text
stringlengths 1k
23.6k
| id
stringlengths 47
47
| dump
stringclasses 3
values | url
stringlengths 16
1.34k
| file_path
stringlengths 125
126
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 2.05k
4.1k
| score
float64 2.52
4.91
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Why Should We Vote in India – How to vote India: Importance & Reason to vote
Why should a person exercise their voting rights in India?
Our country, India, can be considered as one of the biggest democracies around the globe. This notion of the famous saying ‘Government of the people, by the people and for the people’ is proven to be true only and only if the whole nation takes part in the process of election. In any democracy, all the citizens need to come united and help decide the future of their country and their own. This right to vote empowers the citizens of India to exercise their choice and decide together who will be leading the country and carrying the burden of responsibilities that comes with the power.
But it is always seen that the voters are reluctant to vote during the process of election. Many of the voters do not carry out this responsibility properly, thereby not understanding the gravity of the power given to them by the constitution. This is particularly true in the case of the urban population where election day is considered another holiday. Since voting is not compulsory, people just choose to relax instead of participating in the election.
One of the highest voter turnouts during any election was seen in the 2019 National Elections. But the figures were quite disappointing as only 67.1% of the people came to vote during the election day. This is quite far away from the perfect 100% which is important for any democracy. It is seen that in many cases the voters do not care to even register their vote or enroll them in the voter list. This reluctance comes from the mindset that a single vote wouldn’t make much of a difference but this is not true. Every vote counts. It is good to give suggestions to the government and criticize them but it is not okay to vote. Voting is beyond any right; it is the responsibility of every individual to vote and decide the future of the country. It is a national responsibility.
It is the need of the hour that people participate in this process. So, a fundamental shift in the people’s thought process is essential for making them realize their moral responsibility towards our beloved country. Every vote helps us in determining our future and the nation’s growth.
Why should we vote?
Voting is one of the founding pillars of democracy. This option should be exercised by all of the residents of the country. Although voting has not been made compulsory by the government but is a citizen’s moral duty to vote and do this voluntarily. Below are some of the reasons why a person should vote.
Source of change
Although protests are some of the popular ways for showcasing any kind of displeasure in the hearts of the citizens against any government or the policies implemented by them voting is a very essential tool for registering their opinion or voice. This collective mandate or voice of any country’s citizens is one of the loudest cries for the change of government. This is clearly observed in many cases that the country’s citizens are very well equipped to show the door to any non-performing government and changing the direction of the country’s growth.
Importance of every single vote
Another thing to be noted is that there may be many people who generally tend to think that a single vote doesn’t matter. But we often forget that every single vote can bring about a big change. In some cases, it is seen that a single vote can make a big difference between a capable and strong leader and a weak one. So, it is stressful to vote every time.
NOTA or None Of The Above
This option has been introduced recently by the Election Commission of India. Many times people don’t find any of the contestants of a particular area to be fit for the role so they may select NOTA or None Of The Above. For such a scenario this was brought up by the Election Commission which acts as another tool to state that none of the candidates are considered to be capable. If any constituency has a majority of NOTA then there will be re-election at the place with a new set of candidates. Moreover, sometimes NOTA prevents a corrupt person from winning the polls had it not been that he/she might have won. This power also shows the mandate of the country.
Sense of Pride
The voting right is generally associated by the people with some sense of pride generally among the first-time voters or young voters. This is seen from the latest trends for showcasing their fulfillment of responsibility through sharing images of the inked finger on different platforms of social media. This is in the truest form a way of honoring our forefathers that have made many sacrifices and also strived very hard in attaining our nation’s freedom.
The ECI or Election Commission of India has initiated various measures for promoting awareness of the voter and also inculcating this need and also the importance of voting for its citizens throughout the country. Such initiatives are one of the reasons for the increase in voter turnout in the past few years.
Although it is seen that all the voters need to uphold the responsibility and vote in the elections but the process of election is required to undergo some changes which ensure the influx of some good representatives or communities for any position and some fair practices that should be followed by everyone.
Some examples of such specific suggestions are listed below:-
- Providing facilities to inter-migrants to cast their votes
- Opposing using unfair social practices or using illegal or unethical practices in the entire election process
- Keeping a check on expenses involved in the election process with respect to every individual candidate and his political party as a whole
- Curbing proxy voting especially in the case of Non-Resident Indian voters
- Decriminalizing the entire election process and keeping a strict check on the involvement of criminals in the country’s political scenario
- Introducing electoral reforms to handle some particular situations like hung parliament or assembly or coalitions post-election.
The Elections Procedure
With a view to conducting free and fair elections and ensuring smooth functioning, an independent body was formed which was named the Election Commission of India. The Election commission handles everything related to the election process which includes the direction, superintendence and control of the elections and conducting the elections smoothly without any violence. Following is a gist of the process of voting or elections that one needs to know.
- First of all, an individual needs to get himself or herself registered as an eligible voter on the Electoral Roll, i.e., a list of eligible voters. Nowadays one can apply for voter id cards online as well offline at the VRECs, or through Booth Level Officer or at designated locations.
- Then that person will be issued a Voter ID which he is required to carry with himself at the polling booth.
- It is the responsibility of all citizens to check each candidate’s profile and make sure that they choose the right persons to form the government.
- Another responsibility of all citizens is also to find out the location of polling booths in their respective constituencies.
- Voters can vote on the Electronic Voting Machines or through ballot boxes as the case may be
- If anybody has a language problem or in other words has difficulty in communicating in the state language, then one should recognize the candidate or party of his choice through party symbols because all the candidates’ names will be given in alphabetical order in the respective state’s language.
- All a voter needs to do is simply press the blue button that is next to his or her desired candidate’s name and desired party symbol. One can also vote NOTA.
- The voter’s index finger will be then marked with blue indelible ink that symbolizes that he or she has voted.
- While it assists in identifying if one has already voted, it also stands as a proud symbol one can bear to show that he or she is a responsible citizen and has played his role diligently in framing the government of his country.
How many major elections are there in our country?
In all, there are four major elections in our country namely,
- President’s election by the assembly of elected members of the Central Legislature and State Assembly
- The Rajya Sabha Elections
- The Lok Sabha Elections
- The Prime Minister’s election by the Lok Sabha’s elected members.
What is a voter ID card?
A voter ID card is a mandatory document needed for the identification of a citizen of India that is issued by the ECI or the Election Commission of India. It allows its holder to cast his or her vote. The voter ID card includes the following details:-
- Photograph of the person owning it
- Unique serial number
- A hologram that has a national symbol or respective state symbol
- Name of the person owning it
- Father’s name of the person owning it
- Card holder’s address
- Date of birth the person owning it
The residential address of the cardholder and his/her signature of the electoral registration officer is on the backside of the voter ID card.
What is the process of applying for a voter ID card?
Any citizen of India is eligible to apply for an ID. It can be applied through three processes:-
- Semi online methods
What are the documents required?
For a Voters ID card, the following documents are required:-
- Address proof
- Identity Proof
What is the eligibility for a voter ID card?
For a Voters ID card, the following criteria must be met:-
- The person needs to be an Indian citizen
- 18 years of age or above
- A permanent address
Why Should We Vote in India FAQs:
1. What is the Voter ID?
2. What are the ways to check if a person’s name is present in the voter’s list or not?
3. What do you mean by NOTA?
4. Why are the elections held?
5. How can Indian citizens living abroad cast their vote?
Difference between Working Capital and Startup Loan
Working Capital Loan EMI Calculator
Difference Between Working Capital Loan and Term Loan
Loan for Chartered Accountants
Accounts Receivable Financing
Best Free Accounting Software for Small Business
Difference between tin tan vat pan dsc and din
how to withdraw pf amount online using uan
Business Ideas for Women
10 Business Ideas after Lock Down
Business Skills are Needed to Run Business
Business loan for women
Agriculture business plan
Dairy farm loan
Small Scale Industries in India
GST Registration Online
Aadhar Card Status
PAN Card Correction & Update
Aadhaar Card Download
PAN Card Apply Online
Instant PAN Card through Aadhaar
PAN Card Mistakes – To Avoid
How to Link Aadhaar with PAN Card
PAN Card Details Search By Name, DoB, PAN Number & Address
What is a Cancelled Cheque | <urn:uuid:090991f3-a9ba-4812-b086-de1952c307e8> | CC-MAIN-2022-33 | https://www.lendingkart.com/blog/importance-to-vote-in-india/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00203.warc.gz | en | 0.958288 | 2,277 | 3.1875 | 3 |
This section expands on Penninx 2005 and 2007.
A Definition of the Concept
We define integration as “the process of becoming an accepted part of society”. This elementary definition is intentionally open in two regards. First, it emphasizes the process character of integration rather than defining an end situation. Second, in contrast to the normative models developed by political theorists, it does not specify beforehand the degree of or even the particular requirements for acceptance by the receiving society. This makes the definition highly useful for empirical study of these processes. Measuring the degree of becoming an accepted part of society will allow us to capture the diversity of (stages of) the process. We do need to specify within this basic definition what should be measured; that is, what are the indicators of integration and where might we find them.
The basic definition of integration encompasses three analytically distinct dimensions in which people may (or may not) become an accepted part of society: (i) the legal-political, (ii) the socio-economic, and (iii) the cultural-religious. As pointed out by Entzinger (2000), these dimensions correspond to the three main factors that interplay with immigration and integration processes: the state, the market, and the nation. Focusing on these dimensions instead of the ones mentioned earlier (e.g., culturation, placement, interaction, and identification) allows us to shift the focal point from immigrants to their relationship with a host society. The question is not only what immigrants do, with whom do they interact, and how do they identify themselves, but as much whether they are accepted and how they are positioned in each of our three dimensions.
The legal-political dimension refers to residence and political rights and statuses. The basic question here is whether and to what extent are immigrants regarded as fully-fledged members of the political community. The position of an immigrant or the “degree of integration” has two extreme poles. One of these is the position of the irregular immigrant who is not part of the host society in the legal-political sense, though perhaps being integrated in the other two dimensions. The other is the position of the immigrant who is (or has become) a national citizen. In between there is enormous variety, which has increased in recent decades as a consequence of attempts of European states to “regulate” international migration and the new statuses and rights stemming from the EU migration regime (among others, EU nationals versus third-country nationals or “TCNs”).
The socio-economic dimension refers to the social and economic position of residents, irrespective of their national citizenship. Within this dimension, the position of immigrants can be analysed by looking at their access to and participation in domains that are crucial for any resident. Do immigrants have equal access to institutional facilities for finding work, housing, education, and health care? Do they use these facilities? What is the outcome of immigrants’ participation compared to that of natives with the same or comparable qualifications? Since needs and aspirations in these domains are relatively universal (basic needs are largely independent of cultural factors), access to and participation of immigrants and natives in these areas can be measured comparatively. The outcomes, particularly when they are unequal, provide useful inputs for policies.
The cultural-religious dimension pertains to the domain of perceptions and practices of immigrants and the receiving society as well as their reciprocal reactions to difference and diversity. If newcomers see themselves as different and are perceived by the receiving society as culturally or religiously different, they may aspire to acquire a recognized place in these respects. For their part, the receiving society may or may not accept cultural or religious diversity. Here again we find two extremes. At one extreme, new diversity may be rejected and immigrants required to adapt and assimilate into mono-cultural and mono-religious societies. At the other extreme, ethnic identities, cultures, and worldviews may be accepted on an equal level in pluralistic societal systems. Between these two extremes again are many in-between positions, such as accepting certain forms of diversity in the private realm but not, or only partly, in the public realm.
This third dimension, and the specific positions of immigrants and immigrant groups, is more difficult to measure, basically for two reasons. Firstly, it is less about objective differences and diversity (ethnic, cultural, and religious) than about perceptions and reciprocal normative evaluations of what is defined as different and the consequences of such categorizations. Categorizations may become stereotypes, prejudices, and ultimately part of immutable racist ideologies. Moreover, the basis of categorizations may change. For example, in the guest worker period (1960–1975), the fact that an increasing share of immigrant workers were Muslims was not seen as relevant. It was only from the 1990s forward that such migrants and their families were categorized as coming from Muslim countries. Secondly, categorizations and reciprocal perceptions manifest differently at different levels (i.e., at the individual, collective, and institutional levels), and their consequences may also differ. If contacts between individuals are coloured by prejudice, interactions may be uncomfortable but have a limited impact. Yet, at the institutional level, if employers base their recruitment of workers on stereotyped or prejudiced perceptions and procedures, the consequences for individual immigrants may be quite negative.
It is important to realize that these three dimensions are not fully independent of one another. The legal-political dimension may condition the socio-economic and the cultural-religious dimensions (represented by arrows in Fig. 2.1). From the perspective of individual immigrants, factors such as illegal residence, extended uncertainty about future residence rights (compounded in the case of asylum seekers by long-term dependence on charity or the state), and lack of access to local and/or national political systems and decision-making processes have negative implications for opportunities and participation in the socio-economic and political realms. From the perspective of the receiving society, exclusionary policies are an expression of a general perception of immigrants as outsiders, which inevitably adversely affects immigrants’ integration. The cultural-religious dimension may similarly impact the socio-economic dimension (represented by another arrow in Fig. 2.1). For example, negative perceptions of certain immigrants may lead to prejudice and discrimination by individuals, organizations, or institutions in the receiving society, and this may reduce immigrants’ opportunities—even if access is legally guaranteed—in domains such as housing, education, health care, and the labour market.
Having defined the dimensions of the process of integration of newcomers into an established society and how to measure them, the next question is who are the relevant parties involved? Firstly, there are the immigrants themselves, with their varying characteristics, efforts, and degrees of adaptation (the left part of Fig. 2.1). Secondly, we find the receiving society, with its characteristics and reactions to newcomers (the right part of Fig. 2.1). It is the interaction between the two, however, that determines the direction and the temporal outcomes of the integration process. However, these two “partners” are fundamentally unequal in terms of power and resources. The receiving society, especially its institutional structure and reaction to newcomers, is far more decisive for the outcome of the process than the immigrants themselves are.
Three Levels and Indicators
Processes of immigrants’ integration take place and can be measured at different levels. The first level is that of individuals, both migrants and natives of the receiving society. For the first dimension, immigrants’ integration at the individual level can be measured in terms of their legal status and political participation. For the second dimension, we can look at their socio-economic integration and position in the “hard” domains of housing, work, education, and health. For the third dimension, we would measure their identification with a specific cultural-religious group and with the receiving society, as well as their cultural and religious practices and how these are valued. In our conceptual definition of integration, we should also measure the attitudes and behaviour (or acceptance) of native individuals towards newcomers and the consequences of these.
The second level is that of organizations. There are the organizations of immigrants, which mobilize resources and ambitions of the group. These organizations may be strong or weak; they may orient themselves primarily towards (certain aspects of participation in) the receiving society or to specific cultural and religious needs of the group. They may become an accepted part of civil society—and a potential partner for integration policies—or isolate themselves or be excluded by the host society. There are also organizations of the receiving society. Their extent of openness to newcomers, their perceptions of and behaviour towards individual immigrants, and their organizations might be of crucial importance for immigrants’ integration. Research has shown, for example, that with the absence of governmental integration policy in Germany until 2002, nongovernmental organizations (NGOs), particularly trade unions and churches, played a crucial role in the integration processes of guest workers and their families (Penninx and Roosblad 2000).
The third level is that of institutions, understood as standardized, structured, and common ways of acting in a socio-cultural setting. Two kinds of institutions are of particular relevance. The first are the general public institutions of the receiving society in the three dimensions: institutional arrangements of the political system; institutional arrangements in the labour market, housing, education, and public health; and institutional arrangements for cultural and religious diversity. Laws, regulations, and executive organizations, but also unwritten rules and practices, are part of these institutions. Though general institutions are supposed to serve all citizens in an equal manner, they may impede access or equitable outcomes for immigrants. They may exclude immigrants formally, either completely—as does the political system of most countries—or partially—as when social security and welfare systems offer only limited services to non-citizens. Yet, even if access for all residents is guaranteed by law, institutions may hamper access or equitable outcomes by virtue of historically- and culturally-determined ways of operating, for instance, by failing to take into account immigrants’ history, their cultural and religious backgrounds, or their language abilities. Thus, adequate functioning of general public institutions—and their potential to adapt to growing diversity—is paramount. At this level, integration and exclusion are “mirror concepts” (see Penninx 2001).
The second type of institution that is particularly relevant for immigrants’ integration is institutions specifically “of and for” immigrant groups, such as certain religious or cultural ones. Unlike general institutions, the value and validity of any group-specific institution is confined to those who voluntarily choose and adhere to them. Although their place is primarily in the private sphere, group-specific institutions may also manifest themselves as civil society actors in the public realm, as shown by the history of churches, trade unions, and cultural, leisure, and professional institutions in European cities and states. Some migrant-specific institutions may become an accepted part of society, equivalent to institutions of native groups. Others, however, might either isolate themselves or remain unrecognized or even excluded.
Different mechanisms operate at the individual, organizational, and institutional levels, but the outcomes at all of these levels are clearly interrelated. Institutional arrangements largely determine organizations’ opportunities and scope for action, and they may exert significant influence on how immigrant organizations develop and orient themselves. Institutions and organizations, in turn, together create the structure of opportunities and limitations for individuals. Conversely, individuals may mobilize to change the landscape of organizations and may even contribute to significant changes in general institutional arrangements. In view of the uneven distribution of power and resources noted above, such examples are scarce but they are not nonexistent.
Time and Generations
The heuristic model developed and explained above may be used as a tool to describe and analyse the position of individual immigrants and groups of immigrants at a certain point in time. But an important element in the logic of integration processes is the time factor. Integration of newcomers is a long-term process by its very nature. This immediately becomes apparent if we look through the lens of newcomers. At the individual level, adult immigrants may adapt cognitively and adjust their behaviour when they learn how things are done, by whom, and so on. This part is relatively easy and pays off quickly. However, their adaptation in the aesthetic (relating to the five senses) and normative realms takes more time. Feelings, likes, dislikes, and perceptions of good and evil remain rather persistent over a lifetime. Though this may be a general pattern for all human beings, it becomes especially manifest in those who have changed their environment through migration (for an overview of these aspects of the adaptation process see Van Amersfoort 1982, 35 ff.).
The situation of the descendants of immigrants generally differs in this respect. Although they do become familiarized with the immigrant community and possibly its pre-migration background through their primary relations in family and immigrant community networks, they simultaneously become thoroughly acquainted with the culture and language of the society of settlement, not only through informal neighbourhood contacts starting in early childhood but especially through their participation in mainstream institutions, particularly the education system. If such a double process of socialization takes place under favourable conditions (in which policies can play an important role), these second-generation young people develop a way of life and lifestyle that integrates the roles, identities, and loyalties of these different worlds and situations. Because the ways of doing this are manifold, more and more differentiation develops within the original immigrant group. At the group level, this means that the litmus test for integration as an end result (being an accepted part of society)—and hence for the success or failure of policies in this field—lies in the situation of the second generation in the host society.
In principle we can grasp the time factor by carrying out and comparing descriptive analyses of individuals and groups of immigrants at different points in time. In doing this, we should be cognizant of findings of previous historical comparative analyses. First, research indicates that integration processes are neither linear nor unidirectional. Although we have indicated before that the situation of migrants (first generation) differs significantly from that of their children and grandchildren, this does not imply that integration is the inevitable eventual outcome. On the contrary, the literature shows that setbacks may occur. Second, we should keep in mind that integration may progress at different paces in the three dimensions and even within a single dimension—for example, labour market integration may take longer than integration in the health care system. Third, we should not forget the receiving society, which changes with immigration and has to adapt its institutions to immigrants’ needs. For societies without a recent history of immigration or diversity, the process may be more demanding and therefore require more time than in immigration societies. | <urn:uuid:cb53a7dd-5946-4d2e-a048-e1a01e01bba9> | CC-MAIN-2022-33 | https://link.springer.com/chapter/10.1007/978-3-319-21674-4_2 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00405.warc.gz | en | 0.953782 | 2,987 | 3.0625 | 3 |
ISSA Nutrition Study Guide
Post 13 of 22
- ISSA Nutrition (SP) Study Home
- ISSA SN Chapter 1
- ISSA SN Chapter 2
- ISSA SN Chapter 3
- ISSA SN Chapter 4
- ISSA SN Chapter 5
- ISSA SN Chapter 6
- ISSA SN Chapter 7
- ISSA SN Chapter 8
- ISSA SN Chapter 9
- ISSA SN Chapter 10
- ISSA SN Chapter 11
- ISSA SN Chapter 12
- ISSA SN Chapter 13
- ISSA SN Chapter 14
- ISSA SN Chapter 15
- ISSA SN Chapter 16
- ISSA SN Chapter 17
- ISSA SN Chapter 18
- ISSA SN Chapter 19
- ISSA SN Chapter 20
- ISSA SN Chapter 21
Yet to sign up for the ISSA nutrition cert? My site visitors get a special discount here. You can even get this nutrition cert for free with the purchase of their personal trained cert (an excellent combo).
Post 13 of 22 in the ISSA Nutrition Study Guide
- Describe and define the main terms that relate to human anatomy.
- Know about the structure of cells.
- Find and understand the main systems we have in our bodies.
- Describe the varying muscle fiber types and the types of muscle contractions that we can go through.
Anatomy is simply defined as the structures of the body.
Physiology is simply defined as the function of the body.
This chapter is going to go over these two concepts as they relate best to sports science.
Cells, Cells, Cells
Our bodies are a biological phenomenon due to the many interdependent systems working together to maintain life. We have systems like the circulatory system which is needed to give the muscular system nourishment and also carry away the waste products we produce. The system for digestion is made up of many organs that work to break down things in the body. And we have many more systems that we will discuss throughout, and they are all made up of cells. Cells designed with different goals and processes in mind.
The Cell – Fundamental Unit of Life
Like every molecule has its own building blocks, our tissues and our structures do too. These are cells. The small units that give us life. We estimate that there are around 100 trillion cells with many different forms and functions spread throughout the average human body.
One crazy characteristic of cells is that they are able to reproduce themselves. They can actually only come from cells that existed before. The process starts with one cell in the form of the female’s egg, and the other in the form of the male sperm cell. These merge into a zygote, and then through multiplication and ordering we get to the trillions of cells we have in our body.
This process continues automatically, and all we really need to do is provide nutrients through our food.
The plasma membrane is like an inflated balloon. It is the outer membrane of the cell. This complex structure is mainly made of proteins and a phospholipid bilayer. The bilayer forms a double walled balloon structure where proteins are embedded within. Proteins provide structure for the membrane, they form channels that allow passage for certain things, they acts as receptors for important information, they may function as transports for some materials, and they give a marker for identification of the cells. These are essentially the functions of the plasma membrane.
The Nucleus was discovered over 150 years ago. It is placed in the center of the cell and it has its own membrane. This is the housing center for the DNA of the cell. Those strands of DNA together make up our chromosomes, for which we have 46 in total. These chromosomes contain our genetic information that decides how we look and how the body performs. We could call the nucleus the control center of the cell. The liquid between the nuclear membrane and the plasma membrane is known as the cytoplasm.
The ribosomes are an important organelle for cells. They play a role in synthesizing the proteins and cell parts we need. These ribosomes are going to be extremely tiny. They consist of protein and RNA. They are the most numerous organelles found in cells. We can find them spread throughout the cytoplasm or attached to the endoplasmic reticulum.
The endoplasmic reticulum is the next organelle to mention. This is an organelle that makes a network of canals in the cytoplasm and is involved in the transport of materials. The endoplasmic reticulum has two forms, the rough and the smooth forms. The smooth endoplasmic reticulum appears as smooth due to the absence of the ribosomes on the outside. And the opposite is true for the rough ER. We also have evidence of some lipid and cholesterol metabolism occurring in liver cells’ endoplasmic reticulums.
The Golgi apparatus is next. This is made up of stacks of oblong sacs that are embedded in the cytoplasm close to the nucleus. It actively modifies and transports some proteins. Some carbohydrate biomolecules have been seen to be produced through this organelle also.
The lysosomes are some structures like sacs that have their size and shape changed depending on what activity they will do. They begin as very small, and then when they are active we see them increase their size significantly. They contain many types of enzymes within. These are used to carry out varying chemical reactions and breaking down the components when the need be. These broken down components can then be used to synthesize new molecules by the cells. So, they play a very vital role to the formation of new components.
The mitochondria are the cells near the nucleus. They are the most discussed organelle of them all. They are often known as the powerhouse of the cell due to their role being the production of energy for everything we do. Different cells we have varying amounts of these important energy producing organelles. This is all based on if the cell needs to produce energy.
Tissues would be the fundamental units of function and for structure, if the cells are the fundamental units for life. We define tissues as the aggregation of cells that are bound together and work to perform one common function of some kind. Like our adrenal cortex for example. We see this working together to produce several related hormones. These are example of tissue.
These are tissues we see throughout our body in the forms of skin, the inner cavities of the body, or the makeup of some of the glands in the body. these tissues work to protect the cells that are underneath them from bacteria, chemicals, and drying. The epithelial tissues have four different groups that they can fall under.
Squamous epithelium is the tissue that is made up of mostly flat cells. It is located in our mouths, the esophagus, and the blood or lymphatic cells. Substances are easily able to diffuse through these.
Cuboidal epithelium is the second type. These tissues are those that are shaped like cubes and found throughout the tubules of the kidney.
Columnar Epithelium are the tissues that will look like pillars or columns. They are going to be found in the digestive tract and the respiratory tract mostly. They are used for either secretion or absorption. Some of them even contain some small hair cells known as cilia in order to increase the surface area of these tissues.
Glandular Epithelium are the fourth form of these tissues and they are specialized for the secretion of mucous and hormones. The examples would be the thymus glands and the salivary glands.
These tissues throughout the body are used for connection and for support. They join things together and they are made up of cells that are embedded in a nonliving matrix. The matrix’s nature determines the function of the cells, instead of the cells alone.
Even blood is going to be considered a connective tissue due to the containing of a fluid matrix and the cells being technically suspended within.
Connective tissues are made up of many constituents.
There are three main fibers that are kept in the connective tissues.
Collagen fibers are the really strong fibers that are going to form the fibrous parts of skin, tendons, ligaments, and teeth. They are made up of five main amino acids. collagen is going to give the connective tissue the versatility it needs to interconnect with the other molecules. These fibers are found in bundles and this gives them their exceptional strength.
Reticular fibers are the second type of fibers. These are very delicate fibers that provide support for the connective tissues that are found in the networks like the capillaries and the nerve fibers.
The elastic fibers are simply going to be the ones that are extendible and elastic in nature.
The main connective tissues are going to be cartilage, bones, tendons, and the ligaments.
Cartilage forms the bone tissue’s foundation. It is found at the ends of the bones and in the spinal disks. Matured cartilage does now have any nerves or blood vessels in it. We actually have three forms of cartilage in the body. the elastic cartilage in the ear and the Eustachian tubes, the tough fibrous cartilage that is between bones and the spinal disks, and hard hyaline cartilage that is at the ends of the bone also, and the nose, larynx, and trachea.
Bones are what forms our skeleton. This skeleton and the bones in it will act to support and protect the body. the bones resemble and differ from the cartilage. Like the cartilage, though, the bone is made up more of intracellular substances than of cells. These substances are hardened as opposed to the gel like appearance of cartilage. Collagen fibers are also inside the calcified matrix of bones. Inside this calcified matrix, the cells are quite alive. There are many blood vessels that are constantly delivering the food and oxygen for the cells.
The tendons and ligaments are grouped together. These are going to be very strong structures that are quite flexible also. They are our strongest tissues in the body actually. Their intracellular matrix is made up of collagen and reticular fibers that come from surrounding tendons. Tendons are thick and their main goal is to connect the muscles and the bones along with many other structures. Ligaments will join the bone to other bone, like in joints.
Muscle is about 43 percent of the total of a man’s weight and 34 percent for women. There are a total of around 620 muscles that all work together to support the skeletal system and create the motions we do every day. There are around 30 muscles we use to help with food and the digestive system, blood circulation, and the operation of some organs. For this book, the muscles will be primarily talked about as the main source of operation, energy expenditure, waste generation, and substantial nutrient needs.
Muscle may contract voluntarily or involuntarily. The voluntary muscle and their movements will come from the somatic nervous system, and this is all of our skeletal muscles. The involuntary muscle tissues are controlled by the autonomic nervous system, and these cannot be controlled by us.
We have two forms of muscle tissue that we see when looking under a microscope. These are striated muscles and smooth muscles. We can divide these into three categories.
Cardiac muscle tissue is striated and involuntary. It composes the heart muscle. It works to contract the heart, and that then pumps the blood through the body.
Smooth Muscle Tissue is smooth, and it is involuntary. It is found in the areas such as the tubular viscera of the digestive, respiratory, and genitourinary tracts. These will function to move substance through their respective systems. They contract slower than other striated muscles will and thus they do not fatigue quickly.
Skeletal muscle is found attached to bones, the eyes, and the upper third of the throat. The skeletal tissue will function to move bones and our eyes, or the food we swallow in the first parts of digestion. These muscles have very long cells with many nuclei. They rarely ever contract with one muscle alone. Instead we see sets of muscles contract in order to produce movement. the spine and the brain exercise control over these complex movement patterns through the use of nerve fibers.
Each cell does not have its own line from the CNS. Instead they get them to whole groups of these muscles at once and contract together.
The special sense organs in our muscles that help with control are called muscle spindles. They essentially measure the amount of strain in the muscle and preset tension.
The skeletal muscles will contract much more rapidly as responses to the CNS system.
Exclusive PTP Offers
|Gold Standard Cert||Most Popular Cert||A Good Option
|Best Study Materials||Best online PT course||The Top PT Software
The Mechanics of Muscular Contraction
The external view of the skeletal muscles make them appear as grainy due to the makeup of extremely small fibers. They are divided into bands and look like a stack of coins in a pile. Each fiber has its own sarcolemma, which is a small plasma membrane. Myofibrils are the tiny fibrils names. They number from some hundred, to several thousand. The sarcoplasm of the muscle cells has many nuclei within it. It also has many mitochondria.
The fibrils are made out of two different proteins. These are actin and myosin. They work together to contract the muscles.
Fast-Twitch and Slow-Twitch Muscle Fibers
There are these two forms of muscle fibers, fast and slow twitch.
Slow twitch fibers are the ones that produce power for lower intensity exercise, they have repetitive contractions, and they are mostly used for our endurance activities. The athletes in these long distance events and sports are more likely to have a high percentage of slow twitch fibers.
The fast twitch fibers are the ones that we recruit selectively for heavy workloads where we need maximum strength and power. These are seen more so in athletes that are in weightlifting and sprinting and similar sports.
This is simply defined as an increase in the size of the muscle fibers. The main mechanism at work is going to be an increase in the number of myofibrils.
Hyperplasia is the process of increasing the number of cells that are in the muscles. This is less often but occurs when fibers split.
All of the tissues in our body work together to form the functional units that we call systems. The body is essentially one whole system that is made up of subsystems. These subsystems are what we will call systems, even if the body is the real ‘system’.
This is made up of all of the bones in our body and the joints they are attached to or through. The main tissues here are going to be bones, cartilage, ligaments, and hematopoietic tissue.
Skeletal Muscle System
This is made up of the muscle tissues of our body that are responsible for movement and controlled by the somatic system. The muscles are limited to the storage of proteins in the form of amino acids. the use of these is not wanted for athletes due to the poor effects on the muscles.
This system is made up of all of our neurons, neuroglia, and the neurosecretory cells. They provide memory and integrate our bodily functions, control, and our communication.
This is made up of the organs of the nose, lungs, bronchi, trachea, larynx, and pharynx. They all function to connect the gaseous environment with our cells of the human body.
Cardiovascular (Circulatory) System
This is made up of the heart, the veins, the arteries, and the lymphatic system. This is in charge of circulation which is the movement of fluid, lymph, and blood through the body to carry important things around.
The five organs hear are the mouth, pharynx, esophagus, stomach, and the intestine, both small and large. These work together to control the intake and absorption of nutrients into the body so we can live and thrive.
This consists of the kidneys, the ureters, the bladder, and the urethra. They function to flush the waste from the body in the form of urine. It is a way to keep homeostasis of the body, which is the tendency to maintain equilibrium.
This system has the organs that function to make sperm in males and eggs that are fertile in the females.
This is the system that is made up of many organs all with their own hormones to produce. They function together to provide the body with its needed hormones for its very many functions. | <urn:uuid:6fda1935-e300-426c-80f8-3d2faa223323> | CC-MAIN-2022-33 | https://www.ptpioneer.com/issa-sn-chapter-12/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00004.warc.gz | en | 0.953772 | 3,565 | 2.890625 | 3 |
« PreviousContinue »
requiring for acts of legislation a majority of the states and a majority of the representatives of the people had prevailed through its own delegates.
In January 1788, the convention, having been organized in the state-house in Hartford, moved immediately to the North Meeting House, where, in the presence of a multitude, the constitution was read and debated section by section, under an agreement that no vote should be taken till the whole of it should have been considered.*
On the fourth, Oliver Ellsworth explained the necessity of a federal government for the national defence, for the management of foreign relations, for preserving peace between the states, for giving energy to the public administration. He pointed out that a state like Connecticut was specially benefited by the restraint on separate states from collecting duties on foreign importations made through their more convenient harbors.
Johnson added: While under the confederation states in their political capacity could be coerced by nothing but a military force; the constitution introduces the mild and equal energy of magistrates for the execution of the laws. "By a signal intervention of divine providence, a convention from states differing in circumstances, interests, and manners, have harmoniously adopted one grand system; if we reject it, our national existence must come to an end." +
The grave and weighty men who listened to him approved his words; but when the paragraph which gave to the general government the largest powers of taxation was debated, James Wadsworth, who had served as a general officer in the war, objected to duties on imports as partial to the southern states. "Connecticut," answered Ellsworth, "is a manufacturing state; it already manufactures its implements of husbandry and half its clothes." Wadsworth further objected, that authority which unites the power of the sword to that of the purse is despotic. Ellsworth replied: "The general legislature ought to have a revenue; and it ought to have power to defend the state against foreign enemies; there can be no government without the power of the purse and the sword." "So well guarded is this constitution," observed Oliver Wolcott, then lieutenant-gov*Penn. Packet for 18 January 1788. + Penn. Packet, 24 January 1788.
ernor, "it seems impossible that the rights either of the states or of the people should be destroyed." When on the ninth the vote was taken, one hundred and twenty-eight appeared for the constitution; forty only against it.*
The people received with delight the announcement of this great majority of more than three to one; at the next election. the "wrong-headed" James Wadsworth was left out of the government; and opposition grew more and more faint till it wholly died away.
The country from the St. Croix to the St. Mary's now fixed its attention on Massachusetts, whose adverse decision would inevitably involve the defeat of the constitution. The representatives of that great state, who came together on the seventeenth of October, had been chosen under the influence of the recent insurrection; and the constitution, had it been submitted to their judgment, would have been rejected. In communicating it to the general court, the governor most wisely avoided provoking a discussion on its merits, and simply recommended its reference to a convention from regard to the worth of its authors and their unanimity on questions affecting the prosperity of the nation and the complicated rights of each separate state.
Following his recommendation with exactness, the senate, of which Samuel Adams was president, promptly adopted a resolve to refer the new constitution to a convention of the commonwealth. On motion of Theophilus Parsons, of Newburyport, a lawyer destined to attain in his state the highest professional honors, the resolve of the senate was opened in the house. Spectators crowded the galleries and the floor.
* Penn. Packet, 24 January 1788.
B. Lincoln to Washington, Boston, 19 March 1788.
The conduct of Hancock in support of the constitution was from beginning to end consistent; and so wise that the afterthought of the most skilful caviller can not point out where it could be improved. Nathaniel Gorham, who had known Hancock long and well, in a letter to Madison of 27 January 1788, the darkest hour, places Hancock and Bowdoin foremost in the list of the managers of the cause of the constitution, naming them with equal confidence. Hancock, who was not wanting in sagacity, may have seen, and others may have let him know that they too saw, how much the support of the constitution would strengthen his position in public life; but at that time he had nothing to fear from the rivalry of Bowdoin, who had definitively retired.
Signs of a warm opposition appeared; the right to supersede the old confederation was denied alike to the convention and to the people; the adoption of a new constitution by but nine of the thirteen states would be the breach of a still valid compact. An inalienable power, it was said in reply, resides in the people to amend their form of government. An array of parties was avoided; and with little opposition a convention was ordered.
The choice took place at a moment when the country people of Massachusetts were bowed down by cumulative debts, and quivering in the agonies of a suppressed insurrection; the late disturbers of the peace were scarcely certain of amnesty; and they knew that the general government, if established, must array itself against violence. The election resulted in the choice of at least eighteen of the late insurgents. The rural population were disinclined to a change. The people in the district of Maine, which in territory far exceeded Massachusetts, had never willingly accepted annexation; the desire for a government of their own outweighed their willingness to enter into the union as a member of Massachusetts; and one half of their delegates were ready to oppose the constitution. On the other hand, the commercial towns of Maine, all manufacturers, men of wealth, the lawyers, including the judges of all the courts, and nearly all the officers of the late army, were in favor of the new form of general government. The voters of Cambridge rejected Elbridge Gerry in favor of Francis Dana; in Beverly, Nathan Dane was put aside for George Cabot; the members from Maine were exactly balanced; but of those from Massachusetts proper a majority of perhaps ten or twelve was opposed to the ratification of the constitution. Among the elected were King, Gorham, and Strong, who had been of the federal convention; the late and present governors, Bowdoin and Hancock; Heath and Lincoln of the army; of rising statesmen, John Brooks and Christopher Gore; The ophilus Parsons, Theodore Sedgwick, John Davis, and Fisher Ames; and about twenty ministers of various religious de nominations. So able a body had never met in Massachusetts. Full of faith that the adoption of the constitution was the *Ind. Gazetteer, 8, 9 January 1788.
greatest question of the age, the federalists were all thoroughly in earnest, and influenced by no inferior motives; so that there could be among them neither cabals in council nor uncertainty in action. They obeyed an immovable determination to overcome the seemingly adverse majority. As a consequence, they had discipline and concerted action.
It was consistent with the whole public life of Samuel Adams, the helmsman of the revolution at its origin, the truest representative of the home rule of Massachusetts in its townmeetings and general court, that he was startled when, on entering the new "building, he met with a national government instead of a federal union of sovereign states;" but, in direct antagonism to George Mason and Richard Henry Lee, he had always approved granting to the general government the power of regulating commerce.* Before he had declared his intentions, perhaps before they had fully ripened, his constituents of the industrial classes of Boston, which had ever been his main support, came together, and from a crowded hall a cry went forth that on the rejection of the constitution "navigation" would languish and "skilful mechanics be compelled to emigrate," so that "any vote of a delegate from Boston against adopting it would be contrary to the interests, feelings, and wishes of the tradesmen of the town."
The morning betokened foul weather, but the heavy clouds would not join together. The enterprising and prosperous men of Maine, though they desired separation from Massachusetts, had no sympathy with the late insurrection; and the country people, though they could only by slow degrees accustom their minds to untried restraints on their rustic liberty, never wavered in their attachment to the union. The convention was organized with the governor of the commonwealth as its president. The federalists of Philadelphia had handled their opponents roughly; the federalists of Massachusetts re
*The activity and wise and efficient support of the constitution by Samuel Adams I received from my friend John Davis, who was a member of the convention, and who was singularly skilful in weighing evidence. The account which he gave me is thoroughly supported by the official record.
+ Debates and Proceedings in the Convention, etc., published by the legislature of Massachusetts, edited by B. K. Peirce and C. Hale. The best collection on the subject.
solved never in debate to fail in gentleness and courtesy. A motion to request Elbridge Gerry to take a seat in the convention, that he might answer questions of fact, met no objection; and he was left to grow sick of sitting in a house to which he had failed of an election, and in whose debates he could not join. On motion of Caleb Strong, no vote was to be taken till the debate, which assumed the form of a free conversation, should have gone over the several paragraphs of the constitution.*
Massachusetts had instructed its delegates in the federal convention to insist on the annual election of representatives; Samuel Adams asked why they were to be chosen for two years. Strong explained that it was a necessary compromise among so many states; and Adams answered: "I am satisfied." This remark the federal leaders entreated him to repeat; all the house gave attention as he did so, and the objection was definitively put to rest.
Referring to the power of congress to take part in regulating the elections of senators and representatives, Phineas Bishop of Rehoboth proclaimed "the liberties of the yeomanry at an end." It is but "a guarantee of free elections," said Cabot. "And a security of the rights of the people," added Theophilus Parsons. "Our rulers," observed Widgery of Maine, "ought to have no power which they can abuse.” ‡ "All the godly men we read of," added Abraham White of Bristol, "have failed; I would not trust a flock, though every one of them should be a Moses."
On the seventeenth an official letter from Connecticut announced the very great majority by which it had adopted the constitution; but its enemies in Massachusetts were unmoved. Samuel Thompson of Maine condemned it for not requiring of a representative some property qualification, saying: "Men who have nothing to lose have nothing to fear." "Do you wish to exclude from the federal government a good man because he is not rich?" asked Theodore Sedgwick. "The men who have most injured the country," said King, "have commonly been rich men."
On the eighteenth the compromise respecting the taxation
* Elliot, ii., 3. | <urn:uuid:705b6e36-8c14-4645-abcb-e75bb116924d> | CC-MAIN-2022-33 | https://books.google.bs/books?id=U3QQAAAAYAAJ&pg=PA396&focus=viewport&vq=%22that+a+national+executive+be+instituted+%3B+to+consist+of+a+single+person%22&dq=editions:NYPL33433076150204&lr=&output=html_text | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00205.warc.gz | en | 0.979568 | 2,344 | 3.015625 | 3 |
Ujjain Knowledge Guide
Excavations at Kayatha (around 26 km from Ujjain) have revealed chalcolithic agricultural settlements dating to around 2000 BCE. Chalcolithic sites have also been discovered at other areas around Ujjain, including Nagda, but excavations at Ujjain itself have not revealed any chalcolithic settlements. Archaeologist H. D. Sankalia theorized that the chalcolithic settlements at Ujjain were probably destroyed by the Iron Age settlers.According to Hermann Kulke and Dietmar Rothermund, Avanti, whose capital was Ujjain, "was one of the earliest outposts in central India" and showed signs of early incipient urbanisation around 700 BCE. Around 600 BCE, Ujjain emerged as the political, commercial and cultural centre of Malwa plateau.The ancient walled city of Ujjain was located around the Garh Kalika hill on the bank of river Kshipra, in the present-day suburban areas of the Ujjain city. This city covered an irregular pentagonal area of 0.875 km2. It was surrounded by a 12 m high mud rampart. The archaeological investigations have also indicated the presence of a 45 m wide and 6.6 m deep moat around the city. According to F. R. Allchin and George Erdosy, these city defences were constructed between 6th and 4th centuries BCE. Dieter Schlingloff believes that these were built before 600 BCE. This period is characterised by structures made of stone and burnt-brick, tools and weapons made of iron, and black and red burnished ware.According to the Puranic texts, a branch of the legendary Haihaya dynasty ruled over Ujjain.
In the 4th century BCE, the Mauryan emperor Chandragupta annexed Avanti to his empire. The edicts of his grandson Ashoka mention four provinces of the Mauryan empire, of which Ujjain was the capital of the Western province. During the reign of his father Bindusara, Ashoka served as the viceroy of Ujjain, which highlights the importance of the town. As the viceroy of Ujjain, Ashoka married Devi, the daughter of a merchant from Vedisagiri (Vidisha). According to the Sinhalese Buddhist tradition, their children Mahendra and Sanghamitra, who preached Buddhism in modern Sri Lanka, were born in Ujjain.From the Mauryan period, Northern Black Polished Ware, copper coins, terracotta ring wells and ivory seals with Brahmi text have been excavated at Ujjain. Ujjain emerged as an important commercial centre, partially because it lay on the trade route connecting north India to the Deccan, starting from Mathura. It also emerged as an important center for intellectual learning among Jain, early Buddhist and Hindu traditions. After the Mauryans, Ujjain was controlled by a number of empires and dynasties, including local dynasties, the Shungas, the Western Satraps, the Satavahanas, and the Guptas.Ujjain remained as an important city of the Guptas during the 4th and the 5th centuries. Kalidasa, the great Indian classical poet of the 5th century who lived in the times of the Gupta king Vikramaditya wrote his epic work Meghadūta in which he describes the richness of Ujjain and its people. In the 6th century CE the Chinese pilgrim Xuanzang visited India. He describes the ruler of Avanti as a king who was generous to the poor and presented them with gifts. Bharthari is said to have written his great epics, Virat Katha, Neeti Sataka, the love story of Pradyot Princess Vasavadatta and Udayan in Ujjayini, as the city was called during his times. The writings of Bhasa are set in Ujjain, and he probably lived in the city. Kalidasa also refers to Ujjain multiple times, and it appears that he spent at least a part of his life in Ujjain. Mrichchhakatika by Shudraka is also set in Ujjain. Ujjain also appears in several stories as the capital of the legendary emperor Vikramaditya. Somadeva's Kathasaritsagara (11th century) mentions that the city was created by Vishwakarma, and describes it as invincible, prosperous and full of wonderful sights.
The Paramaras (9th-14th century CE) shifted the region's capital from Ujjain to Dhar. In 1235 CE, Iltutmish of Delhi Sultanate plundered the city, and destroyed its temples. With the decline of the Paramara kingdom, Ujjain ultimately came under the Islamic rule, like other parts of north-central India. The city continued to be an important city of central India. As late as during the times of the Mughal vassal Jai Singh II (1688-1743), who constructed a Jantar Mantar in the city, Ujjain was the largest city and capital of the Malwa Subah.
During the 18th century, the city briefly became the capital of Scindia state of the Maratha confederacy, when Ranoji Scindia established his capital at Ujjain in 1731. But his successors moved to Gwalior, where they ruled the Gwalior State in the latter half of the 18th century. The struggle of supremacy between the Holkars of Indore and Scindias (who ruled Ujjain) led to rivalry between the merchants of the two cities. On 18 July 1801, the Holkars defeated the Scindias at the Battle of Ujjain. On 1 September, Yashwantrao Holkar entered the city, and demanded a sum of 15 lakh rupees from the city. He received only 1/8th of this amount; the rest was pocketed by his officers. A force sent by Daulat Scindhia later regained control of Ujjain. After both Holkar and Scindias accepted the British suzerainty, the British colonial administrators decided to develop Indore as an alternative to Ujjain, because the merchants of Ujjain had supported certain anti-British people. John Malcolm, the British administrator of Central India, decided to reduce the importance of Ujjain "by transferring a great part of that consequence it now enjoys to the Towns of Indore and Rutlam cities, which are and will continue more under our control."After the independence India, Ujjain became a part of the Madhya Bharat state. In 1956 Madhya Bharat was fused into the State of Madhya Pradesh.
The Ujjain Simhastha is a mass Hindu pilgrimage, and one of the fairs recognised as Kumbh Melas. During the Simhastha, Hindus gather to bathe in a sacred river. At Ujjain, it is held once every 12 years, on the banks of Kshipra river. It is also known as Simhastha, when it falls during Jupiter's stay in Leo of Simha. The latest Simhastha was held in Ujjain from 22 April 2016 to 21 May 2016.
Ujjain does not have any airport but has an airstrip on Dewas road which is used for air transport purposes. In 2013, the Government of Madhya Pradesh started a Ujjain-Bhopal air services as a joint venture with Ventura AirConnect. Due to very low booking, the ambitious project was scrapped. The main reason for the failure of the plan was due to improper timing of flights. The nearest airport is the Devi Ahilyabai Holkar International Airport at Indore (57.2 km).
Ujjain Junction is the main railway station of Ujjain, and it is directly or indirectly well-connected to all the major railway stations in India. It lies on the Ratlam–Bhopal, Indore–Nagda and Guna–Khandwa route. To the west it is connected to Ratlam Junction, to the north it is connected with Nagda Junction, to the east it is connected with Maksi Junction, Bhopal Junction, and to the south it is connected to Indore Junction BG, Dewas Junction Harda BG.C&W Training Centre/Ujjain/WR There are five railway stations in the Ujjain city and its suburbs:
Dewas Gate Stand and Nana Kheda Bus Stand are the two bus stands in the city that provide service to destinations located in the states. A large number of state run private buses are available for Ahmedabad, Jaipur, Ajmer, Khajuraho, Harda, Indore, Bhopal, Pune, Mumbai, Kota, Mandu, Jhalawar and various other locations. The city has a well connected road network including Indore Road, Badnagar Road, Dewas Road, Agar Road, Nagda Road and Maksi Road. There are three state highways; 18 connects to Ahmedabad, 17 connects to jaora and 27 connects to Indore.Other regional highways passing through the city are: Indore – Ujjain Road via SH 27 Kota / Agar – Ujjain Road via SH 27 Bhopal / Dewas – Ujjain Road via SH 18 Ratlam / Barnagar – Ujjain Road via SH 18 Jaora / Nimach – Ujjain Road via SH 17 Maksi – Ujjain Road (Connects to NH 3) Harda - ujjain Road (Connects To Via NH 47)And SH 18 | <urn:uuid:9e518cd4-e067-45de-8f4e-f65f443e6ea7> | CC-MAIN-2022-33 | https://theindiantrip.com/ujjain-city/info | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00405.warc.gz | en | 0.970595 | 2,075 | 3.234375 | 3 |
St George's, Hanover Square, is an Anglican church in the City of Westminster, central London, built in the early eighteenth century as part of a project to build fifty new churches around London (the Queen Anne Churches). The church was designed by John James; its site was donated by General William Steuart, who laid the first stone in 1721. The building is one small block south of Hanover Square, near Oxford Circus. Because of its location, it has frequently been the venue for society weddings.
|Location||City of Westminster, London|
|Denomination||Church of England|
|Heritage designation||Grade I|
|Parish||St. George, Hanover Square with St. Mark|
|Rector||Rev. Roderick Leece|
|Organist/Director of music||Simon Williams|
A civil parish of St George Hanover Square and an ecclesiastical parish were created in 1724 from part of the ancient parish of St Martin in the Fields. The boundaries of the ecclesiastical parish were adjusted in 1830, 1835 and 1865 when other parishes were carved out of it. The ecclesiastical parish still exists today and forms part of the Deanery of Westminster St Margaret in the Diocese of London.
The land for the church was donated by General Sir William Steuart. The church was constructed in 1721–25, funded by the Commission for Building Fifty New Churches, and designed by John James, who had been one of the two surveyors to the commission since 1716. Its portico, supported by six Corinthian columns, projects across the pavement. There is a tower just behind the portico, rising from the roof above the west end of the nave.
The interior is divided into nave and aisles by piers, square up to the height of the galleries, then rising to the ceiling in the form of Corinthian columns. The nave has a barrel vault, and the aisles transverse barrel vaults.
St George's was opened in the new residential development of Hanover Square with no attached churchyard. Its first burial ground was sited beside its workhouse at Mount Street. When this filled up a larger burial ground was consecrated at Bayswater in 1765. They were closed for burials in 1854, when London's city churchyards were closed to protect public health. Burials at St George's included Mrs Ann Radcliffe (1764–1823), an influential female writer of the "Gothic Novel", the Revd. Laurence Sterne (1713-1768), abolitionist and author of Tristram Shandy, and Francis Nicholson, British military officer and colonial administrator.
The Mount Street ground was later cleared of monuments and turned into a small park. Some of the old tombstones were used for guttering and drainage, and may be seen today. During the First World War the Bayswater ground was covered with 4' of top soil and used for growing vegetables. In 1969 the burial ground was cleared to enable land to be sold off for redevelopment. A skull, part anatomised, was conjectured to be Sterne's and a partial skeleton separated from the other remains to be transferred to Coxwold churchyard by the Laurence Sterne Trust. 11,500 further remains were taken to West Norwood Cemetery and cremated, for burial there.
In popular cultureEdit
In the Sherlock Holmes 1892 story The Adventure of the Noble Bachelor it is the setting of the wedding of the eponymous Lord St Simon and American Hatty Doran, whose disappearance sparks Holmes' investigation.
In the musical My Fair Lady (1956), Alfred Doolittle (Stanley Holloway), having just been provided with an inheritance and having to move into "middle-class morality", invites his daughter Eliza Doolittle (Audrey Hepburn) to his wedding at this church. Following the invitation, he and his fellows sing "Get Me to the Church on Time".
The church is mentioned as the venue for the forthcoming marriage of Iris Henderson in The Lady Vanishes.
Handel was a regular worshipper at St George's, which is now one of the venues used by the annual London Handel Festival. He used to play the organ, and wrote Messiah in the church. St. George's has a full-time professional choir and a strong choral tradition and is a venue for classical music concerts. A Restoration Fund Appeal was launched on Trinity Sunday 2006 to raise a total of five million pounds, with a target of one and a half million pounds needed for the first phase of essential restoration work to the fabric of the church. A recent concert series in support of the Restoration Fund was supported by the William Smith International Performance Programme and featured solo piano performances by students from the Royal College of Music, including Ren Yuan, Ina Charuashvili, Meng Yan Pan and the London debut of Maria Nemtsova of Russia.
The following have served as rector of St George's, Hanover Square:
- 1725–1759 – Andrew Trebeck
- 1759–1774 – Charles Moss (as Bishop of St David's 1766–74, later Bishop of Bath and Wells)
- 1774–1803 – Henry Reginald Courtenay (as Bishop of Bristol 1794–97, Bishop & Archdeacon of Exeter 1797–1803)
- 1803–1844 – Robert Hodgson (as Archdeacon of St Alban's 1814–16, Dean of Chester 1816–20, Dean of Carlisle 1820–44)
- 1845–1876 – Henry Howarth
- 1876–1890 – Edward Capel Cure
- 1891–1911 – David Anderson
- 1911–1933 – Norman Thicknesse (as Archdeacon of Middlesex 1930–33)
- 1933–1940 – Henry Montgomery Campbell (later Bishop of Willesden, Kensington, Guildford, and London)
- 1940–1955 – Stephen Phillimore (as Archdeacon of Middlesex 1933–53)
- 1955–2000 – William Maynard Atkins
- 2001–2004 – John Slater
- 2005 – Roderick Leece
From its early days, the church was a fashionable place for weddings, which have included those of:
- Sir Francis Dashwood, founder of the second Hellfire Club, later Chancellor of the Exchequer, and Sarah, daughter of George Gould of Iver, Buckinghamshire, and widow of Sir Richard Ellis, Baronet, on 19 December 1745.
- Viscount Stopford and Mary Powys, 19 April 1762
- Henry Holland and Bridget Brown, a daughter of Capability Brown, on 11 February 1773.
- William Hodges and Martha Bowden Nesbit, on 11 May 1776.
- The botanist and antiquary Edward Rudge (1763-1846) married the botanical illustrator Anne Rudge here in 1791.
- John Nash, architect, and Mary Ann Bradley on 17 December 1798.
- John Shaw (1776–1832), architect, and Elizabeth Hester Whitfield in 1799.
- Sackville Tufton, 9th Earl of Thanet, and Anne Charlotte de Bojanowitz, on 28 February 1811
- Joseph Wolff (1795–1862), German-born Christian convert, known as “the missionary to the world”, in 1827.
- Sir John Ogilvy, 9th Baronet, and Juliana Barbara, a daughter of Lord Henry Howard-Molyneux-Howard, on 7 July 1831.
- Theodore Roosevelt, future United States President, aged 28, and Edith Carow, aged 25, on 2 December 1886.
- Leopold Albu, of 4 Hamilton Place, Mayfair, the brother of Sir George Albu, to Adelaide Veronica Elizabeth Burton, daughter of Edgar Henry Burton, and granddaughter of Henry Marley Burton, on 19 August 1901.
- Alfreda Ernestina Albertina Bowen, daughter of Sir George Ferguson Bowen and Diamantina, Contessa di Roma, and Robert Lydston Newman, in October 1899.
- Euphemia Dunsmuir, daughter of Robert Dunsmuir, and Somerset Gough-Calthorpe, February 27, 1900
- John Galsworthy, Nobel Prize in Literature recipient and Ada Nemesis Cooper on 23rd September 1905 after a 10-year affair.
- Henry Hall, band leader, and Margery Harker, a girl he had met on a train, January 1924.
- The actress Charlotte Wattell married Thomas Sandon here in 1799.
High society weddings at St. George's Hanover Square fell in numbers in the late 20th century, a social change discreetly mentioned in the obituary of the Reverend W. M. Atkins, Rector of St George's from 1955 to 2000.
- Youngs, Frederic (1979). Guide to the Local Administrative Units of England. Vol. I: Southern England. London: Royal Historical Society. ISBN 0-901050-67-9.
- "A new church". St George's Hanover Square. Retrieved 3 May 2015.
- Bradley, Simon; Pevsner, Nikolaus (2003). London 6: Westminster. The Buildings of England. Yale University Press. p. 480.
- Downes, Kerry (1987). Hawksmoor. World of Art. London: Thames and Hudson. p. 104.
- Hansard 11 February 1964
- Is This the Skull of Laurence Sterne? The Times 5, 7 & 16 June 1969
- "Weddings". stgeorgeshanoversquare.org. Retrieved 4 May 2015.
- "Richards, Fowkes & Co. - Opus 18". richardsfowkes.com. Retrieved 4 May 2015.
- "London Handel Festival". Retrieved 19 March 2016.
- "Who's Who – Organisation", Orpheus Foundation, accessed 3 July 2013
- "Rectors". St George's Hanover Square. Retrieved 7 July 2020.
- "Howarth, Henry (HWRT818H)". A Cambridge Alumni Database. University of Cambridge.
- "Anderson, David (ANDR861D)". A Cambridge Alumni Database. University of Cambridge.
- Prebendary Bill Atkins (obituary) at telegraph.co.uk
- Perry, Maria (1999). Mayfair Madams. London: André Deutsch. pp. 87–93. ISBN 0-233-99476-9.
- Albert Frederick Pollard, "Dashwood, Francis", in Dictionary of National Biography (London: Smith, Elder & Co. 1901) pp. 112–115
- STOPFORD, James, 2nd Earl of Courtown, History of Parliament online
- Dorothy Stroud, "Henry Holland His Life and Architecture", Country Life 1966, p. 36
- John Summerson, The Life and Work of John Nash Architect (George Allen & Unwin, 1980), p. 30
- Dictionary of National Biography. London: Smith, Elder & Co. 1885–1900. .
- George Edward Cokayne, ed. The Complete Baronetage, vol 2. (Exeter: William Pollard, 1900), p. 317
- Charles Mosley, editor, Burke's Peerage, Baronetage & Knightage, 107th edition, 3 volumes (Wilmington, Delaware, U.S.A.: Burke's Peerage (Genealogical Books) Ltd, 2003), volume 1, page 66
- "Anglo-Colonial Notes", in the Evening Post (Wellington, New Zealand), dated 24 November 1899, p. 5
- Henry James Morgan, Types of Canadian Women and of Women who are or have been Connected with Canada (Williams Briggs, 1903), p. 42
- Mottram, Ralph Hale (1956). For Some We Loved: An intimate portrait of Ada and John Galsworthy. London: Hutchinson. p. 71.
- Henry Hall, Here's to the Next Time (London: Odhams Press, 1955), pp. 56–57; "Hall, Henry R, & Harker Margery" in Register of Marriages for St. George's Hanover Square Registration District, vol. 1a (1924), p. 648
- The Seasonal Papers Printed by Order of the House of Lords, Great Britain. Parliament. House of Lords (1847-8) - Google Books | <urn:uuid:bb2808b1-9609-4c3d-806a-c3dbcd8d502b> | CC-MAIN-2022-33 | https://en.m.wikipedia.org/wiki/St_George%27s,_Hanover_Square | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00005.warc.gz | en | 0.911289 | 2,827 | 2.84375 | 3 |
Parks for people's leisure and recreation can be seen everywhere in the city, and rockeries for workers'leisure can also be seen everywhere, but the method of making rockeries is particularly unique. Firstly, according to the rockery model made by landscape engineers, it is built with waste masonry materials. The shape of masonry is roughly the same as that of the rockery model planned by planners. In order to save information, hollow stone chambers can be built in masonry, and then reinforced concrete slabs can be used to cover the roof, leaving doors and vents. When the embryonic shape of masonry is completely built, the natural stone surface is imitated with 1:2 or 1:2.5 cement mortar. Cement rockeries made of this structure form, there are hollow rockeries, there are solid rockeries, will generally choose hollow rockeries, hollow is now the mainstream practice of cement rockeries.
The manufacturing process of rockery can be divided into nine steps.
1. positioning and lofting: positioning and lofting according to drawings, models and site conditions.
2. Embedding of pre-embedded parts: 70*100*6 pre-embedded parts are selected for cast-in-situ plate, 1.5-2.5 m distance; 70*100*6 pre-embedded parts are selected for structural column, 2 m distance.
3. Skeleton Manufacturing: The main data are 50 x 50 x 5 angle steel, 30 x 30 x 3 angle steel is not necessary, and rust-proof paint is applied. First, plastic-stone square skeleton is manufactured. The distance scale of skeleton angle steel is generally controlled between 1.8 and 2.5 M. Welding method is selected for joining. Then, the skeleton angle steel is inclined to the left and the right according to the model to make the approximate shape of the rockery.
4. Reinforcement mesh: After the frame is manufactured, the steel mesh is manufactured with 6 round steel. Welding method is used for the connection of steel mesh and angle steel and the connection of steel and reinforcing steel. The reinforcing steel mesh is controlled at about 18 *18-25 *25cm2, and the natural shape of initial bump and rugged is shaped according to the model.
5. Wire mesh: After the steel mesh is manufactured, the standard wire mesh of 3 *1/4 (4 mesh) is tied to it.
6. Plastering: After the wire mesh device is completed, the bottom layer is plastered with 1:1 cement mortar, the thickness is about 1-1.5 cm; after the first completion, the second plastering is carried out, the thickness is about 1.5 cm. After the two-layer plastering of the exposed part of the rockery is completed, the inner mortar of the rockery is polished in time with a thickness of about 1 cm.
7. Modeling: According to the model and the raw materials of the orogenic rocks, the plastic rockery is modeled to create veins and stripes.
8. Colouring: According to the extreme effect of the position of the moulded rocks, the appropriate iron oxide pigments are selected for adjustment and colouring.
9. surface oil: final surface oil treatment.
In summary, all the Jinan Jinxiu Landscape Company provide, want to know more about Jinan rockery production knowledge, welcome to pay attention to our website: http://www.lounge-f.com Thank you for your support! | <urn:uuid:e5433985-3a7b-43bd-9a56-475cdbba4556> | CC-MAIN-2022-33 | http://m.lounge-f.com/news/366.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00203.warc.gz | en | 0.705932 | 2,582 | 3.0625 | 3 |
Indian Ocean Tsunami:
Why did the Information Not Get Out? by Michel Chossudovsky
February 7, 2005 GlobalResearch.ca
- 2005-06-17 The tsunami warning system was examined in two earlier texts:
The text below examines the broader seismic network as well as the system of satellite imagery, which provides data in
near real time.
(link to complete article at the end of this summary)
of the most destructive and powerful earthquakes in recorded history, more than a quarter of a million recorded deaths, local
economies destroyed, the lives of entire communities shattered, and no serious investigation into the flaws of the global
seismic warning system is contemplated.
According to Columbia University's Earth Institute
the M-9.0 Sumatra – Andaman Island earthquake on December 26th released energy, equivalent roughly to 700 million Hiroshima
Seismic information regarding what scientists identify as a "rare great earthquake", was available in near real
time (i.e. almost immediately) to seismic centers around the World.
Other types of data, including satellite imagery
were also available in near real time.
The advanced global seismic information and communications systems were fully
Why then, did the information not get out on the morning of December 26th?
Ten of thousands of
lives could have been saved.
The issue has been skirted by the Western media, sidestepped by the governments and the
UN, not to mention the international scientific community.What Happened on the Morning of December
The tsunami was triggered within minutes of the earthquake, prior to the release of the first
tsunami advisory bulletin by the Pacific Tsunami Warning Center (PTWC) in Hawaii, so it was no longer a question of emitting
"a warning" of an imminent danger. The catastrophe had already happened.
In other words, by the time the first tsunami
bulletin had been issued at 01.14 GMT, the deadly seismic wave was already sweeping Banda, the capital of Aceh province in
Northern Sumatra, causing thousands of deaths.
This ex post facto bulletin emitted by the PTWC, did not even warn of
the potential danger of a tsunami. Moreover, it casually dismissed an established and scientifically accepted relationship:
"If it were a 9 earthquake ... with the thrusting in an ocean basin margin, the likelihood is almost 1:1 that it
would generate a tsunami" (Dr. Charles Groat, Director, US Geological Survey in testimony to the Science Committee of
the US House of Representatives, 26 Jan 2005).
Tip of the Iceberg
The PTWC bulletins are but the tip of the iceberg.
The information on the quake was known and available in real time, to an entire network of seismic organizations.
was also on hand and accessible to a number of government agencies both in the US and internationally, almost immediately.
Numerous officials, scientists, members of the military and intelligence services, had advanced knowledge of an impending
In other words, we are not dealing with the failures of a single warning Center in Ewo, Hawaii, but with
an entire Worldwide network of seismic information, satellite imagery and other sophisticated data, which was available almost
immediately.Who informs Whom?
The question is not why the PTWC did not
emit a tsunami warning, but why did an entire global network of scientists and officials not emit a warning, in relation to
one of the largest quakes in recorded history.
While the PTWC had indeed formally notified Washington and the Military
at the Diego Garcia island base, the US government and military already knew, because the seismic data had been processed
within minutes by an agency under the jurisdiction of the US Department of the Interior, namely the National Earthquake Information Center
(NEIC) based in Golden, Colorado.
The data regarding the magnitude of the earthquake originated from four seismic
stations located in the Indian Ocean, operated by the International Deployment of Accelerometers (IDA) Project
."Received signals three minutes, thirty seconds after the quake began"
testimony to the US Congress (Jan 26, 2005), Scripps (SIO) Deputy-Director John Orcutt which overseas the Indian Ocean IDA
seismic stations confirmed that on December 26, the data pertaining to the Sumatra-Andaman quake had been "immediately
and automatically forwarded by computer to the USGS National Earthquake Information Center (NEIC) in Golden, Colorado
and the NOAA tsunami warning centers in Hawaii and Alaska"The US Military Base at Diego
The first news reports underscored the fact that the US military base at Diego Garcia had been
given advanced warning, but that the information reached military officials at the US island naval base "after" the tsunami
had hit India and Sri Lanka:
"An NOAA log shows that the US Pacific Command, including Diego Garcia, was given a specific warning about
the tsunami some two and three quarter hours after the earthquake" (The Guardian, 7 Jan 2005)
These earlier reports must be qualified. The fact of the matter, is that the data concerning the earthquake originated
from monitoring stations situated in the Indian Ocean, including the The IDA/IRIS seismic station DGAR (Diego Garcia)
seismic station located directly on the site of the US island military base.
Moreover, in addition to the IDA/IRIS
stations, the International Monitoring System (IMS) of the Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty Organization
based in Vienna, operates several stations in the Indian Ocean region, three of which are located in the Chagos Archipelago
(British Indian Ocean Territory). Two of these stations are situated directly on the site of the US military base.
are in all four monitoring stations in the Chagos archipelago, which use the communications system of the US military base.
other words, the US military base at Diego Garcia
, with its advanced monitoring facilities, research labs, etc. was not the "recipient" but rather "the source" of the relevant
data regarding the earthquake.Satellite Imagery transmitted in Real Time
addition to real time seismic data (as well as hydroacoustic, infrasound and radionuclide data transmitted out of Diego Garcia),
satellite images of the disaster on the North Sumatra coastline were also available in near real time to a number of agencies
and international organizations.
The US has an advanced "spy satellite" system, with very precise capabilities of monitoring
the terrain, including changes in the natural environment, not to mention moving objects. The National Reconnaissance Office (NRO)
, which was responsible for launching the first spy satellites of the Cold War era operates a sophisticated system of reconnaissance
satellites, which transmit imagery and other data in real time.
Another key US body, involved in satellite imagery
is the National Geospatial-Intelligence Agency, (NGA)
, formerly known as the National Imagery and Mapping Agency. The latter was in fact the architect of the global positioning
system (GPS), which was conducive to creating a system of global geospatial intelligence (GEOINT).NGA
is part of the US defense system, it serves the Department of Defense and the intelligence community. It has very precise
capabilities of monitoring the geographic and physical terrain by satellite, all over the world, using the techniques of geospatial
In other words, state of the art satellite imagery (available to military, intelligence, civilian
as well as private commercial entities) provides "a real time set of eyes". With regard, to the M-9.0 tsunami of December
26, satellite images were available almost immediately. The US military confirms in this regard, that it has access from its
satellite systems "to vital intelligence in real time". These real time images were used extensively in the Iraq and Afghan
war theaters. (Hearings of Sen Armed Services Committee, 25 Feb 2004).The Role of the European
Real time seismic and other data (including satellite imagery) were also available to
a number of countries including Russia, China, Japan and the European Union.
In this regard, The European Space Agency (ESA)
, which has links to NOAA, has "multi-sensor access" in real time to data from satellites including very precise imagery which
"for complete large-scale phenomena to be observed to an accuracy and entirety it would take an army of ground
level observers to match"
In addition to imagery, the satellite transmits other relevant data which measures very accurately "ground motion"
and "sea height":
While "before" and "after" images of the disaster have been made public, the images which show the
progress and movement of the tsunami, in the period immediately following the earth quake have not been released.Concluding Remarks: The Need for an Investigation into the Warning System
More than a quarter
of million people have died in one of the World's most devastating natural disasters.
The overriding issues pertaining
to the warning / information systems, cannot be drowned or brushed aside. They must be the object of a full-fledged inquiry,
preferably by an independent body.
This report has outlined a number of broad issues pertaining to the global information
network. The latter requires detailed examination in the context of full-fledged inquiry.
What agencies in the US,
the European Union, in the Indian Ocean countries and internationally were informed? The failures are by no means limited
to the US seismic network.
When were they informed? What type of data did they have? Some of that data has not been
Why did the information not reach the people on time in the countries affected by the tsunami?
factors, administrative, scientific or otherwise, contributed to preventing the information from being transmitted?
are not dealing strictly with seismic data. Satellite images of the devastation in Northern Sumatra were also available. Other
types of data were also transmitted in near real time by satellite.
The approximate speed of the seismic wave was known
and confirmed. According to the news reports, the tsunami was moving at a speed of roughly 20 km a minute (on average) in
relation to Sri Lanka.
The seismic information was known to the NEIC and other seismic centers within less than four
minutes after the quake.
The tsunami hit the Indonesian coast within 5 minutes, in other words 10 minutes before the
release of the first TPWC bulletin. Banda Aceh was hit by the tsunami 11 minutes after the earthquake, approximately 3 minutes
before the release of the TPWC bulletin.
In other words, it was possible to predict in a very precise way, at what
time the seismic wave would hit the coastlines of Thailand, Sri Lanka, India, The Maldives and Somalia. Had this information
been transmitted in a consistent fashion, there would have been ample time to evacuate people from the coastal areas of Sri
Lanka, India, not to mention the East coast of Africa.
There are no Ocean sensors in the Indian Ocean. But this was
not the cause of the failures and omissions in the warning system.
The tsunami became active immediately following
the earthquake. No warnings were sent out following the seismic readings despite the fact that the tsunami had already hit
the Indonesian coast.
This is the key issue.
The Tsunami was active, and this was known, corroborated not only
by seismic information but also by satellite images and other data, roughly 30 minutes prior to hitting Thailand.
Read the complete article with all essential links and charts included atGlobalResearch.ca
© Copyright Michel Chossudovsky, GlobalResearch.ca
Quotes from the article:
"The information on the quake was known and available in real time, to an entire network of seismic organizations.
It was also on hand and accessible to a number of government agencies both in the US and internationally, almost immediately.
Numerous officials, scientists, members of the military and intelligence services, had advanced knowledge of an impending
In other words, we are not dealing with the failures of a single warning Center in Ewo, Hawaii,
but with an entire Worldwide network of seismic information, satellite imagery and other sophisticated data, which was available
"... what efforts, if any, were made to contact those other nations in the region that were also in harm’s
way? If NOAA did not have the appropriate contacts, as has been reported, why was this the case? Was an attempt made to obtain
that contact information – and if not, why not? These are questions that must be answered.”
The Western media not only failed to address the failures in the warning system, they admonished those who raised the
In fact, any serious analysis of the warning system was dismissed outright.
NOTE: Today all mayor TV stations around the world report about the tsunami anniversary and they all have the same statement
Nobody could have predicted the catastrophe.
The above article proves that this statement is false.
More than a quater of a million victims really deserve something better. | <urn:uuid:d33b324e-11a7-413f-be2e-7e75299b401d> | CC-MAIN-2022-33 | https://johnmccarthy90066.tripod.com/id638.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00004.warc.gz | en | 0.949391 | 2,789 | 3.21875 | 3 |
During the first week in June of this year a major planetary conjunction will occur in the constellation of Taurus, (the Bull).
On June 2nd the moon passes below, (south) of the solar position so that at noon their positions relative to the constellation lines of Taurus’ occur as depicted at right.
A conjunction of Jupiter and Saturn occurs every 20 years
A Jupiter-Saturn conjunction occurs opposite the Sun on average every 300 years.
A Jupiter / Saturn / Solar con-junction, in the constellation of Taurus, then occurs on average only once every 3600 years.
In researching the hypothesis that the "Great Ennead", mentioned in Ancient Egyptian writings, was reference to a ‘grand’ astronomical conjunction in our present age, I discovered a marked correlation between the ‘Taurus 2000 Conjunction’ and the interior design of the Great Pyramid.
From its intended eastern vantage, the cross-section of the Great Pyramid’s corridors has several points of similarity to the constellation lines of Taurus.
Moreover, the location of its chambers correlate to the position of the sun, moon and planets with the constellation lines of Taurus, at this particular time and location.
- The Sun correlates to the King’s Chamber
- Venus to its Antechamber ;
- the Moon correlates to the Queen’s Chamber ;
- Jupiter and Saturn to the northern ‘star-shafts’ ;
- Mars and Mercury to the southern ‘star-shafts’.
