese calendar) season + division
Kensuke had no idea how the two holidays differed, and we spent an hour discussing it. The question is quite hard even for native speakers, and on top of that, the Japanese Wikipedia information he copied for me about 春分 and 節分 was tough for me to grasp.
A few keywords stood out in that text:
前日 (ぜんじつ: previous day; day before; eve; prior day) before + day
節気 (せっき: 24 divisions of the lunisolar year)
season + the source of seasonal change
春分点 (しゅんぶんてん: the vernal equinox) spring + division + point
Note that 分 has made three appearances, meaning "division" in every case.
And 節 has appeared twice. That kanji strangely excites me. Here are its primary meanings, to say nothing of lesser ones: "joint, node; season of the year; time; festival; paragraph; tune; to economize, be moderate; moral integrity; bamboo tally used in ancient China." The plethora of definitions is intimidating, but almost all have to do with bamboo and its prominent nodes:
Note the "bamboo" radical 竹 atop 節. That's significant. Henshall explains that the 即 below it typically means "namely" but acts phonetically in this case to express "division" and to lend an idea of "order." So 節 represents an "ordered division of bamboo," referring to the orderly arrangement of its nodes and sections. This concept gave rise to the wide range of definitions.
Imagine the calendar year stretching out like a stalk of bamboo. In a Japanese year, that stalk has 24 sections (each month divided into two), bringing us back to this term:
season + the source of seasonal change
A longer term is synonymous:
二十四節気 (にじゅうしせっき: 24 divisions of the lunisolar year)
24 (1st 3 kanji) + divisions of the lunisolar year (last 2 kanji)
You may be wondering what a "lunisolar" year is. I wrestled with that in essay 1927 on 暦 (calendar, almanac), explaining that what English speakers call “lunar” calendars are often actually “lunisolar” calendars. With a lunar calendar, the months and seasons don’t stay aligned. Jews and Muslims use lunar calendars, and their holidays are always sliding around within the Western calendar because no one tries to sync those lunar calendars with solar ones. By contrast, a lunisolar calendar is a lunar calendar at base, but periods of time have been added so that seasons stay aligned with the solar calendar. For example, padding the calendar in a certain way ensures that the fifth lunar month is always in summer.
Let's go back to the 24 divisions of the lunisolar year. The Virgo in me loves the idea of the 24 divisions. It's as if 12 monthly boundaries in time weren't enough to keep all the days tidy. Better to have 24. Then time (and by extension life itself) can truly be under firm control. (If only!)
All the same, 節分 really just divides winter from spring, which means that we're back to a very loose concept of the year as having four quarters. Likewise, 春分点 marks the point (点) at which the day is as long as the night (thanks to the shifting position of the equator). As we have only two equinoxes (the other falling on my birthday!), one could conceive of 春分点 as dividing the year into two halves. Time is on the loose again, running amok! Anything could happen!
Speaking of a lack of precision, I was surprised to learn that 節分 does not fall at the precise beginning of spring. That start date is represented by yet another word:
立春 (りっしゅん: first day of spring, according to the traditional lunisolar calendar) start + spring
Instead, 節分 comes the day before that first day, which is why 前日 (ぜんじつ: previous day; day before; eve; prior day; preceding day) played an important role in the Wikipedia text. Why should the eve be a bigger celebration than the actual day of something? I have no idea.
Here's one more surprise, something I've never considered before. The term 節分 is so vague and generic that it has no apparent connection to February. Breaking down as season + division, 節分 could have fallen in any of four places on the calendar. Originally, it did; the Japanese were the ones who associated 節分 with the beginning of spring.
I love the characters in that term and the idea of equating bamboo with time, both of them stretching out infinitely and regenerating like crazy, so I'm glad it's called what it is.
By the way, there's a new essay out! Here's a sneak preview:
Have a great weekend! (Which plant signifies the separation between the weekdays and the weekend?!)
Did you like this post? Share the love! It's easy:
Add comment
Log in or register to post comments
|
Dario Padovan
Le scienze sociali e la costruzione dello spazio pubblico: il caso del razzismo fascista
• Abstract
Informations and abstract
This paper explores the responsibility of social sciences in making up a societal public sphere. More carefully, the article thinks about the construction of the Italian public space during the years included between the two World Wars, investigating the influence which racial and racist theories had in the public sphere. During the fascism, Italian social sciences developed a racial theory which proposed a causal connection between somatic and anatomical characteristics, and the cultural, moral and psychological qualities of a racially-defined population. The development of racial politics, which followed the conquest of the Empire, threw the intellectual world into turmoil. The principal conflict regarded the cause of national character, which some racist intellectuals attributed to an immutable racial element whilst others emphasised historical, ideal and cultural factors. In order to clarify the connections between race, people and nation an explanatory scheme was instituted, which allowed a variety of combinations of different disciplinary approaches. One of the major debates concerned the impact of environmental and genetic factors on a race's cultural, social and psychological characteristics. Environmentalists and geneticists disagree on numerous questions concerning racial theories and associated politics. The various doctrinal positions produced different racial typologies, which were used in a variety of ways by the fascist regime in its national and international politics.
Trova nel catalogo di Worldcat
Article first page
Article first page
|
Mining and Quarrying
A quarry is a place from which dimension stone, rock, construction aggregate, riprap, sand, gravel, or slate has been excavated from the ground. A quarry is distinctly different from an open-pit mine from which minerals are extracted. An example of this difference between quarrying and mining would be that limestone is quarried whereas the mineral lime is mined.
|
The Human Truth Foundation
International Date Format (ISO 8601) and Time Measurements
By Vexen Crabtree 2005
The YYYY MM DD date format is the internationally agreed concise format for unambiguous dates and ought to be adopted by everyone. It is logical, with the biggest denominators being listed first (the same way as numbers, times and weights are), making it easily sortable and utterly clear. The International Organization for Standardization specification for the International Date Format is the ISO-8601 format, adopted so far by the computer industry in general (due to the advantages of sorting by dates in filenames), United Nations, commerce groups, scientific communities and some Western governments, although most individuals generally continue to use culture-specific date formats. "2005 03 29" is an example of an ISO-8601-compliant date.
1. International Date Format (ISO 8601): Year, Month, Day
#germany #UK #USA
The International Organization for Standardization (ISO) standard ISO-8601 (2004) specifies the international date and time convention, replacing earlier ISO-8601 standards. Local date formats such as "01/02/03" are ambiguous and inaccurate, and could mean "January 2, 2003" in the USA or "1 February 2003" in other places. The full standard runs to a heady length of 33 pages.
Wouldn't it be wonderful if there were an internationally agreed standard? Well, there is. It is ISO 8601, Data elements and interchange formats - Information interchange - Representation of dates and times.
ISO 8601 corresponds to the UN Working Party on the Facilitation of International Trade Procedures in its Recommendation 7.
ISO Article on International Date Format
(accessed 2005 Aug 16)
Some advantages of adopting the International Date Format:
Across Europe the European Norm (EN) standard 28601 incorporates ISO-8601. "All members of CEN (all of Western Europe and Scandinavia, and most of Eastern Europe) are required to adopt the EN 28601 European Standard. Most have now done so" [Galpin 1998].
1.2. YYYY MMM DD - Today's Date is 2005 Aug 16
I have been using the YYYY MMM DD format since late 1999 when the Millennium Bug started to hit the news; I came up with the format independently of the International Organization for Standardization after thinking on what would make a good, universal, systematic date format that would be completely non-ambiguous. The difference (notice the third M in the middle), is that I use a 3-character English shorthand for the month, for example 2001 Jan 01. This makes it, in my mind, utterly clear what format I am (nearly) using. Once the world is largely familiar with it, the English month can be dropped and replaced with a more sensible number. Until then, it aids the transition. A major disadvantage of this halfway format is that it is not easily sortable; the English letters when used as filenames, for example, would result in "2002 Aug 10" appearing before "2002 May 10", which is unfortunate. When it is for human reading-eyes then I use YYYY MMM DD, when solely for data entry and filenames, YYYYMMDD is the only way to go and hence why ISO 8601 is most highly adopted by the computer industry.
2. The Babylonians Versus the French Revolution1
#christianity #judaism
We all know we divide time into 60 seconds, 60 minutes, 24 hours, 7 days, 4 weeks and 12 months. But in antiquity there have been many ways of recording the passage of time, and many ways to divide up the year into seasons and months. Although the Egyptians may have first divided the day into 24 hours over 5500 years ago2, it was the Babylonians in their star-gazing, moon-charting enthusiasm who divided time into divisions based on the movements of the moon and sun. They divided weeks into 7 days to correspond to phases of the moon, and hours and minutes into divisions of 60 because they had a base-60 numbering system3, and gave us the Zodiac.4. Moon-based and sun-based system became the foundation of Jewish and Christian calendars, and has remained in place as the world's most common system of time-telling. In Qur'an 9:36 it even says that God itself, not us humans, ordained the division of the year into 12 months.
The Babylonians were not ideological in their approach and their astronomers spent lifetimes making careful measurements of the stars and stellar bodies. Aristotle was amazed when he attained 1,903 years' worth of astronomical observations from Babylon, and Ptolemy, the Egyptian scientist, had a Babylonian record of eclipses that dated back to 747BCE. They "fixed the length of a tropical year within twenty-five seconds of the truth; their estimate of the sidereal year was barely two minutes in excess. They had detected the precession of the equinoxes. They knew the causes of eclipses, and, by the aid of their cycle called Saros, could predict them. Their estimate of the value of that cycle, which is more than 6,585 days, was within nineteen and a half minutes of the truth". They measured exactly how the moon covered up stars, and, correctly knew how the solar system was arranged and the order of the planets.5.
Unfortunately, most of this knowledge was wiped out by an ascendant Christianity which enforced its idea of the Earth as the centre of creation, and disregarded and oppressed astronomical sciences, burning books and imprisoning and torturing those who disagreed with the Churches simplistic notion of the planets6.
Base-60 calculations are far from practical and introduce many complications3. Calculating the number of days inbetween two dates is a horrendously multifaceted affair. We have moved on. Numbering systems are base-10 almost everywhere. Our recording of time should also change; such a change would have advantages in man-management, physics, programming, engineering, etc, where we'd no longer need to mix numbers from base-60 and base-10 numbering systems.
A system of base-10 temporal measurements was introduced during the French Revolution with 10 hours in a day, and 10 days in a week, but it was abandoned in the face of almost universal terror at the thought of changing our cherished (but odd) system of dividing time3.
Also see:
3. Use BCE and CE, not BC and AD
#christianity #english_language
Wikipedia notes how the standard transition from BCE to CE is made according to ISO-8601 international standards.
There are also two older, deprecated, denominators, used widely by Christians from the 8th century onwards8. Before this BC/AD notation became popular, the Christian church used 753BCE as the starting-point for calendars, which was the founding year of Rome8.
CE has the same value as AD, and BCE has the same value as BC. They are interchangeable systems. CE and BCE are the correct terms to use for reasons of fairness. Less than a third of the world is Christian, and expecting others to conform to a religious convention that is not their own is immoral - the neutral system of CE and BCE is far fairer7. Using the term "BC" and "AD" shows inconsideracy for others' feelings and beliefs (unless of course they do not know the difference (like most people), which is why I wrote this!). Choosing to use "BCE" and "CE" is to avoid endorsing any religion, and is therefore suitable for communication in the modern world.
We have received many Emails about the use of CE and BCE:
• Some Christians are distressed at the new terms. Some feel that AD and BC have been in use for centuries and that this tradition should be respected. Others see the switch to CE and BCE as just one more example of non-Christian religions being given precedence over Christianity.
• Some Emailers, Christians and others, support the new terms. They feel bound by the Golden Rule -- to do onto others what they would wish be done to themselves. If AD and BC cause distress to others, then the Ethic of Reciprocity (of which the Golden Rule is one of many examples) would suggest that the terms be scrapped in favor of more neutral terms.
The fundamentalist Christians who think that because it is nicer to use religion-neutral terms, that "other religions are being put above Christianity" are incorrect: to use a neutral term is not to put any religion first, which is of course the most tolerant and respectful way to proceed in a multicultural world.
4. What Year Was Jesus Christ Born?10
There is one additional reason to stop using the religion-specific "AD" for dates: it is known to be inaccurate. We simply do not know what year Jesus was born.
"When Was Jesus Born? What Year, and Which Day?" by Vexen Crabtree (2017)
|
Take a minute to understand the concepts behind engaging frontline people in their own safety
A Safety System in Action
An adult and a child are walking on the sidewalk. They approach an intersection with fast-moving vehicles, a common danger zone.
The adult holds the child’s hand, a precaution known as a safe behavior, or an action meant to prevent human error.
Then the adult begins showing the child the safety margin covering how to cross the street safely. The adult reinforces six safe behaviors for a proper safety margin:
1. Stop at the curb.
2. Look both ways for approaching vehicles.
3. Step of the curb only when traffic is clear.
4. Stay in the crosswalk for visibility.
5. Walk across the street looking both ways.
6. Move quickly to other side.
When they approach the next intersection, the adult makes the safety contact again, holding the child’s hand.
But this time, the adult makes another safety contact, directing the child to verbalize and perform the six safe behaviors as they cross the street safely together.
The adult makes a third safety contact once back on the sidewalk, providing valuable feedback about the child’s performance, so the child can apply it next time.
This is a safety system in action. It engaged the adult and child to think about risk and take action to prevent an injury.
SafeTask® System is a safety system for work tasks that engages frontline people to prevent injuries, just like crossing the street.
What does a Safety System Do?
A Safety System engages frontline people in their own protection. It’s a set of safety processes any organization can add to improve its safety performance. These safety processes proactively influence people’s safety while they work.
Our SafeTask® System users experience many benefits, including low injury rates and tasks performed with well-controlled Severe Injury and Fatality risk. Here’s why.
Situation Awareness is the state of being alert to danger and making a safe decision in response. All safety depends on this cognitive skill. The purpose of a safety system for frontline people is to improve people’s Situation Awareness, which counters risk-taking.
SafeTask® System is a toolkit and training for supervisors. It shows them how to apply a safety system of processes to improve people’s Situation Awareness as they encounter risk and perform work tasks.
A Safety Margin is the protection for a work task. The purpose of a safety system is to provide this protection. Think of a Safety Margin as the insulation for a work task, protecting the individual from danger while performing a work task.
SafeTask® System helps supervisors and frontline people achieve a strong safety margin for every work task.
A Safety Contact is when a safety process touches an individual and reinforces a safe margin. In order for a safety system to engage frontline people, supervisors should make an adequate number of safety contacts with their people every week.
SafeTask® System teaches supervisors a safety system of processes they can apply in different combinations to achieve a high level of safety contacts, engaging people and reinforcing safe margins during work tasks.
A Safe Behavior is when a person takes action to execute a precaution. When frontline people engage in safety and perform their work tasks with a high rate of safe behaviors, the injury risk significantly decreases.
SafeTask® System shows supervisors how to proactively influence and measure safe behaviors when frontline people perform their work tasks. It gives supervisors the ability to take charge of safety for their teams.
|
week 2 discussion 79
1.)In the assigned article, “Core Principles & Values of Effective Team-Based Health Care,” the authors state that “the incorporation of multiple perspectives in health care offers the benefit of diverse knowledge and experience; however, in practice, shared responsibility without high-quality teamwork can be fraught with peril.” Describe the perils that the authors say lead to uncoordinated care and unnecessary waste and cost. How do communication and interdisciplinary collaboration prevent adverse events?
2.)Consider your current work environment and your role as a member of the health care team. What can you do to encourage collaboration and demonstrate stewardship?
|
Can Rabbits Eat Violets?
Can rabbits eat violets?
Rabbits can eat violets and will often be seen going into gardens where violets are planted for a quick nibble. It’s important to note, violets are just like any other plant and should only be consumed in moderation to prevent digestive trouble.
The average rabbit will often be seen eating violets, especially if they are in abundance during blooming season.
If you have a small garden full of violets, it’s never a bad idea to grab a few and give them to your pet rabbit. This is a great treat for them and they do enjoy the taste.
There are also additional nutritional benefits associated with eating violets.
These include:
• Potassium
• Phosphorus
• Nitrogen
Getting these nutrients through plants can be effective for rabbits and can also help with their digestive health. This is paramount when asking “Can rabbits eat violets?”
If the rabbit isn’t getting a well-rounded set of meals throughout the day, it will start losing weight and looking unhealthy. As a result, you should look towards different solutions including feeding violets to rabbits from time to time.
This guide will take a look at the question “Can rabbits eat violets?” while also pinpointing how to feed violets to rabbits safely at home.
Best Treats for Rabbits (EDITOR’S CHOICE)
Oxbow Simple Rewards Veggie Treats For Rabbits, Guinea Pigs,...
• Oxbow Simple Rewards Veggie Treats, 3 pack
• Great source of enrichment, convenient resealable bag
• Healthy reward treats for your favorite pet, no artificial colors or added sugar
Tips On How To Feed Violets To Rabbits at Home
1. Choose Fresh Violets
When asking “Can rabbits eat violets?” your first thought should go towards where the violets are going to come from. Even if rabbits can eat violets from time to time, this doesn’t mean you can grab aging flowers and hope for the best!
This is dangerous and can be one of the main reasons for a rabbit’s digestive system going out of order.
Your goal should be to either grow the violets in your garden and/or find a fresh source of violets. This is the only way to feed violets to a rabbit and not worry about the impact it’s going to have on the rabbit’s health.
Experts Say...
Fresh violets are essential as that is what a rabbit would munch on in the wild to maximize nutrients.
The moment you start feeding old violets to a rabbit is when things are going to go haywire.
You will start noticing the rabbit showcasing fatigue and not feeling well. This has to do with how violets age when they are removed from the roots.
Keep things simple and only remove the violets from the roots when it is time to feed the rabbit. This is why growing them in your garden is always recommended.
Can rabbits eat violets
2. Only Give a Few Violets Per Feeding
If you are wondering “Can rabbits eat violets?”, it may be time to understand how the feeding process is going to unfold.
For example, you should look to only give 1-2 violets to a rabbit at a time.
This is going to make it easier for the rabbit to make the most of the nutrients, while still having enough room to eat other nutritional foods.
Rabbits will often look to eat as much as possible, which makes it important for rabbit owners to reduce the feedings as much as possible to maintain a well-rounded diet plan.
Just giving a lot of violets to the rabbit isn’t the way to go and it is dangerous.
The only time this should be happening is if the rabbit has no other food source. This is common in the wild, but it’s not something you want to replicate with a rabbit at home.
Can rabbits eat violets
3. Break Up the Violets
When you have the violets in your hand and want to feed the rabbit, it’s okay to give them in one piece. There is nothing wrong with this, but it is not as optimal as you think it should be.
Instead, what you want to do is take the violets in your hands and start breaking them up a bit. This means tearing at them and just making it easier for the rabbit to digest.
This is especially important for younger rabbits that may end up dealing with digestive issues due to the larger violets.
Final Thoughts
“Can rabbits eat violets?”
Violets are more than okay for rabbits and can become a natural part of their diet in the wild. A lot of rabbits start to prefer eating violets because they have a unique taste and are full of nutrients.
However, you always have to make sure the rabbit’s diet is diversified and as well-rounded as possible. Otherwise, they are not going to get some of the other nutrients that are key for their health!
This is key when asking “Can rabbits eat violets?” because just giving violets to a rabbit isn’t enough. You have to mix things up as much as possible.
Here is more on helping rabbits age well – grooming a rabbit’s whiskers, trimming a rabbit’s nails, rabbits nesting in the same area, and rabbits jumping over each other for mating.
|
Communication Languages
There are some languages, that is, formally defined syntactic systems, that are not programming languages but communication languages - they are designed specifically to facilitate communication through standardization. In 2003 the most important of these are UML, XML, and SQL. You should have some familiarity with all of these so that you can communicate well and decide when to use them.
UML is a rich formal system for making drawings that describe designs. Its beauty lies in that it is both visual and formal, capable of conveying a great deal of information if both the author and the audience know UML. You need to know about it because designs are sometimes communicated in it. There are very helpful tools for making UML drawings that look very professional. In a lot of cases UML is too formal, and I find myself using a simpler boxes and arrows style for design drawings. But I'm fairly sure UML is at least as good for you as studying Latin.
XML is a standard for defining new standards. It is not a solution to data interchange problems, though you sometimes see it presented as if it was. Rather, it is a welcome automation of the most boring part of data interchange, namely, structuring the representation into a linear sequence and parsing back into a structure. It provides some nice type- and correctness-checking, though again only a fraction of what you are likely to need in practice.
SQL is a very powerful and rich data query and manipulation language that is not quite a programming language. It has many variations, typically quite product-dependent, which are less important than the standardized core. SQL is the lingua franca of relational databases. You may or may not work in any field that can benefit from an understanding of relational databases, but you should have a basic understanding of them and the syntax and meaning of SQL.
Next Heavy Tools
Last modified 1yr ago
Copy link
|
Question: Where do wildfires happen the most in Canada?
Nearly all the large forest fires in 2019 occurred in the boreal forest regions of Yukon, northern Alberta, and northwestern Ontario; regions that often see large fires.
Where are the wildfires in Canada?
The 2021 British Columbia wildfires burned across the Canadian province of British Columbia. The severity of the 2021 wildfire season is believed to have been caused by a “perfect storm” of environmental factors exacerbated by human-caused climate change.
Where is the most common place for wildfires?
Rank State Number of fires
1 California 10,431
2 Texas 6,713
3 Arizona 2,524
4 Montana 2,433
How many forest fires are in Canada?
Forest fires in Canada have burned an average of 2.3 million hectares annually since 2000.
Number of forest fires in Canada from 2000 to 2019.
Characteristic Number of fires
2019 3,921
2018 7,114
2017 5,652
2016 5,203
What causes wildfires in Canada?
IT IS IMPORTANT: Can international students become CPA in Canada?
Where do forest fires happen the most in the world?
The most noted areas on Earth for wildfire include the vegetated areas of Australia, Western Cape of South Africa and throughout the dry forests and grasslands of North America and Europe.
Which country has the most forest fires?
Throughout 2020, Brazil reported approximately 223 thousand wildfire outbreaks, by far the highest figure in South America. Argentina registered the second largest number of wildfires in the region that year, at over 74 thousand.
Which province has the most wildfires?
Number of forest fires in Canada in 2019, by province or territory
Characteristic Number of fires
Quebec 339
Ontario 535
British Columbia 807
Alberta 981
Are there wildfires in Minnesota?
The state’s largest wildfire remains 49% contained and continues to be about 40.8 square miles in size. Crews continue patrolling and monitoring the western side of the fire.
Are wildfires increasing in Canada?
Hot temperatures are to blame
Where did the wildfires start in Canada?
Fire officials have not yet determined the cause of the wildfire still blazing across Alberta, Canada. They have, however, determined that its starting point was a remote area 9.3 miles from Fort McMurray.
Has Canada ever had a wildfire?
As of July 14, there were some 226 uncontrolled actives fires burning in different provinces, according to data from the Canadian Interagency Forest Fire Centre (CIFFC). … A total of 3,925 wildfires has been recorded so far — which is above the 10-year average, according to CIFFC data.
IT IS IMPORTANT: How long after the medical exam for immigration to Canada?
|
History, Jews, Scriptures, Writings
20th of Tevet of the year 5244
Traditional portrait of Rambam, and authentic signature of the RambamRabbi Moses ben Maimon, Talmudist, Halachist, physician, philosopher and communal leader, known in the Jewish world by the acronym “Rambam” and to the world at large as “Maimonides”, passed away in Egypt on the 20th of Tevet in 1204 (4965).
On his gravestone were inscribed the words,
“From Moses to Moses, none arose as Moses.”
In his mid-20s, he began authoring numerous volumes on the Mishnah, which he completed around ten years later. His intent was to assist those who could not understand the Mishnah’s Hebrew and often cryptic text, and for that reason, the commentary was written in Arabic but with Hebrew lettering.
Maimonides’ magnum opus is his codification of Jewish law, which he called Mishneh Torah, or “second to the Torah.” The fourteen volume work is a logical systematic codification of Jewish law.
Brockhaus and Efron Jewish Encyclopedia e2 149-0.jpg
Isaac Alfasi
Maimonides codified the laws of Shabbat, holidays, prayer, dietary laws, and the laws that regulate the Jew’s daily life. He also wrote a section on eating healthy, fitness, and mental health—teaching future learners that all our actions should be permeated with holiness and Godliness. “The health and wellbeing of the body,” he writes, “is part of one’s service of G‑d.”
Maimonides also placed great emphasis on making his works available and understandable to all Jews, scholars and laymen alike. He also omitted sources, for brevity’s sake, though later scholars compiled sources for every statement in the Mishneh Torah. Because of his unique style and clarity, he became known as “The Golden Tongue.”
Geef een reactie
WordPress.com logo
Je reageert onder je WordPress.com account. Log uit / Bijwerken )
Google photo
Je reageert onder je Google account. Log uit / Bijwerken )
Je reageert onder je Twitter account. Log uit / Bijwerken )
Facebook foto
Je reageert onder je Facebook account. Log uit / Bijwerken )
Verbinden met %s
|
Reducing electricity consumption on the Isle of Eigg
The technology
Demand is also managed by warning the entire island when renewable energy generation is lower than demand, and diesel generators are operating to back it up – a so-called ‘red light day’, as opposed to ‘green light days’ when there is sufficient renewable energy. Residents then take steps to temporarily reduce electricity demand further still, or postpone demand until renewable energy generation has increased.
Environmental benefits
Social benefits
Economic and employment benefits
Questions 1-7
Answer the questions below. Choose NO MORE THAN TWO WORDS AND/OR A NUMBER from the passage for each answer.
1. Approximately how many people live on Eigg?
Questions 8-13
TRUE if the statement agrees with the information
FALSE if the statement contradicts the information
NOT GIVEN If there is no information on this
9. Eigg’s carbon emissions are now much lower than before.
Change in business organisations
A The forces that operate to bring about change in organisations can be thought of as winds which are many and varied – from small summer breezes that merely disturb a few papers, to mighty howling gales which cause devastation to structures and operations, causing consequent reorientation of purpose and rebuilding. Sometimes, however, the winds die down to give periods of relative calm, periods of relative organisational stability. Such a period was the agricultural age, which Goodman (1995) maintains prevailed in Europe and western societies as a whole until the early 1700s. During this period, wealth was created in the context of an agriculturally based society influenced mainly by local markets (both customer and labour) and factors outside people’s control, such as the weather. During this time, people could fairly well predict the cycle of activities required to maintain life, even if that life might be at little more than subsistence level.
B To maintain the meteorological metaphor, stronger winds of change blew to bring in the Industrial Revolution and the industrial age. Again, according to Goodman, this lasted for a long time, until around 1945. It was characterised by a series of inventions and innovations that reduced the number of people needed to work the land and, in turn, provided the means of production of hitherto rarely obtainable goods; for organisations, supplying these in ever increasing numbers became the aim. To a large extent, demand and supply were predictable, enabling . companies to structure their organisations along what Burns and Stalker (1966) described as mechanistic lines, that is as systems of strict hierarchical structures and firm means of control.
C This situation prevailed for some time, with demand still coming mainly from the domestic market and organisations striving to fill the ‘supply gap’. Thus the most disturbing environmental influence on organisations of this time was the demand for products, which outstripped supply. The saying attributed to Henry Ford that ‘You can have any colour of car so long as it is black’, gives a flavour of the supply-led state of the market. Apart from any technical difficulties of producing different colours of car, Ford did not have to worry about customers’ colour preferences: he could sell all that he made. Organisations of this period can be regarded as ‘task-oriented’, with effort being put into increasing production through more effective and efficient production processes.
D As time passed, this favourable period for organisations began to decline. In the neo-industrial age, people became more discriminating in the goods and services they wished to buy and, as technological advancements brought about increased productivity, supply overtook demand. Companies began, increasingly, to look abroad for additional markets.
E At the same time, organisations faced more intensive competition from abroad for their own products and services. In the West, this development was accompanied by a shift in focus from manufacturing to service, whether this merely added value to manufactured products, or whether it was service in-its own right. In the neo-industrial age of western countries, the emphasis moved towards adding value to goods and services – what Goodman calls the value-oriented time, as contrasted with the task- oriented and products/services-oriented times of the past.
F Today, in the post-industrial age, most people agree that organisational life is becoming ever more uncertain, as the pace of change quickens and the future becomes less predictable. Writing in 1999, Nadler and Tushman, two US academics, said: ‘Poised on the eve of the next century, we are witnessing a profound transformation in the very nature of our business organisations. Historic forces have converged to fundamentally reshape the scope, strategies, and structures of large enterprises.’ At a less general level of analysis, Graeme Leach, Chief Economist at the British Institute of Directors, claimed in the Guardian newspaper (2000) that: ‘By 2020, the nine-to-five rat race will be extinct and present levels of self-employment, commuting and technology use, as well as age and sex gaps, will have changed beyond recognition.’ According to the article, Leach anticipates that: ‘In 20 years time, 20-25 percent of the workforce will be temporary workers and many more will be flexible, … 25 percent of people will no longer work in a traditional office and … 50 percent will work from home in some form.’ Continuing to use the ‘winds of change’ metaphor, the expectation’s of damaging gale-force winds bringing the need for rebuilding that takes the opportunity to incorporate new ideas and ways of doing things.
G Whether all this will happen is arguable. Forecasting the future is always fraught with difficulties. For instance, Mannermann (1998) sees future studies as part art and part science and notes: ‘The future is full of surprises, uncertainty, trends and trend breaks, irrationality and rationality, and it is changing and escaping from our hands as time goes by. It is also the result of actions made by innumerable more or less powerful forces.’ What seems certain is that the organisational world is changing at a fast rate – even if the direction of change is not always predictable. Consequently, it is crucial that organisational managers and decision makers are aware of, and able to analyse the factors which trigger organisational change.
Questions 14-18
Reading Passage 2 has SEVEN paragraphs, A-G. Which paragraph contains the following information?
14. some specific predictions about businesses and working practices
15. reference to the way company employees were usually managed
16. a warning for business leaders
17. the description of an era notable for the relative absence of change
18. a reason why customer satisfaction was not a high priority
Questions 19-23
Look at the following characteristics (Questions 19-23) and the list of periods below. Match each characteristic with the correct period, A, B or C. NB You may use any letter more than once.
19. a surplus of goods.
20. an emphasis on production quantity.
21. the proximity of consumers to workplaces.
22. a focus on the quality of goods.
23. new products and new ways of working.
List of periods
A The agricultural age.
B The industrial age.
C The neo-industrial age.
Questions 24-26
Businesses in the 21st century
It is generally agreed that changes are taking place more quickly now, and that organisations are being transformed. One leading economist suggested that by 2020, up to a quarter of employees would be (24)………………….and half of all employees would be based in the (25)……………………….Although predictions can be wrong, the speed of change is not in doubt, and business leaders need to understand the (26)……………….that will be influential.
The creation of lasting memories
Such findings suggest that our experiences create parallel, and possibly independent stages of memory, each with a different life span. All of this evidence from clinical and experimental studies strongly indicates that the brain handles recent and remote memory in different ways; but why does it do that?
Questions 27-31
27. Experiments by Bernard Agranoff described in Reading Passage 3 involved
A injecting goldfish at different stages of the experiments.
B training goldfish to do different types of task.
C using different types of treatment on goldfish.
D comparing the performance of different goldfish on certain tasks.
28. Most findings from recent studies suggest that
A drug treatments do not normally affect short-term memories.
B long-term memories build upon short-term memories.
C short and long-term memories are formed by separate processes.
D ECT treatment affects both short-and long-term memories.
A Prompt memory formation underlies the performance of everyday tasks.
B Routine tasks can be carried out unconsciously.
C Physical accidents can impair the function of memory.
D Complex information such as regulations cannot be retained by the memory.
30. Observations about memory by Kami and Sagi
A cast doubt on existing hypotheses.
B related only to short-term memory.
C were based on tasks involving hearing.
D confirmed other experimental findings.
31. What did the experiment by Shadmehr and Holcomb show?
A Different areas of the brain were activated by different tasks.
B Activity in the brain gradually moved from one area to other areas.
C Subjects continued to get better at a task after training had finished.
D Treatment given to subjects improved their performance on a task.
Questions 32-36
YES if the statement agrees with the views of the writer
NO if the statement contradicts the views of the writer
Questions 37-40
Long-term memory
Various researchers have examined the way lasting memories are formed. Laboratory experiments usually involve teaching subjects to do something (37)………………and treating them with mild electric shocks or drugs. Other studies monitor behaviour after a learning experience, or use sophisticated equipment to observe brain activity.
The results are generally consistent: they show that lasting memories are the result of a (38)…………….and complex biological process.
The fact that humans share this trait with other species, including animals with (39)………………brains, suggests that it developed (40)……………….in our evolutionary history.
A early
B easy
C large
D late
E lengthy
F new
G recently
H small
I quick
Comments are closed.
|
Glossy Communism: Polite Propaganda from the Eastern Bloc
Not a New Bloc but Unity of Action in the Interest of Peace: Yugoslavia in the Third World
On a summer evening in Pula, on the coast of Croatia, on July 19, 1956, Marshal Josip Broz Tito, leader of Yugoslavia, was “conversing amiably in English” at the foot of an airplane gangway with President Gamal Nasser of the United Arab Republic and Prime Minister Jawaharlal Nehru of India.[1] The three leaders would reaffirm the Bandung Principles, established the previous year in 1955 in Indonesia, and in doing so Tito formally threw the lot of Yugoslavia with that of the third world and the Non-Alignment Movement.
Issues of Yugoslav Life, housed at the Perry-Castaneda Library at the University of Texas, provide a glimpse into the Yugoslav perspective on the Non-Aligned Movement and everyday cooperation between Yugoslavia and the third world as an integral part of the Yugoslav project. Yugoslav Life was a periodical published in Belgrade for English-language readers. The publisher of Yugoslav Life was the official publisher of Yugoslavia, Tanjug (Telegrafska agencija nove Jugoslavije, or the Telegraphic Agency of the New Yugoslavia). Tanjug would go on to be the leading news agency of the Non-Aligned Movement, leading the Non-Aligned News Agencies Pool (NANAP) and providing training for journalists in Africa and Asia. As such, Yugoslav Life presents a sunny depiction of Yugoslavia and its particular “Third Way:” workers’ self-management of the socialist economy, new advances in industrial efficiency and social equity, and a commitment to not engaging in the binary opposition of the Americans and the Soviets.
As a newly-created socialist state after World War II, Yugoslavia was formally an ally of the Soviet Union. However, in 1948 the Soviet Union expelled Yugoslavia from Cominform (the Communist Information Bureau) over ideological splinters between Stalin and Tito; due to this, Yugoslavia was not a member of the Eastern Bloc nor was it under the direction of the Soviet Union, unlike many other socialist states in Eastern Europe. As a result, Yugoslavia did not fit neatly into the division of the first and second worlds—it was not capitalist but socialist, and yet was not aligned with the Soviet Union. Conversely, the Cold War was a war of two systems: the capitalist American sphere of influence in “the first world” and the communist sphere of influence of the Soviet Union in “the second world.” In Belgrade, Yugoslavia, in September 1961, socialist Yugoslavia gathered with leaders of “the third world” to denounce Cold War policymaking and American and Soviet meddling in the decolonized global south. The Belgrade Conference was the first official summit of the Non-Aligned Movement.
Yugoslav Life illustrates the cooperation which would come between newly-decolonized states and Yugoslavia, the lone non-aligned state in Europe which stood at the intersection of the communist Eastern bloc, the Western first world, and Africa and the Middle East. An article from May 1963 lists the details of trading deals with African countries: "Finished products are dominant on the list of Yugoslav exports. Machines and vehicles, for example, account for 54 percent of all exports…From Africa Yugoslavia imports raw materials and some industrial products: cotton, phosphates, minerals, coffee cocoa, bananas, and more recently products of the textile and chemical industries."[2] Such trading partnerships were the legwork of Yugoslavia’s commitment to “creating conditions for equality between the advanced states and the underdeveloped countries.”[3] The strengthened ties between Yugoslavia and other non-aligned countries would take on a human dimension, as well. Yugoslavia sent workers to countries in Africa and Asia to build up industry in those countries through programs of technical assistance. Yugoslav Life claims that more than 1,600 Yugoslav workers were engaged in such programs in Africa and Asia in 1962 alone. Furthermore, it claims that in 1962 nearly 1,000 students from developing countries were studying in Yugoslavia under various cultural conventions and technical assistance programs.[4]
Close to every issue of Yugoslav Life published between 1961-1967 celebrates a visit of non-aligned countries to Yugoslavia or, conversely, a visit carried out by Marshal Tito or other high-ranking state representatives across the globe. Such visible placement of the seemingly tireless diplomatic schedule for foreign readers emphasizes the crucial role the Yugoslav state placed on its cooperation with other Non-Aligned member states. In an issue from June 1961, mere months before the Belgrade Conference would officially inaugurate the Non-Aligned Movement, Yugoslav Life claims that “The grouping of the uncommitted countries, which some people persist in calling the third bloc, is an important international factor.”[5]
Per their party platform, Yugoslavia was committed to the liberation and equality of decolonized states as they struggled to “catch up” with their former colonizers, but the Non-Aligned Movement also provided Yugoslavia with a platform upon which to criticize and differentiate themselves from the Soviet and American spheres of influence, from which it was excluded. Quotes from Marshal Tito and high-ranking politicians like Edvard Kardelj in the periodical often condemn Cold War actions from an outsider perspective: “a dangerous game of extremism and adventurism which threatens…new world conflicts.”[6] Furthermore, Yugoslavia supported its allies in the Middle East in the rising tensions before the Six Day War in June 1967, as Tito “did not for a moment hesitate to call a spade a spade,” putting the support of Yugoslavia and its government with Arab countries against Israeli aggression.
Since the collapse of Yugoslavia, the only current European member of the Non-Aligned Movement is Belarus. Bosnia and Herzegovina, Croatia, and Serbia maintain observer status instead of membership, whereas Slovenia and Macedonia have no formal role in the organization. However, there is still an urgent need for global commitment to the still extant disparity between more developed countries and countries in the global south. The legacy of Yugoslavia as not just a member but an active participant of the Non-Aligned Movement provides a template for global solidarity in an age of ever-increasing economic inequality.
[2] “TRADE WITH THIRTY AFRICAN COUNTRIES,” Yugoslav Life, vol. 8 iss. 10, Belgrade.
[3] “COOPERATION WITH AFRICAN COUNTRIES,” Yugoslav Life, vol. 12 iss. 4, Belgrade, April 1967.
[4] “YUGOSLAVS WORKING IN ASIA AND AFRICA,” Yugoslav Life, vol. 8 iss. 6, Belgrade, June 1963, pg. 5.
[5] “NOT A NEW BLOC-BUT UNITY OF ACTION IN THE INTEREST OF PEACE,” Yugoslav Life, vol. 6 iss. 5, Belgrade, June 1961, pg. 2
[6] “COLD WAR METHODS AND PRESSURE THREATEN TO CAUSE NEW WORLD CONFLICTS,” Yugoslav Life, vol. 9 iss. 9, Belgrade, September 1964, pg. 2.
This page has paths:
This page references:
|
The history of the Peace Community in San Jose de Apartado, Colombia illustrates the awareness for the need of food sovereignty that farmers have strengthened through the armed conflict. They progressively realized that independence from the armed actors also meant the independence of their food supply.
I began by accompanying the Peace Community in San Jose de Apartado (CdP) with FOR Presence for Peace on July 20th, 2015, the first day of a new unilateral ceasefire declared by the FARC, with the promise of a possible de-escalation of the armed conflict. That same day, we accompanied children from a school in CdP to visit an agro-ecological farm, a symbol of the fight for self-sufficiency that they have within CdP. Through the farmers, who told me the history of the creation of the CdP and its development, I learned how the armed conflict and self-sufficiency are entangled in one another as part of the struggle of this community from Urabá antioqueño.
