text
stringlengths 144
682k
|
---|
Sand Dunes can Sing
Sand on a dune possesses energy in the form of gravitational potential energy. The greater the height of the sand dune, the more gravitational potential energy the sand on top has. When the sand on top of a steep dune is disturbed, it slides down the slope, and gravitational potential energy is transformed into kinetic energy. It is this kinetic energy of the falling sand that produces the booming sound. As the sand particles bounce against each other, some of their kinetic energy is transformed into acoustic energy — or sound, waves of vibrations transmitted through a medium.
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
|
The Significance of Sound
Media texts historically, have often incorporated other media texts within themselves, therefore redefining their meaning. Books for example, have always benefited from illustrations and photographs to help convey a meaning, whilst the internet (more obviously), has swiftly been transformed into a haven for multimedia. Since its conception, film has incorporated music, and later foley and effects, (all of which can be classified as a media type in their own right). These elements, mixed in with the dialogue, come to form the soundtrack of the film, the laborious product of a sound design, sometimes as elaborate as the parent media text itself.
As significant advancement in visual technology was made, audio technology improved on par. Many of the improvements to movie soundtracks are rooted in, and were driven by industries that produce audio-only media texts, such as the Radio and Recording Industries. A few key examples spanning almost entirely across the twentieth century, are the invention of magnetic tape recordings (1930s), the shift from monophonic to stereophonic sound (1930s) followed by a later shift towards Quadraphonic Sound (late 1960s) and then 5.1 surround sound (1980s), the digitisation of analogue audio (mid-20th century), followed shortly thereafter by the invention of the first modern, and commercially available synthesizer (1965). Some advances were purely scientific by nature, such as that of the Theremin (1928), and yet managed to significantly influence the stylisation of film soundtracks.
This technological revolution in the world of audio evoked new styles and practices in the production of soundscapes. When synchronised images and audio, for example, became the standard in cinematic production, it introduced the use of dialogue to help define the media text. One such step that has vastly influenced the way a soundtrack is put together, is the introduction of multi-track audio recorders. The ability to practically layer audio tracks, later to be mixed down to a final master stereo or surround track, revolutionised the way soundscapes were designed. The way that foley, effects, and music now gave moving pictures new meaning was dynamic and exciting. Sounds would move across a panorama or a given space, to match particular actions; movement was now perceived by an audience both visually and aurally, therefore making the viewing experience that much richer.
As synth technology evolved, the stylisation of movie soundscapes shifted towards using synthetic sounds, effects and music. One of the most renowned pioneers to embrace such possibilities was none other than Sir Alfred Hitchcock. In 1945 he directed a self-penned movie entitled “Spellbound”, in which Dr. Samuel Hoffmann was commissioned to lay an audio track using the Theremin device. In 1963’s “The Birds”, Hitchcock again revlutionised soundscape stylisation by altogether foregoing the classic accompanying score in favour of source music (or diegetic sound), and by using effects created by the synthesizer’s direct predecessor, the Mixtur Trautonium.
Synthesizers did not only influence the moving pictures industry, it was also responsible for significant cultural reform evident in popular music of the time. The influx of music being produced by means of such technology soon filtered its way through mainstream audiences, and thus became an accepted and valued art form. The movie industry in turn, governed by audience research and demographics, instinctively needs to embrace youth culture, modern trends, and popular music in its quest to remain current, relevant, and profitable, particularly during such displacements in popular culture. The early Hitchcock features already mentioned paved the way, and later, important works such as Stanley Kubrick’s “A Clockwork Orange” (1971) and Oliver Stone’s “Midnight Express” (1978) further highlighted a departure from traditional orchestral music scores.
During the mid to late Seventies, “Disco” music took the world by storm. Hollywood was quick to capitalise with releases such as “Mahogany” (1975), “Car Wash” (1976) and “Saturday Night Fever” (1977). The soundtracks to these movies all brought a special meaning, fixed at a particular point in popular culture, and with it, box office success. Unsurprisingly, the theme music for all three movies generated number one singles and renewed careers for singers such as Diana Ross, Rose Royce, and The Bee Gees with the iconic Staying Alive, which to date remains synonymous with the movie “Saturday Night Fever”.
Popular music (of all genres) was by now well intertwined with cinematography for the masses. But things changed when George Lucas released “Star Wars” in 1977. His vision brought about an interesting merger of pioneering visual technology with a more traditional sound design, comprised of organic sound effects and traditional orchestral score. Lucas commissioned John Williams to compose the original score and to conduct the London Symphony Orchestra during the recordings, and sound designer Ben Burtt to create foley and effects by editing and processing organic sounds. Star Wars made movie history and went on to win six Oscars, one of which was for the Best Original Score, another for the Best Sound, and another for a Special Achievement for Sound Effects Editing.
The relationship between sound and moving pictures had come full circle, and Lucas changed how filmmakers and sound designers would approach audio production forever. At this point, the concepts of traditional and modern soundscapes flourished hand in hand, and after all the technological development and experimentation in stylisation, choices would once again be based on project overview rather than on demographics. Now, on to the music itself.
It could be argued that much of the stylistic progression that came about throughout the latter part of the twentieth century could have passed by unperceived by mainstream audiences. Since most audiences (to some extent) direct popular culture and trends through their purchasing power and media consumption, they could have perceived the shifts in style as a natural progression rather than as changes inspired by technological development; simply put – they remain so engulfed in the experience of popular culture that they might not perceive the industry behind it. Irrespective of this, there was always the same basic understanding of music, whether traditionally scored and orchestrated or electronically synthesized.
Even during the days of silent movies, music has been adding new meaning to film. During those early screenings, musicians would play the score supplied with the film, further enhancing the sentiment portrayed by actors and filmmakers. This was true for screenings aimed at the higher class where a small orchestra could be afforded to provide the music, as well as for those held in lower class establishments, where only a pianist (and a violinist at times) could be employed. Yet in both scenarios, the musicians present successfully portrayed the same intended and wide ranging sentiments.
Audience perception has generally, over the years relied on associations and familiarity acquired through repetitive use of signifiers, stereotypes, and other templates. It is for this very reason that composers can draw on pre-established techniques to empower musicians, in whatever numbers, to meaningfully convey the exact same emotion. These musical connotations have been forged through years of composition, long before music’s affiliation with the movies, which is why they were immediately applicable.
Lalo Schifrin has been composing music for movies since 1957. His illustrious career has earned him four Grammy Awards, honoured with countless nominations (including six for an Oscar), presented with his own star in the Hollywood Walk of Fame, and more. He has composed an impressive body of work, including some very famous film scores such as Mission Impossible, Dirty Harry, and Amityville Horror. In his book ‘Music Composition for Film and Television’, (2011) Schifrin reveals the very essence of how composers convey sentiment through their music.
These connotations are not simply implied by one magical formula, but by the correct combination and application of multiple techniques combined. By playing a melody in a specific mode or scale, the composer can immediately draw from a lexicon of very basic, but well-established associations. One can refer to happy and jovial emotions by use of the major modes (appendix 1), or re-affirm a sad melancholic state of mind by switching to its minor counterpart (appendix 2). Furthermore, there are other modes which can be drawn upon to invoke a sense of hope, affirmation, or adventure (appendix 3). Intervals also bring meaning to music in the same way, since they are intrinsically intertwined in definition with modes, i.e. the nature (major or minor) of the interval or double stop, is ultimately governed by the mode the piece is in.
The subtleties conveyed by the use of modes, scales and intervals could be further enhanced by the choice of instruments (or synth sounds). The piercing characteristics of trumpets, trombones, and clarinets can easily depict crisp rhythmic effects and melodies. Warmer sounds generally associated with more swell (or amplitude), like a French horn, tuba, or bassoon, are typically used for layering. One can similarly emphasise different moods, by clever use of phrasing. Broken up and unpredictable rhythms can bring an element of excitement and suspense to a scene (appendix 4). On the other hand, repetitive and predictable rhythmic phrasing can induce a sense of inevitability (appendix 5).
Finally, parallel motion is often used to musically interpret a subject moving up or down on screen, e.g. a fast ascending scale on a xylophone as a cartoon runs up the stairs. Contrary motion is not exactly the complete opposite in terms of pitch, but more in terms of mood. This is clearly explained by Schifrin (2011) when he describes a very serious western bar brawl, in which the antagonism is sonically generated by the continuous (almost uncharacteristic) honky-tonk piano player.
Throughout all the years of technical and cultural development in the history of movies (as the original media type to include sound and music within itself), a distinct sense of emotion has always been successfully transmitted aurally to the audience subconscious, irrespective of the technology applied, the working practices invoked, or even the popular culture at the time of production. Since the first silent movies, and up until present day, music has consistently featured in soundtracks. Irrespective of its own transformations, cultural or technological, music has since before the movie industry, successfully portrayed such meanings as those already discussed. It is therefore logical to conclude that technology, and practices have only enhanced the delivery of audio media within other texts, but the basic connotations and associations must be routed deep within our popular culture, ever since the earliest days of musical composition.
Christian Gadd (1713 words).
Semester 1 (September – December 2013) : Language and Image.
Appendix 1
Theme music to “The Never Ending Story” written by Giorgio Moroder and Keith Forsey, performed by Limahl.
Appendix 2
Theme music to “The Godfather” written by Nino Rota, conducted by Carlo Savina.
Appendix 3
Theme music to “Raiders of the Lost Ark” written and conducted by John Williams.
Theme music to “Back to the Future” written and conducted by Alan Silvestri.
Appendix 4
Theme music to “Eyes Wide Shut” written and performed György Ligeti.
Appendix 5
Theme music to “The Exorcist” written and performed Mike Oldfield.
Schifrin, L (2011), Music Composition for Film and Television, Boston: Berklee. Available from…
[Accessed 1st December 2013]
About Christian Gadd
Christian Gadd
This entry was posted in Coursework and tagged , , , , , , , , , , . Bookmark the permalink.
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
|
UML Composition vs Aggregation vs Association
What makes a UML Composition different from an Aggregation or a regular Association?
The concepts of Association, Aggregation and Composition exist in UML since the first published versions, but the exact meaning of these concepts, especially the Aggregation still leads to heated debates among UML experts.
But before we go into the details, let’s have a look at how these concepts are defined in UML. I guess every UML user is familiar with the graphical notation, but how do these concepts look like in the UML (v 2.5) meta model?
UML 2.5 Associations Meta Model
This is a the part of the UML meta model that defines Association. (I’ve hidden the elements not relevant to the subject for clarity)
The three possible values for AggregationKind are defined in the UML specifications as follows:
• none
Indicates that the Property has no aggregation.
• shared
Indicates that the Property has a shared aggregation.
• composite
But a bit further, in the semantics section of Properties we find the same explanation except for a small addendum
• shared
[…] Precise semantics of shared aggregation varies by application area and modeler.
Only binary associations can be aggregations.
memberEnd->exists(aggregation <> AggregationKind::none) implies (memberEnd->size() = 2 and memberEnd->exists(aggregation = AggregationKind::none))
And the second part of the OCL constraint tells us that only one of the two ends can play the whole part, so the other end must play the part part.
Looking further in the specs we find in the semantics section of the Property the following
So that paragraph already tells us a little bit more about the nature of the Composition. Let’s dissect this paragraph and figure out what to remember
• that requires a part object be included in at most one composite
object at a time
So a part cannot play the role of part in two compositions at the same time. This implies that the multiplicity of a composite association can only be [0..1] or [1..1] on the composite end.
This is one of the parts where v 2.5 is different from previous versions. Previous versions of the UML specifications had the phrase “are normally deleted with it”. By leaving the “normally” out there no more ambiguity. Deleting the whole will always result in deleting the part in a composition.
But there still a loophole for the delete story.
So before the whole is deleted we can remove the part to avoid having to delete the part as well.
And then there a last paragraph that deals with Compositions
Compositions may be linked in a directed acyclic graph with transitive deletion characteristics; that is, deleting an object in one part of the graph will also result in the deletion of all objects of the subgraph below that object. The precise lifecycle semantics of composite aggregation is intentionally not specified. The order and way in which composed objects are created is intentionally not defined. The semantics of composite aggregation when the container or part is typed by a DataType are intentionally not specified.
• […]are intentionally not specified
This is simply sad… These few sentences basically tell us again nothing at all, except that we shouldn’t look for a specification of these aspects in the UML specifications.
c) the “parts” should be deleted when the “whole” is deleted (except when we move them to another “whole” first)
The relation between Group and User however is an Aggregation because
c) a User should not be deleted when a Group is deleted.
To summarize
|
Seven Wonders of the Ancient World
From Infogalactic: the planetary knowledge core
Jump to: navigation, search
File:Ancient seven wonders timeline.svg
Instead of "wonders", the ancient Greeks spoke of "theamata" (θεάματα), which means "sights", in other words "things to be seen" (Τὰ ἑπτὰ θεάματα τῆς οἰκουμένης [γῆς] Tà heptà theámata tēs oikoumenēs [gēs]). Later, the word for "wonder" ("thaumata" θαύματα, "wonders") was used.[4] Hence, the list was meant to be the Ancient World's counterpart of a travel guidebook.[1]
The first reference to a list of seven such monuments was given by Diodorus Siculus.[5][6] The epigrammist Antipater of Sidon[7] who lived around or before 100 BC,[8] gave a list of seven such monuments, including six of the present list (substituting the walls of Babylon for the lighthouse):[9]
Earlier and later lists by the historian Herodotus (484 BC–ca. 425 BC) and the architect Callimachus of Cyrene (ca. 305–240 BC), housed at the Museum of Alexandria, survived only as references.
Name Date of construction Builders Date of destruction Cause of destruction Modern location
Great Pyramid of Giza 2584–2561 BC Egyptians Still in existence, majority of façade gone Giza Necropolis, Egypt
29°58′45.03″N 31°08′03.69″E / 29.9791750°N 31.1343583°E / 29.9791750; 31.1343583 (Great Pyramid of Giza)
Hanging Gardens of Babylon
(existence unresolved)[11]
c. 600 BC (evident) Babylonians or Assyrians After 1st century AD Unknown Hillah or Nineveh, Iraq
32°32′08″N 44°25′39″E / 32.5355°N 44.4275°E / 32.5355; 44.4275 (Hanging Gardens of Babylon)
Temple of Artemis at Ephesus c. 550 BC; and again at 323 BC Greeks, Lydians 356 BC (by Herostratus)
AD 262 (by the Goths)
Arson by Herostratus, plundering Near Selçuk, Turkey
37°56′59″N 27°21′50″E / 37.94972°N 27.36389°E / 37.94972; 27.36389 (Temple of Artemis at Ephesus)
Statue of Zeus at Olympia 466–456 BC (temple)
435 BC (statue)
Greeks 5th–6th centuries AD Disassembled and reassembled at Constantinople; later destroyed by fire Olympia, Greece
37°38′16.3″N 21°37′48″E / 37.637861°N 21.63000°E / 37.637861; 21.63000 (Statue of Zeus at Olympia)
Mausoleum at Halicarnassus 351 BC Greeks,[12][13] Persians, Carians 12th–15th century AD Earthquakes Bodrum, Turkey
37°02′16″N 27°25′27″E / 37.0379°N 27.4241°E / 37.0379; 27.4241 (Mausoleum at Halicarnassus)
Colossus of Rhodes 292–280 BC Greeks 226 BC 226 BC Rhodes earthquake Rhodes, Greece
36°27′04″N 28°13′40″E / 36.45111°N 28.22778°E / 36.45111; 28.22778 (Colossus of Rhodes)
Lighthouse of Alexandria c. 280 BC Greeks, Ptolemaic Egyptians AD 1303–1480 1303 Crete earthquake Alexandria, Egypt
31°12′50″N 29°53′08″E / 31.21389°N 29.88556°E / 31.21389; 29.88556 (Lighthouse of Alexandria)
A map showing the location of the seven wonders of the ancient world.
Arts and architecture
The Greek influence in Roman culture, and the revival of Greco-Roman artistic styles during the Renaissance caught the imagination of European artists and travellers.[15] Paintings and sculptures alluding to Antipater's list were made, while adventurers flocked to the actual sites to personally witness the wonders. Legends circulated to further complement the superlatives of the wonders.
Modern lists
Of Antipater's wonders, the only one that has survived to the present day is the Great Pyramid of Giza. Its brilliant white stone facing had survived intact until around 1300 AD, when local communities removed most of the stonework for building materials. The existence of the Hanging Gardens has not been proven, although theories abound.[16] Records and archaeology confirm the existence of the other five wonders. The Temple of Artemis and the Statue of Zeus were destroyed by fire, while the Lighthouse of Alexandria, Colossus, and tomb of Mausolus were destroyed by earthquakes. Among the artifacts to have survived are sculptures from the tomb of Mausolus and the Temple of Artemis in the British Museum in London.
Still, the listing of seven of the most marvellous architectural and artistic human achievements continued beyond the Ancient Greek times to the Roman Empire, the Middle Ages, the Renaissance and to the modern age. The Roman poet Martial and the Christian bishop Gregory of Tours had their versions.[1] Reflecting the rise of Christianity and the factor of time, nature and the hand of man overcoming Antipater's seven wonders, Roman and Christian sites began to figure on the list, including the Colosseum, Noah's Ark and Solomon's Temple.[1][3] In the 6th century, a list of seven wonders was compiled by St. Gregory of Tours: the list[17] included the Temple of Solomon, the Pharos of Alexandria and Noah's Ark.
Modern historians, working on the premise that the original Seven Ancient Wonders List was limited in its geographic scope, also had their versions to encompass sites beyond the Hellenistic realm—from the Seven Wonders of the Ancient World to the Seven Wonders of the World. Indeed, the "seven wonders" label has spawned innumerable versions among international organizations, publications and individuals based on different themes—works of nature, engineering masterpieces, constructions of the Middle Ages, etc. Its purpose has also changed from just a simple travel guidebook or a compendium of curious places, to lists of sites to defend or to preserve.
See also
1. 1.0 1.1 1.2 1.3 1.4 "The Seven Wonders of the Ancient World". Retrieved 2009-09-14.
2. "History of the Past: World History".
3. 3.0 3.1 3.2 Paul Lunde (May–June 1980). "The Seven Wonders". Saudi Aramco World. Retrieved 2009-09-12.
5. Diodorus Siculus. Bibliotheca Historica, Books I-V. 2.11.5: Perseus Project, Tufts University.
7. Greek Anthology, Volume III. Book 9, chapter 58: Perseus Project, Tufts University.
8. Biographical Dictionary Volume III. Society for the Diffusion of Useful Knowledge. p. 48. Retrieved 25 November 2016.
14. "Panorama with the Abduction of Helen Amidst the Wonders of the Ancient World". The Walters Art Museum.
15. "Wonders of Europe". Retrieved 2009-09-14.
17. Clayton, Peter and Price, Martin: The Seven Wonders of the Ancient World (Routledge, 1988), pp. 162–163.
Further reading
External links
|
Dear Parents,
You may be hearing about Zika virus in the news. This letter provides basic facts about Zika, including where you can find more information, alerts and warnings.
Learn about Zika virus.
• People usually get Zika through a mosquito bite—but not a bite from any mosquito.
• Zika is affecting parts of Central and South America, Mexico, the Caribbean and other places listed by the Centers for Disease Control and Prevention (CDC). The type of mosquito linked to the current outbreak, called Aedes aegypti, lives in these places. Find the latest Zika-affected locations at
The most common symptoms are fever, rash, joint pain and conjunctivitis (red eyes). Most people have mild symptoms and do not need to go to a hospital.
It is rare but possible for Zika to spread from one person to another through sexual contact and blood. Zika is not spread from person to person by casual contact.
There is no Zika vaccine.
If you’re pregnant, the U.S. Centers for Disease Control and Prevention (CDC) strongly recommends that you postpone travel to a Zika-affected area until health experts say it’s safe.
Zika is not dangerous for most people. However, Zika can cause birth defects.
If it’s not possible to delay travel, talk to a health care provider first. The type of mosquito linked to the current outbreak is very aggressive. The mosquito bites during the day and early evening. Use insect repellents approved by the EPA, and follow the directions on the label. Apply sunscreen first, then repellent. Insect repellent is safe for pregnant women. Wear long sleeves and pants. Wear clothing treated with permethrin (a chemical that repels insects). Use a mosquito bed net if you cannot keep mosquitoes out of your residence.
If you are pregnant and did travel to an area affected by Zika, contact your health care provider to discuss Zika testing.
Find more warnings for pregnant women at and
Help prevent mosquitoes in New York City.
Zika is not spreading in New York City, but local mosquitoes can spread other diseases, like West Nile virus. New Yorkers can help stop the spread of mosquito-borne viruses by following these steps:
Apply insect repellents and wear long sleeves or pants in the evening during mosquito season (June through September).
• Install or repair screens on windows and doors.
• Make sure backyard pools are properly maintained and chlorinated.
• Report standing water to 311.
Visit for the latest Zika information and alerts for New Yorkers. Sincerely,
Carmen Fariña Chancellor
Department of Education
Mary T. Bassett, MD, MPH
Department of Health and Mental Hygiene
|
What is a burpee?
By Mike Kwong, PTA, CSCS
Ever overhear a personal trainer at a gym tell his/her client to perform 10 burpees as a part of their training program? Do you have a kid in team sports moan about the amount of burpees that his/her coach made them do during practice? Have you ever wondered what a “burpee” actually is? It sounds like a cross between a 7-11 Slurpee and the noise you make after drinking it! So, what is this infamous burpee that people are talking about?
The Burpee, also known as a squat thrust, is a full body exercise used in strength training and as aerobic exercise. It is performed in the following steps:
1. Begin in a standing position.
5. Return to standing position. (count 4)
A Brief History of The Famous Mr. Burpee
According to the Oxford English Dictionary, the exercise was named in the 1930’s for American physiologist Royal H. Burpee, who developed the Burpee Test. He earned a PhD in Applied Physiology from Columbia University in 1940 and created the “Burpee” exercise as part of his PhD thesis as a quick and simple way to assess fitness. The exercise was popularized when US Armed Services adopted it as a way to assess the fitness level of recruits when the US entered WWII. Consisting of a series of the exercises performed in rapid succession, the test was meant to be a quick measure of agility, coordination and strength.
There are several variants to the traditional burpee, with the more popular ones adding a push up, jump, or pull up to the exercise. Here are a few:
1. Burpee push up: the athlete adds a push up after assuming the plank position
2. Jump up Burpee: the athlete jumps up as high as they can at the end of the movement and before they start their next burpee
3. Long-jump Burpee: the athlete jumps forward, not upward
4. Jump-over Burpee: the athlete jumps over an obstacle between burpees
5. Pull-up Burpee: the athlete combines a pull-up with the jump or performs the pull-up instead of the jump
6. Double Burpee: instead of 1 push up, do 2 in a row. This cancels the drive from landing after the jump and makes the next jump harder. Each part of the burpee may be repeated to make it harder.
7. Side Burpee: The athlete bends at waist and places hands shoulder-width apart to the side of right or left foot. Jump both legs back and diagonally to the right. Jump back in, jump up, and repeat. jumping back and to the left side.
Here at CPMC’s Physical Therapy and Sports Wellness Clinic, we use the burpee (and variations of it) as one of our exercises in our Total Body Fitness classes. Recently, we have been holding our own fitness challenge: how many can you do in 30 seconds? The results have been amazing! Come try it out for yourself!
Sports Wellness Center
Physical Therapy Clinic – Pacific Campus
2360 Clay Street, San Francisco, CA 94115
Leave a Reply
WordPress.com Logo
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
|
Beyond Discipline EDSEC 310-A
Chapter 1 The Nature of Children
"What do they require in order to flourish? And how can we provide those things?--- As opposed to, say, How can we make them do what we want?"
1. Control VS. Support
2. Labeling Theory or a self-fulfilling prophecy
Chapter 2 Blaming the Kids
"It is deeply unsettling for educators to have to reconsider their requests and demands, their expectations and rules."
1. What are we asking?
2. Is it reasonable?
Chapter 3 Bribes and Threats
1. Coercion, Objects VS. Subjects
2. Punishment, "Thus, we incarcerate students but describe it as "detention." We exiled them from the community and refer to it as "suspension." We forcibly isolate small children and call it by the almost Orwellian name "time out.""
3. Compliance, Might makes right/ Power struggle
4. Rewards, "Rewards work very well to get one thing, and that thing is temporary compliance"
Work cited;
Kohn, A., & Etc, A. K. (2006). Beyond discipline: From compliance to community (10th ed.). Alexandria, VA: Association for Supervision and Curriculum Development.
Created with images by Fitze - "half moon sky blue" • zimpenfish - "Children" • Lotzman Katzman - "Yummy !" • plusgood - "Ice cream bribe."
Made with Adobe Slate
Make your words and images move.
Get Slate
Report Abuse
|
jump to navigation
The Telangana blunder – Meghnad Desai అక్టోబర్ 14, 2013
Tags: , , , , ,
The Telangana blunder
Meghnad Desai, The Indian Express, Oct 13 2013
This is how we began 60 years ago. It was the fast by Potti Sreeramulu which precipitated the creation of Andhra, the first linguistic state. He did something that most people who go on a fast usually take care to avoid. He died. Pandit Nehru was against the creation of linguistic states despite it being the Congress party’s policy, as he feared Balkanisation. He had to concede. A commission was appointed to consider reorganisation of states and reported.
Nehru may have ‘discovered’ India but he did not fully appreciate its diversity. His was a centralist vision of India being a single entity. What he had to concede was that Indians saw themselves simultaneously as Indians and Punjabis or Tamils or Malayalis, among others. They saw no conflict between the two. Unlike China, which has been a single entity throughout its history, India became so only during the late 19th century. Then nationalists projected that single vision backward into history.
India has forever been a multi-national polity. Thus far ‘local’ nations have been defined mainly by language. Only in the case of Khalistan was there an attempt to combine language, religion and territory to forge a secessionist movement. That was quite rightly squashed at enormous personal cost by Indira Gandhi. Rajiv Gandhi was relaxed creating new states in the North-East and the BJP, which used to be Unitarian, has also been easy about creating new states.
Telangana, however, is an anomaly. There is no linguistic separation between it and the rest of Andhra. Its sense of ‘nationhood’ is built on history since it was part of the old Hyderabad state. That is another strand in the creation of India since British Indian provinces had to be merged with native states to make up India. But if Telangana is granted, where would we stop? Rajasthan can be divided all over again in previously held princely territories. Uttar Pradesh would have to concede Awadh as a separate state. There were 600 ‘princely states’ which were merged to make India thanks to Sardar Patel. Is there a plan to open Pandora’s box again?
This way lies folly and much disruption. It is urgent that the Telangana muddle is solved. Why not create a MahaAndhra with three separate autonomous ‘regions/ states’ — Telangana, Rayalaseema and Seemandhra, with a single capital? Look at Belgium for the way such a solution would work. Belgium has defined itself as a nation with two languages — Flemish and French, and three regions, Flanders, Wallony and Brussels. They hold separate legislative sessions for their local issues and get together for national issues. This is the way forward for Maha Andhra.
Source: http://www.indianexpress.com/news/The-Telangana-blunder/1181867/
No comments yet — be the first.
వర్డ్ప్రెస్.కామ్ లోగో
You are commenting using your WordPress.com account. నిష్క్రమించు / మార్చు )
ట్విటర్ చిత్రం
You are commenting using your Twitter account. నిష్క్రమించు / మార్చు )
ఫేస్బుక్ చిత్రం
You are commenting using your Facebook account. నిష్క్రమించు / మార్చు )
గూగుల్+ చిత్రం
Connecting to %s
%d bloggers like this:
|
What is Ayurveda?
Ayurveda is an ancient Indian medicinal practice comprising a range of treatments including herbs, dietary changes, meditation, massage and yoga, to maintain or restore health.
The word Ayurveda comes from Sanskrit and means "science (or knowledge) of life." It is possibly the oldest system of health care continuously practiced in the world, (the tradition has been passed down from master to disciple in India for more than 5000 years).
Ayurveda is based on the belief that health is the result of harmony between mind, body and spirit. Practitioners of Ayurveda in India receive training recognized worldwide. While modern medical science has never validated the principles of Ayurvedic medicine and only a few rigorous studies can certify their effect on specific diseases, it is believed that certain practices like yoga, increase strength and vitality. In addition, currently being studied are many Ayurvedic herbal preparations, based upon their apparent therapeutic effects.
Ayurveda, the "science of life", is the traditional medicine, and natural healing system of India and its cultural sphere. This is probably the oldest healing system in the world. Its roots come from the Vedic era, more than 5,000 years ago. No wonder it has been called "The Mother of All Cures". Ayurveda is one of the most comprehensive healing systems in the world, working completeley with the body, mind and spirit. It is related to a deep yogic vision of life and consciousness. There are indications that much of Ayurvedic practice has lead to the basis of modern western medicine.
Ayurveda in History
Throughout history Ayurveda has had a strong influence in many systems of medicine, from ancient Greece in the west to Traditional Chinese Medicine in the east. Herbs and Ayurvedic formulas appear in Traditional Chinese Medicine also Ayurveda also has a form of acupuncture. Ayurveda is the foundation of Tibetan medicine, which may have travelled along with buddhism from india. Tibetan Medicine/Ayurveda influenced Chinese Medicine, as well as Ayurveda in Nepal, Sri Lanka and Burma, and parts of Thailand.
|
Dismiss Notice
Join Physics Forums Today!
Need Help Solving These
1. Nov 1, 2006 #1
I have these four questions I'm having trouble solving...
Could anyone write the solutions, but with steps on how they did it so I can possibly learn! Thanks a lot
I'm pretty sure they use the binomial or poisson distribution formulas... can't get proper answers
1. In a large shipment of chips, 5% are defective. What is the probability that exactly two out of a sample of ten are defective?
2. On average, a system breaks down every 50hrs. Find the probability of more than two break-downs in a 24hr period.
3. Show that there are more families of 6 children split 4-2 than those with 3 boys and 3 girls.
4. People arrive at a bank at the rate of 60 per hour. Find the chance of getting 0,1,2 or 3 in the next minute.
2. jcsd
3. Nov 2, 2006 #2
User Avatar
Staff Emeritus
Science Advisor
You learn by doing things yourself. (1) is a "binomial distribution" problem, (2) and (4) are Poisson distribution, and (3) is just a matter of calculating the number of combinations.
Similar Discussions: Need Help Solving These
1. Need help (Replies: 3)
|
Monday, August 24, 2009
Lost Teeth Impact Total Health
In the past, the loss of teeth was dismissed as a natural part of the aging process, and dentures were considered a normal sign of old age.
While such ignorance is rapidly becoming a thing of the past, there is still not a general awareness of the seriousness of edentulism (the condition of being completely toothless). Multiple tooth loss is most commonly caused by peridontal disease, i.e.. gum and bone disease. Periodontal disease has a high statistical correlation with chronic debilitating disease, such as diabetes, cardiovascular disease and arthritis.
So it is not very surprising that studies now show a shortened life expectancy by as much as 10 years for persons who have lost their natural teeth, when compared to those who have kept their teeth.
In addition to longevity, quality-of-life differences are just as significant. The functional efficiency of dentures has been measured to be only 20% of that of natural teeth. Can there be any doubt that nutritional deficiencies will be much more prevalent in those without their natural teeth?
Loss of teeth often causes a feeling of loss of wholeness and a sense of deterioration and aging. Given these factors, preservation of the natural teeth is integral to whole-person wellness.
If you have questions regarding how dental health affects your total well-being, please call our office at (949)364-3724 or email us at today.
Best Regards,
Dr. Makhoul
|
Find this Story
Print, a form you can hold
Wireless download to your Amazon Kindle
Look for a summary or analysis of this Poem.
Enjoy this? Share it!
The Morning Comes Before The Sun
by [?]
Slow buds the pink dawn like a rose
From out night’s gray and cloudy sheath;
Softly and still it grows and grows,
Petal by petal, leaf by leaf;
Each sleep-imprisoned creature breaks
Its dreamy fetters, one by one,
And love awakes, and labor wakes,–
The morning comes before the sun.
What is this message from the light
So fairer far than light can be?
Youth stands a-tiptoe, eager, bright,
In haste the risen sun to see;
Ah! check thy lunging, restless heart,
Count the charmed moments as they run,
It is life’s best and fairest part,
This morning hour before the sun.
When once thy day shall burst to flower,
When once the sun shall climb the sky,
And busy hour by busy hour,
The urgent noontide draws anigh;
When the long shadows creep abreast,
To dim the happy task half done,
Thou wilt recall this pause of rest,
This morning hush before the sun.
To each, one dawning and one dew,
One fresh young hour is given by fate,
One rose flush on the early blue.
Be not impatient then, but wait!
Clasp the sweet peace on earth and sky,
By midnight angels woven and spun;
Better than day its prophecy,–
The morning comes before the sun.
|
Wednesday, January 22, 2014
WW - Planning a Paper
Last week I said I wanted to talk about paper-writing, so let's dive right in. I'll put the rest of the post under the cut so I don't clutter up the main page with teacher-y stuff.
My brother is quite a good writer, but he tends to get stuck when he's beginning an essay. It's overwhelming, sometimes, to know where to start when staring at a blank page. I've come up with a kick-starting strategy that works for him, and that's what I'll share today.
- Start with the prompt. It doesn't matter the specifics of the prompt, the information you include in your paper will be, essentially, the same. The last paper I worked was about Shakespeare's Henry V. The prompt was: Discuss King Henry. Open-ended prompts can be tricky because you have no guidance; it's all on you. Don't let that be a deterrent right at the start. This paper was a character study, and in any character study, you have to compare and contrast the facets of said character. I knew going in that, whichever way the paper leaned, Henry would be discussed as a man, a military leader, a king, a son, a politician, even a friend. So to begin, put the prompt on the back burner and set about the business of getting to know Henry really well.
- To help my brother, I started an outline. Together, we went through every act and scene in the play, and I jotted short notes about what Henry did and said in each scene. Tedious, yes, but it cuts through the formality of Shakespeare's flowery speech and gets down to brass tacks. One thing to keep in mind about Shakespeare: his characters lie to themselves and others, so it's important to look at their actions, not just their words.
- With this outline, we went through and labeled our bullet points, noting the way Henry's words in one scene would contradict his speech of the next scene. Some moments were selfless, others very selfish. He vacillated between being truly noble and being nothing but practical. We had "noble moments" and "real moments" color-coded. Very quickly, the character takes shape as one who is conflicted, and dynamic, and pragmatic. He's a complex dude, Henry, and we began taking more notes to that effect, framing out rough sentences, building our case. I say do this with every character study. You create a list of attributes by classifying a character's actions. And this also gives you a possible thesis. Henry could be argued as a conflicted figure, with dueling natures, or one who is totally pragmatic and changes his behavior on purpose to suit his cause. Either case could be argued. Boom - thesis.
- Next, my brother picked out all the things other characters said about Henry. It's important to understand how the other characters feel about the subject of your paper. (You could go on for paragraphs about the way Henry is perceived by his people, and how that helps or hurts his cause as their king).
- Pull some meaty quotes straight from the text and add them to your outline as support for Henry's actions, proof that he's done and said what you claim he has.
- Then it's time to start writing. Using your outline, just start writing sentences, and then paragraphs, without worrying about organization. Write any and everything that springs into your mind. Doing this sort of "free writing," fleshing out the framework of your outline and inserting relevant quotes, your thoughts will build one on top of the other and you will, hopefully, find yourself going off on little tangents. Good. Tangent away! Write, write, write, and you can cut, paste, and organize later. The most important thing is to get all your thoughts on paper.
- The more prep work you do up front, the less you will struggle when it comes to meeting word count or page number requirements. This strategy works not just with literature analysis papers, but with research papers and business essays too. Research, research, research: there's no such thing as too much information when you get started. And outlining doesn't have to be an organized process: you list topics you want to touch on, adding, tweaking as you go.
The hardest part is getting started. You have to take a daunting assignment, and break it into manageable bits so it doesn't overwhelm you. Sometimes it helps to journal about the paper topic, or sit with someone and just talk about the assignment, organizing your thoughts in a relaxed, free-form environment. A lot of times, watching a film of the text (you do have to read it first, sorry) gives you a whole new perspective. Seeing and hearing the characters can only deepen your understanding, so long as you keep your paper limited to the text, and don't include possibly-different sequences from the film in your writing.
Next week, I'll talk about polishing it up. That's where you can be a little creative.
1 comment:
1. Where were you when I was writing all those papers in high school & college. You make it sound so easy!
|
Wednesday, January 11, 2017
way back in 1902-03, racing was pretty dangerous and wacky... they didn't have a lot of power, or advancements, but they could drive through walls unscathed
Back in 1902-03, Walter C. Baker built three streamlined electric racing cars. Called “Torpedoes,” these all-but-forgotten electrics should be remembered for four good reasons:
1) They allowed Walter Baker to become the first man in history to break the 100-mph barrier in a motorcar;
2) the Torpedoes’ bodies were remarkably streamlined, decades ahead of anything similar;
3) because Walter Baker regularly crashed his cars, none of his speed marks went into the record books. Even in his own day, he became known as “Bad Luck Baker;” and
4) what probably saved his life in all those crashes were plain, simple shoulder harnesses, an idea again much too modern for the times.
Baker mounted 11 batteries plus a 14-horsepower electric motor behind the seats and ran double chains to the rear axle.
On Memorial Day 1902, May 31, the Automobile Club of America held speed trials on the streets of Staten Island, N.Y. Baker intended the Torpedo to set records that would overwhelm the makers of steam- and piston-powered machines. Rumor had it that the Torpedo was good for 120 mph, which at that time was roughly double the World Land Speed Record.
Baker chose to drive the Torpedo himself. His passenger and brakeman was the company’s chief mechanic and electrician, E.E. Denzer. Baker and Denzer covered the flying kilometer in 16 seconds, running exactly 100 mph, and they were still accelerating when Baker lost control crossing a set of trolley tracks.
His steering went limp and, as Denzer yanked the brake lever, the car left the road and smashed sideways into the crowd. Two spectators were knocked flat but not injured. A third died instantly. The Torpedo spun 180 degrees, then stopped.
Baker and Denzer stepped out unscathed and were immediately arrested for manslaughter. But the police released them just as quickly, because the crowd had crossed protective barricades. Despite the accident, Baker had set a new record for the flying kilometer, albeit unofficially.
Then, in Aug. 1903, Baker entered both Torpedo in a special event for electric cars near Cleveland. A man named Chisholm drove one, started on the pole and was doing fine, until he got sideswiped by a Waverly Electric. Chisholm crashed and knocked down four spectators. No one was badly hurt, but Walter Baker, who’d been driving the second Kid, decided to hang up his goggles and stop running into people.
Looks like Tim has the makings of a book, as he's spent 7 years researching to compile 75 pages of information on the topic of the Baker Electric Torpedo.
He hasn't printed it yet, but you can read it on a Kindle. Yes, I've pointed out to him that people who like old cars like other old fashioned things like hardcopy books. I don't think he's going to actually have any of thousands of book makers actually print some copies of his material into a book though.
I would. Once you've done that, you've created a lasting monument to your efforts of research and will forever after be known as an author.
1. I wrote the only book on the subject.
1. and as soon as it goes to print you actually will have written a book. Until then, you have only completed a file on a computer. Just as a car means something with wheels that can be driven, the word book has a meaning too, and that is a written or printed work consisting of pages glued or sewn together along one side and bound in covers.
I compliment you immensely on having researched and gathered the information to get a book printed! Now, get to printing. A kindle isn't anything more than a useless computer tablet I'm not going to waste money on as I already have a smart phone, a tablet, and a laptop. I'd buy a book if you'd made some.
|
What is Call Money?
Legal Definition
Call money is short-term finance repayable on demand, with a maturity period of one to fourteen days or overnight to fortnight. It is used for inter-bank transactions. The money that is lent for one day in this market is known as "call money" and, if it exceeds one day, is referred to as "notice money."
Commercial banks have to maintain a minimum cash balance known as the cash reserve ratio. Call money is a method by which banks lend to each other to be able to maintain the cash reserve ratio. The interest rate paid on call money is known as the call rate. It is a highly volatile rate that varies from day to day and sometimes even from hour to hour. There is an inverse relationship between call rates and other short-term money market instruments such as certificates of deposit and commercial paper. A rise in call money rates makes other sources of finance, such as commercial paper and certificates of deposit, cheaper in comparison for banks to raise funds from these sources.
In the international market, the term usually refers to the short term financing by banking institutions to brokers for maintaining the margin account. It is different from the term 'loan' as the schedule for the payment of interest and principal is not fixed. Since, the loan can be called at any time, it is riskier than other forms of loans. It helps in meeting liquidity needs at short notice.
-- Wikipedia
Legal Definition
Money lent by a bank or other institution that is repayable on demand.
|
Indiana is a US state, admitted to the United States as the 19th on December 11, 1816. It is located in the Midwestern United States and Great Lakes Region. With 6,483,802 residents, the state is ranked 15th in population and 16th in population density. Indiana is ranked 38th in land area and is the smallest state in the continental US west of the Appalachian Mountains. Its capital and largest city is Indianapolis, the second largest of any state capital and largest state capital east of the Mississippi River.
Before it became a territory, varying cultures of indigenous peoples and historic Native Americans inhabited Indiana for thousands of years. Angel Mounds State Historic Site, one of the best preserved ancient earthwork mound sites in the United States, can be found in Southwestern Indiana near Evansville.
External Links
US States
AlabamaAlaskaArkansasArizonaCaliforniaColoradoConnecticutDelawareFloridaGeorgiaHawaiiIdahoIllinoisIndianaIowaKansasKentuckyLouisianaMaineMarylandMassachusettsMichiganMinnesotaMississippiMissouriMontanaNebraskaNevadaNew HampshireNew JerseyNew MexicoNew YorkNorth CarolinaNorth DakotaOhioOklahomaOregonPennsylvaniaRhode IslandSouth CarolinaSouth DakotaTennesseeTexasUtahVermontVirginiaWashingtonWest VirginiaWisconsinWyoming
|
Wednesday, February 8, 2012
Spain, the Ems Dispatch and the unification of Germany
Ems Dispatch, Bismarck´s edited version, 13th July 1870
What did a telegram have to do with the beginning of the French- Prussian War? What was the role of Spain on that affair? This is the curious story behind the scenes of the process of German unification:
In September 1868 there was a revolution in Spain against Isabella II´s monarchy. This was the so called Glorious Revolution. Politicians and military men from different parties (progressives, democrats and members of the Liberal Union) conspired against Isabella II, there was a military uprising in Cádiz and some days later Isabella II exiled in France. A period of six years of democratic government started (Democratic Sexenio). The leaders of the revolution formed a Provisional Government and called Constituent Cortes. The Cortes wrote a new Constitution in 1869 and they decided that Spain would go on being a monarchy. The Provisional Government commissioned General Juan Prim to look for a new king for Spain. This search for a new king was not only a Spanish affair, because all the European powers wanted to have their say. The main European powers had their favourite candidate and refused the candidates they didn´t like. Here you have three cartoons about the monarch´s search:
Isabella II, her son Alphonse, her brother-in-law, the Duke of Montpensier and a carlist
observing in Paris an advertisement about the search for a king in Spain.
Revista La Flaca, 10th July 1869
Prim, Topete and Serrano selling the Spanish crown at auction
Revista La Flaca, 27th March 1869
Espartero and Montpensier trying to occupy the Spanish throne.
Revista La Flaca, 12th June 1870
These were the main candidates to the Spanish throne:
- Anthony of Orleans, Duke of Montpensier, a French candidate. He was Louis Philippe of Orleans´s son and was married to Luisa Fernanda, Isabella II´s sister. The Germans refused this candidate. He was involved on a duel in 1870, where he killed infant Enrique of Bourbon, and the Cortes rejected his candidacy.
- Ferdinand of Coburg: he was married to Mary II, queen of Portugal. His candidacy was refused by all those who didn´t want an Iberian Union and he refused to be the king of Spain.
- General Baldomero Espartero, Duke of the Victory: he had had an important role in the 1st Carlist War, he had been regent between 1840 and 1843, the president of the governmet during the Progressive Biennium and was one of the most respected figures of the Progressive Party. Espartero refused to become the king of Spain.
- Leopold of Hohenzollern-Sigmaringen: he was the Prussian candidate. The French didn´t like this option.
This last candidacy and the way the French opinion was communicated led to the war that completed the unification of Germany. This is what happened:
Kaiser Wilhem of Prussia was spending some time at Ems Spa and he received the visit of the Count of Benedetti, French ambassador. The French ambassador politely communicated to Kaiser Wilhem that France wouldn´t like that Leopold of Hohenzollern became the king of Spain. Kaiser Wilhem I accepted this decision and sent a dispatch to Bismarck explaining the conversation. But Bismarck decided to manipulate the content of the dispatch and he changed the tone of the French ambassador´s words, sharpening the language and presenting the French position as unacceptable. The Ems Dispatch provoked an increase of tension between France and Prussia and France had no other option than declaring war to Prussia.
Kaiser Wilhem I of Prussia and the Count of Benedetti, walking at Bad Ems, 13th July 1870
All the German States united to fight against France. The French were defeated in the Battle of Sedan, Napoleon III was captured, the 2nd Empire disappeared and the 3rd Republic was proclaimed in France. France lost Alsace and Lorraine and the 2nd German Empire (Reich) was proclaimed in 1871 in the Hall of the Mirrors of the Palace of Versailles. Wilhem I became Emperor of Germany.
And who became king of Spain in the end? Amadeus of Savoy. He was Victor Emmanuel II´s third son. His candidacy didn´t bother any important European country. On the 16th November 1870 the Cortes voted to elect the new king of Spain and Amadeus of Savoy got 191 votes. 60 deputies voted for a Federal Republic, 27 for the Duke of Montpensier, 8 for Espartero, 2 for Alphonse of Bourbon (Isabella II´s son), 2 for a Unitarian Republic, 1 for the Republic, 1 for the Duchess of Montpensier and there were 19 spoiled votes.
Alejandro Torrillas said...
Hi Paqui!
I think it is curious how the succession to the Spanish throne affect indirectly to the war between the German empire and France. Bismarck was very intelligent but as many of the politician he didn't mind about how he will obtain his goals. That's unethical and his action could involved also Spain and more countries. I think Bismarck was so prepotent that he didn't thought carefully about the consequences of his actions.
By see you tomorrow.
Paqui Pérez Fons said...
Hello Alejandro,
You comment has reminded me to the quote you chose of Napoleon: "A leader is a dealer in hope". Bismarck´s objective was to unify all the German States and he believed that this would only happen through war. And yes, he did think of the consequences of war, but for him the unification of Germany was more important than the soldiers who would die at the battlefields. The manipulation of the dispatch was the casus belli he needed to increase tension with France and other wars have also started due to the manipulation of truth: World War 1 and more recently, the invasion of Irak. The USA and the United Kingdom manipulated the information about mass destruction weapons. They said that Irak had biological, chemical and nuclear weapons and this was a lie. I recommend yo to read the post I wrote about Eugene Debs and the speech he pronounced about WW1. He talked about the wars politicians decide and the soldiers and the civil people who suffer wars. Debs was accused of treason and sent to prison. The power of many nations or even nations have been built over many blood and corpses. Is this worth it?
Have a good night.
|
This guy is seriously going to make a bad director.
A play is a form of theater that you perform in front of five hundred people.
William Shakespeare
Playwrights are responsible for writing the plays for the director. William Shakespeare has written many plays, but probably his most famous was Julius Caesar.
Directors yell at actors on the stage when they do the wrong thing and don't follow the script.
When you are a director, we have some tips for you.
Actors are the people who act in the play and get fired by the director. They are usually very good, such as Jim Carey. bbbbb WAKE UP.
Ad blocker interference detected!
|
To play the slideshow requires Flash 8 or higher. Click here to install/upgrade.
During the Age of Discovery methods of navigation developed quickly because of the need of European explorers venturing to the New World discovered by Columbus in 1492. The instruments navigators used varied and included the quadrant, astrolabe, cross staff, hourglass, compass, map or nautical chart, and other devices.
The compass was known to be in China as early as the 3rd century B.C. It was not in use in Europe until about the 12th century and was common by the 15th century. The compass did not have degrees marked on it like present-day compasses. Compasses used in the 15th-16th centuries displayed the 32 points of direction known as a compass rose. The points of direction were usually 11.25 degrees apart, indicating north, north by east, north by northeast, etc. The magnetic compass during the Age of Discovery was typically composed of a magnetized metal needle attached to a compass rose by a brass pin so the needle would swing freely. It was then hung by gimbals, which are concentric mounting rings that allowed the compass to remain relatively level during travel, and it was kept in a wood box. One component of the compass was a piece of magnetic iron ore or lodestone, used to re-magnetize the compass needle as needed. These navigation instruments were magnetic so the needle pointed to magnetic north not true north. Navigators found variations of magnetic north depending on your location. So they had to account for this variation when they traveled to different parts of the world. Christopher Columbus reported the variations of true north and magnetic north during his voyages across the Atlantic Ocean. The compass could be used in all weather, day or night. It was not dependent on clear weather for use like other navigation instruments such as the astrolabe or quadrant.
The quadrant was a celestial navigation tool used to find latitude. It was a quarter panel of wood or brass with degrees marked on the outer edge of the arch, a plumb line, and sight along one edge. The instrument was used to measure the altitude of the star Polaris. The reading was taken where the plumb line intersected the degree on the outer edge of the arch.
Like the quadrant, the astrolabe was used to find latitude. It was a circle made of brass or wood with degrees on the edges and a moveable alidade or sighting arm. It could be used at night to sight in on Polaris to obtain the latitude. If the alidade had a sight with pinholes on either end, it could be used during the day by measuring the sun. The astrolabe was used by holding from the ring at the top and the sight moved until the sun shined through the pinholes. The degree was then read. If used at night, it was held by the ring with one hand, the other hand moved the alidade until it was sighted in on Polaris. Then the degree was read. Sometimes the astrolabe was by a pair of sailors, one to sight and the other to steady the device and take the reading.
The hourglass was the most common means for counting tie at sea. These were usually four-hour size and a half -hour size. The hourglass consists of two glass bulbs place one on top of the other and connected by a narrow tube. One bulb is filled with sand which flows through the tube into the bottom bulb at a given rate. Once the sand fills the bottom bulb, it can be turned over and time started again.
The hourglass was used to measure the day at sea which was divided into six four-hour watches. At the end of the four hours, the glass was turned for a new watch. In conjunction with the four-hour glass, a half-hour glass was also used. At the end on a half-hour, the glass was turned and the bell rang. One of the ship’s boys was usually responsible for watching and taking care of the hourglasses.
Another use of the hourglass was with the log or chip line used to determine the speed of the ship. A piece of wood was attached to a line that had been knotted at regular intervals. From the stern, a mariner would toss the log into the water and let the line flow freely. When he felt the first knot pass through his hands, he shouted a sailor who turned a thirty-second glass or a one-minute glass. The person holding the line would then count out loud the number of knots that passed through his hand in thirty seconds or one minute. A simple math formula was used to determine the nautical miles per hour of the ship. One calculation gives the speed of “one knot or nautical mile” as equal to about 1.151 miles per hour. The speed is also known as “knots” which is a term still used by mariners today.
Other navigation devices that were in use in the 16th century included the cross staff, used to measure a celestial body over the horizon; the back staff used to sight in on the sun; and the traverse board for keeping track of changes in course and speed of the ship (though used in the 16th century, it was more common in the 17th century).
Solve the Problem: Sailing to La Florida click here.
The Astrolabe click here.
To learn more about 16th Century Navigation Tools, click on the links below:
History of Navigation
History of Navigation: Navigation of the American Explorers-15th to 17th Centuries. Penobscot Bay History Online
Osborne, Mary. “Tools Used by Early Explorers.”
Tools of Navigation, The Mariniers Museum
The Log or Chip Line
The Traverse Board
Site Map | Home | Native Americans | Journal | Pioneer Life | Land Boom & Bust | World War ll | Progress | People | Agriculture | Communities | Geography | Maps & Photos | For Teachers | Credits | Disclaimer | Copyright | Links | Timeline E-L |
phone: 561.832.4164 | fax: 561.832.7965 | mail: P.O. Box 4364, W.P.B., FL 33402 | visit: 300 N. Dixie Hwy, W.P.B., FL 33401
© 2009 Historical Society of Palm Beach County | all photos courtesy HSPBC unless otherwise noted
|
Quality Printing
Offset printing has come a long way from when it was first introduced. Since then, so many innovations had been made to make offset printing what it is today. This resource page was made to provide useful information about how offset printing works and to know more about its history, the different printing processes, product benefits, uses, the types of offset presses, and other relevant details.
Out of all the printing processes, offset and digital are the most common. Large companies, however, lean toward using offset presses for commercial printing, because these tend to be more cost-efficient in bulk quantities. The process involves transferring an inked image from a plate to a rubber mat and then onto paper, hence the name offset printing.
Advantages of Digital Printing
·Shorter turnaround.
·Every print is that the same. more accurate counts, less waste and fewer variations, thanks to not having to balance ink and water during press run.
·Cheaper low volume printing. while the unit cost of each piece is also on top of with printing, once setup costs area unit enclosed digital printing provides lower per unit costs for terribly tiny print runs.
·Variable information Printing could be a variety of customizable digital printing. victimization info from a information or external file, text and graphics can be changed on each bit without stopping or fastness down the press. as an example, personalized letters can be written with a unique name and address on every letter. Variable information printing is employed primarily for direct marketing, client relationship development and advertising.
Advantages of Offset
·High image quality.
·Works on a large range of printing surfaces as well as paper, wood, cloth, metal, leather, rough paper and plastic.
·The unit cost goes down because the quantity goes up.
·Quality and cost-effectiveness in high volume jobs. while today’s digital presses ar near the cost/benefit magnitude relation of offset for high quality work, they’re not however able to vie with the amount an offset press can produce.
·Many modern offset presses use computer-to-plate systems as opposed to the older computer-to-film work flows, additional increasing quality.
Print Friendly
|
Wednesday Wonderment – Ep. 30
A day at the beach!
Last week, we looked up to the sky for our source of wonderment in the clouds. This week, it’s time to get our heads out of the clouds and plant our feet firmly in the sand on the beach, as that’s where we’re heading: the Beach.
You might think that beaches are nothing more than simple deposits of sand, where enough erosion has taken place to grind rocks into grains of sand. However, I’m sure that many of you have visited beaches that have varied greatly, ranging from beaches with various colors of sand ranging from bright white to beautiful black and even pink, or beaches with pebbles.
One of the aspects that I enjoy at beaches is that the interaction between land and water creates very interesting patterns, be it in sand or pebbles.
The development of the beach as a popular leisure resort from the mid-19th century was the first manifestation of what is now the global tourist industry. The first seaside resorts were opened in the 18th century for the aristocracy, who began to frequent the seaside as well as the then fashionable spa towns, for recreation and health.
One of the earliest such seaside resorts, was Scarborough in Yorkshire during the 1720s; it had been a fashionable spa town since a stream of acidic water was discovered running from one of the cliffs to the south of the town in the 17th century. The first rolling bathing machines were introduced by 1735.
The opening of the resort in Brighton and its reception of royal patronage from King George IV, extended the seaside as a resort for health and pleasure to the much larger London market, and the beach became a centre for upper-class pleasure and frivolity. This trend was praised and artistically elevated by the new romantic ideal of the picturesque landscape; Jane Austen’s unfinished novel Sanditon is an example of that. Later, Queen Victoria’s long-standing patronage of the Isle of Wight and Ramsgate in Kent ensured that a seaside residence was considered as a highly fashionable possession for those wealthy enough to afford more than one home.
Seaside resorts for the working class
The extension of this form of leisure to the middle and working class began with the development of the railways in the 1840s, which offered cheap and affordable fares to fast growing resort towns. In particular, the completion of a branch line to the small seaside town Blackpool from Poulton led to a sustained economic and demographic boom. A sudden influx of visitors, arriving by rail, provided the motivation for entrepreneurs to build accommodation and create new attractions, leading to more visitors and a rapid cycle of growth throughout the 1850s and 1860s.
The growth was intensified by the practice among the Lancashire cotton mill owners of closing the factories for a week every year to service and repair machinery. These became known as wakes weeks. Each town’s mills would close for a different week, allowing Blackpool to manage a steady and reliable stream of visitors over a prolonged period in the summer. A prominent feature of the resort was the promenade and the pleasure piers, where an eclectic variety of performances vied for the people’s attention. In 1863, the North Pier in Blackpool was completed, rapidly becoming a centre of attraction for elite visitors. Central Pier was completed in 1868, with a theatre and a large open-air dance floor.
Many of the popular beach resorts were equipped with bathing machines, because even the all-covering beachwear of the period was considered immodest. By the end of the century the English coastline had over 100 large resort towns, some with populations exceeding 50,000.
Beach Formation
Beaches are the result of wave action by which waves or currents move sand or other loose sediments of which the beach is made as these particles are held in suspension. Alternatively, sand may be moved by saltation (a bouncing movement of large particles).
Beach materials come from erosion of rocks offshore, as well as from headland erosion and slumping producing deposits of scree. Some of the whitest sand in the world, along Florida’s Emerald Coast, comes from the erosion of quartz in the Appalachian Mountains.
A coral reef offshore is a significant source of sand particles. Some species of fish that feed on algae attached to coral outcrops and rocks can create substantial quantities of sand particles over their lifetime as they nibble during feeding, digesting the organic matter, and discarding the rock and coral particles which pass through their digestive tracts.
The composition of the beach depends upon the nature and quantity of sediments upstream of the beach, and the speed of flow and turbidity of water and wind.