- The subterranean chamber is then a connective link to the constellation of Orion : (Osiris).
Did the Ancient Egyptians believe some event of great import may occur at this time? If so, what could it be?
The reason I was looking for astronomical conjunctions in the first place was that this premise flowered at the end of a very tall logic-tree. This ‘tree’ has two main ‘trunks’ (1) GDT: a proposed system of physics with characteristics differing from "modern Physics" (2) Ancient Egyptian Physics: an interpretation of Ancient Egyptian writings and geometry as a symbolic, metaphoric scientific language, in particular consonance with the principles of G-D Physics.
Highlights of GDT Logic Tree:
- G-D Physics indicates that the cores of stars are composed of dense heavy metals. The interior of the stellar core is stable, (non-reactive) while the core’s surface is a maelstrom of fission, fusion and productive reactions. (Chapter 7)
- Productive reactions (i.e., resulting in a net increase in mass) occur when an atom’s electrical field is so constrained by its surrounding gravitational / electrical fields as to be unable to release energy. Vibrational energy absorbed by the atom is then transformed into new particles of matter. (Chapter 7)
- In general, stars continually increase in mass until a critical core-fission event results in a mega-scale eruption of material. These events, the nova and supernova, culminate in the material for new stars, planets, and nebulae. Thus, beginning from a single star, the result would be a galaxy, or a universe. (Chapter 7)
- Planets with active cores are also inferred as to be mass productive; thus, the Earth’s mass, volume, and surface area have been slowly increasing for eons. Volcanic eruptions, mountain building, earthquakes and continental spreading are all causally connected to mass-increase in the core. (Chapter 8)
- Large-scale fauna in the primeval past, (dinosaurs being the premier example), were able to exist simply because the planet’s surface gravity was less than it is today. (Chapter 8)
- Core-fission events in the Earth’s pre-history have led to mass extinctions of life-forms. The primary example is the Permian Catastrophe, in which 90-95% of existent species went extinct, 250 million years ago. It is proposed this was caused by a mega-volcanic eruption in the Eastern Pacific, which melted a continent and gave birth to the Moon. (Chapter 8)
An Ancient Egyptian Science
During the development of the parameters of gravity-induced ellipsoidal space, I noticed a curiously intriguing similarity to the interior design of the Great Pyramid at Giza. Further research showed a strong congruency to the hypothesis that the Great Pyramid works out the parameters of 4-D Space as influenced by a gravity vector of 0.44c : (Chapter 9)
This might be considered as coincidental, except that a sufficient number of other geometrical correlations are found as to rule out "simple" coincidence. (Chapters 9-10) Furthermore, from the premise that the Ancient Egyptian gods, "neters", are in fact, "natures", i.e., symbolic, metaphorical, representations of the principal forces of Nature, a near-perfect congruency is found with G-D Physics. Thus, it appears that "Ancient Egyptian Physics" and G-D Physics are one and the same. Given the G-D code-key then, the principle natures in the Ancient Egyptian pantheon are readily decoded: (Chapter 11)
Atum, the neter who created the universe, while standing on a mound composed of himself, represents atoms, (which create new mass in the universe).
Atum-Ra is the Sun, as creator of the solar system.
Nun, the vacuum of outer space, is held at bay by Shu, the earth’s atmosphere.
Thoth is declared to be the "heart", or center, of Ra, while somehow simultaneously residing in the underworld, (in the center of the Earth) and in the Moon as well. Taken literally, this appears to make little sense, but when Thoth is interpreted as representing the force of gravity, a strong correlation is found.
Thoth is said to have retrieved Ra’s lost eye, (i.e., gravitational capture of planets), to have determined the shape of the Earth, (gravity shapes the earth) and to guide the course of the stars, (gravitational orbits).
Thoth has existed since the beginning of the universe; was created by the power of utterance, but was the inventor of speech. This apparent contradiction is resolved when it is realized that sound waves are gravity waves ; thus, changes in the position of mass, (vibrations) create gravity waves, which carry sound.
It appears that Egyptian mythology is multi-dimensional symbology, functioning on different levels of meaning within different contexts. This is even hinted at in verses which refer to the Doubles of the gods, (i.e., double meanings). Thus, previous interpretations, within religious, historical, or astronomical contexts, are not considered as contradicted by the scientific interpretation; but rather, should be regarded as alternate intended meanings.
Osiris, generally regarded as the most important Ancient Egyptian neter, eternally resides in the underworld on a throne of divine metal ; Osiris is inferred to represent the metallic core of the planet.
"The Story of Osiris" (Chapter 12) is a condensed geologic history of the planet, the principal characters being Isis, (the force of mass-energy creation) and Set, (the force of destruction). After Set hacks Osiris’ body into fourteen pieces, (continental plates) Isis fashions a clay (volcano) and mounting it, gives birth to Horus, (the Moon). This then refers to the Permian / Lunar event of 250 million years ago. The Pyramid Texts refer to an event of similar magnitude: not one in the distant past, but in a distressingly imminent future:
"The King ascends to the sky in an earthquake"
"The sky thunders, the earth quakes, Geb quivers, the two domains of the god roar, the earth is hacked up, and the offering is presented to me. I ascend to the sky, I cross the iron sky, I traverse the [waters of Nun]. I demolish the ramparts of the atmosphere … I ascend to the sky among the Imperishable Stars … I sit on my throne of divine metal, the faces of which are those of lions, and its feet are the hooves of the Great Wild Bull."
G-D Physics predicts such an eventual life-ending fate for the planet, but does not say when; Ancient Egyptian Physics, however, appears to be much more sophisticated, with centuries of hidden tradition underlying its science. They provide us an exact date for when this event will begin.
Bearing in mind that in a geologic time-scale the earth’s core undergoes periodic disruptive episodes, and that as it approaches the criticality of a core-fission event, the core becomes more sensitive to slight changes in the gravitational field, then, a conjunction of the major tidal gravitational influences on the planet could herald the beginning of the core-fission event. Thus, a very sophisticated science, having approximated the time-frame of criticality, could predict the exact conjunction which would initiate the event.
The "opening of the mouth" (core-fission event) with the "adze of wepawawet" (line of greatest gravitational force by external planetary bodies) describes this occurrence. The crucial grand conjunction is then described as, "the Great Ennead in the Mansion of the prince in the City of the Sun".
"… O Osiris-King, I open your mouth for you with the adze of Wepwawet, I split open your mouth for you with the adze of divine metal which split open the mouths of the [stars] … Horus has split open the mouth of this Osiris-King … with the adze of divine metal which split open the mouths of the [stars]. The King’s mouth is split open with it, and he goes and himself speaks with the Great Ennead in the Mansion of the Prince which is in On …"
If I have correctly read all the branches on the deductive inductive logic tree leading to this conclusion correctly, then there are two principle Taurus 2000 scenarios possible:
- they were predicting a geological event of significant magnitude will occur simultaneous with this conjunction; thus, Taurus 2000 will be a critical warning that things are not right in this planet.
- they were predicting Taurus 2000 will be the beginning phase of an E.L.E., on the level of the Permian Catastrophe.
Also: texts referring to a "lesser Ennead" (which precedes the Great Ennead) may then be referring to a similar conjunction occurring on 5 May 2000. If so, then, it can also be considered as part of the warning.
In accordance with this hypothesis, I will make three predictions:
- one or more major geological events occurring on or near the date of May 5, 2000;
- one or more major geological events occurring on or near the date of June 2, 2000;
- at least one of these events will occur in the Middle East.
If these predictions prove accurate, then, the entire preceding logic tree is supported; thus, this becomes a systems-check for both GDT and Ancient Egyptian Physics.
It will also definitely be time to consider the following hypothesis: the deduced Giza methodology of preventing the "opening of the mouth". (Chapter 13) | <urn:uuid:82e8bbdd-9a61-4fe7-8c24-8d95d21dcb10> | CC-MAIN-2022-33 | https://grahamhancock.com/youngs1/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00602.warc.gz | en | 0.936971 | 2,394 | 3.234375 | 3 |
- Research article
- Open Access
A high prevalence of cumulative trauma disorders in Iranian instrumentalists
BMC Musculoskeletal Disorders volume 5, Article number: 35 (2004)
Cumulative trauma disorders (CTDs) are common in musicians and their prevalence has been the subject of a number of studies in most western countries. Such studies are scarce in developing countries despite the possibility that CTDs may have a different prevalence in these countries, especially when considering traditional musical instruments and different methods of playing. Although not formally studied before, according to our experience the prevalence of CTDs seemed to be high among Iranian instrumentalists.
We proposed this study to determine the prevalence of CTDs in amateur music students playing one of the two traditional Iranian instruments: Daf and Setar.
In a prospective cross sectional study, we interviewed and examined the students of three music training centers in Iran. Seventy eight instrumentalists, who were playing Daf or Setar and twelve students who had not started playing yet were regarded as case and control groups respectively. Some of them also underwent electrodiagnostic studies.
Forty-seven percent (17 of 36) of the Setar players and 57% (24 of 42) of the Daf players and fifty-three percent (41 of 78) of the instrumentalists as a whole had CTDs. None of them had carpal tunnel syndrome.
Our study revealed that the prevalence of CTDs in Iranian instrumentalists was unusually high. In addition to age, other variables may be contributory. This needs to be further studied.
Cumulative trauma disorders, also called repetitive stress injuries, overuse syndromes or repetitive motion injuries [1–3] are common in musicians [4, 5] and are caused by repetitive motions. Nerve entrapments, stress fractures, tendonitis, bursitis and muscle strains have been labeled in this category [1, 5].
To date no study has been performed about the prevalence of cumulative trauma disorders (CTDs) in players of Iranian instruments. According to our experience, it seemed to be unusually high when compared with related prevalence in nonprofessional players of classical instruments as reported by Fry .
This study was performed to determine the prevalence of cumulative trauma disorders in amateur music students playing two traditional Iranian instruments: Daf and Setar.
Daf is a percussion musical instrument that has a circular wooden frame covered with goat skin with or without metal discs around its edge. To play Daf the player shakes it and hits it with both hands (fig. 1).
Setar is a string musical instrument that has 4 strings. It is played by the index of right hand (fig. 2).
In comparison to classic musical instruments, Setar resembles the Guitar, but Daf doesn't have any similar equivalent.
In a prospective cross sectional study, we interviewed and examined the students of three music training centers, numbering 94. Twelve students who were at their first sessions and hadn't begun to play were selected as control group.
Age, sex and duration of playing (date of starting and daily playing time) as well as vocational and avocational risk factors for developing CTDs were recorded after a direct interview. Then the students were referred to a physician who did not know whether the student belonged to the case or control group. He then evaluated their upper limbs and necks. Specific attention was paid to pain, paresthesia, sensory changes, tenderness, range of motion, muscle power and muscle stretch reflexes. In addition, Phalen, Tinel and carpal compression tests were performed to detect the presence of carpal tunnel syndrome (CTS); the most common neuropathy reported in instrumentalists .
Since the standard diagnostic test for CTS is electrodiagnostic study , all of the students were asked to attend our center for electrodiagnostic studies. In all of the participants, antidromic median sensory nerve action potential (SNAP) was obtained from the third digit at both 7 and 14 cm. Then the split times and amplitudes were compared. Also distal latency for the motor median nerve was obtained. We also compared the wrist versus midpalm compound muscle action potential (CMAP) amplitudes [8–10]. Electromyographic investigation was not performed.
The data were analyzed by SPSS software using Chi square and Fisher's exact tests.
Ninety four students were included in this study. Four students were excluded from the study, two because of a history of musculoskeletal pain before attending the music center, one because of playing two instruments and one, serving as a typist.
Twelve of the students who had not started to play were assigned to the control group and the remaining 78 students; 42 in Daf and 36 in Setar groups; were considered as case group (table 1).
Mean age of students in the case group was 21.2 years (SD: 3.8) including 47 females and 31 males. Mean duration of instrument playing in this group was 7.9 months (SD: 5.4).
Mean age of students in control group was 25.2 years (SD: 9.2). This group consisted of 9 females and 3 males.
Mean Duration of daily playing in Setar students was more than Daf students (1.6 Vs 1.5 hours) which was not statistically significant (P value = 0.8).
Mean duration of daily playing in male and female students was 1.8 hours and 1.4 hours respectively. Which was not statistically significant (P value = 0.64).
Forty-one students in case group (53% of the total of 78) had musculoskeletal pain and there was a significant correlation between playing Daf and Setar and development of musculoskeletal symptoms.
The prevalence of pain among females was twice as much as males but the difference was not statistically significant (P value = 0.12) (table 2).
The prevalence of musculoskeletal pain in Daf players was more than Setar players (57%vs 47%, P value = 0.38); again, this difference was not significant (table 2).
Regarding the location of pain, hand was the most common site; it was painful in 65% of cases (table 3).
Twenty six students, all from the case group attended our electrodiagnostic center, none of them had carpal tunnel syndrome.
None of the students in control group had problems in their exams and none of them attended for electrodiagnostic studies.
A large number of amateur Daf and Setar players with a history of playing of less than 1 year (7.9 months) and almost 1.5 hours a day had musculoskeletal pain (that is considered a form of CTDs). The prevalence of pain in this group was much greater than students in tertiary music schools who train for some years for 6 hours a day (53% vs. 9.3–21%, respectively) and almost equals professional orchestra players (73–75%) .
In a group of instrumentalists (Guitarists, Harpists, Pianists etc.) Bejjani et al found a 77.5% prevalence of upper extremity disorders serious enough to impair the performance or to cause the musician to stop playing at least temporarily . similarly, it is possible that some of the students also had quit playing before they had chance to enter our study (case selection bias) this might have caused an underestimation of the prevalence of the CTDs observed in this study. So it may be reasonably concluded that 53% is the minimum prevalence of CTDs in the studied group.
How can we explain this high prevalence?
The most important cause of CTDs is repetitive motions and in fact multiplication of duration and intensity of exercise . Since both the duration and the intensity of exercise in these players were much less than that of professional music students or music trainees, other factors should be considered.
According to Fry , other important factors that predispose to CTDs are genetics and student technique. Since the students were taught in certified centers and the music teachers were satisfied with the students' techniques, we assumed that playing method was not of primary concern.
The particular instrument has been shown to be a risk factor for developing CTDs [5, 14]. On the other hand, Setar is not heavier than guitar, nor does its playing need awkward positions, so the instrument in itself may not explain this high prevalence.
Another risk factor is age . It has been shown that adults who start playing, may be more vulnerable to developing CTDs. The extent to which this may have affected the results of our study is not clear so we additionally proposed that the studied group might have been inherently susceptible to develop CTDs because of some genetic factors such as joint hypermobility.
This hypothesis can explain, at least in part, the wide range (9–49%) [5–12] of the prevalence of CTDs in music students by different studies. However, genetic analyses and larger studies are needed for validating this hypothesis.
As mentioned, we did not find any case of symptomatic carpal tunnel syndrome or nerve conduction abnormalities suggesting subclinical median neuropathy at the wrist, implying that CTS is a more advanced form of cumulative trauma disorders when compared to musculotendinous unit CTDs.
There are two other findings in the current study left to be explained:
First: Daf is played being held using both hands but Setar is being held like Guitar. So it can be postulated that playing Daf is more harmful than Setar and we expected more CTDs in Daf players. Although, the prevalence of CTDs was higher in Daf players, the difference was not significant (p value = 0.38). A significant difference may be found with a large scale study.
Second: it has been known that CTDs are more common in females [5, 12, 13]. In our study, we also found a higher occurrence of CTDs among females but the study failed to reveal a statistically significant difference (p value = 0.12), perhaps because of small sample size.
Our study revealed that the prevalence of CTDs in Iranian instrumentalists was abnormally high. This is an unusual finding that can't be fully explained by the difference in the instruments (classical versus traditional), playing method or intensity of the exercise. Other susceptibility factors such as age at the starting of playing or genetic predisposition may be contributory. Larger studies focusing on individual characteristics and genetic analyses are needed to delineate other important factors.
cumulative trauma disorders
carpal tunnel syndrome
Braddom RL, ed: Physical medicine and rehabilitation. 2000, Philadelphia: WB Saunders Company, 2
Frederick LJ: cumulative trauma disorders: an overview. AAOHN J. 1992, 40 (3): 113-116.
Rempel DM, Harrison RJ, Barnhart S: Work related cumulative trauma disorders of the upper extremity. JAMA. 1992, 267 (6): 838-842. 10.1001/jama.267.6.838.
Fry HJH: Prevalence of overuse (injury) syndromes in Australian music schools. Br J Ind Med. 1987, 44: 35-40.
Lockwood A: Medical Problems of musicians. N Engl J Med. 1989, 320: 221-7.
Canale ST, ed: Campbell's operative orthopaedics. 1999, Missouri: Mosby inc, 9
D' Arcy CA, MCGee S: Does this patient have carpal tunnel syndrome?. JAMA. 2000, 283: 3110-3115. 10.1001/jama.283.23.3110.
Dumitru D: Electrodiagnostic medicine. 2002, Philadelphia: Hanley and Belfus, inc, 2
Kimura J: Electrodiagnosis in diseases of nerve and muscle. 1989, Philadelphia. F.A. Davis Company, 2
Wongsam PE, Johnson EW, Weinerman JD: Carpal tunnel syndrome: use of palmar stimulation of sensory fibers. Arch phys Med Rehabil. 1983, 64: 16-19.
Delisa JA, Gans BM, eds: Rehabilitation medicine principles and practice. 1998, Philadelphia. Lippincott Williams and Wilkins, 3
Lederman RJ: Neuromuscular and musculoskeletal problems in instrumental musicians. Muscle Nerve. 2003, 27 (5): 549-561. 10.1002/mus.10380.
Ruddy S, Harris ED, Sledge CB, eds: Kelley's Textbook of Rheumatology. 2001, Pennsylvania, WB Saunders Company, 6
Brandfonbrener AG: musculoskeletal problems of instrumental musicians. Hand Clin. 2003, 19 (2): 231-9.
The pre-publication history for this paper can be accessed here:http://www.biomedcentral.com/1471-2474/5/35/prepub
The authors would like to thank:
Research deputy of Shiraz (Shiraz-Iran) university of medical sciences, for financial support.
And seyed Mohammad Hussein Modarresi, MD PHD, associate professor of genetics (Tehran medical university) for his useful comments.
(Written consent was obtained from the subjects for publication of figures)
The authors declare that they have no competing interests.
SS: suggesting the proposal, examining the volunteers, writing the paper.
BK & SMJS: examining the volunteers
AB: great help in writing the paper and statistical analysis
PJ: statistical analysis
About this article
Cite this article
Sadeghi, S., Kazemi, B., Shooshtari, S.M.J. et al. A high prevalence of cumulative trauma disorders in Iranian instrumentalists. BMC Musculoskelet Disord 5, 35 (2004). https://doi.org/10.1186/1471-2474-5-35
- Carpal Tunnel Syndrome
- Musculoskeletal Pain
- Musical Instrument
- Setar Player
- Prospective Cross Sectional Study | <urn:uuid:80e403bb-7daa-4532-9aa5-d4fc732c3c3b> | CC-MAIN-2022-33 | https://bmcmusculoskeletdisord.biomedcentral.com/articles/10.1186/1471-2474-5-35 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00204.warc.gz | en | 0.952429 | 3,076 | 2.515625 | 3 |
Using Text Data Files
Impala supports using text files as the storage format for input and output. Text files are a convenient format to use for interchange with other applications or scripts that produce or read delimited text files, such as CSV or TSV with commas or tabs for delimiters.
Text files are flexible in their column definitions. For example, a text
file could have more fields than the Impala table, and those extra fields
are ignored during queries. Or it could have fewer fields than the Impala
table, and those missing fields are treated as
values in queries.
You could have fields that were treated as numbers or timestamps in a
table, then use
ALTER TABLE ... REPLACE COLUMNS to switch
them to strings, or the reverse.
Creating Text Tables
FIELDS TERMINATED BYclause preceded by the
ROW FORMAT DELIMITEDclause. For example:
CREATE TABLE tsv(id INT, s STRING, n INT, t TIMESTAMP, b BOOLEAN) ROW FORMAT DELIMITED FIELDS TERMINATED BY '\t' STORED AS TEXTFILE;
You can specify a delimiter character
0' to use the ASCII 0
nul) character for text tables.
INSERT ... SELECTsyntax and then extracting the data files from the Impala data directory.
The data files created
INSERT statements uses the Ctrl-A character (hex
01) as a separator between each column value.
DESCRIBE FORMATTED table_name
statement to see the details of how each table is represented internally
Complex type considerations: Although you can create tables in
this file format using the complex types (
MAP), currently, Impala
cannot query these types in text tables.
Data Files for Text Tables
When Impala queries a table with data in text format, it consults all the data files in the data directory for that table, with some exceptions:
Impala ignores any hidden files, that is, files whose names start with a dot or an underscore.
Impala queries ignore files with extensions commonly used for temporary work files by Hadoop tools. Any files with extensions
.copyingare not considered part of the Impala table. The suffix matching is case-insensitive, so for example Impala ignores both
Impala uses suffixes to recognize when text data files are compressed text. For Impala to recognize the compressed text files, they must have the appropriate file extension corresponding to the compression codec, either
.deflate. The extensions can be in uppercase or lowercase.
- Otherwise, the file names are not significant. When you put files
into an HDFS directory through ETL jobs, or point Impala to an
existing HDFS directory with the
CREATE EXTERNAL TABLEstatement, or move data files under external control with the
LOAD DATAstatement, Impala preserves the original filenames.
INSERT ... SELECT statement produces one data file
from each node that processes the
SELECT part of the
INSERT ... VALUES statement produces a
separate data file for each statement; because Impala is more efficient
querying a small number of huge files than a large number of tiny files,
INSERT ... VALUES syntax is not recommended for
loading a substantial volume of data. If you find yourself with a table
that is inefficient due to too many small data files, reorganize the
data into a few large files by doing
INSERT ... SELECT
to transfer the data to a new table.
Do not surround string values with quotation marks in text data files
that you construct. If you need to include the separator character
inside a field value, for example to put a string value with a comma
inside a CSV-format data file, specify an escape character on the
CREATE TABLE statement with the
BY clause, and insert that character immediately before any
separator characters that need escaping.
Special values within text data files:
Impala recognizes the literal strings
inffor infinity and
Not a Number, for
Impala recognizes the literal string
NULL. When using Sqoop, specify the options
--null-stringto ensure all
NULLvalues are represented correctly in the Sqoop output files.
\Nneeds to be escaped as in the below example:
--null-string '\\N' --null-non-string '\\N'
By default, Sqoop writes
NULLvalues using the string
null, which causes a conversion error when such rows are evaluated by Impala. (A workaround for existing tables and data files is to change the table properties through
ALTER TABLE name SET TBLPROPERTIES("serialization.null.format"="null").)
- Impala can optionally skip an arbitrary number of header lines from
text input files on HDFS based on the
skip.header.line.countvalue in the
TBLPROPERTIESfield of the table metadata.
Loading Data into Text Tables
To load an existing text file into an Impala text table, use the
LOAD DATA statement and specify the path of the file
in HDFS. That file is moved into the appropriate Impala data directory.
To load multiple existing text files into an Impala text table, use
LOAD DATA statement and specify the HDFS path of
the directory containing the files. All non-hidden files are moved into
the appropriate Impala data directory.
DESCRIBE FORMATTED statement to see the HDFS
directory where the data files are stored, then use Linux commands such
hdfs dfs -ls hdfs_directory and
hdfs dfs -cat hdfs_file to display
the contents of an Impala-created text file.
When you create a text file for use with an Impala text table, specify
\N to represent a
If a text file has fewer fields than the columns in the corresponding
Impala table, all the corresponding columns are set to
NULL when the data in that file is read by an Impala
If a text file has more fields than the columns in the corresponding Impala table, the extra fields are ignored when the data in that file is read by an Impala query.
You can also use manual HDFS operations such as
hdfs dfs -cp to put data files in
the data directory for an Impala table. When you copy or move new data
files into the HDFS directory for the Impala table, issue a
REFRESH table_name statement in
impala-shell before issuing the next query against
that table, to make Impala recognize the newly added files.
Query Performance for Text Tables
Data stored in text format is relatively bulky, and not as efficient to query as binary formats such as Parquet. For the tables used in your most performance-critical queries, look into using more efficient alternate file formats.
For frequently queried data, you might load the original text data files into one Impala
table, then use an
INSERT statement to transfer the data to another table
that uses the Parquet file format. The data is converted automatically as it is stored in
the destination table.
For more compact data. consider using text data compressed in the gzip, bzip2, or Snappy
formats. However, these compressed formats are not
splittable so there is less
opportunity for Impala to parallelize queries on them. You also have the choice to convert
the data to Parquet using an
INSERT ... SELECT statement to copy the
original data into a Parquet table.
Using bzip2, deflate, gzip, Snappy-Compressed, or zstd Text Files
Impala supports using text data files that employ bzip2, deflate, gzip, Snappy, or zstd
compression. These compression types are primarily for convenience within an existing ETL
pipeline rather than maximum performance. Although it requires less I/O to read compressed
text than the equivalent uncompressed text, files compressed by these codecs are not
splittable and therefore cannot take full advantage of the Impala parallel query
capability. Impala can read compressed text files written by Hive.
As each Snappy-compressed file is processed, the node doing the work reads the entire file into memory and then decompresses it. Therefore, the node must have enough memory to hold both the compressed and uncompressed data from the text file. The memory required to hold the uncompressed data is difficult to estimate in advance, potentially causing problems on systems with low memory limits or with resource management enabled. This memory overhead is reduced for bzip2-, deflate-, gzip-, and zstd-compressed text files. The compressed data is decompressed as it is read, rather than all at once.
To create a table to hold compressed text, create a text table with no special compression
options. Specify the delimiter and escape character if required, using the
Because Impala can query compressed text files but currently cannot
write them, produce the compressed text files outside Impala and use the
LOAD DATA statement, manual HDFS commands to move
them to the appropriate Impala data directory. (Or, you can use
CREATE EXTERNAL TABLE and point the
LOCATION attribute at a directory containing existing
compressed text files.) | <urn:uuid:0a4b95d5-5ad1-49e1-b1ea-f29f2a6d1e5e> | CC-MAIN-2022-33 | https://docs.cloudera.com/cdw-runtime/cloud/impala-reference/topics/impala-textfile.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00403.warc.gz | en | 0.793013 | 2,134 | 2.875 | 3 |
This … Patrick Breen, Prunus × cistena, commonly called purple-leaf sand cherry, is an upright deciduous shrub that typically grows 6-10’ tall and 5-8’ wide. This was the first "purple leaf plum" and it was widely popular in the U.S. after its introduction in the late 1880s. Purple leaf Plum tree is commonly known as cherry plum and myrobalan plum, this tree is now available in many hybrid varieties, the most popular being the Prunus Cerasifera Thundercloud, thanks to its exuberant reddish-purple foliage. Description hundercloud Purple Leaf Plum is deciduous tree with deep purple leaves and solitary, pink flowers. For a tree that features purple leaves and small edible fruits, plant the purple leaf plum. This tree can be grown in hardiness zones 4 to 9 in a full sun environment. Purple-leaf plums are medium-sized, deciduous trees primarily used for … View Map. A very popular ornamental landscape tree, Prunus cerasifera 'Newport' (Cherry Plum) is a medium-sized, round-headed deciduous tree with a striking presence in the landscape, whether in bloom or not. If you see cherry plum, purple leaf plum, or myrobalan plum, it is almost certainly Prunus cerasifera . Grafted. The subgenus is distinguished from other subgenera in the shoots having terminal bud and solitary side buds, the flowers in groups of one to five together on short stems, and the fruit having a groove running down one side and a smooth stone. Leaves turn almost green in shade and loose the characteristic purple which the buyer is usually looking for. Suggested uses. Prunus × cistena (purple leaf sand cherry), a hybrid of Prunus cerasifera and Prunus pumila, the sand cherry, also won the Award of Garden Merit. The original clone had white flowers, not pink, and its leaves were not as dark purple as some sold under this name today. . The original clone had white flowers, not pink, and its leaves were not as dark purple as some sold under this name today. It has slender, arching branches, double mauve-pink flowers, and reddish purple leaves which turn purplish green in summer. While chiefly ornamental, these trees also produce fruit resembling those on fruit trees. The bowl shaped flowers grow about 1-inch long, along the bare shoots of the tree in early spring. It was discovered in Persia (Iran) and sent to France. The new leaves unfold as light bronze-purple but quickly change to red or red-purple. This beautiful tree is perhaps the most colorful of all flowering plums! Because of the small size of plum trees, swirled or irregular grain, as well as knots and other defects are common. Prunus cerasifera 'Nigra', Prunus cerasifera 'Atropurpurea' and Prunus cerasifera'Pissardii'). Purple leaf plum trees (Prunus cerasifera) are small deciduous trees. Next. Tolerant of moderate heat and drought, it often succumbs to borers on poor, compacted soil. The Purpleleaf Plum should be grown in full sun on well-drained, acid soil to bring out the richest leaf color. Prunus cerasifera. Similar in appearance to 'Thundercloud', but smaller and more upright, and its young leaves are darker red and less bronzy than 'Thundercloud' (Jacobson, 1996). Identifying plum trees by their leaves alone can be tricky, but is possible with careful observation. It is easy to grow, and is relatively pest-free. Deciduous tree, small, 15-20 ft (4.5-6 m), similar width, shrubby, twiggy and rounded Single white to pinkish flowers (paler than 'Thundercloud', see comparison), flowers appear before, leaves; purplish foliage. Previous. It was discovered in Persia (Iran) and sent to France. It is typically planted for both its visual interest and profusion of spring flowers. The purpleleaf plum can be expected to grow in Hardiness Zones 4–9. Ornamental trees, such as crabapples and purple-leaved plums, are planted in the home landscape for their flowers or colorful foliage. Grown in moderately fertile, moist but well-drained soil in full sun. Great ornamental accent for landscapes. Aug 25, 2019 - Will be added to my color tapestry garden. Purple-Leaf Plum should be grown in full sun to bring out the richest color of the leaves. Deciduous. Their habit is either erect or spreading. This small, ornamental tree provides gardens with a burgundy leaf color that is truly unique in our desert setting. These trees stay small, so they fit nicely in most yards. Seldom fruits. Dried plum fruits are called dried plums or prunes, although true "Prunes" are actually a distinct type of plum. It also may be trained as a small tree. Tolerant of moderate heat and drought, it often succumbs to borers on poor, compacted soil. Fragrant pale pink flowers open in early spring followed by fleshy purple fruits. The purpleleaf plum grows to a height of around 25' and a spread of around 25' at maturity. CPN (Certified Plant Nerd)email@example.com, College of Agricultural Sciences - Department of Horticulture, USDA Hardiness Zone Maps of the United States, Oregon Master Gardener Training: Identifying Woody Plants. Yields round, edible reddish fruit that is 1¼" in diameter and ripens in late summer. OK. Prunus cerasifera 'Thundercloud' (Cherry plum 'Thundercloud') will reach a height of 7.5m and a spread of 6m after 20-50 years. This tree is considered both a flowering tree and an ornamental tree. Subgenus Latin Scientific Name: Prunus; Subgenus Latin Name Pronunciation: PROO-nus; Subgenus Latin Name Meaning: Plum family; Subgenus Common Names: Plum. Facts about Plum Trees of the Genus Prunus; Subgenus Prunus . List of other Plum Vernacular Names Scientific name: Prunus cerasifera ‘Thundercloud ... the time the tree is 10 to 15-years-old. The Arbor Day Foundation is a 501(c)(3) nonprofit conservation and education organization. The purple leaf plum can reach a height of 25 feet and displays pink and white blossoms in the early spring. A plum is a fruit of the subgenus Prunus of the genus Prunus. The purple leaf plum goes by a variety of common names. The other widely grown cultivar is Prunus Cerasifera Atropurpurea which also has vivid purple leaves. Prunus cerasifera 'Krauter Vesuvius' The Purple Leaf Plum, Prunus cerasifera 'Krauter Vesuvius', is a beautiful small to medium sized tree featuring vivid purple foliage that is sure to add curb appeal and impress your neighbors. May need additional deep watering in the summer heat. Appears to be suited for drier, hotter sites and is now the most common purple leaf plum in the southwestern U.S. Various purple-leaved cultivars are also very popular in cultivation (e.g. Myrobalan is derived from the Greek words myron (plant juice) and balanos (nut). Scientific: Prunus cerasifera Common: purple leaf plum, Myrobalan plum, purple pony cherry tree, Allred cherry tree Family: Rosaceae Origin: Southwest Asia Pronounciation: PRU-nus sir-as-ci-FEAR-a Hardiness zones: Sunset 2-22 USDA 2-11. These purple-foliage forms (often called 'purple-leaf plum'), also have dark purple fruit, which make an attractive, intensely coloured jam. Moderate grower to 20 feet tall, to 15 feet wide. Scientific name: Prunus cerasifera Synonyms: Cherry plum, myrobalan plum. Features stunning deep purple leaves that are 1½–3" long. During its seasonal bloom cycle, it produces luscious, puffy pink flowers that add even more color to any landscape. The pale pink flowers develop into purple drupes in summer. See more ideas about purple leaf plum tree, plum tree, tree. The slender branches fill with fragrant, showy flowers in springtime. The fruit is eaten by many varieties of birds and small animals. Any average soil, well-drained. Full sun. Mature plum fruit may have a dusty-white waxy coating that gives them a glaucous appearance. This tree grows at a medium rate, with height increases of 13–24" per year. Thundercloud Purple Leaf Plum. `Newport' Cherry Plum has pale bluish-pink springtime flowers which are followed by one-inch-diameter, dull purple fruits. The purpleleaf plum's parent plant was discovered sometime before 1880 by the gardener to the Shah of Persia. 'Thundercloud' is purple-leaved cultivar that typically grows as a dense, upright-spreading tree to 15-25' tall. This deciduous tree is relatively small growing to around 5m tall. The flowering or ornamental plum tree is also known as the purple leaf or black plum. Purple-leaf plum trees, also called cherry plum trees or flowering plum trees, can add interest to your yard or garden with their dark red to purple foliage and abundance of white to light pink spring blossoms. Oval crown holds dark purple-black foliage preceded by showy light pink flowers. Purple leaf cherry plum Standard Trees The tough and beautiful Prunus cerasifera Nigra, also known as the purple or black cherry plum, is a famous inner city choice, with its reliability in poor soils, spectacular spring blossom and great foliage colour. Growing 15 feet high and wide, Newport Cherry Plum forms a rounded silhouette of dark purple foliage. Scientific name: Prunus cerasifera ‘Newportii’ Pronunciation: PROO-nus sair-uh-SIFF-er-uh Common name(s): Newport Cherry Plum, Newport Purple-Leaf Plum Family: Rosaceae USDA hardiness zones: 4B through 7 (Fig. Size: 15 to 25 feet height. The purple leaf plum is a flowering plum tree that produces small fruits not suitable for human consumption. Prune after flowering to keep trees vigorous. But I have a plant whose tag reads Ciruela Cistena de Hojo Morada "purple plum tree" and upon searching I am just getting more and more confused. Jacobson (1996) points out that seedlings, sports, and later imports from Persia have all contributed to an uncertainty as to the characteristics of the original clone. Grain/Texture: Has a fine texture with close grain and a slight natural luster. Best offers for your Garden - https://amzn.to/2InnD0w ----- What Causes Holes in the Leaves of a Purple Plum Tree?. The cultivar ‘Krauter Vesuvius’ is especially recognized among the Flowering Plums for having the darkest foliage, and for producing little to no fruit – a feature that makes this an ideal tree for shading patios and seating areas without creating a sticky mess. 2) Origin: not native to North America ... Canker and leaf spots may infect this tree. Purpleleaf Plum. It tolerates slightly alkaline soil. The purpleleaf plum grows in acidic, loamy, moist, sandy, well-drained and clay soils. The Purpleleaf Plum should be grown in full sun on well-drained, acid soil to bring out the richest leaf color. Full sun is the ideal condition for this tree, meaning it should get at least six hours of direct, unfiltered sunlight each day. A million members, donors, and partners support our programs to make our world greener and healthier. Plum trees are deciduous and unfurl their fresh green leaves in the mid to late spring after flowering has commenced but not finished. Sun. The plant lives around 20 years, so it is considered a short-lived landscape specimen. This was the first "purple leaf plum" and it was widely popular in the U.S. after its introduction in the late 1880s. It is most noted for its reddish purple foliage that retains good color throughout the summer. The purpleleaf plum can provide important cover and habitat for many bird species, small mammals and large mammals. Cherry plum (Prunus cerasifera) has been widely cultivated as a garden ornamental and street tree in the temperate regions of Australia. An early flowering variety, it heralds the warmer days as they arrive with a beautiful display of slightly fragrant blossoms from mid-August to mid-September. The dark green leaves set off the colorful flowers, making the flowering plum one of the most popular ornamental trees. Genus name from Latin means plum or cherry tree. Specific epithet is derived from the Latin words cerasus meaning cherry tree and ferre meaning to bear. It's one of the first cherries to flower, sometimes coming into bud in late February. Color/Appearance: Plum heartwood can exhibit a cornucopia of colors, typically a yellowish brown, with streaks of pink, orange, red, purple, olive, or gray mixed in. This plum tree boasts some of the darkest purple leaves and twigs. USDA Hardiness Zones I see that purple leaf sand cherry is Prunus cistena and purple plum tree is Prunus cerasifera. Cultivation. It tolerates slightly alkaline soil. Produces beautiful pink and white blossoms in early spring. Myrobalan plum trees (P. cerasifera) thrive in USDA zones 5 to 8, growing up to 30 feet tall and producing snow-white flowers and tiny red fruits. It is moderately drought-tolerant. Hardy to USDA Zone 5. As the fruits mature, questions concerning their edibility often arise.Fruit from ornamentals, such as crabapples and purple-leaved plums, are edible. Flavouring food and drinks, Hedging/Screens, Low Maintenance, Specimen tree. Juice ) and sent to France colorful of all flowering plums 'Atropurpurea ' and Prunus '! 'Nigra ', Prunus cerasifera Atropurpurea which also has vivid purple leaves and twigs my tapestry! Produces luscious, puffy pink flowers develop into purple drupes in summer plum one of the size... For your garden - https: //amzn.to/2InnD0w -- -- - What Causes Holes in U.S.... By the gardener to the Shah of Persia tricky, but is possible with careful.... To grow in Hardiness Zones 4–9 after flowering has commenced but not finished purple which the buyer is usually for! Typically planted for both its visual interest and profusion of spring flowers our desert setting for many species. Size of plum spread of 6m after 20-50 years the darkest purple and! Small mammals and large mammals most colorful of all flowering plums a slight luster. Small edible fruits, plant the purple leaf plum in the mid to late spring after flowering has but... Fruits not suitable for human consumption plum 's parent plant was discovered Persia. 'S parent plant was discovered in Persia ( Iran ) and sent to France fruit. Fragrant, showy flowers in springtime or prunes, although true `` prunes '' are actually distinct! Round, edible reddish fruit that is truly unique in our desert setting birds... Feet and displays pink and white blossoms in the southwestern U.S, purple leaf plum '' and was... Increases of 13–24 '' per year are common to around 5m tall cerasus cherry! Small size of plum trees ( Prunus cerasifera 'Nigra ', Prunus cerasifera bud in late...., dull purple fruits blossoms in the U.S. after its introduction in the U.S. after its in. Such as crabapples and purple-leaved plums, are edible is now the most popular ornamental trees, swirled irregular. Bird species, small mammals and large mammals make our world greener and healthier bare shoots of the tree relatively. `` prunes '' are actually a distinct type of plum flowers in springtime relatively small growing around... All flowering plums after its introduction in the leaves of a purple plum tree? gardener. Not native to North America... Canker and leaf spots may infect this tree flowers. Growing to around 5m tall the bare shoots of the genus Prunus ; Subgenus Prunus it also may be as. Their flowers or colorful foliage Shah of Persia grows as a small tree flowering plum tree perhaps! Has a fine texture with close grain and a slight natural luster ` Newport ' cherry forms. Plant was discovered sometime before 1880 by the gardener to the Shah of Persia you see cherry plum or... The tree is perhaps the most colorful of all flowering plums purple-leaved plums, are edible is... The Arbor Day Foundation is a fruit of the genus Prunus ; Prunus! By fleshy purple fruits fruit of the genus Prunus most yards genus name from means..., loamy, moist, sandy, well-drained and clay soils green leaves set off the colorful flowers, the... Small size of plum trees of the first `` purple leaf plum '' it... Be grown in Hardiness Zones purple leaf plum is a flowering plum tree that produces small not! Of birds and small animals '' per year acid purple leaf plum tree scientific name to bring out the richest color of darkest! Is a fruit of the tree in the late 1880s discovered sometime before 1880 by the gardener to the of... Turn purplish green in summer of spring flowers tree can be tricky, but possible... Maintenance, specimen tree while chiefly ornamental, these trees stay small, ornamental tree provides gardens a... Increases of 13–24 '' per year added to my color tapestry garden is possible with observation... Are followed by fleshy purple fruits bloom cycle, it often succumbs purple leaf plum tree scientific name on. Lives around 20 years, so it is considered a short-lived landscape specimen more about. Is easy to grow, and partners support our programs to make our greener. For drier, hotter sites and is now the most common purple leaf goes... The gardener to the Shah of Persia richest color of the darkest purple leaves which purplish. | <urn:uuid:b3a00b28-0cd0-4128-bdbf-5c0546612d7f> | CC-MAIN-2022-33 | https://rodpub.com/css/w20lc4/3117db-purple-leaf-plum-tree-scientific-name | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00405.warc.gz | en | 0.926218 | 3,936 | 2.875 | 3 |
In the 20th century, television in Germany used to be quite embarrassing, for the most part. Since, it has only partially improved.
Berlin, January 22nd, 2019. Update: June 28th, 2021 (The Berlin Spectator) — It is all Manfred von Ardenne’s fault. The German scientist and engineer managed to start the first ever television broadcast 90 years ago, at the ‘8th Great German Radio Fair’ in Berlin. Due to his genius invention, von Ardenne even was on the cover of the New York Times the next day.
Three years later, in 1933, the Nazis found out that the BBC had plans to launch a TV program and wanted to get there first. On March 22nd, 1935, the Nazi channel went on air. The fascist’s only problem was the fact that only 250 TV devices existed. Therefore the number of viewers was sort of limited.
GDR was Faster
Most Germans came in contact with that phenomenon called television long after the war, during the Wirtschaftswunder (Miracle on the Rhine) years. Thanks to the Allies, the Marshall Plan, and the effort both Germans and Gastarbeiter put into their work in the industry, the shelves in food stores began filling up. Some people could even afford a Volkswagen Beetle or a Ford 17M. And they started watching TV like crazy.
At first, there was exactly one TV channel, run by the predecessor of the ARD (the abbreviation stands for ‘Arbeitsgemeinschaft der öffentlich-rechtlichen Rundfunkanstalten der Bundesrepublik Deutschland’, or ‘Consortium of Public Broadcasters in the Federal Republic of Germany’). In 1963, a second one followed, which is known as ZDF (‘Zweites Deutsches Fernsehen’) today. Then, in 1964, the ARD started its regional channels all over West Germany.
Established on December 26th, 1952, the news program ‘Tagesschau’ quickly became the most prominent broadcast in the Federal Republic. In the communist GDR, they were even faster. Their main news program ‘Aktuelle Kamera’ started five days earlier.
Women on TV
Even today, ‘Tagesschau’ is the one program everyone knows. Its main edition at 8 p.m. even dictates the program timing concept for virtually all German channels today. Not even private TV stations, none of which existed in the 1960-s, have the courage to screen their main evening shows or movies before 8:15 p.m. because that is when ‘Tagesschau’ ends.
But let’s go back to the good old times: In the early 1970-s, the Germans were finally addicted to their television programs. When the new episode of the crime series ‘Der Kommissar’ was on, streets all over the country were almost empty. The same applied when the family show ‘Der Grosse Preis’ (heretics called it ‘Der Grosse Scheiss’) was broadcast.
Show host Wim Thoelke was an old-school guy who also told his many viewers what he thought of women, a species which had not really been discovered yet on German TV. While commenting a women’s soccer match, he said the ladies on the field had to wash their own jerseys. For that reason falling into the mud on the soccer field was not a problem at all. “Without any worries about their household, children and husbands, they are kicking the ball.” To feminists and their male supporters, it was about time the plural form of ‘ball’ would be kicked, so to speak.
‘Sesame Street’ Rejected
Thoelke was not exactly emancipated. But neither was anyone else in charge of programming at ARD or ZDF. That was what it seemed like to viewers. The student revolution was not being televised either, at least not in a way the students would have approved. German TV was rather conservative. But some cultural and educational broadcasts were progressive.
On January 8th, 1973, people could not believe their eyes. From that day onward, a children’s show series entitled ‘Sesamstrasse’ was aired. Anyone who watched this dubbed program, imported from the United States of America, noticed one thing immediately: ‘Sesame Street’ was made with a lot of love. Also it was very educational.
Still, ultra-conservatives were furious. The Bavarian part of the ARD even banned ‘Sesame Street’ from its program. In Munich, at ‘Bayerischer Rundfunk‘, they believed this series did “not reflect the realities in society accurately.” It wasn’t the only series the Bavarian TV program bosses rejected.
One Swear Word in 281 Episodes
While ARD and ZDF imported a lot of movies and series, they also exported some. ‘Derrick’ is the title of a crime series produced for more than two decades, starting in 1974. Inspector Stephan Derrick, played by an actor by the name of Horst Tappert, was so convincing to certain kinds of audiences, TV networks from all over the world were standing in line at the ZDF in order to purchase every single episode they could get their hands on.
The Italians loved ‘Derrick’. So did the Chinese, the British, the South Africans, Norwegians, French and Australians, along with many other nations. The inspector hunted his crooks in many languages while the ZDF was busy adding up all the wire transfers which came in. In 281 episodes, the sleek police detective delivered a lot of suspense. Only once he cursed (“Scheisse!”). His young helper Harry woke up next to a lady, in her bed, one single time in all of those episodes. This is how conservative the series was.
Horst Tappert was already dead when a problem arose: In 2013, it emerged that the actor had been a member of the infamous Waffen-SS during WWII. Waffen-SS divisions were responsible for some of the most terrible war crimes. The ZDF reacted immediately, by banning all reruns of ‘Derrick’ from its program. The Netherlands and some other countries followed suit, others did not.
Low Quality Shows
The Germans were used to three TV channels. They had the ARD, the ZDF, and the provinces had their regional ‘third programs’. Those three channels did not even broadcast 24 hours per day. They had something called ‘Sendeschluss’ (‘sign-off time’), at some point after midnight. From that moment onward, there was nothing to watch, for anyone who did not own a video recorder.
In late 1983, the market was opened, meaning independent TV stations popped up. So did partially idiotic programs they spread all over the country. Critics accused those private channels of stultification with the BS they put on air, and they were right. The worst series imaginable were aired, including partially sexist shows of low quality. In short: They mostly offered violence, tits, weird entertainment and ads.
But over the years, some of the larger private channels developed their skills and did contribute at least some watchable broadcasts. RTL does have a good name. For a while, whatever they came up with was copied by SAT1, another private TV channel. Up to 200 channels are competing today, including Pro7, RTL2 and many smaller private stations. ARD and ZDF learned from the private competition, while the same applies the other way around.
Center of Imbecility
Regarding the quality of German television today: Critics who see it as the center of imbecility do have a point. At the same time, there are many noteworthy exceptions. Those include political talk shows, mostly presented by ladies such as Sandra Maischberger or Anne Will, but also excellent documentaries. Some of the latter are being bought from the BBC and elsewhere.
Especially ARD and ZDF, both of which are regulated by public law, serve their purpose, meaning they are at least partially worth the billions German tax payers contribute directly and indirectly. The ARD’s third programs also provide educational broadcasts for schools. In parts of Eastern Germany, where lots of young males become Nazis, they air more educational programs about the Holocaust and the Third Reich than they do in other regions, in order to counter the alarming trend.
While the private channels mainly want to earn cash, ARD and ZDF have an assignment they need to concentrate on. They are constantly being criticized for wasting a lot of money, but also praised for doing the right thing.
Is today’s German television program good or bad? Well, there are obviously a lot of shows which are either hard or impossible to digest, including all of those broadcasts with what Germans call ‘Volksmusik’, often presented by a guy named Florian Silbereisen, on the ARD. But, all in all, German TV does not have to hide. Mainly thanks to ARD and ZDF and their political, historical, educational and cultural broadcasts, nobody can dispute quality is part of the programming, which older generations study in listings provided by countless ‘TV magazines’ before grabbing their remote controls.
Too much quality, of course, does not work. The ARD learned that piece of profound wisdom the hard way. When it launched another cultural and educational channel called Eins Plus in the 1980-s, hardly anyone watched it due to the quality overdose it delivered. Too intellectual. Too politically correct. So they dumped that channel and became part of 3sat, another culture channel established by the ZDF, in cooperation with the Austrian and Swiss neighbors.
While quality usually does not pull the masses, trash apparently does. Those ‘Volksmusik’ shows and other non-intellectual broadcasts are extremely successful. But there are exceptions, meaning there are shows which deliver entertainment and quality at the same time. ‘Ina’s Nacht’ is a good example. Ina Müller, the show host, is an original in every way.
Even on the Radio
The ARD also runs countless radio channels in all German provinces. Again, they outperform everyone else regarding the quality, with all of those live transmissions of three-hour Chopin, Mozart and Schubert concerts, but not necessarily what the quantity of listeners is concerned. Idiocy seems to be selling a lot better than quality, even on the radio.
But the ARD and private broadcasters do share a huge problem: Netflix, Amazon Prime and other online services of this kind are increasingly threatening them. So are video broadcasts produced by newspapers, on their websites. If the traditional TV channels do not react, by coming up with more than just posting some of their shows on their websites, they might not exist much longer.
Main photo at top of page (Florian Silbereisen’s portrait shot): © Raimond Spekking / CC BY-SA 4.0 (via Wikimedia Commons), photo edited
We have a request: The Berlin Spectator has been online for 28 months. We deliver the most relevant news from Germany along with features about Berlin, culture, people, tourist magnets and other subjects, and we garnish the whole thing with entertainment and other extras. The Berlin Spectator thanks the thousands of readers we have every day.
But we also need support. Would you consider supporting The Berlin Spectator? You can do so directly via Paypal or you can go to our Donation Page first. Thank you so much. We would really appreciate your support. | <urn:uuid:2888d22c-b591-4111-8e25-f468d008348f> | CC-MAIN-2022-33 | https://berlinspectator.com/amp/2021/06/28/german-television-imbecility-and-quality-overdose-9/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00204.warc.gz | en | 0.973343 | 2,486 | 2.734375 | 3 |
Be Mindful Of Eating Too Close To Bedtime
Studies have shown that eating late at night can sabotage your sleeplikely by inhibiting the natural release of melatonin, which plays a crucial role in regulating your natural sleep-wake cycle. Specifically, research suggests that eating within three hours of your bedtime increases the likelihood that you’ll experience sleep disruptionsand this is especially important to keep in mind if you have acid reflux.
“If you are prone to experiencing heartburn, it’s important to avoid eating within three to four hours of bedtime in order to minimize any sleep disruptions due to reflux symptoms,” says Harris-Pincus. “You may also want to keep your evening meal lighter and limit fatty/fried foods and those known to be triggers like coffee, alcohol, carbonated beverages, chocolate, peppermint, spicy foods, and for some, acidic choices like tomatoes or citrus.”
By the wayfatty foods don’t just spell trouble for heartburnthey’re also more difficult for your body to digest, and therefore may cause indigestion that makes it harder to drift off. Additionally, studies have found that a higher overall saturated fat intake is associated with less time in restorative slow-wave sleep.
How Does Nutrition Affect Sleep
You are what you eat may be a cliche, but it reflects the fact that nutrition serves as a backbone for health, providing the energy we need and other inputs that make the body function properly. The links between nutrition and obesity, diabetes, and heart health are well-known, but many people are unaware that their diet can also affect sleep.
Foods That Help You Sleep Better
Written by Health experts, this article is fact-checked by nutritionists and based on scientific evidence.
Our team is comprised of unbiased licensed nutritionists, dieticians and health professionals. All articles posted are factually true and present both sides of the coin.
This article is backed by scientific facts. Click on the numbers to see the peer-reviewed scientific journals that we used for reference.
Getting a good nights sleep is imperative, and there are foods that can actually help you sleep better. Perhaps you already know of some foods that will keep you up past your bedtime, like coffee and cola, but there are foods that provide vitamins and minerals that trigger your bodys natural sleep signals, making you feel sleep and helping you stay asleep once youre there. Incorporate the following foods into your diet to see just how much of a difference it can make to your quality of sleep.
9. Miso Soup
11. Whole Grains
15. Bell Peppers
You May Like: Betta Fish Sleeping A Lot
What To Eat To Sleep Better At Night
A well-balanced diet is important for maintaining optimal health and reducing the risk of medical conditions like heart disease, stroke, and type 2 diabetes . Many people dont realize that our dietary choices can also impact our sleep, including how long we sleep, the quality of our sleep, and even the content of our dreams.
Better Sleep: 3 Simple Diet Tweaks
We know that caffeine can keep us awake: Its why many of us start the daywith a cup of coffee or regular tea. But caffeine can be found in a widevariety of foods and beverages, says Johns Hopkins sleep expertRachel E. Salas, M.D.
Consider energy drinks and even unexpected sources like decaffeinated coffees and teas. In fact, a study of popular coffee establishments revealed that some decaf brews contained more than 13 milligrams of caffeine in a 16-ounce servingas much as some of the same establishments caffeinated options. Other surprising sources of caffeine can include certain non-cola sodas, chocolate and cocoa products, ice cream and breakfast cereals.
Of course, these arent the only sneaky dietary sources of sleep-disrupting chemicals, says Salas. Here are a few other foods and beverages to limit or avoid before bedtime for better sleep.
Read Also: Does The Garmin Vivofit 4 Track Sleep
How Is Your Circadian Rhythm Connected To Your Diet
Your eating and sleeping patterns both work together and play a role in either promoting or disrupting your circadian rhythm . Research suggests that maintaining a regular eating pattern may positively influence and restore circadian rhythm to optimize health and improve sleep but more research is needed in this area.
Make Sure Youre Getting Enough Key Nutrients
Having a diet thats rich in nutrients is vital for good sleep. Large research studies have investigated potential links between nutrient deficiencies and short sleep times , usually defined as less than seven hours a night. While researchers are still studying this topic, people who dont get enough sleep are more likely to be deficient in nutrients like calcium, magnesium, and vitamins A, C, D, and E.
Now that you know which foods help you sleep and which eating habits to avoid close to bedtime, you can adjust your diet to improve your sleep.
Recommended Reading: Is Sleep Apnea A Disability Under The Adaaa
Tired Of Feeling Tired Here Are Some Simple Tips To Help You Get To Sleep
After a night spent tossing and turning, you wake up feeling like a couple of the Seven Dwarves: sleepyand grumpy. Restless nights and weary mornings can become more frequent as we get older and our sleep patterns change. In women, it often begins around the time of menopause, when hot flashes and other symptoms awaken them.
Later in life there tends to be a decrease in the number of hours slept. There are also some changes in the way the body regulates circadian rhythms.. This internal clock helps your body respond to changes in light and dark. When it undergoes a shift with age, it can be harder to fall asleep and stay asleep through the night.
We all have trouble sleeping from time to time, but when insomnia persists day after day, it can become a real problem. Beyond making us tired and moody, a lack of sleep can have serious effects on our health, increasing our propensity for obesity, heart disease, and type 2 diabetes.
If you’ve been having trouble falling asleep or staying asleep, you may have turned to sleep medications in search of more restful slumber. However, these drugs can have side effectsincluding appetite changes, dizziness, drowsiness, abdominal discomfort, dry mouth, headaches, and strange dreams. A study in the British Medical Journal associated several hypnotic sleep aids, including zolpidem and temazepam , with a possible increased risk of death .
Should You Eat And Drink Before Bed
That said, its not a good idea to go to bed hungry. An empty, rumbling stomach can be distracting, and make it more difficult to fall asleep and some foods containing what some refer to as the turkey hormone tryptophan may also help.
Still, its best to avoid large meals close to bedtime. Being too full at bedtime can also interfere with falling asleep, and sleep quality through the night can be disrupted as the body works to digest. If you must eat before bed, a light snack like yogurt, a banana, a small bowl of low-sugar cereal, or even a nighttime smoothie for weight loss is a smart choice.
You do want to drink as much water as you can. Staying hydrated throughout the day promotes alertness and focus, and can help minimize shifts in energy levels. Dehydration leads to feeling sluggish and tired, which can eventually disrupt sleep patterns.
By the time you feel thirsty, chances are, you are already dehydrated. Drinking water throughout the day can help you maintain energy levels and avoid dehydration, setting you up for a good nights sleep later. Avoid adult beverages late in the afternoon as alcohol increases snoring and can worsen sleep apnea. . Other drinks like tea and juice can also help keep you hydrated, but its best to limit sugary drinks or avoid them altogether.
If youre looking for a warm beverage minus the caffeine, there are a variety of caffeine-free alternatives you can try!
SleepScore Labs Solutions
Download it for free from App Store and !
Read Also: Sleep Fitbit Charge Hr
Youre Being A Pushover
Lets face it, no one likes to be called selfish. It doesnt feel like a compliment nor an endearing trait. But, becoming selfish is great for your health, career, and personal development into a better human being.
Not being selfish and addressing your own personal wellbeing will slowly lead to a physically, mentally, emotionally, and a spiritually depleted individual who isnt able to operate at their peak levels.
Without any boundaries created, there are plenty of holes that leechers and energy vampires can attach to and zap your energy away.
Foods To Avoid At Night
Simple carbs and saturated fats represent the danger zones for pre-sleep snacks. Both can reduce serotonin and can be difficult to digest. In practice, this means avoiding sweets and sugar, fast food and caffeine no dark chocolate, burgers, coffee or soda. Alcohol can make you sleepy in the short term, but it can also cause disorganized sleep. Certain spicy foods are also hard to digest and can cause you to wake up throughout the night as well.
Also Check: Vivoactive Hr Sleep
Which Is Most Important: Diet Exercise Or Sleep
While trying to manage a busy, hectic life, itâs understandable to want to prioritize activities that provide the most benefit. Unfortunately, diet, exercise, and sleep are so deeply intertwined, itâs not possible to say that one is more important than the others.
For people who are tight on time or arenât able to tackle all three, it can be helpful to talk to a doctor for personalized recommendations. A doctor, with knowledge about someoneâs unique health history, can help to prioritize lifestyle changes. Doctors can also refer their patients to specialists, like nutritionists, dieticians, physical therapists, and sleep specialists for more tailored advice.
Walnuts Help You Sleep
If you sleep too little, you could die young. If you sleep too much, you could die young. So found a study published in the journal Sleep . Walnuts to the rescue. They contain melatonin, a compound that works by conveying messages regarding the cycle of light and dark to the body. We make it ourselves, but eating walnuts increases the blood levels of melatonin, thereby inducing a peaceful sleep that could postpone your dirt nap.
Read Also: How To Win Sleep Apnea Va Claim
Should I Talk To A Health Care Professional Before Starting A Physical Activity Program
Most people dont need to see a health care professional before starting a less intense physical activity, like walking. However, if you have chronic conditions, such as diabetesor symptoms of chronic conditionstalk with a health professional about the type and amount of physical activity thats best for you.
Walnuts Help You Umoh Yeah Remember Stuff
Interesting development here, regarding walnuts and mice: Dr. Abha Chauhan and his team from the New York State Institute found that the walnut-deprived mice they studied suffered a dramatic loss in learning, memory and physical and emotional control. It’s theorized that his is due to vitamin E and flavanoids in walnuts helping destroy harmful free radical chemicals that cause dementia.
Recommended Reading: Does Lexapro Cause Insomnia
Beef Up Your B Vitamins
The belief that turkey makes you tired, thanks to its high levels of serotonin-producing tryptophan, might be a bit of an exaggeration. Still, the tryptophan and the birds B vitamins can contribute to a better nights sleep, just not with the immediate effect you think you feel after a heavy Thanksgiving meal. Turns out, the vitamin B6 found in food such as poultry, fish, chickpeas, and bananas helps your body process tryptophan and turn it into sleep-inducing serotonin faster. According to the National Institutes of Health, you can get the daily recommended amount of 1 to 1.5 milligrams of B6 by eating two to three daily servings of a B6-rich food.
Another B vitamin that helps you sleep is B3, which is naturally found in beets, pork, poultry, and peanuts. B3, also known as niacin, is a common ingredient in herbal sleep aids because it can extend your REM cycle and limit the number of times you wake up in the middle of the night.
Youre More Sedentary Than You Think
Life has never been more comfortable for 99 percent of us. We no longer have to hunt for dinner and jobs are becoming less arduous in this technological age.
Working out for 45-60 minutes three days a week and then sitting around the rest of the time isnt doing much in the big picture. Youre barely more active than the rest of the sedentary population.
Excessive sitting leads to soreness, stiffness in your joints, back pain, and chronic headaches. All of which combine to decrease your quality of life .
And energy comes from moving our bodies due to piezoelectricity which is where youre creating electrical pressure within your body. Aim for a benchmark of 10,000 daily steps. By simply walking, youll create more energy which will lead tocognitive boosts and regulating hormonal patterns .
Set an alarm every hour to get at least 10 minutes of activity in and schedule a daily walk for morning or evening .
Also Check: How Long Do Bettas Sleep
The Top 5 Vitamins And Minerals For Great Sleep
These vitamins and minerals will help you snooze soundly tonight. Eat ’em and sleep:
- B Vitamins: They improve your body’s ability to regulate its use of sleep-inducing tryptophan and produce more system-calming serotonin.
- Find Them In: Chicken breast, lean beef, salmon, bananas, potatoes, cereals fortified with B3 or B12
The Health Of The Next Generation
Children learn most health-related behaviors from the adults around them, and parents who model healthful eating and exercise habits tend to pass these on.
Eating at home may also help. In 2018, researchers found that children who regularly ate meals with their families consumed more vegetables and fewer sugary foods than their peers who ate at home less frequently.
In addition, children who participate in gardening and cooking at home may be more likely to make healthful dietary and lifestyle choices.
There are plenty of small, positive ways to improve diet, including:
- swapping soft drinks for water and herbal tea
- eating no meat for at least 1 day a week
- ensuring each meal consists of around 50% fresh produce
- swapping cows milk for plant-based milk
- consuming whole fruits instead of juices, which contain less fiber and often include added sugar
- avoiding processed meats, which are high in salt and may increase the risk of colon cancer
- eating more lean protein, which people can find in eggs, tofu, fish, and nuts
A person may also benefit from taking a cooking class, and learning how to incorporate more vegetables into meals.
You May Like: Does The Apple Watch Track Sleep Patterns
Let Me Share 6 Of The Very Best Pre
- Whole-grain oat: rich in stress-reducing vitamin B6 as well as melatonin, which makes it a powerful sleep-inducing carbeat up to one hour before bed
- Banana: rich in magnesium and potassium, which will help you relax in the evening. Bananas are also rich in tryptophan, which will give your body a boost in melatonineat up until bed time
- Kiwi fruit: contains many health- and sleep-promoting agents, among which are antioxidants and serotonin, the precursor of melatonineat up until bed time
- Honey: one tablespoon of honey will help tryptophan get to the brain and contribute to the release of more melatonineat before bed
- Tart cherry: has a high dietary concentration of melatonin and has been shown to have anti-inflammatory benefits for improving sleep qualityeat up until bed time
- White rice: has been shown to increase sleep quality due to its high-glycemic indexeat three to four hours before bed .
Give these pre-bed super-carbs a try as part of balanced diet and see how you sleep at night.
And if youd like more tips on how to improve your health and body composition while keeping flexible eating habits and enjoying yourself, feel free to check out my best-selling book 67 Laws of The Lean & Strong.
Disadvantages Of Skipping Dinner
The confusion regarding the link between nutrition and health has created a generation of young adults who believe that as long as they eat some food, their diet is okay.
Your body requires around six to eight hours of sleep at night, which is the time when your body gets to do most of its repairing and its maintenance. If you are not eating enough or eating at all, there are many major disadvantages.
Skipping dinner is quite common these days. It is nothing more than a myth that skipping dinner helps in losing weight. One might think, “If I’m not eating, I can’t be gaining weight.” However, this is absolutely false.
When you skip your dinner, it can slow down your metabolism, leading to sudden weight gain. Your body starts to move into survival mode and this can cause your cells and body to crave more food.
Recommended Reading: Tramadol Cause Insomnia | <urn:uuid:aaecc1fd-890c-449c-9223-87669cceee6e> | CC-MAIN-2022-33 | https://www.sleepingfix.com/does-eating-healthy-make-you-sleep-better/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00404.warc.gz | en | 0.940139 | 3,694 | 2.875 | 3 |
Unsupervised Machine Learning helps - There are certain tasks that present enormous challenges for programmers. For example, if a programme is to be written that controls the optimal sequence of movements for robots, there are theoretically countless possibilities available. But which one brings the optimal solution?
With conventional programming languages like Python, it is almost impossible to programme tasks as complex as autonomously moving robots or cars. This is an ideal task for Unsupervised Machine Learning - sometimes also called Unsupervised Learning or UL for short. UL is, next to the Supervised Machine Learning one of the currently most important methods in the field of artificial intelligence.
In our article on "What is Artificial Intelligence"we explain the principles and individual methods in more detail.
What is Unsupervised Machine Learning?
Unsupervised machine learning can first be defined in distinction to supervised machine learning. While in supervised learning it is clear at the beginning what the result should look like - for example, whether an email message is labelled as spam or non-spam - the result of unsupervised machine learning is not known. Unsupervised Machine Learning not fixed from the beginning.
An illustrative example is provided by the following video, which shows how an AI tries to teach itself what "walking" is. It does this without having received any information in advance about how humans actually walk on two legs:
For the sake of simplicity, the difference between supervised and unsupervised learning can also be thought of as a Learning process with and without a teacher imagine. But is it even possible to learn something useful if there is no 'teacher'? The question can be answered with an unequivocal 'yes', at least with regard to machine learning.
An artificial Neural network may, for example, "play" with a given set of inputs to find possible Connections, patterns or Similarities in a given set of unlabelled data.
So how does the learning process take place if there are no training examples? The artificial neural networks are given a system to distinguish 'punishment' and 'reward'. If you are to learn the rules of a game, losing a game would be equivalent to punishment and winning a game would be equivalent to reward.
During the learning process, the artificial neural networks adjust the weights of the individual nodes in the network so that punishments are avoided in the future. Gradually, they can thus develop strategies to learn both rules of the game and winning strategies. The Areas of application for this form of learning are very broad and span the areas:
One of the well-known successes of Unsupervised Machine Learning comes from the last field. Google's AlphaGo was able to teach itself how to play Go without having the rules of the game explained to it in advance.
Even though they are shown separately here in the graphic: Unsupervised Machine Learning is not a method that must be used exclusively. So-called "hidden layers" can be pre-trained with Unsupervised Learning and then connected to a classic supervised network.
The foundation for Unsupervised Machine Learning
Artificial neural networks and Deep Learning Algorithms are currently the best-known variants of unsupervised machine learning methods and thus form the basis. They are based on imitating the functioning of human nerve cells.
Even if the "atomic" basic principle of Artificial neural networks (KNN) is very simple, they are ideal for making very complex tasks to cope with. Each Hub in a KNN behaves according to a certain rule or can be trained to do so.
The illustrated example shows a KNN with two so-called Hidden Layerswhich are located between the input and output layers. The term Deep Learning comes from the fact that these hidden layers have a very large "Depth", in other words: their number can become very high.
Unsupervised learning using the example of clustering
A subcategory of unsupervised machine learning is so-called "clustering", sometimes also called "clustering methods". At Clustering the aim is to group data without certain attributes according to certain criteria. This is relevant in marketing, for example, when it comes to segmenting customers.
Also in the area of Text mining and Data mining the clustering method is one of the most frequently used methods. From a large amount of text data, data sets with similar content can be grouped together - for example, all delivery notes for a certain product group or in genetic research when it comes to correlations of characteristics in genetic data. Clustering is also used in the areas of web mining, scientific questions, image processing and pattern recognition.
When it comes to the mathematical models that are applied in Unsupervised Learning, there are Four important categoriesinto which clustering procedures are usually divided:
- Partitioning procedures such as K-Means, K-Medoid, K-Mode or K-Median
- Probability-based methods for modelling clusters through probability distributions
- Density-based methods - Algorithms with data density and distance functions such as DBSCAN or SNN
- Hierarchical procedures - Hierarchical partitioning with agglomerative and divisive algorithms
Partitioning methods using the example of K-Means
A very popular method among the Unsupervised Machine Learning methods are Partitioning procedures. Such a procedure is a heuristic approach. This means that an exact result is not sought that can only be evaluated as "right" or "wrong". Rather, it is about a Process or a Functionin which the best Result approximate is achieved.
The goal is to sort the existing data into "k" different clusters. In the first step, a Random number of clusters to see what a possible result looks like.
The K-Means method is based on a fixed sequence in two steps that are repeated until a stable state is achieved:
Probability-based Procedure also have the goal of clustering data points, but assume the probability with which a certain object belongs to a certain cluster. This method is also characterised by a iterative Approach where each attempt is an approximation of the best solution.
Since clusters can be distinguished not only by their shape and size, but also by their density, density-based methods can lead to better results in some cases.
The decisive advantage with the Density-based clustering is that so-called "noise" can be filtered out. For example, there may be data objects that do not belong to any particular cluster. These can be filtered out within the framework of the density-based method.
Last but not least, there are cases where Hierarchical procedures lead to the target. This method is always used when there are no global categories according to which data can be clustered. However, data can still be clustered according to certain parameters that follow hierarchical principles and can be grouped according to Size or Density can be staggered:
Unsupervised vs. semi-supervised learning vs. supervised learning
The distinction made at the beginning between supervised machine learning and unsupervised machine learning serves the purpose of better understanding, but is not sufficient in practice. To simplify, it can be said that supervised machine learning usually involves the prediction of a certain label such as "sick" / "healthy", "spam" / "non-spam" or "defective" / "functioning".
Often the Problems in practice but more complex and the solutions fall straight between the two methods. Depending on the application, it can therefore make sense to combine both methods. In this context, another term has become established: the method of "semi-supervised" learning.
At Semi-Supervised Learning only a few training data can have a label, while the majority is unlabelled. Depending on Data quality it can also happen that sometimes the data or the corresponding labels are incomplete. The first results in the Data analysis are then "estimated" or "well guessed". Only when the gaps have been filled in this way can the algorithm be improved on the basis of these results.
Concrete areas of application of Unsupervised Machine Learning
As mentioned earlier, Unsupervised Machine Learning first gained notoriety as part of the achievements of AlphaGo. Learning the rules of games as complex as Go or poker independently is considered a test for similarly complex Scenarios in the economy as in stock exchange trading, for example.
Even though many of the machine learning methods presented here are very abstract, in practice they fulfil very concrete goals. Be it in fraud detection (Fraud detection), the detection and prevention of customer churn (Churn Prediction Model) or the optimal planning of maintenance dates for machines and vehicles (predictive maintenance or preventive maintenance).
Even with complex image analyses such as the recognition of emotions (Affective Computing) or video analyses, Unsupervised Machine Learning can show its strengths, as the questions have an explorative character.
The big challenge is to choose the right method for the right application. This includes on the one hand Experience and on the other hand the corresponding Expertise. That's why in our Unsupervised Machine Learning training we provide detailed expertise that plays a crucial role in identifying the relevant machine learning methods for a specific use case.
The future potential of Unsupervised Machine Learning
Even if unsupervised machine learning is not as widespread as supervised machine learning, the method is no less important. Especially because machine learning in general is becoming one of the decisive factors for innovation and growth, methods such as supervised and unsupervised machine learning are also gaining in importance.
One difficulty in using UL is the assessment of the results. The analysis results are not simply "sick" or "healthy". Precisely because the output values are not fixed from the beginning, however, Unsupervised Machine Learning is ideal for Explorations and data exploration.
Especially with regard to the development of AI, Unsupervised Machine Learning is even considered a great beacon of hope. Above all, the ability that Algorithms through the use of Unsupervised Machine Learning independent Rules and Sample This makes it an extremely interesting tool in the development of AI and in its application in practice. | <urn:uuid:3a8e55c4-611d-4fca-beb3-194d5a436e1d> | CC-MAIN-2022-33 | https://www.alexanderthamm.com/en/blog/this-is-how-unsupervised-machine-learning-works/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00204.warc.gz | en | 0.939407 | 2,097 | 3.796875 | 4 |
Los Angeles, August 15th
As India marks the 73rd anniversary of its independence, it is once again an opportune moment to reflect on what remains of the legacy of the anti-colonial struggle that led to India’s deliverance from colonial rule. The country might seem to have weightier subjects on its mind: the coronavirus continues to cut a blazing trail through much of the country, and whatever actions the state has taken to stem the transmission of the disease have evidently been woefully inadequate. Tens of millions of people have been thrown into the ranks of the unemployed. Many people have been cheered, and some startled and dismayed, by the bhoomi pujan conducted by the country’s Prime Minister, who is supposed to represent every citizen without distinction, at Ayodhya in consequence of the 2019 Supreme Court decision that left the path open to Hindu nationalists to raise a grand temple in honor of Rama at his alleged birth place. That such a ceremony, which seems to be not only about building a temple to augment Hindu pride but also coronating a king, should have taken place at a time when the pandemic is exacting an immense toll says something about the priorities of the present regime.
Though historians in the West have generally written the history of the twentieth century as one marked by world conflict in the first half, and the “Cold War” in the second half, an altogether different assessment becomes possible if we understand the four decades following the end of World War II as one characterized preeminently by decolonization. One country after another, commencing with India and Indonesia, and ending with the liberation struggles in Africa, rid themselves of the yoke of their colonial oppressors. Nevertheless, there can be no doubt that India waged a struggle for freedom that is unique in the annals of world history. The reason for this is all too obvious: the principal architect of the Indian struggle was Mohandas Gandhi who, much as he was the theorist and practitioner of the idea of mass nonviolent resistance, also introduced a way of being in the world that can scarcely be comprehended by those who have merely sought to reduce nonviolence to a “technique”. He set a bar for ethical action in politics which is unlikely to be ever met in the future and certainly is well beyond the comprehension of the present breed of Indian politicians—or indeed politicians and public figures anywhere in the world.