The Displacement: “We’ve abandoned our crops and we are hungry”.
The inhabitants of the township San Jose de Apartado (SJA) have suffered through a long history of displacement due to both legal and illegal armed actors. In 1996, due to threats from paramilitary groups and clashes between the military and the guerillas, the have had to move towards the urban outskirts of SJA. “We abandoned our harvest day after day and now we are going hungry”, one civilian told me. They have not received any humanitarian help from the state at this time. A community pot is distributed once a day which helps them survive, but they feel the need to organize in order to live with dignity and autonomy again. That is how the CdP was born on March 23rd, 1997, based on active neutrality, rejecting direct and indirect participation in the war and reclaiming the right to continue working on their lands, despite the conflict.
The strategy since then has been to start preparing for the return of different routes to SJA that the farmers had to abandon because of the fighting. Preparation consisted of planting crops in these paths, a necessity for the survival of the people, and an essential part of a farmer’s work. Despite the support of different national organizations, this community’s work has confronted hard hits. For example, in October 1997, FARC guerrillas murdered three farmers, suspected of belonging to Convivir, a farmer’s organization created by the then-governor of Antioqua, Alvaro Uribe Velez, and designed to provide information to the military on the actions of illegal armed groups. Behavior that CdP has always rejected. Despite the trauma and fear, the process has continued since its first return in 1998.
The Return: “We had money but we did not have food”.
Thanks to the CdPs community work, in 1998, fifty families could return to La Union, one of the villages in the district of SJA. Following the return of others to their villages, they followed the same system of preparing crops. In 1999 the primitive project of cultivation was created by a group of women. At first, farmers did not have much experience in harvesting this product but after nine months they produced seven boxes that were transported to the city of Turbo with the help of the Diócesis de Apartadó. The project grew to include 60 groups of workers that produced 1000 boxes in a few months. But various boxes were soon lost or stolen and the discrete intrusion of the paramilitaries loomed over the business.
Before these complications, the CdP returned in 2000 to harvest what farmers from SJA have always worked on: cocoa. They decided to practice selling directly, to avoid the involvement of armed groups and fix prices themselves, with the idea of fairer trade in mind. It was an economic boom in the early days until the paramilitaries began intercepting shipments again, and stole 24 million pesos worth of goods, which put CdP on the brink of bankruptcy. In 2002, the same paramilitaries organized a food blockade for three months between Apartadó and SJA, killing those transporting food and thus preventing food from being delivered to SJA. One farmer remembers: “We had money thanks to the cocoa but there was no food”. A situation that made CdP rethink how they wanted to use their land.
Self-Sustaining Projects: “Should be done the farmer’s way”.
In the face of theft and paramilitary checkpoints, examples of the inaction of the Colombian state in this situation, members of the CdP decided to revise the management of cultivation and sought to no longer depend on a single product. “To some extent, the resistance to the armed conflict forced us to think about self-sustainability”, remembered a member of the CdP. In August, 2004, they organized, for the first time, in Arenas Altas (a village in the district of SJA) the Universidad Campesino, a place of learning and exchange on solidarity agriculture involving farmers from all over the country. It started as a discussion of self-sufficiency, food sovereignty and organic farming, sharing the experiences of other farming communities affected by the conflict. A year later, the CdP created their Agricultural Center to facilitate youth learning about harvests and facilitate experiments, especially in seed selection. The idea is to reach a point where the community does not have to depend on anyone from the outside for CdP to achieve self-sufficiency. Their focus is on land conservation and seeds so there is a diversification of crops. From the old ways of farming and the cocoa, progress was made toward the planting of rice, beans, corn, sugarcane, fruit, etc.
This idea of farm work also represents another fight for the CdP, at the same level as their fight for independence and neutrality during the armed conflict. A member of the CdP commented “This should be done the farmer’s way, cultivate land to sustain one’s family and community. It makes no sense to go hungry growing coca because you depend on the money from armed groups”. This course of action continues to develop the CdP little by little. Now there exist different farm projects that are achieving self-sufficiency, serving as examples to expand the idea to a bigger scale, like the whole village of CdP. This self-sustaining village project has merged in the last few years with the idea of a transition to organic farming, which the Agricultural Center has investigated through different experiments facilitated by the Universidad Campesina achieving notable success so far.
The history of the CdP illustrates the awareness for the need of food sovereignty that farmers have strengthened through the armed conflict. They progressively realized that independence from the armed actors also meant the independence of their food supply. Now, other processes are complicating matters: “We know that our food autonomy is in danger due to other issues, such as free trade agreements and provisions against saving seeds”, said one farmer. This fight now includes implications beyond the armed conflict and the advancing peace negotiations taking place in Havana.
|
Hannibal: Rome’s greatest enemy
Hannibal was born during the Sicilian War (or first Punic War). While Carthage withdraws from Rome, his father, Hamilcar Barca, is appointed head of the Carthaginian armed forces.
He managed to reverse the course of the war, but, after a naval defeat, the senators of Carthage decided, against all logic, to stop the hostilities.
pixabay photo
Undefeated in the field, Hamilcar considered the senators’ decision a betrayal and resigned as head of the army.
The defeat led to the Mercenary Revolt that threatened Bizerte, Utica and Carthage.
But with the withdrawal of Hamilcar at the head of a small army of citizens, often fighting 1 against 10, Carthage managed to change the situation in its favor.
The rioters are definitely eliminated in the “Parade of the Saw” (El Monchar?).
While Carthage was greatly weakened as a result of this terrible conflict, Rome took the opportunity to declare war on it.
Exhausted, the Punic metropolis had to accept all the conditions imposed by the Romans: the annexation of Sardinia and Corsica, in addition to the increased damage from the war.
Aware of the extreme danger in which Rome kept Carthage, Hamilcar abandons all political pretensions, even within his reach, and begins the execution of a plan aimed at returning to the Republic all the power and wealth lost.
The leader
He negotiated with the conservatives a military reform that gave the army the choice of its leader, and then, at the head of the army, he set out in 237 to conquer the rich Iberian Peninsula.
On his death in 228, Hamilcar left a powerful and rich Punic Iberian state. Thanks to him, Carthage compensated its lost territories and developed its commercial circuit.
In addition, Iberia provided him with significant agricultural and mining wealth.
Hamilcar’s successor and son-in-law, Hasdrubal Le Beau, continued the expansion of the Iberian-Punic state to the north and in 227 founded a new capital, Cartago La Nueva (today Cartagena).
In the year 226, Hasdrubal negotiates with Rome -which is concerned about the power recovered from its enemy- a treaty that limits the Carthaginian area of influence to the river Ebro (Ebro, which gave its name to the Iberians).
Hasdrubal was killed in 221. The army then chose Hannibal, son of Hamilcar, commander in chief of the Carthaginian forces. He was 26 years old.
As Livy Titus relates in a famous text, Hannibal knew how to obey and order and therefore was the favorite of officers and soldiers alike.
Cultivated, polyglot, frugal, tireless, he was worshipped by his men who were faithful to him throughout his term of office.
To consecrate the Iberian-Punic character of the State, he married a Spanish princess, Imilce, from Castulo, now Linares, thus achieving, in an Alexandrian gesture, the fusion of the two peoples.
Hannibal’s tactical genius became evident as soon as he took command.
The first example that has been communicated to us is that of his tactic used during the Battle of the Tagus, in which he optimized the use of the land to destructure the opponent and, from then on, launched all his attacking force.
Hannibal, still revered by the world’s greatest military, is the inventor of the most brilliant military tactics in history.
His army included special bodies such as the “Comandos” led by his brother Magon, or the Corps of Engineers, the Communications Corps and a famous Intelligence Corps, “had spies as far as the Senate of Rome” reported the Ancients.
Its staff included generals from all countries allied with Carthage, from Libya to Spain.
As for their soldiers, they came from all the countries of the western Mediterranean. They were not mercenaries but soldiers from countries allied with Carthage.
Adapted to today’s weapons, their tactics are still studied in the most prestigious military schools in the world. They are used in most major conflicts (here).
In 218, Rome, concerned about the recovered power of Carthage, used a false pretext and declared war on it.
While the Romans were preparing two expeditionary forces, one destined for Spain and the other for Carthage, Hannibal positioned his forces in all the territories under his authority, prepared the attack on Sicily from Carthage, launched a formidable war propaganda and prepared a great march from Cartagena in Spain to Italy.
Its objective is clearly defined: to break the Roman military force, to restore the freedom of the Italic peoples and to obtain the restitution of the Carthaginian territories of Sicily, Corsica and Sardinia.
At the head of an army of 110,000 men, he left Cartagena, crossed the Ebro, the Pyrenees, the Rhone and finally the Alps, which were thought to be impassable. For this feat, even before fighting, Hannibal became part of the legend.
The choice of the Alps is judicious: the surprise is total, the army has the possibility to rest and finally, the plain of the Po is populated by Gauls subdued by Rome. Come in Hannibal a liberator…
Hannibal takes Turin in October and, a month later, inflicts on Rome a first defeat in Ticino. A few days later, the battle of Trebbie (December 24th) gives him control of the Po Valley.
Hannibal then crossed the Apennines and inflicted a third great defeat on Rome at Lake Trasimeno (March 21, 217).
Hannibal was then 150 km from Rome and the submissive Italic peoples, who saw in him a liberator, began to rise against Rome.
Fabius Maximus and the time strategy
Rome is in a state of panic, the revolution is rumbling even within its walls. The most extreme solutions are being applied.
25 revolutionaries are executed, calls for denunciation are multiplied. Fabio Máximo is named dictator.
He demolished all the bridges that could have led Hannibal to Rome, reinforced the walls, raised 17 new legions (255,000 men) and radically changed Rome’s war strategy, which from then on could be summarized in three directives.
Absolute prohibition of confronting Hannibal. – To attack, in his absence, the cities that had promised him loyalty. – To prevent, at all costs, that he receives reinforcements.
This is the famous strategy of “temporization” that gave Fabius Maximus his nickname, “Cunctator”.
To avoid a Carthaginian landing, the Roman navy occupied all Italian ports; and to prevent his brothers, who had remained in Spain, from sending troops to him, the Ebro was enclosed.
Fabio’s strategy seriously challenged the objectives of Hannibal, who then simulated some military setbacks to manipulate the Senate of Rome and push it to abandon “temporalization” and adopt warlike measures.
Finally, he went to Cannae, in Puglia, where he seized the wheat reserves of the Roman army.
Humiliated, the Senate dismissed Fabius and his “cowardly” strategy and formed a new army of 8 legions (120,000 men) that launched all against Hannibal alone.
The Battle of Cannae
In Cannae (August 216), using the ingenious tactic of erasing the center”, Hannibal eliminated the Roman legions, thus proving Fabius Maximus Cunctator and his theory of refusing to fight…
In less than two years, between 25 and 30% of Italians fit to carry weapons had died.
That is more than enough to admit defeat. But Rome rejects the armistice. Hannibal’s officers wanted to incite him to take Rome, but he refrained from attacking a city whose soldiers had all fallen in Cannes, a city populated by women, children and the elderly: “I did not come to Italy to wage a war of extermination, I came for the dignity and sovereignty of Carthage,” he said, quoted by Titus Livius.
After Cannae
In 215, giving in to popular pressure, the Senate of Carthage decided to send reinforcements to Italy.
But the setbacks in Spain diverted these reinforcements, leading us to wonder about the intentions of a Carthage that was more interested in defending its possessions in Spain than in helping Hannibal achieve his victory already achieved in Italy.
Faced with the manifest ill will of Carthage, and having a small force that he cannot disperse without danger, Hannibal travels to Italy to try to defend the great cities that have promised him their loyalty.
In vain because Rome, as soon as she turns her back, takes the opportunity to attack her allies.
Thus fell the great Capua, the true economic capital of Italy and the prestigious Syracuse, defended by the fantastic inventions of Archimedes.
Its inhabitants are massacred to dissuade other cities from allying with Hannibal, who nevertheless manages to trap and crush several Roman armies in many other battles, but Rome will never again question his strategy of delay.
In the year 209, a ray of hope came from the Spanish front: the Carthaginian armies destroyed the Roman armies and killed their leaders, the Scipio brothers. The lock of the Ebro was opened!
Hannibal’s brothers will be able to send reinforcements. But Rome, aware of the danger, sends new forces across the Ebro led by Cornelius Scipio, son and nephew of the generals killed in Spain, to close the Ebro and prevent the reinforcements from leaving for Italy.
But twice, Scipio will fail in his mission.
In 207, Hasdrubal bypassed Scipio’s forces and led his troops into Italy.
But after he crosses the Alps and before he manages to join his brother, his army is destroyed, in the river Metaure, by two Roman armies.
Hannibal, then ordered his last brother, Magon, to join him. It is a decision that endangers the Punic presence in Spain. Carthage will not forgive him.
To avoid the Ebro lock, where Scipio is now mobilizing all his forces, Magon chooses to arrive in Italy by a maritime expedition. He gathers his army in Menorca, in the Balearic Islands.
Scipio is panicking. For him, a second failure would mean an early end to his career.
In an attempt to retain Magon, he moves to Siga (Numidia) to reactivate the alliance with Syphax against Carthage and divert Magon’s army to Africa. But Scipio fails to secure Syphax’s alliance.
However, in Siga, Scipio had an unexpected encounter with Hasdrubal Giscon, general of the 3rd Carthaginian Army of Spain on his way to Carthage.
According to several sources, Giscone and Scipio had long discussions marked by a strange, rather untimely intimacy between two enemy generals.
Was Scipio then informed of the execrable relationship between Hannibal and Carthage and did he devise a plan to exploit these dissensions to win the war?
We can speculate, especially since everything that will happen after the Siga meeting will confirm these hypotheses.
While Spain was emptied of its armies by the departure of Hasdrubal and then Magon, Scipio goes to Rome where he presents himself as the “conqueror of Iberia”.
The Roman people, humiliated for years, welcome him as a hero, but in the Senate, the reception is much more mixed and he is denied the victory for the conquest of Spain because Scipio failed in his main mission which is to prevent the reinforcements of Spain to Italy.
Scipio asks the Senate for an army with which he plans to confront Carthage in its territory.
The Senate, which is in favor of methodical warfare, rejects it because it considers that first it is necessary to defeat Hannibal, who occupies the South, and Magon, who occupies the North.
Scipio insists and makes the Senate believe that the end of the war is imminent, before the double offensive of Hannibal and Magon.
A compromise is then reached: Rome will not deprive itself of any of its soldiers or ships and will not finance Scipio’s expedition, but the Senate appoints him proconsul of Sicily.
There, he will manage to find money, build a fleet, gather an army and take it to Africa.
While Hannibal and Magon prepare to join their armies, Scipio hastily gathers an unprofessional army and lands in Tunis.
There he wins two small victories and strangely enough, Carthage decides to stop the war and signs an armistice. This is how the Second Punic War ends, with a fish tail.
Hannibal, on his return from Italy, stigmatized the betrayal of the Carthaginian senators: “[here I am] defeated, not by the Roman people, whom I have so often torn to pieces and made flee, but by the Carthaginian Senate, an instrument of slander and envy.
The shame of my return will give less joy and pride to Scipio than to this Hannon, who was not afraid to sacrifice Carthage for lack of another revenge in order to massacre our family. (quoted by Titus Livius)
Zama, a Polybius invention?
Of all the writings related to the “Hannibal War”, the only text that has reached us is that of the official historian of Rome, Polybius.
In the service of his master Scipio Emiliano, who destroyed Carthage half a century after the Second Punic War, Polybius rewrote the history of war, invented a new declaration of war and a defeat of Hannibal.
With the intention of counteracting, in the minds, the immense defeat of Cannes and thus try to erase a little the humiliation that Hannibal made suffer to Rome.
This rewriting had other objectives: to increase the prestige of Scipio’s family and justify the terrible genocide in Carthage.
But this polybial version of history is today highly questioned by inescapable archaeological and historical arguments.
Hannibal remained at the head of the army and then became president of the Republic, while Scipio was accused of corruption by a peace treaty.
Even more obvious: according to the peace treaty reported by Polybius, Carthage could no longer have a military navy, but archaeological research has shown that the famous military port of Carthage, with a capacity of 220 ships, was built after the war, proving that Carthage maintained all its military capacity and even developed it.
However, this fundamentally calls into question the end of the war reported by Polybius, who speaks of a crushing victory for Rome.
Almost 7 years after the war (196), Hannibal was elected President of the Republic. The presidential mandate in Carthage, although limited to one year, was enough to fight corruption, turn around the economy of Carthage and ensure its invulnerability.
Hannibal in the East
In 195, Hannibal left for the East, not as a fugitive, as Polybius wanted to count, but to ally with the most powerful enemy of Rome, the king Antiochus III, and to prepare with him a double offensive on Italy.
But King Seleucid will not listen to Hannibal’s advice and will eventually lose the war. Hannibal, during this conflict, will command a fleet with verve.
In 191, he went to Crete where he tried to gather an expeditionary force to attack Italy through Carthage, but the Punic leaders, committed to Rome during Hannibal’s absence, rejected the project.
Hannibal, constructor
In 189, Hannibal moved to Armenia, where he advised King Artaxias, whom he had met in the retinue of Antioch. He would be his town planner for the construction of his new capital Artaxata (today Artashat).
Finally, in 187, he joined the kingdom of Bythinia, led by Prusias, for which Hannibal fought at sea and won against the powerful Eumene II of Pergamon, an ally of Rome.
Hannibal will build for Prusias his new capital, Brousse, which will become much later the capital of the Ottomans.
Hannibal, writer
It is in this last asylum that Hannibal will end his days. He will write two books to warn the Greeks of the coming loss of their independence, a “Letter to the Athenians” and a “Letter to the Rhodians”.
Hannibal’s Death
But as long as Hannibal is alive, Rome does not feel safe. An ambassador, Flamininus, is sent to Prussian (some say it was Prussian’s son who betrayed him) to ask for Hannibal’s head.
One day in 183 B.C., Hannibal discovers that all the exits, even the most secret ones, from his palace are guarded by Romans.
So he makes the last gesture in his power and poisons himself, preferring freedom to life.
Roman disinformation
Hannibal’s story will be misinformed by a Rome unwilling to let this symbol of resistance and freedom flourish.
Thus, the Roman authors, obscuring their political message, transmitted only their tactical genius.
But in recent decades a new and much more powerful image of Hannibal has emerged from historical research.
The destruction of Carthage, prelude to the Roman Empire
If destiny finally consecrated the Roman victory, it was not because Rome heroically resisted the steamroller Barca.
But rather because the Carthaginian government had freed itself from a conflict of which it did not measure the extent, and because Hannibal was too committed to humanism to turn his struggle into a war of extermination.
Rome did not have the same scruples. Half a century later, it ended up sacking Carthage and then partly achieved the Carthaginians’ goal: the unity of the Mediterranean.
But this Pax Romana was achieved at the expense of freedom and diversity; Rome razed other civilizations to the ground by imposing a standardization whose effects were humanly, culturally and politically devastating.
Hannibal’s story teaches us that freedom is not negotiable. His struggle remains, because the world we live in today still depends on that imperialism that the Carthaginian fought all his life, but finally triumphed over him for lack of allies with the foresight to understand that it was the struggle of all.
In short, twenty-two centuries later, humanity is still at the same point.
Hannibal: Key dates
August 2, 216 B.C.: Hannibal’s victory over the Romans in Cannes
The Carthaginian general Hannibal, great strategist, obtains a crushing victory over the Romans of Varron and Paul Emile, in Cannes, Puglia (south of Italy).
It was one of the biggest defeats of the Romans: more than 50,000 of them died and almost 10,000 were taken prisoner.
This victory was added to the one he had won the previous year at Lake Trasimeno. These two events will lead several cities, such as Capua, Syracuse or Taranto, to break their alliance with Rome.
Despite this, the Second Punic War (218-201 B.C.) will end with the defeat of Hannibal in 202 B.C. Hannibal went into exile and then poisoned himself to escape the Romans in 183 BC.
October 19, 202 B.C.: End of the Second Punic War
After having crushed the Carthaginians in Spain, the Roman general Scipio landed in North Africa in 204 B.C., to crush the Carthaginians.
Meanwhile, Hannibal continued to advance in Italy, not finding the opportunity to crush Rome. In difficulty, Carthage finally called his general for help.
Hannibal immediately returned to his homeland to defend it, but he ran into the Numidian king, Massinissa, who was allied with Scipio.
In 202 B.C., Hannibal suffered a crushing defeat against enemy forces in Zama. Carthage was forced to cede Spain and the islands of the Mediterranean and pay a heavy compensation to Rome.
On his return, Scipio will take the nickname “Scipio the African”.
You may be interested:
Facebook Comments
|
Research Round #3 – How does color affect mental state?
Hey everyone!
This is my third round of research with my question “How does color affect mental state?” . For this round, I’m going to be researching about color theory and color therapy.
Color theory
Color theory is a concept that the colors a person is surrounded with can have an effect on the person’s health, either physical or mental. Color psychology is based on the idea that the colors that a person is exposed to can have an effect on that person’s emotions and even on their health. In color theory, literally any shade of any color, has an effect on how a person thinks, acts, and responds to various stimuli in their world. (1)
Color theory is in different industries to influence the way people behave and think in those environments. In healthcare, color theory is used to create environments that feel safe, healing, and inspiring. Color theory is used a lot in hospitals to encourage patient healing and motivation,facility efficiency and efficacy and healthcare staff motivation and efficiency. For example,hospitals are usually decorated in soothing, cool colors, such as pale blue and green. This is thought to foster a relaxing environment that enables rest which could encourage faster healing. (1)
Color therapy
Color therapy, also known as chromotherapy, is an alternative remedy that uses color and light to treat physical or mental health by balancing the body’s energy centers. This concept goes way back to ancient Egyptians who used sun-activated solarium rooms made with colored glass for therapeutic purposes. Today, both conventional and holistic practitioners acknowledge the bright potential of art therapy, which would include color.(2)
Color therapy uses the energy relating to each of the seven spectrum colours of red, orange, yellow, green, blue, indigo and violet. Each of the spectrum colours is actually just light of varying wavelengths which basically means that each colour has its own particular energy. These energies resonate with the energy of each of the seven main chakras/energy centres of the body. If you imagine the chakras as wheels, where they are like the workings of a clock or an engine; each wheel needs to move smoothly for the clock/engine to work properly. Therefore, good health and wellbeing is being brought by a balance of all these energies. Balance of the energy in each of the body’s chakras is very important for health and wellbeing. Colour therapy can help to re-balance and/or stimulate these energies by applying the appropriate colour to the body and therefore re-balance our chakras.(3)
Color therapy controversy
While color therapy is still used in different applications, there is a lot of evidence from research that it doesn’t have the effects attributed to it. For example, according to the Center for Healthcare Design, the effects of color can be subjective based on cultural history and understanding. This can influence the effect that a certain color has on a certain individual, which goes against the idea that specific colors have a specific psychological response. Color may affect individuals in the cultural context, which makes the whole idea of color therapy valid while still requiring it to be based on a person’s cultural background. More research is needed for the validity of color therapy. However that being said, if a person feels better or more validated by color therapy, then they shouldn’t stop.(2)
If you have any comments, ideas or questions for me, feel free to let me know! Thanks for reading!!
4 Replies to “Research Round #3 – How does color affect mental state?”
1. Hey, Rhea
I like this topic, especially as an artist, because colour helps set the mood and tone of a piece of work. I’m putting a comment because I was curious if you knew of something called “synesthesia”. If you’re unaware as to what it is, it’s when people link words or scenarios to certain colours, smells, or other senses. I think this could possibly link to your research.
A basic example of synesthesia would be: Linking Monday to the colour blue whenever you think about it.
If you’re interested, here’s some links:
2. Hi Rhea,
Once again, fantastic research round. You never fail to impress me with your hard work! I really enjoyed reading how the color theory is applied on our everyday lives, especially the section on how green and blue colours are commonly found in hospitals. It’s intriguing the profound impacts colour can have on people’s mental state and emotions. Nonetheless, great on ending your post with the controversy section. Colour can affect everyone in a different way.
If you continue with this cycle, perhaps you could research whether wearing different colours can affect what other people think of you. I read on a site that people wearing red are believed to “appear” more attractive. Is this true? Does colour impact attractiveness?
Some links:
Congrats on finishing your cycle with a great post,
3. Good morning Rhea, very cool topic! When I think about times where certain colors have affected my mood or state. I have also heard in the past things about how colors affect your sleep and how darker oranges and red are connected with falling asleep and blues and yellow lighter colors are connected with waking up. After hearing this I always try to avoid staying in blue or brighter lights before bed I think this might also have an affect on the relaxation of a person or even how their days might be affected depending on the lighting (color) they surround themselves with. How could someone fix this? I also had questions about how this color theory, may affect people who are color blind? Hope you are doing well and staying safe! Have a great day!
-Sienna Saunders
4. Hey Rhea,
Interesting research round on colour theory and colour therapy. Personally, I am unfamiliar with the topic, but through your explanation, it was very clear and easy to follow and understand. Although it isn’t very common, the usage of colours to help balance individuals emotions is quite cool. It provides a safe alternative for medication and teaches patients to change their energy. Subconsciously, I never associated colours with those specific emotions above but it’s neat to see different perspectives. Perhaps, if a child is overly hyper and excited, their room colour could be blue to promote calmness, peace and honesty. Even though you have completed the cycle, if you continue with this amazing question, it could be fascinating to learn about the effects of color on children specifically because they often are surrounded and understand colour. Anyways, another great research round, and here are some sources on colour and children!
Leave a Reply
|
SHIFT's eLearning Blog
To visit the Spanish blog, click here
6 Ways to Win Your Learners' Hearts and Minds
You remember how words make you feel, not the words themselves. Maybe that doesn’t sound right to you but think of the first time you met your significant other. Do you remember what you said? What your significant other said? Probably not, but you do likely remember, in detail, how it made you feel. Now, consider what you could do if you could harness the power of that emotion and apply it to helping your eLearning audience remember and connect with facts. Facts may be more consistently accurate, but emotions are what our brains filter our experiences through and what we can recall most readily. Taking your audience’s emotions into consideration is especially helpful when dealing with subject matter that is dry but important. For example, with corporate training, you might need to write up a section on which documents need to be filed for a new employee. Things don’t get much drier than talking about filing papers, but think of the massive headache new employees might have if their tax information isn’t filed and their paycheck is held up because of it. Telling your learners about the human side of what they’re learning and how it affects real people can make the difference between someone remembering long enough to apply the knowledge and someone just remembering for the length of the course.
Related Posts
|
How John Adams Managed a Peaceful Transition of Presidential Power
John Adams and Thomas Jefferson standing in front of the White House
The election of 1800 didn't invent the idea of a peaceful transition of power from one set of ideals to another, but it did engrave the United States into history as a democracy. Illustration by Meilan Solly / Photos via public domain and Library of Congress
President John Adams chased the dawn right out of Washington, D.C., departing the half-built city shortly after four o’clock in the morning on Inauguration Day, March 4, 1801. He knew it was time to go. In a battering election that pitted the incumbent Adams against his friend-turned-rival Thomas Jefferson, the New England Federalist suffered a humiliating and life-changing defeat. His popular predecessor, George Washington, swung into a second term easily. But the rules of the game had changed: Adams faced violent factionalism from within his administration, a seething press, rampant electioneering and the eruption of party politics.
To many, Adams’s track record in office was controversial at best, thanks to the passage of the Alien and Sedition Acts that heavily restricted freedom of speech and the press, as well as an unpopular approach to protecting a badly strained peace with the new republic in France. While Adams spent the summer of 1800 at his farm in Quincy, Massachusetts, largely ignoring the pending fall election, ardent politician Alexander Hamilton and a newly minted corps of campaigners trawled for votes. Fanning out across cities and towns, they set political fires in the local press that blazed across the very states Adams needed to win, and wouldn’t. He watched from afar, loathing the campaign tactics taking root. “If my administration cannot be defended by the intrinsic merit of my measures & by my own authority, may it be damned,” he wrote to his son Thomas Boylston Adams in late August. The elder Adams held strong opinions on elections, informed by his close study of classical republics and Renaissance state formation. He hoped to be known as the 18th-century ideal of a disinterested public servant, so the subsequent hard loss at the polls meant one thing: Transfer power peacefully to a new president, thereby safeguarding the office and the nation it served.
To many eyes, the process of choosing a president looked very different as of 1800. For the first time, both political parties, Adams’ Federalist Party and Jefferson’s Democratic-Republicans, used caucuses to nominate their candidates. Adams and Charles Cotesworth Pinckney, a South Carolina politician, squared off against Jefferson and Aaron Burr, a former New York senator. Throughout the fall, the two sides tangled with each other in the press. At the time, mostly white, male landowners over the age of 21 could vote, and the popular vote paled in importance next to the actions of presidential electors.
The role of electors was much more than performative. Presidential electors ostensibly pledge to represent the states' interests (i.e. the popular vote), but the way that electors themselves were chosen in 1800 varied, and in some states, the legislatures picked electors who planned to pursue an openly partisan outcome. Jefferson and the Democratic-Republicans seized that ambiguity to great advantage, stacking the electors in their favor and cultivating their local agendas.
For many, the choice felt like a true fork in the road, since the candidates diverged widely on domestic and foreign policy. Federalist favoritism for British trade attracted some, while the Democratic-Republicans’ sympathy for France also held promise. The Federalists’ tax system, enforcement of the Alien and Sedition Acts, and a split in party leadership were key, too. The election went on and on and on. Voting began in April and ended in December. The results among the electors were tight: 64 votes to Pinckney, 65 to Adams, and 73 apiece for Jefferson and Burr. Federalists swept their usual strongholds in New England, but then New York swung to the Democratic-Republicans, as did Pickney’s home state. “Your anxiety for the issue of the election is by this time allayed. How mighty a power is the spirit of party! How decisive and unanimous it is!” Adams wrote to his friend Elbridge Gerry in late 1800. Members of the House of Representatives readied to settle the dead heat between Jefferson and Burr in a contingent election.
Reactions to the election result ran hotter beyond the Adams-Jefferson bubble of the Capitol grounds. A general mood of crisis and fear of disunion plagued the press, as the House of Representatives took six days and 36 ballots before breaking Jefferson’s deadlock with Aaron Burr. Finally, James Bayard of Delaware and several Federalists from South Carolina, Vermont, and Maryland, cast blank ballots. This move ensured that Jefferson would secure the minimum number of states needed to win the presidency. With the democratic machinery intact, lawmakers turned to electoral reform.
The election of 1800 did not invent the idea of a peaceful transition of power from one set of ideals to another, but it did engrave the United States into history as a democracy. Both men vying for the presidency would have known Plato’s caution: Democracies thrived on the verge of oligarchy, and executive power—embodied by either president or king—risked turning into tyranny the longer its tenure. When did John Adams know his presidency was over, and what did he do about it? In the most technical sense, he lived (awkwardly) with the impending loss of power from December 1800, when key electoral votes failed to tip his way. He was not eager to stick around and watch the next inauguration.
Nor was his family. Wife Abigail Adams, the president’s most trusted adviser, had served as his one-woman cabinet for decades. Her view of the Adams administration as it faded into history offers scholars a new look at the power politics of the time. She hosted presidents, political adversaries, and foreign dignitaries over the years. She corresponded with Jefferson throughout the 1780s, finding common points of agreement on matters political, cultural and intellectual. Party rivalry now pulled them apart. Abigail Adams sat down to her last supper with Thomas Jefferson in January 1801, on a night when neither of them knew whether he would serve next as president or vice president. They shared “a curious conversation.” Jefferson despaired of a partisan Congress, adding that he found “more candor and liberality upon one side [the Democratic-Republicans] than there is upon the other.” Abigail pushed back, observing that, “Some are mere Brutes, others are Gentlemen—but party Spirit, is a blind spirit.”
When Jefferson later fished for a comment on her husband’s political loss, Abigail demurred. They shared a low laugh. In private, Abigail gave her gloomy view of Jefferson’s incoming administration with customary frankness: “His prospect is not a summer sea.” Like John, she began packing for home.
Historians can read plenty of pointed lessons in the presidential election of 1800. It is the revolution after the Revolution. It marks the birth of a party system and the visible decay of Federalist power. It shows a critical exercise of constitutional force by each branch of government, conducted under scrutiny that forever changed the fragile democracy with its drama, electioneering, and political partisanship. Americans would never elect their president the same way again. It is a surprisingly uncivil brawl between two aging revolutionaries, their long friendship soured by party politics.
But to citizens like Margaret Bayard Smith, the 18th-century author and political commentator, the day of Jefferson’s inauguration underscored the durability of American democracy. Raised in a Federalist household and married to a Democratic-Republican newspaper editor, Smith savored the shift. “I have this morning witnessed one of the most interesting scenes, a free people can ever witness,” she wrote to her sister-in-law. “The changes of administration, which in every government and in every age have most generally been epochs of confusion, villainy and bloodshed, in this our happy country take place without any species of distraction, or disorder.” For Adams and Jefferson alike, the driving need to sustain the fledgling democracy and preserve the union overrode party demands.
The chief significance of the election of 1800, as Bayard Smith rightly identified it, was the peaceful transfer of power between two parties. As Adams battled through personal and professional defeats in 1800 and 1801, using “midnight appointments” to sculpt a Federalist judiciary as his legacy, the President reflected that the election of 1800 was about far more than two men trading power, or knowing when to let go. Rather, an election was the country’s best mirror. “In short one half the Nation has analyzed itself, within 18 months, past and the other will analyze itself in 18 months more,” he wrote to Abigail on November 15, 1800, as the election cycle wore on. “By that time the Nation if it has any Eyes, will see itself in a Glass. I hope it will not have reason to be too much disgusted with its own Countenance.”
In his last look around the presidential office, Adams weighed Jefferson’s challenges with unique appreciation. Then, quietly, he returned power to where it rightfully rests—with the people.
This is adapted from an essay written for Perspectives, the newsmagazine of the American Historical Association.
Editor's note, December 8, 2020: This story has been edited to clarify that some states allowed women, free blacks, and other Americans who did not fit the criteria of being male landowners.
|
A silvery-white metal, zirconium (symbol Zr), has a specific gravity of 6.5 and a melting point of about 1850°C. It is more abundant than nickel, but is difficult to reduce to metallic form as it combines easily with oxygen, nitrogen, carbon, and silicon. The metal is obtained from zircon sand by reacting with carbon and then converting to the tetrachloride, which is reduced to a sponge metal for the further production of shapes. The ordinary sponge zirconium contains about 2.5% hafnium, which is closely related and difficult to separate. The commercial metal usually contains hafnium, but reactor-grade zirconium, for use in atomic work, is hafnium-free.
Commercially pure zirconium is not a high-strength metal, with a tensile strength of about 220 MPa, elongation 40%, and Brinell hardness 30, or about the same physical properties as pure iron. But it is valued for atomic-construction purposes because of its low neutron-capture cross section, thermal stability, and corrosion resistance. It is employed mostly in the form of alloys but may be had in 99.99% pure single-crystal rods, sheets, foil, and wire for superconductors, surgical implants, and vacuum-tube parts. The neutron cross section of zirconium is 0.18 barn, compared with 2.4 for iron and 4.5 for nickel. The cold-worked metal, with 50% reduction, has a tensile strength of about 545 MPa, with elongation of 18% and hardness of Brinell 95. The unalloyed metal is difficult to roll, and is usually worked at temperatures to 482°C. Although nontoxic, the metal is pyrophoric because of its heat-generating reaction with oxygen, necessitating special precautions in handling powder and fine chips resulting from machining operations.
The metal has a close-packed hexagonal crystal structure, which changes at 862°C to a body-centered cubic structure that is stable to the melting point. At 300 to 400°C the metal absorbs hydrogen rapidly, and above 200°C it picks up oxygen. At about 400°C it picks up nitrogen, and at 800°C the absorption is rapid, increasing the volume and embrittling the metal.
The metal is not attacked by nitric (except red fuming nitric), sulfuric, or hydrochloric acids, but is dissolved by hydrofluoric acid. Zirconium powder is very reactive, and for making sintered metals it is usually marketed as zirconium hydride, ZrH2, containing about 2% hydrogen, which is driven off when the powder is heated to 300°C. For making sintered parts, alloyed powders are also used. Zirconium copper (containing 35% zirconium), zirconium nickel (with 35 to 50% zirconium), and zirconium cobalt (with 50% zirconium), are marketed as powders of 200 to 300 mesh.
Relatively few metals besides zirconium can be used in chemical processes requiring alternate contact with strong acids and alkalies. However, zirconium has no resistance to hydrofluoric acid and is rapidly attacked, even at very low concentrations.
Small amounts of zirconium are used in many steels. It is a powerful deoxidizer, removes the nitrogen, and combines with the sulfur, reducing hot-shortness and giving ductility. Zirconium steels with small amounts of residual zirconium have a fine grain, and are shock resistant and fatigue resistant. In amounts above 0.15% the zirconium forms zirconium sulfide and improves the cutting quality of the steel.
A noncrystalline metal that reportedly has twice the strength of steel and titanium, has been developed. The material, known as Vitrel-loy, is an alloy composed of 61% zirconium, 12% titanium, 12% copper, 11% nickel, and 3% beryllium. Its yield strength is 1900 MPa, compared with 800 MPa for titanium alloy, Ti-6% Al-4% V, and 850 MPa for cast stainless steel.
Fracture toughness is said to be 55 MPa-m1/2, the same as high-strength steel but half that of titanium. Its resistance to permanent deformation is said to be two to three times higher than that of conventional metals. The density of Vitrelloy is 6.1 g/cm3 between cast titanium at 4.5 g/cm3 and cast stainless steel at 7.8 g/cm3. The material is particularly recommended for aerospace applications because of its surface hardness of 50 HRC. Cast titanium and steel are both tested at 30 HRC.
The beneficial properties of the alloy are ascribed to its noncrystalline structure. Because there are no patterns or grains within the structure, weak areas caused by grain boundaries are eliminated.
An advanced machinable ceramic that may be used to produce thermal shock-resistant components for aerospace, automotive, electrical, heat treating, metallurgical, petrochemical, and plastics applications up to 1550°C has been introduced. The new material (AremcoloxTM 502-1550) is based on the zirconium phosphate system (Ba1+xZr4P6-2xSi2xO24) and is especially unique because of its low coefficient of thermal expansion (CTE) of 0.5 x 10-6 in./in.°F. This characteristic sets the material apart from standard ceramic materials such as alumina and zirconia which have CTEs of 4.0 x 10-6 and 2.5 x 10-6, respectively.
A low CTE ensures that as a component is thermally cycled the mechanical stress induced through expansion and contraction does not cause the part to crack. This feature enables engineers to adapt the material to high thermal shock applications, such as combustion and heater systems, that were not previously feasible.
Additional properties and applications of the machinable ceramic include their use as molds, optical stands, microwave housings, engine parts, and applications in which high mechanical strength, hardness, and low porosity are required. A low-density version of the material (502-1550 LD) is recommended for use as brazing fixtures, induction heating liners, rocket nozzles, and high-temperature gauges, tooling, and structures. The material is easily machined using carbide tooling and no postfiring is required.
Zirconium alloys generally have only small amounts of alloying elements to add strength and resist hydrogen pickup. Zircoloy 2, for reactor structural parts, has 1.5% tin, 0.12% iron, 0.10% chromium, 0.05% nickel, and the balance zirconium. Tensile strength is 468 MPa, elongation 37%, and hardness Rockwell B89; at 316°C it retains a strength of 206 MPa.
