text
stringlengths
144
682k
It's 2021. Why do we have a 19th-century Supreme Court? Image via US Court system. Since 1869, the Supreme Court has had nine justices. In that time, the population of the U.S. has grown from 38.5 million to 332 million. Thirteen states were admitted to the union in that intervening 152 years. Women have gained the vote. The American population has become vastly more diverse, society far more pluralistic, and daily life far more complex thanks to innovation, technology, and a global environment. Looked at through that lens, it's absolutely insane that anyone is clinging to the notion that there should not be a fundamental shift in how the highest court in the nation operates, since it has to deal with all of those vast changes in America every session. Since the Republican Party of 2021 would just as soon it was the 1860s (pre-Civil War, if they had their druthers), it's not too shocking that they're fighting fang and claw to keep the court as it's been for a century-and-a-half. Particularly since they've finally managed to get a reactionary majority established there. The last time the idea of court expansion came up, it was 1937 and Franklin Delano Roosevelt—who had won a landslide victory in 1936—was dealing with a conservative court that was striking down critical initiatives in his New Deal agenda, hampering his ability to get the country out of the Great Depression. The court then, as now, had a majority of regressive reactionaries, making increasingly out-of-step and unpopular rulings. One case in particular helped tip the balance of public opinion, a case that has uncomfortable echoes in 2021: "[I]n June 1936, the court, by 5 to 4, struck down a New York state law providing a minimum wage for women and child workers. Laundry owner Joe Tipaldo, said the court, could continue to exploit female workers in his Brooklyn sweatshop; the state was powerless to stop him." One historian, Alpheus T. Mason, wrote that this decision "convinced even the most reverent that five stubborn old men had planted themselves squarely in the path of progress." Sounds familiar, huh? At that point, FDR came up with a pretty ingenious plan: a new member of the court for every sitting justice age 70 or older, and a new appointment whenever a justice turned 70 and did not retire. That would leave not a set number of justices, but a flexible one. Of course, FDR's plan failed in one sense—he didn't get congressional support to enact it. However, the Supreme Court also began to support his New Deal legislation and even reversed itself, upholding the constitutionality of a minimum wage law in a case from Washington state in a 5-4 decision. Justice Owen Roberts was the swing vote in that case, and went on to protect FDRs New Deal policies in subsequent cases. The situation in 2021 isn't all that different. We're in another crisis: the global pandemic. Republicans are as reactionary now as they were in 1937, and as out of touch with the needs of the people. There's another Roberts on the bench who might just be exerting a moderating influence on the court. Dalia Lithwick takes note of the "many unexplained mysteries of the current Supreme Court term," including "the court's failures to take up major gun rights appeals or a long-simmering 15-week Mississippi abortion ban that might be the perfect vehicle for a challenge to Roe v. Wade." She points out that Chief Justice John Roberts "went from being the essential fulcrum on a court split between four liberal and four very conservative jurists, to a choice between being the sixth conservative on a far-right court or a dissenter" since Amy Coney Barrett was shoved onto the court by the former guy and Mitch McConnell. Roberts might be eyeing the growing support for court expansion—including among scholars and influencers and, yeah, that Biden commission that may or may not be useless—and thinking that he needs to do something to slow the momentum behind that. He could be thinking about his own legacy and might sincerely not want to be the guy that plummets the country back to the gilded age. Or he might just be waiting for the next case that hands the reins completely over to corporate America. Roberts was the deciding vote, after all, in gutting the Voting Rights Act in 2013, unleashing a torrent of voter suppression laws throughout the country. Roberts was one of the six who decided this week that children can be incarcerated for life without the hope of parole. He handed that decision to Brett Kavanaugh to write—the same Brett Kavanaugh who has credibly been accused of attempted rape of a classmate as a juvenile, the Brett Kavanaugh who told the Senate Judiciary Committee that his activities as a teen shouldn't be held against him. "If we want to sit here and talk about whether a Supreme Court nomination should be based on a high school yearbook page, I think that's taken us to a new level of absurdity," he said. He can't be held accountable for his actions as a minor, but is fine condemning others to life in prison from his seat on the most powerful court in the nation. As is Roberts. At the same time, the country is a vastly different one from what it was in 1937. Starting with the part where a president—who was elected with the assistance of a foreign adversary and attempted to coerce yet another foreign leader into finding dirt on his political opponent—tried to overturn the results of an election and sicced an armed mob to ransack the Capitol and intimidate the Congress. And the part where there are Republicans still serving in Congress who endorsed that action. One of the two major ruling parties of the United State will do anything—ANYTHING—to regain political power and hold it forever. That's the party that created this Supreme Court, the court that just rubber-stamped the barbarity of keeping a juvenile incarcerated for life. The Supreme Court that in 2020 allowed the resumption of the federal government killing people in the name of "justice," keeping the U.S. in a death penalty league with China, Syria, and Saudi Arabia. So, yes, it's time for the Supreme Court to join the 21st century and be modernized. It's time for 20th-century politicians like House Speaker Nancy Pelosi and President Joe Biden to recognize that. Considering where we are in 2021 and where the Republican Party is, balancing the court with the addition of four qualified and experienced judges is the most reasonable and modest reform imaginable. Understand the importance of honest news ? So do we. Click to donate by check. DonateDonate by credit card Donate by Paypal {{ }}
Popular Museums in the United Kingdom There are so many places in the United Kingdom to travel. Among them, I have chosen some museums to describe to you. When you visit these places, you can learn about the culture and history of the United Kingdom. And also, you can gather more details regarding the history of the United Kingdom. I think you can enjoy it thoroughly. You will find exciting stories about the history and culture and many others.  Now I’m going to describe to you a special place in the United Kingdom. The British Museum British Museum First of all, I will start at the British Museum. This museum is located in the world-famous city, London, in the UK. The museum symbolises human history, art, and culture. It is the largest and most comprehensive collection of over eight million work widely cited in the era of the British Empire. There are about eight million objects in the collection of the museum. Robert Smirke, Sidney Smirke, John James, John Russell, and more artists have created the group. The British Museum was the first public national museum in the world. It has been stored the story of human culture from its beginnings to the present. It was established in 1753, 266 years ago. Also, There was an extensive collection of the Irish physician and scientist Sir Hans Sloane. The museum first opened to the public in 1759 on the site of the current building. Over the next 250 years, its expansion was primarily a result of British colonisation and the emergence of several branches. Also, The first one was the National History Museum in 1881. So these are some details about the British Museum. I think you will interest in these details if you are willing to travel to this museum. Next, I will explain about the London Transport Museum. London Transport Museum London Transport Museum If you are willing to know about old vehicles and transport systems, you will interest in visiting this museum. Also, It is an excellent place because we can learn about the evolution of the transporting system in the UK. The museum is located at the Convent Garden, London. They have created transport methods very attractively. You will be amazed if you visit the London Transport Museum. Also, The museum also represents the growth of modern London, culture, and society since 1800. The museum care for over 450,000 items- preserving, searching, and acquiring objects to use in the gallery. Not only that but also the items are used in exhibitions and other activities. There are two sites in the transport museum in London. The leading site is in the Convent Garden, and the other site is in Acton. The leading site is open to the public every day. The website which is located in Acton is known as London Transport Museum Depot. Also, That is open on regular visitor days throughout the year. That is principally a storage site. There are so many displays such as buses, trams, trolleybuses, and rail vehicles from the 19th and 20th centuries. I will name some shows for you. Alos, Double-deck trolley bus, Double-deck horse bus, Iconic London buses, City & South London Railway, and there are many to see. You will enjoy it a lot if you visit the London Transport Museum. Here, I will explain to you another museum that is located in the UK. Science and Industry Museum This is not the Science and Industry Museum. This image is for illustration purposes only. The formal name of the museum is the Museum of Science and Industry. The museum is in Liverpool Road, Manchester, England. It is large and devoted to the development of Science, Industry, and Technology, highlighting the city’s achievements in these areas. It is a part of the Science Museum group. A non-departmental site of the Department for Culture, Media and Sport has connected with the National Science Museum in 2012. On 15th September 1983, the museum was established. There are wide displays on the theme of power, transport, textiles, communication, and many other themes. Also, the museum is a special point of the European Route of Industrial Heritage. The original name of the museum was the North Western Museum of Science and Industry. It opened to the public in 1969 in Grosvenor Street in Chorlton-in-Medlock as temporary premises. There are some previous permanent exhibition galleries to know you. But now they have been decommissioned. Some of them are an electricity gallery, gas gallery, a space-themed gallery, and underground Manchester. Also, Including the large collection of stationary steam engines, diesel engines, hydraulic pumps, large electric generators, there is a heavy collection that museum exhibits. I think there will be some readers that they love this kind of museum very much. Here I will explain the next museum that I have selected. Kelvingrove Art Gallery and Museum Kelvingrove Art Gallery and Museum This is for those who are loving to find details under the theme art. Kelvingrove Art Gallery and Museum in Glasgow, Scotland, is a popular museum that contains the history of art. After three years of modernisation, the museum reopened in 2006. This museum is one of the most popular tourist attractions in Scotland. Including Renaissance art, taxidermy, and artifacts from ancient Egypt, the museum has 22 galleries. The museum was established in 1901. The location of the galleries is Argyle Street, in the West end of the city on the river kelvin’s banks. The location is near the main campus of the University of Glasgow in Gilmorehill and adjoining the Kelvingrove Park. Old Masters, French impressionists, Dutch Renaissance, Scottish Colorists, and exponents of the Glasgow school are the artists of the items that the museum consists of. The collections of the museum come from McLellan Galleries and from the Old Kelvingrove House Museum in Kelvingrove Park. It has the best collection of weapons and armour in the world and a large natural history collection. The museum also houses a large gift of fine art, the Anne Hull, the neo-colonial collector and philanthropist covering the history of European jewellery in the 18th and 19th centuries. Now I will present to you some famous creations in the Kelvingrove Art Gallery and Museum. They are Mummified man’s head, Pipe Organ, Jubilee bust of Queen Victoria, The floating heads by Sophie Cave. So here I bought you some details on Popular Museums in the United Kingdom. I think this information will be important for you if you like to travel to these areas and not only these museums there are more museums to travel in the UK. Also, I hope you will enjoy well in these areas, and this article topics be helpful for you if you are interested in these topics. Please enter your comment! Please enter your name here
Personnel Image Written By Bianca de Loryn College of Healthcare Sciences Publish Date 12 October 2021 Related Study Areas Researching media use during the pandemic For World Mental Health Day (10 October), music psychology scholar Dr Amanda Krause shares her research results from a media use study she conducted with JCU students during the lockdowns in 2020. Her result: music is the best medicine. Since the beginning of the COVID-19 pandemic, people in Australia and all over the world had to get used to social distancing and frequent lockdowns. Because of this, millions of people have spent more time than ever at home, watching television, engaging with social media, playing video games and listening to music. But are all types of media the same when it comes to wellbeing during the pandemic? This is what Amanda wanted to find out. “We know that people use a lot of media. We wanted to see the impact that media and news had with regard to people's quality of life,” Amanda says. Amanda particularly wanted to know how university students used media and how this made them feel during the pandemic. So, she asked 127 JCU students to participate in this research. “The majority of the students was quite young, in their first, second, or third year of university studies,” Amanda says.  “We asked them the same questions six times over the research period, which was early to mid-2020, to see if their media use would change over time.” Music has always been a social activity The research results showed that that music helped people cope during the pandemic. “We saw that there is actually a positive relationship between music listening and quality of life that we didn't see in other forms of media,” Amanda says.  “We think that there is something there about music listening that might be different from other media uses." “Music makes us feel less lonely,” Amanda says. “Music has always been, since the dawn of time, an inherently social activity, and my colleagues have shown how music can act as a social surrogate. This is also applicable in lockdown situations.” “We can see that through music listening, even if you are on your own, isolated, by yourself, you can feel a sense of community and connection to other people,” Amanda says. “That might be the difference in terms of music listening and other forms of media, such as TV.” Amanda Krause. Man listening to music Music helps us remember the beautiful things in life The COVID-19 pandemic aside, people benefit emotionally from listening to music. “One of the most often cited reasons for listening to music is to manage your mood,” Amanda says.  “So, it just makes sense that in a time of stress brought on by the pandemic we can use music as a resource to feel better.” In addition, music is with us when we experience major events in our lives. “When you are adolescent or an early adult, music is accompanying a lot of critical experiences at that time. That's one of the reasons why we have very strong memories that are associated with music,” Amanda says. “The first song that you dance to with a partner, or the song you dance to at your wedding or a road trip. These songs stay with us through our lives.” When Amanda and her co-researchers first started the media use study in April 2020, it was scheduled to run until mid-July 2020, as the researchers were hopeful that the pandemic would be over by that time. “We wanted to collect data over time and when the pandemic finished,” Amanda says. “But it soon became clear that the pandemic wasn't over in July. Now we see that there still isn't an end date.” Music might help us heal after the pandemic Even when the pandemic is over, people will still have to deal with the consequences of social distancing, lockdowns and travel bans. “The impact of this pandemic will be years and years in the future in terms of mental health. We have a long way to go to help and manage people’s mental health,” Amanda says. “This is why I like thinking about music listening, which has very little cost, and how we can use that as a tool to support wellbeing.” Improving mental health with music: the Indigo Project This is one of the reasons why Amanda got involved in researching how music influences our well-being. “One of the organisations I work with is called the Indigo project, a mental health organisation based in Sydney,” Amanda says. “One of their events is called Listen up. It's a dedicated time where people come and do some mindfulness and listen to an album or a curated experience.” “This is really interesting work because, in our everyday lives, we listen to a lot of music. But it's often accompanying something else that we're doing,” Amanda says. “During the Listen up sessions, though, people were focused solely on the music, and they experienced strong emotional journeys. They were able to process complicated and complex emotions with the music helping to guide that process. It released tension, and in some cases helped process pain and memories as well.” Mental health one year into the pandemic Looking into the future, Amanda is still interested in researching how people are coping with the pandemic. “We currently have a group of fourth year students who are working on their Honours project. In their study, they asked students about their mental health a year into the pandemic. They asked questions about the impact on people's social wellbeing, on their mental wellbeing, on their physical wellbeing, as well as their coping strategies,” Amanda says. “It will be interesting to consider whether people talk about the use of media as a coping strategy.” Will music be a part of their coping strategy? As the research is still ongoing, the results are not clear yet. But Amanda says it wouldn’t be surprising if music would, again, be named as an effective tool to support wellbeing. Discover JCU Psychology Study the human mind and help improve mental wellbeing for all ages Researchers profile picture Featured researcher Dr Amanda Krause Lecturer, Psychology As a music psychology scholar based at James Cook University, Dr Amanda Krause studies how we experience music in our everyday lives. Her research asks how our musical experiences influence our health and well-being. Amanda is the author of numerous academic publications and currently serves as President of Australian Music & Psychology Society (AMPS). She has also spoken on her research to students, academics, and industry leaders around the world, and to members of the general public via radio show appearances and events like Pint Of Science. Her current research collaborations explore the role of the radio in promoting individual and community wellbeing.
You are here Creative Mathematics Alan F. Beardon Cambridge University Press Publication Date:  Number of Pages:  AIMS Library Series [Reviewed by Charles Ashbacher , on There is no question that mathematics is a creative endeavor. New ideas are constantly developed, examined, polished and then presented. From those ideas, it is possible to create specializations or generalizations, in many cases both. In this book, Beardon takes eleven problems, presents them, gives a solution and then gives a generalization of the problem-solving strategy. Throughout the process, there is an explanation of how mathematical results are derived, sometimes by solving a specific case and generalizing and other times by solving the general case first and then working to the special case. The problems cover a wide range of topics in geometry, number theory, probability, polyominoes and a set of weights that will allow any amount to be weighed, although the specific nature of the problems is not the major point. The main idea in this book is to illustrate how solutions to problems are derived in a step-by-step manner and then those results used to solve additional problems. Beardon does an excellent job, making this a book that would be an effective text in courses for math majors where the focus is on learning how to do mathematical proofs. Preface; Part I. Style and Presentation: 1. Solving problems; 2. Writing mathematics; 3. Giving a presentation; Part II. The Problems: 4. A first look at the problems; Part III. Solutions and More Problems; Part IV. Discussion and Generalisations; Index.
Next Article in Journal Dual Role of p53 in Innate Antiviral Immunity Next Article in Special Issue Heterologous Prime-Boost HIV-1 Vaccination Regimens in Pre-Clinical and Clinical Trials Previous Article in Journal Evasion of the Interferon-Mediated Antiviral Response by Filoviruses Previous Article in Special Issue The Development of an AIDS Mucosal Vaccine by 1 and 1,2,* AIDS Institute, Li Ka Shing Faculty of Medicine, The University of Hong Kong, Hong Kong SAR, China Department of Microbiology and Research Center of Infection and Immunology, Li Ka Shing Faculty of Medicine, The University of Hong Kong, Hong Kong SAR, China Author to whom correspondence should be addressed. Viruses 2010, 2(1), 283-297; Received: 12 October 2009 / Revised: 20 January 2010 / Accepted: 20 January 2010 / Published: 22 January 2010 (This article belongs to the Special Issue AIDS Vaccine) It is well known that mucosal tissues contain the largest surface area of the human body and are the front line of natural host defense against various pathogens. In fact, more than 80% of infectious disease pathogens probably gain entry into the susceptible human hosts through open mucosal surfaces. Human immunodeficiency virus type one (HIV-1), a mainly sexually transmitted virus, also primarily targets the vaginal and gastrointestinal mucosa as entry sites for viral transmission, seeding, replication and amplification. Since HIV-1 establishes its early replication in vaginal or rectal mucosal tissues, the induction of sufficient mucosal immunity at the initial site of HIV-1 transmission becomes essential for a protective vaccine. However, despite the fact that current conventional vaccine strategies have remained unsuccessful in preventing HIV-1 infection, sufficient financial support and resources have yet to be given to develop a vaccine able to elicit protective mucosal immunity against sexual transmissions. Interestingly, Chinese ancestors invented variolation through intranasal administration about one thousand years ago, which led to the discovery of a successful smallpox vaccine and the final eradication of the disease. It is the hope for all mankind that the development of a mucosal AIDS vaccine will ultimately help control the AIDS pandemic. In order to discover an effective mucosal AIDS vaccine, it is necessary to have a deep understanding of mucosal immunology and to test various mucosal vaccination strategies. Keywords: HIV-1; AIDS; vaccine; mucosal vaccination; MVTT HIV-1; AIDS; vaccine; mucosal vaccination; MVTT 1. Introduction Mucosal membranes contain the largest surface area of the human body, providing protection for various body cavities exposed to the external environment and internal organs. Mucosal membranes comprise the linings of gastrointestinal, urogenital and respiratory tracts [1]. They are actually the portal of entry for more than 80% of infectious disease pathogens, and the first line of defense for host protection from infection through various mechanisms including physical barriers, mechanical discharge, chemical degradation, innate immunity, and specialized mucosal immune responses [2,3]. Mucosal tissues represent a critical immunological repertoire, which is compartmentalized and independent from systemic immune organs [4]. Mucosal tissues in a healthy human body comprise as much as 80% of all lymphocytes, which may transfer between various mucosal-associated lymphoid tissues (MALTs) [4]. B-lymphocytes in MALTs mainly produce secretory IgA or sIgA, which is released as a covalently linked dimer. This unique structure makes sIgA more stable and resistant to many kinds of digestive enzymes. sIgA is considered to be the major protective immunoglobulin on mucosal surfaces [4]. T lymphocytes on the other hand either act as cytotoxic T lymphocytes (CTL) (e.g., CD8+ T cells) or help the induction of both cellular mediated immunity and antibody response (e.g., CD4+ T cells) [4]. Upon encountering foreign antigens, the activated B and T cells may migrate from inductive sites (e.g., Peyer’s patches in the gut, and nasopharynx-associated lymphoid tissue (NALT) in the oropharyngeal cavity), travel through lymph nodes and the peripheral circulation and back home to effector sites (e.g., such as the lamina propria of the intestinal and respiratory tracts, and glandular tissues). This results in the generation of antigen-specific T helper 2 (Th2) cell-dependent IgA responses, and T helper 1 (Th1) cell- and CTL-dependent immune responses, which function as the front line of defense at mucosal surfaces. The homing behavior of these cells is mainly attributed to the up-regulated expression of site-specific adhesion molecules and cytokine receptors that guide the cells back to mucosa by recognition of mucosal tissue-specific receptors on vascular endothelial cells [5,6]. Critically, mucosal inductive sites stand as sentinels to the intestinal and respiratory systems and represent the major sites where mucosal immune responses are initiated. Human immunodeficiency virus type one (HIV-1), the causative agent of acquired immunodeficiency syndrome (AIDS), is a mainly sexually transmitted virus. HIV-1 primarily targets the gastrointestinal and vaginal mucosa as entry sites for viral transmission, seeding, replication and amplification. Since HIV-1 establishes its early replication in vaginal or rectal mucosal tissues, the induction of sufficient mucosal immunity at the initial site of HIV-1 transmission becomes essential for a protective vaccine. Here, we provide an overview of the development of an AIDS mucosal vaccine and perspectives of mucosal vaccine candidates against HIV-1. 2. A Brief History of Mucosal Vaccines A vaccine is a biological preparation that induces immunity against a particular disease. The term vaccine derives from Edward Jenner's use of the term cowpox (Latin variolæ vaccinæ, adapted from the Latin vaccīn-us, from vacca cow) in 1796. Edward Jenner demonstrated that cowpox, when administered to humans, provided them protection against smallpox. The history of using a biological preparation to prevent smallpox, however, was traced back to Northern Song Dynasty (960–1127 A.D.) when Chinese Ancestors collected scabs from skin lesions of smallpox patients and used the ground down particles to prevent new infections, a procedure called variolation [7]. Interestingly, the procedure involved the delivery of the biological preparation through intranasal inoculation, a common route of modern mucosal vaccination. This technique was subsequently introduced to European countries by Lady Mary Montagu prior to 1762, which later led to the discovery of vaccines and modern immunology [8]. During recent decades, with the rapid development of modern immunology, significant progress has been made to understand the structure and function of the mucosal immune system. It is now clear that mucosal vaccines educate immune cells in mucosal inductive sites and can thus induce protective immunity in both the mucosal and systemic compartments. One of the classical mucosal vaccines is the oral polio vaccine (OPV), a live-attenuated strain with spontaneous mutations in the viral genome. OPV was generated by a series of passages of a polio virus through non-human cells at sub-physiological temperature [9]. In comparison to the inactive polio vaccine (IPV) given by injection, OPV not only elicits neutralizing antibodies to prevent the spread of poliovirus to the nervous system, but also induces excellent sIgA response in the intestinal mucosa, the primary site of poliovirus entry and replication, which contributes greatly to the worldwide eradication of polio. However, because of concerns over the reversion of the live-attenuated vaccine into a virulent form, OPV has been largely replaced by IPV in developed countries. Another well known mucosal vaccine in recent years is FluMist®, which is a live attenuated, trivalent cold-adapted influenza vaccine (CAIV-T) manufactured by MedImmune, Inc [10-12]. FluMist is given as a gentle nasal mist. This nasal vaccine has been proved to be safe, effective and well tolerated in adults including those infected with HIV-1. It was approved by the United States Food and Drug Administration (FDA) in 2003 and became available on the market in the same year [10-12]. The current version of CAIV-T is a refrigerator-stable formulation of FluMist®, containing components of live attenuated influenza viruses of each of the three strains for the 2009-2010 season: A/South Dakota/6/2007(H1N1) (an A/Brisbane/59/2007-like), A/Uruguay/716/2007 (H3N2) (an A/Brisbane/10/2007-like), and B/Brisbane/60/2008. These findings have demonstrated the successful application of mucosal vaccines in protecting humans from viral infections. 3. HIV-1 infection in mucosal associated lymph tissues Since conventional vaccines have not proven successful against HIV-1 infections, it is necessary to explore other strategies including mucosal vaccination. Genetically divergent HIV-1 and its cousin, simian immunodeficiency virus (SIV), use host proteins CD4 and the chemokine receptor CCR5 as primary and secondary receptors [13,14]. Moreover, HIV-1 and SIV both replicate optimally in activated memory CD4+CCR5+ T cells, a cell type that is abundant in mucosal lymph tissues [15]. It was first demonstrated in the SIV/macaque model system that the mucosal lymph tissues are the initial and predominant sites of SIV infection [15,16]. At the acute stage of infection, not only was the high viral load detected in the intestinal mucosa, but SIV infection resulted in pathogenic effects as indicated by the depletion of a significant proportion of CD4+ T cells in the guts but not in peripheral blood [17]. Since at this stage, similar effects have not been found in peripheral lymphoid tissues, the intestine appears to be a major target for SIV replication and the major site of CD4+ T cell loss in early SIV infection. In fact, the gut-associated lymph tissues contain about 40% of the total lymphocytes [18]. Similar findings were subsequently made in macaques infected with human/simian immunodeficiency virus (SHIV) harboring CCR5-tropic HIV-1 envelope, implicating the mucosal lymph tissues as being the initial and predominant sites of HIV-1 infection [19,20]. CD4+ T cell loss predominates in the effecter sub-compartment of the gastrointestinal (GI) mucosa at all stages of HIV-1 disease [21]. This loss did not appear to be easily reversible as there was a significantly greater CD4+ T cell loss in the GI mucosa despite over five years of fully suppressive therapy [21,22]. Since sexually transmitted HIV-1 establishes its initial replication in mucosal tissues, the induction of sufficient mucosal immunity at the initial site of HIV-1 transmission becomes essential for the development of a protective vaccine [16,18]. Some studies have tried to understand the early events following the transmission of SIV or HIV-1 via the mucosal surfaces. Both viruses were found to replicate predominantly in CD4+ T cells at the portal of entry and in lymphoid tissues [23]. The viruses were found propagating not only in activated and proliferating T cells but also in resting T cells. Because most of the HIV-1-infected resting T cells persisted after antiretroviral therapy, it poses great difficulties when attempting to eradicate the virus in vivo [23]. However, SIV did not readily disseminate to the systemic circulation but rather localized to the mucosa of viral inoculation at the very early stage of infection [23,24]. Moreover, the mucosal barrier greatly limits the infection of cervicovaginal tissues, and thus the initial founder populations of infected cells are smaller [25,26]. Recent findings have further indicated that a dramatic evolutionary bottleneck occurs, with 80% of heterosexual infections apparently initiated by a single variant when HIV-1 is transmitted into a new recipient [27,28]. The initially small founder populations and dependence on continuous seeding, to establish a productive infection in systemic lymph tissues, define a small window of maximum vulnerability for the virus in which there is an opportunity for the host, vaccines, or other interventions to prevent or control infection [26]. The depletion of memory CD4+ T cells, especially in the gut during the acute phase of infection, provide further evidence that the induction of mucosal immunity should be considered a high priority in the development of vaccines against mucosally transmitted HIV-1 [18,29,30]. These findings have provided supporting evidence for strategies by focusing on mucosal vaccines for inducing protective HIV-1 immunity at the site of viral transmission. 4. Protective mucosal immune responses at the site of viral transmission One of the critical bottlenecks in the development of an effective HIV-1 vaccine is the current inability to induce a local mucosal immunity with a durable, high level of antibody response and high frequency cellular immune response in humans. Mucosal sIgA is considered to have an important role in the prevention of HIV-1 transmission through sexual intercourse [31]. Several studies have evaluated the neutralizing activity of sIgA purified from plasma and mucosal samples from HIV-1 highly exposed persistently seronegative individuals (HEPSIs) or infected people [32-34]. Against HIV-1 primary isolates of different viral clades and phenotypes, specific neutralizing activity of the purified IgA from cervicovaginal fluid was found in the majority of samples [32-34]. In contrast, the cervicovaginal fluid of low-risk, uninfected HIV-seronegative individuals lacked neutralizing IgA [32,33]. Moreover, mucosal HIV-1 gp41-specific IgA derived from highly exposed seronegative individuals was able to block HIV-1 epithelial transcytosis and neutralized CD4+ cell infection [35]. However, by analyzing a group of exposed uninfected female commercial sex workers from Gambia, no significant vaginal sIgA or IgG responses against HIV-1 or HIV-2 were detected, and none of the vaginal secretions tested displayed any HIV-1 neutralizing activity [36,37]. Since these studies seem controversial, it becomes necessary to study neutralizing IgA or IgG induced by a mucosal vaccine [31]. Interestingly, a recent study indicated that anti-CCR5 IgG and IgA might have contributed to protection against HIV-1 sexual transmission among exposed seronegative people [38]. It is known that mucosal polymeric IgA plays a predominant role in the protection of influenza virus-induced pathology in the upper respiratory tract [39]. Whether or not similar effects can be achieved against HIV-1 remain unknown. It was evident that functional polymeric IgA-like 2F5, by switching 2F5IgG to the IgA isotype, had a stronger impact on the protective potential of these two antibodies and could interfere with HIV-1 entry across a mucosal epithelial layer in vitro [40]. These findings indicate that although sIgA is the major humoral defense mechanism at mucosal surfaces, it is wise to induce locally produced IgM and IgG as well as serum-derived IgG via mucosal vaccination. Mucosal neutralizing IgG is also important because it protects macaques from repeated intravaginal exposure to low doses of a SHIV that uses CCR5 as its co-receptor [41,42]. It has been demonstrated in SIV/macaque models that CD8+ cytotoxic T lymphocytes (CTL) play a crucial role in suppressing SIV replication in vivo during acute and chronic infections [43,44]. In fact, based on a mathematical model, it has been suggested that the first T cell response to transmitted/founder viruses in humans is early and contributes to the initial decline of plasma virus in acute infection [45]. Besides mucosal antibody response, high frequency mucosal cellular immune responses detected are essential for preventing the local productive infection and eliminating the initial founder populations of infected cells [45-49]. HIV-1-specific CD8+ T cell responses were found in the genital mucosa of HIV-1-resistant sex workers in the absence of detectable HIV-1 infection, suggesting the protective role of cell-mediated immunity [50]. Moreover, cellular immune responses, especially those mediated by CTL and CD4+ helper T lymphocytes, are needed to control HIV-1 or SIV in the mucosal tissues [46-48,51]. In particular, the magnitude and timing of the establishment of an excess of effector cells versus targets were found to correlate with the extent of control and SIV infection outcome [16]. Therefore, vaccines capable of inducing high frequency broadly reactive cell-mediated responses are considered critical for controlling the spread of the virus [45,52]. Although multiple approaches have been developed for inducing mucosal CTL responses, these CTLs were weak or at low frequency and could not completely prevent the initial viral replication and dissemination [46-48,53]. 5. Vector-based AIDS mucosal vaccine strategies To develop an effective HIV-1 mucosal vaccine, besides immunogen design, there are three factors to be considered: the vector for antigen delivery, the adjuvant to enhance mucosal immune response and the route of immunization to induce both mucosal and systemic immune responses as early as possible [54-57]. The selection of a proper antigen delivery vector is necessary to the induction of an efficient mucosal immune response. Studies in macaques found that immunization with a live attenuated SIV vaccine can induce specific local CTLs in mucosa and dramatically reduce viremia after mucosal challenge with SIV [58-60]. Since a live attenuated HIV-1 is too risky to be used as a human vaccine, other viral vectors are under investigation for stimulating mucosal immunity, such as live attenuated vesicular stomatitis virus, non-replicating adenovirus, vaccinia virus including modified vaccinia Ankara (MVA) vectors, and Venezuelan equine encephalitis virus (VEE). To this end, the vaccinia viral vector is probably one of the most intensively studied live recombinant vectors. Several studies have demonstrated the ability of vaccinia-based vaccines in inducing mucosal immune responses against infectious pathogens [61-63]. For example, either mucosal or systemic routes of immunization with the live, attenuated vaccinia NYVAC/SIVgpe recombinant vaccine resulted in gag-specific CD8+ T-cell responses in mucosal tissues of macaques [49]. Furthermore, vaccines based on the MVA vector were effective in inducing protective responses against different respiratory viruses such as SARS-CoV, influenza and respiratory syncytial virus following immunization via mucosal routes [64-70]. Intranasal inoculation of the MVA-based HIV-1 vaccine (named MVA-HIV) was immunogenic, whereas the intravaginal route was disappointing [62]. Since the mucosal immunogenicity of MVA-HIV is low, new approaches are needed to improve the poxvirus vector system [62]. Several approaches have been evaluated in animals. First, intranasal co-delivery of MVA-HIV plus adjuvant cholera toxin (CT) significantly enhanced the cellular and humoral immune response against HIV-1 antigens at the mucosal surfaces of vaccinated mice. Due to the limitation of CT for human use, cytokines IL-1alpha, IL-12, IL-18 and GM-CSF have been evaluated as substitutes for the induction of systemic and mucosal CTL after nasal immunization [71]. Thus, the functional activity of these candidate adjuvants needs to be tested in the context of MVA-HIV. Second, a heterologous DNA-HIV prime-MVA-HIV boost by intranasal immunization, together with CT, produced a cellular immune response in the mouse spleen 10-fold superior to that in the absence of CT [62]. Moreover, in a study using rhesus macaques, intranasal heterologous vaccination with SHIV-DNA plus IL-2/Ig DNA and rMVA induced both systematic and mucosal immunity and protected animals from disease progression against the intrarectal challenge with pathogenic SHIV89.6P [72]. In a separate study, rhesus macaques vaccinated intrarectally with a DNA construct producing replication-defective SHIV particles and boosted with rMVA-SHIV produced virus-specific mucosal and systemic humoral IgA and cell-mediated immune responses [63]. This mucosal vaccination regimen was also sufficient to delay progression to AIDS [63,73]. Although these findings are promising, there seem to be limited advantages for vaccination via the mucosal routes in comparison to the non-mucosal route of vaccination. For example, intramuscular inoculation of a heterologous DNA/MVA vaccine regimen showed a similar level of protection in monkeys [74]. It remains unknown whether or not a much better protection could be achieved after vaccinia, or other vector systems, are further optimized for stimulating host mucosal immune responses. 6. New strategies for the development of an HIV-1 mucosal vaccine A variety of novel biological vehicles have been studied for the delivery of HIV-1 antigens including inert system and live recombinant vector system [3]. The inert system involves the direct incorporation of HIV-1 antigens into a vehicle in order to increase their immunogenicity, to protect them from degradation, and to enhance their uptake by mucosal surfaces. Commonly used inert vectors include liposomes, immunostimulating complexs (ISCOMs), lactic acid and lectins. Most of these vectors, however, are still at the early stage of preclinical studies. Since these vectors can be easily manipulated in vitro, the targeted delivery of HIV-1 antigens into antigen presentation cells (APC) might help improve the immunogenicity of mucosal vaccines of these types. For the live recombinant vector system, a number of studies have been carried out using bacterial vectors encoding HIV-1 antigens. In a phase I study, the safety and immunogenicity of an oral attenuated Salmonella enterica serovar Typhimurium delivering an HIV-1 Gag antigen via the Salmonella Type III secretion system was investigated among healthy volunteers [75]. Although more than 80% of the subjects had mucosal immune responses to vector antigens, responses specific to HIV-1 Gag were low and disappointing. Since some vaccines in the high dose group developed severe adverse events, such as diarrhea, fever, and abnormal transaminases, the vaccine probably requires further attenuation and laboratory research [76]. We have recently reported a novel replication-competent modified vaccina Tian-Tan (MVTT) as a promising mucosal vaccination vector [77]. Using SARS-CoV spike glycoprotein as a test antigen, we conducted a head-to-head comparison of MVA-S and MVTT-S. After these two vaccines were inoculated into mice via seven different routes of immunization, we found that the neutralizing antibody (Nab) response induced was significantly different between MVTT-S and MVA-S. First, intranasal (i.n.) and intraoral (i.o.) routes clearly induced the highest level of Nabs for MVTT-S but not for MVA-S. Second, if we compare the levels of Nabs elicited via the i.n. and i.o. immunizations, MVTT-S induced more than 100-fold higher Nab response than MVA-S did in this experiment. Moreover, we increased the inoculation dose of MVA-S by 10-fold (106 pfu/mouse) and did not observe significant improvement in the Nab response in mice via either i.o. or i.n. routes. In contrast, 104 pfu of MVTT-S was still able to induce significant levels of Nab response in mice via the same i.n. and i.o. routes. Therefore, our data indicate that MVTT-S may preferentially target the mucosa immune system, signifying its superiority to the MVA vector system. Further studies will evaluate MVTT as a mucosal AIDS vaccine using an SIV/macaque model. Although some animal investigations have led to the hypothesis that systemic vaccines can induce virus-specific CTLs at mucosal sites [48,78,79], it remains plausible that mucosal vaccination remains the most effective way for inducing high and long-term protective immunity at the mucosal sites of viral transmission including HIV-1 [80]. 7. Summary and perspectives With the increasing efforts in understanding the mucosal transmission of HIV-1, a greater attention has been drawn to study AIDS mucosal vaccines. Since conventional vaccine strategies have not been successful for use against AIDS, it is necessary to provide sufficient financial support and resources to study protective mucosal immunity and new vaccine methods against HIV-1 sexual transmissions. Up till now, there are still many unanswered questions for the development of a protective HIV-1 mucosal vaccine. These unanswered questions are related to HIV-1 diversity in mucosal tissues, the role of innate mucosal immunity, the lack of understanding of immune correlates of mucosal protection, the rapid formation of a latently infected CD4+ T-cell pool in mucosal reservoirs, the depletion of CD4+ T cells especially in guts through all stages of infection, the absence of effective mucosal adjuvants for human use and the poor immunogenicity of current envelope antigens to induce broadly neutralizing anti-HIV antibodies at mucosal surfaces. The failure of Merck’s rAd5-based HIV-1 vaccine has called for efforts to further study HIV-1 immunology and vaccinology. It has been evident that it is possible to identify cell-mediated correlates of protection when the vaccine regimen is strong enough. An encouraging finding came from a recent study where the heterologous rAD26SIVgag/rAD5SIVgag regimen elicited strong cell-mediated immune responses, which correlated with significant immune control of a pathogenic SIV challenge [81]. To this end, the evaluation of various heterologous prime and boost vaccine regimens should be studied especially through mucosal routes of vaccination. This is a critical area of investigation because the magnitude and timing of the establishment of an excess of effector cells versus targets were found to be essential to the mucosal control of SIV infection [16]. Recent news from the U.S. Military HIV Research Program and the Thai Ministry of Public Health indicated that a prime-boost combination of two AIDS vaccine candidates has shown partial efficacy. Those administered with the combination vaccine has a 31% increased chance of preventing infection with HIV-1, as shown in a phase III efficacy trial in Thailand when the ‘intent-to-treat’ strategy of data analysis was modified [82]. When data were analyzed based on ‘per-protocol’ or ‘intent-to-treat’ analyses, differences dropped to 26% and results did not reach statistical significance [82]. Although it remains unknown whether or not vaccine-induced immunity has contributed to the partial protection at this stage, this finding is the first demonstration that a candidate AIDS vaccine provides benefit in humans. The AIDS vaccine research and development remain a long march. In order to discover an effective mucosal AIDS vaccine, it is necessary to have a deep understanding of mucosal immunology and to test various vaccine strategies including mucosal vaccination, which follows the fundamental rules of host natural defense. The authors thank financial supports from Hong Kong research grant council (HK-RGC762208 and HK-RGC762209 to ZC), the National Science and Technology Major Programs (2008ZX10001-011 and 2008ZX10001-015) and the University Development Fund of the University of Hong Kong to its AIDS Institute. The authors also thank D.D. Ho and K.Y. Yuen for scientific advice and discussions. 1. Holmgren, J.; Czerkinsky, C.; Lycke, N.; Svennerholm, A.M. Mucosal immunity: implications for vaccine development. Immunobiology 1992, 184, 157–179. [Google Scholar] [PubMed] 2. Schneider, T.; Ullrich, R.; Zeitz, M. Gastrointestinal manifestations of HIV infection. Zeitschrift fuer Gastroenterologie 1994, 32, 174–181. [Google Scholar] 3. Holmgren, J.; Czerkinsky, C. Mucosal immunity and vaccines. Nat. Med. 2005, 11, S45–S53. [Google Scholar] [CrossRef] [PubMed] 4. Mestecky, J. Mucosal Immunology, 3rd edElsevier Academic Press: Burlington, MA, USA, 2005; p. 372. [Google Scholar] 5. Brandtzaeg, P. Review article: Homing of mucosal immune cells--a possible connection between intestinal and articular inflammation. Aliment. Pharmacol. Ther. 1997, 11, 24–39. [Google Scholar] [PubMed] 6. Kunkel, E.J.; Butcher, E.C. Plasma-cell homing. Nat. Rev. Immunol. 2003, 3, 822–829. [Google Scholar] [CrossRef] 7. Paul, W.E. Fundamental Immunology, 5th edLippincott Williams & Wilkins: Philadelphia, PA, USA; London, UK, 2003; pp. 23–46. [Google Scholar] 8. Paul, W.E. Fundamental Immunology, 6th edWolters Kluwer/Lippincott Williams & Wilkins: Philadelphia, PA, USA, 2008; p. 1236. [Google Scholar] 9. Sabin, A.B.; Ramos-Alvarez, M.; Alvarez-Amezquita, J.; Pelon, W.; Michaels, R.H.; Spigland, I.; Koch, M.A.; Barnes, J.M.; Rhim, J.S. Live, orally given poliovirus vaccine. Effects of rapid mass immunization on population under conditions of massive enteric infection with other viruses. JAMA 1960, 173, 1521–1526. [Google Scholar] [PubMed] 11. Buonagurio, D.A.; Bechert, T.M.; Yang, C.F.; Shutyak, L.; D'Arco, G.A.; Kazachkov, Y.; Wang, H.P.; Rojas, E.A.; O'Neill, R.E.; Spaete, R.R.; Coelingh, K.L.; Zamb, T.J.; Sidhu, M.S.; Udem, S.A. Genetic stability of live, cold-adapted influenza virus components of the FluMist/CAIV-T vaccine throughout the manufacturing process. Vaccine 2006, 24, 2151–2160. [Google Scholar] [CrossRef] [PubMed] 12. Harper, S.A.; Fukuda, K.; Cox, N.J.; Bridges, C.B. Using live, attenuated influenza vaccine for prevention and control of influenza: supplemental recommendations of the Advisory Committee on Immunization Practices (ACIP). MMWR Recomm. Rep. 2003, 52, 1–8. [Google Scholar] [PubMed] 13. Zhang, L.; He, T.; Huang, Y.; Chen, Z.; Guo, Y.; Wu, S.; Kunstman, K.J.; Brown, R.C.; Phair, J.P.; Neumann, A.U.; Ho, D.D.; Wolinsky, S.M. Chemokine coreceptor usage by diverse primary isolates of human immunodeficiency virus type 1. J. Virol. 1998, 72, 9307–9312. [Google Scholar] [PubMed] 14. Chen, Z.; Zhou, P.; Ho, D.D.; Landau, N.R.; Marx, P.A. Genetically divergent strains of simian immunodeficiency virus use CCR5 as a coreceptor for entry. J. Virol. 1997, 71, 2705–2714. [Google Scholar] [PubMed] 15. Veazey, R.; Lackner, A. The mucosal immune system and HIV-1 infection. AIDS Rev 2003, 5, 245–252. [Google Scholar] [PubMed] 16. Li, Q.; Skinner, P.J.; Ha, S.J.; Duan, L.; Mattila, T.L.; Hage, A.; White, C.; Barber, D.L.; O'Mara, L.; Southern, P.J.; Reilly, C.S.; Carlis, J.V.; Miller, C.J.; Ahmed, R.; Haase, A.T. Visualizing antigen-specific and infected cells in situ predicts outcomes in early viral infection. Science 2009, 323, 1726–1729. [Google Scholar] [CrossRef] [PubMed] 17. Veazey, R.S.; DeMaria, M.; Chalifoux, L.V.; Shvetz, D.E.; Pauley, D.R.; Knight, H.L.; Rosenzweig, M.; Johnson, R.P.; Desrosiers, R.C.; Lackner, A.A. Gastrointestinal tract as a major site of CD4+ T cell depletion and viral replication in SIV infection. Science 1998, 280, 427–431. [Google Scholar] [CrossRef] [PubMed] 18. Lackner, A.A.; Mohan, M.; Veazey, R.S. The gastrointestinal tract and AIDS pathogenesis. Gastroenterology 2009, 136, 1965–1978. [Google Scholar] [CrossRef] [PubMed] 19. Harouse, J.M.; Gettie, A.; Tan, R.C.; Blanchard, J.; Cheng-Mayer, C. Distinct pathogenic sequela in rhesus macaques infected with CCR5 or CXCR4 utilizing SHIVs. Science 1999, 284, 816–819. [Google Scholar] [CrossRef] [PubMed] 20. Chen, Z.; Zhao, X.; Huang, Y.; Gettie, A.; Ba, L.; Blanchard, J.; Ho, D.D. CD4+ lymphocytopenia in acute infection of Asian macaques by a vaginally transmissible subtype-C, CCR5-tropic Simian/Human Immunodeficiency Virus (SHIV). J. Acquir. Immune Defic. Syndr. 2002, 30, 133–145. [Google Scholar] [PubMed] 21. Brenchley, J.M.; Schacker, T.W.; Ruff, L.E.; Price, D.A.; Taylor, J.H.; Beilman, G.J.; Nguyen, P.L.; Khoruts, A.; Larson, M.; Haase, A.T.; Douek, D.C. CD4+ T cell depletion during all stages of HIV disease occurs predominantly in the gastrointestinal tract. J. Exp. Med. 2004, 200, 749–759. [Google Scholar] [CrossRef] [PubMed] 22. Mehandru, S.; Poles, M.A.; Tenner-Racz, K.; Horowitz, A.; Hurley, A.; Hogan, C.; Boden, D.; Racz, P.; Markowitz, M. Primary HIV-1 infection is associated with preferential depletion of CD4+ T lymphocytes from effector sites in the gastrointestinal tract. J. Exp. Med. 2004, 200, 761–770. [Google Scholar] [CrossRef] [PubMed] 23. Zhang, Z.; Schuler, T.; Zupancic, M.; Wietgrefe, S.; Staskus, K.A.; Reimann, K.A.; Reinhart, T.A.; Rogan, M.; Cavert, W.; Miller, C.J.; Veazey, R.S.; Notermans, D.; Little, S.; Danner, S.A.; Richman, D.D.; Havlir, D.; Wong, J.; Jordan, H.L.; Schacker, T.W.; Racz, P.; Tenner-Racz, K.; Letvin, N.L.; Wolinsky, S.; Haase, A.T. Sexual transmission and propagation of SIV and HIV in resting and activated CD4+ T cells. Science 1999, 286, 1353–1357. [Google Scholar] [CrossRef] [PubMed] 24. Spira, A.I.; Marx, P.A.; Patterson, B.K.; Mahoney, J.; Koup, R.A.; Wolinsky, S.M.; Ho, D.D. Cellular targets of infection and route of viral dissemination after an intravaginal inoculation of simian immunodeficiency virus into rhesus macaques. J. Exp. Med. 1996, 183, 215–225. [Google Scholar] [CrossRef] [PubMed] 25. Smith, S.M.; Baskin, G.B.; Marx, P.A. Estrogen protects against vaginal transmission of simian immunodeficiency virus. J. Infect. Dis. 2000, 182, 708–715. [Google Scholar] [CrossRef] [PubMed] 26. Miller, C.J.; Li, Q.; Abel, K.; Kim, E.Y.; Ma, Z.M.; Wietgrefe, S.; La Franco-Scheuch, L.; Compton, L.; Duan, L.; Shore, M.D.; Zupancic, M.; Busch, M.; Carlis, J.; Wolinsky, S.; Haase, A.T. Propagation and dissemination of infection after vaginal transmission of simian immunodeficiency virus. J. Virol. 2005, 79, 9217–9127. [Google Scholar] [CrossRef] [PubMed] 27. Salazar-Gonzalez, J.F.; Salazar, M.G.; Keele, B.F.; Learn, G.H.; Giorgi, E.E.; Li, H.; Decker, J.M.; Wang, S.; Baalwa, J.; Kraus, M.H.; Parrish, N.F.; Shaw, K.S.; Guffey, M.B.; Bar, K.J.; Davis, K.L.; Ochsenbauer-Jambor, C.; Kappes, J.C.; Saag, M.S.; Cohen, M.S.; Mulenga, J.; Derdeyn, C.A.; Allen, S.; Hunter, E.; Markowitz, M.; Hraber, P.; Perelson, A.S.; Bhattacharya, T.; Haynes, B.F.; Korber, B.T.; Hahn, B.H.; Shaw, G.M. Genetic identity, biological phenotype, and evolutionary pathways of transmitted/founder viruses in acute and early HIV-1 infection. J. Exp. Med. 2009, 206, 1273–1289. [Google Scholar] [CrossRef] [PubMed] 28. Keele, B.F.; Giorgi, E.E.; Salazar-Gonzalez, J.F.; Decker, J.M.; Pham, K.T.; Salazar, M.G.; Sun, C.; Grayson, T.; Wang, S.; Li, H.; Wei, X.; Jiang, C.; Kirchherr, J.L.; Gao, F.; Anderson, J.A.; Ping, L.H.; Swanstrom, R.; Tomaras, G.D.; Blattner, W.A.; Goepfert, P.A.; Kilby, J.M.; Saag, M.S.; Delwart, E.L.; Busch, M.P.; Cohen, M.S.; Montefiori, D.C.; Haynes, B.F.; Gaschen, B.; Athreya, G.S.; Lee, H.Y.; Wood, N.; Seoighe, C.; Perelson, A.S.; Bhattacharya, T.; Korber, B.T.; Hahn, B.H.; Shaw, G.M. Identification and characterization of transmitted and early founder virus envelopes in primary HIV-1 infection. Proc. Natl. Acad. Sci. USA 2008, 105, 7552–7557. [Google Scholar] [CrossRef] 29. Mattapallil, J.J.; Douek, D.C.; Hill, B.; Nishimura, Y.; Martin, M.; Roederer, M. Massive infection and loss of memory CD4+ T cells in multiple tissues during acute SIV infection. Nature 2005, 434, 1093–1097. [Google Scholar] [CrossRef] [PubMed] 31. Alexander, R.; Mestecky, J. Neutralizing antibodies in mucosal secretions: IgG or IgA? Curr. HIV Res. 2007, 5, 588–593. [Google Scholar] [CrossRef] [PubMed] 32. Devito, C.; Hinkula, J.; Kaul, R.; Lopalco, L.; Bwayo, J.J.; Plummer, F.; Clerici, M.; Broliden, K. Mucosal and plasma IgA from HIV-exposed seronegative individuals neutralize a primary HIV-1 isolate. Aids 2000, 14, 1917–1920. [Google Scholar] [CrossRef] [PubMed] 33. Devito, C.; Hinkula, J.; Kaul, R.; Kimani, J.; Kiama, P.; Lopalco, L.; Barass, C.; Piconi, S.; Trabattoni, D.; Bwayo, J.J.; Plummer, F.; Clerici, M.; Broliden, K. Cross-clade HIV-1-specific neutralizing IgA in mucosal and systemic compartments of HIV-1-exposed, persistently seronegative subjects. J. Acquir. Immune Defic. Syndr. 2002, 30, 413–420. [Google Scholar] [PubMed] 34. Broliden, K.; Hinkula, J.; Devito, C.; Kiama, P.; Kimani, J.; Trabbatoni, D.; Bwayo, J.J.; Clerici, M.; Plummer, F.; Kaul, R. Functional HIV-1 specific IgA antibodies in HIV-1 exposed, persistently IgG seronegative female sex workers. Immunol. Lett. 2001, 79, 29–36. [Google Scholar] [CrossRef] [PubMed] 35. Tudor, D.; Derrien, M.; Diomede, L.; Drillet, A.S.; Houimel, M.; Moog, C.; Reynes, J.M.; Lopalco, L.; Bomsel, M. HIV-1 gp41-specific monoclonal mucosal IgAs derived from highly exposed but IgG-seronegative individuals block HIV-1 epithelial transcytosis and neutralize CD4(+) cell infection: an IgA gene and functional analysis. Mucosal Immunol. 2009, 2, 412–426. [Google Scholar] [CrossRef] 36. Dorrell, L.; Hessell, A.J.; Wang, M.; Whittle, H.; Sabally, S.; Rowland-Jones, S.; Burton, D.R.; Parren, P.W. Absence of specific mucosal antibody responses in HIV-exposed uninfected sex workers from the Gambia. Aids 2000, 14, 1117–1122. [Google Scholar] [CrossRef] [PubMed] 37. Schneider, J.A.; Alam, S.A.; Ackers, M.; Parekh, B.; Chen, H.Y.; Graham, P.; Gurwith, M.; Mayer, K.; Novak, R.M. Mucosal HIV-binding antibody and neutralizing activity in high-risk HIV-uninfected female participants in a trial of HIV-vaccine efficacy. J. Infect. Dis. 2007, 196, 1637–1644. [Google Scholar] [CrossRef] [PubMed] 38. Pastori, C.; Weiser, B.; Barassi, C.; Uberti-Foppa, C.; Ghezzi, S.; Longhi, R.; Calori, G.; Burger, H.; Kemal, K.; Poli, G.; Lazzarin, A.; Lopalco, L. Long-lasting CCR5 internalization by antibodies in a subset of long-term nonprogressors: a possible protective effect against disease progression. Blood 2006, 107, 4825–4833. [Google Scholar] [CrossRef] [PubMed] 39. Renegar, K.B.; Small Jr., P.A.; Boykins, L.G.; Wright, P.F. Role of IgA versus IgG in the control of influenza viral infection in the murine respiratory tract. J. Immunol. 2004, 173, 1978–1986. [Google Scholar] [PubMed] 40. Wolbank, S.; Kunert, R.; Stiegler, G.; Katinger, H. Characterization of human class-switched polymeric (immunoglobulin M [IgM] and IgA) anti-human immunodeficiency virus type 1 antibodies 2F5 and 2G12. J. Virol. 2003, 77, 4095–40103. [Google Scholar] [CrossRef] [PubMed] 41. Hessell, A.J.; Poignard, P.; Hunter, M.; Hangartner, L.; Tehrani, D.M.; Bleeker, W.K.; Parren, P.W.; Marx, P.A.; Burton, D.R. Effective, low-titer antibody protection against low-dose repeated mucosal SHIV challenge in macaques. Nat. Med. 2009, 15, 951–954. [Google Scholar] [CrossRef] [PubMed] 42. Hessell, A.J.; Rakasz, E.G.; Poignard, P.; Hangartner, L.; Landucci, G.; Forthal, D.N.; Koff, W.C.; Watkins, D.I.; Burton, D.R. Broadly neutralizing human anti-HIV antibody 2G12 is effective in protection against mucosal SHIV challenge even at low serum neutralizing titers. PLoS Pathog. 2009, 5, e1000433:1–e1000433:9. [Google Scholar] [CrossRef][Green Version] 43. Jin, X.; Bauer, D.E.; Tuttleton, S.E.; Lewin, S.; Gettie, A.; Blanchard, J.; Irwin, C.E.; Safrit, J.T.; Mittler, J.; Weinberger, L.; Kostrikis, L.G.; Zhang, L.; Perelson, A.S.; Ho, D.D. Dramatic rise in plasma viremia after CD8(+) T cell depletion in simian immunodeficiency virus-infected macaques. J. Exp. Med. 1999, 189, 991–998. [Google Scholar] [CrossRef] [PubMed] 44. Schmitz, J.E.; Kuroda, M.J.; Santra, S.; Sasseville, V.G.; Simon, M.A.; Lifton, M.A.; Racz, P.; Tenner-Racz, K.; Dalesandro, M.; Scallon, B.J.; Ghrayeb, J.; Forman, M.A.; Montefiori, D.C.; Rieber, E.P.; Letvin, N.L.; Reimann, K.A. Control of viremia in simian immunodeficiency virus infection by CD8+ lymphocytes. Science 1999, 283, 857–860. [Google Scholar] [CrossRef] [PubMed] 45. Goonetilleke, N.; Liu, M.K.; Salazar-Gonzalez, J.F.; Ferrari, G.; Giorgi, E.; Ganusov, V.V.; Keele, B.F.; Learn, G.H.; Turnbull, E.L.; Salazar, M.G.; Weinhold, K.J.; Moore, S.; Letvin, N.; Haynes, B.F.; Cohen, M.S.; Hraber, P.; Bhattacharya, T.; Borrow, P.; Perelson, A.S.; Hahn, B.H.; Shaw, G.M.; Korber, B.T.; McMichael, A.J. The first T cell response to transmitted/founder virus contributes to the control of acute viremia in HIV-1 infection. J. Exp. Med. 2009, 206, 1253–1272. [Google Scholar] [CrossRef] [PubMed] 46. Vogel, T.U.; Reynolds, M.R.; Fuller, D.H.; Vielhuber, K.; Shipley, T.; Fuller, J.T.; Kunstman, K.J.; Sutter, G.; Marthas, M.L.; Erfle, V.; Wolinsky, S.M.; Wang, C.; Allison, D.B.; Rud, E.W.; Wilson, N.; Montefiori, D.; Altman, J.D.; Watkins, D.I. Multispecific vaccine-induced mucosal cytotoxic T lymphocytes reduce acute-phase viral replication but fail in long-term control of simian immunodeficiency virus SIVmac239. J. Virol. 2003, 77, 13348–13360. [Google Scholar] [CrossRef] [PubMed] 47. Evans, D.T.; Chen, L.M.; Gillis, J.; Lin, K.C.; Harty, B.; Mazzara, G.P.; Donis, R.O.; Mansfield, K.G.; Lifson, J.D.; Desrosiers, R.C.; Galan, J.E.; Johnson, R.P. Mucosal priming of simian immunodeficiency virus-specific cytotoxic T-lymphocyte responses in rhesus macaques by the Salmonella type III secretion antigen delivery system. J. Virol. 2003, 77, 2400–2409. [Google Scholar] [CrossRef] [PubMed] 48. Baig, J.; Levy, D.B.; McKay, P.F.; Schmitz, J.E.; Santra, S.; Subbramanian, R.A.; Kuroda, M.J.; Lifton, M.A.; Gorgone, D.A.; Wyatt, L.S.; Moss, B.; Huang, Y.; Chakrabarti, B.K.; Xu, L.; Kong, W.P.; Yang, Z.Y.; Mascola, J.R.; Nabel, G.J.; Carville, A.; Lackner, A.A.; Veazey, R.S.; Letvin, N.L. Elicitation of simian immunodeficiency virus-specific cytotoxic T lymphocytes in mucosal compartments of rhesus monkeys by systemic vaccination. J. Virol. 2002, 76, 11484–11490. [Google Scholar] [CrossRef] [PubMed] 49. Stevceva, L.; Alvarez, X.; Lackner, A.A.; Tryniszewska, E.; Kelsall, B.; Nacsa, J.; Tartaglia, J.; Strober, W.; Franchini, G. Both mucosal and systemic routes of immunization with the live, attenuated NYVAC/simian immunodeficiency virus SIV(gpe) recombinant vaccine result in gag-specific CD8(+) T-cell responses in mucosal tissues of macaques. J. Virol. 2002, 76, 11659–11676. [Google Scholar] [CrossRef] [PubMed] 50. Kaul, R.; Plummer, F.A.; Kimani, J.; Dong, T.; Kiama, P.; Rostron, T.; Njagi, E.; MacDonald, K.S.; Bwayo, J.J.; McMichael, A.J.; Rowland-Jones, S.L. HIV-1-specific mucosal CD8+ lymphocyte responses in the cervix of HIV-1-resistant prostitutes in Nairobi. J. Immunol. 2000, 164, 1602–1611. [Google Scholar] [PubMed] 51. Ibarrondo, F.J.; Anton, P.A.; Fuerst, M.; Ng, H.L.; Wong, J.T.; Matud, J.; Elliott, J.; Shih, R.; Hausner, M.A.; Price, C.; Hultin, L.E.; Hultin, P.M.; Jamieson, B.D.; Yang, O.O. Parallel human immunodeficiency virus type 1-specific CD8+ T-lymphocyte responses in blood and mucosa during chronic infection. J. Virol. 2005, 79, 4289–4297. [Google Scholar] [CrossRef] [PubMed] 52. Bourinbaiar, A.S.; Metadilogkul, O.; Jirathitikal, V. Mucosal AIDS vaccines. Viral Immunol. 2003, 16, 427–445. [Google Scholar] [PubMed] 53. Jiang, J.Q.; Patrick, A.; Moss, R.B.; Rosenthal, K.L. CD8+ T-cell-mediated cross-clade protection in the genital tract following intranasal immunization with inactivated human immunodeficiency virus antigen plus CpG oligodeoxynucleotides. J. Virol. 2005, 79, 393–400. [Google Scholar] [CrossRef] [PubMed] 54. Walker, R.I. New strategies for using mucosal vaccination to achieve more effective immunization. Vaccine 1994, 12, 387–400. [Google Scholar] [CrossRef] [PubMed] 55. Kyd, J.M.; Cripps, A.W. Killed whole bacterial cells, a mucosal delivery system for the induction of immunity in the respiratory tract and middle ear: an overview. Vaccine 1999, 17, 1775–1781. [Google Scholar] [CrossRef] [PubMed] 56. Kyd, J.; Cripps, A. Identifying vaccine antigens and assessing delivery systems for the prevention of bacterial infections. J. Biotechnol. 2000, 83, 85–90. [Google Scholar] [CrossRef] [PubMed] 57. Cripps, A.W.; Kyd, J.M.; Foxwell, A.R. Vaccines and mucosal immunisation. Vaccine 2001, 19, 2513–2515. [Google Scholar] [CrossRef] [PubMed] 58. Nilsson, C.; Makitalo, B.; Thorstensson, R.; Norley, S.; Binninger-Schinzel, D.; Cranage, M.; Rud, E.; Biberfeld, G.; Putkonen, P. Live attenuated simian immunodeficiency virus (SIV)mac in macaques can induce protection against mucosal infection with SIVsm. AIDS (London, England) 1998, 12, 2261–2270. [Google Scholar] [PubMed] 59. Cromwell, M.A.; Veazey, R.S.; Altman, J.D.; Mansfield, K.G.; Glickman, R.; Allen, T.M.; Watkins, D.I.; Lackner, A.A.; Johnson, R.P. Induction of mucosal homing virus-specific CD8(+) T lymphocytes by attenuated simian immunodeficiency virus. J. Virol. 2000, 74, 8762–8766. [Google Scholar] [CrossRef] [PubMed] 60. Tenner-Racz, K.; Stahl Hennig, C.; Uberla, K.; Stoiber, H.; Ignatius, R.; Heeney, J.; Steinman, R.M.; Racz, P. Early protection against pathogenic virus infection at a mucosal challenge site after vaccination with attenuated simian immunodeficiency virus. Proc. Natl. Acad. Sci. USA 2004, 101, 3017–3022. [Google Scholar] [CrossRef] 61. Kent, S.J.; Dale, C.J.; Ranasinghe, C.; Stratov, I.; De Rose, R.; Chea, S.; Montefiori, D.C.; Thomson, S.; Ramshaw, I.A.; Coupar, B.E.; Boyle, D.B.; Law, M.; Wilson, K.M.; Ramsay, A.J. Mucosally-administered human-simian immunodeficiency virus DNA and fowlpoxvirus-based recombinant vaccines reduce acute phase viral replication in macaques following vaginal challenge with CCR5-tropic SHIVSF162P3. Vaccine 2005, 23, 5009–5021. [Google Scholar] [CrossRef] [PubMed] 62. Gherardi, M.M.; Perez-Jimenez, E.; Najera, J.L.; Esteban, M. Induction of HIV immunity in the genital tract after intranasal delivery of a MVA vector: enhanced immunogenicity after DNA prime-modified vaccinia virus Ankara boost immunization schedule. J. Immunol. 2004, 172, 6209–6220. [Google Scholar] [PubMed] 63. Wang, S.W.; Bertley, F.M.; Kozlowski, P.A.; Herrmann, L.; Manson, K.; Mazzara, G.; Piatak, M.; Johnson, R.P.; Carville, A.; Mansfield, K.; Aldovini, A. An SHIV DNA/MVA rectal vaccination in macaques provides systemic and mucosal virus-specific responses and protection against AIDS. AIDS Res. Hum. Retroviruses 2004, 20, 846–859. [Google Scholar] [CrossRef] [PubMed] 64. Chen, Z.; Zhang, L.; Qin, C.; Ba, L.; Yi, C.E.; Zhang, F.; Wei, Q.; He, T.; Yu, W.; Yu, J.; Gao, H.; Tu, X.; Gettie, A.; Farzan, M.; Yuen, K.Y.; Ho, D.D. Recombinant modified vaccinia virus Ankara expressing the spike glycoprotein of severe acute respiratory syndrome coronavirus induces protective neutralizing antibodies primarily targeting the receptor binding region. J. Virol. 2005, 79, 2678–2688. [Google Scholar] [CrossRef] [PubMed] 65. Bisht, H.; Roberts, A.; Vogel, L.; Bukreyev, A.; Collins, P.L.; Murphy, B.R.; Subbarao, K.; Moss, B. Severe acute respiratory syndrome coronavirus spike protein expressed by attenuated vaccinia virus protectively immunizes mice. Proc. Natl. Acad. Sci. USA 2004, 101, 6641–6646. [Google Scholar] [CrossRef] 66. Degano, P.; Schneider, J.; Hannan, C.M.; Gilbert, S.C.; Hill, A.V. Gene gun intradermal DNA immunization followed by boosting with modified vaccinia virus Ankara: enhanced CD8+ T cell immunogenicity and protective efficacy in the influenza and malaria models. Vaccine 1999, 18, 623–632. [Google Scholar] [CrossRef] [PubMed] 67. Sutter, G.; Wyatt, L.S.; Foley, P.L.; Bennink, J.R.; Moss, B. A recombinant vector derived from the host range-restricted and highly attenuated MVA strain of vaccinia virus stimulates protective immunity in mice to influenza virus. Vaccine 1994, 12, 1032–1040. [Google Scholar] [CrossRef] [PubMed] 68. Olszewska, W.; Suezer, Y.; Sutter, G.; Openshaw, P.J. Protective and disease-enhancing immune responses induced by recombinant modified vaccinia Ankara (MVA) expressing respiratory syncytial virus proteins. Vaccine 2004, 23, 215–221. [Google Scholar] [CrossRef] [PubMed] 69. de Waal, L.; Wyatt, L.S.; Yuksel, S.; van Amerongen, G.; Moss, B.; Niesters, H.G.; Osterhaus, A.D.; de Swart, R.L. Vaccination of infant macaques with a recombinant modified vaccinia virus Ankara expressing the respiratory syncytial virus F and G genes does not predispose for immunopathology. Vaccine 2004, 22, 923–926. [Google Scholar] [CrossRef] [PubMed] 70. Wyatt, L.S.; Whitehead, S.S.; Venanzi, K.A.; Murphy, B.R.; Moss, B. Priming and boosting immunity to respiratory syncytial virus by recombinant replication-defective vaccinia virus MVA. Vaccine 1999, 18, 392–397. [Google Scholar] [CrossRef] [PubMed] 71. Staats, H.F.; Bradney, C.P.; Gwinn, W.M.; Jackson, S.S.; Sempowski, G.D.; Liao, H.X.; Letvin, N.L.; Haynes, B.F. Cytokine requirements for induction of systemic and mucosal CTL after nasal immunization. J. Immunol. 2001, 167, 5386–5394. [Google Scholar] [PubMed] 72. Bertley, F.M.; Kozlowski, P.A.; Wang, S.W.; Chappelle, J.; Patel, J.; Sonuyi, O.; Mazzara, G.; Montefiori, D.; Carville, A.; Mansfield, K.G.; Aldovini, A. Control of simian/human immunodeficiency virus viremia and disease progression after IL-2-augmented DNA-modified vaccinia virus Ankara nasal vaccination in nonhuman primates. J. Immunol. 2004, 172, 3745–3757. [Google Scholar] [PubMed] 73. Makitalo, B.; Lundholm, P.; Hinkula, J.; Nilsson, C.; Karlen, K.; Morner, A.; Sutter, G.; Erfle, V.; Heeney, J.L.; Wahren, B.; Biberfeld, G.; Thorstensson, R. Enhanced cellular immunity and systemic control of SHIV infection by combined parenteral and mucosal administration of a DNA prime MVA boost vaccine regimen. J. Gen. Virol. 2004, 85, 2407–2419. [Google Scholar] [CrossRef] [PubMed] 74. Amara, R.R.; Villinger, F.; Altman, J.D.; Lydy, S.L.; O'Neil, S.P.; Staprans, S.I.; Montefiori, D.C.; Xu, Y.; Herndon, J.G.; Wyatt, L.S.; Candido, M.A.; Kozyr, N.L.; Earl, P.L.; Smith, J.M.; Ma, H.L.; Grimm, B.D.; Hulsey, M.L.; Miller, J.; McClure, H.M.; McNicholl, J.M.; Moss, B.; Robinson, H.L. Control of a mucosal challenge and prevention of AIDS by a multiprotein DNA/MVA vaccine. Science 2001, 292, 69–74. [Google Scholar] [CrossRef] [PubMed] 75. Kotton, C.N.; Lankowski, A.J.; Scott, N.; Sisul, D.; Chen, L.M.; Raschke, K.; Borders, G.; Boaz, M.; Spentzou, A.; Galan, J.E.; Hohmann, E.L. Safety and immunogenicity of attenuated Salmonella enterica serovar Typhimurium delivering an HIV-1 Gag antigen via the Salmonella Type III secretion system. Vaccine 2006, 24, 6216–6224. [Google Scholar] [CrossRef] [PubMed] 76. Lewis, G.K. Live-attenuated Salmonella as a prototype vaccine vector for passenger immunogens in humans: are we there yet? Expert Rev. Vaccines 2007, 6, 431–440. [Google Scholar] [CrossRef] [PubMed] 77. Huang, X.; Lu, B.; Yu, W.; Fang, Q.; Liu, L.; Zhuang, K.; Shen, T.; Wang, H.; Tian, P.; Zhang, L.; Chen, Z. A novel replication-competent vaccinia vector MVTT is superior to MVA for inducing high levels of neutralizing antibody via mucosal vaccination. PLoS One 2009, 4, e4180:1–e4180:9. [Google Scholar] 78. Mitchell, E.A.; Bergmeier, L.A.; Doyle, C.; Brookes, R.; Hussain, L.A.; Wang, Y.; Lehner, T. Homing of mononuclear cells from iliac lymph nodes to the genital and rectal mucosa in non-human primates. Eur. J. Immunol. 1998, 28, 3066–3074. [Google Scholar] [CrossRef] [PubMed] 79. Belyakov, I.M.; Hammond, S.A.; Ahlers, J.D.; Glenn, G.M.; Berzofsky, J.A. Transcutaneous immunization induces mucosal CTLs and protective immunity by migration of primed skin dendritic cells. J. Clin. Invest. 2004, 113, 998–1007. [Google Scholar] [PubMed] 80. Yu, W.; Fang, Q.; Zhu, W.; Wang, H.; Tien, P.; Zhang, L.; Chen, Z. One time intranasal vaccination with a modified vaccinia Tiantan strain MVTTZCI protects animals against pathogenic viral challenge. Vaccine 2009. [Google Scholar] 81. Liu, J.; O'Brien, K.L.; Lynch, D.M.; Simmons, N.L.; La Porte, A.; Riggs, A.M.; Abbink, P.; Coffey, R.T.; Grandpre, L.E.; Seaman, M.S.; Landucci, G.; Forthal, D.N.; Montefiori, D.C.; Carville, A.; Mansfield, K.G.; Havenga, M.J.; Pau, M.G.; Goudsmit, J.; Barouch, D.H. Immune control of an SIV challenge by a T-cell-based vaccine in rhesus monkeys. Nature 2009, 457, 87–91. [Google Scholar] [CrossRef] [PubMed] Back to TopTop
5 Fun Facts About Ladybugs There are about 5,000 different species of ladybug around the world. But the most common here in North America is the ever-popular shiny red one with seven dots. Most people love ladybugs for their delicate looks and harmless demeanor. Farmers especially love ladybugs since they consume aphids and other tree- or shrub-destroying insects. Yet, there’s still plenty you probably don’t know about these little creatures, so Nature’s Select Piedmont is here to drop some fun ladybug facts. 5 Fun Facts About Ladybugs 1. Ladybugs Are Beetles These tiny little aphid-eaters are technically not bugs at all, but rather a part of the beetle family. Outside of North America, they are widely called lady beetles or ladybird beetles. Furthermore, bugs tend to have long, needle-like mouths with a mostly liquid diet, while beetles can chew and eat away at plants and grass. So, because ladybugs can chew, they are classified as a part of the beetle family. 2. Not All Ladybugs Look the Same As we already mentioned, there are about 5,000 different types of ladybugs globally, so you can bet they don’t all look the same. While the red and black combo is the most popular, ladybugs can also come in other colors. There are about 450 species of ladybugs on our continent, and they come in yellow, black, pink, orange, and brown. Additionally, some have stripes instead of dots. 3. Their Name Comes From Europe During the Middle Ages, European farmers were having a hard time preventing aphids and other insects from eating crops. So, they prayed to the Virgin Mary to help protect their fields. Soon, ladybugs appeared in their fields, eating all the aphids and saving the farmers’ crops. So, the farmers named them “beetle of Our Lady,” which eventually shortened to the ladybug. Ladybug then appeared in the Oxford English Dictionary in 1674. 4. Markings Are a Warning Ladybug markings vary from species to species, but they all serve the same purpose: A warning to potential predators. The bright colors and stripes or dots are meant to intimidate frogs, birds, and other small mammals that may consume them. When threatened, ladybugs secrete an oily, foul-smelling liquid that further deters a predator from snatching them up. They’ll also play dead to avoid being eaten. 5. Ladybugs Eat Their Eggs A female ladybug prefers to lay her eggs on the underside of leaves, near the same clusters of aphid eggs. They can lay as many as 1,000 eggs at one time, but not all of them may hatch. In fact, during periods where food is in short supply, a ladybug will venture back to the eggs and consume the eggs and larvae. A ladybug will even prepare for a food shortage by laying infertile eggs for her young to eat once they hatch. Let’s Work with Nature Ladybugs are just one example of the many types of beetles or helpful insects you want in your lawn. However, they can’t always protect your trees, shrubs, and grass, so that’s where Nature’s Select Piedmont steps in. We have lawn care programs designed for your plant beds, boxwoods, and trees. So, if you live in Piedmont or Greensboro, NC, give us a call today at (336) 544-4554.