Sediments are moved by moving water and wind according to their particle size and state of compaction. Particles tend to settle and compact in still water. Once compacted, they are more resistant to erosion. Established vegetation (especially species with complex network root systems) will resist erosion by slowing the fluid flow at the surface layer.
When affected by moving water or wind, particles that are eroded and held in suspension will increase the erosive power of the fluid that holds them by increasing the average density, viscosity and volume of the moving fluid.
The nature of sediments found on a beach tends to indicate the energy of the waves and wind in the locality. Coastlines facing very energetic wind and wave systems will tend to hold only large rocks as smaller particles will be held in suspension in the turbid water column and carried to calmer areas by longshore currents and tides. Coastlines that are protected from waves and winds will tend to allow finer sediments such as clays and mud to precipitate creating mud flats and mangrove forests.
The shape of a beach depends on whether the waves are constructive or destructive, and whether the material is sand or shingle.
Waves are constructive if the period between their wave crests is long enough for the breaking water to recede and the sediment to settle before the succeeding wave arrives and breaks. Fine sediment transported from lower down the beach profile will compact if the receding water percolates or soaks into the beach. Compacted sediment is more resistant to movement by turbulent water from succeeding waves.
Conversely, waves are destructive if the period between the wave crests is short. Sediment that remains in suspension when the following wave crest arrives will not be able to settle and compact and will be more susceptible to erosion by longshore currents and receding tides.
Constructive waves move material up the beach while destructive waves move the material down the beach. During seasons when destructive waves are prevalent, the shallows will carry an increased load of sediment and organic matter in suspension.
On sandy beaches, the turbulent backwash of destructive waves removes material forming a gently sloping beach. On pebble and shingle beaches the swash is dissipated more quickly because the large particle size allows greater percolation, thereby reducing the power of the backwash, and the beach remains steep.
Compacted fine sediments will form a smooth beach surface that resists wind and water erosion. During hot calm seasons, a crust may form on the surface of ocean beaches as the heat of the sun evaporates the water leaving the salt which crystallises around the sand particles. This crust forms an additional protective layer that resists wind erosion unless disturbed by animals, or dissolved by the advancing tide.
Cusps and horns form where incoming waves divide, depositing sand as horns and scouring out sand to form cusps. This forms the uneven face on some sand shorelines.
Technical Details
This image was captured with a Canon EOS 1D MkII with an EF 24-105mm f/4L lens attached. Exposure settings were at 1/50 second at f/20 with 400 ISO.
Author: jansenphoto
4 thoughts on “Wednesday Wonderment – Ep. 30”
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
|
Universe Guide
51 Aquilae - HD187532 - HIP97650
51 Aquilae is a blue to white main sequence dwarf star that can be located in the constellation of Aquila. HIP97650 is the reference name for the star in the Hipparcos Star Catalogue. The Id of the star in the Henry Draper catalogue is HD187532. The Id of the star in the Gould Star Catalogue is 82. Stars in the southern hemisphere are more likely to have a Gould Id than the northern hemisphere. For example, there are no Gould classified stars in Ursa Major. 51 Aquilae has alternative name(s), 51 Aquilae , 51 Aql.
Location of 51 Aquilae
Proper Motion of 51 Aquilae
All stars like planets orbit round a central spot, in the case of planets, its the central star such as the Sun. In the case of a star, its the galactic centre. The constellations that we see today will be different than they were 50,000 years ago or 50,000 years from now. Proper Motion details the movements of these stars and are measured in milliarcseconds. The star is moving 032.88 ± 000.30 towards the north and -033.35 ± 000.35 east if we saw them in the horizon.
51 Aquilae Luminosity
Physical Properties (Colour, Temperature, Radius) of 51 Aquilae
51 Aquilae has a spectral type of F0V. This means the star is a blue to white main sequence dwarf star. The star has a B-V Colour Index of 0.4 which means the star's temperature has been calculated using information from Morgans @ Uni.edu at being 6,728 Kelvin.
51 Aquilae has been calculated as 1.52 times bigger than the Sun.The Sun's radius is 695,800km, therefore the star's radius is an estimated 1,060,678.49.km.
51 Aquilae Apparent and Absolute Magnitudes
51 Aquilae has an apparent magnitude of 5.38 which is how bright we see the star from Earth. Apparent Magnitude is also known as Visual Magnitude. If you used the 1997 Parallax value, you would get an absolute magnitude of 3.27 If you used the 2007 Parallax value, you would get an absolute magnitude of 3.15. Magnitude, whether it be apparent/visual or absolute magnitude is measured by a number, the smaller the number, the brighter the Star is. Our own Sun is the brightest star and therefore has the lowest of all magnitudes, -26.74. A faint star will have a high number.
Distance to 51 Aquilae
Using the original Hipparcos data that was released in 1997, the parallax to the star was given as 37.86 which gave the calculated distance to 51 Aquilae as 86.15 light years away from Earth or 26.41 parsecs. It would take a spaceship travelling at the speed of light, 86.15 years to get there. We don't have the technology or spaceship that can carry people over that distance yet.
In 2007, Hipparcos data was revised with a new parallax of 35.88 which put 51 Aquilae at a distance of 90.90 light years or 27.87 parsecs. It should not be taken as though the star is moving closer or further away from us. It is purely that the distance was recalculated.
Source of Information
The source of the information if it has a Hip I.D. is from Simbad, the Hipparcos data library based at the University at Strasbourg, France. Hipparcos was a E.S.A. satellite operation launched in 1989 for four years. The items in red are values that I've calculated so they could well be wrong. Information regarding Stellar Age, Metallicity or Mass is from the E.U. Exoplanets. The information was obtained as of 12th Feb 2017.
51 Aquilae Facts
Alternative Names
Traditional Name51 Aquilae
Short Name51 Aql
Alternative Name(s)51 Aquilae
Hipparcos Library I.D.97650
Bonner DurchmusterungBD-11 5149
Gould I.D.82
Henry Draper Designation187532
Visual Facts
Star Typemain sequence dwarf star
Absolute Magnitude3.27 / 3.15
Apparent Magnitude5.38
Right Ascension (R.A.)19h 50m 46.80
Declination (Dec.)-10d45`48.9
1997 Distance from Earth37.86 Parallax (milliarcseconds)
86.15 Light Years
26.41 Parsecs
2007 Revised Distance from Earth35.88 Parallax (milliarcseconds)
90.90 Light Years
27.87 Parsecs
Proper Motion Dec.32.88 ± 0.30 milliarcseconds/year
Proper Motion RA.-33.35 ± 0.35 milliarcseconds/year
B-V Index0.40
Spectral TypeF0V
Colour(F) blue to white
Estimated Facts
Radius (x the Sun)1.52
Luminosity (x the Sun)5.0000000
Calculated Effective Temperature6,728 Kelvin
Sources and Links
SIMBAD SourceLink
Related Stars
Multi-Star System
Proper Motion mas/yr
H.D. IdB.D. IdStar CodeMagnitudeR.A.Dec.SpectrumColourYear
187532-11 5149.0A5.60000-31.0000034.00000F0Yellow/White
Add a Comment
Email: (Optional)
|
Survival Impossible Without Habitat
January 2, 2001
The prospects of cloning an extinct species back into existence may be exciting science, but it's no panacea for making the world safe for animals and plants while their natural habitats continue to disappear at alarming rates.
That is the dilemma facing "Celia," the name of the clone scientists from the United States and Spain hope to create that will mark the second coming of the bucardo, a mountain goat that had vanished from the face of the Earth.
Pity poor Celia. Like her cloned predecessors, much will be made of her existence. The question is where will she and others like her ultimately go, when their natural environment in the Pyrenees continues to be threatened by habitat destruction, hunting, landslides and pollution?
Cloning is a fact of life. Dolly, the famously cloned sheep, proved that. Now, scientists believe the same tools that created Dolly can be used to shore up the numbers of many endangered species. In fact, the firm that is cloning Celia has already cloned a gaur, an endangered humpback relative of the cow from Southeast Asia.
Celia would be the first clone of an extinct species, a development that has staggering implications that stretch the imagination into the realm of Michael Crichton's Jurassic Park.
In the bucardo's case, scientists are cloning one of the cells of the remains of a mountain goat that was crushed to death by a tree that fell last January in northern Spain.
Over the years, hunting and habitat pressures drove the bucardo into the remote highlands of the Pyrenees. The Spanish government tried to save it, but the last male bucardo died in 1991. Celia was the last female, but researchers had extracted some of its tissue before it died. If the tissue can be cloned in the egg of a common ibex, the bucardo would live again.
By manipulating frozen cells, mankind could bring back some bygone species to shore up the food chain of other animals and help protect Earth's biodiversity. Unfortunately, it's not that easy. Revival through cloning isn't enough.
The human species must do a far better job of protecting the planet's endangered environments. Pollution and the loss of natural habitats to farmland and development remain the biggest threats to those animals and plants unfortunate enough to be classified as endangered species.
Modern science may have the tools to revive a species, but the attempt to restock will do little good unless mankind becomes a better steward in maintaining this world's natural habitats.
Sun Sentinel Articles
|
Benefits by system
Massage Therapy has been found to have positive effects on the following systems:
Nervous and endocrine
Skin and connective tissues
Effects on the Nervous and Endocrine systems
Reduces stress and promotes relaxation by activating the parasympathetic nervous system, the part of the nervous system in charge of the ‘rest and digest’ response.
Decreases pain by increasing blood circulation and stimulating the release of endorphins and other pain reducing neurochemicals, thus decreasing the use of analgesics and improving sleep patterns, by relieving muscular spasms and promoting the rapid disposal of waste products.
Reduces the levels of stress hormones (adrenaline) and increases the levels of dopamine (linked to decreased stress and reduce depression) and serotonin (believed to inhibit the transmit ion of noxious signal s to the brain, therefore reducing pain).
Reduces feelings of depression.
EEG (electro-encephalogram) tests have confirmed that massage increases the alpha and delta brain waves, which promotes relaxation and better sleep.
Effects on the Muscular system
Relieves muscular tension by direct pressure and by increasing circulation, resulting in more flexible, supple and resilient muscles tissue.
Reduces muscle soreness and fatigue. Massage enhances blood circulation, thus increasing the amount of oxygen and nutrients available to the muscles.
**A fatigued muscle recuperates 20% after 5 minutes of rest and 100% after 5 minutes of massage.
Increases range of motion and lengthen muscles by reducing muscular tension and mechanically stretching and broadening tissue, especially when combined with Swedish Massage Gymnastics.
Improves performance (balance and posture) by releasing trigger points, reducing muscular tension and increasing the range of motion.
Tones weak muscles by increasing muscle spindle activity which in turns creates muscle contractions. Particularly beneficial in case of prolonged bed rest, flaccidity and atrophy.
Effects on the skin and connective tissues
Increases skin temperature, which causes the superficial blood vessels to dilate increasing the circulation. This brings added nutrients to the skin improving its condition, texture and tone.
Reduces skin dryness by stimulating the sebaceous glands.
Reduces scar formation.
Increases mineral retention in bones.
Promotes fracture healing by increasing circulation around the fracture, promoting fracture healing.
Reduces surface dimpling of cellulite, it temporarily alters the shape and appearance of cellulite.
Reduces swelling by promoting lymph circulation.
Effects on the cardiovascular system
Improves blood circulation by mechanically assisting venous blood flow back to the heart.
Decreases blood pressure by dilation of the blood vessel.
Promotes rapid removal of waste products, ‘dilutes the poisons’.
Reduces heart rate and decreases pulse rate.
Increases white blood cell count helping the body protect itself from disease more effectively.
Effects on the Digestive system
Stimulates digestion by activating the parasympathetic nervous system.
Relieves constipation by promoting colon evacuation.
Relieves colic and intestinal gas.
Effects on the Respiratory system
Reduces respiratory rate by activating the relaxation response.
Decreases asthma attacks through increased relaxation and improved pulmonary functions.
Increases fluid discharge from the lungs. Several techniques can enhance the phlegm loosening when combined with postural drainage.
|
If you haven't yawned yet, you've at least had to suppress it!
If you haven’t yawned yet, you’re active mind is working hard to suppress it!
The more attention we give to an action during observation, the more likely we are to copy the behaviour. Take traveling abroad, for example, where a constant exposure to accents eventually sees us adopting it presumably to fit in better. It’s been shown too, that the more we imitate other people, the more we tend to like them and presumably the more they like us. It works in reverse as well since the more we like them the more we imitate them. Mirroring and imitation therefore is a salient characteristic in our nonverbal communication and shows others that we like and are connecting with them.
In 2000 Swedish researcher Dr. Ulf Dimberg exposed volunteers to frowning, smiling and expressionless faces. They were then told to react to them in various ways. When they saw a smiling face, they were sometimes asked to smile back and other times to frown back. The researchers found that it was difficult for the subjects to remain expressionless to a face that appeared happy or angry and even more difficult to smile at sad faces or make sad faces at laughing faces. The theory was advanced that our unconscious minds exerts much more control over our faces then we think. While it was somewhat possible to control the subject’s reactions, it required a great deal of mental power to reverse their natural tendencies. The study showed that even when we could control our emotions, minute spontaneous twitches still revealed true responses, and in every case, mirroring was the natural tendency.
The research on the reasoning behind the mirror reflex remains obscure for the moment, but this doesn’t mean we should ignore it. In fact, we should be very careful about our facial expressions and gestures since they will necessarily have a profound effect on others. Our expressions and body gestures illicit similar responses from others, so if we want to make people happy, we should smile more and use more expressive body language. In turn, others around us will naturally mimic our gestures.
|
Sunday, September 19, 2010
Cornish Pasties: Name This Food!
is a Cornish Pasty. That's 'pasty' with a hard, short "A" as in 'magic', not 'pasty' with a long "A" as in 'mayday'. Too many times have I heard our Colonial cousins talking of "Cornish pasties" as if they were some sort of burlesque stick-on nipple covers. It's pasties, pasties, pass-tees... thanks. Whew.
So what's in a Cornish Pasty? And why is it Cornish? And how come some of them look like the one above, while others look like this..
A pasty is a filled pastry case, commonly associated with Cornwall in the United Kingdom. It differs from a pie as it is made by placing the filling on a flat pastry shape, usually a circle, and folding it to wrap the filling, crimping the edge to form a seal. The result is a raised semicircular package. The traditional Cornish pasty is filled with beef, sliced potato, turnip or swede (also known as a rutabaga) and onion, and baked. Pasties with many different fillings are made; some shops specialise in selling all sorts of pasties. In a proper pasty, the filling ingredients must never be cooked before they are wrapped in the pastry casing; that is the main difference between a pasty and an empanada.
The origins of the pasty are largely unknown, although it is generally accepted that the modern form of the pasty originated in Cornwall. Tradition claims that the pasty was originally made as lunch ('croust' or 'crib' in the Cornish language) for Cornish tin miners who were unable to return to the surface to eat. The story goes that, covered in dirt from head to foot (including some arsenic often found with tin), they could hold the pasty by the folded crust and eat the rest without touching it, discarding the dirty pastry. The pastry they threw away was supposed to appease the knockers, capricious spirits in the mines who might otherwise lead miners into danger. Pasties were also popular with farmers and labourers, particularly in the North East of England, also a mining region.
A researcher in Devon found a reference to a pasty in a 16th century document, and argued that this showed the pasty originally came from Devon, although this was refuted by Cornish historians claiming that evidence for the pasty's roots in Cornwall go back millennia. The earliest known recipe for a Cornish pasty is dated 1746, and is held by the Cornwall Records Office in Truro, Cornwall. Outside Britain, pasties were generally brought to new regions by Cornish miners, and this strengthens the argument that pasties are a Cornish invention.
The pasty's dense, folded pastry could stay warm for 8 to 10 hours and, when carried close to the body, could help the miners stay warm. Traditional bakers in former mining towns will still bake pasties with fillings to order, marking the customer's initials with raised pastry. This practice was started because the miners used to eat part of their pasty for breakfast and leave the remainder for lunch; the initials enabled them to find their own pasties. Some mines kept large ovens to keep the pasties warm until mealtime. It is said that a good pasty should be strong enough to endure being dropped down a mine shaft.
And of course, being of Cornish origin means that there are various Cornish dialect names given to the pasty, such as 'tiddy oggy' or 'tiddly oggy' or even 'tiddy oggin'. What is the meaning of all this? You can find out in a wonderful little article at http://www.cornishpasties.org.uk/tiddyoggy.htm
There is an extensive article about Pasties on Wikipedia at http://en.wikipedia.org/wiki/Pasty.
There is a great deal of debate among pasty makers about the proper traditional ingredients and recipes for a pasty, specifically the mixture of vegetables and crimping of the crust. The crimping debate is contested even in Cornwall itself, with some advocating a side crimp while others maintain that a top crimp is more authentic. It has been said that the difference between Devon pasties and Cornish pasties is that the Devon pasty has a crimped crust running along the top of the pasty and is oval in shape, whereas the Cornish pasty is semicircular with a thicker crust running along the curved edge of the pasty, however it is more probable that the choice between top and side crimp versions is highly dependent on the whim of the cook.
Cornish Pasty Recipe for 4 Pasties (using a six inch diameter tea plate)
Ingredients for short crust pastry
1lb plain flour
1/2 lb either lard, hard margarine or butter or a combination of these
pinch of salt
cold water to mix
Rub the fat into the flour but not too finely. Add the salt and then start adding the water gradually until it works together into a ball without being sticky. Put aside in a cool place.
Ingredients for filling (these are traditional ingredients, but there are many other variations)
3/4 lb beef, not stewing beef
raw potato
raw swede (also known as rutabaga or yellow/swedish turnip)
small onion
salt and pepper
a walnut sized piece of butter
• Cut the steak into small pieces but do not mince.
• Slice potato and swede into thin, small pieces about half an inch across.
• Chop onion finely.
• Dust the work surface with flour.
• Roll out the pastry to about 1/4 inch thickness.
• Using a small plate cut out circles. Moisten the edge with milk or water and support half of the pastry nearest to you over the rolling pin. On the other half, put a small layer of prepared vegetables then a layer of beef.
• Repeat this once but be careful not to have too much filling which would cause the pastry to burst during the cooking process.
• Sprinkle a dusting of flour over the filling (this helps to make the gravy).
• Fold the other half of pastry which has been resting on the rolling pin over the filling and squeeze the half circle edges firmly together.
• Starting at the right side whilst supporting the left side with other hand, using first finger and thumb turn the edge over to form a crimp. Repeat this process all along the edge. This will come with practice but you must get a good seal.
• Brush pasty with beaten egg wash to help with browning process and put a small one inch cut in the centre of the top to allow steam to escape.
• Bake in a hot oven 220 degrees centigrade for about 20 minutes then reduce temperature to 160 degrees centigrade for a further 40 minutes. Smaller pasties need less time. If they are browning too quickly cover loosely with greased paper.
Then just eat and enjoy!
Okay, what's the Name This Food! food today?
Name This Food!
1. i guage its very green
2. Never mind the cryptic approach, just give us the name!!
3. that's green gage to you
Come on and chew the fat!
Related Posts Plugin for WordPress, Blogger...
|
Category: beauty of math
Can Math Make Beautiful Designs?
Sure it can!
Check out the video below to see some beautiful patterns that numbers can be used to create!
Learn Fun Math Patterns on a Number Wheel: Threes & Sevens
This video uses a number line bent into a circle for the ones-digits. Skip Counting around the circle by Threes reveal a fancy ten pointed star. Right Brain Math Patterns reveal that when you skip count around the circle by Sevens, you reveal the same star. All the numbers that add up to ten the Ones and Nines, the Twos and Eights, the Threes and Sevens, and the Fours and Sixes create the same image on the number wheel. The video shows the factor set of the Threes and Sevens but concentrates on the Ones-digits. Right Brain Math uses the patterns that are built in, inherent, in numbers to create overviews as well as factor sets and individual multiplication facts. It is a fun, easy way to learn multiplication. Right Brain Maths book, EZ Times Table is considered revolutionary way to introduce Math by Curriculum Review magazine.
Very Cool – eh?
Technorati Tags: , , , , , ,
Math As Your Second Language
I read an article that discussed math in a completey different and unique way. The author is a younger lady named Dinah Jackson and she published the article at
She discusses thinking of math as another language – check out her article.
Math Is Beautiful
Is math created or is it discovered? Does math describe laws of nature or is it a tool? Why do so few people feel passionate about math while most people find it difficult and tedious?
To think ‘in math’ is probably the ultimate in abstract thinking, but the foundation of math is anything but abstract. Basically, the foundation of essential math lies in what we call division. Division is just another way of separating one object from another, or grouping similar objects together and separating them from dissimilar objects. And if you can do that, you can do many other operations like separating multiple groups of similar objects from others. In this sense math is highly practical and mundane. We use math in nearly every aspect of human life without even realizing it.
In my humble opinion, math is an intellectual reflection or ‘grasp’ of the cosmos around us. To me, there are many types of languages, and math is one of them. And math goes far beyond the slicing of the pie description above. Photons can be viewed as either particles or as waves and likewise math can describe either of these two conditions.
It is when math goes beyond particles that it truly becomes beautiful, but also for the majority of us to understand at all. Indeed, there are many mathematicians who can see the exquisite beauty of a perfectly harmonious mathematical function but at the same time have no idea how it applies to real things in our universe. And that’s also the fun part for two reasons. The first, which has so many quantum physicists excited these days, is that any function must surely be describing something in the universe and if that is unknown, it remains to be discovered. From that case, whole theories can be built around the evidence of the math alone. Secondly is the converse. Einstein admitted he was not much of a mathematician, but he was an extraordinarily keen observer. He needed math to explain his observations though, so while we get to the material phenomena of the conversion of mass to energy through math, Einstein went the opposite route.
Dinah Jackson writes articles about Pokemon, travel and more. For the newest Pokemon Black & White information on the web, check out the new Pokemon online magazine called Pokezine. Hundreds of magazine articles on all different Pokemon subjects for free. Get all the latest news, plus tons of information about upcoming great items like Pokemon Serperior pokedoll, Oshawott, Tepig, Minccino and many others. Check it out. Its 100% free.
Very interesting idea! So are you ready to learn a new beatuiful language called math? 😉
If so, come visit me at Cherry Hill Mathnasium!
Have a great day!
Is There Such A Thing As A Math Genius?
We all have our things that we’re good at right? What about math? Are you good at math? Could you sit down for 5 hours straight and recite each succeeding number of pi up into the 22,000 digit range – all from memory?
If your name was Daniel Tammet you could!
Check out this video of a true math genius!
Math Genius
Wow! Now that’s a true math genius!
Have a great day in math!
Technorati Tags: , , , , , ,
The Beauty of Mathematics
Today I’d like to share a video I found on youtube.
It’s called the Beauty of Mathematics and shows how mathematical equations can be rendered by graphics on the computer.
Can’s see the video? Click here to go to Youtube to view it!
Technorati Tags: , , , , , , ,
|
The Saffron Battle: The Monastic Revolution for Democracy
by Ka Yan Hui
In the fall of 2007, Burmese monks led a nation in defiance against a military junta that has illegitimately ruled over a people for almost half a century. Named the “Saffron Revolution” by media outlets, the Burmese social movement gave hope to the Burmese people that they would finally have a democratic nation. The optimism was short-lived, however, and the junta had scarce any mercy when it put a violent end to the movement. Nonetheless, the Saffron Revolution imparts an important lesson, showing how a particular religion can reach out and stir people to act, and how it can inspire a message that resonates with an international body that has the ability to act on behalf of the silenced.
Pattam nikkujjana kamma : Turning over the alms bowl
It is in the Vinaya Pitaka, the Theravada Buddhist canonical texts, that Buddha instructed the sangha, his community of monks and nuns, to follow the precept of pattam nikkujjana kamma in Pali, literally, ‘turning over of the alms bowl’. The ancient phrase instructs a religious boycott of alms against those who engage in the eight wrong factors of character and conduct in the vinaya (AASP 2004). The overturned alms bowl has become a symbol of defiance in Buddhist nations, signifying the monks’ refusal to accept donations from wrongdoers in exchange for punna, or merit - a crux of the Buddhist faith. In late September 2007, the streets of Yangon (Rangoon), and elsewhere in Burma were flushed by the deep saffron-coloured robes worn by protesting monks, who carried the flags of the National League for Democracy (NLD)[1] in one hand and their overturned bowls in the other (Taylor 2009). Across the country, as Burmese monks mobilised, they were eventually joined by civilians in a loud cry against the State Peace and Development Council (SPDC), the military regime that has ruled since its armed takeover in 1962. Both within and outside the nation, hope for a democratic Burma swelled as protests in the cities grew with each passing day. Yet the demonstrations -- which the media later branded as the “Saffron Revolution” after the coloured robes donned by the monks -- were brought to a halt after the military junta enforced a crackdown upon the country. Gunshots fired into crowds of protestors and evening raids of monasteries put an immediate end to the Saffron Revolution, and it became but a memory of momentary hope for the Burmese people.
Still, not since the teahouse incident of 1988 had the SPDC been met with resistance in vast numbers, and not since then had the monkhood been involved in any direct confrontation with the state. If anything is to be learned from this failed movement, however, it is that religion played an essential role as a tool to mobilise, and ultimately inspire, a people towards defiance. Here, I consider how the interaction between religion and the actors and targets involved were significant throughout the entire movement. How Buddhist values were wielded as a political and spiritual tool on both sides poses an interesting paradox, and one that can be explored through examining the tactics and frames of each side. And certainly, the international context of the Saffron Revolution deserves some discussion. Questions remain in the aftermath of the movement, such as: did the frames, or messages, of the Saffron Revolution coincide with prevailing attitudes of our integrated, globalized community circa 2007? Do the messages projected by the actors belong to the master frames that formed the bases for other movements in the start of the 21st century? Furthermore, what did the Saffron Revolution mean for outsiders, and what roles or responsibilities did they adopt?
Burma: “A country of slaves and prisoners”
Burma, or the Union of Myanmar as it is formally recognized, is nestled in Southeast Asia, between the emerging powers of India and China, along with Bangladesh and Thailand. It is home to 56 million, of which nearly 90 percent are of Buddhist faith (Central Intelligence Agency 2009). The nation is plagued by a list of ailments: the continued despotism of single-party rule since 1962, a mismanaged economy stifled by high inflation costs, an ongoing HIV/AIDS epidemic that has already claimed the lives of over 25,000 and put another 240,000 at risk, and the remnants of the Cyclone Nargis tragedy in 2008, which left 130,000 dead and only exacerbated the junta’s failure to provide the necessary humanitarian aid for its people (Beyrer 2007).
1948 marked the end of nearly a hundred years of British colonial rule, and Burma’s newly founded independence would be ensured by the British parliamentary democratic system to be adopted. The short stint of democracy ended on March 2, 1962, when military commander General Ne Win, forcibly removed elected Prime Minister U Nu and his ministers from office. Five months after the coup d’etat, General Ne Win turned his back from parliament all together, banning all existing parties but his own, the Burma Socialist Programme Party (BSPP). The “Burmese Road to Socialism” lasted until 1988, during which Ne Win’s Soviet-style policies led the Asian “tiger” economy to collapse entirely (Skidmore 2005).
1988 was a tumultuous year in Burma, marked by protest, bloodshed, and the creation of the pro-democracy party, the National League for Democracy (NLD).The 8888 Uprising was the largest anti-government demonstration for the country in the 20th century, but it was suppressed by the newly formed SPDC(Clements 2008)[2]. In the 1990 multiparty elections called by SPDC, the NLD, headed by Aung San Suu Kyi, won the majority of votes after a representative turnout, regardless of the fact that many of its leaders had been arrested and imprisoned. Yet, still today, the military has blatantly refused to recognize the legitimacy of the NLD (Ibid). Aung San Suu Kyi, during a brief release from house arrest between 1995 and 1996, reflected: “The regime has made Burma into a country of slaves and prisoners. Yet our message remains the same: change through compassion, not killing” (Ibid).
The precipitating event of the Revolution could be traced back to mid-August 2007, after the government’s erratic decision to remove state subsidies on petrol prices led to fuel prices soaring five times its value and transportation costs doubling overnight (Taylor op. Cit). Compounded by an already stifled economy, the drastic move, which was intended to cover the increased budget for civil servant wages, was the driving force for students – not the Burmese monks – to mobilize under the 88 Generation of Students, a pre-existing pro-democracy organization, on August 19, 2007. Demonstrations against the economic inflation were held in the capital city of Yangon (Rangoon) and in other cities scattered across the country; yet, student participation was insufficient for the protests to gain any momentum and for immediate goals to be addressed by the state (Ibid). In hindsight, however, the student protests were the early risers in the protest cycle, fostering the grounds for which the Saffron Revolution would be launched, paralleling Tarrow’s belief that movements create opportunities for both themselves and other movements (Staggenborg 2008).
Protestors were not large in numbers, but relentless in their cause nonetheless. On 5 September, several Buddhist monks demonstrating in the town of Pakokku were beaten, leading to younger monks in the country to hold three officials captive in return for an apology. The absence of any reconciliation from the junta set the stage for large-scale demonstrations organised by the sangha. The protests escalated over the next two weeks, during which frames of the movement were being broadened all the while the government was constricting details of the movement from leaving the nation. On September 24, at the height of the Saffron Revolution, the protest crowds of Yangon had grown to proportions of 50,000 and demonstrations across the country had too become an alarming threat to the military’s rule. On September 26, the same day authorities closed down all Internet cafés in Rangoon and disconnected mobile phone lines, the military regime installed a violent crackdown on protestors, firing shots into crowds and arresting, oftentimes torturing dissidents. That evening, the military proceeded to raid numerous Buddhist monasteries and leaders and their families were detained. The number of deaths is still uncertain, with the regime reporting that ten had been killed and another 3,000 detained, while witnesses believed that that closer to 200 were killed during the crackdown (Clements ob. Cit). The crackdown effectively ended the protests and many leading monks were forced into hiding in neighbouring countries.
The Challengers of the Saffron Revolution: Frames, Tactics, and their Targets
“Give me whereon to stand and I will move the earth.” -- Archimedes (c. 287-212 BC)
In a nation where its institutions, moral culture and identity and are so deeply entrenched in a sole religion, the actors of the Saffron Revolution had to tread carefully when considering how to frame their movement and what tactics would be used. The challengers were members of the sangha, the community of monks and nuns in Burma. The community monkhood was the main mobilizing structure for recruitment and organization. Numbering close to 400,000, the Buddhist monks are highly respected by the Burmese people and their influence extends beyond religious practice, finding its way into education, health care, and the Burmese moral culture (Rogers 2008). Their high social standing of the monks in Burma is an important factor when considering what led to massive mobilisation of protestors coming from all walks of life. True, the grievances that underlay the movement were shared by a population deprived of its rights, and truer still, class homogeneity did nullify possibilities for inter-class conflict, yet it was the authority of the Burmese monks, coupled with the frames and tactics they chose, that explain why their protests were not met with apathy by the general public, as it the student protests in August had been.
Initially, the frames of the movement concerned the economic crisis after subsidies had been removed from the petrol prices. The frame was narrow yet it had affected everyone. The monks bore witness to the Burmese people suffering under the crippling economy, and at the same time their livelihood was being threatened as they depended on the citizenry for their alms. As the protests progressed, the government attempted to quash any communication from Burma to the outside world. Paradoxically, repression by the state was a proviso for a renewed political opportunity. Their efforts only highlighted the limits of human freedoms under tyrannical rule, and frames were adjusted accordingly, embodying the long-standing and widespread dissatisfaction with the state rule and subsequently demanding that the Burmese people be reconciled with the rights of a democratic nation. The broadened frames also played a role in mobilising the population; affiliates of the NLD, the 88’ Generation group, and members of the older generation (under the Veteran Politicians Organisation) joined the monks in the first time since the 8888 Uprising (Taylor op. Cit). Additionally, during the protests, the All-Burma Monks Alliance was founded to help coordinate the monks, and is an accommodating resource for future mobilisation (Clements op. Cit). The foundations of the frames of the Saffron Revolution could be interpreted as “socially engaged Buddhism”, what Aung San Suu Kyi described as an “intersection of traditional religious values and Western post-Enlightenment thought that empathizes universal human rights and a participatory political process” (Schober 2005). To become part of the movement was not un-Buddhist, as the targets would argue in their campaigns against the monks, but was in fact connecting to one’s religion in a definable way. Finally, the frames were not marked by a distinct dichotomy between the challengers and the targets. The aim was to implement democracy and not to seek retributive justice, remaining fluid with Buddhist beliefs. “The future of Burma rests in our power of forgiveness and our commitment to unity. We must reconcile even with our enemies. Trust that compassion is a more powerful weapon than guns,” said U Gambira, one of the monks that organized the protests (Clements op. Cit).
Tactics were firmly anchored along principles of Buddhism, such as ahimsa, or non-harming. Though hardly a new tactic, the overturned alms bowl symbolized the sangha’s refusal of alms from military forces. It had strong resonance or believers of the Buddhist faith, for it “[denied] these lay people religious support not only in this life, but also in the next”; furthermore, from a political perspective, the tactic was an explicit, visual form of questioning the regime’s claim to strong ties with Buddhist values and the sangha (Selth 2008). The tactic is consistent with their other forms of nonviolent protest used, which altogether aroused sympathies on the home front and abroad, but failed to bring necessary change, and any attempt to do so was halted by the state through violence. In this way, the religious context with which the protests took place indeed could have hampered the cause as much as it helped it; extreme, violent measures were by no means considered by organizers. Weighing between radical, aggressive forms of protest and the peaceful forms used, Aung San Suu Kyi said, “…I’m afraid that if we achieve democracy [through violence] we will never be able to get rid of the idea that you bring about necessary changes through violence. […] For me it is as much a political tactic as a spiritual belief, that violence is not the right way. It would simply not assist us in building up a strong democracy (Clements op. Cit.)".
Her sentiments were echoed in the tactics employed by the primary actors of the protests: protestors marched in an orderly fashion along the sheets, chanting prayers of kindness and protection from the Pali scripts (Ibid). In the monk-led protests, self-immolation was forbidden as a tactic, as it was far too extreme of a tactic and did not align with both political tactics and spiritual belief.
The targets of the Saffron Revolution were the military junta, which has governed the state under one-party rule, limiting the freedoms of its Burmese citizenry. For SPDC, religion plays an equally crucial role in asserting its authority; since 1962, the state has “sought to reshape Buddhist piety and social morality in the image of political ideologies in order to legitimate its rule” (Schober op Cit.). Using the dominant religion as a political tool, the SPDC has put its efforts into “[instilling] among its citizens and within the sangha is own brand of Buddhist nationalism” by associating Buddhist ritual and celebration along with nationalistic identity (Ibid). The rituals, patronage of relics, and public merit-making by government officials are part of the efforts to subscribe citizens with the military’s vision of Buddhism. Meanwhile, the SPDC has tried to bring closer the associations between the sangha and the junta to further legitimize their rule (Ibid). Within the administration of the SPDC, positions and activities are specifically designated towards extending the state’s control over religious thought and the religious order; in 1980, the National Sangha Mahanayaka Council was implemented to supervise the activities of the monastic society (Ibid). To return to the familiar image of an overturned alms bowl, the tactic was a direct challenge to the state and a threat to its stability. The perceived close relations that the state forcibly established between itself and the sangha through its own institutions were severed by the silent show of protest. Furthermore, the state was criticized by its challengers on grounds that their actions deviated from Buddhist beliefs.
Contradiction ebbs and flows through the movement and its constituents: the powerless hold power and those who instill fear do so out of fear itself. Religion helped to strengthen and at the same time weaken both sides of the Saffron Revolution and it was and continues to play an important feature to constructing the Burmese identity and at the same time to question the mechanisms within Burmese culture and institutions.
The International Context
Nothing can erase what was witnessed in the late summer of 2007, despite the efforts of the SPDC to sever all forms of communication from Burma to the outside world. Visions of the 2007 demonstrations in Burma were not just vividly pronounced in the memories of the Burmese people, but were too engrained into those of outsiders – those outside the movement and the nation – granted, likely not to the same extent. Perhaps what most distinguishes the demonstrations of the Saffron Revolution from those in 1988 is the degree of international exposure they both experienced; in less than two decades, communications technology has advanced exponentially, helping to overcome hurdles of massive censorship and restrictions on foreign press. The frames that were to be constructed by the actors in 2007 and the transforming role of the international body were in large part a result of that exposure.
It cannot be ignored that a growing awareness of an international audience likely factored in at some point. Interaction with the international body was beneficial for the challengers, as “multilateralism creates new arenas to question state agendas, to draw international attention to domestic practices, and to cultivate alliances with powerful actors” (Smith 2002). The global network of a shared religion provided a multitude of resources, including human and experiential, and that exiled activists were scattered around other countries helped to spread information and engage outsiders. The protests changed the cultural opportunity structure on a global level, as outside groups used this time of heightened awareness to mobilise old and new members into campaigns. On 30 September 2007, an estimated 3,000 people participated in a march in London, according to organisers Burma Campaign UK (BBC News 2007). Socially-engaged Buddhism provided a frame not wholly specific to Buddhist religion but encompassing universal ideas that would appeal to the global community (Schober op. Cit.). Human liberties and fair political practices are but elements of the master frames in the Global Justice Movement, which can take important meaning in the cultural opportunity structure along with the changing role of the international body considered.
The world watched in disbelief as peaceful protest was met with an iron fist, which spurned international outrage. Actors took steps beyond the limits of the Burmese boundaries to appeal to that outrage; days after the demonstrations were quieted, U Gambira, one of the chief organizers of the protests, acknowledged the sympathies of the rest of the world in a message addressed to the United Nations Special Envoy Ibrahim Gambari, former US president George Bush, and to the world, when he made his plea for help to “liberate the people of Burma from this oppressive and wicked system” (Clements op. Cit.). International response was, at least for democratic states, in favour of the Burmese monks, and was illustrated by an outpour of support. Canada, US, UK, Japan and the EU all took immediate steps against the regime, although countries in ASEAN were and still are resistant to imposing tougher economic sanctions (Selth op. Cit.). The United Nations, reacted to the monks’ protests in presidential statement released by the UN Security Council in October 2007, deploring the SPDC’s violent crackdown (UNSC 2007). What the Saffron Revolution demonstrated is the transforming role of the international community in state politics, and that, whether by the insistence of small activist organizations or by a general recognition of global integration, the community has had to account for new responsibilities.
The movement as part of the human rights master frame and the increasing importance of international influence on state affairs can imply a strong correlation with the Global Justice Movement. The economic crisis in 2007 has strong ties to neo-liberal policies implemented by the WTO, and thus from a very broad outlook the Saffron Revolution should be considered a part of the ongoing Global Justice Movement. Finally, internationalism played a vital role in providing opportunities for actors to “engage in collective action at different levels” (Staggenborg op. Cit.); for example, trans-national bodies like ASEAN were pressured to reform their economic policies and attitudes towards the Burmese regime (Selth op. Cit.).
The problem with remaining optimistic of Burma’s future is that there is little basis for such kind of thinking; as invested as outsiders were in the weeks of August and September 2007, outside engagement to their cause majorly dissipated once immediate problems hit home. The fight against terrorism, the environmental movement, and the global economic crisis are just some of the issues that have left little room for meddling in the affairs of a collapsing nation. Perhaps some consolation could be found when considering that the Burma movement fits into the all-encompassing global justice movement, and that it has not disappeared completely from activist agenda. Yet, that movement alone is composed of large-scale grievances that will likely be addressed before specificities are even given a chance to compete for attention. The voice for struggling nations such as Burma need to be heard on the international domain so that any action the global body need take can be done so swiftly; otherwise, the opportunities that the actors of the Saffron Revolution afforded, often by sacrifice, will have only been in vain. It was U Gambira, who has since been arrested and imprisoned, who said: “Freedom for the people of Burma is near. The cost of that freedom is the only question. We are at a critical moment in history” (Clements op. Cit).
[1] The National League for Democracy is Burma’s elected political party since the 1990 parliamentary elections; however, the ruling military junta has yet to recognize the party’s legitimacy.
[2] SPDC was initially named the State Law and Order Restoration Council (SLORC) in 1989 but was eventually renamed in 1997 to its existing
Assistance Association for Political Prisoners (Burma). "Burma: A Land Where Buddhist Monks Are Disrobed and Detained in Dungeons." Assistance Association for Political Prisoners (Burma). November 2004. (accessed April 5, 2009).
Beyrer, Chris. Burma and the challenge of humanitarian assistance, The Lancet, Volume 370, Issue 9597, 27 October 2007-2 November 2007: 1465-1467.
< 7/2/d62b8e49a72c3d6db1a2af3436736fc9>. (accessed 05 April 2009)
Clements, Alan. The voice of hope: Aung San Suu Kyi conversations with Alan Clements-- 2nd ed., updated and expanded. New York, Ontario: Seven Stories Press, 2008.
News, BBC. "Thousands in London Burma protest ." BBC News | UK. September 30, 2007. (accessed April 5, 2009).
Rogers, Benedict. 2008. The Saffron Revolution: The Role of Religion in Burma’s Movement for Peace and Democracy. Totalitarian Movements and Political Religions. 9(1):115-118.
< >. (accessed 05 April 2009).
Selth, Andrew. 2008. Burma's ‘saffron revolution’ and the limits of international influence. Australian Journal of International Affairs. 62(3):281-297.
< >. (accessed 05 April 2009).
Schober, Juliane. "Buddhist Visions of Moral Authority and Modernity." In Burma at the turn of the 21st century, by Monique Skidmore, 113-132. Honolulu: University of Hawai'i, 2005.
Skidmore, Monique. Burma at the Turn of the 21st Century. Honolulu: University of Hawai'i Press, 2005.
Smith, Jackie. Globalizing Resistance: The Battle of Seattle and the Future of Social Movements. Globalization and Resistance: Transnational Dimensions of Social Movements. Rowman & Littlefield Publishers (2002).
Staggenborg, Suzanne. Social Movements. Don Mills, Ontario: Oxford University Press, 2009.
Taylor, Robert H. The State in Myanmar. London: HURST Publishers Ltd., 2009.
The World Factbook: Burma, CIA,
< >(accessed April 5, 2009)
United Nations Security Council. "Security Council deplores violence used against Myanmar demonstrators, stresses importance of early release for all political prisoners." United Natons. October 11, 2007. (accessed April 5, 2009).
Please leave any comments here.
|
Royal Furniture
Ancient furniture
The Middle Ages
From A.D. 476 to 1453
Chair of St. Peter
Scandinavian work
Anglo-Saxon work
Saxon House
Anglo-Saxon Furniture
Seat on the Dais
Saxon State Bed
Influence of Civilisation
Coronation Chair
Penshurst Place
Furniture in France
Ordinary Furniture
German work
French Gothic
English Gothic
The Renaissance
Jacobean Furniture
Eastern Furniture
Rooms & Decoration
French furniture
Laura Ashley Furniture
Outdoor Furniture
Anglo-Saxon work
Of the furniture of our own country previous to the eleventh or twelfth centuries we know but little. The habits of the Anglo-Saxons were rude and simple, and they advanced but slowly in civilisation until after the Norman invasion. To convey, however, to our minds some idea of the interior of a Saxon thane's castle, we may avail ourselves of Sir Walter Scott's antiquarian research, and borrow his description of the chief apartment in Rotherwood, the hospitable hall of Cedric the Saxon, the classical example of the Anglo-Saxon work. Though the time treated of in " Ivanhoe" is quite at the end of the twelfth century, yet we have in Cedric a type of man who would have gloried in retaining the customs of his ancestors, who detested and despised the new-fashioned manners of his conquerors, and who came of a race that had probably done very little in the way of "refurnishing" for some generations. If, therefore, we have the reader's pardon for relying upon the mise en scene of a novel for an authority, we shall imagine the more easily what kind of furniture our Anglo-Saxon forefathers indulged in.
"In a hall, the height of which was greatly disproportioned to its extreme length and width, a long oaken table - formed of planks rough hewn from the forest, and which had scarcely received any polish -
stood ready prepared for the evening meal. On the sides of the apartment hung implements of war and of the chase, and there were at each corner folding doors which gave access to the other parts of the extensive building:.
"The other appointments of the mansion partook of the rude simplicity of the Saxon period, which Cedric piqued himself upon maintaining. The floor was composed of earth mixed with lime, trodden into a hard substance, such as is often employed in flooring our modern barns. For about one quarter of the length of the apartment, the floor was raised by a step, and this space, which was called the dais, was occupied only by the principal members of the family and visitors of distinction. For this purpose a table richly covered with scarlet cloth was placed transversely across the platform, from the middle of which ran the longer and lower board, at which the domestic and inferior persons fed, down towards the bottom of the hall. The whole resembled the form of the letter T, or some of those ancient dinner tables which, arranged on the same principles, may still be seen in the ancient colleges of Oxford and Cambridge. Massive chairs and settles of carved oak were placed upon the dais, and over these seats and the elevated tables was fastened a canopy of cloth, which served in some degree to protect the dignitaries who occupied that distinguished station from the weather, and especially from the rain, which in some places found its way through the ill-constructed roof. The walls of this upper end of the hall, as far as the dais extended, were covered with hangings or curtains, and upon the floor there was a carpet, both of which were adorned with some attempts at tapestry or embroidery, executed with brilliant or rather gaudy colouring. Over the lower range of table the roof had no covering, the rough plastered walls were left bare, the rude earthen floor was uncarpeted, the board was uncovered by a cloth, and rude massive benches supplied the place of chairs. In the centre of the upper table were placed two chairs more elevated than the rest, for the master and mistress of the family. To each of these was added a footstool curiously carved and inlaid with ivory, which mark of distinction was peculiar to them." - this is a good description of the Anglo-Saxon work.
A drawing in the Harleian MSS. in the British Museum is shewn here, illustrating a Saxon mansion in the ninth or tenth century. There is the hall in the centre, with "chamber" and "bower" on either side; there being only a ground floor, as in the earlier Roman houses. According to Mr. Wright, F.S.A., who has written on the subject of Anglo-Saxon manners and customs, there was only one instance recorded of an upper floor at this period, and that was in an account of an accident which happened to the house in which the Witan or Council of St. Dunstan met, when, according to the ancient chronicle which he quotes, the Council fell from an upper floor, and St. Dunstan saved himself from a similar fate by supporting his weight on a beam.
The illustration here given shews the Anglo-Saxon chieftain standing at the door of his hall, with his lady, distributing food to the needy poor. Other woodcuts represent Anglo-Saxon bedsteads, which were little better than raised wooden boxes, with sacks of straw placed therein, and these were generally in recesses. There are old inventories and wills in existence which shew that some value and importance was attached to these primitive contrivances, which at this early period in our history were the luxuries of only a few persons of high rank. A certain will recites that the "bedclothes (bed-reafs) with a curtain (hyrfte) and sheet (hepp-scrytan), and all that thereto belongs," should be given to his son.
In the account of the murder of King Athelbert by the Queen of King Offa, as told by Roger of Wendover, we read of the Queen ordering a chamber to be made ready for the Royal guest, which was adorned for the occasion with what was then considered sumptuous furniture. "Near the King's bed she caused a seat to be prepared, magnificently decked and surrounded with curtains, and underneath it the wicked woman caused a deep pit to be dug." The author from whom the above translation is quoted adds with grim humour, "It is clear that this room was on the ground floor."
There are in the British Museum other old manuscripts whose illustrations have been laid under contribution, representing more innocent occupations of our Anglo-Saxon forefathers. "The seat on the dais," "an Anglo-Saxon drinking party," and other illustrations which are in existence, prove generally that, when the meal had finished, the table was removed and drinking vessels were handed round from guest to guest; the storytellers, the minstrels, and the gleemen (conjurers) or jesters, beguiling the festive hour with their different performances.
Some of these Anglo-Saxon houses had formerly been the villas of the Romans during their occupation, which were altered and modified to suit the habits and tastes of their later possessors. Lord Lytton has given us, in the first chapter of his novel " Harold," the description of one of such Saxonized Roman houses, in his reference to Hilda's abode.
Copyright 2009-2010 by http://royalfurniture.org
|
St. Pius X High School
Unit 2 - Advanced Features of Corel Draw
Part 1- Layout and Dimensions
Tutorial # 1: Complete the following tutorial: Room
Assignment # 1: Draw a plan of your bedroom at home. Be as detailed as you can.You must demonstrate the following techniques from the tutorial: gradient fill, pattern fill, welding, and drawing a door.
Part 2 - The Lumber Truck
Assignment # 2 : Reproduce the following picture: Lumber Truck
Part 3- Bezier and 3D
Tutorial # 2: Computer Mouse
Tutorial #3: Hearts
Assignment # 3: Reproduce the following picture: The Real Mouse
Part 4 - Logo Design
Tutorial # 4: Complete the following tutorial: Planetary Studies
Assignment # 4: Reproduce the following logo: Tiger
Part 5 - Fruit Bowl
Assignment # 5 : Complete a fruit bowl, fruit and a room.
Final Check
Post each drawing on the appropriate page and add a link to the .cdr files
Tutorial 1- The Room
Assignment 1 - Your Bedroom
Assignment 2 - The Lumber Truck
Tutorial 2 - The Computer Mouse
Tutorial 3 - Hearts
Assignment 3- The Real Mouse
Tutorial 4 - Planetary Studies
Assignment 4 - The Tiger
Assignment 5 - Fruit Bowl (empty bowl, bowl with fruit, bowl in room)
Clearly label each assignment.
Pay attention to the webpage layout. Did you use tables, borders, text?
Does you webpage look neat and orderly? Did you label everything?
When you have posted everything to your website print the
Assessment Rubric
and hand it in for evaluation.
|
Wednesday, November 14, 2012
Nearby Rogue Planet
Astronomers have discovered what is likely a rogue planet-- a planet zipping through space independently, unconnected to any star-- just 100 light years away. The object, at four to seven times the mass of Jupiter, may also be a brown dwarf, a body not quite big enough to become a star, but current odds are that it's a planet ejected from a solar system.
Astronomers think such rogue worlds are common throughout the galaxy, and they are delighted to have found one so close by. Since they won't have to deal with the overpowering glare of a host star, they look forward to learning a lot about this object fairly quickly, and using that knowledge to extrapolate about others of its kind.
No comments:
|
Study your flashcards anywhere!
Download the official Cram app for free >
• Shuffle
Toggle On
Toggle Off
• Alphabetize
Toggle On
Toggle Off
• Front First
Toggle On
Toggle Off
• Both Sides
Toggle On
Toggle Off
• Read
Toggle On
Toggle Off
How to study your flashcards.
H key: Show hint (3rd side).h key
A key: Read text to speech.a key
Play button
Play button
Click to flip
58 Cards in this Set
• Front
• Back
what is the normal dorsiflexion degree of the ankle?
what is the normal plantarflexion of the ankle?
name the term of when the ankle can't dorsiflex 10.
ankle equinus
How do you treat ankle equinus?
stretching; surgical lengthening of the achilles tendon; and OMT
What else is going on in ankle equinas besides not being able to dorsiflex beyond 10 degrees?
posterior displacement of the tibia on the talus and posterior displacement of the proximal fibula
What 2 OM techniques are used to treat ankle equinus?
1) modified fibular head technique; 2)HVLA Tibiotalar joint gapping; S/E: 2days of soreness post tx
Describe the amount of stretching determining the range of motion. Compare 30s, 2min, 5min a day.
At 30S: 2.15 increase; 2min: 2.3 degree increase; 5min: 2.7 degree increase in dorsiflexion
what are the majority of normal motions of the ankle?
dorsiflexion and plantarflexion
in what position are most ankle injuries?
sudden inversion with downward and lateral forces on relatively weak lateral ligaments
In 75% of ankle sprains this ligament is injuried?
anterior talofibular ligament
If the ankle is severely inverted what other ligament is generally involved beyond the ATFL?
calcaneofibular ligament; the anterior capsule may also be torn
what ligament attaches to the styloid process of the 5th metatarsal and is considered the major everter of the foot?
Fibularis Brevis tendon
explain what happens to the body if the foot in inverted enough to involve the calcaneofibular ligament.
the ligament pulls the fibula inferiorly which may lock the proximal fibular head inferiorly and posteriorly -> this puts strain on the interosseous membrane and may cause a dysfxn of the entire lower extremity.
since everything is connected explain the possible pain pattern from an ankle sprain.
commonly ankle and leg, then lateral thigh, lower back, interscapular region, possibly head and neck.
what major structures do you have to worry about with an inverted ankle sprain.
since the distal fibular head may come down, it may compress the fibular nerve just posterior to the fibular head
what lateral leg muscle inserts on the proximal head of the fibula (giving good reason for lateral thigh pain in an inverted ankle sprain).
biceps femoris muscle
these ligaments attach the vertebral column to the iliac crest of the pelvis.
iliolumbar ligaments
Anita Eisenhart, DO of PCOM did a study on 1st and 2nd degree ankle sprains seen in the ER of pts that were at least 18. Both treated and untreated groups exhibited a full loss of dorsal/plantar flexion of 30degrees and about a 2.75cm increase in joint circumference. Name the OMT techniques she used.
Indirect Myofascial Release on the Posterior Proximal Fibula, Muscle Energy and Counterstrain and the Pain and Tenderness of Fibularis Muscles, Articulatory techniques on the plantar Rotation of the Cuboid, and Lymphatic Drainage on the edema.
what were the general results of Dr. Eisenhart's ankle sprain study?
OMT was best for immediate results, especially ROM. the categories tested were EDEMA, ROM, and Pain SCALE (1-10). at the one week follow up there wasn't that much difference.
OMT for the knee is commonly used for ___ and ____.
trauma (MVAs, Sports injuries, and household or work injuries) and Osteoarthritis
What are the 2 steps in evaluating a knee?
1) Configuration: observe the knee with patient weight bearing and look for abnormalities; 2) Assess for Joint Effusion
In the first step (configuration) of evaluating a knee what are the 3 common knee deformities and define them.
Genu varus - bowlegged; Genu valgus- knockneed; Genu recurvatum - back knee
What can you do to determine the extent of a genu valgus?
do a Q angle. draw a line from the ASIS to the mid-patella and draw another line from the tibial tuberosity to the mid-patella and take the superior angle. Normal: males 8-14; females: 15-17
what are the consequences of an increased Q angle?
lateral tracking of the patella, patellofemoral pain syndrome, patellofemoral dysfunction, chondromalacia patella, osteoarthritis of the patellofemoral joint, increased pressure on the lateral facets
Name the autosomal dominant condition where there is absence or hypoplasia of the patella that is associated with onycho-osteodysplasia.
nail-patella syndrome.
What is abnormal in Nail-Patella Syndrome?
Hypoplasia of the patella, Hypoplasia of the iliac horns, Dysplasia of the finger nails and toes, nephropathies with thickening of the glomerular lamina densa and get proteinuria, the distal femur looks like an erlenmyer flask.
What are the tests in Step2 of evaluation of the knee?
Assessing for joint effusion involves 3 tests. 1) Patellar Ballottement Test - looking for major effusion; 2) Bounce Home Test (flex knee) - Moderate effusion; 3) Fluid Shift Test - minor joint effusion
If you get a positive effusion test, what do you do and how do you do it?
joint aspiration with a needle into the medial side of the knee beneath the patellar tendon joint line
What fluid is normally present in the knee?
synovial fluid; it is very viscous and usually don't get any in the needle "dry tap"
If a watery clear yellow fluid (may have celluar debris) is aspirated, what is that called?
What is the most common form of synovitis?
traumatic synovitis - caused by twisting or jarring of the knee and hours later the knee becomes swollen.
What are the treatments for traumatic synovitis?
aspirate, OMT (lymphatic approach); rest, slint, ice, NSAIDs
If you aspirated frankly bloody, watery fluid where the blood doesn't clot, what would that be?
ligamentous tear
If you aspirated frankly bloody, watery fluid that had fat globules and looked like gross homemade gravy, what would it be?
Intraarticular Fracture
If you aspirated pus, what would it be and what is the most common cause?
septic arthritis and it is most commonly from neisseria gonorrhoeae
Give the epidemiology and etiology of the patellofemoral dysfxn.
Epi: 12-35yrFemales, pain originates in teh subchondral bone and is usually a dull ache with occasional sharp pains, relieved by rest and ice and often feels like it will give way; ETIOLOGY: the Patella tracks too far laterally with excessive pressure on the lateral patellar facet: genu recurvatum, low lateral femoral condyle, tight hamstrings, increased Q angle, and occurs while in training and do rapid increases in runs or change shoes or surfaces;
How do you DX patellofemoral dysfxn?
1)shifting the patella laterally reproduces pain with pressure under the lateral facet; 2)Patellar GRIND TEST: press the patella down in the trochlear groove and get the pt. to contract the quadriceps; the motion should be smooth, any clicking or grinding is abnormal; 3)look at thigh circumference (atrophy is common on the worst side); 4)X-ray: see a sunrise view of the patella (patellar dislocation)
How do you treat patellofemoral dysfxn?
1)OMM: DMR, CS and Somatosomatic reflexes L3-S2; 2)Ice massage; 3)NSAIDs; 4)Hamstring stretches; 5)exercises: leg raise, Short Arc Leg Raise: hold knee extended for one min then flex to 45 degrees for 30s, extend knee and repeat 4-5xs (repeat 4-6Xs/day); straight leg raises to strengthen quads; 6) BRACING with infrapatellar strap - may need 6months of conservative therapy to get a response ----last resort: patellofemoral Dysfxn Surgery: reduces Q angle
name the term that describes the degenerative condition of the cartilage surface of the back of the patella; diagnosis can only be made with an arthroscope.
chondromalacia patellae (cartilage looks like shredded crabmeat)
describe the differences in the a 1st, 2nd, and 3rd degree sprain of the knee.