Zirconium alloys can be machined by conventional methods, but they have a tendency to gall and work-harden during machining. Consequently, tools with higher than normal clearance angles are needed to penetrate previously work-hardened surfaces. Results can be satisfactory, however, with cemented carbide or high-speed steel tools. Carbide tools usually provide better finishes and higher productivity.
Small amounts of zirconium in copper give age-hardening and increase the tensile strength. Copper alloys containing even small amounts of zirconium are called zirconium bronze. They pour more easily than bronzes with titanium, and they have good electric conductivity. Zirconium-copper master alloy for adding zirconium to brasses and bronzes is marketed in grades with 12.5 and 35% zirconium. A nickel-zirconium master alloy has 40 to 50% nickel, 25 to 30% zirconium, 10% aluminum, and up to 10% silicon and 5% iron. Zirco-nium-ferrosilicon, for alloying with steel, contains 9 to 12% zirconium, 40 to 47% silicon, 40 to 45% iron, and 0.20% max carbon, but other compositions are available for special uses. SMZ alloy, for making high-strength cast irons without leaving residual zirconium in the iron, has about 75% silicon, 7% manganese, 7% zirconium, and the balance iron. A typical zirconium copper for electrical use is Amzirc. It is oxygen-free copper with only 0.15% of zirconium added. At 400°C it has a conductivity of 37% IACS, tensile strength of 358 MPa, and elongation of 9%. The softening temperature is 580°C.
Zirconium alloys with high zirconium content have few uses except for atomic applications. Zircoloy tubing is used to contain the uranium oxide fuel pellets in reactors because the zirconium does not have grain growth and deterioration from radiation. Zirconia ceramics are valued for electrical and high-temperature parts and refractory coatings. Zirconium oxide powder, for flame-sprayed coatings, comes in either hexagonal or cubic crystal forms. Zirconium silicate, ZrSi2, comes as a tetragonal crystal powder. Its melting point is about 1649°C and hardness about 1000 Knoop.
Zirconium Beryllides
Intermetallic compounds, ZrBe13 and Zr2Be17, have good strengths at elevated temperatures. ZrBe13 is cubic, density 2.72 g/cm3, melting point 1925°C; Zr2Be17 is hexagonal, density 3.08 g/cm3, melting point 1983°C; parts can be formed by all ceramic-forming methods plus flame and plasma-arc spraying. Materials are subject to safety requirements for all beryllium compounds.
These intermetallics, because of their greater densities (BeO = 1.85 g/cm3), contain more beryllium atoms per unit volume than beryllia, a decided advantage for compact, beryllium-moderated nuclear reactors.
Zirconium Carbide
Zirconium carbide, ZrC2, is produced by heating zirconia with carbon at about 2000°C. The cubic crystalline powder has a hardness of Knoop 2090, and a melting point of 3540°C. The powder is used as an abrasive and for hot-pressing into heat-resistant and abrasion-resistant parts.
Zirconium Diboride
Zirconium diboride (ZrB2) has a density of 6.09 g/cm3 and a hexagonal (AlB2) crystal structure with a melting point of 3040°C.
Zirconium diboride is oxidation resistant at temperatures <1000°C and reacts slowly with nitric, hydrochloric, and hydrofluoric acids. It reacts with aqua regia and hot sulfuric acid, as well as with fused alkalies, carbonates, and bisulfates. Zirconium diboride has a typical room temperature electrical resistivity of 9.2 x 10-6 Q cm and is superconductive at temperatures less than 2 K. Consolidation of ZrB2 powder into parts is accomplished by hot pressing or pressureless sintering.
Similar to titanium diboride, ZrB2 is wet by molten metals but is not attacked by them, making it a useful material for molten metal crucibles, free-formed nozzles, electric discharge machining electrodes, Hall-Heroult cell cathodes, and thermowell tubes for steel refining. This last use is one of the largest uses of zirconium diboride. Other uses for ZrB2 include electrical devices, refractories, and applications where high oxidation resistance is required.
Zirconium oxychloride, ZrOCl2 8H2O, is a cream-colored powder soluble in water that is used as a catalyst, in the manufacture of color lakes, and in textile coatings. Zirconium-fused salt, used to refine aluminum and magnesium, is zirconium tetrachloride, a hygroscopic solid with 86% ZrCl4. Zirconium sulfate, Zr(SO4)2 4H2O, comes in fine, white, water-soluble crystals. It is used in high-temperature lubricants, as a protein precipitant, and for tanning to produce white leathers. Soluble zirconium is sodium zirconium sulfate, used for the precipitation of proteins, as a stabilizer for pigments, and as an opacifier in paper. Zirconium carbonate is used in ointments for poison ivy, as the zirconium combines with the hydroxy groups of the urushiol poison and neutralizes it. Zirconium hydride has been used as a neutron moderator, although the energy moderation may be chiefly from the hydrogen.
Next post:
Previous post:
|
Nutrition / Food
Are Artificial Sweeteners Good or Bad for Weight Loss?
Not all sweeteners are created equal.
When it comes to eating healthily, most people struggle with their sugar intake and often turn to zero- or low-calorie sweeteners to help cut down on sugar. Although this seems like a great option, swapping out sugar for an alternative can actually be worse for your health. Before you start using artificial sweeteners with reckless abandon, read on to learn a bit more about how they affect weight loss and health.
Are artificial sweeteners healthy?
The research around the safety of artificial sweeteners is up in the air. “There does not appear to be a concrete answer on whether or not artificial sweeteners are more harmful than sugar,” says Charlotte Martin, M.S., R.D.N., C.S.O.W.M. Many sweeteners have links to numerous health conditions such as stroke, dementia, type II diabetes, obesity, and cancer. “However, most of the research is observational and doesn’t prove that the sweeteners themselves are responsible,” Martin notes.
Because the research is so varied and consuming too much sugar is also harmful, it’s best to try to decrease your intake of both artificial sweeteners and added sugar.
Are they good for weight loss?
Again, there does not appear to be an official consensus as to whether consumption of artificial sweeteners leads to weight gain or weight loss—there is research to support both sides. On the one hand, some studies support that replacement of caloric sweeteners with lower- or no-calorie alternatives can lead to modest weight loss in the short term. However, other studies have found the opposite: Consuming artificial sweeteners can eventually lead to weight gain.
“Experts who believe that artificial sweeteners lead to weight gain feel this way because they think consumption of artificial sweeteners confuses the brain into craving more sugar-rich foods,“ Martin says. “Therefore, individuals who regularly consume artificial sweeteners consume more food to curb these cravings.” Some researchers also believe that artificial sweeteners interfere with the balance of bacteria in your gut. This could affect absorption of nutrients and potentially lead to weight gain.
Popular Artificial Sweeteners
Read on to learn about the risks and benefits of some of the most common zero- and low-calorie artificial sweeteners.
Saccharin is the sweetener you find in Sweet’N Low. “It is also found in processed foods and beverages including gum, soft drinks and diet sodas, fruit canned in light syrup, and other foods labeled ‘low-calorie’ or ‘light,’” Martin says. It was once thought that saccharin increased the risk of bladder cancer in rats. Fortunately, the effect was not the same for humans. However, additional research has found that saccharin can negatively affect gut bacteria and lead to weight gain.
Most people will know aspartame by the names NutraSweet or Equal. Find it in items such as diet soda, sugar-free ice cream, gum, candy, and more. Again, research isn’t conclusive, but this particular sweetener doesn’t seem to bode well for our well-being. People have reported that aspartame causes a number of adverse reactions. These include headaches, nausea, anxiety, slurred speech, insomnia, memory loss, and more.
Acesulfame Potassium
“Unlike other artificial sweeteners like aspartame, this sweetener is stable when heated, which is why it’s found in many baked goods,” Martin says. “It’s also found in tabletop sweeteners, diet beverages, frozen desserts, candies, condiments, gum, etc.”
Like most sweeteners, acesulfame potassium is not without controversy. Some research has found a link between acesulfame potassium and cancer, thyroid damage, and changes in brain function.
Like acesulfame potassium, neotame is heat-stable. So, you can find it in a number of baked goods. It is about 13,000 times sweeter than table sugar. Currently, there aren’t many studies showing negative effects of neotame. The sweetener comes from aspartame, though, so people tend to report the same adverse effects.
Find sucralose in many light dairy products, diet drinks, protein powders and meal replacements, condiments, candies, and chewing gum. This is Splenda. Although the FDA deems it safe, sucralose has links to a variety of harmful biological effects in the body. It can reduce good gut bacteria, release toxins during baking, and alter insulin responses and blood sugar levels.
Unlike the aforementioned sweeteners, erythritol, a sugar alcohol, naturally occurs in small amounts in some fruits and fermented foods. “It’s also added to sweeten many packaged foods such as baked goods, beverages, gum, jellies and jams, and chocolate,” Martin says. It is one of the safest low-calorie sweeteners, but if consumed in high amounts, it does have the potential to cause digestive issues.
“Because stevia extracts originate from a plant, it’s considered natural,” Martin says. “Stevia is found in numerous packaged foods and beverages, such as baked goods, diet beverages, chocolate, candy, protein powders and meal replacements, jams/jellies, condiments, etc.”
Some research shows stevia’s potential to treat endocrine diseases. These include obesity, diabetes, and hypertension. The jury is out about whether it helps weight loss.
There is some evidence connecting zero-calorie sweeteners to negative physical side effects. But it’s still pretty up in the air. As with any processed foods or ingredients, it’s a good idea to ingest artificial sweeteners in moderation.
Plus, it always a good idea to follow a regular workout routine to keep your body and immune system at it’s healthiest. Aaptiv has classes across several categories, so it’s easy to find something you like—and will stick to.
Food Nutrition
Please click the checkbox to subscribe.
|
‘Free, White, and 21’ Catchphrase in the Old Movies of our Time
Although the phrase became something of a Hollywood cliché in the 1930’s, it was around long before that and didn’t die out until the civil rights movement of the 1960’s.
According to a couple of sources the phrase appeared around 1828 as a description of who should be allowed to vote. Prior to 1790, one had to own land and/or meet other additional qualifications in order to vote (actual qualifications were set on a state-by-state basis), but those restrictions were gradually being dropped. With the election of Andrew Jackson as President of the United States in 1828, Jackson’s position that property ownership restrictions be abolished everywhere apparently gave rise to the phrase that all you should need to be in order to vote is “free, white, and 21”. (Being male was still required, but so obvious it did not need to be stated.) While some states had gotten there before 1828, it was not until 1850 that these other restrictions were finally eliminated across the entire country. This also appears to be the point of the quote from South Carolina Bar Association that FumbleFingers dug up: “free, white, and 21” used to (1850-1870) cover everyone who was allowed to vote, but with black men being allowed to vote, this was not the case anymore.
In this context, “free” referred not to not being a slave but primarily to not being in jail or prison for committing a crime. Even today, most people incarcerated for crimes cannot vote. Prior to the 15th amendment to the constitution in 1870, black men could not vote in most states whether they were free or not.
Of course “free, white, and 21” eventually came simply to mean unencumbered (by law or custom), and women would use it well before they would be allowed to vote to assert their right to make other choices in their lives, such as if and when and to whom to get married (or otherwise get sexually involved with). This was usually how it showed up in the Hollywood movies of the 1930’s. – Old Pro
Abandoning the phrase came almost too easily. In 1952, after moving from an independent label to Capitol records, country singer Rod Morris turned his earlier song “Free, White, and 21” into “Free, Wise, and 21.” The same substitution occurs early on in the 1953 noir, City that Never Sleeps. It was that simple. Just trade a few phonemes and the offense vanishes. The rest of the country wised up just as quickly. Newspaper usages of the saying almost completely dried up by the end of the ’60s. With Malcolm X now discussing it, the phrase was clearly too dangerous to hang onto. Suddenly, the hatred buried in the old expression was apparent not only to the African-American press but to the white papers as well; in 1963, the New York Times ran a cartoon of a wizened Klan member captioned “Free, white and going on 101.”
This paragraph in purple above is courtesy of Pictorial website, Article: The Rise and Fall of an All American Catchphrase: ‘Free, White, and 21’ by Andrew Helsel on 09/10/2015. To read the full article, please click the title or the link below. Link: http://pictorial.jezebel.com/the-rise-and-fall-of-an-all-american-catchphrase-free-1729621311
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
Churning of the Ocean: The Universal Template for Social Inequality
Over the last few weeks, across the globe we hear the desperate cries of #BlackLivesMatter. A more sensitive generation, across different races, cultures, varied socio-economic strata are acknowledging the fact that off all human races, the Africans and African origins continue to have the least social acceptance.
We need to use this moment of time in history to restructure the template of social inequality to social equality. What template you ask? Well, no matter what country, culture, religion, which generation, there is always the oppressor and the oppressed. This seems so universal; this social science has the same absoluteness as any of the pure sciences. And guess what, it is followed to the T. The Indian mythological story of ‘Churning of the Ocean’ is that template.
The mythological gods and demons are pretty much humans who constantly succumb to the cardinal sins due to their misuse and abuse of certain privileges they have. The trinity Gods are also humans with very great but limiting power, but because of their faculties they really are the game changers. The Gods are benevolent if you ‘only’ know how to appease them. And they all operate in a codependent eco system. Remove the religious lore attached to them, they represent any and every society there has ever been, including this day.
The lore stripped of its theological philosophy goes like this:
The gods wanted to unearth the pot of eternal nectar buried deep in the ocean. So, they seek the Gods to show them the way. The Gods gives them their blessing and tell them to Churn the Ocean. A mountain becomes the churn stick and a serpent becomes the churn rope. One of the God also takes the form of a turtle on whose shell the mountain rests, lest it sinks. Even with all these resources, the Gods and gods could not Churn the Ocean all by themselves. They needed the help of the demons who the gods disdain. They had to on-board them. There was also an additional catch. The serpent would spit venom during the churning process, so the gods had to also trick the demons to hold the side that had the serpent head.
The demons were lured into the deal by the gods, by being promised to get a fair share of the nectar. With the Gods also blessing the endeavor, and in whose benevolence the demons also live, saw that they had nothing to lose really. If things worked as per plan, they’d get a portion of the nectar. The naïve demons fell in the trap and held onto the serpent on the head side to Churn the Ocean.
The serpent started spitting venom. Caught unaware, the demons endured it, to work towards getting their part of the nectar and not really questioning the discomforts. Then came all kind of wonderous things that got divided by the gods and Gods largely. The demons perplexed by the wonders, did not even question on the distribution of these and still had their eye only on what was promised to them, a portion of the nectar. Also, what came from the process was a lethal poison that would destroy all existence. So, the gods quickly seeked a God to save them, yet again. So, the God obliged and drank the poison, and the churning continued. Finally came out the pot of nectar.
The Hindu Goddess of wealth Laxshmi, who goes onto become the consort of Vishnu, comes from this churning of the ocean. This depiction of the Goddess is a common representation in many Hindu households, like mine. One of the tools, normalising the class divide.
The demons were alerted on the fact that they were cheated. They raged in anger and were ready to put up a fight. But this time, the gods were strengthened by the nectar and could easily defeat the demons. The demons who before the Churning of the Ocean had nothing to lose and were powerful to defend themselves, had everything to lose if they did not retract from the fight. So, they gave in. Accepted whatever benevolence the God may choose to show, in this newly altered world.
Now replace the Gods with venture capitalists and philanthropists , gods with entrepreneurs, demons with slaves and laborers, pot of nectar with profits, the mountain with capital resources, the tortoise with risk appetite, venom spitting serpent with unfavorable working conditions, poison with losses, the wonders unearthed with benefits and secured living conditions, the alluring diplomat with a new philanthropy program, the demon disguised as god with blue collars progressing to become white collars, severing the head of the demon with George Floyd!
Do you still believe that we should trend #AllLivesMatter instead of #BlackLivesMatter?
Repeating myself, we need to use this moment of time in history to restructure the template of social inequality to social equality. Let off our rage and pent up anger in forms of peaceful protests. But after that, we need to engage in a constant conversation with the Billionaires, Philanthropists, Governments, Policy Makers, Civil Right Organizations, Trade Unions, etc. We need to keep the pressure on, on the people who control and make the system. The people who have the maverick intelligence, brave character and personality, with billion dollars in their accounts, running global enterprises, power in their signature to change this template once for all. Only if this template changes, where there are no Gods, gods and demons can we celebrate #AllLivesMatter.
Martin Luther King did just that. He altered the template significantly with his ‘Civil Rights Movement’, and as Hasan Minaj says ‘he CCed the whole world on it’. Other revolutionaries across the world also have significantly altered the template. But there still is an unforgiving amount of work to be done.
For the third time I am saying this: We need to use this moment of time in history to restructure the template of social inequality to social equality.
We need to do this, so that no one ever has to say, ‘I CAN’T BREATHE!’
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
Bach and Vivaldi: The Truth of the Matter
The whole doc is available only for registered users
• Pages: 12
• Word count: 2983
• Category: Music
Order Now
Johann Sebastian Bach is definitely one of the greatest composers of all time. He is to music as a composer, perhaps what Shakespeare is to literature as a poet and playwright. To complete the analogy, Antonio Vivaldi is to the life of Bach what Christopher Marlowe had been to Shakespeare. There are times when two great artists coexist, but one gets to sit on the throne of fame and popularity. Such was the case of Bach and Vivaldi. Even as this paper is being written, Bach’s popularity over Vivaldi is very evident because the there is red crooked line under each Vivaldi, signifying only that Vivaldi is not known to as many learned people that know and recognize Johann Sebastian Bach.
Bach was a fan of Vivaldi (Holland, 2007 p.5). Yet, Bach’s influence in music is much greater than that of Vivaldi. In the case o Shakespeare and Marlowe, it is commonly said that had Marlowe lived longer, he night have taken the seat of Shakespeare. Because he died early, Shakespeare, who somehow learned from him, has the biggest name in Literature. But Vivaldi did not die at an early age to have possibly left the world without a great number of compositions. What’s more, Vivaldi did have a great number of compositions that could have earned him a seat in classical baroque music at least. How is it possible for a source of influence become the lesser known of the two?
It is understandable and evident that Bach had earned his seat in the world of music because of his genius. He ranks among Mozart, Beethoven, and Brahms and some even rank him as the greatest. However, the dominance of his influence in music had some reasons. If he had been influenced by the music of Vivaldi, what had that influence have to do with his legacy to the future generations of music?
Born from a family of musicians, Bach’s father, Johann Ambrosius, was the director of the musicians of the Thurigia’s town of Eisenach and was a court trumpeter for the Duke of Eisenach Court. The Bach family has been known throughout Thuringia for being organists, town instrumentalists, and Cantors. Hence, the Bach family had a reputation for their musical talent. Hence, Johann Sebastian’s talent was not surprising at all. He was indeed expected to be a thriving musician, only, the legacy he left in music exceeded expectations (Johann Sebastian Bach, section 1)
The Bach Family was probably well to do, considering that they had a spacious house in Eisenach. Sebastian had the luxury to study in the same Latin Grammar School where Martin Luther had schooling once. In that school, he also learned bout the scriptures, thereby strengthening his Lutheran faith. Lutheran faith actually had a strong hold in Eisenach, for it was the place where Luther went into hiding when he translated the New Testament in German (Johann Sebastian Bach, section 1).
He had his early training in playing the harpsichord and the violin under his father. Meanwhile, Johann Christoph Bach (not to be confused with his brother whose name is also Johann Christoph), Bach’s well-known uncle, who was then at the Georgenkirche, Eisenach, trained him the ability of playing organ. Because he was very serious with his art, Sebastian soon became extraordinarily proficient with the instruments. His gift in music was not limited to his proficiency in playing musical instruments, for the Latin Grammar School discovered his wonderful soprano voice when joined the Geogenkirche choir (Ibid.).
His parents had died by the time he was ten, so his elder brother Johann Christoph took him and his other brother Johann Jakob to Ohrdruf. There, his brother continued his straining in harpsichord and organ (Sheranne, 2007 par. 1). He also had the opportunity to be exposed to the compositions of Pachelbel, Johan Caspar Kerll and Jakob Froberger, especially when his brother encouraged him to study composition and set Sebastian to immitating music by the above mentioned German organist composers. He continued to attend school at the Ohrdruf Gymnasium (grammar school), where he made excellent progress in Latin, Greek, and theology. Like in Eisenach, scholars were members of the choir and the cantor had high regard for Bach’s musical potentials and singing voice (Johann Sebastian Bach, sections 2 & 3).
His wonderful soprano voice earned him a position the “Mettenchor” of St. Martin’s School in Lüneburg at fifteen (Sherrane 2007 par. 2 and Johann Sebastian Bach). However, as he grew older, his soprano voice vanished. Nevertheless, he remained in the choir as an accompanist playing the violin or harpsichord. While he was there he met Georg Böhm, who introduced him to the great organ traditions of Hamburg.
As he traveled mainly on foot, he was exposed to French instrumental music when he had the chance to play at the Court of Celle. It was still part of Germany, but the taste of the people in arts including music was highly influenced by the French (Johann Sebastian Bach, section 3). He became a church violinist in Arnstadt at the age of 18 (1703). At the age of 20 (1705), he took a leave of absence and traveled on foot to see the great Dietrich Buxtehude play the organ in concert (Sherrane, 2007 par. 2).
Sometime between 1713 and 1717 Bach became interested in the new Italian music. He became a fan of Antonio Vivaldi, and because of his interest in the works of Vivaldi, he transcribed the works of the Italian composer and suited them to different majors and other instruments (Holland, 2000, p. 5; Johann Sebastian Bach, section 10; and Guttmann 2004, par. 6). Throughout his life, he held different positions in church music in different places in Germany. He composed orchestras, cantatas, concertos, and perfected the fugue and contributed to the development of polyphonic music. He died as a respected master of music, though he was buried in an unmarked tomb in St. John’s Cemetery (Johann Sebastian Bach, section 11).
Antonio Vivaldi’s life was also colorful, but he did not enjoy the recognition that Sebastian enjoyed in his life. Unlike Sebastian, Vivaldi was the son of a barber, although his father was formerly a violinist, so the latter was able to teach his son the art. In 1703, he was ordained as a priest. Some sources say that he had bronchial asthma, so he did not have the stamina to complete a mass, but some sources say that he had it as an excuse for him to be able to pursue his career in music. He must have attended the seminary, because it was the only way a poor boy like him could have attended school for free (Antomio Vivaldi, par. 1; Guttmann, 2004 par. 4)
A year after going out of the seminary, Vivaldi was employed at Ospedalle della Pieta as a violin teacher. There, he taught girls, daughters of noblemen to mistresses. The Ospedalle was, hence, well endowed with facilities and services by the fathers of the orphaned girls. The music taught there should then be among the finest in Venice. He kept on writing concertos and operas for Ospedalle for the rest of his life and got paid for it (Antonio Vivaldi, Guttman, 2004).
He traveled to different places like Versailles and Prague where he staged operas and concertos including The Four Seasons. In all his endeavors as a composer and musician, his biographers have no record of where he got his influences as a composer and whose styles he imitated or transcribed. By the 1730s he still composed concertos and operas in great numbers, but only to sell them. He said it was easier to earn that way. So when he died, he was buried, not as a master of music, but as a pauper (Antionio Vivaldi).
Both Bach and Vivaldi wrote concertos, operas, sonatas, and religious music. But Bach wrote cantatas and fugue, which were not mentioned in the biographies of Vivaldi. Both composers were prolific in their entire career. However, Vivaldi’s works have only been recently being found. For example, it was only in 1926, when 300 of his concertos were retrieved. In 2004, Gutmann (2004) had the count of his works as follows: 39 operas, 73 sonata and over 500 (and more a re being uncovered) concertos) plus religious compositions.
Records about their lives set the difference in their career as composers. Many of Vivaldi’s works have not been attributed to him because he sold them by piece, for he needed the money. While it is true that he had made a living out of being a composer and staging his compositions, one could imagine how many of his works from 1703 to 1740 have not been under his name, those are only the ones he wrote for Ohrdurf. He sold more compositions during the 1730s.
On the contrary, Bach had sole ownership of his compositions – even those he transcribed from the works of Vivaldi. There is no doubt that Bach had already been an established and skilled musician and composer by the time he came across the works of Vivaldi, but the works of Vivaldi had an impact on his later works. Because Bach was the bigger name in music, the style that was supposed to be attributed to Vivaldi was attributed to Bach. Furthermore, considering that Bach’s name was more associated with baroque music, he got more of the credits than Vivaldi.
Vivaldi’s compositions were widely imitated, because of the growing popularity of the style. However, since there was need for new compositions, when Vivaldi, died, because he had few compositions under his name, they were forgotten and many of his other compositions, though great, remained unknown, only to be discovered in the 20th century when the history of arts had already proclaimed the greatest masters of music.
Still, Vivaldi’s legacy is very evident in The Four Seasons. He was able to bridge the gap between different forms of musical compositions while combining different movements of notes to create the mood and draw the picture of the scenario he wanted to show. Indeed, he painted sceneries with his music the way ballerinas told stories with their dance and poets with their words.
It should not be mistaken, though that Bach is to be discarded as a great composer, for he was also a musical genius, leaving to the world the fugue and the perfected polyphonic music. Church officials, were at first critical about the polyphonic sound, but Bach was able to make polyphonic music reach popularity and wide acceptance during his lifetime. Now, we enjoy the fruits of his labor, not only with classical music, but also with modern gadgets, so we have cellular phones that have polyphonic tunes and music players that make us hear every detail of the composition like mp3, mp4, and mp5.
Much has been said about Vivaldi’s influence on the style of Bach’s concerto. Hoever, If we compare Vivaldi’s The Four Seasons (1725) and Bach’s Brandenburg we can find similarities in the movements within the parts of the concertos. The reason for the choice of pieces account for the following: 1) both are concertos, 2) The Four Seasons is the best known work of Vivaldi and Brandenburg is the benchmark of baroque music (Simone, 1999 par.1), and 3) both compositions came after Bach was exposed to Italian music.
The tones of certain parts the concertos in Bach’s Brandenburg may be mistakenly attributed to Vivaldi by someone who does not know them well and who has heard it for the first time after hearing The Four Seasons. However, towards the middle and the end of the concertos of Brandenburg, we see the variation in the composition of Bach towards creating a lighter feeling, unlike the Summer III in The Four Seasons and some of its other parts that tend to be heavy.
The Four Seasons moves from E major in Concerto 1 (Spring) starting with Allegro, then Lagro, then Allegro Pastorale. In Concerto No. 2 (Summer), the key switches to G minor beginning with Allegro non molto, then Adagio e piano moving towards Presto e forte, followed by Presto. The third concerto (Autumn) is in F major and starts with Allegro, then Adagio molto, then Allegro. Concerto No. 4 (Winter) switches to F minor starting with Allegro non molto, then Lagro, then finishing with Allegro. Hence in a Concerto, there are three to four movements.
In Brandenburg, the movements are uniform in every concerto: Concerto No.1: Allegro Moderato, Concerto No.2: Allegro Moderato, Concerto No. 3 Allegro Moderato, Concerto No. 4: Allegro, Concerto No. 5: Affectuoso, and Concerto No. 6: Allegro.
Both the compositions had staccato and legato parts that blend well. Vivaldi’s work was mainly for string instruments – violin, viola, cello, etc. Bach’s concerto was arranged for string instruments, brass wind, woodwind and keyboards.
The presence of similarities in their compositions and the adoption of the allegro movement in the composition of Bach may be evidence of Vivaldi’s influence on the prior, but it should not be taken as Bach’s undoing a s composer, for he only followed the Italian Concerto Grosso Style (Simone, 1999). Even Vivaldi must have only followed that style in which he became well versed.
If Vivaldi ever influenced Bach’s style, it was alreaduy in a time when Bach had his training form his father, uncle, brother and exposure to the styles of different German organists and French music. It was not solely Vivaldi that created Bach. He did not even create Bach. Bach could have existed without Vivaldi and could have developed the style he developed even without Vivaldi for it was not Vivaldi who pioneered the Italian Concerto Grosso Style. It just so happened that Vivaldi was probably the best of the best Italian musicians and composers then, so Bach learned form him more than from any other Italian.
Bach was more than just an imitator, though many of Vivaldi’s biographers and fanatics may put it that way. Vivaldi could have had more influence in music that he has had if he did not sell his works, but that does not assure that music scholars of the future generations would give his work more regards. He may have written concertos that are superior to some of the concertos of Bach, but the totality of the quality of the works of Bach may still prove to be more fascinating than Vivaldi’s.
Bach’s name echoed in the baroque era of music more because his music was mainly church music. Because of his popularity and greatness in composing church music, he was the composer benchmark of baroque music in the same way that Mozart is in classical music and Beethoven in classical and romantic. His being a benchmark composer of the era musrt have called the attention of more music scholars than Vivaldi. Hence, it is only with efforts of the few who took interest in the life and works of Vivaldi that we are beginning to unearth the secrets about his life and the true richness of his compositions.
Bach’s compositions like Jesu Joy of Man’s Desiring and Brandenburg can make a person feel euphoric and light, yet some of his compostions like the cellosuites can turn a different tide in a person’s feelings. Vivaldi’s compositions can do the same, for he too is a great composer.
Together, Bach and Vivaldi left a legacy that can be compared to no material treasure. Bach left a legacy of sonatas, concertos, cantatas, operas, fugue, and polyphonic music. He left a legacy of church music that can resound in chapels as renditions of angels for God. He has left a legacy of heavenly music that future generations of musicians, especially church musicians ought to emulate – music with value that transcends time and trends.
Vivaldi’s newly found works show a great range of styles and movements. He introduced the three part majestic concerto, the best example of which is The Four Seasons. Though he wrote a good number of operas, sonatas, and church music, he is notable for his polyphonic compositions in his concertos. Now that more and more of his works are being found, the concertos he wrote become the legacies he has left musical scholars, for his unknown styles are yet to be discovered.
As master composers of their time and ours, Bach and Vivaldi have left us with a generous legacy. The types of music they produced are living testaments that high quality music knows no boundaries in time and space. Wherever a person is, whatever era, if their compositions are wonderfully executed, they can create good lasting impressions. The inspiration this brings to future musicians to produce music of the same quality is yet another legacy that promises the future generations that there will always be “real music” in the coming decades, centuries to come.
Baroquemusic.org. “Antonio Vivaldi” Baroque Composers and Musicians. Retrieved 8 May
2008, from http://www.baroquemusic.org/bqxvivaldi.html.
Baroquemusic.org. “Johann Sebastian Bach” Baroque Composers and Musicians. Retrieved
8 May 2008, from http://www.baroquemusic.org/bqxjsbach.html.
Burkholder, J. (2006). A history of western music. New York: W.W.Norton.
Gutmann P. (2004). Antonio Vivaldi: The Four Seasons. Classical Notes. Retrieved 8 May
2008, from http://www.classicalnotes.net/classics/vivaldi.html.
IPL.org (2008). Johann Sebastian Bach The Baroque Age. Sherrane, Robert compiler.
School of Information, University of Michigan. Retrieved 8 May 2008, from
Holland B. (2000). Bach saw in Vivaldi a Chance to Fiddle. New York Times. Aug 21.
Simeone, L (1999) “Johann Sebastian Bach’s ‘Brandenburg’ Concertos” NPR Online.
Retrieved 9 May 2008, from
Related Topics
We can write a custom essay
According to Your Specific Requirements
Order an essay
Materials Daily
100,000+ Subjects
2000+ Topics
Free Plagiarism
All Materials
are Cataloged Well
Sorry, but only registered users have full access
How about getting this access
Your Answer Is Very Helpful For Us
Thank You A Lot!
Emma Taylor
Hi there!
Would you like to get such a paper?
How about getting a customized one?
Can't find What you were Looking for?
Get access to our huge, continuously updated knowledge base
The next update will be in:
14 : 59 : 59
|
Gratitude and Indigenous People
In Chinese by Gwilym James
Let’s learn how to express our gratitude and address indigenous people appropriately around the world in today’s mini-lesson.
Terms of Gratitude
The most common way to express thankfulness, of course, is with 谢谢. For example, 太谢谢你了!Thank you so much!
There are a couple of other words we use to express gratitude. Here, we use 感 which means “to feel; to sense”. Both characters are used to emphasize and show sincere gratitude and emotions. 感谢 gǎn xiè = to be thankful (verb), gratitude (noun).
To Be Thankful For: 对…感谢
Tā nàme zhàogù wǒ, wǒ duì tā zhēnde fēicháng gǎnxiè.
She’s taking care of me so well; I’m extremely grateful for her.
感恩 gǎn’ēn to be thankful.
This word is used for Thanksgiving: 感恩节 gǎn’ēn jié)
Tā de háizi hěn dǒngshì, dǒngdé gǎn’ēn.
Her child is sensible and knows how to appreciate things.
Terms for Indigenous People
Since we are writing this post in the spirit of Thanksgiving, let’s acknowledge indigenous people by learning how to address them appropriately.
原住民 yuán zhù mín = native people
Specifically, we can attach a country or a region in front of 原住民. For example 美国原住民 “Native Americans”
In North America, indigenous people are sometimes referred to as The First Nations, especially in Canada.
第一民族 dì yī mínzú = The First Nations
zú can be attached to native tribes and racial groups.
1) Navajo 族 in Southwest America.
2) 回族 The Hui people in China (most are Chinese Muslim)
Cultural Note:
In Mandarin, the term 印第安人 yìndì’ān rén “the Indians” is often used in discussions of North American Indigenous people. But due to the offensive and outdated nature of its English counterpart, we don’t encourage using this term at all. There are several other terms used to address indigenous people, but many of them have derogatory connotations and we think 原住民 is the most neutral term. Language has everything to do with narrative and we need to start using objective and neutral words to address indigenous people.
Being Grateful Makes you Happy
Research in the field of psychology has found that showing gratitude is strongly associated with more happiness. Don’t forget to express appreciation to your loved ones and the world!
Talk about this post on our forum!
|
TY - JOUR AU - Gilda G. Stanco PY - 1969/12/31 Y2 - 2022/01/28 TI - Intellectual operation and scholastic yield in children with anemia and iron deficiency. JF - Colombia Médica JA - cm VL - 38 IS - 1 Supl 1 SE - Reviews DO - 10.25100/cm.v38i1 Supl 1.484 UR - https://colombiamedica.univalle.edu.co/index.php/comedica/article/view/484 AB - The iron deficiency is the more frequent hematological dysfunction around the world and it affects approximately to 2000 million people, of which 77 millions live in Latin America and the Caribbean. The iron deficiency has a spectrum that goes from the reduction and exhaustion of the iron reservations, until the reduction of the red cells and of the hemoglobin concentration. In consequence, there are iron deficiencies without anemia. The children are one of the most vulnerable groups to this deficiency, due to the quick period of cerebral growth, especially during the first two years of life. Iron is one of the main substrates that support and allow the development and the metabolic activity of multiple processes at brain, among which is the myelination process. An insufficient iron readiness in a period of high incorporation of this in the cerebral fabric, coinciding with the myelinization period of the nervous fabric, can provide a physiologic base of explanation to the observed behavioral effects when there are deficiencies of the micronutrient. In the same way, the iron deficiency affects the regulation and the neurotransmitters conduction of serotonin, dopamine and GABA. Alteration of the receivers and dopamine transporters, imply in the infants the affective answers and the operation cognitive, and those of the receiving GABA, the coordination of movement patterns and memory. The importance consists that when it happens a deficit of cerebral iron in early stages, those damages persist in the adulthood, beyond the recovery of the anemia during the first months of life. These cerebral alterations are reflected long term in a delay of the mental and physical development of the children that they have had anemia, and its consequence of minor r school acting, with high levels of repetition of grades and desertion of the primary school in economically poor communities. However, the results of the diverse investigations carried out in this field, don’t throw conclusive results about a causal relationship, and it is probable that the effects on the behavior and the development in the anemic children are increased by the presence of unfavorable environmental factors for a normal development. It is unlikely that result differences in the mental development and motor observed in anemic children obey a factor of unique risk, but rather they are consequences of associated factors combination. Of here the necessity arises of uniting efforts, to improve the quality of the educational experience carrying out investments in health, education and environmental reparation that will allow a better well-being of the students and its families. ER -
|
BIOLOGY OF PSYCHIATRIC DISORDERS - PSYCHIATRIC DISORDERS - Harrison's Neurology in Clinical Medicine, 3rd Edition
Harrison's Neurology in Clinical Medicine, 3rd Edition
Robert O. Messing Image John H. Rubenstein Image Eric J. Nestler
Psychiatric disorders are central nervous system diseases characterized by disturbances in emotion, cognition, motivation, and socialization. As a result of their high prevalence, early onset, and persistence, they contribute substantially to the burden of illness worldwide. Most psychiatric disorders are heterogeneous syndromes that currently lack well-defined neuropathology and bona fide biological markers. Therefore, diagnoses continue to be made solely from clinical observations using criteria in the Diagnostic and Statistical Manual of Mental Disorders of the American Psychiatric Association (2000), 4th edition, text revision (DSM-IVTR). Recent advances in neuroimaging are beginning to provide evidence of brain pathology, which may one day be used for diagnosis and for following treatment. Family, twin, and adoption studies have shown that all common psychiatric syndromes are highly heritable, with genetic risk comprising 20–90% of disease vulnerability. The epidemiology, genetics, and biology of four common psychiatric disorders—autism, schizophrenia, mood disorders, and drug addiction—are presented in this chapter. A detailed discussion of the clinical manifestations and treatment of schizophrenia and mood disorders can be found in Chap. 54. Further discussion of alcoholism can be found in Chap. 56, opiate addiction in Chap. 57, and cocaine and other drugs of abuse in Chap. 58.
ASDs show no defining neuroanatomic phenotype that would indicate neurodevelopmental abnormalities. However, structural neuroimaging and histologic studies of postmortem brain provide evidence for anatomic defects. There is a modest increase in cerebrum growth (~10%; affecting both the white and grey matter) during early childhood (years 1–3), with the largest effect in the frontal lobes; the growth rate then decreases with age. Cerebellar size is increased by about 7% in children under age 5 years, but is decreased in older patients, and there are reduced (~30%) numbers of cerebellar Purkinje neurons. Finally, there is reduced cell size and increased cell density in the limbic areas of the brain.
ASDs are highly heritable; concordance rates in monozygotic twins (~60–90%) are roughly tenfold higher than in dizygotic twins and siblings, and first-degree relatives show about fiftyfold increased risk for autism compared with prevalence in the general population. For unknown reasons, ASDs affect four times as many boys as girls. ASDs are also genetically heterogeneous. More than 20 known mutations, including copy number variations, account for about 10–20% of all cases, though none of these causes individually accounts for more than 1–2% (Table 53-1). Many of the genes linked to ASDs can also cause other illnesses. For instance, mutations in MeCP2, FMR1, and TSC1&2 (see Table 53-1 for abbreviations) can cause mental retardation without ASDs, and alleles of certain genes, for example, neurexin 1, are associated with both ASDs and schizophrenia. It is likely that many cases of ASDs result from more complex genetic mechanisms, including inheritance of multiple genetic variants or epigenetic modifications.
TABLE 53-1
Despite the genetic heterogeneity of ASDs, there are some common themes that may explain pathogenesis. These include mutations in proteins involved in the formation and function of synapses, control over the size and projections of neurons, production and signaling of neurotransmitters and neuromodulators, the function of ion channels, general cell metabolism, gene expression, and protein synthesis (see Table 53-1). Many of these mutations have a clear relationship to activity-dependent neural responses and can affect the development of neural systems that underlie cognition and social behaviors. They may be detrimental by altering the balance of excitatory vs. inhibitory synaptic signaling in local and extended circuits, and by altering the mechanisms that control brain growth. Another class of mutations affects genes (e.g., PTEN and Tsc) that negatively regulate signaling from several types of extracellular stimuli, including those transduced by receptor tyrosine kinases. Their dysregulation can have pleiotropic effects, including altering brain and neuronal growth as well as synaptic development and function. With further understanding of pathogenesis and the definition of specific ASD subtypes, there is reason to believe that effective therapies will be identified, as in the case of dietary treatments for phenylketonuria. In addition, work in mouse models (e.g., with fragile X or Rett syndrome mutations) has suggested that autismlike behavioral abnormalities can be reversed even in fully developed adult animals by reversing the underlying pathology, which holds out hope for many affected individuals.