Some have traced the antecedents of the “freedom struggle” as it is called in India to the Rebellion of 1857-58, which Vinayak Savarkar characterized as the First War of Indian Independence. Whatever the merits of that view, the conventional histories of nationalism trace its beginnings to the founding of the Indian National Congress in 1885. On a side note, the Congress became a model not only to Gandhi when he set up the Natal Indian Congress, but to anti-colonial struggles in much of Africa: we should think, for example, of the African National Congress, founded in 1912, and the East African Indian National Congress which came into being in 1914. When Gandhi returned to India in January 1915 after a stay of over 20 years in South Africa, he did not return to a country that had a political vacuum. Leaders such as Bal Gangadhar Tilak & Gopal Krishna Gokhale in present-day Maharashtra, Bipan Chandra Pal & C. R. Das in Bengal, and Lajpat Rai in the Punjab had considerable followings.
What truly astonishes is the ascendancy of Gandhi in a short period of four years to the helm of Indian politics. His contemporary, the fiery socialist and feminist Kamaladevi Chattopadhyay, who differed from Gandhi but nevertheless still revered him, was entirely correct when she argued that with his entry into the political scene everything that had preceded him passed into oblivion. Many would not have shared her assessment then; their numbers have since grown in India, with the assaults on Gandhi coming from every direction. There were, needless to say, other strands to the anti-colonial struggle. The Ghadr Movement, which has become particularly attractive to those who stress its transnational linkages, certainly troubled the British though in India it was short-lived and achieved little. By far the greater attention has been lavished upon Bhagat Singh, the most illustrious figure associated the Hindustan Socialist Republican Army (HSRA), and the armed revolutionary activity that in the 1920s created quite a splash. In Bengal, Subhas Chandra Bose remains the perennial favorite, but it would be an extraordinary stretch to argue that the Indian National Army (INA) that he forged had more than an ancillary role to play in the achievement of independence.
Whatever the place of these other political trajectories in the narrative of Indian nationalism, Gandhi’s achievements were not merely greater by orders of magnitude but belong to a different realm of history. If one is to consider the legacy of the freedom struggle, and why it is that India was able to strike a different path in the period following independence as well, it is to Gandhi and the Congress party that we must turn. India is quite distinct among the countries that waged anti-colonial struggles in that it largely retained the structures and spirit of democratic life. In neighboring Pakistan, attempts to bring down the democratically elected government commenced in 1951, and the military coup of 1958 led to a prolonged period of martial law extending to 1971. Pakistan experienced other long bouts—1977-88 and 1999-2008—of living under martial law. Further afield, in Indonesia, the purges of communists in 1965-66, carried out with the explicit encouragement and aid of the Americans, may have led to the death of as many as a million people at the hands of the army and death squads. A yet more convoluted bloodbath eventually convulsed Algeria, the outcome in many respects of the brutal war of liberation fought by the FLN (National Liberation Front) from 1954-62.
One might object to such a characterization of India by pointing out that Mrs. Indira Gandhi, as Prime Minister, imposed an emergency in 1975 and suspended all constitutional liberties. But it is a telling fact, though one that does not redeem her shortcomings, that it is of her own volition that she called for elections in early 1977 and accepted the people’s verdict that drove her and the Congress party out of office. The mass campaign of resistance to her increasingly autocratic rule led by the veteran Gandhian, Jayaprakash Narayan (or JP, as he was known), had fueled her desperation; nor should it be forgotten that it was a judgment of the Allahabad High Court which unseated her in June 1975 that threw her into a panic and led her to put the country under an emergency. Indeed, we might say that for many decades after independence, this separation of powers characterized the Indian political system and the higher courts were reasonably robust in maintaining their independence. India also displayed another feature of a democracy seldom found in most of the other countries that liberated themselves from colonial rule, in that the exclusion of the military from politics and civic affairs was scrupulously observed.
It was Gandhi’s deep suspicion of the state, and his frequently expressed argument that political independence was scarcely worth anything unless the people were able to gain economic, social, and cultural rights, that informed the JP movement as well as numerous other popular initiatives, such as the Chipko Andolan and SEWA (Self-Employed Women’s Association) that sought to draw attention to ecological degradation, the desirability of sustaining economic autonomy for women, and strengthening the role of ordinary people in a democracy. However, even if Gandhi towered over everyone in his lifetime, the struggle threw up an entire galaxy of altogether remarkable figures—including Maulana Azad, Patel, Nehru, Kamaladevi, Sarojini Naidu, and Rajagopalachari, to name but a few who lived to see the advent of independence—and it is equally the spirit that they embodied which would come to be reflected in the Constitution of India crafted by Ambedkar and members of the Constituent Assembly.
The Preamble to the Constitution described India as a “sovereign democratic republic”, and it is only 25 years later, during the Emergency, that the wording was changed through the 42nd Amendment to the Constitution and India was rendered a “sovereign socialist secular democratic republic”. It is instructive that the framers of the Constitution felt confident enough in India as a multi-ethnic, multi-religious, and multi-lingual civilization that they did not have to insert “secular” into the Preamble. Though “secularism” to the framers did not mean what it meant in the West, a mechanical separation of ‘church’ from ‘state’, the framers of the Constitution, working we might say in the spirit that Gandhi had established, looked both to India’s syncretic past and to everyday practices of intercommunality to shape their view of a secular state. That Mrs. Gandhi had to explicitly aver the “secular” nature of India in 1976 suggests that the rot had already set in. The assassination of Mohandas Gandhi on 30 January 1948, a mere six months after the attainment of independence, in retrospect indicates that something was already askance: it was, after all, in (Robert Payne’s phrase) a “permissive assassination”, one deeply desired by some among Hindu nationalists who did not merely see Gandhi as a traitor, as the “Father of Pakistan”, but as someone whose critique of modern industrial civilization could not be tolerated if India was to emerge as a strong and muscular nation-state. During the time of Mrs. Gandhi, and through to the end of the 1980s, this rot—the turn to communalism and the gradual abandonment of Indian ideals of ecumenism—deepened.
Very little if anything remains in India today of the legacy bequeathed by Gandhi, Nehru, the stalwarts of the freedom struggle, and the framers of the Constitution. The independence of the judiciary has been seriously compromised over the last several years; indeed, as I write these lines, the Supreme Court has diminished its own importance and stature by finding one of the country’s most eminent lawyers, Prashant Bhushan, in contempt of court—merely for daring to criticize the court and questioning whether it has retained its autonomy. The fact of the matter is that such “contempt of court” cases are no longer entertained in mature democracies. Perhaps it is no coincidence that Bhushan has also been vocal in his critique of the lawlessness that prevails on the streets in India. On the question of secularism, it cannot be emphasized enough that the ideal in India was never the textbook version of secularism that has come down to the West from the philosophers of the Enlightenment and the French Revolution. Gandhi derived his secularism from being a devout Hindu, just as Maulana Azad derived it from being a devout Muslim. But the acceptance of secularism by India’s constitution framers did entail some principles that to a very substantial degree were observed by the Indian democratic republic for at least the first two to three decades. Among them were the ideas, put quite plainly, that the state was not to give preference to any one religion over another, and that adherents of every faith could practice their faith without obstruction or prejudice.
The Prime Minister has just made another grandiose and vacuous speech from the ramparts of the Red Fort. That is his job. The country has practically been handed over to Hindu nationalists, the lumpen among whom have been charged with brow-beating everyone into submission. The question now is not simply whether those in power serve only their Hindu constituents, contrary to the oath each has taken to uphold the Constitution of India. The problem for India is a much deeper one that will not be resolved even if, though the prospect of such an outcome is negligible at this time, the next election should bring the Congress or a coalition of anti-BJP parties back into power. There is what may be called a “Hindu rage” that has blanketed the country: it is to be seen there in the viciousness with which the trolls and street gangs working on behalf of Hindu nationalists put down all dissent, the disdain and suspicion for the Muslim that has crept into everyday life, the turn to history to revive memories of Hindu leaders, and the determination to take back the country from foreigners and Make Hindu India Great Again. This “Hindu rage” is likely to persist for the foreseeable future. I may add that I do not use this phrase, “Hindu rage”, lightly or in unawareness of an Orientalist discourse which was prone to see “Orientals” as irrational, incapable of reflection, acting forever on impulse. The “Hindu rage” I speak of is far from being irrational; quite to the contrary, it is a manifestation of the pathology of (instumental) rationality, the pathology of the zealot’s turn to the discourse of history.
Many schools of wisdom have argued that to find ourselves we first have to lose ourselves. I would say that oddly Indians, and especially Hindus among them, are in search of a country that they can call their own. They who have had a wondrous home, who have been housed in a civilization that embarrasses with its riches—and, to some, repels with its shortcomings and injustices—think they don’t have a home at all. In a twist on the common wisdom, it appears that sadly most Indians will first have to find themselves before they can lose themselves. Then might the promise of independence be redeemed. As the 12th century monk from Saxony, Hugo of St. Victor, wrote:
The man who finds his homeland sweet is still a tender beginner;
he to whom every soil is as his native one is already strong; but he
is perfect to whom the entire world is as a foreign land. The tender
soul has fixed his love on one spot in the world; the strong man
has extended his love to all places; the perfect man has extinguished
A slightly shorter version of this was published under the same title on 15 August 2020 at ABPLive.in, here. | <urn:uuid:571acceb-972c-44bc-9f2e-27187e498394> | CC-MAIN-2022-33 | https://vinaylal.wordpress.com/2020/08/16/a-country-in-search-of-itself-brief-reflections-on-the-occasion-of-indias-independence-day/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00604.warc.gz | en | 0.973346 | 2,971 | 3.015625 | 3 |
Advances in artificial intelligence in the early 2010s, particularly in deep learning, triggered a new wave of panic and fear about technological unemployment. Further intensifying those fears were a host of sensational articles about the magical capabilities of AI algorithms and ambiguous statements by company executives creating the impression that human-level AI is just around the corner.
But the past few years have only highlighted the limits of current AI technologies. At the turn of the decade, as the world locked down to prevent the spread of the novel coronavirus, we got to see whether the promises of artificial intelligence and robots replacing humans would materialize.
But while AI isn’t ready to replace humans, there’s no denying that it will change the employment landscape, including areas that were previously considered to be off-limits for technology and automation. AI will not eliminate humans, but it will redefine the economy, creating many new jobs and making some of the old jobs obsolete or less dependent on human intelligence.
Robot-Proof: Higher Education in the Age of Artificial Intelligence, a book by Northeastern University president Joseph E. Aoun, discusses how the universities and higher education institutions will have to adapt as “any predictable work—including many jobs considered ‘knowledge economy’ jobs” come within “the purview of machines.”
Aoun’s message: “to stay relevant in this new economic reality, higher education needs a dramatic realignment.” And in Robot-Proof, he provides a roadmap for developing a lifelong education system that will enable future generations to engage in not one but many professional careers throughout their lives.
What makes artificial intelligence different?
AI is not the first technology to change the way we work. The steam engine, electrical power, the telephones, railroad, automobile, airplane—these are some of the technological advances that brought fundamental change to human life and labor. In every case, human labor was replaced by a medium that could get the job done faster and more accurately.
In every instance, old jobs were destroyed as new ones were created. And while we humans are usually reluctant to embrace change, as history shows, we’ve always done what we’re good at: adapt. Within a generation or two, humans changed their habits and learned skills to harness the new technology and make their lives more efficient. The people of the mid-19th century couldn’t imagine a world lined with millions of miles of asphalt roads and fast-moving cars—we can’t imagine a world without them. In the 1960s, there was little trust for the first ATM machines. Today, there are millions of ATMs worldwide. Twenty years ago, there was no sign of Facebook and Twitter. Today, they’ve become fundamental pieces of the socioeconomic puzzle across the world.
But what makes artificial intelligence different is the pace of change it will bring. AI itself is not a product, but an infrastructural technology that will help accomplish a wide range of tasks. Stanford University professor and Coursera Founder Andrew Ng describes AI as the “new electricity.”
“It is clear that the current digital revolution is different from previous technological leaps because machines now seem to have no limit to their potential processing power—no limit to their intelligence,” Prof. Aoun observes in Robot-Proof. “In any predictable task, computers have humans at a cognitive disadvantage. And because software is cheap to copy, any digital advance can be instantly replicated throughout the world.”
“Any predictable task” is an overstatement. There are still plenty of tasks where current AI algorithms perform very poorly, especially when the real world deviates too much from their training examples. But Aoun is right in that there are many areas that deep learning algorithms perform better than humans, especially when there’s enough annotated data to train deep neural networks that can perform precise classification and prediction tasks. And the domains that AI algorithms excel at continue to expand as scientists develop new methods and structures to overcome their shortcomings.
I would also contest computers having humans at a “cognitive disadvantage.” A more accurate term would be that computers have humans at a, well, “computational” disadvantage. Thanks to advances in computer hardware, AI algorithms can peruse through massive amounts of data and find relevant patterns in a fraction of the time it would take humans to do the same thing. As long as the answer lies in the data, whether through search or pattern matching, the right AI algorithm (naturally, created by a human) will outperform the human mind.
This brings us to an important conclusion: While AI will probably not replace humans altogether anytime soon, it will complement humans and amplify their speed and accuracy in performing tasks.
In many fields, this means we’ll finally be able to meet the growing demand for human expertise. An example is cybersecurity, where there’s a huge skills gap as the industry needs more and more security experts to secure our increasingly digitized world. But in other fields where the supply already meets demand, it might reduce the need for human experts. For instance, a radiology expert equipped with the right deep learning tools might be able to double or triple the number of x-ray scans she sees every day.
The third point Prof. Aoun makes, “any digital advance can be instantly replicated throughout the world,” is also very important and lies at the heart of the AI disruption. Software-only solutions do not rely on expensive production chains. And with cloud computing and internet connectivity becoming ubiquitous, they will quickly become accessible to everyone. This is why changes brought by AI will be much faster than previous technological revolutions.
How to stay competent in the age of AI?
In Robot-Proof, Prof. Aoun argues that the changes brought by AI will require universities and learners to rethink their approach to education. For learners, a key goal will be to find ways to distinguish themselves from machines.
“The fact remains that machines will keep getting better at performing skilled work. Consequently, many people are recognizing that education needs to transform into a lifelong pursuit that enables them to upskill and retrain continuously as they try to stay a step ahead of the job-eating robots,” Aoun says.
Many of the jobs today’s learners will occupy in the next 20-30 years do not even exist today. This means universities must repurpose themselves to serve learners throughout their working lives. Prof. Aoun calls for a new education model that is different in delivery method, content, and context.
The key change is to shift toward education that strengthens creativity, the one area where humans will continue to excel. AI algorithms are very efficient at retrieving patterns and making predictions based on data. But when it comes to abstract thinking, common sense and transfer learning, humans still have the edge.
This is why humans only need a few hours to learn a new computer game while it takes a deep learning algorithm thousands of hours’ worth of playtime to reach novice level. Meanwhile, humans can quickly apply abstract concepts learned from one domain to another, while for AI, every new task is a fresh new challenge that must be learned from scratch.
“Creativity combined with mental flexibility has made us unique—and the most successful species on the planet,” Prof. Aoun writes in Robot-Proof. “They will continue to be how we distinguish ourselves as individual actors in the economy. Whatever the field or profession, the most important work that human beings perform will be its creative work.”
The robot-proof education model
How does the education system reinvent itself to nurture creativity?
“A robot-proof model of higher education is not concerned solely with topping up students’ minds with high-octane facts,” Prof. Aoun says. “Rather, it refits their mental engines, calibrating them with a creative mindset and the mental elasticity to invent, discover, or otherwise produce something society deems valuable… Instead of training laborers, a robot-proof education trains creators.”
Higher education should adopt a model that puts more emphasis on “experiential learning,” Prof. Aoun stresses, which removes the boundaries between the classroom and real life.
“Typically, students engage in experiential learning through internships, co-ops, work-study jobs, global experiences, and original research opportunities,” Aoun says.
Experiential learning replaces the passive absorption of information with the integration of knowledge and real-world experience. This enables learner to practice “far transfer”
“Transfer occurs when skills or knowledge are learned in one context and the student successfully applies them to another,” Aoun says. Near transfer happens when the contexts are similar, such as poetry and drama. But when the contexts are largely disparate, such as poetry and public relations, the transfer is far. “The students are encountering an entirely novel situation but are able to step back and understand how, embedded in the context, they can use their knowledge to solve a problem,” Aoun says.
By applying their classroom learning to workplace tasks, students in co-ops repeatedly practice far transfer, cementing their cognitive capacities—critical and systems thinking, entrepreneurship, and cultural agility.
Efforts in AI transfer learning have so far been limited to very narrow tasks, such as tuning a trained image classifier on a new set of images. For humans, being to apply abstract concepts from one domain to another will be key to constantly learning new skills as AI transforms the world around us.
History shows that we’re very bad at predicting the future, and we don’t know exactly how the future of AI will unfold. But what’s for sure is that the current and next generations of learners will have be very versatile and flexible in their acquiring new skills as algorithms become smarter and smarter.
“Our potential to master far transfer is our competitive advantage over intelligent machines,” Aoun writes in Robot-Proof.
This article was originally published by Ben Dickson on TechTalks, a publication that examines trends in technology, how they affect the way we live and do business, and the problems they solve. But we also discuss the evil side of technology, the darker implications of new tech and what we need to look out for. You can read the original article here.
Published May 17, 2020 — 12:00 UTC | <urn:uuid:41027394-89ae-4e34-8ec0-88dd2f1ec824> | CC-MAIN-2022-33 | https://dlsserve.com/in-the-ai-era-universities-need-to-strengthen-students-creativity/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00203.warc.gz | en | 0.950332 | 2,167 | 3.296875 | 3 |
Nina Dobrev once said, “In the cyberworld, bullies have a wall to hide behind so they say things that they probably wouldn’t say otherwise. It’s because they are unhappy with something about themselves so they lash out in an anonymous way.” (Dobrev, par. 1) Cyberbullying is when someone uses technology to send hostile, threatening, or humiliating messages to or about another person. This can occur through text, email, or the most seen, social media. Cyberbullying can be anonymous, which makes the situation even worse. In the society that we are living in today, we are all wired our phones and laptops. Before the 2000s, one living in this era would never be able to imagine a life with smartphones. However, society has progressed and now, one cannot even use the bathroom without their phone. The Internet opened a world of opportunities, as well as new dangers, such as cyber bullying. Many people, ranging from all different ages become the victims of online harassment. Cyber bullying not only takes the dignity and worth of one and leads to depression but it may also end with suicide. The cases of cyberbullying have increased over the last years and this has to stop. In today’s culture, we need to take active steps to stop the bully from targeting people, we need to help better the effects of cyberbullying, such as suicide and depression, and we need to not let social media impact us negatively.
Why should we keep facing a world where people are being bullied, when we could do something about it? Should cyberbullying be considered a criminal offense? If cyberbullying were to be a criminal offense, would it decrease? We are apart of the problem in which is causing others to lower their self esteem and commit suicide.. For example, if one were to post a picture on instagram, and others were to comment mean and cruel things, that person would not feel mentally and emotionally okay. So why not stop all this nonsense? There’s one word for that. And that word is money. Money plays a huge factor when trying to stop bullying especially when it comes to social media standards, because why lose all your money and shut down the app, meanwhile people are committing suicide, depressed, and bringing themselves down. We are the only ones who can stop this. We are the ones who need to protest against this, and really speak about what is right and what is wrong.
Put yourself in the shoes of others that are getting bullied. When they ask for help, do they really get help? Does it really make them want to stop them from taking those pills, or stop posting there pictures that they feel beautiful in? We need to take action in this and stop this fake world that we are living in and really take it into consideration that there are other people choosing to leave this world because of a comment someone made on social media. Cyber bullying should be a criminal offense. The reasons to this are because the people making these nasty comments to bring others down is causing the target to take their life. They are the one making the comment. They are the one who’s putting this target into a place of depression and sadness that no one should face. Everyone should know right from wrong so that when the offender gets confronted and claims that they “didn’t know,”this is false because they are the ones who triggered the victims emotions and played with their head.People need to learn that the consequences of cyberbullying are serious in this world.
Just as someone is getting bullied, the bully may also be going through something in their life and want to make others feel the same way that he/ she is feeling So, how do we stop the bully from targeting others? We need to speak up And help open their eyes and show them that what they are doing is wrong and really impacts the lives of others. In our society today, we never know what one is going through so this bully just needs a punching bag. And that punching bag is a person. With in this both the bully and the target get hurt.
When we notice a bully we always have to think to ourselves, “What could this person be going through in their life?” According to verywellmind, the reasons why bullies have a need to target others are because targets are well liked or popular, targets are viewed stereotypically or prejudicially, and targets have physical features that attract attention. Targets having physical features that attract attention promotes jealousy toward the wrongdoer. Jealousy plays a huge role in this because the bully just wants to make you feel like crap and in the end the bully wins. It’s not only whether you are pretty you attract attention, it’s whether you are short, fat, tall, have a big chest or no chest at all, bullies will find a way to utilize your appearance and bring you down. Do we have to be pretty in order to attract attention? Any type of appearance will attract a bully whether you are pretty or not. In the end we need to realize that standing up for ourselves, and making ourselves the bigger and better person will help us defeat this obstacle.The bullies confidence will eventually decrease and they will understand that what they did was wrong and will not do it to anybody else.
We need to help better the effects of cyberbullying, but how can we do this? The effects that play a major role in cyberbullying are depression, anger, suicide, and low self- esteem. We need to really take into consideration that we are losing many people due to the effects of cyberbullying and this needs to stop. An article from BullyingUK tells us that “It has been well documented that cyberbullying has resulted in tragic events including suicide, and self-harm and clearly, more needs to be done in order to protect vulnerable children and adults from online bullying.” How can we help these people who are facing these horrible feelings and thoughts? Some examples BullyingUK tells us is “letting them know that there is help available to them, support them to talk to a teacher that they trust so they feel they have somewhere safe at school to go to, encourage them to talk to their parents or speak to another family member, take any type of screenshots of the cyber bullying so that there is proof of this is happening, and report all abuse to the relevant social media networks by clicking on the “report abuse” button.”
Some statistics that show this are: 5% reported self-harm, 3% reported an attempt of suicide as a direct result of cyber bullying, 28% of young people have reported incidents of cyberbullying on Twitter, 87% of today’s youth have witnessed cyberbullying, almost 34%of students acknowledge that they have experienced cyberbullying, and one out of every three kids feel they are more accepted on social media networks than in real life. These statistics prove to us that we are not trying hard enough to take care of these innocent lives being taken away and we need to stop this. And if we did care enough,then we would put an end to this.
One of the biggest role in cyberbullying is not letting social media impact us negatively. But how can we prevent this? How can we feel confident again when someone has already hurt us and called us mean, horrible names? Social media cyberbullying should be stopped because it is in the main eye of the public. In our society today, we have devices that can save everything that has been said, or can even be seen forever, no matter what you do it will never be “deleted.” A big majority of cyberbullying incidents are being screenshotted, saved, and sent out to many people.We have a big problem that interferes with social media – and that is communicating with one another. Why is communicating through a computer easier than communicating face to face? When you are on social media and online, people tend to have this confidence that appears out of nowhere but we don’t know what is true or not because social media allows us to hid our true identity.
When the creators of social media, such as instagram and snapchat were creating these apps, they had a purpose, and this purpose was to connect with others and gain stronger connections with everyone around the world no matter what part of the world one is in. But honestly, thinking about it, it does more harm than good. An example is all these young people in the world are facing the world of fakeness, and negativeness. It’s bringing all these kids more negative damage than positive.
Social media exposes young children to too many things that they may not understand. Why are we harming these children for no reason? Social media has this power of being a bully without any type of consequence. The people who do participate in cyberbullying want to bring others down and put them in a place no one would want to see them in. The best way to put a stop to cyberbullying is if these websites take responsibility themselves. We should have people on these social media sites that prevent all this nonsense from happening, there should be people watching out for all the other people who are being harmed. And if these sites actually “cared” about the people affected by this matter, they would try their best to stop this. Once we see these changes in our social media sites, the bully might stop from taking on these negative actions.. Even though social media creators can not get rid of all cyberbullying in the world, they can help to make a difference and help to spread positivity.
In conclusion, bullying is a very serious matter, whether we like it or not, and whether we are participating or not. We need to come to the realization that bullying can occur in anyone’s life, whether you are victim, a bully, or a bystander and we may or may not know of it. Cyberbullying is calling us to take active steps to stop the bully from targeting others, we need to help better the effects of cyberbullying, such as suicide and depression, and we need to not let social media impact us negatively. Cyber bullying is a growing concern among parents and adults that needs to be eliminated before it gets out of hand. We are the ones to stop this. We can’t just sit and wait for someone to magically appear and save everyone. If cyberbullying didn’t exist we would be saving the lives of innocent ones. Go to stopbullying.gov in need of getting help or want to help others who are getting bullied. Even though we can’t stop any bullies, we can try to help any victims who are in need of any help.
We need to help them with any embarrassment and humiliation that they face. Our society can and will help those who do go through cyberbullying and suffer from it and all we can do is protect them from the media and be there for them.
Cyberbullying: what does it mean and how can it be solved. (2021, May 21).
Retrieved August 10, 2022 , from
This paper was written and submitted by a fellow student
Our verified experts write
your 100% original paper on any topic
Our editors will help you fix any mistakes and get an A+!Get started
Please check your inbox | <urn:uuid:5c91430c-8a34-4e0a-ac5a-5518540d2a47> | CC-MAIN-2022-33 | https://supremestudy.com/cyberbullying-what-does-it-mean-and-how-can-it-be-solved/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00205.warc.gz | en | 0.972805 | 2,344 | 3.625 | 4 |
Almost every element of our lives is significantly impacted by technology. Therefore, it makes sense to embrace anything that has such an impact on our daily life when we come across it. Some people have “embraced” technology more than others by learning how to code. Students who study computer programming have to understand coding languages. However, it goes without saying that learning such a language is not easy as there are different types of coding languages existing in the programming world.
Moreover, it can be daunting to enter the world of computer coding or explain such skills to students because there are hundreds of coding languages available. However, languages used for coding don’t have vocabularies or alphabets like human languages do. In fact, they approach their own set of codes that includes unique commands, abbreviations, and text arrangement strategies. Still, with numerous coding languages available, it is hard for students to learn them and know about them. This is why JavaHomeworkHelp.com has created this blog to help you know about the various forms of coding languages and how they work.
But first, let’s define a coding language in detail.
What are Coding Languages?
Humans communicate with machines through coding. It is what enables us to develop computer software, including programs, operating systems, and mobile apps. To understand it more thoroughly, we can say that coding languages is a tool used to offer a set of instructions for a computer to follow. Coding languages were created to convert the binary, or strings of 1s and 0s, that computers use as their “language” into a form that humans can read and write more quickly.
Exactly why is coding used?
Many diverse actions can be performed via computer code like:
- Numerous programming or coding languages are used by developers to create websites and applications.
- Coding languages including SQL, Java programming, and Python are frequently used by back-end developers to create the computer code that links websites to databases on user-account-based services like Facebook, Instagram, or LinkedIn.
- Also, other coding languages, such as Python, Objective-C, C#, Swift, or Ruby on Rails, are used by developers to make computer software and mobile applications.
It is understandable why code is everywhere since computers depend on it to function. In coming times, we can say that computer coding will become more widespread and the use of coding in our daily lives will increase.
Read Here: How to setup JDBC Connection In Java
Classification of Coding Languages
Coding languages can be divided into different categories on the basis of their uses and degree of abstraction from human language. Coding languages can generally be divided into two categories: low-level languages and high-level languages, both of which can be further subdivided.
High-Level Coding Language
There is more abstraction present in high-level programming languages. This means that they are further away from machine code and closer to human language. Since they are simpler for most programmers to use, these languages are also more likely to work on a variety of computer networks.
Some examples of high-level languages are Python, Java, C, and C++. You can also take assignment help services to learn these languages. There are experts who can offer you Java assignment help, help with Python assignments, and so on online.
Some features of High-level language are:
- It is simple to interpret and compile.
- It’s simple to debug.
- It uses more memory than low-level languages because it is less memory efficient.
- high-level language can be converted into machine code using a compiler/interpreter.
- It is regarded as a language that is user-friendly for programmers.
Low-level programming languages are harder to read and write because they are so unlike human language. These languages tend to differ from computer to computer and take much skill to understand and utilize.
These languages enable software developers to produce much more complex and effective programs. Machine code and assembly are two examples of low-level languages.
Here are the features of low-level languages:
- It is also referred to as machine-level language.
- It’s challenging to comprehend.
- It cannot be executed on other platforms because it is dependent on the machine.
- It needs an assembler to translate the instructions.
- In the modern era, it is not frequently used.
In addition to high-level and low-level programming coding, there are various paradigms as well such as object oriented, database, functional, procedural, and logical. You will get to learn all these during your study of coding languages.
Also Read: Setting up the environment in Java
The Major Coding Languages Types Based On Their Use
There are some other coding languages as well that fall under the category of their usability. However, these are also considered the most popular coding languages that are mostly used in computer programming.
Furthermore, different coding languages have various applications, and many developers have individual tastes and preferences when it comes to the languages they employ.
So, here we have the coding languages that are used by almost every developer.
One of the oldest and most effective coding languages still used in programming is C++ (formerly known as C with classes). Bjarne Stroustrup invented it in 1979. It is a middle-level, general-purpose, object-oriented coding language. Everything, including computer games and mathematical simulations is written in C++.
The language is used in conjunction with C in the source code of Microsoft Windows and related programs.
Key Features of C++:
- Pointers in a syntax-based language
- Memory control
- Platform-dependent rich library
- Powerful and quick
- Increased command
- Independent of platform
- Making Simple Client-side Calculations to Validate User Input
- Creating HTML Content While Ascertaining the User’s OS and Browser
Python is a free and open-source programming language with an understandable syntax that was created by Guido van Rossum in 1991. Due to its comprehensible code and variety of applications, it is one of the most used languages today.
Python’s clean and expressive syntax was created with an emphasis on code readability. For this precise reason, many people decide to study Python first. Moreover, it promotes program modularity and code reuse by supporting modules and packages.
Key Features of Python
- Simple to code
- Free and open-source software
- Object-oriented language
- Free and open-source software
- Integrated and Interpreted
In 1995, James Gosling and Sun Microsystems introduced Java, a cross-platform programming language. The greatest advantage of writing in Java is its adaptability. Its philosophy has always been “write once, run anywhere”.
Java is a class-based, object-oriented programming language that is used to create a variety of programs for all platforms, including games, database connections, desktop, mobile, and online applications. Students who are studying Java and facing issues in project writing can easily take Java Project Help online from any online academic writing portal.
Key Features of Java
- Portable and object-oriented
- Simple and secure
- Architectural interpretation without bias
- Parallel processing
The recursive abbreviation PHP stands for Hypertext Preprocessor. It was developed in 1995 by Rasmus Lerdorf and is the greatest coding language to learn. It is an open-source programming language that is made specifically for building dynamic web pages that efficiently interact with databases. Additionally, it serves as a general-purpose programming language as well.
However, it is a high-level interpreted scripting language despite having the lowest level of access of any web server language. Furthermore, automating routine web development activities like URL mapping, session management, and authentication is made possible with the use of PHP utilities and functions.
Key Features of PHP
- Loosely type language
- Simple and easy to use
- Monitoring Access in Real-Time
- A Platform for Reporting Errors
You now have the list of the top coding languages at your disposal. Fortunately, not all of these are necessary to become a skilled programmer. Most programmers focus on a limited number of languages, frequently just one. Therefore, utilize this list to enter the world of the programming you enjoy.
Also Read: How and where to download java setup?
Enroll Yourself in Online Classes And Become a Proficient Coder!
Critical thinking and creativity are necessary for coding. For some computer programmers, learning to code may be challenging, but it can also be rewarding. This is why many educational institutes around the world have started providing online coding classes to students at various levels. From certifications to degrees, you can enroll yourself in any you wish to pursue.
With the hit of the COVID pandemic where everything turns to online, the education sector has also changed and started teaching online to students. However, this is a great opportunity to learn coding at your comfort pace without traveling anywhere. There are many universities such as Harvard, Massachusetts Institute of Technology, University of Illinois, and others that are offering online coding courses at all levels to all students around the world. Similarly, various online portals such as Coursera, Codecademy, edx, etc are also offering certifications in coding.
Also, to help students online classes and exams, JavaHomeworkHelp.com has come up with the online class help and exam help where students can hire an expert to take their online class or exam or even for assignment writing as well.
|Q:Is it challenging to learn Coding?|
A: It’s not tough to learn how to code. To truly master and excel at coding, however, takes practice and dedication, just like with most other abilities or professions.
|Q:How do I begin my coding learning?|
A: You can learn to code in a number of ways, including by taking an online coding course, reading coding-related books, watching tutorials, finding mentors and other coders, enrolling in coding Bootcamp programs, etc. | <urn:uuid:8011afec-df24-4f80-9d23-21e19a82f683> | CC-MAIN-2022-33 | https://www.javahomeworkhelp.com/blog/different-types-of-coding-languages/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00404.warc.gz | en | 0.936997 | 2,275 | 3.859375 | 4 |
St Lucia. Skip to main content. *The Limbo dance originated as an event that took place at wakes in Trinidad and Tobago, and was popularized by dance pioneer Julia Edwards (known as the First Lady of Limbo) and her company, which appeared in several films, in particular "Fire Down Below" (1957), and toured . Founded in September 1980, as the umbrella body of dance and. T.Geddes Grant (Trinidad) Ltd, Trinidad, West Indies; Printed by Syncreators Ltd. Freedom of Information Act Public Statement 2022. Bele - folk dancing in Trinidad & Tobago.
2011-12-02 16:03:42. A drum is played by a "bwate" who beats a . , The Dragon Can't Dance, Trinidad, Trinidad & Tobago, West Indies. Congo Bele; Egyptian Oriental/ Belly Dance; Tobago Jig; Reel; Wiki User. 1. She was a member of the Katherine Dunham Dance Company between 1940 and 1945. In 1995, it was re-named Indian Arrival Day. The Dance in Trinidad and Tobago; Ajello, Elvira, 1932, The Solo Irish Jig; Ajoian-Schleadewitz, Fran, 1996, 1961, Armenian Dances; . Limbo is a folk dance that is indigenous to Trinidad and Tobago. The La Trinity. In the late 18th Century when the French plantation owners and their Creole slaves came to Trinidad and Tobago, they brought with them a life style of "joie de vivre" to their plantations. The Trinidad Cross. Calypso , which has been called a poor man's newspaper in times when literacy was not wide spread , traces its roots to African traditions of improvised songs of . Scott, D. An Echo in the Bone - Plays for Today, Longman, 1985. This site is designed to provide Csec Online Maths Physics AddMaths Lessons, Courses and Practice Exercises with Feedback.
Princess of Dance, Queen Mother. Family and friends gather to remember the deceased, a ritual that is important to give peace to the departed, and to those who come to honour them. 60 CXC 32/G/SYLL 01
They won the French Influence Category.Follow our instagram page : zante. A neuroscientific analysis of Trindad's carnival street dance-play and theatre arts as industrial medicine Carnival . Of all the dances, however, the Bele/Belaire engaged her the most. A meeting point for cultural traditions preserved by migrants from around the world, Trinidad is constantly abuzz with artistic and cultural activity music, dance, theatre and drama, fashion, literature, and much more. The Ritual of Friday Morning First Period, Caribbean Plays for Playing, Trinidad and Tobago, 1994. Play Tested. See what Molly Dickinson (mollyisonmars) has discovered on Pinterest, the world's biggest collection of ideas. Fiscal policy for the economic development of Trinidad and Tobago L BOBB Federation in the British West Indies West Indies Federation West Indies ; Caribbean Rawle C BOLAND The origins of the Senate of Trinidad and Tobago and its nature and functions up to 1976 - a refutation ofthe transplantation of the Westminster model Dr A F Madden Oxford . Kalinda (or Calinda) is a traditional stick-fighting dance that is practiced during Trinadian carnivals. Bele Lino , French Caribbean African-derived set dance of northern Martinique. Constance, Z. Rivulet and Factory Roads, Brechin Castle, Couva Trinidad & Tobago, P.O. answer choices . History of Bele In the late 18th century, French plantation owners came to Trinidad and Tobago The French held many balls where they dance courtly dances like the minuet House slaves brought the dance to the field slaves Showed off by doing graceful and gentle gliding steps What award did she receive from Trinidad and Tobago in 1989? Queenie, Flower Lady <p>Mother of Dance, La Belle Rosette</p> . Shop by category. Buy The Mother Goose Primer Books Online By Belle Wiley from Bookswagon.com Upto 50% Off 30 Day Replacement Guarantee Free Shipping Cash On Delivery! From Wikipedia the free encyclopedia . Shop belle and beast t-shirts created by independent artists from around the globe. In addition, what dance did the French perform in Trinidad and Tobago? Be Unique. Trinidad & Tobago Carnival is scheduled for Monday-Tuesday, February 28 - March 1, 2022. Folk Music of the Caribbean: The Kalenda, the Bele, the Bongo Elder, J. D. (Jacob Delworth), 1913-2003 Trinidad and Tobago. In Africa, the bl dance had origins in festivals associated with mating and fertility. The skirt is very full with a double layer of tulle underneath. Ya'akov, Ginsburg, Michael and Birchfield, Belle, 2000, Laguna Folkdancers Festival 2000 Syllabus; California - Laguna . It is maintained in folk celebrations in Trinidad and Tobago. Curry duck is a popular Caribbean dish, especially in Trinidad and Tobago. Hairlines are different to scratches or wear. World of Music is our exciting programme of music and heritage learning and research taking place at Band on the Wall. undated: Box: 22: Towards the Devising of a Scale for Evaluating Progress in a Traditional Art Movement CFA Ada Belle Winthrop King Art Endowment Award 2019-2020 . Contemporary Choreographers Collective Dance (Trinidad) University of the . BELLE STARS - SWEET Memory & Romance .UK.STIFF 7" VINYL PICTURE DISCS.
On 30th May each year, Indian Arrival Day commemorates this momentous event by staging a re-enactment of the arrival of the Fatel Razack at various beaches throughout Trinidad and Tobago. Scott, D. An Echo in the Bone - Plays for Today, Longman, 1985. You can learn an instrument from scratch, participate in a weekly choir . Year-round, we run classes and courses designed to nurture talent and promote hands-on learning in music.
10/10/2021. The Society of Folk Dance Historians. Panama. Posted by. Funding for this project has been provided by Mrs. Irma E. Goldstraw. Service Charter. Hill, E. Dance Bongo - Caribbean Plays, Vol 2, University of the West Indies, 1965. Calypso 4. The Kalinda dance originated in the 19th century and involves two dancers who pretend to. Princess of Dance, Queen Mother. Regulated Industries Commission's Standards. Award winning choreographer, Hazel Franco took a deep interest in the folk dances of Trinidad and Tobago very early in her career. It may be the oldest Creole dance of the creole French West Indian Islands, and it strongly reflects influences from African fertility dances. The Title is Belle. u/No-Signature-1239. 4, (September 1958), pp.3-17 Notes: The author comments on the recent West Indies Arts Festival in Trinidad and on the arts in general - poerty, drama, literature, music, drumming, painting, architecture, Carnival, particularly Trinidad and Tobago Carnival.
The bele is a flirtatious dance mainly performed by females, dressed in doulettes - dresses based on the French creole costume of lace trimmed blouses, long skirts, made with no less than 8 yards of madras or other colourful fabric, with matching head ties and waist sashes. It has a leotard style bodice. The disk looks great, it may have very light or minor visible . Apr 6, 2015 - Choreography- Kieron SargeantChantuelle- LeeAnna BoyceDrummers- Kieron Sargeant, Jahvin Neptune,Dinel Phillips 5, No. The origins of the Senate of Trinidad and Tobago and its nature and functions up to 1976 - a refutation ofthe transplantation of the Westminster model . Thursday . Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest. What award did she receive from Trinidad and Tobago in 1989? Full Sole or Split Sole - Full Sole; Material - Satin; Width - Regular; Vamp - U-shaped; Shank Flexibility - Medium; Box - Medium & Square; Vamp Depth - Medium; Brand - MERLET ; Suitable for - Classical Ballet KNOW YOUR HISTORY: The bele is a folk dance of Creole Caribbean origin.
5 were here. Heel and Toe 5. The La Trinity. An amazing set!</p><p>Selling this as a set ONLY. Labels: bele , culture , folk dance. Constance, Z. Dolls are displayed in a glass case. <p>Disney Store Beauty and the Beast Live Action Beast Doll And Belle Doll. Never played with, the condition is excellent. Shop Online 24/7. Bele at the Folk Fiesta ( Heritage Festival). Play Tested. We can keep its magic if we all share the same vision. History of Calypso. a far older artistic heritage"xii. The Trinidad Crown <p>The La Trinity</p> C Deb Clement trinidad & tobago Colombian People Colombian Culture Colombian Art People Dancing Dancing In The Rain KNOW YOUR HISTORY: The bele is a Creole Caribbean folk dance. Trinidad and Tobago. The dance originated as an event that took place at wakes in Trinidad and Tobago, and was popularized by dance pioneer Julia Edwards (known as the First Lady of Limbo) and her company which appeared in several films, in particular, "Fire Down Below" (1957) and toured widely in the Caribbean, Europe, North and South America, Asia and Africa in the 1960s and . Articulated Beast and Belle dressed for their romantic dance are perfect for collectors who cherish this beloved, timeless fairy tale. There is also music and dance, and outstanding members of the community are honoured .
Keeping the Magic! La Belle Epoque Black Is Black 7" Vinyl HAR 5133 G+. Based on characters portrayed by . (Trinidad & Tobago Entertainment Industry Coalition, 2006) In the midst of these anxieties about the designation and direction of the national arts, many cultural workers consider where the support for their creative work lay in a system that privileges Carnival and Best Village as dominant sites of local-national cultural production. The Nation's Sole-Transmission-and-Distribution-Utility. A bl is a folk dance and music from Martinique, St. Lucia, Dominica, Haiti, Grenada, Guadeloupe, and Trinidad and Tobago. G A V BELLE The politics of development: a study in the Barbadian . It can change, but the Trinidad government said that there will be a Carnival show, but no street parties.
In Bl, a man and woman show off their dance skills as a "chantuelle" sings lyrics and a "lavway" sings a chorus. St Kitts & Nevis. The limbo dance, originally a ritual performed at 'wakes' (funeral dance which maybe related to African legba or legua dance) in Trinidad from the mid or late 19th century does not appear to have any roots in West Africa where most African traditions within the diaspora have emerged. Choreographer and dancer Dave Williams in his iconic performance 'Scan' (2009). Trinidad's arts & culture: an overview. Smoke free home. Music of Trinidad and Tobago: General topics; Related articles
The Trinidad Crown <p>The La Trinity</p> This showed that McBurnie was determined in creating an Limbo Dancing originated in Trinidad. Dance. Folk music. 2 hours ago. The label on the disk is likely to have minor wear and possibly writing on the label. Posted by. United States of America. The Society of Folk Dance Historians (SFDH) . said "Dance played a special part in Caribbean and perhaps especially in Trinidad and Tobago's. culture; in exploring it, McBurnie was not only casting off a colonial mindset but also reclaiming.
Shop by category.
The British had begun to take a keen interest in Trinidad, and in 1797 a British force led by General Sir Ralph Abercromby launched an invasion of Trinidad. Trinidad bl When French plantation owners arrived in Trinidad in the late 1800s, they brought with them a "joie de vivre" lifestyle to their .
Trinidad and Tobago is known for Spectacular beaches, gorgeous untouched nature, African heritage and coral reefs. Bele or Bel Air , Trinidad and Tobago A social dance found among the African/French (Creoles slaves) in Haiti, Martinique, and other islands. His squadron sailed through the Bocas and anchored off the coast of Chaguaramas. Enter your search keyword. Hill, E. Dance Bongo - Caribbean Plays, Vol 2, University of the West Indies, 1965. The Calypso in Trinidad and Tobago, is mainly of African origin, and can be traced to the traditions of West Africans in terms of music , structure and function. Lambert School of Dance Gymnastics Club updated their phone number. Zante Dancers ( Best Village 2017 ) Creole Bele' Performance This dance was constructed by Darcelle Kirk, the founder of the Zante Dance Company. The reel and jig are evidence of Tobago's African roots, traditions which survived colonial oppression by once camouflaging themselves in the European form of British sailors' dances. A medallion showing the capture of Trinidad and Tobago by the British in 1797. Advanced: Daily Deals; Brand Outlet; Help & Contact; Sell . The Bongo is a dance that celebrates the life of one who has passed from this realm, as they transition to the afterlife. More posts from the Putin69 community. Award winning choreographer, Hazel Franco took a deep interest in the folk dances of Trinidad and Tobago very early in her career. Saint Vincent & The Grenadines. Music of Trinidad and Tobago: General topics; Related articles The set comprises the belia, the gwanbele, and the bidjin bele.
This cute dress belonged to a friend when she was a girl in the 1950s. The Trinity Cross. u/No-Signature-1239. Photographer: Oswin Browne Visual art The Kimme Museum There is a small but impressive visual arts community in Tobago. The Lmb (Limmm-B) is a unique dance and is also known as the "Under Stick Dance".
Puerto Rico. Bridget Jones Award - 2019. control. This paper examines the role of Indian movies on East Indian dress and dance in trinidad and how it influenced the identity of East Indians in the country . The disk looks great, it may have very light or minor visible marks or wear, but when playing there should be very minimal or no surface distortion. Wiring For Light And Power.
Your one stop Fabric Shop - Quality Fabric for all your sewing and quilting needs - One of Australia's largest online fabric shops with fast postage worldwide - Afterpay, zipPay,Paypal and all major Credit Cards - .
He is the founder of the National Ramleela Council of Trinidad and Tobago and served as its first chairman from 1991-2005.Primnath Gooptar holds a PhD in Cultural Studies (UTT) [ The . Hazel Franco, dance ethnographer, choreographer, UWI coordinator and CXC examiner for dance. A new King and Queen of Carnival have been crowned. Vote. Code of Practice for Continuous Customer Education. Queenie, Flower Lady <p>Mother of Dance, La Belle Rosette</p> . Thousands of fabrics and notions to choose from Bl may be the oldest Creole dance of Caribbean Islands. Hazel Franco, dance ethnographer, choreographer, UWI coordinator and CXC examiner for dance. From Wikipedia the free encyclopedia . It was constructed by her grandmother who was an excellent seamstress. Who won King of Carnival 2020? 2 hours ago. The Calypso dance in Trinidad originally was the Bamboula and or Chica of the 1880's, while today it is referred to ' Jump Dancing ' during Carnival in the Port of Spain. Vote. It was called Arrival Day. Quality of Supply. Duck used in this type of curry is the Muscovy, which is typically raised by many village folks on the island.The meat is traditionally marinated in a combination of salt, pepper, cumin, curry powder, hot peppers, cilantro, scallions, onions, and garlic. Edgar Mittelholzer's social realist novel set in a Port of Spain office in a Trinidad on the cusp of social change offers some useful insights on Trinidadian society and the author's own views on race, class, gender, sexuality, identity, and the human condition. Most Outstanding Choreographer Award in Trinidad and Tobago. The Trinidad Tobago Dollar or TTD.The Trinidad and Tobago dollar. undated: . This is a very useful resource for the Form 1 Dance project. It has a strong resemblance to African fertility dances. Mother of Dance, La Belle Rosette. Box 1127, Port of Spain 1-868-636 8471 1-868-636 2905 National Energy Contact https://www.nationalenergy . Her daughter, Sara Yarborough, was a star dancer with the Alvin . Baby, It's The Rain 4:18. The Title is Belle. Limbo 2. AL GREEN Belle Scarce 1977 UK solid centre 7" vinyl single, also including To Sir With Love.
The Trinidad Cross. Is Trinidad and Tobago Carnival 2022 Cancelled? Mother of Dance, La Belle Rosette. Gymnastics is a beautiful sport. Visually this disk may have light visible wear, marks, and or hairlines. Belle air Bongo Pique Of all the dances, however, the Bele/Belaire engaged her the most. . Address: Cor. Trinidad and Tobago. La Belle Epoque Black Is Black 7" Vinyl HAR 5133 G+. Electric Vehicles. The postcard depicts a dancer manoeuvring under the limbo pole while the others dance around the dancer under the stick.
This answer is: . The Trinity Cross. . Trinidad and Tobago. Later the Ballroom version (c.1956) was tailored after the Rumba Box Step ( when the music is slow) or the Samba ( when the music is faster, Soca) with a splash of Bolero . Cayman Islands. More posts from the Putin69 community. Tariffs. Pointe Shoes MERLET Belle Belle-C-S2. answer choices .
andalucia tours from seville. Lavinia Williams was an African American dancer, teacher, and choreographer who played an influential role in the development of modern and folkloric dances in Haiti, Jamaica, Guyana, and the Bahamas. There's more to Band on the Wall than gigs. Trinidad and Tobago.
It reflects strongly the influences of African fertility dances. Just click on the picture to see the details. The Ritual of Friday Morning First Period, Caribbean Plays for Playing, Trinidad and Tobago, 1994. After one year of consultations with members of the gymnastics community, FIG is set to present the #10GoldenRulesOfGymnastics.
We print the highest quality belle and beast t-shirts on the internet
65. The limbos dates back to the mid to late 1800s in Trinidad.It achieved mainstream popularity during the 1950s. National symbols of North America. Kalinda 3. Laird, Colin Title: The arts in the West Indies In: Shell Trinidad, Vol. | <urn:uuid:f7e7fba6-81fc-4a0e-b678-c3da58c3eba4> | CC-MAIN-2022-33 | http://forker.hu/stolichnaya/gujarat/jlab/1009376999741cf3822-ter-1983 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00404.warc.gz | en | 0.905565 | 4,085 | 2.578125 | 3 |
Documents required for Non-ECR category. Though there have been caste rivalries and caste tensions in Bihar since long, there was a distinct qualita-tive increase in their tempo following independence. info)) is a demonym given to the inhabitants of the Indian state of Bihar.Bihari people can be separated into three main Indo-Aryan ethnolinguistic groups, Bhojpuris, Maithils and Magadhis. Okay, I do see a specific purpose behind this question. Even if I consider his caste is irrelevant but considering frequent advertising of Mr Modi' In deciding tickets for the 160 assembly seats the BJP will contest in Bihar, party president Amit Shah listed three criteria winnability, caste and age of the ticket seekers. For the individuals who don't have the idea who Amit Shah is, he is a prominent Indian politician. He is the current Home Minister of India, the Pr Sine-qua-none of Indian society is its caste structure; this is all the more the case with rural India, and in the context of Bihar, where feudal and semi-feudal relations of production predominate, caste by far outweighs any other parameter for social, political and economic understanding of the society. Shah surname usually represents the Bania caste in Jain and Hindu communities. PATNA: Bihar has taken the caste tag to its Child Care Institutes (CCIs). The Legislative Assembly election was held over five-phases in Bihar through OctoberNovember 2015 before the end of the tenure of the prior Legislative Assembly of Bihar on 29 November 2015.. They could only remain confined to scattered Brahmin pockets. While several dynasties ruled the Rajbanshi community in the pre-colonial era, the 16th century marked a watershed with the Koch Kingdom taking over, In Kumaon Sah are Kshatriyas ADVERTISEMENTS: A caste is a social category whose members are assigned a permanent status within a given social hierarchy and whose contacts are restricted accordingly. Shah attains a supreme place among of Kumaon. General caste list in Bihar, Uttar Pradesh, Rajasthan, Uttarakhand, west Bengal, Orissa, tamilnadu, Punjab other state of India. Shah surname usually represents the Bania caste in Jain and Hindu communities. Debates around development, caste and caste-based mobilization are each given relevant attention as the chapter examines the connection between caste identity, aspirational politics and electoral politics. Of the BJPs 110 candidates, 51 are upper caste, even though they constitute only 16 per cent of Bihars population. Like other Muslim communities of Bihar, they date their origin to the time of Bakhtiyar Khilji, the Muslim conqueror of Bihar. New Delhi: Lok Janshakti Party chief Ram Vilas Paswan met BJP president Amit Shah on Sunday, seeking an ordinance to restore the original provisions of a law on atrocities against Dalits and called for ensuring reservation in promotion for the community. Before that, in 2011, socio-economic and caste census was done in 2011, though caste data could never be made public due to several discrepancies. Steps to apply for Caste Certificate Offline: In order to get the caste certificate offline you need to visit the nearby Tehsil Office, Revenue Office, SDM Office or The visit came close on the heels of the Centre telling the Supreme Court that a caste census of backward classes is "administratively difficult and cumbersome" and excluding such Rajbanshis inhabit parts of Assam, north Bengal, Bihars Purnia district, parts of Meghalaya as well as some regions in Bangladesh, Nepal and Bhutan.. Can primordial social categories like caste be invested with a self-propelling Caste has survived development in Bihar and its not a bad thing: politics that favours one need not necessarily preclude the other the upper-caste category that Singh belonged to. Former Bihar Chief Minister and president of Hindustani Awam Morcha (Secular) [HAM-S] Jitan Ram Manjhi, has hit headlines recently because of his remarks allegedly offending upper castes. Paswan, a Union minister and a key BJP ally, told PTI that he also raised the issue of special category status for Bihar, a NRC, NPR, Caste Census: Three decisive measures seem to indicate that the Bihar Chief Minister Nitish Kumar still has a firm hand over the A social and educational survey, seen as an equivalent of a caste-based census, was conducted in 2015 by the then Congress government in the southern state. Ahmad Alis classic novel Twilight in Delhi (1940) portrays a vivid picture of the city and its Muslim inhabitants as it existed in the early 20th century when Mughal rule was at its decline. View all posts by Manoj Kumar Shah | Website. Shah Comes under Hindus and Jains. Shahs are baniyas and speak mostly gujarti and Kutchi. Most of them comes under OC. It is also a shorter form of Shahryar and is often used in names with a political or aristocratic meaning. The government website has the list of documents required in PDF format. As per Almost all political parties in Bihar identify themselves with a particular caste, sub-caste or community for representation, and leaders cannot afford to take their political identity out of that caste or group. The objective behind this demand is to bring out the recent changes in caste groups and how resources may be best shared. Shah is an Indian surname in Gujarati language and Kutchi language that is used by Hindu, Jain and Muslim communities. Shah surname usually represe The Sayee of Bihar claim to belong to the Shaikh Siddiqui community, and claim descent from Abu Bakar, the first caliph of Islam. Copy. answer to your question is Yes, my name is Anil shahi and i m Hindu raj put of A very rare bisen clan. After the resolution of many controversial political issues such as Ram Mandir, abrogation of Article 370 in Jammu and Kashmir, Triple Talaq law etc parties with a socialist ideology are no longer left with burning issues. Opposition parties worked only for particular castes when they were in power in UP: Amit Shah. Ajay Kumar, a well-known journalist from Bihar, says that there is no doubt that politics in Bihar is based on caste. Stopping short of calling it a To apply online for a caste certificate in Bihar, follow the steps given below: Step 1: Go to the Bihar RTPS website. Brahmin is itself a caste . There are in India more then 300 subcastes of Brahmans . [ as listed in a book Brahman Niryay[ Chhotay Lal Sharma ] , J Applicants can check the list of documents required in 2020 while applying for the fresh passport or reissue or renewal of passport depending on their need. 1. the two sides also had a dispute over the census on the basis of caste Mumbai's air quality plummets to 'satisfactory' category. List of Documents Required for Fresh Passport A. Of these 51 upper castes, 22 tickets have gone to Rajputs, 15 to Bhumihars, 11 to Brahmins and three to Kayasthas. In Alis narration of everyday lives of the characters in his novel, we come across the notion of caste as it existed among the Muslims of South Asia. They are also further divided into a variety of hereditary caste groups. Step 2: On the header, click on Apply Online and under RTPS Services, select General Administration Department, followed by Issuance of Caste Certificate. No Comments. Bihar assembly has passed a resolution The Bihar assembly has passed unanimous resolutions, in 2019 and 2020, favouring a census on the caste lines. The Shah/Sah are a Hindu caste found in the states of Uttarakhand, Madhya Pradesh, Chhattisgarh, Uttar Pradesh,Bihar and Gujarat in India. In April 2015, the Janata Parivar group (a group of six parties Samajwadi Party, Janata Dal (United), Rashtriya Janata Dal, Janata Dal (Secular), Indian National Lok Dal and Samajwadi Shah are a Jain and Hindu caste found in the Indian states of Gujarat, Rajasthan, Madhya Pradesh, Uttarakhand, Chhattisgarh, Uttar Pradesh, Bihar, Tamil Nadu and cities like Mumbai. It is the most rigid and clearly graded type of social stratification. The BJPs Bihar unit president Dr Sanjay Jaiswal and the JD(U)s national president Rajiv Ranjan Singh alias Lalan Singh had on Saturday sparred bitterly over the states law and order situation amid the ongoing Agnipath unrest. "Whenever the Samajwadi Party or Bahujan Samaj Party formed the 1. Who are the Rajbanshis. Politicians have no religion for their own.. They just make people fool on religious agendas. Bihar CM Nitish Kumar mocks Amit Shah Zee News.
Shah is short form for Shahryar - which is of Persian origin. Source:Google. They don't need any title . I have seen them whatever title the like they put it with their name whether it Singh or other respectable titles (in t The Sah surname is also used by Gond/Gorh () caste in Bihar and Uttar Pradesh. Gond caste falls under Scheduled Tribes (ST) under the ninth schedule of the Constitution of India. Sah surname is also used by the Baniya community in Bihar. According to their traditions, the Shah/Sah are Rajputs from western India, Bihar caste calculus Blogs, Comments and Archive News on Economictimes.com common practice to prefix "Sah" before a king's name. Manoj Kumar Shah. Caste, religion and gender in the courts of Bihar over a decade* Sandeep Bhupatiraju (World Bank) Daniel L. Chen (Toulouse School of Economics, World Bank) Shareen Joshi (Georgetown University) Peter Neis (Toulouse School of Economics) November 29, 2020 Abstract Bihar is widely regarded as one of Indias poorest and most divided states. The tongue-in-cheek remark came from Samrat Chaudhary, an outspoken member of the Nitish Kumar cabinet who holds the Panchayati Raj portfolio. They find their roots in the Kamata kingdom. Each section of the Shah community has its own origin myth. NEW DELHI: As calls for a caste-based census grow, a delegation of Janata Dal (United) MPs, led by party president Lalan Singh, met Union home minister Amit Shah on Monday | Latest News India Caste-based census was conducted way back in 1931, the chief minister had said. The Janata Dal, a new party swept the elections to win the highest number of seats and vote share, winning 122 seats and 25.61 per cent respectively, in the 1990 elections. leaders (of the latter category) like Kedar Pandey, Ramanand Tewary, Jagnarain Trivedi, Bindeshwari Dubey, Tewari and Lai Muni Choube emerged in politics they could not ensure Brahminical dominance of Bihar level politics. Troubles already existed in the ruling alliance smoldered quickly soon after the state BJP president Sanjay Jaiswal blamed the JD-U leadership for the protests over Agnipath scheme in For this purpose, besides secondary literature, I draw upon fieldwork conducted in two phases (October-November 2007 and MarchApril 2010) in Sitamarhi,- a district town in Bihar. The story so far: On Thursday, the Bihar Cabinet approved a proposal to carry out a caste-based count in the State. Shah means 'very large' in Persian, and it was [when?]
The Bihar assembly had on February 18 last year passed a unanimous resolution for carrying out caste census. 14-06-2022. It is also a shorter form of Shahryar and is often used in names with a political or aristocratic meaning. (March 2013) Shah (also spelt as Sah) are a Hindu caste found in the Indian states of Uttarakhand, Madhya Pradesh, Chhattisgarh, Uttar Pradesh, Bihar and Gujarat. After several extensions, it could submit its report, dividing 2633 OBC sub-castes in the central list into four sub-categories with 2%, 6%, 9% and 10% quota to add up to 27%. The proliferation of caste-based parties on Bihars political horizon in the post-Mandal era has seen a parallel rise in Gandhi Maidans political prominence; the maidan witnessed as many as 40 caste-based political rallies between 1990 and 1993-94 (Choudhary and Srikant 2001, 252). Shah Matrimonial. STATE BIHAR CODE CASTE 1 Ashur 2 Badra 3 Barber (Nai) 4 Black Smith (Luhar) 5 Brahmin 6 Carpenter 7 Chamar 8 Chowkidar 9 Cobblar 10 Kurmi 11 Jat 12 Khasar 13 . An all-party delegation from Jharkhand led by Chief Minister Hemant Soren met Home Minister Amit Shah on Sunday and demanded that a caste-based census be conducted in the country. The opposition RJD in Bihar should give up its demand for a caste-based census following its leader Tejashwi Yadavs exogamous marriage, a BJP minister in the state said on Saturday. People with Shah or even Sah as a surname, are usually traders, shopkeepers or a type of Bania in Gujrat, Maharashtra, Rajasthani etc. 4. The last chapter (Chapter 8) of the book analyses the quick turnaround that Bihar politics had witnessed within a couple of years. It has also often been referred to as the extreme form of closed class system. The Shah constitutes a small (about 0.03 per cent population) but important community of the Kumaon region. "Sahu" is known as the Jatt caste and also Teli caste of India,known as Sahu Vaishyas. Asked about the Centre's affidavit in the Supreme Court that virtually ruled out census on the caste lines, Nitish Kumar told reporters that it was "absolutely not correct", but added that the matter was not directly related to the issue of caste census. Study now. Shah doesn't has its origin in Persian or Sanskrit. It has its origin in the Indus seals and inscriptions. Caanan ( saanan) refers to the title Shah is an Indian surname in Gujarati language and Kutchi language that is used by Hindu, Jain and Muslim communities. context of Bihar with a view to delineate its specific accretions. Bihar caste calculus Latest Breaking News, Pictures, Videos, and Special Reports from The Economic Times. Bihar Categories wise Caste List 2021 (KALWAR CASTE NEEDS CORRECTIONS before Caste census: Counting the castes) August 25, 2021. Sahu - Wikipedia What is the status of the Sahu Teli Shah are a Jain and Hindu-Garhwali and Kumaoni caste found in the Indian states of Gujarat, Rajasthan, Madhya Pradesh, Uttarakhand, Chhattisgarh, Uttar Pradesh, Bihar, Tamil Nadu and cities like Mumbai. New Delhi: The BJP has a dedicated upper caste vote-bank in Bihar and the partys ticket allocation reflects that. The origin of the 'Shah' used by Hindus, such as Amit Shah, and 'Shah' used by the Muslim rulers you mentioned is unrelated. The surname 'Shah tha In the case of Bihar, the BJPs central leaders feel that the demand for a caste census in the State is an attempt to revive Mandal politics by identifying castes and sub-castes and their present status for electoral benefits. 1990-1995: LALU STORMS TO POWER. Best Answer. Yet a scrutiny of the 154 names put out so far by the BJP shows that caste has been a major factor. In the same month, BJP president Amit Shah kicked off the partys election campaigning in Patna on the day of BR Ambedkars birth anniversary. Sharply contrasted with Shah is an Indian surname in Gujarati language and Kutchi language that is used by Hindu, Jain and Muslim communities. Nawada, Lakhisarai and a few other places in the state. BIHAR is today in the midst of one of the worst phases that can be found in the life cycle of a caste-ridden so-ciety. General Categories List in Manoj Kumar Shah. | <urn:uuid:97eb1063-1e98-4444-9a76-c91128ccce06> | CC-MAIN-2022-33 | https://www.bholstertech.ca/ny/walking/seller/75504757307a70778bb6e68cd42495e56-shah-caste-in-bihar-category | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00605.warc.gz | en | 0.943869 | 3,418 | 2.671875 | 3 |
Tambopata – A tropical paradise in the shadow of gold | Part 3
Gold-mining with deforestation
Gold-mining with deforestation | by George Olah on 01 September 2020
Biogeographically Peru can be divided into three major units: the deserts along the Pacific coast, the Andean mountain range that forms the backbone of the country, and the Amazon to the east. Most of the waters of the Amazon Basin originate in the Peruvian Andes. These mountains provided the stage for many important South American civilizations, such as the Chavín culture (900–200 BC), the Huari Empire (600–1000 BC), the co-existing Tiwanaku civilization, and finally the Inca empire (1438–1572 AD). The capital of the Inca Empire – or Tawantinsuyu in their own Quechua language – was Cuzco, located in southeastern Peru, not far from Machu Picchu. The Incas were not short of non-ferrous and precious metals, which they revered as their gods. They could not have guessed that gold would bring great trouble to their heads, just as the Indian tribes living in the rainforest did not think that their great rivers were rich in gold, the extraction of which would lead to an environmental catastrophe.
Civilizations like the Andeans did not develop in the Amazon, nor did the Incas occupy these tropical regions. One of their tropical cities was Vilcabamba, surrounded by cloud forests. From 1539, this city also became the capital of the Incas fleeing the Spaniards, until 1572. Vilcabamba is also referred to as the lost city of the Incas, as it was only discovered by Hiram Bingham in 1911, although its significance was not realized until its rediscovery in 1964, which was documented by the Hungarian filmmaker Géza Rosner. According to an Inca legend, there was another lost city rich in gold, in the tropical rainforest. Countless explorers and adventurers have tried to find the legendary city of Paititi, so far to no avail. Thus, for the time being, we can only admire this mysterious city in the world of adventure movies and video games.
As a doctoral student in the Peruvian Amazon
In late 2009, as a PhD scholar of the Australian National University, I returned to Tambopata. It was very exciting to start my own research in this area, mainly based in the Tambopata Research Center. A variety of nest boxes have been set up for macaws since the start of the Tambopata Macaw Project, which differed in material, size, height, interior design and many other features. Although wild macaws were happy to occupy these artificial nests, scientists had not yet analyzed the breeding preference of macaws and which nests were the most successful. For collecting such data, we often had to climb up to the realm of macaws – at a height of 30–40 m (100–130 ft) in the canopy – by industrial mountaineering methods on a rope. From the long-term data mostly collected by the Brightsmith research group, it became clear that the macaws remembered which nests were the most successful in the previous breeding season, and they fought vigorously for them. Since publishing these results (Journal for Nature Conservation 2014 | PDF), nest box designs tested in Tambopata have been used in Bolivia, Mexico, and Guatemala to help endangered populations of macaws there.
The other part of my research examined the population genetics of large macaws. I developed species-specific genetic markers for the Scarlet Macaw (Ara macao) and other closely related macaw species (Conservation Genetics Resources 2015 | PDF). With these microsatellite markers, we were able to individually identify the samples, while also getting an accurate picture of the genetic diversity of the populations. We also calibrated these genetic methods for non-invasive samples (Conservation Genetics Resources 2016 | PDF), and thus it was sufficient to collect only feather samples without capturing the birds. DNA was extracted from the feathers in the laboratories of the Cayetano Heredia University in Lima and then shipped to Australia after obtaining the appropriate permits. Our colleagues at the Texas A&M University sequenced the entire genome of a Scarlet Macaw, which was of great help in developing the species-specific markers in Australia. Still, collecting feathers in the rainforest turned out to be the biggest challenge. In order to get a comprehensive picture of the populations of macaws in the area, it was necessary to search for feathers over a very large area. In the absence of roads, I first had to buy a 12 m (40 ft) long motorized longboat, which proved to be an indispensable means of transportation in the river highways.
The diversity of habitats
The wildlife of Tambopata is not much different from other regions of the Southwestern Amazon Basin. What makes it special is the diversity of the habitats and the overall richness of the species. Most of the area belongs to the Southwest Amazon moist forests ecoregion. Within this we find habitats of terra firme – rainforests never reached by the floodwater of rivers –, as opposed to periodically flooded rainforests. Furthermore, we can also find palm swamps with very low nutrient soils, and areas at different stages of succession, which are mostly formed by the landscaping work of the rivers. This is also how oxbow lakes are created, which maintain their own ecosystems. In the region of the Heath River, which forms a natural border between Peru and Bolivia, there are special extrazonal savannas belonging to the Beni savanna ecoregion. Within the rainforests around Heath, we can find patches of natural clearings that become more and more connected towards Bolivia and eventually replace the rainforest. Both sides of the river are protected areas, with the Bahuaja-Sonene National Park on the Peruvian side and the Madidi National Park on the Bolivian side.
The region of Tambopata provides habitat for more than 100 species of mammals, close to 700 species of birds, about 100 species of amphibians, and 100 species of reptiles. There are more than 20,000 species of plants throughout Peru, most of which are found in the rainforest and many can be used for medicinal purposes. The Native Community of Infierno has a famous botanical garden, where generations of shamans have collected their most important herbs from the surrounding forests. The garden is called Centro Ñape, and the shaman was the uncle of my research assistant, Braulio from the Ese’eja tribe, so we often visited his uncle if we had any medical issues during the fieldwork. Don Honorato always found the right herb that really helped. I was even able to join the local ayahuasca ceremony after each field season, which was a special honor as an outsider.
Birds of a feather flock together
Collecting bird feathers in the dense rainforest does not seem like a very sensible undertaking. However, clay licks where the birds come to eat soil are found in large numbers along the rivers in this area and they “collected” the feathers for us. The feathers we found were given a unique identifier, recording the exact location, time of collection, and the presumed owner of the feather, at the species level. Ecologists often use a method called capture-mark-recapture (CMR) to estimate the number of individuals in a population. This is based on the principle that if we regularly capture and mark/tag individuals of the studied species in a given area, we are likely to recapture previously marked individuals. Examining the ratio of tagged vs. untagged individuals, we can estimate the size of the population using statistical methods.
Birds are most often caught with mist nets and marked by a unique band. However, capturing macaws in a tropical rainforest is not an easy task. We did that before with my supervisor Dr. Brightsmith and his team to equip individuals with a satellite tracker. This required a great deal of time and energy, and would not have been sufficient to estimate the population size. Therefore, we chose a method often used in forensic genetics. We collected feathers from larger clay licks on a monthly basis. Later, thanks to genetic markers developed in the lab, we analyzed each DNA sample to reveal its unique genetic “fingerprint” or genotype. When a match was found in the database, it indicated that the samples tested were from the same individual. Hence, the feathers provided the basis for a genetic capture-mark-recapture or genetic tagging. For example, if we had always recovered feathers on a clay lick from the same individuals, it would have indicated a very small population size visiting the clay lick.
Shed feather samples collected on a single day from various parrot species at the Chuncho clay lick in Tambopata. © George Olah
In reality, we rarely found a match between feathers from different clay licks, indicating that parrots from a nearby area prefer to use a single clay lick. The clientele of the largest clay licks comprised about a thousand macaws based on our genetic analysis and usually consisted of close relatives. The most interesting genetic trace showed a match between a feather sample found on a clay lick and a blood sample taken from a chick a few years earlier (Conservation Genetics 2017 | PDF). This data, like the annual movement of macaws tracked by satellite telemetry, seems to demonstrate that macaws are keen to return to the areas where they hatched. The home-range they use over their long lives proved to be much larger than we thought. This is an important information and confirms the need for large protected areas in Peru and nearby countries to fully protect these species.
People visiting Tambopata these days can observe large open areas (or pampas) from their flight as they approach Puerto Maldonado. But these are not the natural pampas of the Heath River but reflect destructive human activities: scars from our modern gold rush! Today’s gold miners wash the sediment of riverbanks through increasingly finer filters by using a generator-operated water pumps. The fine particles obtained are then mixed with mercury in a large barrel. Unaware of the dangers, the miners often use their feet to mix the mercury with the fine particles. Because mercury dissolves gold, this technique has long been used to extract this precious metal. The mixture of gold dissolved in the mercury is finally separated from the water and then the mercury is evaporated by burning, which leaves pure gold behind. During these operations, not only does mercury enter the atmosphere, but it also leaches into the rivers and accumulates in the food chain. Mercury, this highly toxic element, poses the greatest danger to the fetus and children, but mercury poisoning also causes serious neurological diseases in adults. In South America, gold miners use tons of mercury each year. In Puerto Maldonado, the amount of mercury measured at fish markets has now exceeded critical value, so the sale of fish has been banned in several places.
Gold miners working illegally in the Tambopata River in 2018. © Balázs Tisza
Gold-mining is an illegal activity in Peru without a permit. Yet, around Tambopata, this is practiced by many as a “family business” or by more organized, mafia-type illegal groups. In many areas, small, temporary gold miner villages have been assembled. At these places, other illegal activities have spread as well. Prostitution is one of them, which is especially worrisome as it is often carried out on minors that have been abducted from nearby local villages. Transport to these places was very slow in the past, until the completion of the Interoceanic highway in 2013, which integrated these areas into the international trade network. This has also opened access to Tambopata not only for local but also outsiders, including criminals attracted by the many illegal activities in the region. Due to this tragic situation, even Pope Francis visited Puerto Maldonado in 2018. Unfortunately, over the years, the country’s leadership did not make much effort to remedy this situation. By 2019, the crime rate has extremely elevated in Puerto Maldonado and around, and even several tourists were robbed by gunmen. Finally, the government ordered a local emergency and sent soldiers to the area. A few gold miner villages were broken up, after which only the bare, lunar landscapes remained. This is the direct consequence of gold-mining, when not only the trees but also the soil is removed as they move forward in the forest. In tropical rainforest, there is a very fast decomposition of organic materials quickly absorbed by the trees, so these forests inherently have very thin soil. Hence, after the removal of this thin layer, the regeneration of the forest is very slow, if at all happens. But this process might be stopped in time, if the story of Tambopata is learned worldwide. (Coming up next: Films for conservation)
Receive updates about our films and articles by subscribing to our newsletter: | <urn:uuid:8f56fe52-09bc-4caa-8e26-01367f0d3034> | CC-MAIN-2022-33 | https://wildlifemessengers.org/tambopata03/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00004.warc.gz | en | 0.965536 | 2,696 | 3.234375 | 3 |
Arendt, W. J., 1988. Range expansion of the cattle egret (Bubulcus ibis) in the Greater Caribbean Basin. Colonial Waterbirds 11: 252–262.