The main difference is the ligament: 1st: overstretch of the ligament; 2nd: partial tear; 3rd: complete tear - surgical repair
how are the anterior and posterior cruciate ligaments named?
they are named for where the insert (anterior: inserts on the anterior portion of the tibia; posterior: inserts on the posterior tibial plateau)
what are the fxns of the cruciate ligaments?
ACL: prevents the tibia from sliding forward; PCL: prevents the tibia from sliding posteriorly
What tests do you do to test for cruciate tearing?
1) Drawer Test; 2) Lachman's Test; 3) Apley's Distraction Test; Imaging (MRI is best)
what position is the body in when you see ACL ruptures?
leg is extended and internally rotated and the body continues forward; get a Positive anterior drawer and Lachman Test
What position is the body commonly in when you see a PCL rupture?
leg is hyperextended and loaded and tibia if forced backward or knee is flexed and backward force on the tibia. Positive Posterior Drawer and Sag Sign
What position in the body commonly in when you see a rupture of the medial collateral ligament?
a force from the posterolateral portion of the knee (valgus stress)
What position in the body commonly in when you see a rupture of the lateral collateral ligament?
caused by trauma pushing the knee into varus
what is a the Terrible Triad of O'Donoghue?
MAM: rupture of all 3: Medial Collateral, ACL, and tear in the Medial Meniscus
How do you test for the Terrible Triad of O'Donoghue?
Do a positive pivot shift test - extend the knee, place valgus stress on the knee and internally rotate the leg - will hear a "clunk" if positive
what are the symptoms of menisceal tears?
clicking, locking of the knee, and knee pain
How do you diagnose menisceal tears?
Apleys' Compression Test and McMurray Test; imaging with MRI
There are typically __# of bursae about the knee.
How do you get prepatellar and infrapatellar bursitis?
called the Housemaid's Knee, Nun's Knee, Clergyman's Knee - constant kneeling trauma (rarely TB)
What is the name to describe the inflammation of the insertion of the conjoined tendons of 3 muscles (sartorius, gracilis, and semitendinous m)?
ANSERINE BURSITIS: pes anserinus is the bursa beneath the conjoined tendon - lies superficial to the tibial insertion of the MCL) - get pain with forced extension of the knee
what is a fabella?
a sesamoid bone located in the gastrocnemius tendon; it will always remain in the same position on x-ray, posterior to the knee joint
Name the term that describes osteochondrosis affecting the tibial tuberosity.
Osgood-Schlatter DZ
How do you dx and tx osgood-schlatter's dz?
Tenderness and swelling of the tibial tuberosity; x-ray demonstrates seperation of the growth plate; TX: NSAIDs, avoid exercise when painful
L4 radiculitis causes this syndrome where the pt can't extend the knee.
Vastus medialis Syndrome of Pseudoblocking (get spasms in the vastus medialis)
|
When are fillings necessary?
Fillings are placed in teeth to replace missing tooth structure due to tooth decay, small chips or fractures of the teeth. Composite fillings (tooth-colored fillings) may be placed in the front or back of the mouth and they blend seamlessly with your natural teeth. If there is significant tooth loss from decay or fracture, a crown may be recommended to give more strength to the tooth.
When are composite (tooth colored) fillings used?
There are several different types of filling materials used depending on the forces the tooth will receive or location of the tooth. Teeth that need a small to moderate restoration can be filled using a light cured composite material. Composite fillings are white fillings that match the colour of your teeth. If a tooth needs a stronger material, porcelain or gold may be the recommended choice for you.
Dr. Jost and Dr. Prichard will examine your tooth that requires a filling and recommend the appropriate restoration and material for you.
Can Dr. Jost replace my ugly metal dental work?
Absolutely. In this modern age, you can have a healthy, white smile that you’ll be proud to share with the world. Dr. Jost can replace amalgam fillings, and in many cases metal crowns, with natural looking, custom-shaded alternatives. As a bonus, our CEREC ceramic crowns can be placed in just one dental visit!
|
Nico Spycher blogs from the lessons of CAS Digital Finance on the subject of blockchain:
In the low of the financial crisis (November 2008), the idea of a digital currency has been published by the pseudonym Satoshi Nakamoto:
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without the burdens of going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as honest nodes control the most CPU power on the network, they can generate the longest chain and outpace any attackers. The network itself requires minimal structure. Messages are broadcasted on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.
The readable whitepaper can be found at the following link.
Core Elements
The blockchain is a shared distributed ledger, which is based on a comprehensive network. Each transaction (e.g. a transfer of an amount between wallets) is written into the blockchain. Wallets have a secret data block called the „private key“ or „seed“, which is used to sign transactions by providing a mathematical proof that they come from the owner. The signature also prevents the transaction from being modified after the submission. The confirmation (mathematical proof) is done through the network using a process called mining. All transactions are distributed among each user.
Ethereum – Bitcoin 2.0?
Bitcoin is based on a relatively simple programming language. Forth has some essential limitations, among other things for example it is not universally programmable i.e. emulation of a process is not readily possible. Furthermore, only limited information from the blockchain can be processed.
-> if higher requirements exist, it gets complex with Bitcoin
The idea behind Ethereum is to equip a blockchain with a turing-complete programming language. Instead of transactions ought also program code and self-executing contracts to be passed. In addition, addresses can be semi-intelligent contracts that allow certain actions to be executed under certain conditions. Ethereum is intended to create not only a decentralized currency but also a decentralized Internet. The Web 3.0. The dapps – decentralized applications – should bring everything that is possible to the blockchain.
DAO – A Perpetuum Mobile in the Financial System?
DAO is standing for decentralized autonomous organization (DAO), sometimes also known as decentralized autonomous corporation (DAC), an organization form which is managed based on the rules, that have been coded as a computer program. These are so-called Smart Contracts. All transactions and the ruling are stored on the blockchain.
THE DAO, a VC funding organized as a DAO, which in June 2016 had very successfully generated Tokens worth 150 million USD. This DAO is entrepreneurial. Every DAO token owner has the possibility to submit a so-called proposal, the created SmartContract in the blockchain regulates the details of the investment. Subsequently, the owners agree whether the contract is concluded. The generated income can either be paid out or reinvested.
Bitcoin vs. Ethereum
Bitcoin Ethereum
# Token 21m (ACT:16m) ∞ (ACT: 80m)
Compensation Miner 12.5 (decreasing) 5
Speed of Transaction 10min 14sek
Type of Verification Proof of Work Proof of Work
Programming Language Forth Solibity und Serpent
Precondition for Mining ASICS Grafikkarte
Crypto Valley
In the canton of Zug in Switzerland, an ecosystem has been created with a large number of start-ups around the blockchain scene. The policy has recognized the opportunities to position the region as „crypto-valley“ worldwide. As the first international authority, the administration in Zug accepts Bitcoin as a means of payment since 1 July 2016. The region has the goal to become the global center for crypto-currencies. Various association, e.g. „Bitcoin Association Switzerland“ or „Digital Finance Compliance Association (DFCA)“ were established to create the conditions for a successful location in that industry.
The current trend of the Sharing Economy seeks to decentralize any type of service in a peer-to-peer model. We have seen this with companies offering decentralized taxis and hotel services, such as Uber and Airbnb. Technologies such as the smartphone enable apps to connect drivers with rider or tenant with homeowner. These services are more convenient and competitive than their traditional counterparts. At the same time, it offers income opportunities for people who have not previously existed.
The potential of blockchain promises that outsiders can offer financial services with far less capital respectively grant access based on the P2P approach. Access to capital would no longer be the big hurdle that people limit to be innovative. Smart contracts can offer just as much benefits as the financial instruments of traditional companies. These platforms will equalize market conditions for innovative people with limited financial resources.
The start into the blockchain era has thus fallen, but this is only the beginning of a new and revolutionary future. I can hardly get a process or technology that is not affected by blockchain in the future. This new technology will change the financial industry if not revolutionize it and will not keep make up from other industries.
|
Home » Western White Supremacy-Why?- Are They The Only Racists?
Is white supremacy in the Western world a form of racism? It most certainly is. It is based on the belief, and its promotion, that the white people are superior in certain characteristics, traits and personalities compared to people of other racial backgrounds. Is it true? Not by a longshot and in this article I will try and show the reasons why white racism exists, and why at present, it is so difficult to eradicate. Examples , of course, are the Atlantic slave trade, the Jim Crow laws in the United States and Apartheid in South Africa. To make it happen the following conditions have to be in place. You need a small group of powerful people to invade a country, subjugate it as happened in India with the British, or a small group of non-educated people to be dominated by another group as happened to the to Blacks and Aboriginals in North America. It is usually political , social, and economic factors that create a dominant group. Cultural racism is a term used to describe and explain racial ideologies that have recently emerged that promote the assumption that certain cultures inherently are superior, but these assumptions are usually based on a great deal of xenophobia and myths, that have no basis in scientific facts. Has a scientific analysis of all races ever been conducted to measure the actual intelligence and abilities of different groups under conditions that would give answers? I doubt it, mostly because the terms of such a test would never be agreed upon.
All races, nationalities, cultures have a superiority attitude , bar none. Take China for instance. Racism against black people may be one of the strongest forms of racism. Many families in China would be horrified if their son or daughter married a black. It can be difficult getting a job teaching English in China if you are black. The Chinese think the only true Americans are white. Racism against blacks is strongly linked to class divisions, as for thousands of years the lighter Chinese looked down on the darker skinned Chinese. Racism does not extend only to foreigners in China–It also extends to its own people. People from Tibet and virtually all Chinese minorities are seen as backwards and in need of a helping hand. I texted Google to ask if there was racism in China. It is hard to believe the responses . The magnitude of it. It appears that every black American or European who went to teach English in China, one way or another was snubbed. Why do we see white racism and will it last?
No it won`t! When there were few humans, and they were hunters and gatherers they never met one another. The societies developed and for reasons I cannot explain, the group that developed white skin dominated intellectually and scientifically. When people of colour emigrated to Europe and America, they were small in numbers and were immigrants. They were dominated by the whites. There was never white emigration to Asia or Africa except as conquerors . If whites had settled in small numbers for jobs in Asia and Africa there would never have been White Racism. They would have been dominated by people of colour because of their few numbers. Will there be permanent domination by whites? Not a chance. Technology has changed everything and the massive numbers of the people of colour will make a difference, a big difference. White people had an original advantage, that is quickly being lost, and I believe in 1000 years with the movement of populations the colours will disappear and racism will end.
Name of author
Name: Murray Rubin
Leave a Reply
|
Scientists Reveal Images Of Severely Bleached Great Barrier Reef
Australia's Great Barrier Reef is one of the world's most iconic natural landmarks but unfortunately, it may not be around for much longer and humans are to blame.
The Barrier Reef is back in the headlines after an aerial survey by the Australian Research Council's Centre of Excellence for Coral Reef Studies showed that at least 1,500km has been bleached - that's two-thirds of its length!
The intense bleaching is said to be caused by the rise in temperatures due to global warming and it isn't showing signs of slowing down.
This is the second year in a row that scientists are reporting extreme change in the corals and according to council's director, Terry Hughes, it would take about 10 years for the reef to recover even with the fastest growing coral. Keep in mind, recovery can only take place if there is a gap between bleaching.
It only took 1°C of warming for the corals to start changing colors over a span of 19 years. Bleached corals aren't necessarily dead but they do experience damage that are in some cases irreparable.
“Ultimately, we need to cut carbon emissions, and the window to do so is rapidly closing,” said Hughes.
The council released some images of the areas that have been impacted by the mass bleaching. Take a look below and see the damage for yourself.
Related Articles
|
07 February 2016
The End of the Line for Curtiss Aircraft
XP-87 Blackhawk prototype
(USAF Museum)
In the summer of 1945 the US Army Air Force was in the process of outlining its combat aircraft needs in the post-war world. For fighter aircraft, there were three classes of aircraft that the USAAF wanted- an all-weather offensive fighter, a point-defense interceptor, and a long-range penetration fighter. It was expected that because of the state of the technology of the day that the all-weather offensive fighter would be the biggest of the three. On 28 August 1945 the USAAF issued its RfP (Request for Proposals) for the all-weather offensive fighter- a speed of 525 mph at 35,000 feet, 12 minutes to reach 35,000 feet and a 600-mile combat radius. It was thought at the time that piston engines would be necessary, but a refinement of the USAAF requirements a few months later laid out the service's desire for an aircraft that could seek out and destroy both enemy aircraft and ground targets in all weather conditions, day or night. Bell, Consolidated (Convair), Curtiss, Douglas, Goodyear, and Northrop submitted entries; Bell, Convair, and Goodyear were eliminated quickly due to performance deficiencies. Curtiss submitted a large four jet design based on the XA-43 attack jet design they had been working on for a different ground attack specification. Douglas submitted a land-based version of their F3D Skyknight, and Northrop submitted three designs- a refined version of the P-61 Black Widow, one based on the XP-79 flying wing fighter, and an all-new twinjet design.
The political winds of change meant that the USAAF favored Curtiss heavily for the reasons that the previously dominant aircraft manufacturer had no contracts to sustain it in the postwar period and no civilian designs readily available for the growing passenger market. What was left of the funding for the XA-43 project was used to contract with Curtiss for prototypes of their design to be designated the XP-87. But the USAAF was sufficiently interested in Northrop's all-new twinjet design to contract for prototypes of that design as well to be designated XP-89. The USAAF also contracted with Martin Aircraft for a nose mounted turret that would allow the cannons to be swiveled to off-center targets that was to be fitted to both the XP-87 and XP-89.
The XA-43. Note the differences from the XP-87 design.
(The Unwanted Blog at up-ship.com)
The designation XA-43 is often and mistakenly used interchangeably with the XP-87 designation- they were in fact two different aircraft that only resembled each other in basic layout. The XA-43 had a tandem cockpit, oval cross-section nacelles that were mounted inline with the wing, and was 65% larger than the XP-87 which had a side-by-side cockpit, rectangular nacelles under the wing. The XA-43's horizontal tail was low set and the design also featured a tail gun. The fact that the first XP-87 prototype was contracted with XA-43 funding led to the confusion that still is seen to this day. The XA-43 was ordered in November 1944 for a jet-powered ground attack bomber but it soon outgrew its proposed powerplants. By the time of the all-weather fighter RfP, the USAAF had lost interest in the XA-43 and allowed Curtiss to redirect its XA-43 efforts to the XP-87. But since policy of the time dictated two prototype aircraft in case of the loss of one, the original XA-43 contract was amended to allow for the construction of a second XP-87 prototype. In August 1946 Curtiss requested to name the XP-87 the Bat, but as there was already a US Navy glide bomb called the Bat, the request was turned down and a month later the XP-87 was given the name Blackhawk.
By 1947 a review was underway to determine which of the fighters under development at the time might be suitable as a tactical reconnaissance aircraft- due to the size and carrying capacity of the XP-87, it was decided that it would also be developed into a reconnaissance version designated the RP-87. In order to not slow down the development, Curtiss was to complete both prototypes as all-weather fighters and then convert the second aircraft into the reconnaissance configuration at the completion of the prototype flight tests. In June 1947 Curtiss raised concerns with the USAAF on the power output of using four Westinghouse J34 engines in the paired nacelles and suggested changing to the Allison J33 as a single J33 engine had the power of two J34s not to mention the simplification of maintenance having only two engines instead of four. The change was approved for the production model but the prototypes would be completed with the four J34 engines.
Only the XP-87 prototypes were to have four paired engines
(USAF Museum)
The first prototype was built at Curtiss' production facility in Columbus, Ohio, that once housed wartime production of the SB2C Helldiver. Taxi testing and ground tests took place at Columbus, but the USAAF wanted all flight testing to occur at Muroc AAF (later renamed Edwards AFB) in California. The first XP-87 was partially disassembled and loaded onto a trailer for transport to California- on going under the first highway overpass near the Columbus plant, the height was misjudged and the vertical fin hit the overpass, resulting in significant damage. With the damaged fin removed, he convoy headed out again and outside of Tulsa, Oklahoma got into an accident that damaged the nacelle for the left two engines. It was felt repairs could be made at Muroc and after month, the convoy reached the base where a new vertical fin and a team of engineers were waiting to repair the prototype. The first flight was finally made on 1 March 1948 on a reasonably uneventful 58-minute maiden flight. The next several flights discovered buffeting in the tail due to it having a lower critical Mach number than the rest of the aircraft. Curtiss proposed a redesigned swept empennage for the production aircraft that was also duly approved by the USAAF. A total of 55 contractor test flights were made with the Blackhawk prototype and the flights confirmed the need to change to the Allison J33 on the production fighter- the Westinghouse J34s were unreliable and needed constant repair and replacement. By the time of the next series of flights with service test pilots, the USAAF was now the US Air Force and the first USAF flights were made on 3 June 1948. A week later the USAF placed a preliminary order for 57 P-87B Blackhawks (J33 engines and swept empennage were features of the production "B" version) and 30 RP-87B photo-recon aircraft. The following day the USAF switched from P-for-pursuit to F-for-fighter, the Blackhawk becoming the XF-87.
The now-designated XF-87 from the rear
(USAF Museum)
After 19 USAF test flights, a recommendation was made to Curtiss for a slightly larger wing to help reduce the stall speed and it was agreed that the second prototype XF-87 under construction would have the larger wing, the J33 engines, the swept empennage and reconnaissance modifications and would be designated XF-87C. In October 1948 the USAF held a fly-off evaluation with the XF-87 Blackhawk prototype, the Northrop XF-89 which got the name Scorpion, and a borrowed Navy F3D Skyknight to represent the Douglas submission as it was felt the Douglas design was close enough to the production Skyknight that it could act as a stand-in. With pilots of the Air Defense Command participating, while the XF-87 Blackhawk and F3D Skyknight had their strong points (side-by-side seating being one of the strongest suits of both designs in the opinion of the ADC pilots), the Northrop XF-89 Scorpion came out overall ahead in the evaluation and it was selected for production as having the best development potential.
It was a crushing blow for Curtiss-Wright as the XF-87 was its only postwar jet design to take to the air. The Navy had canceled the XF15C mixed-propulsion fighter a few years earlier after only three examples were built. The company, in effect, was betting its future as an aircraft manufacturer on the XF-87 Blackhawk. The first prototype was ferried to Wright-Patterson AFB in Ohio in December 1948 and was eventually scrapped by 1950. The second unfinished prototype was never completed and what was done got parted out for other projects that the company was attempting. With no other designs in advanced development, Curtiss-Wright was forced to shut down its Airplane Division and its assets were sold to North American Aircraft and the Columbus plant would be used for the manufacture of the F-86 Sabre. Curtiss-Wright's propeller division remained active into the 1960s and was responsible for the X-19 radial lift test aircraft. Some feel the X-19 was Curtiss' last aircraft design, but in reality it was the XF-87 Blackhawk that represented the end of the line for Curtiss-Wright Aircraft, a company that just ten years earlier was one of the dominant aircraft manufacturers of the United States.
Source: Experimental & Prototype U.S.Air Force Jet Fightersby Dennis R. Jenkins and Tony R. Landis. Specialty Press, 2008, p95-101.
No comments:
Post a Comment
|
Interface Essentials
Most iOS apps are built using components from UIKit, a programming framework that defines common interface elements. This framework lets apps achieve a consistent appearance across the system, while at the same time offering a high level of customization. UIKit elements are flexible and familiar. They’re adaptable, enabling you to design a single app that looks great on any iOS device, and they automatically update when the system introduces appearance changes. The interface elements provided by UIKit fit into three main categories:
Bars. Tell people where they are in your app, provide navigation, and may contain buttons or other elements for initiating actions and communicating information.
Views. Contain the primary content people see in your app, such as text, graphics, animations, and interactive elements. Views can enable behaviors such as scrolling, insertion, deletion, and arrangement.
Controls. Initiate actions and convey information. Buttons, switches, text fields, and progress indicators are examples of controls.
In addition to defining the interface of iOS, UIKit defines functionality your app can adopt. Through this framework, for example, your app can respond to gestures on the touchscreen and enable features such as drawing, accessibility, and printing.
iOS tightly integrates with other programming frameworks and technologies too, such as Apple Pay, HealthKit, and ResearchKit, enabling you to design amazingly powerful apps.
|
Mount Johnson, a member of the Monteregian Hills petrographic province in Quebec, is a cylindrical, pluglike intrusion in which the silicic peripheral unit (pulaskite) appears to have been emplaced prior to the more mafic transition and core units (essexite). Liquid immiscibility has been invoked to explain this emplacement sequence. The partitioning of trace elements between ocelli-matrix pairs (which have been shown to be the result of liquid immiscibility) from two Monteregian sills is compared to the partitioning of the same elements between peripheral-unit rocks and transition-unit rocks at Mount Johnson. In general, the low-field strength elements are relatively enriched in the silicic material and the high-field strength elements are relatively enriched in the mafic material. The distribution of the trace elements is quite similar for the sills and Mount Johnson. It is concluded that two magmas were involved in the formation of Mount Johnson. The first magma split into two immiscible liquids to form the peripheral-unit and transition-unit rocks, and the second magma was subsequently intruded up the center of the conduit to form the core-unit rocks.
You do not currently have access to this article.
|
>Medieval Catholics or Christians?
In one case, the book is by a British scholar writing for a British press, and I suspect the practice is standard to both, and reflects all sorts of legacies of the Reformation still alive and well, if muted, in England. In this case, the word signals something like ‘In the Middle Ages, they were Catholic. Now we are proper English Protestants.”
In the other case, the book is published by the Catholic University of America Press, so if it’s house style, it’s of a different ilk, claiming continuity rather than difference. But actually, flipping about, I see this author uses the generic “Christian” more often and seems only to rely on “Catholic” when needing to distinguish it from Reformation denominations and practices.
But I have to say, I’ve always found the use of “Catholic” with a capital C anachronistic for the Middle Ages, especially if all or most of what you’re talking about in a work is the Middle Ages, so both of these examples strike me as wrong in some way. Not hugely, grossly wrong, but wrong in the way a slightly out of tune piano note is wrong — something’s off.
But maybe that’s just me. What are your preferences and practices?
7 thoughts on “>Medieval Catholics or Christians?
1. >”Catholic” is wrong for the MA. Alternatives are “medieval Latin church,” “medieval Roman church,” or “Old Church.”
2. >I much more prefer discussing these ideas in terms of medieval Christianity (both in that time period and as part of the continuity across time) and the medieval church (as a broad community). Because the Latin medieval (precursor to the now deemed Roman Catholic) church was the dominant and orthodox view, it doesn’t really seem necessary to differentiate it with the term of “C”atholoic–unless dealing with sects, heresies, etc., which get their own designations anyway.
3. >I teach a lot of medieval and early modern religious history, and so that probably skews my perspective, but I’m fine with capital C catholicism for the MA. My own work is in the Ref era, where that usage is meaningful, but I find my students have enough trouble differentiating various forms of Protestantism, much less keeping straight the differences between medieval Christianity and Catholicism. So if these books are intended for classroom use, I wouldn’t mind; if they aren’t, though, Christianity would be more appropriate.
4. >Slightly on a tangent: I teach music history from the MA through the 21st century. I can’t think of a single music history text that refers to the “Catholic” church…until the Reformation, of course.
5. >I’m an early modernist but I’m also the resident premodernist so I teach the entire range of eras. I usually use “medieval church”, “medieval Latin church” or “medieval western Christendom” to talk about these subjects. I try to drill into my students’ heads that while we can use the term “catholic”, it’s not the same thing as “Catholic” (which has a very politicized meaning after the Reformation takes hold). It would really distress me to read a book about medieval European religion that tossed around “Catholic” a fair bit unless it was to distinguish theological ideas and religious practices from heretical ones (and, even then, I’d vastly prefer orthodox to Catholic).
Add to the Discussion
WordPress.com Logo
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
|
Nicole Piela, PT, DPT teaching Stockton PT students
Medial Tibial Stress Syndrome, commonly known as shin splints, is the inflammation of the muscles, tendons and tissues that surround the tibia. It is very common in runners, dancers and those that participate in high impact activities
Shin Splints can be caused by repetitive motion, flat feet and weakness of muscles in the core, hips or ankles. A common sign of shin splints is pain on the inside of the tibia, either when it is pressed on or during the activity.
“It is really important that people listen to their bodies and stop doing the activity they are doing if they are experiencing pain,” said Nicole Piela, PT, DPT, a physical therapist at Bacharach’s Mays Landing campus. “Rest and ice will be their best friend, at first, and if they realize that they aren’t seeing improvement they can go to a physical therapist to address the issue.”
Physical therapists treat shin splints by assessing the pain and figuring out what causes it. They conduct an analysis of the patient’s gait, ankle flexibility including calf tightness and strength of the patient’s lower extremities and core. Treatment plans are individual to each patient, but usually include stretching and strengthening exercises, manual therapy such as mobilizations and kinesiotape.
shin splint
“Once the warm weather rolls around we tend to see an increase in shin splint patients—especially in younger adults because they are the ones constantly running or doing CrossFit activities,” said Nicole. “People tend to jump back into their activities without proper stretching or footwear.”
If shin splints are ignored and repetitive activities are not stopped they can turn into stress fractures of the tibia, tendonitis and, in severe cases, chronic exertional compartment syndrome, which occurs when pressure builds up in the muscles. If the pain associated with shin splints persists, a physical therapist should be consulted.
“Self-diagnosis is becoming very popular and because of direct access, physical therapists can be the first line of defense for patients experiencing pain,” said Nicole. “With direct access our patients don’t need to see a doctor before being evaluated by a physical therapist. Obtaining access to treatment sooner can help to speed up the whole recovery process.”
Shin splints can be prevented by properly stretching before and after a workout, gradually easing into each workout program, using proper equipment correctly and monitoring how the body is responding to each exercise.
More News
|
Algebra 1
posted by .
Can someone tell me the x- and y- intercepts of: x+y=9
Explain how you got the answer please.
• Algebra 1 -
not enough mathematical equation to answer your question but u can solve it by using a graph.....
• Algebra 1 -
The x intercept is 9, and the y intercept is 9. Just plug in 0 for x to get y and 0 for y to get x!
Respond to this Question
First Name
School Subject
Your Answer
Similar Questions
1. algebra
the equation is : - (2x + 3)-(4 + x). Using the distributive property, my friend got the answer -7 - 3x. I have been fiddling with this problem for 3 hours and don't understand how he got this answer. Can someone please thoroughly …
2. Algebra
Can someone please tell me what the domain of the following equation is?
3. 8th Grade Algebra-Radicals:Answer Check
Write each expression in simplest form. ( means square root 4. 3(11 + 4(11 Answer: 8(11 7. 7(2 - 2(8 Answer: 1(2 ?
4. algebra
Will someone please look over these? I am so lost on these. 1. find the domain of p(x)=xsquared+10- I said {x|x is a real number 2. find the intercepts of 3x+2y=6- I got (0,3) and (2,0) 4.find the equation of (-6,-6)and (6,6)- got
5. Algebra 2 honours
can someone please tell me how to factor out (x^6+1)^4?
6. trig
7. PreCalculus
I'm trying to find the x-intercepts of a polynomial function = 4x^4-3x^3-6x^2+2x+6. I don't want anyone to solve it, could someone please just tell me how to start factoring this so I can find the x-intercepts, I'm lost.
8. Algebra 2
Determine the x-intercepts of the f(x)= (x-2)(x+3)(x-7) Please explain, I don't know if I did it right. I got 2, -3, 7
9. math/ algebra 1
10. Math
Half of a pizza was broccoli and half was mushroom. George ate 2/3 of the broccoli and 1/4 of thee mushroom part. How much of the pizza did he eat?
More Similar Questions
|
Dismiss Notice
Join Physics Forums Today!
Normal mode and eigenfrequency
1. Aug 11, 2008 #1
What is the difference between eigenfriquency and normal mode? If, for example, I solve the secular equation (from the equations of motion) for a mechanical system (say two masses on springs) to obtain the eigenvalues I thought I got the normal modes, but now Im told I get the eigenfrequencies..`?
Thanks for any help to enlighten me on this matter.
2. jcsd
3. Aug 12, 2008 #2
The normal modes are the eigenvectors, the eigenvalues are what are also known as eigenfrequencies. Example Af=wf, where A is your operator (could be differential like d/dx etc), f is a function, w is the eigenvalue/eigenfrequency. If you solve this to find the functional form of f, then you have obtained the normal modes or eigenvectors as theyre also known. For each function f you find, you will also get a value of w.....f1:w1, f2:w2 etc, these values of w are the eigenfrequencies.
So for the equations for two masses on a spring, the functions that describe the motion of the masses, and their amplitudes of vibration are your normal modes . To each of these normal modes will correspond a frequency of vibration, the eigenfrequency.
4. May 17, 2009 #3
nice explanation
5. Jul 6, 2009 #4
It nice explanation :-)
I hve question.. what about the Transverse frequency, which systems ossillate if some electromagnetic radiations (e.g light) shines on the material.
Best regards
Similar Discussions: Normal mode and eigenfrequency
1. Normal Modes (Replies: 7)
2. Normal mode (Replies: 2)
|
Dismiss Notice
Join Physics Forums Today!
Units Help
1. Jun 10, 2006 #1
Hey all,
this is my first post here, I have just discovered the site, and it looks great :smile:
I need some help on units, regarding square roots.
When you find the reciprocal of a quantity, like say, mass, the new unit is kg-1.
I'm not sure about when you find the square root of a quantity, what unit would it be?
2. jcsd
3. Jun 11, 2006 #2
User Avatar
Science Advisor
Homework Helper
When you take the square root of a physical quantity you get the square root of the units as well.
4. Jun 11, 2006 #3
Thanks Tide!
I'm investigating the relationship between time and mass, and I think I've got it, time is proportional to the square root of mass, but what on earth does the gradient mean?
time is on the y-axis, square root of mass is on the x-axis
5. Jun 11, 2006 #4
User Avatar
Science Advisor
Homework Helper
"Gradient" generally refers to (rate of) change with respect to spatial position. If you could provide more detail on the problem you are trying to solve then we could offer more clarification.
6. Jun 12, 2006 #5
User Avatar
Staff Emeritus
Science Advisor
How did you arrive at the idea that "time is proportional to the square root of mass"? I imagine that you have some formula in which something, say a raindrop, is accumulating mass as it falls. In that case, I would be more inclined to say "mass is proportional to the square of time". In order for that to make any sense, your constant of proportionality would have to "fix" the units:
For example, if we have m= ct2, mass is measured in kg and time in seconds, then we have kg= c*sec2 so c must have units of kg/sec2 in order to "cancel" the sec2 and introduce kg into the formula.
Yes, you could also write [itex]t= c\sqrt{m}[/itex] in which case c must have units of [tex]\frac{sec}{\sqrt{kg}}[/tex]. While mathematics does not deal in "cause and effect", physics does. As soon as you introduce "mass" and "time", it makes more sense to me to think of time as the independent variable and mass as the dependent variable!
Notice that just because you can do a mathematical operation doesn't mean it will make physical sense! If A= x2, where A is the area of a square of side length x, then [itex]x= \sqrt{A}[/itex]. Now, there, of course, A would have to be measured in something like "square inches" or "square meters" and, of course, [itex]x= \sqrt{A}[/itex] would me measured in "inches" or "meters". That's why, in formulas, we typically write "square meters" as "m2" or "square inches" as in2.
On the other hand, I would not expect to have any physical quantity with units of [itex]\sqrt{m}[/itex] or [itex]\sqrt{kg}[/itex]. In the examples above, your constants (which may not be "physical" quantities) had to change the units appropriately
|
Wednesday, 23 December 2009
Reason & Practises of Muharram
بِسۡمِ ٱللهِ ٱلرَّحۡمَـٰنِ ٱلرَّحِيمِ
Muharram is the first month of the Islamic calendar. It is one of the four sacred months of the year in which fighting is prohibited. Muharram is derived from the word ‘haram’, meaning ‘forbidden.’ It is called such because it is unlawful to fight during this month. ‘Haram’ also has the connotation of sacred. It is the most sacred of all the months, excluding Ramadhan. Some Muslims fast during these days. The tenth day of Muharram is called 'Ashura, meaning ‘tenth’.
Allah (s.w.t.) Described the Prophet (s.a.w.) as Mercy to all the Worlds:
Further, He Said:
And thou (standest) on an exalted standard of character. (Surah al-Qalam:4)
If we follow the way of Muhammad (s.a.w.), we will never see difficulties. If we follow our desires, we find problems in our life. We try to save ourselves by following what the Prophet (s.a.w.) brought. What changed the life of the universe was the migration from Makkah to Madina. Muharram is the month Allah (s.w.t.) Ordered the Prophet (s.a.w.) to move to Madina to establish the infrastructure of the state and the khilafah. It was in this month that Allah (s.w.t.) Gave a place to the Prophet (s.a.w.) from which Islam spread.
When the Prophet (s.a.w.) arrived at Yathrib or Tha’iyyabah as it was also known then, he found the Jews fasting the tenth of Muharram. He asked, “Why are they fasting on this day?”
They replied, “Because on that day, Allah Saved Musa from Fir’awn.”
And the Prophet (s.a.w.) fasted that day and ordered the Muslims to fast that day. Imam Muslim (r.a.) narrated in one of the hadits of ‘Ashura, that the Prophet (s.a.w.) said that whoever fasts that day, will be Forgiven all the sins of the previous year.
Imam Abu Hanifah (r.a.) said, “That day was an obligatory fast in the beginning of Islam.”
Imam Shafi`i (r.a.) said, “It is a sunnah to fast it but not obligatory.”
Imam Abu Hanifah (r.a.) said that it was an obligation to fast this day in the first decade of Islam. But it is important to remember that Allah (s.w.t.) will Waive one year’s sins we have committed. This is a Mercy that Allah (s.w.t.) Sent to us.
ibn ‘Abbas (r.a.), the greatest mufassir of Qur’an, said that the Prophet (s.a.w.) fasted the day of ‘Ashura because of its importance and he ordered the people to fast it. This is recorded in Swahih al-Bukhari and Swahih Muslim.
Abu Sa’id al-Khudri (r.a.) related that the Prophet (s.a.w.) said, “Whoever fasts the day of ‘Ashura, Allah (s.w.t.) will Waive the preceding year’s sins and the following year’s sins.”
The reason for this is because on that day, Allah (s.w.t.) Honoured many prophets. According to some narrations and according to Sufi tradition, it is a Day when the Gates of Allah’s (s.w.t.) Mercy are Opened. Here is a summary of some of the events that took place on this day for this is the day of Deliverance, especially for the prophets of Allah (s.w.t.). Allah (s.w.t.) Chose Adam (a.s.) to be father of humanity on that day. Adam (a.s.) was Forgiven his sin after the Fall. He Raised Idris (a.s.) to Heaven. He Saved Nuh (a.s.) with his people in the ark. He Saved Ibrahim (a.s.) from the fire of Namrud. Ayyub (a.s.) was Delivered from his Test and Healed from his afflictions. Yunus (a.s.) was Freed from the three layers of darkness. Musa (a.s.), Harun (a.s.) and the Children of Isra’il were Delivered from Fir’awn’s army and crossed the Red Sea. Yusuf (a.s.) was freed from prison. Ya’qub’s (a.s.) blindness was Cured after Yusuf’s (a.s.) shirt was thrown over his eyes. He Forgave Dawud (a.s.) for his lapse of judgement. Sulayman (a.s.) was Restored to his kingdom. He Raised ‘Isa (a.s.) to Heaven and Saved him from crucifixion. And on that day, our Messenger, the Seal of Messengers whom Allah (s.w.t.) Chose, married Khadijah (r.a.) and He Made him migrate to Madina on that day. And He Created the heavens and earth on that day and He Created the Pen, al-Qalam, on that day. And that day was always a Friday.
Imam al-Hamadani (r.a.), one of the greatest muhadditsin, related that when Allah (s.w.t.) Ordered Nuh (a.s.) to build his ship, he built it from 124,000 planks. And we know in the tafsir of ibn ‘Abbas (r.a.) regarding Surah al-A’araf, that Allah (s.w.t.) Sent 124,000 prophets, and among them were 313 messengers. When Nuh (a.s.) began to put each plank in place, the names of the prophets appeared on them. When he reached one plank, number 123,999, the name of Muhammad (s.a.w.) appeared on plank 124,000. Nuh (a.s.) knew that he was the last prophet. He then needed four more planks to complete the ship. As soon as he put these, the names of the four rightly-guided caliphs appeared on those planks. Allah (s.w.t.) Said to him, “For the sake of Muhammad, I will Save this ship.” Imam al-Hamadani (r.a.) said, “For Allah’s Love of them, He Put their names on that ship.” Whoever loves the Prophet (s.a.w.) and his companions, Allah (s.w.t.) Loves them.
The following are some of the ahadits on Muharram.
ibn ‘Abbas (r.a.) narrated that the Prophet (s.a.w.) said, “Whoever fasts the last day of Dzu al-Hijjah and the first day of Muharram, he completes a whole year's worth of fasting in that previous year, and Allah Gives him penance for fifty years.”
Anas (r.a.) narrated that the Prophet (s.a.w.) said, “Whoever fasts the first Friday of Muharram, Allah will Forgive his preceding sins, and whoever fasts three days of Muharram - Thursday, Friday, and Saturday, Allah will Write for him worship and prayers for nine hundred years.”
‘Aishah (r.a.) narrated that the Prophet (s.a.w.) said, “Whoever fasts the first ten days up until ‘Ashura, he will inherit Jannah al-Firdaws.”
The fasting of 'Ashura is a sunnah al-mu`akkadah. When the Prophet (s.a.w.) saw the Jews of Madina fasting on that day, he asked them for what it was. They told him it was the day Musa (a.s.) led the Bani Isra`il from Fir’awn. The Prophet (s.a.w.) said to them, “I have more rights with Musa than you.” So he fasted that day and ordered for its observance. This was part of a longer narration from ‘Aishah (r.a.).
The Prophet (s.a.w.) said, “Whoever fasts the ‘Ashura, Allah will Write for him a thousand wishes and a thousand years of age, and will Grant him the Reward of a thousand martyrs, and will write for him the reward of Isma’il, and Write for him seventy palaces in Paradise, and makes his flesh forbidden from the Hellfire.”
In another hadits, the Prophet (s.a.w.) said, “Whoever fasts on 'Ashura, he will be Granted the Reward of a thousand angels. And whoever recites ‘Qul Huwa Allahu Ahad’ a thousand times on the day of ‘Ashura, Allah will Glance at him with the Eyes of Mercy, and will Write him from amongst the Swiddiqqin.”
In another hadits, the Prophet (s.a.w.) said, “Distinguish yourselves from the Jews by fasting either the day before 'Ashura or the day after it as well.”
Whoever prays in ‘Ashura, four sunnah rak’ah, where after Surah al-Fatihah in each rak'ah recites Surah al-Ikhlasw eleven times, Allah (s.w.t.) Forgives his sins of fifty years, and will Build for him a pulpit from light. And whoever takes the sunnah shower on 'Ashura, he will not suffer sickness in that year except the illness of death, and whoever wears the kohl on his eyes on ‘Ashura he will not suffer sickness on that year.
1 comment:
|
Fascinating Photos Collected From History
March 22, 2017 | No Comments » | Topics: Interesting
Thelonius Monk, 1959
Members of the Harlem Hellfighters in 1919
The “Harlem Hellfighters” were the first African American regiment in WWI who were assigned to the French forces. None were captured, never lost a trench, or a foot of ground to the enemy. They returned to the U.S. as one of the most successful regiments of World War I
Shortest, tallest and fattest men in Europe play cards. 1913
A 17-year old Frida Kahlo poses for a family photo wearing a traditional gentleman’s 3-piece suit, 1924
8th grader Kurt Cobain playing drums at an assembly at Montesano High School, 1981
Earliest known photo of Elvis Presley, with parents Gladys & Vernon in 1938
Samurai in Training, 1860
Enlisted men aboard an American ship hear the news of Japan’s surrender. 1945
A photo taken in secret of the Supreme Court in session, one of only two ever taken. 1932
The only known photograph of Abraham Lincoln at Gettysburg, before giving his famous address. November 19, 1863
A large crowd, made up of many African Americans, mourn the death of Abraham Lincoln outside the Courthouse in Vicksburg, Mississippi
Albert Einstein and Charlie Chaplin, 1931
In 1939 20,000 Nazi supporters held a rally in Madison Square Garden
Times Square, 1957
Paper boys at 2 A.M. about to start their morning rounds. February 12, 1908
The Mona Lisa stolen from the Louvre, 1911
Two years went by before the true culprit was discovered, an Italian petty criminal called Vincenzo Perugia who had moved to Paris in 1908 and worked at the Louvre for a time. He went to the gallery in the white smock that all the employees there wore and hid until it closed for the night when he removed the Mona Lisa from its frame. When the gallery reopened he walked unobtrusively out with the painting under his smock, attracting no attention, and took it to his lodgings in Paris.
Perugia apparently believed, entirely mistakenly, that the Mona Lisa had been stolen from Florence by Napoleon and that he deserved a reward for doing his patriotic duty and returning it to its true home in Italy. That was what he said, at least. Many Italians welcomed the masterpiece home; people flocked to see it for a time at the Uffizi Gallery, some of them weeping with joy, and Perugia served only a brief prison sentence. The great painting was duly returned to the Louvre and has hung there safely and enigmatically ever since.
A war-weary French woman pours a British soldier a cup of tea during the fighting following the Allied landings in Normandy. 1944
Adolf Hitler speaking with Princess Olga of Yugoslavia, 1939
Men working in the rigging of the three-masted steel barque Garthsnaid, 1920
Prince Charles and Princess Diana on vacation in Bahamas, 1982
Share on Facebook0Tweet about this on TwitterShare on StumbleUpon0Email this to someone
|
How We Get Schools Wrong
Failure to recognize the importance of networks
Overconfidence in Curriculum, Testing, and the Educational Machine
Confusion about what “school” actually is
Confusion and guilt about the role of teachers
Politicization of education
Over-reliance on causal thinking
Vestigial artifacts
How we might move forward
The old model simply doesn’t know it’s obsolete.
How Crime and Education Will Fix Themselves
When I was about four years old, my parents asked me what I wanted to be when I grew up. My response? A cashier. Why? They were the ones who got handed all the money.
Today, when people cite crime and education as the two major problems facing America’s cities, the knee-jerk response is to “protect city education budgets” and “put more cops on the street.” This is the same kind of simplistic logic I used as a child, and it’s just as wrong.
If this was how things worked, the safest cities in the world would be populated entirely by police, and the highest levels of education would be attained by those countries who spent the most on teachers and schools. This also is not true. Excluding repressive regimes, the areas with the least crime and most educated populations tend to be places where all citizens have access to the same opportunities.
Access to Opportunity
The new film by Davis Guggenheim, “Waiting for Superman,” chronicles a year or so in the life of a handful of students of different backgrounds as they struggle to get access to the educational resources they need to thrive. The heart-wrenching conclusion shows these kids – all but one – get denied that opportunity by a system that is clearly broken and unfair. 720 applicants, 15 spots. You get the picture.
If America is going to have a public school system, this kind of unfairness should not be tolerated. What happens to the kids that don’t get into the schools that can help them thrive? Should people have equal opportunity? Most people would say “yes.”
How We Got Here
Economic vitality is a kind of spotlight: it shines a light on things that need fixing, and provides the funds and political power to do so. Since our cities were torn apart by race riots and the global consolidation of manufacturing, the resulting precipitous decline in economic health has meant that cities have operated substantially in the dark. Watchdogs have been absent, and grassroots efforts have been underpowered.
American cities have reached a kind of feudal equilibrium. Politicians in power have little incentive to promote the kind of broad-based economic growth that could ultimately result in their ouster, but they can’t let things deteriorate so badly that everyone leaves – also stripping them of their power. And so American cities walk the line: with crime, schools, drug use and taxes locked at levels that are tolerable to just enough people that they are still worth milking, all while politicians hand out favors to power-brokers and childhood friends. Enough.
Ending the Abuse, from the Bottom Up
I wrote in my previous post that cities are now prime locations for idea-based industries. Over time this will mean an influx of wealth into cities as well as an increase in poorer populations in the suburbs.
Economic vitality in our cities borne from idea-based industries will result in a demand for accountable leadership and provide new levels of participation. In short, the feudalism will end when creative people begin to use their economic power to demand real change. The 40 year free ride is over.
Too many people in cities have resigned themselves to the idea that politics is a top-down enterprise — that it’s primarily influenced by the machine, by power-brokers, by community leaders, or by churches. Or that there’s a “turn based system,” where everyone who serves is given an equal shot unless they do something wrong.
That’s just wrong. American city politics from now on will be a bottom-up grassroots affair dictated not by the economics of writing checks to campaigns, but by the interdependent economics of jobs and a shared vision for the future of places that people care about.
Restoring Trust
To be workable, all power relationships must be a compact founded on shared values. Kids trust teachers that have their best interests at heart. Citizens trust cops who behave consistently and fairly. People trust politicians who put the civic interest ahead of their own.
There is nothing that ails us that cannot be fixed by restoring these trust relationships.
In “Superman,” Guggenheim asserts that bad teachers are kept around out of a “desire to maintain harmony amongst adults.” It’s difficult to stand up and fight to end someone’s teaching career, but it’s what’s required. To fail to do so is immoral.
It’s easier to keep getting a paycheck than to make enemies. And certainly there are dozens of systemic problems that make firing teachers very difficult. But that’s all that’s wrong with our schools, our police and our politicians: a simple failure to defend our core values.
And if we cannot agree on those core values – if a desire for personal gain exceeds a willingness or ability to serve the public – then those people deserve to be called out.
The Game Is Up
To be an old-school politician in a major American city today is to be in the way of a major cultural shift. Idealistic, intelligent, educated millennials armed with 21st century political weapons are coming, and they are going to ask why?
Why is the city so screwed up? Why are these jokers in power? Why are these incompetent teachers shuttled between schools? Why is more money spent on development deals for cronies than on parks? And why the hell can’t we clean up the blight that makes any trust or pride impossible?
Should we spend more money on schools or police? More than likely, all we need to do is let smart young people start asking questions. Crime and education take care of themselves if those that have violated the public trust can be removed from power. And with a little attention and common sense, we can ensure that more kids have a shot at the same opportunities.
Because in the end, crime, education, and blight are really just one problem, and it can be cured at least as quickly as it developed.
Will That Be on the Test?
The American educational system deadens the soul and fuels suburban sprawl. It is designed as a linear progression, which means most people’s experience runs something like this:
1. Proceed through grades K-12; which is mostly boring and a waste of time.
2. Attend four years of college; optionally attend graduate/law/med school.
3. Get a job; live in the city; party.
4. Marry someone you met in college or at your job.
5. Have a kid; promptly freak out about safety and schools.
6. Move to a soulless place in the suburbs; send your kids to a shitty public school.
7. Live a life of quiet desperation, commuting at least 45 minutes/day to a job you hate, in expectation of advancement.
8. Retire; dispose of any remaining savings.
9. Die — expensively.
Hate to put it so starkly, but this is what we’ve got going on, and it’s time we address it head-on.
This pattern, which if you are honest with yourself, you will recognize as entirely accurate, is a byproduct of the design of our educational system.
The unrelenting message is, “If you don’t go to college, you won’t be successful.” Sometimes this is offered as the empirical argument, “College graduates earn more.” Check out this bogus piece of propaganda:
But what if those earnings are not caused by being a college graduate, but are merely a symptom of being the sort of person (socioeconomically speaking) who went to college? People who come from successful socioeconomic backgrounds are simply more likely to earn more in life than those who do not.
There’s no doubt that everyone is different; not everyone is suited for the same kind of work — thankfully. But western society has perverted that simple beautiful fact — and the questions it prompts about college education — into Not everyone is cut out for college,” as though college was the pinnacle of achievement, and everybody else has to work on Diesel engines or be a blacksmith. Because mechanics and artists are valuable too.
That line of thinking is the most cynical, evil load of horse-shit to ever fall out of our educational system. Real-life learning is not linear. It can be cyclical and progressive and it takes side-trips, U-turns, mistakes, and apprenticeships to experience everything our humanity offers us.
The notion that a college education is a safety net that people must have in order to avoid a life of destitution, that “it makes it more likely that you will always have a job” is also utterly cynical, and uses fear to scare people into not relying on themselves. Young people should be confident and self-reliant, not told that they will fail.
And for far too many students, college is actually spent doing work that should have been done in high school — remedial math and writing. So, the dire warnings about the need for college actually become self-fulfilling: Johnny and Daniqua truly can’t get a job if they can’t read and write and do math. See? You need college.
An Education Thought Experiment
I do not pretend to have “solutions” for all that ails our educational system. But as a design thinker, I do believe that if our current educational system produces the pattern of living I noted above, then a different educational system could produce very different patterns of living — ones which are more likely to lead to individual happiness and self-actualization.
If we had an educational system based on apprenticeship, then more people could learn skills and ideas from actual practitioners in the real world. If we gave educational credit to people who start businesses or non-profit organizations, and connected them to mentors who could help them make those businesses successful, then we would spread real-world knowledge about how to affect the world through entrepreneurship.
If more people were comfortable with entrepreneurship, then they would be more apt to find market opportunities, which can effect social change and generate wealth. If education was more about empowering people with ideas and best practices, instead of giving them the paper credentials needed to appear qualified for a particular job, it would celebrate sharing ideas, rather than minimizing the effort required to get the degree. (My least favorite question: “Will that be on the test?”)
Ideally, the whole idea of “the degree” should fade into the background. Self-actualized people are defined by their accomplishments. A degree should be nothing more than an indication that you have earned a certain number credits in a particular area of study.
If the educational system were to be re-made along these lines, the whole focus on “job” as the endgame would shift.
And so if the focus comes to be on living, as Emerson suggested it should be, and not simply on obtaining the job (on the back of the dubious credential of the degree), then the single family home in the suburb becomes unworkable, for the mortgage and the routine of the car commute go hand-in-hand with the job. They are isolating and brittle, and do not offer the self-actualized entrepreneur the opportunity to meet people, try new ideas, and affect the world around them.
The job holder becomes accustomed to the idea that the world is static and cannot be changed through their own action; their stance is reactive. The city is broken, therefore I will live in the suburbs. The property taxes in the suburbs are lower, so I will choose the less expensive option.
Entrepreneurial people believe the world is plastic and can be changed — creating wealth in the process. But our current system does not produce entrepreneurial people.
Break Out of What’s “Normal”
It may be a while before we can develop new educational systems that produce new kinds of life patterns.
But you can break out now. You’ve had that power all along. I’m not suggesting you drop out.
But I will say this: in my own case, I grew up in the suburbs, went to an expensive suburban private high-school — which I hated — where I got good grades and was voted most likely to succeed.
I started a retail computer store and mail order company in eleventh grade. I went to Johns Hopkins at 17, while still operating my retail business. Again, I did well in classes, but had to struggle to succeed. And no one in the entire Hopkins universe could make sense of my entrepreneurial aspirations. It was an aberration.
I dropped out of college as a sophomore, focused on my business, pivoted to become an Internet service provider in 1995, and managed to attend enough night liberal arts classes at Hopkins to graduate with a liberal arts degree in 1996. This shut my parents up and checked off a box.
I also learned a lot. About science. About math. About philosophy, literature, and art. And I cherish that knowledge to this day.
But I ask: why did it have to be so painful and waste so much of my time? Why was there no way to incorporate that kind of learning into my development as an entrepreneur? Why was there no way to combine classical learning with an entrepreneurial worldview?
Because university culture is not entrepreneurial. And I’m sorry, universities can talk about entrepreneurship and changing the world all they like, but it is incoherent to have a tenured professor teaching someone about entrepreneurship. Sorry, just doesn’t add up for me. Dress it up in a rabbit suit and make it part of any kind of MBA program you like; it’s a farce. Entrepreneurship education is experiential.
I had kids in my mid-twenties and now have moved from the suburbs to the city because it’s bike-able and time efficient. And I want to show my kids, now ten and twelve, that change is possible in cities. I believe deeply in the competitive advantage our cities provide, and I intend, with your help, to make Baltimore a shining example of that advantage.
I don’t suggest that I did everything right or recommend you do the same things. But I did choose to break out of the pattern. And you can too.
Maybe if enough people do, we can build the new educational approaches that we most certainly need in the 21st century. This world requires that we unlock all available genius.
Learning By Accident
Play and Exploration
Learning In Spite of the System
Ideology and Indoctrination
|
a vessel propelled by paddle wheels and driven by steam.
Read Also:
• Paddle-tennis
• Paddle-wheel
noun 1. a wheel for propelling a ship, having a number of paddles entering the water more or less perpendicularly. noun 1. a large wheel fitted with paddles, turned by an engine to propel a vessel on the water n. also paddlewheel, 1805, from paddle (n.) + wheel (n.).
• Paddle worm
noun 1. any of a family of green-blue faintly iridescent active marine polychaete worms of the genus Phyllodoce, having paddle-shaped swimming lobes, found under stones on the shore
• Paddock
[pad-uh k] /ˈpæd ək/ noun 1. a small, usually enclosed field near a stable or barn for pasturing or exercising animals. 2. the enclosure in which horses are saddled and mounted before a race. 3. Australian. any enclosed field or pasture. verb (used with object) 4. to confine or enclose in or as in a […]
|
Exercise with oxygen
by Lee Elders
Associate Editor
What is EWOT?
No, it's not an action toy from the Star Wars collection.
It is Exercise With Oxygen Therapy (EWOT) and is based on the belief that while exercise is excellent for building muscles and burning calories, it can cause a faster aging rate and increase illnesses due to the oxygen expenditure versus intake. EWOT works by increasing the amount of pure oxygen taken in while exercising, which improves the body's ability to maintain its youthfulness. It's a relatively easy and inexpensive option that may assist in improving health and longevity.
You'll Need:
Oxygen generator
Stationary exercise equipment such as bike, elliptical or a treadmill
Oxygen enhances the body's ability to rebuild itself, detoxify blood, and strengthen the immune system. It will heighten your concentration, memory and alertness, sometimes in minutes.
When you breathe in high levels of oxygen while exercising the higher level in the lungs drives oxygen into the pulmonary capillaries. It also moves the circulation much faster. It is the oxygen that allows the capillaries to repair the transfer mechanism. Once this is done, more oxygen can enter the capillary wall to oxygen-thirsty tissues.
Normally, a red blood cell carries no more than 97% oxygen. Many will argue that you cannot force another 3% into the cell. This is true. However, additional oxygen is absorbed by the plasma (which carries the red and white blood cells) and is then pushed into the body's cells without the aid of the red cells. This is called the Law of Mass Action. Very little oxygen actually gets through, but if you are consistently feeding your body the extra oxygen, there will be an extensive increase in your total tissue oxygen level. The goal is to keep the oxygen level of your blood as close as you can to 100 percent.
All unhealthy germs and bacteria are weakened or killed with oxygen. Healthy bacteria are strengthened by extra oxygen. If one is suffering from headaches, hangover, migraine, stress, fatigue, cramps, jet lag, heat exhaustion, or minor aches and pains, oxygen can provide almost immediate relief. On a longer-term basis, oxygen helps strengthen cells, flush toxins and impurities out of ones blood, possibly preventing cancer from gaining a foothold as well as reduce the effects of mold. Also, if one has minor sprains or injuries, oxygen can promote the healing of these injuries resulting in faster healing times.
Studies have shown that extra oxygen helps:
Stimulate brain activity
Increase memory capacity
Boost concentration
Develop stronger alertness
Raise energy levels
Increase absorbable oxygen at altitude
Improve strength
Build endurance
Detox your blood
Reduce stress
Calm anxiety
Alleviate tension headaches
Remedy irregular sleeping patterns
Help with cardiovascular activity
Prevent lactic acid build up
Strengthen the immune system
"According to scientists, extra oxygen along with a cleansing diet can return balance to the body." --Elizabeth Baker, The Unmedical Miracle: Oxygen.
My personal experience: I have been doing EWOT now for three months. I exercise 20 min per day (4 miles) on my recumbent bike with oxygen. My blood oxygen level has maintained an exceptional 98% rate with excellent muscle tone. All I can say is WOW. Years ago when I was pumping iron, I wish I could have utilized EWOT in my regime but it is never too late to reap the benefits from exercising with oxygen therapy. EWOT is a monumental breakthrough that can benefit those aspiring to a new adventure in health.
Dynamic Living Magazine Issue Vol. 2 March/April 2011 The End
|
Saturday, July 18, 2009
Does you wiki?
I have been thinking about wiki and it's application for our classrooms at RFSD. I expect some teacher has done something like this. I imagine:
sharing technology with students in the flow of their instruction. The class is organized to work together and help document their own instruction within a wiki. Doing a unit on a subject, they add details to the reading, lecture and discussions they are having in class. Studying US Government, they take and post notes from class lectures and discussions. They contribute their own ideas and answer quetions in the content the wiki. Their contributions could include written, audio, still and video content. The wiki becomes a reference for the teacher as they expand on the lesson, make assignments, and assessments, and when they repeat the lesson next year. As an added benefit the wiki becomes a class portfolio, a measure of what they know.
I'm not sure if you can do all this on a wiki but I expect you can do most of it. Perhaps the assessment piece isn't in there. You could do some of your assessments using Google forms, like you would a poll.
In this way the class plays an important role in their own learning. They work with the teacher to build a learning community, learn the content, and produce evidence of their learning. The cool thing about the wiki is that it tracks who contributes, making work easy to find and evaluate.