Schizophrenia appears to be a heterogeneous collection of many distinct diseases, which remain poorly defined but linked by common clinical features. Three major symptom clusters are seen in schizophrenia: positive, negative, and cognitive symptoms. Positive symptoms include hallucinations and delusions, experiences that are not characteristic of normal mental life. Negative symptoms represent deficits in normal functions such as blunted affect, impoverished speech, asocial behavior, and diminished motivation. Cognitive symptoms include deficits in working memory and cognitive control of behavior that often prove extremely disabling. Current antipsychotic drugs are efficacious for positive symptoms only and generally lack efficacy for negative and cognitive symptoms.
Schizophrenia is common, affecting males and females roughly equally, with a worldwide prevalence of approximately 1%. Environmental risks are thought to include prenatal exposure to viral infection (influenza), prenatal poor nutrition, perinatal hypoxia, psychotropic drug use (in particular, cannabis), and psychological stress. Advanced paternal age, birth order, and season of birth have also been implicated. However, none of these environmental influences has a specific or strong association with most cases of schizophrenia.
The best-established neuropathologic finding in schizophrenia is enlargement of the lateral ventricles of the cerebral hemispheres. This is accompanied by a reduction in cortical thickness. These abnormalities are not specific to schizophrenia and are seen in many other conditions, including many neurodegenerative disorders. However, there is a general consensus that the reduction in cortical thickness in schizophrenia is associated with increased cell packing density and reduced neuropil (defined as axons, dendrites, and glial cell processes) without an overt change in neuronal cell number. Specific classes of interneurons in prefrontal cortex consistently show reduced expression of the gene encoding the enzyme glutamic acid decarboxylase 1 (GAD1), which synthesizes γ-aminobutyric acid (GABA), the principal inhibitory neurotransmitter in the brain. Functional imaging studies, by positron emission tomography (PET) or functional magnetic resonance imaging (MRI), show evidence of reduced metabolic or neural activity in the dorsolateral pre-frontal cortex at rest and when performing psychological tests of executive function, including working memory. Alleles of two candidate risk genes (catechol-O-methyltransferase [COMT] and metabotropic glutamate receptor 3 [mGluR3]) are reported to affect dorsolateral prefrontal cortex activity, but these findings need to be replicated in larger samples. Similar pathologic and brain imaging abnormalities are seen in several other brain regions, in particular, the hippocampus. There are also numerous reports of abnormalities in myelin and oligodendrocytes in the cerebral cortex of patients with schizophrenia.
Twins studies establish the heritability of schizophrenia, with co-inheritance at ~50% for monozygotic twins and ~10% for dizygotic twins. Genomewide linkage and association studies, and studies of copy number variation, have identified many regions and alleles that confer increased disease risk, particularly near genes on chromosome 22 (disrupted in schizophrenia 1 [DISC1], COMT, neuregulin 1, the neuregulin receptor ERBB4, and the DiGeorge [or velocardiofacial syndrome] region), and on chromosome 16p. The DiGeorge region deletions produce, in heterozygous form, a psychotic disorder with variable clinical features and a moderate to strong degree of penetrance. In contrast, the contribution of each of the individual genes to schizophrenia remains to be established with certainty. Moreover, the responsible genes within the DiGeorge region have not yet been identified. What is clear is that none of these other alleles produce schizophrenia with a high degree of penetrance. The current view in the field is that multiple rare alleles, many or most with limited penetrance, likely contribute to risk of schizophrenia. As for ASDs, the same allele may be a risk factor for multiple disorders. For instance, duplication of chromosome 16p is associated with both schizophrenia and autism, while DiGeorge region deletions and the DISC1 locus on chromosome 22 are associated with schizophrenia, autism, and bipolar disorder.
There are several prevailing hypotheses about neuro-chemical mechanisms underlying schizophrenia. A reduction in the function of cortical and perhaps hippocampal GABAergic interneurons fits with reduced expression of glutamic acid decarboxylase. However, it is unknown whether this is a primary or compensatory feature of the disorder. Nevertheless, defects in parvalbumin-expressing GABAergic interneurons are known to reduce gamma-frequency activity on the EEG, which is a feature of many people with schizophrenia. Reduced excitatory neurotransmitter (glutamate) function is posited based on psychotic and cognitive symptoms generated in humans exposed to ketamine or phencyclidine, which are non-competitive antagonists of the NMDA subtype of glutamate receptors. There are reports of altered levels of glutamate receptors or associated proteins in the brains of individuals with schizophrenia examined postmortem, but no findings have yet been widely replicated. Finally, overactivity of dopamine neurotransmission at D2-type dopamine receptors is proposed based on the ability of D2 antagonists (an action common to all current antipsychotic agents; see Chap. 54) to ameliorate the positive symptoms of schizophrenia. Excessive dopamine release in the striatum elicited by an acute dose of amphetamine has been demonstrated by PET imaging in some patients with schizophrenia. However, it is unclear whether this abnormality reflects the underlying illness or a lasting effect of antipsychotic medications. In contrast, reduced activity of dopamine at D1 dopamine receptors in the prefrontal cortex has been implicated in working memory deficits based on the cognitive effects of D1 receptor agonists and antagonists in the illness. Nevertheless, inferring something about disease pathogenesis from the actions of psychotropic drugs, for example, as with the glutamate and dopamine hypotheses, is fraught with artifact.
Efforts to understand how defects in these neurotransmitter systems might generate similar behavioral pheno-types have led to intriguing hypotheses. For instance, in the hippocampus, reduced glutamate transmission (based on a hypothesized deficit in glutamate release or glutamate receptors) onto GABAergic interneurons could lead to reduced glutamic acid decarboxylase expression, reduced gamma oscillations, and reduced inhibition onto excitatory neurons. These events in turn could lead to increased dopamine release from the ventral tegmental area, with dopamine antagonists thereby helping to reset the system to its nonpathologic state. It must be emphasized that these are working models only, and a true pathophysiology (or pathophysiologies) for schizophrenia remains to be established.
Overlaid on these neurotransmitter-based hypotheses is speculation as to how mutations in any of several genes implicated, however tentatively, in schizophrenia lead to the associated pathologic and behavioral abnormalities. DISC1 was originally discovered based on its association with schizophrenia in an Icelandic family. However, as stated earlier, DISC1 has since been variably associated with other neuropsychiatric conditions and its role in schizophrenia remains uncertain. The DISC1 protein has been implicated in several cellular functions, including neuronal growth and maturation, neurite outgrowth, and even the proliferation of new neurons during development. Neuregulin 1 (NRG1), a member of the EGF family of growth factors, and its receptor ERBB4 have also been implicated in schizophrenia in several genetic studies. Interestingly, NRG1 and ERBB4 play important roles in the maturation of GABAergic interneurons in cerebral cortex, and regulate dopamine transmission to several limbic brain regions. Moreover, loss of NRG1-ERBB4 in mice leads to reduced neuropil, thus phenocopying a pathologic finding in schizophrenia. Another gene of potential interest encodes Reelin, a secreted extracellular matrix serine protease. There are unconfirmed reports of association of schizophrenia with the Reelin locus on chromosome 7, and of reduced Reelin expression in the cerebral cortex of schizophrenic subjects, possibly related to increased methylation of the Reelin gene promoter. Reelin is important during development in the migration of newly born neurons to their appropriate layers of cerebral cortex. In the adult brain, the protein is enriched in cortical GABAergic interneurons and has been implicated in regulating NMDA glutamate receptor function. It is, therefore, easy to imagine how abnormalities in DISC1, NRG1, or Reelin may be related to GABAergic, glutamatergic, and dopaminergic mechanisms in schizophrenia, and to associated pathologic abnormalities, but all such connections are currently speculative.
Mood disorders are divided into depressive and bipolar disorders. Depressive disorders include the major depressive disorders, dysthymia, and more minor forms of depression. These disorders are heterogeneous syndromes, each composed of several diseases with presumably distinct pathophysiologies that remain to be elucidated.
Mood disorders are common, with a prevalence of ~1–2% for bipolar disorder, ~5% for major depression, and ~15–20% for milder forms of depression. Between 40–50% of the risk for depression appears to be genetic. Nongenetic factors as diverse as stress and emotional trauma, viral infections, and even stochastic (random) processes during brain development have been implicated in the etiology. Depressive syndromes can occur in the context of general medical conditions such as endocrine disturbances (hyper- or hypocortisolemia, hyper- or hypothyroidism), autoimmune diseases, Parkinson’s disease, traumatic brain injury, certain cancers, asthma, diabetes, and stroke. Depression and obesity/metabolic syndrome are important risk factors for each other. In predisposed individuals, stressful life events can lead to clear-cut depressive episodes, while severe stress can induce posttraumatic stress disorder (PTSD), instead of depression. Bipolar disorder is characterized by episodes of mania and depression and is one of the most heritable of psychiatric illnesses, with genetic risk of ~80%. Stress and disrupted circadian rhythms can promote the manic episodes, during which patients exhibit extremely elevated mood, abnormal thought patterns, and sometimes psychosis. Several of these clinical signs can resemble certain features of schizophrenia; indeed, recent epidemiologic and genetic research has questioned the DSM-IVTR designations of bipolar disorder, schizophrenia, and schizoaffective disorder as distinct syndromes.
Brain imaging studies in humans are defining the neural circuitry of mood within the brain’s limbic system (Fig. 53-1). Integral to this system are the nucleus accumbens (important for brain reward—see later in the chapter under Substance Use Disorders), amygdala, hippocampus, and regions of prefrontal cortex. Given that many symptoms of depression (so-called neurovegetative symptoms) involve physiologic functions, a key role for the hypothalamus is also presumed. Depressed individuals show a small reduction in hippocampal size. PET and functional MRI have revealed increased activation of the amygdala by negative stimuli and reduced activation of the nucleus accumbens by rewarding stimuli. There is also evidence for altered activity in prefrontal cortex, for example, hyperactivity of subgenual area 25 in anterior cingulate cortex. Deep brain stimulation (DBS) of either the nucleus accumbens or subgenual area 25 elevates mood in normal and depressed individuals. While there are numerous reports of pathologic findings within these various regions postmortem, there is to date no defined neuropathology of depression.
Neural circuitry of depression and addiction. The figure shows a simplified summary of a series of limbic circuits in brain that regulate mood and motivation and are implicated in depression and addiction. Shown in the figure are the hippocampus (HP) and amygdala (Amy), regions of pre-frontal cortex, nucleus accumbens (NAc), and hypothalamus (Hyp). Only a subset of the known interconnections among these brain regions is shown. Also shown is the innervation of several of these brain regions by monoaminergic neurons.
The ventral tegmental area (VTA) provides dopaminergic input to each of the limbic structures. Norepinephrine (from the locus coeruleus or LC) and serotonin (from the dorsal raphe [DR] and other raphe nuclei) innervate all of the regions shown. In addition, there are strong connections between the hypothalamus and the VTA-NAc pathway. Important peptidergic projections from the hypothalamus include those from the arcuate nucleus that release β-endorphin and melanocortin and from the lateral hypothalamus that release orexin.
Although depression and bipolar disorder are highly heritable, the specific genes that comprise this risk remain unknown. As noted earlier, some of the genes implicated in autism or schizophrenia seem to cause bipolar disorder in some families. Large genomewide association studies have identified genes for diacylglycerol kinase η (DGKH), ankyrin G (ANK3), an L-type voltage-gated calcium channel (CACNA1C), and a gene-rich region on chromosome 16p12 as being associated with bipolar disorder, but these findings await confirmation by additional studies. Numerous susceptibility genes have also been implicated in linkage and association studies, but none has yet been definitively established as a bona fide depression gene. However, a few genes with variants that may modify depression risk are worthy of mention since they may be linked to mechanisms of pathogenesis (discussed later). These include genes for the type 1 receptor for corticotrophin-releasing factor (CRHR1); the glucocorticoid receptor gene (GR); FKBP5, which encodes a chaperone protein for the glucocorticoid receptor; the serotonin transporter gene (SLA6A4); the catechol-O- methyltransferase gene (COMT); and brain-derived neurotrophic factor (BDNF).
Human and animal research in depression has focused on the long-term effects of chronic stress on the brain and their reversal by antidepressant medications; prominent examples are discussed here. A subset of depressed patients show elevated levels of cortisol associated with increased production of corticotrophin-releasing factor from the hypothalamus and perhaps other brain regions (e.g., amygdala). In animals, sustained elevations in glucocorticoids impair hippocampal function, in part via direct damage to hippocampal neurons, which is consistent with reduced hippocampal volumes seen in some depressed humans. As the hippocampus exerts the major inhibitory influence over the hypothalamic-pituitary-adrenal axis, impairment of hippocampal function would lead to still further increases in glucocorticoid secretion, establishing a pathologic feed-forward loop.
Stress-induced damage to the hippocampus, and perhaps other limbic regions (e.g., amygdala), in animals is also mediated in part by reduced levels of BDNF and other growth factors and cytokines. Furthermore, stress leads to a decrease in the birth of new neurons in the adult hippocampus. Interestingly, antidepressant treatments reverse these effects of stress, and the antidepressant effects of these medications seem to depend, in part, on their ability to promote hippocampal neurogenesis in animal models of depression. The clinical ramifications of such observations are unproven, although similar regulation of adult hippocampal neurogenesis may be important for certain forms of learning and memory.
Another important target of stress in animals is the nucleus accumbens, where stress regulation of numerous signaling events (dopaminergic transmission and BDNF signaling are two examples) exert potent effects on depression-like behavioral abnormalities. While a reduction in BDNF in the hippocampus promotes depression-like behaviors, an induction of BDNF in the nucleus accumbens promotes depression; similar changes in BDNF expression have been observed in postmortem brains of depressed patients. Thus the role of BDNF in regulating mood is highly brain-region specific.
In contrast to depression, animal models of mania as well as bipolar disorder have proved much more elusive. Mice with loss-of-function mutations in the Clock or GluR6 glutamate receptor genes or transgenic mice that overexpress glycogen synthase kinase 3β (GSK3β) show manic-like behavioral abnormalities, although the relevance of these observations to human mania remains unknown.
The observation that tricyclic antidepressants (e.g., imipramine) inhibit serotonin and/or norepinephrine reuptake, and that monoamine oxidase inhibitors (e.g., tranylcypromine) are effective antidepressants, initially led to the view that depression is caused by a deficiency of these monoamines. However, this hypothesis has not been well substantiated, although variants in the serotonin transporter, and in the COMT gene, have been associated with altered mood states in some individuals. Nevertheless, these medications, particularly the tricyclics, have formed the basis of antidepressant discovery efforts, with virtually all of today’s marketed antidepressants being SSRIs (e.g., fluoxetine, sertraline, citalopram), serotonin, and norepinephrine reuptake inhibitors (SNRIs) (e.g., venlafaxine, duloxetine), or norepinephrine reuptake inhibitors (NRIs) (e.g., atomoxetine).
A cardinal feature of all antidepressant medications is that long-term administration is needed for their mood-elevating effects. This means that their short-term actions, namely promotion of serotonin or norepinephrine function, is not per se antidepressant but rather induces a cascade of adaptations in the brain that underlie their clinical effects. The nature of these therapeutic drug-induced adaptations has not been identified with certainty. Presumably, the rich innervation of the brain’s limbic circuitry by serotonin and norepinephrine (Fig. 53-1) provide the anatomic basis of their therapeutic actions.
Lithium is a highly effective drug for bipolar disorder, and competes with magnesium to inhibit magnesium-dependent enzymes, including GSK3β and several enzymes involved in phosphoinositide signaling leading to activation of protein kinase C. These findings have led to discovery programs focused on developing GSK3 and PKC inhibitors as potential novel treatments for mood disorders. Another commonly prescribed drug for bipolar disorder is valproic acid, which has pleio-tropic effects, including inhibition of histone deacetylases (HDACs). Histone acetylation promotes transcriptional activation through posttranslational modification of N-terminal lysine residues in histones and thereby causes chromatin decondensation. HDAC inhibitors have shown some antidepressant effects in animal models of depression. Another form of epigenetic control of gene expression is methylation of cytosine residues in DNA, which inhibits gene transcription. DNA methylation has been shown to be important for inherited maternal effects on emotional behavior. Thus, rats born to mothers that exhibit low levels of nurturing behavior show increased anxiety and reduced expression of hippo-campal glucocorticoid receptors due to increased methylation of the receptor gene. They pass these traits on to their offspring, but cross-fostering by mothers that display high levels of nurturing reverses them. As research into epigenetic mechanisms progresses, there is hope that it may become possible to identify specific depression-associated alterations in human chromatin.
The DSM-IVTR uses the terms substance dependence and substance abuse to describe substance use disorders. It is unfortunate that the term substance dependence instead of addiction is used, because dependence can develop without addiction, and addiction involves much more than dependence per se. Physical dependence develops through resetting of homeostatic cellular mechanisms to permit normal function despite the continued presence of a drug; when drug intake is terminated abruptly, a withdrawal syndrome emerges. Withdrawal from alcohol or other sedative-hypnotics causes nervous system hyper-activity, whereas withdrawal from psychostimulants produces fatigue and sedation. Tolerance is a reduction in response to a drug, which like dependence, develops after repeated use. It results from a change in drug metabolism (pharmacokinetic tolerance) or cell signaling (pharmacodynamic tolerance). It is important to recognize that many nonaddictive medications induce tolerance and physical dependence, including β-adrenergic antagonists (e.g., propranolol) and α2-adrenergic agonists (e.g., clonidine).
What sets drugs of abuse apart is their unique ability to produce euphoria, a positive emotional state characterized by intensely pleasant feelings that are rewarding and reinforcing since they motivate users to take the drug repeatedly. Tolerance develops to the rewarding properties of most abused drugs during periods of heavy use, which promotes the use of higher drug doses. In addition, psychological (or motivational) dependence develops through the resetting of cellular mechanisms within reward-related regions of the brain and leads to negative emotional symptoms resembling depression during drug withdrawal. Addictive drugs can also cause sensitization, an increased drug effect upon repeated use, as exemplified by the paranoid psychosis induced by chronic use of cocaine or other psychostimulants (e.g., amphetamine). Addiction, therefore, results from drug-induced changes in reward-related regions of the brain that lead to a complex mixture of tolerance, sensitization, and motivational dependence, in addition to powerful conditioning effects of these drugs mediated by the brain’s memory circuits.
Substance use disorders, especially those involving alcohol and tobacco, are very prevalent. The World Health Organization (WHO) estimates that more than 76 million people worldwide have alcohol use disorders and ~1.3 billion people smoke tobacco products (~1 billion men, 250 million women). The most widely used illicit drug in the United States is marijuana, with ~17% of 18–25-year-olds reporting regular use. Estimates of the annual economic burden of substance use disorders in the United States, including health- and crime-related costs and losses in productivity, exceed $500 billion.
Imaging studies in humans demonstrate that addictive drugs, as well as craving for them, activate the brain’s reward circuitry (discussed later). However, there is no established pathology associated with addiction risk. Patients who abuse alcohol or psychostimulants show reduced gray matter in the prefrontal cortex. Functional MRI or PET studies show reduced activity in anterior cingulate and orbitofrontal cortex during tasks of attention and inhibitory control. Damage to these cortical areas may contribute to addiction by impairing decision making and increasing impulsivity.
Substance use disorders are highly heritable, with genetic risk estimated to be 0.4 to 0.7; however, the specific genes that comprise this risk remain largely unknown. The best-established genetic contribution to addiction is the protective effect that mutations in alcohol-metabolizing enzymes have on risk for alcoholism. Mutations that increase alcohol dehydrogenase (ADH) activity and decrease aldehyde dehydrogenase (ALDH) activity are additive and promote accumulation of acetaldehyde following ingestion of alcohol. This produces intoxication at low doses and a flushing reaction that is unpleasant, resembling the reaction to disulfiram, a drug used to prevent relapse. These variants are common among people of East Asian descent, and individuals expressing these variants rarely abuse alcohol.
Genes that promote risk for addiction have begun to emerge from large family and population studies, but all genes identified to date represent only a very small fraction of the overall genetic risk for addiction. The best established susceptibility loci are regions on chromosomes 4 and 5 containing GABAA receptor gene clusters linked to alcohol use disorders and the nicotinic acetylcholine receptor gene cluster on chromosome 15 associated with nicotine and alcohol dependence. There are reports of numerous other addiction susceptibility genes (e.g., variants in COMT, the μ-opioid receptor, and the serotonin transporter), but further work is needed to validate these findings. In addition, several genes have been implicated in impulsivity, which is strongly associated with substance abuse. These include variants in genes for the D4 dopamine receptor, the dopamine transporter, monoamine oxidase A, COMT, and the 5-HT1B serotonin receptor.
Work in rodents and nonhuman primates has established the brain’s reward regions as key neural substrates for the acute actions of drugs of abuse and for addiction induced by repeated drug administration (Fig. 53-1). Midbrain dopamine neurons in the ventral tegmental area (VTA) function normally as rheostats of reward: They are activated by natural rewards (food, sex, social interaction) or even by the expectation of such rewards, and many are suppressed by the absence of an expected reward or by aversive stimuli. These neurons thereby transmit crucial survival signals to the rest of the limbic brain to promote reward-related behavior, including motor responses to seek and obtain the rewards (nucleus accumbens), memories of reward-related cues (amygdala, hippocampus), and executive control of obtaining rewards (prefrontal cortex).
Drugs of abuse alter neurotransmission through initial actions at different classes of ion channels, neurotransmitter receptors, or neurotransmitter transporters (Table 53-2). Although the initial targets differ, the actions of these drugs converge on the brain’s reward circuitry by promoting dopamine neurotransmission in the nucleus accumbens and other limbic targets of the VTA. In addition, some drugs promote activation of opioid and cannabinoid receptors, which modulate this reward circuitry. By these mechanisms, drugs of abuse produce powerful rewarding signals, which, after repeated drug administration, corrupt the brain’s reward circuitry in ways that promote addiction. Three major pathologic adaptations have been described. First, drugs produce tolerance and dependence in reward circuits, which promote escalating drug intake and a negative emotional state during drug withdrawal that promotes relapse. Second, sensitization to the rewarding effects of the drugs and associated cues is seen during prolonged abstinence and also triggers relapse. Third, executive function is impaired in such a way as to increase impulsivity and compulsivity, both of which promote relapse.
TABLE 53-2
Repeated intake of abused drugs induces specific changes in cellular signal transduction, synaptic strength (long-term potentiation or depression), and neuronal structure (altered dendritic branching or cell soma size) within the brain’s reward circuitry. These modifications are mediated in part by changes in gene expression, achieved by drug regulation of transcription factors (e.g., CREB [cAMP response element binding protein] and ΔFosB) and their target genes. Together, these drug-induced adaptations underlie alterations in numerous neurotransmitter systems (e.g., glutamate, GABA, dopamine), growth factors (e.g., BDNF), neuropeptides (e.g. corticotrophin releasing factor), and intracellular signaling cascades. These adaptations provide opportunities for developing treatments targeted to drug-addicted individuals. The fact that the spectrum of these adaptations partly differ depending on the particular addictive substance used creates opportunities for treatments that are specific for different classes of addictive drugs and that may, therefore, be less likely to disturb basic mechanisms that govern motivation and reward.
Increasingly, causal relationships are being established between individual molecular-cellular adaptations and specific behavioral abnormalities that characterize the addicted state. For example, acute activation of μ-opioid receptors by morphine or other opiates activates Gi/o proteins leading to inhibition of adenylyl cyclase, resulting in reduced cAMP production, protein kinase A (PKA) activation, and activation of the transcription factor CREB. Repeated administration of these drugs (Fig. 53-2) evokes a homeostatic response resulting in upregulation of adenylyl cyclases, increased production of cAMP, and increased activation of PKA and CREB. Such upregulation of cAMP signaling has been identified in the locus coeruleus, periaqueductal gray, VTA, and nucleus accumbens and contributes to opiate craving and signs of opiate withdrawal. The fact that endogenous opioid peptides do not produce tolerance and dependence while morphine and heroin do may relate to the recent observation that, unlike endogenous opioids, morphine and heroin are weak inducers of μ-opioid receptor desensitization and endocytosis. Therefore, these drugs cause prolonged receptor activation and inhibition of adenylyl cyclases, which provides a powerful stimulus for the upregulation of cAMP signaling that characterizes the opiate-dependent state.
Opiate action in the locus coeruleus (LC). Binding of opiate agonists to μ-opioid receptors catalyzes nucleotide exchange on Gi and Go proteins, leading to inhibition of adenylyl cyclase, neuronal hyperpolarization via activation of K+ channels, and inhibition of neurotransmitter release via inhibition of Ca2/+ channels. Activation of Gi/o also inhibits adenylyl cyclase (AC), reducing protein kinase A (PKA) activity and phosphorylation of several PKA substrate proteins, thereby altering their function. For example, opiates reduce phosphorylation of the cAMP response element-binding protein (CREB), which appears to initiate long-term changes in neuronal function. Chronic administration of opiates increases levels of AC isoforms, PKA catalytic (C) and regulatory (R) subunits, and the phosphorylation of several proteins, including CREB (indicated by red arrows). These changes contribute to the altered phenotype of the drug-addicted state. For example, the excitability of LC neurons is increased by enhanced cAMP signaling, although the ionic basis of this effect remains unknown. Activation of CREB causes upregulation of AC isoforms and tyrosine hydroxylase, the rate-limiting enzyme in catecholamine biosynthesis.
|
Calories in a fried egg | Healthiest way to eat eggs | Fried Egg Nutrition
How many Calories in a fried egg ?
A standard size of fried egg has 90 calories. That is the size of the eggs that most people buy from the Market
smaller eggs contains 82 calories.
larger-than-average eggs has 110 calories.
2 fried eggs calories :
standard size of 2 fried eggs has 180 calories.
Healthiest way to eat eggs
Eggs are a low-cost, high-nutrient food item. They are a natural source of protein that are also low in calories and high in nutrients, vitamins, minerals, healthy fats, and other nutrients, making them an excellent complement to any diet.
They can be prepared in a variety of ways and mixed with other foods to create delicious and nutritious combos.
Here are some Healthiest way to eat eggs
1. Boiled
Boiled eggs are fantastic since they only require water — no oil, fat, or butter are required. Boiling an egg also limits the egg’s exposure to air, which reduces oxidation to the yolk and maximizes the quantity of nutrients in the egg.
Hard-boiled eggs are cooked in their shells for 6–10 minutes in a pot of boiling water, depending on how well the yolk is cooked.
The longer they cook, the firmer the yolk becomes.
Hard boiled eggs are loaded with nutrients, protein, and healthy fats. A typical hard-boiled egg (large) contains:
• 77 calories
• 3 grams of fat
• 6 grams of saturated fat
• 3 grams of protein
How long does it take to boil an egg
Boiled Egg
How to Boiled egg
2. Poached
poached egg
Healthiest way to eat eggs
Poached Egg is similar to boiled egg
It’s also a low-calorie alternative to scrambled or fried eggs because you don’t need to use any additional oils to cook them.
How To Poached Egg :
1. Heat the water:
2. Crack egg into a small bowl and gently slip it into the water
3. Turn off heat, cover pan, set timer for 4 minutes
4. Remove eggs with slotted spoon:
Poached egg
Healthiest way to eat eggs
3.Scrambled egg
Scrambled egg
Healthiest way to eat eggs
It is one of the way to fried The egg. Making Scrambled egg is so easy and it is so tasty. how much Healthy it is depends on which oil you used and how much spices and salts you used.
You can Make it healthy By using less amount of olive oil or using Pinch of rock salt with Black Pepper.
Scrambled egg Recipe
1. Pour olive oil or Butter in a small skillet over medium heat.
2. Whisk the eggs : Crack two eggs into a small mixing bowl. Add milk and salt. Aggressively whisk the mixture.
3. Scramble the eggs : Reduce the heat to medium low and add the eggs to the heated skillet. Push the eggs from one end of the skillet to the other with a rubber spatula.
4. When the eggs are set but still glistening with moisture, remove them from the pan and place them on a plate. Finish with a sprinkling of freshly cracked pepper and salt. If used, garnish with fresh herbs.
4.Fried egg
Fried egg Nutrition
Fried egg Nutrition
Fried egg Recipe
• Break an egg into a small bowl with care. (If you’re cooking numerous eggs, repeat the process.)
• In a large (ideally nonstick) sauté pan, heat the oil over medium heat. When the pan is hot enough, carefully pour in the egg and cook until the whites are firm but the yolks are still soft. Remove from the heat right away and serve with sunny-side-up eggs.
• Alternatively, for over-easy eggs, cook for an additional 10-30 seconds, 30-60 seconds for over-medium eggs, or 1-2 minutes for over-hard eggs, flip the egg over and cook for an additional 10-30 seconds, 30-60 seconds, or 1-2 minutes.
• Remove from the heat and season with salt and pepper if desired.
Fried Egg Nutrition
Read More : 10 Amazing Health Benefits Of Eggs | Egg Nutrition
Are fried eggs healthy?
According to studies, eggs can lose up to 61 percent of their vitamin D when baked for 40 minutes, compared to up to 18 percent when fried or boiled for a shorter length of time. Despite the fact that frying eggs decreases these nutrients, eggs are still a high-quality source of vitamins and antioxidants.
Leave a Reply
You May Also Like
|
| | |
Eugene Ballard
At the Café Copoule in Paris in the spring of 1916, three American soldiers of the French Foreign Legion were commiserating with a fourth who was convalescing from a shrapnel wound. Jeff Dickson, a white Mississippian, asked Eugene Bullard, his injured black comrade in arms from Georgia, “Gene, suppose they find you’re too lame for the infantry?” Bullard’s answer raised eyebrows around the table: “I’ll go into the Air Service.”
“Air Force?” Dickson exclaimed. “You know damn well, Gene, there aren’t any Negroes in aviation.” “Sure do,” Bullard said. “That’s why I want to get into it. There must be a first to everything, and I’m going to be the first Negro military pilot.” That friendly argument swiftly evolved into a $2,000 wager. Bullard, who would emerge as history’s first certified black American aviator, won the bet.
Similar Posts
Leave a Reply
|
This classic book on democratic world federation was written at the end of the Second World War. Reves’ purpose in writing this book was to demonstrate how the United Nations confederation that was being created then would not prevent future wars. Only by creating a democratic system of world law could all wars be eliminated.
Reves argues that most people’s approach to political, economic, and social problems is “utterly ridiculous and out-of-date” (p. 29) because they hold on to an antiquated view of sovereign nation-states. What is needed in our modern world that is highly integrated and industrialized is a dramatic shift away from nations that see themselves as the center of the world to seeing the world united by a democratic world federal government that would create world law and order.
In capitalist, fascist, and communist countries, “the people of each nation have been forced to centralize more and more power in their national governments” because of constant threats from other nations. (p. 36) The constant preparation for the possibility of war has meant less political, economic, and social freedom for individuals in every nation, regardless of its political or economic system. The main problem of our modern world is therefore nationalism as a result of many nation-states that are “independent, sovereign units whose relationship is unregulated.” (p. 65)
The ethical teachings of the world’s religions have been inadequate to prevent humans from slaughtering millions of their fellow humans in numerous wars. Christianity, Islam, and the other religions of the world have neglected their basic insight of universalism and the unity of the human family. The world’s religions have become “completely absorbed and dominated by neo- pagan nationalism.” (p. 82) But humanity can be saved only by universalism.
According to Reves, the only method that can make humans accept moral principles and standards of social conduct is law. He argues that a civilized global society and peace between nations can be achieved “only within a legal order equipped with institutions to give effect to principles and norms in the form of law, with adequate power to apply those laws and to enforce them with equal vigor against all who violate them.” (p. 76) Security and freedom are the products of law on the local and national levels, and this would also be true on the global level.
Reves disagrees with those who believe that war can never be abolished because it is part of human nature. He argues that wars between social units always take place when these units (tribes, dynasties, religions, cities, or nations) exercise unrestricted sovereign power. But “wars between these social units cease the moment sovereign power is transferred from them to a larger or higher unit.” (p. 121) Just as there is one and only one cause for wars, peace between social groups that have fought each other has always been established in only one way.
There have been two opposite mistakes in thinking about the cause of war. After the First World War, many believed that the necessary condition for world peace was disarmament. During the Second World War, many believed that only powerful armaments and strategic military bases
spread around the world could prevent aggression and maintain peace. For Reves, the problem of war and the attainment of peace between nations is a social and political problem, not a technical problem about armaments.
Reves argues that “the fundamental problem of peace is the problem of sovereignty.” (p. 126) In previous centuries, chiefs, kings, and emperors were considered to have absolute sovereignty. In the modern world, unlimited sovereignty resides in national governments. We are currently living in global anarchy because there is no higher source of law above the national governments. The Second World War has demonstrated that in our industrialized world, the concept of ‘the sovereign equality of all nations’ is obsolete.
The question is not about surrendering national sovereignty but creating something that we currently lack but need—institutions with universal sovereign power that can extend law and order above the national governments and thereby eliminate the current global situation of unregulated anarchy. Sovereign power resides in communities. People have delegated part of their sovereignty to local governments in order to solve local problems and they have delegated part of their sovereignty to national governments to solve national problems. Reves maintains that it is now time for people to delegate part of their sovereignty to a democratic world federal government in order to solve global problems.
Under the current international system, national governments enter into unenforceable treaties with each other but disregard them whenever they no longer support what they consider their national interests. But “we can never arrive at a legal order by means of treaties.” (p. 150) After any war, a peace treaty is signed. But no matter what kind of treaty is signed, the next war is inevitable in a world that lacks world law. For Reves, “peace is order based on law. There is no other imaginable definition. Any other conception of peace is sheer utopia.” (p. 147)
Wars that are the result of the system of sovereign nation-states are extremely expensive in human life, environmental destruction, and material wealth. The war system restricts individual rights and lowers living standards. Solving the war problem will foster human rights as well as free up huge amounts of money for solving national and global problems. Through a democratic world federation, “a unified world currency is the indispensable condition for further development of world economy from the present stage on.” (p. 170)
After the First World War, the League of Nations was formed but it was unable to prevent later wars because it was a league or confederation of sovereign national governments. Reves wanted the world to avoid the same problem at the end of the Second World War. But even though the United Nations Organization was an improvement over the League of Nations, it was just another international confederation. Reves’ thesis is that both the League of Nations and the United Nations are based on the “fallacy of internationalism” (the title of Chapter 11) and the “fallacy of collective security” (the title of Chapter 13). Under the inter-national system of sovereign nation-states, “all great powers behave like gangsters. And all small nations behave like prostitutes.” (p. 222)
Reves is not advocating that people first become united in the areas of religion, culture, political philosophy, or economic system before they can be united under a democratic world federation.
He says that differences in religion, culture, art, language, politics, and economics would not be eliminated but would actually be protected and flourish under a global legal system. A world federation must be democratic, based on constitutional principles, and protective of human rights.
After the nuclear bombings of Hiroshima and Nagasaki in August 1945, journalists asked Albert Einstein for his ideas on world peace. Einstein replied, “We need a world government.” He then urged the journalists to read Reves’ book. In a postscript to a second edition, Reves said that there is only one method that can create security against destruction by atomic bombs. That method is democratic world federation. He said that the San Francisco Charter that created the United Nations Organization is simply a multilateral treaty whose members are nation-states. “Each party to it can withdraw the moment it desires, and war alone can force the member-states to fulfill their obligations under the treaty. Law and only law can bring peace among people; treaties never can.”
The philosopher Alfred North Whitehead said that all of Western philosophy is a footnote to Plato. A similar saying can be applied to this book. Reves developed the fundamental principles for analyzing the cause of war and the solution of world law created by a democratic world federation. Ever since Reves’ book appeared at the end of the Second World War, other authors of books on democratic world federation have basically been expanding his central argument.
|
• Language: en
Principles of Pharmacokinetics
Pharmacokinetics is the study of the time profile of drugs and metabolites in a physiological organism. It is often described as “what the body does to the drug”. Generally, our goal is to predict a time course of drug concentration that resembles the observations we have collected from an individual. (Observations from a population are covered in Population Models in PoPy.)
To make these predictions we build a mathematical model that, for an individual, has two main components:
1. A deterministic structural model with parameters that define the shape of the time course
2. A stochastic residual error model that specifies how observations deviate from the deterministic predictions
This part of the book provides a detailed description of how various pharmacokinetic (PK) models are implemented in PoPy. It assumes no prior knowledge of PK, hence experienced modellers may be tempted to skip this section. It is, however, probably valuable to look at the syntax for absorption models, particular the Weibull model, which is not available in other population modelling software.
Back to Top
|
Skin disease
Use this domain for words related to skin diseases such as leprosy, boils, and rashes.
• What words refer to a sore in the skin?
boil, infection, sore, open sore, scab, rash, ulcer, abscess, bunion, growth, tumor, bruise, gangrene, inflammation, pox, lesion, canker, corn, eruption, blister, bedsore, cold sore,
• What are the names of specific skin diseases?
leprosy, chickenpox, smallpox, measles, German measles, scabies, ringworm, (itching of foot due to worms), dermatitis, eczema, fungus, shingles,
• What words refer to having an infection?
have an infection, be infected, infect, get infected, break out, develop an infection,
• What words refer to an infection becoming worse?
spread, turn gangrenous, fester, peel, break,
• What words refer to a small sore in the skin?
pimple, acne, zit, whitehead, blackhead,
• What words refer to pus?
pus, pustule,
• What does pus do?
ooze, run,
• What words refer to a person with a skin disease?
|
Stanislav Matveev
May 27, 2021
3 min read
To Look into a Soul. 11) ID and EGO.
Look into the SOUL. 11) ID and EGO .
Interaction of ID and EGO or operation “ cover “ .
ID and EGO interact in many soul models as opposing sides. The constant struggle requires a lot of calories. In our model, we will consider the interaction of ID and EGO in order to achieve a common goal.
ID manages an archive of behavioral programs formed over a million years before our imagination speech. These programs of behavior correspond to the animal kingdom. When we meet another person, our subconscious mind in 0.25 milliseconds determines its image for itself by the movement of the body, hands, facial expressions, and the expression of the eyes. All these options are stored in our memory. And we call this memory intuition, insight, and inner voice.
EGO manages an archive of behavioral programs formed in our souls after the emergence of our speech and imagination. These programs of behavior correspond to the rules of behavior and are formed as a result of copying the programs of behavior that allowed them to survive in the tribe.
This is our memory and the memory of our ancestors. In every nation, customs, beliefs and attitudes to myths are alive. The execution time of behavioral programs is much longer and is due to a wandering mind looking for the desired program of behavior.
How do ID and EGO interact in life within our model?
Let’s imagine that two people have met. They immediately appreciated each other by body movement, facial expressions, eye expressions, hand gestures. Matching memes entered everyone’s souls and the IDs turned on pattern recognition behavior programs. We do not feel, but our souls appreciated everyone in a fraction of milliseconds. Evolution has left us with fast programs for survival in the animal kingdom.
Man is a product of social relations. EGO is slower, but allows you to save kilocalories by enabling behavior programs that comply with the rules of behavior in the tribe. If a person from another tribe met, then EGO does not waste time remembering suitable behavior programs, but transfers control to ID .
But each time to conflict is an extra consumption of kilocalories. EGO consists of program behavior “ cover-up “. Russian philosopher Anna Kir’yanova represents the behavior of the program as a “ a double appointment “ in her book “ A non-standart psychology “ .