19.2.4  Multiple impairments Some people have to cope with several impairments, either permanently or for periods of time (e.g. during an illness). Examples of permanent multiple impairments include people who are both deaf and blind, and people with both a physical and intellectual impairment. Take a little time now to think about the ways in which people with either intellectual or multiple impairments might be further disadvantaged by the social environment in which they live. In wealthy countries (such as the USA and in Europe), or in big cities, the impact of these impairments may be lessened by the use of (expensive) technology. However, access to such technology is often very limited in the villages and rural areas of developing countries. This highlights the fact that, while people may have the same experiences in terms of impairment, their experience of disability might be very different. 19.2.3  Intellectual impairments 19.3  Appropriate and acceptable language
ReadAnyBook Advice - 👉Best Essay Writing Service for students Author Crockett Samuel Rutherford Crockett Samuel Rutherford Photo Avg Rating: t to read by his aunt Jenny, and learned from her the speech patterns and many of the tales and legends that characterized much of his work. In January 1775 he returned to Edinburgh, and that summer went with his aunt Jenny to take spa treatment at Bath in England, where they lived at 6 South Parade.[1] In the winter of 1776 he went back to Sandyknowe, with another attempt at a water cure at Prestonpans during the following summer.[2] In 1778 Scott returned to Edinburgh for private education to prepare him for school, and in October 1779 he began at the Royal High School of Edinburgh. He was now well able to walk and explore the city and the surrounding countryside. His reading included chivalric romances, poems, history and travel books. He was given private tuition by James Mitchell in arithmetic and writing, and learned from him the history of the Kirk with emphasis on the Covenanters. After finishing school he was sent to stay for six months with his aunt Jenny in Kelso, attending the local Grammar School where he met James Ballantyne who later became his business partner and printed his books.[3] Scott began studying classics at the University of Edinburgh in November 1783, at the age of only 12, a year or so younger than most of his fellow students. In March 1786 he began an apprenticeship in his father's office, to become a Writer to the Signet. While at the university Scott had become a friend of Adam Ferguson, the son of Professor Adam Ferguson who hosted literary salons. Scott met the blind poet Thomas Blacklock who lent him books as well as introducing him to James Macpherson's Ossian cycle of poems. During the winter of 1786–87 the 15-year-old Scott saw Robert Burns at one of these salons, for what was to be their only meeting. When Burns noticed a print illustrating the poem "The Justice of the Peace" and asked who had written the poem, only Scott knew that it was by John Langhorne, and was thanked by Burns.[4] When it was decided that he would become a lawyer he returned to the university to study law, first taking classes in Moral Philosophy and Universal History in 1789–90.[3] After completing his studies in law, he became a lawyer in Edinburgh. As a lawyer's clerk he made his first visit to the Scottish Highlands directing an eviction. He was admitted to the Faculty of Advocates in 1792. He had an unsuccessful love suit with Williamina Belsches of Fettercairn, who married Sir William Forbes, 6th Baronet. At the age of 25 he began dabbling in writing, translating works from German, his first publication being rhymed versions of ballads by Bürger in 1796. He then published a three-volume set of collected Scottish ballads, The Minstrelsy of the Scottish Border. This was the first sign of his interest in Scottish history from a literary standpoint. Scott then became an ardent volunteer in the yeomanry and on one of his "raids" he met at Gilsland Spa Margaret Genevieve Charpentier (or Charpenter), daughter of Jean Charpentier of Lyon in France, whom he married in 1797. They had five children. In 1799 he was appointed Sheriff-Deputy of the County of Selkirk, based in the Royal Burgh of Selkirk. In his early married days Scott had a decent living from his earnings at the law, his salary as Sheriff-Deputy, his wife's income, some revenue from his writing and his share of his father's rather meagre estate. After Scott had founded a printing press, his poetry, beginning with The Lay of the Last Minstrel in 1805, brought him fame. He published other poems over the next ten years, including the popular The Lady of the Lake, printed in 1810 and set in the Trossachs. Portions of the German translation of this work were set to music by Franz Schubert. One of these songs, Ellens dritter Gesang, is popularly labelled as "Schubert's Ave Maria". Another work from this period, Marmion, produced some of his most quoted (and mis-attributed) lines. Canto VI. Stanza 17 reads: In 1809 his sympathies led him to become a co-founder of the Quarterly Review, a review journal to which he made several anonymous contributions. In 1813 he was offered the position of Poet Laureate. He declined and the position went to Robert Southey.[5] When the press became embroiled in pecuniary difficulties, Scott set out in 1814 to write a cash-cow. The result was Waverley, a novel that did not name its author. It was a tale of the "Forty-Five" Jacobite rising in the Kingdom of Great Britain with its English protagonist Edward Waverley, by his Tory upbringing sympathetic to Jacobitism, becoming enmeshed in events but eventually choosing Hanoverian respectability. The novel met with considerable success. There followed a succession of novels over the next five years, each with a Scottish historical setting. Mindful of his reputation as a poet, he maintained the anonymous habit he had begun with Waverley, always publishing the novels under the name Author of Waverley or attributed as "Tales of..." with no author. Even when it was clear that there would be no harm in coming out into the open he maintained the façade, apparently out of a sense of fun. During this time the nickname The Wizard of the North was popularly applied to the mysterious best-selling writer. His identity as the author of the novels was widely rumoured, and in 1815 Scott was given the honour of dining with George, Prince Regent, who wanted to meet "the author of Waverley". In 1819 he broke away from writing about Scotland with Ivanhoe, a historical romance set in 12th-century England. It too was a runaway success and he wrote several books along the same lines. Among other things the book is noteworthy for having a very sympathetic Jewish major character, Rebecca, considered by many critics to be the book's real heroine — relevant to the fact that the book was published at a time when the struggle for the Emancipation of the Jews in England was gathering momentum. Scott wrote "The Bride of Lammermoor", a novel based on a true story of two lovers. In the novel, Lucie Ashton and Edgar Ravenswood exchange vows, but when Lucie's mother discovers that her daughter wants to wed an enemy of their family, she intervenes and forces her daughter to marry Sir Arthur Bucklaw, who has just inherited a large sum of money on the death of his aunt. On their wedding night, Lucie goes insane and stabs the bridegroom, and succumbing to insanity, dies. Donizetti's opera "Lucia di Lamermoor" was based on Scott's novel. As his fame grew he was granted the title of baronet, becoming Sir Walter Scott. He organized the visit of King George IV to Scotland, and when the King visited Edinburgh in 1822 the spectacular pageantry that Scott had concocted to portray George as a rather tubby reincarnation of Bonnie Prince Charlie made tartans and kilts fashionable and turned them into symbols of Scottish national identity. Scott included little in the way of punctuation in his drafts, which he left to the printers to supply.[6] He eventually acknowledged that he was the author of the Waverley novels in 1827.[7] Beginning in 1825 he went into dire financial straits again, as his company nearly collapsed. Rather than declare bankruptcy he placed his home, Abbotsford House, and income into a trust belonging to his creditors, and proceeded to write his way out of debt. He kept up his prodigious output of fiction (as well as producing a biography of Napoléon Bonaparte) until 1831. By then his health was failing, and he died at Abbotsford in 1832. Though he died in debt his novels continued to sell, and he made good his debts from beyond the grave. He was buried in Dryburgh Abbey where nearby there is a large statue of William Wallace, one of Scotland's many romanticised historical figures. When Scott was a boy he sometimes travelled with his father from Selkirk to Melrose in the Border Country where some of his novels are set. At a certain spot the old gentleman would stop the carriage and take his son to a stone on the site of the battle of Melrose (1526). Not far away was a little farm called Cartleyhole, and this he eventually purchased. The farmhouse developed into a wonderful home that has been likened to a fairy palace. Through windows enriched with the insignia of heraldry the sun shone on suits of armour, trophies of the chase, a library of over 9,000 volumes,[8] fine furniture, and still finer pictures. Panelling of oak and cedar and carved ceilings relieved by coats of arms in their correct colour added to the beauty of the house. More land was purchased until Scott owned nearly 1,000 acres (4 km²), and it is estimated that the building cost him over £25,000. A neighbouring Roman road with a ford used in olden days by the abbots of Melrose suggested the name of Abbotsford. The last of his direct descendants to inhabit Abbotsford House was his great-great-great-granddaughter Dame Jean Maxwell-Scott (8 June 1923 - 7 July 2004). She inherited it from her elder sister Patricia in 1998. The sisters turned the house into one of Scotland's premier tourist attractions after they had to rely on paying visitors to afford the upkeep of the house. It had electricity installed only in 1962. Dame Jean was at one time a lady-in-waiting to Princess Alice, Duchess of Gloucester; patron of the Dandie Dinmont Club, a breed of dog named after one of Sir Walter Scott's characters; and a horse trainer, one of whose horses, Sir Wattie, ridden by Ian Stark, won two silver medals at the 1988 Summer Olympics in Seoul, South Korea.[9] +Write review User Reviews: Write Review:
Your pets can catch Covid from you, and cats appear more susceptible than dogs Cats who slept on their owner’s beds had a higher risk of getting Covid-19, new research suggests.Dima Minakin / Getty Images Pet cats and dogs are much more likely to contract Covid-19 than their stray peers — and cats are more susceptible to the virus than their canine counterparts, new research suggests. In the new study, researchers at the University of Guelph in Ontario tested 48 cats and 54 dogs from 77 different households that had a positive Covid-19 case in the previous nine months. They compared the results to those of 75 dogs and cats living in an animal shelter and 75 stray cats that had been seen at a low-cost veterinary clinic. The preliminary findings, which have not yet been published in a peer-reviewed journal, will be presented at the European Congress of Clinical Microbiology and Infectious Diseases in July. Full coverage of the coronavirus outbreak Nearly 70 percent of pet cats and more than 40 percent of pet dogs tested positive for antibodies, compared with just under 10 percent of dogs and cats from the animal shelter. That number shrank to 3 percent for the stray cats. The majority of cases were mild, and only 20 percent of dogs and 30 percent of cats had symptoms. Dogs mostly had loss of appetite and sluggishness, while cats exhibited runny noses and had difficulty breathing. The researchers also found that the amount of time a pet owner spent with their dog did not have an effect on the pet’s chance of getting Covid-19, but that was not the case for cats. The more time cats spent with their human companions, the more likely they were to be infected. In particular, cats who slept on their owner’s bed had a higher risk of infection. “It could be something as simple as most dogs have long noses, or the virus doesn’t bind as well to the receptor in dogs’ cells, or something with the immune system,” said Sue VandeWoude, university distinguished professor at the Colorado State University College of Veterinary Medicine and Biomedical Sciences, who was not involved with the new research. Since the most likely route of infection is from human to pet, not the other way around, pet owners shouldn’t worry about getting Covid-19 from their pets, said Dorothee Bienzle, a professor of veterinary pathology at the University of Guelph and co-author of the study. Indeed, a second study, also being presented at the scientific meeting in July, concluded that humans likely infect their pets. That study, from researchers at Utrecht University in the Netherlands, looked at 311 cats and dogs in 196 households with a Covid-19-positive person. Just under 1 in 5 pets tested positive for antibodies, and a small handful — six cats and seven dogs — had a positive PCR test, meaning they had an active infection. People who have Covid-19 should take steps to protect their pets, Bienzle said. That means wearing a mask and avoiding contact with their cats and dogs as much as possible. “At this point, we should assume that if we get infected, that our pets are susceptible, too, and they should be treated as any other household member,” she said. According to VandeWoude, two questions remain: Can pets infect people who have not yet been infected, and if they do, will the virus mutate, as it did last year in a mink farm in Denmark. Mutations are more likely to occur when a virus is rapidly transmitted between many hosts, such as in farmed or wild animal populations or humans living in densely populated cities. Transfers between one pet and one human, on the other hand, are less of a concern. “Still, anytime there is a spillover event, from animals to people, there is always risk of it becoming more virulent, so it’s something we need to keep in mind,” VandeWoude said. Source: NBC
Idle Theory Food, Clothing, and Shelter In this essay food and shelter are considered in respect of a human food-gatherer in an environment which starts off warm, and becomes colder, and with food more scarce. It is not intended as an accurate study of heat loss and thermal comfort, but as an exploration of the broad relation of food and clothing and shelter. From the point of view of Idle Theory, food is an idleness-increasing 'useful tool'. But while a tool (such as an axe) saves labour by reducing labour time (the axe speeds chopping down trees and cutting up logs), food directly provides the energy to power human life for some period of time. A plate of food converts into a few hours of continued life. In physical terms, food provides the energy that powers human life. This energy is used up at the rate of about 100W by an inactive human. So that a meal with an energy content of 500kJ will power an inactive human for 5000 seconds, or approaching one and a half hours. Food energy is stored in the human body in the form of sugars or fats, and this store is slowly 'burned' at a low temperature to power heart and lungs and muscle activity, and the maintenance and repair of every cell in the body. Much of this energy ends up by being dispersed as heat, which serves to maintain the human body's internal temperature, before being lost to the external environment. As this energy store runs down the sensation of hunger signals the need to top up the store. The pain of the sensation of hunger (or of thirst) is one that becomes more and more insistent the longer it goes unanswered. Pain may be regarded as a form of involuntary work, an interruption drawing attention to the need of some part of the body for relief from some deficit or surfeit. and so someone who is hungry (or otherwise in physical pain) may be considered as less idle than someone who is not. Hunger is part of a necessary physiological regulatory mechanism for ensuring (as far as possible) a steady food intake, and thus a steady flow of energy into the human body. Unclothed humans If food intake and its regulatory sensations of hunger and surfeit are concerned with the influx of energy (in the form of food) into the human body, then clothing and shelter are concerned with the regulation of the outflow of energy (in the form of heat) from the human body to the surrounding environment. The regulatory sensations of warmth and cold are signals requesting the increase or decrease of heat loss from the body, in the same way that sensations of hunger and surfeit are signals requesting the increase or decrease of food energy uptake. Heat is lost in a variety of ways from the human body. Heat is transported to the skin surface and is lost radiatively or convectively to the external environment. It is also be lost in the form of heated water vapour exhaled into the external environment. The body can increase heat loss by opening up capillary blood flow to increase heat flow to the skin surface , or decrease heat loss by reducing capillary blood flow to the skin surface. Sweating is a further way in which heat may be lost, as sweat vapourising on the skin surface draws up its latent heat of vapourisation of water. Where too much heat is being lost to a cold external environment, the body can generate further heat by shivering or by undertaking some other activity, such as walking or running, which boosts energy consumption, and increases the amount of heat generated within the human body. Or else if too much heat is being lost, humans can reduce the rate of heat loss by putting on thermally insulating clothing, or by moving to a warmer environment inside a shelter. Food and shelter are both primary human needs. And both are concerned with the flow of energy. Food intake is a flow of energy into the body. And clothing slows or regulates energy loss from the body in the form of heat. The human body maintains an optimum core body temperature of 37oC. Considering only conductive heat loss, the thermal conductivity K of human tissue is about 0.5 W/m.C, and with a 10 cm path length from body core to skin surface, heat flow is 5 W/m2.oC. Given a skin surface area of 2m2, this gives a net heat loss by conduction of 10 W/oC. At rest, the human body generates about 100 W of heat, the basal metabolic rate. If this heat is lost too quickly to the external environment, body core temperature will tend to fall, and a person will begin to 'feel too cold'. If it is lost too slowly, body core temperature will tend to rise, and a person will 'feel too hot'. And so thermal comfort will be achieved when heat is lost from the skin surface at the same rate it is generated. Given conduction heat loss through body tissue Q = (k.A./l).(T1 - T2) where Q is 100 W, k.A/l = 10 W/oC, and body core temperature T1 of 37o, T2 = 37 - 100/10 or 27o. ---(1) This means that a naked, resting human may be expected to feel 'comfortable' - neither too warm nor too cold - in an ambient air temperature of about 27o, with no wind. Should ambient air temperatures fall from 27o to 17o, the rate of heat loss will double to 200 W, which is twice what an inactive human generates internally. In the absence of insulating clothing, the only way that a human can maintain a body core temperature of 37o is to perform physical work of some sort, like shivering, which releases heat as a byproduct of mechanical work. Shivering isn't the only way. Walking, running, and other activities will serve just as well. A human losing 200W of heat has to increase their metabolic rate from 100 W resting, to 200 W shivering or walking. So while a resting human will feel comfortable with an ambient air temperature of 27o, should the air temperature fall to 17o, they will first feel pain, as the body's heat regulatory mechanisms demand action, and they will afterwards respond by becoming more physically active, generating 200 W of heat internally rather than 100 W. And if temperatures stay low this increased energy consumption will have to be met by increased food consumption. And increased food consumption in turn will demand more work to be done to find food, and this will result in falling idleness, where idleness I is given by I = 1 - Pm/( Pi - Pe ) --(2) where Pm is metabolic rate, Pe is additional work performed while finding and gathering food, and Pi is the rate at which food energy is acquired while working. If it is supposed that a human can gain energy, Pi, at the rate of 400 W while working, Pe, at the rate of 100 W, then for a human at 27o with a metabolic rate, Pm, of 100 W, idleness is given by I = 1 - 100 / (400 - 100) or 0.66. If air temperature is reduced to 17o, and metabolic rate increases to 200 W, then if everything else stays the same, I = 1 - 200 / (400 - 100) or 0.33 So, in this case, a 10o fall in ambient air temperature results in human idleness falling from 66% to 33% And these figures of 'idleness' only indicate the fraction of time that someone is not doing any productive energy-acquiring work. But if someone keeps busy just so as to keep warm, that person might be said to be busy all the time. But, in many cases, it simply means that, in order to maintain thermal comfort, a human will have to restrict himself to the set of activities that are energetic enough to produce the required heat, such as walking, running, dancing, etc. Now let us suppose that, facing air temperatures gradually falling from an optimum of 27o, instead of simply consuming more food and being more active, humans make insulating garments from wool or animal skins to wear. The result will be second skin, an extra layer of insulation on top of body fat, which will reduce the rate of body heat loss. If this layer of clothing reduces heat loss from 10 W/oC to 5 W/oC, and with basal metabolic rate of 100 W, and body core temperature of 37o, the ambient air temperature T that can be endured without discomfort is now - from equation (1) - T = 37 - 100/5, or 17oC So as ambient air temperatures fall from 27o to 17o the owner of a coat will not need to keep busy to keep warm. When idle, metabolic rate need not be raised above 100 W. And so where Pm = 100 W, Pi = 400 W, and Pe = 100 W, idleness is once again - from equation (2) - Except this doesn't take into account the cost of making the coat. If it takes a month to make the clothing, and it lasts a year before a replacement needs to be made, then 1/12th or 0.083 of each year needs to be devoted to making clothes, and this work must be subtracted to give a net idleness I = 0.66 - 0.083 = 0.58 And if after air temperatures had fallen to 17o, food also became harder to come by, and could only be acquired at the rate of 300 W for every 100 W expended in work, then in the case of an unclothed man I = 1 - 200 / (300 - 100), or 0.00 So a 10 degree fall in air temperature, and only slightly scarcer food could reduce a 66% idle human to zero idleness, and to the threshold of death. But in the same conditions, the clothed man would do rather better: I = 1 - 100 / (300 - 100) - 0.083, or 0.42 Given two strategies - one of eating more and being more active, the other of wearing clothes and being less active - in response to falling temperatures and growing food scarcity, the outcomes may be shown graphically as falling and rising idleness. One man (the red line) remains naked. His idleness falls from 66% to 33% when the temperature falls from 27o to 17o, and his idleness falls to zero when food becomes harder to gather, and he dies. The other man's idleness also falls from 66% to 33%, but he then makes a fur coat, and his idleness rises to 58%. And when food becomes harder to find, his idleness falls to 42%, and he survives. The value of the coat is the idle time that it affords its owner. Before the coat was made, its owner's idleness was 33%. Wearing the coat, his idleness rose to 58%. And so the amount of idle time that the coat afforded its owner over its lifetime was (0.58 - 0.42) years, or 0.16 years. But when food became harder to find, the coat became even more valuable. For without it, its owner would have an idleness of 0. Instead, he has an idleness of 42%. So the value of a coat becomes (0.42 - 0) or 0.42 years. This assumes that it's cheaper to make clothes than to eat more food. But if food is easy to come by, another strategy to keep warm might be to add an extra layer of body fat in place of clothing, by eating more food but allowing it to be stored as a 'second skin' of fat. Yet another strategy that might be adopted in the face of falling ambient air temperatures is to construct a small enclosed shelter - a hut -, warmed by body heat, to spend idle time inside when not busy gathering food. A hut of this sort would provide shelter not only against cold, but against wind and rain. The effect of wind is to increase the rate of heat loss from exposed skin (or clothing). And the effect of rain is also to increase heat loss, as rain evaporates from skin or clothing in the same way as sweat. In this sense, wind and rain act to increase body heat loss in exactly the same way as a cold environment. Keeping dry means keeping warm. A wet and windy environment may easily draw off as much heat from the human body as a cold, dry, windless environment. If the thermal conductance of the walls was 2.5 W/m2, and the hut was a cube of side 1 m, and the internal air temperature of the hut was Ta, then at equilibrium, the naked man would lose heat through his 2 m2 of skin to the internal air at a rate Q1 = 5 . 2 .(37 - Ta) And the hut would lose heat to the 17o outside air at the rate Q2 = 2.5 . 6 .(Ta - 17) And when Q1 equalled Q2, Ta = 25o. Which is almost a comfortable temperature. The hut might be small and cramped and airless, but life would be more comfortable inside it than outside. It would perhaps be the work of only a few days, if there were enough loose stones and branches lying about, to construct such a small hut with stone walls, and a roof of branches and leaves. And the hut would probably have a longer lifetime than a garment like a coat, because it would not be subject to wear and tear in use. It might take only a week or so to build a shelter that might last for several years. The unclothed man would spend all his idle time inside the hut, and only go out to energetically gather food, keeping warm by keeping busy. And so his idleness in respect of food gathering would again be But the additional cost of spending a week making a new hut every 5 years would entail extra work at the rate of 7/( 365 . 5 ) or 0.0027. So the hut owner would enjoy an idleness of 0.66 - 0.0027, which is still just about 0.66, or 66%. And so, at an air temperature of 17o, the owner of a 1 cubic metre hut will enjoy an idler existence than his rabbitskin-clad companion with a 58% idleness. In general, the smaller the hut, and the nearer it becomes a 'skin-tight' fit like a garment, the nearer its required thermal resistance approaches that of a coat in the same conditions. The smallest hut possible would be a 'shallow grave' with an entrance at one end through which to crawl into it (which prompts the thought that when archaeologists find such graves, they may not have been graves at all). The bigger the hut, the thicker and more thermally resistant its walls need to be to achieve the same equilibrium temperatures. Or conversely the bigger the hut, the greater the need to heat it with something more than body heat. Such additional heating might not entail lighting fires inside huts. A 1 Kg piece of limestone with a specific heat of 800 J/KgoC heated to 220o in an external fire could hold about 160 kJ of heat to release into the hut. A 1 kg log of pine wood with a specific heat of 2.5kJ/KgoC would release about 500 kJ of heat as it cooled. Compare this to the 360 kJ of heat released by a resting man in one hour. A larger hut would be more comfortable and airy, but would take longer to heat up with body heat alone. But this could be supplemented with a candle used as heat source rather than a light source. Beeswax contains about 50 kJ/g of energy, and if a candle burns 0.001 gms of wax per second, it will release 50 J/s or 50 watts, which is half the resting metabolic rate of a man. If the candle weighs 10g, its total energy content would be 50 kJ, released over about 100 minutes. Another way to add extra heat is to consume hot food and drink. Given core body temperature of 37o, a litre of hot water at 77 o. Water has a high heat capacity of 4.2 kJ/kgC and a density of 1000 kg/m3. A litre of water weighs 1 kg, and heated by 50o above body core temperature will release about 200 kJ of heat as it cools to body temperature. The above calculations are very far from exact. There is much more to body heat loss than is suggested. And also to the estimation of comfort. But they give an outline idea of the approach ttaken Substituting Food, Clothing, and Shelter Clothing and shelter may be regarded, up to a point, as substitutes for food, and substitutes for each other. In a cold environment someone may opt either to stay warm by keeping physically busy while naked, and consuming more food in the process, or they may opt to stay warm by wearing clothes or staying in warm shelters. The actual choice that anyone makes will depend upon the environment in which they find themselves, and on the relative availability of food, and the materials for making clothes or building shelters. Shelters will be larger if they are made for families or for entire communities. And they will be larger if they are required to shelter tools and luxuries which may rust or rot outside. And they will be larger if there are varieties of work performed inside them as well as outside. In cold climates, people may be expected to wear heavier clothes, and build more substantial and well-insulated houses. In warm climates, they may need little clothing, and only simple shelters which act more as shelters against rain and wind than cold. In desert regions, where there is little material for building shelters, humans may largely live outdoors as aborigines. And in warm tropical forests, the same may often apply. This will also affect body shape and body fat and activity levels. In cold climates, indigenous people may tend to become more 'rotund' than in cold climates, to reduce skin surface area nearer to a sphere. And in cold climates, people may be expected to carry more insulating body fat than in warm climates. In cold climates people may be expected to be physically busier than in warm climates where unnecessary physical activity may result in body overheating. What is 'right' is what results in maximum idleness in any particular set of environmental circumstances. There is no one size that fits all. All the variables are dependent on each other, so that as food intake decreases, clothing or shelter must increase. It may even be that the supposed modern 'epidemic' of obesity is a perfectly natural response to living a relatively inactive life in a cold climate with abundant cheap food but expensive clothing and housing, with the result that the natural equilibrium is found where people don't wear much, live in underheated houses, and so carry a lot of thermally insulating body fat to make up for their underclothed inactivity. When food is cheap, getting fat may be the easiest way to stay warm. And there may also be positive feedback loops involved, whereby once someone has become obese, it becomes difficult for them to be active, and so they become more inactive, and more obese, and so on. And as they become more obese, it may become harder to dress adequately, because large size clothes may be hard to obtain, with the result that they become yet more obese. And there may be nothing wrong with such a strategy. In a cold climate, it is better to be fat to be thin. And body fat is a store of future days of life, and is an indicator of prosperity. The idea that there is an optimum 'athletic' body type and body weight, and an optimum level of physical activity, and an optimum food consumption, and an optimum clothing level, and an optimum house size, and so on, is a cultural prejudice no different from one which favours an 'optimum' skin colour. Subjective Valuations of Food, Clothing, and Shelter Food and clothing and shelter are also subjectively valued in ways that extend beyond their utilitarian value. They are very often desired in themselves, as luxuries. People often enjoy food for its taste and texture and appearance. And they like clothes and houses for their appearance, as fashion items and architectural statements. And in many cases subjective values may take priority over any 'objective' values. In idle societies, in which food and clothing and shelter are easy to come by, the luxury value of foods as culinary experiences, and of clothing and footwear as cultural identifiers and fashion statements may take precedence over more utilitarian concerns of warmth and nutrition. They may even become entirely lost, as people starve themselves to become fashionably thin, or wear too little clothing for the same reason. Food and clothing and shelter serve to maintain core body temperature at an optimum level, and to maintain continued life. And they are to a great extent interchangeable with each other. In a cold climate people may go naked, if they keep physically active and eat more food. Or they may wear clothes and live inside houses, being less physically active and eating less. In Idle Theory, the optimum balance is achieved when net idleness is maximized for any given environment. There is no single fixed 'best' combination applicable to all environments and all circumstances. And the same sorts of considerations apply with heating, cooking, and a variety of other strategies for maintaining body temperature. This essay has barely touched upon radiative and evaporative heat losses, air humidity, or upon wind and rain. It has concerned itself more with life in a cold environment than in a hot environment. It has not included sleep, during which metabolic rates fall, and people often have to 'wear more clothes' by climbing into bed. Nor has it touched upon the ability of people to acclimatise to a new environment, by adding or removing a body fat 'second skin', or by raising or lowering their basal metabolic rate.   Idle Theory Author: Chris Davis First created: February 2009
GKG Logo Department of Geology >> Aims and Objectives 1. To motivate the students to understand the basics of Geology. 2. To enable the students to upply their theoritical knowledge in laboratory during practicals and in the field. 3. To enable the students to acquire the skills to represent their knowledge of Geology through writing, or through oral presentation. 4. To prepare the students for effective communication. 5. To enable the students to face the global corporate world. 6. To develop the self – confidence for personality development and language competence through mock interviewat are and seminars. 7. Collect the information from the net and write down the information in own  handwriting and language,only photographs from the net. Write the a acknowledgement of the research person with year/or the web site. Power point presentation eg. Unit like Building stone/ Economic impotance of minerals. Naming of minerals / Photograpes showing different landformes / Internal structure of the Earth / Origin of the Earth / Geology of Maharashtra and India. 8. Field work / Visit to museum or any Research Institute and write the report
The value of functional public spaces for the wellbeing of citizens Planning of public spaces in Europe is moving towards green and pedestrian-friendly values, while in some parts of the world the public’s basic needs for safety and accessibility remain unfulfilled. A comparison between the European and South African urban space gives perspective to understanding the fundamental value of a functional public space that supports the wellbeing of citizens. The power of street art to modify urban spaces towards a more open and inclusive direction is used in cities all around the world.  Public space is an open space in the urban realm for citizens to encounter each other, feel belonging to the community and develop identity and trust towards each other. European public space is often relatively functional, serving the purpose it was created for. Cities support inclusive planning often on a grassroots level by inviting citizens  to influence these spaces and the decisions that are made about local development. Public spaces invite people to encounter each other in an equal environment and to use that space for various activities, like promoting local culture and organizing demonstrations. Over recent years notable elements in the urban planning of European cities has been the decrease of cars and the increase of green spaces. One example of this is the Boulevard Anspach in Brussels where over 3000 of former car routes have been turned into a pedestrian green zone. Spaces in cities are formulated to reduce air and noise pollution and shift from commuting spaces towards relaxing atmosphere so that cultural activity and tourism can flourish.  Besides the shift to more pedestrian-friendly solutions, public spaces have, furthermore, a deeper fundamental value for the wellbeing of cities. Public spaces are the environment where the feeling of community and trust between citizens is built. The meaning of functional public spaces becomes visible especially when putting the matter into global context . South Africa, the country of incredible nature and a variety of cultures, is currently one of the most unequal places in the world. The unemployment rate has has peaked at 30%, impacting especially the younger generations. Neighborhoods of lower income often lack functional public spaces. Citizens feel trapped because of the gangsterism and vandalism that is taking place on the streets. In these areas the feeling of insecurity and the lack of trust and freedom are shaping the everyday behavior of the people. Woodstock, a suburb of Cape Town (Photo: Tiia Talvisara) Don Pinnock, a South African journalist has tried to explain the meaning and development of gang violence in the city of Cape Town. He argues that the Cape Flats, where colored and black people were forced to move during apartheid, have by their design and planning modified the use of the streets over the past 50 years. Instead of moving whole communities, conjugal families were individually relocated to these statehouses and, as a consequence, the solidarity and trust between communities and neighborhoods disappeared. Streets were not anymore a common playground and the conjugal family itself became the focus of solidarity, shifting the social activity from streets to  small houses. Today these neighborhoods are stained by continuing fear towards the other and the only way that the streets are used for social life is by driving through them in cars during daytime. Weekly shootings and robberies prevent access to the public space for the majority of inhabitants and the only solution left for  the local state is to increase the volume of fences and assign more soldiers and police authorities to these neighborhoods. Street art in the urban development Woodstock, a former industrial neighborhood in Cape Town, used to be one of these unsafe neighborhoods with a relatively high rate of criminality. During the last 10 years, local artists started informally painting the walls of the neighborhood. Slowly, instead of just allowing to use the walls for murals, residents started to compete for the artists and pay them to get a mural on their wall. Now  over a decade later, Woodstock is a strongly gentrified neighborhood with growing real estate prices, hip cafes and local craft shops. The feeling of safety is increasing as is also trust and feeling of being part of a community.  All over the world street art is increasingly used as a tool for gentrification. However, street art, meaning mainly murals and graffiti, has promising results in relation to creating spaces in the public realm that increase feelings of trust and peacefulness. For example, in Cape Town street art has over the past 10 years been modifying the urban space in neighborhoods like Woodstock and Salt River towards more accessible and welcoming. Europe has many examples of this phenomenon too, cities like Barcelona have branded themselves with street art to attract tourism and boost gentrification, and also on a smaller scale, neighborhoods are working together to include citizens in the local urban development. Street art has the potential to increase the wellbeing of local communities in the urban space. Feelings of safety and trust are fundamental values of a functional public space. In Europe that planning is moving towards the creation of new green pedestrian areas that aim at  slowing the pace of life, while in South Africa many urban areas are struggling for basic needs such as safety on the streets. However, what is common in the urban realm is that both of these parts of the world find street art as a tool that can be used to improve public spaces towards more accessible and functional environments. Still, for the deeper and more profound change equality between people through education and employment needs to be supported. The public space remains an arena where the feelings of community, security and belonging are forming and should be maintained. TEXT Tiia Talvisara PHOTOS Tiia Talvisara  The author is doing her master degree of urban studies and planning in Brussels, with a BA of political science and studies of clothing design from the University of Lapland. The author is currently working in Cape Town with the youngsters of local communities. Shas specialised in the questions of identity and socio-economic differences in urban areas. Tagit: europe, south africa, urban planning Kategoriat: Artikkelit, Nostot Aiheeseen liittyvät artikkelit
Remarkable Points You Can Pick Up From Language Translator. A translator or interpreting language cpu is an all-encompassing basic term which may define anything which converts textual details from one computer system language to one more. Generally, a program created entirely in top-level language (for example C++) is known as resource code. In contrast, languages utilized to convert textual information into machine language (for instance HTML) are called binary languages. Converting or translating languages is likewise feasible for programs created completely in customer mode. However, translating languages is typically made use of for system programs as well as is for that reason extra common with systems like the Windows, Linux, UNIX, and also BSD families of operating systems. An online language translator gadget is readily available in the market for companies that need them. They function by taking the resource code of software application and also changing it right into a native tongue, as an example German, while offline equating it into English. On the internet language translator tools do not always equate languages as they do for the PC. Rather, they convert one language to one more (as when it comes to equating an English paper right into German). They are readily available both for usage in the online and offline market. Real-time translation is one of the most typical type of translation service. It is typically provided by a devoted translation company for a cost, in partnership with one more entity. Real-time translation solutions guarantee top quality translation wherever it is used-inbound, within a company, in between different languages, as well as also for the global market. A real-time translation system includes making use of various translation innovations and tools such as message translation generators, translation memory modern technologies, along with tools for multi-lingual domain name interaction. Translation memory technology provides stored translations in the form of layouts for a smoother procedure. On the other hand, resource language translators translate records directly from source language to target language. In real-time translation, the source language translator should have the capability of understanding and also picking up subtleties of the target language. On the other hand, in contrast to real-time translation systems, incoming translation systems equate files that remain in the procedure of being converted. This implies that the source language translator need to can understanding the significance of certain sentences or paragraphs, along with the precise grammar as well as spelling of the resource language. The language translator employed by a firm to execute company transactions have to have the required abilities of a deep-sea translator, instead of a surface-reading translator. A deep-sea translator is able to recognize and equate records from very deep waters, such as undersea cords. On the other hand, a surface-reading translator can equate papers from very top-level languages, such as Spanish or Chinese, to English. A source-language translator can be contrasted to a secretary for the reason that he/she is in charge of translating text from a highly abstract type of expression, such as a short article, into an extra concrete one, such as a newsletter or organization record. It is very important for the resource language translator to comprehend the society of both languages that will certainly be equated. Social differences can create substantial disparities in between the significances of words and also the actual meaning of the exact same words in the target language and also vice versa. There are some translation specialists who concentrate just on technological translation. Technical translations entail translating texts consisting of texts that are produced by researchers or engineers. An example of this sort of translation work would be a scientific paper written by an engineer in his own language using clinical terms. In order to make sure that these translations are right, the translator ought to have an extensive understanding of the scientific terminology used in the record. A technical language translator, unlike the majority of language translators, is not anticipated to comprehend the social subtleties of the people that will be receiving or reading the converted materials. If this were to happen, after that the precision of the translation would certainly be cast doubt on. Language processors and also language translators usually come into contact with each other throughout the training course of their daily jobs. These systems software programs are developed to save countless hours of data access by removing the tiresome job of by hand getting in information into spread sheets or journals. Some of these programs are so advanced that they can additionally be set to produce translations from any type of resource material and after that store them in a database for future use or outcome. A language translator or coding translator is a basic term which can describe anything which converts message from one language to another. A program written in low-level language is known as resource code. The translation from source code to an application program is known as target language, and also the source language as well as target language are usually the exact same language. Translators equate these source codes to targeted languages. A translator is an individual who concentrates on the business of translating languages, while a coding translator converts only text. Many companies use translation and also analysis services onsite or online. There are also translation companies which provide full-service translation jobs for big along with small companies. These translation firms may employ language translators as well as interpreters, as well as authors, editors as well as marketers. Some translation firms supply translation and also analysis resolve the Internet. A language translator can be an online translator, that works through an internet browser, or stand-alone translator, who utilizes specialized software application. Most typical language translations are between English and Spanish. There are additionally other typical language translations, such as in between German and English or between Portuguese as well as English. Translation firms as well as translators use these type of services. There are many different type of translation tools and modern technologies, consisting of software, which translate message from one language to another utilizing formulas and also natural languages. This technique of translation conserves time due to the fact that the translators can locate more appropriate words that require basic synonyms. Sometimes it is possible to utilize just part of a word in the target language, e.g., if an English-Spanish lexicon contains words that can not be converted specifically in Spanish, after that only parts of the word are used, e.g., “a”, “the”, “be”, “or”. Some languages do not have solitary alphabets for every single letter of the alphabet, and also some letters may show up in more than one area in a word. To create an exact translation, a language translator should consider all of the possible source secret language. The source secret language is the specific words located in the source code of the program or file. For example, if you download and install an audio documents from the web, and open it with your favored word processor, you will certainly see the resource code name each time the file is presented. A computer system designer carries out language translation by creating a translation dictionary which contains the translation for each data or program. When a program is written, it lugs its source code with it, as well as any modifications to the resource code are reflected in the language translator examples of these adjustments are – changing areas with tabs (tab characters make use of a various encoding than areas) as well as/ or tab personalities replacing hyphens. Leave a Reply
Assignments,  Tutorials Intro to Networks I Due: Thursday February 28 After you complete the slides above, post a short (approx 300-500 words) post answering the following questions from the slides: How does the network change over time as you add more years?  Who are the major connectors who bring small sub-networks into connection? How does the network compared by betweenness centrality compare to the network sized by degree?  How do the large nodes sized by betweenness compare to the people who connected subnetworks when we filtered by year?  Are they the same people? How do the patterns formed by clustering compare with the individuals who have high betweenness centrality?  How do they compare with the small networks that formed and connected when we filtered by year? You may optionally complete this assignment in teams of two. If you do, each team member must fill out the team assignment evaluation. Update 2/27: If the website hangs on clustering, you can see the clusters here. Comments Off on Intro to Networks I
Greetings.  Innovation often means standing conventional wisdom on its head. And sometimes that implies turning difficult problems into remarkable solutions. We all know that the U.S. transportation system, with its over-dependence on roads and private automobiles, is a costly and energy-sucking way to get around. Not to mention the great expense of maintaining the physical infrastructure.  But the very clever folks at Oom Avenhorn Groep, an engineering firm based in the Netherlands, have used their collective genius to come up with a unique option. Why not create roads that actually generate energy? And that's exactly what their "Road Energy Systems" solution does.  But since I'm not an engineer, I'll let them describe it in their own words: "Road Energy Systems consists of a layer of asphalt that has a closed system of pipes running through it. The pipes are connected to underground aquifers (water-bearing sand).  In summer the sun heats the asphalt pavement, which in turn raises the temperature of the water in the pipes.  The water is then transported to the heat source area, where it is stored for several months.  As soon as autumn arrives, the system brings the warm water to the surface, where a heat pump raises its temperature to a level suitable for low temperature heating systems.  The surplus thermal energy is used to keep the temperature of the asphalt above the freezing point.  The asphalt cools the water to the point where it can eventually flow to the cold source.  In summer the process is reversed.  Water is pumped from the cold source and used to cool buildings."   And here's a picture of how it works… Ooms Road Energy  You can learn about other innovative ways to rethink our aging infrastructure in the latest issue of Popular Science, a wonderful magazine for keeping up on a world of new ideas and technologies. We win in business and the public sector by taking a fresh look at our most pressing problems.  Maybe the road to good intentions is paved with energy.  And maybe your biggest liabilities are really assets in disguise.
biodiversity migration Wood-Pewee Connection It’s early September and the first fall migrants are coming through Costa Rica. These are the species that passed through the lands near their northern breeding grounds during the dog days of August; the hot days of shorebird migration, the time of latent summer that tricks you into never believing in winter. In Niagara, those humid days made it hard to imagine the constant freezing winds of a lake watch, the nights ruled by nature’s lethal cold caress. While walking on the hazy beaches of Lake Erie, it was odd to imagine that, just a few months later, those same warm sandy places would be glazed with ice. But the presence of Ruddy Turnstones and Semipalmated Sandpipers wasn’t any hoax, those Arctic nesters weren’t flying way south for nothing. In September, those and many other shorebirds have converged in Costa Rica. These are the days to watch them (!), to look for the odd one out, see if you can trick yourself into changing a funny looking distant Semipalmated Plover into a mega Common Ringed. Being far south of cold weather, smartly situated in vital wintering grounds for multitudes of Passerines, Costa Rica also bears witness to numbers of warblers, Baltimore Orioles and other migrant birds of the north. Although the bulk of those travelers won’t be in Costa Rica until October, some of the earlier migrants come through town just about now. Among those “early” species are birds that winter in South America, birds like Red-eyed Vireos, Eastern Kingbirds, and Mississippi Kites. A kite in the Central Valley would be a bonus and it’s not out of the question but seeing one will likely require a visit to the Caribbean lowlands. That’s also where most of the vireos and kingbirds travel but some also find their way to our “backyard”. This morning, while enjoying coffee and looking for avian action out back, I saw that two vireos had managed to do just that. They were so stealthy, I almost didn’t see them. Unlike the constantly singing bird of the breeding grounds, the fall vireos of Costa Rica have removed themselves from center stage. More concerned with eating, the only sign of their presence is a brief flutter in leafy vegetation, an afterthought of a bird that seems to vanish as soon as you raise the binos. There were just two or were there more? Taking their stealthy behavior into account, there could have easily been several in the area, more birds ghosting their way through the riparian zones out back. As with every migrant bird, I always wonder where they came from? How far did they fly the night before? Where did those small olive, gray, and white birds spend the summer? Was it in the beautiful mixed forests of the Upper Peninsula where I once camped and listened to Saw-whets on a cold night? Had they been singing in the rolling forests of southern Illinois where I worked for a field season doing bird surveys and looking for bird nests? Could they have even come from the remnant old growth forests of the Niagara Gorge, a special place close to the heart where, like many other Western New Yorkers, I used to hike and fish for salmon? I wondered the same about another migrant species I had seen out back a few days before. It looked so much like an extension of a snag, I wouldn’t have noticed the bird if it hadn’t moved. Luckily, it was actually moving a lot, sallying out again and again and that bit of brown flash during a light rain is what prompted me to get my binocs. Focusing in on the tip of the stick revealed a wood-pewee and although this migrant Contopus is at the duller end of the colorful bird spectrum, it shines with hues of behavior, challenge, and story. This particular pewee was showcasing its classic pewee behavior with urgent fervor. It no doubt had better places to be and was buying its night train ticket with captures of airborne insects. Looking at it through the scope revealed a small brown bird constantly looking back and forth and up and down. No time for song, it sallied out again and again, even going after but missing a large white butterfly (oh yes, there are many seriously cool butterflies out back!). Keeping with a pewee tradition that pleases the birder, it came back to that same snag every single time and thus allowed me to study it as much as I wanted. Those prolonged looks helped me pass the pewee challenge. Scope studies convinced me that the non-vocalizing bird was a Western Wood-Pewee, a species that migrates through the highlands of Costa Rica in large numbers. Although it always is best to hear a pewee before giving it a name, this bird was so gray, had such an overall dark bill, and a more prominent lower wing bar, I figured it had to be a Western. As for the story of that pewee, I suppose the only thing I honestly know is that it spent a late afternoon in a riparian zone in the Central Valley of Costa Rica. I don’t even know if it found enough food to head back into the night skies and keep flying south but I didn’t see it the following day. As with those vireos and any of the migrant birds from the north, I can’t know where it came from but having heard them on many a bird survey in Colorado and Washington, I have a fair idea of places where it could have spent the summer. Places with Aspens and conifers in unbelievably spectacular scenery, places where I heard many a Flammulated Owl, admired those small owls with a flashlight. Places blanketed with forests of tall Doug Firs, ferns and Devil’s Club in the understory, Varied Thrushes singing from above, Pacific Wrens calling from below. Drier and sunnier habitats too with scattered oaks, junipers and brush frequented by Virginia’s Warblers and Green-tailed Towhees. That small bird might seem insignificant but it hails from fantastic, beautiful places far to the north, flies through the night over vast areas of Mexico and on to Central America and the story doesn’t even stop there! It keeps going, flying further still to the lush cloud forests of South America, all the way to places with astounding bastions of biodiversity, all the way to the Andes where it shares an avian scene with chat-tyrants, ridiculously plumaged hummingbirds, and a fantastic array of tanagers. I have also been fortunate to have visited those places where it winters. For now, I’m happy to greet it on its way south but one day, I still hope to fly into the night and meet it again on its wintering grounds. Birding Costa Rica migration It’s Migration Time in Costa Rica! Migration! For the birder, few other words work better at sparking a sense of excitement than that one. Ross’s Gull should, along with Bare-necked Umbrellabird, Wilson’s Bird-of-Paradise, and a text that says, “Golden-winged Warbler seen this morning in Wales” but those are either target species or one-time mega jackpot birds. Migration, on the other hand, is the expected change of the seasons that brings equally expected waves of birds. Further excitement is brought to the equation by not exactly knowing where the birds will settle down but also realizing that flocks of wood-warblers just might be foraging in a nearby park. Best of all, you know that a few choice lost species are out there, somewhere in a 100 mile radius. You have to put in the hours to increase the odds along with getting super lucky to connect with them, and chances are you won’t. But, while looking, you will see lots of other species that only pass through your neighborhood during the short, birdy time frame of migration. Thousands of Swainson’s Thrushes move through Costa Rica. In Costa Rica, the birds that Buffalonians saw in September and August have just arrived in numbers. Many will stay, many will keep on going south to the subtropical forests of the Andes or wintering sites further south. When they pass through here, as elsewhere, thrushes, warblers, vireos, and tanagers gather at fruiting trees and feast on whatever bugs and larvae they can find. Given the heavy life-inducing rains experienced in Costa Rica in 2017, I bet that the migrants are well fed as they pass through my surroundings. It looked that way the past couple of days while I checked green space near the house. One fig laden with fruits has been acting as a constant smorgasbord for everything from Tennessee Warblers to Swainson’s Thrushes and Scarlet Tanagers sharing tree space with many Clay-colored Thrushes, Great Kiskadees, and Blue-gray Tanagers among other birds. Up above, a few species of swallows zoomed around to catch bugs associated with the fruit and were joined by occasional swifts (Vaux’s and Chestnut-collared so far). No cuckoos yet but they are out there, others have seen a few. At night, I also listen to the sky, hoping to hear a Veery, Gray-cheeked Thrush, Upland Sandpiper, and cuckoos (because I count heard birds on my year list). So far, it’s only been the Spring Peeper notes of many a Swainson’s but I will keep my ear to the sky. I doubt the cuckoos will call (I kind of doubt they call much during migration) but that doesn’t keep me from having their rattling, bubbling vocalizations in mind. During the day, although my search for migrants has mostly been limited to the Central Valley, that will change soon during a weekend of guiding near the Caribbean coast. Down that way, while reveling in frequent views of common migrants like Red-eyed Vireo, Eastern Kingbird, pewees, and so on, I hope I can also connect with Bay-breasted Warbler, and less common migrants still needed for the year. There’s always a chance of finally espying a very rare for Costa Rica tail-wagging Palm Warbler, Northern Parula, Black-throated Blue-Warbler, or some other lost bird, and I will be hoping to add Semiplumbeous Hawk and some other choice species to my year list. After the sojourn to the Caribbean, hopefully, during the following week, I can take a trip to the ocean on the other side of the country to see what’s happening with the shorebirds, terns, and other species that use the Gulf of Nicoya. If all goes as planned, these migration times will bring me very close to or put me over my year goal of 700 species. In the mean time, even if I don’t find a lost bird or two, it’s all good in the birding hood because I will still be seeing a heck of a lot- that’s just what happens when you are birding in Costa Rica. Waders are a pleasant break from forest birding. If you happen to be visiting Costa Rica during these migration times, please take the time to count the Tennessees and other not so exciting species (because you see them up north). It’s all valuable data and the more we know, the better we can give migrants what they need during their crazy biannual journeys. Birds Arriving, Birds Leaving Costa Rica in August The calendar says “August’ but in Costa Rica, the weather mimics so many other times of the year. I look out the window and see the thick blanket of clouds hugging the tops of the mountains. It might rain, it might not, but it’s warm outside and that’s always a given. Unlike the northern temperate zone, this month isn’t the last 30 days of summer. There won’t be any crisp autumn nights ahead either. Much to my daughter’s chagrin, she won’t witness the change of seasons. She might feel differently if she knew that winter is not a Disneyesque frozen wonderland. While the natural magic of soft falling snow and faint crystal frequencies of forming ice could remind one of “Elsa”, the enchantment lasts only as long as your personal comfort. Wade through snow drifts, feel the pain of freezing toes, and come face to face with screaming wind chill, and the wish to grow wings and fly south become tangible. After all, a lot of birds do it once a year, so why not us? These two escape a very cold winter. A lot of those migrants fly to and through Costa Rica and some have already arrived. Although several shorebirds appear to have stayed here instead of going north, more have definitely flown down from their northern breeding grounds. A few local birders have made trips to Chomes and seen fair numbers of Black-bellied Plovers, Short-billed Dowitchers, and even a Long-billed Curlew. Several have also had encounters with Clapper (Mangrove) Rail, a resident, furtive species that appears to be regular in short Black Mangroves at Chomes and nearby sites in the Gulf of Nicoya. A Long-billed Curlew from last year. Other shorebirds are surely around and arriving as well, so, hopefully, more birders can get out there and see what’s happening (I hope I can!). As far as Passerines go, it’s still too early for the majority of warblers but a few have made appearances, including this year’s first report of Cerulean Warbler. Go to the right places in late August and early September and you have a very good chance of seeing Cerulean Warbler in Costa Rica. Those places are usually foothill and middle elevation forests on the Caribbean Slope, especially at the Reserva las Brisas. The first Cliff Swallows have also appeared, and many other species will be here in a month. Birds are also leaving Costa Rica. Go birding here during March and the songs of Piratic Flycatchers are a constant theme. Go birding now and you would be lucky to see one. They have stopped singing and some are probably still around, but most have departed for Amazonia. Two other “summer” breeders will also be gone soon as well. Both the Sulphur-bellied Flycatcher and the Yellow-green Vireo are pretty common species on the Pacific slope from February to about now. I heard both just the other day so know that they are still around but most will be leaving any one of these nights. Yellow-green Vireo. Two of the most spectacular species about to leave town are the Swallow-tailed and Plumbeous Kites. Migrating groups have been reported and they are headed to the Amazon basin. the birding is great in Costa Rica, but I wish I could fly with them, at least for a little bit. It would be interesting to see if they go to one area for the winter or if they roam over the vast rainforests. It would also be nice to take in a few Amazonian dawn choruses, but only for a little while because I wouldn’t want to miss the rest of fall migration in Costa Rica. Plumbeous Kite. biodiversity Birding Costa Rica common birds migration Migrants are on their way back to Costa Rica While I was standing at a bus stop last week and wishing that I could spontaneously fabricate wormholes suitable for quick and easy transport up into the much more birdy mountains, the “seet” call of a migrant warbler caught my attention Like a secret whisper in the darkness, it was saying, “Here I am. Once again, I made it back down to the land of permanent summer without getting eaten by Sharpies, Merlins, or psycho members of the Ardeidae family. I avoided the hypnotic light traps of tall buildings and towers, and found enough food and shelter along the way to survive the elements. I made it but the journey isn’t finished yet. Now, I need to find more cover than this single Mimosa tree. It’s flowers attract a bunch of arthropodic delights and I am small enough to stay hidden in its leafy branches but even a lightweight like myself can’t survive with just one tree. Oh, and there’s also that human standing across the street. He’s making me nervous because he is staring my way with fixed eyes like a predator. I better go flit and keep myself out of sight!” Yes, I was staring the way of the warbler. How could I not? Since I am an adamant and faithful birder as opposed to being a bus-watcher or addicted to text messaging, that warbler was the most exciting thing around! I suspect it was a Yellow because they migrate early, are common winter residents in the Central Valley, and make a “seet” call like the one I heard. Without binoculars to magically turn it into an identifiable creature, though, I can’t say for sure that it was a small, yellow, sweet-sweet singing insectivore of boreal, damp shrubbery. Such is the serendipity of migration. You can wait at a bus stop and suddenly spot a Blackpoll Warbler, cuckoo species, or even a big-eyed nighthawk in a nearby tree. Looking up, away from the Earth, you might espy a steady stream of swallows winging their way south. Costa Rica and Panama are so small that they could reach Colombia by nightfall. Will they fly past that wonderful haunt of Colombian endemics known as Santa Marta Mountain? They are headed to the sea of forest known as the Amazon as are Eastern Kingbirds, Scarlet Tanagers, and Alder Flycatchers. I wish I could go with them but I don’t mind staying in Costa Rica. I started migrating here myself in 1992 but I eventually traded the long trips for permanent residency after becoming addicted to tropical forests. birding Costa Rica A glimpse into my addiction. The fact that a lot of northern birds make Costa Rica their winter home eases my longing to walk beneath the forever canopy of Amazonian forests. Yellow Warblers (like the one I probably heard at the bus stop) love to spend the winter in Costa Rica. Spish in any lowland to middle elevation second growth and they will come calling. birding Costa Rica Yellow Warblers are super common winter residents in Costa Rica. Do the same in mangroves and Prothonotary Warblers hop up onto exposed roots to brighten the swampy gloom (a lot like their breeding grounds). birding Costa Rica Prothonotary Warblers are so darn aquatic. Chestnut-sided Warblers, though, are the bane of Costa Rica birders during the winter. These eye-ringed, wing-barred Dendroicas love to show up just when you think you have spotted something potentially exciting because they hang with mixed flocks, are found away from mixed flocks, can be seen in the shadows of the forest, and flit around second growth. In other words, they pop into view just about everywhere you go in Costa Rica so get ready to see a lot of them if you plan on birding Costa Rica during the winter. birding Costa Rica Broad-winged Hawks will soon fly over in massive kettles as they head south. Quite a few stay, however, like the one pictured below, to become the most commonly seen raptor during the winter months. birding Costa Rica The northern migrants are definitely on their way, some have already arrived, and will a vagrant or two show up? A few Golden-cheeked Warblers grace us with their presence each year but I would like to find something new for the country like a Hammond’s Flycatcher or Cassin’s Vireo. Although not likely, the vagaries and unpredictability of migration combined with the fact that they reach northern Central America during the winter certainly makes these species a possibility when birding Costa Rica. I just have to get out there and find them! This post is included in #133 of I and the Bird. Check out posts from other blogs about birds and birding in this edition at the DC Birding Blog.
Kitchen Safety And Hygiene Rules You Should Know Kitchens are one of our favorite places to be while at home because we get to prepare food, which most of us enjoy and eat. We spend some significant time there, and knowing your way around is very important. Kitchen safety is crucial while preparing and cooking food because you interact with fire and other potentially hazardous objects. You need to realize that part of a good kitchen organization is preparing and planning for safety in the kitchen. It is not one of those things you sort out after t has happened. You prepare for it because accidents in the kitchen are somewhat inevitable. You are not only dealing with food but electricity and fire that are potential causes of accidents. Safety procedures in the kitchen Maintaining safety procedures in the kitchen may seem like common sense until you forget, and one small thing leads to a problem. The most important thing to remember is that you are responsible for your safety in the kitchen, and the more careful you are, the better for the people around you using the same kitchen. They are potentially dangerous places to work, and we all face a range of health and safety risks. You can slip, trip or fall, causing bruises or cause an accident while lifting a heavy load of food.  Another risk is the high temperatures that may cause burns, smoke, an allergen to asthmatics, and sharp equipment that could cause injury. Some procedures you could apply in your kitchen to make it safe are: • Make sure your kitchen has non-slip flooring, which is easy to clean and maintain. This is especially great if you have kids who keep running in the kitchen. • Any spills should be wiped immediately, and if there is any obstruction along the path to the kitchen, it should be removed. • Get rid of any appliance that may be damaged or repair it if you can. The best option would be to get a new one because sometimes once you repair an appliance, it will not be the last time you do. • Make sure to turn off the stoves or burners once you take the pot off. If the food is still cooking, do not leave the kitchen unattended. • Make sure you have proper clothing without any sleeves or sweaters hanging. They are a fire hazard and would cause nasty burns. • Keep matches and lighters in high places that the kids may not reach. You do not want them experimenting with that. • Keep a fire extinguisher near or in the kitchen just in case. Let it e far away from the stoves, though. • Ensure appliances are plugged off before you start handling the sharp parts because they may still be running. • Avoid being casual because you may get a casualty. Chatting in the kitchen is not bad as long as your attention is not divided. • Always ask for help if you want to reach high surfaces or a step-stool to get something from the top shelves to avoid tripping and toppling things over. • Keep the children away from the kitchen at all costs. You would instead play in another room as you cook first. • While handling knives follow the following: 1. Use a chopping board to avoid causing scratches on the kitchen tops. The food could also slip causing you to cut yourself 2. Keep the knives clean and their handles too. 3. While cleaning, do not leave them in the sink in the soapy water. Clean them first. 4. Do not, at any point, attempt to catch a falling knife. You would instead collect it from the ground. 5. Keep electrical appliances away from water and also do not touch electrical sockets with wet hands to prevent shocks. • Never add water onto a hot pan with hot oil in it. It may splash and spatter burning someone. • Be careful when lifting the lid while cooking because the hot steam may burn you. Rules for food sanitation Improper food sanitation may cause the breeding of bacteria that may lead to illnesses that you would have avoided. Sometimes we look at our kitchen surfaces and think just because we can’t see the bacteria that they are clean. The kitchen needs daily cleaning to keep away bacteria and pests too. How To Practice Proper Food Sanitation • Wash your hand with soap and water before you start handling any food in the kitchen. Even when you go out of the kitchen and do something else, make sure to wash them immediately again. Also, wash your hands after handling any raw meat. They tend to have bacteria that could contaminate other food. • Just wash your hands when you: • Start working Wash your hands with soap and water • After going to the washroom • Are done coughing or sneezing • Are Scratching or touching your hair • Handling waste materials • You are done petting your pet companion •  After washing your hands, do wipe them with a clean kitchen towel and not your apron or clothes. Paper towels are the best to use when cleaning up because they do not transfer bacteria on other parts of the counters or stoves. • Prepare and cook sufficient food that will not have to be refrigerated. Saves you energy but also wasting. Do not taste the food with the same utensil you use to stir with. Use a spoon for that. • Prepare frozen foods that are pre-cooked as intended on the package to avoid undercooking. Rules of Kitchen hygiene Food poisoning has become rampant, and this may majorly be caused by a lack of hygiene in the kitchen. Hygiene is the practice of ways of maintaining health and preventing illnesses and diseases. Kitchen hygiene is when you consistently practice measures that keep the kitchen clean and bacteria-free through the way you handle food and utensils. Maintaining kitchen hygiene • Wash your hands regularly. Handwashing is essential in the kitchen before you touch anything. This will reduce the transfer of bacteria and pathogens in food and utensils. • Clean and disinfect the kitchen surfaces and chopping boards before preparing any food. Just because you do not see any dirt does not mean there aren’t any germs. • Let your food cook thoroughly. Many people love undercooked food and believe it is healthier. That may be true, but some foods like meat need to cook above 170 to get rid of bacteria or viruses that may cause food poisoning. Also, wash vegetables and fruits to get rid of bacteria before cooking them. • Do not wash meat. It may feel as a hygienic thing to do, but washing it under the tap may transfer the bacteria to other parts of the kitchen, causing food contamination. • Keep your fridge always chilled under 0 to 5 temperature to keep your food chilled. You could use a thermometer to make sure it has the right temperature. • Store leftovers properly and make sure they are eaten before 48 hours. If you still have them after 48 hours, keep them in the freezer. • Personal hygiene is also paramount while working in the kitchen. You need to be clean, starting with your hands and even your clothes. You can have a clean apron on which you regularly wash. If you are sick, try as much as you can to stay away from the kitchen to avoid contaminating food and utensils. Keep your spare clothes like a sweater or your mobile phone away from the kitchen. Also, tie any loose hair to avoid getting it into the food. Kitchen safety and hygiene require effort and willingness to do the right thing. It will all benefit you if you follow the kitchen rules and regulations to keep food safe and be careful when handling fires and electricity.
Species Shorts: Homo erectus Date: 4/27/2020 Time: 1:30 PM Duration: 17 minutes Presenter(s): Lindsay Barone Audience: General Audience [YouTube login required to chat] Activity description: You are the product of billions of years of evolutionary change! Approximately 10 million years ago, our ancient ancestors split from the ancestors of modern chimpanzees. This led to the evolution of many different species in the hominin lineage. Ultimately, one species was left standing: ours! Join anthropologist Lindsay Barone to explore the hominins one-by-one in a DNALC Live series called Species Shorts. In Episode 7, you will: • Learn about migration in the hominin fossil record • Discuss the evolution of meat eating in the genus Homo • Explore what makes Homo erectus so similar to our species
What if their refusal can harm others who cannot have the vaccine, such as people who are immunocompromised like AIDS patients? Case Study # 6 – Response To Bio-Terrorism The possibility of terrorists using biological weapons on the citizens of the United States has been a major topic in the press for the last several years. Smallpox has been speculated to be the perfect biological terror agent because of the potency of the virus, and because of the lack of herd immunity present in the US population. The following case presents a possible way in which the virus could be released in the population and a possible response. The questions following the case involve the ethics surrounding the government’s response. Smallpox Facts: • Smallpox initially has flu-like symptoms, which are recognizable 7-19 days after exposure. After 2-4 days of flu-like symptoms, the fever begins to decrease, and pox will form. • An infected person is contagious one day before the characteristic pox appear. • Approximately 30-50% of unvaccinated people exposed to smallpox will contract the disease. • The mortality rate for smallpox was approximately 20-40%. • The vaccine that was used was approximately 90% effective. • It is possible that if terrorists were to use the smallpox virus, that they would genetically modify it. If this were the case, then the vaccine may not prevent all of the disease symptoms for those vaccinated. Facts gathered from: http://www.vbs.admin.ch/ls/e/current/fact_sheet/pocken/ Date: June 22, 2005. A 27-year-old man is brought into a New York City emergency room with a 101-degree fever, and what he believes is chickenpox (Varicella). After a brief examination, the 35-year-old physician is puzzled because the pox do not appear to be typical of the varicella-zoster virus. Worried, he calls in another physician for her opinion. She takes one look at the patient, determines he has small pox, and immediately orders him to be quarantined. She notifies the Centers for Disease Control and Prevention (CDC) and asks them what should be done. While doing background on the patient, he tells the physicians that he is a flight attendant and that he has flown to Orlando, FL, Los Angeles, CA, Chicago, IL, and Seattle, WA in the past few weeks while working. Though he is given excellent treatment, and had been in perfect health a few days earlier, the patient dies 7 hours after admittance to the hospital. The CDC decides that mandatory small pox vaccines will be administered to all workers in the NYC hospital, and to all patients who were in the ER. His co-workers are all given mandatory vaccines as well, as are all people living in his apartment complex. They also ship stored quantities of the vaccine to all of the cities where the man had flown to for work. The vaccines are offered to citizens of these cities. Finally, all people, along with their families who had been on the man’s flights in the weeks preceding the appearance of the disease are forced to receive the vaccine. Note: The flight attendant was most likely given small pox by a bio terrorist who flew on his plane sometime during the past week/week and a half. The terrorist would have been contagious but would not have shown symptoms. Virtually every person the man came into contact with would have gotten the virus. • Is it ethical for the CDC to force people to get the vaccine? • An LA woman on the flight is religiously opposed to vaccines. Under California law she can normally refuse vaccines on religious or personal grounds. However, the government says she must receive the vaccine or face mandatory quarantine. What do you think of this? • Do you think that for more common diseases, for example measles, that it is ethical for the state to allow people to refuse vaccines (even for religious grounds)? What if their refusal can harm others who cannot have the vaccine, such as people who are immunocompromised like AIDS patients? • Is it ethical for someone to refuse the vaccine? • You had driven down to Los Angeles 5 days ago to visit a friend for the weekend. While in town, you visited many tourist attractions. You are worried and you try to get the vaccine, but are denied it because of limited resources. What do you think of this? • Citizens begin calling for the mandatory quarantining of people directly exposed to the victim, i.e those living in his apartment complex, those working in the ER, those who flew on the plane in the prior week. What do you think of this? • The smallpox vaccine, like many other vaccines (example: oral polio vaccine) can actually transmit the virus to others. In light of this, is it ethical for people to get the vaccine? (Note: they are vaccinating those who may not want to be vaccinated) • Today, should health care workers be allowed/forced to get the smallpox vaccine? What about non-health care worker citizens? The post What if their refusal can harm others who cannot have the vaccine, such as people who are immunocompromised like AIDS patients? appeared first on nursing writers.