Reblog this post [with Zemanta]
Friday, July 17, 2009
Technology for Instruction or Learning
As we create a vision for student learning, we should delve into our philosophy of technology. Does it follow from our philosophy of learning and teaching? How do we want students to engage with technology? Do we want to put them in pull out classes for typing and other basic proficiencies? Or do we want them to learn by doing, applying technology to their learning, picking up a computer when they need to do a task. As important as this target is, it is equally important to know when to hand students a pencil, or a blackboard, or face to face with each other; using all sorts of tools and arrangements to read, write and engage in projects. The plan to use technology should begin with a question of purpose:
1. What learning outcome are we aiming at?
2. What does the student need to know, perform.
3. What vocabulary do they need, what processes do they need to understand?
After all, we have been using tools in learning and teaching forever. Technology is a revolutionary tool for sure but it should serve our learning objectives. As we create learning experiences for students we need to explore ways to put technology into student's hands to create, communicate and collaborate.
On another note...
If we're going to put more tech in the hands of students, we need to orient them (and ourselves) to the social norms of that environment. What are our expectations for them? What are the rules for engaging each other (and anonymous people) online? Some useful topics:
Students will benefit from 21st Century tools for learning as we balance our concerns with the advantages that the tools afford. As we understand the tools we will do a better job of integrating them into the flow of instruction. Students could begin to tell us when they need a particular tool.
Reblog this post [with Zemanta]
Dream and Prayer
We're all living the same, different, existence,
reaching for a connection and fearing it's loss.
My jealousy is a reminder, a signpost to a new state of being
Where I pause, release and reframe my boundaries,
I accept that I have longing and pain,
and see it melt, see others equal and greater to mine.
Breath with this moment - let us be.
|
Jump to content
Engineer Boards
Hazard level
• Content count
• Joined
• Last visited
Community Reputation
0 Neutral
About Hazard level
• Rank
Previous Fields
• Engineering Field
• License
• Discipline
1. Complex Imaginary Test 4, problem 41
This problem tells you that a wye-wye transmission line is stepped down from 230KV to 200KV using three auto xfmrs connected line to neutral. For each phase, the auto Xfmr is rated 500 MVA, and the turns ratio is 5:2 (common:series). Then it asks to find Apparent Power in common coil. The solution uses the formula S (at) = S (tw) * (1 + N common/ N series). When they ask to find the KVA in common coil, I assumed that it's asking you to.find the KVA of auto Xfmr...But as per solution, they solved for the S (tw) instead, which is the two winding transformer. Can someone tell me why this is correct?
2. Complex Imaginary (version 2011) Exam 1, Problem 30
DK PE, Thanks for explaining this solution. The analogy of P = V^2/R is very helpful and makes sense!
3. This is a problem on finding the Maximum Power Output for a question generator. They use a formula P=3*Vphase*Vinternal / Xsynchronous I'm a little confused as to Why the solutions use this problem. Can anyone explain? Thanks!
|
Learning to play the trombone: French and Anglo-American teaching
A tradition of trombone teaching reaching back to the early days of the Paris Conservatory culminated in a method by André Lafosse (1921, revised 1946). At least two earlier methods have remained in constant use, not only in France, but throughout Europe. While other European countries developed distinctly different performance practice and ideals of playing the trombone, they did not produce a comparable body of teaching material. Within twenty years of Lafosse’s revised edition, American and British authors began to introduce an entirely new concept of how to play the trombone.
French methods
An illustration from Cornette's method
For centuries, the trombone appeared only in books about musical instruments in general, if at all. Then, some time in the 1790s, André Braun published his trombone method. When the Paris Conservatory opened in 1795, Braun and two other trombonists were on the faculty. But before long, the Conservatory no longer offered instruction in how to play trombone. It reestablished a preliminary class in 1833, making trombone instruction permanent in 1836.
Returning the trombone to the Conservatory’s curriculum probably resulted from significant public pressure. Lots of people must have wanted to learn to play trombone. Victor Cornette published a trombone method in 1830. Félix Vobaron, the provisional teacher hired in 1833, published his method in 1834. When the Conservatory established the permanent class, it passed over Vobaron in favor of Antoine Dieppo. Although Dieppo had already issued a method book jointly written with Frédéric Berr, he repudiated it and wrote a new one for his classes.
An illustration from Dieppo's method
The texts of each of these books is better organized and more informative than the last. A modern edition of Cornette’s method is still widely used, with different text. Vobaron’s is likewise still available, though less used. I am not aware of any modern edition of Dieppo’s method. Many other trombone method books appeared over the course of the nineteenth century, but it is hard to find even good bibliographic information about them, let alone locate copies. On the other hand, the revised edition of Lafosse’s method is not only easily available, but published with French, English, German, and Spanish text in parallel columns.
Vobaron complains that when he wanted to learn to play trombone, he could find no one to show him the seven positions. All the early methods lay great stress on the positions and the notes available in them. They also aim to produce soloists, so the exercises culminate in various kinds of ornaments and embellishments. At best, they give perfunctory instruction on mouthpiece placement and articulation. Only Dieppo says anything at all about breathing. Only the other two touch on care and maintenance of the trombone.
Lafosse offers reasonably thorough explanation of everything his predecessors barely touched on. He actually says less about breathing than Dieppo did, but much more about mouthpiece selection, embouchure, and articulation than any of them. Much had happened in music in the more than a century that had passed since the appearance of Dieppo’s method, so Lafosse had to deal with the trigger (limited to brief remarks on the bass trombone), legato tonguing (he had a real struggle trying to describe it), mutes (he considered most of them vulgar for orchestral use), and new techniques like the glissando (he thoroughly disapproved).
Lafosse remained as trombone professor at the Conservatory until 1960. By that time, British and American orchestras had begun to lay aside small bore trombones in favor of the Conn 88H or its equivalents. Lafosse resisted basically all twentieth-century innovations and insisted his students bring small bore trombones to lessons.
American and British recommendations
1963 cover
Philip Farkas issued The Art of Brass Playing in 1962. Other books about how to play trombone followed in quick succession, including: The Art of Trombone Playing by Edward Kleinhammer (1963), The Embouchure by Maurice Porter (1967), Trombone Technique by Denis Wick (1971), and The Encyclopedia of the Pivot System for All Cupped Mouthpiece Brass Instruments by Donald S. Reinhardt. Other notable teachers who did not write books (Emory Remington and Arnold Jacobs, for example) also contributed greatly to a new approach to playing trombone.
These and other authors differ more radically from Lafosse, a near contemporary, than Lafosse differed from Cornette, or Braun for that matter. My readers may be less familiar with Porter’s book than the others. It touches on all wind instruments, not just brass. But perhaps Porter himself shows the sea change in approaches to teaching how to play trombone more than any one thing I can mention: He was a British dentist, who based his entire book on his understanding of human dentition.
Beginning with Farkas, actually, all of these authors demonstrated a keen interest in physiology and science. Where the early French authors could only warn students not to puff their cheeks, and Lafosse added the recommendation to stretch the lips tight, the American and British approach could explain a proper embouchure in much more detail. They don’t all agree. The recommendations of Farkas and Reinhard differ so much that they have caused controversy. But with even a modicum of knowledge about facial muscles, by this time everyone knows (I hope) that Lafosse’s recommendation is harmful.
With the greater scientific sophistication came the recognition that the perfect embouchure for one person might not work at all for someone else. All of these authors, therefore, had to address that issue. They also stressed that musicians need to train like athletes. The entire concept of the daily warmup results from this realization. These authors also pay much more attention to posture.
Kleinhammer and Wick carefully explain how to hold a trombone, and details of slide technique far beyond finding the seven positions. They also have the vocabulary, as Lafosse did not, to describe the subtleties of articulation. They supply much more detail about selecting a trombone and taking care of it.
Incidentally, there is a huge difference in format between the French and American/British books. The French books are complete method books with some illustrative text. They consist mostly of exercises, etudes, etc. Farkas et al. include few if any exercises. Theirs are strictly textbooks.
By the time Lafosse retired, all of his students were champing at the bit to adopt new American large bore tenor trombones with a trigger. His successors have all been much more open to innovation than he. It seems safe to say that the approach to teaching I have described as American and British is now accepted all over the world.
That has at least two consequences. The average trombonist of the last half century or so possesses a range and technique out of the reach of even many virtuoso players of previous generations. But we have lost the distinctiveness of a recognizable French, English, German, Russian, etc. style of playing the trombone. All our soloists, orchestras, and other ensembles sound pretty much alike. That might be a small price to pay for trombonists not only to play better, but know how to do so with so much less danger of injuring themselves.
Leave a Reply
|
Tuesday, April 19, 2005
The Reconnaissance Corps 1941-1944
When the divisional cavalry regiments were absorbed into the armoured formations, starting in 1940, there was still a need for infantry divisions to have their own integral reconnaissance units. The solution was to create the Reconnaissance Corps. The Reconnaissance Corps units were initially designated as battalions, but eventually were redesignated as regiments, as were the battalions of the RTR. The cavalry regiments always did have that status, so they set the standard for the rest. Apparently, the reconnaissance battalions initially were armed with lesser armoured cars and scout cars, but eventually became indistinguishable from the armoured car regiments. At that point, they were merged with the RAC. That happened on January 1st, 1944. This is from Duncan Crow's book British and Commonwealth Armoured Formations (1919-1946), 1971.
No comments:
Amazon Ad
|
Saturday, March 31, 2012
Suspicious Minds
Trayvon Martin
Trayvon Martin, a seventeen year old black kid from Sanford, Florida was fatally wounded on February 26, 2012 by a neighborhood watchman who deemed his behavior "suspicious." The shooting has brought racial profiling to the forefront of the media. A short video promoted by features Howard University students donning the signature hooded sweat shirt worn by the Martin and asking the viewer "Am I suspicious?" My answer is "Yes!" And you have been for a long time.
The black male became "suspicious" on August 21, 1831 when Nat Turner set out with a group of conspirators to free the slaves of Virginia. He didn't make it too far. Turner's bloody rampage began with the slaying of the family that owned and named him and then moved on to other plantations until close to sixty white people had been clubbed, knifed or axed to death. The band of revolutionaries were soon dispersed by the state milita. When Turner was finally captured, he was tried and sentenced to death. He was then hanged, beheaded, flayed and quartered. Some of his skin was later used to make a souvenir change purse that would end up in the pocket of a white man.
New laws soon followed, further limiting the nearly non-existent civil rights of blacks through out the South. Black worship services were ban unless a white minister was present. Teams of slave hunters were commissioned to insure the return of local run aways. During the same period, over a third of the three million slaves in what would become the Confederacy were sold and transported from the tobacco farms of the "upper" South to the cotton plantations of the Mississippi basin. A general polarization of the feelings regarding slavery was developing throughout the United States. The Nat Turner revolt functioned as its spring board. Court rulings and social stigma soon limited the public discussion of emancipation in Southern communities while abolitionists became the target of violent, vigilante justice. In the North, by the time Abraham Lincoln was sworn in as President, over one million Yankees had joined the ranks of The Wide Awakes, a non-violent, highly organized movement to end human bondage.
After the Turner uprising of 1831, all blacks in the South became suspicious. Fear began fueling a new and enhanced form of racism that continues today in the United States. Just as Nat Turner emerged from the shadow of moral and legal injustice imposed by the "peculiar institution" of slavery, so have the terrorist attacks of September 11, 2001 come to symbolize an uprising against the white Judeo-Christian ruling class of the world. The World Trade Towers symbolized the western ideology of economic domination through monopolization of global resources, manufacturing and distribution. The Towers, in a sense, were the very manifestation of capitalistic oppression of the majority by the privileged few.
Polarization is occurring again. The Occupy Wall Street movement and its the demonization of the financially dominant 1% is pitting citizen against citizen and world community members against one another. It harkens to the times pre-dating the blood letting of the American Civil War. Fear and anger drive the political policies of our country. Our prisions are over flowing, our public education system demoralized and our military continually deployed.
If we are to avoid cultural and environmental disaster, we must face our demons together. The suspicious must lower their masks and step into the light. The fearful must meet face to face with them and acknowledge their own racism and xenophobia. Most of all, we must come to terms with the gluttony that demands endless consumption of resources at the expense of global health and individual equality. Technology must be tempered with love; a love for the planet, a love of nature, of species, of race and most importantly, of self. Self is where it all begins. We must all pull back our hoodies, reach out our hands and begin building the kind of human family and community we are capable of becoming.
Monday, March 26, 2012
Alex and Abe
Tsar Alexander II
Synchronicity. The Russian Tsar Alexander II and U.S. President Abraham Lincoln. The connection? Freedom.
It began with Nikolai Sheremetev, grandson to the Russian Field Marshall and heir to the wealthiest estate in the country. It involved a woman. Her name was Praskovia Kovalyova. She had been born a serf in 1768 in the Sheremetev family home the year Nikolai turned nineteen.
Footnote: By the mid eighteenth century human bondage had become a thriving institution in Russia. Introduced a few hundred years earlier by Ivan the Terrible (1553) it is estimated that by 1762 when Catherine II became Empress of the country more than ten million souls were the legal property of either noblemen, private industry or the government. Serfs were the equivalent of America's African slaves only they had not been imported from another continent so they shared the same heredity as the gentry who owned them. Of course this could be said of a number of the slaves in the Thomas Jefferson household as well.
Anyway, Baby Praskovia grew to be an exceptionally beautiful young lady. She also had a wonderful saprano voice that made her a favorite at the nocturnal sing-a-longs organized by the young aristocrat among his best endowed female serfs. The estate's bevy of beauties kept him so occupied that as his forth decade approached he was still a very happy bachelor. Without a wife or legitimate children to distract him, Nikolai was free to pursue his passions with great intensity. Beside serfing, his love of opera was nearly obsessive and he made it his goal to assemble the finest performance company in all of Russia. This gave Praskovia a leg up on the other house maids for her voice was so magnetic, so enthralling, so incredibly superb, that Nikolai fell hook, line and sinker for her. With an hour glass figure and the voice of an angel, the music world followed Nikolai's lead and welcomed petite Praskovia with open arms. She soon became the diva of the opera house as well as her master's devoted lover.
Nikolai Sheremetev
Praskovia Kovalyova
After her debut in 1779, noblemen and women began to flock to Koskovo to experience the young singer's exquisite voice and delicate beauty. Her leading role as Belinda in Antonio Belines "La colinie" show cased her polished talent and new-won fans were introduced to her as Zhemgukova or in English, "Pearl."
For the next twenty years Pearl's fame grew as did her sophistication within the world of Russian celebrity. She soon became fluent in both French and Italian and mastered the harp and clavichord. Empress Catherine II was so impressed with her dramatic performance as Elaine in "Les Mariages samnities" that the ruling monarch insisted on meeting Praskovia and rewarding her with an exquisitely crafted diamond ring.
But great opera is full of tragedy. When Pearl was just twenty-eight she contracted tuberculosis and the damage inflicted on her lungs forced her to leave the stage. In homage to her career, Nikolai Sheremetev disband the opera company. Two years later, Nikolai granted Pearl and her other family members their freedom and then, in a secret ceremony in Moscow, they married.
To put the event in perspective, Nikolai Sheremetev marrying beautiful Praskovia in 1801 would have been the equivalent of Presidential hopeful Thomas Jefferson taking the plunge with his then slave-lover Sally Hemings. It was an unacceptable. A complete outrage! The big difference of course, was Sheremetev had the guts to do it, while Jefferson was too much of a lilly white aristocrate to jeopardize his political career. But the Russians are a passionate people and love is the greatest passion of all.
Within a few months of their marriage, Praskovia became pregnant and in February of 1803 she gave birth to their son Dmitry. Sadly, the stress of the pregnancy had so debilitated Pearl, that her health collapsed and she died three weeks later. Heartbroken, Nicholas could not attend her funeral and confined himself to his room. He lived the remainder of his life in self-imposed seclusion and died six years later. His entire estate, the richest in Russia, then passed to little D., the son of a nobleman and a serf.
Fast forward to 1855.
Honest Abe
Catherine the Great's grandson, Tsar Alexander II, is strolling the streets of Kuskovo with the now salt and pepper haired Dmitry. The 58 year old nobleman tells Alex the story of the great love affair between his mom and dad. The Tsar is so taken by it, that he goes home and immediately signs the initial decree that leads to the freeing of all Russians serfs; an event which will occur in 1861, the same year that Abraham Lincoln will take the long train ride from his home in Springfield, Illinois to Washington DC.
In order to thwart an assassination attempt planned for Baltimore, Maryland, Lincoln will travel the last few miles in disguise and slip into the capitol unannounced during the early morning hours. There he will assume his elected position as President of the United States. Two years later Honest Abe will sign the Emancipation Proclamation which will lead to the freedom of 3.1 million slaves held in bondage in the United States.
Pretty cool. The evolution of humanity occurring world wide and in sync before the first gutta-percha coated telegraph line was laid across the ocean floor. Bravo!
Saturday, March 24, 2012
The Brown-mobile
1972 Chevy Belair
I got my first car when I was twenty-four. It was an eight year old 1972 Chevy Belair. My dad had bought it new and the sales receipt was still in the glove compartment. It had cost $3200.00. By weight, that would have been just under a dollar a pound.
My brother called it The Brown-mobile. It was 19 feet long, a little over eight feet wide with a glistening mahogany brown exterior and black upholstery. It had a 250 horsepower V-8 engine that sucked up a gallon of gas every 13 miles. It's only discernible luxury beside power steering and brakes was a working AM radio. The Brown-mobile lived most of its life just 120 miles west of its birth place in the Mo-tor-City. It slept in the garage of our big brick-face colonial home on Minges Road or in the parking lot of Battle Creek's Kellogg Corporation. Unfortunately many a brutal ride through the salt brine of southern Michigan winters had taken their toll, and by the time the Brown-mobile came east, she was looking older than her years.
I imagine my dad would have given me the car, but I insisted on paying him two hundred bucks to cover the trade-in value. The Chevy's rear quarter panels were completely rusted out so in order to pass inspection I had to rivet flexible sheet metal over the largest holes and then fill the rest with triple expanding insulation foam. With a finishing coat of some wicked smelling body fill, a dozen sanding discs and a couple cans of spray enamel I was able to get registered and licensed in state of Pennsylvania. I was pretty proud of myself. I was also about to learn there was more to a car than the steering wheel and accelerator.
First off, there is nothing quite like turning the key only to hear a tic-tic-tic-weeeeee sound come from under the hood. If all your money happens to be in the gas tank, you pray that it is something simple, like maybe a corroded battery terminal or a spark plug wire. You try the key a few more times and then all you hear is the tic tic tic. So you reach down by your left knee, pop the hood release and then get out and go around to the front of the car where you spend a few tense moments trying to free the secondary spring latch. When your probing finger tips finally get it right, you hoist the huge roof up and peer inside. Okay, there is the battery... and the cables... everything looks okay, so what next? You go back to the driver's seat, turn the key again and watch the dashboard's idiot lights flare on. Then you try the headlights. You walk back up front to find they are glowing brightly, so you know you've got juice and the problem probably isn't the battery or the connections. Damn. This is a real problem.
Now if you happen to be driving a standard transmission and you're on a hill, you can always get the car rolling, stick it into first gear and pop the clutch. If you've remembered to turn the key on, the car will usually jerk to life and you can tool on home. Not so with an automatic transmission. There is no clutch to pop. For that matter, if you happen to have a '72 Belair that weighs 3800 lbs, just getting it to roll forward is a major feat. As fate would have it, when my starter failed I was parallel parked on a flat, residential side street. No choice but to abandon ship and go in search of a pay phone. I found one a couple blocks away and called my girlfriend Barbara. We'd been going out about a month and the shine was still on the coin. She was happy to blow off her lunch break and come to my rescue in her pretty little Honda.
I'd borrowed a thick nylon rope from a guy who lived across the street and by the time Barb arrived, I had it tied to the front end of the Belair. She pulled up in the space ahead of me and before she had time to think about it, I had knotted the rope under the rear end of her car. The disparity between her dainty Japanese Accord and my rusting hulk from Detroit was comparable to a tiny tug boat hauling an oil freighter. Towing me those few miles to her house was no easy task, for without the motor running the Belair's power steering and brakes didn't work. Cornering was a bitch and stopping was down right scary. But we made it. Then together, blue-eyed Barbie and I managed to muscle the monstrously large sedan into the narrow car bay of the shed behind her house. If you can't love your car, you gotta love your girl!
In relationship to rides of today, the Belair was a really straight forward piece of engineering. A battery, a coil, a starter, the big eight cylinders with spark plugs and wires leading to the distributor cap; a radiator, an oil and air filter, a reservoir for windshield wiper fluid. I learned all about these parts because I ended up replacing nearly all of them the first year I had the car. There was no computer software to tie into diagnostic equipment, no weird plastic covers or cowlings to hamper you from throwing on a set of jumper cables or pouring in a quart of oil or transmission fluid. But that still didn't make rusted bolts come loose any easier and it sure didn't stop grease and dirt from dropping in your eyes when you were squinting up into the works trying to ratchet off some half concealed nut.
The starter on the Chevy was a big clunky steel cylinder that weighed a ton. At least that's how heavy it felt when I was flat on my back trying to muscle the thing into place from underneath the chassis. I'd bought a rebuilt one at the Gary's U-Pull It, a junk yard south of town. Like the rest of the Belair, mechanically it was a pretty simple design. A bolt passed lengthwise through the center of its heavy cast iron body and threaded into the motor's engine block. There was a big gear inside it that would spin forward when you keyed the ignition. It would engage another gear inside the motor and crank the engine over. The toughest part of replacing the starter was figuring out how to lift it out and then shimmy the new one in past the axle and frame supports. Barb helped me as best she could, holding a drop light and handing me the box wrenches I'd swiped from my old man's tool kit. The garage was dark and narrow, a two bay set-up built in the 1930's. Barb's rental agreement allowed her one side of the building. The other was used by the landlord to store his canvas covered twelve cylinder Jaguar.
The Jag was a sleek piece of road gear; a sexy thoroughbred fallen from heaven into the same stable that now housed my old hag from Mo-town. Barb had ridden in it once on a trip with the owner into New York City. She said the adventure was great fun, particularly when they would "bottom out on road kill." Barbara appreciated cars. She had a brother in Texas who owned a BMW repair shop. "So clean," she told me "that you could eat off the floor." Her goal after the Honda was to own a Beamer. Me, I didn't know from cars. I really had no desire even to own one. But I had become a salesman that fall and I had to have a car to get from client to client.
Back in college, I could barely afford room rent let alone a set of wheels. After I graduated I went to work for a dairy farmer a mile up the road from my folk's summer place. During the work week I'd either drive the farmer's tractor home or walk the dirt road over the hill to our house. My mom spent most of the summer in the country, so she would let me borrow her Buick if I had some special errand to run. I didn't have a girlfriend that summer and all my college buddies were off working in the city, so being mobile was never much of an issue. Instead I stayed home and saved my money. At the end of October, I collected my pay as one big check, booked a British Airway's flight to Europe and spent the next two years playing my guitar in the Paris Metro, busking for a living. No need for a car there!
When I came home in 1981, I was forced to join the American economy in a real way. My older brother was living with my folks in their New Jersey condo, so there wasn't any room for me and they weren't about to underwrite their musical hobo's housing anywhere else. So I chose to move to up-state New York where a buddy of mine had an old Victorian house he'd rented with a couple of university students. I started out crashing on a couch in the upstairs hallway, but soon moved in with the girl who was renting the back bedroom. Sometimes a guy has to do what he has to do.
Things were pretty touch and go there for a while there. In Paris, I'd made decent money playing music, but there wasn't any way to do that in Binghamton, NY. Gigs were too far in between and they paid shit, so I put a fake resume together and registered with the NY State Employment office as well as the local Ethan Allen Placement Agency. I was borrowing money, thumbing rides around town, and doing pick up work. When you've got nothin' its all about the chicken or the egg and which comes first. You need a car to get a real job, but you need money for a car and then more money for gas and food and rent. So you're forced to rely on your wits and that often involves taking advantage of people you befriend. It sucks. Very few with money seem to remember those lean days if in fact, they ever had to experience them. My Dad, who supported himself through the Great Depression and later worked his way through college at night, wanted me to get a good sense of that reality. I'm glad he did.
Like the old timers say, those years taught me the value of a dollar. They provided a lesson in the false notion of entitlement that privileged kids often leave home with. So many of us expected an expense paid lift into a cushy job where we will be able to replicate the lifestyle achieved by our parents. Seldom do we acknowledge that over fifty percent of the world lives on less than $700.00 a year. We lose track of the fact that fate often thwarts equality and that our good fortune has as much to do with the luck of being born in the right place at the right time as any great plan on our part. The future is never certain and we are not special. We should not only be grateful but we should be willing to limit our appetites so we may share our prosperity when we have the opportunity.
I finally was offered work selling airtime for a local radio station. It was a real job. The employment service would take a commission for the connection and the agent would insist I borrow a proper sports coat, shirt and tie for the first interview. In fact, she sent me home to correct my wardrobe before giving me the employer's address. Mary Delmar was her name; a large woman, in her fifties, who tried on more than one occasion to seduce me. She was so overtly predatory that it made me nervous to sit in her office as she lauded me with sugary compliments. Now that I am her age, her memory is a sign post never far from my own lustful desires.
My first WQYT paycheck (and yes, QYT stood for quiet music, the kind once played in elevators and doctor's offices) was used to make a partial payment on the Brown-mobile. I also placed a deposit on my first business suit at Hykes Aisle of Style. The "Aisle" was a long thin room with suit racks stacked floor to ceiling. Bob Krummenacker, the salesman at the desk next to mine, had recommended the place. Bob had a different three piece suit for every day of the week. He also spent an exorbitant amount of office time making preparations for his upcoming wedding. He had plentiful to-do lists in neat leather-bound organizers and they made a powerful impression on my rather chaotic ADD mind. I figured wherever big Bob shopped was good enough for me.
I was built to wear a size forty suit but the proprietor of Hykes Aisle of Style put me into a size thirty-eight and convinced me it fit. It was a beige tweed, the absolute worst color for a freckle face with auburn hair. He also sold me a baby blue cotton shirt to go with it. Instead of a tie I may as well have hung a sign around my neck that read ASSHOLE. I think I wore that suit everyday for the first two months of my new career. The rusted out Brown-mobile and the beige Hykes Aisle of Style suit. No wonder closing those first sales was so incredibly difficult!
From day one, my life as a salesman was a direct conflict with my... how should I put it... my Buddha Nature. I had stepped onto what the pot-bellied sage called the meat wheel of material life; the Chevy... the job... the payments, the sales budgets, the meetings and of course, the after hour alcohol and sex whose tent folds concealed the road the Brown-mobile and I were on. It would take me another six years before I realized the ladder I was climbing was leaning against the wrong wall. And that, my friend, is why the earth is round; so we can never see too far ahead.
|
Dice with all sides
Super Dungeon Explore uses 3 unique 6 sided dice. Blue, Red and Green. They are rolled together for attacks, defence
or special abilities. For the purpose of this Wiki a given roll will be abbreviated as a number followed by either B for Blue Dice, R for Red Dice or G for Green Dice. For example, an attack with one of each would be written
The probabilites of hitting are semi-complex, for a basic understanding see the table linked below:
Ad blocker interference detected!
|
Monday, 14 January 2013
"The bullfrog's friends" - a new wisdom story
Monday, 7 January 2013
The twelfth gosling
A wisdom story...
It was springtime and a young mother goose had just laid a clutch of twelve very handsome eggs. She and the father goose looked at their eggs admiringly - wondering what future their little goslings would have. They imagined teaching them to fly, helping them to find food, and - when the cold weather came - leading them in the migration to warmer climes.
The goose parents took turns sitting on the eggs to keep them warm. As they waited, they thought about the future of their goslings - wondering how many would be female and how many male - thinking of the day that they would themselves learn to fly and maybe even have goslings of their own.
Day in and day out they carefully tended the eggs. A week passed, and then another, and another. And then one day, after nearly five long weeks, as the father sat on the eggs he heard a faint pecking sound. And then another from another egg. As he moved to look, he saw tiny beaks appearing from two of the eggs.
The process of hatching was not easy. It was arduous work for the babies and they needed to rest often between bouts of pecking. After three days, though, eleven of the goslings were finally out of their shells.
But the twelfth egg was a bit odd. The gosling in that egg had pecked a hole large enough to get out of, stuck his head out, and then return to the shell! The goslings were all peeping in hunger, so father goose went to get food. When he returned, he and mother fed their little goslings - eleven of them standing on their feet and the twelfth still in his shell.
The goose parents began to be a bit concerned about number 12. They pecked the shell a bit. They tried to lure him out with food. But number 12 was set on staying put.
Weeks passed and the goslings all began to grow rapidly. Number 12 finally got so large that his shell could hold him no longer - as it burst, he joined his brothers and sisters walking around in the nest. And it was good timing too, because flying lessons were just beginning!
Mother and father goose showed their goslings how to flap their little wings and they took to it eagerly - practicing their flapping for minutes at a time, resting, and then flapping some more.
All except number 12, that is. Number 12 showed no interest in flapping or in flying.
At last, eleven goslings were ready and they took flight. It was an exhilarating experience for all of them and they returned excited and happy. Number 12 seemed unmoved. He instead took a walk to find some tasty grubs to eat and he thought to himself "that flying looks way too dangerous." I'm just fine staying here on the ground where it's safe.
As time passed, eleven goslings flew more and more and were eventually ready to leave the nest. Number 12 remained with his mother and father. They were happy to have him, but they worried about his future and what might become of him - a goose who would not fly.
And then, the days began to become shorter and colder. Mother and father goose prepared themselves for the long flight south. What would happen with number 12?
Mother and father took off and waved their wings good-by to number 12. Moments later, they heard an anguished squawking from the vicinity of the nest!
They turned back to see a hungry looking fox just inches away from number 12. They swooped down just in time, and as mother goose distracted the fox, father goose lifted number 12 into the air and carried him off. As soon as 12 was safe, mother flew to join father and 12.
What to do now? 12 was simply too heavy to carry all the way on the migration journey, but if his parents left him behind, he would surely perish.
They took turns carrying him - using all of their strength. But it was no use. Exhausted, father goose finally lost his grip and number 12 tumbled from the sky.
The parents were distraught. They had lost their dear gosling. They began to weep and other geese in the flock came to comfort them.
And then suddenly, there was a surprising sound. Honk, honk! - they heard behind them. And there they saw number 12 flying along happily to catch up with them. He seemed perfectly joyful. The parents were shocked but delighted
And as number 12 flew along he thought to himself "I nearly lost my life by trying to be too safe - I will never make that mistake again!"
Number 12 went on to have a happy and adventurous life and became a father many times over before he passed away, content, at a ripe old age.
Thursday, 3 January 2013
A church thriving through the ‘tension between certainty and ambiguity’
This article was written by journalist student Zay Arguelles. I thank her for taking such care in getting it right and for letting me share her writing.
The banner in front of the Unity Church in Upper Street is sure to catch every passer-by’s attention. “Heathens and heretics welcome!”, it says in big bold letters. This phrase is not something normally associated with a church, if at all. But then, churches don’t normally have an atheist minister.
Rev. Andrew Pakula is from America and he came here six years ago to head the Unitarian churches in Upper Street and Newington Green. He earned a PhD in Biology from the Massachusetts Institute of Technology (MIT) and joined the biotechnology industry. Eventually, he left his career as a scientist to pursue a ministerial vocation. Nonetheless, he remained an atheist and even anti-religious in some ways.
A common way of dividing the world is into the religious and the atheist. Here arises the conflict between Rev. Andy’s stance about faith and religion and his job. It is intriguing or rather confusing because of the whole baggage of stereotypes associated with religion. On the contrary, he said that the word religion can mean a bunch of different things and “Depending on how you use that and what you consider to be a religion, it can be quite different.”
When you look at the fundamental core of Unitarianism the fog of confusion starts to evaporate. Rev. Andy said, “I call it a ‘way’. Let’s call it a way. It’s not ‘We are all going to believe the same thing’. It’s about moving together, growing together, working together and making ourselves grow and the world more whole”. It’s clear that the emphasis of Unitarianism lies on being a better person, being in a community and making a better world without the dogma.
As it seems, Unitarians are encouraged to ‘believe what they want to believe’ but Rev. Andy differs. He argued that this is very different from ‘believing what your search or journey leads you to believe’, which is what they do. He explained further by saying “Personally, I want to believe in all-powerful supernatural being that will take care of all of us. I really do! I would love to believe that. That is what I want to believe but it is NOT what I can believe. What my search has lead me to believe is that everyone is sacred, that we are all connected and that we’re here to make each other more whole and happier. That’s were a search has led me to and it might change.”
Just like any other institutions, Unitarianism doesn’t go without criticisms. Many people say that this kind of open-minded religion is not sufficient for people who are really suffering. In response, Rev. Andy said he doesn’t mind other beliefs. “Even if I don’t think it’s true, I think any belief is fine as long as it encourages you to be kind, loving and compassionate.” Certainly, it has also been criticised for being too open - “Whenever you are not a doctrinaire... If there is any flexibility, they will say ‘Well, that’s too flexible’. ” This isn’t a problem for them though, as they identify Unitarianism to be in the grey area in the first place.
With this kind of openness, a lot of barriers and differences can exist. The minister admitted that when he does a service he always tries to use languages which are inclusive to all sorts of beliefs. He said there’s a range of people within the congregation but since they’re all rather open-minded it’s really hard for them to have conflicts.
As he tries to explain how the congregation works for very different people, he grabbed a box of power cord beside him and said “There are people who receive a package and the first thing they do is read the instruction from the first letter to the last letter and maybe read it twice. And other people just plug it in.” He then continued about how they created “a thing with very open sort of steps” – “Decide for yourself how you’re going to be a compassionate consumer, write it down, and commit to it.”
Although very different from the traditional types of religion, Unitarianism remains attached to a certain label or ‘ism’ and that comes as a challenge. Rev. Andy recognises that it is very hard to be associated with the stereotypes, especially in this country “where a lot of people want nothing to do with anything that looks, smells, or tastes like religion.” On the other hand, people need categories to think about things and Unitarianism is commonly dropped on the religious category because what else would you call it or how else would you present it? It cannot be avoided but he also doesn’t mind. In the end, he doesn’t care whether they are called a religion or not – “If people don’t want to call it religion because, by their definition, religion has to have central beliefs, then fine... It’s not a religion. I don’t care. It’s a way of being.”
With the Unitarians’ position between the religious and secular sphere, he said that “It’s very comfortable for me to remember that things are changing and we’re always midstream, somewhere. We are in the process of changing from one thing to another and we don’t know what that other thing is yet or how the world is going to change around us. What we do is stay with it, ride with it, recognise the ambiguity and keep going.”
We live in a society where everything is polarized and it is easier to identify things as black or white. But in reality, the world we live in is very much within the grey scale. There is no one truth and certainly nobody holds a monopoly on what it is. Unitarianism reflects that fact and allows individuals to live in harmonious disagreement within a community with a system that supports them into becoming the best person they can be. In the advent of increasing religious scepticism and secularism, it is indispensable that such institutions exist. Whether it comes in the form of Unitarianism or not, it’s good to know that it is there for those who need it.
|
From protesting to rioting
Protesting is a cumulation of citizens exercising their First Amendment right, but when does a peaceful protest turn into a riot? To answer that question, it is important to know the difference between a protest and a riot.
According to Merriam-Webster dictionary, a riot and a protest are two different things. A protest is a complaint or objection, while a riot is a violent or disorderly confrontation.
In recent months, protests and riots have been featured in every major newspaper and blog. Some of the most famous protests include the Women’s Suffrage parade in 1913 on D.C., Civil Rights march on Selma 1965, and most recently the Women’s March the day after President Trump’s inauguration that occurred around the world.
Though many of these marches aim to be peaceful and maintain some type of organization, violence can erupt through confrontation between protesters, bystanders, and police.
A riot, according to Merriam-Webster, is similar, but there is one factor that is drastically different.
“Public violence, tumult, or disorder, a violent public disorder, specifically tumultuous disturbance of the public peace by three or more persons assembled together and acting with a common intent,” Merriam-Webster states.
Riots are violent in nature and simply aim to disrupt and deface public and private property. Those who partake in riots can be arrested or subdued by various police tactics.
Prior to the Inauguration, over 600 groups had applied for permits from the city to legally protest in the streets. Many people do not realize that permits are required for protests in public spaces.
Elizabeth Rivette, a junior at USD, was at the Women’s March in D.C. She recalled the event as peaceful and inspiring.
“It was incredible; people were smiling and happy,” Rivette said. “[The protesters] were peaceful and not aggressive in any way. The cops only really put up fences to protect the protestors from the cars on the street, and when the protestors were getting too close to the back of the White House. The funniest thing I heard from a cop was when he turned to another cop and said, ‘Yeah, we can expect four long years of this.’”
Jimmy Hussey, a sophomore at USD, attended the Inauguration and passed several protests as he made his way toward the National Mall. Many of the protests he passed were peaceful, but some were overshadowed by others.
“There were so many people that were voicing legitimate complaints and were peacefully protesting, but their message was drowned out by the verbally aggressive protesters who shouted their opinions above everyone else’s,” Hussey said. “I saw the rioting police yelling and marching toward the protesters that were yelling back, but I left before things started to get violent.”
The United States Law Library of Congress outlines the steps to peaceful protest.
Many protesters were permitted to assemble in protest on Inauguration Day, though others were not. One group of individuals smashed the windows of Starbucks and Bank of America, torched a limousine, and graffitied anarchy signs around the city.
As anarchists, these individuals claim no allegiance to a single organized group, but they all showed up with the same intentions using the same technique. “Black bloc” is a technique where rioters dress is all black, wear masks to conceal their identity, and shatter windows, using anything at their disposal leaving destruction in their wake. They embed themselves into other protests, such as J20Resist, the large protest on Inauguration Day that began at Union station and according to their Facebook page over 3,000 people went to protest on Inauguration Day.
While peaceful protests can end in violence, the difference between a protest and riot lies within the intent of the assembly. USD students saw both sides of this issue on Inauguration Day; it is likely that protests and riots will continue to make headlines across the nation.
Peaceful Protest, according to the U.S. Law Library of Congress:
– Organizers must apply for, and obtain, a permit from the local police department/local governmental body.
– Localities can also impose additional requirements for permit applications,
including event details and organizer information.
Written by: Jennifer Givens, Assistant Feature Editor
|
Y chromosome
From Wikipedia, de free encycwopedia
Jump to: navigation, search
Human Y chromosome
Human male karyotpe high resolution - Y chromosome cropped.png
Human Y chromosome (after G-banding)
Human male karyotpe high resolution - Chromosome Y.png
Y chromosome in human mawe karyogram
Lengf (bp) 57,227,415 bp
No. of genes 63 (CCDS)[2]
Type Awwosome
Centromere position Acrocentric[3]
(10.4 Mbp[4])
Externaw map viewers
Ensembw Chromosome Y
Entrez Chromosome Y
NCBI Chromosome Y
UCSC Chromosome Y
Fuww DNA seqwences
RefSeq NC_000024 (FASTA)
GenBank CM000686 (FASTA)
The Y chromosome is one of two sex chromosomes (awwosomes) in mammaws, incwuding humans, and many oder animaws. The oder is de X chromosome. Y is de sex-determining chromosome in many species, since it is de presence or absence of Y dat determines de mawe or femawe sex of offspring produced in sexuaw reproduction. In mammaws, de Y chromosome contains de gene SRY, which triggers testis devewopment. The DNA in de human Y chromosome is composed of about 59 miwwion base pairs.[5] The Y chromosome is passed onwy from fader to son, uh-hah-hah-hah. Wif a 30% difference between humans and chimpanzees, de Y chromosome is one of de fastest-evowving parts of de human genome.[6] To date, over 200 Y-winked genes have been identified.[7] Aww Y-winked genes are expressed and (apart from dupwicated genes) hemizygous (present on onwy one chromosome) except in de cases of aneupwoidy such as XYY syndrome or XXYY syndrome. (See Y winkage.)
The Y chromosome was identified as a sex-determining chromosome by Nettie Stevens at Bryn Mawr Cowwege in 1905 during a study of de meawworm Tenebrio mowitor. Edmund Beecher Wiwson independentwy discovered de same mechanisms de same year. Stevens proposed dat chromosomes awways existed in pairs and dat de Y chromosome was de pair of de X chromosome discovered in 1890 by Hermann Henking. She reawized dat de previous idea of Cwarence Erwin McCwung, dat de X chromosome determines sex, was wrong and dat sex determination is, in fact, due to de presence or absence of de Y chromosome. Stevens named de chromosome "Y" simpwy to fowwow on from Henking's "X" awphabeticawwy.[8][9]
The idea dat de Y chromosome was named after its simiwarity in appearance to de wetter "Y" is mistaken, uh-hah-hah-hah. Aww chromosomes normawwy appear as an amorphous bwob under de microscope and onwy take on a weww-defined shape during mitosis. This shape is vaguewy X-shaped for aww chromosomes. It is entirewy coincidentaw dat de Y chromosome, during mitosis, has two very short branches which can wook merged under de microscope and appear as de descender of a Y-shape.[10]
Most mammaws have onwy one pair of sex chromosomes in each ceww. Mawes have one Y chromosome and one X chromosome, whiwe femawes have two X chromosomes. In mammaws, de Y chromosome contains a gene, SRY, which triggers embryonic devewopment as a mawe. The Y chromosomes of humans and oder mammaws awso contain oder genes needed for normaw sperm production, uh-hah-hah-hah.
There are exceptions, however. For exampwe, de pwatypus rewies on an XY sex-determination system based on five pairs of chromosomes.[11] Pwatypus sex chromosomes in fact appear to bear a much stronger homowogy (simiwarity) wif de avian Z chromosome,[12] and de SRY gene so centraw to sex-determination in most oder mammaws is apparentwy not invowved in pwatypus sex-determination, uh-hah-hah-hah.[13] Among humans, some men have two Xs and a Y ("XXY", see Kwinefewter syndrome), or one X and two Ys (see XYY syndrome), and some women have dree Xs or a singwe X instead of a doubwe X ("X0", see Turner syndrome). There are oder exceptions in which SRY is damaged (weading to an XY femawe), or copied to de X (weading to an XX mawe). For rewated phenomena, see Androgen insensitivity syndrome and Intersex.
Origins and evowution[edit]
Before Y chromosome[edit]
Many ectodermic vertebrates have no sex chromosomes. If dey have different sexes, sex is determined environmentawwy rader dan geneticawwy. For some of dem, especiawwy reptiwes, sex depends on de incubation temperature; oders are hermaphroditic (meaning dey contain bof mawe and femawe gametes in de same individuaw).
The X and Y chromosomes are dought to have evowved from a pair of identicaw chromosomes,[14][15] termed autosomes, when an ancestraw animaw devewoped an awwewic variation, a so-cawwed "sex wocus" – simpwy possessing dis awwewe caused de organism to be mawe.[16] The chromosome wif dis awwewe became de Y chromosome, whiwe de oder member of de pair became de X chromosome. Over time, genes dat were beneficiaw for mawes and harmfuw to (or had no effect on) femawes eider devewoped on de Y chromosome or were acqwired drough de process of transwocation.[17]
Untiw recentwy, de X and Y chromosomes were dought to have diverged around 300 miwwion years ago. However, research pubwished in 2010,[18] and particuwarwy research pubwished in 2008 documenting de seqwencing of de pwatypus genome,[12] has suggested dat de XY sex-determination system wouwd not have been present more dan 166 miwwion years ago, at de spwit of de monotremes from oder mammaws.[13] This re-estimation of de age of de derian XY system is based on de finding dat seqwences dat are on de X chromosomes of marsupiaws and euderian mammaws are present on de autosomes of pwatypus and birds.[13] The owder estimate was based on erroneous reports dat de pwatypus X chromosomes contained dese seqwences.[11][19]
Recombination inhibition[edit]
Recombination between de X and Y chromosomes proved harmfuw—it resuwted in mawes widout necessary genes formerwy found on de Y chromosome, and femawes wif unnecessary or even harmfuw genes previouswy onwy found on de Y chromosome. As a resuwt, genes beneficiaw to mawes accumuwated near de sex-determining genes, and recombination in dis region was suppressed in order to preserve dis mawe specific region, uh-hah-hah-hah.[16] Over time, de Y chromosome changed in such a way as to inhibit de areas around de sex determining genes from recombining at aww wif de X chromosome. As a resuwt of dis process, 95% of de human Y chromosome is unabwe to recombine. Onwy de tips of de Y and X chromosomes recombine. The tips of de Y chromosome dat couwd recombine wif de X chromosome are referred to as de pseudoautosomaw region. The rest of de Y chromosome is passed on to de next generation intact. It is because of dis disregard for de ruwes dat de Y chromosome is such a superb toow for investigating recent human evowution, uh-hah-hah-hah.
By one estimate, de human Y chromosome has wost 1,393 of its 1,438 originaw genes over de course of its existence, and winear extrapowation of dis 1,393-gene woss over 300 miwwion years gives a rate of genetic woss of 4.6 genes per miwwion years.[20] Continued woss of genes at de rate of 4.6 genes per miwwion years wouwd resuwt in a Y chromosome wif no functionaw genes – dat is de Y chromosome wouwd wose compwete function – widin de next 10 miwwion years, or hawf dat time wif de current age estimate of 160 miwwion years.[16][21] Comparative genomic anawysis reveaws dat many mammawian species are experiencing a simiwar woss of function in deir heterozygous sex chromosome. Degeneration may simpwy be de fate of aww non-recombining sex chromosomes, due to dree common evowutionary forces: high mutation rate, inefficient sewection, and genetic drift.[16]
However, comparisons of de human and chimpanzee Y chromosomes (first pubwished in 2005) show dat de human Y chromosome has not wost any genes since de divergence of humans and chimpanzees between 6–7 miwwion years ago,[22] and a scientific report in 2012 stated dat onwy one gene had been wost since humans diverged from de rhesus macaqwe 25 miwwion years ago.[23] These facts provide direct evidence dat de winear extrapowation modew is fwawed and suggest dat de current human Y chromosome is eider no wonger shrinking or is shrinking at a much swower rate dan de 4.6 genes per miwwion years estimated by de winear extrapowation modew.
High mutation rate[edit]
The human Y chromosome is particuwarwy exposed to high mutation rates due to de environment in which it is housed. The Y chromosome is passed excwusivewy drough sperm, which undergo muwtipwe ceww divisions during gametogenesis. Each cewwuwar division provides furder opportunity to accumuwate base pair mutations. Additionawwy, sperm are stored in de highwy oxidative environment of de testis, which encourages furder mutation, uh-hah-hah-hah. These two conditions combined put de Y chromosome at a greater risk of mutation dan de rest of de genome.[16] The increased mutation risk for de Y chromosome is reported by Graves as a factor 4.8.[16] However, her originaw reference obtains dis number for de rewative mutation rates in mawe and femawe germ wines for de wineage weading to humans.[24]
Inefficient sewection[edit]
Widout de abiwity to recombine during meiosis, de Y chromosome is unabwe to expose individuaw awwewes to naturaw sewection, uh-hah-hah-hah. Deweterious awwewes are awwowed to "hitchhike" wif beneficiaw neighbors, dus propagating mawadapted awwewes in to de next generation, uh-hah-hah-hah. Conversewy, advantageous awwewes may be sewected against if dey are surrounded by harmfuw awwewes (background sewection). Due to dis inabiwity to sort drough its gene content, de Y chromosome is particuwarwy prone to de accumuwation of "junk" DNA. Massive accumuwations of retrotransposabwe ewements are scattered droughout de Y.[16] The random insertion of DNA segments often disrupts encoded gene seqwences and renders dem nonfunctionaw. However, de Y chromosome has no way of weeding out dese "jumping genes". Widout de abiwity to isowate awwewes, sewection cannot effectivewy act upon dem.
A cwear, qwantitative indication of dis inefficiency is de entropy rate of de Y chromosome. Whereas aww oder chromosomes in de human genome have entropy rates of 1.5–1.9 bits per nucweotide (compared to de deoreticaw maximum of exactwy 2 for no redundancy), de Y chromosome's entropy rate is onwy 0.84.[25] This means de Y chromosome has a much wower information content rewative to its overaww wengf; it is more redundant.
Genetic drift[edit]
Even if a weww adapted Y chromosome manages to maintain genetic activity by avoiding mutation accumuwation, dere is no guarantee it wiww be passed down to de next generation, uh-hah-hah-hah. The popuwation size of de Y chromosome is inherentwy wimited to 1/4 dat of autosomes: dipwoid organisms contain two copies of autosomaw chromosomes whiwe onwy hawf de popuwation contains 1 Y chromosome. Thus, genetic drift is an exceptionawwy strong force acting upon de Y chromosome. Through sheer random assortment, an aduwt mawe may never pass on his Y chromosome if he onwy has femawe offspring. Thus, awdough a mawe may have a weww adapted Y chromosome free of excessive mutation, it may never make it in to de next gene poow.[16] The repeat random woss of weww-adapted Y chromosomes, coupwed wif de tendency of de Y chromosome to evowve to have more deweterious mutations rader dan wess for reasons described above, contributes to de species-wide degeneration of Y chromosomes drough Muwwer's ratchet.[26]
Gene conversion[edit]
As it has been awready mentioned, de Y chromosome is unabwe to recombine during meiosis wike de oder human chromosomes; however, in 2003, researchers from MIT discovered a process which may swow down de process of degradation, uh-hah-hah-hah. They found dat human Y chromosome is abwe to "recombine" wif itsewf, using pawindrome base pair seqwences.[27] Such a "recombination" is cawwed gene conversion.
In de case of de Y chromosomes, de pawindromes are not noncoding DNA; dese strings of bases contain functioning genes important for mawe fertiwity. Most of de seqwence pairs are greater dan 99.97% identicaw. The extensive use of gene conversion may pway a rowe in de abiwity of de Y chromosome to edit out genetic mistakes and maintain de integrity of de rewativewy few genes it carries. In oder words, since de Y chromosome is singwe, it has dupwicates of its genes on itsewf instead of having a second, homowogous, chromosome. When errors occur, it can use oder parts of itsewf as a tempwate to correct dem.
Findings were confirmed by comparing simiwar regions of de Y chromosome in humans to de Y chromosomes of chimpanzees, bonobos and goriwwas. The comparison demonstrated dat de same phenomenon of gene conversion appeared to be at work more dan 5 miwwion years ago, when humans and de non-human primates diverged from each oder.
Future evowution[edit]
In de terminaw stages of de degeneration of de Y chromosome, oder chromosomes increasingwy take over genes and functions formerwy associated wif it. Finawwy, de Y chromosome disappears entirewy, and a new sex-determining system arises.[16][neutrawity is disputed][improper syndesis?] Severaw species of rodent in de sister famiwies Muridae and Cricetidae have reached dese stages,[28][29] in de fowwowing ways:
• The Transcaucasian mowe vowe, Ewwobius wutescens, de Zaisan mowe vowe, Ewwobius tancrei, and de Japanese spinous country rats Tokudaia osimensis and Tokudaia tokunoshimensis, have wost de Y chromosome and SRY entirewy.[16][30][31] Tokudaia spp. have rewocated some oder genes ancestrawwy present on de Y chromosome to de X chromosome.[31] Bof sexes of Tokudaia spp. and Ewwobius wutescens have an XO genotype (Turner syndrome),[31] whereas aww Ewwobius tancrei possess an XX genotype.[16] The new sex-determining system(s) for dese rodents remains uncwear.
• The wood wemming Myopus schisticowor, de Arctic wemming, Dicrostonyx torqwatus, and muwtipwe species in de grass mouse genus Akodon have evowved fertiwe femawes who possess de genotype generawwy coding for mawes, XY, in addition to de ancestraw XX femawe, drough a variety of modifications to de X and Y chromosomes.[28][32][33]
• In de creeping vowe, Microtus oregoni, de femawes, wif just one X chromosome each, produce X gametes onwy, and de mawes, XY, produce Y gametes, or gametes devoid of any sex chromosome, drough nondisjunction.[34]
Outside of de rodent famiwy, de bwack muntjac, Muntiacus crinifrons, evowved new X and Y chromosomes drough fusions of de ancestraw sex chromosomes and autosomes.[35]
1:1 sex ratio[edit]
Fisher's principwe outwines why awmost aww species using sexuaw reproduction have a sex ratio of 1:1, meaning dat in de case of humans, 50% of offspring wiww receive a Y chromosome, and 50% wiww not. W. D. Hamiwton gave de fowwowing basic expwanation in his 1967 paper on "Extraordinary sex ratios",[36] given de condition dat mawes and femawes cost eqwaw amounts to produce:
1. Suppose mawe birds are wess common dan femawe.
2. A newborn mawe den has better mating prospects dan a newborn femawe, and derefore can expect to have more offspring.
3. Therefore parents geneticawwy disposed to produce mawes tend to have more dan average numbers of grandchiwdren born to dem.
4. Therefore de genes for mawe-producing tendencies spread, and mawe birds become more common, uh-hah-hah-hah.
5. As de 1:1 sex ratio is approached, de advantage associated wif producing mawes dies away.
6. The same reasoning howds if femawes are substituted for mawes droughout. Therefore 1:1 is de eqwiwibrium ratio.
Non-mammaw Y chromosome[edit]
Many groups of organisms in addition to mammaws have Y chromosomes, but dese Y chromosomes do not share common ancestry wif mammawian Y chromosomes. Such groups incwude Drosophiwa, some oder insects, some fish, some reptiwes, and some pwants. In Drosophiwa mewanogaster, de Y chromosome does not trigger mawe devewopment. Instead, sex is determined by de number of X chromosomes. The D. mewanogaster Y chromosome does contain genes necessary for mawe fertiwity. So XXY D. mewanogaster are femawe, and D. mewanogaster wif a singwe X (X0), are mawe but steriwe. There are some species of Drosophiwa in which X0 mawes are bof viabwe and fertiwe.[citation needed]
ZW chromosomes[edit]
Oder organisms have mirror image sex chromosomes: where de homogeneous sex is de mawe, said to have two Z chromosomes, and de femawe is de heterogeneous sex, and said to have a Z chromosome and a W chromosome. For exampwe, femawe birds, snakes, and butterfwies have ZW sex chromosomes, and mawes have ZZ sex chromosomes.
Non-inverted Y chromosome[edit]
There are some species, such as de Japanese rice fish, de XY system is stiww devewoping and cross over between de X and Y is stiww possibwe.. Because de mawe specific region is very smaww and contains no essentiaw genes, it is even possibwe to artificiawwy induce XX mawes and YY femawes to no iww effect[37]
Human Y chromosome[edit]
In humans, de Y chromosome spans about 58 miwwion base pairs (de buiwding bwocks of DNA) and represents approximatewy 1% of de totaw DNA in a mawe ceww.[38] The human Y chromosome contains over 200 genes, at weast 72 of which code for proteins.[5] Traits dat are inherited via de Y chromosome are cawwed howandric traits (awdough biowogists wiww usuawwy just say "Y-winked").
Some cewws, especiawwy in owder men and smokers, wack a Y chromosome. It has been found dat men wif a higher percentage of hematopoietic stem cewws in bwood wacking de Y chromosome (and perhaps a higher percentage of oder cewws wacking it) have a higher risk of certain cancers and have a shorter wife expectancy. Men wif "woss of Y" (which was defined as no Y in at weast 18% of deir hematopoietic cewws) have been found to die 5.5 years earwier on average dan oders. This has been interpreted as a sign dat de Y chromosome pways a rowe going beyond sex determination and reproduction[39] (awdough de woss of Y may be an effect rader dan a cause). And yet women, who have no Y chromosome, have wower rates of cancer. Mawe smokers have between 1.5 and 2 times de risk of non-respiratory cancers as femawe smokers.[40][41]
Non-combining region of Y (NRY)[edit]
The human Y chromosome is normawwy unabwe to recombine wif de X chromosome, except for smaww pieces of pseudoautosomaw regions at de tewomeres (which comprise about 5% of de chromosome's wengf). These regions are rewics of ancient homowogy between de X and Y chromosomes. The buwk of de Y chromosome, which does not recombine, is cawwed de "NRY", or non-recombining region of de Y chromosome.[42] The singwe-nucweotide powymorphisms (SNPs) in dis region are used to trace direct paternaw ancestraw wines. For detaiws, see human Y-chromosome DNA hapwogroup.
The fowwowing are some of de gene count estimates of human Y chromosome. Because researchers use different approaches to genome annotation deir predictions of de number of genes on each chromosome varies (for technicaw detaiws, see gene prediction). Among various projects, de cowwaborative consensus coding seqwence project (CCDS) takes an extremewy conservative strategy. So CCDS's gene number prediction represents a wower bound on de totaw number of human protein-coding genes.[43]
When simpwy saying "number of genes", in most cases, it refers onwy to "number of protein-coding genes".
Estimated by Protein-coding genes Non-coding RNA genes Pseudogenes Source Rewease date
CCDS 63 - - [2] 2016-09-08
HGNC 45 55 381 [44] 2017-05-12
Ensembw 63 109 392 [45] 2017-03-29
NCBI 73 122 400 [46][47][48] 2017-05-19
In generaw, de human Y chromosome is extremewy gene poor—it is one of de wargest gene deserts in de human genome, however dere are severaw notabwe genes coded on de Y chromosome: not incwuding pseudoautosomaw genes, genes encoded on de human Y chromosome incwude:
Y-chromosome-winked diseases[edit]
Diseases winked to Y chromosome can be of more common types or very rare ones. Yet, de rare ones stiww have importance in understanding de function of de Y chromosome in de normaw case.