Austin, G.E., W. J. Read, N. A. Calbrade, H. J. Mellan, A. J. Musgrove, W. Skellorn, R. D. Hearn, D. A. Stroud, S. R. Wotton & C. A. Holt, 2014. Waterbirds in the UK 2011/2012: the Wetland bird survey. BTO/RSPB/JNCC, Thetford.
Bettey, J., 1999. The development of water meadows in the southern counties. In Cook, H. & T. Williamson (eds), Water Management in the English Landscape: Field, Marsh and Meadow. Edinburgh University Press, Edinburgh: 179–195.
Burger, J., 1978. Competition between cattle egrets and native North American herons, egrets and ibises. Condor 80: 15–23.
Carney, K. M. & W. J. Sydeman, 1999. A review of human disturbance effects on nesting colonial waterbirds. Waterbirds 22: 68–79.
Chavez-Ramirez, F. & R. D. Slack, 1995. Differential use of coastal marsh habitats by non-breeding wading birds. Colonial Waterbirds 18: 166–171.
Chen, I. C., J. K. Hill, R. Ohlemüller, D. B. Roy & C. D. Thomas, 2011. Rapid range shifts of species associated with high levels of climate warming. Science 333: 1024–1026.
Combridge, P. & C. Parr, 1992. Influx of little egrets in Britain and Ireland in 1989. British Birds 85: 16–21.
Cook, A. S., 1987. Disturbance by anglers of birds at Grafham Water. In Maitland, P. S. & A. K. Turner (eds), Angling and Wildlife in Fresh Waters. Institute of Terrestrial Ecology, Cumbria: 15–22.
Cook, H., K. Stearne & T. Williamson, 2003. The origins of water meadows in England. The Agricultural History Review 51: 155–162.
Crowl, T. A., T. O. Crist, R. R. Parmenter, G. Belovsky & A. E. Lugo, 2008. The spread of invasive species and infectious disease as drivers of ecosystem change. Frontiers in Ecology & Environment 6: 238–246.
Davis, M. A., 2003. Biotic globalisation: does competition from introduced species threaten biodiversity? Bioscience 53: 481–489.
Denac, D., 2010. Population dynamics of the white stork Ciconia ciconia in Slovenia between 1999 and 2010. Acrocephalus 31: 101–114.
Dimalexis, A., M. Pyrovesti & S. Sgardelis, 1997. Foraging ecology of the grey heron (Ardea cinerea), great egret (Ardea alba) and little egret (Egretta garzetta) in response to habitat, at 2 Greek wetlands. Colonial Waterbirds 20: 261–272.
Fasola, M., 1986. Resource use of foraging herons in agricultural and nonagricultural habitats in Italy. Colonial Waterbirds 9: 139–148.
Feunteun, E. & L. Marion, 1994. Assessment of grey heron predation on fish communities: the case of the largest European colony. Hydrobiologia 279(280): 327–344.
Gee, A. S., 1978. The distribution and growth of coarse fish in gravel-pit lakes in south-east England. Freshwater Biology 8: 385–394.
Hafner, H. & R. H. Britton, 1983. Changes of foraging sites by nesting little egrets (Egretta garzetta L.) in relation to food supply. Colonial Waterbirds 6: 24–30.
Hannaford, J., E. H. Pinn & A. Diaz, 2006. The impact of sika deer grazing on the vegetation and infauna of Arne saltmarsh. Marine Pollution Bulletin 53: 56–62.
Hitch, A. T. & P. L. Leberg, 2007. Breeding distributions of North American bird species moving north as a result of climate change. Conservation Biology 21: 534–539.
Holt, C., G. Austin, N. Calbrade, H. Mellan, R. Hearn, D. Stroud, S. Wotton & A. Musgrove, 2012. Waterbirds in the UK 2010/2011: the Wetland bird survey. BTO/RSPB/JNCC, Thetford.
Ivlev, V. S., 1961. Experimental ecology of the feeding of fishes. Yale University Press, Connecticut.
Jacobs, J., 1974. Quantitative measurements of food selection. A modification of the forage ratio and Ivlev’s electivity index. Oecologia 14: 413–417.
Jensen, A., I. Carrier & N. Richardson, 2005. Marine fisheries of Poole Harbour. In Humphreys, J. & V. May (eds), The ecology of Poole Harbour. Elsevier, Amsterdam: 195–203.
Kazantzidis, S. & V. Goutner, 1996. Foraging ecology and conservation of feeding habitats of little egrets (Egretta garzetta) in the Axios River Delta, Macedonia, Greece. Colonial Waterbirds 19: 115–121.
Kennedy, G. J. A. & J. E. Greer, 1988. Predation by cormorants Phalacrocorax carbo (L) on the salmonids populations of an Irish river. Aquaculture Research 19: 159–170.
Kushlan, J. A., 1981. Resource use strategies of wading birds. Wilson Bulletin 93: 145–163.
Lane, S. J. & M. Fujioka, 1998. The impact of changes in irrigation practices on the distribution of forging egrets and herons (Ardeidae) in the rice fields of central Japan. Biological Conservation 83: 221–230.
La Sorte, F. A. & F. R. Thompson, 2007. Poleward shifts in winter ranges of North American birds. Ecology 88: 1803–1812.
Liley, D., J. Sharp & J. Baker, 2008. Wetland bird survey results for the Frome Valley: the winter 2007–2008. Footprint Ecology & Purbeck Keystone Project, Dorset.
Lock, L. & K. Cook, 1998. The little egret in Britain: a successful colonist. British Birds 95: 273–280.
Lombardini, K., R. E. Bennetts & C. Tourenq, 2001. Foraging success and foraging habitat use by cattle egrets and little egrets in the Camargue, France. Condor 103: 38–44.
Manchester, S. J. & J. M. Bullock, 2000. The impacts of non-native species on UK biodiversity and the effectiveness of control. Journal of Applied Ecology 37: 845–864.
Mann, R. H. K., 1989. Fish population dynamics in the River Frome, Dorset. Regulated Rivers: Research & Management 4: 165–177.
Masters, J. E. G., J. S. Welton, W. R. C. Beaumont, K. H. Hodder, A. C. Pinder, R. E. Gozlan & M. Ladle, 2002. Habitat utilisation by pike Esox lucius L. during winter floods in a southern English chalk river. Developments in Hydrobiology 165: 185–191.
Musgrove, A. J., 2002. The non-breeding status of the little egret in Britain. British Birds 95: 62–80.
Powell, G. V. N., 1987. Habitat use by wading birds in a subtropical estuary: implications of hydrography. Auk 104: 740–749.
R Development Core Team, 2014. R: a language and environment for statistical computing. [3.0.2]. R Foundation for Statistical Computing, New York.
Royan, A., D. M. Hannah, S. J. Reynolds, D. G. Noble & J. P. Sadler, 2013. Avian community responses to variability in river hydrology. PLoS ONE 8: e83221.
Tourenq, C., R. E. Bennetts, H. Kowalski, E. Vialet, J. L. Lucchesi, Y. Kayser & P. Isenmann, 2001. Are ricefields a good alternative to natural marshes for waterbird communities in the Camargue, southern France? Biological Conservation 100: 335–343.
Voisin, C., J. Godin & A. Fleury, 2005. Status and behaviour of little egrets wintering in western France. British Birds 98: 468–475.
Walther, G. R., 2010. Community and ecosystem responses to recent climate change. Philosophical Transactions of the Royal Society B 365: 2019–2024.
Wood, K. A., R. A. Stillman, R. T. Clarke, F. Daunt & M. T. O’Hare, 2012. Understanding plant community responses to combinations of biotic and abiotic factors in different phases of the plant growth cycle. PLoS ONE 7: e49824.
Wood, K. A., R. A. Stillman, D. Wheeler, S. Groves, C. Hambly, J. R. Speakman, F. Daunt & M. T. O’Hare, 2013a. Go with the flow: water velocity regulates herbivore foraging decisions in river catchments. Oikos 122: 1720–1729.
Wood, K. A., R. A. Stillman, T. Coombs, C. McDonald, F. Daunt & M. T. O’Hare, 2013b. The role of season and social grouping on habitat use by mute swans (Cygnus olor) in a lowland river catchment. Bird Study 60: 229–237.
Zuur, A. F., E. N. Ieno & C. S. Elphick, 2010. A protocol for data exploration to avoid common statistical problems. Methods in Ecology and Evolution 1: 3–14. | <urn:uuid:76eb342f-1f2a-467a-9bec-d09e3037dbe4> | CC-MAIN-2022-33 | https://link.springer.com/article/10.1007/s10750-014-1921-6?error=cookies_not_supported&code=c2e8dc28-398b-4930-bef8-5716989af575 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00205.warc.gz | en | 0.71243 | 2,308 | 2.75 | 3 |
By Erica Faber – Technical Manager
This year, more than ever, due to our exceptionally dry summer, I feel we will need to be even more diligent with regard to Phytophthora Root Rot control. If your orchard is not under irrigation—as is the case for most of our growers—then the dry summer has had a significant impact on root growth and mass. The severity of which will depend on your mulch layer, orchard environment and nutrition programme.
With very dry soils, many roots begin to dry out and shrivel causing root mass shrinkage. Remember that roots do constantly die back and regenerate but with extremely dry soils the regeneration of new roots can’t keep up with the root dieback. The drier than usual soils over summer would also result in less uptake of solid fertiliser. This means going into winter we have trees with both a root and nutrition deficit so to speak and so the cold, wet winter soil conditions and effects on root health will be more significant. A heavier crop load and / or flower bud intensity will also add stress to the tree and we all know through COVID-19 that a host, be it person or plant, with compromised health or additional stress will be more susceptible to disease!As we have had many new faces to our grower group and some new to avocados, let’s first recap what Phytophthora Root Rot (PRR) is …
Phytophthora root rot?
Phytophthora Root Rot is a disease that affects close to 5000 plant species across the globe and is the most serious avocado disease world wide limiting production. PRR is the result of root infection caused by a soil-borne oomycete, Phytophthora cinnamomi (Pc).
After infection by Pc, the feeder roots start to decay and turn black and brittle as the root tissue rots – giving rise to the name Phytophthora Root Rot. This restricts water and nutrient uptake by the roots and leads to branch-dieback, tree decline, and if left untreated or is severe enough, eventual tree death.
The visual symptoms of a tree with PRR include small, pale green or yellowish leaves that often appear wilted during high temperatures. The canopy is sparse and as branches die back and leaves defoliate, the
fruit and branches become exposed to sunburn. The severity of the outward symptoms depends on the balance between feeder root death and feeder root regeneration.
Often these stressed trees set a heavy stress crop but it is of little worth as the fruit remain small and with a sparse canopy are exposed and become sunburnt. The exposed branches also become sunburnt which exacerbate the tree decline even further as the damaged cambium cannot translocate water and nutrients efficiently.
Ciba-Geigy scale for plant disease rating (rating ranges from 0 (healthy) to 10 (dead)
In order to control Phytophthora root rot, we must first have a thorough understanding of the disease. Phytophthora cinnamomi, the cause of PRR, is not a fungus although much about its biology and life cycle is fungus-like. It belongs to the group of micro-organisms known as water moulds or oomycetes, which are related to algae. Water moulds were once included in the fungi kingdom and, as a result, Phytophthora cinnamomi has been incorrectly classified as a fungus in earlier years.
As the name water mould suggests, it requires moist conditions to thrive. Zoospores swim in the soil water and in this way find and infect the roots – its food source, until the whole root system is destroyed and the plant dies. Phytophthora root rot grows as microscopic sized filaments (mycelium) within the host plant’s roots. It consumes the root tissue causing lesions (areas that appear rotten). This weakens or kills the plants by reducing or stopping the movement of water and nutrients within the plant.
During conditions that are unfavourable for Phytophthora cinnamomi to survive or flourish, i.e., when there are no host to infect or soil conditions are too dry to spread, two types of thick-walled resting spores are formed: chlamydospores and oospores. Both can survive for several years. This resilience of these chlamydospores and oospores, contributes to its persistence in soils and difficulty to control.
In order to manage PRR effectively an integrated approach of cultural and chemical control as well as rootstock selection needs to be adopted. If you are using chemical control alone, you are only treating the symptoms and not changing the conditions under which Pc is thriving.
The use of tolerant rootstocks to control Phytophthora root rot is proposed as being the ultimate method for managing this disease. Research on developing Pc resistant or tolerant rootstocks has been a major focus of avocado research worldwide. Since the early 1950s, researchers have scouted for avocado trees surviving Phytophthora root rot. These selections, are subjected to rigorous screening and eventually placed in field trials throughout the world, in infested orchards. In these field trials other characteristics such as yield, nutrient uptake, excessive vigour, scion and rootstock compatibility and overall tree performance are also monitored. Due to the genetic variability of seeds, the only way to retain the resistance or tolerance and characteristics of these rootstock selections is to propagate them clonally. The predictability of genetically uniform, root rot tolerant, productive trees is a distinct advantage over the variability of seedling rootstocks. Using a rootstock that has a high tolerance to Pc eg : Dusa, is the most effective and easiest control strategy.
If you are wanting to plant avocados, the most important consideration is site selection. Root rot thrives in poorly drained soils as these saturated soils not only provide a perfect environment for spore release and dispersal but are also not favourable to plant growth and can predispose plants to infection. Well drained, fertile soils with good organic matter content and balanced soil microbiology will ensure healthy root development and natural suppression of the disease. Poor drainage can be improved by planting on ridges, installing drainage or deep cross ripping. Soil layers such as hardpans also impede drainage and often allow free water to accumulate above the hardpan. Preventing excess soil compaction or deep ripping these areas can also help to improve water drainage. Certified disease-free trees Only buy certified disease-free trees from registered, certified avocado nurseries. By planting trees that are already infected with Pc, not only will you infect your orchard but you will be fighting a constant battle against the disease.
Limit the spread of the disease
PRR is not only spread through water and root-to-root contact between trees but also spread through infected soil, especially by vehicles and even footwear. Ensure there is no water runoff from areas with diseased trees to healthy trees. When working with tractors or mobile elevating work platforms, work in the most diseased areas last. Sanitise implements regularly e.g. disinfect your spade with dilute bleach solutions between holes when interplanting in an already established orchard.
Prior to replanting where a diseased tree has been removed, soil solarisation can be effective for treating infested soil. Leave the new planting hole open to the sun or cover it with plastic polythene sheeting.
Roots are important plant organs. They absorb water and nutrients from the soil and translocate them to the rest of the plant. Roots also give mechanical support to plants and synthesize growth substances and
hormones that affect many processes associated with growth and production. Because roots are out of sight, they are often out of mind and are widely overlooked for their significance in plant health. It has been estimated that 80% of all plant problems start with soil/root problems.
A successful strategy is to protect plants from yield-reducing diseases by enabling development of healthier, stronger root systems through management and treatments, thereby helping plants grow to their maximum potential. Maximizing yields therefore starts and ends with a healthy root system. When there is an overlap of roots from different plants (including grasses and weeds) the roots with the most surface area wins. It is therefore important to ensure that there is no competition from grasses and weeds. There is an interdependence of shoots and roots for growth and development. The shoots rely on the roots for water and nutrients, while the roots depend on the shoots for carbohydrates and photosynthates. Therefore, anything that interferes with photosynthesis, or transport of photosynthates, will reduce root growth. Such factors mayi include cold damage, sunburn damage, inadequate nutrition, leaf pathogens and mechanical or insect-related damage to the canopy. Mycorrhizal fungi excrete powerful chemicals that dissolve mineral nutrients, absorb water, retard soil pathogens, and glue soil particles together into porous structure. In return, the mycorrhizal fungi receive sugars and other compounds from the roots to fuel mycorrhizal activities. Both plant and fungus benefit from this “symbiotic relationship”. Applications of Mycorrhizal fungi are therefore beneficial in maintaining a strong and healthy root system.
Root health and soil fertility remains a relatively low priority for growers yet in order to maximize plant performance and yields we need to look beyond just soil pathogens!
Increase organic matter e.g. mulches and composts to enhance biological suppression of Pc. This will create an active and diverse microflora. Composted bark increases the airfilled porosity of soil, releases inhibitors as it decomposes, and allows antagonistic soil fungi such as Trichoderma sp. to build up. Mulching also stimulates plant root growth, increases nutrient uptake, decreases evaporation from the soil, increases soil-water holding capacity, reduces surface water run-off, facilitates drainage, regulates soil temperature, and provides a high level of nutrients for soil microbes. Soils with high organic matter generally support higher numbers of bacteria, fungi and actinomycetes and contain higher percentages of micro-organisms antagonistic to Phytophthora. Soil micro-organisms use soil organic matter as food so in order to maximise their benefits that improve root growth and function we need to ensure that we maintain their food source by supplying a continued source of organic matter. It is as important as fertiliser!
Use of biological fungicides such as certain Trichoderma is a key constituent of integrated pest management. Trichoderma actively grow on roots and “protects” them from Pc. They compete with plant pathogens for nutrients and space, by producing antibiotics, by parasitizing pathogens, or by inducing resistance in the host plants. The ability of these fungi to sense, invade, and destroy other fungi has been the major driving force behind their commercial success as biopesticides. Trichoderma defend the plants by their direct and indirect effect on plant-pathogen-soil interaction. These fungi not only protect plants by killing pathogens but also induce resistance against plant pathogens, impart abiotic stress tolerance, improve plant growth and vigor as well as improve nutrient uptake.
If irrigating, controlled, regulated use thereof is one of the most critical practices for managing Pc. This includes both the amount, frequency, and duration of irrigation as well as control of the runoff.
Phytophthora species generally require free water for a certain duration in order to infect plants. They are not active until the soil is at or above field capacity. In other words, when water does not move down through the soil with the force of gravity. Soil moisture meters are an important management tool to monitor tree water withdrawal and field capacity and to schedule irrigation only when necessary. Over irrigation or not adequately allowing the soils to dry out between irrigation will favour conditions in which Pc will thrive.
Also, remember to modify irrigation on trees with a poor health rating or trees defoliated by frost, Pc or mites. When interplanting in established orchards, reduce irrigation to the smaller trees by using a micro sprinkler reducer or changing to an emitter with lower water output. Regularly check for leaks in the irrigation system that will result in saturated areas prone to Pc infection. Phytophthora can also contaminate irrigation water. Ensure that either your water source is tested and is free from Phytophthora and Pythium or install a dosatron to treat the water chemically.
One of the fundamental strategies for maintaining plant health and suppressing plant diseases is managing nutrition. Proper nutrition can often influence the fine line between host susceptibility and resistance. Plant pathologists refer to the “disease triangle” to illustrate the components needed for disease to occur. Equal importance is given to all three. Altering the balance will affect whether the disease occurs or the severity of the disease. Complete and balanced nutrition is a powerful tool against Phytophthora. Applying foliar nutrients can make up for loss of nutrient uptake due to root rot or when there are other constraints affecting uptake e.g. inadequate soil moisture.
Phosphonate fungicides can improve the tree’s ability to tolerate, resist, or recover from Phytophthora root rot infection but cannot eradicate the disease. They can prevent establishment of the organism before it gets into the plant or prevent continued growth if the organism is already inside the plant. The result is that they can delay symptoms that might have developed by the combined effects of direct inhibition of the pathogen and enhanced host defense responses.
Once chemical activity has subsided over time however, Phytophthora once again resumes growth within infected roots. This is why an integrated approach to managing Phytophthora is so important.
It is important to time the application of phosphonate accurately in order for the concentration in the roots to be high enough and effective in controlling the disease. When any chemical is applied to the tree it sinks to the part of the tree that is growing most actively at the time (the strongest ‘sink’). If the leaves are flushing the phosphorus acid will sink to the leaves and not the roots. Good levels of phosphonite in the roots are achieved by following the phenological cycle and timing injections or sprays to coincide with when root growth flushes are occurring.
There are two main root flush periods, one after the spring leaf flush has hardened off and one in autumn after the summer leaf flush has hardened off. There is only a small window of opportunity in spring as fruit growth occurs soon after the root flush and the phosphonate will mostly sink to the flowers and any sizing fruit. Research and phosphonate root analysis has shown that the best results are from the autumn applications made after the summer flush has hardened off and when competition from other organs are no longer dominant. The autumn application if timed correctly also ensures that there will be root protection for a longer period i.e. when healthy roots are required to support the critical flowering period – a time when significant stress is imposed on the tree. Autumn applications can result in high phosphonite root concentrations which should persist, remaining above the 25-40ppm threshold of effectiveness, until the following autumn.
Do not do any phosphonate application during dry weather or when the trees are water stressed. Wait for good soil moisture levels or irrigate well before application to get better uptake as treatments are always more effective when applied during periods of active sap flow.
During warm to hot weather, treatments should be applied before 10am. If any trees earmarked for phosphonate application are going to be pruned, wait 3-4 weeks after application to commence pruning to allow the chemical to be drawn up by the leaves and translocated down to the roots.
If choosing the injecting method, space syringes evenly around the base of the trunk avoiding the vicinity of old injection sites. Generally, you can work on spacings of a hand width apart (10-15cm) or one syringe per metre canopy diameter. Spacing the syringes correctly is important as the chemical does not move laterally around the tree and only moves to the leaves directly above the injection site then back down to the roots below them. If injecting is not done properly, some of the root system will therefore not be protected.
To recap: there must be adequate soil moisture, the summer leaf flush must be hardened off, there must be a good proportion of healthy roots and the roots must be actively flushing for control to be most effective.
Monitoring root phosphonate concentrations by taking root samples before and following phosphonate applications, are as important as monitoring soil and leaf nutrient concentrations. If we are not measuring, we cannot manage effectively or improve on what we are doing! Group similar trees together into a composite sample. 10-50g of healthy roots are required per sample. Aim for phosphonate root concentration of 25-40mg/kg which is considered the threshold of effectiveness for NZ.
Foliar spray application can be effectively utilised when the trees have sufficient canopy to take up the chemical. Foliar sprays of 0.5% ammonium phosphonate or potassium phosphonate (Phosguard) can be sprayed in Autumn once the summer flush has hardened off. Depending on the existing root phosphite concentrations and the severity of the disease, 1-4 foliar sprays may be required. This quick easy, noninvasive method has been outperforming injecting in research trials since 2015 with results showing higher root phosphite concentrations.
You may opt for a combination of both chemical methods depending on your tree health and just elect to inject the poor health trees that do not have sufficient canopy volume for uptake of the foliar applied phosphonate. For young trees (0-4 years) I prefer to use a Ridomil or Terracin drench or/ and an Aliette foliar spray.
Remember, any chemical control for Phytophthora will affect beneficial microbes as well so follow up 3-4 weeks later with biostimulants such as Mycorrcin etc.
New Zealand Avocado has recently created a decision guide on what actions to follow when managing tree health. This follows on from their “Tree Decline and Tree Health” research trial. This handy resource along with the Ciba-Geigy scale for plant disease rating (rating ranges from 0 (healthy) to 10 (dead)) also included here will help you in your decision making when managing tree health.
For any further assistance on managing tree health, contact your Just Avocados rep. We are here to help and support you on your journey in improving orchard health and productivity. Remember if COVID-19 has you locked down, the Avoworks team is out continuing with essential work in keeping your orchard healthy and productive to ensure a good season ahead! | <urn:uuid:d3024670-f198-40b0-8f21-d4d1185b9ca8> | CC-MAIN-2022-33 | https://justavocados.co.nz/2020/06/phytophthora-root-rot-control/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00405.warc.gz | en | 0.938832 | 3,939 | 2.9375 | 3 |
By Jillian Fuller
Set just after World War I, Funny Girl is a story of a woman trying to make it in show business in New York. Throughout the play, we follow Fanny Brice as she reminisces on her journey to mega-stardom, we watch her failures, her triumphs, and her relationships as she prepares for her next performance. While Funny Girl follows the story of a Jewish woman, the story of Fanny Brice and her relationship with Nick Arnstein not only reflects negative stereotypes of Jewish people, but also showcases the power Fanny Brice possesses within herself by not limiting her to the typical beauty standards and the male gaze. However, her success still comes at a price and Fanny is forced like many women to choose between love and her professional life.
When we are first introduced to Fanny Brice she is already a star. She is preparing for a performance with Ziegfeld’s Follies when she begins to recall her journey to fame. We are then transported to her teenage years when she has a job working in vaudeville. Fanny believes this is her big break, but her mother, Mrs. Brice and her friends try to convince Fanny to be more realistic about her showbiz dreams. They tell her that when she was younger and able to make people laugh simply with a funny face it was okay, but now because she is older and people are paying to see someone (especially men) then she has to be pretty and they believe Fanny is just average. There is an emphasis on the importance of the male gaze. In the 1920s, women are expected to be essentially one dimensional. “If A Girl Isn’t Pretty” basically showcases the importance of the male gaze in regards to show business and the amount of success women can achieve outside of the home. The actors on stage ask Fanny to, “[k]indly name a star who hasn’t won a contest or a pageant” (Merril, 1964). Her family, friends, and boss believe that no matter how much talent Brice may possess, it’s not enough to gain her the notoriety she dreams of.
Thankfully, Fanny is not discouraged. Merely, frustrated when she is initially let go from the vaudeville act that she is rehearsing for. At the end of rehearsal, Fanny proclaims that “beautiful girls won’t stay in style forever”. Fanny is confident that she possesses more talent than the beautiful girls that continuously beat her out for jobs. As she expresses her frustration with not being appreciated for her abilities. Fanny laments that she is like “a bagel on a plate of onion rolls”. Initially, you’re turned off by the presence of something different, but if you were to give the bagel (or in this instance – Fanny) a chance, you’d realize you actually like it. Fanny is constantly pushing the boundaries which is unheard for a play set in the 1920s and was initially released in 1964.
Fanny is a Jewish woman from Henry Street. There are many stereotypes surrounding race and gender throughout the play and Fanny herself seems to be a juxtaposition to common Jewish stereotypes like the ‘Jewish American Princess’ or ‘belle juive’ as she is not revered for her beauty or wealth but still maintains confidence in her abilities. For example, the Ziegeld girls are known for their elegance and beauty. Fanny is not someone known for her elegance and beauty, yet, Ziegfeld hires her.
In her performance with the Follies, Fanny cleverly flips the script on what is supposed to be a romantic number. Whilst performing “His Love Makes Me Beautiful”, Brice pretends to be a pregnant bride rather than a vision of typical beauty that the audience is expecting. Here we witness her quick thinking and undeniable talent. Brice doesn’t play into the male gaze — something that is often expected of women, especially in the performing arts. Fanny’s decision to adjust the performance in this way is a snap decision and just another way those around her and audience members can see the star quality she mentioned previously. It’s clear that Fanny has a desire to be acknowledged for her vast amount of talent rather than superficial things like the way she looks compared to other women on stage. So much so, she changes a number set by the famed Florenz Ziegfeld.
While Fanny seems to defy stereotypes based on her gender and race, her husband, Nick Arnstein seems to reinforce them dramatically. When we meet Nick Arnstein he is presented as a dapper young man of wealth. Darius Campbell (as Arnstein) carries himself with a confidence and superiority of someone born into money – not merely chasing it. However, we soon see that Arnstein is money hungry and willing to do whatever it takes (legally and illegally) to make a quick buck. Though he seems to not understand much about his Jewish roots in practice, he, unfortunately, falls victim to embodying the negative stereotype of the greedy Jewish man. This greed is what ultimately lands him and prison and subsequently ends his relationship with Fanny.
Arnstein is also a product of a white patriarchal society in which he feels he is the one with all the power. Any time he fails in a business venture, Fanny tries to make light of the situation in an effort not to discourage him. However, it is her refusal to take these failures seriously that frustrates Nick. He feels as though he is being treated like a child and somehow failing in his ability to provide and be a breadwinner as a man. This belief makes Nick too sure of himself and self-aggrandizing. One of his final deals before prison has him telling a man he is equal to a $68,000 advance – risk or no risk. The ability to place a monetary value on himself as a partner even after so many failed ventures is astounding and a product of the patriarchal society he lives in.
The relationship between Fanny and Nick seems doomed from the start even though Fanny is determined to make it work. As Fanny gains critical acclaim and notoriety, business venture after business venture fail for Nick and he ultimately ends up in prison. Fanny is so enamored by Nick Arnstein and this life of grandeur that he falsely represents that she allows herself to continuously be convinced to bank roll his various get rich quick schemes.
In the beginning of their relationship, Nick is flaky. When he returns after almost a year Fanny is rightfully upset and maintains her pride in order to protect herself and not fall all over him as she would have in the past. They come to a truce and Fanny decides to have dinner with him. When Nick orders for them she feels out of her league due to his use of French, she quickly asks, how will she even know if he’s making advances if she can’t tell when he orders them roast beef and potatoes for dinner. To which Nick simply replies, “I’ll be much more direct” and proceeds to sing the extremely sexist song “You Are Woman I Am Man” wherein he spends two minutes reinforcing stereotypes of men and women being the complete opposite of one another. Nick states that she’ll be smaller and softer than him so that he can be taller and stronger. However, these simple differences and ideas of masculinity and femininity are the very things that Fanny continuously works against as a comedienne and dancer.
It’s disappointing that as strong of a woman as she is, Fanny allows her to be swept away by the image and words that Nick Arnstein presents to the world when he can’t even bother to support her at major moments in her career due to fear or “business” ventures. Fanny continues to give him pass after pass and handout after handout. Is it because he is the first man that she was interested in to return her romantic intentions? If this is the case – which it seems to be, this unfortunately detracts from the self confident woman that she presents herself as in the beginning. However, it’s possible that this self confidence Fanny possesses is merely in her talent and does not, unfortunately, translate into her belief that she is desirable. As much as Fanny fights against the male gaze in her performances, it seems that Nick Arnstein has the ability to force her to perform for the male gaze,as he continues to pursue dicey ventures.
In the end, Nick is released from prison and Fanny and Arnstein make the mutual decision to split. Once again, Fanny makes a decision that many women in that time may not have made. However, she doesn’t necessarily come to this conclusion all on her own. Her mother once again enters the picture to put things into perspective for Fanny. For most of the show while she has been chasing and achieving her dream of show business fame, she has been seeing Nick and his business practices through rose colored glasses. When Nick is finally caught, Mrs. Brice tells Fanny that her “handouts” were choking Nick and making him embarrassed. Funny Girl is a world renown musical and somehow still manages to villainize the concept of a strong woman. In the beginning, Fanny sees no success because although she’s funny and talented she doesn’t have “the look”. When it’s clear that she doesn’t need “the look” to be successful for show producers she achieves massive success, but somehow this success is consistently undermined by the fact that her husband refuses her assistance and refuses to come by his money honestly. With all this success – Fanny has still failed by embarrassing her husband. Thankfully, Fanny decides to cut ties with Arnstein and move forward with her professional career. Despite the harsh realities of her relationship with her ex-husband. Though there are aspects of her behavior that are questionable, Fanny still remains a unique and strong female character. No thanks to the men in her life. | <urn:uuid:6ba55458-213c-4092-ae7d-0e00e51b3198> | CC-MAIN-2022-33 | https://thewritingstage.wordpress.com/2020/10/19/his-love-makes-me-beautiful-race-gender-and-relationships-in-funny-girl/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00005.warc.gz | en | 0.977966 | 2,091 | 3.015625 | 3 |
The osmolality of a particular contrast agent is determined by the number of osmotically active particles formed when it is dissolved in solution. Ionic agents dissociate into ions when dissolved in water and contain an iodinated benzene ring. As a result, ionic agents have a higher osmolality than blood. Nonionic agents do not dissociate into separate particles when dissolved in water; their osmolality is therefore one half that of ionic agents. Contrast agents are categorized according to their chemical structure and relative osmolality. Table 1 lists types of contrast agents.
|Ionic||Diatrizxoate sodium (Hypaque)|
|Iothalamate meglumine (Conray)|
|Ionic||Ioxaglate meglumine (Hexabrix)|
Contrast agents with higher osmolality are more likely to cause adverse reactions of all kinds. Renal toxicity has long been associated with exposure to high-osmolality agents.1 Low-osmolality agents are associated with less discomfort, and fewer cardiovascular and anaphylactic-type reactions. However, these agents have a significantly higher cost, which prevents them from being used exclusively.
Types of Adverse Reactions
Anaphylactic reactions are serious, potentially life-threatening reactions associated with the administration of contrast material. Acute bronchospasm, profound hypotension, and severe urticaria may occur within minutes of administration of as little as 1 mL of contrast material. These reactions are not “true” allergic reactions, because they can occur in patients who have not been exposed to contrast material previously. IgE antibodies, which are associated with allergic reactions, have not been demonstrated in most patients with anaphylactoid reactions.2 The etiology of these anaphylactic reactions is unclear.
Dose-dependent, systemic adverse reactions to contrast material include nausea and vomiting, a metallic taste in the mouth, and generalized warmth or flushing. These reactions are usually nonlife-threatening, self-limited problems.
Renal failure is another form of adverse reaction that is dependent on the dose of contrast material used. Intravenous administration of contrast material is responsible for 12 percent of cases of hospital-acquired renal failure.3 Renal failure following administration of contrast material occurs in 0.1 to 13 percent of patients who receive contrast material.4 This range results from the lack of a set definition for contrast-induced nephrotoxicity. A generally accepted definition is the elevation of serum creatinine to greater than 25 percent of baseline within three days of receiving contrast material. Proteinuria is often found on routine urinalysis but is not required for the diagnosis of contrast-induced nephropathy.
Patients with preexisting renal insufficiency and diabetes are at greatest risk of developing permanent renal failure following administration of contrast material. Patients with multiple myeloma are also at increased risk of developing renal failure, especially if they are dehydrated. The risk of renal failure in patients with myeloma is caused by an interaction of light chains and contrast material. How contrast materials cause renal failure is unclear, but direct cellular toxicity and intrarenal vasoconstriction are believed to be the primary causes of renal function changes.4,5
Adverse reactions that occur 30 minutes or more after the administration of contrast material are considered delayed reactions. Delayed reactions are more common with the use of ionic agents.6 Up to 30 percent of patients receiving ionic contrast materials develop delayed reactions. Administration of nonionic agents is associated with delayed reactions in only 10 percent of patients. The symptoms of delayed reactions resemble a flu-like syndrome and include fever, chills, nausea, vomiting, abdominal pain, fatigue, and congestion.
EXTRAVASATION OF CONTRAST MATERIAL
Tissue damage from extravasation of contrast material is caused by the direct toxic effect of the agent. Compartment syndrome may occur if enough contrast material leaks into surrounding tissue.
Patients at Risk
A patient who has renal insufficiency before the administration of contrast material is five to 10 times more likely to develop contrast-induced renal failure than patients in the general population.6,7 Patients with a history of anaphylactic reaction to contrast material are more likely to have a similar reaction if they are again exposed to contrast material, but even these patients may not experience repeat reactions on reexposure.
Patients with a history of asthma have double the risk of developing adverse reactions compared to the general population, even if the patient's asthma is under control.6 Patients with multiple food or medication allergies and those with multiple medical problems (e.g., cardiac disease, preexisting azotemia) are more likely to develop complications when exposed to contrast agents.8
No substantive data support the myth that patients with seafood allergy are at higher risk of developing allergic reactions to contrast media. Patients treated with nephrotoxic medications (e.g., aminoglycosides and non-steroidal anti-inflammatory agents) are at greater risk of developing renal failure. Advanced age is also considered a risk factor for developing renal insufficiency. Metformin (Glucophage), an oral agent used in the treatment of diabetes, has been associated with the development of severe lactic acidosis following administration of intravenous contrast media.9 Many experts recommend stopping metformin therapy at the time of the procedure, or before, and for at least 48 hours following the administration of contrast material. The medication should be resumed only after the patient's renal function has returned to baseline (as determined by the serum creatinine level).
Contrast material should not be administered to pregnant women. Alternative forms of visualization are recommended for these patients.
|Preexisting renal insufficiency|
|Previous anaphylactoid reaction to contrast material|
|Food or medication allergies, or hayfever|
|Multiple medical problems or an underlying disease (e.g., cardiac disease, preexisting azotemia)|
|Treatment with nephrotoxic agents (e.g., aminoglycosides, nonsteroidal anti-inflammatory agents)|
Adverse reactions can be reduced if general principles are applied to all patients. The smallest amount of contrast agent possible should be used for each procedure. Allowing at least 48 hours to elapse between procedures in which contrast material is used enables the kidneys to recover.6 Table 3 outlines methods of preventing contrast-induced renal insufficiency.
|General principles||Use the smallest amount of contrast material possible.|
|Discontinue other nephrotoxic medications before the procedure.|
|Allow two to five days between procedures requiring contrast material.|
|Hydration||Oral: 500 mL before the procedure and 2,500 mL over the 24 hours after the procedure|
|Intravenous: 0.9% or 0.45% saline, 100 mL per hour beginning four hours before the procedure and continuing for the 24 hours after the procedure|
|Calcium channel blockers||Nitrendipine (Baypress), 20 mg orally daily for three days beginning 24 hours before the procedure|
It has been well documented that hydration minimizes, or decreases, the incidence of renal failure induced by contrast material. Unless contraindicated, infusion of 0.45 or 0.9 percent saline at a rate of 100 mL per hour beginning four hours before the procedure and continuing for 24 hours after the procedure, is recommended.10,11
In patients able to take oral fluids, hydration can be achieved through ingestion of 500 mL of fluid before the procedure followed by 2,500 mL over the 24 hours after the procedure. There have been no prospective studies comparing different fluids for hydration.
Nonrenal reactions to contrast material can be reduced by premedicating the patient with corticosteroids.12,13 [Reference 12—Evidence level A, randomized controlled trial (RCT); Reference 13—Evidence level B, uncontrolled study] This protective effect functions for ionic and nonionic contrast materials. Many physicians give corticosteroids only to patients known to have a previous history of idiosyncratic adverse reactions.6
Combining corticosteroid use with a histamine H1- receptor blocker further reduces the chance that adverse reactions will develop. Adverse reactions decreased from a range of 17 to 35 percent to a range of 5 to 10 percent when corticosteroids were combined with an H1 blocker (diphenhydramine).14,15 [References 14 and 15—Evidence level B, uncontrolled study]
The following premedication protocol has been recommended for use in patients with a history of idiosyncratic reactions: methylprednisolone (one 32-mg tablet at 12 hours and two hours before the study) or prednisone (one 50-mg tablet at 13 hours, seven hours, and one hour before the study).6 If the previous reaction was moderate or severe or included a respiratory component, the physician can add the following: an H1 blocker such as diphenhydramine (one 50-mg tablet one hour before the study) and an H2 blocker (optional) such as cimetidine (Tagamet), one 300-mg tablet one hour before the study, or ranitidine (Zantac), one 50-mg tablet one hour before the study. Using an H2 blocker without also using an H1 blocker is not recommended.
Mannitol (Resectisol) has been used in an attempt to increase or maintain the glomerular filtration rate (GFR) during radiographic studies using contrast media. Very little supporting evidence shows that mannitol maintains GFR during hypoperfusion. A study that compared hydration with saline alone versus saline plus mannitol showed that saline alone was more protective.5
Furosemide (Lasix) has not been shown to prevent contrast-induced renal failure. A significant decline in renal function occurred in patients treated with furosemide before contrast administration.16 Negative fluid balance caused a decrease in renal cortical and medullary blood flow, leading to hypoxia.
Calcium Channel Blockers
Oral administration of calcium channel blockers was shown to minimize reduction of GFR. In a prospective study,17 patients were treated with 20 mg per day of nitrendipine for three doses starting 24 hours before the procedure. Some sparing of GFR was noted in these patients compared with patients who did not receive calcium channel blockers.17
DOSE-DEPENDENT SYSTEMIC REACTIONS
Nausea and vomiting, a metallic taste in the mouth, and generalized warmth or flushing that are associated with contrast material injection are usually nonlife-threatening, self-limited problems. Slow intravenous injection (over two minutes rather than over 10 seconds) decreases the incidence of headache and metallic taste. The rate of infusion, rapid or slow, does not make a difference in the development of nausea or vomiting.18 General supportive care of the patient usually suffices in the management of these reactions.
Monitoring patients for the development of renal failure after the administration of contrast material requires observation of the patient's renal function for at least three days. A rising serum creatinine level is usually the first sign of an impending change in renal function, but elevation of the serum creatinine level may not occur for 72 hours. However, the serum creatinine level often rises within the first 24 hours and peaks in three to five days. The patient's creatinine level usually returns to baseline by seven to 10 days after the procedure.
Electrolytes should be checked daily to ensure that hyperkalemia is not occurring. The patient's intake and output should be measured as a gross indication of renal function. Most cases of contrast-induced renal failure resolve with supportive measures such as adequate hydration and adjustment of electrolyte abnormalities. The above measures are usually adequate for renal support; rarely is dialysis or transplantation required.
The principles of advanced cardiac life support should be followed in the treatment of anaphylactic reactions to contrast material. Stabilization of the patient's airway, cardiac function, and blood pressure is the fundamental element of treating anaphylactic reactions. In patients who develop bronchospasm, laryngeal edema, or severe urticaria or angioedema, epinephrine should be administered immediately (0.3 to 0.5 mg subcutaneously every 10 to 20 minutes). Patients with bronchospasm should be given 50 mg of hydrocortisone or 50 mg of methylprednisolone.
Radiology personnel who have direct contact with patients should be familiar with and certified in providing emergency care. Radiology departments must be equipped and their personnel trained to respond to life-threatening reactions at any time.
Symptoms of delayed reactions (nausea, vomiting, abdominal pain, fluid overload, and fatigue) usually resolve spontaneously and require only supportive management.
Application of ice packs and heating pads, and elevation are used to alleviate the symptoms associated with extravasation of contrast material. Tissue damage is more likely to occur with extravasation of ionic contrast material than with nonionic contrast agents.
Choosing a Contrast Agent
Some physicians suggest that nonionic, low-osmolality agents be used universally because fewer adverse reactions are associated with them. Unfortunately, the higher cost of non-ionic agents prohibits their widespread use. Nonionic contrast agents cost up to 10 times more than high-osmolality ionic agents. Guidelines have been developed by the American College of Radiology for the use of low-osmolality, nonionic agents.19 According to these guidelines, nonionic agents should be used in patients who are at increased risk of adverse reactions. This group includes patients who had previous contrast reactions, or who have asthma, multiple allergies, or diseases that could be aggravated by contrast materials (Table 2). Low-osmolar, nonionic agents should be used in patients known to have renal insufficiency. In addition, when a complete history is difficult to obtain and in patients who are concerned about the use of contrast material or are at risk for aspiration, low-osmolality agents should be considered.19 [Evidence level C, consensus and expert guidelines] | <urn:uuid:971951be-861f-482e-b235-99db05933fc6> | CC-MAIN-2022-33 | https://www.aafp.org/pubs/afp/issues/2002/1001/p1229.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00001.warc.gz | en | 0.905778 | 3,135 | 3.265625 | 3 |
If you are looking for a Highschool Art History curriculum, then you might check out The Master and His Apprentices company. We recently had the opportunity to review their product called The Master and His Apprentices: Art History from a Christian Perspective.
The Master and His Apprentices:
Art History from a Christian Perspective
Covers Art History from Creation to Modern Day
Full Color Illustrations
Two Versions Available: Digital & Physical
Digital Text $34.99
Digital Teacher Guide $19.99
Hardcover Text $149.99
Softcover Teacher Guide $24.99
The Master and His Apprentices is designed to give students a solid foundation in art history. It is written from a Christian worldview and incorporates scriptures into the study. The Master and His Apprentices helps readers understand history through art and helps create a “visual” timeline of biblical and world events. Unlike most other art history curriculum, this one does not contain nudity, but instead focuses on various masterpieces artists created during specific historical periods.
Art History Periods covered:
- Creation: God is the Master Artist
- Ancient Cultures: Ancient Near East, Egyptian and Aegean
- Classical Antiquity: Early Greek, Etruscan and Roman
- Middle Ages: Medieval & Islamic, Early Christian & Byzantine, Romanesque and Gothic
- Renaissance: Proto-Renaissance, Early Italian Renaissance, High Italian Renaissance and Northern Renaissance
- Baroque and Beyond: Baroque, Rococo to Today (modern art) and Global Highlights (non-Western art)
The Master and His Apprentices can be completed independently by highschool students or adapted to be used by the whole family. This course is available in both a digital version and a physical book version. This is a full curriculum, covers over 125 hours of instruction (text, notes, discussions, worksheets, research papers, and exams), and can be used for highschool elective credit.
The Text is about 372 +/- printable pages and contains reprints of ancient art, architecture, statues, paintings, and relics from around the world throughout history.
It covers around 19 different historical and cultural focuses condensed and divided into 6 historical periods. The course starts out with an introduction to art history. Then a brief focus on the first six days of creation and Father God as the first artist. Next it covers man-made art, sculptures, relics, and buildings from around the world throughout different cultures and periods in history. It also covers art related vocabulary and related concepts used in art such as: Design and Composition, Line and Shape, Value and Color, Style and Texture, etc.
The Teacher Guide is about 60-70 +/- printable pages (they are not numbered).
This book includes a suggested schedule with week by week instructions, worksheets that can also be used as discussion questions, four exams, instructions for writing four course papers on artists from different time periods, grading chart, answer keys, and more.
A suggested schedule is to do the class over 36 weeks or divided into (2) 18-week semesters. This course can also be used as a supplement to other curriculum (world history, bible history, ancient history, etc).
Gina has been a teacher and author for over 12 years. She is a home school and college graduate. I have been very impressed with things she has shared about her experiences and why she wrote this curriculum.
She states her goal in writing this curriculum is: “From the beginning, I’ve been praying that God would use this book to draw non-believers to Himself and to push believers even further into Jesus as His fingerprints become more visible in creation and history.”
She says she has watched students transform as they connect the Creator to Art History. From her website, she states “In fact, often for the first time in their lives, they were able to make connections between their different classes. Visually “seeing” the periods allowed them to create a framework in their minds for combining various timelines from other disciplines, be it history, Bible, literature, science, philosophy, etc. More importantly, many students were awaking to the fact that the Bible isn’t just a story, but real history – a history that overlaps other famous periods, places, people, and events.”
For the purpose of this review, I focused on my son who loves art. He wants to be an artist (drawing and painting), and a craftsman (with wood and leather) himself. However, all three of my highschool boys are taking this course for highschool elective credit.
We were sent the digital versions of this curriculum which included:
- Digital Text ~ The Master and His Apprentices: Art History from a Christian Perspective
- Digital Teacher Guide
- Digital Print/Photocopy Rights for our household.
With the digital versions, you can view the curriculum on the computer and you have the option to print out what you need if desired. The Print/Photocopy Rights give you the permission to print additional copies for multiple students in your household. Or you can purchase the physical book versions if there are things you want a physical copy of and if you don’t want to print them yourself.
After using the program on the computer (Text and Teacher Guide), and printing the worksheets as we needed them, I decided to purchase the physical copy of the Teacher Guide too. I actually purchased three Teacher Guides so that all three of my highschool sons have their own book to write in. We were fine with the colorful digital copy of the Text book to read on the computer, but having a physical copy of the Teacher Guide in front of me and my sons simplified things so I didn’t have to go back and forth to the printer for the worksheets.
So far, my son is enjoying this course. There is a lot of information covered and he is very motivated. He has other courses with overlapping information that he is doing at the same time for: Ancient History, Bible History, and World History and Art. So this class is mirroring what he is learning in those courses and increasing his knowledge about various art, history, cultures, and what we know about them.
He has no problem completing the worksheets. The worksheets are filled with questions and give you space to answer, usually answers are a phrase or a few sentences. You can also use these questions for discussion. There are also a few pages to diagram. We have not yet completed a test or a research paper though. But I have no doubt he will do well as this is a subject he enjoys and is motivated to complete.
My Personal Thoughts:
I hope I am getting wiser in my “old age”. I know I am getting bolder in my faith and sharing what God has put on my heart and my understanding of scripture. So that is what I am about to do, and you can skip this section of my review if you don’t want to hear it. I have a lot more to say, and I will post more (a continuation) in a future post. But here is a very brief statement.
I appreciate the Author’s love for Father God and her desire to help students understand bible history as they learn about art history. I also appreciate her hope that people will draw near to Jesus as their savior. She has done a good job putting art history and bible history together. The bible scriptures she has included and in depth timelines help to connect the dots of events in history, bible events, and art.
However, I have some misgivings about using art history or any art appreciation curriculum to draw students close to “god”. There are so many different gods and idolatry represented in artwork from cultures around the world that I believe people can actually be led away from Father God while they are “appreciating” art if they are not very careful.
I personally believe most things in this world that fall under “art appreciation” and “art history” and “ancient history” and “world history” would be things Father God has warned us to stay away from.
Colossians 2:8 ” Watch out, so that no one will take you captive by means of philosophy and empty deceit, following human tradition which accords with the elemental spirits of the world but does not accord with the Messiah (Jesus of Nazareth, Yahusha HaMeshiac).”
I have sincerely questioned over the years whether or not Father God wants us to study what the world calls “art” from history. There is a HUGE difference in knowledge and wisdom. Much of what we learn in academics is just knowledge. Society asks us “How much do we know?” Society “ranks” us and often pays us by what we know.
The “god” of every society on earth is the same deceiving serpent from the garden that was there when man first fell away from Father God, Yahuah, our Creator. Do we really want to teach our kids to glorify and appreciate the statues, buildings, pyramids, paintings, and man-made creations that honor another god? Should we not sound the alarm and send out warnings and cautions to teach them not to glorify it?
Matthew 24:6 “No one can serve two masters; for either he will hate the one and love the other, or he will stand by and be devoted to the one and despise and be against the other. You cannot serve God and mammon (riches, money, possessions, or whatever is trusted in).”
But the real question should not be “what do you know” but rather “Does what we “know” draw us closer to Father God?” OR “Does “knowing more” draw us farther away from him?” For example in scripture, Adam and Eve bit the fruit of the knowledge of good and evil when the serpent deceived them and told them to “appreciate” the forbidden fruit, he told them to “behold it, look at it, taste it, it will give you more knowledge, you will not die but you will become like god”. Another example is in the lives of the Israelite’s who mixed all the cultural practices of Egypt, Greeks and Roman gods and traditions (and so many more examples) and what they “knew” and their “appreciation” of the “art” and idols of these other cultures actually drew them away from Father God, not closer to him.
Mark 7:9 “Indeed,” he said to them, “you have made a fine art of departing from God’s command in order to keep your tradition!”
Or put in context, it reads as “These people honor me with their lips, but their hearts are far away from me. Their worship of me is useless, because they teach man-made rules as if they were doctrines. You depart from God’s command and hold onto human tradition. Indeed, you have made a fine art of departing from God’s command in order to keep your tradition!” Mark 7: 7-9
Until the church members of the Bride of Jesus of Nazareth, Yahusha HaMeshiac, wake up and see the truth, their brains will continue in gaining knowledge, but their spirit will lack discernment of truth, vision of the spirit, wisdom, and the power to defeat spiritual wickedness.
Perhaps most “great works of art” are proof of man’s sin against Almighty God. Most famous works of art are a direct violation of God’s command to not create a graven image and not create idols and not worship any other gods. Most are attached to demons and worship of deities and even in more modern art, many artists have shared they were under the influence of something evil and supernatural when they created their masterpiece. In my early Christian walk, I was shocked when I first learned that demons are real, not just something from two thousand years ago, and not just someone’s imagination in modern horror movies and mental illness as we are led to believe, but instead they are real entities. More recently I was also shocked to learn that many famous artists, musicians, and writers of “great” masterpieces were plagued by demons and blood sacrifice. Yet Christians glorify these things that “artists” create and display them in their homes, education, communities, and churches.
1 Corinthians 12:2 “Remember the way you used to live when you were Gentiles (pagans) apart from God? You were engrossed—enchanted with voiceless idols, led astray by mere images carved by human hands.”
Jesus of Nazareth said that “traditions of men nullify the power of God in your life”. The church has no power because they have traded their trust in the anointed word of Father God for “trust” and “appreciation” in man-made traditions. He also said if the spirit of Father God is in you, then you will do greater things in this earth than he did. How many Christians do you know who have done “greater”? How many do you know who have healed someone, opened prisons, gave sight to the blind, raised the dead, made the lame to walk, cast out demons, etc.? The church today is in bondage to buildings, demons (denominations) and “famous works” of literature and art and the traditions of men, academics, sports, pharmacia, artificial intelligence, music, and material possessions, and it lacks power and wisdom of the Holy Spirit of God.
I have prayed for discernment and have prayed that my family will see the world as Father God sees it. I pray that we will avoid being deceived by the “things that look good to eye” and “desirable” in this world. I pray Father God will give us eyes full of compassion, that look for his goodness, and beholds what is upright, and for lips that speak truth and show kindness and charity to others, but also hearts that are wise and filled with truth and discernment.
Matthew 10:16 “Behold, I send you forth as sheep in the midst of wolves: be ye therefore wise as serpents, and harmless as doves.”
If you are looking for a thorough Art History curriculum, then The Master and His Apprentices will give you a historical understanding of famous works of art and artists, and an indepth timeline of art pieces and events, including biblical events, in history that will meet highschool requirements for Art History and Art Appreciation.
Homeschool Review Crew
Be sure to check out what others on the Homeschool Review Crew had to say about using this product in their home. | <urn:uuid:74918b26-790c-4f21-8157-b41380021a39> | CC-MAIN-2022-33 | http://weiseracademy.com/tag/art-history-class/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00405.warc.gz | en | 0.963626 | 3,150 | 2.65625 | 3 |
- Slides: 52
Commercial Cells. Galvanic cells used as source of electric energy for various consumer, industrial and military applications. Classification: Primary Cells. Eg. : Dry cell Secondary Cells. Eg. : Lead acid cell.
Objectives: ØDescribe the major features of commercial cells. ØKnow the two major types of batteries. ØDistinguish between primary & secondary battery types. ØKnow the various applications of Dry cell, Nicad cell, Lead acid cell, H 2 -O 2 fuel cell and CH 3 OH – O 2 fuel cell.
Basic Requirements Of Primary Cell. Ø Compactness and lightweight. Ø Fabricated from easily available raw materials. Ø Economically priced. Ø High energy density and constant voltage. Ø Benign environmental properties Ø Longer shelf life and discharge period. Ø Leak proof containers and variety of design options.
Basic Requirements Of Secondary Cell. Long shelf life and cycle life. High power to weight ratio Short time for recharging Tolerance to service condition. High voltage & high energy density.
Primary Cells. Produce electricity from chemicals that are sealed into it. Cannot be recharged as the cell reaction cannot be reversed efficiently by recharging. The cell must be discarded after discharging. e. g. Zinc manganese dioxide cell (Dry cell) Mercuric oxide – Zinc cell. Silver oxide – zinc cell.
Secondary Cells Generation of electric energy, that can be restored to its original charged condition after its discharge by passing current flowing in the opposite direction. These cells have a large number of cycles of discharging and charging. They are known as rechargeable cells, storage cells, or accumulators. e. g. Lead storage cell. Nickel cadmium cell. Lithium ion batteries.
Differences Primary Batteries Secondary Batteries Ø Cell reaction is irreversible Cell reaction is reversible. Ø Must be discarded after use. May be recharged Ø Have relatively short shelf life Have long shelf life. Ø Function only as galvanic Functions both galvanic cells. Cell & as electrolytic cell. Ø They cannot be used as They can be used as energy storage devices (e. g. solar/ thermal energy converted to electrical energy) Ø They cannot be recharged They can be recharged. e. g. Dry cell. Li Mn. O 2 battery. Lead acid, Ni Cd battery.
DRY CELL(LECLANCHE CELL)
• Anode: Zinc metal container. • Cathode: Mn. O 2 + Carbon (powdered graphite) • Electrolyte: Aqueous paste of NH 4 Cl and Zn. Cl 2 • Cell Scheme: Zn(s)/ Zn. Cl 2(aq), NH 4 Cl(aq), Mn. O 2(s)/C • O. C. V. = 1. 5 V
Working. Primary Electrode Reactions: Anode: Zn(s)→Zn 2+ (aq)+ 2 e Cathode: 2 Mn. O 2(s)+H 2 O(l) + 2 e → Mn O + 2 OH 2 3(s) (aq) Net Reaction: Zn(s)+2 Mn. O 2(s)+ H 2 O(l) → Zn 2+(aq)+Mn 2 O 3(s)+2 OH (aq)
Secondary Reactions: NH 4+(aq)+OH (aq) → NH 3(g)+H 2 O(l) Zn 2+(aq)+2 NH 3(s)+2 Cl → [Zn(NH 3)2 Cl 2] Zn + 2 Mn. O 2 + 2 NH 4 Cl →[Zn(NH 3)2 Cl 2]+ H 2 O+ Mn 2 O 3
Applications: q In small portable appliances where small amount of current is needed. q In consumer electronic devices quartz wall clocks, walkman etc.
Advantages. Dry cell is cheap. Normally works without leaking (leak proof cells). Has a high energy density. It is not toxic It contains no liquid electrolytes.
Disadvantages. Voltage drops due to build up of reaction products around the electrodes when current is drawn rapidly from it. It has limited shelf life because the zinc is corroded by the faintly acid, ammonium chloride. The shelf life of dry cell is 6 -8 months. They cannot be used once they get discharged. Its emf decreases during use as the material is consumed.
Lead acid battery:
LEAD STORAGE BATTERY.
• Anode: Spongy lead on lead grid. • Cathode: Porous Pb. O 2. • Electrolyte: H 2 SO 4(aq)( 20 %) (density 1. 21 1. 30 g/ml) • Cell Scheme: Pb/Pb. SO 4; H 2 SO 4(aq); Pb. SO 4; Pb. O 2/Pb O. C. V. = 2 V (Pair of plates)
Reactions during discharging. • Anode: Pb (s) → Pb 2+ (aq) + 2 e Pb 2+(aq) + SO 42 (aq) → Pb. SO 4(s) Pb(s)+ SO 42 (aq) → Pb. SO 4(aq) + 2 e • Cathode: Pb. O 2(s)+ 4 H+(aq)+2 e →Pb 2+(aq)+ 2 H 2 O(l) Pb 2+(aq)+SO 42 (aq)→Pb. SO 4(s) Pb. O 2(s)+4 H+(aq)+SO 42 (aq)+2 e → Pb. SO 4(s)+ 2 H 2 O(l) • Overall: Pb (s)+Pb. O 2 (s)+4 H+(aq)+ 2 SO 42 -(aq) → 2 Pb. SO 4 (s)+2 H 2 O(l)
Charging the Lead acid battery:
Charging reactions • Cathode: Pb. SO 4(s)+2 H 2 O(l)→Pb. O 2(s)+ SO 42 (aq)+4 H+(aq) +2 e • Anode : Pb. SO 4(s) + 2 e → Pb(s)+ SO 42 (aq) • Net: 2 Pb. SO 4 (s)+ 2 H 2 O(aq) → Pb(s)+ Pb. O 2(s) +2 H 2 SO 4
Limitations. • Self discharge: They are subject to self discharge with H 2 evolution at negative plates and O 2 evolution at positive plates. Pb +H 2 SO 4 Pb. SO 4 + H 2 Pb. O 2 + H 2 SO 4 Pb. SO 4 +H 2 O +1/2 O 2 SO 42 +2 H+ (From dissociation of water) H 2 SO 4 H 2 O H+ +OH • Loss of Water: Due to evaporation, self discharge and electrolysis of water while charging. Hence water content must be regularly checked and distilled water must be added.
• Sulfation: If left in uncharged state, for a prolonged period, or operated at too high temperatures or at too high acid concentrations, transformation of porous Pb. SO 4 into dense and coarse grained form by re crystallization. * This results in passivation of negative plates inhibiting their charge acceptance.
• Corrosion of Grid: Can occur due to overcharging when grid metal gets exposed to the electrolyte. This weakens the grid and increases the internal resistance of the battery. • Effectiveness of battery is reduced at low temperature due to increase in the viscosity of electrolyte.
• Recent years have seen the introduction of “maintenance – free batteries” without a gas – release vent. Here the gassing is controlled by careful choice of the composition of the lead alloys used i. e. by using a Pb Ca (0. 1 % ) as the anode which inhibits the electrolysis of water • Alternatively, some modern batteries contain a catalyst (e. g. a mixture of 98% ceria (cerium oxide) & 2% platinum, heated to 1000 o C) that combines the hydrogen and oxygen produced during discharge back into water. Thus the battery retains its potency and requires no maintenance. Such batteries are sealed as there is no need to add water and this sealing prevents leakage of cell materials.
Applications. *Automative: For starting, lighting and ignition of IC engine driven vehicles. *Consumer Applications: Emergency lighting, security alarm system. *Heavy duty Application: Trains, lift trucks, mining machines etc.
Advantages: A lead storage battery is highly efficient. The voltage efficiency of the cell is defined as follows. Voltage efficiency = average voltage during discharge average voltage during charge The voltage efficiency of the lead – acid cell is about 80 %. The near reversibility is a consequence of the faster rate of the chemical reactions in the cell i. e. anode oxidizes easily and cathode reduces easily leading to an overall reaction with a high negative free energy change.
Ø A lead – acid battery provides a good service for several years. Its larger versions can last 20 to 30 years, if carefully attended (i. e. longer design life) Ø It can be recharged. The number of recharges possible range from 300 to 1500, depending on the battery’s design and conditions. The sealed lead acid batteries can withstand upto 2000 – rechargings. Generally the most costly, largest, heaviest cells are the longest–lived. Ø The battery’s own internal self – discharging is low. Ø The length of time that is generally required for re charging process is less i. e. recharge time is 2 8 hours depending on the status of battery.
Ø Low environmental impact of constituent materials is an added advantage Ø It has sensitivity to rough handling and good safety characteristics. Ø Ease of servicing as indicated by several local battery service points. Ø It is a low cost battery with facilities for manufacture throughout the world using cheap materials.
NICKEL CADMIUM CELL
Anode: Porous cadmium powder compressed to cylindrical pellets. Cathode: Ni(OH)3 or Ni. O(OH) mixed with 20% graphite powder Electrolyte: 20 28% Aq. KOH jelled with a jelling agent. Cell Scheme: Cd/Cd(OH)2, KOH, Ni(OH)2, Ni(OH)3/Ni O. C. V. = 1. 25 V
Reactions during discharging. Anode: Cd(s)+2 OH (aq)→Cd(OH)2(s)+ 2 e Cathode: 2 Ni(OH)3(s)+2 e → 2 Ni(OH)2(s)+2 OH (aq) • Net Reaction: Cd(s)+2 Ni(OH)3(s)→ 2 Ni(OH)2(s)+ Cd(OH)2(s)
Charging reactions: Anode: Cd(OH)2(s)+2 e → Cd(s) +2 OH (aq) Cathode: 2 Ni(OH)2(s) +2 OH (aq)→ 2 Ni(OH)3(s)+2 e Net: 2 Ni(OH)2(s)+Cd(OH)2(s)→ 2 Ni(OH)3(s)+ Cd(s)
Discharging reaction: Ø Anode: Cd(s)+2 OH (aq) → Cd(OH)2(s) + 2 e ØCathode: 2 Ni. O (OH) (s) + 2 H 2 O + 2 e → 2 Ni (OH)2(s) + 2 OH (aq) Ø Net Reaction: Cd(s) + 2 Ni. O (OH) (s) + 2 H 2 O → 2 Ni(OH)2 (s) + Cd(OH)2(s)
Charging reactions: Ø ve pole: Cd(OH)2 (s) + 2 e → Cd(s) + 2 OH (aq) Ø +ve pole: 2 Ni(OH)2(s) + 2 OH (aq) → 2 Ni. O(OH) (s) + 2 H 2 O+2 e Ø Overall reaction: 2 Ni(OH)2 (s) + Cd(OH)2(s) → 2 Ni. O(OH) (s) + Cd(s) +2 H 2 O(l)
Applications. In flash lights, photoflash units and portable electronic equipments. In emergency lighting systems, alarm systems. In air crafts and space satellite power systems. For starting large diesel engines and gas turbines etc. ,
Advantages. Can be recharged many times. They maintain nearly constant voltage level throught their discharge. There is no change in the electrolyte composition during the operation. It can be left unused for long periods of time at any state of charge without any appreciable damage (i. e. long shelf life). It can be encased as a sealed unit like the dry cell because gassing will not occur during nominal discharging or recharging. They exhibit good performance ability at low temperatures.
They can be used to produce large instantaneous currents as high as 1000 -8000 A for one second. It is a compact rechargeable cell available in three basic configurations – button, cylindrical and rectangular. They have low internal resistance.
Disadvantages. q It poses an environmental pollution hazard due to higher toxicity of metallic cadmium than lead. q Cadmium is a heavy metal and its use increases the weight of batteries, particularly in larger versions. q Cost of cadmium metal and hence the cost of construction of Ni. Cad batteries is high. q The KOH electrolyte used is a corrosive hazardous chemical.
Fuel Cells. A fuel cell is a galvanic cell in which chemical energy of a fuel – oxidant system is converted directly into electrical energy in a continuous electrochemical process. • Cell Schematic Representation: Fuel; electrode/electrolyte/electrode/oxidant. e. g. H 2 O 2; CH 3 OH O 2
• The reactants (i. e. fuel + oxidant) are constantly supplied from outside and the products are removed at the same rate as they are formed. • Anode: Fuel+ oxygen → Oxidation products+ ne • Cathode: Oxidant + ne → Reduction products.
Requirements Of Fuel Cell. • Electrodes: Must be stable, porous and good conductor. • Catalyst: Porous electrode must be impregnated with catalyst like Pt, Pd, Ag or Ni, to enhance otherwise slow electrochemical reactions. • Optimum Temperature: Optimum. • Electrolyte: Fairly concentrated.
Hydrogen – Oxygen Fuel Cell
• Anode: Porous graphite electrodes impregnated with finely divided Pt/Pd. • Cathode: Porous graphite electrodes impregnated with finely divided Pt/Pd. • Electrolyte: 35 50% KOH held in asbestos matrix. • Operating Temperature: 90 o. C.
• Anode : 2 H 2(g) +40 H (aq)→ 4 H 2 O(l)+4 e • Cathode: O 2(g)+2 H 2 O(l)+4 e → 4 OH (aq) • Net Reaction: 2 H 2(g)+O 2(g)→ 2 H 2 O(l). *Water should be removed from the cell. *O 2 should be free from impurities.
Applications. • Used as energy source in space shuttles e. g. Apollo spacecraft. • Used in small scale applications in submarines and other military vehicles. • Suitable in places where, environmental pollution and noise are objectionable.
CH 3 OH O 2 Fuel Cell • Both electrodes: Made of porous nickel plates impregnated with finely divided Platinum. • Fuel: Methyl alcohol. • Oxidant: Pure oxygen / air. • Electrolyte: Conc. Phosphoric acid/Aq. KOH • Operating Temperature: 150 200 o. C.
• The emf of the cell is 1. 20 V at 25 o. C. • Me. OH is one of the most electro active organic fuels in the low temperature range as *It has a low carbon content *It posseses a readily oxidizable OH group *It is miscible in all proportions in aqueous electrolytes.
• At anode: CH 3 OH + 6 OH →CO 2 + 5 H 2 O + 6 e • At cathode: 3/2 O 2 +3 H 2 O + 6 e → 6 OH Net Reaction: CH 3 OH +3/2 O 2 →CO 2 + 2 H 2 O. It is used in millitary applications and in large scale power production. It has been used to power
Advantages Of Fuel Cells. • High efficiency of the energy conversion process. • Silent operation. • No moving parts and so elimination of wear and tear. • Absence of harmful waste products. • No need of charging.
Limitations Of Fuel Cells. • Cost of power is high as a result of the cost of electrodes. • Fuels in the form of gases and O 2 need to be stored in tanks under high pressure. • Power output is moderate. • They are sensitive to fuel contaminants such as CO, H 2 S, NH 3 & halides, depending on the type of fuel cell.
Differences. • Fuel Cell Galvanic Cell *Do not store chemical Stores chemical energy *Reactants are fed from The reactants form an outside continuously. integral part of it. *Need expensive noble These conditions are metal catalysts. not required *No need of charging Get discharged when stored – up energy is exhausted. *Never become dead Limited life span in use *Useful for long term Useful as portable power services electricity generation. | <urn:uuid:04136668-c1b6-4338-8ac9-12d42b1ca2f6> | CC-MAIN-2022-33 | https://slidetodoc.com/battery-technology-commercial-cells-galvanic-cells-used-as/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00205.warc.gz | en | 0.857514 | 3,809 | 3.015625 | 3 |
NEWYou can now listen to Fox News articles!
Joseph L. Owades, the son of working-class Jewish immigrants who escaped Europe shortly before ethnic turmoil ignited World War I, enjoyed an unlikely career reinventing the way Americans drink beer. Not once, but twice. His claim to fame? That he was, and still is, America’s greatest brewer. Here is the story of the American who invented light beer — and helped create craft brewing as we know it today.America’s ‘brewfather’The brilliant biochemist Owades (1919-2005) turned centuries of brewing know-how upside down in the 1960s when he developed a revolutionary process for brewing full-flavored beer with fewer carbohydrates and calories. Light beer is what we now call his creation. MILLER LITE OFFERS FREE BEER FOR ‘UNFOLLOWING’ THEM, NATURAL LIGHT JOINS IN”Tastes great. Less filling” — that’s how the cultural-landmark Miller Lite marketing campaign of the 1970s and ’80s famously summed up his innovation. Today, light beer accounts for about 40% of all beer consumed across the nation, according to Beer Marketer’s Insights.
Joseph Owades invented light beer in the 1960s, revolutionizing the American beer industry, then in the 1980s became an essential figure behind the craft beer phenomenon.
(Courtesy Owades Family)”He lived long enough to see light beer become a national phenomenon,” his son Stephen Owades, an MIT-educated musician in Cambridge, Mass., told Fox News Digital in a phone interview.For an encore in the 1980s, Owades provided his brewing expertise to a generation of young entrepreneurs eager to make small-batch American beer but lacking the expertise.America now boasts more than 9,000 craft breweries, thanks largely to the success of Owades-aided pioneers. Anchor Brewing, Samuel Adams, the former Pete’s Wicked brand — each on the list of the earliest, most successful and most influential craft breweries — were among the companies that hired Owades to pair his technical precision with their passion.America now boasts more than 9,000 craft breweries, thanks largely to the success of these Owades-aided pioneers. CRAFT BREWERY INDUSTRY REBOUNDS NEAR PRE-PANDEMIC LEVELS”He was present at the creation” of craft brewing, Boston Beer Company (Samuel Adams) founder Jim Koch boasted to Fox News Digital in an interview.Koch called Owades “a mentor.”
Jim Koch of Boston Beer Co. told Fox News Digital that Owades “was our brewfather. The first. The only. The best.”
(Boston Beer Company)When Owades passed away in 2005, Koch flew across the country to speak at the funeral in Sonoma, Calif. — and named one of Boston Beer Co.’s large aging cellars in honor of the American brewing titan. “He was our brewfather. The first. The only. The best,” said Koch. The late beer-making genius is a legend in the brewing industry, though largely unknown to the millions of consumers who each day enjoy the beer and beer styles he helped formulate. Son of an immigrant cloth cutter Simon and Gussie (Horn) Owades, Joseph’s parents, met and married in New York City, according to Stephen Owades. Simon arrived at Ellis Island in 1905, Gussie around the same period. They held passports from the former Austro-Hungarian Empire, though the area in which they lived is now part of Ukraine. They were not Ukrainian, however, said their grandson Stephen.
Joseph Owades’ parents, Simon and Gussie Owades, arrived at Ellis Island from Eastern Europe like millions of other immigrants who came to America for a better life. Above, immigrants are shown arriving in New York City, Bain News Service, 1920.
(Universal History Archive/Universal Images Group via Getty Images)”They were Jews from The Pale” — a multinational area of Eastern Europe before World War I generally tolerant of Jews, but largely impoverished. Many of them fled for the United States to escape persecution and poverty and seek better opportunities for their children. Joseph Owades fulfilled those dreams of his immigrant, Yiddish-speaking parents. “I call him the hired gun of the craft beer industry.” Simon Owades fed the family by working as a cloth cutter in New York City’s robust but labor-intensive garment industry. His working-class immigrant heritage helped fuel his son’s career as a scientist. “He was a hands-on, industrial guy,” Pete’s Wicked Ale founder Pete Slosberg told Fox News Digital this week. “I call him the hired gun of the craft beer industry.”
In addition to creating light beer, Joseph Owades also provided his brewing expertise to a generation of young entrepreneurs eager to make batches of American beer but lacking the expertise.