Double appointment allows you to manipulate one individual over another, not only in words. The first part can be verbal , and the second is facial expressions, gestures or behavior of the one who gives the order.
The most striking example is the memoirs of Samson, a French executioner who talks about the good , humane and humane.
People, be careful!
The second option is when the ID requires a collision, and the EGO includes appeasement programs. In this case, non-execution of programs accumulates in the ID , which leads to latent aggressiveness.
Within the framework of our model, it is possible to set aside reasoning about the mystery of the soul and solve a purely mathematical problem of interaction, given that the difference in behavior programs for each person obeys the law of normal distribution.
|
Hearing Loss Testing
Informed Decision-Making Starts With A Hearing Test
Determining whether or not hearing aids can help you hear a fuller world starts with a hearing test. Knowing the results of those tests gives you the power to make the decision that’s right for you.
Why Have Your Hearing Tested?
Untreated hearing loss can damage your physical health, emotional well-being and professional success. Studies have shown it:
• Increases your risk of cognitive decline.
• Increases feelings of depression, anger and anxiety.
• Makes concentrating and storing new information difficult.
• Increases physical injuries, specifically falls.
• Reduces job performance and monetary compensation.
A Hearing Test Is Quick, Painless and Provides Immediate Results.
Whether you just need a hearing screening or an audiological assessment, testing methods are fast and same-day test results typically allow an audiologist to provide an immediate diagnosis.
What Does an Audiologist Measure?
1. How your ears respond to loud sounds.
2. The quietest sound you can hear at different pitches.
3. How well you can hear speech.
4. The movement capacity of your eardrum.
5. What type of hearing loss you have.
Guiding Your Next Steps
Your results determine what options we’ll recommend, and that’s why we take the time to guide you through them and answer every question along the way. We’re here to support you no matter what path you choose to take after your diagnosis.
Hearing aids may be the most common treatment option, but their technology, style, and convenience are unique to each model. If hearing aids are right for you, we’ll work with you to determine which models best meet your needs, fit them, and provide ongoing support to help you adjust to a whole new way of hearing the world.
Call The Hear Care Center at (772) 283-3000 for more information or to schedule an appointment.
|
Blockchain and Laserfiche: Is This the Future?
Over the past few years, blockchain technology has emerged as a way to track and document cryptocurrency. The Euromoney website defines blockchain as:
A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain. Each block in the chain contains a number of transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s ledger. The decentralized database managed by multiple participants is known as Distributed Ledger Technology (DLT).”
Over time, as the technology matured more industries found usages for blockchain, broadening the definition to:
Now, I bet you are wondering how it works. Staff members request a transaction using the blockchain application. The transaction could be records or other assets of value. Remember, the record itself is not uploaded into the blockchain, just the metadata..
The block that will be created contains information (metadata) about the transaction, for example, sender, receiver, name of the record reviewed, record series number, date created, and other vital information for context and tracking. Then the transaction is sent to a peer-to-peer network made up of distributed nodes. The nodes validate the transaction by using algorithms. Once the transaction is finished and authenticated, the new block is added to the blockchain.
At CPS, we work with blockchain with our trusted systems offering. restorVault, our partner, uses blockchain technology.
You may have noticed that ECM industry analysts have jumped on the blockchain bandwagon. They’re announcing that blockchain is a revolution in business operations. Equally as enthusiastic are archivists in the EU, who are accessing its potential for long-term (permanent) records management. Also, InterPARES Trust, the multi-national, interdisciplinary research project exploring issues of trust and trustworthiness of records and data in online environments has declared that blockchain solves the records documentation issues inherent to ECM. Simultaneously, they also suggest that further study was necessary.
If blockchain can track financial transactions, then there are other uses, such as tracking information assets. While it won’t ever replace ECM, another area where blockchain has obvious potential is compliance and records management. Some ISVs (Independent Software Vendors) are asserting that blockchain can be used to authenticate and add an audit trail of authorized interactions. Although Laserfiche has an audit trail product, so I guess it’s a matter of what you are auditing. If it’s your records management procedure/system, you can use Laserfiche. I could see where blockchain works with Laserfiche to ensure records can’t be changed, like with our trusted systems offering.
Another blockchain scenario is facilitating information and records exchanges of documents with digital signatures between multiple agencies and the public, by ensuring a secure, transparent, and trusted exchange. Through its cryptographic functionality, certain metadata and the hash are retained and stored in the blockchain ledger. This assures that the signatures and therefore the record can be verified for authenticity. Recently, I read that blockchain may have applications within the process of voting.
To answer the question posed in the title, while I think the technology is interesting, I’m not entirely convinced of all the suggested blockchain use cases outside of cryptocurrency and records validation. We’ll certainly be keeping an eye out for how it can further support Laserfiche.
|
Precisely what is Categorical Data?
A specific variable why not try these out is the one which assigns every observation into a category. These variables take a limited selection of values, and they generally assign an observation into a specific nominal category. The categories in which these variables fall are generally fixed, and their values are usually set. Here are several common examples of categorical factors. They’re useful when you’re trying to classify a huge group of observations.
A particular data is information that identifies a category. Its description is simple. The info is categorized by a solo variable. It is value is a number of people within a particular category. This is important because it helps companies to further improve the customer knowledge. A cake chart is usually an example of specific data. The line chart displays the number of persons in a selected category. A pie graph and or demonstrates the number of employees in a company.
A second common type of categorical info is the “other” category. This can be a type of category that can consist of multiple reactions. These can be used to classify very similar items within a list. This information can also be assessed using univariate statistics or bivariate methods. Graphing a graph can also assist you to analyze info and anticipate trends. Such a research is very helpful for business decision-making.
|
WHO Issues List of Top Epidemic-Prone Diseases Without Sufficient Countermeasures
For the purposes of the R&D Blueprint, the World Health Organization (WHO) has developed a special tool for determining which diseases and pathogens to prioritize for research and development in public health emergency contexts.
For the purposes of the R&D Blueprint, the World Health Organization (WHO) has developed a special tool for determining which diseases and pathogens to prioritize for research and development in public health emergency contexts. This tool seeks to identify those diseases that pose a public health risk because of their epidemic potential and for which there are no, or insufficient, countermeasures. The diseases identified through this process are the focus of the work of R& D Blueprint. This is not an exhaustive list, nor does it indicate the most likely causes of the next epidemic.
The first list of prioritized diseases was released in December 2015. Using a published prioritization methodology, the list was first reviewed in January 2017. The second annual review occurred Feb. 6-7, 2018. Experts consider that given their potential to cause a public health emergency and the absence of efficacious drugs and/or vaccines, there is an urgent need for accelerated research and development for:*
Crimean-Congo haemorrhagic fever (CCHF)
Ebola virus disease and Marburg virus disease
Lassa fever
Nipah and henipaviral diseases
Rift Valley fever (RVF)
Disease X
A number of additional diseases were discussed and considered for inclusion in the priority list, including: Arenaviral hemorrhagic fevers other than Lassa Fever; Chikungunya; highly pathogenic coronaviral diseases other than MERS and SARS; emergent non-polio enteroviruses (including EV71, D68); and Severe Fever with Thrombocytopenia Syndrome (SFTS).
These diseases pose major public health risks and further research and development is needed, including surveillance and diagnostics. They should be watched carefully and considered again at the next annual review. Efforts in the interim to understand and mitigate them are encouraged.
Although not included on the list of diseases to be considered at the meeting, monkeypox and leptospirosis were discussed and experts stressed the risks they pose to public health. There was agreement on the need for: rapid evaluation of available potential countermeasures; the establishment of more comprehensive surveillance and diagnostics; and accelerated research and development and public health action.
Several diseases were determined to be outside of the current scope of the Blueprint: dengue, yellow fever, HIV/AIDs, tuberculosis, malaria, influenza causing severe human disease, smallpox, cholera, leishmaniasis, West Nile Virus and plague. These diseases continue to pose major public health problems and further research and development is needed through existing major disease control initiatives, extensive R&D pipelines, existing funding streams, or established regulatory pathways for improved interventions. In particular, experts recognized the need for improved diagnostics and vaccines for pneumonic plague and additional support for more effective therapeutics against leishmaniasis.
The experts also noted that:
- For many of the diseases discussed, as well as many other diseases with the potential to cause a public health emergency, there is a need for better diagnostics.
- Existing drugs and vaccines need further improvement for several of the diseases considered but not included in the priority list.
- Any type of pathogen could be prioritized under the Blueprint, not only viruses.
- Necessary research includes basic/fundamental and characterization research as well as epidemiological, entomological or multidisciplinary studies, or further elucidation of transmission routes, as well as social science research.
- There is a need to assess the value, where possible, of developing countermeasures for multiple diseases or for families of pathogens.
- The impact of environmental issues on diseases with the potential to cause public health emergencies was discussed. This may need to be considered as part of future reviews.
The importance of the diseases discussed was considered for special populations, such as refugees, internally displaced populations, and victims of disasters.
The value of a One Health approach was stressed, including a parallel prioritization processes for animal health. Such an effort would support research and development to prevent and control animal diseases minimizing spill-over and enhancing food security. The possible utility of animal vaccines for preventing public health emergencies was also noted.
Also there are concerted efforts to address anti-microbial resistance through specific international initiatives. The possibility was not excluded that, in the future, a resistant pathogen might emerge and appropriately be prioritized.
*The order of diseases on this list does not denote any ranking of priority.
Source: WHO
|
How to Decoupage With Paper Napkins
Introduction: How to Decoupage With Paper Napkins
Decoupaging with napkins is an easy DIY project that doesn’t require any special tools.
It can be a great activity for kids or an opportunity to upgrade any article you want: A jar, A vase, A candle-holder or A box.
You can buy a cheap, simple jar for example and in a short time and not so much effort- make it a beautiful, decorated jar.
Step 1: Materials Needed for Decoupaging With Napkins
1. Decorated napkin. (You can buy it at the supermarket\ party shop \ art shop).
2. The article you would like to decorate- A jar, vase, box, etc.
3. Scissors.
4. Glue (It could be napkins glue\glass glue if you do it on glass\wood glue if you decorate wood).
5. Brush.
Step 2: Preparing Decoupage Napkins
Separate all layers of the napkin until you have just one layer. Then, keep the top layer (the one with the decorations on it).
Notice: some napkins will have 2 or 3 layers- make sure you stay only with the top layer, it's crucial.
Step 3: Spreading Glue on the Article
Brush a small amount of glue on the whole article.
Notice: Don’t put too much glue- the decoupage is very thin and when doing the next step, it can be ripped.
Step 4: The Crucial Step- Placing the Napkin
Slowly smooth the napkin over the article- Some people like the texture of a few creases but the main idea is to keep napkin as stretched as we can.
• When you get to where the edges meet- Cut off the extra napkin (Try not to get too much overlap).
• If you have extra napkin on the top, just cut it off and apply some glue to secure it down.
Step 5: Sealing Decoupage Decor
Apply one more layer of glue over the decoupage you just placed on the article.
Step 6: Drying Time
Wait for two hours until it dries.
Step 7: Enjoy Your Upgraded Article :)
Be the First to Share
• Fix It Speed Challenge
Fix It Speed Challenge
• Anything Goes Contest 2021
Anything Goes Contest 2021
• New Year, New Skill Student Design Challenge
New Year, New Skill Student Design Challenge
|
2. Water Analysis - Assessments
1. Describe one thing that humans do that changes water quality - either making it worse or better. How would it affect each of the 3 tests we conducted during class?
2. Research another water quality test. What does that test measure? How do you perform that test? What are the natural readings and what are unnatural readings? Describe 2 natural reasons why readings would vary. Describe 2 human impacts that could affect the test.
Going Further
1. Conduct water quality analysis on the reservoir part of the terraqua column. See Terraqua Column lesson.
2. Conduct water quality analysis at the creek restoration site before and after restoration.See Habitat Survey lesson
3. Conduct an independent investigation using terraqua columns that monitors water quality. See Terraqua Column Experiment lesson.
|
In medicine if you’re going to be considered the “Father of Something,” immunology would be a great choice.
Edward Jenner is often called “the father of immunology” and it’s said his work may have saved more lives than the work of any other human.
To be fair, Jenner did not discover vaccination but he was the first person to confer scientific status on the procedure and to pursue its scientific investigation.
Vaccination replaced an earlier process called variolation — smallpox was also known as variola. Variolation involved inserting powdered smallpox scabs or fluid from pustules into superficial scratches or cuts made in the skin.
The process had a couple of serious downsides: the patient could die from smallpox or could (if not dead) infect others as a spreader.
In Jenner’s time, smallpox was killing about 10% of the population (all unvaccinated). Jenner was among five individuals in England and Germany in the 1770s who were interested in the use of material from cowpox and how it might provide immunity.
To illustrate that not all medical breakthroughs are achieved by physicians, a Dorset farmer named Benjamin Jesty was concerned about the presence of smallpox in his locality.
Determined to protect his family, he must have heard of the possibility of transferring traces of cowpox to provide immunity from the disease. He used material from udders of cattle that he knew had cowpox and transferred that material with a small lancet to the arms of his wife and two sons. They remained free of smallpox throughout their lives although they were exposed on numerous later occasions.
Well, Jenner was aware of the common observation that milkmaids were generally immune to smallpox but he knew there was a finite number of openings for that job. Thus, he postulated that the pus in the blisters that milkmaids received from cowpox (the disease similar to smallpox but much less virulent) protected them from smallpox.
He proceeded to test his hypothesis by inoculating the son of his gardener — if you want your dad to keep his job you’ll go along with this.
The story is that he scraped pus from cowpox blisters on the hands of a milkmaid who had caught cowpox from a cow named Blossom.
Blossom’s hide now hangs on the wall of the St. George’s Medical School Library, proving, once again, that no good deed goes unpunished.
Jenner’s gardener kept his job and the kid came through several other tests of variolus material with no serious side effects.
Flushed with his success, Jenner tested his hypothesis on 23 other subjects (who apparently did not work for him). He continued his research and reported it to the Royal Society, which didn’t publish the original paper (it didn’t look like it would sell in paperback).
However, he refined it. Donald Hopkins, former director of all health programs at The Carter Center has written, “Jenner’s unique contribution was not that he inoculated a few persons with cowpox, but that he proved that they were immune to smallpox. Moreover, he demonstrated that the protective cowpox pus could be effectively inoculated from person to person not just directly from cattle.”
Edward Jenner’s pioneering paved the way for continued development in vaccination leading to virtual eradication of smallpox, polio and other diseases.
Vaccination is a key to stopping pandemics in their tracks.
He’d be disappointed in the death rate today from the current pandemic of the unvaccinated and so would Blossom.
|
Computer Programme Beats Doctors In Brain Cancer Diagnoses
A new computer programme developed by scientists including those of Indian origin, has outperformed physicians at spotting brain cancer.
The programme, developed by Case Western Reserve University in the US, is nearly twice as accurate as two neuroradiologists in determining whether abnormal tissue seen on magnetic resonance images (MRI) were dead brain cells caused by radiation, called radiation necrosis, or if brain cancer had returned.
“One of the biggest challenges with the evaluation of brain tumour treatment is distinguishing between the confounding effects of radiation and cancer recurrence. On an MRI, they look very similar,” said leader of the study Pallavi Tiwari, assistant professor at Case Western Reserve.
However, treatments for radiation necrosis and cancer recurrence are far different. Quick identification can help speed prognosis, therapy and improve patient outcomes, the researchers said.
With further confirmation of its accuracy, radiologists using their expertise and the programme may eliminate unnecessary and costly biopsies, Tiwari added.
Brain biopsies are currently the only definitive test but are highly invasive and risky, causing considerable morbidity and mortality.
To develop the programme, the researchers employed machine learning algorithms in conjunction with radiomics, the term used for features extracted from images using computer algorithms.
The engineers, scientists and physicians trained the computer to identify radiomic features that discriminate between brain cancer and radiation necrosis, using routine follow-up MRI scans from 43 patients.
The team then developed algorithms to find the most discriminating radiomic features, in this case, textures that can not be seen by simply eyeballing the images.
“What the algorithms see that the radiologists do not are the subtle differences in quantitative measurements of tumour heterogeneity and breakdown in microarchitecture on MRI, which are higher for tumour recurrence,” said Tiwari.
More specifically, while the physicians use the intensity of pixels on MRI scans as a guide, the computer looks at the edges of each pixel, said Anant Madabhushi, professor at Case Western Reserve.
“If the edges all point to the same direction, the architecture is preserved,” said Madabhushi.
In the direct comparison, two physicians and the computer programme analysed MRI scans from 15 patients from University of Texas Southwest Medical Centre in the US.
One neuroradiologist diagnosed seven patients correctly, and the second physician correctly diagnosed eight patients. The computer programme was correct on 12 of the 15.
The study appears in the American Journal of Neuroradiology.
|
A Star Wars-like scenario seems to be playing out in the deep space. This follows the discovery of the presence of a planet-gobbling star described as "a solar twin" thanks to the Sun-like features including temperature, age, and composition.
The star in question, named as HIP68468m is 300 light-years away and has similar size, mass, and luminosity as Sun.
The surprise discovery was made by a team of international scientists who detailed the findings in a paper published in the journal Astronomy & Astrophysics.
Evidence Of Excess Lithium
Analysis of the solar twin's composition suggested that HIP68468 had munched up some of the worlds that rotated it as had been evidenced by the heavy amount of lithium in the star's surface.
The lithium content was four times more than expected of the star given its age was six billion years.
Planets with less temperature than Sun preserve lithium without melting them away. Also, intriguing was the presence of vast heat-resisting metals seen mainly on rocky planets.
However, some researchers have ruled out an analogous situation with respect to Sun and Earth.
"It doesn't mean that the sun will 'eat' the Earth anytime soon," said Jacob Bean, assistant professor of astronomy and astrophysics at UChicago and co-author of the research.
The star-eating planet happens to be a case of chemical remains belonging to a few worlds smeared in the atmosphere of HIP68468.
"It can be very hard to know the history of a particular star, but once in a while we get lucky and find stars with chemical compositions that likely came from in-falling planets," said Debra Fischer, a professor of astronomy at Yale University who was not involved in the research.
Distant Threat To Earth
The carnivorous star HIP 68468 was found out after astronomers led by Jorge Melendez of São Paulo University in Brazil studied the star using the big telescope at Chile's La Silla Observatory. He detected a missing planet while accounting for three that used to orbit the star.
The very idea of a planet falling into a star and being eaten up may be scary. But that is not uncommon. Of the 60 solar twins under watch, 15 percent has excess lithium.
Scientists think the Earth's Solar System is also vulnerable. Already there are projections that Sun may swallow up Mercury and Venus. Maybe Earth will be on the chopping block in a billion years.
Concern prevails that HIP 68468 can be a repeat offender with the super-Earth- HIP 68468b being a potential target as the tight orbit may make it weaker.
"It's as if we saw a cat sitting next to a bird cage," quips Fischer.
|
Bruce Murray, College of Education The Reading Genie
How do you know if a claim is true?
I don’t like to eat green vegetables.
Is that true or false? To find out, you’d have to be inside the body of the person who said it. Since that’s impossible, there is no reason to question it. Of course, opinions don’t count for much when someone is trying to persuade you. You can always answer, “I have a different opinion.”
The moon is made of green cheese.
The Constitution protects freedom of speech.
An evaluative claim makes a statement about what is good or bad, right or wrong. For example:
People should read books instead of watching so much TV.
To test an evaluative claim, we appeal to standards of value. In this case, the standard might be the value of literacy. Evaluative claims often carry assumptions about empirical claims not directly stated. Here, we are assuming that reading books makes us more literate than watching TV, which according to scientific studies of vocabulary growth, is also true. Answering evaluative claims requires us to decide which value standard is higher. In this case, we might argue that literacy is a higher standard than relaxation or pleasure.
All men are created equal.
When we’ve stripped down an argument to the bare essentials–when it’s stated in neutral, unemotional language, it’s free of opinions, and we are willing to grant the authority and impartiality of the speaker–then our final questions are:
1. What kind of claim is being made?
2. What evidence supports that claim?
Fallacies in arguments, or how arguments go wrong.
Return to the Reading Genie homepage.
Last modified: October 11, 2021
|
Sentence Jumbles
• Type the jumbled words in the correct order.
• Click the button at the bottom to check your answers.
The 10 sentences
1. image the love all We water in standing birds beautiful these of .
2. hours one many can just for flamingo on leg A stand .
3. balance amazing shape that bird special position the A and give .
4. bone it The anatomy means stand basic structure can flamingo's .
5. use a do to muscles Flamingos have their lot not .
6. because stand a Unique can for time it still long .
7. would be human very to difficult stay for still a It .
8. us moving aren't around aware Most that of we're .
9. many birds need so The not use muscles do to .
10. could the say energy be Researchers saving also reason that .
Back to the flamingos lesson.
Share this lesson
More Free Sites by Sean Banville
Online Activities
|
Close Menu
You can obtain a disability for Marfan’s syndrome. Marfan syndrome is a genetic connective tissue disorder that affects multiple body systems, including the skeleton, eyes, heart, blood vessels, nervous system, skin, and lungs. There is no specific laboratory test to diagnose Marfan syndrome. The doctor makes the diagnosis using your medical history, including family history and physical examination. The doctor will also evaluate the ratio of arm/leg size to the trunk size. Additionally, the doctor will do a slit lamp eye examination and order a heart test such as an echocardiogram.
The effects of Marfan syndrome can range from mild to severe. In most cases, the disorder progresses as you age. Most individuals with Marfan syndrome have abnormalities associated with the heart and blood vessels. Your heart’s mitral valve may leak, causing a heart murmur. Small leaks may not cause symptoms, but large leaks may cause shortness of breath, fatigue, and palpitations.
Another effect is that the wall of the aorta may weaken and cause an aortic dilation. This aortic dilation may tear, dissect, or rupture, causing serious heart problems or sometimes sudden death. The SSA will evaluate your Marfan syndrome under the appropriate body system criteria. For example, the SSA will look at Listing 4.10 to determine your eligibility for benefits. If you do not meet or equal a listing from SSA’s “blue book,” then the SSA can consider the functional limitations imposed by your impairment.
Marfan Syndrome phrase on the screen. Oncologist use cell technologies at office.
Listing 4.10 defines disability due to an aneurysm. Listing 4.10 states disability can be awarded due to an aneurysm of the aorta or major branches, due to any cause (e.g., atherosclerosis, cystic medial necrosis, Marfan syndrome, trauma), demonstrated by appropriate medically acceptable imaging, with dissection not controlled by prescribed treatment (see 4.00H6).
The listing under 4.00H6 describes what the SSA means when an aneurysm is not controlled. An aneurysm (or bulge in the aorta or one of its major branches) is dissecting when the inner lining of the artery begins to separate from the arterial wall. The SSA considers the dissection not controlled when you have persistence of chest pain due to the progression of the dissection, an increase in the size of the aneurysm, or compression of one or more branches of the aorta supplying the heart, kidneys, brain, or other organs.
Obviously, Marfan syndrome in its severe form creates disabling impairments, particularly in the heart. If you have treatment and diagnosis for this impairment, please contact Cannon Disability Law. We can help you apply for and win disability benefits.
What happens if you don’t meet or equal one of SSA’s listings? Can you still win disability benefits, even if you don’t meet listing 4.02? The answer is yes. But, only if your Marfan syndrome effects your residual functional capacity (RFC).
Your RFC is what you can physically do after taking into account all of your impairments. Your RFC determines your work capability. The categories of work are sedentary, light, medium, heavy, and very heavy. Each level of work has a specific definition. Sedentary exertional demands are less than light work demands, which are, in turn, less than medium. The SSA typically uses three definitions of work: sedentary, light, and medium. These categories will be the most likely be the work categories that the SSA will use to determine if you can work at your old job or adjust to other work.
At the lower levels of you disability claim, a Disability Determination Services (DDS) physician will identify how your limitations prevent you from working. In other words, the DDS physician will outline your residual functional capacity by looking at your medical records. Find out more here about the importance of medical records in your disability case.
You also have the option to have a Residual Functional Capacity form filled out by your treating doctor. Your treating doctor knows more than anyone about your disability and the impact it is having on your ability to work. The SSA will consider your doctor’s opinion when determining whether you are eligible to receive benefits. Overall, having your doctor’s state that your Marfan’s syndrome disables you increases the chances of your benefits being approved.
It can be difficult to prove to the SSA that your Marfan symptoms prevent you from working. However, Cannon Disability Law can help you win your Social Security disability benefits. We are happy to answer your questions and help you file your application for disability benefits. Contacting us and talking to us about your case is free.
We will not charge you for a consultation. Likewise, we will not charge you an attorney fee unless we win your case. If we do not win your case, you will not pay an attorney fee. There are costs to every claim and the client pays those costs. However, costs are minimal and typically involve paying for a copy of your doctor’s medical records.
In the past 30 years, we have won over $100 million in ongoing and past-due due disability benefits for our clients. You want to hire an attorney with the experience to win your case. Also, you an SSD attorney to help you through the disability process. We have the experience you need to win your disability case. Additionally, we believe we are the best disability team to help you with your SSD case. Hire the best disability firm to help you apply for benefits and appeal your disability case. Contact us today.
Facebook Twitter LinkedIn
Contact Form Tab
Quick Contact Form
|
Quick Answer: Were there more than one Lazarus in the Bible?
Was there more than one Lazarus in the Bible?
The two biblical characters named “Lazarus” have sometimes been conflated historically, but are generally understood to be two separate people.
Is Lazarus and the rich man the same Lazarus?
Jesus then leaves and on the way to Mary and Martha Jesus tells his disciples the story of Luke 16:19 THE RICH MAN AND LAZARUS, a man with the identical name who was also ill who has also died. On Jesus arrival he finds Lazarus has been dead for 4 days.
How long did Lazarus live after resurrection?
Lazarus of Bethany, also known as Saint Lazarus, or Lazarus of the Four Days, venerated in the Eastern Orthodox Church as Righteous Lazarus, the Four-Days Dead, is the subject of a prominent sign of Jesus in the Gospel of John, in which Jesus restores him to life four days after his death.
Who was raised from the dead in the Bible?
THIS IS IMPORTANT: Who is Shadrach Meshach and Abednego in the Bible?
What did Lazarus say about heaven?
The most important truth about heaven in the story of Lazarus is not what he had to say afterward. It’s what Jesus said before he raised Lazarus from the dead: “I am the resurrection and the life. He who believes in me will live even though he dies; and whoever lives and believes in me will never die.
What is the significance of Jesus raising Lazarus?
The raising of Lazarus teaches us another lesson though. When God seems to be doing nothing, He may be doing more than you could ever imagine. Jesus had declared that Lazarus’ sickness was for the glory of God. Jesus knew God would be totally glorified in the situation at hand.
How many times did Jesus appear after his resurrection?
What were Jesus first two miracles?
The Miracles of Jesus
• The raising of the widow’s son.
• The feeding of the 5,000.
• The healing of a paralysed man.
• The stilling of the storm.
• The resurrection.
THIS IS IMPORTANT: Why the church was divided and keeps on dividing?
|
Principality of Turov and Pinsk
10th century–14th century
StatusPart of the Kievan Rus
Common languagesOld East Slavic
Eastern Orthodox Church
Prince of Turov
• 950-980
• Established
10th century
• Incorporation into the Grand Duchy of Lithuania
14th century
Preceded by
Succeeded by
Grand Duchy of Lithuania
The Principality of Turov, also called Principality of Turov and Pinsk (Belarusian: Турава-Пінскае княства, Russian: Турово-Пинское княжество, Ukrainian: Турово-Пінське князівство) or Turovian Rus',[1] was a medieval East Slavic principality and important subdivision of Kievan Rus' since the 10th century on the territory of modern southern Belarus and northern Ukraine. Princes of Turov often served as the Grand Princes of Rus early in 10th-11th centuries. The principality's capital was Turov (now called Turaŭ) and other important cities were Pinsk, Mazyr, Slutsk, Lutsk, Berestia, and Volodymyr.
Until the 12th century the principality was very closely associated with the principalities of Kiev and Volhynia. Later for a short period time until the Mongol invasion it enjoyed a wide degree of autonomy when it was annexed to the Kingdom of Galicia–Volhynia. In the 14th century it became part of the Grand Duchy of Lithuania, Ruthenia and Samogitia.
The Principality of Turov originated mainly from the Dregovich tribe and partially the Drevlyans. While circumstances of its creation are not clearly known, the Principality as mentioned in the Primary Chronicle existed in 980. According to the legend, the town of Turaŭ was founded around 950 (first mentioned in 980) by Varangian Prince Tur, a brother of Rogvolod (the first chronicled prince of Polatsk).[2]
Kiev Principality
During the times of Vladimir the Great (980 - 1015), the city of Turov and the immediate vicinity became part of Kievan Rus. Around 988, Vladimir appointed his eight-year-old son, Sviatopolk I of Kiev, to be knyaz of Turov. Later, Vladimir jailed Sviatopolk for plotting to rebel. Shortly before Vladimir died, Sviatopolk was freed and, upon Vladimir's death, seized the mantle of Grand Prince of Rus.
In a series of three battles during 1016-1018, Yaroslav the Wise overthrew his older brother, Svyatopolk, and became Grand Prince of Kievan Rus. About 1042 or 1043, Yaroslav married his eldest son, Izyaslav, to the sister of King Casimir I of Poland and appointed Izyaslav to be knyaz of Turov and Pinsk. In 1054, Izyaslav became Grand Prince of Rus, with a volatile reign.
In 1078 after Izyaslav's death, Isyaslav's brother and new Grand Prince, Vsevolod, appointed Izyaslav's eldest son, Yaropolk Izyaslavich to be knyaz of both Volhynia and Turov. In 1084, the Rostislavichi, rulers of neighboring Galicia (Halychyna), attempted to seize part of Yaropolk's realm, but Yaropolk and Vsevolod's son, Vladimir Monomakh, defeated the invaders. Yaropolk revolted briefly against Grand Prince Vsevolod, was reinstated, and was murdered in 1087 (likely by the Rostislavichi).
Opposition to Vladimir Monomakh
The Turov principality was passed to his younger brother Sviatopolk II who administered the land of Novgorod. When Svyatopolk became the Grand Prince of Rus, he passed the principality of Turov to his nephew and son of Yaropolk Vyacheslav. Later Svyatopolk gave Volodymyr-Volynskyi and Brest to his sons Yaroslav and Mstislav respectively. As the Grand Prince Svyatopolk also tried to conquer the rebellious Rostislvichi who established themselves well in the land of Halych. However, his attempts were rather unsuccessful. In 1100 the principality of Turov was passed to Yaroslav Svyatopolkovich who ruled both lands of Turov and Volhynia. During another conflict between the prince of Turov and the Grand Prince of Rus Yaroslav was eliminated out of his realm in 1118. The land of Turov then was passed to another son of Svyatopolk Bryachislav, while Volhynia was given to one of the sons of Vladimir Monomakh Roman.
The 1097 Council of Liubech modified the rota system such that the Principality became patrimonial land.
After the death of Bryachislav Vladimir, Monomakh gave the Turov principality to his Vyacheslav who kept it until the middle of the 12th century. Around the 1150s Turov belonged to the descendants of Yuri Dolgoruki Andrei and Boris. Finally in 1162 the principality was passed by Yuri Dolgoruki back to one of the Izyaslavichi Yury Yaroslavich, grandson of Svyatopolk II of Kiev, who gained full independence from Kievan Rus'. However, at the same time the Principality became more and more divided between several sons of the duke Yury. A semi-independent Principality of Pinsk was created. Along with the Principality of Smolensk, the army of Turau participated in the Battle of the Kalka River in 1223.
In the early 13th century the Principality of Turov became dependent of the Kingdom of Galicia–Volhynia. To liberate[clarification needed] itself from it, the dukes of Turov cooperated more and more with the Grand Duchy of Lithuania. In the early 14th century the Principality non-violently joined the Grand Duchy. By that time Hleb Narymunt, the son of Gediminas, was already ruler of Pinsk, while Turov and Haradok were still ruled by Rurikids. Later the territory of the Principality became part of Brest Litovsk, Nowogródek, and Minsk Voivodeships.
Regions of the Principality
Main article: Prince of Turov
Prince of Turov
Monomakh (of Smolensk)
Yuryevichi (Izyaslavichi's branch)
Prince of Pinsk
Yuryevichi (Izyaslavichi's branch)
Prince of Kletsk
Yuryevichi (Izyaslavichi's branch)
Prince of Slutsk-Kopyl
Prince of Dubrovytsia
1. ^ Jan Tyszkiewicz (2015): The stronghold in Sypniewo from the 10th–11th century (p. 295)
2. ^ Franklin, Simon; Shepard, Jonathan (2014). The Emergence of Rus 750-1200. Longman History of Russia. Routledge. ISBN 9781317872245. There arrived 'from overseas' a certain Rogvolod (Ragnvaldr in Old Norse). He installed himself on the Western Dvina at Polotsk, reportedly enjoying princely status. Likewise, Tur or Tury set himself up in a promontory fort by the Pripet, staying there long enough to leave his name on the place, Turov. It seems to have been a recent foundation, if not his own.
Bibliography and external links
Coordinates: 52°10′N 26°45′E / 52.167°N 26.750°E / 52.167; 26.750
|
What Does 64-bit OS Mean – Works, Pros & Cons
What does 64-bit OS mean? A 64-bit operating system is that which has the ability to process data at 64 bits as one single unit or memory cycle. This operating system is considered to be much better than 8, 16 or 32- bit operating systems.
Today, most of the desktop and laptop computers can support 64-bit operating systems and are therefore, called 64-bit machines. However, this does not mean that the 32-bit, 16-bit and 8-bit microprocessors are obsolete. In fact, there are countless of these manufactured each year.
Since a 64-bit operating system is designed to process 64 bits at a time, it means that a 64-bit operating system will not function when it is used in a 32-bit system. On the other hand however, a 32-bit operating system will perform in a 64-bit computer.
64-bit actually is the bit count, which is the smallest unit of information or data available on a computer. The 64-bit operating system processes or transmits this data in parallel.
This means that a single component in a data presentation will use these many number of bits while the data is being processed by the operating system.
Sometimes the term 64-bit may be used in combination with a microprocessor. When this is done, it implies the width of the registers. These registers are special storage areas that performs at a very high speed and are located within the CPU.
All 64-bit microprocessors and operating systems can process memory addresses and data that are characterized by 64 bits. This is a specific term that is more commonly applied to:
• Microprocessors to indicate the width of the registers
• Graphics devices such as digital cameras and scanners and
• Operating systems, when it refers to the number of bits used primarily to signify the memory addresses.
At this juncture, it is important to note that a 64-bit computer or an operating system does not mean it will be twice as fast as a 32-bit operating system.
In fact, for specific brands, the difference perceived in the performance of a 32-bit and a 64-bit operating system and computer may be negligible. It is not simple math but complex technology.
The term 64 bit represents the word size and it involves only one facet of the operating system and its internal processing. The entire functionality of the operating system will depend on other important components of the computer as well such as:
• The clock speed of the CPU
• The speed of storage units
• The type and specification of the RAM
• The I/O and
• The peripheral bus.
All these components will govern the throughput of the computer.
Read Also: What is a FireWire Port - Pros, Cons, Lifespan & Work Process
Ideally, a 64-bit operating system has the ability to deal with more memory and larger address bus of a 64-bit computer system as compared to its 32-bit counterpart. When you compare it with other operating systems and computers you will see that:
• The operation of a 32-bit operating system is restricted to 4 GB RAM
• A 9th generation 65-bit Intel i9 processor can handle up to 128 GB and
• A 3rd generation 64-bit Mac Pro will support 1.5 terabytes of RAM.
However, please note that all these comparisons are made on the basis of the RAM and not the storage of the different operating systems.
Windows operating systems typically comes in both these versions, 32-bit and 64-bit. The unique feature of a 64-bit Windows operating system is that it can also run a lot of 32-bit apps. Check out differences between 32-bit and 64-bit operating system.
What Does 64-bit OS Mean?
What does 64-bit OS mean
A 64-bit operating system handles 64 bits of data at a time and is intended to exploit a 64-bit hardware, especially the processor. A 64-bit computing is therefore, referred to a combination of a 64-bit operating system and a 64-bit processor.
There are actually two folders in a 64-bit operating system, especially that of Windows, the most popular OS as of now. These folders are:
• 32-bit location, which is indicated as C:\Program Files (x86) \ and
• 64-bit location, which is denoted as C:\Program Files\.
It can process 8 bytes of data simultaneously and the maximum addressable memory can extend up to hundreds of gigabytes for high-end work stations and hundreds of terabytes for high-end servers and mainframes.
However, there is no computer designed as of now that can support the maximum addressable memory of a 64-bit memory address register.
It is just the fact that the bigger computer servers led this transition in the operating system and in its architecture. This allows the 64-bit operating systems to access large amounts of memory.
As for the mobile devices and personal computers, a 64-bit architecture is helpful because it needs to transfer larger amount of data at a time with a single instruction. It helps in transmitting them faster.
Most of the modern operating systems are termed as 64-bit systems. For example, you will get both Windows Vista and Windows 7 in 64-bit version. You will also get the Snow Leopard of Mac as a 64-bit system.
This implies that the 64-bit systems are growing in popularity and usage and is out to replace the old 32-bit systems gradually. This is because:
• These modern operating systems have a much greater ability and more unique features that will help the users in accessing and managing the memory of the computer.
• These features also allow the 64-bit operating systems to run and handle more complex and intensive processes and at the same time run much faster than the 32-bit operating system.
Read Also: What to Look for When Buying a Laptop for College Student
If you want to have a better understanding of a 64-bit operating system then you should begin with the basic unit of measurement of computing data, which is called the bit.
Bit is the short form for the terms ‘binary digit.’ This is the simplest and smallest unit of data that a computer, or the processor in particular, can process. A bit can be either 0, or 1 only. This is because, at the simplest level, all computer data comprises of strings of 0s and 1s only.
The number of bits of the operating system or the computer indicates the word size that it can deal with at any given time.
If the word size or bit is larger, it means that the operating system can handle larger number of data that is represented in 0s and 1s. This further means that it will be able to handle more files that contain large number of data.
Apart from that, the features of the 64-bit operating system will enable it to access as much as 17.2 billion gigabytes of memory. This is a lot more RAM as compared to the 4 GB limit of a 32-bit system. Most of the hardware and software applications of today hardly needs that much of data to be handled.
Some of the key features of this operating system includes:
• It has 16 instead of 8 general purpose registers
• It has an additional SSE register
• It has an NX or no execute bit that helps it to prevent attacks resulting from a buffer overrun.
Therefore, it can be said that a 64-bit operating system is way ahead of the present times. Operating at a much faster speed than a 32-bit operating system, a 64-bit OS is future proofed for several years to come.
How Does It Work?
The 64-bit operating system will process 64 bits of information and data at a time. It will make the best use of its architecture to handle such a large amount of data and address a larger memory. The working process of this operating system is dependent on two specific components as follows:
• The operating system works on the basis of its larger width of the data bus. This helps it to address larger width of the data word.
• The processor also plays a significant role in its operation. This helps the operating system to retrieve the desired number of data in a single memory cycle.
However, the width of the address bus may not necessarily use the number of bits that uniquely defines the particular memory addresses. In fact, most of the 64-bit operating systems and computers can only address 48 bits.
Read Also: What is a PSU in a Computer - Voltages, Types & Functions
The Pros
1. Memory accessing ability
One of the most significant advantage of a 64-bit operating system is that it can access large amount of memory in a single memory cycle.
2. Better performance
It has better performing ability and is especially good for the new computers. It has a better and faster transfer rate which enhances its performance and provides it with the ability to access more data files.
3. Lot of support
The 64-bit operating system will provide a lot of support allowing you to do a lot of things at the same time. You will be able to use a RAM that is much more than 4 GB and therefore, boost the performance of the system.