More common[edit]
No vitaw genes reside onwy on de Y chromosome, since roughwy hawf of humans (femawes) do not have a Y chromosome. The onwy weww-defined human disease winked to a defect on de Y chromosome is defective testicuwar devewopment (due to dewetion or deweterious mutation of SRY). However, having two X chromosomes and one Y chromosome has simiwar effects. On de oder hand, having Y chromosome powysomy has oder effects dan mascuwinization, uh-hah-hah-hah.
Y chromosome microdewetion[edit]
Y chromosome microdewetion (YCM) is a famiwy of genetic disorders caused by missing genes in de Y chromosome. Many affected men exhibit no symptoms and wead normaw wives. However, YCM is awso known to be present in a significant number of men wif reduced fertiwity or reduced sperm count.
Defective Y chromosome[edit]
This resuwts in de person presenting a femawe phenotype (i.e., is born wif femawe-wike genitawia) even dough dat person possesses an XY karyotype. The wack of de second X resuwts in infertiwity. In oder words, viewed from de opposite direction, de person goes drough defeminization but faiws to compwete mascuwinization.
The cause can be seen as an incompwete Y chromosome: de usuaw karyotype in dese cases is 45X, pwus a fragment of Y. This usuawwy resuwts in defective testicuwar devewopment, such dat de infant may or may not have fuwwy formed mawe genitawia internawwy or externawwy. The fuww range of ambiguity of structure may occur, especiawwy if mosaicism is present. When de Y fragment is minimaw and nonfunctionaw, de chiwd is usuawwy a girw wif de features of Turner syndrome or mixed gonadaw dysgenesis.
Kwinefewter syndrome (47, XXY) is not an aneupwoidy of de Y chromosome, but a condition of having an extra X chromosome, which usuawwy resuwts in defective postnataw testicuwar function, uh-hah-hah-hah. The mechanism is not fuwwy understood; it does not seem to be due to direct interference by de extra X wif expression of Y genes.
47, XYY syndrome (simpwy known as XYY syndrome) is caused by de presence of a singwe extra copy of de Y chromosome in each of a mawe's cewws. 47, XYY mawes have one X chromosome and two Y chromosomes, for a totaw of 47 chromosomes per ceww. Researchers have found dat an extra copy of de Y chromosome is associated wif increased stature and an increased incidence of wearning probwems in some boys and men, but de effects are variabwe, often minimaw, and de vast majority do not know deir karyotype.
In 1965 and 1966 Patricia Jacobs and cowweagues pubwished a chromosome survey of 315 mawe patients at Scotwand's onwy speciaw security hospitaw for de devewopmentawwy disabwed, finding a higher dan expected number of patients to have an extra Y chromosome.[53] The audors of dis study wondered "wheder an extra Y chromosome predisposes its carriers to unusuawwy aggressive behaviour", and dis conjecture "framed de next fifteen years of research on de human Y chromosome".[54]
Through studies over de next decade, dis conjecture was shown to be incorrect: de ewevated crime rate of XYY mawes is due to wower median intewwigence and not increased aggression,[55] and increased height was de onwy characteristic dat couwd be rewiabwy associated wif XYY mawes.[56] The "criminaw karyotype" concept is derefore inaccurate.
The fowwowing Y-chromosome-winked diseases are rare, but notabwe because of deir ewucidating of de nature of de Y chromosome.
More dan two Y chromosomes[edit]
Greater degrees of Y chromosome powysomy (having more dan one extra copy of de Y chromosome in every ceww, e.g., XYYY) are rare. The extra genetic materiaw in dese cases can wead to skewetaw abnormawities, decreased IQ, and dewayed devewopment, but de severity features of dese conditions are variabwe.
XX mawe syndrome[edit]
XX mawe syndrome occurs when dere has been a recombination in de formation of de mawe gametes, causing de SRY portion of de Y chromosome to move to de X chromosome. When such an X chromosome contributes to de chiwd, de devewopment wiww wead to a mawe, because of de SRY gene.
Genetic geneawogy[edit]
In human genetic geneawogy (de appwication of genetics to traditionaw geneawogy), use of de information contained in de Y chromosome is of particuwar interest because, unwike oder chromosomes, de Y chromosome is passed excwusivewy from fader to son, on de patriwineaw wine. Mitochondriaw DNA, maternawwy inherited to bof sons and daughters, is used in an anawogous way to trace de matriwineaw wine.
Brain function[edit]
Research is currentwy investigating wheder mawe-pattern neuraw devewopment is a direct conseqwence of Y-chromosome-rewated gene expression or an indirect resuwt of Y-chromosome-rewated androgenic hormone production, uh-hah-hah-hah.[57]
The presence of mawe chromosomes in fetaw cewws in de bwood circuwation of women was discovered in 1974.[58] In 1996, it was found dat mawe fetaw progenitor cewws couwd persist postpartum in de maternaw bwood stream for as wong as 27 years.[59]
A 2004 study at de Fred Hutchinson Cancer Research Center, Seattwe, investigated de origin of mawe chromosomes found in de peripheraw bwood of women who had not had mawe progeny. A totaw of 120 subjects (women who had never had sons) were investigated, and it was found dat 21% of dem had mawe DNA. The subjects were categorised into four groups based on deir case histories:[60]
• Group A (8%) had had onwy femawe progeny.
• Patients in Group B (22%) had a history of one or more miscarriages.
• Patients Group C (57%) had deir pregnancies medicawwy terminated.
• Group D (10%) had never been pregnant before.
The study noted dat 10% of de women had never been pregnant before, raising de qwestion of where de Y chromosomes in deir bwood couwd have come from. The study suggests dat possibwe reasons for occurrence of mawe chromosome microchimerism couwd be one of de fowwowing:[60]
• miscarriages,
• pregnancies,
• vanished mawe twin,
• possibwy from sexuaw intercourse.
A 2012 study at de same institute has detected cewws wif de Y chromosome in muwtipwe areas of de brains of deceased women, uh-hah-hah-hah.[61]
Cytogenetic band[edit]
G-banding ideograms of human Y chromosome
G-banding ideogram of human Y chromosome in resowution 850 bphs. Band wengf in dis diagram is proportionaw to base-pair wengf. This type of ideogram is generawwy used in genome browsers (e.g. Ensembw, UCSC Genome Browser).
G-banding patterns of human Y chromosome in dree different resowutions (400,[62] 550[63] and 850[4]). Band wengf in dis diagram is based on de ideograms from ISCN (2013).[64] This type of ideogram represents actuaw rewative band wengf observed under a microscope at de different moments during de mitotic process.[65]
G-bands of human Y chromosome in resowution 850 bphs[4]
Chr. Arm[66] Band[67] ISCN
Stain[69] Density
Y p 11.32 0 149 1 300,000 gneg
Y p 11.31 149 298 300,001 600,000 gpos 50
Y p 11.2 298 1043 600,001 10,300,000 gneg
Y p 11.1 1043 1117 10,300,001 10,400,000 acen
Y q 11.1 1117 1266 10,400,001 10,600,000 acen
Y q 11.21 1266 1397 10,600,001 12,400,000 gneg
Y q 11.221 1397 1713 12,400,001 17,100,000 gpos 50
Y q 11.222 1713 1881 17,100,001 19,600,000 gneg
Y q 11.223 1881 2160 19,600,001 23,800,000 gpos 50
Y q 11.23 2160 2346 23,800,001 26,600,000 gneg
Y q 12 2346 3650 26,600,001 57,227,415 gvar
See awso[edit]
1. ^ "Human Genome Assembwy GRCh38 - Genome Reference Consortium". Nationaw Center for Biotechnowogy Information. 2013-12-24. Retrieved 2017-03-04.
2. ^ a b "Search resuwts - Y[CHR] AND "Homo sapiens"[Organism] AND ("has ccds"[Properties] AND awive[prop]) - Gene". NCBI. CCDS Rewease 20 for Homo sapiens. 2016-09-08. Retrieved 2017-05-28.
3. ^ Tom Strachan; Andrew Read (2 Apriw 2010). Human Mowecuwar Genetics. Garwand Science. p. 45. ISBN 978-1-136-84407-2.
4. ^ a b c Genome Decoration Page, NCBI. Ideogram data for Homo sapience (850 bphs, Assembwy GRCh38.p3). Last update 2014-06-03. Retrieved 2017-04-26.
5. ^ a b "Ensembw Human MapView rewease 43". February 2014. Retrieved 2007-04-14.
6. ^ Wade, Nichowas (January 13, 2010). "Mawe Chromosome May Evowve Fastest". New York Times.
7. ^ Genes and Disease. Bedesda, Marywand: Nationaw Center for Biotechnowogy Information, uh-hah-hah-hah.
8. ^ David Bainbridge, 'The X in Sex: How de X Chromosome Controws Our Lives, pages 3-5, 13, Harvard University Press, 2003 ISBN 0674016211.
9. ^ James Schwartz, In Pursuit of de Gene: From Darwin to DNA, pages 170-172, Harvard University Press, 2009 ISBN 0674034910
10. ^ Bainbridge, pages 65-66
11. ^ a b Grützner F, Rens W, Tsend-Ayush E, et aw. (2004). "In de pwatypus a meiotic chain of ten sex chromosomes shares genes wif de bird Z and mammaw X chromosomes". Nature. 432 (7019): 913–9177. PMID 15502814. doi:10.1038/nature03021.
12. ^ a b Warren WC, Hiwwier LD, Graves JA, et aw. (2008). "Genome anawysis of de pwatypus reveaws uniqwe signatures of evowution". Nature. 453 (7192): 175–183. PMC 2803040Freely accessible. PMID 18464734. doi:10.1038/nature06936.
13. ^ a b c Veyrunes F, Waters PD, Miedke P, et aw. (2008). "Bird-wike sex chromosomes of pwatypus impwy recent origin of mammaw sex chromosomes". Genome Research. 18 (6): 965–973. PMC 2413164Freely accessible. PMID 18463302. doi:10.1101/gr.7101908.
14. ^ Muwwer, H. J. (1914). "A gene for de fourf chromosome of Drosophiwa". Journaw of Experimentaw Zoowogy. 17 (3): 325–336. doi:10.1002/jez.1400170303.
15. ^ Lahn B, Page D (1999). "Four evowutionary strata on de human X chromosome". Science. 286 (5441): 964–7. PMID 10542153. doi:10.1126/science.286.5441.964.
16. ^ a b c d e f g h i j k Graves, J. A. M. (2006). "Sex chromosome speciawization and degeneration in mammaws". Ceww. 124 (5): 901–914. PMID 16530039. doi:10.1016/j.ceww.2006.02.024.
17. ^ Graves J. A. M.; Koina E.; Sankovic N. (2006). "How de gene content of human sex chromosomes evowved". Curr Opin Genet Dev. 16 (3): 219–24. PMID 16650758. doi:10.1016/j.gde.2006.04.007.
18. ^ Hamiwton, Jon (January 13, 2010). "Human Mawe: Stiww A Work in Progress". NPR.
19. ^ Watson, Jacwyn M.; Riggs, Ardur; Graves, Jennifer A. Marshaww (1992). "Gene mapping studies confirm de homowogy between de pwatypus X and echidna X1 chromosomes and identify a conserved ancestraw monotreme X chromosome". Chromosoma. 101 (10): 596–601. doi:10.1007/BF00360536.
20. ^ Graves, J. A. M. (2004). "The degenerate Y chromosome—can conversion save it?". Reproduction Fertiwity and Devewopment. 16 (5): 527–534. PMID 15367368. doi:10.1071/RD03096.
21. ^ Goto, H.; Peng, L.; Makova, K. D. (2009). "Evowution of X-degenerate Y chromosome genes in greater apes: conservation of gene content in human and goriwwa, but not chimpanzee". Journaw of Mowecuwar Evowution. 68 (2): 134–144. PMID 19142680. doi:10.1007/s00239-008-9189-y.
22. ^ Hughes, Jennifer F.; et aw. (2005). "Conservation of Y-winked genes during human evowution reveawed by comparative seqwencing in chimpanzee". Nature. 437 (7055): 100–103. PMID 16136134. doi:10.1038/nature04101.
23. ^ Hsu, Christine. "Biowogists Debunk de 'Rotting' Y Chromosome Theory, Men Wiww Stiww Exist". Medicaw Daiwy.
24. ^ Lindbwad-Toh K, Wade CM, Mikkewsen TS, Karwsson EK, Jaffe DB, Kamaw M, Cwamp M, Chang JL, Kuwbokas EJ, Zody MC, Maucewi E, Xie X, Breen M, Wayne RK, Ostrander EA, Ponting CP, Gawibert F, Smif DR, DeJong PJ, Kirkness E, Awvarez P, Biagi T, Brockman W, Butwer J, Chin CW, Cook A, Cuff J, Dawy MJ, DeCaprio D, Gnerre S, Grabherr M, Kewwis M, Kweber M, Bardeweben C, Goodstadt L, Heger A, Hitte C, Kim L, Koepfwi KP, Parker HG, Powwinger JP, Searwe SM, Sutter NB, Thomas R, Webber C, Bawdwin J, Abebe A, Abouewweiw A, Aftuck L, Ait-Zahra M, Awdredge T, Awwen N, An P, Anderson S, Antoine C, Arachchi H, Aswam A, Ayotte L, Bachantsang P, Barry A, Bayuw T, Benamara M, Berwin A, Bessette D, Bwitshteyn B, Bwoom T, Bwye J, Boguswavskiy L, Bonnet C, Boukhgawter B, Brown A, Cahiww P, Cawixte N, Camarata J, Cheshatsang Y, Chu J, Citroen M, Cowwymore A, Cooke P, Dawoe T, Daza R, Decktor K, DeGray S, Dhargay N, Doowey K, Doowey K, Dorje P, Dorjee K, Dorris L, Duffey N, Dupes A, Egbiremowen O, Ewong R, Fawk J, Farina A, Faro S, Ferguson D, Ferreira P, Fisher S, FitzGerawd M, Fowey K, Fowey C, Franke A, Friedrich D, Gage D, Garber M, Gearin G, Giannoukos G, Goode T, Goyette A, Graham J, Grandbois E, Gyawtsen K, Hafez N, Hagopian D, Hagos B, Haww J, Heawy C, Hegarty R, Honan T, Horn A, Houde N, Hughes L, Hunnicutt L, Husby M, Jester B, Jones C, Kamat A, Kanga B, Kewws C, Khazanovich D, Kieu AC, Kisner P, Kumar M, Lance K, Landers T, Lara M, Lee W, Leger JP, Lennon N, Leuper L, LeVine S, Liu J, Liu X, Lokyitsang Y, Lokyitsang T, Lui A, Macdonawd J, Major J, Marabewwa R, Maru K, Matdews C, McDonough S, Mehta T, Mewdrim J, Mewnikov A, Meneus L, Mihawev A, Mihova T, Miwwer K, Mittewman R, Mwenga V, Muwrain L, Munson G, Navidi A, Naywor J, Nguyen T, Nguyen N, Nguyen C, Nguyen T, Nicow R, Norbu N, Norbu C, Novod N, Nyima T, Owandt P, O'Neiww B, O'Neiww K, Osman S, Oyono L, Patti C, Perrin D, Phunkhang P, Pierre F, Priest M, Rachupka A, Raghuraman S, Rameau R, Ray V, Raymond C, Rege F, Rise C, Rogers J, Rogov P, Sahawie J, Settipawwi S, Sharpe T, Shea T, Sheehan M, Sherpa N, Shi J, Shih D, Swoan J, Smif C, Sparrow T, Stawker J, Stange-Thomann N, Stavropouwos S, Stone C, Stone S, Sykes S, Tchuinga P, Tenzing P, Tesfaye S, Thouwutsang D, Thouwutsang Y, Topham K, Topping I, Tsamwa T, Vassiwiev H, Venkataraman V, Vo A, Wangchuk T, Wangdi T, Weiand M, Wiwkinson J, Wiwson A, Yadav S, Yang S, Yang X, Young G, Yu Q, Zainoun J, Zembek L, Zimmer A, Lander ES (December 2005). "Genome seqwence, comparative anawysis and hapwotype structure of de domestic dog". Nature. 438 (7069): 803–819. PMID 16341006. doi:10.1038/nature04338.
25. ^ Liu, Zhandong; Venkatesh, Santosh S.; Mawey, Carwo C. (2008). "Seqwence space coverage, entropy of genomes and de potentiaw to detect non-human DNA in human sampwes". BMC Genomics. 9 (1): 509. PMC 2628393Freely accessible. PMID 18973670. doi:10.1186/1471-2164-9-509. Fig. 6, using de Lempew-Ziv estimators of entropy rate.
26. ^ Charwesworf, B.; Charwesworf, D. (2000). "The degeneration of Y chromosomes". Phiwosophicaw Transactions of de Royaw Society B. 355 (1403): 1563–1572. doi:10.1098/rstb.2000.0717.
27. ^ Rozen S, Skawetsky H, Marszawek J, Minx P, Cordum H, Waterston R, Wiwson R, Page D (2003). "Abundant gene conversion between arms of pawindromes in human and ape Y chromosomes". Nature. 423 (6942): 873–6. PMID 12815433. doi:10.1038/nature01723.
28. ^ a b Marchaw, J. A.; Acosta, M. J.; Buwwejos, M.; de wa Guardia, R. D.; Sanchez, A. (2003). "Sex chromosomes, sex determination, and sex-winked seqwences in Microtidae". Cytogenetic and Genome Research. 101 (3–4): 266–273. doi:10.1159/000074347.
29. ^ Wiwson, M. A.; Makova, K. D. (2009). "Genomic anawyses of sex chromosome evowution". Annuaw Review of Genomics and Human Genetics. 10 (1): 333–354. PMID 19630566. doi:10.1146/annurev-genom-082908-150105.
30. ^ Just, W.; Baumstark, A.; Suss, A.; Graphodatsky, A.; Rens, W.; Schafer, N.; Bakwoushinskaya, I.; et aw. (2007). "Ewwobius wutescens: Sex determination and sex chromosome". Sexuaw Devewopment. 1 (4): 211–221. PMID 18391532. doi:10.1159/000104771.
31. ^ a b c Arakawa, Y.; Nishida-Umehara, C.; Matsuda, Y.; Sutou, S.; Suzuki, H. (2002). "X-chromosomaw wocawization of mammawian Y-winked genes in two XO species of de Ryukyu spiny rat". Cytogenetic and Genome Research. 99 (1–4): 303–309. PMID 12900579. doi:10.1159/000071608.
32. ^ Hoekstra, H. E.; Edwards, S. V. (2000). "Muwtipwe origins of XY femawe mice (genus Akodon): phywogenetic and chromosomaw evidence". Proceedings of de Royaw Society B. 267 (1455): 1825–1831. PMC 1690748Freely accessible. PMID 11052532. doi:10.1098/rspb.2000.1217.
33. ^ Ortiz, M. I.; Pinna-Senn, E.; Dawmasso, G.; Lisanti, J. A. (2009). "Chromosomaw aspects and inheritance of de XY femawe condition in Akodon azarae (Rodentia, Sigmodontinae)". Mammawian Biowogy. 74 (2): 125–129. doi:10.1016/j.mambio.2008.03.001.
34. ^ Charwesworf, B.; Dempsey, N. D. (2001). "A modew of de evowution of de unusuaw sex chromosome system of Microtus oregoni". Heredity. 86 (4): 387–394. PMID 11520338. doi:10.1046/j.1365-2540.2001.00803.x.
35. ^ Zhou, Q.; Wang, J.; Huang, L.; Nie, W. H.; Wang, J. H.; Liu, Y.; Zhao, X. Y.; et aw. (2008). "Neo-sex chromosomes in de bwack muntjac recapituwate incipient evowution of mammawian sex chromosomes". Genome Biowogy. 9 (6): R98. PMC 2481430Freely accessible. PMID 18554412. doi:10.1186/gb-2008-9-6-r98.
36. ^ Hamiwton, W. D. (1967). "Extraordinary sex ratios". Science. 156 (3774): 477–488. Bibcode:1967Sci...156..477H. PMID 6021675. doi:10.1126/science.156.3774.477.
37. ^ Schartw, Manfred (Juwy 2004). "A comparative view on sex determination in medaka". Mechanisms of Devewopment. 121 (7–8): 639–645. PMID 15210173. doi:10.1016/j.mod.2004.03.001. Retrieved 6 December 2011.
38. ^ Nationaw Library of Medicine's Genetic Home Reference
39. ^ Lars A. Forsberg; et aw. (Apriw 2014). "Mosaic woss of chromosome Y in peripheraw bwood is associated wif shorter survivaw and higher risk of cancer". Nature Genetics. 46 (6): 624–628. PMID 24777449. doi:10.1038/ng.2966.
40. ^ Andy Coghwan (13 December 2014). "Y men are more wikewy to get cancer dan women". New Scientist: 17.
41. ^ Jan P. Dumanski; et aw. (December 2014). "Smoking is associated wif mosaic woss of chromosome Y". Science. 347 (6217): 81–3. PMC 4356728Freely accessible. PMID 25477213. doi:10.1126/science.1262092.
42. ^ Science Daiwy, Apr. 3, 2008.
43. ^ Pertea M, Sawzberg SL (2010). "Between a chicken and a grape: estimating de number of human genes.". Genome Biow. 11 (5): 206. PMC 2898077Freely accessible. PMID 20441615. doi:10.1186/gb-2010-11-5-206.
44. ^ "Statistics & Downwoads for chromosome Y". HUGO Gene Nomencwature Committee. 2017-05-12. Retrieved 2017-05-19.
45. ^ "Chromosome Y: Chromosome summary - Homo sapiens". Ensembw Rewease 88. 2017-03-29. Retrieved 2017-05-19.
46. ^ "Search resuwts - Y[CHR] AND "Homo sapiens"[Organism] AND ("genetype protein coding"[Properties] AND awive[prop]) - Gene". NCBI. 2017-05-19. Retrieved 2017-05-20.
47. ^ "Search resuwts - Y[CHR] AND "Homo sapiens"[Organism] AND ( ("genetype miscrna"[Properties] OR "genetype ncrna"[Properties] OR "genetype rrna"[Properties] OR "genetype trna"[Properties] OR "genetype scrna"[Properties] OR "genetype snrna"[Properties] OR "genetype snorna"[Properties]) NOT "genetype protein coding"[Properties] AND awive[prop]) - Gene". NCBI. 2017-05-19. Retrieved 2017-05-20.
48. ^ "Search resuwts - Y[CHR] AND "Homo sapiens"[Organism] AND ("genetype pseudo"[Properties] AND awive[prop]) - Gene". NCBI. 2017-05-19. Retrieved 2017-05-20.
49. ^ Bachtrog, Doris (18 January 2013). "Y-chromosome evowution: emerging insights into processes of Y-chromosome degeneration". Nature Reviews Genetics. 14 (2): 113–124. doi:10.1038/nrg3366.
50. ^ Veerappa, Avinash; Ramachandra NB; Prakash Padakannaya (August 2013). "Copy number variation-based powymorphism in a new pseudoautosomaw region 3 (PAR3) of a human X-chromosome-transposed region (XTR) in de Y chromosome". Functionaw and Integrative Genomics. 13 (3): 285–293. PMID 23708688. doi:10.1007/s10142-013-0323-6.
51. ^ Veerappa, Avinash; Ramachandra NB; Padakannaya P (August 2013). "Copy number variation-based powymorphism in a new pseudoautosomaw region 3 (PAR3) of a human X-chromosome-transposed region (XTR) in de Y chromosome.". Functionaw & Integrative Genomics. 13 (3): 285–293. PMID 23708688. doi:10.1007/s10142-013-0323-6.
52. ^ Raudsepp, Terje; Chowdhary, Bhanu P. (6 January 2016). "The Euderian Pseudoautosomaw Region". Cytogenetic and Genome Research. 147 (2-3): 81–94. doi:10.1159/000443157.
53. ^ Jacobs, Patricia A.; Brunton, Muriew; Mewviwwe, Marie M.; Brittain, Robert P.; McCwemont, Wiwwiam F. (December 25, 1965). "Aggressive behavior, mentaw sub-normawity and de XYY mawe". Nature. 208 (5017): 1351–2. PMID 5870205. doi:10.1038/2081351a0.
54. ^ Richardson, Sarah S. (2013). Sex Itsewf: The Search for Mawe & Femawe in de Human Genome. Chicago: U. of Chicago Press. p. 84. ISBN 978-0-226-08468-8.
55. ^ Witkin, H.A.; et aw. (13 August 1976). "Criminawity in XYY and XXY men". Science. 193 (4253): 547–555. PMID 959813. doi:10.1126/science.959813.
56. ^ Witkin, Herman A.; Goodenough, Donawd R.; Hirschhorn, Kurt (1977). "XYY Men: Are They Criminawwy Aggressive?". The Sciences. 17 (6): 10–13. doi:10.1002/j.2326-1951.1977.tb01570.x.
57. ^ Kopsida, Eweni; Evangewia Stergiakouwi; Phoebe M. Lynn; Lawrence S. Wiwkinson; Wiwwiam Davies (2009). "The Rowe of de Y Chromosome in Brain Function" (PDF). The Open Neuroendocrinowogy Journaw. 2: 20–30. PMC 2854822Freely accessible. PMID 20396406. doi:10.2174/1876528900902010020. Retrieved 2013-04-05.
58. ^ Schröder Jim, Thwikainen Anja, de wa Chapewwe A (1974). "Fetaw weukocytes in de maternaw circuwation after dewivery: Cytowogicaw aspects". Transpwantation. 17 (4): 346–354. doi:10.1097/00007890-197404000-00003.
59. ^ Bianchi D. W.; Zickwowf G. K.; Weiw G. J.; Sywvester S.; DeMaria M. A. (1996). "Mawe fetaw progenitor cewws persist in maternaw bwood for as wong as 27 years postpartum". Proceedings of de Nationaw Academy of Sciences of de United States of America. 93 (2): 705–708. PMC 40117Freely accessible. PMID 8570620. doi:10.1073/pnas.93.2.705.
60. ^ a b Yan, Zhen; Lambert, Nadawie C.; Gudrie, Kaderine A.; Porter, Awwison J.; Loubiere, Laurence S.; Madeweine, Margaret M.; Stevens, Anne M.; Hermes, Heidi M. & Newson, J. Lee (2005). "Mawe microchimerism in women widout sons: Quantitative assessment and correwation wif pregnancy history" (fuww text). The American Journaw of Medicine. 118 (8): 899–906. PMID 16084184. doi:10.1016/j.amjmed.2005.03.037. Retrieved 24 December 2014.
61. ^ Chan W. F. N.; Gurnot C.; Montine T. J.; Sonnen J. A.; Gudrie K. A.; J. Lee Newson (26 September 2012). "Mawe microchimerism in de human femawe brain". PLOS ONE. 7 (9): e45592. PMC 3458919Freely accessible. PMID 23049819. doi:10.1371/journaw.pone.0045592. Retrieved 24 December 2014.
62. ^ Genome Decoration Page, NCBI. Ideogram data for Homo sapience (400 bphs, Assembwy GRCh38.p3). Last update 2014-03-04. Retrieved 2017-04-26.
63. ^ Genome Decoration Page, NCBI. Ideogram data for Homo sapience (550 bphs, Assembwy GRCh38.p3). Last update 2015-08-11. Retrieved 2017-04-26.
64. ^ Internationaw Standing Committee on Human Cytogenetic Nomencwature (2013). ISCN 2013: An Internationaw System for Human Cytogenetic Nomencwature (2013). Karger Medicaw and Scientific Pubwishers. ISBN 978-3-318-02253-7.
65. ^ Sedakuwvichai, W.; Manitpornsut, S.; Wiboonrat, M.; Liwakiatsakun, W.; Assawamakin, A.; Tongsima, S. (2012). "Estimation of band wevew resowutions of human chromosome images" (PDF). In Computer Science and Software Engineering (JCSSE), 2012 Internationaw Joint Conference on: 276–282. doi:10.1109/JCSSE.2012.6261965.
66. ^ "p": Short arm; "q": Long arm.
67. ^ For cytogenetic banding nomencwature, see articwe wocus.
68. ^ a b These vawues (ISCN start/stop) are based on de wengf of bands/ideograms from de ISCN book, An Internationaw System for Human Cytogenetic Nomencwature (2013). Arbitrary unit.
69. ^ gpos: Region which is positivewy stained by G banding, generawwy AT-rich and gene poor; gneg: Region which is negativewy stained by G banding, generawwy CG-rich and gene rich; acen Centromere. var: Variabwe region; stawk: Stawk.
Externaw winks[edit]
|
August 18, 2017
Laminar Crystal
Muscovite mica
Laminar crystal objects are made of muscovite mica (a crystalline, sheet-like mineral), combined with food-safe ceramic clay. Mica is used in many modern technologies as a capacitor and as an insulator. Lesser known is the fact that mica amplifies the frequencies that support life on Earth. Numerous large deposits on the planet help to maintain energetic balance and to continually cleanse the surrounding environment. When mica is mixed with ceramic clay, it creates a matrix that can be molded to any shape. Firing creates a new material and the clay becomes a part of the crystalline mica matrix. The resulting product is similar to material believed to have been used in the capstone of the Great Pyramid in Egypt.
Crystalline materials are “tuned,” like radio receivers, to pick up specific frequencies. Molecular organization determines which frequencies they are tuned to accumulate. Mica and laminar crystal pick up many life-supporting frequencies and radiate them for the benefit of everything in the surrounding area.
Muscovite mica flakes
Among other things, crystals are capacitors. They accumulate and discharge energy. Laminar crystal objects can store a tremendous amount of energy which results from millions of multi-directional layers resonating together. The elements in laminar crystal are maintained in a high spin state referred to as Ormus. As one particle discharges, it charges another particle so that the high spin state is maintained. When placed in or around water, laminar crystal objects excite individual elements in water and heighten their energetic potential. Laminar crystal brings structure, life force, and hydrogen to water. It is ideal when used in combination with sea salts and with ANCHI Crystals. Together, these bring the full-spectrum of life-supporting energies to water.
For years, archeologists have pondered the use of mica in ancient temples and pyramids. Its use was obviously not decorative and it has been found in one form or another, in many pyramids and ancient towers. This suggests its purpose as an energetic accumulator, radiator, and/or shield. Pyramids and pyramid complexes are also often found in conjunction with underground caverns and tunnels suggesting the flow of water beneath them. Recently, expansive caverns have been discovered beneath the entire pyramid complex in Egypt. The flooding of the Nile River each year would have filled these tunnels and supported the generation of massive amounts of energy. Many books have been written on this possibility. Read the article on mica and cosmic frequencies.
How to use laminar crystal
Laminar orbs_smLaminar crystal objects can be placed in or near water. If you are using small objects in the water, their use in groups of 3 creates a unique resonance that structures, refines and energizes water more rapidly. Place 3 laminar crystal objects in a pitcher of water and leave overnight or longer before consumption. Laminar Crystal Orbs are our own unique creation using mica and gold leaf (24-carat edible gold leaf). Laminar Crystal Orbs are sold in sets of 3. They are included in Introductory Kit #2.
The Water Cradle (right) combines the shape of the egg with the energetic benefits of laminar crystal. This provides a unique way to refine water’s structure and to enhance its energetic potential. Within a porous, egg-shaped vessel, water’s receptive potential is maximized. It reaches its most refined energetic state in perfect balance and equilibrium. This is because clay (and laminar crystal) allow water to breathe—which keeps water cool. Cool, dense water at the outer edges of an egg-shaped clay container sinks to the bottom, forcing warmer water to rise up the center. The process ensures constant cooling and it enhances the continual circulation of energy. No stagnant area exists. As water circulates, molecules assume a tightly packed, refined, crystalline network while gasses become quiet and latent. Hydrogen retreats into the molecular cages formed as water becomes a liquid crystal. Water becomes refined within hours inside the Water Cradle.
Purchase Laminar Crystal Orbs
Purchase the laminar crystal Water Cradle
Be Sociable, Share!
|
Human beings are competitive species and most athletes, when motivated by either the need to achieve full potential or the urge to get fame and recognition, may make them resort to the use of anabolic steroids to achieve this. Anabolic steroids are drugs that enhance performance by increasing the user’s body mass, strength, agility and aggression. This gives the athletes an edge over other competitors and increasing their winning chances. This led to a mass competitive race that saw many athletes both professionals and armatures turn to steroids to gain advantages over other competitors.
Use of anabolic steroids in sports has declined over the past millennia mainly due to the strict regulations set by the sports association and the government. Steroid use was very prevalent in sports competitions in all major leagues such as swimming, boxing, body building and even baseball. Some athletes were often encouraged by coaches and even their governments to use steroids so as to boost their performance in the competitions. This saw some countries such as East Germany use steroids on girls as small as 12 years without parental consent. This enabled the German swimmers and other teams who used the drugs later, to win Olympic medals. Other governments such as Russia employed the help of scientists to help their players use steroids and avoid detection.
The desire to win was so huge that more and more athletes became enveloped in steroid use so as to keep up with the ever growing performance standards. The athletes started using steroid cocktails often mixing up to two or three different types of steroids so as to try and produce better performance in competitions. These increased competitions gave the athletes the mentality that steroids were a necessary evil and did anything to use the drugs and avoid the consequences. Scientists were also not left behind in the race to produce the perfect anabolic steroids in the market which had to produce better results with fewer side effects.
The realization and placement of rules and restrictions banning the use of steroids in competitions did little to suppress the abuse of steroids. This only encouraged the athletes to improvise and find new ways and steroids which could pass the tests. Athletes used steroids in secrecy but with a higher zeal than before. More and more athletes and countries were banned from sports competitions due to doping incidents.
The desire to win among athletes is still high although the doping cases have reduced significantly over the past years due to the determination of sporting associations. With more variables of performance enhancing drugs being sold in pharmaceutical stores, it will be harder for the government to curb their abuse.
Statistics show that the number of steroid users is likely to increase especially among teenagers and adults between the years of 15-30 with 1 percent of US population said to have participated in taking steroids. This makes it harder for the government to control the use of steroids among the general population. You can visit http://120kgs.com/ for more information about steroids.
About admin
Check Also
HCG—injections or shots
HCG, Human Chorionic Gonadotropin is a hormone which is produced by women in pregnancy. So, …
Leave a Reply
Facebook Auto Publish Powered By : XYZScripts.com
|
Introduction: Crack an Apple in Half With Your Bare Hands
Demonstrate your super-human strength by ripping an apple in half with your bare hands. Learn the simple technique here.
If you prefer the video version of the Instructable, you can see the process in this short video.
Step 1: Technique
This trick is all about the technique. As the video explains, humans are not strong enough to simply grab a hold of an apple and rip it apart. The secret is to use your hands in such a way that the harder you grip the more pressure is applied from the stem of the apple outward. Keep this idea in mind as we proceed to the next steps.
Step 2: Wiggle the Fleshy Part of Your Thumbs Into the Stem Area
Remove the stem and then wriggle the base of your thumbs (actually part of your palms) into where the stem was. The rest of your fingers go around the apple and rest on the bottom of the apple.
If you put your hands in this position without the apple and pull your fingers toward your wrists, you will notice that your thumbs roll out. This rolling is the force that will split the apple open.
Step 3: Grip and Roll
With your hands set as described in step 2 squeeze hard and let your thumbs roll outward. You will feel the ripping force increase as your grip tightens. As you grip harder, the apple will break in half.
Step 4: Some Things I Have Learned
There are a few things that I have learned from teaching this to people.
1. Pretty much anyone can do this. I learned it from my mom and even my 12-year-old boy scouts can do it - even the skinny ones.
2. It sometimes helps to use your knee to strengthen your grip. Try pushing on your knee with you fingers as shown in the photo.
3. It sometimes helps to start out with a softer apple or a very crisp ripe one. If the apple is not ripe, it might be more difficult.
4. Size matters. You will eventually be able to crack all sizes, but it may be easier to start with one that fits comforably in your hand - not to big, not too small.
5. If you haven't already watched the video, then I recomend you do so. Sometimes its just easier to see done.
tyler roberts (author)2014-11-17
will this work on normal sized apples, or just those tiny things?
shoemaker (author)tyler roberts2014-11-17
When I was kid, there was a guy in my neighborhood with an amazing garden. He grew apples almost as big as a soccer ball. You could make a whole pie from just one. He often made the gift of one apple to the neighbors. Anyway, I'm not sure this works with his apples, but this will work with most apples you would come across.
tyler roberts (author)shoemaker2015-01-10
I guess I should try it, it's a little late for apples though, first frost has been and gone.
jarikcbol (author)2014-12-06
A few extra tips to people trying this:
1. Start with Gala or Honeycrisp apples, they are the easiest to do, so you can learn the technique. Granny smith and other green apples are damn near impossible when you start out.
2. if the two palms together thing does not work for you, try one palm, and one thumb down in the stem, sometimes thats easier.
3. 'find the sweet spot' I always start out by putting a thumb in the stem, and sort of rotating the apple and feeling it, after a little practice, you sort of develop a feel for finding the direction to try and split the apple. They are all different, but there is generally a 'sweet spot' which the apple breaks along easier than other angles.
4. remember, your basicly pulling it in half, don't squeeze to much, but rather, think of it like opening a book that is stuck shut, with the spine at the base of the apple and the pages at the top, where your palms are.
Mad Fox (author)2014-11-22
haha, rage quit.... I can't do that, maybe the apple is too small compare to my hand
BenBSykes (author)2014-11-19
This is awesome I pranked my little brothers with this!
The Rambler (author)2014-11-18
Haha, six years later and you're featured! This is a really cool trick. I'll have to try it on the apple I packed for lunch.
shoemaker (author)The Rambler2014-11-18
Yeah, that was nice. I think that this instructable was featured way back then. I didn't expect a second life.
Thanks for all the new views.
sabu.dawdy (author)The Rambler2014-11-18
I was thinking the same thing lol
warehouse32 (author)2014-11-18
it really is the simple things in life that we love...can't wait to try this!
haggai2b (author)2014-11-18
it was easy
Electrospark (author)2014-11-17
I've tried it a while ago but didn't know the technique so i squished the apple instead of cracking it.
Thanks for your instructable! I will try your technique and hope for the best! :)
shoemaker (author)Electrospark2014-11-17
Technique matters.
Electrospark (author)shoemaker2014-11-18
I only have rotten apples and i can't crack them... :(
gravityisweak (author)2014-11-17
Out of many attempts I've got this to work one time. It takes some practice and also the proper apple. But its totally possible.
shoemaker (author)gravityisweak2014-11-17
It is easier with some apples, but once you get the hang of it, you should be able to crack just about any apple.
BadPuns (author)2014-11-17
Did this once at lunch at my high school. Everyone was mystified...
Until they discovered that they could do it, too.
shoemaker (author)BadPuns2014-11-17
Its a simple trick I learned from my mom, but people are always impressed.
Master97865 (author)2013-04-11
"Everyone can do this"
I'm not someone.
Electrospark (author)Master978652014-11-17
Are you a robot? XD
printrbot932 (author)2014-11-17
I tried and failed then waited till the apple was room temp and it worked first try
LecJackS (author)2014-11-17
You can crack it again and have 4 pieces if you want to share with several people.
gfranke (author)2014-04-25
It helps if you wash the Apple first. Make sure you dry it off well. The way I've always done it is: put both of the pointy pads of your thumbs ( not the tips) inside the top of where the stem is. When you slide your thumbs passed each other, dig in and pull. It may take some practice but it's pretty easy.
Jaxton Maez (author)2013-09-16
I've seen people do it. Cool
csearle2 (author)2013-08-26
I'm trying to do this, but my hands just keep slipping off the apple. :(
Any tips?
shoemaker (author)csearle22013-08-26
Maybe wash the apple.
ilpug (author)2012-07-29
I think I'm too strong for this... I squished three apples in a row before I got one that broke mostly in half without getting crushed.
happyjo (author)2010-11-28
if only i weren't a puny wimp, I would be able to crack an apple in half like this guy!
super scout (author)2010-09-03
so awesome and makes a cool noise, and it isnt that hard
ReCreate (author)2009-04-22
I know got myself an apple,and i am trying to do it,ill report back
ReCreate (author)ReCreate2009-10-05
i failed...maybe my apple is too hands hurt now...
Browncoat (author)2008-10-04
I'd love to watch the vid, but can NEVER get metacafe to work! I've tried to install the adobe flash thingy that it says to install, but it still won't work. :( Why does everyone use Metacafe instead of YouTube on here...?
Rock Soldier (author)Browncoat2009-08-04
Because the more people that watch your Metacafe videos, the more money you get from them.
spiritwolf7984 (author)2009-07-22
I just did it. Im so happy =] Thanks
sev17 (author)2009-05-23
Thelonelysandwitch (author)2009-03-09
Are you saying scouts are week, if you are I hope you know that we are prety strong. this is pretty easy once you get the hang of it. my 9 yo brother can do it.
GorillazMiko (author)2008-11-15
That's awesome!
The Mad Pancake (author)2008-10-22
i actually use a different technique where I use my fingers to dig into the top of the apple and split it from there
HailDanzig (author)2008-10-02
It works! haha, and you've figured out a way to get me to eat more fruits. :-p
Ian01 (author)2008-09-29
Ihave watched the video before and couldn't breakmy apple. Very good instructable. So it's more of a 'squeeze' than a 'pull apart.'
downgrade (author)2008-09-29
I so wish I had apples right now...
pacific_sunrise07 (author)2008-09-29
awesome! totally bookmarked so i can show-off to the kids at the summer camp i staff!!
firesketch (author)2008-09-29
Awesome =]
tyeo098 (author)2008-09-28
Bookmarked for next time i have an apple
MasamuneX (author)2008-09-28
LOL! That was actually pretty cool. The video made it super easy to understand. Thanks for sharing.
About This Instructable
More by shoemaker:World's Most Powerful Marshmallow Gun -- How To Make Your OwnPyrotechnical Application for Potato CannonsSky Lantern/Hot Air Balloon from a Dry Cleaner Bag
Add instructable to:
|
Annularia Fossil
Annularia Fossil
C009/3865 Rights Managed
Request low-res file
530 pixels on longest edge, unwatermarked
Request/Download high-res file
Uncompressed file size: 50.0MB
Downloadable file size: 4.8MB
Price image Pricing
Please login to use the price calculator
Caption: Annularia is the scientific name for the leaves of the horsetail genus Calamites. Annularia consists of delicate rosettes of leaflets, which can be oval or lance-shaped, depending on the species. This genus occurs in Carboniferous strata in North America, Europe and Asia.
Keywords: annularia, arborescent, calamitaceae, calamites, carboniferous period, equisetales, equisetophyta, equisetopsida, extinct plant, fossil, fossil horsetail, fossil leaf, fossil leaflets, fossilized leaves, palaeontological, palaeontology, paleontology, paleozoic era, plant fossil, prehistoric flora, pteridophyta, rosette, sphenophyte, vertical, whorl
|
Huge Storm Rages on Neptune
An equatorial storm on Neptune has caught astronomers' eyes.
Image of huge storm raging on Neptune
Neptune recorded at several infrared wavelengths.
The location of the vortex caught astronomers by surprise, though. “Historically, bright clouds have occasionally been seen on Neptune, but usually at latitudes closer to the poles, around 10 to 60 degrees north or south” says de Pater. “Never before has a cloud been seen at, nor close to the equator, or anything so bright.”
Neptune is the windiest planet in the solar system, with observed equatorial wind speeds of up to 1,000 miles per hour (450 m/s). Since wind speeds vary drastically with latitude, a storm crossing more than 30° of latitude should quickly break apart. Something, such as an underlying vortex, must be holding it together. But a long-lasting vortex right at the equator would be hard to reconcile with our current understanding of the planet’s atmosphere.
It's possible, given the storm's extent, that it's not a vortex after all but rather a huge convective cloud, similar to the one spotted on Saturn in 2010.
“This shows that there are extremely drastic changes in the dynamics of Neptune’s atmosphere, and perhaps this is a seasonal weather event that may happen every few decades or so,” de Pater says.
Neptune orbits the Sun every 160 years, with each season lasting 40 years. We’ve only had a close look at the planet for less than 30 years.
Amateur Observations
Amateur image of Neptunian storm
The Neptune storm captured on June 10 by Darryl Pfitzner Milika.
Some intrepid amateurs also detected the storm in the weeks preceding the Keck observations using telescopes of 10 inches or more. Experienced planetary imagers using high-speed video cameras and frame-stacking software have a good chance of capturing the storm (appearing as a bright off-center spot) on the diminutive disk of the planet.
Read Keck Observatory's press release here.
|
Alex Funicello – Silicosis
There are many lung conditions that can result from working conditions. Construction workers are often subject to such problems, and silicosis is a prominent one. The American Lung Association describes silicosis as so:
“Silicosis is a lung disease that is caused by inhaling tiny bits of silica. Silica is a common mineral that is part of sand, rock and mineral ores like quartz. People who work in jobs where they could breathe in these tiny silica bits—like sandblasting, mining, construction and many others—are at risk for silicosis. The silica dust can cause fluid buildup and scar tissue in the lungs that cuts down your ability to breathe. Silicosis cannot be cured, but you can prevent it if you take specific steps to protect yourself and your family. “
There are a number of ways to approach a condition caused by silicosis, as the ALA describes on their website:
“Silicosis does not have a specific treatment. Your healthcare provider may prescribe cough medicine, bronchodilators (medications that help open your airways to help you breathe more easily), and oxygen. You may need antibiotics for any respiratory infections. To keep the disease from getting worse, it is important to stay away from any additional sources of silica and other lung irritants, such as indoor and outdoor air pollution, allergens, and smoke.”
For More Info Visit – Alex Funicello
|
Lysine Animation
Lysine is a base, as are arginine and histidine. The ε-amino group often participates in hydrogen bonding and as a general base in catalysis. Common posttranslational modifications include methylation of the ε-amino group, giving methyl-, dimethyl-, and trimethyllysine. The latter occurs in calmodulin. Other posttranslational modifications at lysine residues include acetylation and ubiquitination. Collagen contains hydroxylysine which is derived from lysine by lysyl hydroxylase. O-Glycosylation of lysine residues in the endoplasmic reticulum or Golgi apparatus is used to mark certain proteins for secretion from the cell.
Subscribe in a reader
Lysine an α-amino acid with the chemical formula HO2CCH(NH2)(CH2)4NH2. This amino acid is an essential amino acid, which means that humans cannot synthesize it. Its codons are AAA and AAG.
L-Lysine is a necessary building block for all protein in the body. L-Lysine plays a major role in calcium absorption; building muscle protein; recovering from surgery or sports injuries; and the body's production of hormones, enzymes, and antibodies. Lysine can be modified through acetylation, methylation, ubiquitination, sumoylation, neddylation, biotinylation and carboxylation which tends to modify the function of the protein of which the modified lysine residue(s) are a part.
Clinical significance
It has been suggested that lysine may be beneficial for those with herpes simplex infections.[, more research is needed to fully substantiate this claim. For more information, refer to Herpes simplex - Lysine.
There are Lysine conjugates that show promise in the treatment of cancer, by causing cancerous cells to destroy themselves when the drug is combined with the use of phototherapy, while leaving non-cancerous cells unharmed.
No comments:
Write comments
Recommended Posts × +
|
Digging Begins in Hunt for Nazi Gold Train
A pair of fortune hunters, convinced they’ve homed in on the location of Nazi treasure buried inside an armored military train, are putting that faith to the test. The pair, Piotr Koper and Andreas Richter, accompanied by a team of engineers, excavators and demolitions experts, have started digging; convinced they’ll find a railroad tunnel that for decades has hidden hiding a train loaded with gold, jewels, weapons and priceless art—now buried in the mountain.
The search for the treasure train is taking place along a section of railway between the cities of Wroclaw and Walbrzych in southwest Poland, just east of the border with Germany. Drone video shows the area, the terrain and where the dig is taking place. It’s the latest effort in what’s become a decades-long hunt to unearth the treasure, which includes valuables looted from territories invaded by the Germans in WWII. The legend of the gold train is certainly plausible from the standpoint of history.
What We Know
We know that in May of 1945 the German eastern front was in full collapse. Soviet fighter planes ruled the skies, quickly pouncing on any target of opportunity with a vengeance fueled by the still-fresh memory of the German invasion and Siege of Leningrad, in which Russia suffered millions of casualties. The Russians fought with brutality and passion, and they weren’t big on taking prisoners.
We know for certain that the Germans looted everything of value from conquered territories and sent much of the spoils back to Germany, most of it by rail. We also know that many works of art and other valuables plundered from Eastern Europe were stashed in castles in and mansions in Silesia, a region located mainly in what is now Poland. We also know those stolen treasures have not been recovered or accounted for.
We know that in the chaos of retreat, a heavily armored military train pulled into the station at Wroclaw in western Poland. The train was quickly and quietly loaded and, sometime in the night, it departed into the darkness. The train and its contents were never seen again.
We know for certain the Germans had built a network of underground housing and railway tunnels in the hills in western Poland as part of a building program called Project Riese. That maze of tunnels and underground housing certainly would have made a prime spot to hide a cache of weapons and gold. Like the last station on a train trip to nowhere, this is where the facts end and the speculation begins.
Rumors, Speculation and Dreams of Boundless Treasure
Rumors of the scope of the treasure were fueled by the deathbed confession of one Nazi soldier who claimed to have seen in excess of 300 tons of gold on the train. At today’s prices such a haul would be worth billions, just for the value of the metal, and aside from any historical significance and its worth to collectors.
The Dig Begins
The intrepid pair of Piotr Koper and Andreas Richter was at first rebuffed by Polish officials and doubted by experts who did their own surveys of the area. Undeterred, the pair raised money for this latest effort and, after clearing a small area, the backhoe got to work. The dig is already underway, but so far there’s no word on finding a train tunnel. All the searchers have unearthed so far are some bits of porcelain and non-native soil, which gives them hope that they’ve discovered the material used to seal the tunnel.
In the meantime the pair of treasure hunters, along with a team of thirty-five, intend to keep digging. If they don’t find the tunnel entrance in the first attempt, they’ll move and give it another try. How long they’ll keep digging isn’t known at the moment but billions in gold, plus priceless and historical works of art are a powerful motivation, and this current effort certainly won’t be the last.
|
posted by .
could anyone explain some writing strengths? I'm asked a question for my homework to explain some of my writing strengths and weaknesses but i'm having some trouble thinking about it....
• english -
What criticisms have English teachers made about your papers? Are you too wordy? Do you have a problem with subject/verb agreement? Do you have other grammatical mistakes? Do you lack originality? Do you misuse words? Do you have a problem organizing your papers?
• english -
For strengths, turn these negative questions around.
Are your papers generally concise? Are they grammatical? Are they original? Do you show a good understanding of vocabulary? Are your papers well-organized?
Respond to this Question
First Name
School Subject
Your Answer
Similar Questions
1. Strategic
which comes first, the development of the long-term objectives, or the evaluation of organizational strengths and weaknesses?
2. 12th grade
I am stuck on my thesis statement. I am to write a paper about my strengths and weaknesses as a writer. Topic: writer Point:strenghts and weaknesses examples so far The following are my strengths and weaknesses as a writer. I will …
3. school
i have to think of some strengths and weaknesses of the high school I go to. Can anyone give me some guidelines/examples...
4. Financial
I need some help finding some strengths and weaknesses adjusted book value and market value.
5. U.S. History to 1865
What are some strenghts and weaknesses of the Confederation Government?
6. ideas for an essay
what can be some strengths and weaknesses in school?
7. Accounting
Compare and contrast adjusted book value with market value. What are some of the strengths and weaknesses of each approach?
What are your strengths? What are your weaknesses?
9. Leadership
I'm having trouble with this question: What do you think your strengths are as a leader?
10. English
Hello I need some ideas to elaborate on in an essay about the following question "1.According to Frankenstein what makes the Creature more “human,” his weaknesses or his strengths?
More Similar Questions
|
Burning Candle experiment
posted by .
what is the shape of the candle flame?
To me it looks kind of like a leaf--more like a teardrop. Am I correct?
where does the wax from the candle go?
Does it just burn in the flame?
• Burning Candle experiment -
It looks somewhat a flame to me, too.
The wax either burns in the flame, producing CO2 and H2O or it drips down the side of the candle instead of burning.
• Burning Candle experiment -
Thank you DrBob222:-)
Respond to this Question
First Name
School Subject
Your Answer
Similar Questions
1. chemistry
Please help me with this? What are some properties of a candle?
2. math (rate)
A blue candle is twice as long as a red candle. The blue candle takes 6 hours to burn out, and the red candle takes 15. After 5 hours, what fractional part of each candle is left?
3. Burning Candle experiment
What is the role of the wick in the candle?
4. To: Bobpursely
You helped me with my observations yesterday, but I need help with my questions as well. I tried to answer as many as I could by myself, but I'm having difficulties understanding some. Pointing me towards the right direction would …
5. chemistry
2. Predict the approximate amount of heat liberated by burning a gram of candle wax and a gram of propyl alcohol (Note: candle wax is a mixture of saturated carbon compounds with 20 or more carbons in each molecule and no oxygen. Propyl …
6. Calculus
The burning candle A candle is placed a distance l1 from a thin block of wood of height H. The block is a distance l2 from a wall as shown in Figure 7.1. The candle burns down so that the height of the flame, h1 decreases at the rate …
7. chemistry
a candle was 27.9 grams. the mass of the candle that burned in 3 minutes was 7.2 grams. a) How many moles of wax were in the candle before it burned ?
8. chemistry -------------chemistry
If a flame on the candle burns red , how does energy of that flame compare to that of the Bunsen burner flame ?
9. algebra
2. Jamar and Scout are having a candle wax drinking competition! Jamar has already downed 14 oz. of candle wax and can drink it at a rate of 3 oz. of candle wax per minute and Scott has only downed 8 ox. of candle wax so far but can …
10. Heat and Heat Transfer
Two calorimeters each contain 1.4L of water and have a temperature of 26°C In the first calorimeter, you burn a sample of candle wax and determine that 108.2kJ of energy is released. In the second calorimeter, you have to burn 5.4g …
More Similar Questions
|
posted by .
What is an ecological property? Would the Belize Barrier Reef Reserve System be an ecological property? Or would the Los Katios National Park be a better option?
Respond to this Question
First Name
School Subject
Your Answer
Similar Questions
1. Distributive property
How would I multiply these expression? 6(h-4) -3(x+8) -10(-a+5) PLease and thank-You Multiply the coefficient (outside the parentheses) by each term inside the parentheses. For example, 6(h-4) = 6h - 24 You do the others do you have
2. biology
Discuss how the concept of time applies to ecological situations and evolutionary changes. Do ecological time and evolutionary time ever correspond?
3. science
Name on example of each: ecological rehabilitation ecological mitigation ecological reclamation Please and thanks!
4. biology
what animals and plants are unique in the Belize's barrier reef system?
5. biology
biological interrelationship among life forms; means hoe animals or plants depend on one another?
6. biology
I need to find the unique animal and plant life in the Belize's barrier reef. Can you tell me where to look, I have searched every where. Please
Biology teacher help me with two questions. what role do microorganisms play in ecological succession?
8. biology
what ecological hierarchy level is being considered in an ecological study that observes the impact of the mountain pine beetle on the lodgepole pine in british columbia?
9. MATH
Explain how you would calculate the ecological footprint of the state that you live in if you knew the average ecological footprint of a resident in your state?
10. Biology
What is an ecological footprint and why does Nothern Americans have such large ecological footprints?
More Similar Questions
|
posted by .
make a conjecture for the following show work
the sum of an even and odd number.
- the product of two odd numbers.
• Math -
I'm sure your teacher wants YOUR conjectures.
Try it out with some examples.
2 + 3 =
4 + 5 =
3 * 5 =
7 * 9 =
Respond to this Question
First Name
School Subject
Your Answer
Similar Questions
1. discrete math
use a direct proof to show that the product of two odd numbers is odd. Proofs: (all the nos. i used are odd) 3 x 3 = 9 5 x 9 = 45 7 x 3 = 21 Yes, but you didn't prove the statement for "all" odd integers, only the odd integers you …
2. discrete math
prove that if n is an integer and 3n+2 is even, then n is even using a)a proof by contraposition b)a proof by contradiction I'll try part b, you'll have to refresh me on what contraposition means here. Here is the claim we start with …
3. math
I know It's probably an easy question but I don't know remember how to do it. Show the work to determine if the relation is even, odd, or neither. a ) f(x) = 2x^2 - 7 b) f(x) = -4x^3 - 2x c) f(x) = 4x^2 - 4x + 4 If f(-x) = f(x), for …
4. Geometry
Working on conjectures. The question is Conjecure: The product of any two odd numbers is _____?
5. SUMS?
what is the sum of the first towo odd numbers?
6. math
Consider the following sums of numbers and how they are formed: 1 odd number } 2 odd numbers 678 3 odd numbers 64748 Predict the following sum and complete the generalization: a. 1 + 3 + 5 + 7 + 9 + 11 = ?
7. Geometry
CounterExamples and Inductive Reasoning and Conjectures?
8. math
Test these conjectures. Give three examples. Explain if the conjecture is correct or incorrect. 1. If a number is divisible by 4, it is always an even number._________________________________ 2. All multiples of 5 have a 5 in the ones …
9. Calculus, check my answer, please! 1
Did I get this practice question right? 1. Consider the following functions: f(x)=cos(x^3-x) h(x)=|x-3|^3 g(x)=1n(|x|+3) s(x)=sin^3(x) Which of the following is true?
10. math
in lotto draw balls 1-50 mixed together. machine randomly selects numbers 13,11,7,27,41. is the 6th number drown A. more like to be odd than even b. more likely to be even than odd c. equally likely i could not decide, as long as there …
More Similar Questions
|
Dismiss Notice
Dismiss Notice
Join Physics Forums Today!