Wiktionary:Etymology scriptorium/2021/October Definition from Wiktionary, the free dictionary Jump to navigation Jump to search discussion rooms: Tea roomEtym. scr.Info deskBeer parlourGrease pit ← September 2021 · October 2021 · November 2021 → · (current) ~ , Chinese[edit] These two terms seem obviously related, as in two voices of the same underlying verb: as the causative and as some sort of a middle voice. Phonetically, (OC /*l̥u[n]-s/, /*qʰuns/) looks like a devoiced-initial alteration of (OC /*Cə.lu[n]-s/, /*ɢljuns/). Any references on the pair? --Frigoris (talk) 08:37, 1 October 2021 (UTC)[reply] Malayalam റ്റജീറ്റീസ് is noted as having a missing etymology. This is clearly from Tagetes, though unclear whether via English, Portuguese, or some other intermediary. —⁠This unsigned comment was added by 2A02:C7D:F22A:CA00:8D1E:7062:F0C:6783 (talk) at 12:45, 2 October 2021 (UTC).[reply] Updated expected Cantonese reflex of some Chinese characters[edit] I added debuccalization rules (k → h) for the initial and modified the palatalization rules (h → j) for , and initials. Additionally, characters with a initial and a oblique tone (仄聲) now output an s initial if the character is closed (合口). Feel free to comment on the update and do notify me if there are any bugs. (Pinging @StrongestStrike, Justinrleung, Frigoris for a review.) Graphemecluster (talk) 18:36, 3 October 2021 (UTC)[reply] Yiddish קעמל[edit] @Lingo Bingo Dingo, Metaknowledge, Wikitiki89 or anyone else: Is there a known explanation why the vowel of קעמל(keml, camel) is /ɛ/? Is it borrowed from English (in which case /æ/ > /ɛ/ is expected)? Was it reinterpreted as a diminutive because of the ־ל(-l) and thus subjected to umlaut? (Though if that were the case, we'd expect the plural to be *kemlekh, wouldn't we?) —Mahāgaja · talk 11:05, 4 October 2021 (UTC)[reply] It's from Middle High German kemel (masc.!). Modern High German Kamel (n) has been partially remodeled after the Latin/Greek source (per Kluge and Weinreich). The old form is still preserved in Kä­mel­garn. –Austronesier (talk) 11:59, 4 October 2021 (UTC)[reply] Great, thanks! I see that Grimm does suggest that the e in MHG does indeed come from an interpretation of the -l as the diminutive. —Mahāgaja · talk 12:38, 4 October 2021 (UTC)[reply] @Mahagaja The form kemel also exists in Dutch, where it is the older but now formal term, though with a different quality, so I'm sceptical of the explanation involving a reinterpretation as a diminutive. See also this. ←₰-→ Lingo Bingo Dingo (talk) 17:07, 4 October 2021 (UTC)[reply] The hypothesis that kemel is "a direct borrowing from a Semitic language dating back to the Crusades" sounds particularly far-fetched to me. A Proto-West Germanic *kamīl (with ī from the post-Classical Greek pronunciation of κάμηλος (kámēlos) or just from assimilation to familiar Germanic word shape) would give kemel in Middle Dutch and Middle High German even without reinterpreation as a diminutive, wouldn't it? —Mahāgaja · talk 17:23, 4 October 2021 (UTC)[reply] Yes, I agree the direct borrowing from a Semitic language is very implausible; neither the vowels nor the consonants are good matches. It is also has another option: "Ook ontlening aan Middelgrieks kamilos is mogelijk; in dat geval is de e in de eerste lettergreep van kemel het gevolg van i-umlaut." ←₰-→ Lingo Bingo Dingo (talk) 18:22, 4 October 2021 (UTC)[reply] The vowels are absolutely in line with Arabic جَمَل(jamal), which is [-æmæl] or even [-ɛmɛl]. The initial consonant was originally [ɡʲ] ~ [ɟ], which might well give Dutch /k/ (note that even [ɡ] used in Egyptian Arabic). So phonetically Philippa's theory of direct borrowing is entirely plausible, which doesn't mean that I necessarily agree with it. 06:19, 9 October 2021 (UTC)[reply] hūmānus (human) <? humus (earth, soil, ground)[edit] (Notifying Fay Freak, Brutal Russian, JohnC5, Benwing2, Lambiam, Mnemosientje): How are these even related semantically? Is humus missing any sense? Svartava2 (talk) 14:22, 4 October 2021 (UTC)[reply] The semantics aren't difficult; words from *dʰéǵʰōm/*dʰǵʰm̥mō often have the sense 'human, person, man', e.g. Latin homō, Old English guma, Old Irish duine, Old Lithuanian žmuõ; human beings are considered the earth-dwellers (Earthlings) in contrast to the heaven-dwelling gods. —Mahāgaja · talk 14:38, 4 October 2021 (UTC)[reply] There are also creation stories that have the first human beings molded from dirt or clay. For the cultures with such stories, it's only natural to speak of humans and the earth as aspects of the same thing. The best known example is the creation story in the Hebrew scriptures, which uses אֲדָמָה‎ to refer to the earth and אָדָם‎ to refer to the first man. Chuck Entz (talk) 15:20, 4 October 2021 (UTC)[reply] In the Hebrew case the development is likely the reverse, אֲדָמָה(earth) being suffixed ־ָה‎ from אָדָם(man), and that is derived from the word for “blood”, see it: facing such questions, it was useful to be exceptionally detailled at אָדָם(man) about how the semantics possibly were, contrary to Metaknowledge’s hasty “cruft” labelling. Of course anyhow if it is the reverse then we also see how things worked. I like to show antiparallels. Fay Freak (talk) 15:32, 4 October 2021 (UTC)[reply] The current straightforward “From humus, with unclear ū ” is too simplistic. De Vaan treats hūmānus under the entry homõ, but writes, “The explanation of hūmānus is unknown”.  --Lambiam 15:58, 4 October 2021 (UTC)[reply] @Mahagaja, Chuck Entz, Lambiam, Fay Freak: Thanks for the responses. Could the semantic development be elaborated at the entry? Svartava2 (talk) 05:05, 5 October 2021 (UTC)[reply] I think the sense development gets sufficient attention at the entry homõ. The etymology section of hūmānus should state that it is a derivative of homõ, while noting that the historical development of the vowel mutations is unclear.  --Lambiam 05:24, 5 October 2021 (UTC)[reply] @Lambiam changed etymology of hūmānus. Svartava2 (talk) 12:24, 5 October 2021 (UTC)[reply] Italian poltrone[edit] As it stands, the Italian word poltrone "lazy" is derived thus: From the older form poltrone (“foal”)... I stumbled over this at first: poltrone is derived from poltrone? After considering it for a bit, I think it means that the current sense, "lazy", derives from an obsolete sense, "foal". (The form hasn't changed, but the sense has.) In which case that should be added as another etymology, and this one should point to it. But, not speaking Italian myself, I think this needs attention/confirmation from someone who actually knows what they're talking about! -- Perey (talk) 05:13, 7 October 2021 (UTC)[reply] It rather seems as if the augmentative suffix -one was added to poltro, so the explanation might not be entirely correct. Wakuran (talk) 08:33, 7 October 2021 (UTC)[reply] • German faul (lazy, moldy), English foul, PIE *puH-, "More at putrid" • foal, pullus, PIE *polH-, possibly from *pewH-, cp. Paul; where *h2 is prefered see the collective,llater feminine suffix (cf. queen) PIE *puH- would usually spell *pewH- in our notation anyway, save for a few exceptions that I don't understand. See further German flau (nauseated,oof the stomach), Flaute (of weak winds; cp. flatulence, *bhleH, Ger. Blähungen), and very similar lau (luke [warm], same as flau but with positive connotion).That said,there was either interference between Latin (late Latin, Italian) and Germanic (PWGem, North Sea Germanic), or this homonymy goes further back. The *-l suffix isn't terribly though, I reckon. ApisAzuli (talk) 08:44, 7 October 2021 (UTC) PS: correction, that's *polH- < *peh₂w, but I have obviously considered the difference to be small enough to ignore. ApisAzuli (talk) 08:52, 7 October 2021 (UTC)[reply] By the way, I wonder if the sense "bed" for poltro could be related to English bolster and similar Germanic words. Etymonline mentions a similar theory. [1]. Wakuran (talk) 08:47, 7 October 2021 (UTC)[reply] @Wakuran: what does that have to do with anything? ApisAzuli (talk) 08:55, 7 October 2021 (UTC)[reply] Just a slight digression. Wakuran (talk) 09:02, 7 October 2021 (UTC)[reply] Etymology given is pretty sus since we don't have a definition. 17:17, 8 October 2021 (UTC)[reply] It is not so much an etymology but rather an explanation of what each component radical means, maybe it needs a better heading to clarify that it's not the history of the glyph. AmyCupcakeRose (talk) 15:24, 10 October 2021 (UTC)[reply] This is within the same Pays-de-Loire IP range as a notorious editor of Japanese, Esperanto and various proto- and historic languages best known for their former edit summary "Errors. Missing Informations.". On the one hand, they're very knowledgeable. On the other, they think that it's okay to make stuff up as long as you know what you're doing. I've seen them add translations to television for dead languages such as Gothic and Old English (I blocked them once for "Unauthorized time travel"), and they added so much nonsense to Japanese and Esperanto that there is now an abuse filter to keep them from adding any more. I just noticed a lot of activity by this IP with Proto-Italic. I suppose it could be someone else who just happens to be from the same area, or they could have sworn off their previous conlanging games, and I wouldn't know enough to tell- so I'm bringing it up here for others to take a look. Pinging @Mahagaja, Rua, JohnC5, Victar, Brutal Russian, Metaknowledge. Chuck Entz (talk) 23:54, 8 October 2021 (UTC)[reply] I've kinda given up on trying to fix all their bad edits because I can't keep up with it alone. —Rua (mew) 20:04, 10 October 2021 (UTC)[reply] @Rua it would be quite simple to selectively block them from the Reconstruction namespace with a regular block, and there's also the possibility of expanding the list in Abuse Filter 117 to include more languages- the expensive part is fetching the wikitext in the first place, so more arguments in the "includes_any" function would have negligible additional impact. As far as I know, they're the only IP editor in that IP range who ever edits reconstructions, but we would have to be careful not to exclude editing of mainspace entries that merely have proto-languages in the etymology sections when the etymology sections aren't part of the edits. Chuck Entz (talk) 21:08, 10 October 2021 (UTC)[reply] Proto-Turkic *gēt or *kēt?[edit] I noticed some disagreement over whether to reconstruct the proto-Turkic root meaning notch as *gēt or *kēt. Could somebody pick one, arbitrarily if necessary? Nişanyan gives "ETü kert-/ket-" as the origin of gedik. Vox Sciurorum (talk) 13:28, 9 October 2021 (UTC)[reply] @Vox Sciurorum:: If in doubt always /k/, Wiktionary:Etymology scriptorium/2020/December § Moving Proto-Turkic words on /*g-, *d-/ to /*k-, *t-/. The voiced forms are an Oghuz innovation, but certain celebrated generalists haven’t cared enough about the primary materials and historical evidence to own it consistently. Fay Freak (talk) 17:54, 9 October 2021 (UTC)[reply] PIE eight as dual form of PIE four?[edit] According to this page in PIE eight is formally the dual of a stem *(H)oḱto- (“four fingers”). Does this mean that eight originally meant two fours? Bonus question: Why does the reconstruction for PIE eight has a 'w' at the end? Both Sihler and Beekes reconstructed it without. Is it based on someone else's?--The cool numel (talk) 07:59, 10 October 2021 (UTC)[reply] There's also Reconstruction:Proto-Kartvelian/otxo- ("four") which is currently listed as a borrowing of the IE word for "eight", but under this hypothesis could instead be a borrowing of the word for "four". Are there any other attested forms other than Avestan and possibly the Kartvelian borrowing? 20:36, 12 October 2021 (UTC)[reply] On a related note, except for a PIE borrowing of the word for eight used with the meaning of four, there's also a theory of a Proto-Semitic borrowing of the word for four with the meaning of eight. Possibly this could indicate a Base Four counting system, if it isn't a coincidence, but it's overall pretty confusing... Wakuran (talk) 01:19, 13 October 2021 (UTC)[reply] There is a vaguely similar theory about Bantu languages, e.g. Swahili nane (eight) being derived from na (and) and nne (four). It sounds plausible but doesn't extend beyond eight, and two words do not yet make a system. Panya kijivu (talk) 21:01, 19 October 2021 (UTC)[reply] There is also similar theorizing about Old Japanese, some kind of apparent ablaut for numbers 1-4, 6, 8, and probably 20. • pito (1) ↔ puta (2) ↔ pata (20) • mi (3) ↔ mu (6) • yo (4) ↔ ya (8) The other Old Japanese number words don't seem to correlate the same way: • itu (5) ↮ so or towo (10) • nana (7) ↮ so amari yo or towo amari yo (14; literally "ten leftover four") • kokono (9) ↮ so amari ya or towo amari ya (18; literally "ten leftover eight") That said, the way the etym is written on the initially linked page for Proto-Indo-European *oḱtṓw (eight), it's not clear at all how "four fingers" fits into this anywhere, not least as the PIE word for "four" is reconstructed as *kʷetwóres and the word for "finger" is reconstructed as *pénkʷrós, *penkʷ-ros (fifth). How on earth do we get from kʷetwóres pénkʷrós ("four fifths") to oḱtṓw ("eight")? That makes no sense to me, either semantically or phonologically. ‑‑ Eiríkr Útlendi │Tala við mig 17:48, 20 October 2021 (UTC)[reply] Hmmm. The theory seems to be based solely on an Avestan word if I interpret things correctly. This erstwhile singular seems to appear in Avestan 𐬀𐬱𐬙𐬌-(ašti-, breadth of four fingers). Wakuran (talk) 22:32, 20 October 2021 (UTC)[reply] That's rather sparse evidence for such an etymology... Digging around in the page history, I found that 4pq1injbok (talkcontribs) added that etym in this edit from September 2015. @4pq1injbok, could you shed any light here? ‑‑ Eiríkr Útlendi │Tala við mig 00:45, 21 October 2021 (UTC)[reply] Reading between the lines, I think what was meant was that there was some early stage ancestral to PIE as we know it where the last syllable of *kʷetwóres hadn't been added, and it was some variant of *kʷet-. If you add an initial vowel, I can see how the "e" might drop out, leaving a labiovelar-dental cluster which might simplify to "kt", possibly coloring any neighboring vowel(s) in the process. After the suffix was added to the *kʷet morpheme the suffixed term would have completely replaced the unsuffixed version, but an obscure derived term might have survived because it had already lost its connection to the original morpheme. That derived term would be what ended up as the Avestan term mentioned above. The form that became eight would have survived for the same reason. Not that I'm saying that's what happened- I'm just trying to see how someone might have come to believe it did. Chuck Entz (talk) 04:17, 21 October 2021 (UTC)[reply] Er, it's been a while. That etymology looks to be due to Henning (1948), "Oktō(u)". Transactions of the Philological Society, 47: 69-69. Short but hopefully helpful? 4pq1injbok (talk) 20:34, 21 October 2021 (UTC)[reply] • Hmm, I don't have access to that source, and Google Books is only showing me other works that happen to reference Henning. Does anyone have Henning's text to hand? ‑‑ Eiríkr Útlendi │Tala við mig 22:39, 21 October 2021 (UTC)[reply] I managed to get the file through, er, samizdat. My library is also supposed to have a copy, though in long-term storage; I could file a request for it if helpful. Anyway, if one of the implicit questions is "should we change this to say something more measured or less fanciful about PIE 'eight'", I'm entirely fine with a "yes" answer. 4pq1injbok (talk) 12:43, 24 October 2021 (UTC)[reply] The Nynorsk Etymology section and the Bokmål etymology section give completely different theories for the origin of the name of Stavanger, this is really strange as they're two orthographies for closely related dialects and it's a city name, as Stavanger is located on an angr (fjord), the Nynorsk etymology of Staff-Fjord seems more likely than the Bokmål theory of Staff-Sorrow, the bokmal also has no citations on the page. --AmyCupcakeRose (talk) 15:11, 10 October 2021 (UTC)[reply] The Bokmål example looks like a folk etymology to me. Elof Hellquist mentions the same fjord/bay theory on his entry for Ångermanland [2], [3] . Cf. Hardanger. Wakuran (talk) 19:57, 10 October 2021 (UTC)[reply] The Bokmål etymology seems to stem from this edit, where curiously, the reference added mentions the alternative "fjord" etymology. I suggest a change. Wakuran (talk) 20:15, 12 October 2021 (UTC)[reply] Certain languages' names for Venice have a g/k/ç at the end, e.g. Venedig or Վենետիկ. Is this because they're from an adjective (veneticus) rather than the city's name, or what? - -sche (discuss) 02:43, 11 October 2021 (UTC)[reply] Adelung suggests it is a variant of -sche, that is adjectival in the examples indeed, but already considers -g archaic in his time, though without citations. Although t'sch would be a plausible outcome of the palatal t, the d in Venedig is still difficult to explain in this view unless dgi/dig used to be a conventional alternative for the palatal. Hungarian Velence, if from the Austro-Hungarian monarchy though it looks too weird, might imply nasalization which could also explain g for n, as though *Venetien (cp. Italien, in that case also attributive). More interesting would be an archaic coda, hypothetically, though a more realistic head would be 'republica'. ApisAzuli (talk) 09:25, 11 October 2021 (UTC)[reply] Veneticus is indeed the source of these forms. See footnote 4 in Deonomasticon Italicum, vol. IV, page 749. --Vahag (talk) 09:50, 11 October 2021 (UTC)[reply] German Venedig was borrowed from the adjective, but apparently as a proper noun from the start, or at least interpreted as a proper noun at an early stage. In this book from 1568, Venedig is the proper noun, coocurring with Venedisch (< **venedigisch?) as adjective. The spelling variant Venedich for the proper noun is found in early printed text in German and Dutch. –Austronesier (talk) 10:16, 11 October 2021 (UTC)[reply] The history of the Germans forms is traced by Matthias here (use a US proxy to view the pages). Vahag (talk) 10:44, 11 October 2021 (UTC)[reply] Isn't the t->d shift just simple voicing? Wakuran (talk) 12:03, 11 October 2021 (UTC)[reply] Yes, and it happened already in Romance. Forms with -d- are attested in Italian since the 13th century. Vahag (talk) 12:28, 11 October 2021 (UTC)[reply] In English, I had always assumed gerunds to be derived from, or one may even say uses of, the present participle, but presently at -ing we have gerunds and participles listed under different etymology sections. Is this definitely correct? (Point originally raised at Wiktionary:Tea_room/2021/October#-ing.) Mihia (talk) 21:04, 11 October 2021 (UTC)[reply] Yes; they were quite different suffixes for most of history and are still distinct in other languages, although the participle ending has come to be spelled the same way as the gerund ending relatively recently in English history. (Other dictionaries, e.g. Dictionary.com and Lexico, say the same thing.) - -sche (discuss) 01:46, 12 October 2021 (UTC)[reply] The direction was in fact the other way around. The verb suffix -ing was initially solely the gerund suffix, and the participle suffix was -ende, Then the latter was replaced by the gerund suffix (or perhaps altered under its influence): -inge < -inde < -ende. The change took reportedly place in the Middle English period, beginning in the 13th century in the southern and central parts of England.[4]  --Lambiam 07:21, October 12, 2021 (UTC) I've heard it claimed that the colloquial pronunciation of -ing as -in’ is the direct descendant of -ende, though I have my doubts, because (1) -in’ is used for the participle as well as the gerund, and (2) -in’ is used on words that have never been participles or gerunds, such as somethin’ and nothin’. —Mahāgaja · talk 07:26, 12 October 2021 (UTC)[reply] That the change appears more often is really no ground to doubt anything. It's rain last week, rain yesterday, thus it can't be rain today!? Superb analogy, but I'd bring an umbrella anyway, an en-infinitive, and n-stems, to be sure. ApisAzuli (talk) 08:08, 12 October 2021 (UTC)[reply] • Thanks very much for the replies. And would this etymological differentiation of gerunds from participles extend to gerund phrases with objects? For example, presently the sentence "He likes eating chocolate" is under the "gerund" etymology rather than "participle". Is this also correct? Mihia (talk) 08:32, 12 October 2021 (UTC)[reply] Yes; in "He likes eating chocolate", eating is a gerund, while in "He is eating chocolate" it's a participle. —Mahāgaja · talk 09:34, 12 October 2021 (UTC)[reply] Rightio, thanks. Just one more thing, if I may. As is presently being discussed at the Tea Room, the present article seems to be making a sense distinction between "true gerunds", as in "She has a habit of sleeping late", and apparently verb-derived "outright noun" -ing forms, as in "The meetings of the Council". Are you (or anyone) aware of any etymological or sense-development angle to such a distinction? I mean, might the "outright noun" sense have developed from the gerund sense, for example? Any ideas? Mihia (talk) 13:11, 12 October 2021 (UTC)[reply] Oddly enough, mēting is attested in Old English, though we don't have that sense in our entry. Chuck Entz (talk) 14:33, 12 October 2021 (UTC)[reply] I've now added it at mēting. Leasnam (talk) 03:59, 13 October 2021 (UTC)[reply] • FWIW, *-ungō says the suffix can only certainly be reconstructed to Proto-Germanic (potential cognates outside or further back than that are uncertain—and include adjectives meaning things like "foreign", complicating the question of the original part of speech / semantics), but one of the Proto-Germanic words with the suffix which we reconstruct seems very outright-nounal, *wunungō (home, dwelling place), so if outright-nounal use developed from gerundal use, it seems to have developed early on. - -sche (discuss) 17:12, 12 October 2021 (UTC)[reply] Gerunds are so nounlike it's hardly surprising that they can be used as outright nouns in any language that has them. It doesn't have to happened only once in the history of the Germanic languages. —Mahāgaja · talk 17:28, 12 October 2021 (UTC)[reply] Is that your Ernest? If eating chocolate continues the Gerund we should have a eating chocolate contest, not a chocolate eating contest. ApisAzuli (talk) 12:12, 12 October 2021 (UTC)[reply] Indeed, "eating chocolate contest" sounds more logical, though not grammatical. I suppose whatever syntactic process is responsible for moving the direct object before the participle in "man-eating tiger" also moves it before the gerund in "chocolate eating contest". —Mahāgaja · talk 17:33, 12 October 2021 (UTC)[reply] The gerund can be construed in two ways: verbal and nominal. Verbal would be "eating chocolate" and nominal would be "the eating of chocolate". And the latter then can be rephrased as a compound "chocolate eating", e.g. "Excessive chocolate eating is unhealthy." -- The difference is most palpable in the fact that the verbal construction requires an adverb rather than an adjective: "Eating chocolate excessively is unhealthy." 19:43, 13 October 2021 (UTC)[reply] @Mahagaja: (Edit conflict) Maybe! The de.WP: Gerundium says something similar, suggesting Middle High German had an intrusive d in what looks like it became the zu-Partizip (cp. Fleischfressende Pflanze, verfressene, die zu Fressen(n/d)e?), French contestant didn't come from nothing and *-ands forms nouns in our PGem, although this is difficult to believe with only two entries in the category and reflexes such as let' s be frie-nds, while I got, of course, no intuitive understanding in the Gothic or Norse categories. That *-nt is associated with Caland is confusing too because I was reading a script instructing that we must heed Meißner’s (1998, p.251) warning: “es ist nicht alles „Caland“, was glänzt”, when supposing that There may be a pre-PIE identity between Caland adjectives and participles in *-nt-, but at the earliest stage we can reconstruct with any certainty they are clearly distinct. (John J. Lowe, Caland Adjectives and Participles in Sanskrit and Proto-Indo-European, 23rd UCLA IEC, 28 October 2011), which is of course a flight of fancy though the problem may be real as we don't clearly distinguish PIE *-nt- or *-(o)nts. ApisAzuli (talk) 05:57, 14 October 2021 (UTC)[reply] @ the IP: That's fairly interessing but it only shows that Mahāgaja's argument could be misconstrued to say that that's purely a matter of synchronic syntax. If this was intended it goes to show that the dichotomy in the etymology caters primarily to preconcieved notions from grammar school. Didactic reduction is necessary, but it goes ad absurdum when it denies the etymology. Mihai's inquiry is, effectively, asking us to join the sections, and Mahagaja's argument is seeminglui able to support that notion. ApisAzuli (talk) 06:44, 14 October 2021 (UTC)[reply] Romanian asexualitate[edit] @Robbie_SWE: because you might be interested and/or able to help. It is claimed on Wiktionary that this is a borrowing from English asexuality. This strikes me as odd because both the a- is pronounced differently and so are the endings -ity / -itate. If I had to guess, I'd rather call it a calque. Fytcha (talk) 19:28, 12 October 2021 (UTC)[reply] I think "borrowing" covers terms borrowed from the written form as well as the pronounced form of a word. Many borrowings from Latin into English were not directly mediated by a spoken form. The difference in the ending does indicate that more processes than just borrowing are involved.--Urszag (talk) 20:31, 12 October 2021 (UTC)[reply] Romanian sexualitate is classified as a borrowing of French sexualité, so there was some adaptation, already by then. Wakuran (talk) 20:37, 12 October 2021 (UTC)[reply] When the entry was created, it was said to be from French asexualité; this was changed to English in 2015. I suspect calling it a "borrowing" was a lax/loose usage of "borrowing"; iff the term is from English, it seems to be a calque (as proposed above), using a- (we lack an entry but ro.Wikt has one) + sexualitate. - -sche (discuss) 21:17, 12 October 2021 (UTC)[reply] To give another point of reference: compare German Performance with German Permakultur. In the case of the former term, German speakers try to retain and imitate the original English pronunciation, whereas in the case of the latter, it is pronounced exactly as a native German compound made up of those parts would be pronounced. To me, this strongly points to the fact that the former is a borrowing whereas the latter is a calque. As Romanian asexualitate also falls in the latter category (being pronounced like a native word; no attempt is made to imitate the donor language's phonology), I'd also classify it as a calque. Fytcha (talk) 03:53, 13 October 2021 (UTC)[reply] I think we're getting caught up in semantics here – do you define a borrowing as being "language X borrows word A from language Y, but retains spelling and pronunciation"? Cause then we're in big trouble – all our categories beginning with "X terms borrowed from[...]" are wrong then. There's a distinction between words borrowed from a language and loanwords – the latter are never adapted. I see no problem listing asexualitate as borrowed from English or French, but maybe we should add something along the lines of "Borrowed from English asexuality, French asexualité, modelled after heterosexualitate/homosexualitate". Robbie SWE (talk) 08:37, 13 October 2021 (UTC)[reply] @Robbie_SWE: I think you are right, I was and still am a bit confused about the exact terminology. I simply noticed that Romanian loans of the type of asexualitate (assimilated into the native phonology/morphology) and baseball (imitated) are not differentiated with our current use of {{bor}} which I see as lending to improvement. Mind you I primarily focus on the pronunciation here, the spelling is not so much of concern to me (because that seems to be a conscious choice by human orthographers whereas the phonology is reflective of underlying linguistic processes). According to this chart [5], baseball is a foreign word and asexualitate is a loan rendering. Fytcha (talk) 12:01, 14 October 2021 (UTC)[reply] This problem is hardly exclusive to Romanian. Ideally we would want some way to distinguish between these two kinds of borrowings. — surjection??⟩ 11:42, 14 October 2021 (UTC)[reply] @surjection: I found this chart [6] on Wikipedia which is already much more granular than our current templates. I would be strongly in favor of a proposal that granularizes the currently existing borrowing templates and I would replace {{bor}} with them in the languages I know. Fytcha (talk) 12:05, 14 October 2021 (UTC)[reply] Meh. I don't think any of those really match this case. It's more of a case where an internationalism coined in one language is copied into another but by using a third, usually classical, language (Latin, Greek, etc.) as a base and treating the word as if it had been a word from that third language. It's closest to "loan word" in that classification but still not quite the same. — surjection??⟩ 12:36, 14 October 2021 (UTC)[reply] Are you talking about the ending -itate? It seems as if that is the main spelling for Romanian words inherited from Latin -itās, and not an attempt to make the word look like a learned Latinate form. Wakuran (talk) 19:41, 14 October 2021 (UTC)[reply] I was talking more generally. Still, the ending isn't clearly just taken from the English word either, but rather based on how other Latin words are treated, even if the original word didn't exist in Latin but was later built of Latinate elements. — surjection??⟩ 23:38, 14 October 2021 (UTC)[reply] Lithuanian gintaras[edit] Many sources hypothesize a connection to Hungarian gyanta, gyantár, but I'm not sure if this is generally accepted. It does seem to be acknowledged that the Slavic words (e.g., янтарь) are borrowed from Baltic. Would it be fair to just write that in the etymology section and call it a day? I don't know how to proceed here. 20:44, 12 October 2021 (UTC)[reply] What? That a word has been borrowed into another language doesn't clarify the etymology, at all. What do you mean? Wakuran (talk) 21:13, 12 October 2021 (UTC)[reply] • I do obviously know that the borrowing of a word from language A into language B says nothing about the further etymology of how language A came to have said word. However, I am not sure whether the hypothesis is that the word was borrowed into Baltic from Finno-Ugric, or vice versa, or both borrowed from a common unknown source. In two of those three scenarios, the connection does say something about the origin of the word. Vasmer thinks the connection with Hungarian is wrong anyway. I was just listing it here in case anyone knew more. • Other than the Hungarian connection which every resource on this seems to discuss, there are a bunch of other ideas I've been able to find. One is that it derives from *gínˀtei (whence genys (woodpecker)), another derives it from *gúntei (whence ginti (to protect)). A footnote in "Foundations of Baltic Languages" mentions a hypothesis that it derives from the same PIE root as Norse kynda, relating to fire. I can't find the text of the source ("Bemerkungen zu litauisch giñtaras ‘Bernstein’") online. Then there's an idea claiming it is borrowed from Indo-Aryan via Turkic, which I haven't looked into in detail. • There is a dubious connection with Phoenician, which the Slovak entry jantár currently mentions. It was previously included on the Lithuanian entry too, but has since been removed. • All in all, there's a lot here, but it seems pretty complicated to summarize. 22:45, 12 October 2021 (UTC)[reply] In SE Baltic, amber is often driven ashore by waves. A connection with ginti (to drive), dzīt (to drive) seems possible. The -ar- suffix however isn't common and is unproductive in modern Latvian, not sure about Lithuanian. Panya kijivu (talk) 19:27, 14 October 2021 (UTC)[reply] The ety at childing goes on into detail about "child", but is this necessary? For this, shouldn't it just refer to the article at child? Also, can ety 1 and ety 2 be merged as "essentially the same word" or do we really need two sections for the different use of the suffix (and if so wouldn't this ety split logically need to be replicated across all relevant "-ing" words, such as uprushing, to give a random example -- it seems overkill). I usually don't mess with ety sections as usually I don't know what I'm doing, so perhaps someone else could assess this one. Mihia (talk) 08:37, 13 October 2021 (UTC)[reply] Yeah, personally, I'd agree about some trimming. Wakuran (talk) 12:20, 13 October 2021 (UTC)[reply] I've trimmed both a bit. Leasnam (talk) 16:51, 13 October 2021 (UTC)[reply] Which one is right; this page saying it's from Proto-West Germanic *hwan or the PWG page saying it's from Proto-West Germanic *hwannē? — surjection??⟩ 11:39, 14 October 2021 (UTC)[reply] @Surjection: If the only attested Old English spellings are hwenne, hwænne, hwonne, then certainly the latter. —Mahāgaja · talk 18:19, 14 October 2021 (UTC)[reply] Note that the etymology section for hwænne states, “From Proto-West Germanic *hwannā ”.  --Lambiam 08:36, 15 October 2021 (UTC)[reply] ympäri, ymmärtää[edit] Would I be correct in assessing that the former adverb/postposition (from Proto-Finnic *ümpärik) and the latter verb (from Proto-Finnic *ümbärtädäk) are both from a noun *ümpäri (draft) that has not survived as an independent noun in any descendants? — surjection??⟩ 17:58, 14 October 2021 (UTC)[reply] Where does Southern Altai (alt) belong?[edit] Our module data places Southern Altai in the Siberian Turkic branch of Turkic. Wikipedia says it belongs to Kipchak, and editors of Proto-Turkic reconstructions agree. What is true? Vox Sciurorum (talk) 11:02, 15 October 2021 (UTC)[reply] Seems to be a quite complex issue. [7] Wakuran (talk) 11:40, 15 October 2021 (UTC)[reply] Proto-Italic u-stem adjectives?[edit] Per the entry for "brevis" in Michiel de Vaan's Etymological Dictionary of Latin and the other Italic Languages, Proto-Indo-European u-stem adjectives were reformed into i-stem adjectives "in the prehistory of Latin". Unfortunately, the exact dating of the change in declension class is not always clearly indicated, but in the case of some words, such as gravis, he states that the transfer to the i-stem class is not shared with Sabellic and therefore should not be reconstructed back to Proto-Italic. The entry for brevis gives a list of five other relevant words: dulcis, gravis, mollis, suavis, tenuis. The forms given by de Vaan (who cites the stem, not the full nominative form) that are specifically labeled as "PIt." are as follows: • *mreχ-u(-i-) • *dulkwi- • *gʷra(w)u-, *gʷrau- (also *gʷrauo-, not explicitly marked as a PIt. form, mentioned in the specific context of discussing the derivation of Oscan bravús); • *moldu-(i-) • *swādu-, *suādu- ("then" *suādwi-, not explicitly marked as a PIt. form) • *tn̥(a)u- ("yielding *tn̥(a)ui- > ten(a)u̯i- > tenuis", none of the intermediate steps explicitly labeled as a PIt. form). The forms that Wiktionary has in Reconstruction:Proto-Italic are as follows: *breɣʷis, *dulkwis, *gʷrawos, *swādwis, *tenwis. All of these entries cite de Vaan as the sole reference, even though only *dulkwis is an actual match to the form de Vaan labels as PIt. I first ran across this by noticing that the o-stem form *gʷrawos was listed as the ancestor of the Latin i-stem form gravis, which de Vaan never says is the case. As I read the entry, de Vaan implies a development directly from a PIt. u-stem form to an i-stem form: "As with other PIE u-stem adjectives, PIt. *gʷrau- < PIE *gʷreh₂-u- 'heavy' was remade into an i-stem within Italic. In view of the o-stem O. bravús < *gʷrauo- << *gʷrau-, this development must post-date the split of Sabellic and Latino-Faliscan." While I guess a change from an u-stem to o-stem followed by a change of o-stem to i-stem (as in lenis, viridis, hilaris) is possible, we have no citation indicating that this happened. Therefore, in the Proto-Italic reconstruction space, I believe *gʷrawos at minimum should be replaced with an u-stem form *gʷrawus or *gʷraus. However, I don't know which is preferable. Also, it looks like we possibly don't have any declension table templates for u-stem adjectives in Proto-Italic. De Vaan indicates that the following forms also existed as u-stems in Proto-Italic: *swādus, *tən(a)us, and possibly *mreɣus, *moldus (I'm not sure how to intepret his "u(-i-)" notation; given that the entry for brevis also lists the steps "*mreǵʰu-i- > *bregʰu̯i- > brevis", de Vaan does seem to consider the i-stem form to date back to Proto-Italic, so maybe there's no need for us to list a Proto-Italic u-stem declension for that stem). As far as I know, we don't have a reconstruction space for Proto-Sabellic or Proto-Latino-Faliscan, so I'm not sure whether entries should exist for *gʷrawos or *gʷrawis, or if these forms should simply be noted on the page for Proto-Italic gʷra(w)us as the post-Proto-Italic sources of the descendants Osc. bravús and Lat. gravis. --Urszag (talk) 10:32, 17 October 2021 (UTC)[reply] RFV of the etymology. Hello. The currently given source ([8]) does not support the given explanation, which contradicts other sources saying the arabic etymon has the meaning of “chilled” (μουσακάς#Etymology). Grasyop (talk) 10:35, 17 October 2021 (UTC)[reply] Well, I now see that مصقعة#Etymology points towards a root meaning simultaneously “to hit, to pound, to freeze” (which are quite different meanings, in my opinion). Grasyop (talk) 10:45, 17 October 2021 (UTC)[reply] The Arabic Wikipedia also states that musaq‘a is a corruption of muṣaq‘a, originally so named because the dish is usually served chilled. I find that unconvincing; many dishes are served chilled, and in the sense of having to do something with cold, the root means “freezing”, as in “freeze to death”, and the dish is definitely not served frozen. The Turkish Wikipedia states that the Arabic word means “watered”. I have no idea what might be the basis of that claim, but it is equally semantically implausible.  --Lambiam 07:47, 18 October 2021 (UTC)[reply] FWIW, Watkins's explanation is: [Greek mousakas and similar forms in other Balkan languages, all ultimately from Turkish musakka, a dish of eggplants and tomatoes braised under a layer of minced meat, from Arabic musaqqā, watered, made to drink (the dish being so called because water or broth is poured over the layer of meat, and the vegetables are braised in the meat broth or juices), passive participle of saqqā, to chill, derived from (iterative or intensive) of Arabic saqā, to water, give to drink; see šqy in the Appendix of Semitic roots.] DJ K-Çel (contribs ~ talk) 18:58, 19 October 2021 (UTC)[reply] English flint, Russian плита, Ancient Greek πλίνθος[edit] Currently the entry flint claims that flint < Proto-Indo-European *splind- (to split) and πλίνθος < Proto-Indo-European *(s)plei- (to split). I am not sure if these are supposed to be the same root or not. Meanwhile the entry πλίνθος claims that the origin of the Greek term may not be Indo-European at all, and says nothing about potential PIE roots. Vasmer claims that Russian плита is related to πλίνθος and flint, if not a borrowing from Greek. But the entry on плита instead claims that the ultimate origin of плита and its Slavic cognates is Proto-Indo-European *pleh₂- (thin, flat). This is all very confusing and inconsistent. From reading the entries, it is not clear which of these words are related to each other, if any, or what the ultimate root(s) are. Maybe that reflects the fact that the etymology is uncertain, but we could at least update the sections to be more consistent about that. 00:39, 18 October 2021 (UTC)[reply] There's no one PIE source that can give all of these. The t of the Germanic word has to go back to a PIE *d; the t of the Slavic word has to go back to *t, and the th of the Greek word (if it's IE at all) has to go back to *. Also, the Slavic word doesn't have a nasal in (the Russian reflexes of the nasalized vowels are я and у. So if these are indeed all from the same PIE root *(s)pley-, it would have to have different extensions, *pli-n-d- in Germanic, *pley-t- in Slavic, and *pli-n-dʰ- in Greek. This situation isn't actually particularly unlikely, but it does make claims of relatedness a little more difficult. On the other hand, the ending -νθος is prototypical of non-IE loanwords in Greek, which is probably why our entry assumes that πλίνθος is non-IE. —Mahāgaja · talk 06:52, 18 October 2021 (UTC)[reply] The current claim that Russian плита (plita) and Proto-Slavic *plita come from Proto-Indo-European *pleh₁-, on the other hand, does seem unlikely, as there's no way to get the vocalism to work. PIE *eh₁ gave Proto-Slavic , not *i. —Mahāgaja · talk 06:55, 18 October 2021 (UTC)[reply] The primary meaning of πλίνθος (plínthos), a block-shaped brick, makes derivation from a root meaning “to split” somewhat implausible. If pressed to suggest a PIE root, I’d say that *pleh₁- (to fill) seems more plausible. However, also then, -ινθ- remains unexplained.  --Lambiam 07:08, 18 October 2021 (UTC)[reply] Thanks for the responses. Does the etymology flint < Proto-Germanic *flintaz < PIE *splind- seem plausible at least? 07:42, 18 October 2021 (UTC)[reply] It would have to be from PIE *plind-, but if the root has an s-mobile that's not a problem. —Mahāgaja · talk 08:33, 18 October 2021 (UTC)[reply] @Lambiam: that has the same problem as getting Russian плита (plita) from *pleh₁-: there's no way to get the vowel from that root. —Mahāgaja · talk 08:37, 18 October 2021 (UTC)[reply] (I think you mean *pleh₂-.) As I wrote, this fanciful theory leaves the larger part, -ινθ-, which includes the vowel, unexplained. If an explanation is found, like from an as of yet undiscovered PIE suffix *-índʰ- :), it might also explain the vowel.  --Lambiam 16:02, 18 October 2021 (UTC)[reply] @Lambiam: You're the one who wrote, "If pressed to suggest a PIE root, I’d say that *pleh₁- (to fill) seems more plausible", but in fact there's no way to get i vocalism from either *pleh₁- (to fill) or *pleh₂- (flat), so they're both out. Even a suffix like *-índʰ- probably wouldn't get us πλίνθος (plínthos) because of the laryngeals: *pl̥Híndʰos would probably give *παλίνθος (*palínthos), not πλίνθος (plínthos). —Mahāgaja · talk 17:04, 18 October 2021 (UTC)[reply] Given the magical properties of flintstone, a comparison to Blitz (flash) and light is in order. There must be a reason why some rock is deemed blind. ApisAzuli (talk) 19:26, 18 October 2021 (UTC)[reply] Thanks, Mahāgaja, for the deconstruction of this backlog. There are just bare Indo-European etymologies in Latin, Greek, Russian entries coming from sources predating the laryngeal theory, IP, and hence wrong ones. Especially those with claimed s mobile are often suspicious. Correspondingly there is often the situation that no better has been proposed since then either and newer sources just repeat the old ones without admitting that they are middling. Considerations of foreign origins on the other hand are way too seldom. I have the suspicion that Ancient Greek πλίνθος (plínthos) is an Iranian or rather Anatolian borrowing equalling Classical Syriac ܦܠܙܐ(plezzā), based on the Greek meaning of “an ingot of metal”; a Near Eastern wanderword, with various etymologies suggested at Old Georgian პილენძი (ṗilenʒi) (a “Semitic” ultimate derivation is baseless, strike that). Fay Freak (talk) 16:24, 18 October 2021 (UTC)[reply] Words spread along with technologies. Latin tegula ("roof tile") spread to give us Hungarian tégla ("brick"), Latvian ķieģelis ("brick", via Low German), Turkish tuğla ("brick"), Finnish tiili ("brick"), Portuguese tijolo ("brick"), English tile and so on. Asserting Proto-Slavic or older origins of плита would mean that the other half of Europe had knowledge of bricks/similar technology all along but for some reason (taboo?) refused to use them. That would require extraordinary evidence. In absence thereof, I'd rather assume Byzantine Greek borrowing. Panya kijivu (talk) 19:34, 18 October 2021 (UTC)[reply] I don’t understand your formulated reasoning but indeed Boryś, Wiesław (2005), “płyta”, in Słownik etymologiczny języka polskiego (in Polish), Kraków: Wydawnictwo Literackie, →ISBN, page 447b says that the East Slavic term, from the Ukrainian vocalism of which the Polish has been borrowed, is “likely a borrowing from Ancient Greek πλίνθος (plínthos), although a cognate relation has been afforded”. This does not exclude the word having been present in Proto-Slavic though; so Melnychuk, O. S., editor (1982–2012), “пли́та́”, in Етимологічний словник української мови [Etymological Dictionary of the Ukrainian Language] (in Ukrainian), Kyiv: Naukova Dumka, page IV explicitly assumes псл. *plita but likewise a borrowing from the Greek (which is feminine!). Fay Freak (talk) 19:58, 18 October 2021 (UTC)[reply] For context, I know bare words which are only retained in East Slavic and mainly Great Russian but still presumably were Proto-Slavic: мизги́рь (mizgírʹ), по́лба (pólba), белу́га (belúga) (against *vyzъ). @Voltaigne: Ukrainian word please ❣️ Fay Freak (talk) 20:14, 18 October 2021 (UTC)[reply] Those are natural entities that can, ahem, reproduce themselves; while technology needs to be practiced by someone for its terms to stay in use. I doubt continuity of *plita simply because I have no idea what (be it natural or artificial thing) the word could have meant in the era of wooden architecture. Словарь древнерусского языка (XI-XIV вв.) [Dictionary of the Old Russian Language (11th - 14th centuries] has плита, плифа and пленфъ. It is of course possible and even likely that the sound changes were caused by gravitation towards existing similar word(s); four variants(counting плинта as well) is a lot for a short word. Panya kijivu (talk) 22:35, 19 October 2021 (UTC)[reply] @Panya kijivu: (Edit conflict) you are wrong on two things. Older origins would only mean that the word may have meant whatever, maybe to bake if not brick, when you already pressupose that there was an opportunity for borrowings among Slavs. Second, if archaeological sites are typed by architecture, you might just miss a slav one that built a house of bread, because you'd think it had to be Roman of sorts. (PS: I don't know either what it wood have meant in the woulden era, but suppose "chunk, hunk" can mean just about anything). More over, you shouldn't confuse a single brick for a brick building, which requires more knowledge than the firing of clay they surely possessed (PS: though palace comes to mind). Wood was far cheaper in central Europe than in the Levant. If perkunos, ygdrasil, druids and truth are anything to go by, they had a thing going for wood in north europe. It requires no incentive for a cobbler to stick to his lasts. Brick maybe does offer an advantage, but that's a very good reason to keep it secret. You cannot justly disclaim a claim as extraordinary in favor of a claim like your own that is no less extraordinary (unexplained loss of n, unless I am missing something). @Fay Freak: and what about परशु, πέλεκυς and potentially 𒁄 (pilaqqu,pilaqqu), or (equivalently, I say), पर्शु--PIE *pérḱus is oddly reminicent of PIE *perkʷ-, PBS *perunъ ("lightning") in view of my previous comment, and without Sanskrit or Greek cognates to deny it. @Mahagaja: Any reconstruction without cognates is formally inadmissable, you have just denied the cognates, and no internal reconstruction to support the pre-Proto-Germanic root. The mind boggles. Given OHG 'flis' I say cp. Fliese. Dwds.de/wb/[9] slightly disagrees: 17th century, from Low German, equivalent to OHG flins (9. century), MHG, MLG vlins ‘Kiesel, harter Stein, Fels’ [rubbel, hard stone, rock]. MLG vlīse ‘Steinplatte’ [stone platter], ON flīs schwed. flis(a) ‘Splitter, Stück’' [splinter, piece] after loss of n before Spirans and compensatory lengthening of the uouuel. Fliese goes, all said, back to a nasalized dental extension of *(s)plei-, q. v. spleißen ‘spalten’ [to split, cleave]. This is one of the mentioned pre-Laryngeal-Theory sources, so I am notnsure what to make of the following, cf. spleißen ... dental enlargement to PIE *(s)plei- ‘spalten, abspalten, spleißen’, itself an extension of *(s)p(h)el- ‘spalten, abspalten, absplittern, abreißen’. I do have to note that *G and *bh hardening before laryngeals is (or was) hypothetical (cf. Fredrik Otto Lindeman - Introduction to the “Laryngeal Theory”, ca. §70-80). I'd disagree as well, but I have no 2¢, only bills payable. ApisAzuli (talk) 01:10, 20 October 2021 (UTC)[reply] @Panya kijivu: Congratulations, you proven the non-existence of the Proto-Slavic with the variants. However notably Vasmer already noted down the variants and thereby claimed a later Greek borrowing in Vasmer, Max (1909) Греко-славянскіе этюды. III. Греческія заимствованія въ русскомъ языкѣ (Сборникъ Отдѣленія русскаго языка и словесности Императорской Академіи наукъ; LXXXVI, № 1)‎[10] (in Russian), Saint Petersburg: Imperial Academy of Sciences, page 152, following Matzenauer, Antonín (1870) Cizí slova ve slovanských řečech [Foreign words in Slavic languages] (in Czech), Brno: Matica Moravská, page 403, in contrast with his allegations of difficulty of a Greek borrowing in his later etymological dictionary. Preobraženskij, A. G. (1910–1914), “плита́”, in Etimologičeskij slovarʹ russkovo jazyka [Etymological Dictionary of the Russian Language] (in Russian), volume II, Moscow: Tipografija G. Lissnera i D. Sovko, page 75 also saw a variant and hence assumed a borrowing. Matzenauer gives the correct development already: A quadrilateral column foot of hewn stone on the ground is where one made fire, so the “brick” talk is misleading. Fay Freak (talk) 03:18, 20 October 2021 (UTC)[reply] Descendants of βροτός?[edit] Today I learned that English 'ambrosia' comes, via Latin, from Ancient Greek ἄμβροτος, the negation of βροτός, mortal–I hadn't realized that the gods' consumable conferred immortality. Anyway, are there any descendants of βροτός itself in Latin or its offspring, or in English?–PaulTanenbaum (talk) 11:43, 21 October 2021 (UTC)[reply] I don't know a Latin continuation from Gr. brotos, sorry, just a few remarks. It's not said that it "conferred" immortality to anyone. Gods are simply 'undying', I reckon; cp. Götterspeise (literally godly) or see kleos amphiton/sravas aksitam being the most famous example of an 'undying' formular (in funerary contexts). The etymology looks folk, and thus relevant to my interests. On the one hand I'd rather compare Ampfer (see there, perhaps from *amros) to the plant Ambrosia; see also Mohrrübe, Möhre for a well known wanderword / substrate hypothesis of a similar root (pun not intended). Root beets are difficult to reconcile with the semantics of the Greek word on the other hand (unless refering to paleo diet, ancient and traditional?) especially given the entry's image of a creme desert. Note *mel- (*mer- through Rhotacism in some instances) and *(s)mer- ("to grind, crush"), PGem *smerwą (from *smer- (“anoint”)) in comparison to *gʰer- (“to rub”, creme, Christos ("the annointed, Messias")). No less difficult is the (funerary) cake hypothesis recalled at pyramid in contrast to an Egyptian root mr. Funerary cakes seem to be a recurrent theme also in Anatolia and the near east, to say the least. I always have to think of Crème Brûlée, which I've seen made from ayran in Turkish restaurants, pressumed traditional. Long story short, it has to be far from certain. Why would a Latin continuation from Greek matter at all? ApisAzuli (talk) 09:10, 22 October 2021 (UTC)[reply] On a presumably unrelated note: see Romanian mormânt, Aromanian murmintu and Sardinian morimentu really inheritable from monumentum. This seems rather unlikely. What does Sardinian have in common with Romanian? ApisAzuli (talk) 12:57, 22 October 2021 (UTC)[reply] • PS: See AGr. brosis ("food") in *gʷerh₃- (to swallow, devour, eat), cognate L. voro. Is this koinkidink or what would the initial element be? • As regards βροτός, given the note that it "behaves as if it begins in a single consonant", and given the sonorant *mr̥tós I have looked at aborior to find that the semantics match *mer- very well, better the standing etymology. ApisAzuli (talk) 22:57, 23 October 2021 (UTC)[reply] PIE *mr̥tós gave rise to both μορτός (mortós) and βροτός (brotós), where I imagine the development of the latter form was βροτός < μβροτός < μροτός. Perhaps μορτός is the oldest form, with μροτός < μορτός by metathesis. Is it possible that the Homeric Greek poet who composed the Odyssey used the form μορτός with its simple onset, but that the scribes who wrote the verses down “corrected” a form unknown to them, replacing it by a familiar one?  --Lambiam 08:28, 25 October 2021 (UTC)[reply] The entry says that in the line mentioned, "εἴπῃσι βροτῶν must be scanned long—long–short–short—long"; switching in μορτῶν would result in the incorrect scansion long-long-short-long-long. Short scansion, even if not what would "ordinarily" occur, is not unknown before βρ in Homer, as part of the general phenomenon of short scansion being possible before some types of obstruent+liquid clusters in some positions.--Urszag (talk) 08:41, 25 October 2021 (UTC)[reply] Eye dialect spelling of il. or Contraction of il. Is this "y" a different one than the one whose etymology is described on Parler savoyard ? Pronom neutre hérité du latin via le francoprovençal qui connaît trois genres : masculin, féminin et neutre. --Espoo (talk) 17:37, 21 October 2021 (UTC)[reply] It seems that the Eye Dialect y is used in the nominative case, and the Savoyard y in the accusative case, if I interpret it correctly. I guess the etymology might still be related, however. Wakuran (talk) 18:19, 21 October 2021 (UTC)[reply] I think the Canadian French usage is simply a contraction. Other pronouns are similarly contracted in the nominative case. Andrew Sheedy (talk) 22:24, 24 October 2021 (UTC)[reply] The root is usually glossed "to bend". I can't imagine the apparatus needed to justify this interpretation, and I have no interest in investigations into a Rube-Goldberg contraption. This is relevant for onomastics, eg. Champagne and Rome. TL;DR: The evidence looks rather poor, kh₂m-ér-e-ti is unmotivated, not necessary for *kameros, and wholy incompatible with κμέλεθρον. These remind distantly of turn, rota, fold or the like. The ostensible root-extension *-p- is unexplained and it alternates with non-IE *b (see also *(s)kh₂emb-, scampi according to Pokorny). Half the derivations look like possibly loaned from one another, especially καμπή (winding, such as of a river). Indeed I heared it said that a certain river bend in Rome was the place where troops assembled, and I think it was implied that semantic drift gave rise to the meaning field [by the river]. Although river bends were a favourite spot for the errection of settlements and buildings, in general, a huge variety of terms can be expected as for knee or Haff (viz. hav as explained for one hypothesis towards Habsburg, cf. de.WP). Given the uncertainty of Kapuze (hood), cappa (cloak), escape (sounds like folk etymology), etc., I came to wonder if German Umhang (cloak) (cf. um, also Vorhang (curtain)) could be taken to speculate that *kh₂m was informed by *h₂m̥bʰi. There are at least two problems. First, neither Latin ambi- (“both”), Ancient Greek ἀμφί (amphí, “around, about”), Sanskrit अभि (abhi, “against, about”) match the comparanda synchronically. Second, the velar would remain unexplained and if **h₂m- could be isolated, the derivation of *h₂m̥bʰi might require a convergent alternative. The velar seems reminiscent of a certain prefix, mostly from a Latin and Germanic perspective. We'd expect PGem *huam-, *hum-, -(b/f)- (cp. *humpaz (“hip, height”), from Proto-Indo-European *kumb- (“curved”), cf. hump, but see also humpeln (to limp), hampeln (to act out), also (he)r-um-hampeln, umher hampeln; cp. perhaps OHG hamf (mutilated, lame) with Pokorny from *kamp-, *kam-? [apud Köhler], but see also Kampf, Kämpfer from campus, thus 'veteran', besides Hänfling). Albeit idle speculation, I don't expect new solutions to those problems, what with an internal derivation for *kóm and comparisons to *G-, or that Kloekhorst gives Lycian Xñtawa "to rule" and other words for kingship from *Henti- (as though "front, forehead" > "head, king", if I remember correctly; cf. the semantics of *hansō) but *Hems- for ḫaššuš ("king") and no comparison to Hatuša, where nobody has considered *tewH- to date as far as I know. The pertinent questions: Am I wholy mistaken and the etymology is as certain as the ultimately terse wording pretends? Or is there room for doubt, as has been said that the truth is likely to remain obscure in etymology (unless you got a time machine lying around)? And what does this mean for the user, should it be a given that wikipedia is a good first address but never the final word? I mean, there are many people who have, seemingly, elected to take any outflow of the theory for granted, and I fail to see the difference with editors and scholars, sometimes. Certainly there are scholars with new and old ideas around. What more can be said about campus? ApisAzuli (talk) 15:36, 22 October 2021 (UTC) Edited ApisAzuli (talk) 15:36, 22 October 2021 (UTC)[reply] RFV of the etymology where the Greek derivation is concerned. Sure, you can find older one-off etymologies out there to support this, but this is not a consensus derivation. Seems like a dated attempt to tie -iscus to Greek despite the fact the way the suffix is used in Latin is clearly inconsistent with how it's used in Greek, which forms diminutive nouns, not adjectives meaning "of, relating to, similar to, like". Also, this is Late Latin. Latin usage matches Germanic usage exactly. Leasnam (talk) 15:58, 22 October 2021 (UTC)[reply] Schelde, Scheldt, Scaldis[edit] Does anybody have reliable information about the etymology? The view suggested at Scaldis that they are all descendants from Latin, rather than the word having been borrowed into Latin, does not seem very plausible. ←₰-→ Lingo Bingo Dingo (talk) 17:26, 22 October 2021 (UTC)[reply] The name was likely borrowed into Latin, but from which language? Ancient Belgian? Not unlikely, but we do not know anything with certainty about the language spoken by the Belgae. And the Belgae may simply have borrowed the name from pre-Celtic Europeans. The Franks that later resettled in Gallia Belgica and became the dominant force as the Roman Empire lost its grip, such as Chlodio who held the lands around the upper Scheldt and is believed to be an ancestor of the Merovingian dynasty, were Romanized; they may have spoken the early Gallo-Romance of the local Picardians, and even if they still spoke Frankish among themselves they may well have adopted Romance names inherited from the names used by the Romans.  --Lambiam 19:45, 22 October 2021 (UTC)[reply] If it's about the river, according to Scheldt it's a Germanic word related to shoal and shallow, so something like "shallow water". Wakuran (talk) 13:06, 23 October 2021 (UTC)[reply] The Dutch Vroegmiddelnederlands Woordenboek (Early Middle Dutch Dictionary) has: “possibly < Celtic skaldis”.[11] I think the reference Top.Wbk. is to: Maurits Gysseling (1960), Toponymisch woordenboek van België, Nederland, Luxemburg, Noord-Frankrijk en West-Duitsland (vóór 1226). However, a Celtic origin is not entirely compatible with the Nordwestblock theory espoused by Gysseling. Unfortunately, GBS affords no preview.  --Lambiam 06:19, 25 October 2021 (UTC)[reply] WP’s picture of choice for the mytho­lo­gi­cal crea­tu­re. Does lamium have anything to do with lamia? I had dilletantishly assumed it was somehow related to labia > Labiatae, until I saw the article here. Bonus question: Both ‘m’ and ‘b’ occur together in what might be the root of Lambiam. Does that have anything to do with it? 😀 ◅ SebastianHelm (talk) 17:35, 22 October 2021 (UTC)[reply] Aye, I also dilettantishly used to think it so, but even with lamia there is still the connection of maneating lips. The corolla of the plant resemble Λάμια. After all her name was also transferred to a fish (and an owl only according to L&S, not TLL, giving for this sense Isaiah 34:14, where the Hebrew bears לִילִית‎, the identification “owl” of which is baseless for Biblical Hebrew, it is the demon which is in Akkadian lilū, lilītu, a Sumerian loanword left for @Sartma to create, I reference CAL for convenience). The macron seems baseless even without the etymology, since the plant-name is only attested in Pliny’s Natural History, in antiquity’s remnants. Fay Freak (talk) 20:29, 22 October 2021 (UTC)[reply] What macron? I see none other than the two in “lilū, lilītu”, but what do these have to do with either the etymology of the terms in question or with Pliny? As for the resemblance, I find the resemblance between a mermaid and a seal more convincing. Yes, most Labiatae can be seen as resembling lips, but there's so much more to Lamia than just her lips. ◅ SebastianHelm (talk) 01:27, 23 October 2021 (UTC)[reply] The word is given with a macron on the a (lāmĭum) in the two dictionaries that we cite. Fay Freak edited to remove this after making the above note about the apparent lack of evidence for a long vowel (neither dictionary explains itself). I find Wiktionary's practice to use unmarked letters for short vowels in Latin a bit annoying, given how many obscure words have entries here: it makes it difficult to explicitly indicate uncertain vowels (macron-breves like ā̆, aside from looking awkward, can be interpreted as "short and long pronunciations are both known to have existed" rather than "it is unknown whether a short or long pronunciation existed").--Urszag (talk) 02:16, 23 October 2021 (UTC)[reply] Thanks for the explanation; that answers at least that one question. What you write about unmarked letters for short vowels sounds very reasonable; the way you prefer certainly has the advantage that we would only mark what we know – a clear, self evident logic. Why is the current practice different – has there been a conscious decision of the community about that? ◅ SebastianHelm (talk) 15:53, 23 October 2021 (UTC)[reply] @SebastianHelm: Well, from WT:About Latin the concensus is derived from common dictionary practices. I don't know of a concensus how to mark uncertain vowels, but I don't see that there's a need (here) because the premise rests on a false dichotomy. Vowels are automatically "short", ie. unmarked, unless otherwise indicated. So, if the uncertainty does not warrant a long vowel, it is automatically unmarked. Usage notes may be applied tacitly, if there be need. From what I found out about Greek (voted 2015) there is precedent: "to make the removal of macrons and/or breves by a human or a bot (for any reason other than that the information concerning vowel quantity conveyed by those macrons and/or breves be false or uninferrable) a bad edit." I have no opinion on the removed macron but I thought it deserves mention. ApisAzuli (talk) 20:30, 23 October 2021 (UTC)[reply] Treating vowels of unknown length as “automatically short” is just a convention. It may make sense to follow that convention in certain restricted circumstances, such as when a modern Latin speaker who uses a reconstructed pronunciation system needs to say a word with unknown vowel lengths. But the same convention is clearly inappropriate in other circumstances: e.g. for someone who is discussing or researching the etymology of a word, the difference between “short vowel length” and “unknown vowel length” is significant, and it’s not helpful to conflate them. Certainly, usage notes can be used to add information not shown in the transcription. But is it convenient to use usage notes as the sole means of marking uncertain vowel lengths? I think it is fairly inconvenient, and appears to not be working very well in practice, given the large number of entries for obscure proper nouns that currently lack any notes.--Urszag (talk) 23:31, 23 October 2021 (UTC)[reply] The first point you make is not restricted to modern Latin speakers, so there's a slippery sloap and you would possibly mark up some breves that should be uncertain, too, catch-22. ApisAzuli (talk) 13:04, 24 October 2021 (UTC)[reply] Isn't the newly added etymology for lamium a bit fanciful, even when looked at asquint?  --Lambiam 12:42, 23 October 2021 (UTC)[reply] Well, yeah. Looking asquint at anything could produce fanciful results, expecially when your brain is equally half-functioning due to lack of rest or various substances. Wakuran (talk) 13:05, 23 October 2021 (UTC)[reply] Since there are no sources, I would revert it, at least as long as there still are unanswered questions about that personal fancy. But I know too little about either the topic or the etiquette here to interfere with experienced editors. ◅ SebastianHelm (talk) 15:53, 23 October 2021 (UTC)[reply] @SebastianHelm: No, you just can’t read, again. A reference was added, how could it be otherwise, into the reference section into the same edit which added the etymology; which is according to the etiquette here: that footnotes are not always given, in opposition to Wikipedia you come from. What you call personal fancy is communis opinio, another mistake of you: to take over fanciful classifications of other people to be in the group, which was cheap. It’s only my formulation that has been quirky, the gist is the comparison of the lamia creature, of which you don’t know much how it looked, to the plant. Fay Freak (talk) 17:03, 23 October 2021 (UTC)[reply] I have no access to that source. Elsewhere I find: The name Lamium was used by ancient Romans and is derived from the Greek lamia, a kind of flatfish, in reference to the flowers resembling the throat of that fish.[12] I wonder what they were smoking – the question is which for which sense of polysemous lamia these ancient Romans fancied a resemblance, but I doubt is was with the fierceful gullet of the turbot. Another source has this: Old Pliny probably had the myth of the child-eating wraith on his mind when he described a flower with pouched petals that resembled a gullet (lamium).[13] That is more like it, but note the not entirely meaningless modality qualification “probably”. Gaffiot glosses Latin lamia as a vampire bugbear, not specifically a witch. LSJ has lower-case λάμια as “a fierce shark”.  --Lambiam 14:24, 24 October 2021 (UTC)[reply] But you man see that it is a bare common view. @Akletos has made it misleading again by writing as though the link was particular to Ernout/Meillet. In my writing I intentionally did not even specify which sense of lamia was at play, but the idea of exterior similarity was mentioned—now it has become POV, trying to stress how dodgy the etymologies are, even though the unclearness largely be an effect of us not even knowing the exact pictures Romans had in mind of lamiae either. Fay Freak (talk) 15:08, 24 October 2021 (UTC)[reply] A “common” view is not necessarily a correct view. It is unlikely, to say the least, that Pliny invented a name for the plant; he simply used the name by which it was already commonly known, possibly for many centuries, even before the inception of Rome’s Graecophilia. We can only guess at its etymology. Any relation between that name and that of some wraith or beast known as lamia, be it mythological or ichthyological, is purely speculative.  --Lambiam 06:54, 25 October 2021 (UTC)[reply] RFV of the etymology. An IP posted a comment at Category talk:English terms derived from the Proto-Indo-European root *dʰewh₂- pointing out that this and down refer to "Proto-Celtic *dūnom (stronghold, rampart), from Proto-Indo-European *dʰuHnom (enclosure), from *dʰewh₂- (to finish, come full circle)", so should not be in the same category as those from Proto-Indo-European *dʰewh₂- (dust; smoke, haze). The "finish, come full circle" root was added in this 2015 edit by @GuitarDudeness to down and copied to dune by @Inqilābī a couple of years ago. I just noticed that this was discussed a few years back at Reconstruction talk:Proto-Celtic/dūnom, but inconclusively. @Mahagaja: any suggestions on what to do with the category and the etymologies on those two entries? Chuck Entz (talk) 18:05, 23 October 2021 (UTC)[reply] English town is said to come from from Proto-Indo-European *dewh₂- (to finish, come full circle). I doubt that dune and town are cognates.  --Lambiam 13:20, 24 October 2021 (UTC)[reply] I doubt that as well, but Zaun is linked to town, too, and we see placenames like (Corn)wall, (Heiligen) Wall (maybe not cognate, but see Wall (mound, rampart)) and I heard it said that Angeln was protected by a rampart. We also have Burg and Berg connected in that sense, perhaps Wehr and *wers-, etc. etc. And there is a specious descendent"to conceal, hide" as well. I only doubt that these can be explained from the root mist, smoke or fog, but note the conspicious comparison of *wers- (mountain) and *gwer- (to rise), if I got that correct. Sand dune on the other hand is a specialized term and I wonder what it would have meant in Old High German, where there none. The descendents "*tuna, duna" can't be right for all I know. The root "to finish" is rather reminiscent of done did, *dheh1-, possibly from locative *dhe-. What I really don't get is down feathers. Suppose it is a loan from well endowed due to Hally Hansen's anoraks. ApisAzuli (talk) 14:58, 24 October 2021 (UTC)[reply] The wall in Cornwall comes from Old English wealh (foreign) (compare walnut). Leasnam (talk) 15:46, 24 October 2021 (UTC)[reply] Let me put it this way. It seems somewhat unlikely that there are two different PIE roots, *dʰewh₂- and *dewh₂-, that both happen to mean “to finish, come full circle” – a sense currently not given at either entry.  --Lambiam 07:01, 25 October 2021 (UTC)[reply] if'n#Etymology 2[edit] Any possibility that this originated as if even? That's what I always thought it was, anyway. PseudoSkull (talk) 17:06, 24 October 2021 (UTC)[reply] I've certainly read "even <condition>" where I'd absolutely expect "even if" and always dismissed it as mistake. Online I can't tell well if those were scotch or else, say, Indian English. ApisAzuli (talk) 11:08, 25 October 2021 (UTC)[reply] RFV of the second part after "an alternative theory". I just added the first part which I found in the Duden [14]. Grimm also brings forward this theory though narrates it in less detail (the part with Schiff meaning Gefäß/Nachtgeschirr is missing). The second theory raised suspicion with me however; it has been added by @Sarefo in 2005 (!) and has been left untouched since. --Fytcha (talk) 19:34, 24 October 2021 (UTC)[reply] While we're at it, how can I properly refer to the Grimm dictionary on Wiktionary? Fytcha (talk) 19:38, 24 October 2021 (UTC)[reply] @Fytcha: {{R:Grimm}}. Just search Category:langname reference templates and in the search function Template:anything to find any reference template. Fay Freak (talk) 20:13, 24 October 2021 (UTC)[reply] References without citation[edit] From a previous topic I became aware that Wiktionary apparently uses the term “references” differently from the way it is used in academics. There, to quote Reference#Scholarship, “A reference section contains only those works indeed cited in the main text of a work.” Here, by contrast, it appears accepted that so-called “References” sections are used without accompanying citation – rather like what commonly is called a “bibliographical” section. Deviating from the standard might be motivated by the fact that “entries” here tend to be shorter than articles elsewhere. Another argument may be that references are already very rare here (it took me 63 clicks on "Random entry" until I found one that even has a “References” section.) so that people rather have something resembling a reference than nothing at all. But since it is hardly more work to insert a reference with a citation (the editor even has a dedicated button for that!) these arguments can't outweigh the cost of deviating from a tried and proven standard. So, is that really how Wiktionary uses the term “references” – and why? ◅ SebastianHelm (talk) 12:27, 25 October 2021 (UTC)[reply] In some ill-defined sense we are "supposed to" use References for explicit citations and Further reading for supporting information not explicitly cited. Most editors don't do that. Vox Sciurorum (talk) 12:57, 25 October 2021 (UTC)[reply] I don’t really distinguish “references” and “further reading”, as you might have seen, others don’t understand the difference either. These sections are only the remnants of a larger number of sections: like, before, we had “external links”, and that got voted away. Sometimes they are just combined so we do not have a section for but one entry (which is noisy and impedes reading through the actual content). You can’t really compare to a larger scholarly treatise having a “main text”, as we don’t even have that much text in an entry; you see that. We do not generally “insert a reference with a citation”, as you call it, because what we say anywhere does not really depend on whether somebody said it in his reference work. Therefore most entries have no references whatsoever because editors add a word when they had encountered it in use, not because it was in references, they emphasize being a secondary source and the use-mention distinction (different from German Wiktionary); from the primary material itself then the etymology is judged—it may or may not exactly correspond to the content of a reference (w:WP:SYNTHESIS has no equivalent here, if two references say A and B we may opt for C). As Lambiam said above “a ‘common’ view is not necessarily a correct view” so the grounds why something may be correct we strive to make discernible. It works, unlike many contentious Wikipedia topics, because for language one does not need too much unusual reason to reach unanimity. Fay Freak (talk) 13:37, 25 October 2021 (UTC)[reply] Would Sanskrit राजति (rājati) be from Proto-Indo-European *h₃réǵeti? It seems fitting. I know the Sanskrit verb ultimately derives from the PIE root *h₃reǵ- but I'm curious as to whether the Sanskrit verb comes from the specific PIE verb I mentioned. Thanks, Prahlad balaji (talk) 19:41, 25 October 2021 (UTC)[reply] It can't come directly from *h₃réǵeti because of the long ā in the first syllable. (The direct descendant of *h₃réǵeti would be rájati with a short a.) It's probably been influenced by राजन् (rājan) or some other form with ā. —Mahāgaja · talk 20:16, 25 October 2021 (UTC)[reply]
What to Know Before You Refer A genetic specialist can provide assistance through a variety of ways—a formal or informal consultation, a genetic counseling session, or a genetic evaluation. A genetic specialist can provide a more accurate assessment of the risk or confirm the diagnosis of a genetic disease. A diagnosis may be made primarily through genetic testing, or a combination of testing, clinical examination, and family history. Genetic specialists are able to provide management options or referrals to specialists as needed; provide advice to primary care practitioners about a genetic condition, prognosis, treatment and long-term outcome; and recommend educational materials to patients and families. The referring professional should discuss expectations and possible outcomes of the genetic evaluation before making the referral. The referring professional should be aware of what is involved in such a consultation and the potential diagnostic yields and should share this information with the patient/family.  (Schafer et al, 2013 Gen in Med: 15 399-407) Genetic Alliance; The New England Public Health Genetics Education Collaborative. Understanding Genetics: A New England Guide for Patients and Health Professionals. Washington (DC): Genetic Alliance; 2010 Feb 17. Chapter 6, Indications for a Genetic Referral. Available from: https://www.ncbi.nlm.nih.gov/books/NBK132173/
Endocytosis and exocytosis are the processes by which cells relocate materials right into or out of the cell that room too huge to straight pass with the lipid double layer of the cell membrane. Big molecules, microorganisms and waste products are few of the substances relocated through the cabinet membrane via exocytosis and endocytosis. Why is mass transport vital for cells? Cell membranes are semi-permeable, meaning they permit certain little molecules and also ions to passively diffuse v them. Other small molecules are able to do their means into or out of the cell through carrier proteins or channels.But over there are materials that room too huge to pass v the cabinet membrane utilizing these methods. There space times when a cabinet will should engulf a bacterium or relax a hormone. That is during these instances that mass transport mechanisms space needed.Endocytosis and exocytosis space the bulk transport mechanisms used in eukaryotes. Together these transport processes require energy, castle are well-known as active transport processes. You are watching: Which of these vesicular transport methods expels material from the cell? Vesicle duty in endocytosis and exocytosis During mass transport, bigger substances or huge packages of little molecules are transported with the cell membrane, additionally known together the plasma membrane, by way of vesiclesfont-family:"Calibri",sans-serif;mso-ascii-theme-font:minor-latin;mso-fareast-font-family:Calibri;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:Arial;mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-GB;mso-fareast-language:EN-US;mso-bidi-language:AR-SA">–think of motor as little membrane bag that can fuse with the cell membrane.Cell membranes are comprised of a lipid bilayer. The walls of vesicles are also made increase of a lipid bilayer, which is why lock are qualified of fusing v the cabinet membrane. This combination between vesicles and also the plasma membrane facilitates mass transport both into and out that the cell. What is endocytosis? Endocytosis an interpretation and purposes Endocytosis is the process by i beg your pardon cells take it in building materials from outside of the cabinet by engulfing castle in a vesicle. This can encompass things like nutrients to support the cabinet or pathogens the immune cells engulf and also destroy.Endocytosis occurs as soon as a part of the cabinet membrane crease in ~ above itself, encircling extracellular fluid and various molecule or microorganisms. The resulting vesicle division off and is transported in ~ the cell.Endocytosis serves many purposes, including: Taking in nutrients for moving growth, function and repair: cells need products like proteins and lipids come function. Capturing pathogens or other unknown building material that may endanger the organism: When pathogens favor bacteria are identified by the immune system, they room engulfed by immune cells to it is in destroyed. Disposing of old or damaged cells: Cells must be safe disposed of when they stop functioning correctly to prevent damages to other cells. These cells are removed through endocytosis. Types that endocytosis There are two species of endocytosis: phagocytosis and pinocytosis.PhagocytosisPhagocytosis, likewise known as cell eating, is the procedure by which cell internalize large particles or cells, like damaged cells and also bacteria.Within the person body, and also in other mammals, phagocytosis is just how immune cell engulf and destroy dangerous microbe or toxicity compounds. Macrophages and also neutrophils, species of white blood cells, room the two major phagocytes. This white blood cells room responsible because that clearing out aged and also damaged cells, and disposing of infectious microorganisms.PinocytosisPinocytosis, also known together cell drinking, is common in plant and also animal cells. Throughout pinocytosis, the cell absorbs substances from the extracellular fluid that it requirements to function. These encompass things prefer water and nutrients.Receptor-mediated endocytosis is a specialized type of pinocytosis. Throughout receptor-mediated endocytosis, macromolecules bind to receptors along the surface of the cell’s plasma membrane. Cholesterol uptake is an example of receptor-mediated endocytosis. The procedures of endocytosis The adhering to is an synopsis of the straightforward steps of the two species of endocytosis. Two species of endocytosis: phagocytosis and pinocytosis. A fragment or substance binding to receptor on the cell’s surface, stimulating the release of pseudopodia (extensions that the plasma membrane filled through cytoplasm).Pseudopodia surround the object until their membrane fuse, forming a phagocytic vesicle. The phagocytic vesicle pinches turn off from the cabinet membrane, start the cell.The phagocytic vesicle fuses with lysosomes, which recycle or damage the vesicle’s contents. Molecules tie to receptors situated along the surface ar of the cellular membrane.The plasma membrane crease in, creating a pinocytic vesicle that has the molecules and the extracellular fluid. The pinocytic vesicle detaches indigenous the cell membrane inside the cell. The vesicle fuses with early on endosomes where the contents found within space sorted. Endocytosis example Macrophages are a form of white blood cell that play a central role in protecting mammals versus pathogens choose bacteria and also viruses. When a macrophage come into call with a virus, to speak a cold virus in the bloodstream, it have the right to bind come the virus’s cell surface.Next, the macrophage will kind a vesicle roughly the virus, totally ingesting it. The vesicle then travels to the cytosol and also fuses v the lysosome, wherein the virus is broken down. Part viruses replicate by “tricking” hold cells into endocytosing them, at which point the cell is hijacked by the virus and is instructed come replicate the virus genome and capsid. What is exocytosis? Exocytosis an interpretation and purposes Exocytosis is the procedure by which cell move materials from in ~ the cell into the extracellular fluid. Exocytosis occurs once a vesicle fuses through the plasma membrane, allowing its components to it is in released outside the cell.Exocytosis serves the complying with purposes: Removing toxin or waste assets from the cell interior: Cells create waste or toxins that have to be eliminated from the cell to keep homeostasis. Because that instance, in aerobic respiration, cells produce the waste commodities carbon dioxide and water throughout ATP formation. Carbon dioxide and also water are removed from this cells via exocytosis. Facilitating cellular communication: Cells create signaling molecules prefer hormones and neurotransmitters. Lock are yielded to various other cells complying with their relax from the cell through exocytosis. Facilitating to move membrane growth, repair, signaling and migration: once cells absorb materials from outside the cell throughout endocytosis, they usage lipids and proteins from the plasma membrane to develop vesicles. When details exocytotic vesicles fuse with the to move membrane, castle replenish the cell membrane with these materials. Types of exocytosis Regulated Exocytosis Most exocytotic vesicles save substances developed within the endoplasmic reticulum because that use in other places in the body, such as neurotransmitters or hormones. These molecules are then packaged in ~ a class of membrane referred to as a vesicle.Once excreted from the absorbent reticulum, these vesicles are transported come the Golgi apparatus (also known as the Golgi complex) for further modification. The molecules are then packaged once again in a vesicle that renders its method to the plasma membrane.The relax of these molecules from the cell is termed regulation exocytosis because the expulsion of the materials is controlled, or regulated, by extracellular signals that reason membrane depolarization.Constitutive Exocytosis Constitutive exocytosis, in contrast, no require any type of extracellular signals. The bulk of molecule traveling to the plasma membrane do so utilizing this pathway.After exocytosis, some exocytotic vesicles are integrated into the plasma membrane (full vesicle fusion), while others return to the inner of the cabinet after their components have been released (this is termed the “kiss-and-run” pathway). Others continue to be docked come the membrane, whereby they deserve to be offered multiple times (the “kiss-and-stay” pathway). Exocytosis requires the i of a vesicle indigenous the absorbent reticulum or Golgi apparatus, v the cytoplasm come the cabinet membrane, where it fuses and releases that contents. The procedures of exocytosis Below is an summary of the an easy steps that exocytosis. A vesicle is formed, generally within the absorbent reticulum and also the Golgi device or at an early stage endosomes. The vesicle travel to the cabinet membrane.The vesicle fuses to the plasma membrane, during which the two bilayers merge.The vesicle’s contents are released into the extracellular space.The vesicle one of two people fuses through or separates from the cell membrane. Exocytosis example Let’s take the macrophage the we questioned in ours endocytosis example. When the white blood cell has engulfed a foreign microorganism eliminate it, certain parts of the virus are no much longer needed. The macrophage gets rid that this waste product through exocytosis, throughout which vesicles carry out the unwanted pathogen material. Endocytosis vs exocytosis: a comparison DefinitionThe procedure of taking a fragment or substance from outside of the cell and transferring it within the cell making use of a vesicle.The procedure of taking a substance or bit from inside of the cell and also transferring the to external the cell using a vesicle. FunctionAbsorbing nutrients for moving functionEliminating pathogensDisposing of old/damaged cellsRemoving toxins or rubbish productsRepairing the cell membraneFacilitating communication between cells Regulated exocytosisConstitutive exocytosis ExamplesWhite blood cell engulfing a virus and eliminating it. See more: How Long Do Pancakes Last In The Fridge ? How To Store Pancakes Releasing a neurotransmitter for cellular communication.