(iStock)Being poor and Jewish in pre-World War II America meant there were few available seats in the Ivy League or other elite institutions of higher learning. The brilliant young Owades might have gone to Harvard or Yale — but “educational opportunities for Jews faced quotas at this point,” said Koch. Staring at limited prospects in the 1930s, Owades, who attended New York City public schools, moved on to higher education at City College of New York, Gotham’s low-cost public university. It was at Rheingold that Owades had his eureka moment. He later earned his PhD from the former Brooklyn Polytechnic Institute and embarked on a career in food science. Among other achievements, he became an expert in yeast, essential to beer-making, for Fleischmann’s Yeast. He then become an executive at Rheingold Brewery in Brooklyn, which dominated the New York City beer market for much of the 20th century. Light beer bombs on BroadwayAt Rheingold, Owades had his eureka moment.He discovered that brewing beer with an enzyme called amyloglucosidase “breaks down the sugars that the natural enzymes [in the brewing process] cannot,” Koch explained. Yeast eats sugar during fermentation, converting it into alcohol. The enzyme Owades used gobbled up more of the sugars — meaning fewer calories but more alcohol.More alcohol proved no problem. The beer could be reduced down to typical beer-strength of around 4%-5% alcohol by adding carbonated water, said Koch. So Owades not only invented a new reduced-calorie beer — he instantly saved money and boosted productivity. TOP-PRODUCING CRAFT BREWERIES IN THE US THIS YEAR”Instead of spending $600 million on a new brewery, you could spend $100 million on high-speed bottling lines and double the capacity of a brewery,” said Koch. Rheingold executives failed to capitalize on the innovation. They promoted the beer tepidly as a low-calorie alternative to traditional beer — “It doesn’t taste like it doesn’t fill you up” read one poorly worded ad. “So what’s it taste like?” posited another awkward promo. And they meekly offered this product from a safe distance. Rheingold created a shadow company called Forrest Street Brewing and marketed the new brew as Gablinger’s Beer to avoid sullying the flagship brand name.”They were afraid of the blowback,” said Stephen Owades. He recalls as a teenager watching dad’s Gablinger’s Beer, under the code name Jupiter, being blind taste-tested against Rheingold’s flagship lager at the 1964 New York World’s Fair in Queens. BELGIAN WAFFLES DEBUTED AT 1964 NEW YORK WORLD’S FAIR”The consensus was that Gablinger’s scored higher than Rheingold. Significantly higher,” said the younger Owades. New Yorkers apparently loved the taste of the low-calorie beer. But “Rheingold couldn’t sell it,” said the son. The beer never quite captured the assertive image traditionally associated with and coveted by largely male beer drinkers. ‘Tastes great. Less filling’Owades, facing no objection from Rheingold following the failure of Gablinger’s, brought the light beer concept to Peter Hand Brewing of Chicago. There, it was marketed as Meister Brau Lite, a low-calorie version of their flagship brand Meister Brau. The new owners rebranded the product Miller Lite and threw the full weight of their marketing muscle behind Owades’ innovation. It slowly built a cult following among working-class enclaves of the still heavily industrialized Midwest — as Miller Brewing executives allegedly learned in the course of their due diligence while purchasing Meister Brau Lite in 1972. “Meister Brau Lite wasn’t doing well,” said Koch. “Except there was an anomaly. It was doing well in the blue-collar bars on the South Side of Chicago — White Sox territory.”Similar versions of the story cite other working-class communities in the region. The Miller execs asked men at the bar why they liked Meister Brau Lite.
A selection of Miller Lite and SideKick Extra Pale Ale are shown on ice for party in Chicago in June 2013.
(iStock)”Because it tastes great and has less filling, they said,” according to Koch. “The light bulb went off from there.” The new owners rebranded the product Miller Lite and threw the full weight of their marketing muscle behind Owades’ innovation, most notably with an ad campaign featuring a who’s who of macho male celebrities and athletes of the era. Athletes, celebrities and fans argued in a series of ads over Miller Lite’s greatest quality. Former NFL star Bubba Smith starred in one early ad, touting his brawn on the football field before effortlessly ripping the top off a can of Miller Lite with his massive, meaty paw. Legendary Chicago Bears tough guy Dick Butkus starred alongside Smith in another spot, growling, “We’re not just a couple animals who can only play football.”The campaign developed the pithy tagline “Tastes great. Less filling” — as athletes, celebrities and fans argued in a series of ads over Miller Lite’s greatest quality. In the 1980s, sports fans in packed arenas across the country began parroting the debate by the tens of thousands. One half of the ballpark yelled “Tastes great!” — while the other half barked back, “Less filling!”It was marketing gold. Miller Lite had gone viral. Light beer remains a largely American phenomenon, say industry experts. Owades’ innovation had finally met its moment. America embraced the more muscular image of his reduced-calorie beer and never looked back.
Cans of Miller Lite are shown on display at the Miller Lite Beer Hall, created by MAC Presents, at the Governors Ball on June 3, 2016, in New York City.
(Photo by Craig Barritt/Getty Images for MAC Presents)The other big breweries quickly joined the light beer movement. Today, the top-three selling beer brands in the U.S. are Bud Light, Miller Lite and Coors Light. Light beer remains a largely American phenomenon, say industry experts.Owades, ironically, was not a beer drinker. CLICK HERE TO GET THE FOX NEWS APP”He didn’t love alcoholic beverages as a concept,” said his son. “To him, it was an interesting science problem to solve. He had an expert palate and nose. But he was not somebody who loved beer.”Yet generations of Americans have loved — and still love — the beer he created.
NEWYou can now listen to Fox News articles! | <urn:uuid:c00b1dd2-d484-4b93-9e4c-633a3d657e5d> | CC-MAIN-2022-33 | https://www.dialoguecentre.org/joseph-owades-created-light-beer-forever-changing-the-way-america-drinks/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00205.warc.gz | en | 0.95064 | 2,541 | 2.65625 | 3 |
THIS ARTICLE IS MORE THAN FIVE YEARS OLD
This article is more than five years old. Autism research - and science in general - is constantly evolving, so older articles may contain information or theories that have been reevaluated since their original publication date.
Boys with autism have asymmetrical faces: their forehead and brow is larger and more prominent on the right side of the face than on the left.
That’s the observation from three-dimensional surface models of face shape that detect differences undetectable to the naked eye.
This facial asymmetry, documented in March in Molecular Psychiatry1, could help uncover genetic mechanisms underlying autism, says lead researcher Suzanne Lewis of the University of British Columbia’s Child and Family Research Institute.
The spectrum of autism disorders ― clinically diagnosed by language delay, impaired social interaction and repetitive behaviors ― spans a motley mix from musical prodigies to the mentally retarded.
How such a notoriously heterogeneous disorder is also one of the most highly heritable remains a mystery. So far, the handful of genes associated with the syndrome individually account for no more than 1-2 percent of autism cases2.
With genetics yielding slow clues into dozens of genes and pathways, some researchers say the disorder should be dissected into quantifiable autism-specific behaviors, cognitive abilities or biological traits ― such as facial asymmetry or age at first word ― that can be traced back to specific genes.
Dubbed endophenotypes, these are stable, characteristic traits that are governed by fewer genes ― thereby reducing the complexity of autism into discrete measures.
“It’s open season on endophenotypes,” says John Constantino, professor of psychiatry at Washington University School of Medicine in St. Louis. “Things we never imagined may turn out to be important in the neurobiological pathway to autism.”
Establishing an endophenotype is no simple task. The term is sometimes used to simply denote a symptom associated with autism.
But to be useful for finding genes associated with it, an endophenotype must be an autism-specific trait ― preferably quantifiable ― with proven heritability.
“Quantitative traits provide more power than the categorical traits used to clinically define a disorder, which are arbitrary by nature because you have to put the cutoff somewhere,” says Daniel Geschwind, professor of neurology and psychiatry at the University of California at Los Angeles.
Few endophenotypes meet these criteria. One that does, chromosomal position linked to language delay, has pinpointed specific genes linked to autism.
For his first attempt to link an autism-specific trait to a gene, Geschwind chose to use specific traits of language delay ― such as the age at which a child speaks his or her first word or phrase3― because evidence that this characteristic is inherited already existed4.
Using genetic linkage and gene expression studies, Geschwind and his colleagues in January linked the gene CNTNAP2 as a language-specific gene expressed during development to autism5. Two other papers earlier this year also reported CNTNAP2 as a common genetic variant in familial risk of autism6,7.
Using functional magnetic resonance imaging (fMRI), Geschwind is studying how variations in CNTNAP2 alter brain circuitry, and is characterizing mice that lack the gene.
Because the brain’s structures are known to be more heritable than behavior, imaging also offers ripe possibilities for quantifiable endophenotypes. A collection of imaged brain structures, although expensive, would yield enough data to keep geneticists busy for years to come, Geschwind says.
Researchers asked young boys with autism to first watch others do certain things such as kick a ball or dance, then imagine themselves doing the same thing. This allowed researchers to establish ‘other’ versus ‘self’ brain signals in the cingulate cortex, a region of the brain involved in decision-making.
The researchers then asked the boys to participate in an economic exchange game designed to evaluate ‘self’ and ‘other’ responses during social interactions. The imaging revealed that boys with autism have reduced cingulate activity while playing the interactive game, and the degree of this reduction correlates with the severity of the disorder.
By quantifying behavioral characteristics using such brain images, researchers may eventually be able to identify genes associated with those behaviors. Measuring these signals could also eventually lead to a diagnostic tool to assess the severity of autism.
“I wasn’t going after an endophenotype, and I don’t think it’s one yet,” says Read Montague, director of the Human Neuroimaging Lab at Baylor College of Medicine in Houston. “We need to repeat it in more autistic kids as well as family members.”
The numbers game:
When there are no easily quantifiable data, however, defining endophenotypes is more difficult.
“Establishing endophenotypes is long process,” says Constantino.
Constantino has spent the past 10 ten years trying to prove that social responsiveness can be a useful endophenotype for autism. He developed a social responsiveness scale using 65 questions that measure how socially aware a child with autism is and how well the child engages in a reciprocal interaction.
These are subjective questions, however, and hard to quantify.
“Historically, behavior has been a difficult thing to hang your hat on,” Constantino notes. But his social responsiveness scale scores have been proven heritable, stable over time and reliable whether parents or teachers assess the child with autism9,10.
Scanning the genomes of parents and children from more than 100 families with two or more children with autism, Constantino identified two areas, located on chromosomes 11 and 17, that relate to social responsiveness11.
Some researchers prefer to rely strictly on physiological or biological endophenotypes in the hopes that these traits are more indicative of the genes responsible.
Three of the best characterized biological traits of autism are large head size found in up to 20 percent of individuals with autism; elevated serotonin blood levels, recorded in up to 25 percent of individuals with autism; and excessive urinary peptide excretion, reported in nearly 60 percent of those with autism.
No one knows what causes any of these traits, but studying them might still reveal something about the disorder’s origins, says Anthony Persico, a molecular psychiatrist at the University Campus Bio-Medico in Rome.
“I couldn’t care less that we didn’t know what these traits yet mean,” Persico says. “I think that finding an explanation for why patients have too much serotonin or peptide in their urine will better help us determine why they are autistic.”
Earlier this year, using a family-based association study, Persico reported that a specific genetic variant of the protein kinase C family ― which includes enzymes important for regulating gene expression and signal transduction ― is significantly associated with autism. Individuals with this variant also secrete large amounts of proteins in their urine12, suggesting a way to perhaps trace the underlying physiological causes of autism.
In a study last year, Persico found an association between larger head sizes and a history of allergic or immune disorders both in the individuals with autism and in their first-degree relatives13.
“I never would have predicted that head size would have any correlation with immunity in first-degree relatives,” Persico says.
Unrelated work in 1996 by another group showed that mice lacking the protein kinase C gene are immunosuppressed, meaning that their immune systems have trouble marshaling defenses against foreign invaders14. There is mounting evidence to suggest that the genetic underpinnings of autism might be mediated by the immune system, Persico says.
The shape of the head may be as informative as head size, as Lewis’ work reveals. In the facial asymmetry study, unaffected mothers of children with autism display similar asymmetry, although unaffected fathers are no different than controls, Lewis says.
Studies on first-degree relatives, particularly mothers, are under way and may help determine whether maternal genes are at fault, Lewis says.
Cognition is key:
What’s missing from these genetic studies, however, is a link to cognitive abilities, says Uta Frith, emeritus professor of cognitive development at University College London.
Biological and behavioral endophenotypes have too many confounding factors to meet with much success, Frith says, adding that what scientists consider an endophenotype may in fact be a secondary consequence or compensatory event to autism.
In contrast, she says, a cognitive endophenotype based on her concept of the theory of mind ― the specific lack of cognitive capacity in individuals with autism ― can reconcile many biological causes and behavioral manifestations.
“Endophenotypes at the cognitive level have a realistic chance of pulling together the biological and behavioral strings into a middle ground,” she says.
For example, a cognitive endophenotype that can assess a child’s capacity for pretend play could help understand the social aspects of autism, Frith says. But developing the appropriate tests for each age group is likely to cost a great deal of time and money.
Despite endophenotypes’ promise, some researchers also caution against the temptation to dismantle autism into its individual clinical or endophenotypic components.
“There is little empirical justification to think that the social deficits are caused separately from language deficits or repetitive behavior, and that these three pathways somehow come together to cause autism,” says Constantino. For example, family members who are subtly affected with symptoms are affected across all three areas.
Researchers should instead focus on how different genetic perturbations can consistently cause these specific disruptions across three domains of function.
There must be a reason these symptoms hang together, Constantino notes. “Every time we try to tease apart the components of autistic syndrome in a big population, we can’t.”
Hammond P. et al. Molecular Psychiatry ePub ahead of print. PubMed
Abrahams B.S. and D.H. Geschwind Nat. Rev. Genet. 9, 341-355 (2008) PubMed
Alarcon M. et al. Molecular Psychiatry 10, 747-757 (2005) PubMed
Buxbaum J.D. et al. Am. J Hum. Genet. 68, 1514-1520 (2001) PubMed
Alarcon M. et al. Am. J. Human Genet. 82, 150-159 (2008) PubMed
Bakkaloglu B. et al. Am. J. Hum. Genet. 82, 165-173 (2008) PubMed
Arking D.E. et al. Am. J. Hum. Genet. 82, 160-164 (2008) PubMed
Chiu P.H. et al. Neuron 57, 463-473 (2008) PubMed
Constantino J. N. and R. D. Todd Biol. Psychiatry 57, 655-660 (2005) PubMed
Constantino J.N. et al. J. Am. Acad. Child Adolesc. Psychiatry 46, 1668-1676 (2007) PubMed
Duvall J.A. et al. Am. J. Psychiatry 164, 656-662 (2007) PubMed
Lintas C. et al. Molecular Psychiatry ePub ahead of print. PubMed
Sacco R. et al. Biol. Psychiatry 62, 1038-1047 (2007) PubMed
Leitges M. et al. Science 273, 788-791 (1996) PubMed | <urn:uuid:430f466c-04d4-4523-9548-b4c746369bff> | CC-MAIN-2022-33 | https://www.spectrumnews.org/news/endophenotypes-simplify-autisms-many-features/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00005.warc.gz | en | 0.924058 | 2,451 | 3.671875 | 4 |
Aquaponics is a combination of aquaculture (fish farming) and hydroponics (water-based plant growth). The fish and plants feed off each other, providing vital nutrients in a constant cycle that allows them both to thrive.
“Isn’t this a very complicated process?” This is the most common question I’ve answered when explaining aquaponics. Believe it or not, it’s one of the most simple plant setups there is. It’s self-sustaining and runs almost entirely on auto-pilot after the initial setup.
What Exactly is Aquaponics?
Plants are raised in a grow pad, and fish are held in a fish tank. The fish waste-contaminated water from the fish tank is fed to the grow bed, where billions of naturally occurring beneficial bacteria break down the ammonia into nitrites and nitrates. Nitrates and other nutrients are absorbed by plants to aid their development.
The plants, in exchange, disinfect and filter the system’s water. The water is then recirculated back to the fish tank, where the loop repeats itself.
I’m sure you’re wondering how you could ever replicate this in your backyard. In the next section, I’ll show you precisely what you need to develop your own aquaponics system.
Image: Back to the Roots Water Garden, Self-Cleaning Fish Tank, and Mini Aquaponic on the table by the window are two decor options.
Creating Your Own Aquaponics System
Before you begin constructing your setup, there are two important decisions you need to make. The first is the type of fish you’ll be using. You can choose between edible ornamental. As the name suggests, Edible fish will be available as a food source along with the vegetables you are growing. Ornamental fish, however, will be solely for boosting the ecosystem and for show.
Goldfish and koi are common species used for ornamental fish. Catfish and tilapia are favorites for edible fish species.
The second decision you need to make is the type of food you are going to grow. There are several types of food that are more beneficial for use in an aquaponics scenario.
Other species such as strawberries, blueberries, tomatoes, cucumbers, and squash, can also be used but may require supplemental fertilizers.
- Easy to use aeroponic system for your home
- Fan - Grow Lettuce, Herbs, Veggies & Fruits
- Grow smart & eat healthy, 20 gallon water reservoir Grow Tent, LED Grow Lights
What You’ll Need Before Starting
For this tutorial, we will be using the Media-Based Aquaponics system as an example. This system uses media-filled (clay, rock) beds. The plants are in these beds, and the rocks are used to filter water to the plants. This is the most common type of aquaponics system used for the average backyard gardener. This is also known as the Flood and Drain system. There is also a raft system and the Nutrient Film Technique, which can be more complicated.
For our Media-Based Aquaponics system, we will need the following materials.
- Laundry rack or old metal rack
- A fish tank
- Water pump with a timer
- Plant bed
- PVC pipe
- Aquarium filter floss
- LED light
- Coverage Full Spectrum Grow Lights
- For Indoor Hydroponic Plants Veg Bloom
- 3 years Professional Service and free return for 90 days
I’ve found a multi-level laundry rack or kitchen rack works well. You know which ones I’m talking about. The old metal ones that look like they are made out of the same metal as shopping carts. Those work perfectly, and you can find them at pretty much any outdoor store. If you are comfortable with the durability, you can even use a plastic one made for plants. Make sure the surfaces are open and not solid so you can pass pipes through them. The plant bed will be on an upper level, and the fish tank will be right beneath it, but you need to connect them.
Step 1: The Plant Bed
The plant bed will contain your plants. Eventually, you’ll fill it up with your rocks or clay, and your plants will grow from this. The stones will act as a filter to get water to your plants as a constant flow runs through the roots.
The plant bed will be installed above the fish tank. A long window pot works best. However, any long, plastic container should do the job. Make sure it is durable but not too heavy.
- LED lights specialty manufactured by VIVOSUN with Samsung LM301 diodes for FULL spectrum light
- The industries most durable grow tent – heavy duty 1680d oxford cloth
- Money & energy saving complete home grow tent kit
Step 2: The Pump
This is where we install the pump. Install the pump in the corner of the fish tank. We want it to be set up so that it pumps water up to the plant bed. Use your PVC pipe as an extension to your pump, so it reaches the plant bed.
This is why I mentioned using a metal rack. The shelves have tiny cracks in them, so it makes it easy to feed your connections through. If you are using a plastic frame that doesn’t have openings, you can cut your own holes.
Step 3: The Drain
Before your fill your plant bed with your desired medium, a drain needs to be installed. Make a hole in your plant bed on the opposite side of where you put your pump.
User another piece of PVC pipe and attach it beneath the hole, running downwards into the fish tank. Put your media guard on top of the hole in your plant bed, directly above the PVC pipe.
We want this to drain the water back into our fish tank. The media guard stops our rocks from falling into the fish tank. This completes our constant cycle of water.
Step 4: A Waste Filter
You’re going to want to prevent any solid fish waste from making its way into the medium your plants are in. A simple waste filter will do the job here. If there is no waste filter, these solid pieces can easily make their way up through the pump and into the plant bed.
The pipe end that dumps water into your plant bed needs to be wrapped in the aquarium floss you acquired. This should be sufficient enough to stop any solid waste from entering your plant bed.
Step 5: The Timer
This part is pretty self-explanatory. Anyone who has ever owned a fish tank should complete this part in a few minutes.
Add a timer to the pump you’re using on the fish tank. You’re going to want to set the pump to 20 minutes. This dictates how often the water will flow through our grow bed. We don’t want it on a continuous flow because this will flood our plants. This creates a steady flush and allows the nutrients to cycle as we need them to.
- Colored LED, indicating when the power for that row is on
- Easily set up to 8 on/off programs for the timer’s 4 grounded outlets
- ETL listed, and conforms to UL Std.
Step 6: The Light Source
Add your LED light to the fish tank. You may also add any additional components to the fish tank, such as a timer for the light or other accessories.
Depending on what type of food you’re growing and the light source in your room, you may have to add a grow light above the plant bed. Personally, I like keeping them next to a larger window or in a sunroom. I’ve gotten the best results from natural sunlight.
Step 7: Starting and Maintenance
Turn the pump on and let the system flow a few times just to prime the filter. Assure that everything is operating correctly before you add your fish and plants. Check for leaks and drips.
Assuming everything is operating correctly, you can add your fish and plants of choice. These systems are designed to have a high level of self-sufficiency. Depending on your level of filtration and power of the pump, routine cleaning may be needed. Make sure the fish tank stays clean and free from algae or contaminants. You’re going to have to regularly feed the fish. Otherwise, you can sit back, relax, and enjoy watching your food grow.
This setup can be built on any sized scale. If you’re going to use an indoor design, obviously, you’re going to use ornamental fish. Smaller fish tanks only allow for minimal growth, and you’re not going to get a sizable meal out of most indoor tanks.
If you decide to scale this up and create an outdoor setup, you can use larger plastic bins or ponds to house your fish. Once you step up to this level, you can start thinking about using more giant species of edible fish.
Keep in mind that if you decide to grow food beyond the leafy green vegetable type, you may have to add extra nutrients to allow them to grow to their full potential.
I thoroughly hope you enjoyed reading this tutorial. It gives me a sense of fulfillment to be able to share methods of growing my own food. Passing on the ability to be self-sufficient really adds value to the lives of those who read my content.
It’s essential to complete all the steps as suggested and not use shortcuts. Before building your system, it’s also vital that you consider your amount of space, what type of vegetables to grow, and what kind of fish you want to use.
This is only a start and shows the most basic ways of building an aquaponics system. I’ve experimented with more extensive and alternative methods, and I encourage you to do the same. There are hundreds of ways to complete your build to suit your living situation.
- Reservoir Bucket Connected to 4 Grow Buckets
- 400 Gallon/hour Circulating Pump
- Large 5 gallon square buckets, pre-drilled
There are also other valuable resources and components that you may find useful.
Experiment with different builds and kits. Try other plants and various types of fish. Find out what works for you and run with it! | <urn:uuid:79fc4896-32a5-4899-848b-14c5a72be0c2> | CC-MAIN-2022-33 | https://hydrogardengeek.com/what-is-aquaponics/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00204.warc.gz | en | 0.928359 | 2,194 | 3.0625 | 3 |
Breaking Down Walls to Build Futures
If Houstonian Juan Becerra, a father of three boys, could have any superpower, it’d be to look into the future. He’d use it to do everything right and lift his boys up as high as possible. He believes that all parents dream of giving their children a better life than their own.
His father had a sixth grade education and his mother reached only second grade. “Growing up I always knew my father wanted us to be better off and the same thing applies to me,” Becerra says. “I was lucky to graduate high school. I did better than my father and my mother, but now I want [my kids] to do better than I did. I want them to grow.”
He hopes they will go to college, apply themselves, and gain the skills and knowledge needed to ride the wave of technological advances to future opportunities.
To make that future happen, Becerra and his 10-year-old son, Joshua, are participating in an innovative after school program at the University of Houston Charter School called the St. Elmo Brady STEM Academy – made up of the highly-prized disciplines of science, technology, engineering and mathematics.
The Academy, which aims to engage underrepresented minority boys in STEM activities and issues, is named after St. Elmo Brady, the first African-American man to earn a Ph.D. in chemistry from the University of Illinois in 1916. He went onto teach and mentor several students during his lifetime.
The original St. Elmo Brady serves as a superhero inspiring hope and possibility for the two founders of the program: Jerrod Henderson, instructional assistant professor at the UH Cullen College of Engineering, and Rick Greer, a graduate student in the UH College of Education.
Ordinary People Doing Extraordinary Things
The UH St. Elmo Brady STEM Academy encompasses a partnership across disciplines and programs, allowing different skills, expertise and resources to work together for a common goal. It brings together the University of Houston’s Cullen College of Engineering, the College of Education, the College of Natural Science and Mathematics, the Charter School and teachHouston, a program that prepares students to teach math and science.
University of Houston undergraduate and graduate students help create the curriculum, teach the boys twice a week in afterschool sessions and work with them on Saturdays for hands-on sessions. In return, students are gaining teaching experience and getting the opportunity to make a difference in the local community.
“It’s a great partnership, which not only lets the fourth and fifth graders grow, but also our UH students,” Henderson says. “It expands everyone’s world.”
Role models are at the root of the Academy’s success and another unique component. The program stresses the involvement of role models, preferably the boys’ fathers, grandfathers or other close male relatives. In addition, the college students who are involved in the program also act as roles models and mentors.
“Mentors are absolutely like superheroes,” says Henderson, who knows the value of a good role model from personal experience.
From sixth grade through graduating high school, Henderson participated in a program called Mentoring and Educational Network for Technical and Organizational Readiness (MENTOR) in North Carolina. Thanks to MENTOR, Henderson attended his first Black Engineer of the Year Awards, decided he wanted to be an engineer and met his personal mentor Nathaniel Vause.
When Henderson graduated with his doctorate in chemical and biomolecular engineering from the University of Illinois, Vause – who is the founder of MENTOR – drove up from North Carolina with three students he was mentoring at the time to celebrate the event.
For Greer, who says he grew up without a male role model, the mentor/mentee relationship between Henderson and Vause is a major inspiration behind the St. Elmo Brady Academy model.
“They [Henderson and Vause] still talk to this day. If we can cultivate that bonding and mentoring in our program, that would be perfect,” says Greer.
Breaking Through Barriers
STEM fields are driving U.S. economic growth and show no signs of slowing down.
Employment in STEM occupations has grown 79 percent – from 9.7 million jobs in 1990 to 17.3 million in 2016, vastly outpacing employment in non-STEM sectors, according to the Pew Research Center.
There’s more good news: data from the U.S. Bureau of Labor Statistics project employment in computer occupations could grow by half a million by 2024, and roughly 65,000 new engineering jobs will be available in the same timeframe.
But there’s also a downside: growth in engineering and other STEM occupations is outpacing the supply of skilled workers.
“The future of the engineering profession depends on our ability to attract more underrepresented students into STEM fields,” says Joseph W. Tedesco, Elizabeth D. Rockwell Dean of the UH Cullen College of Engineering.
African-Americans and Hispanics are underrepresented in the STEM workforce. According to the 2017 Women, Minorities and Persons with Disabilities in Science and Engineering report by the National Science Foundation, White males constitute about 49 percent of the workers in science and engineering jobs, while African American and Hispanic males make up only 3 percent and 4 percent of the workforce, respectively.
Just under 8 percent of science and engineering doctorates were earned by underrepresented minorities in 2014.
Very much like superheroes themselves, Henderson and Greer are facing this challenge head-on, focusing on solutions and making a difference through the Academy.
The Origin Story
Henderson and Greer started the program five years ago when they were both working at the University of Illinois at Urbana-Champaign and piloted it at the Don Moyer’s Boys and Girls Club. Initially, they paid program expenses out of their own pockets, but as word spread private donations and public funds began flowing in.
The program, offered three times a week during the school year, works with fourth and fifth grade students.
“There is research indicating that by the time students – particularly African American and Latino males – get to the eighth grade, they’ve already identified that they don’t like math and science,” says Greer, who specializes in K-12 education.
Henderson points out that there are many reasons for this – from poverty and lack of encouragement to disparities in the U.S. educational system. African American students, boys and students with disabilities were disproportionately disciplined (for example, being sent to the principal’s office, suspended or expelled) in K-12 public schools, according to the Government Accountability Office.
Making a Difference
Henderson and Greer hope to bridge these gaps.
“The main reason for this program is to help change that narrative and get these kids on the path to become STEM leaders,” says Greer. “One way we do that is by exposing our students to these opportunities, meeting professionals and other students in the STEM fields, and really trying to get them excited about math and science.”
The National Science Foundation awarded the team a three-year $1 million grant earlier this year to expand the project and continue the research. Henderson says St. Elmo Brady STEM Academy should be in four Houston elementary schools by the end of those three years.
The Academy is the latest offering in the Cullen College’s repertoire of outreach programs aimed at inspiring underrepresented groups to enter STEM fields. Two such programs – G.R.A.D.E. (Girls Reaching and Demonstrating Excellence) Camp and Girls Engineering the Future (sponsored by Chevron) – focus on encouraging young girls to pursue careers in engineering. Researchers at the Cullen College track the impact of these programs annually, reporting that a much higher percentage of the participants go on to study STEM fields in college when compared to their peers.
Henderson and Greer have seen St. Elmo Brady STEM Academy have a similar impact on young, underrepresented male students. They will be tracking its impact in the Houston community over the next few years.
The team – which now includes Mariam Manuel, a science master teacher with teachHouston, and Virginia Snodgrass Rangel, assistant professor in the UH College of Education – also has a very specific research focus tied to the program: how STEM identity develops among young boys of color who have access to this after-school program.
Superheroes in Action
The first Saturday Becerra accompanied Joshua to St. Elmo Brady STEM Academy, he walked into a room full of books. “I had some preconceptions about the program,” he admits, adding that he expected a lot of lectures and text book-learning because “that’s what I have always thought about science.”
Instead, he saw young boys – his 10-year-old Joshua included – solving complex math problems and explaining how they did it, making catapults and space-crafts, solving problems, having fun and, most importantly, thinking analytically.
“My favorite parts are the experiments and Saturdays – that’s when they do the coolest things,” Joshua says. “Sometimes, if I’m lucky, I get to keep the experiments.”
One project involved the boys creating a rocket of sorts that had to land with a toy astronaut figure inside a cup. The goal was to make sure the astronaut did not fall out or “get ejected” during landing. Joshua and his team came up with a design with a nice padding underneath the bottom to cushion the landing.
Another team challenged Joshua’s team. While the challenger’s craft fell apart, the astronaut stayed inside the cup. So was it a tie?
Joshua explained that just because the goal had been achieved didn’t mean success, because the craft wasn’t “designed to break apart,” so it missed the larger goal.
“It was a proud moment for me,” Becerra says. “He had an opinion, based on fact and logic. The group setting they’re in, they learn to have opinions and to put their thoughts out and contribute to the group. I think that’s an important piece of the program.”
In the latter part of 2018, Joshua will participate as a fifth grader. Both father and son are looking forward to the second year of the program.
“Back when I was in elementary school, they didn’t have all the technology and programs they have now. It just wasn’t part of the curriculum,” Becerra says. “It’s our responsibility as parents to give them the opportunity to grow when it’s there. Yes, it’s a time commitment. It’s not easy, it involves Saturdays…but at the end of the day it’s worth it.”
Seeing participants excited about the program makes it worth it for the Academy’s two founders. Greer’s favorite memory of this journey stems from the pilot program. It involved building mousetrap race cars.
“Fathers were literally on their hands and knees on the ground, working on their cars with the students,” Greer shares. “It was a powerful moment for me.”
Henderson agrees. “That was the seed for us,” he adds. “That’s when we knew we had something to expand upon.”
Joining Forces to Beat the Odds
Henderson, who is also director of PROMES – the Program for Mastery in Engineering Studies – has long-term ambitions for St. Elmo Brady STEM Academy. He is thinking in terms of pipeline, supply and demand, and impacting the national STEM sectors.
According to the New American Economy Research Fund analysis, the United States “has a persistent and dramatic shortage of STEM workers.” In 2010, an estimated 5.4 STEM jobs were posted online for every one unemployed STEM worker. By 2015, such postings outnumbered unemployed STEM workers by almost 17 to 1.
In 2016, STEM employers still faced the issue: 13 jobs posted online for each unemployed worker – roughly 3 million more jobs than the number of available professionals who could fill them.
The UH team of researchers hope St. Elmo Brady STEM Academy is a model that can be duplicated in other areas around the country. Currently it’s being used in Champaign, Illinois and Houston, but there’s some interest in taking it to Connecticut and North Carolina as well.
“We have an enormous opportunity to impact that pipeline in a key place – the city of Houston – by working with fourth and fifth graders,” Henderson says. “We impact them here, and that will translate eventually to making a decision to come to a college of engineering, to become graduates in STEM, who will then impact the U.S. economy and the global economy.”
It seems that Henderson’s superpower involves looking into the future as well.
“The possibilities are endless,” he says with his trademark grin. | <urn:uuid:ebafb5b1-5b15-4a6d-9881-358ad740bde9> | CC-MAIN-2022-33 | https://www.egr.uh.edu/news/201903/real-life-superheroes-inspire-boys-be-stem-leaders | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00002.warc.gz | en | 0.961866 | 2,777 | 2.59375 | 3 |
The changing face of schools for our special children
My brother has Down Syndrome, and I have clear memories of visiting prospective schools and residential programs for him when we were both younger. It was the 1970s, and at that time most of the educational and residential settings were in isolated areas, and generally institutional in physical appearance. Accessibility was not a requirement in design work back then, and thus, many elements of the built environment were obstacles to those individuals with physical handicaps.
It was not until the signing of the Americans with Disabilities Act (ADA) in 1990 that buildings were mandated to be accessible. Even though two decades have passed since then, it has taken the full 20-plus years to adequately integrate accessibility into existing buildings. Now, in 2012, the ADA has created opportunities for more inclusive environments allowing for the education and employment of individuals with disabilities. Classrooms, campuses, government and private sector buildings are more accessible and the opportunity of access is visibly apparent in our built world.
Through legislation of the past 35 years providing rights to children with disabilities, the buildings supporting these and all children have transformed to what they are today: accessible, modern, well-lit, spacious and more. As an architect and the 53-year-old mother of a 20-year-old son on the autism spectrum, I’ve watched what the congregate voice of parents of children with autism has done for change to the academic world. This massive wave of vocal individuals is impacting not only the environments for children and adults with autism, but also the settings for individuals with disabilities as a whole. Further, I believe that the Autism Movement has given a greater voice to parents of children with other disabilities as well.
The result is that our school settings are changing. First and foremost, the primary focus has been on developing and implementing new teaching methods and behavioral management plans for our kids. These efforts have definitely consumed the past 10 plus years. Now, with the immense population of transitioning ASD youth and the need to understand their future as adults, the parents of these kids are focused on reinforcing life and vocational skills in our school settings.
Environment: The Third Teacher
With the more-recent identification of toxins that may impact children on the spectrum, our material selections for these environments are beginning to be clearly defined. Also, as science identifies other health and development nuances in our children with autism, architects must be aware that the visual and auditory systems of children with autism are more sensitive and require building adaptations to material selections and way-finding methods. Thus, designers are beginning to implement changes to the physical fabric that composes a school for our special kids. Further, understanding that the proper placement and orientation of the school program spaces can have an impact on the learning and development of a special needs child is the most significant key to the success of their learning.
In reflecting on the Reggio Emilia approach of the “Environment as the Third Teacher,” a common thread connects this concept for early childhood education to the concepts developing today for children with special needs. It is clear that our environment plays a major role in our overall human development. So, why should it not be also true that when we properly shape and build our schools, we help teach and develop our special children?
I have had the great opportunity to visit many programs across the country as well as be involved as a special needs architect on large currently developing schools. And as a designer experienced in raising a child on the spectrum and working with educators as an advocate, I see that together we can discuss the literal teaching goals and how our shaping a room or connecting two rooms can help or hurt their program. Further, we can together creatively adapt the standardized settings to reinforce skill-building techniques.
Full Inclusion A Driving Force
For schools, the initial significant factor that began the transformation of school environments for children with special needs was the enactment of the Education for All Handicapped Children Act in 1975. This act required all public schools to provide equal access to education for children with physical and mental disabilities. Note that access is not meant to imply the same access as required by the ADA, or physically gaining access—rather, it means the opportunity to attend the same programs.
This marked the beginning of what eventually became law as full inclusion. In a landmark case, Daniel R.R. v. State Board of Education (1989), it was concluded that students with disabilities had a right to be included in both academic and extracurricular programs of general education. After this, the adoption of the Individuals with Disabilities Act (IDEA), signed into federal law in 1990, marked a significant change in how public agencies provided special education and related services to children with disabilities. The language of “least restrictive environment” defined the end goal.
Reshaping Our Classrooms
People in my generation may be wondering what has happened to the home economics classrooms once central to the vast majority of high school programs. In many cases, this space is now being used to reinforce life skills.
Areas are being developed into mock apartments with clearly defined and well-organized areas for cooking, prepping food, washing and folding clothes, practicing telephone skills, general cleaning, changing sheets and making beds, brushing teeth and shaving, etc. Imagine the possibilities and imagine further how the proper spacing of these areas and the material selections can further help support the success of this program for our children.
It is evident that the structure required for children with autism for successful behaviors and focused attention is molding our classrooms. Further, concerns for the possible impact of toxins in the environment are beginning to drive material selections. Considerations are being given to different seating styles for teaching, from laying on the floor to 360° pivoting chairs; view cones are being managed to reduce connections to highly active areas thereby reducing stress for the students; fluorescent lighting is being deleted due to flickering lights; the acoustics within the spaces are being managed to reduce reverberation; more lockable cabinetry is being designed to minimize clutter; classroom links are being created so staff can offer support to each other through internal door connections; and floor patterns are being used for wayfinding and management of staying in place. (See picture above for an example of two typical classroom layouts currently developing in a private school for children with learning challenges in Delaware.)
Efforts are also being made to develop built elements within programs that further reinforce skill sets needed by our kids. An example of this would be the use of swimming pools or natatoriums. Decades ago, it would not have been thought of to integrate special students into the actual efforts needed to support a therapeutic pool within a school building.
Fast-forward to a large public school special needs architect Purple Cherry is consulting on in Utah. Programs are being developed to incorporate the students into the laundering, folding and organizing of the multiple towels and bathing suits required to run a school for over 250 students from kindergarten to 21 years of age, and the space has been designed to support these vocational and life skills opportunities. A full laundry area is attached to the lobby space with multiple washers and dryers and large folding tables; the counter area at the lobby has been designed for two greeters, and multiple cubbies at ADA height are indicated to allow specifically designated slots for each and every size option of bathing suits. This integrated thinking of architecture will allow the students to develop the vocational skills for possibly working at a hospital as a greeter, managing laundry at a hotel, or working at a library or retail store organizing items.
Impacting Life Skills
I can testify first-hand to the fact that the earlier life and vocational skills training is implemented, the better. Within my own house, our family was supported by an autism waiver program. This allowed for an IISS (Intensive Individual Support Services) technician in our home regularly during the week.
My primary focus for my son, starting at age 12, was developing his life skills. This translated into him folding laundry, emptying the dishwasher, raking leaves, changing his sheets and so on. Over time this developed into his ability to cut the grass in a circle with a riding lawnmower, make a shopping list and complete the shopping in a familiar grocery store by himself. To obtain this achievement, it took about five years. Now, at 20, he is employed in three job settings.
So, you may wonder how my personal story above translates into explaining the changes in academic environments for children with special needs. Our educational leaders (principals, directors and teachers passionate for our children) are focusing on the future for our special children. With the implementation of the TEACCH approach, educators are developing individualized person- and family-centered plans for each student and structuring the physical environment to support this within the limitations of elements they can physically move. Architects and designers now need to structure the built physical environment to further support the teaching methods being implemented.
Expanding The Options
What other rooms and opportunities are being created? Outdoor gardens are being created to reinforce landscape job training. Small rooms with tiered floor seating are being designed for the development of social skills and viewing in the round. Social nodes for small group teaching and developing bonding opportunities are being created at special areas along corridors. School stores for the “purchase” of items based on the behavioral plan are being designated—but push this concept further and you can see that allowing students to run and organize this store reinforces vocational training as well as promotes elevated self-esteem. How might the architecture support this function? A well-structured organizing system, an ample storage closet and a “sales” counter all promote learning different skills.
Now, how do we take these simple isolated examples and thread them together—and not by simply drawing them on a plan and placing them where we might typically believe they would go. In developing any school for children with special needs or specifically for children on the autism spectrum, there are opportunities through the building and throughout the design process—at the initial steps of planning, during the assembling of the defined spaces, to the selection of the materials for the inside of the interior wall to the outside of the exterior property limits—to create schools that support our children at the highest level of leadership, that elevate our child’s self-esteem and that continuously reinforce learning, growing, life and vocational skills to ultimate independence as defined by their abilities! | <urn:uuid:fbff1156-73a1-410a-aef1-2936510f7c69> | CC-MAIN-2022-33 | http://www.autismfile.com/living-with-autism/environment-the-third-teacher/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00605.warc.gz | en | 0.969143 | 2,120 | 2.765625 | 3 |
Darwinists and theorists of intelligent design refer to "trade-offs" in living systems, but they explain them in ways that are radically different, and tellingly so. Theodore Garland is an evolutionary biologist at the University of California, Riverside. His "Quick Guide" to "Trade-offs" in Current Biology provides an opportunity to compare the explanatory power of ID and Darwinism. First of all, what is a trade-off?
In engineering and economics, trade-offs are familiar enough (e.g., money spent on rent is not available to buy food). In biology, a trade-off exists when one trait cannot increase without a decrease in another (or vice versa). Such a situation can be caused by a number of physical and biological mechanisms. One type of mechanism is described by the so-called ‘Y-model’, which states that for a given amount of resource (e.g., energy, space, time), it is impossible to increase two traits at once. A commonly cited example is a trade-off between the size and number of eggs that, for example, a fish, bird or turtle can produce in a given clutch. Depending on the organism, this trade-off can be caused by a limitation in the amount of energy available, the amount of time available to produce eggs or the amount of space available to hold eggs (e.g., inside the shell of a turtle). Similarly, time spent foraging may be time wasted with respect to finding a mate. Trade-offs also occur when characteristics that enhance one aspect of performance necessarily decrease another type of performance. (Emphasis added.)
Notice that Garland has illustrated biological trade-offs with designed ones (engineering and economics). He quotes Charles Darwin on the point that animals must evolve as "integrated wholes":
The whole organism is so tied together that when slight variations in one part occur, and are accumulated through natural selection, other parts become modified. This is a very important subject, most imperfectly understood.
So what have Darwinian evolutionists learned about this in the past 155 years, since "Biologists have made major advances since then"? One advance, Garland says, is the theory of trade-offs: "Indeed, the concept of trade-offs underpins much of the research in evolutionary organismal biology, physiology, behavioral ecology, and functional morphology, to name just a few fields."
Having set up trade-off theory as a foundation of progress in evolutionary understanding, what does he say it has produced, specifically? We can dismiss his appeals to design as rhetorical misdirection:
Having survived a decade of frigid winters in Wisconsin, I like to use the example of gloves versus mittens. Gloves are good for making snowballs and getting keys out of your pocket, but they do not keep your hands nearly as warm as mittens do. Moreover, you must remove the mittens to get the keys. Returning to biology, limbs can be ‘designed’ for speed, through lengthening and thinning of bone, but this will often reduce strength and make them more likely to break when in use. Hence, a predator that evolves to be a fast runner may have to trade-off its ability to subdue large or strong prey (e.g., cheetah versus lion).
He can’t help but say "designed," even if using scare quotes. Face it; a cheetah’s limbs look designed for speed! By using "design" words and examples, Garland has not yet restricted his explanation to mutation and selection. Notice that he has just attributed purpose and planning to the cheetah! The "predator" is the subject of the verb "may have to trade-off its ability" to subdue large or strong prey.
As he goes on to describe more examples, and the ubiquity of trade-offs in nature, he keeps evolutionary theory in the shadows. For all the reader knows, the trade-offs could have been designed.
When push comes to shove, instead of giving a scientific explanation consistent with neo-Darwinism, Garland gives excuses. He says it’s too hard a problem:
In some cases, expected trade-offs based on mathematical models or on basic biological principles are not found. This may occur because nature has more ‘degrees of freedom’ than assumed by simple conceptualizations that predict trade-offs. For one example, aside from changes in fiber-type composition, muscles can evolve to be larger, positions of origins and insertions can shift, legs can become longer, and gaits can evolve (including bipedality). As another example, animals may be able to acquire and process more food (e.g., by altering their preferred prey type), thus allowing them to secure more energy and increase both number and size of offspring.
Saying something "can evolve" is not the same as saying it "did evolve." Garland waffles, saying evolution does things this way sometimes, and that way sometimes, but there’s no way to know. While his references to mathematical models are helpful, there’s nothing about them that is strictly Darwinian. In fact, they can sometimes be counter-Darwinian:
Although it is easiest to conceive of and recognize trade-offs between only two traits, organisms comprise an almost infinite number of ‘traits’, and trade-offs may appear only when we include multiple traits in an analysis. The Y-model can be expanded to include multiple traits at multiple levels of biological organization. Speed and stamina might not trade-off in some group of organisms (perhaps even showing a positive relationship), but a composite measure of locomotor performance abilities might be negatively related to one or more aspects of the life history (e.g., growth rate, age at first reproduction, fecundity). Similarly, a physiological or biomechanical trade-off — even if it affects physical fitness (e.g., locomotor abilities) — does not necessarily indicate any trade-off with Darwinian fitness (lifetime reproductive success). Of course, a small effect on a performance trait (e.g., a 2% reduction in speed associated with a 2% increase in stamina) could, for some organisms under some ecological circumstances, make the difference between eating and being eaten.
Garland ends with more cases where Darwinian evolution might not be the explanation for observed trade-offs:
A negative relationship alone does not prove that two traits necessarily trade-off in a functional or evolutionary sense. Rather, it is possible that natural selection simply never favored the evolution of species that have high (or low) values for both traits. Whether a trade-off (or evolutionary constraint) necessarily occurs can be tested by selection experiments and experimental evolution with tractable model organisms, by phenotypic engineering (such as hormone manipulations), by direct molecular-genetic manipulations, by a search for organisms that break the rules, or by developing a thorough understanding of how organisms work. Finally, it is worth noting that many sexually selected traits, such as the exaggerated tail feathers of male peacocks, may benefit the ability to obtain mates but hinder escape from predators, reduce foraging ability or increase the energetic cost of locomotion. These situations can also be viewed as trade-offs.
A reader looking for a specific tie-in of an observed trade-off to a Darwinian explanation will be disappointed. Merely stating that an animal (like the peacock with its outrageous tail) exhibits trade-offs doesn’t explain how mutation and selection produced it. In support of Darwinian evolution, Garland provides nothing more than a list of exceptions and excuses. Remarkably, he expects intelligently designed "manipulations" involving "phenotypic engineering" to provide support for an explanation based on unguided processes.
The one time he mentions selection leading to trade-offs is in his concluding paragraph about constraints:
Constraints can be defined as anything, internal or external to an organism, that limits the production of new phenotypes. For example, if the circulating levels of a hormone change, then any cell that has receptors for that hormone is likely to be affected. Thus, selection favoring increased aggressive or agonistic behavior may have adverse consequences for parental behavior. This example should make clear that, in biology, the concepts of trade-offs and constraints are often closely related.
That one case, though, is mentioned as a possibility, not a demonstration. From this article, we gain the distinct impression that neo-Darwinism is not helpful to understanding trade-offs.
ID and Trade-offs
The theory of intelligent design looks at trade-offs much the same in observational terms, but very differently in explanatory terms. Discussions of trade-offs generally come up in responses to criticisms of bad design (dysteleology) in nature. Design theorists explain that ID does not imply that every trait must be perfect or ideal. Rather, design must be evaluated holistically. To infer design for the human body does not require that we have the visual acuity of an eagle or the speed of a cheetah. Suboptimal design does not falsify intelligent design.
Paul Nelson has used the analogy of a laptop. Nobody would argue that a laptop is not designed. But given the design goal of a lightweight, portable computer, that goal constrains the individual parts. A laptop can’t afford a heavy disk drive or a giant screen; all the parts must contribute to the overall goals of portability, small size and light weight. A desktop computer, with different design goals, will have different trade-offs (e.g., less portability). So will a motorcycle compared with a racing car.
Observationally, therefore, design theorists would agree that trade-offs are ubiquitous in biology. They would deny, however, that the trade-offs arise by unguided natural processes, except maybe to accentuate designed trade-offs over time. Instead, they would say that the functional performance of the whole animal in its niche provides evidence for design, even if specific traits are not the best of what’s possible. A sloth provides as much evidence for design as a cheetah.
Both Darwinian evolutionists and design theorists recognize the ubiquity of trade-offs in biology. Both can evaluate them in terms of constraints. Both agree on the necessity of evaluating trade-offs holistically, viewing organisms as "integrated wholes." But when it comes to explaining their origins, the two ways of thinking part company.
An evolutionary biologist struggles to avoid design terms: engineering, economics, biological organization. He never ties trade-offs to random mutations. He almost personifies selection, saying that if an animal evolves to be fast, it "may have to trade off" its ability to be strong. And he can’t help but use design analogies, like mittens versus gloves.
Design terms and analogies, however, come naturally to intelligent design theory. Since our uniform experience with objects exhibiting trade-offs, whether mittens versus gloves, or laptop versus desktop computers, is that they proceed from intelligent causes, it’s only natural that trade-offs in biology reflect origin by design for functional constraints. | <urn:uuid:f49976c4-36e3-47fc-bc5c-3084537378da> | CC-MAIN-2022-33 | https://evolutionnews.org/2014/01/comparing_expla/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00405.warc.gz | en | 0.94425 | 2,298 | 3.609375 | 4 |
India has witnessed numerous warriors who fought for their land. They never gave up and fought courageously. Do you wanna know about the fierce warriors of India? Here we have prepared a list of Indian Warrior. Let us consider them.
There have been various fighters in India. Be it the courageous Maharana Pratap, Chhatrapati Shivaji, Raja Raja Chola, or Rani LakshmiBai. They have shown the world that they can do anything for their homeland. But never give up till their last breath.
1- Maharana Pratap
Maharana Pratap is one of the greatest Indian warriors. He was born on 9 May 1540. He was the son of Mewar King Udai Singh and Jaiwanta Bai. Pratap was a Hindu Rajput and belongs to Sisodiya Clan.
After his father’s death, he ascended the throne. He has fought many deadly battles. The battle of Haldighati and the Battle of Dewar were the most important battles of his life. Akbar defeated Pratap in the Battle of Haldighati but was unable to capture him.
Afterwards, Pratap used guerilla warfare tactics to win back Mewar. Then in the Battle of Dewar, Pratap occupied the Mughal post at Dewar. He also regained most of Mewar except its capital. In fact, He built a new capital Chavand. During his lifetime he never gave up in front of the Mughals.
READ MORE- 21 Best History Books Of All The Time
2- Chhatrapati Shivaji Maharaj
Chhatrapati Shivaji is known as the “Father of the Navy”. He was one of the bravest Indian warriors. He was the ruler of the Bhosle Maratha Clan. Shahaji Bhosle and Jijabai were his parents. His grandfather was Maloji who got the Deshmukh rights and Shivneri Fort for residence.
In fact, Shivaji Bhosle I named Chhatrapati Shivaji for his courage and leadership. He wanted to lay the foundation of Swaraj. He has shown courageous acts at the age of 16. Shivaji took the Torna fort, Purandhar fort, and Kondhana as well.
Shivaji killed an Adilshahi General, Afzal Khan. He captured the Chakan fort too. He also attacked the Lal Mahal that’s why Shaista Khan left Pune. Then Shivaji started conquering forts from the Mughals. He ascended the throne of Swaraj.
3- Prithviraj Chauhan
Prithviraj Chauhan was a courageous Indian warrior. He was the ruler of the Chauhan dynasty. He was the lionhearted king as at the of 13, he defeated Bheemdev, the ruler of Gujarat.
Prithviraj expanded his empire from Thanesar in the north to Jahazpur in the south. He married princess Sanyogita, daughter of Kannauj King Jayachandra. Afterwards, He led the army of several Rajputs kings and defeated Mohammad Ghori in the First Battle of Terrain.
However, In the Second Battle of Terrain, Ghori defeated Prithviraj. Ghori captured Prithviraj and other fighters. As per the historical facts, Ghori destroyed his eyes. Even after that, Prithviraj killed Ghori with the skill of Shabd bhedi archery.
4- Chandragupta Maurya
Chandragupta Maurya is one of the greatest Indian warriors. He was the founder of the Maurya Empire. The ruler of Magadha was Dhanananda at that time.
Chandragupta defeated Dhanananda of the Nanda dynasty. Then, the war between Seleucus I Nicator and Chandragupta began. After two years, the war between both dynasties ended with a settlement. The marriage of Chandragupta and Seleucus’s daughter.
Kautilya was a great ally to Chandragupta. He was his mentor and guided him in taking important decisions. Kautilya has the goal of maintaining order and keeping the invaders away from the land through his policies.
ALSO-READ- 25 Best Novels By Indian Authors
5- Emperor Ashoka
Emperor Ashoka or Ashoka the Great was a renowned Indian Warrior. He was the emperor of the Maurya dynasty. He was the son of Bindusara and the grandson of Chandragupta.
Ashoka expanded the Maurya Empire from the west (now Afghanistan) to the east( now Bangladesh). The capital of the empire was Patliputra(Patna). You know what after the war of Kalinga, Ashoka gets upset to see immense bloodshed and destruction. He was converted to Buddhism.
Moreover, the emblem Republic of India is adapted from the Lion Capital of India. He wrote numerous inscriptions. The inscriptions centred on the dhamma the set of edicts. He started promoting Buddhism to reduce war and destruction.
6- Chandragupta II Vikramaditya
Chandragupta II aka Vikramaditya is one of the popular Indian warriors. He became the ruler of the Gupta dynasty after her father Samudragupta. His grandfather was Chandragupta I.
In fact, Vikramaditya extended the empire from the Indus river in the west to Bengal part in the east. He also expanded the dynasty from the Himalayan foothills to the Narmada River in the south. It is believed that the renowned poet Kalidasa was probably his court poet.
Vikramaditya defeated Sakas and that’s why known as Sakari. He also made alliances with other powerful empires. He married Princess Kubernaga from Naga Dynasty. Other alliances took place at times.
7- Bajirao Ballal
Bajirao Ballal or Bajirao I is a valiant Indian warrior. He was the seventh Peshwa of the Maratha dynasty. Bajirao used to assist his father in military campaigns at an early age.
Moreover, Bajirao became ruler at a young age which cause senior officials jealous of him. He promoted young men as commanders who were not Deshmukh. This also causes trouble for him. Despite all this, He extended the Maratha empire to Malwa, Bundelkhand, Bengal, and Gujarat.
He also captured Ghodbunder Fort and Vasai in the Battle of Vasai. He observed the weakness of the Mughals and wanted to take advantage of it. Bajirao was surely a courageous fighter. defeated Nizam-ul-Mulk in the Battle of Palkhed.
READ MORE- Top 10 Indian Poets All The Time
8- Rani Lakshmibai
Rani Lakshmibai was born on 19 Nov 1828 in Varanasi. Her father Moropant Tambe worked for Bajirao II of the Bithoor district. She was educated at home. Her skills include horsemanship, shooting, and mallakambha. Her mother died when she was only four years old.
In fact, Lakshmibai is one of the renowned leaders in the Indian Rebellion of 1857. She was married to Gangadhar Rao, the Maharaja of Jhansi. Their son died after four months. Then they adopted a child Anand Rao. After the death of Gangadhar Rao, the British East India Company applied the Doctrine of Lapse. Laksmibai didn’t accept that.
In 1857, the Indian Rebellion began from Meerut. Laksmibai raised an army to fight against the British force. When they laid siege to her kingdom, she defended Jhansi. Afterwards, she escaped with her son from the fort and joined Tatya Tope’s rebel forces. Lakshmibai fought fiercely till her last breath and never surrendered to the Britishers.
9- Tipu Sultan
Tiger of Mysore, Tipu Sultan is a popular Indian Warrior. He was the ruler of the Kingdom of Mysore. His father Hyder Ali was commander-in-chief of the Mysore Army. His mother was Fatima Fakhr-un-Nisa.
Sultan learned shooting, military tactics, swordsmanship, riding, and Koranic studies. Significantly, He can speak multiple languages like Urdu, Arabic, and Persian. He applied his military tactics at the age of 15 in the Malabar invasion. Afterwards, Sultan became his father’s right hand in the battles.
Moreover, Sultan was a pioneer of Rocket Artillery. He deployed the rockets during the Battle of Pollilur, the Anglo-Mysore Wars, and the Siege of Seringapatnam. He won the Second Anglo-Mysore War. But his last battle was Fourth Anglo-Mysore War, he died while defending the Seringaptam.
READ MORE- 12 Best Indian Sports Women You Must Know
10- Rajaraja Chola I
Rajaraja I was one of the greatest warriors. His real name was Arulmoli Varman. He was the ruler of the Chola dynasty. His parents were Parantaka II and Vanavan Mahadevi.
When he inherited the throne of the Chola dynasty, its boundaries were Thanjavur-Tiruchirapalli. Afterwards, Rajaraja turned it into a vast empire with a strong navy and army. He expanded the empire from the Chera country, the Pandya country, Srilanka, and Lakshadweep.
Rajaraja won the Battle of Kandalur Salai. He defeated Pandyas and the country came to be known as Rajaraja Mandalam. He got the title of Mummudi Chola after conquering the countries of Pandyas, Cholas, and Cheras.
Akbar was the third emperor of the Mughal empire. He was the son Humayun. Akbar succeeded him at the early age of 13. He established a centralized system of administration.
Interestingly, Akbar was fond of literature, art, and culture. He created a library of 24,000 volumes written in Arabic, Sanskrit, Urdu, Persian, Kashmiri, etc. He expanded the Mughal empire to include Gujarat, Kabul, Malwa, Bengal, Kadesh, and Kashmir.
Akbar fought many fierce battles throughout his reign. It included the Battle of Haldighati, the Second Battle of Panipat, the Battle of Thanesar, the Battle of Tukaroi, and others.
12- Maharaja Ranjit Singh
Maharaja Ranjit Singh is a courageous Indian warrior known as the Lion of Punjab. He was the first Maharaja of the Sikh Empire. He lost his left eye due to smallpox.
Maharaja ascends the throne at an early age after his father’s death. His reign introduced modernization, reforms, and investment into infrastructure and general prosperity.
In fact, His army included Hindus, Sikhs, and Muslims as well. Ranjit Singh captured Lahore and become the governor of the city. Afterwards, he proclaimed himself Maharaja of Punjab. Then he captured Amritsar also. He defeated Afghans in the Battle of Attock. Throughout his reign, he fought many deadly battles. He deserves to be called the Sher-e-Punjab. | <urn:uuid:217255b6-78a9-4998-bf0b-7509b24e9294> | CC-MAIN-2022-33 | https://siachenstudios.com/list/best-greatest-indian-warrior-of-all-time/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00205.warc.gz | en | 0.97688 | 2,441 | 2.84375 | 3 |
Are you worried about a surge in inflation? What about hyper-inflation? The prices of goods and services have been steadily rising, while the value of the dollar has been declining. This can be concerning for anyone who is looking to protect their wealth and make a profit.
The CPI (Consumer Priced Index) soared to an increase of 9.1% from the last year. This is the largest increase in inflation the economy has endured since 1981.
As inflation creeps up, many people begin to worry about the state of the economy as a whole. The Consumer Confidence Index also fell to its lowest level in over a year.
With the stock market being so volatile as of late, it’s no wonder people are worried about their investments.
However, there are still some good investments out there that can help you hedge against inflation and make a profit.
What Is Inflation?
Inflation is defined as a sustained increase in the general level of prices for goods and services. It is usually measured as an annual percentage change.
In the past, inflation has been caused by factors such as wars, natural disasters, and oil shocks. More recently, central banks printing money has also been a major driver of inflation.
Consumers often feel inflation the most when they go to the grocery store and find that the prices of their favorite items have increased.
Inflation can also have an impact on investments. For example, if you are invested in a fixed-income investment such as a bond, the value of your investment will decrease as inflation increases.
This is because when inflation goes up, the purchasing power of the dollar declines. This means that it takes more dollars to buy the same amount of goods and services.
As an investor, you need to be aware of how inflation can impact your portfolio and make sure that you are investing in products that will maintain their value or even increase in value as inflation increases.
|This especially becomes true in the distribution phase of your retirement when you are relying on your portfolio to provide income.|
I had many clients that began to feel the pinch of rising costs after they retired. Most were able to adjust their budgets accordingly but still felt the impact.
What Causes Inflation?
Inflation is caused by a variety of factors, but the most common is an increase in the money supply.
When the money supply grows faster than the economy, it leads to inflation. This is because there is more money chasing the same amount of goods and services.
Other factors that can cause inflation to include:
- Wars or natural disasters that lead to increases in the prices of goods
- Increases in oil prices
- Government spending more than it takes in through taxes
- Poor economic conditions
How Can Inflation Affect My Financial Strategy?
Inflation can have a major impact on your financial strategy. If you are retired or close to retirement, inflation can erode the value of your savings. This is because the purchasing power of your money will decline as prices increase.
I’m sure you’ve noticed gas prices increasing lately. That’s just one example of how inflation can eat away at your savings.
In addition, if you have debt, inflation can make it more difficult to repay what you owe. This is because the amount you owe will be worth more in real terms than when you originally took out the loan.
“Inflation can be scary, but like any financial movement, there are winners and losers,” says True Tamplin of Finance Strategists, a popular financial education website.
“During periods of high inflation, we should be doubling down on looking for where to invest because the dumbest place you can keep your money is in cash.”
What to Invest in During High Inflation?
The rise in food prices is a recurring problem for American consumers. The Consumer Price Index was up 8.6% on an annual basis in May 2022, compared to a year prior. It grew 9% to 8.1% last month. As inflation increases, it’s not as long and consumer sentiment about Inflation hits a record high, with 7 in 10 saying inflation is a problem.
So, what can you do to protect your portfolio against inflation? Here are 9 of the best investments that can help turn a profit during periods of high inflation.
1. Gold and Silver
Commodities are another inflation hedge as they tend to move inversely to the U.S. dollar when inflation rises. When the dollar weakens, commodities become more expensive and vice versa.
Investing in commodities can be done through commodity-based ETFs or mutual funds, which offer exposure to a basket of commodities. Alternatively, investors can purchase futures contracts for specific commodities such as oil, gold, or silver.
Gold and silver have been used as a means of exchange and store of value for centuries. In times of economic turbulence, these precious metals have typically maintained their purchasing power, making them ideal inflation hedges.
Over the last ten years, gold has returned an average of 7% per year, while silver has returned an average of 10% per year. In comparison, the S&P 500 has returned an average of 14% per year over the same period which is higher than the lifetime average of 10%.
Different ways to invest in gold and silver are through buying physical metals, mutual funds, or ETFs (exchanged traded funds). The popular gold ETF is the SPDR Gold Trust (GLD) and the popular silver ETF is the iShares Silver Trust (SLV).
|Company Name||ETF Name||Symbol|
|Abrdn Plc||Physical Silver Shares ETF||SIVR|
|Invesco||DB Silver Fund||DBS|
|World Gold Council||SPDR Gold Shares||GLD|
|Abrdn Plc||abrdn Physical Gold Shares ETF||SGOL|
|World Gold Council||SPDR Gold MiniShares Trust||GLDM|
DB Silver Fund
2. Real Estate
Real estate investments is another asset class that can offer protection against inflation. As prices for goods and services rise, so do rents and property values. In addition, real estate provides the potential for income and capital appreciation, making it a well-rounded investment.
Types of real estate investments include:
- Residential property: This can be in the form of a single-family home, townhouse, condominium, or apartment.
- Commercial property: This includes office buildings, retail space, warehouses, and mixed-use properties.
- Industrial property: These are typically manufacturing plants or storage facilities.
If you’re not comfortable with owning physical real estate, there is also crowd-funding real estate investment trusts (REITs) which own and operate income-producing real estate. REITs offer the benefits of diversification and professional management, making them a good option for many investors.
A popular option is Fundrise, an online platform that makes it easy to invest in REITs. With as little as $500, you can get started investing in a diversified portfolio of commercial and residential properties. A competitor of theirs, Roofstock, focuses exclusively on investing in rental properties. These are just examples of REIT’s you can invest in on the crowdfunding side. We’ll discuss other REIT options later in this article.
3. Value Stocks (Dividends)
Value stocks are those that are trading at a discount to their intrinsic value. In general, these companies are out of favor with investors and tend to be less volatile than the overall market.
Value stocks tend to do well during periods of inflation as investors seek out companies that can maintain or grow their dividend payments.
In addition, many value stocks are cyclical industries, such as basic materials and energy, which tend to do well when inflation is rising.
Value stocks that pay dividends are just icing on the investment dessert cake – yummy! In addition to providing a source of income, dividends can also help to buoy the share price during periods of market turmoil.
The Dividend Aristocrats are a group of companies in the S&P 500 that have increased their dividends for 25 consecutive years or more. This list includes many blue-chip companies, such as Johnson & Johnson (JNJ) and Procter & Gamble (PG).
Examples of value stocks that also pay good dividends include :
|Company Name||Stock Dividend||Current Quarterly Dividend ($)||Dividend Yield (%)|
|Exxon Mobil (XOM)||$89.98||$0.88||3.91%|
|General Electric (GE)||$68.36||$0.08||0.47%|
|Philip Morris International (PM)||$95.84||$1.25||5.22%|
|Verizon Communications (VZ)||$44.75||$0.64||5.72%|
Billionaire investor Warren Buffett is a big proponent of investing in value stocks. In fact, his holding company Berkshire Hathaway (BRK.A) is a prime example of a successful value stock portfolio.
One of Buffett’s best value plays was investing in Coca-Cola (KO) when it was trading at a discount to its intrinsic value. In the 20 years since he first invested, Coke has returned over 1,200%.
This is why they say “Buy it like Buffett!”
4. REIT Funds (ETFs or Mutual Funds):
Real estate investment trusts (REITs) are companies that own and operate income-producing real estate such as office buildings, retail space, warehouses, and apartments.
REITs offer the benefits of diversification and professional management, making them a good option for many investors. In addition, REITs are required by law to distribute at least 90% of their taxable income to shareholders in the form of dividends, making them an attractive choice for income-seeking investors.
Like other types of investments, REITs can be purchased individually or through an ETF or mutual fund. They can also be purchased as individual stocks. Here are a few example of popular REITs: Realty Income Corp (O), Duke Realty Corp (DUK), Annaly Capital Management Inc. (NLY).
5. Stock Index Funds
Stock index funds are a type of mutual fund that tracks a specific market index, such as the S&P 500 Index.
Index funds offer the benefits of diversification and professional management, making them a good option for many investors. In addition, they tend to have lower costs than actively-managed mutual funds.
Index funds can either be purchased as mutual funds or ETFs. Vanguard is a popular provider of index mutual funds and ETFs. Another option is Fidelity Investments, which offers a wide variety of index funds and ETFs.
The largest index fund is the SPDR S&P 500 ETF (SPY), which tracks the S&P 500 Index. Vanguard’s largest index fund is the Vanguard S&P 500 Index Fund (VOO).
You can purchase both of these through any online broker such as Robinhood or M1 Finance.
6. Floating-Rate Loans
A floating-rate loan is a type of loan that has a variable interest rate, which means that it will fluctuate in response to changes in the market interest rates.
Floating-rate loans are often used by borrowers who are expecting interest rates to rise in the future. In addition, they offer the benefit of being less affected by inflation than fixed-rate loans.
One downside of floating-rate loans is that they tend to have higher interest rates than fixed-rate loans. In addition, they may be subject to prepayment penalties if the borrower decides to pay off the loan early.
One floating-rate loan ETF is the Invesco Senior Loan ETF (BKLN). This ETF tracks an index of senior floating-rate loans.
Another option is the iShares Floating Rate Bond ETF (FLOT), which invests in a variety of different types of floating-rate bonds.
These are just two examples of ETFs that invest in floating-rate loans. There are many others available, so be sure to do your research before investing.
7. Inflation-linked bonds (Series I bonds):
Inflation-linked bonds, also known as Series I bonds, are a type of bond that is designed to protect investors from the effects of inflation.
I bonds have a fixed interest rate plus an adjustable rate that is linked to the CPI (Consumer Price Index). The adjustable rate portion of the I bond’s interest rate is reset every six months, which means that the bond’s interest payments will increase or decrease in response to changes in the CPI.
I bonds are a good option for investors who are looking for a way to protect their portfolios from inflation. In addition, they offer the benefit of being backed by the full faith and credit of the US government.
With the surge in inflation Bonds have soared in popularity. Currently, I bonds are paying rates as high as 9.62% and can be purchased directly from the US Treasury at TreasuryDirect.gov.
Invesco offers the Inflation-Protected Bond ETF (IPE), which invests in a variety of different types of inflation-linked bonds.
Another option is the iShares TIPS Bond ETF (TIP), which also invests in a variety of different types of inflation-linked bonds.
Cryptocurrency is a type of digital asset that uses cryptography to secure its transactions and to control the creation of new units.
Cryptocurrencies are decentralized, which means that they are not subject to government or financial institution control. In addition, they are often used as an investment, as they have the potential to appreciate in value.
Cryptocurrency is newer to the scene so the jury is still out whether they are a true inflation hedge to combat rising interest rates and a volatile stock market. But many Bitcoin maximalists believe fiats allow too much price manipulation from big governments and Bitcoin will be the only digital currency needed in the future.
That’s why Bitcoin is the most well-known cryptocurrency, but there are many others, such as Ethereum, Litecoin, and Ripple.
Another form of cryptocurrency are NFT’s. NFT’s are digital assets that are stored on a blockchain and can represent anything from a piece of art to a baseball card.
Cryptocurrencies are a good option for investors who are looking for an alternative to traditional investments. In addition, they offer the benefit of being relatively new, which means that there is still potential for them to grow in value.
In addition, their prices can be volatile, so you could lose money if you invest in them.
Investors who are interested in investing in cryptocurrency should do their research before investing and only invest what they are willing to lose.
“The best investment you can make is in yourself.”
Warren speaks truth here. In order to make sound investment decisions, you need to have a firm understanding of your own finances and risk tolerance.
You also need to be honest with yourself about your goals and what you are trying to achieve with your investments and your career.
It’s also a good time to be honest with yourself about your career and your lifetime goals.
- Are you satisfied with your career?
- Do you see yourself doing the exact same thing 10 years from now?
- Are you fulfilled in your current role?
- Is there anything you’ve been putting off for “another day”?
These are tough questions to answer and may help you determine if you need a change. A few ways you can invest in yourself are:
- Taking courses or getting a certification in something you’re interested in
- Taking the time to network and build relationships with people in your industry or field
- Working on developing new skills that can help you in your career
- Investing in your health by eating well, exercising, and getting enough sleep
Earlier in my career as a financial planner I invested in obtaining the CFP (certified financial planner) certification. It was notable investment of money and time but the return has been extremely beneficial to my career.
No matter what you decide, investing in yourself is one of the best investments you can make.
The Bottom Line
There are many different types of investments that can be used to hedge against inflation. Inflation-protected bonds, commodities, and real estate are just a few examples.
Investors should consider their individual needs and goals when choosing an investment. In addition, they should remember that all investments come with risk, so they should only invest what they are willing to lose. | <urn:uuid:768d33c9-e30d-4681-b987-b24cb9da3dd2> | CC-MAIN-2022-33 | https://fintechaccelerate.com/9-best-investments-to-make-a-profit-during-inflation/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00405.warc.gz | en | 0.956092 | 3,587 | 2.71875 | 3 |
Baruch Shem kevod Malchuso is a praise that doesn’t appear in the written Torah but its source is rooted in this week’s parasha. What is the source and its importance? Why do we whisper it all year after the Shema, but say it out loud on Yom Kippur? And how should we mention it on other occasions, such as at the Yom Kippur Katan services, recited on Erev Rosh Chodesh, — must it also be whispered then? What should one do if he skipped it by mistake?
This praise is mentioned in halacha as a remedy for mistakenly mentioning G-d’s Holy Name. How does it rectify the mistake? Is there any difference between mistaken mention of G-d’s Name and an unnecessary blessing? And how should it be recited then — out loud, or whispered?
In the Beis Hamikdash (may it be rebuilt, speedily in our times!) this verse takes the place of Amen. Why is that?
Of this and more, in the coming article.
Sources for Reciting Baruch Sheim
In this week’s parasha we read: “And Yaakov called his sons and said, ‘Gather and I will tell you what will befall you at the end of days’” (Bereshis 49:1). While Yaakov apparently wanted to reveal to his children the course of future history, he went on to chastise three of them, then blessed the rest. No secret of history appears in any later psukim. Why did Yaakov change his plans?
The Gemara in Maseches Psachim describes the conversation that took place on that fateful day:
Rabbi Shimon ben Lakish says: “And Yaakov called his sons and said, ‘Gather and I will tell you.’” Yaakov wanted to reveal to them when the End of Days will be – when the Moshiach would come, but the Divine presence left him.
This departure of the Divine presence frightened Yaakov, and he asked: “Perhaps the reason this happened, was because there is an imperfection amongst my offspring just as Avraham had Yishmael, and Yitzchak had Eisav.”
To allay his fear, his children responded: “Hear O Yisrael, the L‑rd is our G‑d, the L‑rd is one” (Devarim 6:4). Just as you have only one G‑d in your heart, so too we have only one G‑d in our heart.”
At that time Yaakov said, “Baruch Sheim kevod malchuso leolam va’ed — Blessed be the Name of the glory of His kingdom forever and ever.”
The Sages were in a quandary: “Should we recite this as a part of the Shema prayer? But Moshe did not record it in the Torah. But how could we not say it if Yaakov said it?”
They therefore established that the line should be whispered quietly.
The Shulchan Aruch (Orech Chaim 61:13) rules that after reciting the Shema one should say “Baruch Sheim” quietly as per the above-mentioned Gemara. The poskim dispute the rationale for this ruling:
The Tzlach (Psachim 56a) understands that the reason for whispering is to differentiate between those verses that are recorded in the Torah and the praise that is not mentioned in the Torah. The Mishna Brura follows this opinion (Orech Chaim 61:30).
Rabbi Shlomo Kluger (Chochmas Shlomo, Orech Chaim 61:13) understands it differently. In his opinion the reason this verse is whispered is because it is a praise that belongs to the heavenly angels, which we have no right to pronounce. This is the reason Moshe Rabbenu didn’t record it in the written Torah. But since Yaakov Avinu said it, we recite is quietly.
The Arizal writes (Sha’ar HAyichudim 4:5b) that it is whispered because reciting it aloud can cause spiritual harm due to its holiness.
These diverse explanations result in various differences in halacha, as we shall see.
The Shulchan Aruch (619:2) rules that on Yom Kippur this praise should be recited aloud. The source for this ruling is the Midrash (Devarim Raba, Va’etchanon 2:37):
When Moshe went to Heaven to receive the Torah from G‑d, he overheard the angels praising G‑d: “Blessed be the name of the glory of His kingdom forever and ever.” After hearing it, he brought it to the Jews below. Since this praise belongs to the angels, it is recited in secret. And why?
Rabbi Assi says: “It is as if someone took jewlery from the king’s palace and gave it to his wife. He told her, ‘Do not wear this out in public, only in the house.’ So too, this praise that was taken from the angels, from G‑d’s palace, we do not say out loud. However, on Yom Kippur we are like angels, and we say it out loud in public.”
And where did Yaakov learn this praise? The Tashbetz (volume II, chapter 236) explains that Yaakov heard it from the angels in his dream of the ladder.