You can open more than four tabs in Chrome, make videos, process a lot of data, track enormous amount of inventory, and hold all data in a larger memory.
4. Pointer types
A 64-bit system will have 64-bit pointer types. This will permit simulated address assortments that is much larger than 4 GB in size. In fact, it is 2^64 or 18,446,744,073,709,551,616 distinct addresses. This is called 16 Exabytes.
5. Native integer
You will also get a 64-bit native integer to use. This will make arithmetic or logical operations such as C’s much faster.
The Cons
6. Limited application
The 64-bit operating system will not support all applications. It will also not support an old 32-bit system. This will create a lot of confusion for the users if they use a 64-bit operating system in a 32-bit computer.
7. Limited functions
You will not be able to perform a few specific functions such as reading mails and watching videos smoothly using this operating system. For these types of activities, a 32-bit operating system is more suitable.
8. Run slower
The 64-bit operating system will run comparatively slower overall. This is because it will use more memory that will take up double the space due to the length of memory addresses and therefore the programs to use will have less memory available to operate.
9. Compatibility
In order to use a 64-bit operating system, you must have compatible hardware in your computer. This includes the processor and device drivers for all hardware in the computer that must be 64-bit themselves or else the operating system will not work.
A 64-bit operating system will help you to process large amount of data in quick time. Several applications will get the benefit of such big data usage.
|
Guinea Pig Not Pooping – What To Do?
Share on facebook
Share on google
Share on twitter
We know that guinea pigs, like other rodents, practice coprophagy or eating fecal matter – but do you know that the feces they eat contain much more Vitamins B and K and can be differentiated from their actual poop?
“How often do guinea pigs poop?”, ” How much do guinea pigs defecate?”, “Why do they eat their own feces?”, and “What do I do if my guinea pig gets constipated?”.
Let’s give answers to all of these questions as we go along in this article.
poop collector
A Little Bit on Cavy Anatomy
Animals too have a similar system as humans, except that cavies do not have a highly developed GI tract like ours. Their food particles pass from the small intestine through an organ called the caecum, where good bacteria process the partially digested food by breaking down cellulose into simple sugars.
The food particles – now called caecotrope – pass through the large intestine and then through the anus where it is expelled as caecal feces that are smaller, softer, and covered in greenish mucus compared to the real feces.
Caecal feces are high in nutrients such as Vitamin B, Vitamin K, and fiber – all byproducts of the anaerobic reaction; thanks to the good bacteria in the caecum.
Guinea pigs eat these caecal feces in order to absorb the nutrients. If a cavy is continuously prevented from reprocessing the caecal dung through coprophagy, the poor cavy will suffer malnutrition and even die.
Worse scenario aside from being unable to eat their caecum? Not being able to poop properly.
What, then, could cause your cavy to get constipated?
There are various causes of not being able to poop but one external cause is impaction, which affects the muscle walls of the anus and the 2 parts connected to it – the perineal sac which is larger and contains a couple of glands; and the rectum, where your guinea pig will expel all its caecal and fecal matter.
Perineal sacs in boars are bigger than those of sows. It is for this reason that fecal matter tends to collect in that area during impaction.
A Matter of Poop
Guinea pigs are grazers and thus, eat and drink anytime they are awake. This also means that their digestive system is always busy, which means that cavies poop every so often as long as they are awake. They even poop as frequent as 10 times in one hour, dropping about ¼ cup of poop or 30 pellets in a single shot.
If such is the case, then how come our guinea pig’s cage is not that messy enough that we can just spot clean it every day or every 2-4 days or do a general cleaning only once a week?
This is because guinea pigs reprocess their food. Not all of their feces, after all, are inedible turd. Additionally, cavies do not poop every hour. They can actually hold it in if they are doing other things like playing, training or exercising, or if they are unable to do so such as when they are being held.
This ability to hold their poop is actually part of their fight or flight response. In the wild, guinea pigs are hunted down by preying animals and thus, have developed a skittish nature as well as the tendency to poop a lot after a session of being handled.
guinea pig and poop
That C Problem
Once in a while, for some reason, your guinea pig will suddenly not poop for 6 hours straight. This often happens among older boars or male cavies but females can experience it too, but probably for a different reason.
There are two things that will help you easily identify that your cavy is having constipation – first, there is an absence of fecal matters in your piggy’s cage, and second, you may even notice your pet straining and exerting effort as if to do some toileting, but with no results.
There are various signs, symptoms, and indications that come along with your cavy’s constipation so it is best to examine carefully why your pet is unable to defecate while you make your plans for vet consultation.
There are two possible causes for your guinea pig’s toilet problem – bloat or gastrointestinal stasis, which is usually caused by dietary problems; or blockage, which could either be internal or external.
Gut Stasis
Guinea pigs must continuously graze on food to keep their digestive system working. Not being able to do it due to a series of stressful situations, tooth problems, and even being unable to successfully digest food due to lack of fiber and water or due to the presence of hard-to-digest food in their meal will cause their digestive system to get out of whack.
The unprocessed food, in return, will release gas in their digestive tract. On the other hand, undigested particles will block passages, thereby creating bloating or gastrointestinal stasis.
• Treatment: Gastrointestinal stasis can worsen rapidly and be fatal to your guinea pig which is why it is important to consult with a vet immediately. Vets will usually give motility drugs to induce movement and gas release.
Post-clinical home care may involve some gentle tummy rub as well as a makeshift vibrating pillow using a couple of electric toothbrush in addition to the prescribed medicine.
In cases when you have to wait for a vet visit or an appointment to take place, however, you may give emergency care by giving 100cc pellet slurry for every kilogram weight of your guinea pig. The treatment will be divided into 6-8 feedings round the clock, along with some hay, as well as small slices of no-pesticide, unpeeled apple, pear peels, and olive oil.
• Prevention: Constipation due to bloat is usually caused by 3 factors – first is low fiber or sugar-rich diet, often related to eating too much pellet and less fiber. Second is lack of water intake and third is eating of foods that are high in gas.
A proper diet for a guinea pig should have plenty of Timothy hay and fibrous foods like green leafy vegetables. However, avoid serving cavies veggies that release so much gas like bok choy, broccoli, cabbage, cauliflower, and grass that your cavy is not used to eating. Always give your guinea pig plenty of water and avoid letting it eat high-sugar food.
Impaction occurs when the poop gets stuck in the perineal sac. This often happens among mature boars compared to younger male cavies and sows. This is because their anus muscles tend to lose tone so the fecal matter gets stuck in the perineal area.
Add to that the stinky and sticky substance released by the two glands, plus all foreign objects like hay and small bits of wood shavings and debris stuck into their butt holes from all the bum rubbing these highly territorial males do to express dominance – and we have a recipe for impaction.
Impaction cannot be left untreated. It is not only unhealthy for your guinea pig and affects cavies’ food and nutrition; it can also be a potentially dangerous that can lure fatal diseases like fly strike.
• Treatment and Prevention: treatment of impacted bum can be done by us pet owners, although having the vet around is a plus since he/she will not only instruct or assist you in the impacted stool removal but will also prescribe vitamins for your mature boar.
While wearing rubber gloves, use warm water, olive oil or mineral oil to carefully soften the impacted poop.
You may use a syringe if you are confident with it. Otherwise, use a cotton swab instead. Gently coax the impacted feces while occasionally rinsing the perineal sac from time to time until all the nooks and crannies are free of gunk.
Cleaning impacted bum should be done at least twice a week or as needed to ensure that your piggy stays healthy. Additionally, rooming it with a younger same-sex cavy will keep it more active, which will help tone its muscles, making possible for it to have a cleaner butt.
Final Word
Do not wait for more than 24 hours for your turn in vet consultation if you confirm that your guinea pig has constipation. That “small” and “insignificant-looking” poopy matter may turn out to be a more serious medical condition like parasites, infection or even some surgery-inducing blockage.
Consult with your vet over the telephone, email or chat, for any emergency treatments before the appointed time.
Careful observation and quick thinking during this crucial period between reporting it to the vet and the actual appointment can help save your guinea pig – sometimes even your budget.
Carlye Yancey
Carlye Yancey
Leave a Reply
Close Menu
|
Definitions for "Observation"
Things or phenomena that are perceived through one or more of the basic five senses in their normal state. In addition, to be accepted as factual, the observations must be verifiable by other.
the collection of information through the use of the physical senses (sight, sound, touch, smell, and taste).
The use of the five senses to note a phenomenon.
The recognizing, noting and record ing of facts or occurrences, often involving measuring with instruments. [D03039] RMW
the noting and recording of facts and events.
The information so acquired; as, to record one's observations carefully.
A research technique in which no direct questions are asked, but people in a public place (e.g. shoppers and drivers) are watched and their behaviour recorded.
The noting carefully of people's emotions, physical characteristics, and voice and diction patterns from which characters are modeled.
An unobtrusive method for gathering information about how the program/initiative operates. Observations can be highly structured, with protocols for recording specific behaviors at specific times, or unstructured, taking a more casual “look-and-see” approach to understanding the day-to-day operation of the program. Data from observations are used to supplement interviews and surveys in order to complete the description of the program/initiative and to verify information gathered through other methods.
a provable, verifiable reality
noticing someone and judging his/her action in some way. As teachers, we observe our learners everyday, usually in an unstructured way. This is a type of assessment.
a remark expressing careful consideration
a general preliminary remark usually concerning assumptions underlying various arguments.
A data collection strategy in which the activities of subjects are visually examined. The observer attempts to keep his/her presence from interfering in or influencing any behaviors.
A non-verbal means of obtaining primary data as an alternative or complement to questioning.
a row in a SAS data set. An observation is a collection of data values associated with a single entity, such as a customer or state. Each observation contains one data value for each variable. See also variable.
The process used by a supervisor to evaluate a worker's ability to work according to the job description.
a description of what you see or perceive
a wonderful way for a parent to absorb the surroundings of a Montessori classroom
The data collection process to be used by the observer during the planned classroom visitations.
Keywords: feb, est
Feb 8, 11:55 AM EST
Keywords: phil, col, psalm, verse, bible
This is the first step in Inductive Bible Study. This is the step where the reader takes the time to really see what the passage says. Dates and Verses Date: Verse: 6.15 Col 1:15-20 6.22 Romans 12:1-2 6.29 Phil 2:5-11 7.6 Phil 1:20-25 7.13 Psalm 25:4-5 7.20 Romans 8:1-5 7.27 Hebrews 4:14-16
Keywords: ogive, omnibus, offline, poll, odds
Odds | Offline | Ogive (in time chart) | Omnibus (survey) | Online | Open Source | Open Space Technology | Open-ended | Operating system | Opinion poll
Watching something and taking note of anything it does. For instance, you might observe a bird flying by watching it closely.
An individual or event is watched for a specified length of time.
the act of observing; taking a patient look
looking at things to find how they look.
Observation means looking at people and listening to them talk. One can infer the meaning, characteristics, motivations, feelings and intentions of others on the basis of observations (Kerlinger, 1986).
A single new case of cancer, cancer death or hospital separation.
Performance of what is prescribed; adherence in practice; observance.
A practice, while not in strict violation of EMS requirements, may constitute a poor practice that can lead to a nonconformance
An instructional strategy for developing co-operation and observation skills. Students form pairs, facing each other. Each observes the appearance of the other. Student A turns away while student B changes something about her or his appearance. Student A turns back and tries to determine what the change was. An observation strategy can also be used as a listening activity, in which student B changes something about a known song; or a dance exploration activity, in which student B changes a step or one of the elements of movement.
a requirement for renal dialysis technology students
A systematic plan for gathering useful pieces of information about students. This can include what a student does or does not know and/or can or cannot do. This information in turn makes it possible to plan ways to encourage students' strengths and work on weaknesses.
Keywords: dataset, pipeline, processing
a dataset processing through the pipeline
A sensor reading from a Device, such as current, pressure, temperature, valve state or voltage. Observations are represented in Livingstone as Observation Variable
an uninterpreted instance of a characteristic obtained by applying a single instrument to a single modeling technique
A component of an observing script for a particular purpose; typically just pointing at a source, but maybe an on/off, a pointing determination, a line of a mosaic, or what have you.
The most common of the seven modes. Its positive pole is clarity; its negative pole is surveillance. In observation mode, one releases one's energy neutrally.
Sometimes it is necessary for the assessor to observe a candidate at work in order to generate an observation report for inclusion in their portfolio (as a demonstration of good customer relationship skills for example.)
'Check box' comments used to describe deficiencies or the general condition of the components.
Keywords: offset, otherwise, oppose, over
offset oppose otherwise over
a complete statement of one thought that is true according to the text
Keywords: weather, see
See weather observation.
Keywords: row, see
See row.
Keywords: one
what one has seen or noted
|
RhoGAM; What You Should Know
Generic Name: RHo (D) immune globulin
What is RhoGAM
RHo (D) immune globulin (RhoGAM) is a sterilized solution containing IgG anti-D (anti-Rh)
obtained from human blood. It is a medication used to prevent Rh isoimmunization in mothers who are Rh negative. Rh is a substance that occurs naturally in the blood of most people. Such group are said to be Rh positive. But in some people, Rh is absent (Rh negative). Rh is the abbreviation for rhesus, which
is the name of one of many different blood group systems in the body. Rh-positive people have
the Rh antigen (also called rhesus factor or D antigen) on the surface of their red blood cells Rh-negative people do not have the Rh antigen on the surface of their red blood cells.
When a Rh negative mother is pregnant with a Rhesus positive child, the mother’s Rh negative blood sees the Rh positive child blood as a foreign body, thereby producing antibodies against it.
Rhesus incompatibility can be a cause of recurrent miscarriages and intrauterine fetal death in some women.
How does it work?
RhoGAM is an immune globulin used to prevent an immune response by the Rh negative mother
to the Rh positive child. It helps prevent the production of antibodies (Rh-sensitization). Rh-sensitization of the mother during pregnancy can lead to hemolytic disease of the fetus and newborn (HDFN) in future pregnancies. When administered, it prevents the Rh-negative expectant mother from making antibodies during pregnancy that could cause HDFN in future pregnancies.
When to use RhoGAM
RhoGAM is indicated for the prevention of Rh-sensitization in the following situations:
• During pregnancy in Rh-negative women unless the father or baby are proven to be Rh-negative
• In cases of suspected or proven fetal-maternal hemorrhage during pregnancy (instances in which the baby’s blood enters the mother’s bloodstream)
• Actual or threatened pregnancy loss at any stage of pregnancy
• Ectopic pregnancy/ruptured ectopic pregnancy
• Miscarriage/abortion
• Prenatal testing like Chorionic Villus Sampling(CVS), amniocentesis, fetal blood sampling, cordocentesis, and fetal biopsy.
• In any Rh-negative person after the incompatible transfusion of Rh-positive blood or blood products
Other indications include:
o Immune thrombocytopenia purpurea (Nonsplenectomized Rh0(D)-Positive patients)
o Incompatible transfusion
How is it given?
It is administered as intravenous (I.V) or intramuscular (I.M) injection.
To prevent immune response leading to hemolytic disease in fetus and newborn, RhoGAM is
Antepartum(during pregnancy): 1500 IU at 28 – 30 weeks of gestation.
Postpartum(after delivery): 1500 IU within 72 hours of delivery. If unable to administer within 72 hours, givewithin 28 days.
Administering both antepartum and postpartum doses reduces the risk of immune responses
by over 97 percent.
In obstetric conditions such as miscarriage or abortion involving a Rh negative woman and
Rhesus positive fetus, RhoGAM should be administered at a dose of 1500 IU within 72 hours.
Side effects of RhoGAM
Most common are:
o Injection site reactions that include swelling, induration, redness and mild pain or warmth.
o Systemic reactions that include nausea, diarrhea, vomiting, stomach pain, skin rash, body
aches or a slight elevation in temperature, flushing (warmth, redness, or tingly feeling).
Patients should be observed for at least 20 minutes after administration. Severe systemic allergic
reactions are extremely rare.
Who should not use RhoGAM
• People known to be hypersensitive to immune globulins
• Rh positive women
• Rh negative women who are Rh immunized
• Newborn
RhoGAM should be administered only in a healthcare facility under the supervision of medical
expert where laboratory and other monitoring can be done.
Cost and where to get RhoGAM
Availability, accessibility and affordability are crucial aspects of pharmacotherapy.
RhoGAM is available in every state in Nigeria in health facilities including Government tertiary
hospitals, some private specialist hospitals and some community pharmacies.
The cost of RhoGAM vary slightly from one facility to the other. Drug revolving fund, national
health insurance scheme, brand of the drug, are some of the factors that affect the cost of the
Some facilities you are sure to get RhoGAM and price include;
• University of Benin Teaching Hospital, Benin City, Edo State N39, 400
• Airen Pharmacy, Sapele Road, Benin-city~ N36,000
• Flowell Pharmacy, Sapele Road, Benin-city~ N37,000
• Overflow Pharmacy, Hospital Road, Tori, Warri, Delta state~ N39,000
• Irrua Specialist Teaching Hospital, Irrua, Edo State N33, 300
• Nnamdi Azikiwe University Teaching Hospital, Nnewi, Anambra State- N26,500
• Georgie Pharmacy, ZIK Avenue, Awka, Anambra State N35, 000
• University College Hospital, Ibadan, Oyo State N28, 600
• KLEN Pharmacy, Utako, Abuja N38, 000
• PRIME Pharmacy, Area 11, Garki, Abuja N37, 000
• Alpha Pharmacy in Ikeja, Lagos State~ N37,500
• Dangi Pharmacy, Gyadi Gyadi, Kano~ N35,000
• Maneks Pharmacy, 8, Kakuri Bus Stop, By Makera Road, Kakuri, Kaduna South~N36,500
This drug is a life saver
Credit: pharm.com.ng
Written by AIGBAGENODE Aiyebor Augustine (B.Pharm, Pharm.D)
Public Health Pharmacist
Please enter your comment!
Please enter your name here
|
Wage Gap An Essay That Discusses The Wage Gap, What It Is, And Why We Need To Get Rid Of It Honors 10 World Lit Essay
1194 words - 5 pages
The world is constantly evolving, changing, growing, learning, yet somehow we continue to cling onto so called “traditional views”. No matter how many years go by, no matter how many laws are passed, women are still viewed as less. It doesn’t matter what women achieve or what they do. There are examples of this all around, even in the year 2018. One such example is the wage gap. Wikipedia defines the gender wage gap as “average difference between the remuneration for men and women who are working”. In simpler words, women are paid less for the same job. They put in the same time but receive less money for their efforts. This is a breach of equality that society is constantly trying to achieve. For the same job all genders should be paid the same amount of money.
Work by a women should not be devalued;however, this is not the case in our society. Studies show that an excess of women in a field lowers its value. When a field is dominated by men and women take over, the pay in said field lowers noticeably. Paula England, a sociology professor, stated that “Once a woman starts doing a job it just doesn't look like it's important to the bottom line or require as much skill”. She says that “Gender bias sneaks into those decisions”. Paula England is the co-author of one of the most important studies regarding this topic. In her study she used US census data from the 1950s to 2000s, a time period in which the share of women in many jobs increased. In her study she found that when a great percentage of women went into an occupation, the jobs began paying less. In this study, Paula found that there was considerable amount of evidence that employers value the work of women as less. One striking example is in the field of recreation, such as working in parks or leading camps. This field went from primarily males to females from the 1950s to the 2000s. Because of this change the median hourly wage decreased by 57 percentage points. Other examples of this include industries like designers, where wages fell 34 percentage points, housekeepers, where wages fell 21 percentage points, and biologists, where wages fell 18 percentage points. The reverse is true for men. Once they went into a field, the value of it increased. In computer engineering, once the number of men outnumbered the number of women the average pay increased. In fields where men are the majority, the average weekly pay is 962 $ a week, 21% more than of fields in which women are the majority. Through looking at research it is evident that value of the fields that women work in is less.
One of the traditional beliefs that has developed this wage gap is the idea that men run the household and therefore should be paid more. The role of males in our society is still viewed as dominant, but the fact is that this is no longer true. Society has changed drastically in the past 100 years. Where it was once scandalous for a women to be living on her own, it is now completely normal. In fact many women e...
2493 words - 10 pages history as some companies have tried to focus their hiring efforts solely on males as it is believed that men will save them money on working time arrangements as opposed to women.. Even through history as women contribute more to labor market, human capital investment, and obtain higher levels of education within any industry, they are still facing a wage gap. Biology: The “Motherhood Penalty” One major reason contributing to the ongoing gender wage
Canadians aim for closing wage gap - Centennial - essay
2386 words - 10 pages you can see, the result was a split decision. I get it. It's complicated. But what does most of the research say? Ask a liberal economist, and they'll likely point to a 2009 study of studies by Hristos Doucoullagos and T.D. Stanley that pooled together the results of 61 different research papers published over the decades. When averaged together, the results suggested that raising the minimum wage had close to zero impact on employment. An
822 words - 4 pages the death penalty is the idea of an eye for an eye. This is morally wrong. If we are against killing but kill a murderer, then we are murders and by that logic, we should be killed. It simply does not make sense, or in the words of Holly Near, “Why do we kill people who are killing people to show that killing is wrong?” This is not the only reason why the death penalty is hypocritical, however. The death penalty is hardly used outside of the USA
gap year and experience during that time - chaminade madonna - essay
479 words - 2 pages mean Comment by Tara Weinberg: reword Comment by Tara Weinberg: delete Comment by Tara Weinberg: explain this Comment by Tara Weinberg: make this clearer. Comment by Tara Weinberg: run-on In the nutshell, I would claim that if you are an adventurous, travelling person, then a gap year might suit you. However, if you are well-planned person and can be easily get disappointed about the consequences, then a gap year is not for you. Comment by Tara Weinberg: a Comment by Tara Weinberg: explain clearly what this means
1096 words - 5 pages considered ‘bad’. We as humans require nurture in order to keep our individuality and our morals, as without them all anarchy would break loose, destroying every aspect of what we view now as ‘good’, destroying civilization itself and society with it. Without nurture our morals that condition the way we think, respond and act and without it there is no way of defining whether an individual is ‘good’ or ‘bad’. Nurture is a humans way of learning from its
Should the Minimum Wage be raised? - WGTC ENG1101 - Essay
480 words - 2 pages would enroll in a college to get a higher paying job. This would be a step backwards for our country. If the minimum wage were increased in the United States, the outcome would be catastrophic. It would impact Americans throughout the United States, eliminate jobs, and make people less likely to train for high-skilled jobs. Increasing the minimum wage would be a bad decision for the United States. The only way to avoid all of these consequences is to leave the minimum wage at its current level. Works Cited “Four Reasons Not to Raise the Minimum Wage.” https://object.cato.org/sites/cato.org/files/four_reasons_not_to_raise_the_minimum_wage.pdf. Accessed 15 Nov. 2017.
Essay Explaining Why We Need the Everglades - Class - Research
484 words - 2 pages tremendous asset to the sunshine state. So why is the Everglades in need of protection and what is being done to improve one of America’s most exciting natural resources? The health of the Everglades is a major concern, and efforts to protect and conserve this unique environment are ongoing. Why have the wetlands suffered over the years? Draining and development dates back to the early 1900’s and many projects designed to alter the Everglades went
2891 words - 12 pages Free from experiencing a freedom from the text once finished, and therefore brands the novel great not only as a form of entertainment, but intellectually- therefore completely contradicting the repeated beliefs of the aristocracy in the text. “We live in an age when men treat art as if it were meant to be a form of autobiography. We have lost the abstract sense of beauty." “that is one of the great secrets of life—to cure the soul by means of the
why 'closing the gap' in death age between aboriginals/torres straight people and convicts/etc - staughton college, year 8 SEAL - persuasive essay
1080 words - 5 pages Free and friends die… Interesting. Yeah, nah. If you ask me and countless other people, they will all tell you this is simply not the truth. Closing the gap is not getting enough support, or action, for it to be able to achieve any real success. We, as a nation, need to stand up and take responsibility before these issues get any worse. There are many actions you can take to decrease deaths in indigenous children, to close the life expectancy gap
|
Self‐folding 3-D photosensitive graphene architectures
Self‐folding 3-D photosensitive graphene architectures
Mechanism and versatility of self‐folding SU8 films. a) Self‐folding SU8 bilayer where the SU8 bottom layer is fully cross‐linked and the top SU8 layer is partially cross‐linked. The SU8 bilayer film folds upward on the solvent exchange between acetone and water. b) Self‐folding SU8 with low UV dose gradient cross‐link density across the single SU8 film. The SU8 film folds downward on the solvent exchange between acetone and water. The bilayer SU8 beams’ total thicknesses were, c) 20 μm, and d) 10 μm, and UVr = 0.5. Controlled folding of bilayer SU8 stars, e) UVr = 0.8, the thickness was 10 μm. f) UVr = 0.5, the thickness was 10 μm. g) UVr = 0.5, the thickness was 5 μm. h) SU8 ribbons folded into i) helices, and j) an SU8 star folded into k) a square pyramid using the gradient method. Scale bars are, c–g) 500 μm, h,i) 800 μm, and j,k) 300 μm. Credit: Advanced Intelligent Systems, doi: 10.1002/aisy.202000195
Stimuli-responsive, self-folding, two-dimensional (2-D) layered materials have interesting functions for flexible electronics, wearables, biosensors, and photonics applications. However, limits with scalability and a lack of design tools can prevent high integration and their reliable function. In a new report now published on Advanced Intelligent Systems, Qi Huang, and a team of scientists in chemical and biomolecular engineering and electrical and computer engineering at Johns Hopkins University, U.S., proposed a mass-production strategy to create monolayer graphene-based reversible self-folding structures. The material can be used in microfluidics and micromechanical systems. As proof of concept, they achieved complex and functional devices in the form of rings, polyhedra, flowers and origami birds. They then integrated gold electrodes to the constructs to improve their detection sensitivity. The experiments suggest a comprehensive framework to rationally design and fabricate scalable and complex, 3-D, self-folding optical and electronic devices by folding 2-D monolayer graphene.
Developing 3-D microstructures from 2-D precursors
The development of 3-D integrated microstructures from wafer-scale, 2-D precursors can be useful across a variety of fields including optics, electronics, robotics and biomedical engineering. However, it is yet difficult to realize on-chip or free-standing and reversible 2-D layered material-based hybrid devices. In this work, Huang et al. investigated the folding mechanics of differentially cross-linked SU8—i.e., an epoxy-based ultraviolet (UV) cross-linkable, negative photoresist based on a commercial resin, and the interaction of light with flexible graphene-gold (Au)-SU8 3-D microstructures. The team used experiments and simulations to introduce several new ideas and demonstrated the SU8 graphene microstructures. They varied the extent of SU8 crosslinking by tuning the UV dose to develop a physics-based, coarse-grained model that encompassed the effect of UV light for material mechanics and volume changes. They then used the approach to provide example 3-D shapes including origami birds. The method also included multilayer very-large-scale integration (VLSI) computational approaches. The method allowed simple connections with electrodes and other electronic, optical or microfluidic modules. The studies displayed 3-D graphene hybrid functional devices suitable for robotics, wearables and photonics.
Self‐folding 3-D photosensitive graphene architectures
Mechanics design framework for self‐folding microstructures. a) Plot of the elastic modulus (E) versus exposure intensity (I0) for SU8. Individual points are measured values and the straight line indicates a theoretical fit to these points and the modulus value at the threshold exposure from the SU8 datasheet. b) A plot of the averaged ROC for a bilayer rectangular SU8 beam with dimensions 250 × 500 μm, as a function of the thickness (t) and exposure intensity (I0) of the top layer. The red indicates the bottom SU8 layer (fully exposed to UV with 240 mJ cm−2), and the blue layer is the top SU8 layer (exposed to UV with I0). c) A plot of the ROC for a gradient cross‐linked rectangular SU8 beam with dimensions 250 × 500 μm, as a function of exposure intensity (I0) of the top layer (color in red with energy of I0) and gradient intensity decreasing along the thickness given by (
Rationally designing 3-D self‐folding SU8 structures
Huang et al. tested two methods to allow reversible folding of differentially cross-linked SU8 films including bilayer and gradient methods. For both versions, they first deposited a 50 nm thick thermally evaporated copper sacrificial layer on a wafer or glass slide. During the bilayer method, they patterned SU8 bilayer films with a fully cross-linked bottom layer and a partially crosslinked top layer using photolithography to facilitate bending away from the wafer. They then spin-coated the SU8 layers on to the material and conditioned the bilayer patterns by immersing them in acetone to create self-folding precursors. The conditioned structures could reversibly fold and unfold on solvent transfer from acetone to water. By varying the thickness of the pattern, they assembled curved beams with different radii and a variety of 3-D shapes. The team also varied the dose of UV exposure ratio to increase the extent of pattern folding. They noted how different fold angles could be achieved by varying the thickness and extent of cross-linking. The work provided the design criteria required to achieve controlled bending and geometries for SU8 microstructures. The simulations were accurate reproductions of the experimental folding shapes.
Converting graphene into 3-D shapes based on the self-folding SU8 structures
The self-folding structures could importantly support the transformation of flat monolayer graphene into 3-D shapes. This integration process included a few key steps. At first, the team transferred the monolayer graphene grown using chemical vapor deposition from a copper-coated wafer to the sacrificial copper-coated silicon substrate by using the polymethyl methacrylate (PMMA) method. Then using Raman spectra, Huang et al. noted the peaks corresponding to deposited on SU8 as expected. Thereafter, they patterned graphene via photolithography and plasma etching, and realized self-rolling of graphene-SU8 structures with reversible rolling/unrolling in water and acetone. This integration process of self-rolling graphene-SU8 occurred on a wafer scale, facilitating the inclusion of other elements including gold lines or patterns, to form functional electronic or optical devices.
Self‐folding 3-D photosensitive graphene architectures
Schematic illustration of the fabrication process for free‐standing and 3D self‐folded graphene–Au–SU8 beams. a) Fabrication process flow. b) Self‐folding and unfolding process on solvent transfer between water and acetone. c) Image of a flat graphene–Au–SU8 beam, and d) a self‐folded graphene–Au–SU8 roll. e) Side‐view scanning electron microscope (SEM) image of the self‐folded beam. Scale bars are c,d) 800 μm, and e) 200 μm. Credit: Advanced Intelligent Systems, doi: 10.1002/aisy.202000195
Developing ultrathin shape-changing smart materials.
Materials scientists typically study graphene for its electronic and optical applications based on unique physical characteristics, high mechanical strength, and stability of the material. Due to its characteristic properties of optoelectronics, the high charge carrier mobility of graphene at ambient temperatures revealed potential applications in high-frequency and high-speed devices. Nevertheless, light absorption and light-matter interaction of graphene is low for atomically thin planar graphene-based devices. Huang et al. therefore leveraged the optical transparency of SU8 to develop 3-D self-folding graphene-based optical devices to form flexible optical devices and wearables. They created multi-rolled 3-D graphene structures to overcome the limits of poor absorptivity of single-layer graphene. The scientists then used a flat graphene-gold-SU8 photodetector and tested the substrate by illuminating each gold electrode with a 488 nm laser. The photovoltage was larger when the laser illumination was directly incident on the graphene side compared to the SU8 side. The reduced illumination resulted from absorption of light in the SU8 film. The photovoltage generated in the work mainly resulted from the gold and graphene overlapping area.
Forming chip-integrated 3-D grapahene-SU8 structures and photodetectors
As proof of concept, Huang et al. developed complex origami-inspired designs and chip-integrated structures. To assemble them, they patterned the copper and graphene and controlled the UV exposure in specific regions to selectively fold the SU8 microstructure, while other parts remained pinned down flat. Such complex structures will be important for soft robotics with a graphene-gold interface for remote optical energy harvesting applications. The on-chip assembled designs are also important in optoelectronics, which Huang et al. illustrated using angle-resolved photodetectors with a self-folded SU8 graphene photodetector array. Using light illumination, they showed different photoresponses based on the angle of the laser and the material's architecture. The team also used simulations to determine the angle-resolved response.
Self‐folding 3-D photosensitive graphene architectures
Photoresponse of free‐standing graphene–Au–SU8 self‐folded beams. a) A plot of the photovoltage as the laser spot was scanned across the lateral direction of the flat graphene–Au–SU8 beam, and the solid line is a guide to the eyes. Open‐circuit photovoltage measured in the b) flat, and c) self‐folded Au–graphene–SU8 beam, when the laser power was varied from 1 to 5 mW irradiated on one electrode with different exposure times. d) Comparison of the photoresponse between the 3D self‐rolled graphene–Au–SU8 and the flat graphene–Au–SU8 beam. Credit: Advanced Intelligent Systems, doi: 10.1002/aisy.202000195
In this way, Qi Huang and colleagues developed a highly parallel process to assemble 3-D flexible graphene microstructures. The method has three key advantages to offer,
1. Free-standing materials and chip-integration
2. Highly parallel integration of flexible and transparent 3-D devices, and
3. Reversible reconfiguration.
Self‐folding 3-D photosensitive graphene architectures
Chip‐integrated graphene–Au–SU8 3D self‐folded microstructures and photodetection. a) Schematic of the process flow. Optical and SEM images of the self‐folding of a graphene–Au–SU8 origami bird from, b) flat into c) its 3D shape. Optical and SEM images of the self‐folding of a graphene–Au–SU8 flower from, d) flat into e) its 3D shape. f) Schematic of self‐folded 3D graphene–Au–SU8 arrays on‐chip. g) SEM image of the self‐folded graphene–Au–SU8 array. h) Optical image of the measurement set‐up. i) Schematic of the angular‐dependent photoresponse measurement for the chip‐integrated graphene–Au–SU8 3D self‐folded photodetector. j) Angular‐dependent photovoltage response of a single graphene–Au–SU8 3D self‐folded photodetector. (0°, 30°, and 60°). k) COMSOL simulation of the variation of light absorption as a function of incident angles. Scale bars are b–e) 500 μm and g) 200 μm. Credit: Advanced Intelligent Systems, doi: 10.1002/aisy.202000195
The optically transparent photoresist can be spin-coated and maintained with relative flexibility. The structures were stable in air and can form better lightweight alternatives to silicon-based modules for integration in flying and swimming robots. The primary basis of the self-folding mechanism relied on chemical-solvent driven differential swelling to faciliate folding/unfolding motions. The team expect to use this approach to create a range of 3-D microstructures for wearables, moving robots, in biosensors and in energy harvesting devices.
Explore further
Staying ahead of the curve with 3-D curved graphene
More information: Huang Q. et al. Solvent Responsive Self‐Folding of 3D Photosensitive Graphene Architectures, Advanced Intelligent Systems, doi: doi.org/10.1002/aisy.202000195
Freitag M. et al. Photoconductivity of biased graphene, Nature Photonics, doi: doi.org/10.1038/nphoton.2012.314
Koppens F. H. L. et al. Photodetectors based on graphene, other two-dimensional materials and hybrid systems, Nature Nanotechnology, doi.org/10.1038/nnano.2014.215
© 2021 Science X Network
Citation: Self‐folding 3-D photosensitive graphene architectures (2021, January 11) retrieved 29 January 2022 from https://phys.org/news/2021-01-selffolding-d-photosensitive-graphene-architectures.html
Feedback to editors
|
A Comprehensive Dictionary of the World (Thomas Wright; Mittal Publications, India)
From Termhotel.com
a comprehensive dictionary of the world thomas wright 2.jpg
In our times English language is perhaps the world’s most widely spoken and written language. It would not be an exaggeration to say that this has been the lingua franca of the world. This miracle has taken place not due to any compulsion or force but largely due to the beauty and flexibility of English language itself. This sounds almost a wonder that is language which for reason of spellings and pronunciation sounded ugly and unintelligible only four or five centuries ago, today possesses one of the richest literatures of the world and is eagerly learnt and taught all over the world. A Comprehensive Dictionary of the World (in 10 volumes) starts with Introduction and a brilliantly written preliminary chapter containing Editor’s penetrating observation on the history and development of English language. It enlarges and enriches the knowledge of readers about the growth of English language. It provides an encyclopaedic information about English words arranged alphabetically which make it an extraordinary Dictionary of English and a reference book of inestimable value, combining the various advantages of a voluminous encyclopaedia of knowledge. It contains concise articles adapted to the advanced state of science and art with accurate definitions and pronunciations of the various terms in modern usage. It attempts to provide a comprehensive geographical, biographical and historical dictionary by giving brief sketches of individuals who occupy a place of pride in history, literature and science. Besides it is complete literary, classical, scientific and technological exposition of English language. The geographical part is illustrated by a series of new maps by Surveys ordered by the governments of the countries concerned, thereby making them most complete and authentic atlases ever published. A veritable magnum opus, it will occupy a place of pride in all libraries of the world and will prove a priceless acquisition to scholars and institutions which aspire to enlarge the frontiers of knowledge.
|
The Difference: What does ~ look like? Vs. How does ~ look?
Let’s compare these questions:
• What does she look like?
• How does she look?
There is a small difference in meaning between these two questions. I will try to explain.
1. The question “What does she look like?” asks for a physical description or a comparison to another noun.
• A: What does she look like?
• B: She is tall and has brown hair. (This is a physical description.)
• C: She looks like a model. (This is a comparison to another noun.)
2. The question “How does she look?” asks for a personal judgment (or evaluation), such as ‘good’ or ‘bad’.
• A: How does she look?
• B: She looks great. (This is a judgment of how she looks; it isn’t a description.)
• C: She also looks happy. (Again, this is a judgment, not a description.)
Let’s talk about this animal.
A reddish fox sitting atop a tree stump.
• Q: What does it look like?
• A: It looks like a fox. (noun) It has orangeish hair. (description)
• Q: How does it look?
• A: It looks relaxed. (a judgment)
Common Mistake: How does it look like?
• What does he look like? (correct)
• How does he look? (correct)
• How does he look like? (mistake)
The last sentence above is never correct. You cannot combine “How” with “like”.
I hope you have found this helpful. If you have any questions or find a mistake, please leave a comment below.
– Written by Matthew Barton / Creator of (copyright)
Leave a Reply
Your email address will not be published.
|
Chain Management
The world that we live in is one that is characterized by a lot of instability due to a variety of factors. These factors have influenced completely how people relate amongst themselves as workers and other people of different cultures. Technology, on the other hand, has continued to shape the way people communicate, work, live and even travel. It is on this note that we explore the contribution of certain theories of organizational change management in the modern management setting. An organization is a system that should be run in a particular manner depending on the decisions that have been made by the management (Hayes, 23). Such decisions frequently incorporate the interest of the shareholders, managers, employees and other stakeholders in a bid to ensure that the firm remains relevant.
Based on the above content, there is the aspect of change as discussed by Andrew Sturdy and Christopher Grey with regards to how to handle organizational change management. It has been determined that organizational change may be the most widely embraced term in most global companies yet there has been little impact on these companies with regards to evolution. There are often questions that have been asked with regards to the extent of change in these organizations considering that a company is faced with a lot of factors that are both internal and external that may hinder the company to thrive. A good example is a factor such as technology which is dynamic and can affect an organization in most aspects. Globalization is another phenomenon that organizations have been forced to embrace their effects in a bid to make sure they catch up with the impacts (Hayes, 50).
Organizational change framework insists that change does not just happen within an organization and that there have to be proper structures put in place with regards to handling these changes. Continuous improvement is essential for every organization for progress to be seen. Amidst all these happenings, an organization has to take into consideration the need to continue satisfying the consumer needs more profoundly. Ideally, change management within an organization requires a strategic relationship between the organization and the factors that influence change within the organization, as depicted in the document a. An organization during the process of change has to undergo one or more essential characteristic change (Cameron, 46). In the sense that the order in which a company used to handle its operation or otherwise the management structure has changed. These instances require that the organization undergo specific significant changes in general. The process that follows is that the management team has to lead in the process of evolution by either influencing or creating these policies.