Rope and Table
1. Oct 27, 2009 #1
A rope of length L sits at rest on a horizontal table with length L/3 hanging over the edge. The rope is mass M. What is the normal force acting on the rope? (I keep having people tell me that it is the product of the mass of only the rope that is on the table with the acceleration due to gravity and I am having a problem with this.)
This is not a homework question. It was part of a test question involving the rope that starts sliding of the table with friction involved as well.
2. jcsd
3. Oct 27, 2009 #2
The normal force is the total rope mass times g. It is evident from the force balance: the reaction of table compensates the whole mg.
4. Oct 27, 2009 #3
Thank you. Now, someone please answer to me the following question. If the rope starts to slide off (not at rest anymore), that is, the center of mass begins to accelerate, how does the normal force change during the movement or does it change at all (while the rope remains in contact with the table)? I am just looking for a qualitative answer.
5. Oct 27, 2009 #4
User Avatar
Science Advisor
Homework Helper
Gold Member
Dearly Missed
What do you think?
6. Oct 27, 2009 #5
Here is what I think. I know that the center of mass of the rope starts to accelerate. The acceleration has a downward component, call it a_y. Then I know that there is an imbalance between the normal force and the force due to gravity. Let m be the mass of the rope that is hanging over the edge of the table (this changes with t, time or with x, the distance the rope (on top) has moved across the table). So the net force on the center of mass in the y direction is M*a_y or m*x'' where x'' is the acceleration of the rope (on top) across the table. To get the normal force N, N = M*g - m*x'' . So, the normal force is proportional to the product of the distance x, and the acceleration x'' .
Keep in mind the x and x'' correspond to only the acceleration of the rope on top of the table moving horizontally; these are the same as y' and y'' of the rope hanging over the table if you just consider the rope to only move in one path, that is, it doesn't sling off the table realistically.
The reason I need the correct normal force is to know how the friction changes so I can find x as a function of t; to solve the correct differential equation (If I can). When I did the problem on the test, I said the normal force was constant, Mg, but after the test, I ask my professor what it should really be and she told me it should just be the mass of the rope on top times g. But, I really don't know what to think so... please help.
7. Oct 28, 2009 #6
Anyone? Just a tiny little hint? Please?
|
Friday, August 11, 2017
Roshan Thiran posts (11 August) on LeaderEconomics HERE
What Adam Smith Teaches Us About Becoming Happierarticle
Over the past few years, I have written about great leaders like Gandhi, Ben Franklin, Steve Jobs and others who have shown great leadership. Recently, I have been reading about others who may not have led a nation or an organisation, but from whom we can nevertheless learn great leadership lessons.
Adam Smith, the Scottish philosopher and economist, the father of modern economics and the man who coined the term the “invisible hand of the market” is one of them.
Smith remains one of the most important thinkers in addressing a question that is still as pressing today as it ever was: How can human values and the needs of business work together to create prosperous and civilised societies?
…. For Smith, the reality was much less black-and-white. Corporations, he believed, don’t corrupt our world – they simply serve our appetites and supply whatever it is we demand. The answer to society’s problems does not lie in getting rid of capitalism, but instead in learning how to make better use of it.
Smith (1723-1790) was born in Kirkcaldy, an industrial town in Scotland. At the age of 14, he attended the University of Glasgow before going on to study at Oxford. In 1748, he taught at the University of Edinburgh, where he met and befriended the philosopher and economist David Hume.
In 1759, Smith published the first of his notable works, The Theory of Moral Sentiments, a book which examines how we can lead a good life.
In 1776, his best known work, An Inquiry into the Nature and Causes of the Wealth of Nations (known as The Wealth of Nations) was published, and is considered a seminal work that shaped modern economic thinking.
At the time, a nation’s economic wealth was determined by the amount of gold and silver it possessed, but Smith argued that the true wealth of a nation was measured in its production and commerce.
Today, we refer to this measurement as the gross domestic product.
Capitalism is Good?
In the age of consumerism, Smith believed that capitalism was ultimately a force for good in the world. The creation of wealth helped societies look after their weakest members through the provision of hospitals, welfare systems, and other means of support. But Smith also felt that capitalism fell somewhat short in its role of meeting demands and serving appetites.”
Adam Smith never “coined the term the “invisible hand of the market”. He used it as a metaphor for a consequence of a merchant's action in investing his capital in an economy. These claims are of recent vintage owing the wholly fabricated claims by Paul Samuelson from 1948 to 2010.
Adam Smith never referred to “capitalism”. Nor did anybody else until well into the 19th century - the word ‘capitalism’ was first used in English in 1833 - 43 years after Smith died. It was also rarely used until the 1870s.
Adam Smith never taught at the University of Edinburgh. He delivered an annual series of public lectures on Rhetoric and Jurisprudence in the City of Edinburgh for private fees from 1748-51. This is a fact despite recent wholly erroneous claims made by some inventive Edinburgh students.
Adam Smith corresponded and met with David Hume privately and they remained life-long friends. David kept a room for Adam Smith in his Edinburgh home. They shared similar private views on religion and moral philosophy.
Adam Smith did not believe “that capitalism was ultimately a force for good in the world”. He supported free markets and thought that “merchants and manufacturers” were often tempted to reduce competition so that they could raise prices to the deteriment of consumers’ interests.
Wednesday, August 09, 2017
My Post on Paul Samuelson's Awesome Error has been picked up by other Blogs. Thank you very much.
If you notice any others, drop me a line ..... Thank you
Tuesday, August 08, 2017
Gregory Mason, an associate professor in the department of economics at the University of Manitoba, posts (8 August) in Winnipeg Free Press HERE
“Raising minimum wage won't fight poverty”
… “This is an example of a self-organizing mechanism, otherwise known in economics as a Nash equilibrium. John Nash, the subject of the movie A Beautiful Mind, won the Nobel Prize for realizing that our individual decisions must account for the decisions of everyone else driving or participating in the economy. A steady state, or sustainable equilibrium, occurs where each of us makes the best decision in the context of everyone else’s best decision.
The "invisible hand" is another possible way of describing a Nash equilibrium. Ascribed to Adam Smith, the popular understanding is that Smith viewed the economy guided as if by an invisible hand.
Further, coupled with his idea that each of us acting in our own self-interest will collectively produce the highest well-being for society, it is an easy leap to conclude that Smith defended a non-interventionist and laissez-faire economic policy.
In fact, part of this story is bunk. Adam Smith only mentions the invisible hand three times in his important books. Indeed, he seems not to have seen this as a useful or central idea. It was contemporary economists who linked the idea of a self-organizing market to the invisible hand, possibly to justify non-intervention in market processes.
Gregory Mason’s article is another piece of evidence that economists are slowly waking up to the major error in attributing to Adam Smith the false idea that he believed that there was a special role for his use of the “invisible hand” as other than as a rhetorical metaphor.
The incorrect attribution to Adam Smith began in the late 19th century (from the 1870s) and later flowered after Paul Samuelson (1948) wrongly attributed false meaning to Smith’s reference to an “invisible hand” that supposedly had remarkable powers well beyond anything envisaged by Adam Smith.
Today, the error is unbiquitous across, and beyond economics.
Adam Smith never “viewed the economy guided as if by an invisible hand”. Such an assertion treats Adam Smith’s use “of an invisible hand” as a simile, not a metaphor. (See: Adam Smith. Lectures on Rhetoric and Belles Lettres, Oxford University).
Moreover, Nash Equilibrium has nothing to do with anything Adam Smith wrote, as Gregory Mason correctly states.
To which “contemporary economists” linked Nash Equilibrium idea of a “self-organinising market”? Certainly, none of Smith’s contemporaries mentioned Smith’s use of the invisible hand. Only in the mid-20th century was that assertion made and believed, thanks to Paul Samuelson’s awesome reputation legitimising his wholly invented error.
Rudolf E. Havenstein posts (7 August) on ALTERNATIVE ECONOMICS HERE
"I believe in the invisible hand of capitalism."
Leon Cooperman []
SAD. If its down too an oath swearing “I Believe” imposture its no longer economics, nor any form of science.
Like the ’tooth fairy” at the bottom of the garden, it is for young children, not adults.
Rudolph E. Haverstein should rename his blog:
An Alternative to Economics ...
Friday, August 04, 2017
Sabal al-Binal posts (3 August) on The National (the middle-east explained) HERE
Why the firm underpins a modern economy
We need companies to exist in order to ensure efficient markets but they shouldn't get too big
“The idea of an efficient market was introduced by Adam Smith, the Scottish philosopher considered to be the father of modern economics. Smith used the phrase “invisible hand” to describe the theory that if each consumer is allowed to buy whatever they want and each producer is allowed to sell whatever they want then this would result in an optimal allocation of resources and setting of prices that would benefit the economy as a whole. This optimality is what is now known as Pareto optimal, ie any reallocation of resources that makes one market participant better off would necessarily make at least one other participant worse off.”
Adam Smith did not introduce the “idea of an efficient market”.
Adam Smith knew nothing of “Pareto optimal” (an idea formulated in the 20th century). Smith lived and died in the 18th century.
In short, Sabah al-Binali is making it up, also known as faking it.
Thursday, August 03, 2017
Matthew Paris posts (5 August) in The Spectator HERE
Why we need ideology in politics
Because some things might work in practice but not in theory
“What, after all, is religious faith but a grand, over-arching theory of what things mean, how to read the world, how to handle human motivation, and (sometimes) how (and why) to change the culture of a nation? Chris is a convinced Catholic, albeit not a dogmatic one. To search for God moving unseen beneath the surface of events — to surmise that there is more to human affairs than the apparent — is (I suggest) in the same category of outlook and explanation as to look for Adam Smith’s invisible hand as a way of making sense of man as an economic being. …
… For instance: as a mild but steady believer in the free market, I would tend to give weight to self–interest as a reliable motivator of human beings. I would see the role of state regulation as ideally to guide and inform and occasionally modify or restrain, rather than to force, block, ban or confound.”
Problem for the student debating approach to real issues is that it is clever for a debating performance - appaluse all round - but not so good for understanding.
Belief in a fairy story and act accordingly is unsafe as a guide to action.
Adam Smith’s invisible hand is a modern myth.
It does not “work” in practice and never existed as his “theory”. It was a metaphor for what happened at the aggregate level in an economy - it described the sum of all the individual actions of merchants and manufacturers in an economy.
Each local investment in a economy summed to total domestic investment. A simple arithmetic truism. Nothing more.
So obvious it attracted no comment from Adam Smith’s contemporaries while he was alive nor any comments well into the 19th Century and barely any from 1874 until mid-20th century (Paul Samuelson, 1948 onwards).
Matthew Paris, a big-name conteporary journalist, gets a column talking nonsense about Adam Smith and three-cheers all round (plus of course his big fee).
Its a living I suppose, but it does Adam Smith’s reputation no favours.
Wednesday, August 02, 2017
BEN CLAIR posts (1 August) on BLOMBERG HERE
The Secret Economic Lives of Animals
Wasps do it, baboons do it. Economics isn’t just a human activity.
“Economists study human behavior. “Nobody ever saw a dog make a fair and deliberate exchange of one bone for another with another dog,” Adam Smith sniffed in The Wealth of Nations. The ability to “exchange one thing for another,” he declared, “is common to all men, and to be found in no other race of animals.” Later economists, inheriting Smith’s self-regard, rechristened man Homo economicus in the belief that rational self-interest defined the human species. Even John Maynard Keynes, the father of modern economics, attributed our irrational choices to “animal spirits.”
But an animal spirit can actually be entrepreneurial. Consider a January study about paper wasps from the journal Nature Communications. A female paper wasp will recruit “helper” wasps to her nest to raise her offspring, and these helpers can usually choose from several different nests in a given area. The wasps are essentially making a trade: The top female offers helpers membership in her nest in exchange for childcare, and she can kick out a helper who doesn’t pull its weight.
What’s remarkable is that the terms of the wasps’ trade are determined by supply and demand. When the paper’s authors increased the number of nests in the field, they found that females were willing to tolerate smaller contributions from their helpers. The paper wasps behaved like any rent-seeking landlord, just as an economist would predict. A greater overall supply of wasp nests lowers the price of entry into any single nest. “In order to predict the level of help provided by a subordinate, it is necessary to take into account the state of the surrounding market,” the authors wrote.
If Adam Smith had strapped on a bee suit—or a safari jacket, or a scuba mask—he could have discovered that the animal kingdom is, in fact, a chamber of commerce. “Biological markets are all over the place,” says Ronald Noë, a Dutch biologist at the University of Strasbourg who first proposed the concept of the biological market in 1994. Scientists have since described biological markets in the African savannah, Central American rainforests, and the Great Barrier Reef. Baboons and other social primates exchange grooming for sex. Some plants and insects reward ants for protection. Cleaner wrasses eat parasites off other fish and behave more gently when a “client” has the option of visiting a rival wrasse.
These discoveries have not just deflated economists’ anthropocentrism but have challenged biological dogmas as well. “We all learned not to treat animals in an anthropomorphic way, but a theory that was produced to explain human behavior nevertheless matters in biology,” says Peter Hammerstein, Noë’s co-author and a professor of theoretical biology at the Humboldt University in Berlin. “In fact, I believe some of it works better in biology than in humans.”
Noë began to think about economics in biology in 1981 as he worked on a post-doctorate degree in Kenya. “A big baboon gave me the idea,” he says. Baboons live in large hierarchal groups, and Noë was interested in when and how low-ranking males teamed up to challenge a more dominant male to mate with a female. Cooperation was common in nature—not just between animals of the same species but also between different species (for example, a plant and its pollinator). But the origins of cooperation were a mystery. How could two animals work together when Darwin’s theory of evolution taught about survival of the fittest? Shouldn’t natural selection always favor ruthless self-interest?”
That is all I can reproduce wiithout trespassing on BLOMBERG’s patience in defence of its copyrights. Readers are urged to follow the link to BLOMBERG’s long article and read the rest.
The majority of the article, reports on the detailed field work of modern biologists, in parts of the world then inaccessible to Adam Smith in the 18th Century, let alone access to the modern equipmental and mathematical techniques that are now the ordinary tools of field-based research subjects in biology.
I found the reported descriptions of co-operation between animals both interesting and revealing. However, why BEN CLAIR takes a cheap swipe at Adam Smith in this context I cannot understand.
Nobody ever saw a dog make a fair and deliberate exchange of one bone for another with another dog.” (Wealth of Nations, 1776).
In what way is that statement untrue? Why does Ben use the derogarity word “sniffed”? Did anybody in the 18th century observe two dogs behaving differently? Has anybody seen two dogs make a a “fair and deliberate exchange one thing for another”?
That animals can co-operate deliberately was known to Smith. Indeed, he discusses near exceptions to his statement in Wealth of Nations:
“When an animal wants to obtain something either of a man or of another animal, it has no other means of persuasion but to gain the favour of those whose service it requires. A puppy fawns upon its dam, and a spaniel endeavours by a thousand attractions to engage the attention of its master who is at dinner, when it wants to be fed by him. … In almost every other race of animals each individual, when it is grown up to maturity, is intirely independent, and in its natural state has occasion for the assistance of no other living creature.
[See the two footnotes, 4 and 5:
[4 The example of the greyhounds occurs in LJ (B) 2x9, ed. Carman I69. LJ (A) vi.44 uses the example of 'hounds in a chace' and again at 57. Cf. LJ (B) e22, ed. Carman XTt: 'Sometimes, indeed, animals seem to act in concert, but there is never any thing like a bargain among them. Monkeys when they rob a garden throw the fruit from one to another till they deposit it in the hoard, but there is always a scramble about the divi- sion of the booty, and usually some of them are killed.' In LJ (A) vi.57 a similar example is based on the Cape of Good Hope.
[5 In EARLY DRAFT: 2.12 an additional sentence is added at this point: 'When any uncommon misfortune befals it, its piteous and doleful cries will sometimes engage its fellows, and sometimes prevail even upon man, to relieve it.'
With this exception, and the first sentence of this paragraph, the whole of the preceding material follows ED 2.t2, very closely and in places verbatim. The remainder of the paragraph follows ED 2.I2 to its close.
The above shows the risks of merely reading Adam Smith from singular quotations and from not reading his Works in their full context.
In the most interesting reports of observed animal behaviour by biologists drawn to our attention by Ben Clair’s report we deepen our knowledge of animal and insect behaviours and that can only be a positive contribution.
’Tis a pity that Ben spoils his objectivity with quite silly and misleading semi-mocking of Adam Smith who writing in the 18th century.
What were Ben Clair’s 18th-century ancestors doing and contributing to the sum total of human knowledge in the 1770s? Precious little I surmise!
Tuesday, August 01, 2017
jhadmin posts (31 July) on Just Helicopters for ROTORCRAFT PR HERE
“I’ve always felt the shapers of the American experiment from the late 1700s were not only exceptional, but brilliant thinkers. Their ideas and ideals still guide our success in the 21st century. Take Adam Smith for example and his theory of the “invisible hand.”
Investopedia says: Smith’s theory of the invisible hand constitutes the basis of his belief that large-scale government intervention and regulation of the economy is neither necessary nor beneficial. Smith put forth the notion of the invisible hand in arguing that free individuals operating in a free economy, making decisions, primarily focused on their own self-interest, logically take actions that result in benefiting society as a whole even though such beneficial results were not the specific focus or intent of those actions."
Adam Smith did not have a "theory" of "the invisible hand". It was a metaphor. If Jhadmine is curious of the difference between a "metaphor" and "theory" he could read Adam Smith's 'Lectures on Rhetoric and Belles Lettres', which he delivered from 1748 to 1763.
'Investopedia' is unreliable on Adam Smith. Its definition of Adam Smith's use of the 'invisible hand' is wildly incorrect and misleading.
|
The design depicts the people coming to the temple in Jerusalem offering the best of their crop. Musical instruments where played while the pilgrims paraded as was done on the three harvest/pilgrimage festivals of Succoth, Passover and Shavuot. Bringing Harvest 3 times a year to the Temple in Jerusalem.
Since prehistoric times sacred places have exerted a mysterious attraction on billions of people around the world. Ancient legends and modern day reports tell of extraordinary things that have happened to people while visiting these places. Different sacred sites have the power to heal the body, enlighten the mind, increase creativity, develop psychic abilities, and awaken the soul to a knowing of its true purpose in life. Jerusalem, by virtue of the number and diversity of people who have held it sacred, may be considered the most holy city in the world. To the Jewish people it is the Biblical Zion, the City of David, and the site of Solomon's Temple and the eternal capital of the Israelite nation. To Christians it is where the young Jesus impressed the sages at the Jewish Temple, where he spent the last days of his ministry and where the Last Supper, the Crucifixion and the Resurrection took place. Also greatly venerated by the Muslims, it is where the prophet Muhammad ascended to heaven. Abraham's journey to the Promised Land was the first religious pilgrimage. Among the places he visited was Salem, the future site of Jerusalem. With the bringing of the Holy Ark to Jerusalem by King David and the erection there of the Temple of the Lord by King Solomon, Jerusalem became the focus of Jewish pilgrims seeking to comply with the Biblical injunction: "Three times in a year shall all thy males appear before the Lord thy God in the place which He shall choose" [Deuteronomy 16:16]. Through the centuries, Jews dispersed throughout the world have engaged in pilgrimages to their Holy City. Historically, three Jewish festivals are celebrated by making a pilgrimage to Jerusalem, to make offerings at the temple. The first of these is "Pesach" or Passover, in the spring, which marks the Jewish exodus from Egypt and freedom from bondage. The second is Shavout or Pentecost. In the summer, which commemorates both the wheat harvest, the offering of first fruits at the temple, and the giving of the law on Mt. Sinai in the desert. The third is "Sukkot" or Feast of Tabernacles, in the fall. The tabernacles or booth refer to the structures where the Israelites lived during their 40-year sojourn in the desert after the exodus from Egypt. Christian pilgrimage received a considerable stimulus in the fourth century when Empress Helena, mother of Emperor Constantine, identified the traditional sites associated with the life and death of Jesus. The sites themselves and the magnificent churches and shrines erected over them have attracted Christian pilgrims in large numbers since that time, as have other holy sites. One of the Five Pillars of the Islamic faith is the hajj, an obligatory pilgrimage to Mecca. Nevertheless, Jerusalem is known in Arabic as el-Quds ("the holy one"), and the city is home to some of the most important Islamic shrines. Among them is the Dome of the Rock, the magnificent mosque sheltering the rock from which Muhammad is believed to have ascended to heaven. The Temple Mount, upon which it stands, along with the great Mosque of el-Aqsa, is reverently called el-Haram esh-Sharif, "The Noble Sanctuary." Early pilgrimages from Europe to Jerusalem were long and difficult journeys. The flow of pilgrims was influenced by many circumstances including travel facilities, wars, epidemics, and political, religious, and economic conditions. Accounts of these journeys are rich sources of information regarding historical events, geography, and various cultures, religious practices, customs, and languages. Pilgrims' itineraries and maps were sometimes distorted by inaccurate observation, hearsay, deliberate exaggeration or fabrication, or religious preconceptions. They nevertheless provide valuable insights into the history and topography of Jerusalem and surrounding regions. Because of Muslim and Jewish prohibitions against "graven images," the majority of maps were by Christian pilgrims.
Product Options
Price: $36.00
Please login to start shopping.
|
Problems With Japan, And With Us
September 22, 1987|By Robert E. Weigand, professor of marketing at the University of Illinois at Chicago, where he teaches international business.
Charles Richardson, a young Englishman living in Japan, and three of his friends went for a Sunday horseback ride along the old Tokkaido Road 125 years ago this month. The road connected Edo-called Tokyo after 1868-with Japan`s westernmost provinces. It was a popular meeting place for foreigners looking for recreation.
The road also was heavily used by important government officials who were routinely rotated between their provincial offices and the country`s capital, the families remaining in the capital as hostages so that the loyalties of the provincial lords would be encouraged. Shimazu Hisamitsu, the prince of Satsuma, was returning to his home in western Kyushu this particular Sunday-Sept. 14, 1862. The move was complicated because it meant moving both the prince and several hundred loyal retainers.
The government normally warned everyone to stay off the road on a day an entourage the size of the prince`s was to pass. No one wanted an awkward incident. On this particular Sunday someone forgot to give notice. When Richardson came upon the prince`s retinue, he neglected to dismount from his horse to show respect. It was his last mistake. A small band of samurai who accompanied the parade did the only honorable thing. They killed Richardson. The other three escaped.
The Namamugi incident, named for the Yokohama suburb where it took place, incensed the British, who demanded 100,000 pounds indemnity and the prosecution of the killers. The Japanese government agreed, but delayed carrying out the agreement. In August, 1863, the British navy bombarded Kagoshima harbor in the heartland of Satsuma province, killing and wounding many on shore and sinking several small Japanese ships. The shelling won the attention of the Japanese, and negotiations with the British were resumed. The issue was resolved four months later.
The event was a vital turning point in Japan`s move toward modern ways. It demonstrated to the Japanese the importance of building its naval and military power if it were not to become a vassal of the West, it helped unify the various provincial lords who until then profoundly disagreed about how the Western threat should be met, and it won the respect of some of Japan`s leaders on Kyushu Island who had been the most difficult to persuade.
Today, neither the Americans nor the Japanese expect to use gunships to get the other side`s attention. But the relationship is floundering, possibly leading to anti-Japanese legislation in Congress and anti-American sentiment and behavior in Japan. The greatest-and nearly only-aggravation is that we buy so much more from the Japanese than they buy from us, about $14 billion during the April-June quarter.
In some respects, however, Japan is a decidedly more open country now than just a short while ago. The import tax on foreign cigarettes has been eliminated, an agreement has been reached on auto parts, paperwork on imports has been reduced, quality inspections are easier, quotas on leather products are gone, the insurance and financial industries are more openly accepted, and government purchases are increasingly going to foreign bidders.
American exports to Japan are increasing-almost 13 percent more in 1986 than in 1985. But Europe (the comparable increase was over 57 percent) and the newly industrialized countries such as Hong Kong, Taiwan, and Korea are doing far better. Further, Japan bought 18 percent more food from abroad in 1986 than the year before; but China, Taiwan and Korea were the major
beneficiaries, not the United States.
Business Week magazine reports that many American businesses are increasing their export prices in response to the cheaper dollar. They have not opted to increase their share of markets in Japan, which might be receptive to the now-cheaper American products. It`s good for short-term bottom line, thus making the company`s annual report look good, but decidedly unhelpful in winning new customers, keeping Americans employed and balancing our trade account.
The hearts of compassionate Americans go out to unemployed fellow citizens who once were part of our steel, automobile, electronics or other industries. And it is tempting to argue that we must send the Japanese a message that unless they open their markets-thus bringing American industry back to the good old days-our markets will be closed. But before enacting such legislation, a message far more peaceful and subtle than the one sent at Kagoshima, there are two points to remember.
|
Thursday, August 28, 2008
Sustainability and biofuel farming
James Gustave Speth has written a really important book on sustainability within a modern society. The book is called The Bridge at the Edge of the World: Capitalism, the Environment, and Crossing from Crisis to Sustainability, and it's an important contribution. One of the most fundamental conclusions that Speth arrives at is the idea that sustainability will require a truly profound transformation of how we think about a "good life," and a rethinking of the kinds of material circumstances we might aspire to in order to create a world system that is genuinely sustainable.
One way we might try to pursue this line of thought is to consider whether gardens and local biofuel production might provide a basis for more sustainable human activity. Could we use more of our own time and labor to create some of the material necessities of our lives, and do so in a way that imposes a smaller footprint on the world's energy and resource system?
David Blume was a guest on NPR's Science Friday on August 15. Blume is the author of Alcohol Can Be a Gas!: Fueling an Ethanol Revolution for the 21st Century. Blume is an advocate for the idea that alcohol can be a large and ecologically positive component of our modern energy economy (website). And he believes that it is possible to imagine a more decentralized energy economy for the United States in which local producers and distillers satisfy a large percentage of the energy needs of a region.
Blume made an observation that I found intriguing: that the common wetland plant, the cattail, can be a fuel source for producing ethanol. (Here's a news story on Blume's comments about cattails on an earlier occasion.) Corn produces about 250-300 gallons of ethanol per acre, and it is estimated that cattails would produce something less than this. (Blume himself estimates that the yield of cattail ethanol production would be "many, many times" that of corn, and says that 7,000 gallons per acre is feasible. This seems unsupportable, given the potential yield of other biofuel crops.) But cattails also have ecological advantages: they soak up excess nutrients (e.g. agricultural fertilizer runoff or sewage waste plant effluent), and they require little cultivation. Here are a few news stories (story, story) with some interesting background.
So here's the question: what would be involved in creating a community that is energy self-sufficient based on ethanol production? Could households grow their own fuels? What would the economics of a cooperative community-based distillery look like? How much land, labor, and money would be required for the household?
It should be noted that there is serious disagreement about the most basic features of the commercial ethanol economy: does ethanol production lead to a net gain in energy, or do the inputs into the cultivation and distilling processes exceed the energy content of the resulting volume of alcohol? Here's a discussion at FuturePundit and a summary of the findings of a national expert, David Pimental from Cornell University. Here are the central conclusions of a recent study by Pimentel and Tad Patzek at UC-Berkeley:
But still, let's think it through a bit. The scenario I'm imagining is labor-intensive and local, so the costs of energy associated with mechanization and transportation are reduced or eliminated. Could we imagine a local energy economy based on crops and distillation that could be fitted into an otherwise acceptable lifestyle? (The analysis will begin to sound like Piero Sraffa's exercise, Production of Commodities By Means of Commodities: Prelude to a Critique of Economic Theory.)
A family's energy budget might look something like this, estimated in gallons of ethanol:
• transportation 800 gallons (10,000 miles)
• cooking 300 gallons (365 days)
• heating 1000 gallons (180 heating days)
• illumination 100 gallons (365 days)
• refrigeration 200 gallons
This adds up to 2,400 gallons of ethanol required for a year's energy use. But we aren't finished yet, because cultivation and distillation also have an energy cost, and this cost is a function of the volume of alcohol required. Let's take a more optimistic estimate than that provided by Pimental above, and assume that the energy cost of distillation is 30%. (We're working with a coop, after all!) To produce a gallon of ethanol we have to expend .3 gallons in the distillation process. And let's assume that cultivation is done by hand without mechanization, but that the crop needs to be transported to the distillation facility at a 10% cost. (That is, I assume that the net transportation cost of transporting the thousands of pounds of feed crop to the processor is 10% of the net alcohol product of the crop.) These estimates imply that the household requires 4,000 gallons of alcohol.
Now assume that the alcohol yield of an acre of cattails is 250 gallons; this implies a fuel farm size of 16 acres. (It would be nice to extend the exercise to include a food garden as well; this is left for the reader! Here's an interesting United Nations article from the 1980s on the economics of family gardening that can help get the analysis started.)
Now how many hours of labor time need to be devoted to cultivating and harvesting this crop? Evidently cattails don't require much by way of fertilizers, irrigation, and pest control. But I'm sure there is some level of maintenance needed, and 16 acres is a large area. In fact, it represents a rectangular plot that is 200 feet by 3,500 feet -- more than half a mile long. So let's assume that basic maintenance of the cattail crop requires 2 hours a day of adult labor. The large investment of labor, however, occurs at the harvest. About 14,000 pounds of cattails will be harvested per acre, or 224,000 pounds for the farm over the course of the harvest. If we assume that an adult can harvest 200 pounds per hour, this represents 1,120 hours of harvest work. Let's assume that harvesting can be spread out over a couple of four-week periods or 56 days; this implies 20 hours of adult labor per day during the harvest season. So it would take 10 hours a day, 7 days a week during the eight weeks of harvest season for two adults to harvest this volume of cattails. Two months of very hard work devoted to harvesting will eventually produce enough ethanol to support the household's chief energy needs.
Now what about the economics of the cooperative's distillery? If we assume a cooperative involving 100 households of the scale just discussed, the distillery needs to process 22,400,000 pounds of material in order to produce 400,000 gallons of ethanol. The households will be farming an area of 1,600 acres of cattails -- about three square miles. And the system will be supporting the energy needs of about 500 people. If we keep our assumption of a 30% ratio of input-to-output, this process will consume 120,000 gallons of ethanol. The coop members will need to fund the purchase and maintenance of the still and the labor costs associated with operation of the still. Perhaps it's a labor coop too? In this case, each household will need to devote several hours a week to work in the distillery. And we might imagine that the coop would require a "tax" of some small percentage of the alcohol produced to cover maintenance and operating expenses. Here's a research article from AGRIS that examines the costs of a small distillery of roughly this size. The conclusion is somewhat discouraging: "The analysis indicates that the distillery would not be profitable at current prices for corn and ethanol." In other words, the cost of inputs and operation of the distillery exceed the value of the alcohol produced, according to this analysis. But this conclusion isn't quite relevant to our scenario, because the raw materials are not purchased through the market and the product is not sold on the market. Nonetheless, the finding implies that there's a shortfall somewhere; and it may well be that it is the unpaid labor of the fuel farmers that is where the shortfall occurs.
So here's the upshot of this back-of-the-envelope calculation: it would be a major commitment of land and labor for a household or a village community to achieve energy self-sufficiency through cooperative-based ethanol distillation. And I've made an assumption I can't justify: that the energy input to the distillation process is 30% of the energy content of the resulting quantity of ethanol. If that ratio is 60% instead of 30%, then the land and labor requirements for each household are greatly increased; and if the ratio approaches or exceeds 100%, then the whole idea falls apart. But even on these assumptions, the life style associated with this model sounds a lot closer to that of a peasant village in medieval France or traditional China than to that of a modern US citizen. It involves hard physical labor during several months of the year and a moderate level of labor effort during the remainder of the year. And if we imagine that the scenario is extended by incorporating a substantial amount of food gardening for family consumption, then the balance of necessary labor to free labor tips even further in the direction of the peasant economy.
|
Water Management Gone Wrong
Kabul is the capital of Afghanistan, for those unaware. Kabul sits at an elevation of over 5800 feet, at the merging of three bodies of water. With Kabul’s population of about 4 million people, a very high percentage (70-80%) do not have access to clean drinking water. That is just Kabul alone. In Afghanistan, with a population of 30 million people, clean accessible water is a topic. Where it comes from and how much clean water is available, is a talked about amongst geologists, the people of the country, and those that understand the urgency.
When brought up, Afghanistan is thought of as the country of war and conflict. The war on water and the conflict of lack of it is not thought of. So what is going on and what actions is the afghan government taking to utilize whatever water resources are available?
Many of the current issues that Afghanistan face, specifically speaking of it’s water supply, are directly influenced by the wars that have continued on for decades. They have left the country harmed in many ways. Yet the wars are not the single source contributing to the water crisis.
Afghanistan’s drastic climate contributes to the water hardship. It has it’s issues with heavy droughts, as well as severe flooding. During drought times when water is scarce, as well as flood times, when not only crops are lost, but people die to. Access to water is a complicated and a frustrating issue.
Mountain rivers produce what could be Afghanistan main water source. However being the way that it geographically sits, the water flows into other countries….Pakistan, Central Asia, Iran. Proper catchment methods have not been developed or utilized to the water available to the country. Well under 50% of the water that flows from the Afghanistan mountains stays there.
The struggle is real. Developing dams and proper canals, etc to channel the water will take many years, and investors are hesitant to invest in such a project because of the warring history of the country. The government is not offering solutions either, or capitalizing on the water that should belong there.
Potable water is necessary for life. Without clean drinking water and sanitation ( water is needed for this too), disease and infection brew and take the lives of people. Although some practices have been put into play to recently increase the amount of clean water available and to educate on the conservation of water, the road to providing enough clean, drinkable water is still long. Those in control must see this issue and adopt it as a priority for the people of the country.
|
Black supremacism
From Metapedia
Jump to: navigation, search
Black supremacism is an ideology based on the belief that Blacks are superior to other races and therefore should control or rule these races.
As is the case for White supremacism, groups and individuals that have been labelled as "Black supremacist" by politically correct sources may actually advocate views such as Black separatism.
In a broad sense, some forms of Black privilege and advocacy for such privileges for Blacks but not for some other group(s) may be seen as Black supremacism. This would make Black supremacism very widespread.
In South Africa there are influential Black individuals and groups supporting views such as subjugation and genocide of Whites. One example being ANC leaders singing the song Kill the Boer. Some aspects of Black liberation theology have sometimes been seen as Black racism/supremacism.
However, in politically correct descriptions (such as by the SPLC), Black supremacism is limited to only a few organizations. Many of these have been accused of being anti-Semitic, which may possibly be related to why these particular groups have been labelled as Black supremacist.
Such organizations include:
See also
Other supremacisms
Personal tools
In other languages
|
How the Olympic Opening Ceremonies Work
A scene from the extravagant opening ceremony for the Youth Olympic Games held in Singapore in 2010. See more Olympic pictures.
Photo courtesy © IOC/Adam Pretty/Getty Images
The opening ceremonies of the Olympic Games aren't just about pageantry and the parade of nations. The 1920 games were held in Antwerp, and the people of Belgium were proud to show that despite the vast devastation of World War I, the horrors of that conflict hadn't broken their spirits.
Fast-forward to 1964, and the citizens of Japan had a similar statement to make. Their final torchbearer was a young man named Yoshinori Sakai. He was born on Aug. 6, 1945, in Hiroshima -- the very day that city was struck by an atomic bomb.
The Olympics in general can also be a way for nations to take a stand against perceived injustices. In 1980, for example, 65 countries refused to take part in the Moscow games [source: Time]. They were protesting the Soviet Union's invasion of Afghanistan. In fact, the '70s and '80s were a hard time for many hopeful Olympians. 1992 would mark the first time in 20 years that no countries felt the need to boycott the games.
And let's use the 1992 Barcelona opening ceremony to showcase just one of the many impressive feats and performances that have occurred over the years during the commencement rituals of the games. During most ceremonies, the Olympic cauldron is lit by a torch, which is hand-delivered by some famous personage or another. The Spaniards took an impressive gamble: Their cauldron was lit from afar by an archer with a flaming arrow. Talk about pressure to make the shot!
|
Thursday, September 20, 2012
HBL-A0023 - Abortion
• death is at the point the brain stops working. life is at the point the brain starts working.
• the brain starts working at around the end of the first tri-mester.
• the fetus is a person for all intents and purposes at that point.
• abortion must balance out the human rights of the infant, the mother, and the father, as well as take into consideration the emotional needs and values of other interested parties.
The issue of abortion swings on whether a fetus is a person. The matter of whether someone is a person can only be determined by two means, possession of a soul or a working brain. Other matters such as feeling pain, being dependent, and having potential are far more debatable and less specific. There is no way to determine whether a fetus has a soul. Therefore, the only method of determining whether a fetus is a person is whether the brain is working. This happens around the end of the first trimester. This is our determination, that abortion after the fetus is 3 months old (more specifically when the doctor determines the brain has kicked in) is killing a person. In matters of rape or danger to the mother or child, each case needs to be judged in it's specifics according to the following guidelines. 1) Whether the mother's life is more important than that of the fetus must be specifically determined based on exacting criteria, never assumed. 2) Whether the child is wanted is irrelevant, someone else certainly does. The adoption laws in this country happen to be such that draconian processes must be navigated to adopt. If these were changed, every child would have a home.
A strong exemption exists in the case of rape because it is difficult, if at all possible, for any authority to determine the mother must exist with what might reasonably be considered a torturous circumstance. However... if clear and substantial evidence is shown that this is not the case, the normal balance must be determined.
|
August 21, 2010
150 Anniversary of the rail-road bridge in Tczew
Preparations for building the first iron bridge had been going during 1844-1845. The foundation stone was laid July 27, 1851 year by Frederick William IV.
The first train ran on the 12 October 1857 year. Most numbering 837 m in length, resting on seven pillars, was the longest in Europe and one of the largest in the world. Portals of the bridge was decorated with reliefs depicting among other Winrich von Kniprode, receiving the homage of the Duke of Lithuania Kiejstutis.
In the years 1888-1891 at a distance of 30 meters a second bridge was built only by rail. At that time, the older of the bridge turned into a road. Originally, both bridges were shorter than today, because the embankment was located closer to the riverbed. In 1912 he moved toward the shaft Lisewa, an extension of the bridges and outbuildings were built with a common gate. Both bridges are all the possible technical solutions of construction for the construction of bridges in the art from the nineteenth century.
Stamp Issue: 2007-10-12
Cp 1442
|
Human Reproduction
By | 0 Comments
Sex is a phenomenon of life that sustains life forms on the planet earth. The life cycle of every living kind (a sexual population) spreads the advantageous traits in a way that it makes the next generation more capable of meeting the challenges of survival in different conditions. Sexual reproduction involves combining specialized cells (gametes) to form offspring that inherit genetic traits from both parents. Each cell has half the chromosomes of the mother and half of the father.
Human sexuality has many aspects. It involves building up personal identity in a social evolution of individuals in a society. Sociocultural aspect casts human sexuality as asocial norm under moral, ethical, philosophical and religious or spiritual framework. Medically, it deals with the physiological or even psychological aspects. Sexuality is also now viewed in the cultural, political, and legal context in a society.
The construction of sexual meanings, is an instrument by which social institutions, religion, the educational system, psychiatry, the legal system, human rights, etc. control and shape relationships. Therefore, sexuality is, generally, framed within the context of the institution of marriage.
A home is an environment that provides nourishment for the growth of young ones and guarantees mutual care and safety for all. It instills a moral obligation and individual responsibility for the partners’ sexual behaviors. In some countries, sex functions, behaviors, and feelings are expressed without any binding relationship among them. Deviant sexual practices are limited by laws in many countries. In some societies, mostly those where religion has a strong influence on social policy, marriage laws serve the purpose of encouraging people to only have sex with one partner within marriage. The underlying factor is that mature individuals engage in actions for which they own the responsibility and work towards a condition where harmony is established in the society.
Laws also ban adults from committing sexual abuse, committing sexual acts with anyone under-aged, performing sexual activities for money (prostitution). Though these laws cover both opposite-sex sexual activities and same-sex, they may differ with regard to punishment.
In medicine, pregnancy is caused by the merging of the female gamete with the male gamete, in a process referred to as fertilization, or commonly known as conception. Human pregnancy or gestation is generally divided into three trimester period. Human pregnancy averages 266 days (38 weeks) from conception, or 40 weeks from the start of the last menstrual period.
Week 1
Fertilization: Cleavage to form a blastocyst 4-5 days after fertilization. More than 100 cells are involved at this stage. Implantation takes place 6-9 days after fertilization.
Week 2
The three basic layers of the embryo development are ectoderm, mesoderm and endoderm. No research allowed on human embryos beyond this stage.
Week 3
Neutral tube develops, along with the beginnings of the brain and spinal cord (first organs). The embryo at this stage is 2 mm in size.
Week 4
Heart, blood vessels, blood and gut start forming. The size of the embryo is about 5 mm at this stage.
Week 5
Brain starts developing along with the limb buds (small swellings which are the beginnings of the arms and legs). Heart is a large tube and starts to beat, pumping blood. This can be seen on an ultrasound scan. The embryo is 8 mm in size.
Week 6
Eyes and ears start to form.
Week 7
All major internal organs start to develop along with the face. Eyes get their color and mouth and tongue are formed. Hand and feet continue to grow and the fetus is now 17 mm long.
By week 12
Fetus fully formed, with all the organs, muscles, bones, toes, fingers and sex organs. Fetus starts moving and for the rest of the gestation period, it is mainly growing in size. Fetus is 56mm long from head to bottom. Pregnancy may be beginning to show.
By week 20
Hair begins to grow, including eyebrows and eye lashes. Fingerprints, fingernails and toenails develop. A firm hand grip develops completely. Between 16 and 20 weeks baby is usually felt moving for first time. Baby is 160 mm long from head to toe.
Week 24
The baby’s eyelids begin to open and the legal limit for abortion in most circumstances.
By week 28
Baby starts moving vigorously. It responds to touch and loud noises. It starts swallowing amniotic fluid and urinating.
By week 30
Usually the baby lays head down ready for birth. It is now 240 mm from head to bottom.
40 weeks
9 months, the baby is born.
Symptoms signify pregnancy. The symptoms include nausea and vomiting, excessive tiredness and fatigue, craving for certain foods not normally considered a favourite and frequent urination particularly during night.
Medical signs associated with pregnancy include the presence of human chronic gonadotropin (HCG) in the blood and urine, implantation bleeding that occurs at implantation of embryo in the uterus during the 3rd or 4th week after last menstrual period, increased basal body temperature sustained for over 2 weeks after ovulation, softening of the uterus isthmus, and darkening of the mid line of the abdomen, caused by hyper pigmentation resulting from hormonal changes, usually appearing around the middle of the pregnancy.
Detection Tests
Pregnancy tests detect hormones generated by the newly formed placenta. Clinical blood and urine tests can detect pregnancy soon after implantation, which is as early as 6 to 8 days after fertilization. Blood pregnancy tests are more accurate than urine tests, which cannot detect pregnancy until at least 12 to 15 days after fertilization.
|
Tuesday, December 08, 2015
Did Massive Northern Hemisphere Volcanic Eruptions Warm and Disrupt the Pleistocene Quaternary Antarctic Ice Sheet?
Massive volcanic eruptions could cause localised warming that might destabilise some of the world's biggest ice sheets, according to new research from Durham University.
Scientists investigated links between very large volcanic eruptions and polar temperatures during the last Ice Age.
Their findings suggest that some periods of Antarctic warming between 30,000 to 80,000 years ago were triggered by huge volcanic eruptions in the Northern Hemisphere that caused a shift in the world's weather patterns.
The Northern Hemisphere cooled as volcanic particles reflected the sun's heat, forcing warmer weather fronts south which led to warming in Antarctica, the researchers said.
Conversely, their research suggests that Southern Hemisphere eruptions could also have triggered abrupt warming in Greenland during the last Ice Age.
No comments:
|
If You Read One Article About Security, Read This One
How To Guard Your Website?
DDOS means Distributed Denial of Service. System bots, as what other programmers and people call it. Once it is flooded, the capacity of a searcher will reach its limit. Thus, it can no longer provide data for its visitors. This situation is about attacking which involves different computers that floods a server, thus, it is no longer accessible.
Does it mean that availing of protection after the attack of a DDOS to a network is required? The straightforward answer for this question would be, “YES, it is necessary and immediate to get DDOS Protection.” After the threats and damages of the DDOS will be exposed, I’m sure, you will really appreciate the importance of the protection.
The damage that the DDOS attack cause is not only limited to a single PC, but it can even damage a whole network. The attack can cause the opening files to be extremely and unusually slow. The attack is even capable of doing things such as processing router and resources of a network stack. The most and oldest way or style of DDOS attack is the manner of sending a lot of e-mail messages to a single recipient. If this happens, it can add a very huge space to the computer’s hard disk drive. This style of attacking is already classic, yet, it is still present until now.
A Quick Rundown of Options
Of course when there’s a problem, there has got to be a solution, and most websites especially those who are involved in businesses are using DDOS protection against these attacks. The program will see to it that the production of your business is safe, however, it costs a lot of money since it is a little bit expensive. It is undeniable that the industry has a small competition, thus, making the DDOS protection expensive. Though, you can find some providers that offer discounts and you can make your research online.
Learning The Secrets About Companies
However, what exactly does a DDOS protect do for your computer? DDOS Protection provides several protection and security for your systems. One of which is giving a quality protection against DDOS attacks on your business website, email, and web applications using carefully analyzed programs which automatically starts when it detected an attack being launched. The program will be triggered to add security and protection to your website once it has detected odd and unusual behaviors. Your website capacity is being secured and guarded 24/7.
In order for a DDOS protection to be efficient, it should be understood and studied well. Because criminals can manipulate different DDOS attacks, upgrades are still being done up to this date, so that the protection against the attacks will be rest assured.
|
Headache: MedlinePlus Medical Encyclopedia
Always read the accompanying consumer medicines information leaflet and ask your pharmacist or doctor for advice. The typical process leading to acute sinusitis starts with the common cold virus. Complications of sinusitis. Accessed Jan. Treat athlete’s foot if you have it. Dry air irritates your throat when you have a cold.
In a baby it’s even more thin. Dry air irritates your throat when you have a cold. You might be able to “wait it out” and find relief from your symptoms using over-the-counter (OTC) medications. When the pressure in your middle ear is different than the pressure outside of your body for an extended period of time (for example during flight, scuba diving, or driving in very high altitudes), it can lead to severe discomfort, and even eardrum damage. Different patient: The MRI shown on the right shows a life-threatening complication of sinusitis. Impetigo causes small pustules that break and leak yellow exudate.
Should I make any changes to my daily routine? F. Other serious concerns are blood or clear fluid draining from the nose or ear. Often patients find bright light and even TV make the headache worse. Sixty-four percent of the time, the doctor thought it was NOT a brain tumor when respondents first went to the doctor. Rebound headaches are caused by a cycle of using pain medications for short-term relief, followed by the headache pain returning for increasingly longer periods of time despite taking more pain medications.
Cold sores are usually caused by a type of herpes virus and are very contagious. Wicked winter health myth #2: Suicides peak over the holidays The onslaught of stressors — financial strain, dinner with the in-laws, harsh weather — would seem to be a perfect storm for suicide. Turns out, the opposite is true. Make sure to tell your doctor if you’re allergic to the antitoxin. Specifically, they will look for a visible deposit of skin cells or a large mass of blood vessels in the ear. Treatment options include surgery, chemotherapy, chemoembolization, radiofrequency ablation, radiotherapy and targeted radionuclide therapy.
They show that when people sneeze, they produce a complex fluid cascade, not just a simple uniform spray of droplets, as previously thought. Examples of preventive techniques are: the deep exhalation of the air in the lungs that would otherwise be used in the act of sneezing, holding the breath in while counting to ten or gently pinching the bridge of the nose for several seconds. Strong cravings for sweets and sugars. The face often goes red and the body becomes tense. In severe cases children may become severely dehydrated during the primary infection, necessitating admission to hospital and administration of fluids and nutrients with an intravenous drip. However, the bacteria can be transmitted even when it’s dormant.
It can only be considered as harmful when it is growing in number and has already started blocking and stopping the reproduction of healthy cells. At first, the teen seemed to be suffering from nothing more than a headache. Mouth ulcers that do not go away. Some are allergy remedies (antihistamines), while others are for treating overactive bladder or high blood pressure. Colds and flu are viruses that are spread through direct or indirect contact. ‘At first I thought “Where has it gone?” and then my mum told me and I was really shocked.
It also can happen when people touch used tissues, share drinking glasses or touch hands that have infected droplets on them. The danger is that you will break the skin somehow and give root to an infection, which could subsequently migrate inward-into the base of the brain. in English and went on to complete a Master of Social Work degree at USF as well. The nasal septum is the wall in the middle of your nose composed of bone and cartilage that splits the inside of your nose into the left and right. She expected the steroid treatment would bring some relief, and as the sole caregiver of a husband with Lou Gehrig’s Disease, she needed it. When genital herpes symptoms do appear, they are usually worse during the first outbreak than during recurring attacks.
Viruses or localised infections can cause the eye to redden. Dr Moskowitz couldn’t resist climbing up onto a tank turret.
|
Tip & How-To about Heating & Cooling
How do I Set the Thermostat Anticipator
If you have an older thermostat that has a heat anticipator in it then there are some things that you need to know about setting it and what it actually does.
First the function of the heat anticipator is to fake the thermostat into feeling the room temperature as hotter than it really is. The heat anticipator is actually a variable output heater inside your thermostat. The amount of heat that it actually produces is very, very small. This heat does, however, make a difference in how the room temperature feels to your thermostat.
If no extra heat is made inside the thermostat it will not react quickly enough to shut off the heating source. This will make the room “overshoot” the set point of the thermostat.
By heating the thermostat up very slightly it then shuts down the furnace or heat source before it actually reaches the temperature set point. This will allow the left over heat to go into the room and raise the temperature to the set point by the time it is all used up.
If you are experiencing wild temperature swings or the room temperatures are either not getting to the set point or going over the set point then the heat anticipator either is not adjusted right or it is burnt out and not working at all.
There are a couple of different types of heat anticipators. They will usually look like one of these.
If your heating is running too long then you will need to adjust the setting to a lower number. If you are not getting enough heat then go to a higher number. All you are changing when you do this is the amount of the heat coil you are using. Make small adjustments to the anticipator and then give it at least a half day before making more adjustments. Small changes can have a big effect if the heat anticipator is working correctly.
You also can set the anticipator by checking the current draw of the system. To do this you need to use an amp meter and measure the current draw of the heating unit when it is running. Then set the heat anticipator to the corresponding number of the current draw. This will at least get you a good starting point and some fine small adjustment can be made from there.
For more advanced digital thermostats there are cycle change features that do what this heat anticipator does in older thermostats. These often incorporate many things in determining the cycle length of the heating. These thermostats will not have a heat anticipator setting.
Like many things when it comes to your comfort, all people feel things a bit differently. You need to make the changes to the thermostat so that YOU feel comfortable. There is no right way it has to be done. Make it work for you and adjust the thermostat so that you are the most comfortable!
Posted by on
Heating & Cooling Logo
Related Topics:
Related Questions:
1 Answer
furnace repair
If the thermostat is an older model it may have the heat anticipator on the thermostat set incorrectly. It should be set to the measured amp draw from the "W" terminal on the thermostat.
Apr 30, 2017 | Heating & Cooling
1 Answer
what should the heat anticipator be set at on the thermostat?
The purpose of a thermostat heat anticipator is to "de-sensitize" the thermostat so that when actual room temperature is hovering close to the set temperature on the thermostat, the thermostat switch won't keep switching the air conditioner or heating system on and off too often - which can damage the equipment.
If you are replacing an existing defective thermostat with a new one, simply, set the anticipator to the same setting as the old one- as long as they are of the same manufacturer and model.
If you don't have the old one to match the new thermostat settings to, then you need to measure the thermostat's circuit using an ammeter.
In order for the thermostat to operate properly- you must adjust the heat anticipator resistor to match the current of the gas valve or relay on an oil-fired burner..
Another option is to install the T-stat using the factory default setting.
Since you did not mention the make and model number of the T-stat you are using, I cannot be more specific.
Feb 12, 2017 | Heating & Cooling
1 Answer
Bryant Furnace starts up then shuts off
If you have a standard thermostat and not a digital stat, the problem could very well be the 'heat anticipator' setting on the thermostat sub-base. It is a variable resistor that has to be adjusted to match the amp draw of the heating control circuit. In the heat mode, the heat anticipator 'warms' up the thermostat because of the heat generated through the system controls and causes the thermostat to 'anticipate' room temperature setpoint just a little before it really gets there.
If set too low, the result is a short cycle, if set too high, the result is an overshoot in setpoint temperature. The average setting for the anticipator is .4. You should see a very thin 'wire wound' flat resistor under the cover with a thin metallic pointer that physically slides from left to right or right to left. The pointer is pointing to its 'setpoint'. Adjust it up .1 or .2 from its current setting and observe operation for a week or so to see if any appreciable change has occurred.
Mar 22, 2015 | Bryant Heating & Cooling
2 Answers
How do I adjust the heat anticipatory to its proper settings
Look on the gas valve. Or post the make and model
Mar 21, 2013 | Heating & Cooling
1 Answer
my themorsat stop working,and I replaced the batteries.
see this causes and fix it. God bless you
Furnace Produces No Heat Possible Causes
Possible Repairs
• Remove cover of thermostat and loosen screws holding unit to wall. Level the thermostat. Re-tighten screws and replace cover.
• To adjust the heat anticipator, please see Heat Anticipator Adjustment.
• Furnace Turns On and Off Frequently ("short cycling")Possible Causes
• Dirty thermostat components
• Heat anticipator not set correctly.
Possible Repairs
Sep 30, 2012 | Honeywell Programmable Thermostat Heater
Not finding what you are looking for?
3,317 people viewed this tip
Ask a Question
Usually answered in minutes!
Top Heating & Cooling Experts
Level 3 Expert
2457 Answers
Dan Webster
Dan Webster
Level 3 Expert
8220 Answers
Donni Steen
Level 3 Expert
659 Answers
Answer questions
|
HTML <div> Tag
<div style="background:#F9EECF;width:50%;height:50%;">
Generic content...
The above example demonstrates usage of the <div> element. In this example I've applied some inline styles in order to see the actual <div> on the page.
The <div> element is a generic container with no particular meaning. It is often used to enclose elements into logical groups, usually with a view to applying styles to the group or specific elements within the group.
The W3C says that the <div> element can be used with class, lang, and title attributes to mark up semantics common to a group of consecutive elements.
The W3C also says that authors should view the <div> element as an element of last resort, for when no other element is suitable.
The <div>'s History
Prior to HTML5, the <div> element was widely used for creating containers for specific purposes and having its purpose conveyed using the class attribute. For example, this method was used to declare the "main" content section, an "article", a "nav" bar, a "header", "footer", etc. However, HTML5 has many elements that are specifically designed for these purposes (such as <main>, <article>, <nav>, <header>, <footer>, etc). Therefore, these elements should be used in place of the <div> element.
|
• Unbridgeable divide? Schism started in 1949
TAIPEI: When presidents Ma Ying-jeou and Xi Jinping shook hands on Saturday, it was a gesture of solidarity once unthinkable for the two sides, locked in hostility for decades over their very identity and right to exist.
The schism has been un-bridgeable since Taiwan split from the mainland after a civil war in 1949, which saw Nationalist leader Chiang Kai-shek flee to the island after defeat by Mao Zedong’s Communist forces.
It set the stage for a technical state of war as Taiwan evolved into a self-ruling democracy, while China still sees it as part of its territory awaiting reunification, by force if necessary.
While it is unclear what will come out of the meeting, it is symbolic of a dramatic rapprochement under Ma that has paved the way for the two leaders to be in the same room together — a seismic shift in relations.
Following is a brief history of the journey to the Ma-Xi summit.
Taiwan, formerly known as Formosa, is an island off the southeast coast of China between the East and South China Seas. Chinese immigration began in the 17th century and the island came under mainland control after a period of Dutch rule from 1620-62. Taiwan was also occupied by Japan from 1895-1945.
In 1949, about two million supporters of the KMT led by Chiang Kai-shek fled to Taiwan to establish a separate government after losing a civil war to Mao Zedong’s communists.
Beijing and Taipei were frozen in enmity as each insisted on recognition as the only representative of China.
As Chinese clout grew, more countries began to recognize Beijing as China’s seat of power — Taiwan lost its United Nations seat to China in 1971 and is now only formally recognized by 22 states.
After Chiang died in 1975 his son Chiang Ching-kuo took the reins, lifting martial law in 1987.
Chiang’s deputy Lee Teng-hui succeeded him in 1988 and the first signs of a possible thaw with China began to show.
In 1991, Lee declared the end of 43 years of emergency rule, unilaterally ending a state of war with China.
Two years later, the first direct talks between the two sides were held in Singapore between quasi-official envoys.
But relations soured once more in 1995 when Lee visited the US, prompting Beijing to suspend the high-level talks in protest.
Lee stressed the island’s statehood, which riled China.
In 1996, the United States sent in the Seventh Fleet after Beijing fired test missiles into the Taiwan Strait in a bid to stop voters electing Lee in the island’s first ever democratic elections — he won by a landslide.
Washington is Taiwan’s key ally and the island’s leading arms supplier, despite switching diplomatic recognition from Taipei to Beijing in 1979.
Closer ties
Ties with China were further strained in 2000, when Chen Shui-bian of the pro-independence Democratic Progressive Party (DPP) was elected president in Taiwan, ending the KMT’s 51-year grip on power.
But despite political turbulence, the two became economically closer with improved trade links.