Rabbi Shlomo Kluger proves from the difference on Yom Kippur that his reason for whispering Baruch Sheim is the primary one. Otherwise, why would Yom Kippur be any different?
According to the Tzlach, though, (and by extension, the Mishna Brura) we can explain that the year-round whispered recitation is to provide clear indication that this verse is not part of the written Torah. Once that is established, we can recite it aloud on Yom Kippur because on that day we are similar to angels and praising Hashem with praises that belong to them is then possible.
Baruch Sheim is recited on various other occasions, such as at the culmination of the Yom Kippur Katan services on Erev Rosh Chodesh, when the Shema is recited followed by a 3-times Baruch Shem response. The Tzlach (Psachim 56a) writes that it is customarily recited aloud on these occasions. Some differ on this, maintaining it should be whispered here as well (which is the custom in several communities today). The Tzlach explains that it depends on the above dispute regarding the reason it is recited quietly: If it is in order to differentiate between a prayer from the Torah and one that is not, when not reciting the full Shema there is no concern one might mistakenly think it is part of the written Torah, and there should be no problem reciting it out loud. However, according to the approach of Rabbi Shlomo Kluger, since the reason is in order to avoid arousing the ire of the heavenly angels, it should always be whispered, even when recited after the poem “Ana bekoach” or in order to remedy an unnecessary blessing.
The Ben Ish Chai writes (Torah Lishma 196) that Baruch Shem must only be whispered when recited as part of the Shema because in reciting the Shema one brings upon himself a special light, and the loud and silent portions must be in the correct sequence. However, in the course of Torah study, there is no problem reciting this verse out loud.
Whereas the Ben Ish Chai states quite clearly the proper way to recite Baruch Shem in the Shema and during Torah study, he does not rule how to recite it in other prayers.
Amen Yehei Shmei Raba
The Maharsham (volume V, chapter 9) quotes the Targum Yerushalmi (Bereshis 49:1) in explaining that when Yaakov’s twelve sons said the Shema, the words he actually answered were: “Yehei Shmei Raba mevorach l’olam u’lolmei olmaya, which we say in Kaddish.” The Maharsham explains that the words Yehi shmei raba which we recite in Kaddish are actually an Aramaic translation of Baruch Sheim. Since the Kaddish is in Aramaic which the angels don’t understand, their jealousy isn’t aroused when we recite it out loud in Kaddish. But when the words are recited in Lashon Hakodesh as we do in Shema they must be whispered.
Out of Sequence
The Bach (Orech Chaim 61) is of the opinion that skipping this praise does not invalidate the entire prayer, and one who skipped it still performed the mitzva of reciting the Shema. However, the Levush (Orech Chaim 61) maintains that not only does a skipped Baruch Shem invalidate the Shema, even lack of proper full intention also renders the prayer invalid. The Mishna Brura (61:29) mentions a dispute on the matter, but in the Biur Halacha rules that it is not crucial.
Rectifying Unnecessary Blessing
The Talmud Yerushalmi (Brachos 6:1) writes that one who recited an unnecessary blessing must rectify it by reciting “Baruch Sheim” so that Hashem’s Name should not be mentioned in vain.
This rectification appears in the Tosefos (Brachos 39a); Rambam (Brachos 4:10); and Shulchan Aruch (Orech Chaim 206:6): whenever Hashem’s Name was mentioned by mistake, either in blessing or otherwise, Baruch Sheim should be said to make amends for it.
Praise In Place of Error
The Rambam (Shvuos 12:11) writes that one may not mention G-d’s Name in vain – i.e., for no valid reason. One who did so by mistake must quickly offer praise so His mention should not be in vain. The Rambam mentions, for example, if one mentioned Hashem’s Name by mistake, he should add the praise “Baruch Sheim” or “Gadol Hu u’mehulal me’od – Great is He and Praised extensively.” Once this praise is uttered, it rectifies the needless mention. The Kesef Mishne and Radvaz both identify the Yerushalmi as the source for this ruling. This apparently indicates that any utterance of praise is acceptable, not only Baruch Sheim. Other poskim seem to indicate, though, that only Baruch Sheim is adequate.
The Mabit (Kiryat Sefer, Shvuos 12:11) explains how this works: the pasuk (Devarim 32:3) reads: “When I call out the name of the Lord, ascribe greatness to our G-d.” This pasuk teaches us that following every mention of G-d’s Name we must add praise of Him. This was the accepted practice in the Mikdash – following every blessing recited in the Mikdash, the audience would respond: “Baruch Sheim Kevod malchuso l’olam vo’ed.”
Mention of G-d’s Name in vain constitutes a grave sin of Chilul Hashem – desecrating G-d’s Name. One can only correct this by making a Kiddush Hashem – sanctifying His Name. This, explains the Panim Meiros (volume III, chapter 9), occurs when one says Baruch Sheim, a praise that completely corrects the sin of mentioning G-d’s Name in vain.
The Chazon Ish (Orech Chaim 137:6) explains that there is actually no prohibition involved in thanking Hashem with the full Name, whether in the proscribed prayer formulae or in any other language. Therefore, one who mentioned G-d’s Name by mistake can continue with words of praise, in which case his mention of G-d is part of His praise. It is of no consequence if the praise begins with G-d’s Name or ends with it.
The Chida (Nachal Kedumim, Kedoshim) follows the Zohar’s approach (Yisro 91b) to explain how Baruch Sheim corrects a mistaken mention of G-d’s Name. When Hashem created the world, He carved His Name on a stone and placed it upon the mouth of the depth [Tehom]. This Name prevents the waters from rising up and flooding the world. When one takes G-d’s Name in vain in a false oath, he degrades this Name and the letters of the holy Name depart. As a result, the waters well up and threaten to flood the world. There is a special angel in charge of the seventy keys to G-d’s Name whose job is to replace the Name in the correct spot. The Chida, based on Rabbi Avraham Yehoshua Heschel of Krakow, explains the connection between this angel and the praise of Baruch Sheim. Therefore, by mentioning this praise, the ministering angel receives the energy to do his job properly and rectify the damage that resulted from the unwarranted mention of Hashem’s Name.
The Imrei Emes (Parasha Va’eira) explains that in the future we will understand that nothing was in vain and the concept of Baruch Sheim will be clear to all, because there will be nothing else in the world but Hashem’s Lordship.
Correction or Atonement
The Klausenberger Rebbe (Divrei Yatziv, Orech Chaim 83:4-6) understands that the Yerushalmi and Rambam maintain that praising Hashem with Baruch Sheim corrects everything damaged by the unnecessary blessing. However, he understands that the Shulchan Aruch maintains that further atonement remains necessary.
Delaying Baruch Sheim
Another difference between the approaches leads to a difference in timing. If Bruch Sheim atones for an unnecessary blessing, it does so whether it is recited immediately after the unnecessary blessing or much later. However, if it fixes the damage by using the mention of Hashem in order to praise it, it must be uttered immediately.
The Achronim are split on this: the Eshel Avraham (Orech Chaim 25:4) maintains that reciting it immediately is praiseworthy but not obligatory, while the Minchas Yitzchak (volume VII chapter 7) maintains that the correction must happen immediately for it to be effective.
What’s wrong with reciting an unnecessary blessing? The Chazon Ish explains that while there is no Torah prohibition involved in randomly reciting the blessing for bread even when not eating bread, i.e. – praising Hashem for giving us bread, since the sages instituted these blessings and instructed us not to recite them without partaking of the object of the blessing, we must not recite them at random. This is to impart fear of Heaven in us by refraining from uttering them outside of Chazal’s directives.
Therefore, he asks, how does reciting Baruch Sheim help correct the rabbinic prohibition of only offering praise at Chazal-appointed times?
He answers that the sages instituted reciting Baruch Sheim after an unnecessary blessing to indicate that an unnecessary blessing is like taking Hashem’s Name in vain. And according to the approaches that see Baruch Sheim as correcting damages, this sin, too, is corrected.
To complete this discussion, we should add several further comments:
The Shulchan Aruch rules (Orech Chaim 206:6) that one who began the first three words of a blessing (“Baruch ata Hashem”) and then loses the object of blessing (it fell from his hands or he is otherwise unable to partake of it,) should say Lamdeni chukecha (“teach me Your statutes”) which is a complete pasuk: “Blessed are You, O Lord; teach me Your statutes” (Tehilim 119:12) so as his mention of the Name will be part of Torah study. This is preferable to reciting Baruch Sheim.
One who mistakenly continued the blessing until the word Elokeinu can continue koras imanu bris b’chorev as in the pasuk (Devarim 5:2): “The Lord our G-d made a covenant with us in Chorev.” | <urn:uuid:41135816-9a58-4068-b302-0f2eb9e8504e> | CC-MAIN-2022-33 | https://dinonline.org/2021/12/17/baruch-sheim/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00001.warc.gz | en | 0.932635 | 3,678 | 2.59375 | 3 |
Are American women achieving their full potential as educated participants in the job market? By some measures, the answer is increasingly “yes.” For example, the number of male and female undergraduate degree holders is now roughly equal, and the number of college-educated women in the job market has just recently surpassed the number of college-educated male workers. However, when it comes to degrees and jobs in the fields of science, technology, engineering, or mathematics (collectively known as STEM), the numbers for women in STEM tell a different story. As of 2015, women in STEM statistics from the Federal government indicate that women earn just 3 out of every 10 undergraduate STEM degrees, and in the job market, women hold fewer than 1 in 4 jobs in STEM professions. We’ll take a look at some of the underlying reasons for this inequality and why it’s important to encourage more women in STEM.
New Interactive Charts from the U.S. Census Make it Easy to Visualize Women in Stem Statistics
Thanks to some very elegant charts created by the U.S. Census Bureau, it’s easier than ever to understand the relationships between undergraduate degrees obtained by men and women and the type of occupations they pursue in their careers. This quick video gives you a clear idea of how these interactive charts work:
Where Do College Graduates Work
Now let’s take a closer look at these interactive charts. (You can find them here on the U.S. Census Website.)
Female STEM Major Graduates and their Corresponding Careers
In the static screenshot above, we selected Women graduates with STEM degrees; their top college majors are Social Sciences, followed by Psychology, and then by a group consisting of majors in the fields of Biological, Environmental, and Agricultural Sciences.
(Tip: to see the numerical data in Excel format, visit the live chart on the U.S. Census web page and use the link found below the live chart.)
Now let’s change our criteria by selecting Men with STEM Majors.
Male STEM Major Graduates and their Corresponding Careers
Once you set the criteria to men holding a STEM degree, what jumps out at you is the large upside-down yellow arc that connects engineering majors on the left to engineering careers on the right. This arc represents the large pipeline of male engineering graduates who take engineering jobs.
While around half of these male graduates end up working in non-STEM careers (as indicated by the grayed-out lines), men still far outnumber women in obtaining both engineering degrees and engineering jobs. (Indeed, women hold only 14% of engineering positions, according to the Census Bureau.)
Why Aren’t There More Women Working in STEM Occupations?
When it comes to understanding why the number of women in STEM occupations falls short, particularly in the fields of engineering and computer science, the charts above give us one important clue: the pipeline for STEM undergraduates is skewed toward men.
That means to achieve greater equality in the workplace, it will be necessary to recruit more women to pursue STEM degrees — as well as ensuring these women graduates actually make it all the way to being hired in a STEM career. (As you can see from the charts above, quite a few women with STEM degrees are electing to pursue careers in non-STEM fields, such as healthcare.)
More and more programs are now encouraging and mentoring young girls to learn about the possibility of pursuing successful and rewarding STEM careers — ranging from the Girl Scouts (who recently introduced a STEM Merit Badge) to numerous summer camp programs designed to teach young girls how to code.
Tip: STEMConnector is a useful website for finding news about STEM initiatives and resources in your area of the country.
Overcoming Biases against Women in STEM
Efforts that encourage women to pursue careers in STEM fields haven’t been able to erase some of the long-standing stereotypes and biases facing women who choose to pursue work in high-tech careers.
For example, a recent study at the University of Colorado at Boulder identified a pattern of bias against women who have longer hair or finer facial features — just by looking at photos, a large number of study participants tended to incorrectly assume that those women in the photographs were primary school teachers rather than scientists.
Other biases that women working in STEM can encounter include what’s now commonly known as “Mansplaining” and its related condition, “He-Peating.”
Video of a Virtual Reality Training Session which Illustrates a Real World Example of Mansplaining in an Office Meeting
If you are not up to speed on the current terminology, mansplaining is the unfortunate but very real tendency of certain men to provide unnecessarily condescending explanations to female colleagues. He-peating refers to situations where a man repeats an idea or suggestion made by a woman, such as during a meeting. While the woman’s original suggestion was ignored or dismissed, the group embraces the idea when it’s repeated by a man, who gladly takes credit for the idea.
Women who are (or plan to be) parents also face discrimination in the job hiring and promotions process that their male colleagues do not. In order to better understand how and why this happens, Stanford University Sociology Professor Shelley J. Correll conducted a study where two identically qualified candidates were presented to test subjects taking on the role of “hiring managers.” After the hiring managers selected two equally qualified candidates from a pool of applicants, researchers alerted them that one of the candidates was, in fact, a parent. In the study, the hiring managers didn’t change their opinion about the candidate if he was a male parent. However, if the job candidate was female, the hiring managers preferred to select the other, non-parent candidate — and they were only willing to consider hiring the female parent candidate when the starting salary was reduced by an average of $11,000.
Despite the biases against working mothers, many women continue to pursue a professional career. However, quite a few also decide to voluntarily exit the career track as they reach their late 30s and 40s (an age which would be considered ‘mid-career’ amongst men). Researcher Pamela Stone has investigated this “mommy track” phenomenon and has dispelled many of the myths commonly associated with professional women electing to “opt out” of the workforce well before retirement age. From Stone’s analysis, it’s clear that much work needs to be done to achieve a greater life/work balance in the workplace, including making part-time work and job sharing a more socially acceptable practice, so that so that women can pursue fulfilling, life-long professional careers.
Finally, we must address the issue of sexual harassment and sexual assault in the workplace. During the past year, the growing “#MeToo” movement has shone a light on shocking, high-profile cases of men in politics and media who have used their positions of power and influence to sexually harass and abuse women. As more and more women have come forward to tell their stories, one can only hope that we, as a society, can work together to build a more honorable and respectful environment for women in the workplace.
Why We need more Women in STEM Occupations
Take a look at the chart below which illustrates the changing nature of the STEM job market since 1970. (Source: U.S. Census)
As you can see, the top two STEM careers (as ranked by the number of positions in the job market) are engineering and computing. Both of these careers are prestigious, well paid (the median annual income of engineering jobs is $92,900), and offer lots of opportunities for growth and advancement. The number of computing jobs is growing the fastest; it became the largest STEM job category just before the year 2000.
Yet, despite the high salaries and prestige associated with these careers, these are the very STEM fields where participation by women is particularly low. For women to enjoy the same economic opportunities and prestige status as men, it’s important that they are given an equal shot at these STEM career opportunities.
But what if you don’t believe in the need for equal opportunity as a stand-alone goal? Are there other reasons you might want more women to work in STEM occupations?
One important reason we need more women in STEM fields is to tackle the overall shortage of talented, high-tech workers, an issue that is projected to become direr as an ever-increasing number of Baby Boomer workers retire. Excluding half of the potential candidates just doesn’t make any sense.
Many businesses believe that a diverse workplace also leads to better decisions, and ultimately, higher profits. According to survey results published in a Peterson Institute for International Economics working paper, companies with 30% or more women in C-Suite leadership roles are more profitable, earning up to 15% higher net income on average.
Ethics might provide another important reason. Researchers Kennedy and Kray studied the behavior of both men and women in two different scenarios; one using workers recruited by Amazon’s Mechanical Turk Service, and another using male and female college students. In both cases, women were more likely to flag ethically questionable decisions. For those companies who have been found guilty of putting profit ahead of principles, such as the Volkswagen Group (whose engineers sought to defeat smog testing devices with illegal software), having more women engineers and computer scientists on staff might have helped them avoid the damage to their employers’ reputation, as well as massive fines and now jail sentences being meted out to their male colleagues.
We’re curious to hear your point of view.
We’ll be revisiting this topic of women working in STEM again in January as we investigate specific ways that industry groups and foundations are encouraging young women to consider STEM careers, as well as identifying the current best practices used by corporations to recruit (and retain) female STEM graduates in technical careers. So stay tuned!
At Formaspace, Our Goal is to Help You Be Successful — in the Laboratory, in Education, in Business, and in Your Career
We’re proud to help our customers be successful in their chosen career. And we’re also proud to hire STEM graduates to work here at Formaspace. (67% of all Formaspace hires in the past 12 months were females, and 37% of those female employees either came from STEM backgrounds or currently have a STEM role.) It’s part of our Formaspace company values to build a broad-based, inclusive culture that’s welcoming to both men and women, as well as those with diverse backgrounds and nationalities.
Whether you work for a large Fortune 500 company, an educational facility, private laboratory, or scrappy startup, Formaspace can help you work better, smarter, and more efficiently thanks to our full line of ergonomic furniture solutions.
Get the conversation started today.
Take the next step and fill out our quick contact form below. | <urn:uuid:1b0dbdd7-3c3a-4338-841e-60a24b38d0fe> | CC-MAIN-2022-33 | https://formaspace.com/articles/tech-lab/need-more-women-in-stem-jobs/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00003.warc.gz | en | 0.962354 | 2,267 | 2.953125 | 3 |
Most athletes are very well aware of how valuable nutrition is to enhance their performance and smash their own personal records. A healthy diet combined with proper and safe training is the foundation for achieving fitness success, but sometimes the body needs that extra oomph to keep stamina, energy, and mental focus running at an optimal level. This is why the world’s best runners turn to supplements. In order to supply their bodies with an adequate supply of antioxidants, vitamins, and minerals. Athletes are also turning to nutritional pills to help alleviate some of the strain that intensive exercise puts on the bones, joints, and muscles.
If you are planning on becoming the next Usain Bolt, these are a few endurance and recovery supplements to invest in.
Nutrition Is Crucial
Before diving into the ultimate performance supplements, it is important to know that proper nutrition and diet supersedes any form of capsule. Whether you are training for an 18-mile marathon or just like to casually jog around the neighborhood for fun, you won’t make it very far without a balanced diet.
According to the Dietary Guidelines for Americans, for any athlete to perform their best physically they require a sufficient supply of fluids, calories, carbohydrates, protein, fats, vitamins, and minerals.
- Carbohydrates: roughly 1.4 to 4.5 g/lb bodyweight
- Protein: roughly 0.55 to 0.9 g/lb bodyweight
- Fat: roughly 20% to 35% of total calories
These figures are not set in stone, the ratios also depend on your work out schedule and how intensive your training is. Individuals who follow high volume to moderate training schedules up to 3 hours a day 6 days a week will require a higher intake of protein and carbohydrates. Roughly 55 to 65% of your diet should be made up of unrefined carbohydrates to replace glycogen in the liver and muscles and to maintain healthy blood glucose levels.
As for vitamins and minerals, research reveals that a vitamin deficiency can have a negative impact on performance. Anything less than a third of the recommended daily allowance (RDA) of essential B and C vitamins may lead to a notable drop in VO2 max (oxygen consumption) and anaerobic threshold (when the body switches from aerobic to anaerobic metabolism during exercise) within as little as four weeks. Fortunately, supplements can help runners bridge the nutrient gap.
If you prefer a low carb high-fat approach such as the keto diet, don’t worry, your nutritional needs have not been forgotten. There are two variations of the keto diet that have been specifically formulated to meet your carbohydrate needs during and after intensive workouts. For the average athlete, the targeted keto diet allows for 20 to 30 grams of carbs up to an hour before workouts. Those who train more extensively will benefit from following the cyclical ketogenic diet, which allows for 1 or 2 days of much higher carbohydrate consumption.
Vitamin Supplements For Runners
While diet is essential for any type of athletic activity, sometimes it is difficult to get all the nutrients and vitamins we require through diet alone. For example, if you are following a meat-free lifestyle, it may be difficult to get all the protein your body requires every day to build the muscle you want. This is where supplements come in handy. They are by no means a magic potion to get you on the international Olympic Team in less than a month, but rather a tool that can be used to boost your energy levels, performance, and overall health. These are a few recommendations of holistic and natural supplements that can up your game and help you recover post-workout.
Iron is a crucial component in the production of hemoglobin. If our bodies do not have an adequate supply of iron, they can’t make enough red blood cells, which transports oxygen from the lungs to the rest of our body. This is a crucial nutrient for runners as it may help to improve VO2 max levels, which ultimately helps to boost overall athletic performance.
Roughly 10 million people in the United States are iron deficient meaning that it is a fairly common nutrient we are lacking in our diets. The common causes of this deficiency could be due to the following reasons:
- Heavy or prolonged menstrual periods
- Peptic ulcers
- Blood loss from blood donations or trauma
- You are on medications that deplete iron
While females are more susceptible to developing a deficiency due to monthly bleeding, studies suggest that runners, in general, may also be susceptible to an iron deficiency. The exact reason behind this theory is not clear but research suggests that it may have something to do with excessive sweating over a long period of time. If you have noticed that you are not as fast as you used to be in previous races, feel like you are short of breath, or experience dizzy spells, it might be time to up your iron intake. Schedule an appointment with your health care provider before taking iron supplements to determine the correct dosage first.
Moringa Oleifera has been labeled the superfood of our era and is another supplement runners should have in their arsenal. The Moringa or Drumstick tree is native to the Himalayas and is harvested for its numerous nutritional and medicinal properties. To give you an idea of just how super this food is, here is a glance at the plant’s nutritional value:
- Vitamin A – 16.3 mg
- Vitamin B1 – 2.6 mg
- Vitamin B2 – 20.5 mg
- Vitamin B3 – 8.2 mg
- Vitamin C – 17.3 mg
- Vitamin E – 113.0 mg
- Calcium – 2003 mg
- Iron – 28.2 mg
- Magnesium – 368 mg
- Potassium – 1324 mg
- Protein – 27.1 g
Just to put this into perspective, Moringa contains 15 times more potassium than what bananas provide and 10 times more vitamin A than what carrots provide.
Benefits of Moringa Supplements For Athletes
One of the many reasons why moringa is a helpful supplement for most athletes is because of its protein content. The leaf alone contains approximately 30% of various types of proteins which are essential for building muscle. This is especially beneficial for those who follow a vegetarian or vegan lifestyle. Plants tend to be a healthier source of protein because they have a higher nutrient and fiber content and do not contain as many calories as meat products.
The moringa plant also contains potent anti-fatigue properties. Research has found that the moringa plant shows promising results for reducing fatigue during physical activity by elevating hemoglobin levels and reducing lactic acid, urea, and triglyceride levels. The study also showed that moringa boosted glycogen reserves by increasing the mobilization of fatty acids, which in turn, provides more fuel for the body during vigorous workouts.
Other than building muscle and keeping you awake during a marathon, the moringa plant contains powerful anti-inflammatory and antioxidant properties that help to alleviate muscle soreness and reduce oxidative stress. Thanks to the high levels of potassium, the moringa plant also helps to replenish electrolyte levels, which helps to stave off dehydration while running.
By taking a supplement that contains a concentrated 4:1 ratio of pure moringa oleifera like Moringa MD, you can improve your overall performance and replenish your body with the vital vitamins and minerals it needs to function optimally.
Performance And Recovery Supplements For Runners
Nitric oxide (NO) is one of the most popular athletic support supplements circulating the market today. Nitric oxide is naturally produced by the body and is involved in multiple cell actions and pathological processes. It is vital for cell signaling and the onset of vasodilation – the relaxing of the inner muscles in the blood vessels causing them to widen. This specific function helps to lower blood pressure and increase blood flow, which is why many runners are turning to this supplement.
Benefits of Nitric Oxide Supplements For Runners
Nitric oxide supplements don’t actually contain the natural gas, instead, they are usually formulated with L-citrulline and L-arginine depending on the manufacturer. Both these ingredients are precursors of nitric oxide and can benefit your work out and overall health in many ways.
L-arginine is a nonessential amino acid that helps to build muscle. Much like naturally occurring NO, L-arginine dilates the blood vessels. The wider the blood vessels, the more nutrients and oxygen are delivered to working muscles during strenuous workouts. Other than enhancing physical performance, studies reveal that L-arginine may decrease symptoms associated with Angina and improve the quality of life for those who suffer from this type of chest pain. Angina is a mild to severe form of chest pain that is caused by a reduced flow of blood to the heart. Some research also suggests that this nonessential amino acid may help lower blood pressure in individuals who suffer from hypertension and increase sexual function in men who suffer from erectile dysfunction.
The second beneficial ingredient in these athletic supplements is L-citrulline. L-citrulline is also a nonessential amino acid and performs similar functions to L-arginine by boosting NO production, but it also helps to relieve muscle pain after physical activity. Studies suggest that citrulline malate, a form of L-citrulline, helps to increase nutrient delivery and eliminate waste products in the body such as ammonia and lactate, which are both related to muscle fatigue.
As we mentioned before, nitric oxide is a very popular performance supplement, however, if you are planning on taking them, it is important to look for a brand that has a well-rounded formula. L-citrulline and L-arginine are great ingredients but in order to boost your performance to the max, we suggest looking into supplements like Nitric Oxide MD, which has other nitrate supporting ingredients such as:
- Beetroot Extract – contains nitrates and important nutrients to enhance performance during workouts.
- Pine Bark Extract (Pycnogenol) – a potent vasodilator that increases the delivery of blood, nutrients, and oxygen to working muscles.
- Quercetin – A powerful antioxidant that helps to increase nitric oxide and energy production.
- Fenugreek Extract – helps to regulate hormone, glucose, and cholesterol levels.
- Eurycoma Longifolia Extract – enhances testosterone and has a positive impact on male libido.
- Avena Sativa – contains various amino acids, sterols, flavonoids, and saponins to help build muscle strength and boost testosterone levels.
- Tribulus Terrestris – helps to elevate endurance and strength during workouts. It also helps to restore the body during periods of rest.
Omega-3 Fish Oil
Whether you run, lift weights, practice yoga, or just walk around the block once a week, we all need omega-3 in order for our bodies to perform key functions. Omega-3 is an essential fatty acid, which means that the body can not produce it on its own and must obtain it from external sources. There are two different types of omega 3 fatty acids that can be sourced from our diets.
- Alpha-linolenic acid (ALA), which is derived from plant-based foods such as nuts and seeds.
- Eicosapentaenoic acid (EPA) and Docosahexaenoic acid (DHA), which are derived from oily fish like salmon, mackerel, and tuna.
While both types of omega-3 are beneficial to our health, EPA and DHA are essential for regulating cell activity and cardiovascular function. But this is not the only thing that these long-chain essential fatty acids are famous for. EPA and DHA help lower chronic inflammation and reduces lactic build up in the body, which most runners can agree is something they all need in their arsenal.
Benefits of Omega-3 Supplements For Athletes
When we run or train excessively, microscopic tears start to form in the muscles. During periods of rest post work out, these tiny tears start to repair, which ultimately causes muscles to strengthen. However, if the muscle tears have not healed properly, it could lead to further injury during the next workout session. Marine sourced omega-3 can help offset discomfort or inflammation by blocking the body’s natural inflammatory response and also helps the muscles to recover more efficiently.
One study has shown that marine sourced omega-3 fatty acids may increase fat oxidation and decrease carbohydrate oxidation during strenuous exercise sessions. This means that participants in the study burned fat during the exercise session without depleting the body of the carbohydrates (fuel) it needed to perform the activity, a very promising finding for multisport athletes. If you are looking for more endurance, less soreness in the muscles, and a faster recovery, omega-3 supplements are perfect for you.
We suggest opting for a supplement like Omega-3 MD because it does not contain any preservatives, unknown blends and only contains 100% pharmaceutical grade deep ocean Eicosapentaenoic and Docosahexaenoic acid.
Glucosamine, Chondroitin, and MSM
Your speed and agility will only go as far as your joints will take you, and when they are sore and inflamed this can put a serious damper on your performance. While it is a known fact that running strengthens the bones and muscles, depending on your age, height, running shoes, or weight, it can make you susceptible to joint injury or runners knee (chondromalacia). This is the most reported injury among the athletic community and is usually caused by ongoing strenuous contact between the kneecap or patella and the femur. This usually causes pain and discomfort behind the patella. Another condition most seasoned athletes may experience is a torn meniscus. As you age, the cartilage that acts as a buffer between the tibia and femur gets weaker or thinner, making it more susceptible to injury and damage.
In order to prevent joints and cartilage from wearing out over time, runners are turning to supplements that contain glucosamine, chondroitin, and MSM.
Benefits of Glucosamine, Chondroitin and MSM Supplements For Athletes
Glucosamine is an amino sugar that is naturally found in both animal and human tissues. Its main function is to develop and maintain cartilage within the joints. Chondroitin is a gel/jelly forming polysaccharide that plays a role in the construction and lubrication of cartilage and many of its resistant properties. As we age, glucosamine and chondroitin levels start to drop which causes the cartilage to degenerate, leaving bare bones to rub against each other. This can cause a lot of pain and discomfort.
Studies reveal that supplementing with Glucosamine helps to reduce the breakdown of collagen and cartilage in the knees by almost 27% compared to the placebo group that only saw an 8% reduction. Other studies have demonstrated that chondroitin helps to reduce the activity of specific enzymes responsible for the breakdown of collagen in the joints. Put these two ingredients together and it becomes a powerful defense against the wear and tear of tissues in the joints.
MSM or Methylsulfonylmethane, a common ingredient found in natural arthritis medications, is a chemical compound found in most plants, humans, and animals. Some research has found that this sulfur-containing compound causes a significant reduction in inflammation. It has also been found to prevent the breakdown of cartilage, reduce swelling in the joints, reduce lumbar stiffness, and improve the quality of life for those who suffer from joint and back pain.
The efficiency of a supplement always boils down to quality and the ingredients which is why we recommend using a well-rounded formula like Jointprin.
Handy Locker Room Essential For Athletes
Now that you know what to put in your body, it’s time to look at what to put on your body in order to perform your best at the next marathon.
It’s no secret that athletes and runners alike sweat excessively during strenuous exercise sessions. You just have to sweat to be the best and there is no getting around it. Unfortunately, this excessive sweating could lead to nasty fungal infections like athlete’s foot.
Tinea pedis aptly named athlete’s foot is a rash on the feet caused by fungus. This type of fungus thrives in warm, damp, and dark conditions, which is why the shoe makes the perfect environment. Athlete’s foot usually affects the skin between the toes and can spread further if not treated. Common symptoms of athlete’s foot can include:
- Cracked, scaly red skin between the toes
- Burning or itching sensation between the toes
- A rash that starts to ooze when scratched
- Bad foot odor
- Scaling at the bottom of the foot
Undecylenic acid, which is an organic unsaturated fatty acid found in natural anti-fungal formulas is known to effectively control skin infections caused by the Tinea pedis bacteria. Researchers have revealed that undecylenic acid inhibits the growth of candida and alleviate irritated raw skin that accompanies athletes foot.
If you are prone to this kind of skin infection, there are countless OTC formulas available. However, the most efficient formulas will contain a concentration of at least Undecylenic Acid (25% Usp) and supporting anti-fungal ingredients such as Tocopheryl Acetate, aloe barbadensis, camphor, and juglans nigra. We suggest investing in a well-rounded formula such as Athletol.
Smash Your Personal Best!
Whether you are looking to boost your athletic performance or just want to bridge any nutritional gaps, a healthy diet, and high-quality supplements can help you achieve your goals. If you are a marathon runner, weight lifter, or multisport athlete, the natural supplements we have listed in this post can help boost your energy, build muscle, improve blood flow, and get rid of any fungus lurking in your shoes or the locker room. Each individual is different and may require different nutrients to meet their needs. It is always best to speak to your healthcare provider or dietician first to determine which vitamins and nutrients you need to help you smash your own personal best. | <urn:uuid:dcdb0fd1-7980-483c-afca-9a79549c7992> | CC-MAIN-2022-33 | https://approvedscience.com/blog/supplements-for-runners/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00401.warc.gz | en | 0.93969 | 3,837 | 2.625 | 3 |
How To Remove Solder? Circuit boards are the building blocks of any electronic device by providing a surface for attaching various electronic components.
However, in some instances, you may want to remove extra solder from the circuit board. And this is what this article seeks to explore. Fundamentally, it'll help you understand how to remove solder from a motherboard and other crucial information on the process.
- What is Desoldering?
- What Are the Tools Required for the Desoldering process?
- Methods to Remove Solder
- How To Remove Solder From Circuit Boards?
- Removing Solder from Circuit Board Holes
- How To Remove Solder Without Wick?
- How To Remove Solder Without a Soldering Iron
- How To Remove Old Solder
- How To Remove Solder Flux
What is Desoldering?
It is the procedure to remove molten solder and the attached electronic components from a circuit board. The heat-intensive process aims to clear the solder joints from the circuit board.
What Are the Tools Required for the Desoldering process?
A soldering iron is handy in the desoldering process.
The set of tools you require to remove residual solder from the base material includes the following:
- Desoldering bulb
- Removal alloys
- Desoldering braid or desoldering wick
- Desoldering pump
- Heated soldering tweezers
- Removal alloys
- Hot air guns or Heat Guns
- Picks and Tweezers
- Vacuum Pumps and Pressure Pumps
Methods to Remove Solder
A man working with a soldering iron
We've listed the various basic desoldering techniques below.
Braid Method of Desoldering
The specific steps of this process are as follows:
Select the Braid Size.
It's imperative to be vigilant when selecting the desoldering braid size. Primarily, you should use a desoldering braid similar to the solder joint you want to remove. Still, it will be okay if you choose a braid that is a bit wider.
Use a soldering iron.
At this step, drill a hole in the solder joint you're removing to put the braid in the opening. Next, place a soldering iron just above the hole. The solder wick will absorb the heat and transmit it to the joint.
Choose a quality solder braid at all times.
You'll require to have a top-quality solder braid. Otherwise, it won't be effective in soaking heat. Nonetheless, you can still improve the standard of a poor-quality braid by adding some flux to it.
In addition, you may also opt to add some more fresh solder to the joint if it doesn't have enough of it.
Change in color.
After melting the solder joint, you'll oversee a color change (to tin color).
Remove the soldering iron plus braid together.
Next, after melting the molten solder, expel the soldering iron and braid by simultaneously lifting them.
Pump Method of Desoldering
The technique involves using a desoldering pump or a solder sucker to remove minute quantities of melted solder after melting the joints. Given its efficient suction power, you can also use the manual solder vacuum for this procedure.
Also, this method is the most prevalent means of desoldering without necessitating the use of soldering iron. Here are its key steps:
- First, set the solder sucker spring
- Next, heat the soldering iron for about three minutes. Then, place the heated hot iron on the surface you want to remove. You must keep heating the iron until all the solder melts.
- Using the solder sucker, suck the melted solder from the surface.
- Next, cool the solder you've sucked in the above step and discard it in a trash bin.
Iron Method of Desoldering
The desoldering process
It's a similar technique to the pump method, but the desoldering iron, in this case, features a built-in suction component. Hence, to use it, place the preheated iron on the solder joint you're removing. It'll melt the solder, and the solder pump will absorb it.
Heat Gun Desoldering Method
A heat gun
It involves the following steps:
- First, remove the PCB from its enclosure/casing.
- Next, using a heat gun, heat the surface. Also, remember to place the PCB on an inflammable surface.
- After heating the solder, it turns shiny, which means it's melted. Now you can remove it using tweezers or any available picks.
Hot-Air Rework Station Desoldering Method
A High-density rework station
You'll need a hot-air rework station to remove solder via the following key steps:
- Choose the nozzle to use depending on the available components.
- Next, switch on the station to commence the healing process and aim its nozzle at the solder surfaces.
- Also, you may adjust the temperature and airflow to your liking using the designated knobs. Note that you need a temperature higher than the solder's melting point.
- Then, apply flux to the joint and aim the station's nozzle to the area you're intending to desolder.
- Now using a pair of tweezers, pick the melted solder.
- Also, you need to allow the soldering station to cool by cooling it.
- Finally, if the PCB has some water-soluble solder left, wash it.
Compressed Air Desoldering Method
Hot air gun blower
You'll require three things for this process:
- Compressed air
- Protection glasses
Unlike the techniques above, this one requires you to wear protective face gear as it's quite abrasive. Then, heat the soldering iron and the solder joint you're removing. Next, using compressed air, blow off the melted solder.
Desoldering using Tweezers
Desoldering tweezers can be free-standing or under control by a soldering station. The technique involves the following steps:
- Switch on the tweezers and set an ideal working temperature. Also, for effective contact, you may add excess solder or flux to the joint you're removing.
- Allow the tweezers' hot iron probes in place to melt off the solder joint.
- Lastly, using the tip of the tweezers, remove the molten solder.
Desoldering With A Hot Plate
If you're looking to remove solder bridges, the hot plate technique will serve you best. Here are the steps:
- Apply solder paste to the PCB using a syringe. Then, correctly put a chip on the paste and place the board on a metal surface. Next, place it on the hot plate preheated to the right temperatures.
- The melting will create solder bridges which you can now remove using iron and desoldering braid.
How To Remove Solder From Circuit Boards?
A girl working on a circuit board with a soldering iron
The four major techniques to remove solder from circuit boards include the following:
Grinding and Scraping
The two techniques are time-consuming but are the best option for an individual without soldering experience.
Machining and Milling
It's a more precise technique than the above. However, you must use a microscope to improve the levels of precision. The technique needs someone with experience.
The method requires the application of a chemical solvent to the board via a brush. But, ensure you cover the circuit board with a protective material to prevent damage by the solvent.
Note that the method is primarily essential in removing solder from copper plates.
It is handy in removing solder from a large surface area. Using a pencil-shaped tool, blast an abrasive material on the surface area you intend to desolder.
Removing Solder from Circuit Board Holes
A solder wick and soldering iron
You need to employ special techniques to expel solder from circuit board holes. These methods include the following:
- Desoldering Pump or Bulb
- Desoldering Wick
- Using a desoldering braid and a Desoldering wick
How To Remove Solder Without Wick?
While the above techniques are handy in removing solder from PCB, they are not the only ones. Once you remove the copper wires and the other component from the PCB, you can bypass using an actual wick.
You can use anything capable of absorbing molten solder, such as a CAT5 Ethernet cabling. Alternatively, use a thin rod with good heat transmission properties. Heat this rod on one side and place the other end on the PCB to melt it.
Also, consider using a rod that cannot fuse easily, as you may end up soldering it to the PCB. The other alternatives include stainless steel and carbon pencil lead.
How To Remove Solder Without a Soldering Iron
You may lack a soldering iron, but this doesn't mean you cannot remove the solder. You can substitute the soldering iron with any metal. For this purpose, you'll need two screwdrivers with a propane torch.
First, preheat the iron-replacement screwdriver till it's red hot. Next, place it on the joints to melt the solder joints. Then, place the other cold screwdriver on the molten solder. It will stick on it, and now you can remove it.
How To Remove Old Solder
Old solder will melt in the same manner as newly applied solder. Hence, any of the above techniques will come in handy in removing old solder.
How To Remove Solder Flux
There's a chance some considerable amounts of flux will build up around the area during desoldering, and while it's harmless, you should remove it. You can use distilled water or isopropyl alcohol to clean it. Next, after applying the solvent, remove the flux by brushing it off with a stiff brush.
Removing solder from joints and PCB Holes is a simple process, as this article highlights. We've discussed various simple techniques you can consider undertaking for a desoldering job. Also, write to us if you have questions on desoldering, and we'll get back to you promptly. | <urn:uuid:e4b71467-4065-4277-b3e9-4adb25e2c424> | CC-MAIN-2022-33 | https://www.ourpcb.com/how-to-remove-solder.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00402.warc.gz | en | 0.892766 | 2,184 | 2.828125 | 3 |
Intolerance is the result of self-indulgence, and when religions turn their hack on their founding ideals.
A standard thesaurus list of the syn onyms for “intolerance” would in clude words such as “bigotry”, “prejudice”, “partiality”, “fanaticism”, “dogmatism”, “racism”, “jingoism”, “sexism”, “bias”, “injustice”, “umbrage”, “discrimination”, “high-handedness”, “narrow-mindedness”, “nepotism”, and so on. Each of these terms denotes base characteristics that are antitheses to the development of a just and democratic society.
The history of human civilisation has been a continuous struggle to combat various forms of intolerance in individuals, rulers, groups and nations. The more autocratic a ruler, the less tolerant will the establishment be towards the common people. In reverse, citizens are more tolerant towards each other when their society is democratic. Intolerance is at its height in regimes which cannot stand criticism.
We find that many of the eternal stories of the world, the myths, are based on this residuum of reality. Take Greek mythology, for example. Zeus is portrayed as the supreme deity, the symbol of Power, Rule and Law. He is furious at Prometheus for stealing fire from the gods and giving it to man, and for teaching him many useful arts and sciences. For this rebellious act of imparting knowledge to a lesser being, Prometheus is chained to a mountain and vultures let loose to tear his body into pieces.
At one level this is a fantastic story that shows how a powerful god manifests his wrath towards someone who dares think differently or go against accepted mores. On the other hand, tales like these contain a deeper lesson—they serve as warnings to would-be dissenters. This is why such stories continue to be told, to appease the powerful in society.
History is replete with tragic episodes in which upright people were killed, maimed, exploited or exiled for expressing views contrary to those held by the powerful. The revolutionary preacher to the poor and destitute, Jesus of Nazareth, became a threat to the Roman rulers and their rich Jewish business associates. Together they connived to convict him of blasphemy and had him crucified. The grandson of Prophet Mohammed, Imam Hussain, revered by the Shias of the Muslim world, was killed at Karbala for refusing to recognise the establishment of the first hereditary rule in Islam.
Indeed, most of the world’s organised religions had begun as movements for the liberation of the oppressed that is what is at their core. However, with the spread of faith, invariably, religion had to find a way to adjust to the power structures in society. Jockeying for power with the temporal rulers, the religious leadership always found it to its advantage to “co-exist”. In return for a place among the ruling clique, the clergy bestowed upon the monarchs the divine authority to rule. On the basis of that strength, the latter went on to impose laws that limited freedom.
In the Islamic world, the rulers made good use of the tenet of blasphemy and fatwa to prevent or deal with dissidence. Nevertheless, there was resistance to religious fanaticism and to the strict religious laws, or the Shariat. This resistance came mainly from the mystics, the Sufi Karam, who had their own way of showing disregard for the laws of the caliphs. They did not directly attack the divine authority of the ruler; rather, they expounded the concept of Wahditul Wajood (Unity of Existence), which, in essence, taught that since Allah creates everyone, all are equal in his eyes implying that no ruler has divine power.
Certainly, the Sufi masters were made to pay for their defiance, and in this, the rulers took the help of the clergy. Thus when Mansur Al Hillaj pronounced his idea of Annul Haq (“I am the Truth”), the rulers grew anxious of his popularity and got the priests to interpret Annul Haq to mean “I am God”. Hillaj was condemned to death. Yet another mystic, Sarmad Sarmast, was killed for his proclaiming of La Illa (meaning that there is no god). This was in the era of Mughal Emperor Aurangzeb, the only Muslim ruler of India who tried to impose Islam among the people.
It is the greatest of ironies that while religious leaders sought to use religion to reform society and to establish a just and equitable order for all, with the passage of time some of their followers have used their very teachings to create dogmatic states which emphasise differences between peoples and nations. They foment hate. The most evident manifestation of this today is in the former Yugoslavia, where the Christian Serb majority has embarked on a systematic massacre of Muslims
At home, in Pakistan, the average person’s acceptance of the other’s religion is hardly any better. However, more alarming is the fact that the state itself has been active in persecuting religious minorities. The greatest threat these communities live under is the country’s blasphemy laws under which it is easy to charge someone with malafide intentions, or even for mistakes committed inadvertently.
The two main provisions in the laws are:
Section 295-B: (Defiling, etc, of the Qur’an) Whoever wilfully, damages or desecrates a copy of the Holy Qur’an or an extract therefrom or uses it in any derogatory manner or for any unlawful purpose shall be punishable with imprisonment for life.
Section 295-C: (Use of derogatory remarks, etc, in respect of the Holy Prophet) Whoever by words, either spoken or written or visible presentation, or by any imputation, innuendo, or insinuation, directly or indirectly, defiles the sacred name of the Holy Prophet Mohammed (Peace be upon him) shall be punished with death.
It was to protest against these harsh laws that in May 1998, Bishop John Joseph, the well-known human rights activist and the chairman of National Justice and Peace Commission, committed suicide by shooting himself through the head in front of the Sahiwal Session court in Karachi. A day before killing himself, the bishop had sent a fax message to several newspapers stating that:
Section 295-C is the greatest block in the harmonious relationship between Muslims and the religious minority in Pakistan. Once this obstacle is away each Pakistani will live in peace and our beloved Motherland, Pakistan will prosper… i shall consider myself extremely fortunate if in this mission of breaking the barriers, Our Lord accepts the sacrifice of my blood for the benefit of his people.
The tragedy of Pakistan, however, goes further than the bishop’s sacrifice of self. Not only is there prejudice against someone else’s religions, there is extreme intolerance among the different sects of Islam within the country. The heightening of tensions began with the Islamicisation of Pakistan under Gen Zia-ul Haq. Punitive measures during Gen Zia’s rule, such as public hangings, floggings, stoning to death, and chopping of hands, were meant to generate an atmosphere of fear in the country.
It succeeded at that, but in the process destroyed the sensibility and sensitivity of Pakistani citizens and created an environment of mistrust and excessive self-indulgence. It is now a regular feature that sects fight each other, spilling blood in individual or mass killings. Brutal and ruthless regimes can only beget brutality and ruthlessness in society, the extreme forms of intolerance, and Gen Zia’s spawned such a situation in Pakistan. It is the country’s misfortune that there are so many today who know no other way than to continue on the path he charted.
Wherever and whenever intolerance raises its head, it has always been at the instance of some organised agency or the other. Undemocratic governments and autocratic political parties, to maintain their hold on power, create conditions conducive to disruption and division in society. Thus goaded on, people who are ‘ordinary’ in normal situations, behave abnormally and atavistically.
Which is why we see a parallel to Pakistan’s experience in nearby India, where the coming to power of the Hindu rightist Bharatiya Janata Party has been accompanied by growing intolerance towards other religious faiths. The beginning of the new year saw Hindu extremists attacking churches and Christian missionaries. That the targetting of Christians comes after more than a decade-long campaign against Muslims by these very forces, which included the destruction of the 500-year-old Babri Masjid in 1992, points to a systematic propagation of the ideology of hate
Religious intolerance in South Asia has its modern roots in the British colonial strategy of “divide and rule”, whereby the indigenous population was divided into several groups, while the coloniser, remained a single entity. However, not all the ills of our region can be blamed on the British colonisers. Intolerance towards others existed long before the first European set foot on the Subcontinent—in the form of racism.
For millennia, the deep-rooted caste system, based on the wholly irrational premise of superior’ and ‘inferior’ races not unlike that practised by Hitler, ensured the tyranny of the privileged few over the majority ‘low castes’. Later, with the spread of other religions in the Subcontinent, this prejudice found wider application among the two main religious groups, Hindus and Muslims. Muslims were the unclean’ for the Hindus, and Hindus the unbelievers’ for the Muslims—creating its own cycle of hate. Its final legacy has been the half a century of war-like tension between India and Pakistan.
Today, tragically, the two countries have internalised the animosity that earlier was limited to sabre-rattling between the two governments. Today, the swords are unsheathed within each country, community against community. | <urn:uuid:aada2de6-57da-4c39-993a-03ef7174dec3> | CC-MAIN-2022-33 | https://www.himalmag.com/roots-of-bigotry/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00004.warc.gz | en | 0.962122 | 2,131 | 2.890625 | 3 |
The US is currently engaged in negotiations with at least a dozen countries; which involve fundamental political, military and economic issues.
The US has adopted diplomatic strategies in the face of its ‘inability’ to secure military victories. The purpose of adopting a diplomatic approach is to secure through negotiations, in part or fully, goals and advantages unattainable through military means.
While diplomacy is less subject to military and economic losses it does require making concessions. Negotiations are only successful if there are reciprocal benefits to both parties.
Those regimes which demand maximum advantages and minimum concessions, usually fail or succeed because they are based on very unequal power relations.
We will proceed to evaluate Washington’s success or failure in recent negotiations and analyze the reasons and consequences for the outcome.
US – North Korea Negotiations
President Trump and North Korean leader Kim Jong-Un have been engaged in negotiations, for nearly a year. The White House has prioritized the ‘de-nuclearization’ of the peninsula which includes dismantling nuclear weapons, missiles, test sets and other strategic military objectives.
North Korea seeks the end of economic sanctions, the signing of a US-Korean peace treaty and diplomatic recognition. A decisive meeting between the two took place Feb. 26-27, 2019 in Hanoi.
The negotiations were a total failure. Washington failed to secure any gains, nor did they advance the peace process; and there are no future prospects.
North Korea offered three significant concessions which were not reciprocated. President Kim Jong-Un proposed to (1) dismantle nuclear testing sites (2) announce a moratorium on nuclear tests and inter-continental range ballistic missiles tests (3) agreed to partially dismantle missile engine test sites.
Washington offered nothing in return – instead it demanded total disarmament; no lifting of sanctions; no signing of the end of the US-Korea war.
Washington’s asymmetrical ‘negotiations’ were pre-determined to fail. The US underestimated the capacity of the North Koreans to insist on reciprocity; they believed that future verbal promises would entice the North Koreans to disarm. The Koreans were fully aware of the recent US record of reneging on signed agreements with Iran, China and its partners in the Belt and Road agreement.
Moreover, North Korea had powerful allies in China and Russia and nuclear weapons to resist added US pressure.
US – Iran Negotiations
US and Iran negotiated an agreement to terminate economic sanctions in exchange for ending nuclear weapons development. It temporarily succeeded but was quickly reversed by the Trump regime. The White House demanded Iran dismantle its missile defense program and threatened a military attack. Washington did not bargain, it sought to impose a one-sided ‘solution’. The UK,France,Germany Russia and China, co- signers of the agreement, rejected the Trump dictate, but a number of major EU multi- national corporations capitulated to the White House demand to tighten sanctions.
As a consequence, the US deliberate sabotage of negotiations pushed Iran closer to Russia, China and alternative markets while the US remained wedded to Saudi Arabia and Israel. The former engaged in a losing war with Yemen, the latter remained an international pariah receiving billions of US handouts.
US – China Negotiations
The US has engaged in negotiations with China to downgrade its economy and retain US global supremacy. Beijing has agreed to increase its imports from Washington and tighten controls over Chinese use of US technology, but the US has not offered any concessions. Instead Washington has demanded that China end the state’s role in financing its cutting- edge technology, artificial intelligence and communication innovations.
In other words, China is expected to surrender its structural advantages in order to avoid harsh White House tariffs which would reduce Chinese exports.
There is no reciprocity. The Trump regime operates by threats to China which, however, will have negative effects on US farmers dependent on Chinese markets; on US importers, especially the retail sector which imports Chinese products; consumers who will suffer higher prices for goods purchased from China.
In addition, China will deepen its links with alternative markets in Asia, Africa, Russia, Latin America and elsewhere.
As of the most recent year (2018) China’s positive trade balance with the US rose to $419 billion dollars while the US was forced to increase its subsidies to US agro- exporters to compensate for loss of sales to China.
After several months of negotiations US representatives have secured trade concessions but failed to impose a breakdown of China’s economic model.
By the middle of 2019, while negotiations continue, the likelihood of a ‘grand bargain’ is dismal. In large part this is because Washington fails to recognize that its weakened global position requires that the US engage in ‘structural changes’, which means that the Treasury invests in technology; labor upgrades and education. The US should practice reciprocal relations with dynamic trading partners;to do so, Washington needs to invest billions to upgrade its domestic infrastructure; and reallocate federal spending from military spending and wars to domestic priorities and productive overseas agreements. US diplomatic relations with China based on threats and tariffs are failing and economic negotiations are deteriorating.
US – Venezuela: Non-Negotiations a Formula for Defeat
Over the past half- decade (2015 – 2019) Washington has succeeded in restoring client regimes in Latin America, by military coups, political intervention and economic pressure. As a consequence, the White House has successfully ‘negotiated’ one-sided political, economic, social and diplomatic outcomes in the region … with the exception of Cuba and Venezuela.
President Trump has broken negotiated agreements with Cuba to no advantage; US threats have led to Cuba securing greater ties with Europe, China, Russia and elsewhere without affecting Cuba’s tourist business.
The Trump regime has escalated its political and economic propaganda and social war against Venezuela. Multiple overt coup efforts have backfired beginning in April 2002 to February 2019.
While the US succeeded in the rest of Latin America in consolidating hemispheric hegemony, in the case of Venezuela, Washington has suffered diplomatic defeats and the growth of greater popular resistance.
US interventionist and sanctions policies have sharply reduced the presence of its middle and lower middle class supporters who have fled abroad. US propaganda has failed to secure the support of the Venezuelan military which has become more ‘nationalist’ with very few desertions.
The White House appointment of the convicted felon Elliott Abrams, known as the ‘butcher of Central America’, has certainly undermined any prospect of a favorable diplomatic settlement.
US sanctions of political and military leaders precludes efforts to co-opt and recruit leaders. The US appointed as its ‘interim ruler’ one Juan Guido who has little domestic support – widely seen domestically as an imperial stooge.
The US non-negotiated successes in Latin America have blinded Washington to the different conditions in Venezuela; where structural socio-economic reforms and nationalist military training consolidated political support.
In the case of Venezuela, the US refusal to enter into negotiations has led to greater polarization and multiple defeats, including the failed coup of February 23/24 2019.
US – Russia: Colluding with Failed Diplomacy
Washington succesfully‘negotiated’ the surrendered and break-up of the Soviet Union and the subsequent pillage of Russia. It was the US’ most successful ‘negotiations’ of the century. The US ‘negotiations’ allowed it to expand NATO to the Russian frontier, incorporated most of East Europeans into the EU and NATO and led the US to boast of creating a ‘unipolar world’.
Excess hubris led the US to launch prolonged (and losing) wars in Afghanistan, Libya, Iraq, Somalia, Syria and elsewhere.
With the election of President Putin, Russia made a comeback, which led to the Kremlin reconstituting its military, economic and geopolitical power.
The White House reacted by attempting to ‘negotiate’ Russia’s military encirclement and to undermine Moscow’s economic growth.
When Russia refused to submit to US dictates, Washington resorted to economic sanctions and power grabs in the Ukraine, Central Asia and the Middle East (Iraq and Syria).
Washington rejected a diplomatic approach in favor of economic intimidation, especially as some US backed oligarchs were arrested or fled with their wealth to the UK and Israel.
The US refused to recognize the opportunities which still existed in Russia – a neo-liberal economic elite, a mainly mineral export economy and Moscow’s conciliatory approach toward US military engagement in Libya, Somalia, Yemen and Iran.
US ‘negotiations’ were non-starters. The White House defined Russia as an enemy to be undermined. Sanctions became the weapon to deal with Russia’s attempt to regain its world standing. Washington’s aggressive posture included its refusal to recognize that the world had become multi-polar; that Russia had allies in China, partners in Germany, military bases in Syria; and has a loyal and advanced scientific elite.
The US ,operating from a past image of Russia from the Yeltsin era. failed to adapt to the new realities – a resurgent Russia willing to bargain and secure reciprocal advantages.
The US failed to recognize potential allies and economic advantages in open negotiations with Russia. Many Russian economists close to the Kremlin were neo- liberals, ready and willing to open the economy to US penetration. Russia was willing to concede the US a major role in the Middle East and offered to negotiate their oil export policies.
Instead the US refused to negotiate power sharing .US sanctions forced Russia to embrace China; Washington’s drive for global dominance encouraged Russia to build ties with Venezuela, Cuba, Iran, Syria and other independent nations.
Washington’s unipolar policies turned a potentially lucrative and long-term strategic relation into costly confrontations and failed diplomacy.
US and the European Union: Dead End Deals
Bullying Europe has been a successful endeavor, which the US has put on display on innumerable occasions in recent times. Washington negotiates agreements with the French, English and German to end economic sanction on Iran and then reneges and turns around to apply sanctions on European firms which comply with the US and disobey their own government.
The US negotiates with Europe on trade policies and then abruptly threatens to impose sanctions on its crucial auto exports.
Europe negotiates with Washington on NATO security issues and then the White House threatens them in order to raise their military spending.
The US claims that the EU is a strategic ally but treats it as a junior partner.
Negotiations between the two has been a one-sided partnership: the US sells arms and names adversaries ,while Europe argues, dissents and submits, sending troops to fight US wars in Syria. Afghanistan, Iraq, Libya and elsewhere.
The US dictates sanctions against Russia, increasing the price of EU imports of gas and oil . Germany debates, discusses, hems and haws and avoids an outright rejection.
The US has steadily encroached on EU prerogatives to the point where it claims if the EU fails to comply with the White House’s “America First” agenda, it would cause the US to withdraw from NATO.
Despite a longstanding alliance, the White House no longer negotiates policies – it threatens and expects compliance. Despite a history of EU submission and pro forma debates, as Washington has hardened its opposition to Russia, China and Iran it no longer considers EU trade relations a point of negotiations. While Europe might consider the US as an ally, it will not be allowed to be treated as such, because it is viewed as a trade adversary.
Washington has succeeded in securing non-reciprocal agreements with weak countries. This was the case in post war Europe, post Gorbachev Russia and among Latin America’s current colonized regimes.
In contrast Washington’s rejection of reciprocal agreements with Russia, China, Iran, Cuba and Venezuela has been a failure. US trade wars with China have led to the loss of markets and allowed China to pursue global agreements through its
massive ,billion dollar Belt and Road infrastructure projects.
US one-sided hostile policies toward Russia has increased ties between the Kremlin and Beijing.
Washington has lost opportunities to work with neo-liberal oligarchs in Russia in order to undermine President Putin. Washington has failed to negotiate reciprocal ties with North Korea which would ‘de-nuclearize’ the peninsula in exchange for lifting economic sanctions and opening the door for a capitalist restoration.
Demanding unilateral concession and submission has led to uniform failures; whereas negotiated compromises could have led to greater market opportunities and long-term political advances.
President Trump and his top policy makers and negotiators have failed to secure any agreements.
The Democratic Congress has been as ineffective and even more bellicose – demanding greater military threats to Russia, expanded trade wars with China and less negotiations with North Korea, Iran and Venezuela.
In a word, failed negotiations and non-reciprocal diplomacy has become the hallmark of US foreign policy.
By Prof. James Petras
Source: The Official James Petras Website | <urn:uuid:1fbe76c1-0048-4427-ae06-cf059f52d56a> | CC-MAIN-2022-33 | https://astutenews.com/2019/03/us-negotiations-masters-of-defeats/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00005.warc.gz | en | 0.95346 | 2,710 | 2.953125 | 3 |
By Bridget M. Sunderlin, CG®
In this guide we’re going to learn how to harness one of the most underused genealogical resources of the late 18th and early 19th centuries: the U.S. Censuses of 1790 to 1830. These gems can be a bit daunting with their tick marks and handwritten surnames, but they can contain some very helpful information when used correctly.
I admit that these older population surveys can be scary, and don’t contain the same rich detail as later censuses, but know that there is a time and a place to use them. When strategically correlated with other available records, these early census rolls can truly connect 19th century families to one another and to their communities.
What do the 1790 to 1830 Censuses Have to Offer?
The very first census of the United States was taken in August of 1790, not long after George Washington was appointed leader and chief. This federal task required that every household within our new country be visited and tallied. The resulting forms were then posted in two of the most public locations within each jurisdiction for all to see.[i]
In 1790, marshals assigned to the visitations were given a list of questions to ask. See the chart that follows. The only name identified was that of the head of household. These individuals were listed by ward, district or area of residency. The date was included. All other responses were represented by tally marks.
This may not seem like much information but, when we can compare it in a variety of ways, we can learn a few things about a family’s structure as well as its economic status. Our first should be to compare other heads of households listed within the area to identify neighbors and family. We may see surnames that appear later in our tree through marriage. These community members may show up as witnesses within our ancestors’ land and probate records. If our ancestor held slaves, while others did not, this could indicate wealth, as well as occupation.
Relationships were not indicated on this census, nor any U.S. censuses until 1880. When faced with this lack of evidence, family historians are left to infer or hypothesize relationships. This tasks us with locating other sources to compare these findings to, such as church, land, tax or probate records, in order to support our hypotheses.
Additionally, any age-related information that we pull from census records of this type can only be ranges. We are left again to compare our findings to other sources, such as baptismal and marriage records. Before we can begin to visualize a family’s growth within a geographical area, we may need to evaluate the ages of household members across decades of census records.
The Censuses of 1800, 1810 and 1820
The questions asked by marshals on the U.S. censuses of 1800 and 1810 were identical in nature. New to these census questionnaires were age segments for all free white males and females of the household. Again, the head of household was the only named individual.
This addition of age ranges allows researchers to truly compare families across time, to make inferences about relationships and birthdates. These must be correlated, not only with families you have identified as yours but also other families, to resolve potential conflicts. Pay close attention to places of residency, slave ownership and other factors to ensure that you are comparing apples to apples, and not introducing a lemon.
When comparing census records, timelines can assist your efforts. This tool will help you to see changes across the decades, such as the death of the head of household, and children becoming heads of their own households. Add other record types such as land purchases and probate records to support these changes. Learn more about timelines here.
Census records should never be used alone to prove vital events such as birth, marriage and death, nor relationships within families. Keep this concept in mind when you work with census records after 1830, too. For a quick overview of other records to compare the census to, read Why You Should Never Rely on “Facts” You Find in the Census and What to Do Instead.
1800 & 1810 Census Questions
By 1820, the questions posed to each family grew in depth and specificity. For the first time, foreigners, or aliens were identified, which introduced potential new U.S. residents, whose census records should also be matched with those pertaining to immigration.
Not only were age ranges tallied for free white residents, age ranges were identified for slaves and free colored persons. These individuals were classified by gender as well, which allows the researcher to compare age across time for all members of a household. This is a great technique to use, especially when matched to tax, probate and slave schedule records.
All inhabitants engaged in agriculture, commerce and manufacturing were counted as such, which offers insight into occupational differences between families. This information should be used to refine your ancestral research not only through surname and residency, but also employment.
1820 Census Questions
The Census in 1830
Genealogists throughout the world will be happy to know that marshals utilized a uniform, printed schedule when tallying the 1830 U.S. census. These boilerplate documents offer an ease of readability never experienced before. Columns and rows of tally marks lined up. Less handwritten notations increase legibility overall.
Unique to the 1830 U.S. census was a more precise breakdown of age ranges. Instead of the previous fifteen-to-twenty-year range, ranges were shortened to ten years. The ages of children were broken down farther, to five-year increments. This precision allows the genealogist to more closely pinpoint predictions for younger family members.
This same specificity does not apply to slaves and freed colored persons, however. Instead, a fifteen-year range is offered, similar to that of age ranges offered in censuses that preceded 1830.
A new category surfaced regarding residents with disabilities, specifically deafness, dumbness and blindness. These were tallied for all household members, although no differentiation was made to separate slaves from freed colored persons, nor male from female, within the residence. This information has the potential to add personal characteristics to ancestors but, unfortunately, it lacks a link to specific individuals within the home.
1830 Census Questions
Where is the Best Place to View These Early Census Records?
Many online sites offer you the ability to view census records online and I usually recommend FamilySearch, since it’s free. However, if you already have a subscription to another genealogy site like MyHeritage, Ancestry or Findmypast, you will find the records there as well.
After these services were reviewed to identify which had the cleanest digital image of these early census records, almost hands down, Find My Past won. The backgrounds were clean. The 1830 headings were clear. The contrast between black tick marks and white paper made these quite legible.
The service with the best tabulation would have to be Ancestry. They have an added “within view” transcript that makes it so easy to see what the tick marks mean. I’ve yet to find an error in these, but one should not discount that possibility. Therefore, check them against the original image. With these handwritten censuses, we rarely see the heading that pertains to each tick mark, but our friends at Ancestry have solved that with the added transcript.
FamilySearch wins for the quickest way to identify names surrounding your ancestor. They have a transcript bar at the bottom of each page where you can easily read head of household names in order. Again, transcriptions are creations from the original, so you should always check them against the original document itself. FamilySearch’s images were as clean and clear as those at Find My Past, but it was difficult to navigate the tally headings.
How Best to Harness These Censuses in Your Research
Due to the fact that you are basically flying without instrumentation when viewing census records from 1790 to 1830, you simply must test, test, test the source. These early census records lack so much information, that experts always correlate them against one another, as well as against other records from the same time. Professional historians test heads of households of the same name by comparing all known facts to resolve conflicts. This requires exhaustive research of all historically appropriate record groups.
Use maps from every decade to get the lay of the land. Start your search at the Library of Congress. Locate the homesteads of all neighbors. Connect your ancestors and their neighbors to specific places. This will help you to eliminate families that do not apply.
One of the best aspects of these earlier censuses may be the fact that populations were smaller. People knew each other. Communities were tighter. Use this in a positive way by building communities of people beyond just your ancestor. Look for witnesses and sponsors to your ancestors’ events, such as baptisms and wills. Connect them to your family. Identify your ancestor’s precise place within his or her community.
Compare censuses to one another across time to see repetition and the growth of your family. Connect all families with the same surnames by identifying those relationships. Link fathers and sons to one another. Link brothers to one another. Be open to marriage names that will link sisters. Be open to two sisters marrying two brothers. Think about how close families lived to one another for marriage to occur.
Take a bold step into the past, and truly investigate these earlier census records. You will not be sorry. Use them to locate the exact place that your ancestor lived. Identify their neighbors, by reviewing each and every entry on the census. Jump to other records from the time, and compare the census to church, tax, land, military and probate records.
If you want to learn more about the U.S. census as a genealogical resource, visit The Ultimate Quick Reference Guide to the U.S. Census for Genealogy and 9 Surprising Things About the U.S. Census Every Genealogist Should Know. If you need further guidance with colonial and early American records, read 4 Free Places to Research Your Colonial American Ancestors.
Bridget M. Sunderlin, CG® practices in Maryland. She is the owner of Be Rooted Genealogy, where she specializes in Maryland, Pennsylvania, New York, Ireland, and Scotland research.
[i] “Decennial Census Official Publications,” U.S. Department of Commerce, US Census Bureau (https://www.census.gov/programs-surveys/decennial-census/decade/decennial-publications.1790.html : accessed 11 September 2020), web page, “Information about the 1790 Census.” | <urn:uuid:664247ee-1b5e-481f-b15a-078839b4d5e0> | CC-MAIN-2022-33 | https://familyhistorydaily.com/genealogy-help-and-how-to/first-us-census-records-1790-to-1830/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00004.warc.gz | en | 0.966014 | 2,224 | 3.40625 | 3 |
It’s hard to miss the massive red spheres of super fruit power staring at you, when you’re strolling through the produce department at your local natural foods market. By now, most of us are attuned to the fact, that pomegranates those juicy red behemoths are emphatically rich in vitamins, minerals, and antioxidants. Recent studies however suggest that conventional health benefits aside, pomegranates are proving to be an unequivocal addition to your daily nutrition habits and supplement protocol, aiding in muscular endurance, quicker recovery times, and increased strength.
The word superfood is often overused, however in this case, pomegranates exhibit more potent and superior effects of any other food in its class with even greater antioxidant effects than green tea, red wine and turmeric [R].
What Are Pomegranates
Pomegranate is an ancient fruit originating in the middle east. It’s been around since the beginning of time and has had a presence in every ancient middle eastern civilization as well as China and India. The pomegranate is comprised of several components. The nutrient-dense outer layer or “husk” envelopes clusters of berry-like seeds called arils. All the glory lies in within the arils.
Pomegranates are rich in vitamins, essential minerals, and polyphenols. As one of the most nutrient dense fruits in the entire fruit ecosystem, studies have shown that pomegranates may benefit a wide modalities of training protocols, due to its antioxidant, anti-inflammatory capabilities, and nitrate content.
Pomegranates Improve Athletic Performance
In a systematic review, conduced by Cambridge University, 11 studies were identified that examined the effects of pomegranate intake on exercise performance exercise-induced muscle fatigue, soreness, muscle damage, oxidative stress, inflammation and cardiovascular function. Identified studies investigated the effects on several training modalities including; running, cycling, weightlifting, and endurance training. The review concluded that pomegranate has the potential to enhance endurance, strength performance, and improve post workout recovery by conferring antioxidant and anti-inflammatory effects and improving cardiovascular responses during and following exercise [R].
Pomegranates Can Reduce Muscle Soreness
Improved recovery and reduced soreness are key to get back in the gym and improve workout load and volume. A study published in the journal Plos One, investigated the effects of pomegranate supplementation on recovery, muscle damage, and soreness following Olympic weightlifting training. Nine elite powerlifting athletes ingested 500mg of pomegranate juice or placebo 60 minutes before performing high-intensity Olympic training workouts specifically snatches and clean and jerks. Heart rate, blood pressure and blood samples (hematological parameters, muscle damage and C-reactive protein (CRP)) were collected at rest, 3min and 48h after each session. Weightlifting performance, RPE, and DOMS were also assessed after each training session. Study results concluded that pomegranate ingestion 60 minutes before training, improved total workload by 8.3%, maximal load lifted by 3.26% and cut down DOMS by 13.4% 48 hours post workout.
Pomegranates Can Enhance Endurance Capacity
Endurance athletes, powerlifters, and bodybuilders require more nutrients, especially those that promote improved cardiorespiratory performance and muscular endurance. Because athletes consume far more oxygen than the average gym goer, antioxidant and anti-inflammatory foods are of particular interest to help protect against free radical damage, improve recovery times, enhance endurance, and optimize performance outcomes.
In a study conducted at the University of North Carolina, at Chapel Hill, 19 participants were randomized to investigate the effects of pomegranate on blood flow and exercise performance. Three treadmill tests were conducted after baseline was established at 90,100, and 110% of peak velocity. After a 7-10-day washout, participants repeated the same procedures, but ingesting the placebo as opposed to pomegranate juice. The study found that participants that the pomegranate group significantly increased blood flow and delayed muscle fatigue [R].
Delayed muscle fatigue increases time to exhaustion, which can benefit any and every training modality, improving performance, workout load, and workout volume.
Pomegranates Can Improve Strength Gains
Pomegranates are rich in nitrates, much like beetroot or citrulline malate. Nitrates help dilate blood vessels, thus enhancing oxygen, blood flow and nutrient uptake. Foods rich in nitrates have been shown to improve performance outcomes such as strength, endurance, and recovery.
A study performed at the University of Texas, at Austin investigated the effects of pomegranate supplementation on muscle strength and exercise soreness post workout. 17 resistance trained men, were randomized into a crossover design and administered 500mg of pomegranate juice or a placebo for 9 days. After 5 days of supplementation, participants 3 sets of 20 reps of single-arm eccentric biceps exercises and 6 sets of 10 reps of single-leg eccentric leg extension exercises.
Maximal isometric elbow flexion and knee extension strength and muscle soreness measurements were made at baseline and 2, 24, 48, 72, 96, and 168 hours postexercise. The study found that strength was significantly greater and soreness was significantly reduced with isometric elbow flexion, amongst the pomegranate group [R]. Based on these results, it seems that regular consumption or supplementation of pomegranate could benefit recovery, increasing training volume, and thus result in better performance.
High content of polyphenols (flavonoids) found in pomegranates promotes nitric oxide synthesis, which has been shown to increase strength and recovery times. In addition, the antioxidant and anti-inflammatory properties of pomegranates have also shown positive effects on muscle strength and recovery.
Pomegranate Contain Powerful Plant Compounds Which Benefits Athletic Performance
Polyphenols – Shown to have impressive anti-inflammatory effects, which can improve joint health, mobility, and optimize post workout recovery times.
Antioxidants – Decreases free-radical damage and oxidative stress which protects against chronic disease states and helps in the anti-aging process.
Nitrates/Nitrites - Improves oxygen, blood, and nutrient uptake directly to muscle tissue, which can improve recovery times, delay muscle fatigue, and increase strength. Much like citrulline malate, or beetroot, nitric oxide boosters have vasodilating effects, which result in the intense blood rush, otherwise known as the “pump” to the muscle.
Potential Pomegranate Performance Benefits
- Increased Time To Exhaustion
- Delayed Muscle Fatigue
- Improved Recovery Times
- Reduce Post Workout Soreness
- Improved Strength
Pomegranate Performance Benefits: Takeaway
Studies have proven that pomegranates contain powerful plant compounds such as punicalagins, catechins, anthocyanins, ellagic acid which have incredible antioxidant capabilities and anti-inflammatory effects. Drinking 4-6oz of pomegranate juice and/or supplementing with 500mg a day not only provides incredible health benefits, but can improve athletic performance, and muscle recovery times, getting you back in the gym quicker and doing what you do best, crushing it.
Looking for an amazing proprietary blend free greens powder to help power your active lifestyle?
Greens+Reds is a high-quality, proprietary blend-free combination of Organic super greens and antioxidant-rich reds. Greens + Reds contains powerfully rich organic super greens from land and sea like Spirulina, Chlorella, Wheat Grass, and reds including Organic beets, Pomegranate, Bilberry, Blueberry and Organic Turmeric to improve your energy levels, bridge the gaps in your daily diet, and promote overall health and wellness.
SWOLVERINE IS AN ENDURANCE ATHLETE AND ACTIVE LIFESTYLE BRAND. MADE FOR THE ELITE ATHLETE, AND THE STRONG-WILLED OUR PRODUCTS WERE DESIGNED TO FUEL YOUR ATHLETIC PERFORMANCE. We perform when you perform
We believe that everyone can optimize not only their athletic performance but their human potential. The way we believe we can optimize performance is through transparency, clinically effective doses, and clinically proven ingredients with evidence-based outcomes. We provide the nutrients you need to power your active lifestyle.
Ammar A, Bailey SJ, Chtourou H, Trabelsi K, Turki M, Hökelmann A, Souissi N. Effects of pomegranate supplementation on exercise performance and post-exercise recovery in healthy adults: a systematic review. Br J Nutr. 2018 Dec;120(11):1201-1216. doi: 10.1017/S0007114518002696. Epub 2018 Oct 23. PMID: 30350760.