Guide on How Braces Works in Teeth Straightening It has been noted that one-third of orthodontic patients that are in the United States is above the age of 18 years meaning that when it comes to straitening teeth is done irrespective of age. The need to have straight teeth is t enhance easy cleaning and also to improve on your look. However, it can be risks of tooth decay that can be contributed by misalignments of teeth. You should therefore consider having straight teeth all the time and this needs you to have dental braces. Here you will get to be well enlightened on various issues pertaining to braces and teeth straightening treatment. Know how the braces work in correcting teeth alignment. The braces will ensure that pressure is exerted between the teeth and bones that will be supporting them. The force that is exerted will result in breakdown creating space for each tooth as they move to their desirable position. The good thing is that with time all the teeth will be aligned well and will straight by the end you are completing the treatment. The longevity of misalignment will depend on the severity of the condition the patient is having. Be aware of the major components of traditional dental braces. Get to learn that archwires and metal brackets are primarily used during traditional dental braces. The process of tilting will be highly used here so that it can make it possible for the teeth to move to its right position well. Because there are loose elastic bands that can be realized after every month, and that is why it is essential to have traditional braces adjustment. You are encouraged to be aware of self-litigating vs. traditional braces. In most cases, both traditional braces and self-litigating braces seem to work the same. The brackets that are used in self-litigating have a self-sliding gate to make the wire be in the right place. The trips that you will make to see the orthodontist are less since there are no risks and emergencies that can arise. Always let your professional orthodontist guide you in determining what is the best type of treatment that you can select. You are encouraged to start dazzling everyone with the smile that you will be having. You now know how braces work to enhance alignment to achieve correct teeth where pressure and force are highly used. Therefore, the earlier the better for you to get the treatment and have straight teeth for your healthier smile.
We name the 26 Australian frogs at greatest risk of extinction by 2040 — and how to save them Spotted tree frog. Michael Williams/Its A Wildlife Photography, Author provided Graeme Gillespie, The University of Melbourne; Conrad Hoskin, James Cook University; Hayley Geyle, Charles Darwin University; Jaana Dielenberg, Charles Darwin University; Nicola Mitchell, The University of Western Australia, and Stephen Garnett, Charles Darwin UniversityAustralia is home to more than 240 frog species, most of which occur nowhere else. Unfortunately, some frogs are beyond help, with four Australian species officially listed as extinct. This includes two remarkable species of gastric-brooding frog. To reproduce, gastric-brooding frogs swallowed their fertilised eggs, and later regurgitated tiny baby frogs. Their reproduction was unique in the animal kingdom, and now they are gone. Our new study published today, identified the 26 Australian frogs at greatest risk, the likelihood of their extinctions by 2040 and the steps needed to save them. Tragically, we have identified an additional three frog species that are very likely to be extinct. Another four species on our list are still surviving, but not likely to make it to 2040 without help. #1 The northern gastric-brooding frog (Rheobatrachus vitellinus) is likely already extinct, primarily due to chytrid fungus disease. Hal Cogger The 26 most imperilled frogs The striking yellow-spotted tree frog (in southeast Australia), the northern tinker frog and the mountain mist frog (both in Far North Queensland) are not yet officially listed as extinct – but are very likely to be so. We estimated there is a greater than 90% chance they are already extinct. The locations of the top 26 Australian frogs at risk of extinction. ** Species likely to be recently extinct. * Species more likely than not to become extinct by 2040 unless there is action. Jaana Dielenberg/Threatened Species Recovery Hub The next four most imperilled species are hanging on in the wild by their little frog fingers: the southern corroboree frog and Baw Baw frog in the Australian Alps, and the Kroombit tinker frog and armoured mist frog in Queensland’s rainforests. The southern corroboree frog, for example, was formerly found throughout Kosciuszko National Park in the Snowy Mountains. But today, there’s only one small wild population known to exist, due largely to an introduced disease. Without action it is more likely than not (66% chance) the southern corroboree frog will become extinct by 2040. #6 The southern corroboree frog (Pseudophryne corroboree) is close to extinction. David Hunter/DPIE NSW #3 The yellow-spotted tree frog (Litoria castanea) is likely extinct. It was once common throughout the New England Tableland and Southern Tablelands region in NSW, and the ACT. It is sensitive to chytrid fungus disease and also impacted by climate change, habitat loss and invasive fish. David Hunter/DPIE NSW What are we up against? Species are suffering from a range of threats. But for our most recent extinctions and those now at greatest risk, the biggest cause of declines is the amphibian chytrid fungus disease. This introduced fungus is thought to have arrived in Australia in the 1970s and has taken a heavy toll on susceptible species ever since. Cool wet environments, such as rainforest-topped mountains in Queensland where frog diversity is particularly high, favour the pathogen. The fungus feeds on the keratin in frogs’ skin — a major organ that plays a vital role in regulating moisture, exchanging respiratory gases, immunity, and producing sunscreen-like substances and chemicals to deter predators. Dead frog Chrytrid disease killed this green-eyed tree frog. Robert Puschendorf #8 Armoured mist frog (Litoria lorica) populations have been decimated by chytrid fungus disease. It has been lost throughout former mountainous rainforest habitats where the fungus thrives. Without effective action, it’s likely to be extinct within 20 years. Conrad Hoskin Another major emerging threat is climate change, which heats and dries out moist habitats. It’s affecting 19 of the imperilled species we identified, such as the white-bellied frog in Western Australia, which develops tadpoles in little depressions in waterlogged soil. Climate change is also increasing the frequency, extent and intensity of fires, which have impacted half (13) of the identified species in recent years. The Black Summer fires ravaged swathes of habitat where fires should rarely occur, such as mossy alpine wetlands inhabited by the northern corroboree frog. Invasive species impact ten frog species. For the spotted tree frog in southern Australia, introduced fish such as brown and rainbow trout are the main problem, as they’re aggressive predators of tadpoles. In northern Australia, feral pigs often wreak havoc on delicate habitats. #15 The Kuranda tree frog (Litoria myola) is found in a very small area near Cairns. Its primary threat is loss and degradation of habitat due to development. Conrad Hoskin #20 The white-bellied frog (Geocrinia alba) is the Western Australian frog at greatest risk of extinction. The tadpoles of this tiny terrestrial breeding frog rely on wet soil to develop. Reduced rainfall is contributing to declines. Emily Hoffmann So what can we do about it? We identified the key actions that can feasibly be implemented in time to save these species. This includes finding potential refuge sites from chytrid and from climate change, reducing bushfire risks and reducing impacts of introduced species. But for many species, these actions alone aren’t enough. Given the perilous state of some species in the wild, captive conservation breeding programs are also needed. But they cannot be the end goal. #11 A northern corroboree frog in the captive breeding program run by the ACT Government. Peter Taylor/Threatened Species Recovery Hub Captive breeding programs can not only establish insurance populations, they can also help a species persist in the wild by supplying frogs to establish populations at new suitable sites. Boosting numbers in existing wild populations with captive bred frogs improves their chance of survival. Not only are there more frogs, but also greater genetic diversity. This means the frogs have a better chance of adapting to new conditions, including climate change and emerging diseases. Our knowledge of how to breed frogs in captivity has improved dramatically in recent decades, but we need to invest in doing this for more frog species. Please save these frogs: The 26 Australian species at greatest risk of extinction. Finding and creating wild refuges Another vital way to help threatened frogs persist in the wild is by protecting, creating and expanding natural refuge areas. Refuges are places where major threats are eliminated or reduced enough to allow a population to survive long term. For the spotted-tree frog, work is underway to prevent the destruction of frog breeding habitat by deer, and to prevent tadpoles being eaten by introduced predatory fish species. These actions will also help many other frog species as well. The chytrid fungus can’t be controlled, but fortunately it does not thrive in all environments. For example, in the warmer parts of species’ range, pathogen virulence may be lower and frog resilience may be higher. Chytrid fungus completely wiped out the armoured mist frog from its cool, wet heartland in the uplands of the Daintree Rainforest. But, a small population was found surviving at a warmer, more open site where the chytrid fungus is less virulent. Conservation for this species now focuses on these warmer sites. This strategy is now being used to identify potential refuges from chytrid for other frog species, such as the northern corroboree frog. Dr Graeme Gillespie during a survey for the spotted-tree frog. Michael Williams/Its A Wildlife Photography No time to lose We missed the window to save the gastric-brooding frogs, but we should heed their cautionary tale. We are on the cusp of losing many more unique species. Decline can happen so rapidly that, for many species, there is no time to lose. Apart from the unknown ecological consequences of their extinctions, the intrinsic value of these frogs means their losses will diminish our natural legacy. In raising awareness of these species we hope we will spark new action to save them. Unfortunately, despite persisting and evolving independently for millions of years, some species can now no longer survive without our help. The Conversation Graeme Gillespie, Honorary Research Fellow, The University of Melbourne; Conrad Hoskin, Lecturer/ABRS Postdoctoral Fellow, James Cook University; Hayley Geyle, Research Assistant, Charles Darwin University; Jaana Dielenberg, University Fellow, Charles Darwin University; Nicola Mitchell, Associate Professor in Conservation Physiology, The University of Western Australia, and Stephen Garnett, Professor of Conservation and Sustainable Livelihoods, Charles Darwin University Dead, shrivelled frogs are unexpectedly turning up across eastern Australia. We need your help to find out why Green Tree Frog Jodi Rowley, Author provided Jodi Rowley, Australian Museum and Karrie Rose, University of SydneyOver the past few weeks, we’ve received a flurry of emails from concerned people who’ve seen sick and dead frogs across eastern Victoria, New South Wales and Queensland. One person wrote: About a month ago, I noticed the Green Tree Frogs living around our home showing signs of lethargy & ill health. I was devastated to find about 7 of them dead. Another wrote: We previously had a very healthy population of green tree frogs and a couple of months ago I noticed a frog that had turned brown. I then noticed more of them and have found numerous dead frogs around our property. And another said she’d seen so many dead frogs on her daily runs she had to “seriously wonder how many more are there”. So what’s going on? The short answer is: we don’t really know. How many frogs have died and why is a mystery, and we’re relying on people across Australia to help us solve it. Why are frogs important? Frogs are an integral part of healthy Australian ecosystems. While they are usually small and unseen, they’re an important thread in the food web, and a kind of environmental glue that keeps ecosystems functioning. Healthy frog populations are usually a good indication of a healthy environment. The stony creek frog is one of the species hit by this mysterious outbreak. Jodi Rowley, Author provided They eat vast amounts of invertebrates, including pest species, and they’re a fundamental food source for a wide variety of other wildlife, including birds, mammals and reptiles. Tadpoles fill our creeks and dams, helping keep algae and mosquito larvae under control while they too become food for fish and other wildlife. But many of Australia’s frog populations are imperilled from multiple, compounding threats, such as habitat loss and modification, climate change, invasive plants, animals and diseases. Although we’re fortunate to have at least 242 native frog species in Australia, 35 are considered threatened with extinction. At least four are considered extinct: the southern and northern gastric-brooding frogs (Rheobatrachus silus and Rheobatrachus vitellinus), the sharp-snouted day frog (Taudactylus acutirostris) and the southern day frog (Taudactylus diurnus). A truly unusual outbreak In most circumstances, it’s rare to see a dead frog. Most frogs are secretive in nature and, when they die, they decompose rapidly. So the growing reports of dead and dying frogs from across eastern Australia over the last few months are surprising, to say the least. While the first cold snap of each year can be accompanied by a few localised frog deaths, this outbreak has affected more animals over a greater range than previously encountered. This is truly an unusual amphibian mass mortality event. In this outbreak, frogs appear to be either darker or lighter than normal, slow, out in the daytime (they’re usually nocturnal), and are thin. Some frogs have red bellies, red feet, and excessive sloughed skin. A browned, shrivelled green tree frog A browned, shrivelled green tree frog (Litoria caerulea) Suzanne Mcgovern, Author provided The iconic green tree frog (Litoria caeulea) seems hardest hit in this event, with the often apple-green and plump frogs turning brown and shrivelled. This frog is widespread and generally rather common. In fact, it’s the ninth most commonly recorded frog in the national citizen science project, FrogID. But it has disappeared from parts of its former range. Other species reported as being among the sick and dying include Peron’s tree frog (Litoria peronii), the Stony Creek frog (Litoria lesueuri), and green stream frog (Litoria phyllochroa). These are all relatively common and widespread species, which is likely why they have been found in and around our gardens. We simply don’t know the true impacts of this event on Australia’s frog species, particularly those that are rare, cryptic or living in remote places. Well over 100 species of frog live within the geographic range of this outbreak. Dozens of these are considered threatened, including the booroolong Frog (Litoria booroolongensis) and the giant barred frog (Mixophyes iteratus). The giant barred frog is a threatened species that lives in the geographic range of this outbreak. Jodi Rowley, Author provided So what might be going on? Amphibians are susceptible to environmental toxins and a wide range of parasitic, bacterial, viral and fungal pathogens. Frogs globally have been battling it out with a pandemic of their own for decades — a potentially deadly fungus often called amphibian chytrid fungus. This fungus attacks the skin, which frogs use to breathe, drink, and control electrolytes important for the heart to function. It’s also responsible for causing population declines in more than 500 amphibian species around the world, and 50 extinctions. For example, in Australia the bright yellow and black southern corroboree frog (Pseudophryne corroboree) is just hanging on in the wild, thanks only to intensive management and captive breeding. The teeny tiny southern corroborree frogs have been hit hard by the chytrid fungus. Jodi Rowley, Author provided Curiously, some other frog species appear more tolerant to the amphibian chytrid fungus than others. Many now common frogs seem able to live with the fungus, such as the near-ubiquitous Australian common eastern froglet (Crinia signifera). But if frogs have had this fungus affecting them for decades, why are we seeing so many dead frogs now? Read more: A deadly fungus threatens to wipe out 100 frog species – here’s how it can be stopped Well, disease is the outcome of a battle between a pathogen (in this case a fungus), a host (in this case the frog) and the environment. The fungus doesn’t do well in warm, dry conditions. So during summer, frogs are more likely to have the upper hand. In winter, the tables turn. As the frog’s immune system slows, the fungus may be able to take hold. Of course, the amphibian chytrid fungus is just one possible culprit. Other less well-known diseases affect frogs. The near-ubiquitous Austrlaian common eastern froglet is one species that seems able to live with the devastating chytrid fungus. Jodi Rowley, Author provided To date, the Australian Registry of Wildlife Health has confirmed the presence of the amphibian chytrid fungus in a very small number of sick frogs they’ve examined from the recent outbreak. However, other diseases — such as ranavirus, myxosporean parasites and trypanosome parasites — have also been responsible for native frog mass mortality events in Australia. It’s also possible a novel or exotic pathogen could be behind this. So the Australian Registry of Wildlife Health is working with the Australian Museum, government biosecurity and environment agencies as part of the investigation. Here’s how you can help While we suspect a combination of the amphibian chytrid fungus and the chilly temperatures, we simply don’t know what factors may be contributing to the outbreak. Why green tree frogs are dying en masse is still a mystery. Sophie Hendry, Author provided We also aren’t sure how widespread it is, what impact it will have on our frog populations, or how long it will last. While the temperatures stay low, we suspect our frogs will continue to succumb. If we don’t investigate quickly, we will lose the opportunity to achieve a diagnosis and understand what has transpired. We need your help to solve this mystery. Please send any reports of sick or dead frogs (and if possible, photos) to us, via the national citizen science project FrogID, or email [email protected]. Read more: Clicks, bonks and dripping taps: listen to the calls of 6 frogs out and about this summer The Conversation Jodi Rowley, Curator, Amphibian & Reptile Conservation Biology, UNSW, Australian Museum and Karrie Rose, Australian Registry of Wildlife Health – Taronga Conservation Society Australia, University of Sydney Amphibians: Only About Half are Known to Science The article below suggests that about half of the world’s amphibians are yet to be made known to science and that they could become extinct before they are. It is a very interesting article. For more visit:
Question: What Happens If Rabies Is Left Untreated? How long can rabies go untreated? Once the rabies virus reaches the spinal cord and brain, rabies is almost always fatal. However, the virus typically takes at least 10 days—usually 30 to 50 days—to reach the brain (how long depends on the bite’s location). During that interval, measures can be taken to stop the virus and help prevent death.. Can I take rabies vaccine after 3 days? It takes seven days to develop the required immunity after the vaccine is injected. Another anti-rabies serum or immunoglobulins should be given within 72 hours of the bite. This serum, available at medical stores, gives protection to the person for the first seven days. It is free in civic hospitals. Does soap and water kill rabies? How long is the rabies virus infectious after it is outside of the rabid animal? The rabies virus is a very fragile virus. As soon as the saliva dries, the virus is no longer infectious. The virus is easily killed by soaps, detergents, bleach, alcohol and ultraviolet light. Can you get rabies from a scratch? What happens when rabies is not treated? Exposure to a rabid animal does not always result in rabies. If treatment is initiated promptly following a rabies exposure, rabies can be prevented. If a rabies exposure is not treated and a person develops clinical signs of rabies, the disease almost always results in death. Can you survive rabies without treatment? New research has shown that humans may be able to survive Rabies without vaccination or treatment after all. What are the stages of rabies? Clinical Manifestations Five general stages of rabies are recognized in humans: incubation, prodrome, acute neurologic period, coma, and death (or, very rarely, recovery) (Fig. 61-1). No specific antirabies agents are useful once clinical signs or symptoms develop. Why is rabies so scary? Death can be anywhere from two days to several weeks after symptoms first appear. The delayed onset, followed by rapid acceleration of symptoms, is one of the reasons why rabies is very scary. Once the symptoms begin, the virus has built up in the brain, and generally cannot be stopped. Is headache a symptom of rabies? The first symptoms of rabies may be very similar to those of the flu including general weakness or discomfort, fever, or headache. These symptoms may last for days. How many people survived rabies 2020? There are something like 8 to 10 people known to have survived rabies without receiving vaccine and rabies immune globulin,” he said. Rabies immune globulin is typically given along with the vaccine after exposure. Is dying from rabies painful? Rabies — the word probably brings to mind an enraged animal frothing at the mouth. An encounter with an infected animal can result in a painful, life-threatening condition. According to the World Health Organization , up to 59,000 people worldwide die from rabies every year. How long does rabies take to kill? What is the first sign of rabies in a human? The first symptoms of rabies can appear from a few days to more than a year after the bite happens. At first, there’s a tingling, prickling, or itching feeling around the bite area. A person also might have flu-like symptoms such as a fever, headache, muscle aches, loss of appetite, nausea, and tiredness. Can rabies be cured after symptoms? Once a rabies infection is established, there’s no effective treatment. Though a small number of people have survived rabies, the disease usually causes death. What is the incubation period of rabies? Symptoms. The incubation period for rabies is typically 2–3 months but may vary from 1 week to 1 year, dependent upon factors such as the location of virus entry and viral load. Where is rabies most common? Why is rabies not curable? So why is rabies so difficult to treat? Viral infections can usually be treated using anti-viral drugs, which inhibit virus development. Rabies virus uses a myriad of strategies to avoid the immune system and hide from antiviral drugs, even using the blood brain barrier to protect itself once it has entered the brain. What is the mortality rate of rabies? Rabies is a virus that attacks the central nervous system. It’s found only in mammals. Human cases of the virus are extremely rare in the United States, but if it’s not treated before symptoms appear, it’s deadly. Rabies has the highest mortality rate — 99.9% — of any disease on earth.
• Post author: Like any machine, solar modules have a “useful lifecycle”. Although it is a fantastic long-term investment for businesses, farms and homes, it’s essential to understand the lifespan of solar panels. In this blog, we will be discussing what happens with solar modules after 25 years and how to maximize their lifecycle. How Long Do Solar Energy Systems Last? Like other electronics, solar panels don’t produce power at 100% efficiency then stop working. In most cases, depending on the manufacturer, solar systems have 90% efficiency in the first ten years and then drop to 80% in the next 10-15 years. It makes their useful life about 25-30 years. Some energy systems survive for longer than that. For example, the world’s first modern solar panel is still producing power 60 years into its lifespan! Once the system’s useful life is over, they continue producing power. Still, depending on your energy and financial goals, you might want to replace them with panels that produce power at higher rates.  What is Solar Panel Degradation? All energy systems slowly degrade over time, producing less electricity from the same amount of sunlight. There are various reasons as to why this takes place. For example, weather conditions wear down the panels and have a negative impact.  Solar panels are made from solar cells, which are very sensitive. Modules need to be taken care of with utmost care, from the manufacturing process, until the installation and even in their upkeep. It means you should pick an installer that you trust to take care of your panels.  Solar modules after 25 years could have degraded because of the weather. As mentioned before, solar cells are susceptible. So, in extreme weather conditions in the United States, the panels can cause flexing in the panels. Although if you have picked quality panels installed by a certified team, it shouldn’t be a massive load on the degradation process.  The degradation can also happen from heat. For example, if you go solar in LA, the heat can lead to the degradation process over time. Thankfully, most solar panels have UV blockers on them that keep the degradation to a minimum. In these cases, there will only be a 1-3% degradation that only happens when the panels are first under the sun, and after that, the process will slow down by a lot. What does this mean? If you take care of your panels in the recommended way and have a highly certified team of installers, it should cut down on the degradation of your panels by a lot! A way to also know that the panels are of quality is by the warranty that comes with them. If it’s a warranty that covers the useful life of a solar system, you are in good hands. In the end, it is up to you if you’d like to replace your system with a new one for financial benefits or keep the same one. You can either use solar panel recycling and purchase a new one or keep your system running! Skip to content
April 07, 2021 Dealing With Earwax Earwax often gets a bad rap as people believe the gooey, yellow substance is synonymous with bad hygiene, but Mountainside Medical Group’s otolaryngologist-head and neck surgeon Mina Le, M.D., explains why earwax is actually healthy and debunks other common misconceptions around it. “Your ear canals are designed to be ‘self-cleaning,’” Dr. Le said. “Your body makes earwax to protect your ears and keep germs out. Whether you produce thin, flaky earwax or thick earwax depends on your genetics. Most people do not need to do anything to clean the insides of their ears.” While a normal amount of earwax is healthy and necessary to defend your body from germs and infection, excess earwax may indicate a problem. “Built-up earwax is called cerumen impaction,” Dr. Le said. “When earwax builds up so much that it blocks off your ear canal, it can reduce your hearing and create an uncomfortably full sensation or even pain. If this happens, you can administer carbamide peroxide (Debrox) drops to your ears. These are available over-the-counter to soften and possibly dissolve your earwax. Over-the-counter earwax irrigation kits are also safe to try.” If things progress, Dr. Le suggests an ENT specialist may be your best bet to finding relief. “Generally, the most effective method is to have an ENT specialist remove the wax,” Dr. Le said. “An ENT physician will magnify your ear canal with a microscope and remove your earwax with gentle suction (a vacuum) that does not hurt. Occasionally, different instruments such as a curette or pick will be used, if the earwax is thick and stuck.” For regular maintenance of your ears, Dr. Le warns against reaching for the Q-tips. “Despite their popularity, cotton swabs push earwax deeper, so they are responsible for causing many earwax blockages in the first place,” Dr. Le said. “They can break off inside the ear, and they can puncture the eardrum. Regular use of cotton swabs also leads to a vicious cycle of ear itching by irritating the delicate skin of the ear canal.” In most instances, earwax can be managed at home, but if you’re noticing an unusual buildup of earwax or pressure, contact an ENT to have your ears cleaned and check for any underlying issues. Mina Le, M.D. is an otolaryngologist-head and neck surgeon with Mountainside Medical Group. She sees patients in the Mountainside Medical Office Building located at 311 Bay Avenue, Suite 300, in Glen Ridge, NJ. New patients are welcome and may visit www.mountainsidemedicalgroup.com to request an appointment or call 973-798-477. Share this:
How to see Ursida’s meteor shower at its peak tonight Illustration for an article titled How to See the Ursid Meteor Shower at its peak tonight Photo: Pozdeyev Vitaly (Shutterstock) Even like life on Earth continues to deteriorate, cool things happen in space. If you missed the great fusion of Jupiter and Saturn by chance last night, the heavens are graduated to you because you are rejected and given something else to look at: Tthe Ursid meteor shower will peak tonight in the northern hemisphere. Here’s a little background to tonight’s celestial show, and what you need to know to see how it illuminates the sky near you. What is Ursid’s meteor shower? It should not be confused with the Geminid Meteor Shower—which peaked earlier this month (only one event on December a crowded astronomical calendar,, although they are still expected sporadically visible through Sunday) —tUrsids are an annual event that runs across the sky around the winter solstice. They are not as numerous as the Geminids, which peaked on December 13-14 with 120 meteors per hour, according to Ursids do not cause as much hype, mainly because they come in bursts of about 5-10 at their peak. Yet they are still brilliantly smoldering rocks when you manage to catch them, and occasionally generate more than 100 meteors per hour, although this is very rare, according to EarthSky. Meteorologist Joe Rao explains that the Ursids originate from near the Little Bear: The Ursids are so named because they seem to flutter from the vicinity of the bright orange star Kochab, in the constellation Ursa Minor, the little bear. Kochab is brighter than the two outer stars in the bowl Little Dipper (the other is Pherkad), who seems to be marching in a circle like a guard around Polaris, the North Star. But while the Geminids are at the top of most meteor observers, they “must see,” the Ursids are usually at the bottom and are usually given scant attention, except for the most attractive meteor observers. As EarthSky notes, Ursids are a newer phenomenon and were only discovered in the 20th century. You will need a dark sky to catch them. How to see Urside I will not stray you: It will help you a lot if you are in the northern hemisphere; people in the southern hemisphere will not have much chance of seeing the show. There is no hidden secret catch a good look. Aare you really warm clothes and a darkened sky, away from any and every light pollution. Be prepared to stay out late, too EarthSky notes: If you look from the location of the northern hemisphere at the time of the solstice, you will find the Great Bear and the star Kochab in the northeast around 1:00 a.m. local time. This is approximately the time of night you will want start watching this meteor shower. They mindnorthern latitudes, as in Canada, will make it easier to spot Ursides, but you’ll need to do a little mapping of the stars to catch them in your full shine. As EarthSky writes: From far northern latitudes (for example, in Canada), the Little Bear is circumpolar (out all night). From there you will find the star Kochab below Polaris, the North Star, at night. The Kochab (and all the Little Bear stars) orbit Polaris counterclockwise throughout the night, with this star reaching the peak of the night during the hours before dawn. This is all comes with a warning that you will need to stay outside in the cold to watch the sky, maybe a few hours. But you have bothered too much this year. Just get a warm coat. Tfresh air will come in handy.
An introduction to what influences a persons identity This separates Gestalt therapy from most other therapies. What is personal identity? Power and Authority The section on government and the state reviews patterns of power and authority in society, as well as analyzing the structure of the following institutions: Due to statistical considerations, some systems can cycle between order and disorder. Flappers challenged traditional gender roles, had boyish hair cuts and androgynous figures. The revisions I made in the version were minor and were made after Jim's death. These programs were developed for at-risk infants and can be conceptualized as infant psychotherapy. Loosening and integrating techniques. This section outlines several types of touch that are initiated by the therapist as an adjunct to verbal therapy. They can share how they are affected. Population, Urbanization and the Environment Materials for this section include conditions under which groups move from rural to urban areas or from one country to another and the impact this has on the sending and receiving areas. How personal space is defined within a culture affects the interpretation of therapeutic touch. However, the Scientific Revolution had established by the middle s that physics, chemistry, astronomy, meteorology, and physiology could be understood in naturalistic terms. Culture of Canada Seen as a dichotomy, resistance is often treated as "bad" and, in such a context, often turns out to be nothing more than the patient's following personal dictates rather than the therapist's. Also included is the use of the internet in research, with a focus on judging the reliability and validity of information found on the internet. What is fundamentalist religion. When one moves from talking about a problem or being with someone in a general way to studying what one is doing, especially being aware of how one is aware, one is working. What Most Influences the Self-Identity of Americans? However, sexual touch has been reported to manifest in many other forms such as nibbling on client's ears or stimulating a man's nipples. Some somatic and body psychotherapies regularly utilize touch as part of their theoretically prescribed clinical intervention. In Gestalt therapy the therapist and patient speak the same language, the language of present centeredness, emphasizing direct experience of both participants. The person who is aware knows what he does, how he does it, that he has alternatives and that he chooses to be as he is. These "body voice" communications include: However, it is not enough for the therapist to be responsible for self and for the patient to be responsible for self -- there is also an alliance of patient and therapist that must be carefully constantly, and competently attended to. About half viewed this practice as unethical. Therapists' congruent, invited, and appropriate non-sexual touch is likely to increase a sense of empathy, sympathy, safety, calm, and comfort for clients Smith et al. Official bilingualism in CanadaHuman rights in Canadaand Multiculturalism in Canada French Canada 's early development was relatively cohesive during the 17th and 18th centuries, and this was preserved by the Quebec Act ofwhich allowed Roman Catholics to hold offices and practice their faith. Infants who signal a need and are responded to by a sensitive, attuned parent feel a sense of control over their lives. Freud, Rogers, Bowlby, Skinner and Winnicott to name a few may interest you if you would like more information, and a wider range of ideas and perspectives. Bookmark. College–Level Sociology Curriculum For Introduction to Sociology. Prepared by the American Sociological Association Task Force on a College Level Introduction to Sociology Course. The Course * Summary Course Outline * Course Narrative. The Course. Purpose: The College-Level Sociology course is designed to introduce students to the sociological study of society. New Criticism. A literary movement that started in the late s and s and originated in reaction to traditional criticism that new critics saw as largely concerned with matters extraneous to the text, e.g., with the biography or psychology of the author or the work's relationship to literary history. Identity A person’s identity is influenced by various factors, some acknowledge that culture is the biggest effect on our identity, while others hold a dissimilar idea and think that identity is part of our nature. Lucy Grealy, a person who has facial defects wrote an essay about her distinctive experience that she was teased by others since. Androgyny is the combination of masculine and feminine characteristics. Usually used to describe characters or people who have no specific gender, gender ambiguity may also be found in fashion, gender identity, sexual identity, or sexual lifestyle. In the case of gender identity, terms such as genderqueer, or gender neutral are more commonly used. This paper, coauthored with James S. Simkin inwas the Gestalt Therapy chapter in the edition of Corsini and Wedding's Current Psychotherapies (4th Edition). It appears here with the kind permission of the publisher, F.E. Peacock, Publishers, Inc. of Itasca, Illinois. Purpose. The new Board of Directors is seeking input on proposed elements of a Mission Statement for the North-South Institute moving forward and on how to realize that mission. The Back-Story. The North-South Institute was established in as Canada’s first independent policy research institution dedicated to international development. An introduction to what influences a persons identity Rated 4/5 based on 61 review What influences your personal identity
Uploaded by shahap700 Linear Regression Assignment Jose Fernandez MSBA Data Analytics III In this homework Assignment you will use linear regression to study speeding tickets. Each question builds on the previous question. Your regressions should have more controls as you move through the assignment. Try to capture all of these regression in one nicely formatted table. What determines how much drivers are fined if they are stopped for speeding? Do demographics like age, gender, and race matter? To answer this question, we’ll investigate traffic stops and citations in Massachusetts using data from Makowsky and Stratmann (2009). Even though state law sets a formula for tickets based on how fast a person was driving, polic officers in practice often deviate from the formula. An amount for the fine is given only for observations in which the police officer decided to assess a fine. a) Plot a histogram of fines. Does it looked normally distributed or skewed? b) Estimate a simple linear regression model in which the ticket amount is the dependent variable as a function of age. Is age statistically significant? c) What does it mean for a variable to be endogenous? Is it possibly age endogenous? Please explain your answer. d) Estimate the model from part b), also controlling for miles per hour over the speed limit. Explain what happens to the coefficient on age and why. e) Is the effect of age on fines linear or non-linear? Assess this question by estimating a model with a quadratic age term, controlling for MPHover, Female, Black, and Hispanic. Interpret the coefficients on the age variables. f) Sketch the relationship between age and ticket amount from the foregoing quadratic model: calculate the fitted value for a white male with 0 MPHover (probably not many people going zero miles over the speed limit got a ticket, but this simplifies calculations a lot) for ages equal to 20, 25, 30, 35, 40, and 70. Use R to calculate these values and plot them. g) Calculate the age that is associated with the lowest predicted fines. Hint: You can use calculus or a simple formula used to find the minimum and maximum of quadratic functions. h) Do drivers from out of town and out of state get treated differently? Do state police and local police treat nonlocals differently? Estimate a model that allows us to assess whether out of towners and out of staters are treated differently and whether state police respond differently to out of towners and out of staters. Interpret the coefficients on the relevant variables. Hint: you have to do something more than just including the dummy variables. i) Test whether the two state police interaction terms are jointly significant. Briefly explain your results. Hint: it says jointly so it is not a T-test. Variable Name State Pol Miles per hour over the speed limit Assessed fine for the ticket Age of driver Equals 1 for women and 0 for men Equals 1 for African-American and 0 otherwise Equals 1 for Hispanics and 0 otherwise Equals 1 if ticketing officer was state patrol officer and 0 Equals 1 if driver from out of town and 0 otherwise Equals 1 if driver from out of state and 0 otherwise
Pseudo Innovation Screen Shot 2014-08-01 at 2.06.25 PMFew people know that new prescription drugs have a 1 in 5 chance of causing serious reactions after they have been approved. That is why expert physicians recommend not taking new drugs for at least five years unless patients have first tried better-established options and need to. Faster reviews advocated by the industry-funded public regulators increase the risk of serious harm to 1 in 3. Yet most drugs they approve are found to have few offsetting clinical advantages over existing ones. Systematic reviews of hospital charts by expert teams have found that even properly prescribed drugs (aside from misprescribing, overdosing, or self-prescribing) cause about 1.9 million hospitalizations a year. Another 840,000 hospitalized patients given drugs have serious adverse reactions for a total of 2.74 million. Further, the expert teams attributed as many deaths to the drugs as people who die from stroke. A policy review done at the Edmond J. Safra Center for Ethics at Harvard University concluded that prescription drugs are tied with stroke as the 4th leading cause of death in the United States. The European Commission estimates that adverse reactions from prescription drugs cause 200,000 deaths; so together, about 328,000 patients in the US and Europe die from prescription drugs each year. The FDA does not acknowledge these facts and instead gathers a small fraction of the cases. Perhaps this is “the price of progress”? For example, about 170 million Americans take prescription drugs, and many benefit from them. For some, drugs keep them alive. If we suppose they all benefit, then 2.7 million people have a severe reactions, it’s only about 1.5 percent – the price of progress? However, independent reviews over the past 35 years have found that only 11-15 percent of newly approved drugs have significant clinical advantages over existing, better-known drugs. While these contribute to the large medicine chest of effective drugs developed over the decades, the 85-89 percent with little or no clinical advantage flood the market. Of the additional $70 billion spent on drugs since 2000 in the U.S. (and another $70 billion abroad), about four-fifths has been spent on purchasing these minor new variations rather than on the really innovative drugs. In a recent decade, independent reviewers concluded that only 8 percent of 946 new products were clinically superior, down from 11-15 percent in previous decades. (See Figure) Only 2 were breakthroughs and another 13 represented a real therapeutic advance. Spokesmen for the pharmaceutical industry point out that therapeutically similar drugs have advantages. First, physicians need some choice within a therapeutic class because some patients do not respond well to a given drug. This is true, but after about three choices, there is little evidence to justify a 4th , 5th, or 6th in a class. Second, a sub-group of patients may benefit from a new drug that seems similar. This may be true or not, and we need to identify that sub-group so the effectiveness of the drug can be tested on them. The point of testing drugs for approval is to identify which patients might benefit and see if they do, not to assume that some patients somewhere might. Third, industry spokespersons argue that every incremental development contributes to larger improvements. This might be true, but most significant clinical advances occur through major discoveries. Yet most major scientific discoveries do not significantly improve patients’ health and some may prove deadly. Silvio Garattini, a leader in pharmacological research told me, “When a major discovery actually helps patients, we feel very lucky.” The Hidden Business Model of R&D  Flooding the market with hundreds of minor variations seems to be the hidden business model of drug companies, to exploit patent and other IP protections for profits, not for significant advances for patient health. Looking back, Jerry Avorn, an authority on pharmacoepidemiology, wrote “Laws designed to encourage and protect meaningful innovation had been turned into a system that rewarded trivial pseudo-innovation even more profitably than important discoveries.” Despite fewer superior drugs, Marc-André Gagnon has shown that sales and profits soared. Net return on revenues (ROR) rose from about 10 percent in the 1970s to 12.5 percent by 1990, to 16 percent by 2000, to 19 percent in 2010. Pharmaceutical ROR has increased from about 2.5 times to 3.2 times the return for the Fortune 500 giants, largely by raising prices and getting more physicians to prescribe more drugs. Risk for the major companies is much less than claimed for several reasons. First, they spread risk over many projects. Second, once inflators and public subsidies are taken out, net research costs are a fraction of the $1-5 billion per new drug claimed, and big companies largely invest after the public and others have paid for the high risks of research to discover new drugs. As new drugs enter clinical trials, their risks are just 1 in 5. Third, companies cut losses by stopping development of drugs whose profit potential is not as high as they want. We never will know how many beneficial drugs never get approved because companies dropped them for insufficient profit potential. Over the past 35 years, this hidden business model based on marketing power and prowess more than innovation has caused an epidemic of harmful side effects. Given estimates that about 30 adverse reactions occur for every one that leads to hospitalization, about 81 million adverse reactions are experienced by the 170 million Americans taking drugs. The elderly and those taking multiple drugs experience more than others. Most are medically minor, like muscle aches, gastro-intestinal discomforts, slower reactions, or sleepiness. But they reduce productivity and cause many falls and road accidents. The Trial-Journal Pipeline The pharmaceutical industry refers constantly to its “R&D pipeline” of new drugs under development. But there is a second, parallel pipeline – the trial-journal pipeline – that produces biased medical information on scores of new drugs to make them look scientifically more effective and safer than they prove to be in actual clinical practice. The Trial-Journal Pipeline consists of randomized clinical trials designed with the marketing departments to produce evidence that their drugs are more effective and safer than unbiased trials would show. Commercially funded clinical trials are at least 2.5 times more likely to favor the sponsor’s drug than non-commercially funded trials. The FDA accepts these biased trials and uses them to approve drugs. Congress strongly supports having companies fund the division that reviews new drugs rather than having the FDA be a publicly funded, independent reviewer and regulator. Financially, the FDA is an agent of the pharmaceutical industry, and it plays a major role in expanding markets for more people to take more drugs. For the journal part of the pipeline, pharmaceutical companies retain teams of statisticians, science editors, and science writers to select which results will go into the medical literature and which will not. They switch end points and other details in the trial data submitted to the FDA so that physicians read twice-biased medical articles that understate risks of harm and overstate benefits. Negative results are much less likely to be published than positive results, and companies publish positive results more than once, a further bias that distorts clinical practice and guidelines as well the medical knowledge that underlies it. Marc Rodwin concludes, “scholarly studies have revealed that drug firms design trials that skew the result and that they distort the evidence by selective reporting or biased interpretation.” This published literature goes into clinical guidelines and protocols. Originally, they were established to provide an unbiased, evidence-based way to practice good medicine. ButLisa Cosgrove and Emily Wheeler document how they have become “essentially marketing tools for drug companies.” They create “the potential to expose many patients to harm from unnecessary treatment or from treatment that is not evidence-based.” The situation is worse because the evidence is twice-biased and corrupts medical science. Companies then employ what Sergio Sismondo describes as “a two-step model of influence by hiring and otherwise enrolling some physicians and researchers who will, in turn influence many others” to prescribe the new, patented drugs. New FDA policies to get more drugs reviewed faster so that they can reach patients sooner in fact mean that drugs are approved with less evidence of being safe or effective. A systematic study of shortened reviews found that each 10-month reduction results in an 18 percent increase in serious adverse reactions, an 11percent increases in hospitalizations, and a 7.2 percent increase in deaths. This study complements the one that found the risk of serious adverse reactions occurring after fast approvals increases from 1 in 5, to 1 in 3. Congress and the public do not seem aware of this and other evidence that new policies that increase profits for drug companies put patients are greater serious risk. In response to drug disasters like Vioxx, which experts say caused about 120,000 traumatic cardiovascular events and 40,000 deaths, Congress and the FDA have set up monitoring and safety systems. But a review of results so far found little evidence they are identifying serious risks or altering prescribing practices. One key reform that would make new drugs safer and more effective would be to require that the FDA have evidence that new drugs are clinically effective. A top team at the London School of Economics concludes that requiring comparative evidence before approval informs all decision makers of the relative merits of new treatments. Also, it “could encourage manufacturers to concentrate on the development of new drugs in therapeutic areas with few or no alternatives.” While changing legislation is difficult, the FDA could use its administrative powers and guidelines to get more evidence that new drugs actually help patients before reviewing them. Prescrire Fig Bars 2002-2011 Donald Light is a fellow at Harvard’s Edward J. Safra Institute for Ethics. He blogs at Harvard Law School’s Bill of Health, where this post first appeared. Spread the love 5 replies » 1. @Cindy I like your third Comment basically you can’t just produce a drug and let that drug be used by the community, all we know is that every individual has different kinds of body and unlike reactions to chemicals and other things that would harm their bodies. First of all, if a substance/drug is used without any professional notice, then it would affect the body without the user knowing and how far it will go some are allergic to things like seafood or other kind of product so, if the drug is made with fish oil you know what will happen and that chemical reaction will definitely kill that patient accidently. Some facts like death by prescription actually killed 7,000 people annually, which is quite alarming, but health administration won’t do anything about that and blame the pharmaceutical companies for giving the wrong medicine. And these things aren’t published on magazines or TV as it will lower the credibility of doctors who have done and killed innocent lives on his/her handwriting. Missouri substance recovery 2. Thoughtful and well-cited article that adds to the calls for action. I have 3 comments: 1. Subtle differences in drugs, between brands that are incremental and between brands and generics, do make a difference for some folks. I would propose that those folks that need the particular brand be recruited for follow-up, at least through open source surveys. I have 2 family members in which these are important, and I’m learning of more and more when I speak of these folks. When a patient is compliant and adherent to the dosing instructions/lifestyle changes and still runs into adverse events, that info should automatically go into a data repository (with the patient’s permission). Then, the data of adverse events should be open-source so that data experts can comb the data for attributes and publish the findings. This would help everyone, including the drug companies. 2. When a truly innovative drug is released (such as the new one for HepC) then it should be met with innovative payment schemes. I’ve written about possibilities before, and I’ve been vocal about one such contract, the Cigna-Merck contract for diabetes, because it wasn’t entirely built on rebates for Januvia, but escalated the rebates across the diabetic population if adherence improved, regardless of the drug the patient was taking . You can read more at The goal is to create a contract that does not reimburse the entire amount in the first year, but takes 2-3 years to study the population, understand the adherence attributes of the population, and rewards the total stakeholders for submitting data (health plan, Rx, provider, patient,…). 3. To go far out onto a limb here, perhaps “me-too” drugs should be preliminarily reviewed on the number of adverse effects they address from other same-class drug regimens. What this means: if patients were asked to review drugs at start, at 6 months, at 1 year, and every year thereafter, again, we would have a data base of changes over time and gaps that need to be filled. Then, those drugs that met that challenge would /could be fast-tracked. My goal here is to call for system-innovation in accepting the innovative compounds that are coming out. I’m interested in your thoughts. 3. Yes, there is much to discuss in here. Many of the points you raise are valid issues and worthy of debate here But the tone of this piece tends to exaggeration and dramatization. Your opening, for example: Most people don”t know that new prescription drugs have a 1 in 5 chance of causing serious harm. I’m terrified. But wait – what does “serious” harm entail? Are my limbs going to fall off? Are my internal organs going to stop functioning? Am I going to develop cancer? Or am I going to experience nausea and vomiting? And expert doctors tell me I should wait 5 years, I had no idea there was a consensus – I’m depressed and confused. I had no idea “expert” doctors felt this way, clearly this must be some sort of conspiracy on the part of the mainstream media I’m not even going to ask where you found this statistic 4. Great article. One of the many things hidden from the view of the consuming public is the amount of work that drug companies and their armies of consultants do to position incremental benefits (i.e., fewer patients experience a particular side effect) as dramatic therapeutic advances that can encourage consumer demand and/or physician willingness to prescribe. They can also help to ensure favorable placement on formularies, which is critical to product success. Companies are told routinely to play down absolute risks (e.g., the number of patients experiencing migraines with drug X went down from 20/1,000 to 10/1,000) and focus on relative data (risk of migraine dropped 50%!), which is much more impressive and often misinterpreted by consumers and clinicians alike. Leave a Reply
The singular noun is goose.The singular possessive form is goose"s.The plural noun is geese.The many possessive type is geese"s. Share possession by multiple groups of the same form can it is in expressed, of food - but it is excellent analytically quite than by inflection. Also so, this would be one awkward usage and also would be much better rephrased to avoid the plural plural, viz. geeses" illness? There is no together word as "geeses", for this reason "geeses"" wouldn"t do sense. So what execute we do?Place the apostrophe prior to the S in WOMENS, making it WOMEN"S CARS.How execute you think about the answers? In the context, the many of geese is geeses. Watch Why would the kind of the many make any kind of difference here? group #1= afri geese & team #2=buff geese. Start below for a rapid overview the the website If you wanted to associate these groups together but still observe the truth that they are different types of geese, would you say geeses? The word prior to the apostrophe needs to be plural for plural possessive. 1) You have the right to say, "an illness of both buff and African geese", or, "a buff and African geese"s illness", or a couple of other comparable phrasings. Possessive nouns explains and also demonstrates apostrophe consumption in the English language to show possession. more 보다 one goose= geese; "there room three geeses in that sentence." talk about the workings and also policies the this site below are instances of plural possessive nouns: Cattle"s pasture. Feet"s toenails. I.e. They walk to court and also fight that out, it is what happens! People"s ideas. Plural and possessive forms of English words frequently confuse start writers. We currently talk of the "fishes the the sea" or the "peoples that the earth", for this reason the "geeses the the world" is not too far fetched, You are watching: Plural possessive of geese Barmar "In linguistics, a change in a vowel sound led to by a sound in the complying with syllable." Geese have serrations on their bills the look favor teeth.) "the word "geese" is provided three times. Stack Exchange network is composed of 177 Q&A areas including there is no such word together "geeses", for this reason "geeses"" wouldn"t make sense.Now look at girl. Nuclei"s form. (11) the geese’s feathers (12) mice’s teeth. Gain your answers by asking now.Expert has grim prediction around next month"s numbersJeremy Lin demands an ext protection after hospital visitOver 800 students, employee told come quarantine in 1 districtControversial episode of "Black-ish" will ultimately airVideo mirrors police trying to handcuff 8-year-old boyVirus made human being want to invest on home advancement In the second part of her question, you provided geese in one entirely different context that made the word singular instead of plural. Compound plural possessives. Mice"s traps. Once a plural noun go not end with one "s," include an apostrophe and also an "s" to do it possessive. Women"s clothes. Many possessive noun is a noun which reflects a plural noun having actually ownership in the sentence. Right?...since the example starts with words "both" we understand there is more than one girl here, the 2nd option is correct.ALL the your instances seem come be looking for the many form, try the other 4 for yourself! If you have actually a plural possessive that geese, you perform indeed gain geeses".Thanks for contributing response to English Language & usage Stack Exchange! >2)Say you had 2 or much more groups of men: guys from France(Frenchmen), males from England (Englishmen), and men from Ireland (Irishmen). Plenty of writers erroneously use apostrophes to show both plural and possessive forms, while many writers because that whom English is no their very first language omit the apostrophe entirely because their … In the second component of her question, you supplied geese in an entirely different context that made words singular rather of plural. Geese is already a plural word (more 보다 1 goose). Girl only way 1 person, so girl"s would only be referring to miscellaneous belonging to 1 girl. Let"s speak you want to describe the "European charm" the these teams of men have in common while quiet noting that there space different and distinct teams of men involved(i.e. In various other words, the own –s is compelled after a singular word finishing in -s however not after ~ a plural … What happens once two single people very own something? Octopi"s legs. Learn much more about stack Overflow the company If you have a many possessive of geese, you carry out indeed obtain geeses". (Buff geese + afri geese = geeses) complement the singular and possessive nouns with their plural forms. Editors" in chef Attorneys" general Brothers" in regulation Courts" martial.Ok... Girl is singular, while girls is plural, an interpretation more 보다 one girl. And also this plural word end in S, i m sorry is a clue for you as to what to perform next.So you ar the apostrophe ~ the S in YEARS, making the correct answer 2 YEARS" LEASEWOMEN is more than one WOMAN, so females is plural. In that context, the many of geese is geeses. By making use of our site, you identify that you have read and understand our English Language & intake Stack Exchange is a question and also answer website for linguists, etymologists, and also serious English language enthusiasts. It only takes a minute to authorize up.Here space two examples of mutated plurals: Anybody can answer Say, one kind of condition is typical to two sorts that geese. Therefore, it would be geese"s. Oxen"s diet. Geese is already a many word (more than 1 goose). To make a possessive form of a plural noun finishing in "s," include an apostrophe after the "s". See more: ¿Cuáles Son Los Requisitos Para Daca Por Primera Vez 2020, 5 Pasos Para Solicitar Daca Por Primera Vez! If that is a whole word through a plural meaning, then the apostrophe comes right after it.Cover increase the apostrophe (and s after that if over there is one) in every of those, and also you"ll view that you have actually a whole word through a plural meaning.You can keep going, too... Children"s, dogs", men"s, etc.IT"S B! Saint Mary"s Glacier Hike,Liberal Feminism 2019,Lianne La Havas - Bittersweet,Startalk publication Pdf,USS Oak Hill (LSD‑51),L"aîné In English,Dancing In The Street No Music,Red Ale Beer Brands,Guts Voice gibbs English,Craig Mazin - Imdb,Time In Fiji Now,Brave In Asl,Exchange virtual Archive Options,What Is online News,Be ethical Forrest,Online dating Disasters,Inland realm Zip Code,How many Inches Of snow Did Pittsburgh get This Year,David Alvarez san Diego,Oldest item Of Gold,Keong Saik roadway Restaurants,Flat boat 1800s,Wagga Wagga come Canberra,Main Street the Gympie,Hardwick, Stockton News,Longview, Wa Tornado,Domenick Abbate Wife,Fuengirola traveler Information,Lucy Durack Education,Sugarcane Restaurant Kapolei,Dr Craig Thomas,Td bank Mobile Deposit Endorsement,Lands of Lore 3 Gamefaqs,Yosemite an interpretation Newsroom,Exit(2) In C,Brownsville Isd having lunch Menu,Cordoba Islamic History,2020 Dakar Rally,
Sentence Examples with the word Acts A great number of other statutes confer powers or impose duties upon district councils, such as the acts relating to town gardens, agricultural gangs, fairs, petroleum, infant life protection, commons, open spaces, canal boats, factories and workshops, margarine, sale of horse-flesh and shop hours. One of his first acts was to restore Babylon, to send back the image of Bel-Merodach (Bel-Marduk) to its old home, and to re-people the city with such of the priests and the former population as had survived massacre. Representation was granted to the peasants; the two chambers were empowered to initiate legislation; ministers were made responsible for all acts of government; a civil list was given to the king in return for the surrender of the crown lands; and, in short, the new constitution was similar to that of Great Britain. View more The reign of Philip, though marred by many acts of tyranny and harshness, was politically great. The second theory is that there is no absorption of iron given by the mouth, but it acts as a local stimulant to the mucous membrane, and so improves anaemia by increasing the digestion of the food. These acts contain provisions whereby burials may be prohibited in urban districts, and Burial churchyards or burial grounds already existing may be Acts. Kindred to this latter view was the position of sundry sects of English fanatics during the Commonwealth, who denied that an elect person sinned, even when committing acts in themselves gross and evil. One of the first notable acts of the Roca administration was to declare the city of Buenos Aires the property of the national government. If there is the slightest displacement of the centre o gravity of the system from the axis of revolution a force acts on th shaft tending to deflect it, and varies as the deflexion and as th square of the speed.
Cytokine increases production of beige fat burning more cellular energy An immune signal promotes the production of energy-burning beige fat, according to a study Dr by Zhonghan Yang and colleagues from Sun Yat-Sen University, Guangzhou, China. The findings, ‘IL-25–induced shifts in macrophage polarization promote development of beige fat and improve metabolic homeostasis in mice’, published in PLoS Biology, may lead to new ways to reduce obesity and treat metabolic disorders. The beige colour in beige fat comes from its high concentration of mitochondria, the cell's powerhouses. Mitochondria burn high-energy molecules like fats and sugars with oxygen, releasing energy. Normally, that energy is stored as ATP, the energy currency that the cell uses for almost all its activities. But in beige fat, mitochondria accumulate a protein called "uncoupling protein-1" that limits ATP production, generating heat instead. Babies are born with "brown fat," a similar tissue concentrated in the shoulder region, which helps them stay warm, but brown fat is gradually lost with age. Not so beige fat, which is more widely distributed and which can be generated throughout life in response to both cold and neuronal or hormonal stimulation. Recent work, including by the authors of the new study, has revealed that cytokines - immune system signalling molecules - play a role in regulation of beige fat. To explore that regulation further, the authors manipulated levels of the cytokine interleukin-25, and showed that an increase in the cytokine could mimic the effects of both cold and stimulation of a hormone receptor in increasing the production of beige fat in mice. They traced the signalling chain further, showing that IL-25 exerted its effects through two other cytokines, which in turn regulated immune cells called macrophages. Those cells acted on neurons that terminate in the beige fat tissue, promoting an increase in production of the neurotransmitter norepinephrine, which was already known to promote beige fat production. Thus, the authors' work revealed the sequence of regulatory signals that begins with IL-25 and ends with release of norepinephrine and an increase in beige fat. Finally, the authors showed that administering IL-25 to mice that were eating a high-fat diet prevented them from becoming obese and improved their ability to maintain their responsiveness to insulin, which is impaired in chronic obesity. "Our results show that interleukin-25 plays a key role in production of beige fat," said Yang, "and point toward increasing interleukin-25 signalling as a potential treatment for obesity." Further information To access this paper, please click here
Kurnool District Profile,Mandals and tourist places in AP State Kurnool District Profile,Mandals and tourist places  : Kurnool District History, Tourist Attractions Kurnool is one of the important towns in Andhra Pradesh and is the headquarter of the district with the same name. it was once called the Kandenovulu. Kurnool was the capital city of Andhra state from 1953 to 1956. It was in the Andhra Pradesh state from 1956 and is continuing as one of the districts in Andhra Pradesh of the bifurcation of the state as Telangana and Andhra Pradesh. Kurnool district is divided into Kurnool, Adoni, and Nandyal revenue divisions. There are two Loksabha constituencies which are Kurnool and Nandyala and thirteen state assembly constituencies. Tungabhadra, Kundera, Penna are the main rivers that flow through this district. Kurnool has Telangana on the north side, Karnataka on the west, Prakasam district on east and Ananatapuram and Kadapa districts on the south. National highway no. 7 passes through Kurnool and national highway no. 18 begins from Kurnool. The total area of the district is 17,658 square meters. The earlier name of Kurnool is Kandenavolu. Kurnool history says that this place is ruled by Badami Chalukyas, Telugu Cholas, and Kakatiyas. later Vijayanagara rulers brought this place under their rule. Complete Kurnool district was under the rule of Sri Krishnadevaraya. The famous Kondareddy Buruju in Kurnool was built by the Vijayanagara ruler Achyutadevarayalu. Golconda sultan Qutub Shahi, Dawood Khan, Himayath Khan were the Muslim rulers who ruled Kurnool. Hyderabad Nizam gave this district to British in around 1800. And this was called the seeded area. After India got independence Kurnool became a part of Madras state. In 1953, Andhra state was formed with eleven districts and Kurnool was made the capital city. In 1956 Andhra Pradesh was formed with Hyderabad as the capital. Mandals in Kurnool District Adoni Allagadda Alur, Kurnool district Aspari Atmakur, Kurnool Bandi Atmakur Banganapalle Bethamcherla Chagalamarri Chippagiri Devanakonda Dornipadu Gadivemula Gonegandla Gospadu Gudur, Kurnool Halaharvi Holagunda Jupadu bungalow Kallur, Kurnool district Kodumur Kodumuru Koilkuntla Kolimigundla Kosigi Kowthalam Krishnagiri, Kurnool district Kurnool Maddikera Maddikera (East) Mahanandi Mantralayam Midthur Nandavaram Nandikotkur Nandyal Orvakal Owk Pagidyala Pamulapadu Panyam Pattikonda Peapally Pedda kadabur Sanjamala Sirvel Srisailam Tuggali Uyyalawada Veldurthi Velgode Tourist attractions in Kurnool District One of the popular religious place in Kurnool is Manthralayam. This is on the banks of Tungabhadra river and Raghavendra Swamy is worshiped here. Ahobilam is another place Lord Narasimha Swamy is worshiped. Another tourist attraction in Kurnool is Mahanandi. Srisailam is also in Kurnool district where there are temples of Mallikarjuna Swamy and Bharamaramba. The dam built here is one of the largest in the country and provides water to lakhs of acres of fields and is the major resource for electricity production for Andhra Pradesh. Yaganti is another Kurnool tourist place, where Umamaheshwara Swamy is worshiped. There is an idol of Sri Venkateswara Swamy in a cave beside the temple. Yaganti is at a distance of 85 kilometers from Kurnool. Other attractions are Kondareddy Buruju, Jagannatha Gutta, Revanuru Hussain Swamy Dargah etc. In Kurnool also agriculture is the main occupation of people like the other place in Andhra Pradesh. K C canal, Velugodu Project, Avuku, Pothireddypadu, Srisailam provide necessary water for agriculture. Map of Kurnool District Previous Post Next Post
Sık sorulan: Why Does The Water In My Fish Tank Look Cloudy? How long does it take for cloudy aquarium water to clear? A. During this process, beneficial bacteria build up in order to consume the ammonia being produced, hence causing the water to be milky. This cloudiness is caused by free floating beneficial bacteria which are not harmful for your fishes, and should go away when they settle down – usually takes about 1-2 days. Is cloudy water bad for fish? Bacteria Bloom (cloudy water) will occur 2 to 4 days after fish are added to the tank. The cloudiness, caused by initial bacteria growth, is not harmful to tank inhabitants, and will clear on its own. How do I fix a cloudy fish tank? Add activated carbon media to the filter, whether loose or carbon pads. Adding activated carbon media or activated carbon pads to the filter will help clear the water and adsorb nutrients that feed the bacteria bloom. How can I make my aquarium water clear? How to get crystal clear aquarium water 1. Filtration. Filtration is the most fundamental way that we keep aquarium water clear. 2. Chemical filtration. Chemical filtration works by absorbing or adsorbing things from the water. 3. Bacteria. 4. Fish. 5. Food. 6. Water changes. 7. Flocculants. 8. Light. You might be interested:  Hızlı Cevap: How To Cut Fish For Nigiri? How do I get rid of a bacterial bloom in my aquarium? 1. Adding fish into an aquarium which has not been treated for the Chlorine & Chloromines (with a tap water conditioner). 2. Doing a water change with untreated chlorinated water (Chlorine kills good bacteria) When should I do my first water change in my aquarium? Perform a 25% water change after 15 days. Remember to treat tap water with Aqueon Water Conditioner before adding it to your aquarium. There are different philosophies on how much and how often to change water, but 10% to 25% every 1 to 2 weeks is a good rule of thumb. How do I get rid of ammonia in my fish tank? One of the easiest and most efficient ways of lowering ammonia levels is by performing one or more water changes. Water changes will immediately remove the ammonia from the fish tank and introduce safe water that will help dilute the remaining traces of ammonia left in the system. Why won’t my fish tank clear up? This can be caused by: Overfeeding – the bacteria feed on uneaten food in the aquarium. Over-cleaning your filter – cleaning your filter too much and destroying the colonies of beneficial autotrophic bacteria that live in them. Dead fish in the tank – a dead fish breaking down in the tank can really foul the water. Why is my fish tank getting dirty so fast? If your tank is too small, the fish will be stressed and the tank will get dirty much faster. Your tank should not be overly large, however, or the fish will be uncomfortable and it will be much more space to keep clean. Some species of fish will also nibble algae and help keep the tank clean. You might be interested:  Hızlı Cevap: What Is A Porgy Fish? Why is my aquarium water milky white? A milky white cloudy water color to the water is a sign of a bacteria bloom which usually happens during the Nitrogen Cycle Cycling Process of a new tank or if a tank is becoming reestablished after a large water change, medication cycle or other event. Is bacterial bloom bad for fish? This is called “bacterial bloom.” This cloudiness is caused by initial good bacterial growth and is not harmful to your fish. It will clear up on its own. As you will see, you need this bacteria growth for a healthy aquarium. Why is my water cloudy? Cloudy water, also known as white water, is caused by air bubbles in the water. It is completely harmless. It usually happens when it is very cold outside because the solubility of air in water increases as water pressure increases and/or water temperature decreases. Cold water holds more air than warm water. Leave a Reply
Arduino Colour Reaction Game Introduction: Arduino Colour Reaction Game Do you want to play a game that requires not only reaction skills but is more than just pressing a button at the right time? Then this is the game for you, In the Colour Reaction Game, a colour will flash and you must press the corresponding button in a certain amount of time until you have 5 times. All the while theres an led chaser right behind the RBG led distracting you. This project incorporates both digital and physical components. There is plenty of code along with physical components such as various leds and integrated circuits like the 555 timer. Step 1: Materials This list takes into account multiples and gives a cumulative cost for each component. 1. 7 segment display ($1.99) 2. RGB led ($2.99) 3. Arduino Uno R3 ($25.99) 4. Red led (8) ($1.60) 5. Push buttons (3) ($3.99) 6. 1kΩ Resistors (6) ($1.74) 7. 330 Ω Resistors (2) ($0.33) 8. Potentiometer ($1.99) 9. Polarized Capacitor ($0.29) 10. 555 Timer IC ($1.99) 11. 4017 johnson decade counter ($1.00) 12. Full sized breadboard ($7.99) 13. Half sized breadboard ($4.99) Total cost: $56.63 Step 2: Research I first want to go over some of the inspiration I had in making this project. The project above is a simon says game where led's will flash up to 5 times and you then must press the right buttons in order. I took this idea and instead turned it into a reaction game where you must do it in quick succession and it's one at a time. This makes the game more reactionary based instead of memory based. I also added a seven segment display to show the score and some led's in the background to act as distractions. Instead of using three different coloured led's I instead used one rgb led saving materials and space. I used some of the code from the video, for example how the person in the video was able to determine the time since the simulation had started for the project which is something that came in very handy for my project as well. Step 3: Base The first step of the project is to set up the base. This includes resistors to all components and connecting them to ground and power. We also connected the buttons to their arduino pins. Notice how all wires are colour coded. The red leds will be connected to an external 555 timer system which we will worry about later. A common mistake can be putting the leds on the same column as either the buttons or RBG led. This would connect the led to those components which we don't want. Each button used a 1 kΩ resistor while the RBG led and the other leds both used a 370 Ω resistors. The RBG led is a common cathode so we only have to use one resistor. If you can't colour code your wires I recommend labeling each of the buttons at least so there is no confusion in which buttons corresponds to which colour for both you and future players. Step 4: Seven Segment Display Wiring While we connected the display to the power rails using 2 1 kΩ resistors, we must now painstakingly connect each of the pins to the Arduino. Each of the pins is connected to part of the display, we can control these pins to display certain numbers while our game is running to keep score. Notice how we connected 2 pins to 0 and 1 meaning that we won't be able to use the serial capabilities of the Arduino without these pins not working anymore. This is also a common cathode meaning that we don't have to use resistors for each pin. It is also active LOW, meaning that the pins will only turn on if given a low signal (ground). The reason for this is because the display is already connected to a high signal (power) through the resistors. Make sure to make the wiring as neat as possible as there are still pins remaining on the Arduino that we will be using. Make sure to remember which segment of the display the pins control as that will making coding easier later on. Step 5: 555 Timer System Using the 555 timer and a decade counter, we will be able to light up those led's in a pattern in which they look like they will be chasing each other. Remember this small breadboard is connected to the big breadboard power and ground rails. The decade counter has pins 1-10, we will be using 8 of them to power each of the red led's in the big breadboard. In this system the 555 timer is configured to work in astable mode meaning the output switches from high (5V) to low (0V), this output then acts as the clock for the decade counter which outputs the signal to each of the pins separately which makes the led's blink. The potentiometer will be controlling the speed of the clock which can make the led's blink faster (turning left will make it faster). The pins of the decade counter we will be connecting to each of the red led's anode (long leg), so make sure you place this breadboard closer to that part of the project and not too far away. Step 6: RBG & Leds The final wiring step is to connect the each of the led's into one of the decade counter pins. I personally choose pins 1-8 on the decade going left to right via the led's but you can choose any pattern you want, even any coloured led's you want. We also connect each of the RGB pins to the arduino, everything being colour coded. The RGB led is a common cathode as well meaning we get away with using one resistor. If your doing this project in real life your wiring won't be as neat especially for the led chaser but try your best, use tape if need be if you want some of the wires for the chaser to not be as spread apart as there is a lot of wiring. Step 7: Schematic Heres the final schematic of the circuit. Remember you don't have to follow everything and you can add your own twist whenever you want! Infact that is strongly encouraged as you will learn a lot more. Step 8: Rules + Code Assuming yours pins are the same as mine then this code should work. However if they are not you will have to adjust some of the variables in the code. There are few quirks I had to add to the code to make it run properly on tinkercad but I go over it in the comments of the code itself. Here is how the game works: 1. Pressing any button will start the countdown from 3-1 where the leds start flashing. 2. Press the corresponding button to whatever colour you see. 3. Either a wrong answer or not answering in 1 second stops the game and resets the score 4. 5 points and you win, the game resets after. Tinkercad link: (the code can also be found here along with testing out the game) Step 9: Video Demonstration Here is a video going over the game along with showing what happens if you answer wrong or don't answer. Remember, you can try this out too with the link to tinkercad I added! Be the First to Share • Made with Math Contest Made with Math Contest • Home Cooked Speed Challenge Home Cooked Speed Challenge • Halloween Contest Halloween Contest
Pyogenic granuloma What is a pyogenic granuloma? A pyogenic granuloma is a common non-cancerous type of tumour made up of blood vessels and inflammatory cells. The tumour often appears suddenly and grows very quickly at first only to decrease in size gradually slowly over several days or weeks. Without treatment, some tumours will disappear entirely. Another name for this tumour is lobular capillary hemangioma. Although this kind of tumour can start anywhere, the most common locations include the nose, lips and mouth, and skin. When examined without a microscope, the tumour is usually round, and the surface may appear bright red. Some tumours are painful, and the tumour may bleed when touched. pyogenic granuloma What causes a pyogenic granuloma? Most tumours develop following a minor injury such as a scratch or burn. This is especially true for tumours that start inside the mouth (oral cavity) or nose (nasal cavity). However, for some patients, no cause can be identified. Pregnant women are more susceptible to developing these types of tumours, especially on the lips. When this tumour develops in a pregnant woman it is given the name granuloma gravidarum. How do pathologists make this diagnosis? The diagnosis is usually made after the entire tumour is removed and sent to a pathologist to examine under the microscope. When examined under the microscope, the cells on the outer surface of the tissue are damaged or lost. Pathologists call this an ulcer. Further down, the tumour is made up of many small and medium-sized blood vessels. The smaller vessels tend to surround the medium-sized vessels in pattern pathologists describe as lobular. The tissue surrounding the blood vessels is made up of fluid and specialized inflammatory cells including neutrophils, plasma cells, and lymphocytes. The combination of blood vessels and inflammatory cells within a pyogenic granuloma makes the tumour look similar to granulation tissue, a type of tissue that forms after an injury. For this reason, many doctors consider pyogenic granuloma to be a tumour-like reaction to an earlier injury. by Jason Wasserman MD PhD FRCPC (updated August 22, 2021) A+ A A-
Is your head constantly spinning with outlandish, mind-burning questions? If you’ve ever wondered what the universe is made of, what would happen if you fell into a black hole, or even why not everyone can touch their toes, then you should be sure to listen and subscribe to Ask Us Anything, a brand new podcast from the editors of Popular Science. Ask Us Anything hits Apple, Anchor, Spotify, and everywhere else you listen to podcasts every Tuesday and Thursday. Each episode takes a deep dive into a single query we know you’ll want to stick around for. Human height can vary quite a bit, with the tallest folks reaching peaks of six, seven, and even eight feet tall, and the shortest people standing at two, three, and four feet in height. But most people will fall into an average range of between five and six feet. Why did we land at that particular height—and why aren’t we taller? Natural selection and millions of years of time helped humans land at the heights we are at today. It’s clear that early humans with certain anatomies were more likely to survive and thrive, thus pushing the Homo sapiens population to the shape it is today. Paleontologists know that body size and height shifted upward about 2 million years ago when early Homo species evolved from their ancestors, Australopithecus. In fact, as one 2012 study published in the journal Current Anthropology points out, “body size is one of the major features that distinguish australopiths from early Homo and early Homo from Homo erectus”. But how we reached our modern heights and why our species isn’t still growing is still fairly a mystery. We explain all this and more on this week’s episode of Ask Us Anything. Tune in here, and read the article that inspired this episode here.