A corruption scandal played a major role in Chen’s defeat in 2008, paving the way for Ma, who promised prosperity through closer ties.
Relations have improved dramatically since Ma took office, as the two sides held direct talks in Beijing, which led to regular direct flights and a tourism boom.
The Economic Cooperation Framework Agreement was signed in 2010 to reduce commercial barriers and in February last year the first government-to-government talks took place in Nanjing.
However, public sentiment in Taiwan has turned against the KMT with concerns over Chinese influence a major factor.
In spring 2014, 200 students occupied parliament for more than three weeks to demonstrate against a controversial trade pact in what became known as the Sunflower Movement.
The KMT suffered its worst-ever local election defeat in November last year and the DPP looks set to be voted in at presidential elections in January.
Friday’s summit is seen as a move to emphasize how far relations have come under Ma and promote the “one China” principle as Taiwan looks likely to imminently vote in a far less Beijing-friendly leader.
Please follow our commenting guidelines.
Comments are closed.
|
Articles >
Dealing With Dissolved Organic Solids (DACs) in a Pond Environment
By Ron Boedeker
Our main goal is to provide a constant and stable environment for the fish.
We divide pond water management into two main categories:
1. Biological
2. Chemical
Realize that most ponds are effectively a closed system. Everything that goes in stays in, as the saying goes, “The fish live in their own toilet”. We call this build up of organic material “Dissolved Organic Solids” or DACs and our goal in achieving good water quality is to reduce these dissolved organic solids to their lowest practical level.
All living things need to have an adequate steady supply of Calcium and other minerals to meet their needs.
This is best done with frequent water changes.
Water Changes:
Remove 15% of the water as often as possible, replace with dechlorinated water. Use a chlorine removing product or run new water thru a carbon filter to remove the chlorine.
24/7 trickle system is adding new water to the pond thru a hose or small tubing on a constant year around basis set at 5 to 10% per day. This will require an exit point for the extra water to leave the pond. It can be a simple over flow or more commonly, a sump for the exiting water to flow into and a sump pump to pump the waste water away.
Fish Loads:
We recommend not more than 12 inches of fish for each 250 gallons of pond water or better yet, 12” per 500 gallons for larger koi.
The idea is to give the fish enough food for their needs, but not more than that. Fish will eat way more pellet food than they need and the extra just passes thru their system and pollutes the pond water. Also, most ponds have plenty of algae to nibble on.
Feeding what the fish will eat in 5 minutes and remove any uneaten food.
Empty the skimmer each day to remove uneaten food.
We do not want to leave any uneaten food anywhere in the system. If left there, it will break down and contribute to the unwanted organic load of the pond.
Dissolved Oxygen:
Maintaining High levels of dissolve oxygen will break the organics down faster and can be achieved with a well-designed waterfall, large air stones or other methods.
Good circulation means that all areas of the pond have good water movement. This will prevent a build up dead or dying material from accumulating in the pond.
Surface Skimming/Overflow:
Effective surface skimming will catch the excess fish food, falling and windblown debris from settling in the pond. It will break up the surface proteins and oils allowing for a better Oxygen exchange at the air/water interface while recirculating the water back to the pond. The skimmer basket should be dumped out daily. An overflow system will remove the surface oils and organic permanently from the system lessening the bio load on the filters and the water column.
Plants can be both a positive and a negative on the water quality. On the positive side, they provide shade and shelter to the fish. They absorb pond pollutants and help cleanse the water. On the negative side, they absorb minerals the fish need and as the plants die off, they contribute to the organic loading of the pond. As the fish get larger, they can damage themselves on the plant pots and stands.
Plants aerate the water during the day, but remove oxygen during the night. So in a heavily loaded pond in hot weather without effective mechanical aeration, the oxygen can be depleted enough to kill fish in the early morning hours when the dissolved oxygen reaches its lowest point.
There are several things we want to keep track of in the pond water.
On the chemistry side, we need to be sure that the buffering (KH or Alkalinity) capacity of the water is adequate. If the buffering capacity is exceeded, the PH will fall, potentially causing a PH crash killing all the fish. We also need to be sure the pond system has enough calcium and minerals to sustain the plant and fish growth, so we test for GH (general Hardness) and calcium.
· On the biological side, we need to watch the Ammonia and Nitrite. We should never be able to read any ammonia on a pond test kit.
· Dissolved organic solids are the combination of all the organic waste in the water column. The simplest way to see them is to fill a pint jar 1/2 full, put a cap on it and then shake it. In water with very little organic content, the water in the jar will form very few bubbles and they will collapse very quickly. In heavily laden organic rich water, the water will foam up and the foam will not break down easily. Another test is to just compare the color of the pond water to a jar of city water over a white back ground.
For questions or for more information contact:
|
During which of the following Indian freedom movements did Mahatma Gandhi give the call 'Do or Die'?
Options :
1. Khilafat Movement
2. Non-Cooperation Movement
3. Civil Disobedience Movement
4. Quit India Movement
Answer and Explanation :-
Answer: Option 4
Previous Question : The 'Indian National Social Conference' was founded in 1887 by which of the following persons?
Next Question : Which of the following provinces was not to be included in the Indian dominion, according to Mountba...
Click here for online test on Indian History
(Getemail alerts when others member replies)
Surround yourself with those who won't compete but will revel in you your success and see your ascent as a reflection of their own possibilities.
-Ifeanyi Enoch Onuoha
|
The Ecologist
More articles about
Related Articles
Renewable energy versus nuclear: dispelling the myths
Mark Diesendorf
19th April 2016
Most of the renewable energy technologies are commercially available, affordable and environmentally sound. The pro-nuclear and anti-RE myths disseminated by nuclear proponents and supporters of other vested interests do not stand up to examination.
Nuclear energy and renewable energy (RE) are the principal competitors for low-carbon electricity in many countries.
As RE technologies have grown in volume and investment, and become much cheaper, nuclear proponents and deniers of climate science have become deniers of RE.
The strategies and tactics of RE deniers are very similar to those of climate science deniers.
To create uncertainty about the ability of RE to power an industrial society, they bombard decision-makers and the media with negative myths about RE and positive myths about nuclear energy, attempting to turn these myths into conventional wisdom.
In responding to the climate crisis, few countries have the economic resources to expand investment substantially in both nuclear and RE. This is demonstrated in 2016 by the UK government, which is offering huge long-term subsidies to nuclear while severely cutting existing short-term subsidies to RE.
This article, a sequel to one busting the myth that we need base-load power stations such as nuclear or coal, examines critically some of the other myths about nuclear energy and RE. It offers a resource for those who wish to question these myths. The myths discussed here have been drawn from comments by nuclear proponents and RE opponents in the media, articles, blogs and on-line comments.
Myth 1: Base-load power stations are necessary to supply base-load demand.
Variant: Base-load power stations must be operated continuously to back-up variable renewable energy systems.
Variant: Renewable energy is too variable to reliably make the principal contribution to large-scale electricity supply.
This myth is refuted in my previous article, 'Dispelling the nuclear 'baseload' myth: nothing renewables can't do better!' To quote three introductory paragraphs:
Underlying this claim are three key assumptions. First, that baseload power is actually a good and necessary thing. In fact, what it really means is too much power when you don't want it, and not enough when you do. What we need is flexible power (and flexible demand too) so that supply and demand can be matched instant by instant.
The second assumption is that nuclear power is a reliable baseload supplier. In fact it's no such thing. All nuclear power stations are subject to tripping out for safety reasons or technical faults. That means that an electricity system that includes a 3.2GW nuclear power station needs at least 3.2GW of expensive 'spinning reserve' that can be called in at a moment's notice.
Myth 2: There is a renaissance in nuclear energy
Global nuclear electricity production in terawatt-hours per year (TWh/y) peaked in 2006. The percentage contribution of nuclear energy to global electricity peaked at 17.5% in 1993 and declined to under 11% in 2014. Nowadays annual global investment in nuclear is exceeded by investment in each of wind and solar.
Over the past decade the number of global start-ups of new nuclear power reactors has been approximately balanced by the number of closures of existing reactors. While several European countries are phasing out nuclear energy, most growth in nuclear reactor construction is occurring in China, Russia, India and South Korea.
See also Dr Jim Green's detailed article busting this myth wide open: 'Nuclear renaissance? Failing industry is running flat out to stand still'.
Myth 3: Renewable energy is not ready to replace fossil fuels, and nuclear energy could fill the (alleged) gap in low-carbon energy supply
Most existing nuclear power reactors are classified as Generation 2 and are widely regarded as obsolete. The current generations of new nuclear power stations are classified as Generation 3 and 3+. Only four Generation 3 reactors have operated, so far only in Japan, and their performance has been poor. No Generation 3+ reactor is operating, although two are under construction in Europe, four in the USA and several in China.
All are behind schedule and over-budget - the incomplete European reactors are already triple their budgeted prices. Not one Generation 4 power reactor - e.g. fast breeder, integral fast reactor (IFR), small modular reactor - is commercially available. So it can be argued that modern nuclear energy is not ready.
On the other hand, wind and solar are both growing rapidly and are still becoming cheaper. Large wind and solar farms can be planned and built in 2-3 years (compared with 10-15 years for nuclear) and are ready now to replace fossil and nuclear electricity.
Myth 4: Nuclear weapons proliferation is independent of civil nuclear energy
Variant: Nuclear weapons explosives cannot be made from the type of plutonium produced in conventional nuclear power reactors, or from the thorium fuel cycle, or from the IFR.
Six countries (France, India, North Korea, Pakistan, South Africa and the UK) have covertly used civil nuclear energy to assist them to develop nuclear weapons. In addition, at least seven countries (Argentina, Australia, Brazil, Iran, Libya, South Korea and Taiwan) have used civil nuclear energy to commence covertly developing nuclear weapons, but then terminated their programs (references in Diesendorf 2014).
Thus nuclear energy is facilitating proliferation and therefore is increasing the probability of nuclear war. Even if the probability of nuclear war is small (and this is debatable), the potential impacts are huge. Therefore it is inappropriate to ignore the proliferation risk, which is probability multiplied by potential impact.
Thorium reactors are under development in India. Thorium is not fissile, so it first has to be bombarded with neutrons to convert it into uranium-233, which is. Like any fissile element, U-233 can be used either to generate heat and hence electricity, or as a nuclear explosive. Nuclear weapons with U-233 as part of the explosive have been tested by the USA (Teapot MET test), Soviet Union and India.
Some nuclear proponents incorrectly claim the hypothetical IFR would be proliferation-proof. The IFR has only ever operated as a single prototype in the USA. The project was cancelled by Congress in 1994 for reasons including funding, doubts about whether it was needed, and concerns about its potential for proliferation.
The IFR offers at least two proliferation pathways. Once it has separated most of the highly radioactive fission products from the less radioactive transuranics by means of an experimental process known as pyroprocessing, it would be easier to extract the plutonium-239 from the transuranics by means of conventional chemical reprocessing and use it to produce nuclear weapons.
An alternative proliferation pathway would be to modify an IFR to enable it to be used as a breeder reactor to produce weapons grade plutonium from uranium-238. (Wymer et al. 1992).
Myth 5: The death toll from the Chernobyl disaster was 28-64 people
These absurdly low estimates are obtained by considering only short-term deaths from acute radiation syndrome and ignoring the major contribution to fatalities, namely cancers that appear over several decades.
For Chernobyl, the lowest serious estimate of future cancer deaths was "up to 4,000" by the Chernobyl Forum (2006), a group of United Nations agencies led by the International Atomic Energy Agency (IAEA).
The IAEA has the conflicting goals of promoting nuclear energy and applying safeguards against inter alia accidents and proliferation. Estimates from authors with no obvious conflict of interest range from 16,000 from the International Agency for Research on Cancer to 93,000 from a team of international medical researchers from Ukraine, Russia and elsewhere.
See also Dr Jim Green's excellent article: 'Radiation harm deniers? Pro-nuclear environmentalists and the Chernobyl death toll'.
Myth 6: The problem of permanently storing high-level nuclear wastes has been solved
All high-level waste is currently in temporary storage in pools or dry casks. Not one permanent repository is operating in the world.
Development of the proposed US repository at Yucca Mountain in the USA was terminated after expenditure of $13.5 billion. Underground repositories are under construction in Sweden and Finland. Even if the technical and economic challenges could be solved, the social problem of managing or isolating the repositories for 100,000 years remains.
Myth 7: The IFR could 'burn up' the world's nuclear wastes
The Integrated Fast Reacor or IFR only exists as a design. If it were ever developed, it would become another proliferation pathway (see Myth 4). At best it could convert most transuranics to fission products, so underground long-term repositories would still be needed.
For a fuller exposition of the problems of IFRs and other 'new' reactor designs, see Amory Lovins's classic 2009 essay, recently republished on The Ecologist: ''New' nuclear reactors? Same old story'.
Myth 8: Nuclear energy emits no or negligible greenhouse gas emissions
Neither nuclear energy nor most renewable technologies emit CO2 during operation. However, meaningful comparisons must compare whole life-cycles from mining the raw materials to managing the wastes.
Nuclear physicist and nuclear supporter Manfred Lenzen (2008) found average life-cycle emissions for nuclear energy, based on mining high-grade uranium ore, of 60 grams of CO2 per kilowatt-hour (g/kWh), for wind of 10-20 g/kWh and for natural gas 500-600 g/kWh.
Now comes the part that most nuclear proponents try to ignore or misrepresent. The world has only a few decades of high-grade uranium ore reserves left. As the ore-grade inevitably declines, the fossil fuel used to mine (with diesel fuel) and mill uranium increases and so do the resulting greenhouse gas (GHG) emissions.
Lenzen calculates that, when low-grade uranium ore is used, the life-cycle GHG emissions will increase to 131 g/kWh. Others have obtained higher levels. This is unacceptable in terms of climate science. Only if mining low-grade ore were done with renewable fuel, or if fast breeder reactors replaced burner reactors, could nuclear GHG emissions be kept to an acceptable level, but neither of these conditions is likely to be met for decades at least.
For more on this topic, see also Professor Keith Barnham's excellent article: 'False solution: Nuclear power is not 'low carbon''.
Myth 9: Nuclear energy is a suitable partner for renewable energy in the grid
Making a virtue out of necessity, nuclear proponents claim that we can have both (new) nuclear and renewables in the same grid. However, nuclear energy is a poor partner for a large contribution of variable renewable energy in an electricity supply system for four reasons:
1. Nuclear power reactors are inflexible in operation (see Myth 10), compared with open cycle gas turbines (which can be biofuelled), hydro with dams and concentrated solar thermal (CST) with thermal storage. Wind and solar PV can supply bulk energy, balanced by flexible, dispatchable renewables, as discussed previously.
2. When a nuclear power station breaks down, it is usually off-line for weeks or months. For comparison, lulls in wind last typically for hours or days, so wind does not need expensive back-up from base-load power stations - flexible dispatchable RE suffices.
3. Wind and solar farms are cheaper to operate than nuclear (and fossil fuels). Therefore wind and solar can bid lower prices into electricity markets and displace nuclear from base-load operation, which it needs to pay off its huge capital costs.
4. Renewables and nuclear compete for support policies from government including scarce finance and subsidies. For example, the UK government commitment to Hinkley C, with enormous subsidies, has resulted in removal of subsidies to on-shore wind and solar PV.
Myth 10: Nuclear power reactors can generally be operated flexibly to follow changes in demand / load
The limitations, both technical and economic, are demonstrated by France, with 77% of its electricity generated from nuclear.
Since the current generation of nuclear power stations is not designed for load-following, France can only operate some of its reactors in load-following mode some of the time - at the beginning of their operating cycle, with fresh fuel and high reserve reactivity - but cannot continue to load-follow in the late part of their cycle. This is acknowledged by the World Nuclear Organisation.
Load-following has two economic penalties for base-load power stations:
• Substantially increased maintenance costs due to loss of efficiency and the expansion and contraction cycles associated with rising and falling reactor temperatures;
• Reduced earnings during off-peak periods. Yet, to pay off of their high capital cost, the reactors must be operated as much as possible at rated power.
France reduces the second economic penalty by selling its excess nuclear energy to neighbouring countries via transmission line, while parts of Australia soak up their excess base-load coal energy with cheap off-peak water heating.
Myth 11: Renewable energies are more expensive than nuclear
Variant: Nuclear energy receives smaller subsidies than RE.
Both myths are false. Levelised costs of energy (LCOE) depend on the number of units installed at a site, location, capital cost, interest rate and capacity factor (actual average power output divided by rated power). LCOE estimates for nuclear are $108/MWh based on pre-2014 data and $97-132/MWh based on pre-2015 data (Lazard 2015).
The IPCC estimate does not include subsidies, while the Lazard estimate includes US federal government subsidies excluding loan guarantees and decommissioning. None of these US estimates takes account of the huge escalation in costs of the two European Pressured Water Reactors (EPR) under construction (mentioned in Myth 3).
The EPR proposed for the UK, Hinkley C, is being offered a guaranteed inflation-linked price for electricity over 35 years, commencing at £92.5/MWh ($144/MWh) in 2012 currency. That's now pushing up towards £100 in today's money, almost three times the current wholesale price of electricity in the UK. The subsidy package also includes a UK Treasury loan guarantee of originally £10 billion ($15.3 billion). Its capped liability for accidents and inadequate insurance is likely to fall upon the British taxpayer.
In 2015 multinational financial consultants Lazard estimated unsubsidised costs for on-shore wind across the USA of $32-77/MWh. An independent empirical study by US Department of Energy (Fig. 46) found levelised power purchase agreement prices in 2014 for wind in the US interior (region with the highest wind speeds) of $22/MWh, and in the west (region with lowest wind speeds) about $60/MW.
The US government subsidises wind with a Production Tax Credit of $23/MWh over 10 years, so this must be added to the DoE figures to obtain the actual costs. In Brazil in 2014, contracts were awarded at a reverse auction for an average unsubsidised clearing price of 129.3 real/MWh (US $41/MWh).
Lazard estimated unsubsidised costs of $50-70/MWh for large-scale solar PV in a high insolation region of the USA. In New Mexico, USA, a Power Purchase Agreement for $57.9/MWh has been signed for electricity from the Macho Springs 50 MW solar PV power station; federal and state subsidies bring the actual cost to around $80-90/MWh depending on location.
In Chile, Brazil and Uruguay, unsubsidised prices at reverse auctions are in the same range (Diesendorf 2016). Rooftop solar 'behind the meter' is competitive with retail grid electricity prices in many regions of the world with medium to high insolation, even where there are no feed-in tariffs.
For CST with thermal storage, Lazard estimates $119-181/MWh.
Comparing subsidies between nuclear and RE is difficult, because they vary substantially in quantity and type from country to country, where nuclear subsidies may include some or all of the following (Diesendorf 2014):
• government funding for research and development, uranium enrichment, decommissioning and waste management;
• loan guarantees;
• stranded assets paid for by taxpayers and electricity ratepayers;
• limited liabilities for accidents covered by victims and taxpayers;
• generous contracts for difference.
Subsidies to nuclear have either remained constant or increased over the past 50 years, while subsidies to RE, especially feed-in tariffs, have decreased substantially (to zero in some places) over the past decade.
Myth 12: Renewable energy is very diffuse and hence requires huge land areas
Hydro-electric dams and dedicated bioenergy crops can occupy extensive areas, but renewable energy scenarios for few regions have large additional contributions from these sources.
Ground based solar farms located may occupy significant land, however this is often marginal land, and need not preclude other uses such as grazing. Rooftop solar, which is widespread in Germany and Australia, and bioenergy derived from crop residues, occupy no additional land.
On-shore wind farms are generally located on agricultural land, with which they are highly compatible. The land occupied is typically 1-2% of the land spanned which deniers often ignore and misleadingly quote the land area spanned.
For an economic optimal mix of 100% renewable electricity technologies calculated for the Australian National Energy Market, total land area in km2/TWh/y is about half that of equivalent nuclear with a hypothetical buffer zone of radius 20 km, as belatedly established for Fukushima Daiichi (Diesendorf 2016).
Myth 13: Energy payback periods (in energy units, not money) of renewable energy technologies are comparable with their lifetimes
Nowadays typical energy payback periods in years are: solar PV modules 0.5-1.8; large wind turbines 0.25-0.75; CST (parabolic trough) 2; nuclear (high-grade-uranium ore) 6.5; nuclear (low-grade-uranium ore) 14 (references in Diesendorf 2014, Table 5.2).
The range of values reflects the fact that energy payback periods, and the related concept of energy return on energy invested, depend on the type of technology and its site. Critics of RE often quote much higher energy payback periods for RE technologies by assuming incorrectly that each has to be backed-up continuously by a fossil fuelled power station.
Myth 14: Danish electricity prices are among the highest in Europe, because of the large contribution from wind energy
Danish retail electricity prices are among the highest in Europe, because electricity is taxed very heavily. This tax goes into consolidated revenue - it does not subsidise wind energy. Comparing tax-free electricity prices places Denmark around the European average.
Wind energy in Denmark is subsidised by feed-in tariffs funded by a very small increase in retail electricity prices, which is offset by the decrease in wholesale electricity prices resulting from the large wind energy contribution.
Myth 15: Computer simulation models of the operation of electricity grids with 80-100% renewable electricity are meaningless over-simplifications of real systems
Although a model is indeed a simplified version of reality, it can be a powerful low-cost tool for exploring different scenarios. Most modellers start with simple models, in order to understand some of the basic relationships between variables. Then, step-by-step, as understanding grows, they make the models more realistic.
For example, initially the UNSW Australia group simulated the operation of the Australian National Electricity Market with 100% RE in hourly time-steps spanning a single year. Wind farms were simply scaled up at existing sites. The next model included economic data and calculated the economic optimal mix of RE technologies and then compared costs with low-carbon fossil fuelled scenarios.
Recently the simulations were extended to six years of hourly data, the RE supply region was decomposed into 43 sub-regions and a limit was imposed on non-synchronous supply. Meanwhile, researchers at Stanford University have shown that all energy use in the USA, including transport and heat, could be supplied by renewable electricity.
Their computer simulations use synthetic data on electricity demand, wind and sunshine taken every 30 seconds over a period of six years. Using synthetic data allows modellers to include big hypothetical fluctuations in the weather. Such sensitivity analysis strengthens the power and credibility of the models.
Strangely, some of the loudest critics of simulation modelling of electricity systems, a specialised field, have no qualifications in physical science, computer science, engineering or applied mathematics. In Australia they include two biologists, a social work academic and an occupational therapist.
Renewables could be scaled up long before nuclear
Computer simulation models and growing practical experience suggest that electricity supply in many regions, and possibly the whole world, could transition to 100% renewable energy (RE).
Most of the RE technologies are commercially available, affordable and environmentally sound. There is no fundamental technical or economic reason for delaying the transition.
The pro-nuclear and anti-RE myths disseminated by nuclear proponents and supporters of other vested interests do not stand up to examination. Given the political will, RE could be scaled up long before Generation 3 and 4 nuclear power stations could make a significant contribution to electricity supply.
Mark Diesendorf is Associate Professor in Interdisciplinary Environmental Studies in the School of Biological, Earth and Environmental Sciences at the University of New South Wales.
Diesendorf M (2014) Sustainable Energy Solutions for Climate Change. London: Routledge and Sydney: NewSouth Publishing.
Diesendorf M (2016) 'Subjective judgments in the nuclear energy debate'. Conservation Biology doi:10.1111/cobi.12692. (See the Supporting Information as well as the short article.)
Wymer RG et al. (1992) An Assessment of the Proliferation Potential and International Implications of the Integral Fast Reactor. Martin Marietta K/IPT-511 (May); prepared for the Departments of State and Energy.
Previous Articles...
Using this website means you agree to us using simple cookies.
More information here...
Help us keep the Ecologist platform going
Join The Resurgence TrustDonate to support the Resurgence Trust
|
“There’s an old saying: ‘White space is nice.’ Amateurs tends to pack every nook and cranny of space with visuals and type. Don’t. White space is not your enemy.”
(Kim Golombisky and Rebecca Hagen, White Space Is Not Your Enemy: A Beginner’s Guide to Communicating Visually Through Graphic, Web and Multimedia Design. Focal Press, 2010)
The Rhetoric of Spacing
“White space includes the spacing of symbols, words, sentences, even letters at times; the spacing (or ‘leading’) of lines; paragraph and other indentions, space left at paragraph ends, and extra space sometimes left between paragraphs; space to the right and left of centered lines; and blank or partly blank pages. The rhetorical value of white space–a matter clearer to printers than to most teachers and writers–appears by absence when words are unspaced, when the page is crowded to the edges, or when matter which ought to be in half a dozen paragraphs is set as an unbroken phalanx paragraph. White space judiciously employed makes communication easier and more pleasurable. It is for this reason that publishers use so much paper for well-proportioned margins, and that advertisers pay heavily for space which they do not fill with words. White space may be considered in three aspects: as a removal of obstructions, so that the reader may read; as a means of indicating transitions, e.g. from paragraph to paragraph; and as an important element in typographical design.”
(George Summey, Modern Punctuation: Its Utilities and Conventions. Oxford Univ. Press, 1919)
Radical Architecture In Your Palm
These days, architecture is often either left unbuilt (or it takes place within the shell of an older building). Despite our questioning of the QR Code facade yesterday, it’s evidence that the Dutch seem to have an almost preternatural understanding of how to use technology to engage the public in architecture.
the stamps are paired with an Augmented Reality App called UAR (Urban Augmented Reality) that lets you place this and other unbuilt structures in meatspace by holding your iPhone up to the site.
amazing use of technology!
via Architeizer
Power of white in graphic design
Poets have written of cloth “white as the driven snow” (Shakespeare), “Dusk faces with white silken turbans wreath’d” (Milton), sea spray like “wild white horses” (Arnold), the moon as an “orbed maiden, with white fire laden” (Shelley). Tennyson’s Arthurian heroes rejoice that “the world is white with May.” As a colour, white is a metaphor for many emotions and for concepts ranging from purity to death…providing cool white space, making an emphatic statement.
“… in graphic design, white is too often thought of as something to cover up or get rid of, not something to explore and celebrate.”
Gail Deibler Finke
April 2000
White “space”
What is not,
helps us define what is.
What is not,
soon becomes what is.
The what is,
is what was note.
What was left out,
is just as important
as what is put in.
White space
is as real as what fills it.
All acts of creation start with a blank canvas (whitespace)…
use it wisely.
From book: White Graphics: The Power of White in Graphic Design by Gail Deibler Finke
Book on amazon
Problem with Close-Talking? Blame the Brain
Why is it so uncomfortable to stand really close to a stranger? Sure, there are the potentially icky things. Sometimes an elevator car is so crowded that you can smell a fellow rider’s shampoo or chewing gum (or worse). But even when a stranger is perfectly groomed, it’s usually a bit revolting to be pressed against him in public. Why?
Read more at Times health
Waiting room
An installation at St Philips Building, Sheffield st, London, WC2A 2EX
An exhibition to mark the life of the St Philips Building was quickly organised before its imminent demolition. Dominic Wilcox was one of those asked to create something in the buliding that would reference the buildings history in some way. The St Philips building started in 1903 as a workhouse Infirmary for the poor before going on to be a hospital for women and then bought by the London School of Economics.
On visiting St Philips Dominic found the last remaining office, left abandonded and intact.
“I thought that it was as if the room was waiting to die and I wanted to ease its transition from this world. My thought for the office was to leave it intact but to remove the colour from every aspect in the room (via white paint) thereby taking away a layer of reality and connection to our world as it moves closer to its imminent death.” Dominic Wilcox
via Dominic Wilcox
Waiting Room from Dominic Wilcox on Vimeo.
I thought the use of white to signify impending doom leaves a very deep impression in people’s mind.
This treatment of physical, visually seen (directly) “whitespace”, I perceive as something portraying reality instead
It is that kind of uncertainty, recalling what exactly the colour of the object if recalling someone close to you leaving, having flashbacks memories on the interaction between you and the person that passed away. almost colourless, fading away. It is the non-existence of the person in future that makes one person ache.
It is the memories and connections we have with the person/object that make us ache.
Van Alen Bookstore
The very existence of Van Alen Books makes a powerful argument about the role of the book in our professional culture. The consensus opinion regarding architectural publishing seems to be that the era of the architectural “tome” is over. But the argument that we don’t “need” bookstores anymore, since we buy books less, ignores the implicit social currency that these spaces deal in. Opening Van Alen Books could be seen as as huge risk, but on the other hand, the store addresses the dearth of public meeting and forum spaces in the city.
A look at the LOT-EK designed space proves that subtextual point: where are the books? Does it matter?
via Architizer
Personal Space final
personal space
Everyone is talking about time management these days and warnings about balancing between research vs execution and also making things work.
Learning to enjoy our own project process is important too. But the word “FYP” will just put all enjoyment aside. no. it wont be a fyp project but more of finding out something I want to know, and sharing it with people through visual communications.
Someone discussed about how projects should first catch people’s attention with something awesome first so that people will move to look further into the process journal, methodology, research…and finding out what it really is. It just don’t only work in the arts and design industry, but also in business, science… all fields.
In the mist of all the mugging and researching, I kind of forgotten that common people don’t look at how much work you have done to determine how good the project is. They look for something that interest them and relate to them. Then they grasp the general concept of the project, influence how they think and remember them when they leave.
ooohhh.. too much to handle.
|
Break a Leg
Today’s phrase up for consideration is one from the back catalogue in honour of my friend, blogger and director, and the performance of her new show. So for the cast and crew and everyone involved in Frozen, break a leg!
It’s an odd superstition that before any sort of theatrical or arts performance we think it’s unlucky to utter a good luck. Especially when you consider that we would happily say those words before important exams, driving tests or a job interview. We all know that the correct thing to say is break a leg, but you would think that breaking a leg would actually be a pretty unlucky thing, so where does this phrase come from?
The truth is we’re not quite sure. There are a few false etymologies that seem quite unlikely. One suggests that the curtain pulls were once called legs which would eventually break after lots of wear and tear. So to break a leg would be a good thing, meaning that you had had lots of popular and successful performances.
Another false etymology comes from the assassination of Abraham Lincoln in 1865. Allegedly, John Wilkes Booth, actor-come-assassin, jumped onto the Ford’s Theatre stage after murdering Lincoln and broke his leg. Unfortunately, there’s no evidence of the phrase before the 19th century and it’s difficult to see how Lincoln’s assassination would tie in with good luck.
The most likely explanation is that the phrase is simple superstition. The Italians have a comparable phrase, bocca al lupo, and the Germans have a particularly similar expression, Hals- und Beinbruch, which means ‘break your neck and leg’ or literally ‘neck and leg break’. It might be that we get the phrase from this since there is an example of the same structure from 1954 in the News of Fredrick, Maryland.
Among the many sayings for “good luck,” you can hear actors whisper “neck and leg break” to each other as the footlights dim and the curtain rises each opening night. Although “neck and leg break” sounds more like a call for a wrestling arena, theatrically it means, “good luck”.
Still, there is the possibility that the German and English expressions appeared simultaneously, without the former being the origin of the latter, since Japanese has a similar phrase as well. Some people claim the phrase has a British origin but the earliest recorded citations are all American. Supposedly it dates back to the 1930s but the first complete example comes from 1957 in the Associated Press in a story about an actress who literally broke her leg during the performance.
All in all, it’s a bit of a mystery. Generally, it seems that the phrase is simply a way of stopping a jinx; if it is bad luck to wish for a good performance, you have to wish for a bad one instead.
2 thoughts on “Break a Leg
1. Hi. I am from Japan, and I am wondering what exactly is the Japanese phrase similar to ‘Break a leg.’ Does that happen to be ‘hone o oru,’ (break a bone,) which is an idiomatic expression meaning ‘to make a lot of effort’? I am not sure if it is used when we wish for a good luck.
Anyway, thank you for sharing an interesting piece of information.
• Thanks for your comment! It’s exciting to see my blog is reaching as far as Japan!
To be quite honest, I’m not sure what the similar Japanese expression is meant to be since the source of that fact doesn’t go into detail. The exact quote from is: “The possibility that both languages developed similar phrases is plausible (Japanese has a similar phrase as well) given that the superstition of the jinx is common around the world.” Perhaps the author just meant that the structure of the phrase is similar rather than the use?
In fact, now I’m looking into it again (I originally wrote this post nearly a year ago) I can’t find any other references to Japanese in Cassell’s Dictionary of Word and Origin Phrases, or the OED. So I think you’re probably correct. Thanks for the input. It really helps to make Word Stories more accurate which, to me, is really important.
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
|
Lei Day/May Day
Lei Day/May Day
by Minako Ishii, Jeffrey Kent
hard cover, color
64 pp, 7" x 7"
Add To Cart
For centuries the Kingdoms of Hawaii and Great Britain have shared an admiration for celebrations, royalty and flowers. That connection is explored in Minako Ishii's flip book May Day/Lei Day. May Day tells of the origin of this special celebration in England over 700 years ago and describes how Hawaii came to embrace it.
Lei Day describes how local customs commemorate Hawaii's royal history and details the significance of color and materials used to make the beautiful lei. Simple lei-making instructions are included so Hawaii's keiki can make a lei of their very own. Beautiful photographs throughout show how this day is celebrated throughout Hawaii. The unique binding creates two books in one!
Minako Ishii's travels as a senior business analyst with Sony furthered an early interest in world cultures. Her photographs, which have appeared in international, national and Hawaii publications, and her business Beyond Borders reflect her belief in both the importance of cultural preservation and in children's potential to bridge boundaries. She is also the author of the children's flip book Girls Day / Boys Day
|
CNET también está disponible en español.
Ir a español
Don't show this again
In your future: Clothes made of feathers and straw
What's the new polyester? Feathers.
Researchers at the University of Nebraska are trying to create fabrics made from chicken feathers and rice straw to replace the petroleum-based artificial fabrics in bike jerseys, jackets, carpets and other garments or items. The chicken feather fabric will feel more like wool, while the straw fabric will resemble cotton, so you won't resemble a scarecrow or a homecoming float mascot.
Success, of course, could turn the fabric industry upside down. The cost of fabrics could decline because the base product would be waste product. Oil exports could drop a bit, and farmers would get another income stream.
Research is still in the experimental stage. The properties of the fiber indicate it could be used to spin fabric. Chicken feathers are mostly composed of keratin, the same type of protein found in wool.
"We hope that the research reported here will stimulate interest in using agricultural byproducts as textile fibers, which would add value to agricultural crops and also make the fiber industry more sustainable," said Yiqi Yang, Ph.D., a University of Nebraska professor of textile science, in a prepared statement.
Yang's paper was released at the annual conference of the American Chemical Society in San Francisco this week.
Autoplay: ON Autoplay: OFF
|
Dismiss Notice
Dismiss Notice
Join Physics Forums Today!
Injecting a particle in space (question, not math)
1. Mar 7, 2005 #1
Suppose a uniform magnetic field exists in a finite region of space. Can you inject a charged particle into this region from the outside and have it stay trapped in the region by magnetic force? Explain completely.
Originally I thought no because i didnt think one could keep a charged particle in one area in space due to a magnetic force. I thought it could be injected but not held into space, but not sure of the reason
2. jcsd
3. Mar 8, 2005 #2
User Avatar
Science Advisor
Homework Helper
What kind of motion does a charged particle in a uniform magnetic field describe?
Similar Discussions: Injecting a particle in space (question, not math)
1. Particle question (Replies: 3)
2. Particle question (Replies: 0)
3. Particles from space? (Replies: 6)
4. Math questions (Replies: 1)
5. Particle questions (Replies: 2)
|
Getting Along with Python
Install Python packages with pip
Python’s “standard library” contains all kinds of modules. For example, re lets you use regular expressions. These come installed with Python, so all you have to do is import them. But sooner or later you are going to want to use Python code someone else wrote, outside the standard library; this code is bundled up in files called “packages”. Using great third-party packages is one of the major advantages of Python and is not to be missed. But unlike the standard library packages which come with Python, you must somehow ‘install’ third-party packages to make it possible to import things from them.
Regardless of your skill or experience level, the right way to install packages is with a ‘package manager’ tool. There are many wrong ways people try, like manually downloading packages and dumping their contents in system directories. This wastes time, frustrates you and makes a mess on your system. Avoid that kind of trouble and just follow the standard practices described here, which allow many people to live in harmony with Python.
The intent of this document is benign: to help beginners get comfortable installing packages with a standard tool, so they don’t maintain painful and harmful habits (like manually dumping files in site-packages, manually setting PYTHONPATH, modifying sys.path at runtime, trying to import code from arbitrary paths, and especially reinventing wheels just to avoid managing third-party libraries). In this way, a clear, standard, general-purpose recommendation benefits both beginners and the community even if it isn’t one’s own favorite.
Introducing pip
Historically, many Python beginners have been confused by the various methods for installing packages, and all the arguments about them. Today, you don’t have to be confused. Just use pip as your default and preferred method of installing and uninstalling Python packages.
Using pip is usually as easy as typing this at a command line:
pip install example
pip uninstall example
(except with the name of the package instead of example.) There are exceptions: certain packages, like NumPy, should probably just be installed from an OS package or windows EXE installer if you can’t easily get them to compile (see what pip can’t install).
If you’re convinced, you can skip the rest of this and make sure you have pip installed using this page’s section on bootstrapping pip, or use pip’s own instructions on installing pip. Otherwise, read on for more of the reasoning.
Why pip?
Of the available options, why choose pip? pip’s main historical competition was easy_install, which served well for quite a while but also had certain problems:
• it could not uninstall packages.
• it left broken packages when installations failed, causing a variety of mysterious issues.
• its error feedback was often unhelpful.
• it wasn’t always very actively maintained.
There were workarounds to some of these. But pip just resolved the issues. It also added a few bonus advantages of its own:
• pip is pre-installed for you in every virtualenv. (Why should you use virtualenv?)
• pip helps you reproduce installation of dependencies using pip freeze and pip install -r requirements.txt.
• pip finds packages from the command line with pip search. (OK, it’s a bit slow.)
• pip can install the new wheel (PEP 427) binary package format, and stays up to date with the current state of Python packaging.
So most experienced Python developers settled on pip as a default years ago. Formalizing this, pip now also has an official recommendation (PEP 453 says: “officially recommend the use of pip as the default installer for Python packages”). For these reasons, pip is the safest and most future-proof default currently available. It not only does the job now in any case that matters, it can also be counted on to do the job for years to come. Unfortunately, this is still not clearly communicated to people who are less familiar with Python.
Despite pip’s big advantages, there are two significant issues to be aware of. The first is that pip doesn’t come with Python, which means using a less easy way to install pip itself (see Bootstrapping pip). The second is that pip can’t install every possible thing (see What pip can’t install). These issues shouldn’t be enough to make a beginner to Python avoid adopting pip as the default way to install and uninstall packages, because mitigating them is almost always easy in practice; rare corner cases and universal limitations of all Python-based installers cannot justify struggling with bad or nonexistent package management on a daily basis.
Bootstrapping pip
Unfortunately, Python doesn’t come with pip. (Sometime in the future, for Python3.4+, this should be fixed by PEP 453.) For now, we have to install pip by some less convenient method than using pip. Once you see how to do it, though, it’s not so bad.
1. Sometimes your OS ships with pip installed, or someone already did it. Then you’re already done. To see if this is the case, try just running pip from a terminal or command line. If it’s not there, no harm, it was worth a try.
2. Usually OS-specific packages for pip are available (e.g. Debian/Ubuntu python-pip, Fedora 17+ pip-python). Install one of these in the way you’re used to, and you are typically done.
Using this option usually means you aren’t getting the latest version of pip, but rather whatever version your OS deemed stable; you would probably already know if this was something that should matter to you.
On Windows, try running the Windows installer for setuptools and then the Windows installer for pip. Or try installing both using pip-Win.
On OS X, you can use homebrew or MacPorts to install pip, whatever you normally would use.
3. If all else fails or you want the latest pip, the method which offers the greatest control is to download and run this file.
Locate it on disk, change to that directory and run it with:
python --user
This has two really important differences from the first two methods.
• This installs pip to a place in your user directory. Therefore it does not require sudo or admin privileges and will not interfere with system packages. On the other hand, it will not be on PATH unless you configured it that way, so typing pip might not find it. On *nix, you might have to type something like ~/.local/bin/pip until you add ~/.local/bin to your user PATH by modifying ~/.profile. On Windows, you might have to set a User Environment Variable via Control Panel.
• The installed pip will manage packages for the python that was used to run Running python will install a pip which looks after the packages used by python. But running python3.4 --user would install a pip command which looked after the packages used by that python3.4.
I would personally not recommend sudo python or the equivalent, as it could mess with your system’s Python stuff and confuse you with different pip executables all over the place. But it can work OK and it’s probably your computer to mess up, right?
In any case, don’t be scared of installing pip. It’s just a matter of going down these options in order. If one method doesn’t work, another one will soon.
Installing a package for one user
To install a package just for yourself,
pip install --user example
The actual package files are put somewhere under your home directory, which means you don’t need special privileges like sudo, and also doesn’t interfere with system packages, but it still works mostly like you installed those packages globally.
This is especially useful if there are certain Python-based command line tools you run interactively and always want to have available, like flake8, pylint, etc. Try installing these with pip install --user instead of using OS packages; it lets you upgrade things whenever you want, the system doesn’t mess with your stuff as much and you don’t mess with the system’s stuff as much.
But if you are installing packages as dependencies of a Python project you are working on, those should normally be installed inside a virtualenv.
What pip can’t install
The vast majority of Python packages can easily be installed with pip. But there are a few kinds of package which can cause problems requiring other techniques.
• Some packages are simply broken as written, whether due to age or a mistake. Nothing can install these, the code has to be fixed. Don’t assume that it’s pip’s fault when a package fails to install.
• Some packages have C code that you can’t easily get to compile. Find an OS package or installer, or follow provided documentation. On Linux, for example, distro package repositories provide OS-native packages for harder-to-compile libraries like numpy. On Windows, look at these prebuilt EXE installers for common Python modules. If you can’t find an installer, the project may provide documentation which you can follow to get the project built. Otherwise, that’s a bug.
• Perhaps you are a more advanced user deploying an application, and you need to deploy precompiled binaries to speed up package installations or keep build tools off of the machines you are deploying to. This is coming in the form of wheels, but it isn’t totally done yet, and maybe it isn’t what you want to use anyway. Check out Hynek Schlawack’s article on building your own OS-native packages. This is an app deployment strategy which uses virtualenv and pip together with OS packaging tools; you don’t have to go through this for every package you want to develop with.
• Sometimes you have no choice but to use an old package only distributed as an .egg file. pip does not use those, only easy_install does. See if it’s provided in another form, find something else to use, or if you’re really forced to, you can use easy_install for just that package.
A broken, archaic, manually intensive or poorly-documented install process tends to indicate lack of robustness in other areas as well. In the truly exceptional situations where a working package simply cannot install with pip, I would personally recommend finding an alternative which is actively maintained.
The future for Python binary packages is wheel (accepted as a Python standard in PEP 427). pip can already install wheels, if you really need them. But if you are just starting, it is not likely you will need to use wheels yet, and at this writing they still aren’t able to package binaries for Linux effectively..
Finding Packages
Once you know how to install packages easily, you can have a lot of fun, save a lot of time, and do things better by using Python libraries that other people made (rather than reinventing every wheel). If something isn’t in the Python standard library, then search for it on PyPI. PyPI is the main place people put Python code which they want others to use, and it is the default place that pip installs from.
|
Monday, April 30, 2012
Massively multi-player game is effectively a supercomputer.
Ponders the fact that all the computers in a massively multi-player game is effectively one of the largest super computers in the world; wonders how much work could be offloaded from the servers to the clients. Make all the clients use a bittorrent like protocols to download updates and textures between machines on closer networks.
Sunday, April 29, 2012
Data Processing Pattern.
I've done a lot of data processing over the years and have come to the following understanding of how data processing words at a general level. This concept is what I am planning on using for several batch and message processing projects I wish to create.
Data level
Data can come from many sources. The program has to open a file, a database connection, a serial port, a network port, or other device and begin reading in a stream of data. At this level the data is an almost meaningless stream of single bytes.
Format level
These bytes are organized in a specific pattern known as a format. There are many different formats that the data can be organized around.
Fixed length. Each field can be in a strict order, each with a fixed length, so that each record you read will be the sum of those fixed fields. Typically there will be a special byte with an end of line significance, typically a newline or a carriage return, but with this format the record separator is optional. This is how the IP and TCP headers come in a data packet at layers 4 and 5. Each byte and even each bit can have a specific positional meaning. If you look at a set of data and you can set it to be 80 columns wide in a text editor and suddenly you see beginning of last names all line up right down the page at column 20, each name followed by spaces until another column starts all lined up at column 32.
Delimited. Each field is followed by a delimiter, typically a comma or a tab and there is an end of record marker that separates each record from each other, typically a newline or a carriage return as with some of the fixed length format above. Typically the fields do still have a maximum length, or range of values, but this is not visible from the format itself. Typically you can spot this format by seeing the commas or the tabs in the data, typically every record will have a fixed count of commas or tabs in every record.
Mixed. A message, or record, can be a combination of the above. The fields can mostly be delimited with commas or tabs, but have a few fields whose contents have a fixed. HL7 is an example of a mixed format.
Grammar. This used to be much more difficult than it is now. Typically this means they used XML now. In the past people would create many different formats for data that was contextual in nature. If you are trying to parse text that comes from a command line, or a language like English, or a program file written in C or Java, then your parser will have to understand that combination of positional text whose meaning is determined by the initial state and the order of the commands.
Conceptual Layer
At this point you have read in the stream of bytes, given groups of those bytes meaning and stored the data into a record or other data object in your program. A reference to this data can be passed around to represent that stored set of meaning.
Translation and Routing
Often the data you received has fields in the wrong order, or you have a set of numbers from 1-5 that actually represents a user name. This layer will take the incoming data and create a new record in the new format, transferring and transforming the data from one data object to the other. Or an xml file you parsed has a 100 records that need to be pulled out of the object and 100 individual records sent to the next layer. So this layer would have a loop that lets you get one data value and create as many objects as you need. A single message might be split into multiple outbound messages.
Data Store
The data coming out of the translation layer will need to be mapped to a set of outbound data objects. One stream might go one direction, while another set of messages goes to another table. This operation has to be tied to a database transaction, so that either all the data is applied to the database, or none of it is. Or you can have an exception log that others have to check and correct later.
Data View
In order to see this data you can map a view onto one or more data objects and see records in the data view. The data view can represent the underlying data objects in many ways. It also only has to retrieve what it needs to fill the current set of records in the view, so a dataview for a million element database might only have to load in the first 10 elements. This data view could even be aliased across to another computer and still only has to cache a little data to represent many records.
The 7 layers of the OSI Network Model
How to layout project files for multi platform/target code bases.
There are often many ways to look at how to build and manage the project files, as well as the output from the project, the intermediary and release files. It is better to keep the intermediaries out of the source tree, to keep it clean and small. You can accidentally check in files that should not be included if you are not careful. Best to keep them out of the tree altogether. Then there is the actual output from your work; the libraries, modules and programs you wish to release. If these are in their own folder organized how they need to be then you can just zip or tar.bz2 them up easily. You can even add a target level at that point and use a cross complier to release for many platforms at one go. You may also need to add in a special build for code that uses the compiler to build a special version of There are three levels of indirection that apply to the hard set calculations of where the path goes. Level 1 is: where does the project go when you save out a new one you create? Level 2 is: where is the project file in relation to the root of the project file? IE... where is the source code? Level 3 is: where do my intermediate and builds go in relation to the project root? /Builds /Targets /Debug /Release /Clang /Intermediates /Targets /Debug /Release /Clang /MainProject-SDK /LoadableModules/ProjectRoot /platform /os /buildsystem /target /ProjectFile Where target is removed if a certain os only has a single target ever.
Simple ipv4 dot notation parser I wrote once.
ip.c an ipv4 dot notation parser.
This is a routine designed to parse the ipv4 dot notation.
Given a string with a dot notation value between and
make sure this is a valid string of that format.
static char ** string;
char * str;
int value = 0;
if (*string && isdigit(*string[0])){
value = value*10+*string[0]-'0';
str = *string;
string = &str;
str = *string;
string = &str;
str = *string;
string = &str;
} else {
return 0;
if (value < 256)
return 1;
return 0;
if (*string && *string[0] == '.') {
str = *string;
string = &str;
return 1;
} else
return 0;
if (*string && *string[0] == 0)
return 1;
return 0;
parseDotNotationV4 (char * stringtoparse){
string = &stringtoparse;
if (parseNum()){
if (parseDot()){
if (parseNum()){
if (parseDot()){
if (parseNum()){
if (parseDot()){
if (parseNum()){
if (endOfString()){
// Good dot notation value
return 1;
// failure
return 0;
printfParseDotNotationV4(char * string){
int returnVal = parseDotNotationV4(string);
printf("%s %d\n", string, returnVal);
return returnVal;
int main (){
int i,j,k,l;
char string[1024];
for(i=0; i<256; i=i+4){
for(j=0; j<256; j=j+4){
for(k=0; k<256; k=k+4){
for(l=0; l<256; l=l+4){
sprintf(string, "%d.%d.%d.%d", i, j, k, l);
if (!parseDotNotationV4(string))
printf("%d failed when it should have been
valid.", string);
return 0;
Saturday, April 28, 2012
How I used Linux as a Multi Line Fax Server for a Pharmacy Order System
Summer of 1995.
My boss came to me and said "Jim, I need a fax machine in our new out-of-state office that can refax the orders to us here at the main office."
I promised that I would look into the possibilities immediately. I started by calling my main parts vendor but was unable to find anything at the time for either Windows 95 or Windows NT that was a multi-line fax server and could also refax the received faxes to our main office.
I had been using a small utility with my home Linux system and had configured efax to work with one modem line. Sure enough the main controlling program was just a shell script and was extremely well documented with comments. In fact there were more lines of comments than of code.
After messing around that night faxing things back and forth from my home and the office I decided that efax could do the job. I went to my boss and told him that there were no commercial products that would do what he wanted, but that I had found a solution that would work. What he wanted to do was a minor problem with UNIX because controlling banks of serial devices is one of the reasons that UNIX was written by AT&T in the first place.
He was hesitant to go with a UNIX solution until I assured him that a company called Caldera was working with Novell to provide a UNIX operating system that would run on regular IBM compatible hardware and be interoperate with our network. He gave me the go ahead.
Since the system was going to be in an other state I decided to go with new, powerful equipment so as to have as few problems as possible. I got the quotes that I needed and ordered a copy of Caldera 1.0, 100 MHz Pentium, 16 MB RAM, 1.2 GB HD, mini tower case, NE2000 combo network card, 4x EIDE CR-ROM player, 8 port ISA Cyclades serial board with octopus cables, 4 USR Sportster 14.4 external modems, and an HP 5 laser printer. The grand total came up to about $2000.00.
All the parts came in by the second day and I assembled the hardware in a few minutes. I then placed the Caldera CD-ROM in the player and the boot disk in the floppy drive and quickly ran through the setup to have an operational OS in less than 10 minutes. This was the first time that I had ever used Redhat and I haven't used anything else since then for any full installs.
The system didn't recognize the Cyclades serial card. No problem, I was an old hand at reconfiguring and installing the kernel. Still didn't recognize the Cyclades serial card. I double check everything that I had done and it was correct. I called Cyclades technical support and they knew exactly what was wrong and directed me to a patch on the internet. I got the patch and had full instructions. I applied the patch, setup the /etc/rc.d/rc.serial file to recognize the new ports, created the new devices in the /dev directory with a supplied script and remade the kernel.
With problems I had the entire system operational inside of two hours. It even installed Samba print and file server and the Apache web server and they were running with no configuration on my part.
Now came the tough part. I copied the /usr/bin/fax script to /usr/bin/faxa. Then I modified the /usr/bin/faxa script as follows:
I changed the
I changed the
NAME="name of our company"
I corrected the phone number to report the phone number that it was going to answer at. I also fixed the log name and received fax names to give each a unique name by prepending an 'a' to these names.
Then I made sure that /usr/bin/faxa worked in that it would answer the line receive the fax, print the fax locally, retransmit the fax to our bank of fax machines in the office and then move this file to a done directory.
Finally I copied /usr/bin/faxa to /usr/bin/faxb, /usr/bin/faxc and /usr/bin/faxd and corrected each of these new files so that DEV= ttyS1, ttyS2 and ttyS3 respectively. They each prepended the log file name and received fax file names with 'b', 'c' and 'd' respectively.
I spent the next two days testing the system to ensure that it would work without any hardware or software problems. The following day I made the 3 hour drive and installed the system. I had to modify the print portion of the /usr/bin/fax[a|b|c|d] scripts in order to fix a glitch in the information that was being sent to the system from some old fax machines. The efax machine was rescaling the faxes so that one page faxed would fit on one printed page. We were getting a postage stamp printed page in the upper left corner with a long thin horizontal line clear across the page. I modified the faxa, faxb, faxc and faxd scripts to trim the page to 8.5x11 and cleared up the problem.
In less that a week I had researched, developed and implemented a multi-line fax server. I never saw the utilization go below 85% on that box and there was always plenty of free memory. And the thing that amazed me is that we were only scratching the surface of the power that having a Linux system could provide.
The system worked with only a few minor user glitches during the next nine months that I worked at that company. Once the phone lines became messed up. The users forgot to put paper in the printer upon occasion or didn't change the toner until two days after the printer ran out. "Oh, you mean it's _supposed_ to have stuff printed on the page?"
Even a complete unexpected power down would only cause the system to come back online reprint and refax what it hadn't moved to the done directory and then continue on answering the fax lines. Please note that this is the default behavior of the operating system and efax, I didn't have to do anything special to get this robustness.
Next I tell you how I automated putting the received faxes into a web server.
Lua scripting language in nmap overview.
Nmap, wireshark, and other programs use Lua as a scripting language to enable users to extend the functionality of the program. Seems that Lua is very popular in security programs. As popular as Tcl in the hospital environment.
This is the nmap scripting chapter from the nmap book;
From the link:
Here is a link to a pdf that discusses extending both nmap and wireshark:
This is a video presentation of the lua interface in nmap by David Fifield:
The Nmap scripting engine
David had been the maintainer of the scripting engine for two years when that video was made.
And "Mastering The Nmap Scripting Engine (Blackhat 2010)" Video:
Learning the Lua Language
This is a general tutorial for the language:
From the link:
This tutorial is aimed at all newcomers to the language Lua. We start off with where to find relevant introductory material and then progress to using the language with tutorials in the TutorialDirectory. The style is directed at newcomers to scripting languages, as well as newcomers to Lua. Common uses of Lua are:
• A configuration language for applications.
• A standalone scripting language.
• An embedded language in applications to modify runtime behavior.
There is a link from the above overview to a list of very good, detailed tutorials here:
You can also do functional programming in Lua using lisp like structures
And is one of the few languages to support the power of closures:
The complete language reference is available from here:
And that Lua language book is available from the languages main web site:
Clang static analyzer.
From the website:
Clang Static Analyzer
The Clang Static Analyzer is source code analysis tool that find bugs in C and Objective-C programs.
Currently it can be run either as a standalone tool or within Xcode. The standalone tool is invoked from the command-line, and is intended to be run in tandem with a build of a codebase.
What is Static Analysis?
Static analysis bug-finding tools have evolved over the last several decades from basic syntactic checkers to those that find deep bugs by reasoning about the semantics of code. The goal of the Clang Static Analyzer is to provide a industrial-quality static analysis framework for analyzing C and Objective-C programs that is freely available, extensible, and has a high quality of implementation.
This means that this is an open source program that is designed to analyze code without running the code. Clang reads the source code of the program you are working with in order to tell you what problems the rule set finds in the code.
Several open source projects are interested in using Clang to make their code base better. In my opinion, Clang is only part of an overall solution that includes unit testing of interfaces combined with high level integration testing of the overall released project. But it is better than no testing at all.
Since the primary target for Clang is OSX I have to download and follow the instructions here: For other platforms, such as my Ubuntu system the web site lead me to this page:
I followed those directions and got an executable to begin testing against source code after just a few hours.
I did have to do a
sudo make install
in both the llvm and build directories. It installed everything in
Once everything is working you build your project with
scan-build make
This does the build by replacing the normal compiler with a special compiler that both compiles and analyzes the code. At the end of the run
My plan is to get clang all build and begin testing against a few small projects to see what it says, then scale up to complete open source projects.
The page recommends that the build be done in debug mode with assertions enabled to help control the way the program is analyzed.
I had to use the command:
/usr/local/bin/scan-build .configure
/usr/local/bin/scan-build -v -V make
in order to make everything work correctly with the way I had installed the software.
It took hours to build nmap using this method.
Almost immediately I got this error: warning: Value stored to 'num_host_exp_groups' is never read
num_host_exp_groups = 0;
which would not be found by the normal checks, because it was used before this point.
2041 /* Free host expressions */
2042 for(i=0; i < num_host_exp_groups; i++)
2043 free(host_exp_group[i]);
2044 num_host_exp_groups = 0;
2045 free(host_exp_group);
Line 2044 really has no effect because it doesn't actually do anything that has an effect.
This is the output from the error report:
Then it took about 10-20 minutes to check each of the rest of the files.
The second thing it found was:
Which was in
It is a little scary that it appears that the buflen is checked only after writing to the buffer. warning: Value stored to 'state' is never read
state = 0;
^ ~ warning: Value stored to 'foundgood' is never read
foundgood = true;
^ ~~~~ warning: Value stored to 'foundgood' is never read
foundgood = true;
^ ~~~~ warning: Value stored to 'seq_stddev' is never read
seq_stddev = 0;
It will even sort a few fields.