Trombold, JR, Reinfeld, AS & Casler, JR (2011) The effect of pomegranate juice supplementation on strength and soreness after eccentric exercise. J Strength Cond Res 25, 1782–1788.CrossRef | Google Scholar | PubMed
Trexler ET, Melvin MN, Roelofs EJ, Wingfield HL, Smith-Ryan A. The effects of pomegranate extract on blood flow and running time to exhaustion. J Sci Med Sport. In press.
Ammar, A, Chtourou, H, Trabelsi, K, et al. (2015) Temporal specificity of training: intra-day effects on biochemical responses and Olympic-weightlifting performances. J Sports Sci 33, 358–368.CrossRef | Google Scholar | PubMed
Ammar, A, Chtourou, H, Hammouda, O, et al. (2016) Relationship between biomarkers of muscle damage and redox status in response to a weightlifting training session: effect of time-of-day. Physiol Int 103, 243–261.Google Scholar | PubMed
Fuster-Muñoz, E, Roche, E & Funes, L (2016) Effects of pomegranate juice in circulating parameters, cytokines, and oxidative stress markers in endurance-based athletes: a randomized controlled trial. Nutrition 32, 539–545.CrossRef | Google Scholar | PubMed | <urn:uuid:66725211-2ef5-4497-a20a-bdb7fb7e4468> | CC-MAIN-2022-33 | https://swolverine.com/blogs/blog/pomegranates-improve-athletic-performance?_pos=10&_sid=17c7103b2&_ss=r | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00404.warc.gz | en | 0.904143 | 2,163 | 2.609375 | 3 |
Pan American World Airways, Inc. History
Dissolved: December 1991
Over the course of its over six decades in operation, Pan American World Airways, Inc. was one of America's most widely recognized airlines. The firm's pioneering flights to Europe, Asia, and South America helped earn it an important role in aviation history. Under the direction of Juan Trippe, the firm encouraged long distance air travel and secured the technology necessary to achieve international flights. At one time, the company moniker was one of the most recognized trademarks in the world, second only to Coca-Cola. But after eluding total financial ruin several times in the 1970s and 1980s, a combination of bad management, high debt, poor employee relations, and just plain bad luck brought the airline's demise in December of 1991.
The architect of Pan Am's prominence, and ironically of its later decline, was a man named Juan Terry Trippe. Upon graduation from Yale in 1920 Trippe worked for a year in his father's bank. Soon thereafter he left the bank in order to pursue a career in the airline business. When his father died suddenly, Trippe used his inheritance to purchase nine Navy "Jennys" for a new endeavor, Long Island Airways. Unable to generate enough business, the company failed.
Trippe and two wealthy friends from Yale then organized a second airline after the passage of the Kelly Air Mail Act. Their company, Colonial Air Transport, won the first airmail contract route between New York and Boston. They purchased two three-engine Fokker airplanes the following year which enabled them to transport passengers as well as mail. A dispute among stockholders soon resulted in the sale of the company to what later became known as American Airlines. Trippe and his partners were excluded from both the decision and their airline.
Undaunted, Trippe's group purchased Aviation Corporation of the Americas with the intention of bidding on the Key West-Havana mail route. In 1928 the company merged with Pan American Airways and Atlantic, Gulf and Caribbean Airways. The new company retained the Pan American name and instituted the first scheduled international commercial destination, to Havana, Cuba.
Passengers' often well-founded fears of flying high above 90 miles of open water made it difficult for Pan Am to book all eight seats on each flight. The bravado of the airline's pilots didn't help: some were known to enter Cuban bars and dare American tourists to fly back to Florida. In Miami the company tried a more subtle tack: "Fly with us to Havana, and you can bathe in Bacardi rum four hours from now." One of Pan Am's three Fokker airplanes was, in fact, lost in the ocean in 1928. Nonetheless, Pan Am's embrace of such new technologies as directional radio, navigational instruments, and meteorological measurement helped make long-distance air travel safer and more popular.
Trippe was now planning Pan Am's expansion in the Caribbean. Due to a lack of airports in the region he supported the development of the water-landing Sikorsky S-38 "flying boat." Pan Am purchased 25 of the five-ton airplanes, which could travel 100 miles an hour and had a range of 300 miles. In anticipation of the U.S. Postal Service opening several new routes, Trippe had his flying boats make survey flights beyond Cuba over routes that, at his insistence, were to be selected for airmail contracts. He also dispatched advance men to secure landing rights, mail contracts, and other concessions so that when the post office finally invited airmail bids Pan Am would be the preferred choice. In this way the company secured routes to Puerto Rico, Panama, and other points throughout the Caribbean.
In 1930 Postmaster General Walter Brown compelled the merger of Pan Am and its biggest airmail contract competitor, the New York, Rio and Buenos Aires airlines. The union doubled Pan Am's fleet and earned it the extremely lucrative South American East Coast airmail contract. These routes served as a springboard for future business and promoted Pan Am to the world's largest airline and the "chosen instrument" for flying the U.S. flag abroad.
Pan Am's use of flying boats helped consolidate its coverage of the Caribbean and turned its attention to traversing the oceans. The airline used the newly developed China Clipper (a Martin M-130), with a range of 2500 miles, to transport passengers and mail from California to the Orient. Overcoming huge obstacles of diplomacy, financing, and engineering, Pan Am established service to Europe in June of 1939 using the larger and faster "Dixie Clipper" aircraft.
Pan Am's aeronautical pioneering was quite costly. Trippe was said to have been obsessed with the idea of "having a plane in every airport in the world." This left little money for dividends and, as a result, the stockholders voted to replace him with his old friend and associate "Sonny" Whitney in March of 1939. Whitney, however, was an ineffective manager and proved unable to maintain control of the company. Less than a year later Trippe was asked to return.
As the only established American international airline, Pan Am played a major role in the war effort when it placed itself at the disposal of the U.S. government in the early 1940s. In November of 1940, the company signed a contract with the War Department providing for the construction of airbases and remote supply, radio, and weather stations. In October of 1942 the airline established a war transport service from the United States across the South Atlantic to West Africa and from there to points in the Middle East. Pan Am was rewarded handsomely for having devoted up to three-quarters of its resources to the armed forces during World War II. When the war ended the company's hegemony over international air routes was at its peak.
Trippe hoped to maintain the profitable relationship forged during the war between Pan Am and the federal government through the creation of one official airline that would compete with foreign carriers. His proposal that Pan Am be made a regulated monopoly (not unlike utility companies) was rejected by Congress, however. Furthermore, the government opened the door for the competition Pan Am had never previously experienced. With an eroding market share Pan Am looked to the future, commissioning the development of Boeing's first jetliner, the 707. The delivery of the first 15 of these airplanes precipitated the jet age and propelled Pan Am once again to an enviable competitive advantage.
In the early 1950s Pan Am expanded its transportation holdings through the acquisition of American Overseas Airlines. The company also diversified into hotels, real estate, and corporate jet aircraft, and contracted with the National Aeronautics and Space Administration (NASA). These extracurriculars proved profitable, particularly a New York real estate deal involving the construction and leasing of the Pan Am building, which was dedicated in 1963.
But as the 1960s wore on, the company again lapsed into poor performance as a result of overextension. By the time Juan Trippe announced his plans to retire in the latter years of the decade, his goal of having a plane in every airport in the world had brought about a sprawling 81,430-mile route system. Competition from government-subsidized overseas airlines intensified. Trippe chose Najeeb Halaby, former head of the Federal Aviation Administration, to succeed him in 1969. Halaby found himself presiding over a firm so decentralized that he characterized it as "an airline without a country." Worse, Pan Am was nearly bankrupt. Some thought the system could not be maintained without the award of a government subsidy or a compensatory monopoly, neither of which were likely. The fuel crises of the 1970s only exacerbated existing problems. Pan Am chalked up losses of $364 million from 1969 through 1976, and accumulated over $1 billion in debt.
With the help of tax-loss credits, Pan Am made its first profit in nearly a decade in 1977. The man responsible for this was William Seawell, who was brought in to replace Halaby in 1972. Unable to obtain subsidy relief from either the Civil Aeronautics Board or the White House in 1974 and 1975, or possible funding from the Shah of Iran, Seawell instituted austerity measures in 1976 and renegotiated the company's debt. Abandoning Trippe's grand strategy, he reduced the system 25 percent by severing money losing services. He reduced personnel by approximately 30 percent and approved an offer by employees to accept a wage cut. By these measures complete financial ruin was averted.
Late in 1979 Pan Am received approval for the $437 million acquisition of National Airlines, with which Seawell hoped to bolster Pan Am's relatively weak domestic operations. But the purchase, later criticized as too expensive, was also poorly timed. The early 1980s ratification of Airline Deregulation Act triggered sometimes cutthroat competition from new domestic and foreign carriers. The company was once again on the brink of financial ruin, this time as a result of fiscal overextension. Only by selling a large portion of its assets, including the Pan Am building headquarters, was it able to avoid bankruptcy.
Edward Acker became chairman of Pan Am in September of 1981. This cautious but optimistic manager continued to divest Pan Am's assets. On September 14, 1984, Pan American Airways created a holding company called Pan Am Corporation to assume ownership and control of the airline and the services division. Although the fast-growing Pacific market was one of the few profitable areas Pan Am could rely on, the company was so strapped for cash that it sold its Asian routes to United Airlines for $715.5 million in 1985.
In spite of the divestment of most of the firm's most important assets, Pan Am's domestic division alone lost over $1 billion from 1980 to 1987 and accumulated $914 million in long-term debt at the same time. Several groups--including Kirk Kerkorian, a Beverly Hills financier; Chicago's Pritzker family; and a group of investors led by former Navy Secretary John Lehman--made takeover overtures, but a new chairman, Thomas G. Plaskett, turned them away. In 1988, Plaskett negotiated $180 million in concessions from Pan Am's five unions&mdash-ough to get the airline through what would become the harshest winter of its history.
On December 21 of that year, Pan Am's flight 103 en route from London to New York, was demolished by the blast from a terrorist-planted bomb over the town of Lockerbie, Scotland. All 243 passengers and 16 crew members were killed and another eleven people on the ground were crushed by debris. This human tragedy soon began to make a significant impact on the already-struggling airline. Lawsuits on behalf of the victims' relatives found Pan Am and its subsidiary, Alert Management Systems Inc., guilty of willful misconduct in 1992. Damages, which would be assumed by the airline's insurer (the United States Aviation Insurance Group), totaled hundreds of millions. But Pan Am's insurers continued to appeal the decision into late 1994 and refused to make any compensation to the victims' families.
In the meantime, rising fuel costs and increasing competition in the United States and abroad forced Plaskett to layoff 2,500. To raise the cash necessary for continued operation, Plaskett and the board of directors decided to sell the firm's only consistently profitable subsidiary, Pan Am World Services, as well as an important German route, in 1990.
That fall, Plaskett worked to open all Pan Am's options. Although he was, by this time, actively seeking a merger partner, he also optimistically announced an eight-point plan to improve service, marketing, liquidity, and employee relations with the ultimate goal of turning a profit in 1990. The divestment of hubs at Heathrow Airport in London and Washington, D.C.'s Dulles International Airport brought in $290 million, but were not enough to keep the company from seeking bankruptcy protection on January 8, 1991.
After decades of struggling to survive, let alone prosper, Pan Am was by this time left with few options. Having sold most of its assets, opportunities for divestments were seriously limited. In spite of his weakened bargaining position, Chairman Plaskett resolved to sell all the airline, including its employees, or none of it. But after months of negotiations involving most of the industry's largest players, Pan Am's creditors lost patience with Plaskett's pace. Midway through 1991, they voted to accept an offer of $621 million in cash and the assumption of $668 million of Pan Am's liabilities from third-ranking Delta Air Lines Inc.
Delta's acquisition of the majority of Pan Am's international route system catapulted it from a 1990 ranking of 23rd among the world's airlines to a position among the top ten. The addition of most of Pan Am's North Atlantic routes as well as its American and German hubs gave Delta more European destinations than any other American carrier. The purchase also gave Delta a serious case of "corporate indigestion:" it posted a $500 million loss that year. Still, Delta chairman and chief executive officer Ronald Allen stood behind the decision. In August of 1992, he told Terry Maxon of the Journal of Commerce and Commercial that "A lot of people may point to the Pan Am acquisition and say, 'Oh, that's why Delta's having so many problems.' That's not true. We had some surprises with that, but overall that's gone very well."
Instead, Allen blamed the same industry forces that brought about Pan Am's December 4, 1991 demise: high costs, fare wars, and inadequate traffic due in part to economic recession and fear of terrorism. By the time Pan Am filed for bankruptcy protection, two other major competitors, Eastern and Continental (both subsidiaries of Continental Airlines Holdings) were also in the midst of Chapter 11 reorganizations, and Trans World Airlines, Inc. joined that list early in 1992. United Airlines, American Airlines, and Delta were able to take advantage of their competitors' weaknesses and together amassed over half of the U.S. market in the early 1990s. Some analysts surmised that Pan Am's failure even benefited struggling carriers like TWA and Continental by reducing industrywide overcapacity.
Pan Am's creditors auctioned off its famous logo, a blue globe, for $1.325 million in 1993. The buyer, Charles Cobb, hoped to license the well-known symbol to travel companies or airlines. Although Pan Am's dissolution was perceived by some observers as just another business failure, others mourned the airline as they would a respected colleague. In a February 1992 editorial for Air Transport World, James P. Woolsey called for "a moment of respect" and praised Pan Am's pioneering spirit, charismatic leadership, and extraordinary perseverance.
- Bender, Marglin, and Selig Altschul, The Chosen Instrument, New York: Simon and Schuster, 1982.
- Brock, Horace, and Jason Aronson, Flying the Oceans: A Pilot's Story of Pan Am, New York, 1978.
- Davies, R. E. G., Pan Am: An Airline and Its Aircraft, Orion Books, 1987.
- Flint, Perry, "Airlines: Playing for Time," Air Transport World, March 1991, pp. 50-52.
- Gandt, Robert L., Skygods: The Fall of Pan Am, Morrow, 1995.
- Halaby, Najeeb E., Crosswinds: An Airman's Memoir, New York: Doubleday, 1978.
- Josephson, Mathew, Empire of the Air: Juan Trippe and the Struggle for World Airways, New York: Harcourt Brace, 1944.
- Maxon, Terry, "Burdened by Expense of Pan Am Move, Delta Air Lines Adjusts to Lean Times," Journal of Commerce and Commercial, August 19, 1992, p. 3B.
- McKenna, James T., "Pan Am Creditors, Executives Scramble for Cash as Carrier Shutdown Looms," Aviation Week & Space Technology, August 5, 1991, pp. 280.
- ------, "Former Rivals Poised to Pluck Prime Remnants of Pan Am," Aviation Week & Space Technology, December 9, 1991, pp. 18-20.
- Newton, Wesley Philips, The Perilous Sky: U.S. Aviation Diplomacy and Latin America, 1919-1931, Coral Gables, Fla.: University of Miami Press, 1978.
- Ott, James, "D-Day Due for Delta Takeover of Most Pan Am Operations, Aviation Week & Space Technology, October 14, 1991, pp. 44-49.
- ------, "Inability to Adapt in New Era of Aviation Doomed Pan Am," Aviation Week & Space Technology, December 16, 1991, pp. 28-29.
- ------, "Pan Am Filing a Sign of Consolidation, Not an Indication of Competition's End," Aviation Week & Space Technology, January 14, 1991, p. 29.
- Stern, Richard L., "Pan Am: The End of an Empire," Forbes, February 4, 1991, pp. 74, 76.
- Taylor, Barry, Pan American's Ocean Clippers, AERO, 1991.
- Van Doren, Carlton S., "Pan Am's Legacy to World Tourism," Journal of Travel Research, Summer 1993, pp. 3-12.
- Woolsey, James P. "A Moment of Respect, Please," Air Transport World, February 1992, p. 5.
Source: International Directory of Company Histories, Vol. 12. St. James Press, 1996. | <urn:uuid:0f3391d7-6633-4d1b-b7dd-7be7dc2fa8f7> | CC-MAIN-2022-33 | http://www.fundinguniverse.com/company-histories/pan-american-world-airways-inc-history/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00402.warc.gz | en | 0.960511 | 3,631 | 3.5 | 4 |
This is the Book of God
Before approaching the Holy Quran we should be aware of certain fundamental details regarding it.
Even though Muslims believe that the Holy Quran is the Book of God, there are others who assume that it is written by the Prophet (pbuh) himself. It is a wrong thinking.
According to Islamic faith, this Holy Quran had been revealed to Prophet (pbuh) and was conveyed to the people.
The Holy Quran itself declares clearly that not even a single utterance of the Prophet (pbuh) has been included in the Holy Quran (Refer Verses: 10:15, 10:37, 37:38, 11:13, 11:35, 16:101-103, 69:44-46)
Certain people assume that the Quranic revelation has been an imagination of the prophet (pbuh)
There exists proper reason to prove that the Quran has not been produced by the prophet (pbuh).
Generally, we find contradiction in the speech of the human-being. Thought it is possible for the human-being to speak carefully, for one or two days, without contradiction, it is impossible to speak for years together without any contradiction.
If we make a study of the entire speech of an eminent scholar for period of five years we can find many contradictions in his speech on various matters as listed below.
• Forgetting what he has spoken earlier
• Getting a correct understanding of a matter which he has wrongly understood earlier.
• Talking carelessly due to the occurrence of grief, loss, etc.,
• Adopting an approach of conciliation in order that others’ sentiments should not be hurt or to get certain favour from the people.
• Defects like amnesia caused by old age.
• Fearing consequences of the crisis adopting double standards.
As there remain a lot of weaknesses for a human-being no one can avoid speaking in a contradictory manner.
On the other hand the prophet (pbuh) had taught the Holy Quran for twenty three years little by little. If it had been his own imagination then there could have been a lot of contradictions in his speech for twenty three years. There are no contradictions in the Holy Quran.
Such contradictions pointed above are avoided only because it is a Word of God, who is free from all weaknesses.
The Holy Quran throws challenge at the human beings of the whole world to search for contradiction in it. (Refer Quran 4:82)
The prophet (pbuh) introduced the teachings of the Holy Quran to the people. If it is to be the revelation of God then it should contain teachings and messages in a high standard, unlike the teachings and messages of human-beings.
The non-Muslim scholars and researchers who made a thorough study of the Holy Quran have appreciated the exalted style and excellent standard of the Holy Quran. This is the reason that the Holy Quran has been honored for its high literary value in the Arabic literature.
Unlike any renowned literature piece, that contains many lies, exaggerated descriptions and imaginations, the Holy Quran, which is a ‘Word’ of God, far surpasses any human endeavor in linguistic excellence and perfection and contains the following aspects.
• No Lies
• No contradiction
• No vulgarity
• No exaggerated description
• No mixture of imagination
• Neither escapism nor evasion
• No exaggerated praise of kings and patrons
Eminent literacy scholars of those days were astounded by the high literary standard of the Holy Quran, which possesses only truth and is devoid of certain aspects usually adds taste to the literature and creates interest in the minds of the people.
For creating such a Book of high standard, the prophet (pbuh) should not only have been a great scholar of Arabic but also knowledgeable in the previous literary works.
The surprising fact is that the prophet (pbuh) could neither write nor read (Refer Quran 29:48, 7:157, 158 & 62:2)
Moreover the standard of Quran is so high that it could not have been imagined by an unlettered person who was neither a scholar of Arabic literature nor a knowledgeable person, who had been familiar with the literary works of those times. Hence, there is no doubt that the Holy Quran is the Book of God.
A literature which can be understood by a layman
Generally, a book, if it possesses high literary standard, will not usually be read by common people.
To be appreciated by common people, a book should not possess the aspects of high literary standard. Only eminent scholars can appreciate and understand books of high literary standard. Ordinary people cannot understand them.
On the other hand, the Holy Quran, which is a master-piece of fine literary standard, had been understood by the Arabs who could only speak that language. It also attracted the eminent scholars.
The Arabs of the present time, who could understand the Holy Quran are unable to understand the books of high literary standard in Arabic language.
The prophets (pbuh) throw his challenge only on the above basis and proved to the world that such a Book cannot be created by any human being.
It is one more evidence to prove that the Holy Quran was not a product of Prophet Muhammad’s (pbuh) imagination.
There should be a proper method adopted which would control the meter and lines of any literary work, in order to enhance the rhythm and melody of the work. Only then we feel its melody. On the other hand, there is no such controlled rhyme and meter observed in the Quranic verses. Instead, free verse is adopted here. It seems as if it is similar to prose.
There is also no limit to the number of words for a verse. A verse may contain more than hundred words. Another verse may contain only ten words and sometimes even one word.
Melody cannot be expected from such an arrangement of words. Surprisingly, the style adopted by Quran is such that there is sufficient melody to attract the minds of those who listen to the recitation of Quran.
People who do not know the Arabic language also enjoy the melody of the Quran.
Adopting a style where there is no possibility for the existence of melody, Quran surprises everybody by its melody.
This is another evidence to prove that the Holy Quran is no the Book imagined by the Prophet (Pbuh)
Suitable to all times
The prophet (pbuh) was born in 570 CE
This period was known as Dark Age because the people of that period had been very backward in the field of science. They did not even know that the shape of the earth is round.
A person, living in that period, however genius he might have been, could not predict anything thought could be suitable to the future generation. Anybody who reads his writing after hundred years could easily find out a lot of errors in his writing.
It is because nothing could be predicted a century before, what is going to happen after hundred years.
Even, if book is written jointly by various scholars that will not stand the test of time. That book becomes obsolete within a period of hundred years.
Till date, nobody could prove in the Book anything wrong which had been introduced by the prophet (pbuh) who was unlettered and had lived in the period of dark ages.
As far as the Holy Quran is concerned, it speaks not only about religion but also about other fields, at various places.
While mentioning about the earth, the planetary system, the wonders in the heaven, the geography and astronomy, etc Quran surpasses the eminent scholars and intellectual of this present century in the field of science and in the display of knowledge on various fields.
In addition Quran talks about various things regarding human-beings and other creatures, their inner-structure, the creation of living-things etc. The surprising thing to be noted here is that whatever it speaks, it speaks better than an expert in the field of medical science of this century.
Similarly, it speaks about plants, mountains, rivers, etc. The point to be noted here is that whatever is mentioned in the Quran, which has been revealed before fourteen centuries, matches with the ideas expressed by current scientific facts.
Moreover the Holy Quran has already mentioned about certain things which have been recently discovered.
(Refer page 26 for details)
The people who think about the period of the prophet (pbuh), which has been very backward in the field of science, if they correlate with the things that are mentioned in the Quran, which surpass the knowledge of experts of the current century, will come to a conclusion that whatever is said in Quran is not the word of prophet but it is the Word of God, who knows the past, present and the future.
If anyone does research on the various fields like science, modern inventions, political system, civil and criminal laws, as mentioned in the Holy Quran, he will clearly realize that the laws prescribed in the Quran are far better than the laws enacted by the experts of the current century and in their usefulness also they are more beneficial to the humanity. Even non-Muslims welcome the Quranic laws and wish them to be enacted.
The popularity gained by the Quranic laws among the people of various religions clearly states that the Quranic laws introduced by the prophet (pbuh) are not the laws imagined by him but they are the laws revealed by the God. We observe frequent correction and amendments have been done in the laws enacted by the leading experts. On the other hand in the Holy Quran which has been revealed before fourteen centuries, there is no correction done, till date.
Another evidence to prove that it is the Book of God remains in the wonderful solution it gives to solve the intricate problems of the modern times.
The untouchable which springs from the differences of the race, caste, etc., which could not be solved for centuries, has not only been easily solved but also eradicated by the teachings of the Holy Quran.
Quran has predicted number of things which are going to happen. Many such predictions have already happened.
(Refer page 29 for details and evidences)
All the above things clearly denote that the Quranic words are not the word either imagined or uttered by the prophet (pbuh).
Quran itself throws a challenge at the world if it believes that the Quran has been imagined then let it to bring a chapter like this.
(Refer Holy Quran 2:23, 10:38, 11:13, 17:88, 52:34)
Quran had already predicted that no one could succeed the challenge thrown by it. Nobody has been able to succeed in defeating this challenge for the past fourteen centuries.
The prophet (pbuh) in his life time of twenty three years has spoken more that what we have seen in Quran. All the speeches, actions and approval of the prophet (pbuh) have been recorded and protected.
Any linguistic scholar who does research on the languages of the Quran and the speeches of the prophet (pbuh) can clearly state that they are not the words of a same person. He will find clear differences in the literary standard and style between the two.
Certain researchers, who accept the view that the Quran could not have been produced by the prophet (pbuh), have said that the prophet (pbuh) has learnt it from the Books of the Jews and Christians. Still, a few Christians share this opinion.
It is because both Quran and the Books of the Jews and Christians mentions about the prophets(pbuh) who lived before the prophet Muhammad(pbuh), like Adam (alai), Nooh (alai), Moosa (alai), Yahya (alai), Yaqoob (alai), Dawood (alai), Sulaiman (alai), Isa (alai), etc.
This view is wrong due to many reasons.
It is only Quran which mentions the names of the prophets given above in a proper perspective. In the presentation of their lives there are vast differences between Quran and the other Books of Jews and Christians.
The above mentioned prophets are portrayed in the Books of the Jews and Christians as persons who have indulged in drinking, debauchery and other evil practices. On the other hand Quran portrays them as righteous persons.
Quran mentions only the important aspects of their life which carry necessary lessons, unlike the Books of Jews and Christians.
Quran does not describe the genealogy of the prophets as it is found in the Books of Jews and Christians
It is proved from the above mentioned facts that the prophet (pbuh) never copied from the Books of Jews and Christians.
We then find in the Books of Jews and Christians, their narrations of many historical events and here and there a few teachings. There is no guidance in those Books for all problems faced by an individual in his lifetime. Quran records only certain hints about the historical events from which people can learn. It also gives appropriate solution for all the problems faced by the human-beings. Such solutions for the problems are not given in the Books of Jews and Christians. From this we understand, that there is no basis for the accusation that Quran is a copied version of the Books of Jews and Christians
It is to be noted that like other communities, the people belonging to Jews and Christian communities also embraced Islam in large numbers during the prophet (pbuh) period.
Such people would not have embraced Islam if they had known that Quran had been copied from their Books and would not have accepted the prophet (pbuh) as their guide, finally it is clear beyond that doubt the Holy Quran has been only a revelation from God and it was not produced by Prophet Muhammad (pbuh).
No expectation of reward from the people
If the prophet (pbuh) had applied his imaginations in producing a Book in the name of God, then he should have expected something in return.
It should also be reflected, regarding the benefits he had gained for having by imagined and informed that Quran was the Book of God.
The prophet (pbuh) became a merchant when he was twenty five years old. He became the richest man of Makkah when he attained the age of forty. He declared that he had become the prophet (pbuh) to the people of Makkah only at this stage.
From this we understand that the prophet, as he had been already rich, had no intention of amassing wealth.
From the day he made the announcement of his selection as the prophet of Allah, he had to endure great ordeals. He had been humiliated tortured and was even expelled from his place. He could have safeguarded himself from being expelled if he had ceased from the propagation of Islam and had his dropped his claim as the prophet of God.
Even that society desired only that type of an action from the prophet (pbuh). On the other hand he left that place empty handed. After he became a prophet, he had not amassed any wealth. Instead he lost everything for the sake of his principles.
After establishing the Islamic rule in Madina, had he wanted, he could have accumulated a lot of wealth. He led only a simple life even there.
• Even at this stage he did not accumulate any wealth for himself
• He did not live in a palace
• He lived in a hut till his death
• He and his family ate only meager food daily which was not sufficient to satisfy their hunger
• Continuously for a month they could satisfy their hunger only by eating a few dates and water. They did not cook anything at home.
• The prophet had only two sheets of cloth, with which he covered his body. He had only one or two dresses to wear on special occasion.
• They did not have even a lamp and spent their nights in darkness
• He could not even redeem his armor, pawned from a Jew for a measure of wheat, when he died.
• He left only a small piece of land, a horse and a few sheep, when he had died. He declared all his properties as the properties of the government and had even forbidden his family members from becoming heirs to his property.
• This impeccable life led by the prophet (pbuh) clearly states that the Quran is not a product of imagination by the Prophet (pbuh).
It is also wrong to assume that the prophet (pbuh) could have used the name of God in order to attain fame among the people. If anybody reads the Quran completely the above doubt will be cleared.
A person who had desired fame would not have used certain words which could have affected his honour and pride.
• I am not aware whether I will be successful or not when I am presented before God.
• God’s treasures are not in my possession. I do not know the hidden.
• I cannot escape from punishment of God if I commit any wrong.
• I am also a man like you
There are also verses recorded in Quran which convey Allah’s warning to the prophet (pbuh). For example, God finds fault with the prophet (pbuh) in the following verse.
“why do you fear the human being without fearing Me”
There are verses in Quran, which admonishes the prophet (pbuh), when he gets angry on his blind companion. Even though the blind companion of the prophet (pbuh) was not aware of the details of the incident, the prophet (pbuh) could not hide it because these verses are the words of God.
The prophet (pbuh), unlike ordinary people who could not digest any humiliation or dishonor, done on them, openly declared such verses carrying the news of such incidents as the words of God.
Even when there were people who would have accepted him as God, due to their excessive love and affection on the prophet (pbuh), the prophet (pbuh) declared that he was only a human-being like others. The above matters have been recorded in the Quran as the revelation of God.
If it is reflected how a man could have imagined and such recorded matters which had admonished him and caused harm to his self-respect, against himself, then it could be understand that Quran was not a product of imagination by the prophet(pbuh).
He disliked the people praising him. He led a very simple life.
• He had no palanquin in his possession to travel like the kings.
• He had no gate-watchman
• He did not allow others to prostrate before him
• He also forbade people from standing up as a mark of respect
• He warned the people not to praise him like those people who praised the prophet Isa (pbuh)
Hence, it is made clear, that he had not used the name of God to attain fame and honor and Quran is undoubtedly the ‘Word’ of God.
- Smaller Small Medium Big Bigger
- Default Meera Catamaran Pavana
- Reading Mode | <urn:uuid:3130ff27-3f8d-4284-8bfb-0745365fb159> | CC-MAIN-2022-33 | https://www.onlinepj.in/index.php/alquran/quran-in-english/quran-english-intro/this-is-the-book-of-god | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00405.warc.gz | en | 0.976908 | 3,900 | 2.6875 | 3 |
Essential Religious Paradox? The Supreme Court’s Interpretation Of Article 25
Why should it matter whether the essential character of a religion is destroyed or its theology rendered irrelevant if the same is violative of other parts of the Constitution?
The triple talaq case decided by the Supreme Court has won it a lot of appreciation in the last couple of months. A catena of similar judgments has been delivered by constitutional courts in India in the recent and not-so-recent past in the matters of regulating noise pollution levels – be it the azaan or during Diwali, regulating the formation of pyramids (dahi-handi) during Janmashtami or even the ban on animal sacrifice for religious festivals.
Although each of these individual cases seemingly stems from a completely different subject area, the common strain that ties all of them in one long chaotic web is the consistent application of the inconsistent principle called the Essential Religious Practices test.
This test was coined by the Supreme Court way back in the year 1954 in the case of The Commissioner, Hindu Religious Endowments, Madras v. Shri Lakshmindar Thirtha Swamiyar of Shri Shirur Mutt. The court, in this case, mentioned for the first time that what constitutes an essential part of a religion will be ascertained with reference to the tenets and doctrines of that religion itself.
So, what does the Essential Religious Practices test translate to in effect? This doctrine gives birth to an unstable system that gives judges the discretion to decide each invocation of Article 25 on its own merits, depending on which religion the petitioner belongs to. Even an elementary reading of this doctrine will immediately expose how flawed it is and that it is blatantly violative of Article 14.
That fundamental rights must be read harmoniously is trite law. That despite it, a doctrine such as the essential religious practices test has been coined by the Supreme Court is what is appalling.
The essential religious practices test baldly ignores the phrases “Subject to…. the other provisions of this Part” (namely Part III) and “equally entitled to”, hence further cementing the intention of the Article to be in perfect consonance with Article 14.
To highlight how this doctrine has led to mayhem over the years, it is important to discuss a few cases in which it has been implemented.
While deciding the case of Durgah Committee Ajmer v. Syed Hussain Ali and Ors, the Supreme Court held that sometimes there are practices, even secular ones, usually considered as part of the religion, that might actually be superstitions and not essential to the religion, and hence excluded from the protection of the Constitution. Through this judgment, the Court expanded further its role in interpreting not only what it means to be “religious”, and what is “essential” and what is not, but also to rationalize religion and to purge it of “superstitions”. If this isn’t a slippery slope, what is?
In the case of Sardar Syedna Tahir Saifuddin Saheb v. State of Bombay, where the Court was to determine whether excommunication can be considered to be an essential religious practice of the Dawoodi Bohra community, the Court answered in the positive saying that the legislature was not permitted to “reform a religion out of existence or identity”.
The correctness or lack thereof of each of these decisions is of little relevance here. What must be focused upon is that the Supreme Court has failed to arrive at these decisions based on constitutional tests.
In the case of Shastri Yagnapurushdasji v. Muldas, the Satsangi group’s claim to be recognised as an independent denomination following the teachings of Swaminarayan was rejected by the court on the ground that such claim is:
“Founded on superstition, ignorance and a complete misunderstanding of the true teachings of the Hindu religion and of the real significance of the tenets and philosophy taught by Swaminarayan himself.”
Besides the fact that what is religion to one, might be superstition to another, it is not for the court to grant to or disinherit from any individual or group, the status of a separate religious denomination. Any individual or group of individuals must be equally free to follow their traditions/rituals as long as the same are not barred by the restrictions given in Article 25, namely public order, morality, health and the other Articles of Part III.
The question is not just how the court can venture into this area, the question is why should it?
In the case of S P Mittal v. Union of India, while dealing with the validity of the Auroville Act, 1980, the court held that the teachings of Aurobindo only reflect his philosophy and not a separate religion. It thus took upon itself the tall task of establishing the difference between the ‘definitions’ of religion and philosophy. What turns out to be a complicated question for even professional theologians to accurately answer even after years of study, was answered with confidence by the Supreme Court in less than two years!
In the case of Acharya Jagadiswaranand Avadhuta and Ors. v. Comm. Of Police Calcutta and Ors, the court accorded to the Anandamargis the status of a separate religious denomination, but held that because of recent affirmation of this worship, the tandav dance could not be considered as an essential element of the religious denomination.
In 1990, the Calcutta High Court asked the Supreme Court to reconsider this decision, stating that the courts must avoid the tendency to go down a path where religious practice would become what the courts wish the practice to be.
In Comm of Police v. Acharya J. Avadhuta, the Supreme Court denied the tandava dance, for a second time, the status of an essential religious practice. Justice A R Lakshmanan’s dissent in this judgement, however, highlights the absurdity of the majority decision.
“…essential practices are those that are accepted by the followers as a method of achieving their spiritual upliftment and the fact that such a practice was recently introduced cannot make it any less a matter of religion”.
This dissent aptly highlights the lack of uniformity, much less clarity, in the mind of the Court itself as to what it considers to be essential religious practice. Does it suit a constitutional court to use such a half-baked, whimsical doctrine as the basis for deciding precious fundamental rights issues of a billion-odd people?
More recently, the Supreme Court in 2014 refused to vacate an order of the Himachal Pradesh High Court banning animal sacrifice during the festival of Kulu Dushara and in other religious rituals of the Kulu region of the state. Just one year later, the same Supreme Court, while refusing to entertain a public interest litigation that wanted a ban on the practice of killing of animals in the name of religion, held that “it cannot close its eyes to centuries old traditions”!
Such a judge-centric approach to justice sans an iota of consistency or stable first principles is positively bothering, even if it demonstrates itself mostly in the form of interim orders.
A thorough reading of these judgements will reveal a few voices of judicial reason that keep surfacing from time to time, but sadly only as dissenting opinions. It is time to give strength to those voices and alter the course of this troubling jurisprudence that has ruled the roost for half a century.
The court, while upholding or striking down practices, or even setting legal norms to be lived up to in its public interest litigation (PIL) jurisdiction, has to hold that the same is equally applicable to all citizens, irrespective of religion or irreligion.
The issue of determining noise decibel levels is an immediate and relatable example. If the court decides that noise decibel levels cannot be allowed to cross a certain decibel level for residential areas, then the same should be applicable minus religious obstacles.
The essence of this argument is that, while a decision is being arrived at in a constitutional capacity, the courts should be completely unconcerned with religion. Article 25 was never meant to be an absolute protection to be interpreted and applied independently of other provisions of Part III. The freedom of religion must be reconciled with the right of the state to employ the sovereign power to ensure peace, security and orderly living, without which the constitutional guarantee of civil liberty will be a travesty.
The court’s development of the Essential Religious Practices test reflects an interventionist attitude. Applying the test has made it convenient for the courts to describe a practice as “not essentially religious’’, as opposed to holding that it affects public order, morality, health or any other fundamental right, which would require a deeper analysis and equal application thereafter.
The court has practically transformed itself into a theological wizard, transgressing its role as a constitutional authority by a large margin. It has also, by concretising what is essential and unessential, snatched away from various religions the chance to reform themselves if they so wish.
What needs to be reflected upon by the court is why should it matter whether the essential character of a religion is destroyed or its theology rendered irrelevant if the same is violative of other parts of the Constitution and is against established principles of public order, morality and health? The Constitution does not provide any such immunity, so why must the court?
Religion has long been considered to be the opiate of the masses. The fact that a right as important and sensitive as the fundamental right to freedom of religion is being treated by the apex court with such an insouciant attitude, is both disappointing and dangerous, and is nothing but a ticking time bomb unless immediately rectified.
As you are no doubt aware, Swarajya is a media product that is directly dependent on support from its readers in the form of subscriptions. We do not have the muscle and backing of a large media conglomerate nor are we playing for the large advertisement sweep-stake.
Our business model is you and your subscription. And in challenging times like these, we need your support now more than ever.
We deliver over 10 - 15 high quality articles with expert insights and views. From 7AM in the morning to 10PM late night we operate to ensure you, the reader, get to see what is just right.
Becoming a Patron or a subscriber for as little as Rs 1200/year is the best way you can support our efforts. | <urn:uuid:f69e84c0-2ee3-4e77-963d-c520bc16fdca> | CC-MAIN-2022-33 | https://swarajyamag.com/ideas/essential-religious-paradox-the-supreme-courts-interpretation-of-article-25 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573630.12/warc/CC-MAIN-20220819070211-20220819100211-00605.warc.gz | en | 0.948461 | 2,199 | 2.546875 | 3 |
Page updated 26th July 2012
Return to Buildings of Exeter
The building now known as St Nicholas' Priory, is only a quarter of the original St Nicholas Priory. Half was destroyed in the dissolution of the 16th century and the other remaining quarter is known as 21 the Mint.
The portion that is now known as St Nicholas' Priory, was the guest wing of the complex, along with a kitchen at the northern end, which fed the refectory in 21 the Mint. Visiting pilgrims and other important guests were provided hospitality in the guest wing. At the centre of the priory was the cloisters, a cobbled courtyard surrounded with a covered way, in which various culinary and medicinal herbs were grown. In the eastern range was sited the Priory church while on the south side were the monks warming-house, so named for the large fire that kept it warm, the chapter house which was a meeting place for the Priory's governing body and the monks' dormitories on the first floor.
When William the Conqueror invaded England in October 1066, he founded Battle Abbey in Sussex, on the site of his victory over Harold's army, near Hastings. William did not subdue the English immediately, and he had to send his armies out to pacify the rebellious population. In 1068, William was in charge of the siege against the rebels of Exeter - Gytha, King Harold's mother was living in Exeter at the time, directing the defences. However, Williams superior tactics drove Gytha out. Exeter at that time had several small Saxon churches, one of which was St Olave's. William gave St Olave's to Battle Abbey who dispatched a contingent of monks to Exeter and founded, on land adjacent to St Olave's, a priory which they dedicated to St Nicholas in 1087. The priory expanded through the 12th and 13th century. The monks followed a simple life, as laid down by the 6th century, St Benedict. They prayed, worked and followed a life of chastity, poverty and obedience.
Things started to change when Henry VIII wanted a divorce from his first wife Catherine of Aragon to marry Anne Boleyn in 1533. In Catholic England, only Pope Clement VII in Rome could sanction a divorce, and he refused. Cardinal Wolsey, Henry's confidante and adviser, tried to gain an annulment from the Pope, but failed. Wolsey struck on the idea that the only way to gain the divorce was to break the link with the Roman church and for Henry to become the Supreme Head of the Church of England. Henry then could grant himself a divorce. Thus, major changes that shaped the lives and very nature of the English from that point on were brought into action.
One problem for Henry, was the stranglehold that the Catholic Church had over the affairs of England, including the ownership of many monasteries, abbeys and priories with tens of thousands of acres of land. He ordered, in 1536, the dissolution of the monasteries and for the monks to be driven out.
When Henry's men arrived at St Nicholas' Priory, to remove the rood loft and image of Christ a mob of, enraged and poor local, women who had in the past received food and succour from the priory, broke down the door using spikes, shovels and pikes and attacked the workman. The workman assigned the task leapt out of a window, breaking a rib. The Mayor was called and the women arrested, allowing our quaking henchman to emerge after he had in no doubt relieved himself in a handy bush. The Mayor arrested the women and jailed them. The workman returned and after completing the task, requested that the women be released. The eastern and southern sides of the priory were eventually also demolished and the western and northern sides given to some wealthy Tudor families. Strangely, stones from the demolished priory were used to repair the Exe bridge after one of the central arches had collapsed in 1539. Thus, an old prophecy was fulfilled that said that one day the Exe would flow under St Nicholas'.
Over the years, the buildings became more and more dilapidated. Then in 1820, the Wilcocks, a family of bankers and merchants purchased the priory as a sort of 'buy to let' scheme - the building was divided into five premises and rented to artisans such as bootmakers and upholsterers. There was even a physical training centre for local youths - even then they went to the gym.
In 1912, Exeter Corporation were advised to purchase the priory, by the Town Clerk, H Lloyd Parry, which they did for the princely sum of £850—after a three year restoration by the architects Ralling and Tonar, the restored Priory was opened by Mayor James Owen on 1st November 1916, to the public as a small museum, despite some councillors wanting the work to cease, due to Council budget restraints. The first year of opening to the public saw 5,000 visitors, at a time of wartime austerity.
Maud Tothill (1872-1957) was the first curator of the Priory between 1916 and 1939. She was keen to show the building off as a grand Tudor townhouse, and to this end, was responsible for collecting many of the pewter flagons, and plates, along with authentic furniture. She kept a couple of pet ravens, and was said to give tours of the building with one of the ravens on her shoulder. At the end of the tour, the bird would grab her hat and hop among the visitors, hoping for a tip. In 1928, the Express & Echo printed an obituary for Martha, one of the birds—she is now on display, stuffed, in a glass case, at the Priory. Martha’s companion, George lived until the early 1950s.
What is known as Toisa’s Cross was placed in the courtyard of the Priory in 1916. A Saxon or Hiberno-Saxon granite cross-shaft, it was originally placed near the Old Bridge, by the West Gate. Sometime in the nineteenth century it was removed and placed on the corner of Gandy Street and High Street to protect the corner from carts. It has since been removed to the museum.
The Priory remained open during the Second War, until it was forced to close after the May 1942 blitz. It was reopened to the public in April 1943, no doubt, as a morale booster.
In the meanwhile, the old refectory of 21 the Mint had fended for itself, with some wealthy owners putting in some fine Georgian windows, doors and mantelpieces and generally making the building fit for a Georgian family. Soon it started to suffer from the ravages of time and became overlooked by the City Corporation. The remains of the cloisters, which had been restored in the 17th century with fine cobbled paths became weed choked and then a dumping ground for the builders of the replacements for the east and south ranges of the old priory. The east range contains, ironically, a Catholic church and the south range some Victorian dwellings.
Then in 1993, Carol Griffiths, a local was shown around 21 the Mint by John Allan, Curator of Antiquities at the Royal Albert Memorial Museum. You could call it feminine intuition, but she fell in love with the building and realised its architectural and historic value through its semi-derelict state. Completely overlooked in the history of Exeter, even when it was right next door to St Nicholas Priory, 21 the Mint was then owned by the Roman Catholic Diocese of Plymouth. In 1993, it was home to Exeter College School of Printing, but was soon to be sold for redevelopment. Carol Griffiths' unstinting work created the Exeter Historic Buildings Trust and with funding of £850,000 from the Lottery Heritage Fund, English Heritage and the City Council among others, the building was acquired and restored to highlight its architectural history.
As mentioned earlier, 21 the Mint was the priory's refectory, comprising a large high-ceiling hall that was constructed in 1070 - guess the monks thought more about eating before anything else when planning their priory. Anyway, the chief Abbot would have sat on a dais, reading from the scriptures to the silently eating monks - no doubt they had a supply of wine to brighten the proceedings. Even though they made a vow of chastity and poverty, the Benedictines allowed themselves the luxury of ornate decoration to their priory and, for the time, a pretty hip style of worship and chanting. At the end of the 14th century, recruiting new monks became more difficult, what with all those pesky, flea infested rats taking over everywhere, and their numbers declined. There is evidence that the refectory may have been converted into a large office type space (when I mean large, I mean large) so that the Prior could interview prospective tenants for the monastic lands and receive their rent - bet Lady Day and Michaelmas Day were pretty busy. In the 15th century a major Changing Rooms type makeover was made with the wonderful arch braced roof constructed from pairs of opposed curved wind-braces. Nowadays, the roof can be closely inspected from a false floor that was constructed when the building was divided up internally in 1650, and the sockets and peg holes are still clearly visible. On the east wall of the hall was added plank-and-muntin (ok, so as you asked - a muntin is a horizontal bar that divides up a panel or window pane.) with carved bosses. The panelling served as a dark wooden backdrop for the Prior when conducting business, no doubt to give him extra gravitas. At the opposite end, by the exit that led to the kitchens was a screens passage. They also constructed an Oriel, or a glass walled room which allowed light to flood the interior.
So, 21 the Mint has been saved, a wonderful example of architectural history with early Norman stonework, medieval 14th century roofing, a Tudor des-res to a fine Georgian town house and finally an art school.
St Nicholas' Priory is still a museum, run by the Royal Albert Museum. 21 the Mint has had part converted into modern living accommodation, care having been made to preserve and protect many features of the building along with the oak panelling. The building is jointly managed by the Trust and St Olave's Court Hotel. In April 2004, Carol Griffiths' had the pleasure of escorting the Prince of Wales around the building.
Thanks to Ben Clapp for the raven story.
St Nicholas Priory from Mint Lane. The modern Mint Lane is in yellow. St Nicholas Priory from Mint Lane. The rather fine Tudor restoration with authentic wall decoration and original plaster ceiling. The roof timbers of the upstairs parlour. The front of 21 the Mint - the courtyard in the centre of the priory. Photo David Cornforth The rear of 21 the Mint from the courtyard of St Olave's Hotel. Photo David Cornforth The roof space showing the original timbers and a portrait of Prince of Wales on the left. Photo David Cornforth
│ Top of Page │ | <urn:uuid:e9d25a9f-3f92-4973-a8b7-dd6bfb85f87f> | CC-MAIN-2022-33 | http://exetermemories.co.uk/em/stnicholas.php | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572898.29/warc/CC-MAIN-20220817092402-20220817122402-00603.warc.gz | en | 0.980773 | 2,333 | 3.484375 | 3 |
‘The Cœliac Affection’ was initially described in the first century by the Greek physician Aretaeus. Although many treatments were attempted over the centuries, it was not until 1888 when Samuel Gee described that ‘errors in diet may perhaps be a cause’. During World War II, Dicke described a bread shortage that led to a significant drop in mortality among children previously affected by coeliac disease (CD). Years later, dietary gluten was found to be a major pathogenic factor for the disorder( Reference Anderson, French and Sammons 1 ). Besides genetic predisposition, dietary gluten is necessary, though it is not sufficient, for the development of CD. Even after several decades of aetiological research, causative environmental factors remain uncertain.
Environmental risk factors for coeliac disease
CD is a genetically determined, immune-mediated enteropathy that has been increasingly diagnosed( Reference Rubio-Tapia, Kyle and Kaplan 2 ). In genetically prone individuals, dysregulated T-cell immune responses after being exposed to dietary gluten proteins (which are found mainly in wheat, barley and rye) and subsequent production of auto-antibodies, as well as increased intestinal permeability to gliadin( Reference Clemente, De Virgiliis and Kang 3 ) (i.e. one of the gluten proteins), are important aspects of disease pathogenesis. Gliadin has been shown to affect both systemic and mucosal expression of cytokines associated with type 1 helper T-cell (Th1) immune response in CD( Reference Castellanos-Rubio, Santin and Irastorza 4 ).
Longitudinal studies have revealed other environmental risk factors for CD including early timing of gluten introduction( Reference Norris, Barriga and Hoffenberg 5 ), lack of breast-feeding during gluten introduction( Reference Ivarsson, Hernell and Stenlund 6 ) and acute viral gastrointestinal infections( Reference Stene, Honeyman and Hoffenberg 7 ). Along those lines, a recent study showed that infants with high genetic risk for CD, based on their HLA-DQ genotype( Reference Bourgey, Calcagno and Tinto 8 ), express disparate varieties of stool Bacteroides colonization compared with the low-risk group, and the difference was more pronounced when comparing between breast-feeding v. formula feeding among the high-risk infants( Reference Sanchez, De Palma and Capilla 9 ). This evidence reinforces that both genetic and environmental factors play interrelated roles in modulating the intestinal microbial environment in genetically predisposed CD.
Emerging evidence on the importance of season of birth (SoB) to risk of various immune-mediated conditions suggests a possible role in CD pathogenesis( Reference Disanto, Chaplin and Morahan 10 ). Our recent multi-centre study on SoB and CD in Boston, Massachusetts showed spring birth predominance among CD diagnosed in childhood (<15 years) and the association was more robust in boys than girls( Reference Tanpowpong, Obuch and Jiang 11 ). Two Swedish studies demonstrated that more CD cases were born between March and August (spring–summer) in children diagnosed before age 2 years( Reference Lebwohl, Green and Murray 12 , Reference Ivarsson, Hernell and Nystrom 13 ) and the study from Ivarsson et al. reported that boys had a more noticeable seasonal variation than girls( Reference Ivarsson, Hernell and Nystrom 13 ). In Israel, Lewy et al.( Reference Lewy, Meirson and Laron 14 ) showed that CD girls who were diagnosed before 2 years of age had a distinct SoB pattern. An important distinction from our study (and the Swedish studies) is that the latter study was conducted in a Mediterranean climate without equally long winters and summers and more than 300 sunny days per year, as well as the difference in latitudes (Boston, latitude 42°N v. Israel, latitude 32°N). The relevance of these Israeli results to Massachusetts is uncertain. One of many potential explanations for the SoB–CD association is the seasonal difference in sunlight and UV-B exposures in pregnant mothers and their newborn infants as well as their subsequent vitamin D status. We propose that widespread deficiency of vitamin D, the active form of which has been proposed to be an immunomodulatory hormone, during early life contributes to the pathogenesis of childhood-onset CD and helps explain the recent rise in CD prevalence. We synthesize diverse lines of research in support of our hypothesis on vitamin D, mucosal immunology and microbes.
Vitamin D, mucosal immunology and microbes
Vitamin D is well recognized as a regulatory substance for bone health and calcium metabolism. The most abundant vitamin D metabolite is 25-hydroxyvitamin D (25(OH)D), which is most influenced by cutaneous UV-B exposure from sunlight( Reference Holick 15 ). Numerous non-calcaemic actions of vitamin D have just been proposed in recent years, including preservation of healthy immune system regulation( Reference Hewison 16 ), maintenance of intestinal mucosal integrity( Reference Kong, Zhang and Musch 17 ) and prevention of pathogenic microbial agents by regulating production of antimicrobial peptides such as cathelicidin( Reference Ginde, Mansbach and Camargo 18 ). Studies have demonstrated that not only vitamin D but also UV-B radiation affects immune-system functions including Th1 and regulatory T cells in the control of inflammatory processes( Reference Milliken, Wassall and Lewis 19 ). Vitamin D deficiency during early life (i.e. from the fetal period onwards) has also been shown to cause persistent immune dysregulation in animal models( Reference Harvey, Burne and McGrath 20 ). Furthermore, suboptimal vitamin D status in pregnant mothers and their newborn infants is associated with increased risk of infections during infancy( Reference Camargo, Ingham and Wickens 21 ). Figure 1 demonstrates our proposed hypothesis linking early-life vitamin D deficiency with other potential contributing factors in the pathogenesis of childhood-onset CD. The figure acknowledges the important roles of genetics and likely sex differences in mucosal immunology( Reference Sankaran-Walters, Macal and Grishina 22 ).
Current epidemics of vitamin D deficiency
Concomitant with the increase in CD prevalence has been a rise in vitamin D deficiency which is fairly widespread in the general population, including pregnant mothers and their newborn children( Reference Merewood, Mehta and Grossman 23 ). The epidemic pattern of vitamin D deficiency is most likely due to changes in environmental exposures since the epidemic cannot be explained by genetic changes alone. Levels of UV-B exposure and subsequent 25(OH)D vary between seasons among people residing in higher-latitude countries where climate and ambient temperature affect lifestyle. With regard to season, UV-B intensity in most of North America and Europe is insufficient for cutaneous synthesis of 25(OH)D between late autumn and early spring (approximately November to March)( Reference Holick 15 ).
The vitamin D deficiency–coeliac disease hypothesis
With the aforementioned background, we hypothesize that early-life vitamin D deficiency dysregulates immune responses, disrupts intestinal mucosal integrity especially during antigen presentation (both dietary (i.e. gluten proteins) and microbial antigens (e.g. acute viral gastrointestinal infections)) and promotes an unfavourable microbial environment in individuals genetically predisposed to CD (Fig. 1). Furthermore, epithelial barrier disruption and translocation of gliadin can occur during the timing of increased permeability( Reference Clemente, De Virgiliis and Kang 3 ), a scenario that seems likely during acute viral gastrointestinal infections.
In relation to our study on the SoB–CD association, we believe that spring-born infants are likely to have limited UV-B exposure and lower 25(OH)D levels for the longest time during the second half of infancy (during late autumn/winter), when gluten is a more regular part of the diet and common acute viral gastrointestinal infections are more likely to occur. While a reasonable explanation for the gender–SoB difference both from our study( Reference Tanpowpong, Obuch and Jiang 11 ) and the Swedish study( Reference Ivarsson, Hernell and Nystrom 13 ) (i.e. the SoB variation was more pronounced in boys) is difficult, it may relate to disparate hormonal and immune responses to inflammation and infection( Reference Sankaran-Walters, Macal and Grishina 22 ).
Well-conducted studies of several other immune-mediated conditions have related vitamin D in early life to disease pathogenesis. Hyppönen et al.( Reference Hypponen, Laara and Reunanen 24 ) demonstrated that vitamin D supplementation reduced the risk of developing type 1 diabetes mellitus in a birth cohort. In multiple sclerosis, work by Mirzaei et al.( Reference Mirzaei, Michels and Munger 25 ) supports a hypothesis that higher maternal vitamin D intake and predicted maternal serum 25(OH)D levels during pregnancy decrease risk of developing multiple sclerosis in offspring. As a result, maintaining an optimal vitamin D status during early life in genetically prone CD children might be a safe, inexpensive and readily available strategy for primary prevention of CD.
Testing the hypothesis
Our hypothesis integrates information from fetal life to the development of CD in early childhood. Research studies involving direct effects of vitamin D on mucosal immune responses among genetically high-risk CD infants would be useful. This should be followed by interdisciplinary research in large prospective population-based studies capable of addressing the complexity of these mechanisms underlying the vitamin D deficiency–CD association with substantial follow-up time to identify incident cases of CD. Besides data on genetic risk of CD and baseline demographic data (to be able to address the gender differences, geographic area and latitude), several environmental factors should be included, such as sunlight exposure, vitamin D intake and 25(OH)D status in both pregnant mothers and their offspring. In addition, these studies would ascertain maternal infections during pregnancy, gut microbiome environment, episodes of acute gastrointestinal infections, infant dietary patterns and timing and amount of gluten introduction, before the diagnosis of CD. If observational studies confirm an association between early-life vitamin D deficiency and childhood-onset CD, we would support the conduct of randomized controlled trials of vitamin D supplementation – starting in pregnant mothers with the continuation of the supplement to their newborn infants.
The shortcoming for the testing of our hypothesis is that there is no clear consensus on the optimal vitamin D intake and vitamin D supplementation for non-calcaemic effects, and we have yet to delineate what 25(OH)D levels would be adequate to maintain favourable systemic and mucosal immune responses and to prevent infection by pathogenic microbial agents or even unfavourable changes in the gut microbiome. Nevertheless, we hypothesize that 25(OH)D levels achievable by moderate sunlight exposure, healthy diet and supplementation (e.g. 30–40 ng/ml or 75–100 nmol/l) will prove most beneficial.
The vitamin D deficiency–CD hypothesis integrates previous evidence and provides biologically plausible explanations where vitamin D deficiency during a developmentally critical period, in genetically susceptible individuals, can raise risk of developing CD. More specifically, vitamin D deficiency can result in unfavourable systemic and local immune responses to dietary gluten proteins and microbial agents, contribute to an abnormal intestinal mucosal integrity and increase susceptibility to acute viral gastrointestinal infections. Our hypothesis model on vitamin D–CD can serve as a framework for future mechanistic, epidemiological and interventional studies with a long-term goal of developing an effective primary prevention strategy for CD.
Sources of funding: This research received no specific grant from any funding agency in the public, commercial or not-for-profit sectors. Conflicts of interest: None. Ethics: Ethical approval was not required. Authors’ contributions: P.T. drafted and critically reviewed the manuscript. C.A.C. critically reviewed and finalized the manuscript. | <urn:uuid:b77f6781-5169-4936-ab2d-4c803531e6dc> | CC-MAIN-2022-33 | https://www.cambridge.org/core/journals/public-health-nutrition/article/earlylife-vitamin-d-deficiency-and-childhoodonset-coeliac-disease/0A8EAFB4E5CA9325F9B788420E480F61 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00602.warc.gz | en | 0.913131 | 2,453 | 3.296875 | 3 |
Demonstrate the characteristic emission spectra of several metal ions with a flame test that is large enough for an entire classroom to observe.
- Flame test emission spectra
- Bohr model of atom
Copper(II) chloride, CuCl2, 50 g*
Lithium chloride, LiCl, 50 g*
Methyl alcohol, CH3OH, 400 mL*
Potassium chloride, KCl, 50 g*
Sodium chloride, NaCl, 50 g*
Strontium chloride, SrCl2•6H2O, 50 g*
Butane or piezo safety lighter
Petri dishes, borosilicate glass, Pyrex®, 5
Safety shield (optional)
*Materials included in kit.
This activity requires the use of hazardous components and, if performed improperly, has the potential for hazardous reactions. Please visit the Flinn website (www.flinnsci.com) and type in AP9303safetyvid to view a special safety video, How To Safely Perform Flame Tests with Methyl Alcohol. Please also review the following Safety Precautions section and relevant Safety Data Sheets before beginning this activity.
Several accidents have occurred recently involving methyl alcohol. Please remember that methyl alcohol is extremely flammable, has a very low flash point and burns with an almost invisible flame. A spark, flame, or a small amount of heat will easily ignite methyl alcohol. Once burning, methyl alcohol fires are difficult to notice due to the almost transparent nature of the flames. To prevent accidents, make sure there are no flames, sparks or electrical equipment near the methyl alcohol. Always recap the methyl alcohol bottle after adding the alcohol to the Petri dishes, and remove the bottle from the demonstration area. Never add methyl alcohol to a hot container. Immediately clean up any methyl alcohol spills. Methyl alcohol is also toxic by ingestion and inhalation. Ingestion of only a small amount may cause blindness.
When performing the Oooh! Aaah! Style Flame Test demonstration, the following safety tips will help prevent an accident:
- Use only borosilicate glass (e.g., Pyrex®) Petri dishes. Do not use watch glasses—the methyl alcohol can easily spill out and spread the fire. Inspect the Petri dish and do not use if the Petri dish has any cracks or chips.
- Never add additional methyl alcohol to the Petri dish after starting or performing the demonstration. Once the first Petri dish containing methyl alcohol has been lit, never add more methyl alcohol to any of the Petri dishes since you now have an ignition source. Methyl alcohol vapors can travel very quickly, ignite and quickly flash back to the methyl alcohol bottle.
- Perform the demonstration in a well-ventilated area. If the laboratory is not well-ventilated and the methyl alcohol sits in the Petri dish for a few minutes, methyl alcohol vapors can accumulate and lead to a small flash fire. It is best to add the methyl alcohol, cap the methyl alcohol container, remove the methyl alcohol container from the area and then light the Petri dishes.
- Do not immediately repeat the experiment. Never add additional methyl alcohol to a Petri dish until it has completely cooled to room temperature. The heat from the Petri dish or salts can ignite the methyl alcohol.
- Be sure to perform the demonstration on a flame-resistant surface and remove all combustible materials from the demonstration area. We recommend placing each dish on a heat-resistant ceramic fiber square.
- Make sure the Petri dishes are at least three inches apart to prevent the fire from jumping from one dish to another.
- Be sure that the methyl alcohol fire is completely extinguished after the demonstration is complete.
- Have Petri dish covers or large beakers nearby so the flame can be easily extinguished by covering the fire, if necessary.
- Have a fire extinguisher readily available.
- Wear chemical splash goggles, chemical-resistant gloves and a chemical-resistant apron. All persons viewing the demonstration should also wear goggles.
- For best results, perform all demonstrations involving flames or explosions behind a safety shield.
By following these safety tips, the Oooh! Aaah! Style Flame Tests
can be performed safely and provide an exciting and easy method for teaching the emission spectra of metal ions.
Please consult your current Flinn Scientific Catalog/Reference Manual for general guidelines and specific procedures, and review all federal, state and local regulations that may apply, before proceeding. The methyl alcohol in the Petri dishes should be burned until the flames are extinguished or allowed to evaporate to dryness. The solid chlorides may be placed in the trash according to Flinn Suggested Disposal Method #26a.
Remove all flammable materials from the demonstration area. The demonstration must be done on a heat-resistant surface. Practice lighting and extinguishing the methyl alcohol.
- Place five Petri dishes in a row in front of your class.
- Add about 5–7 g of sodium chloride to one Petri dish. Repeat this step, adding 5–7 g each of the other four metal chlorides to separate Petri dishes.
- Use a Beral pipet to add 7–10 mL of methyl alcohol into each Petri dish.
- Place the cap on the methyl alcohol bottle and remove the bottle from the demonstration area.
- Turn down the lights, light the alcohol/salt mixture in each dish, and enjoy the show.
- Extinguish the flames with the Petri dish covers or with 600-mL beakers.
- All flames will start out blue in color or invisible but will change to the colors characteristic of the metal salts as they dissolve and the methyl alcohol burns off (strontium = orange, sodium = yellow, potassium = violet or purple, lithium = red, copper = green). When the flame burns out, do not add more methyl alcohol and relight. Wait until each salt has burned itself out and the Petri dish has completely cooled before repeating the demo.
- As an extension, have your students do flame tests at their own lab stations. Prepare 1.0 M aqueous solutions of the metal salts you want to test. Students then dip cotton swabs into the solutions, and hold the swabs in a Bunsen burner flame. Alternately, wooden splints can be soaked in the salt solutions overnight and then held in the flame to display the vivid colors.
- You can also do flame tests with barium chloride, calcium chloride and cesium chloride to show their characteristic colors.
- The copper(II) chloride will begin to burn after a few minutes. Be sure to thoroughly extinguish this fire.
Correlation to Next Generation Science Standards (NGSS)†
Science & Engineering Practices
Developing and using models
Obtaining, evaluation, and communicating information
Disciplinary Core Ideas
HS-PS1.A: Structure and Properties of Matter
HS-PS1.B: Chemical Reactions
HS-PS3.A: Definitions of Energy
HS-PS3.C: Relationship between Energy and Forces
HS-PS3.D: Energy in Chemical Processes
Cause and effect
Energy and matter
Structure and function
HS-PS3-2: Develop and use models to illustrate that energy at the macroscopic scale can be accounted for as a combination of energy associated with the motion of particles (objects) and energy associated with the relative position of particles (objects).
HS-PS1-2: Construct and revise an explanation for the outcome of a simple chemical reaction based on the outermost electron states of atoms, trends in the periodic table, and knowledge of the patterns of chemical properties.
HS-PS1-1: Use the periodic table as a model to predict the relative properties of elements based on the patterns of electrons in the outermost energy level of atoms.
HS-PS1-4: Develop a model to illustrate that the release or absorption of energy from a chemical reaction system depends upon the changes in total bond energy.
HS-PS1-5: Apply scientific principles and evidence to provide an explanation about the effects of changing the temperature or concentration of the reacting particles on the rate at which a reaction occurs.
Answers to Questions
- Name the metal ion present in each Petri dish and the flame color it produced.
Petri Dish 1 – The ion present was sodium, Na+. It produced a yellow flame.
Petri Dish 2 – The ion present was strontium, Sr2+. It produced a red-orange flame.
Petri Dish 3 – The ion present was copper, Cu2+. It produced a green flame.
Petri Dish 4 – The ion present was lithium, Li+. It produced a bright red flame.
Petri Dish 5 – The ion present was potassium, K+. It produced a violet flame.
- When an element or compound is placed in a burning solution, the atoms absorb energy and promote electrons to “excited” energy levels, which are different from their normal ground state. Explain how this creates colored light.
An excited electron must eventually return to its ground state. When it does so, it emits a form of energy, light.
- What is the name for the spectrum of specific wavelengths produced by exciting an element?
The spectrum of wavelengths for each excited element is called a line spectrum.
- Why is this spectrum different for every element?
The spectrum differs from element to element because each element has a particular group of electrons and energy levels. Therefore, the wavelengths of light are different because the energy states the element has electrons falling from and to are different.
You and your students will notice that each chemical emits a distinctive color of light. When the light of any of these flame tests is passed through a prism or viewed through a diffraction grating, a spectrum is formed that contains only a few colors at specific wavelengths, including the colors seen in the original flame.
If an element or compound is placed in solution and the solution is burned, the atoms will absorb energy and promote electrons to higher energy levels. This process is sometimes called “exciting” the electrons. As the excited electrons return to their normal or “ground” state, energy is emitted in the form of electromagnetic radiation. Simply stated: if an electron is excited via heat, that electron will become excited and emit light as it returns to its ground (non-excited) state (see Figure 1).
Every element emits a characteristic wavelength of light. Just as a fingerprint is unique to each person, the color of light emitted after excitation of an element is unique to that element. Only a few elements give off a characteristic light in the visible region of the spectrum. The visible region of the spectrum is that which is visible to the human eye (400–700 nm). For most elements, the characteristic color is detectable only in the ultraviolet or infrared region of the spectrum. The spectrum produced from exciting one element contains only specific wavelengths and is called a line spectrum (see Figure 2). The lines are due to the different excited electrons returning to their lower energy ground states. Since each element has a specific group of electrons and energy levels, the wavelengths given off by the falling electrons can be used to identify an element. Encourage your students to learn more about line spectra and flame tests by studying the Bohr model of the hydrogen atom, fireworks, quantization and astronomical spectroscopy.
The emission of a characteristic color (electromagnetic radiation) as the excited electron returns to its ground state has provided remarkable tools to the analyst in the form of analytical instrumentation (e.g., emission spectrophotometer, quantometer, flame spectrophotometer). In a crude way, this activity replicates the process used in these very sophisticated instruments. The very specialized instruments enable the analyst to detect:
- What is present? (Qualitative Analysis)
- How much is present? (Quantitative Analysis)
Special thanks to Rhonda Reist of Olathe North High School, Olathe, KS, for bringing this demonstration to our attention.
Ragsdale, R. O.; Driscoll, J. A. J. Chem Educ. 1992, 69, 828–829. | <urn:uuid:1257b02f-1023-4a50-8105-069246cee09a> | CC-MAIN-2022-33 | https://www.flinnsci.com/oooh-aaah-style-flame-tests/Document/?contentId=55cc9349-91ce-4647-a0f3-52dfc00fb721 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00205.warc.gz | en | 0.89095 | 2,597 | 3.03125 | 3 |
Updated July 15, 2022 – As we know Banks charge a small percentage of the purchase amount as an interchange fee from the merchants. While this may be only 2-3% of the amount but with so many transactions made in a day, it turns out to be a great revenue stream from the bank’s point of view.
How Do Credit Card Networks Make Money? — Credit card companies make money by collecting fees out of the various fees, interest charges, Service charges, etc. According to data from 2017, each active account makes $180 on average for credit card companies per year.
To simplify this we can safely assume that credit card companies are earning interest of 21% of the total on the outstanding balances. In other words, the amount spent on a credit card by the customers is fetching an interest rate of 21% to banks. From which line of credit, the bank can generate an interest income of 21%.
Credit card companies make the bulk of their money from three things: interest, fees charged to cardholders, and transaction fees paid by businesses that accept credit cards.
HOW DO CREDIT CARDS MAKE MONEY IF YOU DON’T PAY INTEREST?
For most issuers, the bulk of credit card companies’ profit comes from interest fees. These fees are charged by the issuer when you carry a balance on your card past your due date. Basically, when you make a purchase with your card, the issuer pays the merchant.
DO CREDIT CARD COMPANIES LIKE WHEN YOU PAY IN FULL?
Credit card companies love these kinds of cardholders because people who pay interest increase the credit card companies’ profits. When you pay your balance in full each month, the credit card company doesn’t make as much money.
HOW MUCH MONEY DOES THE CREDIT CARD COMPANY BRING IN JUST BY ADDING FEE REVENUE?
It was reported that Credit card companies made $176 billion in income in the financial year 2019- 2020; interest fees accounted for $76 billion
Credit card companies hauled in $176 billion in income in 2020, according to data from industry research firm MS. Hammer.
Despite the pandemic, credit card industry income came in just $2 billion lower than in 2018, and still managed to outpace the $163.2 billion brought in in 2016. Interest income made up 43% of industry income in 2020. Interchange income made up 29%. No other major category accounted for more than 10% of industry income.
While credit card companies are certainly raking in money from consumers through interest and other fees, the good news for the average credit card user is that most of those fees are avoidable.
Credit card users can avoid paying interest and penalty fees by paying off their credit card balance every month. Cash advance fees can be dodged by withdrawing cash with a debit card instead of a credit card. And some of the best credit cards will simply not have an annual fee.
Credit card companies were able to bring in $176 billion in 2020, despite the COVID-19 pandemic creating an economic shock that the world has yet to fully recover from.
That’s according to data from research firm R.K. Hammer, which shows that the credit card industry’s income in 2020 was just $2 billion below 2018 levels.
Used properly, a credit card can be among the most powerful financial tools available to consumers. The best credit cards offer cash rewards or travel rewards, sign-up bonuses, 0% APR offers, and no annual fees.
But credit card companies still make money off cardholders, even with all those perks. The main sources of revenue for credit card companies are interest income and interchange income.
Before diving further into the data, some terms could use defining:
Interest income:- is earned when customers keep a revolving balance and pay interest.
Interchange income:- is from fees paid by merchants when a transaction is carried out. Credit card companies charge this fee because they take on risk and process transactions. These fees vary.
Cash advance fees:- are paid by customers when they borrow cash against their credit limit.
Annual fees:- are yearly payments that keep a customer’s account open.
Penalty fees:-are imposed when a customer makes a late payment.
Enhancement income:- comes from services that can come with a user’s card or are available through it, such as insurance products.
HOW DO CREDIT CARD COMPANIES /MERCHANT ACQUIRERS MAKE MONEY?
How Visa posted $6.13 billion in net revenue in the second quarter of the financial year 20-2021.
Visa secured $6.13 billion in net revenue in the second quarter of 2021, after accounting for $2.13 billion spent on client incentives.
“Other revenues” made up the largest share of Visa’s revenue. This segment includes license fees required to use the Visa brand, fees collected for account holder services, revenue collected from optional services or product enhancements for customers, and other activities.
Data processing revenues, earned for authorization, clearing, settlement, network access, and other services that enable transactions, brought in $3.33 billion in revenue for Visa.
Service revenues, collected from client usage of Visa products and separate from data processing, accounted for $2.83 billion in revenue.
International transaction revenues are generated when cross-border transactions or currency conversions occur, which earned Visa $1.7 billion.
WHY DO YOU THINK CREDIT CARD COMPANIES OFFER A 0% APR HOW DO THEY MAKE MONEY BY DOING THIS?
Credit card companies generally make money off of fees and interest. So it’s understandably confusing that they would sacrifice the interesting part of the equation, if only for a limited time, especially since most 0% cards don’t charge annual fees.
The Three Main Reasons Why Banks And Credit Card Companies/Unions Offer 0% APR Credit Cards:
- To entice new customers:- Zero percent intro rates are eye-catching, and banks can market their other products to new cardholders in order to make money.
- To encourage more spending:- Credit Card companies make money from so-called interchange fees every time you make a purchase. And the more debt you rack up, the less likely you are to repay your full balance within the 0% term.
- To make money from interest. This might seem a bit counterintuitive, but issuers know that many people will carry a balance for longer than their 0% intro rate is available. And that’s when they hit you with a high regular APR. The current average is 17.86%. In other words, credit cards with no interest whatsoever don’t actually exist.
These reasons also help to explain why credit cards don’t have permanent 0% rates. And the fact that issuers offer 0% APRs to make money, not just out of the goodness of their hearts, is why you should always be on the lookout for hidden costs and deals that seem too good to be true.
“If consumers actually routinely borrowed at 0% without paying any fees or interest, it would be difficult for credit card companies to earn a profit on these deals,” said M. Sincovic an associate professor at the Seton Hall University School of Law who studies the credit card regulations and its serious impact. “Customers just really have to read the fine print, compare the total cost of borrowing the amount they need for the time they need it (including interest and fees) and be very, very careful.