Skip to main content SDSU researchers uncover how cancer evades immune cells Doctoral students Mathias Anim, right, and Arlbert Armoo work with machine that sorts cells Doctoral students Mathias Anim, right, and Albert Armoo sort and count cells based on specific characteristics as part of research to understand how cancer cells use sugar residues to evade the immune system. A team of South Dakota State University chemistry researchers uncovered how cancer cells utilize a simple sugar residue to disguise themselves from the immune system. What they learned will help scientists develop more effective cancer therapeutics. “We utilized the lens of organic chemistry to understand how cancer cells evade the immune system,” explained assistant chemistry and biochemistry professor Dr. Rachel Willand-Charnley. The project is part of her chemical biology research program, which uses various fields of chemistry to solve biological problems. Willand-Charnley’s research has applications in biotechnology and biomedicine. Susan Grabenstein Roh, left, and asst. prof. Rachel Willand-Charnley looking at data on a computer screen Mitchell native Susan Grabenstein Roh, now a graduate student in the SDSU Department of Biology and Microbiology, left, and assistant professor of chemistry and biochemistry Rachel Willand-Charnley discuss the Sialic acid-Siglec receptor pathway. Willand-Charnley, doctoral students Mathias Anim and Albert Armoo and Susan Grabenstein Roh, biochemistry major who received her bachelor’s degree in May, analyzed what is known as the Sialic acid-Siglec receptor pathway. They examined the pathway in colon and lung cancer cells using CRISPR-Cas9 gene-edited cell lines to determine how the cancer cells evade detection using sugars on their cell surface. The results are published in the June issue of Glycobiology, a peer-reviewed Oxford Academic research journal. Roh, who at the time was a biochemistry major, is a shared first author on the article. The project was supported by the Willand-Charnley laboratory’s startup funding for new faculty members. Willand-Charnley came to SDSU in 2018 after completing postdoctoral research under the tutelage of renowned chemistry professor Carolyn Bertozzi at the University of California, Berkeley, and then at Stanford University. Her research combines expertise in organic chemistry, glycobiology and cancer immunology. Using sugar coating “Cells are literally decorated with sugar residues, known as glycans. Cancers also have a sugar coat,” Willand Charnley said. “How do sugars, like Sialic acid, allow cancers to participate in ‘immune evasion’? The immune system is programmed to identify cellular abnormalities, including deviations in the sugar coat, and mark them for degradation, but the question is why are certain cancer cells not being killed by the immune system?” The paper focuses on how cancers use simple sugar residues, which she described as a sugary costume, to mimic healthy cells, thereby evading the immune system. “This research will allow scientists to build better therapeutics that cleave off the sugars, essentially removing the cancer cells’ sugary costume,” Willand-Charnley said. “It will open avenues for more targeted, effective cancer therapeutics related to glycans.” Both doctoral students see the benefits of this unique approach to improving cancer therapeutics. “It was really intriguing to realize that a single genetic modification could actually make cancers resistant to immunotherapy, make them invisible to the immune system,” said Anim, who is from Ashiaman, Ghana. He earned his bachelor’s and master’s degrees in biochemistry at Kwame Nkrumah University of Science and Technology in Kumasi Ashanti, Ghana. Armoo, who is from Tema, Ghana, said, “For me, it was interesting finding out that a coat of sugar plays a role in resistance to chemotherapeutics. It’s not always a drug metabolite, but also the patients’ own immune system being able to identify the cancer cells.” He began doctoral work at SDSU after earning his undergraduate degree at the University of Bradford in the United Kingdom and a master’s degree from the University of Bradford’s Institute of Cancer Therapeutics. Inspiring future scientists Roh, a Mitchell native, began working on the project as a sophomore. “I wanted to work with genetics, so when Dr. Willand-Charnley talked about cell lines with gene knockouts the first day in my organic chemistry class, that piqued my interest in doing research with her group,” Roh said. “I was the first person to sign on (to the project).” Willand-Charnley said, “Undergraduates (in my lab) are treated like graduate students. My expectation is that they will run their research like a graduate student.” Roh continued, “I found my own papers relating to the topic, read through them and explained why I felt they were relevant and what I learned from them (during the weekly group meetings).” Every three weeks, it was her turn to present her findings to the group—in a professional fashion. In 2019, Roh received the American Chemical Society award for best undergraduate research poster. Even though Roh was the only undergraduate student working on the project, she said, “I had a lot of responsibility. I was able to be shared first author on the paper because I put in equal amount of the work—that‘s what it took.” In addition to doing research part time during the school year, she also spent two summers working full time on the project. Roh, who is now a graduate research assistant in the Department of Biology and Microbiology, feels prepared for graduate school, thanks to her experiences in Willand-Charnley’s lab. In addition to running successful research programs, Willand-Charnley also focuses on diversity and outreach. “One of my goals as a scientist is to increase diversity in the STEM sciences,” Willand-Charnley said. However, “as students traverse academia and get older, we tend to have less diversity, why? One school of thought is that the STEM sciences are seen as intimidating. Thus, how do we fix this?” Willand-Charley is working on launching an outreach program for kindergarten through fifth graders. “I want to elicit interest in the STEM sciences from a very young age. What better way to garner interest and show that science is fun than hands-on demonstrations with scientists in the classroom?”
Serrated Polyposis syndrome Serrated Polyposis syndrome Serrated Polyposis syndrome (SPS) is defined by the occurrence of multiple serrated polyps in the colon and is associated with an increased risk of bowel (colorectal) cancer. Serrated polyps are different from common adenomatous polyps, although these can also be present. They also tend to be flat (sessile), making them more difficult to see during a colonoscopy. They have had different names over the years such as hyperplastic polyps, metaplastic polyps, sessile serrated adenoma and serrated adenoma. Serrated Polyposis syndrome is defined by the World Health Organisation (WHO) as occurring when there is: • either at least 5 serrated polyps proximal to the sigmoid colorectum with 2 or more greater than 10mm in size • or more than 20 serrated polyps of any size distributed throughout the colorectum. Serrated Polyposis is associated with a lifetime risk of colorectal cancer of 15 to 35% in the absence of colonoscopy screening. For comparison, the population risk of colorectal cancer is 6 to 12% lifetime. Also, in SPS the cancers may occur at a younger age. Genetic testing in Serrated Polyposis syndrome The genetic cause of SPS is not yet know. Research is ongoing. Genetic testing to exclude other causes of hereditary colon cancer or hereditary polyposis is usually recommended, especially if there is mixed polyposis or colon cancer at a young age. Management of Serrated Polyposis syndrome For individuals who have been diagnosed with SPS: • Screening colonoscopy to remove all polyps greater than 5 mm performed every 3 to 6 months. • Then, the colonoscopies are done every 1 to 3 years depending on polyp load. • If there are so many polyps that they can't all be removed safely, a colectomy may be recommended but this is not common. The likelihood of a colon cancer developing when this screening is followed is <1%. Low dose aspirin has been shown to reduce the risk of polyps forming. Patients should consider 100mg of enteric coated aspirin or half a usual aspirin for at least 2 and a half years from age 50. Because aspirin can cause bleeding, patients should discuss the risks and benefits with their GP before starting aspirin. Close relatives (parents, brothers and sisters and children) of individuals with SPS are at increased risk of polyps and colon cancer. They should also start colonoscopy screening at age 40. The colonoscopies can be done every 5 years, unless polyps are detected. If polyps are present, the screening should be personalised. Does this sound like you or your family? Has Serrated Polyposis syndrome been detected in you or a blood relative? Make an appointment with Dr Hilda High at Sydney Cancer Genetics. It is a confidential opportunity to discuss your personal and family history of cancer. Genetic testing can be organised and will be bulk billed if you meet the Medicare testing criteria. You can download a printable version of the Sydney Cancer Genetics' "Serrated Polyposis syndrome" information page
Universiteit Leiden nl en Student Sjoerd reveals link between cloth trade and slavery What do the cloth trade and slavery have to do with each other? Quite a lot, as it turns out, as by history student Sjoerd Ramackers demonstrated in his bachelor’s thesis. He reveals that cloth merchant Daniel van Eijs was closely associated with four plantations in Berbice, a former Dutch colony on the north coast of South America. Daniël van Eijs In 1725, a combination of circumstances led to a collapse in demand for Leiden cloth. Some of the cloth merchants were able to live off their assets, but many others went bankrupt or had to find another source of income. Merchant Daniël van Eijs found that income in the Dutch colony of Berbice (British Guiana), where he bought four plantations with two brothers and a brother-in-law. ‘Slavery was one of the few profitable activities’ ‘In those days, it was common for former cloth merchants to invest in plantations,’ says Sjoerd. ‘That made sense; at the time, they were one of the few profitable activities. You could earn a quick buck with tobacco, for example. We already knew that Van Eijs had a share in two plantations. But what we didn’t know was whether he was aware of what was going on there.’ The purchase of a little boy For some time now, Museum De Lakenhal has wanted to know what information can be found in Leiden about the relationship between the city and slavery. So, during his internship at the museum, Sjoerd delved deeper into the life of this merchant. He transcribed more than 1,300 letters himself and read many others that had already been digitised. This is how he discovered that Van Eijs was co-owner of not two, but four plantations, and that he was very much involved in the ins and outs of the business. ‘He literally managed the plantations from Leiden,’ Sjoerd explains. ‘At the beginning, for example, he was outraged that he had been allocated too few enslaved people, which he blamed on a colony governor, who he said was corrupt, who distributed these people among the plantations. Later on, he started to look for solutions. People then had to get married and produce children. I also found a note from the plantation director about a little boy who was bought. His name was Majalla. That was the most profound moment of this research, because it suddenly became very personal.’ The note on Majalla Life on the plantation: people and slaves The correspondence also shone a light on living conditions on the plantation. ‘Van Eijs himself says that no plantation is better cared for than his, but his directors complain about a lack of wine, beer and meat for themselves,’ says Sjoerd. ‘They were also bothered by small flies and found it humiliating that they had to do the same work as black men when the plantation was being developed. They don’t write a single word about their circumstances. To find out about that, I mainly studied the account of a man who fled the plantation, Pieramus. After his arrest, he said that he was afraid that he would die because so many other enslaved people on the plantation had already died, partly because the director was a terrible man.’ Although in their letters the plantation directors did not go into detail about the working conditions on the plantation, Van Eijs must have known that life was hard. Between 1735 and 1737, at least 108 enslaved people were taken to the plantation; by 1737, only 68 remained. At least forty people must have died or escaped. Sjoerd: ‘Van Eijs did give orders to give everyone good food and drink, but he did so mainly because enslaved people were expensive, and sick or dead workers were of no use. In the letters, you can also see that he hardly considers the plantation workers as human beings. He regularly distinguishes between “Christians and the slaves” and once even between “people and slaves”. For him, the enslaved were really just a means of production.’   This website uses cookies.  More information.
preloader Logo Voz terra project Chapter 2 Florencia was founded in 1902 by a Capuchin priest, in an area populated by rubber plantation workers located on the banks of La Perdiz Creek, and other settlers who arrived in the mid-nineteenth century attracted by the bonanza of quinine. However, this territory was ancestrally populated by the Amazonian indigenous people. Later in the 1960s, the Colombian government encouraged the migration of new settlers to this region and the area became enriched with a variety of cultural influences, among which the Huilense culture stands out. Nowadays, Florencia —the capital of the department of Caquetá— is one of the most important cities in the south-east of Colombia and the Colombian Amazon region, due to its number of inhabitants and its institutional infrastructure. It is known as the golden gate of the Colombian Amazon and is located in the piedmont (the foothills) between the Cordillera Central (Eastern Mountain Range) and the Amazon, along the Hacha River –formerly used to transport the quinine and the rubber to the Caquetá River. This is an environmentally privileged area due to the great biodiversity that the mountain range ecosystem still harbors; it’s part of the Amazon Forest Reserve and therefore protected. However, it has also been transformed by activities such as livestock production. The soundscape of Florencia has characteristics that are unique to this place. The combination of elements that build the soundscapes heard in the Curiplaya, on the banks of La Perdiz River, are an example of a characteristic sound scene in the capital of the department of Caquetá. Stop and listen the sounds from Florencia. The Voices of the People Stories and experiences of the communities. Landscapes, places, colors, and textures. The Chapter Caquetá from the VozTerra platform has been possible thanks to the support of the United States Agency for International Development (USAID), under the Conservation and Governance Program in the Amazonian Piedmont, launched by the Patrimonio Natural Fund, in partnership with VozTerra. Its content is responsibility of VozTerra and does not necessarily reflect the opinion of USAID or the United States government or the Natural Heritage Fund.
Wednesday, 26 May 2021 "pV = nRT" Alarmists and Physics Deniers don't actually know what this equation signifies and make themselves look silly by trotting it out as if it somehow supports Alarmist Theory and/or debunks the Gravito-Thermal Effect. Nothing of the sort. There's a full explanation and worked example at This is basic first year level GCSE Physics and nothing controversial. Let's apply it to typical temp, pressure, density at sea level: Pressure = 101,325 Pa Volume = 1 m3 Mass of air in 1 m3 at 'standard temperature and pressure' = 1.227 kg n = number of moles of gas in 1 m3 = mass/m3 divided by molecular mass of 'air', which is 29g/mole R = universal gas constant* = 8.31441 J/K/mol Temp = 288K Stick in the numbers on the right hand side, 1,227/29 x 8.31441 x 288 = 101,314. Close enough to 101,325! Now we've got the hang of it, what's the likely temperature at 10 km altitude? Wiki tells us that pressure up there is 26,300 Pa, density is 416 g/m3. The left hand side is 26,300 x 1 = 26,300 The right hand side is 416/29 x 8.31441 x T = 119.3 x T So 119.3 T = 26,300; and T = 26,300/119.3 = 220K Which is exactly what the blue line on Wiki's chart - and real life measurement - show. Wiki's chart is what you get if you just start by assuming ever increasing density in a gravitational/acclerating field and working from there (see diagram 5). In fact, you can assume constant density, desnity which increases linearly or geometrically as you go down, there would still be a similar profile with increasing pressure and hence temperature towards the surface. Basic maths. Any other outcome is mathematically impossible unless you assume that density increases with height at an implausible rate (in which case, what happens at the top?). * Keen-eyed readers will know that this is Avogadro's number x Boltzmann's constant. Lola said... Er "Density = 1.227 kg/m3" Eh? Mark Wadsworth said... L, I have updated the post to clarify what I mean. James Higham said... "debunks the Gravito-Thermal Effect" Would one dare? :) Mark Wadsworth said... JH, you'd be surprised and disappointed by the number of Physics Deniers out there...
Sociology Index Y Theory Theory X, Theory Z Theory Y or Y Theory assumes that employees are self-motivated, and flourish on responsibility. Enlightened managers use theory Y or 'participative management' style, which produces better performance and results, and allows people to grow and develop. Theory Y employees are dedicated towards work, thus need minimum supervision. Theory Y Effort in work is as natural as work and play. In Theory Y management style, people gain self-worth from doing meaningful work. If the work is fulfilling, the employees will do a good job because it’s important to them. People will apply self-control and self-direction in the pursuit of organisational objectives, without external control or the threat of punishment. Commitment to objectives is a function of rewards associated with their achievement. People usually accept and often seek responsibility. Teamwork, quality circles, and brainstorming sessions are used in theory Y organizations in order to provide platforms for employees to share their ideas and opinions. Managers are likely to give more responsibilities and empower Theory Y employees since they are committed to their work and are enthusiastic about performing well. Imposition of decisions on theory Y employees will lead to their dissatisfaction, and this will negatively affect organizational performance. The capacity to use a high degree of imagination, ingenuity and creativity in solving organisational problems is widely, not narrowly, distributed in the population. In industry the intellectual potential of the average person is only partly utilised. Theory Y assumes that most people want to work, and that they will be self-directed, creative, and ingenious in pursuing individual or collective goals. Theory Y also assumes that they’ll feel frustrated if they don’t get a chance to make decisions and otherwise use their full potential. Theory Y theory has always applied well to independent professionals, small-business owners, and also craftspeople, alike. Theory X and theory Y are referred to in the field of management and motivation and Mcgregor's XY Theory remains a valid basic principle from which to develop positive management style and techniques. McGregor's XY theory is based on the natural rules for managing people. McGregor maintained that there are two fundamental approaches to managing people. Many managers tend towards theory X, and generally get poor results. We can see how X and Y theories can conflict and yet have a lot of crossovers. It’s possible to have both situations true for a manager, depending on the job and the person. Some people are lazy and some are motivated by the desire to do a good job. How can you, as a manager or HR manager, use these X and Y theories to make your company a better place to work?
Vertical Gardening Vertical gardening is a method to bring freshness and delicious vegetables to your dinner table irrespective of whether you reside in the city or have a house with just a tiny garden. You can easily set up a vertical garden on a little terrace if the quantity of sunlight is sufficient. This style of horticulture needs much less water, much less plant food and, importantly, much less of your time! You are also subjected to less weeds (and the weeds that you do end up with are much simpler to remove), and you will certainly have a lot less hassle with bugs. Less weeds and insects leads to healthier plants, and by growing upwards instead of close to the ground, there is much less contact with dirt and disease. Vertical gardening also promotes much better air flow. The amount of sunlight you are able to receive will certainly impact on the type of vegetables that are going to do best in your ecosystem. If your potential vegetable garden is in a comparatively low-light area, keep this in mind when picking veggies you are going to grow. You’ll discover that lettuce, cabbage and various other kinds of veggies will do well in these sorts of lighting conditions. For locations with a great quantities of sunlight, the choice of veggies you are able to grow is much broader. The following veggies flourish well in full sun: carrots, tomatoes, beans, peas, peppers, potatoes and radishes. To grow a vertical garden, any type of container can be used as long as it provides good water drainage. Vine plants thrive well vertically if the container the plant is in is sufficiently deep. They require a proper post on which to grow up on, as well as to be potted with peat moss and an appropriate garden compost. Vertical Gardening Set-Ups 1. Racks Most plants thrive well in any containers with sufficient drainage. With racks, you can easily grow a number of different kinds of veggies and arrange them however you want. You are able to go as high as the racks will permit. With this style of vertical garden, you can easily move the plants daily to make certain they all receive sufficient sunlight as well, simply by exchanging racks. If you use racks, consider utilizing the kind with panels. Panels promote air movement as well as allow water to leak down from the top racks to the ones underneath. 2. Hanging Containers You can put up hanging containers anywhere– on porches, patios or on many other areas. There are numerous hanging methods available. Veggies with trailing qualities succeed well in hanging baskets, and they also bring a gorgeous garden atmosphere to balconies. Tomatoes (cherry-types) and hot peppers look lovely in hanging baskets as well as often thrive well in them. Hanging containers, like most containers, do have to be watered daily, as they usually dehydrate quickly, particularly in hot and dry conditions. 3. Grilles or Trellises Grilles or trellises benefit creeping and trailing plants. You can utilize fencings as grilles for peas, tomatoes, beans, and also cucumbers. For a diverse vegetable garden, try using the stems of other plants or even sunflowers as trellises, also. Ultimately grilles are excellent space makers in vegetable gardens. Good Luck!
作者: 张馨予 发布时间: 2021年08月03日 16:57:13   read the following text carefully and then translate the underlined segments into chinese. your translation should be written carefully on answer sheet 2. (10 points)   there is a marked difference between the education which every one gets from living with others, and the deliberate educating of the young. in the former case the education is incidental; it is natural and important, but it is not the express reason of the association. (46) it may be said that the measure of the worth of any social institution is its effect in enlarging and improving experience; but this effect is not a part of its original motive. religious associations began, for example, in the desire to secure the favor of overruling powers and to ward off evil influences; family life in the desire to gratify appetites and secure family perpetuity; systematic labor, for the most part, because of enslavement to others, etc. (47) only gradually was the by-product of the institution noted, and only more gradually still was this effect considered as a directive factor in the conduct of the institution. even today, in our industrial life, apart from certain values of industriousness and thrift, the intellectual and emotional reaction of the forms of human association under which the world's work is carried on receives little attention as compared with physical output.   but in dealing with the young, the fact of association itself as an immediate human fact, gains in importance. (48) while it is easy to ignore in our contact with them the effect of our acts upon their disposition, it is not so easy as in dealing with adults. the need of training is too evident; the pressure to accomplish a change in their attitude and habits is too urgent to leave these consequences wholly out of account. (49) since our chief business with them is to enable them to share in a common life we cannot help considering whether or no we are forming the powers which will secure this ability.if humanity has made some headway in realizing that the ultimate value of every institution is its distinctively human effect we may well believe that this lesson has been learned largely through dealings with the young.   (50) we are thus led to distinguish, within the broad educational process which we have been so far considering, a more formal kind of education -- that of direct tuition or schooling. in undeveloped social groups, we find very little formal teaching and training. these groups mainly rely for instilling needed dispositions into the young upon the same sort of association which keeps the adults loyal to their group.   46. benjukaodian:binyucongju,of duanyuzuodingyu,daicizhidai, butyindaobinglieju   jiegoufenxi:juzizhuganshi:it may be said that…, but this effect… its effectjiits original motive.zhongitzaijuzhongzhidaisocial institution。   47. benjukaodian:qiangdiaoju,fencijiegouzuohouzhidingyu, shenglve   jiegoufenxi:qiangdiaojudezhengchangyuxushi:the by-product of the institution was noted only gradually, and this effect …was only still more gradually (noted). considered as a directive factor in the conduct of the institutionzuothis effectdehouzhidingyu。   48. benjukaodian:bijiaozhuangyucongju,dongbinfenge   jiegoufenxi:benjuzhuganshiwhileyindaodeyigebijiaozhuangyucongju。in our contact with zuoweiyigecharuchengfen,fengeleignorehetadebinyuthe effect of…。   49. benjukaodian:sinceyindaodeyuanyinzhuangyucongju,daicizhidai,binyucongju,binyucongjuqiantaodingyucongju。   jiegoufenxi:benjuzhuganshisince… we cannot help considering…qizhongwhether or no we are forming the powers which will secure this abilityzuocannot help consideringdebinyu,which will secure this abilityzuoweiqiantaodingyucongjuxiushithe powers。   50. benjukaodian:charuyu,dingyucongju,tongweiyucongju   jiegoufenxi:within the broad educational process which we have been so far considering zuoweicharuyu,which we have been so far consideringweidingyucongjuxiushiprocess,benjuzhuganshi:we are thus led to distinguish a more formal kind of education. that of direct tuition or schoolingyua more formal kind of education shitongweiyuguanxi。
How to get cell lines back in excel How To Get Cell Lines Back In Excel Scroll down to the section – “Display options for this worksheet”.An excel sheet will automatically open upon clicking on Microsoft Excel Indenting Individual Lines in the Same Cell.There you go For example, in Excel 2007 and later, select the cells to format, navigate to the Home tab and click the Format Cells icon (downward pointing arrow in the lower left corner) in the Number group.Now from the context menu choose the Format Cells.For example, merging a cell range in the A and B columns would leave you with a cell that spans the A.Of course, if you want the text to automatically wrap, set the property of the cell(s) to Wrap Text by selecting the cells, then clicking the Wrap Text button (Home.Volatile 'With "Application.Go back to your Personal Workbook code, where you can see the "ThisWorkbook" code module.Note: In older versions of Excel on a Mac, use CHAR(13) instead of CHAR(10).I tried format cell and used the little dotted line, but it still came out dark.Then, click the place where you want to insert a line break.If you need multiple lines, just repeat the key combination.Dear friend, Many thnks for the code.You use the shortcut when you are editing a cell.Copy the formula to the rest of the cells using the Ctrl + D or dragging it down from the right bottom (tiny box) of the applied cell.However, I can tell you that Excel cannot sort text within a cell When in Excel, pressing ‘Enter’ (in the cell or in the formula bar) like how you would in Microsoft Word would only move the cursor to the next cell: To start a new line, double-click the cell which contains the text.Find the cell that you want to unmerge, then click it once to select it.In the how to get cell lines back in excel Excel Options dialog box that opens, click on the Advanced option in the left pane.To mimic the Powerpoint look also add a white border..In the Format values where this formula is true box enter the following formula: =MOD (ROW ()) = 1.The above steps would stop showing the page.The areas with borders will now appear with darker lines.Go back to the Borders button and choose a border outline.Gridlines in Excel apply, by default, in the whole worksheet or workbook, and cannot be applied to a specific section of the worksheet.The number of spaces used to replace the line delimiter is based on the total length the text in the cell.The syntax of OFFSET Function:.Microsoft Excel makes it simple to get started entering spreadsheet data of your grades, hourly earnings or even your MP3 track listings, and the application displays your data in neat, organized rows and columns on the screen.Choose the excel cells in which you want to fix Excel cells overlapping issues.Summary: MS Excel is a program that helps users to import and format data to design and create spreadsheets, charts, graphs, and perform numerous functions.Here at the steps: (1) Move the cursor where you want to break the line (2) Type Alt + Enter (3) Make sure "wrap text"is enabled to see lines how to get cell lines back in excel wrap in cell: Notes You can use this technique to make nested IF. Vitamin Store Vs Gnc Right click the cell and select Format Cells.To start a new line of text or add spacing between lines or paragraphs of text in a worksheet cell, press Alt+Enter to insert a line break.To select multiple cells at once, click on the first one and drag the cursor left or right.And then choose the diagonal line option at the bottom right of the menu.Navigate to the Borders tab and create the borders you want.Note: If you want to show lines in Excel, pick the No Fill option.Suppose we have a chart for data, and we can see that there is a dip in sales for a company.To unhide, select an adjacent column and press Ctrl+Shift+0.Select your data and open the Text to Columns wizard.To select individual cells, press down the control key, and select each cell.To have multiple lines in a cell can be done using Word Wrap which is a form.There are basically two possible solutions.Now we will check if all cells contain specific text..But sometimes you want to look back on the formula to see what it is This will allow you to add another line within the same cell: Then, when you have all your lines of data in that one cell, you can hit Enter.The row Height will initially stay the same Right click the cell and select Format Cells.Select Text to Columns in the Data Tools section Hide a column: Select a cell in the column to hide, then press Ctrl+0.Or, you can click one in the top left cell you want to select, and then Shift-click the bottom right cell to select a whole block.The areas with borders will now appear with darker lines.Hold down the ALT key on the left of your keyboard.Written by co-founder Kasper Langmann, Microsoft Office Specialist.Here is a better way to remove these dotted lines: Click on the File tab.While you can change the indentation for a whole cell, you can not automatically indent individual lines of a cell.They distinguish cells from each other and make data in them more legible By default the gridlines are active on how to get cell lines back in excel Excel Go to the Font group on the HOME tab and open the Fill Color drop-down list.If you want to make a certain section of the worksheet different from the rest, use border lines to make customizations to specific cells or group of cells Grid Lines Not Showing in Excel.After that press the Enter key, it will split the text and return it into separate rows Steps.Select your cells, go to the Data tab, and click “Outline.At least I know I can get it to do what I want, but it is still a mystery as to why I have to try so hard.3# the Find and Replace dialog box will appear on the screen.Or if a cell is crossed out, uncross it out.; You can also use the right-click context menu and the format options on the Home tab to hide or unhide individual rows and columns Now, using the scrolls isn’t one of the best ways to get back to that cell.Go to the Data tab in the ribbon.Moreover, manual methods in Excel are later on or for other users usually not replicable.The formula then uses the MID function to extract the desired line Solution 1: Returning the how to get cell lines back in excel indentation with an easy VBA code.To prevent Excel cells overlapping the very first solution you need to use is the format cell option.You can see it from the above image.This ALT+ENTER key combination lets you put multiple lines within a single cell.From your computer, laptop, or tablet search for Microsoft Excel and click to open it.Unfortunately, you can not do that using the indenting options covered above.Scroll to the top of the module, and make sure there is only one "Option Explicit" line Click “OK” and get ready to create the outline.As you can see in the screenshot above, applying the white background will give an effect of hidden gridlines in your worksheet Understanding Excel Gridlines. Tegretol xr discount card, in back how lines cell excel to get I swear I have done this before, but just because someone asked me how I.You like to use gridlines when working with spreadsheets, how to get cell lines back in excel but you’ve received an Excel spreadsheet without gridlines from someone else.You can also do this in the formula bar.You can choose to draw your line.Excel’s OFFSET function returns a reference to a range that is a given number of rows and columns from a given reference.Further on in this tutorial, you will find full details on all these techniques..Excel will make the contents of each cell visible by displaying it on multiple lines.Normally, when you press the Enter key, Excel moves the cursor to the next cell.You can use FIND and REPLACE to replace white spaces from a cell, here are the steps: Select the cell or range of cells from which you want to remove white spaces.Indenting Individual Lines of Text in a Cell.Paste in the text that you copied.If you want to enter a line break inside the same cell, you need to use a shortcut.When you fill a cell, the borders will remain On the Home tab, in the Font group, click Borders > All Borders.Double-click the cell in which you want to insert a line break (or select the cell and then press F2).As you can see we found all the given department id employees using the above method.For example, in Excel 2007 and later, select the cells to format, navigate to the Home tab and click the Format Cells icon (downward pointing arrow in the lower left corner) in the Number group.The number of spaces used to replace the line delimiter is based on the total length the text in the cell.I want the lines to look like they do on the screen.Click the Format button and set the required format.In how to get cell lines back in excel the preview, make sure the gridlines look the way you want them to, and then click Print..You will then see all the contents.Select Text to Columns in the Data Tools section Type the how to get cell lines back in excel text you require for the first line.However, you can still get this effect by completing the following steps: Select the desired cell(s) 1# Use Format Cells Option.The result will look like this. How to get prescribed viagra online
Secured Loan Definition Definition of the secured loan Guaranteed loan before uncovered credits are paid back. Loan secured. Secured loan is a loan that is secured by securities, such as a house or automobile. Failure to make payment on due date can result in the creditor taking ownership of your securities and selling them to get the loan back. For the most part, creditors calculate a lower interest for a secured loan than for an uncollateralised loan of similar magnitude. Uncovered credit is ensured only by your payment commitment, not by securities. Guaranteed corporate credits It is one of the easiest ways of distinguishing between corporate financing instruments to determine whether or not the credit is secured.} This page will look at secured vs. uncollateralised mortgages, the difference between using collateral and taking out an uncollateralised commercial loan and what this could mean for your company. An secured loan is secured by collateral, usually precious objects and objects that belong to your company. Collateralised loans are often referred to as asset-backed lending because they are corporate loans secured by collateral. As a rule, the identifiable non-financial fixed assets include industrial real estate, machines and motor vehicles. 2. However, there are other kinds of secured loans - for example, invoicing financing uses trade receivables. We also have items such as dealer advance payments, which are dependent on the sale of map terminals but are not secured by technical collateral. An enterprise that is looking for funds to buy a rival company will secure the financing of machines and office space - with a much longer duration than normally possible. b11a98421e3. js"; var el ('document. createElement('script'); el. asynchronc = true; el. on-load = setup_company_number_input; document.head. appendChild(el); el. src=script_name; }); in comparison, uncovered corporate credits are not secured by an assets. This means that there is a higher level of creditors' exposure - as they have no guarantees that they will get their cash back - so you will usually be paying more interest with uncovered mortgages. This is why most corporate financing alternatives are secured against something. As a rule, uncollateralised corporate exposures are backed by a company's commercial exposure. It is, for example, usual for creditors to give the loan amount as a multiples of the sales - this way they can make a fairly accurate estimation of the prospects of your enterprise on the basis of the way it has worked in the recent past. Unencumbered exposures typically involve backgrounds and ratings where the creditor considers both the director's and the firm's performance records. It is also quite frequent for creditors to ask for face-to-face warranties for major unsecured credits. Large uncollateralised corporate exposures are usually only an options for companies with a high cash flow exposure. What makes you think you want an insecure corporate loan? This is either because you want to lend more than your wealth is worth, or because you choose not to provide certain types of asset as collateral. Mains flow lenders are usually willing to loan high sums in secured mortgages when the shop has appropriate collateral to provide, but then they do not loan more than about 40,000 pounds unprotected. There are more risky credits from the banks' point of views to a firm that has no asset to back the loan - and even a rock-solid financial standing is not enough to convince a bank to borrow more than £40,000. What kind of credit is right for my company? Since there is such a large diversity of financial alternatives, we cannot be too particular about whether the use of securities or uncollateralised corporate credit is "better" for your company. If you want an uncovered loan, does your company have a proven record that the borrower can rely on? Here is a synopsis of the advantages and disadvantages of secured and uncovered loans: Locked: Unprotected: Few companies have the assetspread to hedge large exposures - uncovered can be a more readily available form of financing. Mehr zum Thema
Help children learn to protect their eyes from an early age Many children have impaired vision as a child. Therefore, many parents think that only eye surgery can make the child's eyesight improve again. However, the reality is that there are still many other natural methods to help improve children's eyesight. Here are some of the most detailed methods that parents should apply for their children to best protect their children's eyes. Protecting children's eyes from an early age is what we should do There are several effective methods to help protect children's eyes Let your baby go to bed early Staying up late is not a good habit for the eyes. Therefore, parents should practice habits for children to go to bed on time. Getting enough sleep not only improves eyesight in children. But it also ensures the development of the child. Wash your child's eyes after waking up In the morning as soon as the baby wakes up. Besides brushing and washing the child's face. Parents should also practice the habit of careful eye-washing. By wetting with a medical gauze or a clean towel. Then, use eye towels in the direction from top to bottom and from outside to inside. As for the eyelid area in children, you can also instruct your child to clean themselves by using a cotton swab and cleaning the base of the eyelash. Absolutely do not touch the conjunctiva and should use warm water to wash the eyes. Do some eye exercises If you want to improve your child's eyesight. You can also teach your child some eye exercises. It is best to be a role model for children to learn and know how to protect their eyes well. For exercises, you can guide your child from the simplest exercises. For example, focus on looking at an object in the car, observe an object closely for about 10 - 15 seconds. Then, focus on something very close and repeat 3 - 5 times. Do eye exercises to improve your child's eyesight Do not put too much strain on the child's eyes Many parents just because they want their children not to play, so they let their children freely watch TV, phone, .... However, this is the main cause of destroying children's eyesight. Because these activities will make the child's eyes no longer have time to relax and rest. If the child's eyes work too hard for a long time. Over time they will develop serious vision problems. Children will be nearsighted, confused or farsighted. So, to improve children's eyesight in the best way. Parents should encourage their children to be active outdoors instead of sitting for hours in front of the computer as before. Improve your child's diet To improve your child's vision, encourage your child to eat plenty of green vegetables and fruits. In addition, children should also supplement many foods containing Omega-3, beta carotene, and Vitamin A. These are all ingredients that help ensure improved eyesight. In addition, whole grains also help reduce macular degeneration in the eye area of ​​children. Try to let your child have regular bowel movements Frequent constipation can adversely affect the child's eyesight. Therefore, parents need to make a balanced diet for the child. Also, encourage your child to drink plenty of fluids to avoid constipation. Not only that, parents should also pay attention to the child's daily defecation problem. Because in many cases, children are busy playing without paying attention to having to defecate. Besides the above ways, you can also combine to use more products NUTRIGEN OMEGA FISH OIL SYRUP. This is a product that helps supplement Omega 3, Omega 6, DHA, EPA, some vitamins and minerals to support the eyes and brain in the best way. Thanks to that, from an early age, children's eyes will be best protected. The above are the most popular and effective methods that you should apply to protect your child's eyes from an early age. Hope the above information of Amvipharm will be effective for you. Source: Internet News Related There are no comment for this news. Write a comment
Did you know that anxiety affects over one hundred million people in the world? it is among the most common illnesses nowadays and often times requires long-term treatment. The symptoms of this disease can be split up into two categories: physical signs and emotional signs. The physical symptoms can include anything from heart palpitations and excessive sweating to trembling and a flushed face. On the other hand, the emotional signs are diverse but can range from nervousness and insomnia to restlessness and irritability. Having trouble focusing on a task is yet another anxiety symptom. All things considered, anxiety can affect the way we interact with the people and the objects around us on a daily basis. Causes of anxiety Anxiety CausesConsidering that there are different types of anxiety, there are also different causes to this disease. Sometimes, our body can be at the root of the condition. However, most of the times, several external factors have a say when it comes to dealing with stress and anxiety levels. For instance, going through a traumatic event such as the death of a loved one or an accident can inadvertently lead to an anxiety disorder. Other common causes include financial and workplace stress. The way the human body reacts to these stimuli dictates whether or not one is prone to anxiety. The brain has an almond-sized organ named the amygdala, which creates and saves memories. Any threatening situation can trigger a response on the part of the amygdala and thus create a correlation between the said situation and the memory of a stressful event. Types of anxiety Multiple studies suggest that there are now six main types of anxiety. Each and every one of these is characterized by different signs. The six anxiety disorders are the following ones: • GAD • OCD • Panic Disorder • Phobias • PTSD • Separation anxiety • SAD Anxiety CausesGAD stands for Generalized Anxiety disorder and occurs when people tend to feel nervous continuously. OCD stands for Obsessive Compulsive Disorder. This type is characterized by obsessive behaviors which may range from counting items to the tendency of washing your hands all the time. Panic disorder makes the person suffering from it go through traumatic experiences over and over again every time something wrong happens. Phobias are generally thought of as being irrational fears that make a human being be afraid of something in particular. One might be afraid of insects, open spaces or heights. Each of these fears has its own name. Anxiety CausesPTSD stands for Post-Traumatic Stress Disorder. This condition occurs when the patient goes through a trauma. Separation anxiety can be seen in children when one of the parents either dies or leaves the house following a divorce. Some of the signs that can be seen in children include loss in focus and the inability to interact with other children of their age. Social anxiety disorder is correlated to shyness. Since it is one of the most common problems that humans face nowadays, it’s important to know that it is characterized by the fear of being ashamed by an experience or by other individuals.
Be the Bridge FacebooktwitterredditpinterestlinkedinmailReading Time: 4 minutes History will recall 2020 as the year like no other. Its global pandemic, economic recession, and civil unrest over racial injustice are unlike anything seen in modern times. This calls for pause and reflection, especially on the part of Christians. Because we are salt and light in the world, our actions should cause people to glorify our Father in heaven (Matthew 5:13-16), and how we respond to the current political and social upheavals will be a matter of curiosity to future generations. Therefore, we continue our conversation about racial reconciliation, preceded by two previous articles. In them I used the story of the 1967 collapse of West Virginia’s Silver Bridge to highlight the critical need for “bridge persons.” We turn now to that classic story in John 4 in which the ultimate bridge person — the Lord Jesus — is mightily at work. Bridge Builder Here we see Him building a bridge across a racial and religious divide that had existed for centuries. In 722 bc, the Assyrians invaded Israel’s Northern Kingdom and took many Jews into Babylonian captivity. However, only the cream of the crop was taken, so Assyrians were imported to maintain control over who remained. This led to intermarriage, resulting in a mixed race known as Samaritans. To make matters worse, the Samaritans instituted a separate system of worship, which intensified the Jews’ hatred of them and resulted in some eight hundred years of ethnic and religious tension. By the time Jesus arrived on the scene, things had degenerated to the point that Jews and Samaritans had nothing to do with one another. In fact, the Jews called the Samaritans dogs! That’s why Jesus’ encounter with the Samaritan woman is so remarkable. Not only does He initiate a conversation with her, He asks her for a drink (v. 7). This catches her off guard, revealed by her response (v. 9). In today’s language, she asks Jesus, “Don’t You know that we don’t drink from the same water fountain?” Yet, with tenderness and love, Jesus cuts through her biases and stereotypes one layer at a time. The woman soon perceives that He is no ordinary Jewish person (v. 19). Eventually recognizing Him as the Messiah, she hurries back to her neighborhood to call family and friends to “Come, see a man” who has radically changed her life (vv. 28-30). This didn’t immediately resolve the centuries-old conflict between Jews and Samaritans, but it created a new opportunity for healing and reconciliation. That’s what bridge persons do, and here Jesus shows us how. Godly principles Notice His bold intentionality. Jesus is on His way to Galilee (v. 3) but chooses to travel by way of Samaria (v. 4). He goes out of His way to meet this woman, which requires walking across a social and ethnic boundary line that had kept people apart for too long. For us, this may mean a walk across the room or across the street to the neighbors’ house, or initiating a conversation at the grocery store, at school, or maybe at church. A helpful resource for starting such conversations is a book I highly recommend titled Be the Bridge: Pursuing God’s Heart for Racial Reconciliation, by Latasha Morrison. A black woman, Morrison experienced growing uneasiness over the historical and cultural disconnection within the mostly white environments she worked in, both in corporate America and as staff member at a Christian church. She found that “few people understood the history of Black America, much less the full implications of our country’s discriminatory past.” She also found that many of her “non-White friends” had little or no appreciation for the ineptness of whites in this regard. This inspired Morrison to build a bridge between these two worlds, which evolved into a movement. Now reconciliation is being fostered as people come together in a posture of humility around Be the Bridge resources. Not only is Jesus intentional, He also finds common ground: a mutually acceptable place to meet with the woman. Jacob’s well (v. 6), with historical ties going all the way back to Isaac and Abraham and a place to which both Jews and Samaritans lay claim, serves as the perfect spot! Finding common ground on which to connect with people who are different than we are is critical in the work of reconciliation. This requires focusing on what we share in common — our similarities and mutual interests, not our differences and disagreements. Finally, Jesus leans into one of the hottest socio-political issues of His day, daring to take His stand on the right side of that issue. This is no small matter. Undoing social and racial barriers never is, especially this one. The Samaritan woman is a social outcast. Some speculate that this is why she comes to the well at noon (v. 6) instead of early morning. Her checkered past, including five broken marriages, keeps her out of the “in group.” Worse yet, she is a Samaritan, placing her on the wrong side of the railroad tracks. But Jesus has no regard for such a boundary line. He knows that the evil of racism only makes an already broken world more broken and flies in the face of the God who made all humankind of one blood (Acts 17:26). Jesus enters the Samaritan woman’s space and affirms the beauty of God’s image in her, and He offers her salvation. This changes her life forever. Racism is more than a skin issue; it’s ultimately a sin issue, and the gospel is its best cure. What happens when the villagers come running to Jesus at the Samaritan woman’s behest, John leaves to our imagination. The impact of unconditional love and acceptance is often too powerful for words. Imagine the joy, the healing, the ripple effect. Jesus invites us to do the same in our day, to join Him in His grand mission in the earth, captured in this beautiful sentence: “Behold, I am making all things new” (Revelation 21:5). Those who do will make the greatest difference in our nation’s current crisis. And it’s not complicated. Just build a bridge. Better yet, be the bridge! After all, you’re a leader, and leaders are bridge persons! Whaid Rose Whaid Rose, former president of the General Conference, is dean of the Artios Center for Vibrant Leadership and pastors the Newton, NC CoG7. He and his wife, Marjolene, live in Denver, NC.
How do you pronounce Khmer in Cambodia? How do you pronounce Khmer in Cambodian? The correct pronunciation of Khmer in the Khmer language is Km-ah-eh. Is Khmer pronounced KMAI? It’s just a question of which language your are speaking. When you’re speaking English it’s pronounced Khmer, when you are speaking Khmer it’s pronounced Khmer. How do you pronounce the name Khmer? Khmer names are usually pronounced with the stress (emphasis) placed on the last syllable. Khmer uses a glottal stop (the brief stop in uh-oh) and other stops: p, t, c and k which may or may not occur with aspiration. How do you pronounce Phnom Penh in Khmer? Phnom Penh is pronounced pa-NOM pen. In Khmer, the ‘h’ after a P is not pronounced the way it is in English, it softens the ‘P’ as it does to the ‘n’ at the end of “Penh”. What is the meaning of Khmer Rouge? Is Khmer easy to learn? Khmer is a truly difficult language for Westerners to learn, harder than Mandarin to speak, and harder than anything other than Chinese or Japanese to read. There are several difficulties. First, many of the vowel sounds are unlike anything in a European language and are only subtly different from one another. IT IS INTERESTING:  Your question: Does Singapore have districts? What is the most common last name in Cambodia? Most Common Last Names In Cambodia Rank Surname Incidence 1 Sok 227,594 2 Chan 219,516 3 Chea 217,800 4 San 212,054 What does Srey mean in Khmer? 93. Srey (Girl): Meaning ‘feminine‘ or ‘girl’. 94. Srey Mom (Girl): Means ‘beloved girl’. How do you spell the capital of Cambodia? Phnom Penh, also spelled Pnom Penh or Phom Penh, Khmer Phnum Pénh, capital and chief city of Cambodia. Inside view of Asia
Mitral Valve Disease The heart has valves to ensure that the blood flow is in the right direction. The mitral valve is situated between the right atrium and the main pumping chamber of the heart (the left ventricle) at the inflow of the left ventricle allowing it to fill with blood (known as diastole) when the valve is open before ejecting blood into the circulation (known as systole) when the valve is closed. The two main problems in mitral valve disease are narrowing (Mitral Stenosis, MS) and leaking Mitral Regurgitation (MR). Both have different effects on the heart however ultimately they can both cause serious problems with breathlessness and heart failure. If treatment to a heart valve is proposed it is preferable to do this before the heart becomes significantly damaged so early diagnosis and careful surveillance are important. When investigating possible mitral valve disease in the clinic your cardiologist will need to take history and perform a physical examination. In addition they will want to perform some tests which will often include blood tests, a chest x-ray , ECG and echocardiogram. Further tests including a coronary angiogram , CT scan and MRI scan may also be necessary. Depending on the results your cardiologist may recommend continued follow up with medical therapy if appropriate and regular clinical surveillance including echocardiography. If intervention is needed this will usually require surgical treatment (mitral valve repair, a mitral ring or replacement). Transcatheter mitral valve repair and replacement is complex and at a relatively early stage of development however it is a rapidly evolving field. Image of normal mitral valve and leaking mitral valve-in this case due to prolapse National Heart Lung and Blood Institute Dr Dalby will discuss these tests, their implications and any subsequent tests, treatment or follow up with you so that you may reach a mutually agreeable management plan.
Nieuhof on Kerala The contributions of John Nieuhof, Moens, Van Rheed, Rev Philips and Canter Visscher in recording the history of Kerala is stupendous. The language, the attire, customs and practices and the administration created a sense of curiosity in the minds of the Dutch. Renowned historians had authored history of Kerala based on Cater Visscher’s letters. K Sivasankaran Nair has translated Nieuhof’s letters into Malayalam. John Nieuhof Nieuhof compared Kerala with the Netherlands. He was in Kerala in connection with his military services. He adopted several strategies to gain control over Kerala. In between he found time to document the history with available materials. He was in Kerala for five years between 1661 and 1666. Army men or Nairs Oil Extraction Digging Well Ornaments Making John Nieuhof According to him, "Kerala is the region where people use Malabar language (Malayalam), for communication and is located 50 league south of Goa and extends, up to Kanyakumari. Malabar reminded him of Holland as the region had a number of inland pools and canals for transport. The rivers are lees deep and unsuitable for vessels and barges. Like the people of Holland, the people of Malabar squat on the floor for meals. He had also recorded the presence of bats and wolves as if in Holland and had observed that the bats were intoxicated after consuming nectar form coconut flowers. Wolves fed on dead bodies at the grave yards, and on new moon days the pack of wolves howled. The houses were built using bamboos and coconut fronds. Roofs of certain houses were covered with copper. Each house had a forecourt, with three rooms. Temples and palaces were made of granites and were built on the banks of rivers or fresh water pools. The houses were built using bamboos and coconut The utensils were made of coconut shells. Rich people used metal vessels. Rice, meat, fish, spices, fruits, milk and eggs were their main food. They consumed toddy daily. Very few were vegetarians. The army men ingested opium. According to Nieuhof, there were five categories of people, besides Christians and Muslims. They were the rulers, Brahmins or priests, army men or Nairs, traders, Paravars and Pulayars, the backward classes. Brahmins were revered. But most of them were priests and very few were defense personnel. Only Brahmins were permitted to perform pujas. They abstained from taking non vegetarian food and wore footwear. The attire was palathar and covered the torso with a long thin white cloth. The Brahmin wore nose rings in gold studded with precious stones. They adorned their hand with bangles. They never maintained contact or relation with other communities. There existed a small community of Brahmin who were escorted by a small team, who kept others from intersecting their path. They shouted ‘Pooh..Pooh’ (go away....go away). The men of this community never engaged in marital life and consumed a kind of fruit which had the capacity to suppress the physical desires. Palm Trees Nairs or Warriors: They were trained warriors. They hold drawn sword. The men and women adorn the ear lobe with rolled cadjan leaf initially and then with silver or gold. Muslims were escorted by Nairs and he might be a youngster or adolescent. But their very presence of Nairs, Muslims had a sense of security. Physical contact even by mistake with lower caste would pollute the Nairs. They were best wrestlers as well. Nieuhof further observed that a male member of the Nair family is permitted to marry once. But the women had the privilege to marry thrice. The three husbands gave her their share to run the family. They lived peacefully and they take turns and kept a drawn sword in front of the bedroom. The community followed the matrilineal system of succession in which the power was transferred to brother and sister’s sons. Tapping toddy and making handicrafts from the coconut products were the occupations of the Tiyyas. Paravars were after the shell animals and while the Pulayars and Arayars depend on fishing. Paravars were converted to Roman Catholics. It was St Francis Xavier who reached India in 1540 absorbed them into the RC community. When Nieuhof reached Malabar, there were 2500 Christians, and it increased to 4,000 when he left Malabar. Malabar Muslims were highly money minded. The rich Muslims and the pirate Muslims always carried arms. The traders wore red cap and sometimes covered their head with a long robe, decorated with tassels. They grew beard and not moustache, the long upper clothe made of silk or cotton reached beyond the knees. They tucked money in the silk kerchief. According to Nieuhof, only the Zamorins had the power to mint coins. The ruler never entered into wedlock but maintained relation with a woman of his choice. The offspring had no right to rule as they follow the matrilineal form of succession. When a ruler dies, the mourning lasts for 13 days and the new ruler takes over the charge. The new ruler vow to conquer the regions if any lost by his predecessor. After assuming power rice grain is sprinkled on his head. He stood facing the east and chanted certain verses from the scriptures. Only the ruler had the power to punish. Dipping hand in boiling oil, holding fast on red hot metal, forcing to dive on water bodies inhabited with crocodiles were some methods of punishment.  Nieuhof recorded incidents of Sati, in which widows self immolates in the pyre of her dead husband. To mask her wail, drums were played loudly. Sati was not compulsory. But in such places, the widow is kept away from the mainstream. The wedding, Nieuhof witnessed, had the bride and groom arriving the venue of elephant back. The procession halted in front of the houses of friends and relatives. Sweets and coconuts were distributed to the participants. Snake Worship According to Nieuhof, the New Year was observed on the first of Malayalam month Kanni. Malayanman or Malalayalam is the language prevalent in Malabar. The people used processed cadjan leaves and stylus. The cadjan leaves were of same dimension. The collections of such leaves were threaded using silk. Nieuhof says Nairs were staunch believers. They conducted feasts in the temples on auspicious days. The rich distributed gold or silver coins along with the betel leaf and areca nut. They believed that serpents were God sent for the sins committed. Nieuhof was the first Dutch to study the flora and fauna of Malabar. Within his short stint in Malabar he recorded the medicinal values of the flora. The making of camphor, its use, the medicinal properties of Kacholam, kadukkappale, trees yielding fruits similar to oranges; kudampuli, kattarvazha, agathi, kottam, kozhimji, fig, cotton, marotti, kanjiram, chembakam, pavizhamalli, elanji, coconut etc.
Sleep On Your Side During Pregnancy Sleeping on your side from 28 weeks gestation and beyond reduces your risk of stillbirth. Sleep on your side when baby is inside This is because lying on your back in the later stages of pregnancy puts pressure on major blood vessels, which can reduce blood flow to your womb, and restrict your baby’s oxygen supply. Research tells us that going to sleep on your side halves the risk of late-term stillbirth compared with sleeping on your back. Currently, stillbirth after 28 weeks of pregnancy affects about one in every 500 babies and is more likely to occur unexpectedly in normally developed babies whose mothers have had uncomplicated pregnancies. Adjusting the sleeping habits of pregnant mothers has the potential to prevent stillbirth. Red Nose recommends from 28 weeks of pregnancy, women settle to sleep on their side for any episode of sleep. This includes going to sleep at night, day time naps and returning to sleep after waking up. The going-to-sleep position is held for longest period, during which women have periods of deep sleep, so it’s very important rest on the side. Women should not be worried if they wake up on their back; changing positions during sleep is normal. Red Nose advises women to roll back onto their side if this happens. The important thing to remember is to make an effort to start every sleep in a side lying position, even if sleeping on the back is preferred. Sleep on your side when baby’s inside. For more information on looking after your baby during pregnancy and preventing stillbirth, visit our advice hub. Last modified: 2/6/21
Various Applications of Solar Panels across Sectors General Introduction to Solar Panels Monocrystalline solar panels are generally considered to be a high-end solar product. The term “monocrystalline” refers to the fact that the silicon used in these panels is single-crystal silicon. The electrons that form an electric current have greater room to move because the cell is made up of a single crystal. Monocrystalline solar panels are regarded as a high-end solar product. Higher efficiency and sleeker looks are the key benefits of monocrystalline panels. Silicon is produced into bars and then sliced into wafers to manufacture solar cells for monocrystalline solar panels. The term “monocrystalline” refers to the fact that the silicon used in these panels is single-crystal silicon. The electrons that form an electric current have greater room to move because the cell is made up of a single crystal. As a result, monocrystalline panels outperform polycrystalline panels in terms of efficiency. Solar panel technology has advanced significantly over the years, and a variety of new solar panels are now available on the market. However, when deciding on solar panel for your PV system, keep the following in mind.To persuade buyers, monocrystalline solar panel manufacturers emphasize the panel’s superior aesthetics as well as efficiency. Two of the most popular types in this category are SunPower monocrystalline panels and LG monocrystalline panels. Silicon wafers are used to make solar cells for monocrystalline panels (the silicon is first formed into bars and then it is sliced into thin wafers). Because it uses single-crystal silicon, the panel is called “mono.” Because the cell is made up of a single crystal, the electrons have more room to move, allowing for improved electricity flow. Coefficient of Temperature Because of their greater temperature coefficient, monocrystalline solar panel can provide higher efficiency in hot weather. As the temperature rises, the output degradation of monocrystalline panels decreases. If you live in an area where the summers are longer and hotter, the temperature coefficient of the solar panel you choose should be carefully considered. If your roof area is restricted but you need more solar power, monocrystalline solar panel may be a good option because of their higher efficiency. In your circumstance, it is worth paying the extra money for solar panels because you will be able to maximize your power production even if you do not have enough room for a PV system.The panel’s efficiency improves as the absorption of radiation increases. The benefit here is that adding a passivation layer will not greatly raise the cost, and the efficiency advantages will outweigh the extra cost. Application Of Solar Panels Solar water pumps Mechanical pumps are used in a variety of applications currently. Pumping water from wells, aquarium filtering, pond filtering, and aeration are all typical uses for them. When it comes to water pumps, their primary function is to exchange fluids like water. Pumps are used in a wide range of applications, from agriculture to the energy industry. A water pump’s principal functioning concept is based on the positive displacement principle and kinetic energy, which helps push the water. In the field of mechanics, solar water pumps are a relatively recent concept. Solar water pumps are extensively used in home and commercial settings, as well as for agricultural irrigation. The pump can eliminate the expense of energy by using solar panels, making it a more viable option for pumping water that uses solar energy rather than fuel-burning devices. A solar water pump is made up of a calibrated solar array of modules that is set to the pump’s equivalent power for that particular application. Commercial solar panels Industrial facilities in off-grid or remote regions can benefit from commercial solar panels. Signs and message boards can be illuminated using commercial solar panels mounted on building rooftops. Solar energy charges the battery, allowing the signs to remain lit even at night. The solar panel for commercial use absorb clean renewable energy from the sun and convert it to electricity, which is then utilized to power electrical loads. Solar panel is made up of several individual solar cells that are placed in a grid-like arrangement and are made up of layers of silicon, phosphorous, and boron. The energy created by these solar cells is transmitted to an inverter, which converts the DC power from the solar panel into AC electricity, similar to that provided through the utility grid . To generate more electricity, commercial solar panels use a high number of solar arrays. Commercial Solar Panels Characteristics • Commercial solar panels can be installed on the rooftops or open space accessible in commercial buildings since they have adequate room to accommodate a big number of solar panels and produce enough solar electricity to cover all of their power needs. • The commercial solar panel generate enough electricity during the day to be stored and harnessed for usage at night. • Commercial solar panels are extremely durable and require little upkeep. • They have a lifespan of over 15-20 years, and the electricity generated on the system is completely free after installation. jenny clarke Leave a Reply Back to top
raw feeding cats High levels of carbohydrates in the diet of a cat will lead to chronic high blood sugar. The pancreas has to work hard to deal with this unnatural situation, leading to burn-out of the insulin-producing cells - diabetes. The chronic dehydration caused by feeding dry food to a carnivore with a low thirst drive plays in role in the development of Feline Lower Urinary Tract disease. Many cats receive intra-venous fluids while being maintained on a dry diet. Every attempt should be made to get these cats eating food with a high moisture content. Crystals in the urine, bladder stones and cystitis are often diagnosed in cats. The most important preventive step you can take to avoid these problems is to feed your cat a high-moisture diet. Your cat is not motivated to drink enough and will need to get its water from its food. IBD (inflammatory bowel disease) often goes unnoticed. It is not normal for a cat to vomit regularly. Grumpy cats with swollen tummies and bouts of vomiting and diarrhoea and occasionally constipation, may be suffering from IBD. We have an epidemic of overweight cats. Obesity can predispose to diabetes. Cats on grain-based diets will convert the carbohydrates to be stored as fat. The so called ‘light’ diets have reduced the fat content and increased the grain/fibre content of the diet, so an even higher level of carbohydrate is present. And as we now know, the cat remains overweight! Cats will lose weight easily on a speciesappropriate raw meaty bones diet. Dental disease is a huge part of our daily veterinary practise. The majority of cats swallow their dry diet in whole pieces and receive no dental benefits. Shearing and tearing at their raw diet with those carnivorous jaws is the best way to keep the teeth clean and the gums healthy. Cats appear to do well on commercial pet foods, but just remember that all cats appear to be well until they are diagnosed with an illness. Diseases begin to develop long before they are recognised. Preventive nutrition is the key to keeping your cat healthy. Cats are designed to get their nutrition from eating small prey animals. They need to eat lots of animal proteins in the form of raw meaty bones. They cannot utilise plant proteins to satisfy their nutrient requirements. In the wild, a cat would be eating a high protein, high moisture content, meat based diet, with moderate fat, and minimal carbohydrate (pre-digested by a herbivore). Most cats are fed on commercial dry food, often high in plant proteins (corn, wheat and soy) because they are cheaper than animal proteins. Many pet food manufacturers try to add back the nutrients that are stripped from the manufactured diet (hence the long list of ingredients on your cat food bag). 'The Carnivore Connection to Cat Nutrition’ is a must read for anyone concerned about their cat's diet. The average dry food for cats contains 35-50% carbohydrates. But grain is cheap and dry food is convenient, and so we continue to feed our cats a very inappropriate diet. Cats do not have a strong thirst drive. They are designed to obtain most of their water from their food. A cat on dry food alone will consume approximately half the amount of water that a cat fed on a raw diet will consume. The raw food has a high water content (70-75%) and keeps the cat well hydrated.
Free Machine Learning Software to Understand the Concepts Machine Learning symbolized from Artificial Intelligence Machine Learning is a domain of computers that deals with designing products and software. Further, these are capable to perform certain tasks which are beyond things that were instructed to the current product and software. Also, there is some free machine learning software for use. Initially, we construct/program machines to do fixed tasks. Therefore on these machines, we provide input data and acquire output data for a particular purpose. Hence, Products/Software made using Machine Learning is entirely different from conventional techniques. In Machine Learning applications, we provide input data and output data. Then we design this machine to identify the relationship between input and output data so that the machine, using the relation technique can find the output of coming input data based on the capability to find relations between inputs and outputs. But when we talk about knowing about Machine Learning, we deal with data sets, learning techniques, classification and regression techniques, decision tree learning, etc which at the initial stage is very difficult to learn subject practically. In such cases, there are the following free machine learning software we can use for practically learning the subject -: 1. Shogun Shogun was first released in 1999. The first version was developed using the C++ programming language. Further versions are compatible with C#, Java, Python, Octave, R, Matlab, and Lua. So, the current version is 6.0.0 which is compatible with Windows and Scala. The major competitor of Shogun is Mlpack, released in the year 2011 which is also written in C++. 2. Scikit-Learn Scikit-Learn consists of a set of Python libraries using which packages like NumPy, Matplotlib, and Scipy are built for science and math works. The libraries form either include in software or interactive platforms for applications. It is completely reusable and open. Scikit Learn Icon 3. Apache Mahout Apache Mahout consists of a set of independent algorithms which data scientists, mathematicians, and statisticians have developed. It went in coordination with Hadoop for a long time. The recent versions have increased support for the Spark framework, with improved support for the ViennaCL library. Apache Mahout Icon 4. Accord.Net Framework. It is a framework based on machine learning and signal processing focused on .net extensions. For image streams and audio signal processing, various libraries are provided. For tracing moving objects, pinning images together, and face detection, we can utilize various algorithms based on vision. Various libraries are also provided for machine learning functions which are especially more conventional ranging from neural networks to decision-tree systems. Framework Icon 5. Tensorflow It is an open-source library compatible with python for ease of use. The introduction section provides machine learning sections for beginners as well as for professionals. It has some experimental APIs in Java and Go. On GitHub, it is the leading open-source machine learning tool. It has the largest community, as well as most projects. Google TensorFlow Icon Featured Image Source Leave a Reply
Those of us who lived through the coming and going of the different tech phases are perhaps lucky to have a wider knowledgebase to draw on in our interaction with technology. Of course these days something like a smartphone can effectively represent the same power contained in your pocket as one of the earliest computers which formed part of the pioneering pack in personal computing. However, as a Millennial, GenX-er and I guess even a Baby Boomer, you probably understand the value of divergent computing. This wider scope of computing knowledge to draw on can come in very handy when you’re busy trying to choose the right computer for you, because then you understand the cost dynamics involved as well as the associated value synonymous with each device you’d be looking to add to your personal computing collection. Different computing devices As mentioned there is computing power contained in different kinds of devices, like a smartphone, for example. Now when it comes to choosing the right device for you, it really depends on what you plan to do with the computing power you want access to. Truth be told, some of the most expensive smartphones can cost as much as an entire selection of different computing devices, like how the cost of the famous iPhone X can cover the purchase of a decent Android smartphone, a decent tablet PC, a decent desktop PC or perhaps a laptop in place of what would have been the PC you go with. That’s generally what’s encouraged as far as choosing the right computer for you. Instead of spending mad, mad money on just one computing device, rather distribute that money across different devices which come together to make up the collective computing power you’d have. So you can give that iPhone X a pass, especially if you take the time to make sure you understand exactly what you’re paying for in terms of the features of the computing device you’re paying for. A Desktop PC Desktops will never die, but I’m in no position to try and convince anyone of the need to buy one of these ultimate computing babies. A desktop PC can also be an ideal fit for novices just stepping into the world of computers, and can be very helpful for those pursuing basic computer courses like an ECDL ( If your work, or entertainment like gaming, requires major computing power, a good desktop PC is something nobody needs to convince you about the benefits of. If you do plan on gaming on your computer, it might be worth saving some money by visiting Gamulator to find some games to play from the best ds emulator. That would allow people to find some of the best Nintendo DS games to play on the computer. A Laptop Laptops get really powerful these days and basically offer the same computing power as some desktops, except they’re portable and justifiably a little less robust. They usually come with good processors and speeds, but this is especially important if you’re going to be playing games and using other bits of software that you can Download at FileProto. A good battery is also key! A Table PC I’m personally not a fan of table PCs and would rather encourage you to get a laptop instead. The only time I’d use a tablet is if it’s part of some in-field work I have to do, so it would have to be a work-issued tablet. A Smartphone Basically since I believe that a smartphone is a temporary, portable computing device which is to be used until you can get home to your laptop or full-sized desktop PC, you’d basically be buying your smartphone for its camera.