I cleared out all the .o instead of just nmap's .o and found this bug:
linear.cpp:1092:9: warning: ‘loss_old’ may be used uninitialized in this function
linear.cpp:1090:9: warning: ‘Gnorm1_init’ may be used uninitialized in this function
linear.cpp:1376:9: warning: ‘Gnorm1_init’ may be used uninitialized in this function
linear.cpp:1805:15: warning: Call to 'malloc' has an allocation size of 0 bytes
int *start = Malloc(int,nr_class);
linear.cpp:21:32: note: expanded from macro 'Malloc'
#define Malloc(type,n) (type *)malloc((n)*sizeof(type))
linear.cpp:2000:30: warning: Assigned value is garbage or undefined
model_->w[j*nr_class+i] = w[j];
^ ~~~~
This one actually seems more serious, if true.
evidently nr_class is 0 there which causes malloc to allocate no bytes to "start".
I set the -k option to keep going, and am letting everything run for as long as it needs to run.
About 6 hours later I checked and it had finished up. The reports are very complete:
This is an example of one of the errors, but as you can see the NULL does appear to be checked in the previous. The documentation talks about using asserts to remove some of these errors in a debug build.
Overall this does look like an interesting additional tool to use in addition to other tools.
Because it makes a copy of the file for each bug report, because the paths to the failed branches it makes a copy of a file for each bug report.
The compressed size of the reports was 3.7 MB, and the uncompressed size was 47 MB.
Friday, April 27, 2012
Learning nmap
Original document from 1997 that describes why nmap was created:
The Art of Port Scanning - by Fyodor
The above article is interesting because it illustrates some of the philosophical underpinnings of the innocuous network scanning tool and the background of where the tool came from.
Then the main web site documentation is available here:
Which goes into detail on how to use the tools and what the options are.
A good tutorial can be found here:
This documentation needs to be a _little_ more fleshed out. I looked at a bug someone posted with output from the --packet-trace option whose output looks similar to this:
SENT (0.1281s) TCP > S ttl=59 id=23310 iplen=44 seq=3166348013 win=1024 <mss 1460>
RCVD (0.1440s) TCP > R ttl=53 id=0 iplen=40 seq=3166348013 win=0
And I could find nowhere an explanation of what the fields were representing. I know a little about tcp/ip, so I know that ttl stands for time to live, iplen is the length of the ip packet, and sequence is the packet sequence number that is assigned to every packet by the sender of the packet. However I am not positive what is meant by id, win, or what the letters 'R', 'S', and 'A' represent.
If you are going to be doing much development on the software then you need to download the software and begin reading the code.
Instructions for getting and compiling the code is here:
For me on an Ubuntu box it is as simple as this:
svn co
cd nmap
I actually just downloaded the source tarball for the current and development versions and did the .configure;make on them and they compiled just fine. The tarballs for source and compiled versions are available here: source is second section down.
If you are not part of the core team then you can't check changes back into the main branch. The changes you make will just be for your own use. If you would like you could post diffs to the main dev mailing lists for discussion and inclusion to the main code base. This nmap dev mailing list archive is here: And you can subscribe to the list here:
And even if you were part of the core team it would probably be bad to check things in directly to the main branch without extensive testing and having things reviewed by others.
I am still in process of creating a branch to work in the main repository. If I remember correctly creating a branch in svn is the same as making a low cost copy internally to a new location inside the svn database. Which should be a command similar to this:
svn copy SRC DST
Still working out exactly what the SRC and DST parts will be. I'm thinking it will be this:
svn mkdir
svn copy -m "branching for username gsoc work"
and then I need to do a check out this way:
svn co
I had a little scare when I created the svn directory, it defaulted to the user name on my system, I hit return and it then asked for username and password which it seems to have cached for that host, which is nice. I had to install autoconf to get the compile to work as well.
A little page of basic svn commands is helpful:
I am a little rusty on my source code patchs.. reading this to get re-familiarized:
and of course man diff and man patch are your friends.
Frequently Asked Questions About Ports In The Internet Protocol.
I wrote this in the 90's to help a few team mates understand how the Internet worked. It is very basic.
Everything you ever wanted to know about ports but were afraid to ask.
TCP is a network protocol, built on top of IP, that guarantees reliable delivery of data across the network.
In order for two processes to communicate using TCP/IP they must perform the following steps:
The server creates a tcp socket.
The server binds a local address and port number to that socket.
The server then listens for a connection on the socket
The client creates a tcp socket.
The client then connects to a server on a port. (The client port is chosen at random.)
The server accepts the connection and the socket on the client and server are now called 'fully specified sockets'
Fully specified sockets are those that form a set of five values:
Server Port Protocol Client Port 32123 tcp 65030
These values form a unique combination that exactly match this and only this connect on the entire Internet.
Known ports are considered to be those ports where a server can accept multiple connections from many clients. Telnet has a know port of 23. Any server which accepts multiple connections on a single port is considered to have a known port, because this is the port that is known by all its clients.
Two telnet sessions from a client to the server would look like this:
Server Port Protocol Client Port 23 tcp 41049 23 tcp 41071
Note that even though the telnet server has accepted two connections on port 23 that each client was randomly given a different port number and this slight difference is all that is needed to uniquely differentiate the two connections from each other.
This is not to be confused with the /etc/services file which reflect those ports which are assigned by the Internet Assigned Numbers Authority. Many of these ports are know ports, but that because they accept multiple connections on a single port, not because they are in the services file.
Cloverleaf doesn't use a known port to accept connections. Each process that wants to connect to a tcp/ip port on cloverleaf will get it's own port. Adding to the complexity is the fact that Cloverleaf has a production, test and training environment. The number of interfaces that we have will only grow with time. In order to manage this complexity we need the flexibility to assign port numbers on the cloverleaf servers in a logical manner that is maintainable and ensures that we can quickly and easily troubleshoot any networking problems.
Ports are only bound to particular socket on the server. So it is perfectly acceptable for a port to be used for one purpose on an application server and for an entirely different purpose on another server, such as the interface server. In fact, restricting the use of a port on a machine, for a service that the machine will never provide is counter productive. In just a few years we would run out of blocks of numbers that we are allowed to use. Such a network wide restriction on ports would not be enforceable and would not be maintainable.
We are perfectly willing to fully publish our entire port number specification as a network reachable document on the novell server.
Thursday, April 26, 2012
Evolution Report
There are thousands of mythologies that explain how life was created and got onto the earth. Just about every group of people that ever lived made up some explanation about the creation of life. Because their memory of history only extended back to the memory of the oldest living person in the tribe, they had no perspective on how the Earth had changed on vastly longer time scales. Memory can only last as long as someone remembers the story. And as anyone knows that has ever played a game of telephone, the story grows in the telling. The big points stay similar, but the details are filled in.
These creation stories were comforting for the people who shared them. But as the dark ages ended Europeans began to chart the course of the stars in the heavens, systematically dig into the earth, began to explore the world on ships, and most importantly of all, began to methodically record the information they were finding, and sharing this information with others. The information they were finding didn't match the creation myths to this point. Instead of the Earth being thousands of years old, life was millions of years old, and then billions of years old. Instead of the Earth being the center of the universe, the Earth circled around the Sun, and it wasn't even the biggest planet.
This new evidence completely disproved all the ancient myths. The old ways of thinking were so entrenched that anyone who disagreed with them was stoned or burned to death. A new more systematic way of asking questions about everything was developed called “The Scientific Method.” This allowed people to ask questions about the universe and experiment to see if the question was true or not. Instead of taking things on faith this new method required people to repeat the experiment before they accepted the theory as true. And new theories could be presented to refine or replace older theories, without anyone being burned to death.
Many theories were proposed that explained bits and pieces of the theory of life. One theory took precedence over all the rest. A man named Darwin took a voyage on a ship and studied a group of islands with an amazing diversity of life. He noticed many patterns and over the course of years he worked on a book. Another man named Wallace independently came up with nearly identical theories to Darwin. So Darwin was forced to abandon work on his masterwork book and immediately publish a pamphlet called, “On the Origin of Species.”
It took decades of experiments to prove this controversial work to be correct. A combination of the study of fossils and looking at living species. Over the years since then the theory has been refined, but never disproven.
The way evolution works is that living populations have environmental pressures. Their offspring will either be fit to survive in that environment or not. Because there are limited resources the offspring that can get the most resources and have the most offspring will have the most descendants, crowding out the less fit. This pressure from other species and your own species is a form of environmental pressure as well.
It is important to realize that individuals in a population do not evolve. The offspring of a pairing can have a lot of different combinations of genes, which make them more or less fit. Sometimes there is an error when the DNA is duplicated. Most of the time this causes the offspring to be completely unfit. But the mutation can result in an individual that is more fit for the environment it finds itself in.
The pressures of all the species in an area all evolving together is called macro-evolution. When one species becomes more fit for the environment it puts more pressure on the other species competing for the same resources.
A new species forms when individuals from the same species stop breeding together, either because of behavior changes, or because of geographic separation. At some point in the future the small changes accumulate or the number of genes changes and makes it impossible for the individuals to breed together anymore.
We talked about theories about how life evolves, but where did life originally come from? Nobody knows for sure, and it is impossible to prove one way or another. The most popular theory is that the early atmosphere rained out organic compounds into the early seas and ponds. Then primitive replicating molecules began duplicating. Eventually a cell wall was formed by mistake, this became the primary cell that out competed all the existing self replicating molecules.
This cell replicated itself and mutations caused it to fit into every available ecological niches. Cells began to invade other cells in parasitic relationships. Eventually these relationships became symbiotic and beneficial to both cells. This happened several times; once with mitochondria, a second time with the nucleus replacing previous, and a third time with chloroplasts. This increase in complexity allowed the development of multi-cellular life. This multi-cellular life got washed up onto land during high tide, became adapted for land bit by bit, and then spread from the shore inland.
If you look at all the stellar systems in our galaxy, and all the galaxies in the sky, the odds that life evolved on more than just one planet is almost a certainty. Even if you say that only 1 in a million suns has a planet in the right place, and 1 in a million of those planets develop life, that still leaves millions of places that life could develop. And life may just be completely adaptable so that it can form in conditions well beyond what we expect, including in interstellar space far from any sun. We have found life on Earth in ice fields, miles deep in the earth, miles deep under the ocean around volcanic vents, in hot springs, and even in nuclear reactors. It may be possible that the first life on Earth came from the comets that rained down onto the forming planet.
Describe how you have reacted to a failure.
30 minutes to write this for the class final.
The difference between the wise man and the fool is not that the wise man succeeds at everything on the first try. The difference is that the wise man only sees someone fail that particular way one time.
As a computer programmer I was often called upon to code solutions to problems that nobody at that company had dealt with before. Failure had to be factored into every project, and a solution to each failure found before the scheduled deadline. You couldn’t just look up the answer and implemented it. You first had to figure out exactly what the question was, because often the person asking for something wasn’t very specific about what they wanted. This was called a functional specification and is a negotiation between everything that someone could possibly want, and what was technically feasible to implement in the limited time with the limited resources available.
Only once you knew exactly what someone was asking for could you write up a technical specification about how you would implement a solution given the limitations of your computing environment. After 3-4 weeks you would have a good idea of the question and a solution to the problem and it was time to attempt to implement the solution.
Often this is where programmers like me would come into the project. We would be handed the functional and technical specifications and told we had 4 weeks to implement the code. We were told that this would be our number one priority, along with the dozen other number one priorities we also had at the same time.
Often I would bring up the project at team meetings and get input from everyone there about how they would like the project to be implemented. I would give my ideas on their projects as well. Once I had an idea of how to implement the code I would break the code up into interfaces and code each piece. If more than one programmer was working on the project we would each work behind one of these interfaces and if we did our piece correctly the code would just match up and run in a couple of weeks.
Now, we programmers expect to write the code completely wrong, so at each interface we would first spend a couple of hours writing the interface and a test harness to test the code. The more time we put into this, the more robust the interface would be later.
Then we would implement the code behind the interface, in a fill in the blank way. It was a cycle. Write code, test it, see how complete and functional it is, repeat. At this point it is common to run into problems, figure out a solution, and have to go back and amend the technical and functional specifications. Sometimes the project is made longer to fix the problem. Sometimes the project is broken into a phase I and II. Sometimes everything goes right and you make the deadline with functional code that actually works.
You then go into testing. Quality assurance gets the code and the specifications and tests everything. We developers would get bug reports and fix the problems, rolling out new releases to test.
At the end of the project we always won, despite having numerous failures along the way. Any system that doesn’t implement feedback to correct failure is a broken system. Failure is part and parcel of life. The only failure that counts is the failure that isn’t corrected.
Wednesday, April 25, 2012
Creating Linux USB startup drives
One of the things I had to do with the netbook when I installed easy peasy ubuntu onto it, was to create a startup disk that ran from a USB port. Here is a tutorial on how to create a boot thumb drive of nearly any Linux install disks.
How to Forge - Creating USB startup disks from various linux distributions with unetbootin
Mini travel trailer for van.
I am building a mini travel trailer to pull behind my van.
The reason I am doing this is to be able to camp and travel in comfort and style. If I get a short term job some place I want to be able to come in and work right away. I may also homestead a small plot of land with the trailer.
I wanted the trailer to be just wide enough so that a full sized futon would fit in the front of the van. It should have enough room to store clothing for 2 people, Have a shower, a toilet and a kitchen. It should provide enough power to heat the water, heat the interior, power a fridge, led interior lights, a small tv and a laptop computer. It should also be able to charge up a battery to run a drill or a cutter.
I had never built anything of this scale before. So everything was new to me.
At first I was aiming to build a 2000 pound trailer, but the cost for the 3500 pound parts were just a little more and even if my trailer only weighted 2000 pounds that would add a large safety margin into the equation.
I got 3 twelve foot and three eight foot sections of 2x2x1/4 angle iron. This was around $150. I only had three small pieces of waste metal when I was finished.
I laid out two of the 12 foot pieces as side rails and two of the eight foot pieces as end rails. I got 4 buckets all the same size to work on. The side rails went on the buckets. I clamped the end rails under the side rails. The axle was lifted onto the side rails and the width of the end rails adjusted to 61 inches on the outside, so that the spring mounts were just inside the frame.
Everthing was tack welded and then the frame was squared by measuring both diagonal directions. The frame was welded together by my step dad.
The front spring shackles were put on just past the mid point to lean some of the weight of the trailer onto the hitch. The rear spring shackle was put back 25 inches from the front shackle so that the swing arms just broke past the halfway point. The frame and shackles were drilled for grade 5 3/8 inch bolts.
The front A frame was welded to the receiver. It was positioned equally on each side so that it made two triangles on the front corner.
The frame was primered and painted with rustolium spray paint.
Top Deck.
My first plan was to build the deck on top of 2x4 framing inside the angle iron, but this puts the deck up 3 1/2 inches higher than it needs to be.
So the plan now is to build inside the angle iron frame and go under it with 2x4's in 3 places to bring the weight back onto the trailer frame.
Database Design - homework
1. The four steps of database design are discovery phase, plan the tables, normalize, and test the database using sample data.
1. Data duplication is entering two or more records in the database about the same entity with a slight variation. You have to delete or merge duplicate records by hand. Data redundancy is the same data in the database repeatedly. You remove this redundancy by normalizing the database. The reason you want to try to only store data a minimum number of times is to assist in keeping the data up to date and consistent.
1. Scope creep is when new features and requirements are added to a project after the project has begun.
2. When you are assigning a data type and size to a field you have to know the storage requirements for that field. You need to know the size and range of data will be stored in the field.
1. Text fields store 255 characters and are used for a short collection of text, codes such as phone numbers, email addresses, and zip codes . Memo fields store up to 1GB of data and display up to 64,000 characters and are used for formated text, and to accumulate logs in append mode.
2. Currency fields are number fields with a currency sign in front of them. Currency fields also default to 2 decimal places.
3. You should never store calculated fields in your database. For instance, if you know someone is 32 years old, you don't store their age, you store their date of birth. That way you can generate a report now or 5 years from now that includes the age of that person and it will be correct in both cases without having to go in to the database annually and recalculate that persons age.
4. When you have a field in a form that has a small set of non changing possible values you create a drop down box to allow people to quickly set the value in that field. This prevents things like someone entering a state name that doesn't exist. You could have drop downs for ice cream at an ice cream shop or for picking the name of someone to assign a bug to in a bug tracking database.
5. What are the three general rules about naming objects in a database? Names have to be less than 64 characters, but should be less than this. Names cannot include a period, exclamation point, accent grave, or brackets. Names cannot include spaces.
6. The four main database objects are Tables, Queries, Forms, and Reports. Tables hold data, queries ask questions about the data, forms allow you to enter and display data and to act as a switchboard to your program, and reports allow you to retrieve and format data from the database in an attractive way.
7. Select, Action and Crosstab queries are the three types. Select queries ask questions about the data in the tables in the database and display a dataset. Action queries change the data in the database. Crosstab queries calculate data from a table and display it in a dataset.
8. Redundant data entry, Error prone and difficult to update when information changes. If the information does change and you don't change all the occurrences then you have introduced data inconsistencies to the data.
9. A primary key is a field or set of fields that uniquely identifies a record. If this key is included in another table it is called a foreign key. By linking tables together this way you create a relation between the tables that links the records in one table to the records in another table.
10. A is one to many. Any one customer will have one or more orders. B is one to one. States only have a single capital. C is many to many. There are many college students in a class and each of the students take multiple classes.
11. Entity integrity is done by using a primary key, which requires that there be only one record in the database with that key and that key is not null. Referential integrity is when the value in the foreign keys in a table match the table where they are primary keys. Yes, you should enforce referential integrity in a database so that you don't get records with values that don't relate to the other tables correctly.
12. Deletion anomalies occur when you delete a record and the cascading delete removes data from related tables because that was the records last matching record set. Update anomalies occur when there is duplicate data in the database and an update only changes some of the data. Insertion anomalies occur when you can't insert a record into a table unless you enter data into another table first.
13. Normalizing databases result in a smaller database, reduces the occurrence of inconsistencies and reduces the occurrence of all three types of anomalies. The first normal form reduces repeating groups. The second normal form removes functional dependencies. The third normal form requires that every field in a record be at least partially determinant on the key.
14. A determinant is a field, or set of fields whose value determines the value in another field. A partial determinant is where the value depends on a subset of a key. A transitive dependency is related to another field that has a partial or full determinant dependency.
Tuesday, April 24, 2012
5‐Paragraph Essay
5‐Paragraph Essay
This document gives a general overview of the 5 paragraph essay. It is as brief as possible and should be used in conjunction with several specific good and bad examples in order to teach how to use this tool to improve writing techniques.
1. Introduction (with thesis statement)
2. Body Paragraph #1 (with topic sentence)
3. Body Paragraph #2 (with topic sentence)
4. Body Paragraph #3 (with topic sentence)
5. Conclusion
• Is the first paragraph of your essay.
• Introduces your topic to your reader.
• Tells the reader exactly what the rest of the essay is about.
• Concludes with a clear, strong thesis statement.
Body Paragraph #1
• Open with first topic sentence.
• Corresponds to the first point in the essay map.
Body Paragraph #2
• Open with second topic sentence.
• Corresponds to the second point in the essay map.
Body Paragraph #3
• Open with third topic sentence.
• Corresponds to the third point in the essay map.
• In your conclusion, reflect on the main points you made in the paper.
• Highlight the most important information.
• Do not introduce new points.
• Do not simply re‐state your thesis statement and/or the main points from the essay.
• Leave your reader with something interesting to think about.
What is a Thesis Statement?
• A single, clear, concise sentence.
• The final sentence of the introduction.
• Contains the topic of your essay, and your opinion on the topic.
• It often includes an “essay map” that lists the three main points you plan to make in the paper.
What is a Topic Sentence?
• A topic sentence is a single sentence at the beginning of a paragraph that tells your reader what the paragraph is going to be about.
• A topic sentence is similar to the thesis statement, but it works only on the paragraph‐level, whereas the thesis statement covers the whole essay.
• Each topic sentence should directly reflect one of the points made in the thesis statement.
Body Paragraph
• Will focus on a single idea, reason, or example that supports your thesis.
• Discuss only one point per body paragraph.
• Begins with a clear topic sentence (a mini thesis that states the main idea of the paragraph)
• Has as much discussion or explanation as is necessary to explain the point.
• Use details and specific examples to make your ideas clear and convincing
• Five lines minimum per paragraph.
• Connect your paragraphs to one another, especially the main body ones.
• Do not jump from one idea to the next.
• You need a transition between each paragraph.
Think about words and phrases that compare and contrast.
• Does first tell us a pro and the second a con? ("on the other hand . . .")
• Does second tell us something of greater significance? ("more importantly . . .")
Click here to see more suggestions for transition words.
General rules - mostly just for college writing, but may apply to more formal business writing.
• Do not use contractions.
• Do not use first-person pronouns such as "I" "me" "my."
• Do not use second-person pronouns such as "you" "your" "yours."
• Do not engage in personal stories, meaning stories of your own life experiences, or the experiences of friends, family, and so on.
• Do not begin sentences with conjunctions: but, and, or, nor, for, so, yet.
• Write sentences in the form of statements.
• Avoid any form of direct address to the reader, such as "think about the fact that . . ."
• Avoid too casual of a prose style, such as sentences that begin with words like "well, sure, now, yes, no."
• Do not use phrases such as, "a lot," "lots" or "lots of," which can usually be replaced with one of the following words: many, most, much, often.
• Do not use exclamation points, for they are almost always unnecessary!!!!!!!!!!!!!!!!
• Periods and commas should be inside of quotation marks, but other forms of punctuation go outside of quotation marks.
• Do not use the word "okay" when words like "acceptable" could be used instead.
• Do not use the word "nowdays," "nowadays," or any slight variation thereof.
• Various commands and scripts
I am mainly just posting this for my own use. A good place to place short scripts or commands that I figure out that are tricky to work out the first time. As time goes on this will grown.
Please add your own command line shortcuts and commands below in the comments.
To scan a page:
scanimage -d artec_eplus48u:libusb:001:008 -y 350 -x 216 --mode gray --resolution 300 > test.pnm
Create a movie from images:
mencoder "mf://*.JPG" -mf fps=10 -o test.avi -ovc lavc -lavcopts vcodec=msmpeg4v2:vbitrate=800 -vf crop=2000:1500:400:400,scale=720:-2
Transcode a movie from my Xacti to a smaller avi format that I can play:
mencoder ./SANY0121.MP4 -oac mp3lame -ovc lavc -o RollingDice.avi -vf scale=640:400
To scale to exactly half of 1080p do this scale:
mencoder ./SANY0002.MP4 -oac mp3lame -ovc lavc -o L.avi -vf scale=960:540
The above give very small files, but they have moving blocks in areas with low contrast. To give a very detailed picture at the cost of about 1.7 times the file size do this:
mencoder ./SANY0121.MP4 -oac mp3lame -ovc lavc -o TumblinDiceN.avi -vf scale=960:540 nr=2000 -lavcopts vcodec=mpeg4:mbd=1:vbitrate=2000
To download a bunch of similiar files from a website with the number only differing.
for i in `seq 0 9`; do for j in `seq 1 3`; do wget -c$j$i\_en.pdf; done; done
How to reduce a 25,000x25,000 tif file down to a manageable size.
2012 tifftopnm wac_nearside.tif | pnmscale .25 | pnmtojpeg > wac_nearside.jpg
2013 ls
2014 ls -altr
2015 tifftopnm wac_nearside.tif | pnmscale .5 | pnmtojpeg -quality=97 > wac_nearside.jpg
2016 tifftopnm wac_nearside.tif | pnmscale .5 | pnmtojpeg --quality=97 --smooth=10 > wac_nearside.jpg
2017 tifftopnm wac_nearside.tif | pnmsmooth -size 10 10 | pnmscale .5 | pnmtojpeg --quality=97 --smooth=10 > wac_nearside2.jpg
2018 tifftopnm wac_nearside.tif | pnmsmooth -size 10x10 | pnmscale .5 | pnmtojpeg --quality=97 --smooth=10 > wac_nearside2.jpg
2019 tifftopnm wac_nearside.tif | pnmsmooth -size 5 5 | pnmscale .5 | pnmtojpeg --quality=97 --smooth=10 > wac_nearside2.jpg
2020 tifftopnm wac_nearside.tif | pnmsmooth -size 9 9 | pnmscale .5 | pnmtojpeg --quality=97 --smooth=10 > wac_nearside2.jpg
2021 jpegtopnm wac_nearside2.jpg | pnmsmooth -size 9 9 | pnmscale .25 | pnmtojpeg --quality=97 --smooth=10 > wac_nearside3.jpg
2022 jpegtopnm wac_nearside3.jpg | pnmsmooth -size 9 9 | pnmscale .25 | pnmtojpeg --quality=97 --smooth=10 > wac_nearside4.jpg
2023 jpegtopnm wac_nearside3.jpg | pnmsmooth -size 9 9 | pnmscale .5 | pnmtojpeg --quality=97 --smooth=10 > wac_nearside4.jpg
2024 jpegtopnm wac_nearside3.jpg | pnmscale .5 | pnmtojpeg --quality=97 --smooth=2 > wac_nearside4.jpg
2025 jpegtopnm wac_nearside4.jpg | pnmscale .5 | pnmtojpeg --quality=97 --smooth=2 > wac_nearside5.jpg
How to clean out firefox to run faster:
cd ~/.mozilla/firefox/_your_profile_.default
for i in *.sqlite; do echo $i; echo "VACUUM;" | sqlite3 $i; done
Split a book into chapters, then convert the chapters to html files.
csplit -f Chapter_ -ks Schmitz\,\ James\ H.\ -\ The_Witches_of_Karres.txt '/^ Chapter/' {50}
rename 's/Chapter_([0-9][0-9])/Chapter_\1.txt/' *
find . -name "Chapter_*.txt" -exec ~/bin/ {} \;
Removing extra file url lines in text files, in place.
perl -pi.orig -e 's/^file:\/\/\/.*+//e' s
perl -pi.orig -e 's/^[ ]*+file:\/\/\/.*+//e' pb
perl -pi.orig -e 's/^[ ]{0,}file:\/\/\/.*+//e' pb
Sleep better, change screen to reddish tint at dusk and change back to normal at dawn.
./xflux -z 45715 -k 3000
how to back up disks/folders:
rsync -a -v --progress /media/Action/Action/* /media/SciFi/Action/
rsync -a --progress /media/truecrypt4/* /media/truecrypt1/
I set up rsnapshot to run and back up /etc/ /home/ /opt/ and /usr/local/ to /media/Comedy/rsnapshot
If Comedy isn't there I changed it to not create the root file system so it won't backup unless the usb drive is mounted.
had to set exceptions for a couple of files .gvfs because of a strange error and Downloads because it is just too huge and ever changing.
exclude /home/*/Downloads/
exclude /home/*/.gvfs
Compiling an SDL program:
gcc c4.c -I /usr/include/SDL -lSDL
if you get a strange error about a symbol not found, then the module is probablly a c++ program and you compile it like this:
gcc c4.c -I /usr/include/SDL -lSD++
Convert txt file into an epub:
ebook-convert "./Hitchhikers/Adams, Douglas - Hitchhiker's Trilogy 3 - Life, the Universe, and Everything.txt" "./Hitchhikers/Adams, Douglas - Hitchhiker's Trilogy 3 - Life, the Universe, and Everything.epub" --no-default-epub-cover --pretty-print --asciiize
328 find . -name "*.txt" -exec ~/bin/ "{}" \;
329 cd ..
330 ls
echo $1
path=`dirname "$1"`
name=`basename "$1" .txt`
echo "path $path"
echo "name $name"
echo ebook-convert \"$path/$name.txt\" \"`pwd`/$path/$name.epub\" --no-default-epub-cover --pretty-print --asciiize
ebook-convert "$path/$name.txt" "`pwd`/$path/$name.epub" --no-default-epub-cover --pretty-print --asciiize
Transcode a video file:
mencoder svd-tat720p.mkv -ni -ovc lavc -lavcopts vcodec=mpeg4:vbitrate=1200:keyint=120:vqmin=4:vqmax=24:autoaspect -oac mp3lame -vf scale=720:310,denoise3d -ffourcc DX50 -o svd-tat720p2.avi
Convert a pdf into image files:
759 gs -SDEVICE=jpeg -r100x100 -sPAPERSIZE=letter -sOutputFile=x/x%04d.jpg -dNOPAUSE -dBATCH -- "filename.pdf"
760 cd x/
761 mogrify -shave 70x10 *
762 mogrify -resize 70% *
763 cd ../filename.pdf_images/
764 mogrify -transpose *
765 mogrify -rotate -90 *
Extract image files from a pdf:
# Extracts image files from PDF files
# For more information see
mkdir ./"$1_images"
pdfimages -j "$1" ./"$1_images"/"$1"
exit 0
Write a text file out to a wav file:
espeak -v f2 -s 100 -f filename.txt -w filename.wav
Convert a wav file to an mp3
ffmpeg -i file.wav -acodec libmp3lame -ab 96k file.mp3
Mass renaming files on disk:
395 rename 's/\(2\)\.zip/.cbz/' *.zip
396 rename 's/\.zip/.cbz/' *.zip
397 rename 's/--#//' *.zip
398 rename 's/--\#//' *.zip
399 rename 's/* --\#*//' *.zip
400 rename 's/The Walking Dead --#//' *.zip
401 rename 's/The Walking Dead --#/The Walking Dead /' *.cbz
How to rename author names from
First Last
First Middle Last
First M. Last
F. M. Last
Last, First
Last, First Middle
Last, First M.
Last, F. M.
rename 's/([A-Za-z]+) ([A-Za-z]+)/$2, $1/' *
rename 's/([A-Za-z.]+) ([A-Za-z.]+) ([A-Za-z]+)/$3, $1 $2/' *
Comix couldn't open .cbr files:
Converting a file from daa to iso:
daa2iso Programming\ Books\ Collection\(Total\ 19\ Books\).daa Prodaa2iso Programming\ Books\ Collection\(Total\ 19\ Books\).daa Programming\ Books\ Collection\(Total\ 19\ Books\).isogramming\ Books\ Collection\(Total\ 19\ Books\).iso
To ignore robots.txt with wget do this:
wget -e robots=off --wait 1 -rc
by James M. Rogers.
We live life.
We make choices.
We hurt people.
We feel pain.
Life goes on.
And on.
And on.
We meet people.
We fall in love.
Love ends.
Life goes on.
And on.
And on.
We miss what we no longer have.
We miss what we think we should have.
We fear that even if we find love.
That we will just be hurt again.
Life goes on.
And on.
And on.
Live in the moment.
Live in the now.
Seek to make those around you happy.
Surround yourself with those who make you happy.
Be true to yourself.
Life goes on.
And on.
And on.
The application programming framework
I wrote this up a few years ago, thinking about how to implement a way to program complex systems. Instead of writing programs like previous programming languages you create assembly lines of objects through which the data flows as messages. This turns everything around. Multit-hreading, multi-processor and cloud processing should be able to be introduced at the system level, without adding any complexity to the "programs" that people have already written.
The application programming framework is a general framework to manage the memory and messaging between objects.
Everything in the framework is an object. From a simple number to the most complex protocol is an object. TCP is an object, file is an object.
Let us say that one wanted to create a web server.
One would create a work unit object to contain everything. A view, if you will.
Inside the view you create a TCP object, a stream to http object, and an http processor object. Everything would be configured at this point. Then connect the inputs and outputs between the objects together.
The starting and stopping actions of the work unit are defined.
Finally the objects would be started from the http processor to the stream to tcp object, and finally the tcp port would be started.
After everything is started then the tcp port accepts connections, this generates a connect message with a session Id that is sent to the stream to http object that allows it to set up a data structure in expectation of more to come.
Any data that comes in on session is sent to the stream to http object as a stream object with a session id embedded in it. The http data object generated is associated with the session id as well. The http data object is sent to the http processor. The http processor queues up all the http requests.
When finished and the work unit is deactivated, the tcp object stops listening for new connections, the queue is flushed and all current work is finished, then the http processor is disabled, the stream to http object is deactivated, and finally the tcp object is deactivated. After a timeout even if a work unit isn't finished, then everything is shut down anyway.
The key here is that it should be a very simple script to create, configure and connect these objects together and then to control their startup and shutdown behavior. With the proper base objects it should be easy to create a secure web service or an rss feed.
-- -- --
There are multiple levels.
The memory.
The objects.
-- -- --
The first Object must be hand crafted, because there are no facilities to create objects until the object class exists.
Once the Object class is present then you can subclass from the Object to create new classes.
The Object class is the root class.
I want to be able to easily swap out any subclass of the same type, so that you can easily change out a file for a tcp connection to make it easy to test processing from a file.
-- -- --
If you just declare to this point, then you will get the highest version of anything
Let us say that we have tcp.
inside that object path is version info.
It goes /major/minor/build
If you don't specify a version, then you get the highest version of the same major number you used when you built something. You can specify just a major number, or a major and minor number or a complete path to a specific version.
-- -- --
Installing versions.
"GrokThink" is the name for our company. The URL to the GrokThink object repository is stored as a property in the GrokThink Object.
An interface is designed to check this repository for new versions and ask if the user wants to install them.
Build number changes are for internal use, to differentiate between versions for QA. Minor number upgrades are controlled by QA, usually once a bug fix is done, then the build number is set to 0 and the build number is changed to incremented. Typically these changes are minor bug fixes or a feature add that will not change the behavior of previous functionality. The key here is that the fix or feature add should not change the behavior of objects previously used to build prior services or applications.
Major number changes are made for incompatible changes to an object. Often you will change the interface or fix a bug in such a way as to no longer work with older objects. At this time the major number should be incremented and the minor and build numbers set to 0.
Development goes like this:
1. Developer gets a bug against a specific major version.
2. The bug report includes a new unit test to demo the bug.
3. Developer checks out the source, this increments the build number.
This also locks the object so nobody else can work on it.
4. The Developer fixes the bug.
5. The Developer runs the unit tests against the object, adding in the new bug unit test.
6. Once all the tests pass, the Developer can check in the fix to the code system.
A description of what was fixed should be attached.
7. This creates a diff from the old code, the new code and diff go into the system for another developer to double check.
8. The developer approves or disapproves the fix. The two developers negotiate a fix and finally the second developer approves the fix after the changes are made.
9. The final fixed release is sent to QA.
10. QA approves the release and the release is put into the published area of the site.
11. The end users versions of the software can now download and install the new object.
The Development system comes with the software to perform all of these actions and publish to a public web server for your own company. The company name is the name of the web server that the repository resides on. This will prevent any conflicts as time goes on between different companies. There can be a redirect added to override the repository location if the website name where the repository resides changes in the future.
-- -- --
How to Merge in CVS.
This document describes the procedures you need to do to merge a change from the main development branch to the PubFinal branch.
Commit the changes that you made.
cvs update .
cvs commit cmdtool*
Tag the files that you want to merge over.
cvs tag bug873 cmdtool.c cmdtool.h cmdtoolpb.c
Checkout the PubFinal branch of VNOS in a temporary location.
mkdir tempPubFinal
cd tempPubFinal
cvs checkout -r PubFinal VNOS/widgets/cmdtool
Then merge the fix into the branch.
cd VNOS/widgets/cmdtool
cvs update -j bug873
Fix any conflicts and then commit the changes to PubFinal.
cvs commit .
Finally, throw away the copy of PubFinal so you don't accidentally start working in the wrong branch.
cd ../../../
rm -rf tempPubFinal
And you are done.
If it was just one file, you could have used its version number to merge in the changes to PubFinal.
Instead of:
cvs update -j bug873
You could have used:
cvs update -j 1.49 cmdtool.c
If cmdtool.c was the only file you changed and 1.49 was the version that contained your checkin.
Asteroid mining plans are not to bring resources back to Earth.
What all these articles are failing to realize is that at todays launch costs _anything_ already in orbit is worth several times it's weight in gold, minimum. Get 60 tons of water from an asteroid, it's worth a cool million dollars. Get 60 tons of any resource from an asteroid, it's worth a cool million dollars.
Nobody is going to bring anything back to earth, that would be ridiculous. You'd be better off filtering elements out of salt water.
Mining asteroids is so we can colonize the solar system cheaper.
The only thing that could compete with mining asteroids economically is a space elevator, which would have to be made out of unobtanium and which would attract terror attacks like moths to a flame.
Mining asteroids for gold and platinum
Details have been emerging of a plan by billionaire entrepreneurs to mine asteroids for their resources.
The multi-million-dollar plan would use robotic spacecraft to squeeze minerals such as platinum and gold out of the rocks.
|
Friday, April 20, 2012
Is India's romance with communism over?
An year ago, India’s red states, West Bengal and Kerala voted the communists out of power after a historical tenure in the government. Many people raised the inevitable question: Is India’s romance with communism over? How is it relevant in the post-liberalization era and the world’s largest spiritually oriented nation? Let us examine the history and growth of Communism in India before we evaluate the relevance of the movement today.
The roots of the communist movement in India go back to 1920’s when Communist Party of India was founded as an alternative to the existing Congress led anti-imperialist movement. The movement was driven by angst against the economic injustice of the propertied classes of both Britain and India. The “revolt” was not against the imperialism of the British but against the capitalist system in practice.
Victor Hugo once famously remarked that no force could stop an idea whose time has come. In many ways, Communism feels like an idea whose time never really came in India. Communism in India as it was practiced and offered to the people was never in sync with the socio-cultural norms of the majority. In trying to bring about radical change through a revolutionary zeal, the idea missed the opportunity of changing things at the margin. I cite two specific ideological errors made by the movement which I think explain the reason for its failures in India.
National identity: No real national spirit existed among a group of peasants, landowners and middle class proletariat who combined for socio-economic reasons. The fact that it failed to create a new national identity and unite the masses like Gandhiji and other Congress leaders did during the pre-Independence era was one of main weaknesses in its institutional structure. Not addressing the caste and religion issues through continuous dialogue was one of the biggest mistakes of the communist movement during this time. Imposing their caste and religion free ideology on the masses instead only further alienated them.
Means of revolution: The means of violence chosen by Communist movement was easy to be negated by the militarily powerful British opposition. Gandhiji's method, by contrast, was to slowly pick apart at the government's view of liberalism and tackle the issues on the margin. This proved to be highly effective because the colonial state found it more frustrating to battle a morally forceful yet peaceful movement. I would hence argue that this movement managed to damage the government more effectively than the violent and disorganized methods of the CPI.
Therefore, it is not surprising that Marxist roots only persisted in two of India’s most literate states of Kerala and West Bengal where people’s aspirations matched with the ideologies of the Left. However, the last year’s state election debacles of CPI and CPI (M) in both these states point to a trend of the movement losing public support even in these states. But it needs to be pointed out that the unruly offshoots of Naxalism and Maoism still dominate a third of our districts in India. After the Dantewada massacre where 76 jawans of the central paramilitary were surrounded and butchered in cold blood by well-armed Naxalites, the little romanticism public intellectuals and larger public had for such extremist ideologies seem to have evaporated. Our internal security as rightly pointed out by our Prime Minister is our greatest threat and needs to be dealt with utmost urgency and seriousness. In looking back at the history of communist movement and its loss to Gandhiji’s Satyagraha, Government and civil society will do well to pursue its own truth through a rigorous and community based development agenda in these affected districts. In a country like India, it would be hard and foolish to pronounce a judgment on the end of communist movement. But, by choosing to be not in sync with the socio-cultural and economic norms of the larger society, the communists are being clearly overpowered in the battleground of ideas.
Why am I optimistic about change?
Imagine that you placed two gold coins on the first square of a chess board. If you kept doubling the number of gold coins for each and every square, how many coins do you think will be there on the last square (64th)?
18000000000000000000 (18 followed by 18 zeroes)
Can you imagine that number in your head? I mean we can all visualize 2 birds, 5 trees, 10 buildings, a few hundred people, even a few lakhs and crores of money(Our politicians seem to have the acumen to deal in many more zeroes than us citizens though!).
Malcolm Gladwell articulates this cognitive principle of 'Tipping Point' brilliantly through a lot of social examples. His main idea in the book is how little unprecedented things can actually create a social movement and the factors which lead to that critical mass for the movement to explode. To further break it down, human mind does not have the cognitive ability to comprehend geometric progressions or in other words, big socially impactful movements (read World Wars, computer, internet etc.)
There are a few other mathematical theories to highlight the same principle (Long Tail, Butterfly effect etc.) but I will focus on one which really appealed to me - The Black Swan theory
The Black Swan Theory or Theory of Black Swan Events is a metaphor that encapsulates the concept that some events happen and taken all us by surprise, like the name used to represent it. It is very rare that we come across a Black Swan in our lifetime. The legend goes that the English did not believe such a thing existed till they came across one. Therefore, it is only in hindsight do we come to terms with the fact of the event.
The theory was developed by
Nassim Nicholas Taleb to explain three concepts:
· The tail events which are extremely rare and highly improbable but not impossible. There exists a small probability of occurrence of such events in sciences and social sciences which happen to shape new frontiers.
· Given the low probability of occurrence of such events, usually less odds than 1 in a million, it is difficult to use mathematical models to predict them.
· Because of the nature of rarity and uncertainty of such events, the psychological biases human minds have towards low occurrence-high impact events.
Black Swan Events were characterized in his book The Black Swan. Taleb regards almost all major scientific discoveries, historical events, and artistic accomplishments as "black swans"—undirected and unpredicted. He cites the examples of World Wars, personal computer, Internet, 9/11 to prove his point.
Therefore, there are three major takeaways from a Black Swan event. First, that nothing in the past can potentially anticipate the possibility of its occurrence. It is clearly outside the realm of regular expectations and an outlier on a probability distribution. Second, most black swan events carry an extreme impact on society. Third, in spite of our inability to predict such events, human mind tends to find causal links to such an event in hindsight. The author argues that almost everything in our world, from the success of ideas and religions, to the dynamics of historical events, to elements of our own personal lives can be explained through these events.
In my opinion, this is how change and social movements happen. We must surely reason on a daily basis. We must definitely plan for the uncertain future. We must ardently strive to achieve our planned goals. But we cannot predict our Black Swan moments. Life is purely probabilistic. And, at the tail of such a probability distribution is a black swan event waiting to happen in our life time. Therefore, we must believe at some level that high impact change is possible. It might not be around the corner and predictable, but there is some mathematical argument to believing the impossible is probable as well.
So ask yourselves, what is the ‘Black Swan’ moment that you can ‘probably’ dream of? What can you do to tip the scales of change in India?
Where is the high moral ground?
The article on the book ‘Nanma Niranjavare Swasthi’ by Sister Mary in First Post is heart wrenching, disappointing and serious all at the same time. The fact that it evokes such diverse and mixed reactions is indicative of the sensitivity and complexity of the topic. Instead of giving a quick emotional response, I decided to delayer the three reactions. The views expressed are certainly personal but I do think they are reflective of the generation I belong to and it’s frustrations with the religion that our parents taught us to practice.
Firstly, the personal narrative of Sister Mary shook me up to the core. One, for the personal trials and tribulations she had to go through in spite of choosing the high noble path of service. And, also by the fact that her marginalization was compounded by her being female. I can only barely empathize how it must have been to go through all that she did and yet manage to have the courage to stand up to her ideals. For living the message of service in the most pristine way possible despite the obstacles life had offered to her, I personally hold her in high respect and draw inspiration from her commitment.
However, abstracting to what the story symbolizes at an institutional and society level, it leaves me with disappointment. The story is a reflection of how church as an institution and more generally religious institutions, no longer stand on the pedestal of human excellence or the pursuit of it. In fact, this story reflects the slow but dangerous degradation of integrity of these institutions and our society as a whole. In the garb of high moral ground and a life of core values and service, these institutions in majority are turning out as platforms for debauchery and power exertion by men. Coming from a scientific and rational background, I would question the idea of celibacy and chaste life that most religions impose on their priests, nuns and monks. Especially, in the context of our modern social norms in which our films and all other forms of entertainment are becoming salacious by the day. It surely requires the highest degree of moral probity to not to yield to temptations of such messages. Either they have must stricter codes on how to uphold and practice the values they preach to their unsuspecting believers or these religious institutions need to question, innovate and think of adapting themselves to the changing societal norms. Values as they say are caught and not taught.
Lastly, the article raises serious questions about the role of religion and religious institutions in our society. To paraphrase Swami Vivekananda’s idea of religion, he said that if you can have the body of a Muslim, heart of a Christian and soul of a Hindu, you have reached the pinnacle of human life. What he meant was if you can practice austerity that Islam preaches, if you can serve others like Jesus did and if you can reflect within deeply like Gita says, you don’t need the crutches of religion to live in an uncertain world and pursue the highest truth. I hope that the story will make all of us question our own scientific temper and reasoning mind. What do we need religion for in life? Can we distill the teachings of all religions and practice them in an individual way? Can we question the lives of gurus, nuns and priests who use religion to manipulate unsuspecting people? More importantly, can we as a society or an aspiring modern society develop scientific temper and search for the fundamental truths through evidence, reason and debate?
Tuesday, April 10, 2012
Article on Higher education for YouthkiAwaaz
Our first Prime Minister, Pandit Jawaharlal Nehru said, “A University stands for humanism, for tolerance, for progress, for adventure of ideas and for the search of truth. It stands for the onward march of the human race towards ever higher objectives.”
Cleary, a knowledge society cannot be built and an IT revolution cannot be sustained without strengthening institutions of higher learning. Let us examine where we stand at this moment and what must urgently be done.
The race we have forgotten to run – a number diagnosis
Though the contribution of higher education to development, whether private or public returns is well established and quite significant, India, like many other developing countries, has not paid adequate attention to it. Allocations for higher education have reduced from 25% in the 4th Five-year plan (1969-74) period to hardly 7-8% in the Ninth Five year plan(1997-2002).
India and China had the same gross tertiary enrollment ratio around 10% in the late 2000’s. While China has managed to break away and grow at 15% every year, we have fallen behind by growing at 7%. The gross tertiary enrollment ratio has reached 15%, according to MHRD’s statistics on Higher and Technical education (2009-10).
International evidence shows that economically advanced countries with universalized secondary education that provide a fair degree of access to higher education have a gross enrolment ratio ranging from 40% to 90%. The converse is also true. No country with a low enrolment ratio of 10% to 15% can be an advanced country – economically, politically or socially.
In summary, higher education is clearly a race we have forgotten to run or chosen not to run.
The leap we never make in India – reports, committees and commissions to policy action
The Yashpal committee report (2009) on the topic of ‘Renovation and rejuvenation of Higher education in India’ is very instructive in understanding the challenges of the higher education sector. It also provides a logical agenda for action to recover the lost distance and the grand idea of a University.
To summarize the report in a few hundred words would be gross injustice to the rigor of the analysis and to the complexity of the problem. The challenges of social relevance of our Universities, architecture of learning to promote academic excellence and revamping current administrative and regulatory structures to deliver the public good of higher education are deep and multifold.
The agenda for action outlined is equally complex and challenging to carry out even for the most capable administration. Take for example, creating the all-encompassing National Commission for Higher Education and Research (NCHER), a constitutional body to replace the existing regulatory bodies including the UGC, AICTE, NCTE and DCE and appropriate law for the commission’s functioning.
Instead of getting into the details of the report, I will instead focus on the political follow up of the report. India’s problem of policy action has never been ignorance. We have had significant thought leadership and intellectual capital working on the problem at the macro level, be it through National Knowledge Commission and this report to cite a few examples.
However, it is disheartening to note that India does not have a dedicated Minister for Human Resource Development. It highlights the urgency and focus with which our government has tackled the problem. Our past governments on both sides of the political divide have been equally lax in their vision.
In all debates which ‘3 idiots’ movie prompted on our higher education system, none of the focus was on the big gap in enrollment numbers we have chosen to neglect or on the course of political and administrative action we have taken for the last six decades. Instead, in narrowing the discourse just to culture of learning in IITs and IIMs, we have showed an elitist bias in our understanding of the problem.
To truly start to move towards delivering the ideals of higher education, a system based on core values of academic excellence, social relevance and spiritual vitality, we first urgently need to inject accountability into our political discourse. A simple demand of a dedicated Central Minister to start with, to represent the 85% children of our country who cannot crash the barriers of higher education.
Debut as a public writer - Youth ki Awaaz article on TFI journey
“How does one become a butterfly?” he asked
“You must want to fly so much that you give up being a caterpillar.”
Metaphorically, this is the same question I started with on my TeachforIndia (TFI) journey as a fellow in 2009. What is my depth of drive to serve people? I always had deep reverence and admiration for Gandhiji, as how much one single man could do for millions of spiritually starved people just by changing himself. I hoped that such an intense journey of personal transformation will lead to discovery of my inner self – my self actualization need and my drivers for it.
During January 2011, I was running a Writer’s workshops based on central themes of the Lion King story in my classroom. Our big goal for the year was to plan, perform and organize the Musical for the story. My kids were into the story at a factual and sequential level in Reader’s workshops since September 2010. Wanting to take it up high on Bloom’s cognitive development level, I hit on this idea on integrating it in to writing as well. As is the process, you need to model the way of writing on the topic to the kids. Also, being 10 year olds, I realized that I really needed to delayer the emotion to the basic level so that it made a deep connect with all of them. In the process, I realized the distance I have covered on the journey of personal transformation during the course of fellowship. The themes that we wrote on were -
“I was put to shame when…” (SHAME)
I was a 16 year old caterpillar, who couldn’t take the possible ignominy of not cracking the IIT- JEE test and ran away from hostel for one full week on the streets. Now, the butterfly can make itself vulnerable in front it its kids by sharing any story of my life in intricate details, just like little Simba got over shame in the end of the story!
“I fear about...” (FEAR)
From fearing about being judged in public like Simba, I have shed my cover and inhibitions as I found my purpose being a teacher in front of my children.
“My responsibilities in the Circle of Life are...” (RESPONSIBILITY)
From being self driven, I am now driven to make the TFI vision of ‘one day all children will have an excellent education’ a reality by 2060. It has given my dreams new wings.
“I want to serve….” (SERVICE)
I truly feel that I want to serve now, not out of self righteousness but because I believe that my happiness and liberation is bound up with the underprivileged children of this country.
“I am attached…” (ATTACHMENT)
From being a product of the rat race system, I am no longer attached to the fruits of my action and only focus on working positively. I have found my objective equilibrium with the world.
It is with this rooted deep desire to do something for the country which is purposeful, passionate and impactful, I reflected deeply about the root cause of our governance failures and my possible contribution to it. I have grown to believe that answer to bad politics is good politics. Power when combined with passion, purpose and integrity can fastrack wellbeing of people. One of the fundamental questions I asked myself was, “What does it take for a young person with idealism, intellect, integrity and Indian as his/her only identity to win an Indian election in the current scheme of things?”
It has been 65 years since we have realized our dream of political independence. However, we have yet to realize our economic, democratic and spiritual independence.
Any other field or profession in India has success stories of people who have beaten heavy odds to be successful. My goal is to show that we can crash barriers to entry in the field of politics in India as well. Irrespective of identity and position in society, a patriotic and spirited individual must be able to qualify to win and rise in our system of democracy. My mission is to demonstrate that it is possible and hopefully in the process institutionalize it through the Indian School of Democracy.
Studying at Harvard Kennedy School for the last one year has made me realize the importance of India’s urgent need for a public policy school which not only develops the discerning intellect of a student but builds empathy and integrity through community experiences. William Faulkner, an American writer and Nobel Prize laureate from Mississippi, would say “to understand the world, you must first understand a place like Mississippi”. I can vouch to that wisdom from my limited experience of two years in the Wadgaonsheri community in Pune at TFI.
I still do not have all the answers to the big question but believe in the direction which my ideas are leading me. Hopefully, going back to my roots after my study, understanding some of the towns and villages of India in all its hues and sounds, listening long and deeply enough to people and serving them in my own means might open up the necessary opportunities.
There is much to feel skeptical about the rationality of my logic and the audacity of my dream. To them I will politely quote Robert Kennedy, who paraphrased George Bernand Shaw’s, “Some men see things are they are and say why? I dream things that never were and say why not?
And on that day when I finally get to fly, you will know me and the fact that I have given up being a caterpillar!
|
Study your flashcards anywhere!
Download the official Cram app for free >
• Shuffle
Toggle On
Toggle Off
• Alphabetize
Toggle On
Toggle Off
• Front First
Toggle On
Toggle Off
• Both Sides
Toggle On
Toggle Off
• Read
Toggle On
Toggle Off
How to study your flashcards.
H key: Show hint (3rd side).h key
A key: Read text to speech.a key
Play button
Play button
Click to flip
20 Cards in this Set
• Front
• Back
Computer Versus Computer System
A computer is a machine for solving problems.
A computer system consists of at least 3 elements.
1. Harware
2. Software
3. Computer users
What are the 3 steps in Hardware Organization?
1. Input (keyboard)
2. Processing (central processing unit (CPU))
3. Output (printer)
What is Serial or Sequential Processing?
Information is processed in the order in which items are entered and stored in the computer.
What is Distributed Processing?
The information is processed by several computers connected by network.
What is Multitasking when talking about computers?
Multitasking is the computer works on more than one task at a time.
What is multiprocessing?
Multiprocessing uses two or more connected processing units.
What is Parallel Processing?
A method of processing that can only run on a computer containing two or more processors running simultaneously.
What is Pipelining?
Pipelining is a method of fetching and decoding instructions in which at any give time several program instructions are in various stages of being fetched or decoded.
The two main types of computers are Digital and Analog. What are the differences?
Digital- most common, operate on digital data through arithmetic and logic operations.
Analog- operate on continuous physical quantaties, such as electronic signals, speed, temperature and displacement.
What is an Analog-to-digital conversion (ADC)?
The ADC converts the analog signal into a sequence of numbers having finite precision.
Essential parts being: a sampler, quantizer, and coder.
What is Sampling (ADConverter)?
Sampling is the conversion of a continuous time signal into a discrete signal obtained by taking samples of the contiuous-time signal at discrete time instants.
What is Quantization (ADConverter)?
Quantization is the conversion of discrete-time, discrete-valued (digital) signal.
What is Coding (ADConverter)?
Coding is the assignment of a binary bit sequence to each discrete output from the quantizer.
What is a Binary Bit?
A Binary Bit is a single binary number. In computing it is as follows
4 Binary Bits (0.5 byte) = 1 kilobyte (K or KB)
8 Binary Bits (1 byte) = 1 megabyte (MB)
16 Binary Bits (2 bytes) = word
32 Binary Bits (4 bytes) = double word
What is a Digita-to-analog Conversion (DAC)?
The digital signal processor outputs digital data that are subsequently converted into the analog signals needed to operate analog display devises such as television monitors.
What is Input Harware?
Input Harware refers to information entered into the computer for processing.
(Ex. keyboard)
What is Output Harware?
Output is information that has been produced in a seemingly intangible form. Can be soft copy- video display, or hard copy- film or paper.
What are examples of Secondary Storage?
Magnetic Tape Storage, Magnetic Disk Storage, Optical Disk Storage.
Computers in Radiology
In 1955 computers were used to calculate radiation dose.
What is DICOM?
Digital Imaging and Communication in Medicine.
|
What is the Difference Between a Synthesizer & an Electronic Keyboard?
Music, just like most hobbies or professions, has its own technical jargon. When it comes to types of musical instruments, this jargon is important from a monetary point of view so you know exactly what you're buying. The first step to understanding the differences between electronic keyboards and synthesizers is to understand what each is.
Electronic Keyboard
• At its most basic definition, an electronic keyboard is a musical instrument that has a keyboard and whose sound originates electronically. While there were some earlier attempts, the earliest practical electronic keyboards attempted to directly simulate the sound of acoustic keyboard instruments. Electric pianos and organs were among those first electronic keyboards. Some synthesizers qualify as electronic keyboards.
The Synthesizer
• A synthesizer creates music by generating a sound wave then manipulating and altering various attributes of that wave. These attributes consist of things like attack (how quickly the note rises up) and decay (how quickly it terminates) and the shape of the wave. Through the proper adjustment of these characteristics and others (like white noise) a musician can simulate natural sounds or create unique sounds.
The Earliest Synthesizers
• The first synthesizers were developed in the 1960s. They were big devices that weren't equipped with keyboards. They were confined to recording studios because their size made them impractical to transport. The first portable synthesizer use was built by Bob Moog in 1964. While it gained acceptance and was widely used, it did not have a keyboard. Moog didn't built a synthesizer equipped with a keyboard until 1970.
Other Types of Synthesizers
• Midi technology created a means for synthesizers to communicate with one another and interface with devices like computers. Digital technology and controller devices, which allowed things like drum pads or guitars to control the synthesizer, made them even more versatile over the 1980s and 1990s. Some keyboardists prefer the sound of analog synthesizers to digital (a similar debate to the one that surrounds vinyl records versus CD's) and might not consider digital synthesizers to be an advance.
The Bottom Line
• Most electronic keyboards that allow multiple voices are probably synthesizers. Still, there are synthesizers out there that are essentially metal boxes with no keyboards of their own. These need some form of Midi controller to control the sound generation. Many Midi controllers are keyboards which means there are electronic keyboards that aren't synthesizers. A good rule of thumb (although, this isn't infallible, either) is the more expensive electronic keyboards are synthesizers, while the cheaper ones are not. Also, the more advanced synthesizers have a higher learning curve and might require a keyboard tech depending on a user's level of experience and knowledge.
Related Searches
• Photo Credit keyboard image by Vasiliy Koval from Fotolia.com
Promoted By Zergnet
You May Also Like
Related Searches
Check It Out
12 Tiki Essentials to Turn Your Bar Cart Into a Tropical Paradise
Submit Your Work!
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.