The Change Control Process
Executing the task without proper reference can result in a tumultuous outcome. The concept requires an evaluation of the types of changes to be allowed within the management. In this section, cognitive analysis of the shift or aspect ascertains the manager an easier time in specializing the instance to required given segments. Workflow generates sluggishness when an unfamiliar adjustment is presented to a workplace. To implement a concrete structure that might shift the workflow, one needs to analyze the weak point area in the chain of work to depict an effective strategy. Requesting change requires an organized procedure, with the aim of attaining success within the change management plan. Such concept is ascertained by usage of intermediary platforms such as internal memos, organization’s email addresses and use of power structure in terms of announcements (Cameron, 15). The platforms penetrate across the entire work team and create a space for feedback and adjustments. Formats portray an act of structural, whereby the senior officials give guidance on how specialization will occur and distribution of workforce to extended sections. The review then follows, with a substantial amount of feedback and criticism from working individuals. Changes will be approved depending on the type of format one uses to implement the adjustments. However, encountering rejection only means that the change management plan lacked credibility and not the failure of the organization’s flexibility.
Values and priorities covered in chain management fluctuate depending on the impact imposed on the subject. The delivery period form stakeholders ascertain the approval for continuing with the plan, based on the deliverables and the variables are chosen. Requesting the change comes from ideas whereby the creative aspect of the case is dependable on the discretionary elements. On the other hand, reducing discretionary aspects shifts value and priority considerations, with the aim of avoiding unwanted risks. The priorities set on a change will be in conjunction with the value attained through observation of the format imposed, as highlighted in document b. The executives are followed with keen interest, and the perceptions suggested by stakeholders are taken with enthusiasm. The managerial part of the plan has a derivative approach on risk management, for a better outcome and delivery. The priorities uphold the value of the subject imposed change. Observation throughout the plan enables one to handle any resistance from the organization practically.
Works Cited
Cameron, Esther, and Mike Green. Making sense of change management: A complete guide to the models, tools, and techniques of organizational change. Kogan Page Publishers, 2015.
Hayes, John. The theory and practice of change management. Palgrave, 2018.
|
Archaeology shock: Scientists left baffled over lost ancient city Mohenjo Daro in Pakistan
ARCHAEOLOGISTS are still no closer to understanding who occupied the ancient city of Mohenjo Daro in modern-day Pakistan during the third millennium B.C.
Comment section Share on LinkedIn Share on Pinterest Copy link Link copied
Herculaneum discovery solved ‘ancient riddle’ says expert
Researchers first visited the site in 1911 and various excavations were carried out in the 1920s through to 1931. Subsequent digs took place in 1950 and 1964, which provided fascinating glimpses into the ideology and beliefs of the city’s inhabitants. The well-planned street grid and an elaborate drainage system suggest that the occupants were skilled urban planners, for whom the control of water was of utmost importance.
The city has no grandiose monuments such as palaces, temples or monuments.
It lacks an obvious central seat of government and there are no indications that the city was ruled over by an established monarchy.
Modesty, order and in particular cleanliness appeared to be qualities that were highly prized by the city’s inhabitants.
A watertight pool called the Great Bath is the closest structure Mohenjo Daro has to a temple.
Ancient history news: Mohenjo Daro
Ancient history news: Mohenjo Daro (Image: GETTY)
Ancient history news: Mohenjo Daro/Ox Cart
Ancient history news: Mohenjo Daro/Ox Cart (Image: GETTY)
According to Indus expert Gregory Possehl of the University of Pennsylvania in Philadelphia, this suggests an ideology based on cleanliness.
Wells were found throughout the city, and nearly every house contained a bathing area and drainage system, which would appear to back up Mr Possehl’s theory.
During its heyday from about 2500 to 1900 BC, the city was among the most important to the Indus civilisation.
JUST IN: Archaeologists dig up a Celtic iron mill predating Jesus Christ
Ancient history news: Mohenjo Daro
Ancient history news: Mohenjo Daro (Image: GETTY)
According to University of Wisconsin, Madison, archaeologist Jonathan Mark Kenoyer, the mounds grew organically over the centuries as people kept building platforms and walls for their houses.
"You have a high promontory on which people are living," he said.
Its wealth and stature is evident in artefacts such as ivory, lapis, carnelian, and gold beads, as well as the baked-brick city structures themselves.
Archaeology shock: Archaeologists stunned by stone age find [Latest]
Ancient Egypt shock: Baffled expert proves how Tutankhamun was buried [Update]
Archaeology shock: Sensational 7,000-year-old find stuns scientists [Analysis]
Ancient history news: Mohenjo Daro
Ancient history news: Mohenjo Daro (Image: GETTY)
Ancient history news: Mohenjo Daro/Goat's Head
Ancient history news: Mohenjo Daro/Goat's Head (Image: GETTY)
The demise of the Indus civilisation and Mohenjo Daro is also a mystery.
By 1900 BC many Indus cities had been abandoned, but historians believe things started to fall apart around 1700 BC.
Some historians think that a collapse of trade with the Indus’ major trading partner, Mesopotamia, was to blame.
Roman Tunisia settlement archaeology is 'enigma' says expert
Around the time the Indus cities started to fail, Mesopotamia, an advanced civilisation in the Middle East, was going through huge political problems.
This led to the unravelling of its trade networks which would have had a huge impact on the Indus cities.
Others surmise that war was the likeliest cause behind the demise of the Indus.
Ancient history news: Mohenjo Daro/Indian rhinoceros
Ancient history news: Mohenjo Daro/Indian rhinoceros (Image: GETTY)
Hindu poems called the Rig Veda (from around 1500 BC) describe northern invaders conquering the Indus Valley cities.
In the 1940s, archaeologist Mortimer Wheeler discovered 39 human skeletons at Mohenjo-Daro.
He believed that they were people killed by invaders, although today archaeologists are sceptical about this version.
|
What is medical oxygen?
medical oxygen cylinder
Oxygen therapy, also known as supplemental oxygen, is the use of oxygen as medical treatment. Acute indications for therapy include hypoxemia, carbon monoxide toxicity and cluster headache. It may also be prophylactically given to maintain blood oxygen levels during the induction of anaesthesia. Wikipedia
Medical oxygen as a term has become much more well-known since the pandemic with the crisis of oxygen needed globally due to Covid-19. This form of oxygen allows many patients to have the ability to take in oxygen and be able to do many daily things that we take for granted such as move around, light exercise and even travel with medical oxygen and see the world!
Medical oxygen is prescribed for patients suffering from COPD, chronic asthma, bronchitis and other respiratory diseases.
To read more resources please do visit OxygenWorldwide for information on medical oxygen and travel.
A thought for next Christmas – rent your tree!
christmas tree in the snow
Have you ever wondered what happens to all the Christmas trees; real and artificial once the festive fun is all over?
A couple have started up a business to let people rent their Christmas trees as part of Oxygen Project. This helps to reduce the amount of trees that simply end up in the landfill. Your tree gets replanted for you ready for next year.
On average, one tree produces nearly 260 pounds of oxygen each year. You may feel an artificial tree would be better as they are re-used each year but ultimately once disposed of they take a long time to decompose in a landfill. Recycling your real tree is the most environmental option to take.
Staying warm and well this winter
Winter is here. For many its a time to get excited for all the festivities as we warm up for spending time with loved ones, take a break or have some time out to see out the end of another (tough) year. But for many it can anticipate worry, anxiety and even cause for concern if you have a respiratory disease such as asthma, COPD or bronchitis. Many will be short of breath, coughing more or even not wanting to leave the house to avoid worsening conditions especially in times where coughing and having a cold makes many even more wary with Covid-19.
The best advice is to Keep Warm and to Keep Active. These two elements will help you be less severe and stay away from worsening your conditions. And the most important piece of advice is if you are unwell please do speak with you GP or doctor for further advice. Leaving the house may give many anxiety but a short walk in your local area and getting fresh air is so important for your physical and mental health.
Staying warm is important to keep your body temperature up. Carefully plan your ability to keep you house warm, wear extra layers of clothing and even thick socks and long-sleeved tops. Moving about will help to keep your temperature warm and strengthen those lungs which is very important at this time of year.
You may be travelling this winter to visit or be with your family so please do speak with our team for advice and arrangements to allow you one less thing to worry about when arranging medical oxygen on holiday.
Conditions that can affect breathing
cuddly toy with breathing mask on to show needs help to breathe
If you have ever wondered what conditions can be caused when breathing, inflammation of the lungs or problems with respiratory, then here are the main conditions:
• Acute Respiratory Distress Syndrome
• Asbestos-related lung diseases
• Asthma
• Atelectasis
• Bronchitis
• COPD
• Hypersensitivity pneumonitis
• Idiopathic pulmonary fibrosis
• Pleural Disorders
• Pneumonia
• Primary ciliary dyskinesia
• Sarcoidosis
• Sleep Apnea
Learn about oxygen and your eyes
woman's blue eye in illustrative drawing style
Another popular article from our archives to be brought to the top and our new readers to read.
Did you know that the cornea is one of the few parts of your body that doesn’t have blood vessels supplying oxygen to it. The only other parts are tooth enamel, hair and nails.
So that light can travel through the cornea is transparent as well as no sight of blood vessels.
As there are no blood vessels to carry any oxygen where does the eye get oxygen from? It has to come directly from the outside air. To keep the cornea nice and healthy oxygen enters tears and carbon dioxide is released via the same process back out to the atmosphere. Certain things such as keeping your eyes shut for a pro-longed period of time or wearing the wrong contact lens can cause the cornea to lack oxygen.
There could be bad affects if the cornea doesn’t receive enough oxygen. This could be the ability to not detect pain, scarring and become less transparent. Additionally, new blood vessels from the sclera (the white part of the eye) can grow into the cornea and cause further damage and scarring. Always wondered why you may get a blood shot eye? This occurs when the cornea is looking for an alternative way to get more oxygen in. Since the cornea is without blood vessels, the retina pumps up its veins in attempt to absorb more oxygen.
This response can lead to other problems over time like corneal neovascularization and macular degeneration disease. The oxygen supply to the cornea is slightly less absorbed when contact lenses cover the cornea. Contact lenses are now made to allow more oxygen to pass through to the eye and some are designed to be in for long periods of time too.
It is always a good idea to check with your optician to make sure you have the correct type of lenses to avoid damaging your eyes. Early symptoms of a lack of oxygen include dryness and irritation as well as blood shot eye. Solutions and moisturisers are available to help keep your eyes healthy and oxygenated.
References: http://www.aclm.org.uk and http://www.avoideyestrain.com
Original post 2015
10 ways to help increase oxygen levels
oxygen levels - diver in sea
It may have been a few years since this article was published but due to a popular interest of wanting to find some simple tips, we have decided to re-publish for our new readers!
Using supplemental oxygen will increase your oxygen levels but there are other tips that can help increase your oxygen levels, its circulation and your body’s ability to take up the additional oxygen and utilise it more efficiently. Take a look at these ideas as in conjunction with your home oxygen therapy a little change could greatly increase your oxygen levels and quality of life.
These 10 ideas will help to improve your oxygen levels:
1. Open your windows. Fresh air will bring additional oxygen into your home and even if you are constantly breathing in oxygen through a cannula, whenever you talk or open your mouth fresh air containing higher oxygen levels can be drawn into your body. If you live in a smoggy area then you could consider investing in an air-filtration system.
2. Plants. They are the opposite of us as they take-in carbon dioxide and expel oxygen. Thereby increasing the foliage and plants in your home will decrease the carbon dioxide and increase the oxygen levels in your home.
3. Aroma. Many of the chemical-filled candles and various other incense type products actually contain carcinogens. Instead it is better to burn all-natural beeswax candles as then you’ll have better luck breathing in oxygen.
4. Exercise. Even a small amount of exercise will help to improve your respiration ability, as your breathing rate increases and deepens your lungs can absorb more oxygen.
6. Go Green. Eating more fresh, raw green juices is beneficial as they are full of vitamins and minerals which your body utilises to aid in the uptake of oxygen.
7. Meditation. Daily meditation or just simply sitting quietly and focusing on your breathing and taking deep breaths for a few minutes can greatly help in reducing stress and improving your oxygen intake.
8. Eat lron-rich foods. Your diet can seriously impact your oxygen levels. Certain foods can help improve your oxygen levels in the blood naturally. Target iron-rich foods such as meats, poultry, fish, legumes and green leafy vegetables as they can improve iron deficiency, which in turn improves blood oxygen levels.
9. Cut out Salt. A diet low in sodium can lead to increased oxygenation via the kidney and the blood.
10. Eat green raw foods. Oxygen-rich foods can naturally increase your blood oxygen levels. Try eating more green vegetables like kale, broccoli and celery in order to boost your oxygen levels and hopefully breathe easier.
References: http://lunginstitute.com
Blog article first published 2015
5 tips for living with medical oxygen
1. Portable oxygen concentrators – These will allow you more freedom to go wherever you wish, even on a plane. Do whatever you want to do as you can take the oxygen with you!
2. Always plan in advance; look out for how long you may be walking outdoors, staying away from home or going abroad. Planning is key to make sure you have all your oxygen planned in advance. OxygenWorldwide can arrange anything abroad for you for your next holiday.
3. Make sure you stay hydrated. Consume plenty of fluids throughout a day to avoid dryness.
4. Be careful around any type of flame such as candles and gas heaters whilst having your oxygen with you.
5. Your sleep will improve if taking oxygen overnight.
medical oxygen at home
India and its oxygen crisis
India has been for a while been hit with lack of oxygen supply after the Coronavirus wave that has swept the country. Many had not been vaccinated as did not experiencing any major crisis last year. Since the widely publicised wave that has swept the need and demand for medical oxygen is high.
Ludhiana, which being the biggest district with a maximum population of over 3.5-million passed through a harrowing time during the deadly second Covid wave, has built a strong medical oxygen infrastructure to meet the anticipated high demand of the life-saving gas during the possible third virus wave, the government has confirmed.
Besides accumulating maximum cylinders, the district has also acquired the highest number of oxygen concentrators in the state, the official figures have revealed.
6,165 oxygen cylinders made available
The data compiled by the Health and Family Welfare Department, which is available with The Tribune, showed that Ludhiana has made available 6,165 oxygen cylinders, including 4,774 D-type cylinders, 4,158 in private and 616 in government hospitals, and 1,391 B-type cylinders, including 855 in private and 536 in government institutions.
Reference: Tribune News Service
Balearic Islands now open (to UK)
This week we have seen the travel doors given the green light for UK to arrive in the Balearic Islands. Travellers have the good news that fully vaccinated or negative test will allow entry onto the islands. There is growing concern and pressure to open up travel corridors and also tourism but also with Covid cases on the increase to also be very careful on regulations and guidelines.
Ibiza, Menorca, Majorca and Formentera will be hot destinations to travel to for English Tourists looking to get some summer sun.
The announcement also includes other destinations such as the
Caribbean islands that are going on the green list are Anguilla, Antigua and Barbuda, Barbados, British Virgin Islands, Cayman Islands, Dominica, Grenada, Montserrat, and the Turks and Caicos Islands.
Breathe easy at home
oxygen at home
For those who need medical oxygen at home this can seem daunting. Home oxygen is needed for those who have low oxygen levels and having this supply can help those with respiratory illnesses.
For some this may be a relatively new requirement especially if you have been in hospital with coronavirus and on your after-care plan you still require extra help with oxygen to improve your condition and daily life.
Oxygen at home or oxygen therapy increases the oxygen levels in your blood flow and can help with daily activities all based upon what your doctor has required necessary.
It can seem very scary but this vital source of medical equipment not only will help you breathe but will enable you to be able to move around, do daily exercise and even (when we can) venture on holiday. You do not have to miss out.
The team at OxygenWorldwide have over 20 years experience and can assist, provide and be available for your oxygen needs. Whether you require oxygen therapy at home or abroad – contact our team which operates across Europe and worldwide.
For more information about the team, where we deliver and also client feedback please do visit our website and contact us with any questions.
|
With the exception of private well systems, tap water goes through a well-regulated filtration process at a municipal facility. To secure the procedure, the Environmental Protection Agency has set standards for treating more than 90 contaminants that may occur in drinking water.
The problem is even treated water still has some levels of impurities, and there is plenty of debate among many public interest groups what the "safe" amounts of these levels should be.
To a certain extent, the EPA, itself, is the source of this confusion. The EPA establishes two different levels for the contaminants it polices.
As a first step in the process, the EPA sets standards for safe levels of chemicals in drinking water that are based solely on health concerns.
These Maximum Contaminant Level Goals, or MCLGs, do not consider how much it would cost a public utility to meet these marks. As the term "goals" implies, these levels represent targets to strive for, but are not enforceable under the law.
Afterward, the EPA then sets Maximum Contaminant Levels, or MCLs, which are enforceable standards. MCLs are set as close to the MCLGs as possible, but they do take into account the practicality of public water systems to detect and remove contaminants using suitable filtration and treatment technologies.
In other words, MCLGs represent the ideal situation; the MCLs represent the real world.
For many contaminants, particularly those on the public's mind, the MCLG is zero while the MCL is somewhat north of that ideal amount. What's more, the EPA puts these two numbers right out in the open, side by side in its published regulations, for all the country to see.
"The EPA can't regulate at zero because many water treatment systems, particularly those serving smaller cities, couldn't afford to treat water to that level of purity," says Joe Harrison, technical director of the Water Quality Association, a water treatment trade group based in Lisle, Ill. "After all, what is 'zero?' Even one molecule of a contaminant would mean it wouldn't pass such a standard."
So does the perfect glass of water exist? Yes, and closing the gap between the ideal of the MCLGs and the reality of the MCLs adds up to a tremendous opportunity for marketing residential water treatment equipment.
"Consumers do have an uneasiness about many contaminants, especially when they find that that can buy bottled water that has zero levels of many common contaminants -- or at least as close to zero as we can measure," Harrison adds.
You can see how this discrepancy between MCLs and MCLGs plays out with one of the latest causes of concern -- trihalomethanes or THMs. We may be oversimplifying a bit, but THMs are the result of the disinfecting process itself. Yes, you read that right -- even the most common treatment to treat water causes its own contamination by the time it reaches your faucet.
Disinfecting water with chlorine, for example, has been a mainstay since the 1880s, primarily because it's cheap and it works. Chlorine is a powerful chemical that kills bacteria and many troublesome parasites in water. By the 1920s, chlorination (and other filtration procedures) virtually eliminated epidemics of major waterborne diseases, such as typhoid and cholera, in the United States. According to a 1995 EPA survey, almost two-thirds of public water treatment facilities use chlorine as a disinfectant.
Now that's progress. So why are people objecting to chlorination now? Chlorine is, in fact, also toxic to humans. When added to water, chlorine interacts with other inorganic and organic chemicals present in the water to produce even more toxic by-products -- the contaminant du jour THMs. (THMs actually refers to a family of disinfecting by-products. Chlorine produces chloroform, the most common contaminant of the clan.)
The EPA's MCL for total THMs is 80 parts per billion; its MCLG is zero.
"We can't discourage the use of chlorine since there is much more benefit to its use than risk," Harrison says.
Bottled water is one option, but an expensive one. The most practical way of treating treated water is with a family of water treatment equipment referred to as "point-of-use" or POU equipment. Reverse osmosis and carbon filters would be just two examples of POU products. By and large, most of the equipment on the market today (or perhaps, a combination of different types of POU equipment to form a sort of "treatment train") can effectively make drinking water more like the MCLG ideal.
We hate to say that it would render the water to a zero level of THMs, but water treatment equipment can virtually eliminate THMs. Additionally, while the performance of different brands of equipment may vary, Harrison encourages using an RO system rated for THMs since ridding water of THMs will also eradicate other common contaminants.
Two other contaminants, one relatively new and the other an issue for decades, are also common concerns that can be effectively treated at the point of use:
The "right" amount of arsenic in treated water is another matter of fierce debate. Until a few years ago, acceptable levels of arsenic were set at 50 parts per billion and had been the "standard" since the 1950s, decades before the EPA was even established. Then, just before President Bill Clinton left office, the EPA announced it would lower the standard to 10 parts per billion.
The issue became a political football after the Bush administration said it wouldn't go along with that decision, and then later agreed to make it 10 parts per billion by January 2006.
Meanwhile, the MCLG for arsenic is -- you guessed it -- zero. (We should add that the MCLG is still a proposal as is the MCL.)
Arsenic is just about as dangerous as it sounds. Exposure to arsenic can cause cancer and diabetes, as well as various circulatory maladies. It's also more common than you think since it's a naturally occurring substance of the Earth's crust.
Setting more stringent regulations for arsenic will seriously tax the abilities of smaller water treatment systems. And we do mean this literally since most everyone is for safe drinking water, but they don't want to see higher taxes or water bills to be a result. Eliminating arsenic at the tap, particularly for smaller systems, may prove to be the most affordable way to meeting this new standard.
"The arsenic issue has turned out to be an 'icebreaker' to treat this contaminant as well as others at the point of use," Harrison explains.
Unlike most other contaminants, the EPA does not set an MCL for lead since the level of such contamination can't be controlled by the public water system. Lead wouldn't normally be present as the water leaves the treatment plant. Rather, most instances of lead contamination in drinking water are the result of corrosion of lead pipe. All water is corrosive to metal plumbing systems to some degree.
There is, however, an "action level" of 15 parts per billion that would trigger additional treatment procedures. Meanwhile, the MCLG is -- how did you guess? -- zero.
While there may be room to debate some of the health hazards of certain contaminants, few doubt the effects of lead, particularly on children as well as unborn children. Such harmful effects include premature births, smaller babies, decreased mental ability in infants, learning difficulties and reduced growth in young children.
The bottom line, however, is if lead is present in tap water, many treatment products can effectively remedy the situation. The WQA recommends a choice of six methods. (For more information, see sidebar, "Tap Treatments.")
Ultimately, water treatment comes down to a delicate balancing act between public health and public money. Public water systems do provide safe water, and the majority of contaminants that remain after treatment are present in minute amounts. They may contribute to health problems only after many years of exposure, making identification of the cause difficult, if not impossible.
Trusting the system when it comes to drinking water is a safe bet. But "systems" still fail. And more importantly, POU equipment may prove to be the most affordable method of ensuring safe drinking water.
How Much Is 1 Part Per Billion?
One cent in $10 million. Or one second in 30 years. Other contaminants are measured in parts per million, which comes to one cent in $10,000, or one second out of 11 days.
Also, the EPA MCLs are typically stated in the metric "mg/L" or milligrams per liter. Since there are a million milligrams in any liter of fluid, an MCL of 5mg/L could also be expressed as 5 parts per million.
Tap Treatments
According to the Water Quality Association, the following types of treatments, either solo or in tandem, will treat the three tap water contaminants we've mentioned. There are certainly more contaminants than just these three. The WQA can help with other contaminant issues as well. For more information, contact the WQA at 630/505-0160 or log on towww.wqa.org.
Treatment:Coagulation/Filtration; Submicron Filtration; Anion Exchange; Activated Alumina; Reverse Osmosis; Distillation; Electrodialysis; Iron Oxide Media; Iron/Alumina Media; and Activated Carbon
Treatment:Cation Exchange; Coagulation/Filtration; Submicron Filtration/Activated Carbon; Reverse Osmosis; Distillation; and Electrodialysis
Treatment:Activated Carbon; Reverse Osmosis; and Distillation
|
Kingdom meaning in Hindi
Kingdom is a english word.
Kingdom Meaning in Hindi (हिंदी में मतलब)
• kingdom = राज्य
• Usage: People were very happy in Ashok's kingdom.
Kingdom Meaning in Detail
• kingdom (noun) = a domain in which something is dominant
Synonyms: kingdom, land, realm
• Usage: the untroubled kingdom of reason
• Usage: a land of make-believe
• Usage: the rise of the realm of cotton in the south
• kingdom (noun) = a country with a king as head of state
Synonyms: kingdom
• kingdom (noun) = the domain ruled by a king or queen
Synonyms: kingdom, realm
• kingdom (noun) = a monarchy with a king or queen as head of state
Synonyms: kingdom
• kingdom (noun) = the highest taxonomic group into which organisms are grouped; one of five biological categories: Monera or Protoctista or Plantae or Fungi or Animalia
Synonyms: kingdom
• kingdom (noun) = a basic group of natural objects
Synonyms: kingdom
• Other words to learn
Also See
|
Home General Who gets the most tornadoes in the world?
Who gets the most tornadoes in the world?
Who gets the most tornadoes in the world?
Does UK get tornadoes?
The UK usually has up to 35 tornadoes a year, but they rarely cause significant damage.
Does the UK get snow?
The UK gets on average 23.7 days of snowfall or sleet a year (1981 – 2010). Most of this is snow falling on higher ground where temperatures are lower, as can be seen on the maps below.
How is winter in UK?
Winter is the coldest month in the UK, running roughly from December to February (although November can often suffer very wintry conditions too). Temperatures often get as low as freezing point (0oC), though not too much colder usually.
Is England hot or cold?
The south and south-east of England are the least exposed to polar air masses from the north-west, and on occasion see continental tropical air masses from the south, which bring warm dry air in the summer. On average, the temperature ranges from 18 to 25 °C (64 to 77 °F).
Also Read: How do you troubleshoot a fuse?
Why is London so warm?
Why is the UK so warm at the moment?
Why is it so warm in the UK at the moment? It’s a result of an unusual weather pattern amplified by global warming. Southerly winds have been blowing hot air from north Africa all the way up to northern Europe.
Why is London so warm in winter?
Also Read: Can you pay online in a different currency?
Why is Heathrow Airport so hot?
Cities tend to hang on to the heat for longer, which can push up temperatures by a few degrees, he says. Heathrow – with its large black asphalt runways and airport buildings – will naturally absorb more heat. That suggests that it is the buildings, rather than planes, contributing to the higher average temperatures.
|
1.8 C
United States of America
Friday, January 28, 2022
What Happens To Lost Fat When You Lose Weight?
Must read
You’re all familiar with the term, losing weight or weight loss. But do you ever ask, “Where do the fats go when you lose weight?”.
Let’s find out…
Health experts assumed that fat loss is converted to energy or heat, hence the term “burned”. But researchers from the Australia’s University of New South Wales, concluded that “people breathe out fat in the form of carbon dioxide“. So now you know, that “you exhale lost weight“. Yes that’s right! Lost mass goes into thin air.
The researchers explained that, when you lose weight, you are attempting to metabolize the triglycerides stored in fat cells. For the triglyceride molecules to be metabolized, it must be broken into their components of carbon, hydrogen and oxygen, via the oxidation
The researchers further tracked the voyage of lost fat atoms, and found out that almost 84% of the loss fat was converted to carbon dioxide. While the rest becomes water, which may be excreted in feces, urine, breath, sweat, tears and other bodily fluids.
The explanation on how lost fat is converted into carbon dioxide is a very complicated
matter. But the researchers believed that this new knowledge may help doctors, nutritionists and trainers to help you burn those extra pounds.
But don’t try to lose those excess pounds by breathing faster. This will result to hyperventilation, the researchers say. And if you’re wondering whether the carbon monoxide that is exhaled when you breathe out those fats are dangerous to the environment. No it’s not, as stated by the experts.
For now, enjoy this new found knowledge and who knows? This may help you lose more of those excess pounds!
Also Read 8 Brilliant Exercise Alternatives When You are in Pain
Daily Pick
|
Asked • 04/29/19
How were political borders marked during the Middle Ages?
I have a very specific question regarding borderlands: between 500-1500, how were the political borders identified? Was it a mere furrow on the ground? Did we have any signs? In other words, were such borders formed along physical boundaries? I imagine, considering that people didn’t know how to read and many people had lands, symbols, icons and heralds were used to make sure no one would trespass (and die). This question is extremely important to me; any single reference or image (painting) would be extremely appreciated. Thanks! Ps: excuse me if this is an easy/stupid question. I’m not a native English speaker, so the more specific a topic gets, the harder the research.
1 Expert Answer
BZ C. answered • 05/09/19
4.9 (195)
Eccentric and Lovable Historian of Politics and Ideas
Still looking for help? Get the right answer, fast.
Ask a question for free
Get a free answer to a quick problem.
Most questions answered within 4 hours.
Find an Online Tutor Now
|
Sleep Apnea, ADHD
ADHD, Symptoms, Warning Signs, Youth, Preschool
Left-handed people are more likely to have ADHD.
Pregnancy and ADHD
While the academic community has yet to reach a definitive conclusion with respect to what causes ADHD, there is a relative consensus on risk factors for the condition. These factors include genetics, epigenetics, and environment, but medical experts have recently added the length of a pregnancy to the list.
ADHD, ADD, Kids, TV, Television, iPhone, App, Treatment
Many parents and educators are often heard citing that kids watch too much TV and that it isn’t good for them. As it turns out, they are right! As it turns out, a study has confirmed that early television exposure to kids between 1 and 3 years old has…
Doctors, ADHD, Psychologists, Psychiatrists, ADD, Treatment, Cure, Test, Assessment
What Causes ADHD?
Although it’s not a dire health concern, ADHD or attention deficit hyperactivity disorder still affects a large number of children and teens. When it comes to the possible cures for ADHD, doctors and psychiatrists could only help patients by managing the symptoms. Definite cures for ADHD are not yet…
Most people use the terms ADD (or Attention Deficit Disorder) and ADHD (Attention Deficit Hyperactivity Disorder) interchangeably, but the truth is, they do not refer to the same thing. What ADD actually refers to is a type of ADHD, the Predominatly Inattentive Type. In fact, the American Psychiatric Association…
ADHD warning sign
ADHD is being diagnosed more and more frequently in our youth today. But despite the fact that most parents are well aware of the fact that almost 5% of children are afflicted with the condition, very few are aware of the early warning signs and what to do if…
|
About Seesaw Sign Up
Teachers, save “Cloud Computing 1 (BrainPOP)” to assign it to your class.
Mr. Wagner Guy Pierre
Student Instructions
Cloud Computing 1 (BrainPOP)
1. Watch this movie = https://www.brainpop.com/technology/computerscience/cloudcomputing/ 2. Complete this worksheet with the LABEL tool 3. Explain your answers as well as how to stay safe online Discover how the "cloud" is really a network of powerful data centers connected by the Internet. Learn how any device with an Internet (or even cellular) connection can access this network from anywhere in the world. Explore the multiple uses of the cloud, from storing huge amounts of data to running computer programs on many devices at once. How can cloud computing change the way we communicate, learn, and do business? The sky's the limit!
8th Grade, 7th Grade, 6th Grade, Computer Science, STEAM, Digital Citizenship
35 teachers like this
Students will edit this template:
|
Scareware is a form of malware designed to scare you into taking some action that further damages or infects your computer or costs you money.
Most common forms of scareware display a list of infections supposedly on your computer, and inform you that you need to purchase the “full version” to remove them. In fact, the infections are completely fake and are listed only to intimidate you into handing over money. Whether or not the software you purchase actually does anything at all is debatable, but it’s not uncommon for this program to contain even more malware.
scareware (Wikipedia)
Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software. Scareware is part of a class of malicious software that includes rogue security software, ransomware and other scam software that tricks users into believing their computer is infected with a virus, then suggests that they download and pay for fake antivirus software to remove it. Usually the virus is fictional and the software is non-functional or malware itself. According to the Anti-Phishing Working Group, the number of scareware packages in circulation rose from 2,850 to 9,287 in the second half of 2008. In the first half of 2009, the APWG identified a 585% increase in scareware programs.
The "scareware" label can also apply to any application or virus which pranks users with intent to cause anxiety or panic.
« Back to Glossary Index
|
How Labradors Show Affection? (25 Ways Explained) 2022
• By: Hs Saini
• Time to read: 7 min.
As a Labrador parent, Have you ever thought that how Labradors show affection? What is the Labrador way of loving its owner is the most asked question by the owners as we know that our darling Labradors just can’t put all of their love into words, unlike human.
That is why they are more clear and expressive in their actions. However, their body language says it all about their love and affection for their parents.
How Labradors Show Affection? Labradors show affections in a several different ways such as wagging tail, following you, licking your face, jumping on you, playing with you, watching you, loyal to you, social with you, sleeping near you, rollover, guarding you while you eat and many more.
Labradors are one of the most popular breed, in the united states as well as other parts of the world.
How Labradors show affection?
1. Wagging their tail
Surprisingly, Labradors use their tails to communicate and to express emotions such as fear, happiness, and as well as aggression. Similarly, Labradors show affection for their parents by continuously wagging their tails when they are near to the loved ones.
Interestingly when your Labrador is happy, it just starts wagging its tail, and it looks as its whole back is shaking. This sign ensures that your dog not only loves you but trusts you more than any other person.
2. Following the owner
Labrador, especially when they are young, they requires the full time security and safety, due to which they keep following their owners.
If your puppy is continuously following you, then be happy because it finds you a source of security and peace with the growing age, this behavior will turn into a expression of love and as well as affection.
You will be happy to know that you are the well-being spot for your darling Labrador.
3. Licking your face
Licking is the Labrador’s way of kissing its owner, which shows all of its love and affection. As we notice that puppies lick the face of their mothers to communicate, the same is the case when dogs lick the face of their owners.
There can be multiple reasons for a Labrador licking your face, such as asking for food, or maybe they are grooming you. By Licking, a Labrador makes their Bond stronger with their parents.
4. Jumping
A Jumping Labrador’s actions are quite unacceptable behavior within the breed but know that it is your dog’s way of showing excitement and love. Your Labrador never meant to hurt you or people by jumping on them.
All they need is your attention, and maybe they want to cuddle with their parents because they feel it soothing and comfortable.
You will notice that when you come home after a long day, your puppy will greet you by jumping on you and by licking your face.
5. Playing rough with parents.
Playing somewhat unpleasant is actually your canine’s usual method of showing friendship. It’s sound, however, an essential piece of your canine’s social turn of events. Rough housing assists with framing a connection between the owner and their furball.
Once in a while the overall roughhousing may go much excessively far. Make sure to train your canine what practices are worthy – no yapping, gnawing, or swiping. Protect it!
6. Social with owners
Almost all of the labradors are subspecies of wolves that are highly social and active. Similarly, Labradors demands to move outside with you when they want to show their love, isn’t it sweet?
When you live with this breed, you are the best companion of its life, so be ready to enjoy each moment according to the lab.
Labradors will look at you for the proper guidance, companionship, and as well as for approval. And hence, your dog will serve you the best company by socializing with you.
7. Loyal with you
Loyalty in dogs is something at which none of us can raise a question. But, again, the loyalty in dogs is from due to the wolf background and due to which they are great as family members. You can hand over your entire house to Labrador, and it will never disappoint you.
8. Sleeping near you
Just like a human, dogs also like to sleep with their loved ones. When you live with a Labrador, know that you are the most important, so they enjoy sleeping close to you.
They love your vibe and energy that helps them keep calm and sleep well. By sleeping near to you, labs show the affection and feeling of blind trust.
9. Watch over you
It’s so sweet of Labradors that they keep watching over, especially when you are sick. They try their best to care the dog owners in order to make them feel better. In this way, Labrador shows that it wants your quick recovery.
10. Lean on dog parents
It’s sometimes annoying and unacceptable to own a pup continuously trying to get the hold over you even when you are busy. In the case of having a young dog, you may not realize this as a problem.
While, with the increasing age and size, it gets difficult to bear such a giant lab trying to lean on you. Let me clear this; your dog just never meant to hurt you; it’s just showing its unconditional love and affection for you.
In this case, spend some quality time to make it clear that you, too, are in love with your Labrador.
11. Smile at parent
Trust me, they smile, and their smile gets bigger when they are around owners. Maybe you don’t know, but dogs indeed try to mimic the facial expressions of their parents.
12. The dogs will sniff between legs
I realize how humiliating and irritating it is, however to a canine, this conduct is intended to be cordial. It’s in a real sense a “become more acquainted with you” signal, as a method of making proper acquaintance, yet additionally a method of social occasion data about you via your scent.
13. Recognize the owner’s name
Try this, call your name and notice the reaction of your puppy. Again, it’s your lab’s love for you that it recognizes your name even in public. The lab may reply with a barking reaction when someone is calling you.
14. Give you toys
Dogs are selfish when it comes to their favorite toys, but there are no restrictions for owners. Even Labrador will pick the best of its toys and give this to you to show affection.
15. Guard you at meals
Dogs are highly protective even when there is no threat. Most of the time, Labrador shows their affection by looking at their owner at the time of meals as Labradors doesn’t bark much to ask for foods so they do prefer staring at their loved ones.
16. Labrador Rub their face on owner’s face
Know that, when your Labrador is Rubbing their face on owner’s face, it is another sign of affection by Labrador. By this behaviour, they reflect that they are yours and you are the most important for them.
17. Gaze in owner’s eyes
Gazing into your eyes for a long time is another attempt by your Labrador to show their friendship and love with you. That’s why Labradors are so friendly, unmistakable mark of attachment and affection.
18. Labradors will Sense owner’s sadness
Being your Flawless companion’s dogs can easily sense your sadness. Therefore, when parents are unhappy, the Labrador will make an effort to give you a relaxing time and want you to be happy.
19. Cuddle with parents
Labradors are famous because of their cuddle with owners. Cuddling in random times how their love and affection for you.
20. Nose nudge
It’s cute to watch nose nudging from the dogs, another way to show care and love.
21. Deep sigh
Some of the soft vocalizations, such as sighs, are the source of showing love in dogs.
22. Rollover
Labradors start rolling over on their back to show relaxation and as well as affection when they are near you. Even, by this behavior, they are asking you to rub their belly. You can say that rollover is somehow similar to the wagging of their tails which are again the signs of love and affection towards parents.
23. Share broken toys with you.
No matter if their toys are broken or brand-new, they will love to share them with you. It shows their blind trust in you that you are not going to harm their toys.
24. Try to herd you
Sometimes, grouping breeds will attempt to herd you if they think you are straying all alone. But, again, it’s a method of them showing friendship for their pack.
25. Force you to play
You will notice sad behavior when you are in an unconscious state and when you are being non-responsive to your dog. They want you to get up and play with them, and for this, they start licking your face and head.
Of course, this behavior makes it difficult for the parents to get sleep. Make sure that your Labrador is sleeping in another room so there will be no distraction for you.
To conclude
Some new owners may wonder if Labradors friendly or dangerous? Labradors never keep their love for their parents in the heart but are highly expressive.
There is a wide range of ways in which Labradors keep showing their affection for their parents or owners. Cuddle, rollover, wagging the tail, sharing toys, and sensing your sadness are the clear signs of love and affection from Labrador.
So I hope now you got the answer how labradors show affection to their human parent.
Do Labradors love their owners?
Yes of course, Labradors love their owners. I would say even every dog breed love their human parent as long as you give them love.
Do Labs pick a favorite person?
There is nothing like this, but as Labradors are highly energetic, active they love to do different kinds of activity. So in this situation they would prefer to be with same level of active person, who can play and do some activities.
Why are labs so loyal?
closeness to their owners release some hormones’ signal to their brain as a love and affection sign. So it’s all about give and take.
|
The “science”(dogma) of conjecture
Evolution is a fact. But not the way it is commonly understood… How to understand evolution scientifically?
You may have heard about Darwin’s theory of natural selection… yes, where the claim is that one species evolved into another species because the fittest who evolved survived and the others died off, thereby creating a natural evolution of species just sort of accidentally and randomly. It is in line with the magical wishful thinking of the Big Bang.
But according to the Vedic scripture all 8.4 Million species are created by the arrangement of God. 400,000 of those species are human in nature, and the remain 8 million are sub-human.
Jalaja (Water based) – 0.9 million, Sthaavara (immobile like plants & trees) – 2.0 million, Krimaayo (Reptiles and germs) – 1.1 million, Pakshinaam (Birds) – 1.0 million, Paashavah (terrestrial animals) – 3.0 million, Maanavah (human-like bodies, including human species, demigods, danavas, gandharvas etc) – 0.4 million.