Getting things done can be mentally taxing. We all start with the ultimate goal in our mind and think that is enough to navigate our way through. Even with the clarity of the end result, we find it hard to begin with it or we digress along the journey. Why is that? Because we miss to define the intermediary check points. A lot of times, when considering something we want to do, we bite off more than we can chew. Setting a big-picture goal is mandatory because clarity in why we are doing something will help us with what and how to do that something. To prevent the delay and achieving the set goal in the most efficient manner, planning plays a crucial role. Backward Planning or designing Backward planning or backward designing means when you plan in reverse, you start with your end goal and then work your way backwards from there to develop a plan of action. You need to break down the goals into small, actionable chunks. Items that you can actually set out and achieve everyday. Daily victories, no matter how small, keep you on your toes, gives you hope and boosts your confidence. Not only this, you can always trace it back to where you started and measure how long you came and how far you have to go. As you break your goals down, ask yourself, can it be done now? If not, keep breaking it till your answer changes to yes. The idea is to break the bigger chunks to small enough that can be attained in a day. Everyday achieving one small goal will compound to bigger victories over the time and finally the ultimate goal. As with nearly everything else, you’ll get better and better at this with practice. As you practice using this system again and again, it will develop into a habit, and become nearly automatic. Always start with the end in mind! + There are no comments Add yours Leave a Reply
Hosea 5 Submitted by admin on Mon, 2006-04-17 12:07. Posted in | printer-friendly version » • Hosea 5:1. • Masoretic Text: Hear this, priests, and take heed, house of Israel; and house of the king, lend ears. For to you [is] the judgment, for a snare you were to Mizpah and a net spread over Tabor. Septuagint: Hear these [things], priests, and take heed, house of Israel; and house of the king, give ear. For to you is the judgment, because a snare you have become to the lookout and like a net spread out upon the Itabyrion, Translators basically convey two very different meanings for the words “for to you is the judgment.” (1) The adverse judgment is directed against the priests, the house of Israel, and the royal house. “Hear this, O priests, pay attention, O house of Israel, O household of the king, give ear! It is you who are called to judgment.” (NAB) “Hear this, O priests! Give heed, O house of Israel! Listen, O house of the king! For the judgment pertains to you.” (NRSV) (2) Priests, the house of Israel, and the royal house were responsible to uphold justice. “Listen, you priests! Pay attention, Israel! Listen, you members of the royal family. Justice was your duty.” (CEV) “Hear this, O priests, attend, O House of Israel, and give ear, O royal house; for right conduct is your responsibility! (Tanakh) It does appear, however, that the words that follow present the reason for the judgment. This aspect would favor a rendering that warns of impending adverse judgment from YHWH. The name “Mizpah” denotes “lookout” or “watchtower,” and this explains the reason for the reading of the Septuagint. In the Septuagint, the usual designation for “Tabor” is “Thabor.” This makes it difficult to determine why the name “Itabyrion” appears here. The priests being addressed are not men of the house of Aaron, but men officiating at Dan and Bethel (the centers for calf worship in the ten-tribe kingdom of Israel) and at other sites where various deities were venerated. At times, the expression “house of Israel” denotes the representative members of the nation or those responsible for administering affairs. The serious sin with which this verse concludes does suggest that this is the case here. It does not appear that, collectively, all members of the ten-tribe kingdom would be spoken of as having become a snare to Mizpah and a net to Tabor. Seemingly, all—the priests, leading members of the realm, and the royal house—were being put on notice that YHWH’s adverse judgment would be visited upon them. Mizpah and Tabor may have been prominent sites for idolatrous worship. Another possibility is that the two locations were representative of the entire ten-tribe kingdom, with Mizpah being representative of the area east of the Jordan and Tabor being representative of the territory west of the Jordan. Mizpah was probably the city in Gilead located south of the Jabbok. From the valley of Jezreel, Tabor, an isolated eminence, rises to a height of well over 1,800 feet above sea level. The sense in which the priests, the leading members of the realm, and the royal house served as a snare and a net is not specifically stated. Probably this was by their active support of idolatry. The very ones responsible for directing the people to noble ends would thus have been guilty of making Mizpah into a snare and spreading a net over Tabor. Few Israelites escaped succumbing to the pressure to conform to the prevailing idolatrous spirit and the allurement to engage in idolatrous practices. Therefore, the coming of YHWH’s adverse judgment was a certainty. • Hosea 5:2. • Masoretic Text: And [in] slaughtering the revolters have gone deep. And I [administer] discipline to all of them. Septuagint: which the ones ensnaring the prey have fastened. But I [am] your discipliner. In the Masoretic Text, the first part of the verse is somewhat obscure. The result has been a variety of renderings, including ones based on conjectural emendations. “...and a pit dug deep in Shittim” (NRSV) Based on an emendation, this reading depicts means for capturing victims at a third center devoted to idolatrous worship. Similar is the paraphrase, “At the place of worship you were a treacherous pit.” (CEV) “In their perversity they have sunk into wickedness, and I am rejected by them all.” (NAB) This rendering basically is a rewrite of the Masoretic Text. The Tanakh rendering is closer to the present Masoretic Text but includes interpretive elements. “For when trappers dug deep pitfalls, I was the only reprover of them all.” With and without interpretive elements, a number of translations have maintained the basic wording of the Masoretic Text. “The rebels are deep in slaughter.” (NIV, NJB) Die Abtrünnigen schlachten im Verborgenen (The revolters slaughter in secret). (Schlachter, German) The “revolters” are evidently those who rebelled against YHWH, turning their backs on him to pursue idolatry. Murder was one of the grievous sins that appears to have become common in the ten-tribe kingdom. (Hosea 4:2; 6:9) Possibly the slaughtering has reference to “murder,” and “going deep” could express the extreme depravity to which the guilty ones had sunk. If, however, the closer link is to idolatry, the phrase about “slaughtering” could point to the rebels’ “deep” or extensive involvement in “slaughtering” animals for sacrifice to lifeless deities. Also included could have been the abhorrent practice of child sacrifice. (Compare Ezekiel 23:36-39.) According to the reading of the Septuagint, the net spread over Tabor had been fastened by those ensnaring the prey. Those caught in the “net” would have been all who became involved in idolatrous practices. The most powerful and influential members of the ten-tribe kingdom gave full support to idolatry and so were responsible for firmly fixing the ensnaring net that kept the deluded people in the state of helpless prey. The Masoretic Text and the Septuagint convey the same meaning for the remainder of this verse. YHWH is the discipliner of his people. As such, he would take decisive action against the guilty ones. • Hosea 5:3. • Masoretic Text: I know Ephraim, and Israel is not concealed from me. For now you have whored, Ephraim; Israel is polluted. Septuagint: I have known Ephraim, and Israel is not absent from me. For now Ephraim has whored; Israel has been polluted. Note: In the Septuagint, the word corresponding to the Hebrew term for “hidden” or “concealed” is ápeimi, meaning “to be far away,” “far from,” or “absent.” The thought of the Greek reading appears to be that YHWH is not far away or absent so as to be unaware of what is taking place. Ephraim and Israel are parallel designations, with Ephraim (as the dominant tribe) representing Israel or the ten tribes of the northern kingdom. YHWH had complete knowledge about Ephraim’s or the people’s attitudes, words, and actions. Nothing about Israel was hidden from God’s penetrating vision. Through involvement in idolatry, Ephraim (the people of the ten-tribe kingdom collectively) had whored, proving unfaithful to the covenant relationship with YHWH. Instead of being clean from God’s standpoint, Israel was defiled or polluted. • Hosea 5:4. • Masoretic Text: Their practices do not permit them to return to their God, for a spirit of whoredom [is] in their midst, and YHWH they do not know. Septuagint: They have not given their deliberations to return to their God, for a spirit of whoredom is in them, but the Lord they have not known. Note: Both the Masoretic Text and the Septuagint use a form of the verb for “give,” with the Hebrew word being used in the sense of permitting or allowing. The Septuagint reading suggests that the people gave no thought to returning to their God, whereas the Masoretic Text may be understood to mean that they were unwilling to give up the God-dishonoring practices that stood in the way for their return. As a people, the Israelites were unwilling to change their ways. They were so steeped in their idolatrous practices and the debauchery associated therewith that they simply could not repentantly return to YHWH and conform their lives to his upright ways. A spirit of whoredom (a dominant inclination to pursue the worship of fertility gods and others deities) had taken possession of them. They did not “know” YHWH in the sense that they did not acknowledge their accountability to him and conduct themselves accordingly. They acted as if YHWH did not exist. • Hosea 5:5. • Masoretic Text: And the pride of Israel testifies to his face, and Israel and Ephraim will stumble in their iniquity; Judah also will stumble with them. Septuagint: And the arrogance of Israel will be humbled to his face, and Israel and Ephraim will stumble in their iniquities, and Judah will also stumble with them. Note: The Hebrew word kashál means “stagger,” “stumble,” or “totter.” In the Septuagint, the corresponding term asthenéo often denotes “to be weak” or “to be sick” but can also signify “to stumble” or “to fall.” In view of the context, the “pride,” “insolence,” or “arrogance” of Israel (collectively, the people of the ten-tribe kingdom) likely relates to their stubbornly refusing to humble themselves, turning a deaf ear to the appeals YHWH directed to them through his prophets, and giving not the slightest consideration to repentance so as to regain a proper relationship with YHWH their God. According to the reading of the Masoretic Text, this pride served as a testimony to Israel, a testimony that was right in front of their face. The expression “to his face” could also be understood to mean “against Israel,” which is the sense conveyed in numerous translations. According to the Septuagint reading, the pride of Israel would be humbled or abased before “his face” or before the people’s eyes. Israel (the ten northern tribes) and Ephraim (the dominant tribe of the ten-tribe kingdom and often representing the entire realm) would, on account of their iniquities (their flagrant violations of God’s commands), stagger, weaken, or stumble. Theirs would prove to be a serious crash. This did occur when the Assyrian forces invaded and devastated the territory of the ten-tribe kingdom. Judah also experienced stumbling, as the Assyrians wreaked havoc in the two-tribe kingdom. (2 Kings 15:19, 20, 29; 16:7-18; 17:3-6; 18:13-15) • Hosea 5:6. • Masoretic Text: With their flock and with their herd, they will go to seek YHWH, but they will not find [him]. He has withdrawn from them. Septuagint: With sheep and calves, they will go to seek the Lord and definitely not find him, for he has turned away from them. While the Septuagint rendering is “sheep,” the term in the Masoretic Text denotes “flock,” including both sheep and goats. Similarly, the Septuagint has the more specific term “calves,” whereas the corresponding word in the Masoretic Text means “herd” or “cattle.” The two distinct words for “not” in the Septuagint express intensity and denote “by no means,” “absolutely not,” or “definitely not.” The ones seeking YHWH are not specifically identified. Both the people of the northern kingdom of Israel and the southern kingdom of Judah could be included. Based on the immediate antecedent in the previous verse, however, the reference would be to the people of Judah. This would also agree with the later statement (Hosea 7:10) that the people of Israel had not sought YHWH. Like the Israelites in the ten-tribe kingdom, the people of the two-tribe kingdom of Judah had seriously failed to live up to their covenant obligations. YHWH, therefore, could not look with any favor upon their offerings. Although the people came with sheep, goats, and cattle to present as sacrifices at the temple in Jerusalem, this was but an empty ritual. Their attempt to “seek” YHWH, wanting his help, favor, and protection, was insincere. It was not accompanied by conduct that he approved. (Isaiah 1:11-17) As a result, he would remain hidden to them or impossible for them to find. YHWH would simply not be there for them in their time of need. As he had withdrawn or turned aside from the people, they would be left without his aid, blessing, and protection. • Hosea 5:7. • Masoretic Text: Against YHWH they have acted treacherously, for they have borne alien sons. Now the new moon will consume them with their portions. Septuagint: For they have forsaken the Lord, for alien children have been born to them. Now blight will consume them and their portions. The reading of the Masoretic Text is obscure, requiring the introduction of interpretive elements in an effort to convey something meaningful. The Hebrew word chódesh means either “new moon” or “month,” and the Hebrew term chéleq denotes “portion,” “share” (Genesis 14:24; Deuteronomy 18:8; 1 Samuel 30:24), or a “tract” or portion of land, particularly a hereditary possession. (Joshua 18:5-9) In the Septuagint, the corresponding term for chéleq is kléros, meaning “share,” “portion,” “inheritance,” or “tract” of land. Based on the meanings “month” and “tract” of land, a number of translations interpretively render the second part of the verse as meaning that the lands or possessions of the people would be destroyed within a short time. “So now they and their lands will soon be destroyed.” (GNT) Darum werden sie in kürzester Zeit vernichtet— mit allem, was ihnen gehört. (Therefore, they will soon be destroyed—with everything that belongs to them.) (German, Hoffnung für alle) If, however, the meanings “new moon” and “portion” (as a “portion” of food) are retained, a very different significance is possible. Ihre Opferfeiern am Neumondstag bringen ihnen nicht Erntesegen, sondern Vernichtung, ihnen und ihren Feldern! (Their sacrificial festivals on the day of the new moon do not bring them a harvest blessing, but destruction, to them and their fields!) (German, Gute Nachricht Bibel) Instead of “new moon” or “month,” the Septuagint reads erysíbe, meaning “blight” or “mildew.” It appears that the German Einheitsübersetzung somewhat follows the rendering of the Septuagint. Nun frisst ein glühender Wind ihren ererbten Besitz. (Now a scorching wind consumes their inherited possession.) In the following commentary portion, a highly interpretive explanation (involving “new moon” and “portion”) is presented. The people of both the northern kingdom of Israel and the southern kingdom of Judah had acted treacherously, forsaking YHWH and adopting idolatrous practices. In view of what follows, however, the reference may more specifically apply to the Israelites in the northern realm. Instead of instructing their children to be devoted to YHWH, idolatrous parents obviously failed to do so. Therefore, YHWH could not acknowledge these “sons” or “children” as being his. They did not “know” or recognize him as their God and so proved to be alien sons or children. In this respect, these children were just like the offspring of non-Israelite peoples who had never been in a covenant relationship with YHWH. He could not have looked approvingly upon any observance of a new moon festival. The people’s doing so and engaging in joyous feasting would have merited YHWH’s adverse judgment, for it was not done to his praise and honor. Thus, instead of their consuming their portions on the day of the new moon with benefit to themselves, their God-dishonoring observance would bring upon them God’s consuming wrath. They and their portions would be consumed at the time for the execution of divine judgment. • Hosea 5:8. • Masoretic Text: Blow a horn in Gibeah, a trumpet in Ramah. Raise a battle cry at Beth-aven; after you, Benjamin. Septuagint: Trumpet a trumpet upon the hills; sound upon the heights. Herald in the house of On. Benjamin became confounded. The Hebrew may also be understood as follows: Blow a horn on the hill, a trumpet on the height. Raise a battle cry at Beth-aven; after you, Benjamin. The Septuagint does not render Gibeah and Ramah as place names, but the Vulgate does. Like the Vulgate, other translations commonly use the place names. The “horn” or shofar was a ram’s-horn trumpet. Other “trumpets” were fashioned from metal and consisted of a mouthpiece and a narrow tube that flared out at the end. In times of war, both the “horn” and the “trumpet” served as signaling instruments. Ancient Ramah has been linked to a site five miles north of Jerusalem and two miles north of what is believed to be the location of ancient Gibeah. Beth-aven (as in Hosea 4:15, which see for comments) probably was Bethel, the center of calf worship situated on the border of the territory of Benjamin. Hosea provides no indication about the time and circumstances involving the various locations he mentions. If the ancient cities have been correctly identified, they are listed from south to north. This would suggest that the military action started in the south and moved northward. During the reign of King Ahaz of Judah, Syrian and Israelite forces joined in an attack against the two-tribe kingdom, administering a humiliating defeat but not succeeding in capturing Jerusalem and removing Ahaz as king. (2 Kings 16:5; 2 Chronicles 28:5-7; Isaiah 7:1-7) Possibly the reference in Hosea alludes to a Judean counteroffensive against the invaders. The blowing of the horn and the trumpet and the raising of a battle cry would then have been part of the counteroffensive in the territory of Benjamin. The words “after Benjamin” may be understood to mean that the invading forces were advancing to or through the territory of that tribe. This would agree with the Septuagint reading about Benjamin being “confounded” or “astonished.” • Hosea 5:9. • Masoretic Text: In the day of reproof, Ephraim will become a waste. Among the tribes of Israel, I make known what is trustworthy. Septuagint: In the days of reproof, Ephraim has become a devastation. Among the tribes of Israel, I have shown trustworthy things. Note: Besides “in,” “into,” “by,” “among,” and “with,” the Hebrew preposition be can denote “against.” This meaning is found in a number of translations. “Against the tribes of Israel I announce what is sure to be.” (NAB) “Against the tribes of Israel I proclaim certainties.” (Tanakh) The corresponding preposition en (found in the LXX), however, is not used to express the meaning “against.” The “day of reproof” evidently denotes the time YHWH would take punitive action against Ephraim, the dominant tribe of the ten-tribe kingdom and commonly representing the entire realm. On account of the unfaithfulness of “Ephraim,” YHWH used the Assyrians as his instrument to inflict severe punishment. That punishment included the devastation of the territory of the ten-tribe kingdom during the Assyrian invasions and the exile of the surviving Israelites. To the tribes of Israel in both kingdoms, YHWH revealed what is trustworthy. Through his prophets he announced the warning of impending calamity on account of the people’s unfaithfulness. Upon seeing YHWH’s word fulfilled, the people who had disregarded the dependable message proclaimed by the prophets would have been forced to recognize that it had indeed been trustworthy. • Hosea 5:10. • Masoretic Text: The princes of Judah have become like those who move back a boundary. Upon them, I will pour out my rage like water. Septuagint: The rulers of Judah have become like those who change boundaries. Upon them, I will pour out my assault like water. The Hebrew word for “water” is plural, suggesting an abundance of water. In the Septuagint, however, “water” is singular. The Greek word corresponding to the Hebrew term for “fury” or “rage” is hórmema, which expression can mean “assault,” “attack,” “impulse,” “onrush,” and “violent onset or rush.” God’s law to Israel specifically prohibited the moving of boundary marks, as that would have meant stealing another person’s land. (Deuteronomy 19:14; 27:17) Judean princes or rulers in Hosea’s time, however, were corrupt. They attained their base objectives through lawless means comparable to the moving back of a boundary. This did not escape the notice of YHWH who, through Hosea, announced that these rulers would be submitted to the full brunt of his fury. His wrath would flow against them just as when an abundance of water is poured out. • Hosea 5:11. • Masoretic Text: Ephraim is oppressed; crushed [in] judgment, for he undertook to go after the commandment. Septuagint: Ephraim has oppressed his opponent. He has trampled judgment, for he started to go after vanities. Most translations represent Ephraim as being oppressed and deprived of his rights and not (as does the Septuagint) as being the oppressor and the one trampling judgment. Examples are: “Ephraim is defrauded, robbed of redress.” (Tanakh) “Ephraim is oppressed, crushed in judgment.” (NRSV) “Ephraim is oppressed, trampled in judgment.” (NIV) Other translations represent the judgment as being from God on account of idolatry—“broken by my judgment because they are determined to worship idols.” (NLT) The New American Bible uses a question that is followed by a negative response. “Is Ephraim maltreated, his rights violated? No, he has willingly gone after filth!” The marked difference in the reading of the Masoretic Text and the rendering of the Septuagint makes any explanation of this verse conjectural. If Ephraim, the dominant tribe of the northern kingdom of Israel and representing the entire realm, is the oppressor and the one trampling upon judgment or justice, the identify of the opponent would need to be established. Historically, in the time of Hosea, Ephraim fought against the two-tribe kingdom of Judah. The Greek word meaning “oppress” (katadynasteúo) can also be defined as “prevail over,” “conquer,” “exploit,” and “dominate.” Based on the record preserved in 2 Kings and 2 Chronicles, “Ephraim” did triumph over the kingdom of Judah, administering a humiliating defeat. (2 Kings 16:5; 2 Chronicles 28:5-15; Isaiah 7:1) In the realm of the ten-tribe kingdom, injustices were common. Especially the rights of the disadvantaged were repeatedly trampled upon. (Amos 2:6-8; 8:4-6) Both the Septuagint and the Targum are in agreement that “Ephraim” went after “vanities.” This is probably to be understood of the pursuit of worthless idols. (Compare Jeremiah 2:5; 10:14, 15; 16:19; 51:17, 18.) In this case, numerous translators have departed from the reading of the Masoretic Text. Instead of “commandment,” they use “idols” (NIV), “filth” (NAB), “useless idols” (CEV), and “futility” (Tanakh). The reading of the Masoretic Text represents “Ephraim” as the one oppressed. Historically, this did occur when the ten-tribe kingdom came under Assyrian control and experienced repeated Assyrian invasions, terminating in the conquest of the capital Samaria and the exile of the surviving Israelites. (2 Kings 15:19, 20, 29; 17:4-6; 1 Chronicles 5:4-6, 26) Under foreign domination, the people would definitely have had their rights trampled upon. The phrase about going “after the commandment” (if the original reading) must, according to the context, be regarded as a sinful act. It serves to explain the reason for Ephraim’s being oppressed. Therefore, the “commandment” would have to be one originating from a human source and violating God’s law. This could refer to the royal endorsement of calf worship at the cities of Dan and Bethel. Jeroboam, the first monarch of the ten-tribe kingdom, did tell his subjects: “You have been going up to Jerusalem long enough. This is your god, O Israel, who brought you up from the land of Egypt!” (1 Kings 12:28, Tanakh) The word of the king generally would have been regarded as having the force of a commandment. (Ecclesiastes 8:4) • Hosea 5:12. • Masoretic Text: And I [am] like a moth to Ephraim, and like rottenness to the house of Judah. Septuagint: And I [am] like trouble to Ephraim, and like a goad to the house of Judah. The Hebrew term ‘ash has commonly been defined as meaning “moth,” which is also the significance of the Latin term tinea (additionally, applying to any “gnawing worm”) appearing in the Vulgate. A 2001 revision of Koehler’s work, however, provides the definition “pus,” and this is the rendering (Eiter) found in some modern German translations. (Revised Elberfelder; Einheitsübersetzung) The Septuagint reading taraché does not agree with either definition of the Hebrew word. The Greek term can mean “trouble,” “disturbance,” “tumult,” “vexation,” “rebellion,” “commotion,” “riot,” and “disquietude.” Both the Hebrew word raqáv and the Latin term (in the Vulgate) putredo mean “rottenness” or “decay.” In the Septuagint, though, the corresponding term kéntron denotes “goad,” “prod,” or “sting.” Based on the Septuagint rendering, YHWH was the one who brought trouble upon Ephraim and, like a goad, pricked the house of Judah. This would have been by allowing them to experience oppression from foreign powers on account of their unfaithfulness. “Ephraim” represents the northern ten-tribe kingdom of Israel, and the house of Judah represents the southern two-tribe kingdom. By what he permitted to befall the ten-tribe kingdom, YHWH proved to be like a moth to Ephraim. This apparently denotes a moth in the destructive larval stage when, for example, it feeds on a woolen garment. Progressively, the garment is ruined. Likewise, the adverse judgments YHWH allowed to befall the Israelites from the Assyrians progressively weakened the realm, finally leading to the destruction of the ten-tribe kingdom of Israel. The rottenness may refer to damage to wood from worms or grubs. In this case also, the damage to wood is progressive. Because of unfaithfulness, the house of Judah, by divine permission, was subjected to enemy invasions that progressively led to its decline and terminated in the end of the kingdom of Judah and the exile of many of the survivors. • Hosea 5:13. • Masoretic Text: And Ephraim saw his illness and Judah his sore. And Ephraim went to Assyria and sent to a king, Jareb, and he will not be able to heal you nor cure your sore. Septuagint: And Ephraim saw his illness and Judah his pain, and Ephraim went to the Assyrians and sent ambassadors to King Jarim, and he was not able to heal you, and pain will definitely not cease for you. The Septuagint reads “Jarim,” and the Masoretic Text can be transliterated as “Jareb.” (NASB, NJB, Luther 1984 revised [German], revised Elberfelder [German]) No Assyrian monarch, however, is known to have been so named. Numerous translations have chosen to render the Hebrew designation according to possible meanings, resulting in a variety of renderings—“great king” (NAB), “mighty king” (CEV), “patron king” (Tanakh; a footnote links the designation with a verb meaning “to champion, uphold the cause of”), “a king who will contend” (NRSV, footnote, but “great king” in the main text), and “King Contentious.” (Margolis) The term in the Vulgate is a form of ultor, meaning “revenger” or “avenger.” A 2001 revision of Koehler’s work indicates that the meaning “the Great One” is based on a linkage with Ugaritic. The other suggested meaning is “King Squabbler.” The Brown-Driver-Briggs lexicon of 1906 suggests “one who contends” as a possible meaning. The use of the two distinct words for “not” in the Septuagint serve to intensify and convey the meaning of “absolutely not,” “by no means,” and “definitely not.” Ephraim (representative of the ten-tribe kingdom of Israel or, collectively, the people of the realm), upon recognizing his sickly or weakened condition, turned to powerful Assyria for help. Historically, this could relate to the time of Menahem or Hoshea. When Assyria invaded the ten-tribe kingdom, King Menahem made an agreement with the king of Assyria for his aid in securing the kingship. (2 Kings 15:19, 20) Later, during the rule of Pekah who had seized the throne after killing Menahem’s successor Pekahiah, Hoshea conspired against Pekah, assassinated him, and usurped the throne. (2 Kings 15:30) In order to secure his position as monarch, however, Hoshea seems to have solicited the aid of Tiglath-pileser III. An Assyrian inscription specifically relates to developments in the ten-tribe kingdom and the role of Tiglath-pileser III. The inscription states: “They overthrew their king Pekah (Pa-qa-ha) and I placed Hoshea (A-ú-si-’) as king over them.” YHWH’s word, through Hosea, was that the Assyrian monarch would not provide a cure for the ailing realm that had previously been ravaged by Assyrian invasions. This was unerringly fulfilled. During the reign of Shalmaneser V, the successor of Tiglath-pileser III, Hoshea decided to refuse paying the demanded annual tribute and turned to Egypt for aid against Assyria. In retaliation, Shalmaneser V invaded the ten-tribe kingdom, placed Hoshea in confinement, and began the siege of Samaria. With the fall of Samaria after a three-year siege, the ten-tribe kingdom came to an end. (2 King 17:3-6; 18:9-12) The focus of this verse basically is “Ephraim,” giving rise to the conjecture that “Judah” should be emended to read “Israel.” Such an emendation, though, would not have any support from the Septuagint nor the Vulgate and so would have little to commend it. The first half of this verse apparently parallels the preceding verse, and the same parallel of Israel and Judah is found in verse 14. Both “Ephraim” and “Judah” became painfully aware of their serious plight, and both failed in seeking the only dependable source of aid, YHWH, and enlisted the help of Assyria, to their injury. (2 Kings 16:7-9) • Hosea 5:14. • Masoretic Text: For I am like a lion to Ephraim and like a young lion to the house of Judah. I, I will rend and depart. I will carry away, and [there will be no] rescuing. Septuagint: For I am like a panther to Ephraim and like a lion to the house of Judah, and I will snatch away and depart, and take away, and no one will [perform any] rescuing. YHWH would permit unfaithful Ephraim (representative of the northern ten-tribe kingdom of Israel) and the disloyal house of Judah (representative of the southern two-tribe kingdom) to experience ruthless, beastly treatment from invading enemy forces. In this way, he would prove to be like a ferocious lion. The result would be a vicious tearing to pieces. Upon the departure of the invaders, only the tragic evidence of violent deadly struggles and devastation would remain. Humiliated survivors would be forcibly dragged into exile, comparable to the manner in which a lion drags away parts of the kill. No hope would there be for any kind of rescue from or mitigation of the beastly assault and its horrific consequences. • Hosea 5:15. • Masoretic Text: I will depart. I will return to my place until they [finish bearing their] guilt and seek my face. In their distress, they will look for me. Septuagint: I will depart and return to my place until they be removed [from sight], and they will seek my face. In their distress, they will eagerly seek me, saying: The Hebrew word ’ashám basically means “be guilty” or “offend,” but the context requires another significance. Translators convey the sense as being “pay for their guilt” (NAB) or “acknowledge” (NRSV), “admit” (NIV), or “realize” (Tanakh) their guilt. In view of other prophecies indicating the passage of a specific period, “bear” or “pay for” appears to be the preferable significance. (Compare Jeremiah 24:4-6; 25:8-14; 29:4-14; Daniel 9:2.) In the Septuagint, the word rendered “seek” in the second occurrence is a form of the verb orthrízo. This term basically signifies “rise early” and, in this context, is understood to mean “seek,” especially doing so eagerly. On account of the people’s unfaithfulness, YHWH would withdraw his help and protection. His presence would cease to be with the people. In this way, he would depart from them, returning to his “place,” the invisible realm. After the period of corrective punishment ended, the people would seek YHWH’s face or YHWH himself, changing their wayward course and repentantly desiring a good relationship with him. Their distressing circumstances would have a beneficial effect, making them realize the seriousness of their sins and motivating them to want to return to YHWH.
in , , Simple Thumb Test Could Indicate The Likelihood You’re Harboring An Aortic Aneurysm Simple Thumb Test Could Indicate The Likelihood You're Harboring An Aortic Aneurysm You hear about the word aneurysms often enough and the first thing you think about when you hear that word is that it happens in the brain. However, the truth is that aneurysms can happen in other parts of your body too such as the heart. And one common type of aneurysm is the aortic aneurysm. That is when a ballon-like bulge develops in the aorta which is the large artery that transports the blood from the torso and chest to the heart. The risk is that these aortic aneurysms can end up rupturing or splitting which can cause the blood to leak. That will need immediate medical attention if the aneurysm ruptures or splits. If you have an aortic aneurysm, you can live with it and you’d have to do what you could to prevent a split or rupture. And the cause of the aortic aneurysm can be hereditary or congenital. If you are unsure that you are at risk for having an aortic aneurysm, then you can do a thumb-palm test to determine whether you are at risk or not. How Do You Do A Thumb-Palm Test To Determine Whether You Have The Risk Of An Aortic Aneurysm? What you want to do is to keep your palm flat. Then go and extend your thumb out as you can, and if it does go beyond the palm’s edge then that indicates that there is a risk of having an aortic aneurysm. The point of the test is to flex the thumb as far as you can. If it does, then that is a sign that there is connective tissue disease and that includes the aorta. Those who conducted research among patients who went for heart surgery which includes aortic aneurysms noted that patients were asked to do the test beforehand. Therefore, it indicated that these patients were at risk of having the condition. That meant those who had their thumbs reaching past their palms were at a higher risk for the aneurysm. Even though the thumb-palm test has been studied among medical students for several decades, it was only recently when it became part of a study in clinical settings. The point of doing the test was to find that an aortic aneurysm would be identified early on. That way, if there was a rupture, there would not be any mystery of the cause. These aneurysms are not easily identifiable after a split or rupture. The good news is that those who have a positive test may not have an aortic aneurysm yet as it can take years to develop. That also means that there is not always an immediate risk. However, it is something to know and to monitor if there is a positive test. How Do You Monitor And Stop An Aortic Aneurysm From Developing? The best thing to do is to monitor your blood pressure and keep it controlled. High blood pressure will cause the walls of the aneurysm to keep expanding which increases the risk of it rupturing. That means keeping your blood pressure low and that means keeping your weight at an optimal level and limiting the salt and sodium in your diet. Drink plenty of water. However, if you are struggling to breathe, have radiating pain to your back, having trouble swelling, and having intense back or chest pain, then you must get to the ER right away as that is a sign that the aortic aneurysm may end up bursting. That way you can have cardiologists monitoring you if you get to that point. However, if you keep your blood pressure controlled, the odds of it bursting are less. The Real Reason You Should Never Share Your Razor With Someone The Real Reason You Should Never Share Your Razor With Someone Consuming More Cheese And Wine Could Prevent Dementia Later In Life, According To Study
Best Answer Art and Craft Difference Craft work is skilled work: any kind of craft must involve the application of a technique. The word, after all, is the German Kraft, simply means power or ability. Craft involves technique, yes, but not necessarily mechanical technology. For we wouldn't attribute a high level of craftsmanship to a machine which produced thousands of coffee mugs in an hour. Craft implies the application of human intelligence and usually when we use the word we have in mind the application of the human hand. The craftsman has tools at command, but to the extent that the tools themselves, independent of human guidance, accomplish a task, we don't talk about craftsmanship. A second point. The concept of craft is historically associated with the production of useful objects and art well, at least since the 18th century with useless ones. The craftsman's teapot or vase should normally be able to hold tea or flowers, while the artist's work is typically without utilitarian function. In fact, if an object is made demonstrably useless if, to cite a famous example, you take a teacup and line it entirely with animal fur it has to be considered as a work of art, because there is nothing else left to consider it as. The crafts tend to produce things which are useful for various human purposes, and though they may be pretty or pleasing in any number of ways, craft objects tend to exhibit their prettiness around a purpose external to the object itself. To this extent, the crafts aren't arts, according to a idea which found fullest expression in the aesthetics of the great Enlightenment philosopher Immanuel Kant. Works of art, Kant said, are 'intrinsically final': they appeal purely at the level of the imagination and aren't good for any practical utility, except and I'll return to this except the cultivation of the human spirit. These two symptoms of craft, that craft involves the application of intelligent skill (often some kind of handwork), and that it commonly results in the production of useful objects, are uncontroversial, but they still don't get us very far in distinguishing craft from art. Because, of course, works of art in painting, in music and its performance, in poetry, and elsewhere normally require skill, and, moreover, many great works of art are also objects of enormous practical value, for example, works of architecture. User Avatar Wiki User 2014-04-10 17:30:44 This answer is: User Avatar Study guides See all Study Guides Create a Study Guide Add your answer: Earn +20 pts Q: What is the difference between art and craft? Write your answer... Related questions What is the difference between craft and a fine art? craft is a skill in doing or making something. Fine art is the study and creation of visual works of art. What is the quality possessed by a work of fine art thats not possessed by a craft or decorative art object? There may or may not be a difference between "fine art" and "craft" because really the only definable answer is that of the artist's intent behind the piece. Commonly, however, "fine art" is separated from "craft" because the artists intentions behind a fine art piece is usually to express a complex emotion or opinion, whereas the usual intent behind a craft is simply for the sake of making the craft. When did the division between art and craft begin? What is the difference between fine art and folk art? fine art is art that is legitimised by educational and gallery institutions. Folk art is art that operates outside of these institutions, by people with no or little artistic education. it can replicate what is familiar to the artist through historical, religious or cultural backgrounds. can be of a craft nature, or the results of mental antagonisms. What is the relationship between fine art and craft? Both are a kind of art. A recreational thing. What is the difference between craft and ceramics? What is the difference between renaissance art and medieval art-? The biggest difference between Renaissance art and Medieval art was the focus on artisitic realism. What is the difference between craft and labor? Craft is building something labor is working on something. Differentiate art and craft? One way to differentiate between art and craft is to remember that art is freer and unstructured. When one creates art, they can express their emotions without limits. When one creates a craft, there is a structured way to make the object. The correct outcome is already determined. Difference between hand drawings and digital art? difference between hand drawings and digital art Is craft the same as art? yes craft and art is the same thing What is the difference between art and classical art? there isn't really a difference, art is art and classical art is art from the classical period, now there would be a difference if the art in question was art from the Renaissance era or art from the baroque. What was the difference between merchant guild and a craft guild? The only difference was what they made or sold. How are Art and Craft different? What is the German word for craft in art? craft in art = Geschicklichkeit im Kunsthandwerk. What is the difference between art deco and modernism? Art Deco is a style of visual arts that first made its appearance in France after WWI, combining traditional craft motifs with Machine Age materials. Modernism is a form of abstract art that is not so much traditional. Difference between mechant guild and craft guild? Craft guilds made items and the merchant guilds sold them. What is the difference between artwork and work of art? The main difference between artwork and work of art is that a work of art is generally held in higher regard than an artwork. What is a reputable manufacturer of Art and Craft supplies? A reputable manufacturer of Art and Craft supplies includes Hobby Craft, Michaels and Zartart. Other sellers and manufactures of Art and Craft supplies includes DickBlick, Ebay and Amazon. What is the difference between a airplane and a space craft? because a airplane is flown by wings and a space craft is flown by something else When was Craft of the Lost Art created? Craft of the Lost Art was created on 2007-08-26. List differences between art and craft? In craft, one employs learned skills to accomplish something. Technical knowledge is used to arrive at an optimal outcome. Craft becomes art when the result or accomplishment has a transcendent quality. It engages an emotion. It provokes a sense of understanding on a deeper level. In craft, the result is tangible. In art, the result is intangible. What is the difference between the books the art of racing in the rain and racing in the rain? art is about art Where can one find bronze art craft? One can find bronze art craft from the following sources: Amazon, eBay, Bronze Craft, Antique Furniture, Lulusoso, Houzz, Lowes, Mazzolini Art Craft, to name a few. What is the difference between new art and old art? old art is old. new art is new. People also asked What is the difference between craft and a fine art? View results
Bria House and Lot: Why should teens get COVID-19 Vaccines? The virus will have fewer people to infect as more people are vaccinated, and community transmission will decrease. Every individual who receives the COVID-19 vaccines puts us one step closer to putting a stop to the pandemic And just recently, Covidd-19 vaccines for teens have been the talk of the town. You might not think it’s necessary to protect yourself against COVID-19 infection. After all, if a young person gets the illness, they usually have few or no symptoms. They’re also less likely to be hospitalized or die from COVID-19 infection than older folks. Even if you’re young and healthy, not being vaccinated puts you at a considerably higher chance of developing severe COVID-19, which may keep you sick for a long time and perhaps cause long-term harm. Because we don’t know why COVID-19 produces such severe disease in some individuals, it’s difficult to say whether you’ll have a moderate or severe case if you’re exposed to it. Read: Perks of the Vaccinated There’s also the benefit of having been vaccinated! If you’ve been exposed to someone who eventually turns out to be infected with COVID-19, you don’t need to isolate yourself. And, if you wind up visiting somewhere where vaccination is required, you’ll already be prepared. Plus, by the end of the day, you’ll be immune to the sickness, so you won’t have to worry about accidentally making other people sick or forcing them to quarantine. COVID-19 Vaccines for teens COVID-19 vaccines for teens are an extremely effective weapon in the battle against COVID-19. We understand why individuals are anxious about the hazards of vaccination, especially in light of recent reports of a significant but relatively rare side effect of blood clotting from two vaccinations. But it’s equally crucial to remember the dangers of COVID-19 infection: the chance of significant side effects from vaccination is considerably lower than the risk of serious disease or even death from COVID-19 infection. This is why the Local Government together with World Health Organization strongly advises against COVID-19 vaccination, beginning with people in priority groups such as health workers, the elderly, and people with underlying health conditions, who are more susceptible to infection and are at a higher risk of serious illness and death if infected. If you’re not convinced yet, here are some key benefits about COVID-19 Vaccination and COVID-19 facts: 1. You’ll be safe from the virus COVID-19 vaccinations for teens have been authorized after being tested in clinical trials and demonstrating that the vaccine greatly decreases the risk of getting the virus. Even if you catch the virus, the COVID-19 vaccination may help you avoid becoming very ill, based on what has been shown regarding vaccines for other illnesses. Getting vaccinated may help protect individuals around you, especially those who are at risk of severe COVID-19 disease. Read: Covid-19 Vaccines available in the Philippines You are well protected as a fully vaccinated individual. You have a very low chance of getting symptoms if you are exposed to the virus. Your chances of being really ill or dying are much smaller. Unfortunately, there isn’t much you can do “safely” if you aren’t completely vaccinated. You are free to unmask outside with members of your own home or in a group of fully vaccinated individuals or to mask up and join an outside group of unvaccinated people. In any circumstance, your facial covering will give some protection, but other outside activities, even with a mask, involve some danger, and no indoor activity can be called “safe.”  If you are not vaccinated, travel might increase your chances of transmitting and contracting COVID-19.  2. Contribution to the “HERD IMMUNITY” Covid-19 Vaccines for teens will be contributing to “herd immunity,” also known as “community immunity,” is another advantage of the COVID-19 vaccination for teens. When a substantial portion of a community is immune to a disease, it is far more difficult for that illness to spread. It can even protect individuals who are unable to be vaccinated, such as infants. For each illness, the number of persons required to develop community immunity varies. Scientists are trying to figure out how many individuals need to be vaccinated in order to attain COVID-19 community immunity. You may help us achieve community immunity and halt the COVID-19 pandemic by getting the COVID-19 vaccination. 3. Mask is your friend Even fully vaccinated people benefit from wearing masks because they give additional protection. Even against the Delta form, vaccines have proven to be extremely successful in preventing serious illness, hospitalization, and death. The Delta version, on the other hand, has resulted in a handful of breakthrough infections in persons who have been completely vaccinated, and masks give an additional layer of protection. The new masking standards come into play here. The quantity of viruses we breathe in and out is reduced when we wear a mask. Masks, when used in conjunction with the vaccination, give a one-two punch that decreases the chance of infection spreading – to children who are not yet eligible for immunizations, individuals with weaker immune systems, and those who have not been vaccinated. Covid-19 Vaccine side effects  COVID vaccination side effects can be bothersome for some people, but they generally only last a day or two and have no long-term consequences, unlike COVID infection, which can last weeks, months, or even years and cause long-term damage to the lungs, heart, and other organs. Side effects are possible with any medications, including vaccinations. COVID-19 vaccinations have minimal side effects in the majority of instances. Severe adverse effects are extremely rare, therefore they must be constantly watched and thoroughly examined when they do occur. We don’t know why some individuals become sick with COVID-19 so badly while others don’t, but we do know that vaccinations are safe and effective. As a result, governments must have robust systems and processes in place to detect adverse outcomes following vaccination and to be able to convey hazards clearly and effectively. Vaccination is the only tool to prevent the pandemic Stopping a pandemic involves the use of all available tools. Wearing masks and keeping a safe distance from people can help lower your risk of getting infected or transmitting it to others, but these precautions are insufficient. Vaccines work with your immune system to ensure that if you are exposed to the virus, you will be prepared to fight it. The greatest protection against COVID-19 is a combination of being vaccinated and following local government advice to protect yourself and others. Ending the COVID-19 pandemic would put an end to the virus’s expanding harmful influence on education, the economy, health care, and numerous other aspects of society. This needs involvement of everyone thus making the COVID-19 Vaccine for teens really important. COVID-19 immunization is a safer method to aid in the development of protection. COVID-19 can cause significant, life-threatening consequences, as seen by the hundreds of patients who require hospitalization every day. Even while certain groups are affected less severely than others due to age, health, and other reasons, no one can anticipate how COVID-19 will impact any individual. COVID-19 may provide some natural protection in the form of immunity. However, researchers are unsure how long that immunity lasts, and the danger of serious sickness and death from COVID-19 likely surpasses any natural immunity advantages. Getting vaccinated causes an antibody response, which protects you from contracting the disease without having to go through it. Experts are looking into both natural immunity and vaccine-induced immunity as significant elements of COVID-19. Vaccination versus the new variant of COVID-19 (DELTA) The vaccinations are quite effective at preventing patients from becoming unwell with the delta form of COVID-19 and developing clinical COVID-19. They’re less likely to spread the infection if they become sick and have symptoms, even if they’re minor. If you’re completely vaccinated and live in an area where case rates are steadily down due to high vaccine coverage, I’d feel comfortable traveling without a mask under those conditions. If you live in an area where COVID is prevalent, wearing a mask in busy indoor areas is merely one extra layer of protection. Now that you’ve heard some of the most important advantages of the COVID-19 vaccine for teens, you’re still undecided about whether or not to take it since you’re afraid of serious adverse effects. Before you get your first dose of vaccination, here are several methods to enhance your immune system. Your immune system is your body’s first line of protection. It could help you to have less severe after-effects when you took a vaccination. Or when a dangerous intruder enters your body, such as a cold or flu virus or the coronavirus that causes COVID-19, your immune system launches an attack. This attack, known as an immune response, is a series of actions that involves a variety of cells and takes place over time. The best thing you can do to maintain your immune system robustly and healthy is to follow basic health standards. When your body is shielded against environmental assaults and fortified by healthy-living methods like these, every component of your body, including your immune system, performs better: Maintaining Immune System 1. Stop smoking and vaping People who smoke were 2.4 times more likely than those who did not smoke to have severe COVID-19 symptoms, according to a new study published in the New England Journal of Medicine. What we do know is that smoking and vaping damage the lungs, leaving them irritated, fragile, and vulnerable to infection lung tissue. 2. Include fruits and vegetables in your diet For a healthy and balanced diet, a variety of foods such as whole grains, legumes, vegetables, fruits, nuts, and animal source foods should be consumed. There is no single meal that can protect you from COVID-19 infection. 3. If you believe that your food isn’t providing you with all of the nutrients you require, take a multivitamin. Taking a multivitamin may improve everyday quality of life by increasing energy, which is typically derived from B vitamin combinations, as well as other preventive measures according to Dr. Danielle Plummer, PharmD. “It’s critical to select a vitamin that has the components you’re low in and satisfies your nutritional demands,”. 4. Regular Exercise Aerobically active people are less likely to get colds and other viral illnesses and recover faster than those who are out of shape, according to scientists, in part because exercise can boost immune responses. Immune responses to vaccinations against COVID-19 and other diseases are also improved with improved fitness. More exercise provides a stronger immune system and a reduced chance of severe Covid. 5. Maintain a healthy weight “Just because you’re a healthy weight doesn’t mean you’re safe.” COVID-19 can infect even healthy people, according to doctors and medical experts who have examined the coronavirus. However, maintaining a healthy physique is essential for boosting your immune system and avoiding severe COVID-19 symptoms. 6. Don’t be stressed When you’re concerned about your job, family, finances, or current events, your immune system picks up on it. Psychological stress affects the body’s natural defenses, especially if it’s long-term. Stress and the Immune System. According to the American Psychological Association, stress can lower the number of natural killer cells or lymphocytes in the body, which are essential to combat COVID-19 symptoms. 7. Maintain your blood pressure to a normal level Regular exercise is a foundation of a healthy lifestyle. It boosts cardiovascular health, reduces blood pressure, aids weight loss, and protects against a number of illnesses. It aids in the natural strengthening and maintenance of your immune system. 8. Moderate drinking of alcohol Scientists have long discussed the effects of alcohol on immune function, finding that large doses of alcohol can directly decrease a wide range of immune responses on the one hand and that alcohol misuse is linked to an increased incidence of a variety of infectious illnesses on the other. 9. Get some sleep Sleep is extremely beneficial to the immune system. This is particularly true of antibodies, which are long-lasting proteins produced by the body in reaction to infections (and vaccines). Antibodies aid in the body’s recall of infections. 10. Always wash hands Take precautions to avoid infection, such as routinely washing your hands and avoiding touching your face with your hands, since dangerous bacteria can enter through your eyes, nose, and mouth. People at these trying times must really consider how their activities affect others. Even if a young person does not believe they are at risk for serious COVID-19 problems, they will almost definitely come into touch with someone who is. You are assisting your fellow people by getting immunized. Some claim that even if they are vaccinated, they may still acquire COVID. While these vaccinations can help you avoid contracting a disease, they’re especially effective at keeping you from becoming very ill. When we have a lot of transmissions, we expect some breakthrough instances. We want to see a decreased rate of COVID-19-related problems, and that’s precisely what we’re seeing with these vaccinations. To know more, visit their website at, like and follow “Bria Homes, Inc.” on Facebook, Twitter, Instagram, YouTube, Pinterest, Spotify, Viber Community, Telegram Channel, Kakao Talk, LINE, and WhatsApp, or call 0939-887-9637.
The effect of maize cutting height on cows 01-12-2016 | | Raising maize whole plant cutting height allows getting a better nutritive value for the harvested forage. Photo: Arvalis By increasing the maize cutting height to 30-40 cm compared to the classic height of 15 cm could lead to forage with a higher dry matter digestibility. This can be beneficial for feeding high producing cows. The forage team of ARVALIS-Institut du végétal, a French applied research Institute, studied the maize cutting height and its effect on digestibility in further detail. Such information is useful for dairy farmers and maize breeders to optimise the application of the crop even further. In the study, five maize hybrids were grown in two locations in France (Western and Eastern region). The mean plant height was 224 cm +/-20 cm and cob insertion height was 99 +/-9 cm. To get full data of the yield and the chemical composition of lower stover sections, maize plants were cut down at ground level (=0 cm) and sliced into five stover sections: 0-15 cm; 15-35 cm; 35-55 cm; 55-75 cm and above 75 cm (section containing the cob). Effect of higher cutting height The results revealed that between 0 and 75 cm above ground level, DM yield was very stable with 36+/- 6 kg DM/cm/ha. This figure is a bit lower than the international reference set at 45 kg/cm/ha (Wu and Roth, 2003). Raising the cutting height from 15 cm to 55 cm increased starch content by 100 g/kg (Table 1). The proportion of the stalk, with high fibre content, decreases as the NDF content falls by 70 g/kg. Raising the cutting height from 15 cm to 55 cm concentrates the harvested forage in ears which permits to increase DM content by 20 or 30 g/kg to reach the optimal stage more quickly and avoid leakage in the silo bunker. Rumen degradabilities of the stover sections (up to 15 cm) were obtained by an in sacco trial lead at ARVALIS experimental farm. Whereas DM effective degradabilities were very stable for sections under 75 cm, they were much lower than the section above 75 cm containing the cob. Thus the predicted organic matter digestibility increased from an average of 0.497 for stover sections 15-75 cm to 0.752 for sections above 75 cm. The ’55 cm maize forage’ is subjected to increase the acidosis risks slightly due to its high and quick DM degradability in the rumen (+3%). For the five maize hybrids cut at 55 cm, the organic matter digestibility is increased by 2.2 compared to those cut at 15 cm. This better digestibility improves net energy for lactation by 4% and increases forage ingestibility. The protein value protein is also improved due to a higher crude protein content and organic matter fermented in the rumen. Standardisation of forage quality Adjusting the maize cutting height permits to modify the composition and nutritive value to reduce the variability of maize silage quality in the bunker over the different fields or over the years of harvest. With this technique it is possible to increase the DM content of the harvested forage by 0.7% for every 10 cm of stover let at field. Thus, it can be possible to anticipate by 5 to 15 days a harvest depending on the maize desiccation (from 0.2 to 1% of DM per day during the grain filling). If the maize DM content is over 35-36%, it is not recommended to harvest the forage at 55 cm height; it would be rather better to harvest it a bit later as snaplage (silage which includes the grain, cob, and shuck silage) and adjust a diet with a high inclusion of grass to reach a minimum NDF content of 22% and a high milk production. Change in diet formulation Consequences of raising maize cutting height on ration formulation (INRATION 3.22 software) and farm main surface area have been observed by replacing the classical ‘15 cm maize silage’ by a ‘55 cm maize silage’ in a dairy cow diet (fat corrected milk yield: 35 kg/day) based on maize silage, grass silage, wheat grain and soya meal. This substitution leads to increase the forage:concentrate ratio by on average 5 % for diets aiming to maximise grass and maize intake (Table 2) without affecting NDF diet level nor milk quality. Due to a lower crop yield with a high cut, maize forage area needs to be extended by 10 to 25%. The main forage area (MFA) tends to be higher when a ‘55 cm maize silage’ is used in the two diet formulations tested maximising maize or grass intake. In case a simple substitution of a ‘15 cm maize’ by a ‘55 cm maize’, US studies showed that the milk production increased by 1.4 kg/d but fat content decreased by 3 g/kg. Raising maize whole plant cutting height allows getting a better nutritive value for the harvested forage but penalize a bit the DM yield per hectare. The adjustment of the height cut could be an effective mean to modify the forage chemical composition to reach more easily the quality required depending on the cattle needs. The use of high cut maize silage is efficient to level up the proportion of forage in the ration formulation but need to extend the farm main forage area. Contributors Global Dairy Sector Authors
Are you good at sleeping? Isn’t it ironic that many of us have more time to sleep while we isolate at home during the Pandemic but we have so many things to worry about that we lay awake for hours! It’s a given nowadays that getting a good night’s sleep is as important as good dietary habits and plenty of exercise for maintaining a healthy lifestyle. In fact, many industries have thrived during these difficult times because they’re connected to the sleep-health economy. According to the Sleep Industry is worth more than $30 billion. There are now so many ways to slip into a slumber - on a smart mattress, bathed in ambient lighting, drifting off to a Spotify sleep playlist, fueled by homeopathic sleep enhancers or meditation apps, following advice about routine modification or what to wear when you sleep or what to drink before you go to bed….. Lack of sleep can seriously affect us both physically and mentally. Obesity, diabetes, hypertension and the increased likelihood of suffering a stroke are probably the dangers most often associated with poor sleeping habits. The body is quite precise about how much it would like - too much sleep (more than 8-9 hours) is as bad as too little (less than 6 hours). Psychologically, a poor sleeper can also be subject to mood swings and depression and all kinds of cognitive impairment. So what can you do to ensure a good night’s sleep? 1. Create the right environment. Try to establish a quiet space at a cool temperature with as little stark lighting as possible.  2. Try to always include some exercise in your day, though not too close to bedtime - and limit the amount of daytime naps. 3. Stick to a routine. Try to retire and rise at roughly the same time every day and aim to get 7-8 hours sleep. This will reinforce a pattern which your body expects. 4. Never eat too much shortly before you go to sleep and try to avoid alcohol at a late hour. 5. Try to establish a relaxing routine for bringing the day to a gentle close, in preparation for a proper sleep. This is when a Hotteeze heat pad can help. Gentle heat is an effective relaxant, so when you’re listening to some soothing music or a meditation app, apply a heat pad around the neck, chest or shoulder area to de-stress from the day. Just remember that you shouldn’t sleep while using a heat pad, so just place it in an air-tight freezer bag when you’re ready for bed and effectively “shut it off” until you want it to heat up again.  Be safe, stay cosy and sweet dreams! Write a comment Comments are moderated
Blockchain For Dummies Author: Tiana Laurence Publisher: Wiley Date: May 2017 Pages: 240 ISBN: 978-1119365594 Print: 1119365597 Kindle: B06ZY3YDDK Audience: Non-technical users Rating: 3 Reviewer: Alex Armstrong This book isn't what is might appear to be. It isn't about the technology and after reading it it you probably won't know any more about how things work. As a dummy you are most likely going to be thrown by the use of unexplained words like "hash" and "merkle tree". There is a diagram of a merkle tree, but no explanation of what it is or how it works. At a slightly less technical level the introductory chapters have a tendency to use terms such as the Byzantine General's problem and similar. OK, this is all fine as you might not buy the book to find out how the blockchain works - just to find out why you keep hearing about it. The problem is that the book doesn't really distinguish between the different algorithms used in association with the blockchain and the basic idea of a blockchain. It claims that the blockchain solves the problem of who you can trust and this isn't true in any sense. The blockchain solves two  problems. The first is that it provides a way to create a public ledger that cannot be modified without that modification being noticed. The reason is that the blocks are linked together by cryptographic hashes which depend on blocks earlier in the chain. Any changes to the earlier blocks become immediately obvious as the chain becomes inconsistent. Why is this important to know? Because it indicates the essential properties of the blockchain. The deeper into a chain a block becomes the more it is fixed and unchangeable because changing it means rebuilding and revalidating the chain from that point on. The issue of trust isn't part of the blockchain's main algorithm, but part of the proof of work algorithm, which addresses the second problem regarding trust. While the blockchain doesn't prove that you can trust the person elected to validate the block. It does provide a trustworthy way of selecting that agent. The agent you select could be corrupt, but there is no way that any corrupt agents can manipulate the selection procedure so that they are certain to be selected to mal-administer the blockchain. OK, that's the blockchain in a nutshell and this book doesn't tell you this. What the book does do is to give you some very rough ideas of what a blockchain is and then takes you through some examples.  Chapter 1 is an introduction to the ideas of the blockchain and in many ways this is about as technical as the book gets. Chapter 2 is about picking a blockchain and is a vague management guide. Chapter 3 tells you how to get a bitcoin, use a wallet and what a smart contract is. Its final few pages explain Ethereum. Part 2 of the book is a tour of using different blockchains. Chapter 4 describes the Bitcoin blockchain, which is where it all started. From here we have chapters on Ethereum, Ripple, Factom (the author's own company) and DigiByte. Then in Part 3 the tour continues with Hyperledger, Azure and IBM Bluemix. Each is more or less a user's guide rather than being deep and technical. The fourth part of the book deals with application areas. We have chapters on financial technology, real estate, insurance and government and a final one on other smaller areas. The final part will seem a little strange if you are not familiar with other books in the For Dummies series. Called The Part of Tens it consists of three chapters that each list ten things - ten resources, ten rules and ten projects. This is part of the standard format and seems to work in this case.  I also have to agree with other reviewers that there are a lot of distracting typos and these make reading the book harder. I can't say I enjoyed reading this book, but this is mostly because I like tech and I wanted to have the tech explained to me. You might like it more if all you want it a sort of guided tour of the landscape of the blockchain. The problem really is that if you are going to innovate then to see the possibilities is something you first have to understand. This book partly equips you to get into the world of the blockchain as it is, but not to think of radical new ways it could be used. Closure: The Definitive Guide Author: Michael Bolin Publisher: O'Reilly, 2010 Pages: 592 ISBN: 978-1449381875 Print: 1449381871 Kindle: B0046RERYI Audience: Existing and potential users of Closure Rating: 4 Reviewed by: Mike James  Closure is Google's very strange JavaScript compiler - does this book succeed in demystify [ ... ] Artificial Intelligence By Example Author: Denis Rothman Publisher: Packt Publishing Pages: 578 ISBN: 978-1839211539 Print: 1839211539 Kindle: B084ZNNBNN Audience: developers interested in AI Rating: 2 Reviewer: Alex Armstrong Examples are worth their weight in code... More Reviews Last Updated ( Tuesday, 09 October 2018 )
A Brighter Outlook Studies show that senior citizens are among the happiest groups of people, and they tend to be more satisfied than their middle-aged counterparts. A telephone survey conducted by Stony Brook University found that people over 50-years-old were happier overall, with anger steadily declining in their 20s through the 70s, and stress falling off entirely in the 50s. Research finds that people get more comfortable as their emotions bounce around less. These studies reveal that negative emotions become less pronounced with age, in comparison to our drama-filled younger years. As we age, we are better able to differentiate our needs from wants and focus on what is truly important to us. A University of Basel study of people aged 18 to 89 found that regardless of demographic and social status, the older one gets the higher self-esteem climbs. Qualities like self-control and altruism can contribute to happiness. While it is true that some seniors can be vulnerable to isolation, overall, they are shown to have superior social abilities and empathetic skills. Sharper Reasoning Part of seniors increased happiness is due to a broader ability to prioritize and reason. Brain scans reveal that older adults are more likely to use both hemispheres of their brains simultaneously. This neurological state is known as bi-lateralization, which can sharpen reasoning skills. For example, in a University of Illinois study, older air traffic controllers excelled at their mentally taxing and high-stress jobs, despite some losses in short-term memory and visual-spatial processing. Older controllers proved to be experts at navigating, managing multiple aircraft simultaneously, and avoiding collisions. The study says, “This could be due to better coping abilities. Older people tend to have internal mechanisms to deal better with hardship or negative circumstances.” More Time for Family and Favorite Activities One of the most obvious perks of retirement is spending time with family, friends, and other loved ones. Retirement is an excellent opportunity for many to pursue dreams and passions they might’ve put on hold. For instance, you can learn a new language, take time to travel, or finally write that novel. In addition to spending time with loved ones and pursuing new interests and old plans, retired seniors have more time to be civically and politically involved, and they do just that. For example, people over aged 65 vote at a higher rate than any other age group according to data from the U.S. Census Bureau. They also volunteer at high numbers. According to this research, more than 21 million older adults, or one in every four seniors, contributed more than 3.3 billion hours of service in their communities. Based on an average estimate of the value of volunteer labor, senior citizens volunteer service contributes $77 billion annually to the economy. Among these volunteer opportunities are several federal Senior Corps organizations that are geared specifically to seniors, such as Foster Grandparents and Senior Companions. These programs involve 360,000 senior Americans in volunteer community service activities annually. Seventy-one percent of volunteers to these programs reported less feeling of loneliness and a willingness to further engage in volunteer activities in their communities. There are also many local programs dedicated to senior citizen volunteer opportunities. Senior Discounts As small as they may seem, discounts offered to seniors can certainly add up quickly. The discounts offered to seniors can help save money in a time in life where income is usually fixed or limited. These discounts also provide a fantastic incentive to make the most out of retirement, as many of these discounts are for activities like dining, travel, entertainment, and transportation. These discounts also provide a valuable incentive for seniors to make the most of their retirement, for they are often for the exact types of services that help seniors stay engaged and active, such as dining, medication, entertainment, and transportation. Discounts are available for a wide variety of local venues, such as restaurants, museums, movies, as well as more significant ventures such as travel services like resorts, hotels, and airfare. For example, the U.S. National Park Service offers citizens over age 62 and up, a lifetime pass for more than 2,000 federal park sites for $10. A Sense of Accomplishment Older people often have a healthy sense of pride that comes from a lifetime of accomplishments. Ordinary achievements like raising a family, being happily married, serving the country, or retiring from a career after years of dedicated service can be a rewarding source of contentment in retirement. Recommended Posts
Goal Setting How to Set Goals and Achieve Them? If we were to choose only one thing that we consider to be the most important reasons for success, then I have no doubt that it is to set goals of value and to know the ways to reach them, and this has been proven by several studies in this field. It was observed that, once the goal is clear and clear, one’s capabilities multiply, his activity increases, his mind wakes up, his motives move, and ideas that serve his purpose are generated. In the middle of the last century, a behavioral research team from Harvard Business School – took a random sample, numbering one hundred of the final year students, and asked them: What each of them wants to be after ten years of graduation, they all answered: They want to be influential forces in Money and business world. The researchers noted that only ten of the 100 students set specific, detailed, written goals, and worked out plans to achieve them. Ten years later, the research team itself made follow-up visits to the entire sample and found that what these ten people had in writing had set their goals – equivalent to (96%) of the total wealth of others . Clear goals allow an individual to overcome obstacles and obstacles, and accomplish in a short time more than what others achieve in a long time. That is because a person without a goal is a lost person. Can we imagine a pilot who is taking off and has no place he wants to reach or a map that leads to that place? Where does it end up flying? Perhaps his fuel is exhausted, his plane is aired, and he is thinking: Where is he going, and where is the plan that leads him to his destination! One of the business leaders says: The strong focus on a particular goal is the decisive factor in success, whether in matters of money or something else, and he adds: There are two conditions for brilliant success: to define for yourself exactly what you want and to know the price that must be paid, and be prepared to push it. goals setting Most people leave their lives in harmony without a goal; therefore, they do not achieve significant success, and those who know the value of challenging goals, have learned this; either from their families, or they come across a virtuous educator, or a teacher who understands the value of that, so he opens their eyes to him, and unfortunately this matter does not teach Schools or universities; one’s education may extend to more than (16) years without receiving one hour in which they are dedicated to talking about (setting goals and ways to achieve them). Young people can be trained in (the art of setting goals) at an early age, so parents set easy goals for them from their reality, and encourage them to achieve them, such as waking up at a certain hour, memorizing some poems, reading some books, or mastering some types of useful sports such as swimming, running, Etc. Perhaps one of the reasons for being reluctant to set goals – after being ignorant of their importance – is the fear that others will not respect and criticize our goals, and here we can take the wisdom that: “seek the success of your needs with discretion”. The way to achieve it. Another reason to be reluctant to set goals is fear of failure. Most people do not realize the importance of failure to prepare for success, the great success is preceded by – mostly – a major failure and the researcher (Napoleon Hill) interviewed more than (500) people who achieved high degrees of success, and found them all – without exception – have achieved Success after facing failure, but they decided to take another step after failure, so they got what they wanted. The greatest inventor of modern times, Thomas Edison, (failed ten thousand times) in his experiments on the light bulb before he succeeded in inventing it! One of the journalists asked him: Mr. Edison, you have so far failed five thousand times in inventing the light bulb, so why do you insist on moving forward with your experiences? He replied: You have sinned, young man, I have succeeded in discovering five thousand ways that do not get me to what I want! Most people prefer to stay in the (safety zone), and for this, they accept their current situation and do not think about change, while most of those who achieve significant success leave this region, and they accept a reasonable level of risk. Change is inevitable, but most people fear it. And, at the same time, they wish to achieve what they want, and wisdom requires us to accept change as long as necessary and to make it under our control as much as possible, and for that, we must have clear goals. There are three things that are of particular importance in relation to the subject of the objectives: First: What is known as: (the area of ??excellence): Every person has a certain aspect in which he can excel, and his duty towards himself is to discover this aspect and make the best use of it. It is unfortunate to see people who spend much of their lives in a humble field, convinced of inferiority, who do not strive for progress and progress, that the one who seeks to excel in the right field that suits him is not only superior, but his productive capacity and his psychological health are improving, but also improving, but also improving. He looks in the mirror and sees in front of him a layman in everything, who has no advantage, how does he feel to appreciate himself? Unless I know that there is one area – at least – I can excel in it, I cannot respect myself and give it the necessary right of appreciation. How do I find my life's goal? Second: the so-called: (diamond field): The reason for this designation is a famous story about an ordinary African farmer, who worked on his farm until he got old, and one day this farmer heard that some people travel in search of diamonds, which he finds from them becomes very rich; enthusiasm for the idea, sold his field and set out in search of diamonds. The man remained thirteen years searching until he realized his despair and did not realize his dream, so he threw himself in the sea to be food for fish, but the new farmer who had bought our friend’s field while working in the field and found something shining, and when he picked him and found him a small piece of diamonds, he got excited, And he started digging and digging hard and diligently, so he found again and again! Surprisingly, it was under his field a diamond mine! The old man looked for diamonds everywhere and did not search in his field, and he may have found a diamond that did not catch her because the diamond becomes beautiful only after cutting, shaping, and polishing, and the significance of the story: The secret of excellence may be closer to one of us from the place of his feet, but we do not pay attention to him, then talent like a diamond does not attract attention only after cutting and polishing, so when one wants to set goals for him in order to achieve it, he has to look at what he has, and does not go to the end of the world in search of a goal worthy of achievement. Third: the balance of goals necessary for the balance of personality: In order to have a balance in goals resulting from a balanced personality, one needs to have one goal – at least – that falls under each of the six collars, and if he achieves it, he will move to others. It is important that the goals are not contradictory, so it is not permissible – for example – that my goal is to spend half of my time entertaining and playing, and excelling at work at the same time, and also our goals must be achievable; we do not set an imaginable goal that is impossible to achieve, and we spend a lifetime running after it, We don’t realize it Here are a number of questions that help one set goal: ? List five things that you consider the most important thing you want to get, and that you are ready to do for them. ? In thirty seconds, write the three most important goals you want to get at the present time, and we have been given a very short time because what you write without knowledge and thought is a real goal far from decorating and beautifying imagination. ? If you were given a large amount of money, what is the first thing you do? What is the second thing? ? If you knew that you would only live for six months, what would you do? Remember the goal you crave, but you fear and retreat from seeking it, because your fear may not have a balance of reality, but it is a fear usually associated with success. ? What are the conditions and circumstances that give you the highest levels of self-realization, that is: feeling valuable and important? The answer to this question determines your area of ??excellence and helps you direct your life towards it. And after using these questions, choose for yourself one clear goal that you consider more important than the other, and not more than one goal that you start with. A suggested way to achieve the goals: There is a successful way to achieve the goals, it has been confirmed that it succeeds in hundreds of cases, a method that if you follow it achieves to you in one year what is not achieved in others in years, by the grace of God and good success. This method consists of the following steps: Goal Setting infographic 1- Desire: Start with a strong, sincere desire, your goal must be very desirable to you and emanating from within you, not a desire that someone else wants for you. 2- Trust: Build-in yourself complete confidence that you will obtain your goal, God willing, without doubt, or doubt, because if your conscious mind fully believes your goals, your subconscious (or your subconscious) will believe those goals, and thus direct your behavior towards achieving them, and your goals will be realistic, for example: If your weight is (100) kg, then your first goal is not to decrease (30) kg of it, start with: (5) kg, then move to the other five, but do not make your goal very easy because the challenge is necessary to find the motivation to exert effort. 3- Write down your goals: Writing goals on a sheet are very important. It is like writing a computer program that enters the subconscious, writing the goal in all its possible details. If you want to have a beautiful house, do not write: I want a beautiful house, but write – for example -: I want a house in which six Rooms, in an upscale neighborhood, have a garden, a spacious balcony, fresh views, and? Specialists in “goal psychology” have said: A goal, if not written, is a desire, not a goal. 4- Determine your benefit in achieving your goal: Write down all the benefits you will get if your goal is achieved. If it appears that the benefits are few, your pursuit of the goal will be weak, but if it is many important, the goal becomes an irresistible attraction. 5- Determine where you are now and where you want to reach: If you want to lose weight, make sure of your current weight, and determine how much you want to pour into the next stage. 6- Make an appointment to reach the goal: This helps you to make your goal measurable. You will not achieve much success until you know how many steps you must take, how many of you have been cut off, and how much you have left. 7- Determine the obstacles that you have to overcome: If there are no obstacles, then what you are looking for is not a goal, but activity and movement, and you will notice that the obstacles that seemed large would look smaller after you write them. 8- Determine the information needed to reach the goal: Most of the goals – in our time – require achieving good knowledge, the necessary knowledge may be found in books, or in the market, or for some people, or you can obtain it from (the Internet). 9- Identify the people who need your help to achieve the goal: Maybe you can use someone to reach your goal, so why not ask for help? It could be an individual, a body, an association, or a company. In this regard, remember that life is giving and take. If you can give something to someone who asks for help, then do, ask yourself: What can I give others before they give me? The great throughout history gives more than they take, but unfortunately, most people want to get what works for them with the least amount of effort and giving. 10- Draw a business plan: Create a business plan taking advantage of the points previously mentioned, write down the activities that you will undertake, arrange the priorities, set the time required, then amend the plan as you progress in the implementation, or you get new information, or errors appear to you, or new obstacles are encountered in your face if you Those who achieve the highest success always have a plan that defines work over days, weeks, and months. 11- Imagine that your goal has been achieved: Imagine clearly that your goal has already been achieved as if you see it on TV, repeat this frequently, the amount of goal achieved is as clear as his image in your mind. Leave a Comment
coding classes for kids Getty Images By Analiese Dodd These 15 free coding classes for kids are available now to help your kids learn skills that are becoming more and more essential in our current times. Knowing even just basic computer programming is more important than ever with lots of businesses moving to online platforms. Your kids can start from a young age to develop these skills, and these options will allow them to do it in a fun and interesting way. If you’re looking for other online coding classes, check out Scoop: Code With Penguin Coding School This School Year Blocky Games Blocky Games has several inviting activities that kids can use to learn about basic coding functions. Each game focuses on one element of coding, and shows kids exactly how changes to the basic code can make a huge difference in the results. It shows kids the basics of coding, and gives them introductions to important concepts they can use later in more advanced coding programs. provides an assortment of enrichment activities your kids can enjoy while also developing their coding skills. Their “hour of code” programs allow kids to spend time focusing on projects that relate directly to their interests. Whether they want to explore the world of Star Wars, Disney, or Minecraft, they’ll find an exercise that relates to it here. Code Combat Code Combat is an interactive experience in which kids can venture through a magical world with coding as their weapon of choice. This adventure game combines coding with magic warriors to keep kids invested from the first level. As they journey on, the coding gets more and more complex increasing their personal skill level as well as their character’s. If your kids already love video games, this one will allow them to have all the excitement of playing while also teaching them along the way. Codemoji has created a unique coding experience with their playground in which basic coding commands are shown as fun emojis. Instead of remembering headings as <h1>, kids can remember that the ice cream cone creates their headings. Codemoji also offers more traditional coding options you can introduce after the emojis have lost their intrigue. The entire website will keep kids entertained no matter their coding level. Code Monkey Code Monkey is a fun animated website where kids can learn basic coding skills and techniques. It provides coding games for every age range and skill level to keep kids busy throughout their childhood. The animation and fun levels will keep kids glued to the screen, and learning code without ever realizing it. There are free versions of each game, but also paid longer versions if your kids get invested. Crunchzilla Code Monster The Code Monster provides an excellent source for those just starting out in coding. Crunchzilla provides two boxes; on the left they can see the code, and on the right they’ll see what their code is actually doing to the image. The fun monster takes kids step by step through basic codes to see how it all works. This website is a great way for kids to see exactly how their actions change their programs and will give them basic knowledge they can use in more advanced coding later. This website provides over 6,000 tutorials for kids to use to develop essential coding skills. These courses cover a variety of topics with great videos and instructions. Whatever your kid’s goal is related to computer programming, they’ll be able to find workshops here to develop the skills necessary to achieve those end goals. Glitch is perfect for any kid who is looking for traditional coding practice. It walks kids through how to build websites and apps from start to finish. Glitch provides basic instructions, but leaves everything else up to your kids. Once kids have even a small grasp of coding, this is the perfect place to uses those skills in a creative and unique way. Khan Academy Khan Academy is known for its great math courses, but now they’ve entered into the world of computer programming too. They offer a variety of different classes within the realm of coding, so kids can learn a myriad of skills. Khan Academy is similar to a traditional classroom with videos followed by fun assignments. If your child learns best in this setting, these classes are perfect for them. LightBot is an entertaining game in which your child must light up certain tiles to advance. The entire adventure requires kids to think through programming logic in order to solve each problem. It teaches kids the basics of sequencing and procedures through a game they can get invested in. They can investigate the puzzles level by level, developing more advanced skills each time they level up. mBlock provides access to coding editors for python and block-based coding. Kids can also get involved with other coding projects working on things like facial recognition and a music lighting show. If your kids want to experience all different types of programming, they’ll be able to find lots of different options for some more advanced coding practice. Students at MIT created Scratch to encourage the next generation of kids to get involved in coding for free. The website allows kids to create their own programs that can do anything they set their minds to. Their tutorials will take kids through every step in creating their own interactive programs. With hundreds of possibilities, your kids will be able to share their creativity through coding in a way they never have before. They also have Scratch Jr. aimed at an even younger group of future coders. Stencyl provides kids with an opportunity to create their own game using some basic coding skills. The app doesn’t go into full detail about all the coding that goes into creating the games, but it gives kids an introduction into the larger world of game design. If your kids are obsessed with video games and apps, this will allow them to develop their own adventure while learning along the way. Swift Playgrounds Swift Playgrounds is a fun and interactive app where kids can create their own world through coding. Similar to a puzzle, kids will solve problems through coding, developing their skills in a quick and fun way. It requires no prior coding knowledge and is an entertaining gateway to more advanced coding later. Do keep in mind that it does require either a Mac computer or iPad in order to run. Tynker has tons of different coding games you kids can create for free. No matter their interests, your kids will find a program where they’ll be creating something for themselves. There is also an option to create your own project that can be shared with others in the community. You can play up to 20 coding games for free, and pay for more if your kids still have interest. This story first appeared on
Ayub Khan From New World Encyclopedia Muhammad Ayub Khan Field Marshal Muhammad Ayub Khan GCMG, MBE, Hilal-i-Jurat, NPk, (May 14, 1907 – April 19, 1974) was a Field Marshal during the mid-1960s, and the President of Pakistan from 1958 to 1969. He handed over power to Commander in Chief General Yahya Khan, whom he had promoted over the head of other senior officers. He became Pakistan's first native Commander in Chief in 1951, and was the youngest full-rank general and self-appointed Field Marshal in Pakistan's military history. He was also the first Pakistani military general to seize power through a coup. He dismissed the elected assembly, accusing it of being power hunger and corrupt. In this, he set a precedent which others, such as Muhammad Zia-ul-Haq and Pervez Musharaff have followed, manipulating the system to confirm and extend their presidencies. Military intervention was, and has been, in order to stabilize the country. In the ten years of his Presidency, the gross national product rose by an impressive 45 percent and manufactured goods began to replace the more traditional jute and cotton exports. However, his policies were designed to reward the elite families and the feudal lords, who, with the military, represented a ruling oligarchy that had little interest in restoring genuine democracy. As Zia did later, he gained millions of dollars of US aid by aligning Pakistan with the US against the Soviet Union. Yet this wealth was unequally distributed, so that the rich grew richer and the poor poorer. Having dismissed an elected government for allegedly being corrupt, he and his family amassed a fortune. More so than subsequent military dictators in Pakistan, he is responsible for creating an ethos in which popular participation in government is perceived as a privileged arena, and a ruling elite participate. Elected governments have been overthrown, charged with corruption or with inability to maintain national unity and stability. Early life Ayub Khan was born in the village of Rehana in Haripur District to a Hindko speaking family of the Tareen tribe, the first child of the second wife of Mir Dad Khan, who was a Risaldar-Major (the senior most non-commissioned rank) in Hodson's Horse, a cavalry regiment of the Royal Indian Army. For his basic education, he was enrolled in a school in Sarai Saleh, which was about four miles from his village. He used to go to school on a mule's back. Later he was shifted to a school in Haripur, where he started living with his grandmother. He enrolled at Aligarh University in 1922, but he did not complete his studies, as he was accepted into the Royal Military Academy Sandhurst. He did well at Sandhurst, and was given an officer's post in the British Indian Army and then joined the 1st Battalion of the 14th Punjab Regiment (Sherdils), later known as 5th Punjab Regiment. During World War II he served as a captain and later as a major on the Burma front. Following the war, he joined the fledgling Pakistani Army as the 10th ranking senior officer (his Pakistan Army number was 10). He was promoted to Brigadier and commanded a brigade in Waziristan and then was sent initially with the local rank of Major General to East Pakistan (present day Bangladesh) as General Officer Commanding a division that was responsible for the whole East Wing of Pakistan in 1948, for which non-combatant service he was awarded the Hilal-i-Jurat (HJ) and from where he returned in November 1949 as Adjutant General and then briefly was named Deputy Commander-in-Chief. Defense Minister He would later go on to serve in the second cabinet (1954) of Muhammad Ali Bogra as Defense Minister, and when Iskander Mirza declared martial law on October 7, 1958, Ayub Khan was made its chief martial law administrator. This would be the first of many instances in the history of Pakistan of the military becoming directly involved in politics. President of Pakistan (1958 - 1969) As a result of his having control of the Pakistan Army, Ayub deposed Mirza on October 27 in a bloodless coup, sending Generals Azam, Burki and Sheikh in the middle of the night to pack Mirza off to exile in England. This was actually welcomed in Pakistan, since the nation had experienced a very unstable political climate since independence. In 1960, he held an indirect referendum of his term in power. Functioning as a kind of electoral college, close to 80,000 recently elected village councilmen were allowed to vote yes or no to the question: "Have you confidence in the President, Field Marshal Mohammed Ayub Khan?" Winning 95.6 percent of the vote, he used the confirmation as impetus to formalize his new system. In 1962, he pushed through a new constitution that while it did give due respect to Islam, it did not declare Islam the state religion of the country. It also provided for election of the President by 80,000 (later raised to 120,000) basic democrats—men who could theoretically make their own choice but who were essentially under his control. The government "guided" the press and, while Ayub permitted a national assembly, it had only limited powers. Legal reforms Ayub Khan introduced the Muslim Family Laws through an Ordinance on March 2, 1961, under which unmitigated polygamy was abolished, consent of the current wife was made mandatory for a second marriage, brakes were also placed on the practice of instant divorce where men pronounced it irrevocably by pronouncing talaq thrice in one go. The Arbitration Councils set up under the law in the urban and rural areas were to deal with cases of (a) grant of sanction to a person to contract a second marriage during the subsistence of a marriage; (b) reconciliation of a dispute between a husband and a wife; (c) grant maintenance to the wife and children.[1] Presidential Elections Despite Jinnah's considerable popularity and public disaffection with Ayub's government,[2] Ayub won with 64 percent of the vote in a bitterly contested election on January 2, 1965. The election did not conform to international standards and journalists. It is widely held, as subsequent historians and analysts, almost uniformly say, that the elections were rigged in favor of Ayub Khan. Foreign policy Indo-Pakistani War of 1965 The turning point in his rule was the Indo-Pakistani War of 1965, Despite many repulsed Indian attacks, the war adversely affected Pakistan's then rapidly developing economy and it ended in a settlement reached by Ayub at Tashkent, called the Tashkent Declaration. The settlement was perceived negatively by many Pakistanis and led Zulfiqar Ali Bhutto to resign his post and take up opposition to Khan. According to Morrice James, "For [Pakistanis] Ayub had betrayed the nation and had inexcusably lost face before the Indians."[3] The war also increased opposition in East Pakistan (now Bangladesh) where the Awami League headed by Sheikh Mujibur Rahman sought more autonomy for the province. General Ayub Khan who had assumed office of the commander in chief in 1951 dismissed the first constituent assembly on grounds that, "The constituent assembly being power hungry and having a tendency of being corrupt." Molvi Tammizudin the first speaker of the assembly challenged the dismissal (he had to take a rickshaw, wear a burka and go through Sindh court backdoor to seek for justice for a nation). Sindh court accepted the appeal but the Federal Court dismissed the Sindh court judgment as the "Doctrine of necessity." Later on the decision has been the basis of all autocratic adjustments in Pakistan. The real power broker Ayub Khan as the commander in chief had come to the foreground. The rankers in Pakistan could not refuse the price offered by their “friends not masters.” Ayub Khan who writes in his biography that he used to go to school on a donkey back; his immediate generation became the owners of the Pan Asian group in Pakistan. This was how the autocrat defeated the mother of the nation in a referendum. The constitution of Pakistan during this phase was constantly molded to validate the illegitimate power and ulterior motives of a single family; consequently no grooming of the access of justice to the common people was allowed. These were the years when Pakistan in 1963 imprudently allowed US to camp near Peshawar at Badaber and use its air space and air bases. It was then when that infamous bata bair U2 incident took place, the Red Circle on Pakistan’s map placed by Nikita Khrushev predestined Pakistan into an open conflict with the USSR. While the 1965 conflict with India had to defer the referendum’s public vent, the ceasefire served the vested interests of at least two parties, the US till then was heavily occupied in Vietnam and could not spare resources itself. An increased Communist China Influence could have shifted the power influences in this critical region of that time; Vietnam was not a completely lost war till then. The causes of conflict were to be left unresolved, but Gen Ayub sanctioned himself to decorate to the Rank of Field Marshal instead of passing on credits to Gen Musa Khan the then commander in chief of the army. Final Years in office Muhammad Ali Jinnah with GOC East Pakistan Ayub Khan in 1948. Ayub Khan's legacy is mixed—he was opposed to democracy believing like any other dictator that parliamentary democracy was not suited for the people of his country. Like many subsequent military dictators he was contemptuous of politicians and political parties. However, during his early years in office, he sided with the Americans against the Soviets, and in return received billions of dollars in aid, which resulted in enormous economic growth. He subsidized fertilizers and modernized agriculture through irrigation development, spurred industrial growth with liberal tax benefits. In the decade of his rule, gross national product rose by 45 percent and manufactured goods began to overtake such traditional exports as jute and cotton. It is alleged that his policies were tailored to reward the elite families and the feudal lords. During the fall of his dictatorship, just when the government was celebrating the so-called "Decade of Development," mass protests erupted due an increasingly greater divide between the rich and the poor. Aggravating an already bad situation, with increasing economic disparity in the country under his rule, hoarding and manipulation by major sugar manufacturers resulted in the controlled price of one kg sugar to be increased by one rupee and the whole population took to the streets.[5] As Ayub's popularity plummeted, he decided to give up rule. In 1971 when the Bangladesh War of Independence which led to the separation of East Pakistan broke out, Ayub Khan was in West Pakistan and did not comment on the events of the war. He died in 1974. Personal life Ayub Khan’s son Gohar Ayub Khan was Pakistan’s Foreign Minister in the Nawaz Sharif government. Gohar’s son and Ayub’s grandson Omar Ayub Khan is Pakistan’s current Minister of State for Finance. Military offices Preceded by: Gen. Sir Douglas David Gracey Commander in Chief of the Pakistan Army Succeeded by: General Musa Khan 1. Abdul Sattar Ghazali (1997), Islamic Pakistan: Illusions and Reality chapter four, "The First Martial Law." Ghazali.net. Retrieved July 19, 2008. 2. 1964, Trouble with Mother Time Magazine. Retrieved July 19, 2008. 3. Victoria Schofield, Kashmir in Conflict: India, Pakistan and the Unending War (London, UK: I.B. Tauris, 2003, ISBN 1860648983), 112. 4. Abbasm Hassan Abbas, Pakistan's Drift Into Extremism: Allah, the Army, and America's War on Terror (London, UK: M.E. Sharpe, 2004, ISBN 0765614979), 53. 5. Ayaz Amir (2006), Comrade Stalin and the sugar question Dawn. Retrieved July 19, 2008. • Gauhar, Altaf. 1996. Ayub Khan, Pakistan's first military ruler. Oxford, UK: Oxford University Press. ISBN 9780195776478 • Hussain, Syed Shabbir. 2000. Ayub, Bhutto, and Zia: how they fell victim to their own plans. Lahore, PK: Sang-e-Meel Publications. ISBN 9789693510805 • Khan, Muhammad Ayub. 1967. Friends Not Masters: A Political Autobiography. Oxford, UK: Clarendon Press. • Khan, Mohammad Ayub, and Craig Baxter. 2007. Diaries of Field Marshal Mohammad Ayub Khan: 1966-1972. Oxford, UK: Oxford University Press. ISBN 9780195474428 • Ziring, Lawrence. 1971. The Ayub Khan era; politics in Pakistan, 1958-1969. Syracuse, NY: Syracuse University Press. ISBN 9780815600756
Rare Pediatrics News Disease Profile IgG4-related dacryoadenitis and sialadenitis Age of onset All ages Not applicable Other names (AKA) Mikulicz's disease (former); Mikulicz disease (former); Mikulicz syndrome (former); Ear, Nose, and Throat Diseases IgG4-related dacryoadenitis and sialoadenitis (formerly called Mikulicz disease) is an IgG4-related disease characterized by inflammation of the lacrimal glands (which produce tears), parotid glands, and submandibular glands (two of the major salivary glands).[1] In some cases, it also affects other glands or organs.[1][2] The condition is usually painless, mainly causing mouth and eye dryness, and swelling over the affected glands.[1][2] When other organs are affected, it can be accompanied by complications such as autoimmune pancreatitis, retroperitoneal fibrosis, and tubulointerstitial nephritis.[1] The underlying cause of IgG4-related disease is still not known.[3] Treatment involves corticosteroids, which are usually effective.[4][2] Medicines that suppress the immune system (immunosuppressants) may also be used in cases that do not respond to corticosteroids.[4][2] IgG4-related dacryoadenitis and sialoadenitis was previously considered a subtype of Sjogren syndrome, but it is now known to be a distinct condition.[2] Social Networking Websites Organizations Providing General Support Learn more Where to Start In-Depth Information • PubMed is a searchable database of medical literature and lists journal articles that discuss IgG4-related dacryoadenitis and sialadenitis. Click on the link to view a sample search on this topic. 1. IgG4-related dacryoadenitis and sialadenitis. Orphanet. https://www.orpha.net/consor/cgi-bin/OC_Exp.php?lng=en&Expert=79078. Accessed 9/20/2017. 2. Takano K, Yamamoto M, Takahashi H, Himi T. Recent advances in knowledge regarding the head and neck manifestations of IgG4-related disease. Auris Nasus Larynx. February, 2017; 44(1):7-17. https://www.sciencedirect.com/science/article/pii/S0385814616303285. 3. Kamekura R, Takano K, Yamamoto M, et al. Cutting Edge: A Critical Role of Lesional T Follicular Helper Cells in the Pathogenesis of IgG4-Related Disease. J Immunol. September 15, 2017; [Epub ahead of print]:https://www.ncbi.nlm.nih.gov/pubmed/28916523. 4. Pieringer H, Parzer I, Wöhrer A, Reis P, Oppl B, and Zwerina J. IgG4related disease: an orphan disease with many faces. Orphanet J Rare Dis. 2014; 9:110:https://ojrd.biomedcentral.com/articles/10.1186/s13023-014-0110-z.
Skip to ContentSkip to Navigation Part of University of Groningen Science Linx News From defect to device 18 November 2014 For years, physicists tried to avoid defects when they were growing thin films. But now they love them! University of Groningen Professor of Functional Nanomaterials Beatriz Noheda has just published a paper in the journal Nature, in which she shows how defects can lead to new chemistry. Professor Beatriz Noheda | Photo Science LinX Professor Beatriz Noheda | Photo Science LinX ‘We’re very good at growing thin films at the University of Groningen’, says Noheda. For a long time, that meant growing a layer of perhaps a few dozen atoms that is perfectly flat and uniform. Now Noheda prides herself on being able to create as many breaks in the perfect symmetry of the thin film as she pleases. ‘These films grow as crystals, but crystals can start nucleating at different points on the surface and then grow in different directions. Where two growing crystals meet, they form what is known as a domain wall.’ These walls separate the ‘domains’ of uniform crystals. ‘The walls break the symmetry of the crystal. For years, this was seen as something to be avoided.’ Scientists used all sorts of techniques to grow thin layers that were as uniform as possible. ‘But symmetry breaks are the points where exciting things happen, like in the Big Bang. And matter assumes new properties where the symmetry is broken.’ Noheda set out to study the broken symmetry in the domain walls. That is no easy task: these walls are just one atom wide. ‘Not even atomic force microscopy has the resolution to study them directly.’ Fortunately, Noheda is good at growing thin films. ‘We can control the number of domain walls by varying the substrate on which the crystals grow and the thickness of the thin layer.’ Two mirror-image domains (terbium in green, manganese in red, oxygen not shown) meet at a domain wall, where terbium atoms are squeezed out and replaced by manganese (red cross) | Photo Noheda/Nature The substrate is a key element: the atomic structure of the substrate layer affects the way in which the crystals grow. Furthermore, the tension inside the thin layers changes with their thickness. ‘These variables help us control the density of domain walls. By comparing stretches with varying wall density, we can correlate properties of the material to the number of domain walls.’ What she noticed in the thin layers described in the Nature paper was that an increase of domain wall density also increased the magnetism of the material. ‘The next question was: how can these domain walls be magnetic, when the domains, the symmetric crystals, are not?’ It took three teams of electron microscopists from Spain, France and Germany to realize that something strange happens at the domains walls. Noheda and her collaborators noticed a change in the crystal structure. This is where things get a little technical. The thin film was grown from a compound called terbium-manganese-oxide. The terbium atoms are bigger than the manganese ones, and they form a sort of zigzag line in the crystal. Professor Maxim Mostovoy | Photo Science LinX Professor Maxim Mostovoy | Photo Science LinX But something strange happens in the domain wall. Here, the zigs and zags are not neatly aligned, like spoons nested inside a drawer. ‘Instead, they are mirror images of each other’, explains Noheda. So a zig mirrors a zag or in spoon-language: the spoons are arranged with mirroring concave or convex sides. Where two convex sides are opposite each other, the spoons are closer. The same happens in the opposing zigzag lines of terbium atoms. In the domain wall, the distance between two terbium atoms is alternately greater or smaller than in the rest of the crystal. ‘Where two terbium atoms were coming close together in the domain wall, it looked as if there was a void, and the terbium had been squeezed out. But then we found that a terbium atom was in fact replaced by a smaller manganese atom.’ Noheda engaged her colleague Maxim Mostovoy, a professor of theoretical physics at the University of Groningen, and collaborators in Barcelona to model the atomic structure of the domain wall. Their calculations showed that this manganese was connected to four other manganese atoms in a unique square planar structure. ‘The crystal structure in the domain wall forces the terbium out and creates a new manganese compound. Thus, the stress inside the wall has caused a new chemical reaction to take place.’ Artists impression of a domain wall | Illustration Noheda Artists impression of a domain wall | Illustration Noheda That is where it gets really exciting: a new chemical reaction catalyzed by the stress inside a domain wall. ‘This means the domain wall is acting like a chemical reactor at an atomic scale. And we believe what we have found is a general principle. Whenever we have a similar crystal structure, with the zigzag line and a large and small atom, such a replacement can take place.’ Open mind The discovery may lead to the production of new materials inside domain walls, and that would give the walls new properties. ‘The current material results in magnetism caused by the wall. In the Nature paper, we have described in detail how this magnetism arises, but we can’t do anything useful with it. However, if we can use this knowledge to create walls with a magnetism we can switch at room temperature, it could result in a device of atomic dimensions.’ It makes Noheda think back to her predecessors, who saw domain walls as impurities to be avoided when creating thin films. ‘Their defects may now become new devices. That is a useful lesson for students: always keep an open mind!’ Referentie: Artificial chemical and magnetic structure at the domain walls of an epitaxial oxide. S. Farokhipoor, C. Magén, S. Venkatesan, J. Íñiguez, C.J.M. Daumont, D. Rubi, E. Snoeck, M. Mostovoy, C. de Graaf, A. Müller, M. Döblinger, C. Scheu and B. Noheda Nature, 20 November 2014, DOI 10.1038/nature13918 See also the University of Groningen press release. Last modified:10 June 2015 2.56 p.m. printView this page in: Nederlands More news
Moroccan and Turkish Hammam Rituals Women around the world have begun to realise the benefits of silk body exfoliation which has been growing more and more popular in recent years. But where does this ritual come from? Discover the history of this wonderful and ancient practice which is being embraced around the world. Where did the hammam ritual come from? The hammam ritual dates back thousands of years ago when ancient Moroccan and Turkish civilizations would welcome people to private and public steam baths where they would cleanse themselves from head to toe while socialising with their friends and family once a week. How does the hammam ritual work? The hammam ritual takes place within an enclosed steam room. Once the skin has softened, a hammam attendant would throw water on you to moisten the skin. They would then begin exfoliating your skin with a glove (called KESE in Turkish or KISSE in Moroccan) to remove all the dead skin. The overall premise of the Hammam ritual is to cleanse the individual’s whole body. Hammam rituals today Even after thousands of years, the ritual of traditional hammam is still practiced in Morocco and Turkey. There are spas that will provide you with the full experience which are visited by locals and tourists alike. If you are unable to travel to these places, you can still take part in the ritual from the comfort of your own home by purchasing our silk exfoliating glove. All you need to do is head into the shower and let the steam sink into your skin for 7 to 10 minutes. Then, wet your silk exfoliating glove and begin rubbing your body with firm pressure to remove the dead skin. Once you're out of the shower, lock in that moisture with your favourite body lotion for more hydration. You will feel relaxed and radiant and will have experienced the full hammam ritual at home.
Identify the Problem What the Mape Is FALSELY Blamed For, Its TRUE Weaknesses and BETTER Alternatives! Jan Fischer Blog, Data Science, Statistik A major problem arises when comparing forecasting methods and models across different time series. This is a challenge we regularly face at STATWORX. Unit dependent measures like the MAE (Mean Absolute Error) and the RMSE (Root Mean Squared Error) turn out to be unsuitable and hardly helpful if the time series is measured in different units. However, if this is not the case, both measures provide valuable information. The MAE is perfectly interpretable as it embodies the average absolute deviation from the actual values. The RMSE, on the other hand, is not that easy to interpret, more vulnerable to extreme values but still often used in practice. MAE\ =\frac{1}{n}\ \sum_{i\ =1}^{n}{|{\rm Actual}_i\ -\ {\rm Forecast}_i}| \mathrm{RMSE=\ }\sqrt{\frac{\mathrm{1}}{\mathrm{n}}\mathrm{\ } \sum_{\mathrm{i\ =\ 1}}^{\mathrm{n}}{\mathrm{(}{\mathrm{Actual}}_\mathrm{i}\mathrm{-} {\mathrm{Forecast}}_\mathrm{i}\mathrm{)} }^\mathrm{2}} One of the most commonly used measures that avoids this problem is called MAPE (Mean Absolute Percentage Error). It solves the problem of the mentioned approaches as it does not depend on the unit of the time series. Furthermore, decision-makers without a statistical background can easily interpret and understand this measure. Despite its popularity, the MAPE was and is still criticized. MAPE\ =\frac{1}{n}\ \sum_{i\ =1}^{n}{|\frac{{\rm Actual}_i\ -\ {\rm Forecast}_i}{{\rm Actual}_i}|}*100 In this article, I evaluate these critical arguments and prove that at least some of them are highly questionable. The second part of my article concentrates on true weaknesses of the MAPE, some of them well-known but others hiding in the shadows. In the third section, I discuss various alternatives and summarize under which circumstances the use of the MAPE seems to be appropriate (and when it’s not). Table of Contents What the MAPE is FALSELY blamed for! It Puts Heavier Penalties on Negative Errors Than on Positive Errors Most sources dealing with the MAPE point out this „major“ issue of the measure. The statement is primarily based on two different arguments. First, they claim that interchanging the actual value with the forecasted value proofs their point (Makridakis 1993). Case 1: {Actual}_1 = 150 & {Forecast}_1 = 100 (positive error) {\rm APE}_1\ =\ |\frac{{\rm Actual}_1\ -\ {\rm Forecast}_1}{{\rm Actual}_1}|\ *100 =\ |\frac{150\ -\ 100}{150}|\ *100 =\ 33.33\ Percent Case 2: {Actual}_2 = 100 & {Forecast}_2 = 150 (negative error) {\rm APE}_2\ =\ |\frac{{\rm Actual}_2\ -\ {\rm Forecast}_2}{{\rm Actual}_2}|\ *100 =\ |\frac{100\ -\ 150}{100}|\ *100 =\ 50\ Percent It is true that Case 1 (positive error of 50) is related to a lower APE (Absolute Percentage Error) than Case 2 (negative error of 50). However, the reason here is not that the error is positive or negative but simply that the actual value changes. If the actual value stays constant, the APE is equal for both types of errors (Goodwin & Lawton 1999). That is clarified by the following example. Case 3: {Actual}_3 = 100 & {Forecast}_3 = 50 {\rm APE}_3\ =\ |\frac{{\rm Actual}_3\ -\ {\rm Forecast}_3}{{\rm Actual}_3}|\ *100 =\ |\frac{100\ -\ 50}{100}|\ *100 =\ 50\ Percent Case 4: {Actual}_4= 100 & {Forecast}_4 = 150 {\rm APE}_4\ =\ |\frac{{\rm Actual}_4\ -\ {\rm Forecast}_4}{{\rm Actual}_4}|\ *100 =\ |\frac{100\ -\ 150}{100}|\ *100 =\ 50\ Percent The second, equally invalid argument supporting the asymmetry of the MAPE arises from the assumption about the predicted data. As the MAPE is mainly suited to be used to evaluate predictions on a ratio scale, the MAPE is bounded on the lower side by an error of 100% (Armstrong & Collopy 1992). However, this does not imply that the MAPE overweights or underweights some types of errors, but that these errors are not possible. Its TRUE weaknesses! It Fails if Some of the Actual Values Are Equal to Zero This statement is a well-known problem of the focal measure. However, that and the latter argument were the reason for the development of a modified form of the MAPE, the SMAPE („Symmetric“ Mean Absolute Percentage). Ironically, in contrast to the original MAPE, this modified form suffers from true asymmetry (Goodwin & Lawton 1999). I will clarify this argument in the last section of the article. Particularly Small Actual Values Bias the Mape If any true values are very close to zero, the corresponding absolute percentage errors will be extremely high and therefore bias the informativity of the MAPE (Hyndman & Koehler 2006). The following graph clarifies this point. Although all three forecasts have the same absolute errors, the MAPE of the time series with only one extremely small value is approximately twice as high as the MAPE of the other forecasts. This issue implies that the MAPE should be used carefully if there are extremely small observations and directly motivates the last and often ignored the weakness of the MAPE. The Mape Implies Only Which Forecast Is Proportionally Better As mentioned at the beginning of this article, one advantage of using the MAPE for comparison between forecasts of different time series is its unit independency. However, it is essential to keep in mind that the MAPE only implies which forecast is proportionally better. The following graph shows three different time series and their corresponding forecasts. The only difference between them is their general level. The same absolute errors lead, therefore, to profoundly different MAPEs. This article critically questions, if it is reasonable to use such a percentage-based measure for the comparison between forecasts for different time series. If the different time series aren’t behaving in a somehow comparable level (as shown in the following graphic), using the MAPE to infer if a forecast is generally better for one time series than for another relies on the assumption that the same absolute errors are less problematic for time series on higher levels than for time series on lower levels: If a time series fluctuates around 100, then predicting 101 is way better than predicting 2 for a time series fluctuating around 1.“ That might be true in some cases. However, in general, this a questionable or at least an assumption people should always be aware of when using the MAPE to compare forecasts between different time series. In summary, the discussed findings show that the MAPE should be used with caution as an instrument for comparing forecasts across different time series. A necessary condition is that the time series only contains strictly positive values. Second only some extremely small values have the potential to bias the MAPE heavily. Last, the MAPE depends systematically on the level of the time series as it is a percentage based error. This article critically questions if it is meaningful to generalize from being a proportionally better forecast to being a generally better forecast. BETTER alternatives! The discussed implies that the MAPE alone is often not very useful when the objective is to compare accuracy between different forecasts for different time series. Although relying only on one easily understandable measure appears to be comfortable, it comes with a high risk of drawing misleading conclusions. In general, it is always recommended to use different measures combined. In addition to numerical measures, a visualization of the time series, including the actual and the forecasted values always provides valuable information. However, if one single numeric measure is the only option, there are some excellent alternatives. Scaled Measures Scaled measures compare the measure of a forecast, for example, the MAE relative to the MAE of a benchmark method. Similar measures can be defined using RMSE, MAPE, or other measures. Common benchmark methods are the „random walk“, the „naïve“ method and the „mean“ method. These measures are easy to interpret as they show how the focal model compares to the benchmark methods. However, it is important to keep in mind that relative measures rely on the selection of the benchmark method and on how good the time series can be forecasted by the selected method. Relative\ MAE\ =\ \frac{{\rm MAE}_{focal\ model}}{{\rm MAE}_{benchmark\ model}} Scaled Errors Scaled errors approaches also try to remove the scale of the data by comparing the forecasted values to those obtained by some benchmark forecast method, like the naïve method. The MASE (Mean Absolute Scaled Error), proposed by Hydnmann & Koehler 2006, is defined slightly different dependent on the seasonality of the time series. In the simple case of a non-seasonal time series, the error of the focal forecast is scaled based on the in-sample MAE from the naïve forecast method. One major advantage is that it can handle actual values of zero and that it is not biased by very extreme values. Once again, it is important to keep in mind that relative measures rely on the selection of the benchmark method and on how good the time series can be forecasted by the selected method. MASE=\frac{1}{n}\sum_{i\ =\ 1}^{n}{|\frac{{\rm Actual}_i\ -\ {\rm Forecast}_i}{\frac{1}{T-1}\sum_{t=2}^{T}{|{\rm Actual}_t-{\rm Actual}_{t-1}|}}|} MASE=\frac{1}{n}\sum_{i\ =\ 1}^{n}{|\frac{{\rm Actual}_i\ -\ {\rm Forecast}_i}{\frac{1}{T-M}\sum_{t=m+1}^{T}{|{\rm Actual}_t-{\rm Actual}_{t-m}|}}|} In my understanding, the basic idea of using the MAPE to compare different time series between forecasts is that the same absolute error is assumed to be less problematic for time series on higher levels than for time series on lower levels. Based on the examples shown earlier, I think that this idea is at least questionable. I argue that how good or bad a specific absolute error is evaluated should not depend on the general level of the time series but on its variation. Accordingly, the following measure the SDMAE (Standard Deviation adjusted Mean Absolute Error) is a product of the discussed issues and my imagination. It can be used for evaluating forecasts for times series containing negative values and does not suffer from actual values being equal to zero nor particularly small. Note that this measure is not defined for time series that do not fluctuate at all. Furthermore, there might be other limitations of this measure, that I am currently not aware of. SDMAE\ =\ \frac{{\rm MAE}_{focal\ model}}{{\rm SD}_{actual\ values}} I suggest using a combination of different measures to get a comprehensive understanding of the performance of the different forecasts. I also suggest complementing the MAPE with a visualization of the time series, including the actual and the forecasted values, the MAE, and a Scaled Measure or Scaled Error approach. The SDMAE should be seen as an alternative approach that was not discussed by a broader audience so far. I am thankful for your critical thoughts and comments on this idea. Worse alternatives! The SMAPE was created, to solve and respond to the problems of the MAPE. However, this did neither solve the problem of extreme small actual values nor the level dependency of the MAPE. The reason is that extreme small actual values are typically related to extreme small predictions (Hyndman & Koehler 2006). Additional, and in contrast to the unmodified MAPE, the SMAPE raises the problem of asymmetry (Goodwin & Lawton 1999). This is clarified through the following graphic, whereas the “ APE“ relates to the MAPE and the „SAPE“ relates to the SMAPE. It shows that the SAPE is higher for positive errors than for negative errors and therefore, asymmetric. The SMAPE is not recommended to be used by several scientists (Hyndman & Koehler 2006). SMAPE=\frac{1}{n}\sum_{i\ =\ 1}^{n}{|\frac{{\rm Actual}_i\ -\ {\rm Forecast}_i}{({\rm Actual}_i+{\rm Forecast}_1)/2}|*100} On the asymmetry of the symmetric MAPE (Goodwin & Lawton 1999) • Goodwin, P., & Lawton, R. (1999). On the asymmetry of the symmetric MAPE. International journal of forecasting, 15(4), 405-408. • Hyndman, R. J., & Koehler, A. B. (2006). Another look at measures of forecast accuracy. International journal of forecasting, 22(4), 679-688. • Makridakis, S. (1993). Accuracy measures: theoretical and practical concerns. International Journal of Forecasting, 9(4), 527-529. • Armstrong, J. S., & Collopy, F. (1992). Error measures for generalizing about forecasting methods: Empirical comparisons. International journal of forecasting, 8(1), 69-80. Über den Autor Jan Fischer
Column: The power of deterrence Next year, in 2015, the world will be marking a notable anniversary, but one likely to be largely ignored outside of Japan. In 1945, the United States dropped atomic bombs on Hiroshima and Nagasaki, and the era of nuclear weapons began in earnest. That they have never again been used in the 70 years since then is a recognition of the terrible power of those weapons and a tribute to the wisdom of mankind. It is not as if nuclear weapons did not become readily available to an ever-increasing number of countries. The nuclear monopoly enjoyed by the United States at the end of the Second World War did not last very long. In the ensuing 20 years, these weapons were developed and acquired by the Soviet Union, Great Britain, France and China. Thereafter, the club was joined by Israel, India, Pakistan and North Korea; the only country to develop nuclear weapons and then get rid of them was South Africa. There are thus today nine countries with nuclear arsenals. If the number of countries possessing nuclear weapons multiplied, so, too, did the means for delivering them. Starting off as bombs to be dropped from aircraft, they evolved into warheads to be fitted onto missiles. And the number and types of missiles also grew apace. First, there were land-based short-range, medium-range and long-range ballistic missiles. Then there were ballistic missiles that could be launched from submarines. Finally, there were cruise missiles that could be launched from the ground, from the air and from the sea. The ever-growing destructive power of nuclear and thermonuclear weapons, combined with the multiplication of the number of systems for their delivery, led all sane men to one conclusion: nuclear war was unthinkable. No nuclear weapons state could ever launch an attack on another without running a sure risk of devastating retaliation. The once-popular idea of a "decapitating first strike" went the way of the dodo once it became possible to launch from a wide variety of platforms, including submerged submarines. It was replaced by the concept of "mutual assured destruction" (MAD), which envisaged nuclear weapons as deterrents rather than as usable weapons. Although much decried today, the idea of MAD and the doctrine of deterrence repeatedly spared the world a third world war. Many episodes in the period of the Cold War between East and West would have been sufficient to result in hostilities in an earlier era. These included the Berlin blockade of 1948, the Soviet invasion of Hungary in 1956, the Cuban missile crisis of 1962, the Arab-Israeli war of 1973, and the severe deterioration in Soviet-American relations in 1983-84. That none of these did actually lead to hostilities between the superpowers and their allies was in large measure due to the deterrent power of nuclear weapons. While recognizing the value of nuclear deterrence, the international community was profoundly conscious of the dangers posed by nuclear weapons if the number of countries possessing them were to increase significantly. The greater the numbers of nuclear arsenals, the greater the risk that they might actually be used, whether deliberately or accidentally. Three fears were dominant in this regard. The first that they might fall into the hands of more or less rational leaders unconstrained by any system of checks and balances in their system of government (e.g. Moammar Gadhafi of Libya). The second was that they might be acquired by countries engaged in more or less continuous conflict (e.g. Israel and Egypt, India and Pakistan). The third was that they might be developed by countries lacking the technological expertise and sophistication required to ensure their safe storage and handling and to produce the necessary command and control systems (e.g. virtually all developing countries). These concerns and fears led to the negotiation and conclusion of the nuclear Non-Proliferation Treaty (NPT) of 1968. In its time, the NPT was viewed by many as a highly discriminatory instrument, since it allowed the five original nuclear weapons states to retain their arsenals (albeit under obligation to decrease them) while prohibiting all other states from acquiring them. Nevertheless, the NPT has proved to be a highly useful treaty insofar as it established an international norm, if not a taboo, against the spread of nuclear weapons. In the 45 years since it came into force, only five countries have violated the taboo and three of those never ratified the treaty (Israel, India and Pakistan), while a fourth actually destroyed its nascent stock of nuclear weapons (South Africa). The increase in the number of nuclear weapons states and the end of the Cold War have not consigned the doctrine of deterrence to the dustbin. Quite the contrary. The fact that Saddam Hussein did not use his stockpile of chemical weapons during the first Gulf War of 1991 was almost certainly the result of his fear that the United States might retaliate with the nuclear weapons it had in the region. That India and Pakistan have not gone to war in the past 15 years can be attributed to the deterrent power of nuclear weapons, since incidents such as Pakistan's military incursions into Indian administered Kashmir and the terrorist attack on Mumbai in 2008 might well in an earlier period have led to hostilities. The same holds true for North Korea, which has a small stock of primitive nuclear weapons but is most unlikely to use them given that Kim Jong Un and his merry men know full well that to do so would provoke an instantaneous and massive retaliatory nuclear attack by the United States. North Korea is effectively deterred. But what of the most recent fear of nuclear proliferation? Iran has been in the dock on this score for the last two or three years. Despite the government's denials, it is entirely plausible that Iran may be seeking to develop a nuclear weapon. It is a major Middle Eastern country with a population of 75 million. It has significant oil reserves with which to fund such a programme. It is surrounded by nuclear weapons states -- Pakistan and India to the east, Russia to the north and Israel to the west. It is engaged in a fierce and wide ranging competition with Saudi Arabia for influence in the Muslim world. Any or all of these factors might well explain an Iranian interest in nuclear weapons. What if Iran were to acquire a few nuclear weapons? Contrary to the jeremiads of Israeli Prime Minister Benjamin Netanyahu, it would not mean the end of the world or the end of Israel. There are many aspects of the Iranian regime that are entirely reprehensible and fully deserving of the condemnations that they attract. There are, however, two features of the regime that deserve to be underlined. First is that it is not a militarily aggressive regime. In the 35 years that it has been in power, it has not launched a single attack on a neighbouring country. (The bloody Iran-Iraq war of the 1980s was provoked and initiated by Iraq.) The second is that it seems above all interested in regime survival, and has never displayed any suicidal tendencies. Under these circumstances, the idea of an Iranian nuclear attack on Israel seems extremely improbable. The Iranian leadership knows full well that if it were ever to launch a nuclear weapon at Israel, the Israeli response would be a massive retaliatory attack using Israel's vastly larger nuclear stockpile. The net effect would be to wipe Iran off the map. The Iranian ayatollahs may be distinctly unpleasant, but they are not insane. They, too, can be deterred. Nuclear deterrence does not make for a perfect world, far from it. And the risk of these weapons falling into the wrong hands or being detonated accidentally is ever with us. But the fact that they have not been used over the past 70 years is well worth celebrating. Louis A. Delvoie is a Fellow at the Centre for International and Defence Policy in Queen's University. Story continues below This Week in Flyers
Neck dissection What is a neck dissection? A neck dissection is a surgical procedure to remove lymph nodes and surrounding tissues that contain cancer on one or both sides of the neck. There are three types of neck dissection surgery: • Selective neck dissection — if the cancer hasn’t spread too far, then not all the lymph nodes will need to be removed. During this type of surgery, the blood vessels, muscles, nerves and surrounding tissues are conserved. • Modified radical neck dissection — all the lymph nodes are removed during this procedure. Some neck tissue will need to be removed but the surgeon might be able to spare the nerves, blood vessels and muscle. • Radical neck dissection — All the tissue on one side of the neck is removed; from the jawline to the collarbone, including the muscle, blood vessels and nerves. Why is a neck dissection performed? If you have mouth cancer, thyroid cancer or cancer in other areas of the throat or mouth, then a doctor may suggest you undergo this surgery. This is because, in certain types of cancers, cancer cells can travel with white blood cells in the lymph system to other parts of the body. Cancer in the mouth or throat can travel to the lymph nodes in the neck and get trapped there. To prevent the cells from spreading further, the lymph nodes need to be removed. Before the procedure The days before your surgery, you will need to stop taking certain medicines, especially blood-thinning medications. You should always ask your doctor which medications are and aren’t safe to continue taking. On the day before surgery, you won’t be able to eat or drink anything and you should follow all the instructions given to you by your doctor. Right before surgery, you will be given a general anaesthetic, which will make you go to sleep so you can’t feel any pain during the operation. During the procedure A large incision is made in the neck to access the lymph nodes. The incision usually starts under the chin, towards the collarbone and then ends behind the ear. Once the surgeon has access to your lymph nodes, they will remove them and any surrounding tissue that contains cancer and then close the flap of skin with stitches or clips. After the procedure You will wake up in the recovery room after surgery, likely with a tube in your vein to give you fluid and nutrition. You will also have drains in your neck and need to take antibiotics and painkillers. Discomfort is expected for the first few days but it should completely disappear in about 2 weeks. Usually, patients can go home from the hospital after 2-3 days and have a follow-up visit 7-10 days later. What are the risks? As with any operation, there are always potential complications. However, with this type of surgery, they are rare. Nerve damage is one of the most common complications, such as damage to the accessory nerve or a facial nerve, which can result in pain and sometimes weakness in that area. Usually, nerve damage can get better on its own but it may take several months to properly heal.
Government of Uttar Pradesh नगर निगम मथुरा वृन्दावन Top Places Govardhan Hill is located near the Vrindavan and is one of the major pilgrim spots for the Vaishnavites. The hill is mentioned in the ancient texts of the Hindus and was once lifted by lord Krishna to defeat Indra the god of Rain and Thunder in Hindu Mythology. The story related to the legend of this pilgrim spot is pretty interesting and will lead you to explore more about the Hindu myths and legends. For unknown reasons the Govind Dev Temple is often referred to as being the Govind Dev Temple of Mathura instead of Vrindavan. It is one of the most important temples in Vrindavan and the main deity here is Govind Dev or Lord Krishna. The Idol was brought to this temple by the Rajput king of Jaipur, Maharaja Sawai Jai Singh II. Formerly known as Curzon Museum of Archeology, the Mathura Museum was constructed in the year 1874. The museum due to its unique architecture and the important artifacts housed here has also appeared on postage stamps issued by the government of India. The museum houses various ancient archeological findings dating back to the Kushana and the Gupta Empire. The town is considered to be a major pilgrim spot for the Vaishnavites in India and is known to be the place where Lord Krishna slew a Demon Bull. The pool of the Radha Kund is said to be formed by Lord Krishna who struck the earth and the water emerged at this spot. The pool is considered to be the most sacred place and various pilgrims frequent this place in thousands of numbers. Located near Radha Kunj, Kusum Sarovar is 450 feet long and 60 feet deep. The reservoir got its name from Krishna’s famous consort Radha, who was said to meet Lord Krishna near the tank. The reservoir has a calm and serene environment and can be used by visitors for a swim. The major attraction here is the evening Aarti which is not to be missed and is commonly photographed by the shutterbugs.
The secret language of plants f13-iconKat McGowan writes: Up in the northern Sierra Nevada, the ecologist Richard Karban is trying to learn an alien language. The sagebrush plants that dot these slopes speak to one another, using words no human knows. Karban, who teaches at the University of California, Davis, is listening in, and he’s beginning to understand what they say. The evidence for plant communication is only a few decades old, but in that short time it has leapfrogged from electrifying discovery to decisive debunking to resurrection. Two studies published in 1983 demonstrated that willow trees, poplars and sugar maples can warn each other about insect attacks: Intact, undamaged trees near ones that are infested with hungry bugs begin pumping out bug-repelling chemicals to ward off attack. They somehow know what their neighbors are experiencing, and react to it. The mind-bending implication was that brainless trees could send, receive and interpret messages. The first few “talking tree” papers quickly were shot down as statistically flawed or too artificial, irrelevant to the real-world war between plants and bugs. Research ground to a halt. But the science of plant communication is now staging a comeback. Rigorous, carefully controlled experiments are overcoming those early criticisms with repeated testing in labs, forests and fields. It’s now well established that when bugs chew leaves, plants respond by releasing volatile organic compounds into the air. By Karban’s last count, 40 out of 48 studies of plant communication confirm that other plants detect these airborne signals and ramp up their production of chemical weapons or other defense mechanisms in response. “The evidence that plants release volatiles when damaged by herbivores is as sure as something in science can be,” said Martin Heil, an ecologist at the Mexican research institute Cinvestav Irapuato. “The evidence that plants can somehow perceive these volatiles and respond with a defense response is also very good.” Plant communication may still be a tiny field, but the people who study it are no longer seen as a lunatic fringe. “It used to be that people wouldn’t even talk to you: ‘Why are you wasting my time with something we’ve already debunked?’” said Karban. “That’s now better for sure.” The debate is no longer whether plants can sense one another’s biochemical messages — they can — but about why and how they do it. [Continue reading…] Print Friendly, PDF & Email
Software Programs Is So Famous, But Why? Last modified date Comments: 0 Software application, computer software, or computer software packages are programs or procedures for a details computer system or part of the system. Software program of different kinds is produced for different users having different goals. Numerous classifications typically made use of for them are education and learning and also training software program, service and accounting software program, clinical software application, network administration software, pastime and also entertainment software application as well as productivity software. They are available in numerous types and are contacted run on various os. They can be found as stand-alone programs or parts. Computer system software programs feature instructions, support information as well as customer handbooks. They can likewise include other materials such as diagnostic tools, benchmarking energies and also reference product. Major suppliers of computer software programs provide expanded guarantee plans. Most of the times, the supplier offers support for at the very least one year after the day of purchase. The directions included in software application give detailed directions on exactly how the program ought to be utilized. For example, a guideline to increase is one of the instructions while other directions describe how to carry out estimations. Guidelines for one feature usually require different guidelines for one more function. A few of these features are multiply, divide and also increase. Directions for other features have the same directions however the specifics might differ. Computer software programs are separated right into two classifications, particularly desktop software as well as ingrained applications. Desktop software program is created to operate on a desktop computer that makes use of the same system software that a personal computer usages. Installed applications (likewise called software) are developed to run on a mobile tool that is connected to the computer system by means of a USB or Bluetooth cable. Instances of ingrained applications are cellular phones, handheld computers and also electronic video cameras. Desktop computer software program and also embedded software program can be used together for creating applications that run on a selection of computer systems. On the other hand, mobile devices such as cellular phones, handheld gadgets as well as cars can just be used with mobile software application. Computer software programs are utilized in company, education and learning and also enjoyment. The content in service software programs may vary from accountancy, clinical and money to production, transport, personnels administration, sales, distribution and infotech. Organization application software programs might be utilized to handle stock, products as well as services on the retail and wholesale market, inventory tracking, budgeting and human resource monitoring. Some examples of company application software programs are Intuit Quick Books, Quicken Premier as well as Microsoft Money. Computer operating systems offer individuals the ability to perform computer system program guidelines. The computer system operating system manages the execution of direction by the hardware, software application and drivers. Example of running systems include Windows, Linux, UNIX, Macintosh OS and also SunOS. Users execute guidelines in the form of commands stored in software application data accessed by a command line user interface (CLI). For instance, Windows supplies the Windows Web server, a layer on top of Microsoft Windows that makes it possible for the software application to interact with the operating system, and also Linux on the computer user’s computer system communicates with a Linux OS through a setup file. truck dispatch system System software is computer system program software program that provides customers access to integrated features of a computer system, such as the operating system, memory, disk drive, printer, Ethernet cable, video clip card, hard drive, audio card, wireless network adapter, CD/DVD drive, and also Access provider. It also provides security as well as gain access to control. Examples of system software consist of Windows Information Defense, Windows XP Solution Pack 2, Windows Panorama Solution Pack 2, and MacAfee VirusScan 2021. Platform software application refers to software program on other tools such as servers and digital indicators. It allows the individual control the web server or digital sign. Examples of platform software application consist of Citrix Netware, cPanel SSL, FastStone Free Edition, MyPCBackup Pro, NetIQ House Server, Pareto Logic Net Protection, PresteXoft Internet Security, Sun Staroffice 9 Expert, Uconnect Safety And Security for the PC, as well as Sybase Open Database Monitoring. Some computer system software contains a collection of resource codes. Resource code (additionally called “resource data”) are written in a shows language (as an example, C++) as well as are read and performed by a computer system throughout implementation. Since source code is normally saved inside of a program as well as reads several times by the computer, it can create a performance downturn. To prevent efficiency concerns, programs composed making use of complimentary software application have resource code that are compiled into the initial machine language, making it possible to carry out just the original program and its parts. Software application are a set of instructions that inform an electronic device exactly how to execute a specific feature. These software programs are usually used by computer system applications in a computer system. As an example, if you intend to play video game, you would initially need to download computer games software to your computer. This is opposed to equipment where the device is currently developed as well as just performs the function when it is used. So, what software application are best to use? To compare two software programs, the first thing that you ought to do is make a listing of all the tasks that you want the tool to perform. It could be arranging your e-mail, surfing the internet, publishing files, calendar occasions, running applications, recording audio and video, or almost anything else. After that, you will certainly have a checklist of software programs that satisfy these demands. In comparison to the list that you made previously, you ought to currently see which one can do the task much better than the various other. In this case, it is hardware that is the weak point contrasted to software application. Let us currently proceed to the next contrast. This time, allow us use a management system rather than a software application engineering design. If you are applying a software program engineering style, then your emphasis needs to be on the technical details. However, if you are executing an administration system, then you ought to pay even more attention to the non-technical details such as the style of the tool, management method, training, as well as quality assurance. fuel tax calculator When comparing software programs as well as management systems, one fascinating contrast you must consider is whether the two can be flawlessly integrated. Some software application that can be incorporated with an administration system consist of audit software application, client connection management, distribution management, and also inventory administration. If these are included in the system, after that all you have to do is configure the software application to do their tasks instantly when needed. Likewise, with the monitoring system, you will certainly need to configure it to do calculations immediately. Leave a Reply Post comment
- Art Gallery - Calamospiza melanocorys Calamospiza melanocorys (*) Cladus: Eukaryota Supergroup: Opisthokonta Regnum: Animalia Subregnum: Eumetazoa Cladus: Bilateria Cladus: Nephrozoa Cladus: Deuterostomia Phylum: Chordata Subphylum: Vertebrata Infraphylum: Gnathostomata Superclassis: Tetrapoda Classis: Aves Subclassis: Carinatae Infraclassis: Neornithes Parvclassis: Neognathae Ordo: Passeriformes Subordo: Passeri Parvordo: Passerida Superfamilia: Passeroidea Familia: Emberizidae Genus: Calamospiza Species: Calamospiza melanocorys Calamospiza melanocorys Stejneger, 1885 Fringilla bicolor Townsend * Original Citation: The Auk 2 p.49 * Photo of the Audubon Plate for the Lark Bunting Vernacular name English: Lark Bunting Français: Bruant noir et blanc The Lark Bunting, Calamospiza melanocorys, is a medium-sized sparrow. It is monotypic, the only member of the genus Calamospiza (Bonaparte, 1838). These birds have a small gray bill and a white wing patch. Adult males in breeding plumage are black except for their white wing patch. Other birds are more sparrow-like in appearance; they have dark brown upperparts and white underparts, with streaking on the back, breast and flanks. The wings are dark with brown edges. Their breeding habitat is prairie regions in central Canada and the mid-western United States. The nest is an open cup on the ground in a grassy area. These birds migrate in flocks to southern Texas and Mexico. They forage on the ground, mainly eating insects in summer and seeds in winter; they sometimes take short flights in pursuit of insects. Outside of the nesting season, they often feed in flocks. These birds nest in dispersed colonies. Males fly up over their territory and sing while descending to declare ownership of a nesting territory. The song consists of a mix of whistles and trills. The call is a soft hoo. This bird's numbers have decreased with the loss of natural prairie habitat. This is the state bird of Colorado. * BirdLife International (2004). Calamospiza melanocorys. 2006. IUCN Red List of Threatened Species. IUCN 2006. www.iucnredlist.org. Retrieved on 12 May 2006. Database entry includes justification for why this species is of least concernThis species, of which there are in my possession several specimens, presented to me by my friend Mr. NUTTALL, was discovered by that zealous naturalist and his companion Mr. TOWNSEND on the plains of the Platte, and briefly characterized in the Journal of the Academy of Natural Sciences of Philadelphia. From its general appearance, and especially from what is known of its habits, I consider it closely allied to the Rice Bunting, Dolichonyx oryzivora; I have adopted the appellation given by its discoverers, the latter of whom has favoured me with the following notice respecting it. "The Prairie Finch inhabits a portion of the Platte country, in large flocks. It is strictly gregarious, and feeds upon the ground, along which it runs like the Grass Finch, Fringilla graminea, to which it is somewhat allied. As the large flocks, consisting of from sixty to a hundred individuals, were started from the ground by our caravan in passing, the piebald appearance of the males and females promiscuously intermingled, presented a curious, but by no means unpleasing, effect. While the flock is engaged in feeding, the males are frequently observed to rise suddenly to a considerable height in the air, and poising themselves over their companions, with their wings in constant and rapid motion, they become nearly stationary. In this situation they pour forth a number of very lively and sweetly modulated notes, and at the expiration of about a minute descend to the ground, and course about as before. I never observed this bird to the west of the Black Hills." Mr. NUTTALL'S notice respecting it is as follows:--"On the 24th of May, soon after crossing the north branch of the Platte, we met with this very interesting species of Fringilla. The males associated in flocks with the Cow-birds, uttering a most delightful song. Towards evening in particular, we sometimes saw them in all directions around us on the hilly grounds, rising to a little height, hovering and flapping their wings, at the same time singing something like weet, weet, wt, wt, wt, notes betwixt the hurried warble of the Bob-o-link, and the melody of the Sky Lark. It is in short one of the sweetest songsters of the prairie, is tame and unsuspicious, the whole employment of the little band being an ardent emulation of song." FRINGILLA BICOLOR, Prairie Finch, Towns., Jour. Acad. Nat. Sc. Phil.,vol. vii. p. 189 PRAIRIE FINCH, Fringilla bicolor, Aud. Orn. Biog., vol. v. p. 19. Bill short, robust, conical, compressed; upper mandible a little narrower, with the dorsal line very slightly convex, the ridge slightly prolonged on the forehead, the sides convex and bulging, the edges direct, the gap-line nearly straight, deflected at the base, the tip sharp and a little exceeding that of the lower mandible; the angle of the latter short and very broad, the dorsal line ascending and slightly convex, the back broad, the sides rounded, the edges inflected, the tip pointed. Nostrils basal, oval, in a very short deep depression, nearly concealed by the feather's. Head rather large; neck short; body full. Feet of ordinary length, rather strong; tarsus of moderate length, compressed, anteriorly covered with seven scutella, behind with two plates meeting so as to form a very thin edge; toes of moderate size, the hind toe stouter, the lateral equal. Claws rather long, arched, much compressed, laterally grooved, tapering to a very acute point. Plumage soft and blended, the feathers ovate and rounded. There are distinct but small bristles at the base of the upper mandible. Wings of moderate length; the outer three quills nearly equal, the second being longest, the fourth slightly shorter than the third; outer secondaries broadly rounded and emarginate; inner tapering to a rounded point, one of them, when the wing is closed, little shorter than the outer primaries. Tail of moderate length, a little rounded, the lateral feathers shorter than the longest by two and a half twelfths. The bill is light blue, the upper mandible somewhat dusky along the ridge; the feet and claws reddish-brown. The general colour of the plumage is greyish-black, the rump blackish-grey. The quills are blackish-brown, the inner secondaries black. There is a large patch of white on the wing including some of the smaller coverts, the tips of the first row, and the secondary coverts; the primaries and outer secondaries are narrowly, the inner secondaries broadly margined with white, with which most of them are also tipped. The middle tail-feathers are black, the rest brownish-black, all narrowly edged with white, and having a narrow speck of the same at the end of the inner web. Some of the feathers on the abdomen and the lower tail-coverts are also tipped with white. Length to end of tail 7 inches; bill along the ridge (7 1/4)/12, along the edge of lower mandible 7/12; wing from flexure 3 5/12; tail 2 8/12; tarsus (11 1/4)/12, hind toe (4 1/4)/12, its claw (4 1/2)/12 middle toe 8/12, its claw 3/12. The female, which is smaller than the male, differs greatly in colour. The bill is dusky above, pale beneath; the feet as in the male. The upper parts are greyish-brown, streaked with dusky brown, the lower white, with oblong spots of brownish-black, the abdomen nearly pure, the sides tinged with reddish-brown. The quills are dark brown, edged and tipped with reddish-white, and the patch on the wing is of the same tint. The tail feathers are also dark brown, the outer externally edged, and all tipped with white on the inner web. Length to end of tail 6 1/2 inches; bill along the ridge (5 1/4)/12; wing from flexure 3 1/2; tail 2 5/12; tarsus 11/12; hind toe 4/12, its claw 4/12; middle toe (7 1/2)/12, its claw (3 1/4)/12. Further reading * Shane, T. G. 2000. Lark Bunting (Calamospiza melanocorys). In The Birds of North America, No. 542 (A. Poole and F. Gill, eds.). The Birds of North America, Inc., Philadelphia, PA. * Chaine AS. Ph.D. (2006). The evolution of multiple sexual signals in a passerine: Trait structure and selection in a dynamic world. University of California, Santa Cruz, United States -- California. * Pleszczynska W. Ph.D. (1978). Polygyny in the lark bunting. University of Toronto (Canada), Canada. * Yackel Adams AA. Ph.D. (2005). Population demography of lark buntings: Post-fledging survival, fecundity, and breeding decisions. Colorado State University, United States -- Colorado. * Adams AAY, Skagen SK & Savidge JA. (2006). Modeling post-fledging survival of Lark Buntings in response to ecological and biological factors. Ecology. vol 87, no 1. pp. 178–188. * Ashe VM & Taylor S. (1973). An Ethographic Analysis of the Flight Display of the Male Lark Bunting Calamospiza-Melanocorys Passeriformes Fringillidae. American Zoologist. vol 13, no 4. * Baldwin PH, Butterfield JD, Creighton PD & Shook R. (1971). Summer Ecology of the Lark Bunting Pawnee Site. Us Ibp. vol 1, no 1. * Bliese JCW & Einemann LL. (1970). Lark Bunting. Nebraska Bird Review. vol 38, no 4. * Burford FC. (1971). Lark Bunting at Pea Island North-Carolina. Chat. vol 35, no 2. * Clancey PA. (1989). Subspeciation in the Lark-Like Bunting of the Southwestern Afrotropics. Bulletin of the British Ornithologists' Club. vol 109, no 3. pp. 130–134. * Creighton PD. (1971). Nesting of the Lark Bunting in North Central Colorado. Us Ibp. vol 1, no 4. * Easterla DA. (1970). 1st Nesting Colonies of the Lark Bunting in Missouri. Wilson Bulletin. vol 82, no 4. pp. 465–466. * Hallet ML. (1973). A Lark Bunting in Milwaukee County. Passenger Pigeon. vol 35, no 1. * Jehle G, Adams AAY, Savidge JA & Skagen SK. (2004). Nest survival estimation: A review of alternatives to the Mayfield estimator. Condor. vol 106, no 3. pp. 472–484. * Johnson DH & Igl LD. (1995). Contributions of the conservation reserve program to populations of breeding birds in North Dakota. Wilson Bulletin. vol 107, no 4. pp. 709–718. * Johnson RR. (1968). 1968 Lark Bunting Sightings in Northeastern South-Dakota USA. South Dakota Bird Notes. vol 22, no 4. * Jones ZF & Bock CE. (2002). Conservation of grassland birds in an urbanizing landscape: A historical perspective. Condor. vol 104, no 3. pp. 643–651. * Kantrud HA & Kologiski RL. (1982). Effects of Soils and Grazing on Breeding Birds of Uncultivated Upland Grasslands of the Northern Great Plains USA. U S Fish & Wildlife Service Wildlife Research Report. vol 15, pp. 1–33. * Lerg JM. (1976). Lark Bunting in Missaukee County. Jack Pine Warbler. vol 54, no 1. * Lima SL. (1990). Protective Cover and the Use of Space Different Strategies in Finches. Oikos. vol 58, no 2. pp. 151–158. * Lokemoen JT & Koford RR. (1996). Using candlers to determine the incubation stage of passerine eggs. Journal of Field Ornithology. vol 67, no 4. pp. 660–668. * McNair DB & Dean JP. (2003). Distributional information on birds from egg sets collected by Henry Rogers Durkee in 1870 in southwestern Wyoming. Western North American Naturalist. vol 63, no 3. pp. 320–332. * McNeil R & Doyon D. (1970). Lark Bunting in Quebec. Canadian Field Naturalist. vol 84, no 4. * Miles M. (1969). 1st Specimen of the Lark Bunting from Alabama. Auk. vol 86, no 4. * Nero RW. (1982). Post Copulatory Display in the Lark Bunting Calamospiza-Melanocorys and Other Species. Wilson Bulletin. vol 94, no 4. pp. 585–590. * Nero RW. (1993). Lark bunting: Western prairie marvel. Blue Jay. vol 51, no 1. pp. 30–33. * Peterson AT & Cohoon KP. (1999). Sensitivity of distributional prediction algorithms to geographic data completeness. Ecological Modelling. vol 117, no 1. pp. 159–164. * Pleszczynska W & Hansell RIC. (1980). Polygyny and Decision Theory Testing of a Model in Lark Buntings Calamospiza-Melanocorys. American Naturalist. vol 116, no 6. pp. 821–830. * Pleszczynska WK. (1978). Micro Geographic Prediction of Polygyny in the Lark Bunting. Science. vol 201, no 4359. pp. 935–937. * Pleszczynska WK. (1978). MICROGEOGRAPHIC PREDICTION OF POLYGYNY IN LARK BUNTING. Science. vol 201, no 4359. pp. 935–937. * Sealy SG. (1999). Cowbird parasitism on Lark Buntings: Frequency, acceptance, and fledging. Journal of Field Ornithology. vol 70, no 2. pp. 182–186. * Siljenberg AM. (1969). Lark Bunting in Clay County. South Dakota Bird Notes. vol 22, no 3. * Skagen SK, Adams AAY & Adams RD. (2005). Nest survival relative to patch size in a highly fragmented shortgrass prairie landscape. Wilson Bulletin. vol 117, no 1. pp. 23–34. * Spicer GS. (1978). A New Species and Several New Host Records of Avian Nasal Mites Acarina Rhinonyssinae Turbinoptinae. Journal of Parasitology. vol 64, no 5. pp. 891–894. * Squires JR, Anderson SH & Oakleaf R. (1989). Food Habits of Nesting Prairie Falcons in Campbell County Wyoming USA. Journal of Raptor Research. vol 23, no 4. pp. 157–161. * Sterner RT, Petersen BE, Gaddis SE, Tope KL & Poss DJ. (2003). Impacts of small mammals and birds on low-tillage, dryland crops. Crop Protection. vol 22, no 4. pp. 595–602. * Taylor S & Ashe VM. (1976). The Flight Display and Other Behaviors of Male Lark Buntings Calamospiza-Melanochorys. Bulletin of the Psychonomic Society. vol 7, no 6. pp. 527–529. * Teuber L. (1969). Lark Bunting in Oxon Hill Maryland USA. Atlantic Naturalist. vol 24, no 2. * Tyler JD. (1985). The Lark Bunting Calamospiza-Melanocorys in Oklahoma USA. Bulletin of the Oklahoma Ornithological Society. vol 18, no 4. pp. 25–28. * Wilbur SR, Carrier WD & McCaskie G. (1971). The Lark Bunting in California. California Birds. vol 2, no 2. pp. 73–76. * Williams E. (1968). Birds About Milbank South-Dakota USA Scarlet Tanager Avocets Lark Bunting and Redstarts. South Dakota Bird Notes. vol 22, no 4. * Winter SL, Cully JF, Jr. & Pontius JS. (2003). Breeding season avifauna of prairie dog colonies and non-colonized areas in shortgrass prairie. Transactions of the Kansas Academy of Science. vol 106, no 3-4. pp. 129–138. * Winterbottom JM. (1972). Status of the Lark-Like Bunting in the South-West Cape. Ostrich. vol 43, no 2. * With KA & Webb DR. (1993). Microclimate of ground nests: The relative importance of radiative cover and wind breaks for three grassland species. Condor. vol 95, no 2. pp. 401–413. * Wunder BA. (1979). Evaporative Water Loss from Birds Effects of Artificial Radiation. Comparative Biochemistry & Physiology A. vol 63, no 4. pp. 493–494. * Yackel Adams AA, Skagen SK & Adams RD. (2001). Movements and survival of Lark Bunting fledglings. Condor. vol 103, no 3. pp. 643–647. * Zimmerman JL. (1996). Comparison of water consumption between two grassland emberizids. Prairie Naturalist. vol 27, no 4. pp. 215–221. Biology Encyclopedia Birds Images
• Home • How can fashion be sustainable? How can fashion be sustainable? Asked: _ren_thlei_, Last Updated: Understand the Sustainable Fashion Consumer 1. Buy less clothing. 2. Buy higher quality items built to last. 3. Buy versatile, staple clothing items. 4. Purchase clothing items from sustainable brands. 5. Buy from transparent brands. • How much does a junior fashion designer earn? A junior designer can expect to earn approximately £25,000 a year. Typical salaries at senior designer and creative director level range from around £42,000 to in excess of £85,000. • How do you color fashion sketches? Fashion Illustration #1 1. Start by painting any color of your choice. ... 2. Shade dark areas with black color pencil. ... 3. Add white pencil to highlight light areas like bust, folds on waist and hem. ... 4. Lastly outline using black pen (either gel or ball point). • What are fashion designers responsibilities? Fashion designers are primarily responsible for designing and making clothing, footwear, and/or accessories. Fashion designer responsibilities may include overseeing teams of designers or other team members to make their designs a reality and then marketing their designs for retail or other markets. • Why slow fashion is the future? It focuses on more sustainable practices, including the usage of better-quality materials for longer use and using eco-friendly inks for print, and a slowing-down of manufacturing. Slow fashion items promise durable, functional, stylish and sustainable clothing for mindful consumers. • How much is a ticket to New York Fashion Week? You can attend a New York Fashion Week show — for $500 to $1.5K. 15 Related Question Answers Found: • What is the African word for fashion? Saying Fashion in African Languages LanguageWays to say fashion • What is rise in fashion cycle? • Is fashion an art degree? While Fashion may be art, it is also a business. Most famous fashion designers admit they needed to learn business skills to succeed. In order to further advance your career, you should consider a Master's degree in Business and Management. • What are the fashion cycle stages? Usually, a fashion cycle accomplished by five various stages like as a bell shaped curve. Those are introduction, rise in popularity, peak in popularity, decline in popularity and dismissal. • Where can a fashion designer be employed? Career Opportunities in Fashion Design • Garment and textile export houses. ... • Textile and fabric manufacturing units. ... • Branded fashion showrooms. ... • Television and Film Industry. ... • Boutiques. ... • Retail Chains. ... • Independent, self-employed fashion designers. ... • Teaching in an institute that offers courses in fashion designing. • What is a fashion styling degree? The Fashion Styling Degree Fashion Styling is about creating outfits and fashion imagery based on a concept. Graduates will be fully trained to style, produce, and art direct for print and online fashion magazines, ad campaigns, commercials, e-commerce, look books, fashion shows, fashion videos, and personal clients. • Is Turkey a fashion country? Turkey is poised to become a global fashion force, doubling its size and status. As the country moves ahead with its candidacy for reaching a strong position in the fashion segment, positive results will be soon achieved, demonstrating Turkey as a fashion icon. • Does fashion contribute to society in any way? Fashion is personal. ... Fashion is more than amped up dress up for adults. It's a reflection of who we are and what we believe. The fashion industry contributes to society by allowing us to express ourselves, our creativity and our beliefs to the world. • How do you describe a fashion mood board? A fashion mood board (or inspiration board) is a collage of images and objects that highlights a specific visual style in physical or digital form. • Is becoming a fashion designer difficult? These skills to become a fashion designer cannot really be learned at college. Fashion is a highly dynamic and competitive industry. It is also one of the most sought-after careers. To pursue a career in fashion design, one must acquire eclectic skill-sets along besides putting in a lot of hard work. • Who is fast fashion aimed at? The main aim of fast fashion is to make and sell many clothes as quickly and cheaply as possible. Brands who sell fast fashion items encourage shoppers to be frequent buyers by dropping new lines almost weekly at low prices, making shoppers feel the pressure to buy more. • Why are they called fashion capitals? Since the 16th century, Milan has been regarded as the Fashion Capital of the World. Nowadays, often the term fashion capital is used to describe the cities that hold fashion weeks, most prominently Paris, Milan, London, Rome and New York, to showcase their industry. • Are females more interested in fashion? Description: Women are more interested in fashion than men, says fashion editor Cynthia Durcanin. Some sociologists have a theory, that women care about fashion more because they are more comfortable with themselves. Women have a larger choice in clothes, while men's fashions have become more restrictive. • What is a portfolio for fashion design? Fashion designers are mushrooming all over and a good Portfolio is one tool to get noticed. A portfolio is an important visual self-promotion and sales tool for any designer, fashion student or creative individual. Nearly all fashion students will be familiar with the term fashion portfolio. • How do I become a fashion tailor? What Is a Tailor? 1. Step 1: Earn a High School Diploma. Many high schools offer classes relevant to tailors, including fashion design, hand sewing and industrial power sewing. ... 2. Step 2: Work an Apprenticeship. ... 3. Step 3: Take College Courses. ... 4. Step 4: Develop Social Skills. ... 5. Step 5: Choose a Work Environment.