Padma Purana
Some species may be visible at some times, and other species may be present at other times. So what determines whether there are any specimens of any given species are actually on a planet at any given time?
A tiger has no choice…
Karma! Karma is the law action and reaction – every action has an equal and opposite reaction, that is the law of Karma. This most basic law of nature drives the circumstances of a living entities trajectory in the material world… simply put, certain deeds are classified “karma” or deeds that bring pleasing reactions, and certain deeds are classified “vikarma” or deeds that bring unpleasant reactions. Karma and Vikarma is only accrued in human forms of life, the sub-human species are simply living our their karma – the tiger suffers no reaction for killing a deer but a human does.
A human has choices…
अधस्तान्नरलोकस्य यावतीर्यातनादय: ।
क्रमश: समनुक्रम्य पुनरत्राव्रजेच्छुचि: ॥ ३४ ॥
adhastān nara-lokasya
yāvatīr yātanādayaḥ
kramaśaḥ samanukramya
punar atrāvrajec chuciḥ
Having gone through all the miserable, hellish conditions and having passed in a regular order through the lowest forms of animal life prior to human birth, and having thus been purged of his sins, one is reborn again as a human being on this earth.
After transmigrating through the millions of different species, we get a human life. What we do in our present human life determines our future trajectory.
It takes a lot of transmigraton through species to get a human life…
Of course, trying to piece together the effects of the law of karma is a fool’s errand, because here’s something – let’s say you have one seed – one karmic action. That seed sprouts, grows into a tree, flowers, and fructifies – each fruit contains many more seeds… those result in more trees and more and more and more. Pretty soon, you don’t know where you started and why you’re enjoying or suffering. All sorts of apparently anomalous phenomena occur, and people ask questions like “why do bad things happen to good people”. In the material world, no one is really fully innocent. We all came here by our own free will, due to the original sin of trying to displace God after all.
A Banyan tree – where did it all start?
There is one kind of action, called “akarma” which can be loosely translated as “inaction in action”…
कर्मणो ह्यपि बोद्धव्यं बोद्धव्यं च विकर्मणः ।
अकर्मणश्च बोद्धव्यं गहना कर्मणो गतिः ॥ १७ ॥
karmaṇo hy api boddhavyaṁ
boddhavyaṁ ca vikarmaṇaḥ
akarmaṇaś ca boddhavyaṁ
gahanā karmaṇo gatiḥ
The intricacies of action are very hard to understand. Therefore one should know properly what action is, what forbidden action is and what inaction is.
कर्मण्यकर्म यः पश्येदकर्मणि च कर्म यः ।
स बुद्धिमान्मनुष्येषु स युक्तः कृत्स्नकर्मकृत् ॥ १८ ॥
karmaṇy akarma yaḥ paśyed
akarmaṇi ca karma yaḥ
sa buddhimān manuṣyeṣu
sa yuktaḥ kṛtsna-karma-kṛt
One who sees inaction in action and action in inaction is intelligent among men, and he is in the transcendental position, although engaged in all sorts of activities.
Statements like this can be mysterious and confusing, and they did end up confusing a lot of western scholars who studied the Bhagavad Gita without the guidance of the disciplic succession, a bona fide Guru.
But it is quite easy to understand with the context, go ahead and click on the link to BG 4.18 and you will get a crystal clear explanation. Basically, you might think you are inactive, but you could be accumulating karmic reactions just by your breathing… but there is a way to do everything so that not only are there no karmic reactions but your existing karmic reactions are burned away…
Coming back to the speculative idea that somehow or other one organism adapted and evolved into another species, and that the fossil record is to be taken as proof is fallacious. The fossil record, is at best, a conjecture.
Why is that?
Fossils are not truly reliable as evidence for evolution…
Because the fossil record simply represents certain events or accidents depending on whose viewpoint you are looking at – some hapless animal got caught in some clay that solidified to rock preserving the skeleton as a fossil, and just because this didn’t happen a billion years before or after doesn’t necessarily give us the time when that species was around. A fossil is essentially like a little child pointing and clicking a camera randomly – you can’t decide what exactly happened that day just from the photos. A lot of room for error.
A great book on this subject is Nature’s IQ by by Balaz Hornyansk and Istvan Tasi.
Nature’s IQ
The introduction to the book reads “It is not at all surprising that insects behave like insects, birds behave like birds, and mammals behave like mammals. They execute most of their intricate behavior in a predetermined, instinctive manner. But how do they know when and how they should act? Where did the intelligence that is manifested in nature come from? Can the current view be true, that inert matter (lacking consciousness) somehow acquired intelligence over the course of a vast span of time? Darwin’s theory of evolution is widely accepted as the explanation for the varieties of life. Evolutionists attempt to explain the origin of behavioral patterns by gradual modifications of more simple behavior forms. But when we try to explain complex animal behavior this way, it becomes impossible! Nature’s IQ invites the reader to investigate an alternative explanation. Is it possible that our world reflects, in many different ways, a supernatural intelligence that has applied its own infinitely ingenious solutions to create the living world?”
One of Darwin’s ideas is that some fortunate specimens of a particular species developed a particular advantage that helped them survive while their peers perished due to the lack of that advantage.
The key idea is that for example, it is conjectured that a giraffe needed a long neck so it could eat the leaves from trees that were very tall and thus have an advantage over those animals that depend on grass and other short plants… one day, a short-necked ancestor of a giraffe developed a slightly longer neck, and its descendants developed longer and longer necks… but the authors make an argument like, OK, what advantage did the giraffe ancestor with a neck only slightly longer than its previous generation have? How could that change continue in the absence of any tangible advantage? What about more complex instincts and behaviours? What about the intelligence that many animals exhibit?
Such examples abound in nature… Michael Cremo writes in his foreword… “These complex behaviors involve many behavioral steps, linked in specific sequences. Without all the parts of the behavior being present in proper sequence, the behavior would not be executed. We can thus say that not only biological form but biological behavior can be irreducibly complex. That means these behaviors cannot have arisen in the step by step fashion that evolution requires. Thus biological behavior also provides evidence of intelligent design.”
In other words, the theory of evolution of species is not much more than mental speculation combined with healthy doses of conjecture. It is the dogma of conjecture.
Another great book is Rethinking Darwin, by Leif Jensen.
Rethinking Darwin
What can we do then? We can evolve back to a higher consciousness with our efforts and lots of mercy.
The Vedic Scriptures say:
aprārabdha-phalaṁ pāpaṁ
kūṭaṁ bījaṁ phalonmukham
krameṇaiva pralīyeta
For those who are engaged in the devotional service of the Supreme Personality of Godhead, all sinful reactions, whether fructified, in the stock, or in the form of a seed, gradually vanish.
Quotation from the Padma Purana in purport of
Here is real science. You can know this, follow the process of Bhakti, Loving Devotional Service to the Supreme, and go back home. It is a repeatable process. Countless have done it. You can too. Dear Spirit Soul, you are already perfect in your original state. Over countless lifetimes, you have devolved from your original perfection to a state which is an embarrassment to your true identity. Wake up! Know yourself! Be yourself! Go back home to the spiritual realm where you belong! I pray to serve you on your journey back home, that is why I exist. Ask me how!
Author: Mahabhagavat Das SDA
12 thoughts on “The “science”(dogma) of conjecture”
1. A tiger or any other sub-human creature has no control over its activities, its activities are dictated by the body it has. A tiger cannot stop killing animals for food, and neither will it kill when not needed. But a human can live without killing animals, a human has a choice to eat as nonviolently as possible, to cook vegetarian foodstuffs for Krishna, offer the food to Krishna, and take Krishna Prasada whereas a tiger in the material world cannot. It is interesting to note that in the spiritual world, even a tiger does not kill animals, for example there is a famous pastime of how Sri Krishna helped a tiger use his conscience and spare the life of a cow (for another day), and in the Bible, in the book of Genesis, it is said how in the Kingdom of God the lamb and the lion lie together.
1. inaction in action means that action that does not generate any reaction such as pure devotional service, such as chanting Hare Krishna… and action in inaction means that when someone is externally inactive but inside all sorts of materialistic things are going on, and karmic reactions are accumulating. In the purport of Srila Prabhupada writes “A person acting in Kṛṣṇa consciousness is naturally free from the bonds of karma. His activities are all performed for Kṛṣṇa; therefore he does not enjoy or suffer any of the effects of work. Consequently he is intelligent in human society, even though he is engaged in all sorts of activities for Kṛṣṇa. Akarma means without reaction to work.”
1. Do you know Sanskrit? What does “कर्मण्यकर्म यः पश्येदकर्मणि च कर्म यः ।
स बुद्धिमान्मनुष्येषु स युक्तः कृत्स्नकर्मकृत् ॥ १८ ॥” mean?
1. Yes, I am not a Sanskrit scholar but because of the efforts of Srila A. C. Bhaktivedanta Swami Prabhupada, I know more than I did before. This is the 18th verse of the 4th chapter of the Bhagavad Gita – you can find it here and means “One who sees inaction in action and action in inaction is intelligent among men, and he is in the transcendental position, although engaged in all sorts of activities.” – please read the purport!
1. Yes, Krishna has done this multiple times. This material world is a type of hell, for all practical purposes and He has come here so many times! In the purport of SB 10.45.42-44 “pāpa-kṣayāt tataḥ sarve vimuktā nārakā narāḥ padam avyayam āsādya
“Their sinful reactions eradicated, all the inhabitants of hell attained liberation and approached the spiritual world.”
1. In the spiritual world, there is no dead matter and no dumb or foolish animals. In the spiritual world everything is conscious, right from the grain of sand (which melts in ecstasy when he experiences the touch of Krishna’s lotus foot), to the blade of grass, to the trees, the water, the flute, the vessels, ornaments, everything… The highest spiritual consciousness is present in each entity in the spiritual world. By their own choice they adopt a particular form (which is eternal) to serve Krishna… some living entities choose to serve Krishna as deer, some as cows, some as peacocks, but they are all actually saints with full consciousness, eternal knowledge and bliss… But you already have an eternal relationship with Krishna… First you must purify yourself of your material designation like “Chinese” or “Canadian”… and gradually your spiritual form will be revealed to you. But that is premature… we need to make sure we don’t get birth as animals in this world first! 🙂
1. Start by reading Srila Prabhupada’s Bhagavad Gita As It Is, and carefully observe the Sanskrit text, the word-by-word translation and full English translation… simply by reading Srila Prabhupada’s 70+ books you will be perfectly well-read in Vedic scripture.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this:
|
Sat, 29 Jan, 2022
Virtual Machines: The Wonders of Modern Technology.
By Samrajya Basnyat
You recently downloaded a program from your favorite subreddit. The Redditors say it’s a good program to customize your Desktop. You hurriedly install the program and restart your computer to reorganize your folders. Windows then displays the blue screen of death, you feel anxious and search for videos to fix this problem. Unfortunately, your device is gone for good. This is a problem many people face while downloading unsafe software from the internet. Various viruses are disguised to trick people into destroying their computers; hence, if you ignore the antivirus warnings and still want to check out the program ‘Virtual Machines’ is a lifesaver for running tests.
Virtual machines are virtual environments that function as virtual computers having their CPU, Memory, Network interface, and storage created on a physical hardware system. Virtual machines run on the concept of Virtualization technology. This technology allows you to create useful IT services by using resources bound to the hardware. It allows the user to use the machine’s full capabilities by dividing among the users or environments. For example, if there are 3 different servers to manage mail, web, and legacy applications, each server uses 30% of the total server potential. Improvements can be made by moving the legacy apps into the mail server increasing its potential from 30 to 60 percent. Hence a server can be used to its full potential freeing up a whole server.
Virtualization technology can be dated back to the ’60s where the technology required for virtualization i.e. hypervisor was developed. The hypervisor is software generally used to create virtual machines and the ancestral version was developed to give multiple users simultaneous access to computers that performed batch processing. It was developed alongside timesharing technology due to the rising user/single machine problems which grew in popularity. This led to the development of UNIX-based operating systems that eventually paved the way to LINUX-based operating systems. In 1990, Most enterprises had physical servers and single-vendor IT stacks, which prevented legacy apps from running on a different vendor’s hardware. Companies started updating their IT environments with less-expensive commodity servers, operating systems, and applications from a variety of vendors; they were bound to underuse physical hardware as each server could only run 1 vendor-specific task.
This was the moment virtualization technology took off as it allowed companies to run servers and legacy apps on multiple OS types and versions. Servers were used with great efficiency which reduced the cost, maintenance, cooling, and set up of the hardware. This widespread applicability reduced vendor constraints allowing for the development of cloud computing. Virtual machines are a part of virtualization technology that has allowed users to create environments for testing new applications and software. Due to its isolated nature, the original system remains unharmed even if the virtual system has been infected with viruses or bugs rendering it useless. It’s a useful way to run Linux and Windows environments side-by-side.
As new software to run virtual machines such as VMware, Virtual Box, etc are released to the public, innovative techniques to run such virtual machines come into existence. In summary, virtual machines have and will continue to play an important role in the future as we steadfast into the world of virtual reality.
Total Views: 0
|
Why Regular Machine Calibration Is Essential
To maintain their high standards, workshops and factories must maintain their machines. The most useful machines get used the most, and over time they wear down. Regular maintenance and calibration solves this issue, keeping standards high, machines accurate, and employees safe. But what exactly is calibration?
Why Regular Machine Calibration Is Essential
What is Machine Calibration?
Machine calibration catches any errors in measurement equipment to prevent faulty production and curb inefficiency. The process involves taking a workpiece of standardised dimensions and measuring it with the machine. If the machine deviates from the standard measurement on any of its axis, the calibrators discover the errors, diagnose their causes, and fix them to improve the machine and the business.
Maintenance workers conduct calibration as part of their routine maintenance. This proves particularly vital for sensitive equipment, such as Coordinate Measurement Machines (CMMs). CMM calibration, or calibration for any fine-tuned measurement equipment, is a vital part of sustainable and successful workflows. No matter how long it takes or how many resources it requires, regular maintenance pays off dividends in the long term as an investment in quality.
Why Do Machines Need Calibration?
Wear and tear naturally decreases accuracy over time, lowering product quality. Moreover, a variety of environmental and physical issues also speed up the process, threatening faults and breakdowns without regular machine calibration.
Issues that affect accuracy and exacerbate wear and tear include:
Temperature changes, which causes expansion and contraction of sensitive measuring instruments, leading to stresses and inaccuracy
Vibrations, caused by other machines and manufacturing processes in the workspace, which cause parts to jump and impact one another.
Contamination or particles in the air from other manufacturing processes, such as sawdust, scraps of metal, or a build-up of microplastics that clogs components or interferes with a machine’s movements.
Spills, such as grease, oil, cooling fluid, plumbing, or drinks, which causes rust or swelling in measurement equipment.
Power cuts, shocks, or surges that short or burnout electronics, or reset software.
Uneven usage, such as measuring plates being used more on one side than another, causing grooves or chips that throw off readings.
The list goes on and on, and even as operators and business leaders strive for scientific accuracy, random factors like accidents or emergencies intervene. The best way to stop combat these issues, and even pre-empt future problems, is regular calibration and maintenance, which brings a range of benefits.
The Benefits of Regular Machine Calibration
Excellence and high-quality is the main benefit of regular calibration. When firms invest in themselves, they improve their products and their workflow in competitive and high-stakes manufacturing markets. They also uphold their quality assurances, a powerful selling point for winning over customers, employees, and investors alike.
No matter how careful and well-trained workers aim to be, accidents happen, and sometimes they seem beyond control. Sometimes accidents involve simple slips or damaged machinery, but occasionally, they’re far worse. The best way to ensure safety is through regularity and rigour. The machines, and their operators, should be well-drilled and fine-tuned. With regular calibration, workers gain full trust in their machines, and know exactly what they’re doing and when.
Many important warrantees, quality assurances, insurances, and accreditations rely on regular maintenance. Businesses do right by their customers, their employees, and themselves by ensuring their equipment remains in tip-top condition.
Errors and faulty measurements may also lead to costly recalls, brand-damaging discounts, or even costly legal action. Creating a strong relationship with expert maintenance and calibration professionals protects a company and its products.
Error-prone equipment leads to uncertainty, mistakes, and wasted resources. Simply put, maintaining accuracy ensures that you’re doing the correct manufacturing processes to the correct amount of materials: fewer offcuts, fewer rejects, greater efficiency.
Alongside protecting employee safety, regular maintenance shows an internal trust, belief, and investment in the workforce. This effort shows employees that their work’s worth honing to high standards for high stakes.
When Do Companies Need Machine Calibration and Maintenance
Companies must strike a balance between the cost of maintenance and the potential cost of inefficiency, breakdown, and recall. While regular machine calibration is the answer, regular can mean anything from bi-weekly to bi-annually. The best calibration and maintenance firms work custom deals out with their clients to suit their machinery’s requirements and find the perfect solution for them.
How to Choose a Machine Calibration Solution
Besides flexibility, professionalism and experience prove the most important factors for a great maintenance and calibration expert. Choosing a partner with decades of experience in the field, and the right industry accreditations from the International Standards Authority is a great place to start when you find a firm to build a productive relationship with.
Conclusions: Why Regular Machine Calibration is Essential
Machine calibration is essential for calibrating a business to optimum efficiency. By protecting leaders, workers, and stakeholders, calibration combats faults and maintains excellence, forming an essential part of competitive and forward-thinking firms.
|
Popular Science Monthly/Volume 75/December 1909/Medieval Creation Myths
From Wikisource
Jump to navigation Jump to search
By Professor B. K. EMERSON
THERE is perhaps more reserve than formerly in assuming the westward wandering of great hordes out of Asia, but, whether the peoples have or have not migrated, the myths certainly have, and all through western Asia and southern Europe the old biblical stories are strongly blended with dualistic traits that have all the ear marks of Iran. As the light conquers the darkness and ushers in the day, so the darkness conquers the light and ushers in the night. Thus Ormuzd and Ahriman are equal to the confines of eternity and God and Satanael become equal in the blended stories.
Of the many variations of these creation myths which have taken root especially among Slavic peoples in the Caucasus, across southern Russia and the Balkans, I have wilfully chosen those parts which have a geological flavor, and illustrate or parody, in quaint and naive manner, many earth forms or earth-forming processes.
I owe most of this material to Oscar Dähnhardt,[1] who has collected many medieval stories of the creation of curious interest. In north and west Russia, in the fifteenth and sixteenth centuries the "Roll of the Divine Books" tells how, while there was still neither heaven nor earth, the Sea of Tiberias existed, solitary and alone, and it was shoreless.
The story is continued thus in Ukraine (p. 55):
As God would create the world, he spoke to the oldest of his angels, Satanael, with whom he wandered over the sea, and bade him dive to the bottom and bring him up a handful of sand. As he grasped the sand he should say, "I seize thee, Earth, in the name of the Lord!" But as Satanael came to the bottom the wicked thought came to him, and he said, "In the Lord's and in my name!" But as he arose again the sand ran out of his hand and he brought up nothing.
The Lord, who noticed what had happened, bade him dive again and forbade him to use his own name. He did this, nevertheless, and again brought up nothing. Only the third time he left out his own name and brought up sand in his open hand. God took it; went out over the sea and scattered it upon the waters and it became land.
But Satanael licked his hand and said, "I will keep back just a little and also make land." And God asked him if he had any sand and he answered, "No!"
Now God blessed the earth in all four directions and it began to grow. But the earth that Satanael had in his mouth began to grow also and became so great that his lips stretched apart.
And God said, "Spit it out, Satanael." And he began to sputter and spat it all out, and wherever it fell cliffs and mountains grew up. Therefore is our earth greatly uneven.
"Wherefore hast thou made such mountains?" asked the Lord, "That man should weary himself in climbing them?"
"O Lord it is good that it is so hard," answered the Devil, "For now will man think of you and also not forget me. When he climbs up breathless he will say, 'Help, Lord!' When he descends the mountains he will think of me also, and say, 'The Devil has tempted me up on to this mountain, here one can break his neck only too easily.'"
Among the Philippone of the flat plains of Ost Preusen the story has this curious turn:
Then the earth grew in the mouth of the angel, he screamed and called on God for help, and spat out the earth at God's command, and there grew therefrom tobacco and hops.
We may continue the story as it is told among the Moguls (p. 67):
The earth grew continuously. As it had reached a large compass God and Satanael descended from the clouds and began to dwell upon the earth. From this time on, they used the clouds only for long journeys and when they wished to rise to the heavens.
To increase the number of the living upon the earth, God took two stones and struck them together. On the first stroke the Archangel Michael came forth and on the second the Archangel Gavril. Satanael envied God and wanted also to create servants. So he took two stones and began to strike them together. With every blow there came forth a devil. As he kept on striking a great throng of devils appeared. And God was angry that his companion knew no bounds in creating his kind, and forbade him the further creation of devils. Satanael stopped only when, after long labor, he found his stones no longer produced devils.
In Transcaucasia they say:
The archangel followed him and they came on a blue stone (or gold stone) which they raised up. But Satanael was under it and he sprang up, grabbed God by the throat, and nearly throttled him. God called on the archangels -for help, but they could not free him. There was nothing left but to beg Satanael. "Ask what you will of me, only let me free." And Satanael said, "I ask nothing except that we be brothers. And God promised this, whereupon Satanael let him go and went his way.
In a Greisinian variant (p. 32):
Michael and Gabriel wander through the earth, and the crust of the earth was so thin that they sank to the knees, although they wore snowshoes. Always a round stone rolled on before these angels, and God said, "We are tired of this stone." And in spite of the angels' warning, God shattered the stone with his foot, and lo, Satanael was in the stone.
In the Swanetic narrative:
God and his angels wandered through the world on their wonderful horses, and came on a great white stone. But the angels led God another way. Again they came on the stone and again the angels led God another way. "Some cheating is the cause," said God to the angels, "that we do not come upon this stone; otherwise we should have reached it already." The angels answered, "All right, we will bring you to the white stone, but we believe it will do you harm." They went to it and God broke the stone with his whip. Then the devil sprang out of it and grabbed God's horse. The devil said to God, "I and you were both in the same stone. I and you are of the same origin. I am the heart of the stone like you, so give me part of the world." While God chose for himself men and animals, the devil chose the souls. But the angels said to him: "Rejoice not overmuch. Know that the souls will remain in your hand only until a Son of God is born, who will free the dead from thy kingdom." The devil answered: "That will be a long time hence."
God placed himself and his archangels upon the cloud, raised himself high over the earth and created the heavens. Satanael made, with his devils, a second heaven that was higher than God's. God would not live below Satanael and raised himself higher and made a third heaven. In this way, vying with each other, they created nine heavens, one above the other, and Satanael began to build a tenth heaven still higher. Then God lost his patience and commanded his angels that they throw Satanael and his devils down from heaven.
Satanael and his angels fell down upon the earth. Each took his name from the place where he fell. He who fell in the wood became a wood devil, he that fell upon the water became a water devil.
In the Balkans they describe this fall of the angels thus:
As the angels under the earth mourn and complain we feel it as an earthquake, when they weep on the earth their tears are so hot that long drought follows, when floating among the stars they shed tears and we see them fall upon the earth as shooting stars.
We may continue the story as it is told by the Bulgarians:
As now Satan saw the great broad earth, he hit upon the deceitful plan of putting God to sleep and then throwing him in the water; taking possession of the earth himself and claiming honor as creator of the earth. God of course knew Satan's plan, but laid him down as if to sleep. Satan then seized God and carried him to the great water to throw him in. As he came to the shore the land began to grow rapidly so that he could in no wise reach the water. He turned back to the opposite shore, but for the same reason could not reach that. And as he could not reach the water from the third side because of the growth of the land before him, he let God slide down on the ground, and sank down beside him. After he had slept awhile he took God up again and carried him in the fourth direction to the water. As the land began immediately to grow in this direction also, so in this direction also he failed to reach the water.
He then waked God up, saying, "Arise, God, let us bless the earth 1 Lo, how it is grown while we slept." God answered him, "As you have carried me in four directions, to throw me in the water, and thus with my body described a cross, I have blessed the earth already, that it grow and flourish." This made Satan wroth and he left God. God remained alone, and the earth grew continuously, so that it could no longer be covered by the sun's light. Then God created out of his spirit angels and sent the war angel to ask Satanael what he should do to stop the earth's growing.
In the meantime the devil had made him a goat, and he came to God riding on the back of the goat, for which he had made a beard of earth. Since that time goats have beards to the present day. As the angels saw the devil riding toward them they laughed at him; he was wroth and rode back. On the instant God created a bee and said: "Fly quickly to Satan and listen to his speech. Return and inform me." The bee then flew to Satan and perched on his shoulder as he spoke to himself, "Oh, this foolish God (O dieser dummer Gott), he knows not that he needs only to take a stick and mark the earth with a cross and say: 'This much earth is enough.' He just doesn't know what to do! "Then God blessed the bee and commanded that its wax should serve to illumine weddings and funerals and its honey should heal the sick.
In the Rumanian Sage the bee goes to the wise hedgehog for advice and the hedgehog says:
" Plainly God does not know that he must create mountains and valleys to make room for the waters."
The Setts say (p. 128):
As the earth was created it did not fit under the arch of heaven. Where shall one put such a great disk? Just then the hedgehog came along and asked what the trouble was. "Verily the earth is done, but we can not get it under the arch of heaven and it would not do to break a piece off." "That's nothing," said the hedgehog, "You must squeeze the disk together a little and then it will go." Good: God quickly pressed the disk together and it was easy to stick it under the heaven.
Now there appeared here and there, by the pressure, wrinkles which are the present mountains and valleys. God gave the hedgehog, for his shrewd head, an excellent coat, all of needles, so that no enemy can get near him.
1. "Sagen zum Alten Testament."
|
News ID: 317166
Published: 0314 GMT October 17, 2021
Radkan Tower in Khorasan Razavi Province, a sophisticated instrument of astronomical science
Standing some 100 feet tall on a hillock in northeastern Iran, Radkan Tower was long assumed to be an ancient tomb, or perhaps a beacon guiding travelers in the area.
In fact, it’s likely it was something much more spectacular.
The tower known also as, Mil-e Radkan, is located 26 kilometers northwest of Chenaran, Khorasan Razavi Province.
Thanks to the discoveries of an archaeoastronomer, it’s now believed the Radkan Tower was an incredibly sophisticated instrument of astronomical science built nearly 800 years ago, wrote.
The yellow-brick tower dates to the mid13th century and was created by one of the greatest Persian scholars of the age, Muhammed Nasireddin Tusi. A polymath, scientist, and astronomer, Tusi is known for helping found the pioneering observatory at Maraqeh, East Azerbaijan Province, which, along with the Radkan Tower, collected invaluable information about the stars and sky during a period of remarkable scientific discovery.
The tower has 12 walls corresponding to the 12 months in a year, with 36 columns arund the exterior, topped with a conical roof. The structure seems to have been completed in 1261 CE.
Shape of the tower is like a cone. Internal diameter of tower is 14 and external diameter is 20 meters. The tower has dodecagon walls which are precisely constructed.
Date of construction, descriptions and some texts about designer are carved at the top of it
on a stone. Materials used for building the tower are brick, lime, plaster and clay.
On the days of the solstice and equinox each year, the sun is aligned perfectly to shine through the doors on opposite sides of the tower. It’s also believed the structure can determine the beginning of the four seasons, leap years, and the start of Norouz, Iranian New Year.
It was possibly with data collected here, and at his more famous observatory at Maraqeh, that Tusi managed to calculate the earth’s diameter and explain discrepancies between Aristotle’s and Ptolemy’s theories of planetary movement.
Security Key:
Captcha refresh
Page Generated in 0/8333 sec
|
Everything to do with pregnancy and infant care
How to make your kids pick up good values ?
We are social beings and we all have certain responsibility towards our society and its fellow members. The same thing must be taught to the kids as well. They to need to develop certain values within themselves to order to become a good social being and fulfill their responsibilities.
But it is easier to be said than done because kids might need a lot of explanation to understand moral lessons.
More often than not it may happen that they may learn the opposite things the to the ones which are being taught by the parents from their peers, environment, entertainment sources and other things.
As they spend much of their time in schools as compared to their homes, they are more likely to pick up the values or rather the behavioral traits of their peers.
A thing which the parents can do is to have a frank conversation with their kids and try to make them understand and differentiate between the good values and the negative ones. Kids must be taught to respect their elders. They must follow good manners- like healthy food habits, healthy sleep cycle, proper balanced diet. Since they are the members of society, they need to follow certain rules like helping the ones who are needy, assisting the disabled, caring for the nature as well for the animals. The explanations must be supplemented by examples for which the parents have to turn themselves as the ideal example, since kids imitate whatever their parents do.
The parents must set a good example in order to make their kids good social beings.
Leave A Reply
Your email address will not be published.
|
Infographic Category Animals
Is the Lion King Based on Hamlet?
By | source:Here Dec 2nd, 2021
Is the Lion King Based on Hamlet by William Shakespeare? While there are definitely some similarities, it’s hard to say for sure. Here’s why…
As shown in todays daily infographic, the major plot points of The Lion King follow a near identical pattern to the classic play Hamlet by William Shakespeare. Is this a coincidence?
The Lion King is a popular animated movie that came out in 1994 to huge success. It tells the story of a young prince coming of age and attempting to reclaim the kingdom from his evil Uncle Scar.
The truth is, just about every fairy tale is a retelling of a classic story that has been told as long as we can remember. You can look at just about every animated movie that comes out and see some similarities between it and a previous story from a previous generation.
With that being said, it is hard not to see the direct comparisons between The Lion King and Hamlet. The major divergence appears at the end of The Lion King. The movie ends in a happy way with the iconic song “The Circle of Life” being played. This is contradictory to the end of Hamlet and definitely leaves the audience with a different feeling and message about what they just saw.
Most of the differences between the two works can be attributed to the intended audiences for each. The Lion King is clearly made for a younger demographic while Hamlet is made for adults. That alone can explain many of the divergences between the two stories.
Is the Lion King Based on Hamlet?
The final verdict is… Yes, The Lion King is loosely based on Hamlet but has many key divergences. This is mostly due to the intended audience of the film being much younger than the original. The similarities are undeniable between the two stories and while The Lion King puts its own spin on things in many ways, the references to Hamlet are definitely there.
|
Inheriting the Legacy of Japanese Imperialism
2 months ago 18
Take a kaleidoscope, peer inside its lens and turn the dial: the jeweled-mosaic pattern within deforms and reforms anew. Asako Serizawa mirrored her debut short story collection Inheritors after this complex design. Out of chronological sequence, the thirteen short stories locate twelve related characters across 1868 (the Meiji Restoration) to 2035. A grandmother wanders the streets of California, marking her past by the kinds of tomato plants she’s grown, as her memory takes flight. Then, a young daughter witnesses the dissolution of her parents’ marriage when her father’s identity is completely overturned during their family trip to Japan.
Inheritors by Asako Serizawa
Other stories experiment with form, mimicking official historical documents. A one-sided transcript about comfort women supplies only the subject’s answers; a police interrogation file stacks evidence against a boy for a Communist assassination plot; the last flight log of a young pilot records his last days, hours, minutes.
At first, their connections are unclear, so each rereading offers a fresh revelation about a character glimpsed or refracted through the memory of another. The family tree of five generations included at the beginning is helpful to orient oneself and navigate the timelines, connections, and perspectives scattered across the globe.
“Yet the fully enlightened earth radiates disaster triumphant,” wrote Theodor Adorno and Max Horkheimer in the aftermath of the Holocaust and Nazi fascism, a consequence of the Enlightenment’s seductive notions of human progress and superiority. This quote serves as the epigraph to Inheritors, which grapples with Japan’s fascism, among other things.
Given the fraught relationship between Japan and the countries it occupied—Korea, Malaya, Manchukuo, and islands across the Pacific Rim (for context on Singapore and Malaysia, Tash Aw reviewed the collection for the New York Review of Books)—as well as the US and its global hegemony, Serizawa’s Inheritors is a welcome corrective and a deeply-considered, impressive debut. Serizawa complicates the cut-and-dry categories of victim and perpetrator by showing how one can so easily slip into being either. Oddly, for a book on horrific human violence, the collection gave me hope for the possibility of reparations, restitution, and light. With its myriad voices, Inheritors opens space for more stories effused with empathy, repelled by rather than bound to triumphant resolution.
Esther Kim: I first heard of Inheritors from my partner, who came across your book at Lit Books, an indie bookshop in Petaling Jaya, Malaysia during the early pandemic days. He texted me a photo of the author’s note at the end, which immediately made me want to borrow it.
So I want to start with a question at the end, the bio that mentions you grew up in Singapore and Jakarta. Can you tell me about your childhood in the cities, and how they may have shaped your thinking on this subject of World War II?
It’s difficult to talk about the trauma of a perpetrator because you don’t want to end up excusing their actions. And yet, these are people who have done these things, and they live with this thing.
Asako Serizawa: Because of my father’s job, we left Japan when I was one. And I lived in Southeast Asia until the middle of high school. I think my parents assumed that we weren’t going to be there very long, and this was an opportunity for me to learn English. When kindergarten started, I essentially entered the British-based international school system and got this colonial type of education, so my knowledge and understanding of the history of the region was general and pretty vague until we returned to Japan. This was also the height of Japan’s economic dominance, so I never really got confronted with this history even though I spent my early years in Southeast Asia.
The region is disfigured by American, European imperialism and colonialism, and more recently, Japanese imperialism and colonialism and certainly invasion and occupation during the Second World War. When I started to learn this history when we returned to Japan, it was shocking to realize that I had lived in this area for so long, and I had the privilege of not really knowing that much about it.
That experience of finally learning about this history stayed with me and really got me thinking about institutional, systemic, or structural collusions that allow for this muting of certain stories.
In Japan, World War II is a ubiquitous topic. Growing up, we returned to Japan to visit my grandparents. The war was such a reference point, especially for that older generation, and so it was always a topic. It was always on TV—and it’s a fraught history—so it’s always on the news. Yet there’s this curious silence around it. My grandparents lived through the war, and my parents grew up during the American occupation, but they never talked about that history. They’ll mention things like, “Oh, you know, war is bad,” but they never really talked about their experiences.
EK: You’ve mentioned in an excellent interview for Asian Books Blog that this collection took 12 years to write. In your author’s note, the line I really loved was where you say, “What I can say is my concern was less to capture a time, place, or event than to responsibly represent that time, place, or event.” And that word “responsibly” really stuck out to me because that suggests there’s also an irresponsible way to write this. What was it like to apprehend these stories?
AS: This book was written as a counter-narrative to several different kinds of official historical narratives: the sort of triumphalist American narrative on a successful democratizing mission; the Japanese ultra-nationalist narratives that tend to downplay or outright suppress atrocities to really create a streamlined, convenient history. All of these things have this way of presenting a history with a clear beginning, middle, and end that serves their particular political viewpoints.
That experience of finally learning about [the history of Southeast Asia] got me thinking about institutional collusions that allow for this muting of certain stories.
So this is partly why I wrote my book as an interconnected collection, rather than a novel to resist that representation of history. Because in the end, this history isn’t necessarily linear, in the sense that there isn’t a clear beginning, middle, and end.
A huge question for me was how to access the various stories and narratives within the history. Some stories didn’t emerge until much later, for example, or certain stories are the voices that are suppressed or repressed. The question then was how to access and represent these stories and how these are all interconnected.
The other part I have an investment in centering—trying to get as much of—the complexity of the context into these stories because I think there’s a way in which this history—or any history—is streamlined, which means that there’s a lot of omissions. I have an investment to get those back in and also create a space for more stories because I think that there are many, many, many, many stories to be told about this time that have been omitted, suppressed, silenced, or repressed. When you have a collection, with discrete pieces like this, hopefully, it’s invitational for other people to add their stories around this history.
EK: I found I learned so much through Inheritors about certain darker aspects of Japanese Imperialism, such as the experiments on humans in Manchuria (“Train to Harbin”) and the Korean miners who tunneled through Japan (“Luna”). Were certain characters’ minds more difficult than others to enter or write?
AS: I try to find characters that allow me to explore the complexity of the situation, and so, it’s funny, each character had their own challenges. Perpetrators are always tricky to write because I certainly didn’t want to end up inadvertently justifying or excusing war crimes, for example, but for me, it was imperative to lend that humanity to the character.
Going through all of this material, you realize it’s really a privilege to think “We wouldn’t do these things. We wouldn’t commit these crimes” or “How can one do such horrible things to another human?” And we can sit here thinking, “Oh, we would never do this.” But that’s really not the case. I mean, there are definitely sociopaths. There’s no doubt, but I think that many people were just ordinary people who would have never imagined doing these things. And I think one thing that you hear over and over again is these people’s astonishment at themselves.
There was a documentary featuring interviews with all these Japanese war criminals that came out a number of years ago. I think it was called “Japanese Devils.” It was really disturbing, not only because you’re hearing all of these horrible and really inhuman things that people were doing to each other, but the other part was just how blank these people were when they were talking. They look completely stricken. Done stuck in a particular place. It was one thing I didn’t expect to see, and I realized that there was a trauma there. These were traumatized people who had basically bifurcated themselves.
It’s really difficult to talk about the trauma of a perpetrator, the war criminal, again because you don’t want to end up excusing or justifying their actions. And yet at the same time, these are people who have done these things, and they live with this thing. And what do they do with this, these stories, these experiences, these memories? There’s really no room for these people’s stories in the aftermath. Yet it’s crucial to understand them because it’s so easy for a society and for all of us to scapegoat these people and feel like, “Well, you know what, we’re done with these criminals,” and the society is safe. It’s easy to do that, but any of us could occupy that position, given the pressures.
EK: The collection excels at complicating the cut-and-dry categories of “the oppressed” and “the oppressor” (or perpetrator and victim). For me, the short story “Pavilion” illuminates this with the discovery of Seiji and Masaaki’s shared parents and their discussion of fate in Borges’s The Garden of Forking Paths. What were some of the questions you hoped to explore with this pair of characters?
AS: It gets at one of the book’s gravitational cores for me: the issue of individual agency, alongside personal and collective responsibility, and the entangled intergenerational consequences of imperialism, colonialism, and war. The gnarly family tree that makes up the spine of the book is, in my mind, an expression of this history and its violent cleaving, together and apart, of people, families, nations, and their indelibly etched psychic spaces.
Is genuine healing possible? What would it look like, and what would it entail? And where do we start, not just collectively but individually—personally?
And “Pavillion,” which brings together two strangers, seemingly from opposite sides of the oppressed/oppressor divide, who, as you said, discover their shared parents, is, on one level, an exploration of their gridlocked connection, and the violence, as well as the unresolvable cruelty, inherent in their “blood” ties, their inseparable “familial” roots. On another level, “Pavillion” poses, and the characters attempt to answer, the unanswerable question that haunts not only this story but the book as a whole: is healing, genuine healing, possible? What would it look like, and what would it entail? And where do we start, not just collectively but individually—personally?
EK: Lastly, there’s a short story writer, South Korean writer Choi Eunyoung, who I wanted to recommend to you because she has a similar aesthetic and wrestles with similar questions. There’s one short story “Xin Chào Xin Chào” in her collection Shoko’s Smile in particular about South Korea and Vietnam from a child’s perspective I’m reminded of.
AS: Have you read Elaine Chiew’s The Heartsick Diaspora? She’s a Singaporean Malaysian British writer. It’s one of the short story collections I read during the pandemic that I really enjoyed. I hope that more stories emerge from this period, especially from Southeast Asia, and enter the US and the western part of the world.
Take a break from the news
We publish your favorite authors—even the ones you haven't read yet. Get new fiction, essays, and poetry delivered to your inbox.
Read Entire Article
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.