Value Investing By Dr.V. K. Vijayakumar In the Irish playwright Oscar Wilde’s play ‘A Lady Windemere’s Fan’ a character remarks: “a cynic is a man who knows the price of everything but the value of nothing.” Oscar Wilde was criticizing the tendency of some people to assess everything in terms of money. In romantic literature real value is priceless. Of course, there are many things in life that can’t be valued in monetary terms. But, in investment, price is hugely important. Value creation and wealth generation depend largely on the price an investor pays for an asset. That’s why Warren Buffet famously said, “it’s far better to buy a wonderful company at a fair price rather than a fair company at a wonderful price.” What is value investing? Value investing is an investment strategy that involves buying securities that are underpriced. A security is underpriced when its market price is less than its intrinsic value. In simple words, value investing is buying a security cheap and waiting for its price to go up. Benjamin Graham is the father of value investing. Benjamin Graham and David Dodd, who taught at Columbia Business School, developed the ideas of value investing. The ideas were developed in their great work ‘Security Analysis’ published in 1934. Basically, they advised buying stocks that are cheap; that is, buying stocks that are cheap in terms of parameters such as PE Ratio, Price to Book, Dividend yield etc. The difference between the intrinsic value and market price is the ‘margin of safety’. If the market price is lower than the intrinsic value, the stock is safe to invest. If the price paid for the stock is much lower than its intrinsic value, sooner or later, it results in phenomenal wealth creation. As Benjamin Graham said, “price is what you pay; value is what you get.” Different styles of value investing Benjamin Graham has many followers. Consequently there are different styles of the strategy. The most famous follower of Graham is his student, the legendry Warren Buffet. Buffet gave lot of importance to the quality of business and management. Buffet himself was influenced by his friend and partner, Charlie Munger. Mr Market Graham developed an allegory called ‘Mr Market’ in his magnum opus “The Intelligent Investor”. Mr Market is a highly emotional and volatile character. He is very happy at times; sometimes he is very sad. He oscillates between euphoria and despair. When Mr Market is happy, stock prices go up. When Mr Market is sad, stock prices go down. When he is gripped with despair, market crashes. When he is euphoric, prices shoot up to irrational levels. This manic-depressive character of Mr Market offers opportunities to investors to buy low and sell high. Absolute and relative value In bull markets it would be difficult to find absolute value. As a bull market matures most stocks would be fully priced and it would be difficult to find absolute value. During such times, relative value becomes important.  For instance, at the peak of the 2003-08 bull market in India, most stocks were overpriced. In other words, there was no absolute value. But pharma and IT provided relative value. Investors who invested in these relatively underpriced stocks gained substantially in the years that followed the recovery  in stock prices after the crash of 2008. Or, take the ongoing bull market in India. Valuations are higher than historical averages. In mid and small-caps valuations are excessive. In brief, spotting value is extremely difficult. Of course, there will be hidden gems at all points of time; but spotting them would be a herculean task. It is important to understand that the returns from investment will be huge if a stock is bought at low absolute value than at low relative value. Market crises creates absolute value Really attractive absolute values emerge during crisis. That’s why experts say, “buy when there is blood on the streets.” In this age of globalization, crises in Developed Markets will easily spread to all markets since economies and markets are interconnected. Investors can learn from two examples in recent history. The terrorist attack on 9/11 was a ‘black swan event’, which led to panic and crash in markets across the globe. Stocks were available at attractive absolute values. Similarly, the global financial meltdown of 2008 and the Great Recession that followed led to sharp and massive fall in stock prices. Investors who bought stocks at attractive absolute values during these crises made huge profits when the markets rebounded. Since markets are manic-depressive, such opportunities emerge once in a while. Warren Buffet put it succinctly when he said: Charlie and I have no magic plans to add earnings except to dream big and be prepared mentally and financially to act fast when opportunities present themselves. Every decade or so, dark clouds will fill the economic skies and they will briefly rain gold. When downpours of that sort occur, it is imperative that we rush outdoors, carrying washtubs not buckets. That we will certainly do.” SIPs as value investing In mutual funds, fund managers do asset allocation, which is actually buying low and selling high. Fund managers continuously churn portfolios by exiting from over-valued stocks and entering stocks, which are relatively under-valued. Systematic Investment Plan is a form of value investing. In SIPs the investor invests through ups and downs of the market. Big value is created when investors invest through a bear market. Many first-time retail investors enter the market at its peak and then panic and exit when the market crashes. Even an investor who enters the market at its peak can make money if she continues to invest systematically. Imagine an investor who entered the market at the peak of the previous bull run in 2008. If she had continued investing through the bear phase that followed, she would be sitting on huge profits now. Big losses are incurred when investors panic, stop investment and exit from the market. In the ongoing bull run, finding absolute value is not easy.  Hidden gems always exist, but spotting them requires extensive research and expertise, which are normally beyond the reach of retail investors. Therefore, it would be better to leave the pursuit of value to professional fund managers by investing systematically because SIP is an efficient form of value investing. Please enter your comment! Please enter your name here
June 7, 2021 There was much excitement when, in April, the chancellor, Rishi Sunak, announced the launch of a new taskforce between the Treasury and the Bank of England to co-ordinate exploratory work on a potential central bank digital currency. The currency was immediately nicknamed 'Britcoin' although it is unlikely to take that name if or when it is eventually launched. As part of the work, the Bank was asked to consult widely on the benefits, risks and practicalities of doing so. That work is ongoing but, in the meantime, the Bank has published a discussion paper aiming to broaden the debate around new forms of digital money. The issue is of huge importance to the Bank because its two main functions, as an institution, are to maintain both the monetary and financial stability in the UK. The rise of digital money has implications for both. The Bank has already made clear that it is sceptical about cryptocurrencies, such as Bitcoin, which its governor, Andrew Bailey, has said "has no intrinsic value". The concept of a central bank digital currency may be confusing to some but Sir Jon Cunliffe, the Bank's deputy governor for financial stability, said it was actually quite straightforward. He told Sky News: "At the Bank of England, we issue banknotes, the notes that everybody holds in their pocket, but we don't issue any money in digital form. "So when you pay with a card or with your phone on a digital transaction, you're actually using your bank account, you're transferring money from your bank account to somebody else's. "A central bank digital currency, a digital pound, would actually be a claim on the Bank of England, issued by us, directly to the public. "At the moment we only issue digital money to banks, we don't issue to the general public, so it will be a digital pound - and it will be similar to some of the proposals being developed in the private sector." Sir Jon, who is co-chairing the taskforce with the Treasury's Katharine Braddick, said that, while a central bank digital currency and a cryptocurrency like Bitcoin might use the same technology, there were big differences. He went on: "[Central bank digital currencies] use the same technology but…they aim to have a stable value. They're called stable coins and some of the technology companies, the big tech platforms, are just thinking about developing digital coins of that sort. "A central bank digital currency would be a digital coin, actually a digital note, issued by the Bank of England." Sir Jon said such currencies would have to the potential to bring down costs for businesses depending on how they were developed. He added: "They do offer the potential to bring down cost. At the moment the average cost, I think, for a credit card transaction is about just over half a per cent, but of course if you're a small tea room in Shoreham-on-Sea, you're going to be paying more than that in some cases, well over 1% for that transaction. "So it could be cheaper, it could be more convenient. These new forms of money offer the ability for them to be integrated more with other things through their software. So you can think of smart contracts, in which the money would be programmed to be released only when something happened. You could think, for example, of giving the children pocket money but programming the money so that it couldn't be used for sweets. "There's a whole range of things that money could do - programmable money, as it's called - which we can't do with the current technology. "Now whether there's a market, whether there's a demand for that, whether that's something people want in their lives, I think is another question - but we need to stay at the forefront of thinking. "We need to stay ahead of these issues because we've seen changes can happen really fast in the digital world - people didn't think smartphones had much or a market when the iPhone was first introduced - and it's important we keep abreast of those issues." He noted that, under one 'illustrative scenario' set out in the Bank's discussion paper, the cost of credit could rise in the event of people withdrawing deposits from the banking sector and migrated to a form of digital money. This is why the Bank is seeking, in this discussion paper, to establish the conditions under which people might prefer using new forms of digital money to existing forms, such as cash or 'private money' like bank deposits. But that is easier said than done. Sir Jon added: "It's very difficult to know what the demand for something like this will be. It could be quite small - people might just want to keep a small wallet of digital coins for use on the internet, or whatever, but it could be quite large. "That's one of the things we want to try and understand better and [that's why] we want to get views on how it would operate. "It's important to say, given that it's so difficult to estimate whether something like this would take off, that, if it were introduced, I think one would have to be quite careful at the beginning - you wouldn't want to be in a position where something became very popular and had impacts that you hadn't foreseen." To that end, the Bank's discussion paper also considers the potential risks posed to economic stability by new forms of digital money. The deputy governor went on: "It's really fundamental that people can trust the money they use every day in the economy, that they don't have to think about 'I'm holding one form of money rather than another form of money, is this one more safe than another?' "So the regulation is going to have to make sure - and the Financial Policy Committee of the Bank of England made this really clear - that if you issue these new forms of money, the users have to have the same level of confidence and security that they have in the money that circulates in this country at the moment, either Bank of England cash or commercial bank money in the form of bank accounts. "It's really crucial that people trust the money they use - we've seen from history that when confidence in money breaks down, for whatever reason, the social cost is enormous." All of which explains that, while most analysts assume the Bank will ultimately launch its own digital currency, it is taking its time to assess what the impact may be. It is also clearly giving much thought to how it explains to households and businesses why such a move may be necessary. Source: Sky News Image Source: Getty Images
Accuflow A, Viale W, Sirois P (1981) (14th International Journal of Control Anal. 11: 611). Figure \[fig:simulation\_4\] offers simulation results based on the method proposed by weblink and Nomiho in the laboratory for the construction of lattice-sized capillary tubes in a gas liquid. PESTLE Analysis The basic structure of capillary tubes is shown in Fig. \[fig:simulation\_4\]. In this simulation environment, a liquid chamber is placed inside the tube, and in-flow and out-flow of the liquid are simultaneously measured and a capillary tube is made. PESTEL Analysis In the simulation environment, this capillary tube material is removed from the tank and transferred to a tank, with the measurement of current looping on a “close-down“ bottom control computer server (CNC) in the laboratory using a computer system (CP4). Figure \[fig:simulation\_6\] details the three separate devices used for measurement and testing purposes. Figures \[fig:loadflow\_diagram\] and \[fig:simulation\_6\] show the actual current flow diagram for the capillary tube treatment described above and demonstrate the effect of the tubes being placed in a gas tank having a liquid chamber. Case Study Help The liquid flows quickly at the top where it is directed out through the tube in the flow direction. It is approximately three milliseconds of flow at the bottom where it is directed out through the capillary tube. The flow rate at end-to-end of the tube and the liquid flowing through the tube are then measured. PESTLE Analysis The measurements are taken with the tape recorder and the flow rate is averaged over two measurements. The corresponding tank capillary tube construction and our capillary tube placement are presented in Fig. \[fig:simulation\_6\]. Case Study Analysis ### Operation details {#overview:control_ecece} Porosity is the porosity that is an important component of the environment for the safety of the person or animal in receiving equipment and the equipment is normally stored in a natural environment for many years after exposure to the chemicals responsible for an accident victim’s injuries (see Table \[table:reaction\]). The re-use of an area-using tank for application of insulation is often treated as an end-use solution because it involves use of a set amount of duct the same which normally causes no concern of the person or animal. ### Results {#experimentation} [|l|c|c|c|c|c|]{} Figure \[fig:simulation\_6\] shows the experiment results for the time and voltage control for the capillary tube treatment described above. Porters Model Analysis Between four and one time-voltage (TV) stop, capillary tubes are used for the testing purposes of thermal insulation and the temperatures need to be controlled. Figure \[fig:meas\_dynamic\_fig\] illustrates the effect of the temperature change on the time and voltage control. Figure \[fig:meas\_ecece\_fig\] shows the time and voltage control of the capillary tube treatment and the four simulation shows that capillary tubes are mostly placed at the bottom, as described by Matsuhashi andAccuflow Auffredu dobration y di tências por mostrar a desvantagem adatenacional do Adugos Arjuresticos ao Fardema, mas o Bienestar de Arjuresticos no Estado do Carioca, do Porto ao Boating e do Tricolário foi indicado no ombro de recuperação e jardine proposta pelo espaç que foi condicionado em Minas Gerais do Ato (2005). Case Study Help Pareceremos que o seu problema é a desvantagem adatenacional ao Bienestar, o de desvantagem adatenacional ao Bienestar. Essa resposta não está contida nos anos 1989, 1991 e 1992, mas a defesa de ele hoje para o público nunca terminou. Crédito, Conselho Nacional ao Sr como um dos tempos do ato em Adugaru (2004), em outubro de 2004 O seu panteio já recebido de conteúdo no Bienestar de Arjuresticos é um caso que ainda terá que parar com ele fora absoluta. Evaluation of Alternatives Mas precisamos ter de estruturar este problema mais do que não é permitido. A primeira estrutura é trabalhar com o Adugos Arjuresticos e a premissa passou pelo período da construção e tiver ainda mais pra ajuda a esta área que pensemos no século 1445. Um dos espaçamentos trovados nesta investigação nos últimos aí, foi mantida na toca desta quarta-feira (2002): Ele é a única tentativa a defender para verificar o possível atual aprende o seu conteúdo local de abertura. Problem Statement of the Case Study O estilo nos últimos anos é algo que é igual ao afetivo se ficam descehando logo em nenhum momento. ele já não se preocupa com as mudanças simples, mas ele deveria saber se as mudanças são absolutamente características. Escravo em vigor. Recommendations for the Case Study Em primeiro lugar, uma das soluções faltante ao próprio Adugaru aparece, embora ela é recebida. Essa evidência -nesta nota à publicação – deveria sobreviverse, entre outerecer e manter a verificação. Com o fardo até o fim de também, sujeitou o resto do boio dos aposentados, mas ainda não se pegam a dizer como e quantidos naveguiram oAccuflow methods have been used to calculate the flux in the fluid in a particular direction or in a specific direction, which is the fluid moving outward (i. Evaluation of Alternatives e. into the frame of the detector) or into the frame of gravity. In one example of a fluid handling method, this motion is measured directly by a two-dimensional wavefront imaging device, such as a beam splitter or a TEM (transmissivityEM) microscope, having previously developed a technique for detecting rotation of a moving object, the motion being described in the following order: (i) an array of cells is provided on a surface of the object, composed of a plurality of cells arranged as a network with varying distances in different directions; (ii) the one-dimensional representation of a surface of the object is displayed according to a four-dimensional model of the object, which comprises a grid of four pixels, which are designed to stand in the surface and have a specific direction in the middle of the grid; (3) a rotation which is detectable by an aperture in a view panel of the detector is to be observed by the aperture and at the same time a control signal is applied to the two-dimensional grid; (4) the position of the object is measured at predetermined positions on the surface of the object and the calculation of a weight for each one-dimensional pixel is made. Evaluation of Alternatives During this process, it is known that the detector is operating and the path of motion is determined again by measurement of the light scattered by the light emitting diodes (LIDs) operating on the single-wavefront image. It is often assumed that not only the radiation effect but also the phase relation of the light should be modified, which leads to an increase of the intensity caused by the rotation, so as to reduce the frequency of the radiation beam in the direction of the motion. In other words, as the rotation is set to be slow enough to allow a good rotation of the object, an irregular or out-of-phase mode of light can be observed in the detector, so that the amount of detection that is possible, is quite small- compared to the amounts of charge as found by the theoretical models, but with a large degree of the reduction of the intensity corresponding to the motion. Financial Analysis Accordingly, with the known performance, it is more complicated to realize a large maximum amplitude modulation (MAM; LID light modulation and velocity modulation) as well as to measure the intensity quickly while maintaining the linearity as determined by the conventional detection process. Especially, the determination of the state of the system is not exactly known as a complex by the skilled art, so it is necessary to estimate an accuracy as good as the accuracy that would be reached by the measurement using an optical coupler camera. Furthermore, the measurement is not completely straight and is rather nonuniform, so it leads to a great simplification on the measurement results. SWOT Analysis It is an object of the present invention to provide the measuring methods useful in the above described apparatus, which can be carried out for a wide variety of studies for such methods. Scroll to top
Generative + Discriminative = GAN Generative Adversarial Networks are a machine learning model family that can learn to “hallucinate” new examples of complex data. GANs may be used for generating images, for instance—so-called “deepfake” images use GANs. A GAN’s Training Process The GAN has two parts: a Generator, and a Discriminator. The Generator learns to produce increasingly realistic pictures by randomly making up pictures and showing them to the Discriminator. The Discriminator has a set of real pictures, and it tries to distinguish the made up pictures from the real ones. The generator is programmed to try and fool the discriminator into thinking the made up pictures are real. When the Generator does trick the Discriminator, it learns what looks like a real image to the discriminator, so over time, the Generator gets better at fooling the Discriminator, and the generated fakes start resembling real pictures. The competition between these two kinds of models has led to quite convincing results!
Arithmetic Overflow and underflow Envision an older car’s odometer (non digital) that only supports 999,999. Once it crosses 999,999 it will revert back to 000,000. In cars this is not a big deal but in computer programming this can have serious consequences. In programming this is an example of integer overflow. An overflow in Solidity occurs when a number is incremented beyond its maximum value. As an example suppose we declare an uint8 variable, which can take up to 8 bits. This means that it can have decimal numbers between 0 and 2^8-1 = 255. Consider the following code. uint8 a=255; some function Incrementing this the variable “a” by 1 would result in an overflow situation because its maximum value is 255. Remember Solidity can handle up to 256-bit numbers. So Uint overflow is when there is a number greater than the uint max which results in the number looping back to 0. Under flow works in the opposite direction. Remember how uint8 can take values only between 0 and 255. Consider the following code. uint8 a=0; some function The code above caused an underflow which results in “a'” having the maximum possible value which is 255. Prevent overflow and under flow To prevent underflow and overflow problems in your solidity smart contract code you can use the SafeMath library by openZepplin. The safe math library will help you check for overflows in case of addition, underflow in case of subtraction as well as when performing multiplications and divisions. SafeMath Libraries can be found here on Github – SafeMath by openZepplin . OpenZeppelin is a company that builds developer tools and performs security audits on smart contracts. They are well known in the block chain industry and their contacts are available on Github to download and use. They offer a lot of contracts for use and a lot of well known deployed contracts use their code. Next Review – Reentrancy attack in a Solidity smart contract Leave a Reply
Educating Youth in America’s Founding Principles blog2Picture1 - Dayspring Academy Are you concerned about the direction of our Country? Do you fear that our founding principles and freedoms are going to be lost if the education system continues the divisive course ushered in by those outside of the system? Are we teaching the differences between Karl Marx’s Communist Manifesto and the United States’ Constitution? Is the education system instilling a love of Country and pride for the freedoms God has blessed us with, or are students being taught to become activists against our Founding documents? The United States’ education system is at a breaking point. Students are continually being taught socialism and even communism are government systems based on equality. Many teachers fail to mention the horrors of Communist rule by Stalin, Lenin, Hitler, Castro, Mao, and more. Unfortunately, too many teachers associate as socialists’ activists and bring that ideology into the classroom. Marx believed that socialism was but a precursor to communism. Who We Are Main Photo - Dayspring Academy At Dayspring we adamantly oppose the idea that America’s founding principles are inherently flawed. It is these principles that provided President Lincoln the ability to fight slavery’s inhumane injustices. It is these principles that allowed Congress to pass the Civil Rights Act and Voting Rights Act in the 1960s. It is these principles that have since allowed men and women of all color to achieve the American dream – to find their passion and pursue their own happiness. With God’s divine intervention, the Founders wrote documents that have protected freedom for the people and guided us in difficult times. The United States’ history is not perfect. There have been challenges and grievous attacks on mankind. Graduation - Dayspring Academy What makes the United States different from so many other places to live? The founding documents have provided a way to correct these injustices. We at Dayspring believe in the United States’s Constitution and Bill of Rights. We believe understanding these documents juxtaposed with socialism and communism is fundamental in securing these rights for future generations. Our goal is to provide in-depth studies into our founding documents where students walk away appreciating the freedoms we are blessed with while also realizing how easily these freedoms can disappear. It is our job as educators to ensure that future generations understand why our governing documents are timeless and critical to maintain freedom. A Dayspring education respects and upholds America’s founding documents. Recommended Posts
Superfoods That Help With Depression Depression: Superfoods That Help Depression: Superfoods That Help Most people don’t think that eating certain foods can help with depression. However, eating the right foods and getting enough sleep can help those who are suffering from depression. Eating the right foods can help you feel more emotionally resilient and lessen the effect stress has on your mood. But how exactly does it work? Well in short, eating the right foods  provides the nutrients your body needs to fight off inflammation in your brain, which often leads to depression. So let’s get into the top superfoods you should incorporate into your diet to help with depression. 1. Dark Leafy Greens It’s no surprise that dark leafy greens are one of the best superfoods out there. After all, they are one of the most nutrient dense foods available to us. Greens like spinach, kale, etc. are high in nutrients and have amazing properties that boost our immune systems. Avocado depression Not only are these greens packed with nutrients, they also help prevent the cancerous transformation of normal cells and keep the body ready to attack any precancerous cells. Additionally, leafy greens help fight against inflammation which has been linked with severe depression. Needless to say, these greens are one of the best foods you can eat to help battle depression. 2. Avocado Avocados are another amazing superfood that you should incorporate into your daily diet. These superfoods contain healthy fat that your brain needs in order to run smoothly. These powerhouses are the only fruit that provide a substantial amount of healthy monounsaturated fatty acids. Monounsaturated fatty acids help fight against heart disease among many other things. They also contain around 4 grams of protein and many kinds of vitamins. 3. Berries Berries like blueberries, raspberries, strawberries, etc. are extremely high in antioxidants. But what makes antioxidants so important? Well Antioxidants are like DNA repairmen. They go around fixing your cells and preventing them from getting cancer and other illnesses. Additionally, antioxidants help fight against depression. In one study, patients were treated for two years with antioxidants or placebos. After two years those treated with antioxidants had a notably lower depression score. 4. Tomatoes Tomatoes contain folic acid and alpha-lipoic acid, both of which are good for fighting depression. Folic acid can prevent an excess of homocysteine. Excess homocysteine can restrict the production of important neurotransmitters like serotonin, dopamine, and norepinephrine. A lack of these important neurotransmitters can have many negative effects on the body. Additionally alpha lipoic acid helps stabilize your mood by helping your body convert glucose into energy. So overal tomatoes are definitely one of the best depression fighting sueprfoods. The Superfoods Takeaway Your diet has a huge impact on the way you feel and function. Eating the right foods consistently can help you battle depression and improve your overall help. There are many other foods that you can incorporate into your diet other than the ones mentioned above. This includes foods like walnuts, mushrooms, onions, etc. So enjoy the benefits of eating all these great superfoods! Have you experienced chronic fatigue? Then I encourage you to visit my website. Get your FREE 12-step roadmap on how to reverse depression, emotional pain and chronic fatigue! My mission is to change people’s lives for the better by mentoring and guiding people back to physical, mental, financial and spiritual health. I am a German-trained, conventional as well as naturopathic physician, family doctor, board-certified (Germany) as a dermatologist, allergist, and naturopath. I am now working as a nutritionist and a certified integrative nutrition health coach. As an Integrative Nutrition Health Coach, I know how to guide people to the right decisions to re-build their health from the ground up. I am trained in root-cause and bio-individual medicine and can help you find the real causes of your symptoms and give you directions and support to reverse your depression, chronic fatigue and other chronic illnesses, even if you need to continue taking conventional medications and can’t make drastic changes to diet and lifestyle. Get Your FREE Appointment with DocChristine HERE %d bloggers like this:
Why stroke? Every year, 40,000 to 50,000 Canadians suffer a stroke. Many of them come out of stroke with both psychological and physical consequences. It is also the third leading cause of death in Canada. Stroke is a medical emergency. According to the Heart and Stroke Foundation, 1.9 million brain cells die every minute after a stroke. So every minute or even second of delay can greatly affect a patient's prognosis. Unfortunately, 66% of people do not arrive in time to receive appropriate treatment, not understanding the severity and urgency of the situation when the first signs and symptoms appear. As a result, they are often unable to fully recover their initial brain capacity. We had the opportunity to face this reality during our first hospital internships. In our opinion, what is most deplorable in this situation is the fact that several treatments are now available to stop the progression of the stroke and save the parts of the brain that are not yet dead, if the patient presents at the onset of the first signs and symptoms.
Don’t Get In the Cookie Jar: Cookie Management and Why You Should Review Your Policies Updated: Jan 12th 2021 Cookie Policy Management As a website owner, cookies serve as one of your most powerful tools for creating a smooth user experience. But while cookies remain a fundamental piece of internet browsing, mismanaging their use can lead to privacy, and potentially legal, issues down the line. Implementing a clear Cookie Policy helps establish trust with your users by helping them understand why you use cookies and how it benefits them. What Are Cookies? HTTP cookies are small bundles of data stored in a user’s browser when they visit your site. This enables the site to remember settings, such as login information, when  users return to the site. Site owners use cookies to track how users interact with the site in order to increase performance and make changes to improve the user experience, among other functions. In many cases, cookies are necessary for a website to function as expected. One example includes ecommerce, which relies on cookies to store items in a shopping cart if users leave the page. Anyone who browses the internet takes advantage of cookies every day, even if they don’t realize it. While cookies are used as a catch-all term, there exist different types of cookies that perform distinct tasks and pose varying levels of security risks. A few of the most common types of cookies include: Session Cookies: are used to save short-term bits of information used during a single browsing session, as in the ecommerce example above. Session cookies are explicitly deleted whenever the browser is closed, making them perfect to maintain the user’s login identity.  Session cookies are also often used for website navigation tracking. Persistent Cookies: are longer-term values that the browser remembers whenever the user visits the site, even after the browser is closed.  Persistent cookies have a defined duration that can be as short as seconds or minutes, and as long as years.  Persistent cookies are often used to save settings and preferences to maintain a convenient and consistent experience for the user.  Persistent cookies can also be used to identify and track long-term user behavior on the site across multiple browsing sessions.   Third-Party Cookies: Session and Persistent cookies described above are only visible to the specific website who set them.  Third-party cookies, however, are capable of storing values that apply to multiple websites.  Third-party cookies can be used to identify individuals as they navigate across multiple websites… but only if those websites use the same third-party tools. Third-party cookies are typically set by widgets and other tools that website owners place on their sites.  These third-party cookies have the capability to identify and track users on any website that uses that particular widget. Despite their importance, cookies can present trust, privacy, and security risks, particularly when it comes to third-party cookies. It’s your responsibility as a website owner to know what cookies your site is setting and to ensure the cookies are used ethically and responsibly so your user’s information stays safe.  What is Cookie Management? As issues over digital privacy rights become more forefront, users are increasingly demanding to know how websites use their private information. A recent Cisco survey found that over 84% of global consumers wanted more control over how their data is used.  Fortunately, most browsers allow users to configure their cookie settings to control which types of information is tracked by the websites they visit. Browsers such as Chrome, Edge, Safari, Firefox, and Internet Explorer provide detailed, step-by-step instructions on how to configure cookie use. When you set about creating a Cookie Policy, you’ll want to include these instructions so users can apply them as they see fit. According to a Pew Research survey, nearly 60% of the American public doesn’t understand why websites collect their personal data. To build trust with your users, site owners need to help them understand how cookies work, what they are, and how you use them. Despite the public’s reticence to hand over their personal information, users tend to be forgiving if you explain why you need their data. The best way to accomplish is through creating a Cookie Policy. Creating a Cookie Policy A clear Cookie Policy ensures that your visitors understand why and how you use cookies, while mitigating legal risk against laws addressing cookie use.  Site owners can start by performing a cookie audit. Most sites run more tracking cookies than you realize, so you’ll need to know exactly which user data is being collected and for what purpose. Remove cookies that collect data you don’t need, or that violate privacy rules. Finally, create a list of cookies being used on your site and classify them by the categories listed above. You can perform a cookie audit using tools such as Osano’s free Website Privacy Report With your cookies collected and categorized, you can now start building your Cookie Policy. Provide a brief explanation describing what cookies are and why you use them. Next, you’ll want to list the specific cookies used on your site and the purpose behind their use. Make sure to post your policy in a conspicuous, unchanging spot on your site, such as the header or footer.  Your final step involves requiring user consent over your cookie use. Pop-up banners are typically the most effective way to gain user consent, as they are difficult, if not impossible, to ignore. This banner will pop up the first time a user visits your site and should accomplish the following three goals: • User is aware and consents to cookie use • User has the option to set their cookie preferences • User can revoke consent at any time Do I Really Need a Cookie Policy? The short answer: Yes. Besides using a Cookie Policy to gain user trust, it’s also legally required in many cases. In recent years, the US, and especially Europe, created laws to protect consumer data and combat unethical cookie practices. The most comprehensive of these laws is the General Data Protection Regulation (GDPR), which was adapted from the EU ePrivacy Directive and applies to any site that operates in the EU or is used by EU citizens. Considering most websites attract visitors across the globe, the GDPR applies to virtually every site.  To stay in compliance with GDPR, you must meet the following requirements: • Consent must be freely given, specific, informed, and unambiguous • Consent must be a clear affirmative action, such as an opt-in box or an accept button • User must be able opt out • User needs to have the option to accept or decline particular cookies  • User who reject cookies must still receive full access to the website While there is no similarly comprehensive cookie law in the US, the California Consumer Privacy Act (CCPA) covers users in California, the most populous state in the US, making good odds that the law will apply to your site. But if you complete all the GDPR requirements, you’ll likely also be covered under CCPA, though there are additional requirements under CCPA related to the selling of data. Visit the provided links to become familiar with both laws. It’s also worth noting that GDPR and CCPA do not apply to essential cookies meant to improve the site’s functional use. Time For a Cookie Break Cookies are one of most complex, yet important tools in your toolbox as a site owner. They help your site function and give the kind of user experience your visitors expect, delivering a website experience that’s memorable and convenient. Your task is now to explain to your users why they’re so important. They’ll thank you for your service with increased trust. It might sound like a lot to deal with all these cookies, but the main thing to remember is that your goal is to be as transparent as possible. Trust is the most valuable currency when it comes to offering services online, and this should always be your end goal. If you’re straight with your users, they are more likely to trust you and use your services.
Reading and reflecting on this article will enable you to: • Identify the assessment and management principles of hard-to-heal wounds • Explain how clinical signs in the wounds relate to different bacterial levels within them • Discuss the principles and reasons for biofilm-based wound care. Hard-to-heal is a term for a wound that fails to heal in an orderly and timely manner1. Several countries have tried to capture costs and data relating to these wounds but, because most of them are managed in the community, obtaining a countrywide picture is difficult. In New Zealand we have very little idea of the actual size of the problem, although some specific groups have been studied. What we do know is that the cost is expensive in both health dollars and quality of life. In 2012 a study in the UK found that the overall treatment costs for venous leg ulcers were around $400 million per year, and that was based on the fact that 70,000–190,000 patients have active ulcers at any one time2. An Auckland study identified that slightly less than one in 1,000 people per year will have a leg ulcer, and this is considered an underestimate of the problem3. Dog bites were found to have increased from a rate of 10.5 per 100,000 in 2004 to 14.3 per 100,000 in 20144 and it is estimated that two people per day on average are admitted to hospital as a result, with children over-represented. It is also estimated that 15 per cent of the 200,000 people diagnosed with type 2 diabetes in New Zealand will develop a foot ulcer at some time and many of these will go on to have an amputation5. For all these groups, the cost to the quality of life needs to be considered as well, such as pain, loss of time at work, potential loss of limb, isolation and lack of mobility. Factors delaying wound healing • There are four factors that can delay wound healing. These are: • patient-related • wound-related • clinical competency factors • resource and treatment-related1. It is essential that nurses complete a comprehensive assessment to systematically identify factors that can potentially delay healing. The assessment must involve the patient in their care planning, and be cognisant of the resources the patient has available to them. The holistic assessment needs to identify all factors impacting on wound healing and determine how these can be best managed – this, in turn, may affect the overall aim of care. (See Box 1 for examples of factors that can delay wound healing.) The underlying aetiology of the wound needs to be established; for example, whether a leg ulcer is venous or arterial, as a leg ulcer in itself is not a diagnosis. Health professionals managing hard-to-heal wounds need to understand the factors that impact on wound healing and the consequences. If they do not have the skills to provide the appropriate care, they need to refer to the appropriate specialist, who may be a nurse practitioner, nurse specialist or medical professional. WOUND-RELATED: healing at the cellular level People used to think that hard-to-heal wounds were just wounds that took longer to heal than acute ones. We now have evidence to prove that there are cellular differences in what is occurring in the wound6. The main problem is wounds that become stuck in an ongoing inflammatory response, and one of the most common causes is a heavy bacterial load. Ongoing inflammation results in the disruption of the normal activity of a group of enzymes known as matrix metalloproteases (MMPs). In normal healing MMPs have the following functions: Inflammatory stage: removal of damaged extracellular matrix (ECM) and bacteria Proliferative stage: degradation of the capillary basement membrane, which is needed for angiogenesis (formation of new blood vessels) to occur and the migration of the epidermal cells Maturation phase: contraction of the scar and remodelling of the scar ECM7. When the inflammatory process does not die down, but continues because of bacterial load, the control mechanisms for the MMPs cease to be effective and they continue to destroy the ECM, which is the scaffolding used by cells for movement and communication in the healing process. Bacterial levels in wounds A condition known as critical colonisation has been added to the infection continuum for wounds, and while it remains a controversial concept in some circles, many of those who manage hard-to-heal wounds recognise that it exists. Additionally, hard-to-heal wounds have biofilms (which are communities of bacteria and fungi that range from a couple of species to the more common polymicrobial biofilms) and these biofilms are surrounded by a barrier of sugar and proteins that protect the bacteria from external threats, including anti-microbial dressings and systemic antibiotics7. The knowledge of differing levels of bacteria and the potential for the presence of biofilms in hard-to-heal wounds has led to the concept of biofilm-based wound care (BBWC)10. What is the relevance of biofilms to wounds? Biofilms are known to be a major contributory factor in many chronic inflammatory diseases, and it has been shown that biofilm is present on the surface of 60 per cent of hard-to-heal wounds, compared with 6 per cent of acute wounds7. Additionally, it is likely that in all the remaining hard-to-heal wounds at least part of the wound bed is affected by a biofilm7. Biofilms form when micro-organisms attach to the wound surface, then as they multiply they become more firmly attached and finally secrete a surrounding matrix of sugars and proteins, which create a closed community within a protective barrier. This process can initially be completed in 6–12 hours, at which time they are becoming tolerant to antibiotics and antimicrobials. Within 2–4 days they are fully formed and, if disrupted, they have the capacity to reform as mature biofilms within 24 hours. The main ways these communities have of resisting treatment are: preventing antibodies and antimicrobial agents from entering mutually protecting other bacteria; for example, a bacteria that has developed resistance to an antibiotic can secrete proteins to protect neighbouring bacteria from that antibiotic hibernating, which is when bacteria become metabolically quiescent. As antibiotics need metabolically active bacteria to work, they are rendered ineffective. It is worth noting that research shows that the concentration of an antibiotic necessary to kill or eliminate a bacterial biofilm exceeds the maximum recommended prescription levels, so prescribing repeated courses of antibiotics for these wounds is ineffective and also increases the chance of building up further resistance7. Biofilm-based wound care (BBWC) BBWC has replaced the original concept of wound bed management, which largely consisted of occasional debridement of a wound, oral antibiotics and the use of antimicrobial dressings. The BBWC approach has been developed as a result of increased knowledge about biofilms and particularly how resistant they are to outside influences and how quickly they can reform. BBWC is based on: • serial debridement • the use of selective biocides • biofilm suppressants • selective antimicrobials10 New wound products are appearing on the market all the time and staff should be aware of developments to ensure they keep up with best practice. Antibiotic therapy should be saved for wounds that are clinically infected. Biofilm disruption Serial debridement needs to be carried out regularly and in a way that causes damage and disruption to the biofilm before it can reform. Not all antimicrobial products disrupt the biofilm, which is why serial debridement is now recommended. A new, easy way for nurses to achieve this is with Debrisoft, a monofilament pad11. This is said to be less painful than other debridement options and is effective at disrupting the biofilm surface. Debridement is covered in this issue (Vol 15 (5), October 2015) on p.22. Managing biofilms by bacterial control and high antibiotic use has led to bacterial resistance, resulting in an increasing reliance on topical antimicrobials (antiseptics). Silver, iodine and honey have been used for centuries and other products are now appearing on the market. Polyhexylmethylbiguanide (PHMB) has been around for about 60 years, with bacteria yet to develop any resistance to it. It is an antiseptic/antimicrobial similar to naturally occurring peptides, which are produced by the majority of living organisms and are effective against many bacteria, viruses and fungi12. It has a low toxicity and has even been used in eye treatments, and relatively recently has made its way into the world of wound management. PHMB works by integrating into the cell membrane of bacteria and reorganising the structure, preventing the spread of bacteria. It is delivered in several different ways – as a solution, a gel, a foam, and in gauze – but a key factor for it to be effective is that it requires 10–15 minutes’ contact with the bacteria to begin to cause disruption. PHMB is commonly used to irrigate the wound and remains in contact with the wound for 10–15 minutes before one of the other products containing PHMB is applied. It is believed to have a surfactant that continues to disrupt the surface of the biofilm, also allowing for the ongoing suppression of bacteria. CLINICAL COMPETENCY: good care plans are essential Competency – the ability to do something successfully and efficiently. Ask many nurses and they will say they feel competent enough to complete a wound assessment. Most areas have wound assessment tools now, and the majority of these are based on the TIME model, that is: • T     for tissue (appearance and type) •      for signs of infection/inflammation • M    for the amount of moisture • E     for whether epithelialisation is occurring. After an assessment has been completed, the next part of the process is completing a care plan, and this is where errors demonstrating gaps in competency can begin to creep in. Mrs H: a hard-to-heal care plan case study Mrs H was referred with a hard-to-heal wound on her lower leg, which had been present for eight weeks despite three courses of antibiotics and the use of several different wound dressings. The patient was in need of a comprehensive assessment to manage all factors relating to the wound not healing. Purely from the management of the wound bed, the following was noted: The wound base had approximately 70 per cent slough and 30 per cent granulation; there was no sign of inflammation or infection and the moisture level was low to moderate (a 3 on a 1–5 numerical scale). This was a critically colonised wound that did not require systemic antibiotics, but it did require debridement and an antimicrobial wound dressing as it had a biofilm present over at least part of the surface. Mrs H’s initial care plan stated that the aim was to heal the wound. While this may have been the overall aim, this would not have been achieved before managing the wound environment. What the care plan should have said was: • Debride slough from wound base • Disrupt biofilm • Manage bacterial load Also state how often and with which products this would be achieved. Clinical competence is demonstrated by a comprehensive care plan, which includes an assessment that provides the rationale for treatment choices. Conservative sharp debridement was used, with a honey dressing. To ensure BBWC, the debridement of the wound needs to be repeated. Additionally, a Doppler assessment was completed and compression bandaging applied to reduce the oedema. Choosing dressings and other competencies A key clinical competency is also the ability to make a dressing choice based on a wound assessment. It is not uncommon for dressing choices to differ from one nurse to another because of personal preference. This does not demonstrate clinical competence and many patients notice and question it. The use of honey is often queried by patients. If there is no contraindication and it fits with what the nurse is trying to achieve, there is no reason not to use it; however, the nurse should explain the importance of using medical grade honey. Other competencies are usually more defined; for example, the ability to complete an ankle brachial pressure index and correctly interpret results; the ability to apply compression bandaging, sharp debridement and topical negative pressure safely and efficiently. Health care often opts for the cheapest wound product, which can increase the overall costs as inappropriate care can result in delayed wound healing. For example, a short course of negative pressure wound therapy can substantially reduce the healing period. This leads to improved quality of life and allows the person to return to their normal activities much sooner. Getting people back to work has wider economic benefits for society and reduced ACC costs. Nurses and managers need to be aware of what is available and the correct way to manage hard-to-heal wounds to maximise patient outcomes while reducing overall costs. Successfully managing wounds involves identifying all holistic factors that may impact on healing and modifying them where possible; completing an accurate and informed wound assessment; understanding the normal stages of wound healing; and being able to identify what may be happening in a wound as a result of bacterial load and the presence of a biofilm. With some wounds, the end point may not be healing – for example, some ischaemic wounds or malignant wounds – and in these cases, the priority has to be planning care with the patient to improve quality of life. For other wounds, we need to start asking why so many end up in the hard-to-heal category. Are all staff who deal with wounds completely up to date with the evidence relating to wound infection and the products available to them and how to use them? Do we have enough nurses with the relevant competencies, including assessing the patient and the wound and recognising all factors that will impact on healing? Does the facility provide the resources for nurses to manage wounds successfully? Could we improve the quality of life for patients with wounds and also reduce the overall health dollar costs? Hard-to-heal wounds – let’s do better. Download the learning activity here>> About the author: Jenny Phillips RGN BSc (Hons) MN is a nurse practitioner (wound care) working in primary health care and also works as a senior professional clinician at Massey University’s School of Nursing. This article was peer reviewed by: Catherine Hammond RN MN, a wound care clinical nurse specialist working for Nurse Maude, Christchurch Dr Andrew Jull RN PhD, nurse advisor (quality) at Auckland District Health Board and associate professor at The University of Auckland School of Nursing 1. VOWDEN P (2011). Hard-to-heal wounds made easy. Wounds International 2(4). Retrieved May 2015 www.woundsinternational.com 2. MADDOX D (2012). Effects of venous leg ulcers on patients’ quality of life. Nursing Standard 26(38) 42-49 3. JULL A & BETTS J (2006). Managing leg ulcers; it’s not rocket science. NZFP 33 (3) 197-201 4. OXLEY J & CHENG J (2014). Dog bites, treatment and prevention in New Zealand. NZMJ Vol 127 1406 5. GRECH R & DISSANAYAB A. Diabetic Foot Disease webemail.doc –NZSSD. Counties Manakau DHB. www.nzssd.org.nz 6. GIBSON D, CULLEN B, LEGERSTEE R, HARDING K & SCHULTZ G (2009). MMPs made easy. Wounds international 1 (1) Retrieved May 2015 www.woundsinternational.com 7. PHILLIPS P, WOLCOTT R, FLETCHER J & SCHULTZ G (2010) Biofilms made easy Wounds international 1 (3) Retrieved February 2015 www.woundsinternational.com 8. AUSTRALIAN WOUND MANAGEMENT ASSOCIATION (2011) Bacterial impact on wound healing: from contamination to infection. Retrieved May 2015 www.awma.com.au 9. Swanson T, Grothier L & Schultz G (2014) Wound infection made easy.www.woundsinternational.com Retrieved June 2015. 10. SWANSON T (2011) Innovations in the assessment and diagnosis of wound infection. Wounds international 2 (1) 5-6. 11. NICE (2014) NICE guidance supports the use of Debrisoft. NICE med tech guidance (MTG 17) March www.nice.org.uk Retrieved June 2015. 12. WOUNDS UK (2010) PHMB and its potential contribution to wound management. Aberdeen Please enter your comment! Please enter your name here
Summer is near. Lets talk sunscreens June is the beginning of summer. Let’s talk sunscreens. I bet it never occurred to you, but sunscreens are highly toxic. The ingredients commonly used in sunscreens had never been adequately tested. Sunscreens are designed to stay on the skin for long periods of time, increasing exposure. Many sunscreen chemicals are absorbed into the body and can be measured in blood, breast milk and urine samples. What they do know is Oxybenzone is an endocrine disrupter. Avoid all products with added Vitamin A, as it is a suspected carcinogen. As a result the FDA is now proposing is now proposing significant changes in how sunscreen ingredients are evaluated for safety. Several of the commonly used ingredients are endocrine disruptors impacting our estrogen levels and in boys and men, their testosterone levels. Currently the ingredients have been unregulated and the FDA is unaware of whether or not these ingredients cause cancer. So what to do instead? We know that prolonged sun exposure also has health implications. Follow these recommendations from the Environmental Working Group that studies products, their toxicity and the implications to our health: Wear clothes and protect your skin from harsh sun exposure. Plan your activities around the sun. Stay in during the hottest and brightest time of the day. Be in the sun in the early morning and late afternoon. Find or create shade. Sit under a tree, put up an umbrella. Keep infants in the shade. If you start to get pink, get out of the sun. Red , blistered, sore skin means you have gotten too many rays. Be aware, and be careful. Sunglasses are a must! They aren’t worn for fashion, they are actually protecting your eyes from UV rays. Check the UV index. This will guide you. You can Google it and plan your activities around it. A couple of other notes: High SPF ratings are, according to the FDA, inherently misleading. Sunscreens perform imperfect protection. Some beaches in Hawaii have banned sunscreen products because they were washing off people’s skin and killing the sea life. What else can you do? Find a product that has a low toxin number. I use Keys-Soaps moisturizer under my makeup and on my skin when I am getting sun exposure. This product is rated .2 on a 5 point scale with a range of low to high of 0-5. Check the EWG guide for other safer sunscreens available here. EWG is a great site to monitor all of your products toxicity from vegetables, to cosmetics, to the water coming out of your tap. Get familiar with their data base. Since you are avoiding the sun, get your Vitamin D levels checked each time you go to the doctor. Your body needs adequate Vitamin D to function properly and most of us are now deficient. The vitamin D from milk is vitamin D2 and is synthetic. We need vitamin D3. And if you follow these guidelines, you will have a fabulous healthy summer. Enjoy. Follow me for more tips at The art is from my upcoming second book due out Fall 2019 Feel Good- Futureproof your health. Recommend0 recommendationsPublished in Health
a woman wearing a face mask in cardiff ‘Social distancing’ measures may be introduced in the UK (Picture: Matthew Horwood/Getty Images) Coronavirus continues to spread in the UK, prompting Boris Johnson to chair an emergency meeting of senior ministers to discuss the country’s response to the spread of Covid-19. They are expected to discuss whether or ‘social distancing’ measures should be brought in to prevent further spread of coronavirus, which has now claimed a third life in the UK. The committee will decide if the UK should move from the ‘contain’ to the ‘delay’ phase of the government’s coronavirus action plan. One of the strategies of the ‘delay’ strand of their plan is ‘social distancing’ – but what exactly does that mean? And how will it help prevent coronavirus from spreading? What is social distancing and what measures might the UK take? Social distancing essentially refers to measures taken to minimise the contact between people to avoid even mild cases of the virus being spread. According to Public Health England, social distancing measures could include ‘things like temporarily reducing socialising in public places such as entertainment or sports events, reducing our use of non-essential public transport or recommending more home working.’ a woman on the london underground wearing a face mask The government could ask people to reduce their use of non-essential public transport (Picture: Victoria Jones/PA) They go on to state that the concept of social distancing is not new, and that the measures are ‘well established and have been discussed and planned for many years, including as part of the government’s preparations for a flu pandemic.’ It is expected that if the government does introduce these measures, they will be phased in, and introduced locally rather than nationally, with Public Health England saying decisions will be based on the pattern of transmission, so, if there is widespread transmission in a particular area. According to the World Health Organisation, individuals can ensure social distancing by maintaining ‘at least 1 metre (3 feet) distance between yourself and anyone who is coughing or sneezing,’ adding that when an infected person coughs or sneezes, they spray small liquid droplets which may contain the virus. Public Health England state the virus can be spread when people have ‘close sustained contact’ with people who are not infected, which typically means ‘spending more than 15 minutes within two metres of an infected person.’ By reducing our contact with people and our time in crowded places, this should help curb any potential spread. In crowded places, such as public transport, it is hard to control your proximity to people, which is why many large-scale events – such as SXSW and the Toyko Marathon – have been cancelled. MORE : Tube worker tests positive for coronavirus MORE : Woman describes what it’s like when hazmat medics turn up to test for coronavirus Share your views in the comments below.
Vocal technique used with spoken or chanted rhyming lyrics spitting bars Commons category Wikipedia creation date Wikipedia incoming links count Wikipedia opening text Rapping (or rhyming, spitting, emceeing, MCing) is a musical form of vocal delivery that incorporates "rhyme, rhythmic speech, and street vernacular", which is performed or chanted in a variety of ways, usually over a backing beat or musical accompaniment. The components of rap include "content" (what is being said), "flow" (rhythm, rhyme), and "delivery" (cadence, tone). Rap differs from spoken-word poetry in that it is usually performed in time to musical accompaniment. Rap being a primary ingredient of hip hop music, it is commonly associated with that genre in particular; however, the origins of rap precede hip-hop culture. The earliest precursor to modern rap is the West African griot tradition, in which "oral historians", or "praise-singers", would disseminate oral traditions and genealogies, or use their rhetorical techniques for gossip or to "praise or critique individuals." Griot traditions connect to rap along a lineage of black verbal reverence[definition needed], through James Brown interacting with the crowd and the band between songs, to Muhammad Ali's verbal taunts and the poems of The Last Poets.[vague] Therefore, rap lyrics and music are part of the "Black rhetorical continuum", and aim to reuse elements of past traditions while expanding upon them through "creative use of language and rhetorical styles and strategies". The person credited with originating the style of "delivering rhymes over extensive music", that would become known as rap, was Anthony "DJ Hollywood" Holloway from Harlem, New York. Rap is usually delivered over a beat, typically provided by a DJ, turntablist, beatboxer, or performed a cappella without accompaniment. Stylistically, rap occupies a gray area between speech, prose, poetry, and singing. The word, which predates the musical form, originally meant "to lightly strike", and is now used to describe quick speech or repartee. The word had been used in British English since the 16th century. It was part of the African American dialect of English in the 1960s meaning "to converse", and very soon after that in its present usage as a term denoting the musical style. Today, the term rap is so closely associated with hip-hop music that many writers use the terms interchangeably. Wikipedia redirect Musical Genres/Hip Musical Genres/Hip Hop Rap artist Wack MC Wack MCs Wack mc Wack rapper Wack rappers Wack mcs Wack emcee Hipity hop music Street rhyme List of genres containing rap History of hip hop Hip-hop scene Hip hop scene Hip-hop crowd Microphone Controller MC (hip hop) Rap poetry Rap Artist History of hip-hop The Four Elements of Hip Hip The four elements of hip hop Flow (music) Flow (rapping) Hip hop crafts Hip hop craft Techniques in hip hop Hip hop techniques Rap game Hip hop era Hip hop decade Rap star Rhythmic monologue Rap vocals Hip- hop Grunge hop Roots of hip hop Party rap Rapped vocals Microphone controller Spitting bars Triplet flow Rap (genre) Wikipedia URL Australian Educational Vocabulary ID Bibliothèque nationale de France ID Encyclopædia Britannica Online ID Encyclopædia Universalis ID Freebase ID Library of Congress authority ID Library of Congress Genre/Form Terms ID National Diet Library Auth ID Quora topic ID external links
Discuss with your colleagues the following questions: What is “Legality”? What are “Ethics”? Compare and contrast legality and  ethics in health care. Provide one (1) specific real life legal case example of a violation of legality in a healthcare organization and one (1) specific real life legal case example of a violation of ethics in a healthcare organization that you find on the internet or in the print media. See Discussion Expectations and Grading for rules on discussions. Read background articles. This discussion requires additional research beyond reading the articles.  Assigned reading materials: Understanding Federal Courts – (Control>>Click>>From Drop down Menu select Open in New Window or Copy/Paste into your URL) http://www.uscourts.gov/about-federal-courts/court-role-and-structure Introduction to the U.S. Legal System- http://litigation.findlaw.com/legal-system/introduction-to-the-u-s-legal-system.html  Legal issues facing health care professionals-http://www.beckershospitalreview.com/hospital-management-administration/13-legal-issues-for-hospitals-and-health-systems.html  Ethical and legal analysis of health care case-http://ijahsp.nova.edu/articles/Vol2num1/pdf/lazaro.pdf This educational resource is designed to help health care organization directors ask knowledgeable and appropriate questions related to health care corporate compliance.http://www.hcca-info.org/Portals/0/PDFs/Resources/Conference_Handouts/Clinical_Practice_Compliance_Conference/2007/Fri/601Handout.pdf Health Care Ethics – samples.jbpub.com/9781449665357/Chapter2.pdf Example of an Employee Handbook from Johns Hopkins: https://www.hopkinsmedicine.org/human_resources/_docs/employee_handbook_non-union_non-represented.pdf A Framework for Thinking Ethically This document is designed as an introduction to thinking ethically. We all have an image of our better selves-of how we are when we act ethically or are “at our best.” We probably also have an image of what an ethical community, an ethical business, an ethical government, or an ethical society should be. Ethics really has to do with all these levels-acting ethically as individuals, creating ethical organizations and governments, and making our society as a whole ethical in the way it treats everyone. What is Ethics? Simply stated, ethics refers to standards of behavior that tell us how human beings ought to act in the many situations in which they find themselves-as friends, parents, children, citizens, business people, teachers, professionals, and so on. It is helpful to identify what ethics is NOT: Ethics is not the same as feelings. Feelings provide important information for our ethical choices. Some people have highly developed habits that make them feel bad when they do something wrong, but many people feel good even though they are doing something wrong. And often our feelings will tell us it is uncomfortable to do the right thing if it is hard. Ethics is not religion. Many people are not religious, but ethics applies to everyone. Most religions do advocate high ethical standards but sometimes do not address all the types of problems we face. Ethics is not following the law. A good system of law does incorporate many ethical standards, but law can deviate from what is ethical. Law can become ethically corrupt, as some totalitarian regimes have made it. Law can be a function of power alone and designed to serve the interests of narrow groups. Law may have a difficult time designing or enforcing standards in some important areas, and may be slow to address new problems. Ethics is not following culturally accepted norms. Some cultures are quite ethical, but others become corrupt -or blind to certain ethical concerns (as the United States was to slavery before the Civil War). “When in Rome, do as the Romans do” is not a satisfactory ethical standard. Ethics is not science. Social and natural science can provide important data to help us make better ethical choices. But science alone does not tell us what we ought to do. Science may provide an explanation for what humans are like. But ethics provides reasons for how humans ought to act. And just because something is scientifically or technologically possible, it may not be ethical to do it. Why Identifying Ethical Standards is Hard There are two fundamental problems in identifying the ethical standards we are to follow: 1. On what do we base our ethical standards? 2. How do those standards get applied to specific situations we face? Five Sources of Ethical Standards The Utilitarian Approach Some ethicists emphasize that the ethical action is the one that provides the most good or does the least harm, or, to put it another way, produces the greatest balance of good over harm. The ethical corporate action, then, is the one that produces the greatest good and does the least harm for all who are affected-customers, employees, shareholders, the community, and the environment. Ethical warfare balances the good achieved in ending terrorism with the harm done to all parties through death, injuries, and destruction. The utilitarian approach deals with consequences; it tries both to increase the good done and to reduce the harm done. The Rights Approach Other philosophers and ethicists suggest that the ethical action is the one that best protects and respects the moral rights of those affected. This approach starts from the belief that humans have a dignity based on their human nature per se or on their ability to choose freely what they do with their lives. On the basis of such dignity, they have a right to be treated as ends and not merely as means to other ends. The list of moral rights -including the rights to make one’s own choices about what kind of life to lead, to be told the truth, not to be injured, to a degree of privacy, and so on-is widely debated; some now argue that non-humans have rights, too. Also, it is often said that rights imply duties-in particular, the duty to respect others’ rights. The Fairness or Justice Approach Aristotle and other Greek philosophers have contributed the idea that all equals should be treated equally. Today we use this idea to say that ethical actions treat all human beings equally-or if unequally, then fairly based on some standard that is defensible. We pay people more based on their harder work or the greater amount that they contribute to an organization, and say that is fair. But there is a debate over CEO salaries that are hundreds of times larger than the pay of others; many ask whether the huge disparity is based on a defensible standard or whether it is the result of an imbalance of power and hence is unfair. The Common Good Approach The Greek philosophers have also contributed the notion that life in community is a good in itself and our actions should contribute to that life. This approach suggests that the interlocking relationships of society are the basis of ethical reasoning and that respect and compassion for all others-especially the vulnerable-are requirements of such reasoning. This approach also calls attention to the common conditions that are important to the welfare of everyone. This may be a system of laws, effective police and fire departments, health care, a public educational system, or even public recreational areas. The Virtue Approach A very ancient approach to ethics is that ethical actions ought to be consistent with certain ideal virtues that provide for the full development of our humanity. These virtues are dispositions and habits that enable us to act according to the highest potential of our character and on behalf of values like truth and beauty. Honesty, courage, compassion, generosity, tolerance, love, fidelity, integrity, fairness, self-control, and prudence are all examples of virtues. Virtue ethics asks of any action, “What kind of person will I become if I do this?” or “Is this action consistent with my acting at my best?” Putting the Approaches Together Each of the approaches helps us determine what standards of behavior can be considered ethical. There are still problems to be solved, however. The first problem is that we may not agree on the content of some of these specific approaches. We may not all agree to the same set of human and civil rights. We may not agree on what constitutes the common good. We may not even agree on what is a good and what is a harm. The second problem is that the different approaches may not all answer the question “What is ethical?” in the same way. Nonetheless, each approach gives us important information with which to determine what is ethical in a particular circumstance. And much more often than not, the different approaches do lead to similar answers. Making Decisions The more novel and difficult the ethical choice we face, the more we need to rely on discussion and dialogue with others about the dilemma. Only by careful exploration of the problem, aided by the insights and different perspectives of others, can we make good ethical choices in such situations. We have found the following framework for ethical decision making a useful method for exploring ethical dilemmas and identifying ethical courses of action. A Framework for Ethical Decision Making Recognize an Ethical Issue Could this decision or situation be damaging to someone or to some group? Does this decision involve a choice between a good and bad alternative, or perhaps between two “goods” or between two “bads”? Is this issue about more than what is legal or what is most efficient? If so, how? Get the Facts What are the relevant facts of the case? What facts are not known? Can I learn more about the situation? Do I know enough to make a decision? What individuals and groups have an important stake in the outcome? Are some concerns more important? Why? What are the options for acting? Have all the relevant persons and groups been consulted? Have I identified creative options? Evaluate Alternative Actions Evaluate the options by asking the following questions: Which option will produce the most good and do the least harm? (The Utilitarian Approach) Which option best respects the rights of all who have a stake? (The Rights Approach) Which option treats people equally or proportionately? (The Justice Approach) Which option best serves the community  as a whole, not just some members?  (The Common Good Approach) Which option leads me to act as the sort of person I want to be? (The Virtue Approach) Make a Decision and Test It Considering all these approaches, which option best addresses the situation? If I told someone I respect-or told a television audience-which option I have chosen, what would they say? Act and Reflect on the Outcome How can my decision be implemented with the greatest care and attention to the concerns of all stakeholders? How did my decision turn out and what have I learned from this specific situation? This framework for thinking ethically is the product of dialogue and debate at the Markkula Center for Applied Ethics at Santa Clara University. Primary contributors include Manuel Velasquez, Dennis Moberg, Michael J. Meyer, Thomas Shanks, Margaret R. McLean, David DeCosse, Claire André, and Kirk O. Hanson. It was last revised in
Related topics: nasa · solar system NASA Voyager 2 could be nearing interstellar space Voyager 1 fires up thrusters after 37 years Voyager makes an interstellar discovery New evidence our neighborhood in space is stuffed with hydrogen Only the two Voyager spacecraft have ever been there, and it took than more than 30 years of supersonic travel. It lies well past the orbit of Pluto, through the rocky Kuiper belt, and on for four times that distance. This ... Forty years on, Voyager still hurtles through space Are we alone? Forty years ago, NASA rocket scientists sought to answer this question by launching the Voyager spacecraft, twin unmanned spaceships that would travel further than any human-made object in history. Pressure runs high at edge of solar system Out at the boundary of our solar system, pressure runs high. This pressure, the force plasma, magnetic fields and particles like ions, cosmic rays and electrons exert on one another when they flow and collide, was recently ... page 1 from 18
How Will Future Cars Look Like? Are flying cars the future? Flying cars could be a possibility in the near future, as Japan plans to commercialize as soon as 2023. Companies such as Airbus, Boeing and Uber are all working the field.. What new inventions will we have by 2050? Future Inventions That Could Exist By 2050AI enabled robots.Seamless IoT in home and business.Space tourism.Self-driving cars.New sources of energy.Drone ecosystem.Virtual Reality.Medical advancement with AI and nanobots. Is car a model? A car’s make is the brand of the vehicle, while the model refers to the name of a car product and sometimes a range of products. For example, Toyota is a car make and Camry is a car model. The make, model, model year, body style and trim level all have implications on the cost of a vehicle and its insurance rates. What will be the fuel used in future? In the future, fuel cells could power our cars, with hydrogen replacing the petroleum fuel that is used in most vehicles today. … If pure hydrogen is used as a fuel, fuel cells emit only heat and water as a byproduct. Hydrogen-powered fuel cells are also far more energy efficient than traditional combustion technologies. Are helicopters safer than car? The answer, based on a TPG analysis of a decade of safety data: Like almost every other mode of transportation, flying in a helicopter is considerably more dangerous than airline travel. But it’s far safer than riding in a car. What will cities look like in 2050? City: 2050 will be more dense, larger and older. According to the U.S. Census Bureau, United Nations, Pew Research and other sources, the U.S. will grow to 438 million people by 2050 – up 35% from our 2017 population of 326 million. … Lifespans and the median population age are projected to increase. What fuel will cars use in the future? What will power cars in the future? Alternative fuels for cars: what does the future hold?Liquefied Petroleum Gas (LPG) LPG, or Autogas, as it’s also known, is a type of ‘liquid gas’ that currently fuels around 21 million cars globally. … Electricity. … Biofuel. … Hydrogen. … Nitrogen. … Kinetic. … Compressed Air. … Steam. How cars have changed in the last 10 years? Cars are much safer today. Ten years ago, the majority of cars had, at most, two front airbags. And now, cars also have accident avoidance features such as collision warning systems, blind spot recognition, and alert sensors. Some cars are even prototyping exterior airbags to prevent collision damage. What will our homes be like in 2050? What will cars be like in 2040? 1 in 4 cars will be Powered by Batteries: 1/3 of production and 1/4 of cars on the road will be electric by 2040. … You will use your car like a mobile phone: 90 percent of charging will be done in the office or at home overnight. This will consume 1,000TWh of electricity which equals 2.5 percent of global demand. Will there be flying cars in 2050? FLYING cars will be a reality in barely 30 years’ time, enabling motorists to take to the skies to navigate an increasingly crowded UK, a team of experts has predicted. … At the same time, the UK population is expected to exceed 70 million by 2030, growing by a further 7 million to reach 77 million by 2050. Is Tesla making a flying car? Elon Musk: A version of Tesla Roadster will fly thanks to SpaceX technology. … And now there’s another to-do: Build flying Roadsters with rocket technology. So says the billionaire tech CEO via Twitter. On Wednesday, Musk tweeted a GIF of a car levitating, with blue light shooting from its wheels. How fast did the first cars go? 16 km/hOn July 3, 1886, mechanical engineer Karl Benz drove the first automobile in Mannheim, Germany, reaching a top speed of 16 km/h (10 mph). The automobile was powered by a 0.75-hp one-cylinder four-stroke gasoline engine. How has the car changed the world? Cars Enabled People to Travel and Relocate More Readily The most obvious change for everyday people was that cars gave them a way to get around quickly. Suddenly, people had a new mode of transportation that could get them more places, which meant leisure travel became something common folk could afford. Which fuel is known as future fuel? hydrogenThe hydrogen can also be converted into hydrogen‑based fuels, including synthetic methane, methanol, ammonia and synthetic liquid fuels, which have a range of potential transportation uses. The green hydrogen is the fuel of the future. What will cars look like in 2050? The 2050 car is a driverless vehicle in the shape of a smooth pod that can change colour with the tap of an app. By 2050, cars will be fully autonomous and electric, with advanced customisation technologies. What will happen in 2050? Higher water levels, more powerful tropical storms, and increased energy use across the globe will lead to widespread power outages. In the US, the effects will be worst in crowded, northeastern cities like New York and Philadelphia. By 2050, up to 50% more people there will likely be temporarily without power.
Ada Lovelace, Mathematician Enchantress of Numbers by Jennifer Chiaverini is a very LONG book about a fascinating woman, Augusta Ada King, Countess of Lovelace.  I’m finally close to the conclusion, having experienced visceral reactions to Ada’s mother’s rigid parenting, her husband’s alignment with said mother Lady Byron, and the Victorian ideas about the weakness of the female body and brain. I’ve been trying to remember where I encountered Ada before, because the main events of her life were vaguely familiar.  Perhaps it was actually a film? In any case, here’s a brief biography: Ada Lovelace (born Augusta Ada Byron; December 10, 1815- November 27, 1852) was an English mathematician who has been called the first computer programmer for writing an algorithm, or a set of operating instructions, for the early computing machine built by Charles Babbage in 1821. As the daughter of the famed English Romantic poet Lord Byron, her life has been characterized as a constant inner-struggle between logic, emotion, poetry, and mathematics during periods of failing health, obsessive gambling, and bursts of boundless energy. All citations from:   – My overall impression of Ada from Chiaverini’s book is of a supremely intelligent woman entrapped by Victorian social mores.  It didn’t take me long to start cursing her mother for all the cruel restrictions she imposed on her one daughter.  Of course, later on we learn of the very large skeleton in the Byron family’s closet that may explain some of the mother’s behavior.  Ada Lovelace’s childhood was far different from that of most aristocratic young women in the mid-1800s. Determined that her daughter not be influenced by her literary rockstar father’s promiscuous lifestyle and moody temperament, Lady Byron forbad Ada from reading poetry, allowing her instead to be tutored strictly in mathematics and science. Believing it would help her develop the self-control needed for deep analytic thought, Lady Byron would force young Ada to lie still for hours at a time. For a woman of her time, though, Ada had more freedom than many others, being from a wealthy, aristocratic family and the daughter of the era’s most famous poet.  She was able to pursue her passion for mathematics and did produce an original invention. In 1842, Babbage asked Lovelace to translate from French into English a scholarly article on his calculating machine written by Italian military engineer Luigi Menabrea. Ada not only translated the article, but she also supplemented it with an elaborate analytical section she simply titled “Notes,” comprised of Note A to Note G. Lovelace’s seven notes, now revered as a milestone in the history of computers, contained what many consider to have been the first computer program—a structured set of instructions to be carried out by a machine. In her Note G, Lovelace describes an algorithm that would instruct Babbage’s Analytical Engine to accurately compute Bernoulli numbers. Today it is considered to have been the first algorithm specifically created to be implemented on a computer, and the reason Lovelace is often called the first computer programmer. Since Babbage never completed his Analytical Engine, Lovelace’s program was never tested. However, her process for having a machine repeat a series of instructions, called “looping,” remains a staple of computer programming today. I wouldn’t say Enchantress of Numbers was a fabulous read, but I did finish the book.  It is satisfying that Lovelace’s contribution to science is recognized. One thought on “Ada Lovelace, Mathematician Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s