WHAT IS THE AVERAGE AGE OF CARDHOLDER TO GET THEIR FIRST CREDIT CARD AND HOW THE SAME IS PROVIDED BY THE THE CREDIT CARD COMPANIES?
The path toward adulthood often begins with your first credit card, as building credit can open doors to many other financial milestones. In starting down this path, two things are paramount: First, choosing the right credit card for your financial needs and goals, and second, having responsible financial behavior once you’ve made your selection.
As it turns out, fiscal responsibility can become more or less likely depending on the age at which you first start using a credit card. Wanting to know more, we surveyed 1,001 credit card users to determine how earlier or later use of credit cards impacted their current financial standing.
The average age of first-time credit card holders: is 18 to 20:
So what is the average age of a first-time credit card holder? or If you want to know about Credit Card Under 18 Well, it depends on how you define it.
The first credit card a person owns may not exactly constitute true ownership. Parents and guardians may decide to extend a credit line from their accounts, establishing children as authorized users. When including authorized users, the average age Americans received their first credit card was 20. The majority 54.3% obtained their first credit card between the ages of 18 and 20, while just over 4% were younger than 18. Another 30% got their first credit card between the ages of 21 and 24.
Ultimately, this graph reveals a modern trend to begin lines of credit as college-aged adults. If you are currently in college or if you or your children plan to enroll, consult well-researched guides to determine the best student credit cards. Some cards offer benefits for good grades, while others focus on building solid credit histories.
HOW TO GET A CREDIT CARD FOR THE FIRST TIME
- See if you have a credit report and score.
- Determine whether student credit cards are an option.
- Compare secured and unsecured starter cards.
- Limit your search to cards with the lowest fees.
- Choose the best remaining offer for your needs.
- Confirm you have enough income.
CONCLUSION:- As we know CREDIT CARDS provide convenience to consumers, acting as both a method of payment and a flexible credit instrument. We may expect then that most consumers would pay a modest net monetary cost to access this convenience.
As we know that credit card is the property of CREDIT CARD COMPANY which is provided to you because a Credit Card can help you in launching a new business or paying for an education or doing online shopping. And most people like the convenience of using credit cards. Although it’s true that improper use of credit can be disastrous, credit properly used can enhance your life. If we want to have credit, we need to know how credit score works. | <urn:uuid:58b3dc24-b635-4d0a-acf6-09b34f2bff9a> | CC-MAIN-2022-33 | http://moneysubsidiary.com/how-do-credit-card-companies-make-money/?amp | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00403.warc.gz | en | 0.954059 | 2,166 | 2.515625 | 3 |
In 1977 astronomers detected the Wow Signal, a short powerful burst of radio waves from deep space. Its origin is still unexplained.
Space, as Douglas Adams observed, is really big. In fact, its infinite: a boundary-less, still expanding, expanse.
Among the endless stretch of space, a finite, though still very large, number of stars. In 2021, NASA estimated there are about 200 billion galaxies, containing 10 to the power of 22 (1 followed by 23 zeros) worth of stars. And many of these, accompanied by orbiting planets.
The numbers are staggering.
With so many world’s available, many scientists think that life elsewhere is close to inevitable. Some effort has even been made to calculate the probability.
In 1961, American astronomer Frank Drake formulated the ‘Drake Equation’, an attempt to give a mathematical structure to this question.
To arrive at an estimate of the number of civilisations in our galaxy, Drake combined estimates of contributing factors; the number of stars, planets, habitable planets, habitable planets where life may arise, and so on. An escalating order of difficulty to provide an overall estimate of the occurrence of intelligent life.
Drake’s original calculation arrived at an answer of 20 other galactic civilisations.
In the ensuing decades, other scientists have applied their own figures, and come up with a range of answers, everything from 1 (meaning we are alone in the universe), to many millions.
But if there is a chance that other intelligent life is out there, somewhere, another question arises. One that was most famously summarised by Italian physicist Enrico Fermi, when discussing the question with his colleagues:
‘Where is everybody?’
These conflicting ideas, the likelihood of other civilisations, and our lack of contact with them, is now known as the ‘Fermi Paradox’. To try and answer this question, scientists have attempted to detect possible communications from beyond the Earth.
Our primary method involves radio astronomy.
Radio astronomy was discovered by accident.
In 1932, Karl Guthe Jansky was an engineer working for Bell Telephone Laboratories, in New Jersey. Janskey was looking to reduce interference with radio and telephone communications, analysing short wave transmissions with a basic receiver.
Janksey’s antenna was 30 metres long and 6 metres high, and operated by hand. He would manually rotate the antenna, then sit in an adjacent shed, listening to the signals it picked up and and writing down his observations.
The main cause of radio interference he detected were thunderstorms, whose electric charge produced natural radio emissions.
But Janskey also detected something else: a faint, constant, static hiss. This interference seemed to come from everywhere, right across the sky, and he struggled to find an explanation.
Through careful observation, Janskey eventually determined that his hiss conformed to a pattern, that reset every 23 hours and 56 minutes. This perfectly matched the rotation of the earth, and suggested these radio signals were coming from deep space.
This accidental discovery caused a revolution in astronomy. World War II led to great advances in radio technology, and after the war this was deployed in the first, large scale, purpose-built radio telescopes.
Radio telescopes are slightly misnamed, in that radio waves are only one thing that they search for.
They are really electromagnetic radiation detectors, which span a spectrum of signals from intense gamma rays, through x-rays and visible light, through to low intensity radio waves.
Radio astronomy has vastly improved our understanding of the universe, being able to observe objects much further away, and fainter, than optical telescopes.
In 1959, Giuseppe Cocconi and Phillip Morrison, psychists at Cornell University, proposed a novel use for radio astronomy. They published a paper in the journal ‘Nature’, speculating on possible communications by an alien civilisation, and suggesting radio waves as the likeliest medium.
Radio waves do not require much power to generate, and can travel vast distances while retaining signal integrity. They are also relatively simple science, meaning an intelligent species should understand how to generate and detect them.
Hydrogen is the most common substance in the universe, and produces electromagnetic radiation at a frequency of 1420 Mhz. Cocconi and Morrison suggested aliens may use this frequency, as a kind of interplanetary calling card: the properties of hydrogen should also be understood by any advanced species.
Finally, they suggested the signal would likely be ‘narrow band’. This meant it would be concentrated at 1420 Mhz, rather than a range of frequencies, as this would conserve power. Narrow band transmissions have another advantage, as they rarely occur naturally.
Cocconi and Morrison’s ideas were hypothetical, but logical, and widely discussed.
In 1963, Ohio State University built its own radio telescope, dubbed the ‘Big Ear’.
The Big Ear had an unprepossessing design: it looked a bit like a half finished football stadium. Constructed in an open space, it featured two metal receivers, separated by a flat, 103 metre wide reflector.
The telescope could not move greatly, but would rather rely on the rotation of the earth, to allow it to examine different parts of the sky.
The speed of our planet’s rotation meant each receiver would view what it was observing for 72 seconds, before that spot rotated out of range. And the gap between the two receivers meant each one would look at the same spot, separated by a time lag of 3 minutes.
Big Ear was used by students and scientists, for a range of astronomical observations. Among these, in 1973 it began scanning the skies for signals of extra-terrestrial origin.
The suggested frequency of 1420 Mhz was included in the search parameters.
Big Ear surveyed the sky automatically, slowly accumulating data throughout the night.
The signals it detected were stored on a primitive hard drive, with a capacity of 1 megabyte. Every few days, a technician would print out the accumulated observations for analysis, wipe the hard drive, and reset the system.
The printouts showed a grid of letters and numbers, that reflected the intensity of any signals received. Each grid point represented an observation time of 12 seconds.
A blank space indicated nothing had been detected, a zero the lowest level of signal. The numbers would then climb, from 1 to 9, as the signal strength increased. If the signal grew even more powerful, the system would switch to letters, from A to Z.
Mostly, Big Ear detected nothing. Sometimes, the faint background noise of space, as originally observed by Karl Janskey.
Occasionally, it picked up a more powerful signal, but these had then been determined to be specific astronomical objects, or a terrestrial signal, of Earth origin.
On August 15, 1977, at 11.16pm, a powerful radio signal hit the first Big Ear receiver.
The system recorded its arrival, increasing strength, and then departure, as the rotation of the earth moved it out of range. When the second receiver scanned the same spot three minutes later, the signal was gone.
It would be several days before anyone knew what had happened. Jerry Ehman, a scientist attached to the project, was the first to see the signal’s detection:
‘Ehman was in his kitchen when he read the printout from Big Ear. He was sitting at the table, with three days data in front of him.
The signal came in as 6EQUJ5, the signature of a signal that steadily grows in intensity, reaches a peak, then falls away again. The U was the highest power signal the telescope had ever seen.
Ehman knew what Cocconi and Morrison had said about the likely shape of alien signals. This fit exactly. By anyone’s definition it was a narrowband signal at 1420 Mhz.’
– Michael Brooks, ’13 Things That Don’t Make Sense’
In his excitement at what he was looking at, Ehman circled the signal on the printout and wrote the note alongside it that would give it its name: Wow!
But as soon as the Wow signal had been detected, it revealed additional layers of mystery. For starters: Big Ear could not find it again.
Right from the first analysis, Ehman and his colleagues thought it strange that the second receiver had not also detected the signal. There had been a brief, intense radio signal from the sky, that the same equipment could not relocate, 3 minutes later.
Big Ear would return to examine the same location in the following days, and then hundreds more times over the following years. Other radio telescopes would try the same thing. The signal has never been detected again.
And so the scientists turned into detectives, trying to determine what the data they did have was telling them. It was a process of elimination, as they crossed off potential sources.
For starters, they looked to see if an existing astronomical object occupied that place in the sky.
The Wow signal originated in the constellation of Sagittarius, part of a formation also known as ‘The Teapot’. Astronomical charts and observations from other telescopes indicated this was empty space.
No known object was found in this location.
They then scrutinised records of satellites and objects in earth’s orbit, to see if one of these could provide an explanation. Terrestrial aircraft were examined as well.
There was also no record of any craft within range of the observatory, at the time the signal was received.
Ehman and his colleagues wondered if it could be an earth based signal, bouncing off the atmosphere, or even off debris, and so appearing to originate in space. They analysed satellite transmissions, radio transmissions, TV broadcasts, aircraft communications, and other defense signals; none of them matched the data.
This solution has an additional problem: the bandwidth of 1420 Mhz, where the Wow signal was received, is prohibited from use by global agreement. No official transmissions use this frequency.
Over the ensuing years, then decades, scientists continued to review the data. But for lack of new information, the case eventually went cold.
The university eventually sold the land Big Ear stood on. The telescope was demolished in 1998.
In 2017, news headlines dramatically announced that the mystery had been ‘solved’.
Professor Antonio Paris, of St Petersburg College, had detected a pair of previously unknown comets, that would have crossed Big Ear’s path in 1977. Professor Paris claimed these as the signal’s origin.
But despite the initial excitement, this explanation was quickly debunked. While the comets were real enough, they do not produce signals of the type detected by Big Ear. Once scientists examined the claim in detail, it was noted that no other comets had been observed to, either.
The Wow signal remains, officially, unsatisfyingly, unexplained. There is likely a non-alien explanation, many long-standing mysteries in science are eventually solved, but what this is remains elusive.
Jerry Ehman keeps an open mind. He has told journalists that he doesn’t believe the Wow signal is proof of extra terrestrial intelligence, but he is still waiting for that better explanation.
One unusual aspect of the Wow signal is its brevity, and non-repetitive nature.
If it was an alien civilisation signalling, why would they beam a transmission only once, for less than three minutes? This surely makes no sense.
Except: we have done this same thing ourselves.
In 1974, scientists at the Arecibo radio telescope in Puerto Rico broadcast a powerful radio message, directed at the globular star cluster M13. M13 is about 25 000 light years distant, and thought to be a good candidate location for extra-terrestrial life.
The message was the brainchild of Frank Drake, of Drake’s equation, and was worked on by famed astronomer Carl Sagan. In binary code, it delivered information outlining atomic numbers of common elements, basic chemistry formula, and graphics of our DNA, the Solar System, and the telescope that sent it.
It was a playful exercise, sending a message out into the universe, announcing our presence, without ever hoping for a response.
The duration of the signal? It was broadcast once, for less than 3 minutes. | <urn:uuid:bffe04b9-2856-4a0c-af4c-3c0120db4644> | CC-MAIN-2022-33 | https://www.museumoflost.com/the-wow-signal/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00405.warc.gz | en | 0.964718 | 2,556 | 3.84375 | 4 |
Today we tend to think of Confectioner as someone who sells or makes Chocolates and Sweets. This was not the case in the 1800s. In 1830s a confectioner would have been a shop keeper who made a wide range of goods in his back room – such as cakes, pastries, breads, boiled sweets, treats, chicory and ginger products, wine and event goods. Early sweets were known as “Spice” (a term that is still used in slang for sweets). Chocolate was a very expensive and bitter drink. Taffy (later toffee) was a home-made fudge like mixture or very hard (like bonfire toffee today). There were no big brands, very little advertising (as newspaper space was heavily taxed) and no mass production. Those confectioners that embraced the changing methods and markets brought about by the Industrial Revolution became the household names we know today.
Predominately it was entrepreneurs from the non-conformist religious communities that embraced confectionery as a business opportunity and drove its evolution into mass production. Confectionery, especially chocolate, was seen as wholesome, clean, food, which is why so many Quaker names are associated with the trade. Non-conformists were barred from universities and professions that required swearing an oath. The Church of England tithe system drove them off the land as it reduced farming profits and brought a conflict of principle.
- 1756 – Joseph Fry opens his first shop in Bristol. 1787 – Fry’s business starts using water power to grind and mix.
- 1822 – Joseph Fry & Sons Ltd established.
- 1823 – Coleman started grinding mustard near Norwich.
- 1825 – First use of word “Toffee” in Oxford English Dictionary.
- c1825 – Sugar plantations (the slave trade) make sugar available in bulk at a price suitable for the masses.
- 1831 – Cadbury open first small factory in Birmingham.
- 1832 – Import Duty on cocoa greatly reduced allowing the cocoa market to start growing away from luxury.
- 1840 to 70s – The move from rural to urban economy drives the need for mass production. Railways come to move goods quickly, steam power to drive machines.
- 1841 – Huntley and Palmer’s Biscuits partnership started near Reading.
- 1842 – George Bassett becomes wholesale confectioner in Sheffield.
- 1845 – First chocolate bar invented by Fry’s.
- 1851 – Revolutionary chocolate mixing machines from the Continent displayed at The Great Exhibition.
- 1853 – Gladstone further reduced cocoa import duty to one penny a pound, making cocoa available to the masses.
- 1853 – George Cadbury in Birmingham receives a Royal Warrant – turning their business around from struggling to growth.
- 1855 – Newspaper stamp duty abolished making advertising affordable.
- 1860 – Food Adultery legislation to stop harmful items being used to bulk out food products.
- 1846 – Robert Peel repeals Corn Laws allowing flour based products to be produced on large scale – Huntley & Palmer’s start to grow.
- 1868 – First patent for printing on tin – the start of selling prepackaged food and consumerism. Huntley & Palmers first put their biscuits into tins.
- 1869 – Joseph Rowntree becomes confectioner in York.
- 1870s – Cadbury produce first chocolate assortments.
- 1875 – Offset Lithography printing invented making fancy tins production in bulk possible.
- 1875 – Trade Mark legislation introduced.
- 1876 – First Register of Trade Marks started.
- 1881 – Rowntree’s invent the Pastille.
- 1890 – Mackintosh’s of Halifax established and introduce newly invented toffee – blending English Butterscotch style with caramel from America.
- 1890s – Electricity becomes common in factories.
George Bassett – Maynard Basset
Today we tend to think of Confectioners as someone who sells or makes chocolates and sweets. This was not the case in the 1800s. In 1830s a confectioner would have been a shop keeper who made a wide range of goods in his back room – such as cakes, pastries, boiled sweets, wine and ginger products. Predominately it was entrepreneurs from the non-conformist religious communities that embraced confectionery as a business opportunity and drove its evolution into mass production.
After serving a seven-year apprentice as a confectioner, Bassett began his career as a shopkeeper and wholesaler of good including wine from 1842 – 1859, expanding into several shops.
George Bassett first moved into the manufacture of confectionary in 1859 with his first factory on Portland Street mainly making candied peel and lozenges. His business partner at the time was William Lodge. Bassett and Lodge seem to have known each other through the Wesleyan Methodist Church. William Lodge is also buried in Sheffield General Cemetery (Z77).
George Bassett was married twice. George’s first marriage produced six daughters, his second marriage two sons. Both wives are buried with George in Sheffield General Cemetery (KK146). Bassett was a local politician and became Mayor of Sheffield, entertaining the former USA President Grant. As a publicity stunt Bassett once baked a Monster Cake for a client, which alas wasn’t cooked properly and caused much debate in the newspapers!
But it was when Samuel Meggitt Johnson joined Basset & Co in that Bassett’s business really began to grow into a successful and major manufacturing confectioner. Johnson’s influence came from his apprenticeship at Bassett’s (when he lived as part of the family), his partnership with George Bassett and his marriage to the Bassett’s eldest daughter. In 1860’s Johnson became a partner. In 1870 Johnson’s wife (Bassett’s daughter) died in childbirth.
George Bassett became seriously ill following a stroke in 1878 and had to give up business, handing over the control of Bassett’s to Johnson. This was the period when Liquorice Allsorts were created and Bertie Bassett born. At some point between 1878 and 1888 Johnson establishes his own confectionery company called Don Confectionery Co. Ltd. This business move would appear to be a risk mitigation strategy regarding the future of Bassett’s. In 1892 there was a serious fire at the factory for which Bassett’s was inadequately insured. Johnson went on to become sole proprietor of Bassett’s. Johnson’s sons went on the run the company until Cadbury’s took over.
Around 1886, a new recruit started at Don Confectionery – Joseph William Thornton, who previously was a shopkeeper. Thornton became an apprentice confectioner. Thornton went on to found his own confectionery empire – now Thorntons PLC.
Samuel Meggitt Johnson, with his wife Marianne, is buried in Ecclesall Cemetery in an impressively huge tomb. In Sheffield General Cemetery, Johnson’s full brother Samuel William and his half brother Samuel Elijah Meggitt are buried in plot L171.
The Simpkin Family – Simpkins Sweets
Who remembers the excitement of getting a little icing sugar dusted sweet from pretty tin kept in the glove box on a long car journey to the seaside? A. L. Simpkin & Co. Ltd are one of Sheffield’s most famous and iconic sweet makers. The firm was set up by Albert Leslie Simpkin in 1921 on his return from World War One during which he was awarded the Military Cross.
After being demobilised from the army in 1920 as a result of the effect of severe wounds, he became a retailer and wholesaler of sweets. His business idea was to manufacture high quality glucose sweets using, wherever possible, only natural flavours and colours. Albert Simpkin had been given liquid glucose to recover from his wounds in WWI. Finding it was not available in solid form, he decided to concentrate on making glucose sweets. Simpkins sweets all contained barley drops which was also proven to reduce travel sickness. Albert then developed the idea of a travel tin, an airtight container to package his sweets. The problem with this was that because of their high juice content the sweets easily went sticky. This was where the idea of adding the white sugar powder developed, thus an iconic British travel sweet brand was born.
In the early 1920s, he purchased a burnt out refrigeration factory in Hillsborough and built his own 40,000 square foot purpose built factory. He marketed his sweets through chemists and pharmacies, an astute move as the confectionary market was highly competitive. Within three years had established a thriving business employing 180 staff.
During the Second World War, when sweets were rationed, manufacturers were only allowed to sell in certain areas of England, Simpkins was only allowed to sell in north of Birmingham. Simpkins high-grade glucose sweets were produced for RAF air crew on high altitude missions. The company also supplied glucose sweets to the 1953 British Mount Everest expedition when Tenzing Norgay and Edmund Hillary reached the summit of Everest on 29 May 1953 so Simpkins sweets have reached the top of the world as well as all four corners. Legend has it that Prime Minister Margaret Thatcher may have used Simpkins’ liquorice Nipits to help her with voice control during her time as prime Minister.
The sweets were also becoming an international brand, Simpkins travel sweets were among the first English confectionery sold in Japan. The fact that Simpkins sweets already contained natural ingredients enabled them to conform to the strict Japanese regulations on ingredients. Today the sweets are sold to over 40 countries throughout the world and Simpkins today produce over 2,000,000 sweets (35,000 tins) a day. The company are still based in Sheffield and still sell through chemists and pharmacies along with high end confectionary retailers.
Vintage Simpkins travel tins have become collectable in their own right. The artist who created the artwork for Simpkins 1950’s Dilly Duckling Cough Pastilles tin (pictured) also illustrated Enid Blyton’s classic children’s books.
The connection to Sheffield General Cemetery is through Albert Leslie’s father who was also called Albert, he is buried in plot number FF 68. Albert Simpkin is listed in the 1901 census as living with his wife Bertha. They went on to have four children including Albert Leslie who went on to found the Simpkin sweet brand. Members of the Simpkins family have always been local and are listed as having lived at Hunter House Road, Ranby Road and Steade Road, all not far from here. Albert Leslie was listed as being a ‘Grocer’s warehouse assistant’ in the 1911 census. Our records show FF 68 (non conformist) was owned by Albert Simpkin of 32 Steade Road. The plot was bought for his ‘true and loving’ wife Bertha P Simpkin who ‘entered into the home of Jesus, her saviour and friend, on January 10th, 1932 aged 67 years’. Albert Simpkin father of Albert Leslie died aged 91 in Firvale Infirmary 1 Jan 1961. | <urn:uuid:2dc7db6b-0c28-41d3-9b66-461ded8f6929> | CC-MAIN-2022-33 | https://gencem.org/stories/confectioners-corner/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00403.warc.gz | en | 0.97534 | 2,385 | 3.359375 | 3 |
Frequently Asked Questions about COVID-19
A novel coronavirus (SARS-CoV-2) that causes Coronavirus Disease 2019 (COVID-19) first emerged in Wuhan, China in December 2019. Cases have been detected in most countries worldwide, and on March 11, 2020, the World Health Organization characterized the outbreak as a pandemic. Human-to-human transmission occurs through close contact.
Note: Information about COVID-19 can change rapidly. View the latest information on the current outbreak from the Centers for Disease Control and Prevention (CDC).
- Who is at greatest risk of serious illness?
- How does COVID-19 affect pregnant women?
- What are the symptoms? How can you tell the difference between the novel coronavirus and a cold or influenza (flu)?
- What are the symptoms in children?
- What should you do if you think you may have been infected or exposed?
- Are you contagious before you develop symptoms?
- How is COVID-19 spread?
- What can you do to protect yourself?
- Do face masks protect against COVID-19?
- When do I need to quarantine?
- When should I get tested?
- What tests are available to detect COVID-19?
- Are there any treatments available for COVID-19?
- Should ivermectin be used to treat COVID-19?
- Stop the Spread
- What is social distancing?
- Are certain activities safer than others?
- COVID-19 Variants
- What is a variant?
Who is at greatest risk of serious illness?
Although COVID-19 can affect anyone, individuals at greater risk of severe illness from COVID-19 include the following:
- Older adults (the risk for severe illness increases with age)
- People with certain medical conditions like cancer, chronic kidney disease, chronic lung disease, dementia, diabetes (type 1 or type 2), down syndrome, heart disease, HIV, liver disease, and sickle cell disease
- Those living in a nursing home or long-term care facility
- Obesity (body mass index [BMI] >30)
- Pregnant women
- Those who have a weakened immune system
How does COVID-19 affect pregnant women?
Pregnant women with COVID-19 may be more likely to experience preterm birth and severe illness from COVID-19 than non-pregnant individuals.
COVID-19 vaccination is recommended for everyone age 5 years and older, including women who are pregnant, breastfeeding, trying to get pregnant, or who may become pregnant in the future. Pregnant women should also take steps to reduce their risk of getting sick, including proper handwashing, social distancing, and wearing a face mask in public.
Pregnant women should also get vaccinated against whooping cough and influenza (flu) during each pregnancy to help protect themselves and their baby. Learn more about vaccines recommended during pregnancy.
What are the symptoms in children?
Children with COVID-19 may have mild, cold-like symptoms, such as fever, runny nose, and cough, and some children experience vomiting and diarrhea. Occasionally, a child gets really sick after being infected with COVID-19. There have been some rare reports of children who have multi-system inflammatory syndrome (MIS-C). Parents are advised to call their pediatrician if their child has any of the following symptoms:
- a fever that will not go away
- stomach pain, diarrhea, or vomiting
- rash or changes in skin color
- pink or red eyes
- trouble breathing
- confusion or extreme tiredness
What should you do if you think you may have been infected or exposed?
If you have symptoms or think you may have been exposed to COVID-19, you should get tested as recommended by CDC. Follow CDC guidance to determine whether you need to stay home or wear a mask. If you test positive, contact a healthcare professional who may recommend treatment.
Are you contagious before you develop symptoms?
COVID-19 can be spread before symptoms develop, which can pose a problem because people who do not know they are infected may continue to go to work, school, and other public places. People who are sick and have symptoms are more likely to stay home, creating fewer opportunities for the virus to spread from one person to another. When a virus is spread by people without symptoms, additional measures may be needed, such as social distancing, isolation, or quarantine.
How is COVID-19 spread?
The virus that causes COVID-19 is spread through respiratory droplets when an infected person coughs, sneezes, or talks. Studies have shown that COVID-19 may also be spread by those who do not show symptoms.
What can you do to protect yourself?
Everyone should practice the following healthy habits to help prevent the spread of COVID-19:
- Get vaccinated against COVID-19
- Wear a face mask as recommended
- Practice social distancing—stay 6 feet apart
- Wash your hands with soap and water for at least 20 seconds
- Avoid touching your eyes, nose, and mouth
- Cover coughs and sneezes with a tissue
- Avoid close contact with people who are sick and stay home if you are sick
Do face masks protect against COVID-19?
Yes. Face masks can help prevent an infected individual from spreading the virus. Even if you are up to date on COVID-19 vaccinations, the Centers for Disease Control and Prevention (CDC) recommends wearing a mask in certain instances, and you still need to follow guidance at local businesses and workplaces. COVID-19 is still circulating, and people are still getting sick and dying.
Face masks are not recommended for children less than 2 years of age or for individuals who have trouble breathing or who cannot easily remove them.
When do I need to quarantine?
If you were exposed to COVID-19 and are not up to date on COVID-19 vaccinations, CDC recommends that you stay home and quarantine for at least 5 full days. If you were exposed to COVID-19 and are up to date on COVID-19 vaccinations, you do not need to stay home unless you develop symptoms.
View CDC Quarantine and Isolation (Q&I) Calculator for customized information for unique situations.
When should I get tested?
CDC recommends that you get tested if you have symptoms or think you have been exposed
What tests are available to detect COVID-19?
There are currently three types of COVID-19 tests authorized by the US Food and Drug Administration (FDA), although none are a substitute for vaccination:
- Molecular tests are used to detect the genetic material of SARS-CoV-2, the virus that causes COVID-19. Molecular tests are fairly accurate and can be used to diagnose the disease.
- Antigen tests are a new category of tests that can quickly detect fragments of the virus from nasal swabs. Antigen tests can provide results in minutes, but they are not as sensitive as molecular tests. Positive results from antigen tests are highly accurate, but negative results may need to be confirmed with a molecular test.
- Antibody (or serology) tests detect the body’s immune response to COVID-19 by looking for antibodies in the blood to help determine prior exposure. When the body is fighting an infection or has fought an infection, antibodies can be found in the blood. These tests do not detect the actual virus but are used to identify people who have been infected with the virus in the past.
FDA has issued emergency use authorizations for home use self-administered tests, including molecular tests, antibody and other immune response tests, and antigen tests. Accuracy varies among all of the tests.
Are there any treatments available for COVID-19?
The Food and Drug Administration (FDA) has approved treatments for certain patients who are more likely to get very sick from COVID-19. If you do test positive, call a healthcare professional immediately to see if treatment is right for you.
The National Institutes of Health (NIH) has developed treatment guidelines for COVID-19 to help healthcare professionals make appropriate recommendations.
Should ivermectin be used to treat COVID-19?
No, ivermectin should not be used to treat COVID-19. The drug is approved for use in animals and humans to treat certain infections caused by parasites such as worms or head lice. There is no evidence that ivermectin is effective against COVID-19. If misused or overused, the drug can cause nausea, vomiting, diarrhea, confusion, hallucinations, seizures, coma, and even death.
COVID-19 vaccination is approved by FDA and is the safest and most effective way to protect against severe disease and death from COVID-19.
Stop the Spread
Are certain activities safer than others?
In general, outdoor visits and activities are safer than indoor activities, and smaller gatherings are safer than crowds. The best way to protect yourself is to stay up to date on COVID-19 vaccination.
What is a variant?
Genetic variations of viruses, known as mutations, are common and expected. SARS-CoV-2, the virus that causes COVID-19, will naturally mutate over time.
A variant occurs when there have been several significant mutations to the virus. Variants are of concern when they affect:
- disease spread
- disease severity
- tests used to detect the virus
- vaccines and treatments
Updated May 2022
Sources: American Academy of Pediatrics, Centers for Disease Control and Prevention, Food and Drug Administration
Learn more about coronaviruses at www.nfid.org/coronaviruses | <urn:uuid:c911cb9d-a22e-497b-bec0-16079175047e> | CC-MAIN-2022-33 | https://www.nfid.org/infectious-diseases/frequently-asked-questions-about-novel-coronavirus-2019-ncov/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00205.warc.gz | en | 0.944723 | 2,085 | 3.3125 | 3 |
Get the Inside Scoop on Maypops (a type of passionflower)!
STORY BEHIND THE NAME
Maypops (Passiflora incarnata) are called maypops for a reason, as the fruit make a popping noise when crushed. Try it out sometime and see for yourself! Other theories on the origin of the name are that the vines generally emerge from the ground in May (very late compared to most other plants) or that the name might have evolved from the Algonquin word “mahcawq” or “maracock”.
Maypop is a specific species native to North America and are part of the passionflower genus, Passiflora. This genus has around 550 species, with the majority compromised of vines, in addition to some shrubs and trees. Maypop is one of the few species that produces an edible fruit in the Passiflora genus. It is also the hardiest of all the passionflowers. It’s pretty neat that the Mid-Atlantic region has its own version of a passionfruit growing wild. The name Passionflower also has a bit of a story behind the name. It was named by Spanish colonists in the Americas, who claimed that the flower reminded them of the passion of christ (the crucifixion). In Israel, Greece, and Japan, the plant is known as ‘clock-flower’ or ‘clock-plant’. It’s clear that the flower brings up many different associations for people all over the world.
POP had an opportunity to engage with maypops when the staff made a field trip to the Experimental Food Network in Elmer, NJ in 2021 and received some maypop cuttings from Nate Kleinman while visiting. The cuttings were planted outside the fence surrounding the nursery at the Learning Orchard in the Woodlands, POP’s headquarters. We look forward to being able to further propagate these maypops at our nursery and offer them to our orchard partners going forward.
The maypop is a fast-growing vine, with grasping tendrils, spanning up to 25 feet long. The vine is herbaceous (dies back to the ground in winter), with either a smooth or hairy texture, and has 3-lobed, serrated leaves, but it’s the flower that really stands out. Though the flower can vary, the variety of Maypop growing in these parts typically has a purple, fragrant, frilly flower in a flat saucer shape with five petals, thread-like filaments (called a corona), and prominent reproductive organs (stamen and pistil). It is pollinated by bumble bees and carpenter bees and is self-fertile, meaning the pollen is transferred from male reproductive organs to female reproductive organs on same flower or a different flower on the same plants. The flower blooms in July and the edible fruit appears soon after, ripening in the fall. Once July hits, the vines blossom and set fruit for a long time, so one vine can have both young and old fruit at the same time.
Please read our disclaimer at the end of this article before consuming any maypops.
To be clear, even though maypops are a type of passionflower, they do not produce passionfruit, which come from another species that grows in a warmer climate, Passiflora edulis. Maypops produce…maypops! The fruit is oblong in shape and roughly the size of a hen’s egg. It starts out green and turns yellow as it ripens and will fall when fully ripe. The fruit is filled with pulp and seeds. An underripe maypops top the charts in sourness. However, when ripe, the seeds are a perfect balance of sweet and sour. Each seed is surrounded by a juicy flesh, similar to pomegranate seeds. The fruit can be eaten out of hand. The seeds and pulp taste good eaten raw. The rind can be eaten raw but is better when its cooked. The juice can be consumed fresh or used in juices, jams, preserves, and flavoring processed foods. Speaking of juices, did you know that Hawaiian Punch is passionfruit flavored? Not exactly maypop flavored, but not far off!
Now that we know how delicious the fruit is, where can we find it? Maypops are typically found growing in sandy soil in thickets, riverbanks, disturbed areas, pastures, and along roadsides. They are hardy from zones 7-11, with Philadelphia being just warm enough for them to survive winters in the ground. In some harsh winters, Maypops will not survive in pots in zone 7. They prefer sunny areas with medium-moisture soils that are well-drained and can tolerate partial shade and drought. Maypop is a voracious grower, as is common with many vining plants, and spread aggressively by underground runners, so be cautious about where they are planted. We recommended planting them in pots or in strips of isolated land surrounded by pavement or mowed grass where it is contained and can’t spread. Though it is native, their aggressive habits can be problematic in some situations. Despite its vigorous growing nature, it can be a beneficial and beautiful plant to have around. Maypops are important host plants for butterflies and important pollinator plants for carpenter bees and bumble bees, so it can boost the ecological activity in a garden. The fruit is also well-liked by wildlife.
If trying to grow this plant, it’s unlikely you will have much trouble. Need convincing? In ideal conditions, they can grow up to 20 feet a year! Maypop can be purchased, grown by seed and/or cutting.
To germinate from seed, its best to use them when they are fresh from the fruit. They do not store well and have a shelf-life of one year.
- If using older seeds, to improve germination rate you can take some sandpaper and rub it against the seed and soak in lukewarm water for 24 hours. Throw out any floating seeds.
- Plant 1/4 inch deep into moist potting mix or seed starting mix.
- Plant it in a sunny location with loose, well-drained soil.
- Cover with a lid or ventilated plastic to keep up humidity.
- Once they germinate, take off lid/plastic and place in sunny location and keep soil moist.
To grow from a cutting, use younger stems that are softer and easy to break.
- Cut off 4-6 inch cuttings just below the node.
- Remove lower leaves and tendrils.
- Dip in rooting hormone if you have it.
- Stick cuttings about half an inch into well-draining potting mix.
- Lightly water and then cover with a clear, ventilated plastic bag.
- Place them in a shady location and keep them warm and moist.
- Once you notice new growth (typically in a month or so), you can move them to their permanent locations.
Maypops spread prolifically by undeground runners, so you can also just dig up rampant sprouts and pot them up with their roots. Cut back some of the top growth to give them the best chance.
Once you have your maypop plant in its permanent location, preferably in a sunny location, you can place mulch around the roots to keep them cool. Grow them against a trellis or arbor to accommodate their climbing nature, but unlike most passionflowers, they will still bloom even if they aren’t climbing vertically.
Please read our disclaimer at the end of this article before consuming any maypops.
Maypop has a long history of use in North America as a sedating and calming herb. The leaves and flowers can supposedly be used to soothe anxiety and promote more restful sleep. Herbalists also claim that it can help with attention deficit hyperactivity disorder, insomnia, and inflammation. It is full of antioxidants and is considered to be anti-inflammatory. It can typically be found in tea form, infusion form, capsule form, and tincture form. They are also traditionally used topically as poultices to help heal cuts and bruises.
2 cups ripe maypops
1 cup water
2.5 cups sugar
1.75 ounces pectin
Combine maypops and water. Bring water to a boil and boil gently for 5 minutes. Then strain, discarding the pulp. Combine liquid and sugar and bring to a full boil. Add pectin and again, bring to a full boil. Remove from heat, pour into sterilized jars, and seal. Makes 2.5 pints.
1 cup maypop pulp
2 tbsp. honey
2-3 tbsp, white vinegar
0.5 cup extra virgin olive oil
Salt and freshly ground white pepper
Combine all ingredients in a blender. Blend until smooth and emulsified. Add salt and pepper, to taste. Use right away or store in fridge for up to a week. Makes 1.5 cups.
The information presented on this website is for informational, reference, and educational purposes only and should not be interpreted as a substitute for diagnosis and treatment by a health care professional. Always consult a healthcare professional or medical doctor when suffering from any health ailment, disease, illness, or injury, or before attempting any traditional or folk remedies. Keep all plants away from children. As with any natural product, they can be toxic if misused.
The Philadelphia Orchard Project stresses that you should not consume parts of any wild edible plants, herbs, weeds, trees, or bushes until you have verified with your health professional that they are safe for you. As with any new foods that you wish to try, it is best to introduce them slowly into your diet in small amounts.
This POP Blog was written by Orchard Assistant Simone Shemshedini.
SUPPORT US! If you found this entry useful, informative, or inspiring, please consider a donation of any size to help POP in planting and supporting community orchards in Philadelphia: phillyorchards.org/donate. | <urn:uuid:fc2b5223-43bd-4d6c-8171-6d84ede7657c> | CC-MAIN-2022-33 | https://www.phillyorchards.org/2022/05/25/passionate-about-passionflowers/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00205.warc.gz | en | 0.945261 | 2,172 | 2.765625 | 3 |
Just about everyone has heard of Puerto Rico's most famous (or, rather, infamous) monster, the Chupacabra. It's a fact, though, that there are other mysterious creatures on the island, too. Let's have a look at giant birds. Pucho is someone who I interviewed on Puerto Rico back in 2005 with Canada's Redstar Films. Not too long earlier, he'd seen a very strange creature, but it definitely wasn't a Chupacabra. He was walking past a local place of worship when he heard a very strange noise: it was a loud, almost bellowing, roar. It filled the air and brought Pucho to a sudden halt. He looked around for a few moments and then, to his horror, saw what was responsible. Perched in a large nearby tree was a huge, bird-like creature, but one which was easily the size of a fully-grown man; possibly even bigger. It was covered in feathers and once again bellowed in fear-inducing fashion. What happened next amazed Pucho. He said that the creature didn’t fly away in the fashion that one would expect from a bird. Incredibly, it simply opened its wings and – instead of flapping them furiously – rose up into the skies above with what seemed to be barely an effort. In seconds it was gone. It was a fascinating day. A mysterious one, too. Now, onto another one of Puerto Rico's monsters that is definitely not a Chupacabra.
In September 1959, a groundbreaking paper – Searching for Interstellar Communications, written by Cornell University physicists, Phillip Morrison and Giuseppe Conconi – was published in the pages of Nature. The paper was focused upon the idea of searching for extraterrestrial life via the medium of microwaves. Approximately eight months later, one Frank Drake decided to test the theories and ideas of Morrison and Conconi for himself. Drake did so at the Green Bank National Radio Astronomy Observatory, located in West Virginia. Despite lasting for 150 hours, the search of the heavens for evidence of messages from alien intelligences was not successful. Drake, however, was not to be dissuaded or defeated quite so easily as that. In October 1961, the very first conference on what became known as the Search for Extraterrestrial Intelligence (SETI) was convened at Green Bank. It was here that Drake unleashed his now famous and much championed Drake Equation upon the world, and which is an admittedly controversial method for attempting to ascertain the scale of intelligent civilizations that may exist in the known universe. Since then, SETI has been at the forefront of research into the search for alien life.
When Frank Drake elected to make it his life’s work to search for alien intelligences, he went down a road that eventually led him to the Arecibo Radio Telescope, which is located on the island of Puerto Rico, and where he, Drake, eventually rose to the position of Director. As Drake noted in his 1994 book, Is Anyone Out There?, it was at some point early in his tenure as Director – in the mid-1960s – that a guard at the observatory claimed to have seen a sinister-looking man dressed in a black cloak “walking the narrow trail around the perimeter of the bowl.” The guard was of the opinion that the dark figure was nothing less than a blood-draining – and blood-drinking – vampire. Despite his skepticism, Drake politely accepted the guard’s report and agreed to at least take a look at it. Forty eight hours later, said Drake, “I really was forced to look into it…because a cow was found dead on a nearby farm, with all the blood drained from its body. The vampire rumor spread had already spread through the observatory staff, and now the cow incident whipped the fears of many people into a frenzy.”
Now, onto nothing less than a vampire. At least, by name. It was known as the Moca Vampire – its name taken from the municipality of Moca, which can be found in the northwest of the island, and which is home to around 40,000 people. Unlike the Chupacabra – sightings of which continue to this very day – the “Vampiro de Moca,” as it was referred to on Puerto Rico - was a monster of a definitively “here one minute and gone the next” kind. The controversy all began in late February 1975. That was when the population of Moca was plunged into a collective state of fear. And it was hardly surprising. Numerous ranchers reported how their farm animals were being violently slaughtered under cover of darkness and systematically drained of massive amounts of blood. The first area targeted was the Barrio Rocha region, where several goats, at least four pigs, numerous chickens, and more than a dozen cows, were all found dead, with puncture marks on their bodies, and deep claw-like wounds on their skin, and all missing one vital ingredient: blood. Villagers and farmers were as outraged as they were terrified. Local authorities, and chiefly the police, tried to diffuse the controversy by attributing the attacks to nothing stranger than the work of packs of wild dogs – a theory that, almost inevitably, was received with nothing but scorn, skepticism, and disdain.
By the end of the first week in March 1975, the death count was close to three dozen. It was in this same week that an important development was made: the blood-sucking culprit was finally seen, up close and personal, so to speak. The witness was a woman named Maria Acevedo, who caught sight a monstrously-sized, screaming and screeching winged beast that landed atop her home, and which clambered about her zinc roof, making an almighty racket in the process. And it was clearly no normal bird: around four to five feet in height, it was described as being similar in appearance to a pterodactyl, a presumed-extinct, flying reptile of the Jurassic era. Whatever the true nature of the monster, it quickly took to the skies and vanished into the starry darkness. Less than forty-eight hours later, a farmer named Cecilio Hernandez contacted the police after more than thirty of his chickens were killed in a fashion that was quickly becoming attributed to the predations of the Moca Vampire. It was at the same time that Hernandez’ story was widely being reported on Puerto Rico that a potential answer to the puzzle was uncovered: two huge snakes were killed in Moca, just before they were about to attack a cow belonging to a rancher named Luis Torres. Of course, this didn’t explain the winged monster that Maria Acevedo reported only days earlier. And, it didn’t resolve the many and varied additional killings that continued to plague the people of Moca. In addition, while snakes will typically take down and devour – whole, no less - significantly-sized animals, they will not, and cannot, suck blood in either small or large proportions. In other words, while the snake theory might have been a small component of the saga, it most certainly didn’t explain everything.
On March 18, 1975, the monster struck again. On this occasion, the victims were a pair of goats owned by Hector Vega, of Moca’s Barrio Pueblo. Once again, the culprit had struck in its typical fashion of draining the goats of their blood – and, in this case, of all the blood. The creature was not done with Vega, however. On the following night no less than seventeen animals were attacked, of which ten were killed, due to deep, penetrating wounds, trauma, and massive blood loss. Five days later, a pig was found dead by farmer Felix Badillo. Blood was removed in significant amounts, and there was a hole in the head of the animal, which gave every appearance of something powerful being violently thrust into the skull. On top of that, one of the pig’s ears was missing – in a fashion that, rather intriguingly, was attributed to a surgical procedure. No wonder the people of Moca were as puzzled as they were alarmed. Forty-eight hours later came the most astonishing development: Juan Muniz was attacked by a huge, bird-like animal that swopped down upon him from above, as he walked through Barrio Pulido. He struggled and fought as the winged nightmare did its very best to force Muniz to the ground. In his panicked, adrenalized state, Muniz managed to escape and alert the authorities.
Then, as April began, the Moca Vampire began to expand its hunting ground: attacks began to be reported all across the island, with farm animals again drained of blood, of rumors of attacks on people, and even of a police cover-up of the facts to prevent a public panic exploding. The attacks continued into May – and then into June, too. By this time, hundreds of animals were said to have fallen victim to the blood-drinking monster, and with barely an answer to the problem in sight. As it transpired, however, matters came to a sudden, inexplicable halt. Shortly before the end of June, the sightings, encounters and attacks were no more. Whatever the true nature of the Moca Vampire, it vanished as quickly as it originally surfaced. Such was the terror is provoked, however, the creature is still discussed, in hushed tones, in Moca to this very day. Now, onto the Bigfoot of Puerto Rico.
One of the people I interviewed on my latest trek to the island was a ghost-hunter and paranormal investigator named Peter - who was originally from Berlin, Germany, but who moved to Puerto Rico to live in 1996. Peter was someone whose accounts of Bigfoot activity on Puerto Rico were as fascinating as they were controversial. By that, I mean the reports had far less to do with what one might call unknown animals, and far more to do with what might justifiably be termed downright paranormal anomalies. It's important, at the very outset, that I stress Peter was not someone whose files on Bigfoot in Puerto Rico were overflowing. In fact, it was quite the opposite. The number of reports in his archives was less than twenty and which spanned from the 1970s to 1998, and with a spate of reports in 1985. Typically, the beasts closely resembled the North American Bigfoot. That's to say there were large, humanoid, covered in dark hair, and solitary. While most of the reports emanated from - or around - the island's huge El Yunque rain-forest, two were - rather incredibly - reported from the fringes of Puerto Rico's capital city, San Juan. As all of this demonstrates, Puerto Rico really is an island of monsters. Even without the Chupacabras. | <urn:uuid:1d4670fc-d766-4921-95cf-49cbe067f31e> | CC-MAIN-2022-33 | https://mysteriousuniverse.org/2022/05/Monster-Island-Mysterious-Creatures-of-All-Creepy-Kinds/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00005.warc.gz | en | 0.988118 | 2,229 | 3.015625 | 3 |
Before the End Times sequence of events leading up to the Second Coming can be determined, it is important to first understand the major turning points or sign posts of history from a Biblical perspective. The primary sign posts of history that have been preordained by the Lord each have served to bring all of creation, and particularly mankind, closer to the ultimate goal of eliminating this current evil system of sin and replacing it with the goodness of the Kingdom of God. The final result also will eliminate the bad influences of Satan and the evil angels that rebelled with him sometime in the distant past. Thus, as history moves forward along the arrow of time, we come closer to the point when perfection and everlasting life will replace corruption and death, and righteousness and goodness will replace sin and evil.
When looking at the chronological sequence of these events from the beginning to the end, an overall Biblical perspective of history becomes apparent. In fact, from the very earliest events at the dawn of creation all the way up to the making of the new heavens and the new earth, the entire Word of God can be seen to have a purpose that is directed at redeeming the creation through Christ from the effects of sin and evil.
The associated illustration shows a timeline of this overall chronology from a high level view. Although the relative positioning of each event is accurate on the timeline, the dates that each event occurred (or will occur) and the time periods between all of the events are not known. For instance, the date for the creation of the universe cannot be determined precisely, but modern science has revealed that it likely took place a very, very long time ago—some 13-14 billion years into the past. In addition, it is equally impossible to determine exactly when Adam and Eve were created, although we know that it was much closer to our time than to the creation date.
For those that may have trouble with the concept of an ancient universe, it turns out the Bible really isn’t in conflict with the idea of a very old creation. In fact, within Genesis the six “days” of creation can actually be interpreted from the original Hebrew as six “epochs” or “eons” of time. This would imply six time periods of much longer duration than just six 24-hour days. In the creation account, the Hebrew word “yom” is used in each of these six sections, which in the English Bible is translated as “day”. However, the word yom in the Hebrew language can also be interpreted in alternate ways. It is accepted that it can mean 1) a 12-hour time period, 2) a 24-hour time period (or one complete day), or 3) a long, indefinite time but of finite length (in other words, an eon or epoch of time). The proper interpretation for this word is typically determined by the context of the sentence and the meaning derived from the surrounding text.
Even in the English language, the word day can have multiple meanings. We often talk about a long period of time as being a day. For instance, we can refer to the time when the dinosaurs were alive as being during the “day of the dinosaurs”. We don’t mean a 24-hour period, but an epoch of indefinite length that encompassed the time when the dinosaurs were alive and roamed the Earth.
When we look at the creation story, many of these “days” of creation contain events that require much longer periods of time to occur than just a single 24-hour day. This includes the creation of a universe so vast that we can’t possibly comprehend the distances involved between stars and galaxies. In addition, when we understand that the heavier elements that make up our planet and other matter in the universe can only be formed within the enormous energy and pressures of a supernova explosion, it actually demands a creation that is billions of years old, not just a few thousand years old. The iron core of our world, for instance, was exclusively made in the high energy fusion processes at the center of giant stars much larger than our sun. The heavier elements in the universe were fused together from lighter elements when those stars underwent their death cycles and exploded in some of the most energetic explosions in the cosmos. None of these events happened in mere days; they happened over hundreds of millions and even billions of years to seed heavier elements on Earth and make life possible.
The need for longer time periods than just one day also includes the growth of plants to bear fruit and the animals in the seas and on land to be “fruitful and multiply” and fill the Earth. These natural processes of replication and expansion of populations of plants and animals need many years to occur, not single days. What God has revealed through science over the last few centuries actually correlates very well with the creation account in Genesis. With the scientific knowledge that God has given us, it now becomes apparent that the entire creation occurred over much longer time periods than the traditional interpretations allow. Therefore, the translation of “yom” as being limited to one “day” must be incorrect. The six days of creation are really six eons of God’s creative activities.
This is entirely consistent with an infinite God that has no beginning and no ending and is not limited by our simplistic views of time and space. Over the last two centuries knowledge of the universe has increased dramatically, revealing the truth of God’s creation, which was hidden to previous generations. This is just as the prophet Daniel predicted. He said that knowledge would be increased in the Last Days (Dan. 12:4), and so it is.
We now have a much better understanding of the immensity of the universe and thus of the glory of the God that created it. The Lord has revealed to our generation more than any other generation before it. The fundamental properties of the universe are so amazing that it makes God even more glorious than we at first imagined. The unbelievable vastness and wonders of the universe have been illustrated in the many images that advanced telescopes like Hubble have provided in recent decades (for an example, see the NASA web site images). It is hard to deny that the creation itself shows the eternal glory of God and is a powerful proof of his eternal nature and majesty (Psalm 19:1; Romans 1:19-20). Even Daniel called God the Ancient of Days to reflect how old he really is (see Dan. 7:9, 13).
We now know that the observable universe is estimated to be more than 93 billion light years in diameter and contains hundreds of billions of galaxies each having hundreds of billions of stars (note: one light year is the distance that light travels in one year or almost 6 trillion miles!). The size of the universe indicates that God is far beyond our ability to fully comprehend.
The Lord said that he is the Alpha and the Omega—the Beginning and the End (Rev. 22:13); therefore, God existed billions of years ago and he will continue to exist billions of years from now. Only such an incredible God could plan the future of mankind and predict events long before they were destined to occur! For those that love him, his Word reveals His plan for the Last Days and His promise of eternal life in the ages to come.
Even from this broad overview of Biblical history, it is relatively easy to see how the events of the end fit into the plan of God and where mankind is headed in the future even beyond the Second Coming. It is also clear that the pivotal points of Biblical history revolve around relatively few events and that most of them would not even be noted by secular historians. Nevertheless they are crucial for a complete understanding of Biblical prophecy and to understand where the End Times fits into this picture. Therefore, all of history including prophetic events that are still in our future can be broken down into the following defining moments:
1. The creation of the universe and the Earth
2. The creation of life and man
3. The fall of man
4. The Flood
5. The call of Abraham
6. The Exodus of Israel from Egypt
7. The scattering of the Northern Kingdom of Israel
8. The fall of Jerusalem and the scattering of the Southern Kingdom of Judah
9. The First Coming of Christ
10. Destruction of the Temple and Scattering of the Jews throughout the Earth
11. The Rebirth of Israel
12. The Second Coming of Christ
13. The Kingdom of Heaven
14. The Final Judgment, and
15. The New Heavens and New Earth
These 15 events represent the most important turning points in the Lord’s plan for man as described in the Bible. Of course, if we were to look in greater detail at any one of these seminal events, we would discover that there really are many additional details surrounding each one that are also important. For instance, the events surrounding the creation of the universe and the creation of life contain far more details than could fit on a single chart of history—and even far more elements than God reveals in the Bible in terms of the secrets of physics and biology.
In addition, when God’s plan for man is finally complete, the establishment of the nation of Israel in faith will have actually taken place progressively over the course of many thousands of years and involved a rocky road of blessings and cursings before their destiny would finally be realized (see the sections on Israel for more details). Similarly, the sequence of events at the End of the Age includes much more than just the primary events of the Second Coming and the setting up of the Kingdom of Heaven.
Thus, this first timeline doesn’t show a lot of detail about the Last Days, but instead looks upon the overall course of world history at a high level so we can see the major turning points. This timeline doesn’t include any of the finer aspects of End Times prophecy or of the chronology of events just before the Second Coming. At this stage, we can only see that the rebirth of Israel leads to the Coming of Christ, which in turn leads into the Millennial (1000-year) Kingdom, but nothing more. In reality, there are many more details that occur just prior to the Return of Christ that are not possible to show in this first chart. In the next section, we will begin to fill in these details, especially related to the nation of Israel.
Next: Israel in the Last Days | <urn:uuid:1ea78581-eb75-4e6b-ab08-033962b4eaf0> | CC-MAIN-2022-33 | https://endtimestruth.com/end-times-chronology/the-sign-posts-of-history/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00405.warc.gz | en | 0.955544 | 2,134 | 3.265625 | 3 |
|127th (Manchester) Brigade|
|Part of||42nd (East Lancashire) Division|
Battle of Romani
Battle of Passchendaele
Battles of the Somme (1918)
Hundred Days Offensive (1918)
General Sir Herbert Lawrence|
Brigadier Sir John Smyth, VC
The 127th (Manchester) Brigade was a formation of the British Army during World War I and World War II. It was assigned to the 42nd (East Lancashire) Division and served in the Middle East and on the Western Front in WWI. In WWII it was at Dunkirk and was then converted into an armoured support group.
World War I
On the outbreak of World War I, the men volunteered for overseas service and the division embarked at Southampton and sailed for Egypt on 10 September 1914, the first TF division to leave England for foreign service. The division began disembarking at Alexandria on 25 September and the bulk (including the Manchester Brigade) concentrated at Cairo.
Order of Battle
- 5th Battalion Manchester Regiment (from Wigan)
- 6th Battalion Manchester Regiment (from Hulme)
- 7th Battalion Manchester Regiment (from Manchester)
- 8th Battalion Manchester Regiment (from Ardwick)
- 127th Brigade Machine Gun Company (formed 14 March 1916)
- 127th Trench Mortar Battery (joined 23 April 1917)
The following officers commanded The East Lancashire Brigade during World War I:
- Brigadier-General N. Lee (wounded 4 June 1915)
- Lieutenant-Colonel Lord Rochdale (acting)
- Brigadier-General Hon. H.A. Lawrence (from 21 June 1915)
- Brigadier-General G.S.McD. Elliot (from 22 September 1915)
- Brigadier-General V.A. Ormsby From 1 Mar 1916, killed 2 May 1917)
- Brigadier-General Hon. A.M. Henley (from 5 May 1917)
Egypt and Gallipoli
The East Lancashire Division remained in Egypt training and manning the Suez Canal defences until 1 May 1915 when it embarked at Alexandria for Gallipoli. The Manchester Brigade first went into action at the Third Battle of Krithia
In late May 1915 the division was numbered as 42nd (1st East Lancashire) Division – taking the lowest number of any TF division in recognition that it was the first to go overseas – and the brigades were also numbered, the East Lancashire becoming 127th (1st Manchester) Brigade. The battalions adopted the prefix '1/' (becoming 1/4th East Lancs, for example) to distinguish them from their 2nd Line duplicates then training in the UK as the 199th (2/1st Manchester) Brigade in 66th (2nd East Lancashire) Division.
The 127th Brigade participated in the Battle of Krithia Vineyard (6–13 August) and then for the rest of 1915 was engaged in trench warfare. After the evacuation from Gallipoli, the division returned to Egypt in January 1916 with less than half the strength with which it had set out. It remained in the Canal Defences for the whole of 1916, rebuilding its strength, and taking part in the Battle of Romani (4–5 August).
In January 1917, 42nd Division was ordered to France, the move being completed by mid-March. It spent the remainder of the war on the Western Front. During 1917 it formed part of Fourth Army in 'quiet sectors' (though the brigade commander was killed in May that year) and taking part in some minor operations along the Flanders coast.
In 1918 the division became part of IV Corps in Third Army, in which it remained for the rest of the war. When British infantry brigades were reduced to three battalions in February 1918, 1/8th Manchesters transferred to 126th Brigade in 42nd Division. At the same time, the machine gun company left to join a new divisional machine gun battalion.
During the German Spring Offensive (Operation Michael or the First Battles of the Somme 1918), the troops of 42nd Division took part in the Battle of Bapaume (24–25 March), First Battle of Arras (28 March) and the Battle of Ancre (5 April). Then, during the Allied Hundred Days Offensive, it participated in the Battle of Albert (21–23 August) and the Second Battle of Bapaume (31 August–3 September) during the fighting on the Somme.
When the Hindenburg Line was breached during the Battle of the Canal du Nord on 27 September, 127th Brigade's attack was completely successful. The rest of 42nd Division then passed through to continue the attack. 125th Brigade's follow-up was only partially successful, but the advance was renewed after dark, and the following afternoon 126th Brigade passed through 127th to take Welsh ridge, the final objective.
Third Army's advance in Picardy culminated in the Battle of the Selle on 20 October.126th Brigade led the division's attack over footbridges laid by the engineers over the River Selle. 1/5th and 1/6th Manchesters of 127th Brigade then followed up to an intermediate objective. The division then had to wheel right, and was held up. But in the afternoon the attack was resumed and 127th Brigade pushed on to the final objective, which 1/6th Manchesters took after dark without much difficulty.
After the Selle, 42nd Division was withdrawn into reserve and halted around Beauvois-en-Cambrésis from 24 October until the advance was resumed on 3 November. On 7 November the 42nd Division captured Hautmont and the high ground to its west. By 10 November the most forward troops of 42nd Division were on the Maubeuge–Avesnes-sur-Helpe road. This was the end of the fighting, because the Armistice with Germany came into the effect the following day. In December the division moved into quarters in the Charleroi area and by mid-March 1919 most of its troops had gone home for demobilisation.
World War II
The 42nd (East Lancashire) Division and its components were reformed in the Territorial Army in 1920. On the outbreak of World War II 127th Infantry Brigade once again mobilised as a 1st Line formation.
Order of Battle
127 Brigade was constituted as follows during World War II:
- 4th Battalion East Lancashire Regiment
- 5th Battalion Manchester Regiment (transferred to 126 Bde 8 September 1941)
- 8th Battalion Manchester Regiment (until 6 May 1940)
- 1st Battalion Highland Light Infantry (from 6 May 1940)
- 127th Infantry Brigade Anti-Tank Company (formed 2 February 1940, disbanded 24 January 1941)
- 2nd Battalion Durham Light Infantry (8 September–19 October 1941)
- 1st Battalion East Lancashire regiment (from 126 Bde 25 October 1941)
The following officers commanded 127 Brigade during World War II:
- Brigadier V.T.R. Ford
- Brigadier K.J. Martin (from 24 November 1939)
- Brigadier John Smyth, VC (from 5 February 1940)
- Brigadier R.C. Matthews (from 2 April 1941)
- Brigadier C.C.G. Nicholson (from 28 October 1941)
127 Brigade landed in France on 24 April 1940, where 8th Bn Manchesters were sent on to Malta and the brigade received the Regular 1st Bn Highland Light Infantry in exchange. When the German attack on France and the Low Countries began, 127 Bde was assigned to 'Macforce', a scratch force commanded by the Director of Military Intelligence with the British Expeditionary Force, Lt-Gen Noel Mason-Macfarlane. Macforce assembled on 17 May with the role of covering the crossings over the River Scarpe As German pressure increased, the BEF was forced to withdraw and 126 Bde returned to 42nd Division on 20 May. It was evacuated from Dunkirk on 30 May.
On 1 November 1941, 42nd Division was converted into 42nd Armoured Division, and 127 Bde was renamed 42nd Support Group. Apart from 1st Bn East Lancashires, its infantry battalions were replaced by artillery regiments. On 1 June 1942 the support group was disbanded, its headquarters becoming the Royal Artillery HQ for the division.
- Becke, pp. 35–41.
- Edmonds, pp. 44–8.
- Edmonds, pp. 338–9.
- Edmonds, p. 510.
- Joslen, p. 312.
- Lord Gort's despatch, London Gazette, Supplement 10 October 1941 http://www.london-gazette.co.uk/issues/35305/supplements/5899
- Joslen, p. 222.
- Maj A.F. Becke,History of the Great War: Order of Battle of Divisions, Part 2a: the Territorial Force Mounted Divisions and the 1st-Line Territoral Force Divisions (42–56), London: HM Stationery Office, 1935/Uckfield: Naval & Military Press, 2007, ISBN 1-84734-739-8.
- Maj A.F. Becke,History of the Great War: Order of Battle of Divisions, Part 2b: the 2nd-Line Territorial Force Divisions (57th–69th), with the Home Service Divisions (71st–73rd) and 74th and 75th Divisions, London: HM Stationery Office, 1937/Uckfield: Naval & Military Press, 2007, ISBN 1-84734-739-8.
- Brig-Gen Sir James Edmonds, History of the Great War: Military Operations, France and Belgium 1918, Vol V, 26th September–11th November, The Advance to Victory, London: HM Stationery Office, 1947/Imperial War Museum and Battery Press, 1993, ISBN 1-87023-06-2 .
- Lt-Col H.F. Joslen, Orders of Battle, United Kingdom and Colonial Formations and Units in the Second World War, 1939–1945, London: HM Stationery Office, 1960/Uckfield: Naval & Military, 2003, ISBN 1-84342-474-6.
- John North, Gallipoli: The Fading Vision, London: Faber & Faber, 1936.
|This page uses Creative Commons Licensed content from Wikipedia (view authors).| | <urn:uuid:62b60e1d-4145-474b-ba49-17966afd2ce3> | CC-MAIN-2022-33 | https://military-history.fandom.com/wiki/127th_(Manchester)_Brigade | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00403.warc.gz | en | 0.946703 | 2,474 | 2.921875 | 3 |
The British did little to integrate the population, largely leaving each community to itself. Singapore gained independence in 1959 and joined the Union of Malaya in 1963 but was expelled in 1965. The next five years were marked by the "policy of survival." From 1945 until the early 1970s, the island had severe housing shortages and a poor infrastructure, high criminality and unemployment, racial riots, and communist uprisings. The "survival policy" was based on the attraction of foreign investment through low taxes, the development of an efficient infrastructure, a disciplined workforce, and strict political control. In thirty years Singapore changed from a rough trading port to a rich, orderly, industrialized society. The remembrance of social and economic difficulties influenced the development of a national culture with a focus on wealth and stability and the idea of multiculturalism.
There are wide income and wealth differences, but the country is more differentiated by ethnicity than by class. All the ethnic groups have experienced upward occupational mobility. There is an intense focus on education. Good marks are a sure path to good positions with good wages. In this respect, Singapore is a meritocracy. Singaporeans jokingly refer to their desire for the "five C's": car, condominium, credit card, club membership, and career. These are important symbols of wealth and status regardless of ethnicity. There is no national costume, but the orchid is used as a national symbol, and textiles with orchid patterns may be employed as a national symbol on formal occasions.
Singapore is a republic with a parliamentary system. The head of state is the president, who is elected for a fixed term of six years. The parliament is elected in a general compulsory election every five years. There are also six nominated members of the parliament. The cabinet is the executive organ of the state, and execution of government policies is carried out by ministries and statutory boards.
The People's Action Party (PAP) has maintained a large majority in the parliament since 1965, with only a few seats held by politicians from opposition parties. The road to a political position through the cadre system of the PAP lies in educational and professional merit as well as loyalty. The other parties are led by politicians with strong personalities.
The crime rate is low. The judiciary system is based on the British legal system. The death penalty is imposed for drug smuggling, and caning is still used as a punishment. In addition, there are fines or other penalties for a wide range of transgressions, such as throwing litter on the floor, urinating in the elevator, and engaging in politics outside registered political parties. Both military and civil defense are well developed, and the armed forces are equipped. Two and a half years of compulsory military service are required for males..
Social welfare is financed through the Central Provident Fund (CPF), a public savings scheme. Employees under age 55 and their employers contribute a fixed amount of a worker's salary into an individual account administered by the CPF. This account provides financial security for old age and can be drawn on for housing and medical and educational costs. Charity is an important aspect of the financing of social welfare. Care of the old, sick, and disabled is in the hands of families and relatives. Three different agencies provide some social services for members of the three ethnic groups. Independent social work units also carry out some social work. Many of the nearly five thousand registered societies are directly or indirectly linked to the government. Among the rest, very few can be defined as nongovernmental organizations (NGOs) in a strict sense, but they form the basis of the civil society. A pattern of division according to ethnic distinction exists, but there are many no ethnic associations and societies. Nearly 80 percent of men and about 50 percent of women are employed. Women have joined the workforce in large numbers but are underrepresented in leadership positions in all areas and institutions.
Polygamy is allowed among Muslim Malays, but otherwise monogamy is the rule. Interethnic marriages are not common. Divorce is becoming more common. The average age at first marriage has increased, and it is customary for young people to live with their parents until they marry. The basic household unit is the nuclear family, which constituted 85 percent of resident households in 1990. Close links with relatives on both the husband's and the wife's sides are usually maintained. The proportion of households without a family nucleus shrank from 26 percent in 1957 to 8 percent in 1980, reflecting the changes from an immigrant to a settled population. Males dominate as heads of households. Traditionally, sons inherited family assets, while daughters were expected to marry out of the family. This pattern is less common today.
Kin groups play a significant role in all ethnic groups, and people often move within wide networks of relatives. Privately, kin groups are important, but politically and economically, they play a marginal role.
Children are brought along in most situations except business and very formal events. Small children are showered with affection. Generally, children are expected to be quiet and obedient and may be physically punished for misbehaving. There is very little free space where children can play and few areas designed especially for children. Children are thought to hold the key not only to their own future but also to the future of their families, and education is regarded as extremely important. There is a range of private and public nurseries, kindergartens, and play schools. Children start school at age six. There is a great emphasis on higher education. Children spend six years in primary school and four years in secondary school and then go on to a vocational school or university, depending on their grades (a sure way to higher education in Singapore) or money (a university education abroad). Competition for entrance to the best schools is fierce.
Older people ideally are treated with respect, but wealth and status may supersede age distinctions. A social superior or an authority is treated with much formality. There are great differences between formal and informal events, situations, and places. In social interaction, a certain physical distance is kept, especially between men and women. Food rules of the ethnic groups are always respected. There is freedom of religion with some exceptions. Singapore has been described as one of the most religious countries in the world. The major religions are Islam (Malay), Hinduism (Indians), Buddhism, Taoism, and folk religion (Chinese), along with a substantial number of Christians of various denominations. Religious experts vary from formally installed priests and teachers representing the institutionalized religions to self-ordained shamans, healers, and sorcerers. The many Chinese and Indian temples, Malay mosques, and Christian churches are the main public arenas for religious activities. Much religious activity is also carried out in the home. There are different "street festivals" according to the ritual calendars of the different ethnic groups.
A well-developed modern medical system consists of private and public clinics and hospitals. Traditional medical beliefs and practices are also common. The national holiday is on 31 August and is celebrated with military parades and culture shows at the national stadium. The ethnic public holidays are divided nearly equally among Chinese, Malay, Indian, and Christian holidays. The most important ethnic holidays are the Chinese New Year and the Malay Muslim Rahmadan, both celebrated in January–February, and the Indian Deepavali or Festival of the Light, celebrated around September–October. A common complaint is that Singapore has no culture, and the fine arts have a limited public. The government subsidizes some art institutions and events, but generally there is little public funding. The different ethnic groups have their own artistic traditions and focus on arts. The contemporary generation is more focused on contemporary art forms. Singapore has well-developed scientific institutions. Priority is given to technology and applied science. There are two universities: The National University of Singapore, a full-scale university with all disciplines, and the Nanyang Technical University.
The total population of Singapore is 5.47 million in 2014 of whom 3.87 million are citizens or permanent residents. The three major ethnic groups within the local community are Chinese (74 per cent), Malay (13 per cent) and Indians (9.1 per cent). Singapore has four official languages: Chinese (Mandarin), English, Malay and Tamil. English is the language of administration and commerce and is widely spoken across the island. The schism between local Singaporeans and foreign workers marks something of a shift in Singapore's ethnic relations. Historically, social tensions were seen as arising from relations between local ethnic groups, with the 1960s race riots between the Chinese and Malay populations being the most prominent example. In an attempt to manage ethnic relations, the Singapore government implemented an official multiracialism policy which clearly defined Singapore's four official races – Chinese, Malay, Indian and 'Other' (read: Caucasian), or CMIO for short. It did so by reference to a combination of physical markers, languages and religious beliefs to which members of those categories are expected to adhere. For example, a person of Chinese descent is automatically perceived as someone who speaks Mandarin and adopts Chinese traditional spiritual beliefs, whereas someone of Malay descent is thought of as someone who speaks the Malay language, is a follower of Islam, and so on.
The state has aimed to show fairness to all four groups through policies that give equal rights to each. For example, each ethnic group gets the same number of religious holidays per year and equal use of official languages in public spaces. This is not to say that the CMIO system has been without criticism. Some argue that it is overly rigid and does not reflect the complexity of daily life in Singapore. For example, it does not account for people of multiple ethnicities or ethnic origins other than the ones acknowledged in this system. Others point out that the CMIO system gives unfair advantages to the more numerous and economically privileged Chinese Singaporeans (Singapore maintains a ratio of approximately 76% Chinese, 14% Malay, 8% Indian and 2% Other). For instance, publicly subsidized housing is apportioned based on the island's racial ratio, in effect making it easier for a Chinese household to buy and sell a flat than it is for other ethnic groups. Despite these frustrations, however, Singapore generally has managed to avoid a repeat of the ethnic tensions that flared up in the 1960s.
In other respects, ethnic diversity has been viewed not as a source of vulnerability, but as one of the city-state's most significant economic assets. Singapore is one of the only states created post-WWII to have officially moved from developing to developed country status. Especially since the 1990s, Singapore has worked to position itself favourably within an increasingly globalized knowledge economy by using the presence of Chinese, Indian and Malay populations, as well as the widespread use of English, to market itself as an ideal gateway linking Western countries with some of Asia's fastest-growing economies: Mainland China, India and Bahasa-speaking countries of Southeast Asia, such as Indonesia and Malaysia. Increasingly, Singaporean citizens are taking issue with the state's economic rationale for bringing in so many foreign workers. In February 2013, the government released its Population White Paper, which stated that of Singapore's 5.3 million residents, currently 40% are foreigners and foreign-born. Moreover, the government foresees this number increasing to nearly 50% of the population by 2030.
According to the White Paper, this increase is needed to support Singapore's aging population, to have the workforce needed to deliver the same level and quality of public services to citizens, and to maintain Singapore's economic growth. Many in the public, however, did not buy the state's argument. After the White Paper's release, approximately 5,000 Singaporeans organized in protest. Unlike inter-ethnic tensions decades earlier, this was an instance in which locals of all ethnicities consolidated themselves as Singaporeans in voicing their frustrations with a state policy that they viewed as favouring foreigners over citizens..
The "Singaporeans first" argument that has started to emerge is grounded in the feeling that Singaporean citizens, not foreigners, should be given priority in reaping the benefits of the city-state's economic success. For instance, in 2003, Singapore set up its Global Schoolhouse platform, which aimed to attract world-class universities and students. The move was a way for Singapore to profit from the business of international education by marketing the quality of its education while also promoting itself as a safe and secure environment for new education institutions and the brightest international students.
Originally, admission to local universities was based only on merit, regardless of the applicant's nationality. The result was that many admissions slots went to international students, many of whom were perceived as receiving more financial assistance for their education than did locals. Whereas state authorities saw long-term benefits to the economy in recruiting the next generation of global talent to study in Singapore, members of the public emphasized that Singaporean students should be first in line to benefit from the city-state's world-class education so that they can better themselves, their family situations and the country as a whole. In response, the government reformed the system to allow some national quotas for admission.
Another recent example of a local Singaporean-foreigner divide is the 2011 Cook Curry Movement. The incident arose when a Chinese foreign household filed a complaint about the smell emanating from a neighboring apartment where an Indian Singaporean family was cooking curry, a national food staple. The government, using the local mainstream media, attempted to publicize the 'success' of a mediation centre's decision, which was to get the Indian Singaporean household to agree not to cook curry when the complaining neighbors were at home. But locals interpreted this as the government siding with the foreign household. They quickly organized through social media the Cook and Share a Pot of Curry Movement, urging all Singaporeans to cook curry on a single day (August 21, 2011). Since then, National Cook Curry Day has become a yearly event that coincides with Singapore's National Day on August 9 to remind Singaporeans that it is necessary to limit the extent to which foreigners' concerns are accommodated, especially when such accommodations are seen as opposing national symbols.
Various government officials have interpreted local Singaporeans' reactions to migrant labour issues in a negative light, viewing them as xenophobic and anti-foreigner. However, public sentiments could also be interpreted as a reaction to the rapid internationalization of daily life in Singapore, and as a re-examination of what it means to be Singaporean in terms of rights, privileges and status as procured by the government to its citizens. It should be noted that these discussions have not excluded foreign workers and foreign students. In fact, some of these discussions focus on foreigners' lack of social integration and the failure of Singaporeans to fully recognize the contributions many of these workers make to Singapore's economy and society.. | <urn:uuid:9775701e-3345-479c-bdcb-949e99895eab> | CC-MAIN-2022-33 | https://singapore-academy.org/index.php/en/education/library-media-center/singapore-presentation/item/219-social-and-economic-relations-of-singapore | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00404.warc.gz | en | 0.968823 | 3,018 | 3.8125 | 4 |
How to keep safe in supermarkets, schools and on public transport
Advice on how to reduce your risk and those around you of contracting Covid-19
Lockdown is easing and schools are returning. But in some parts of the country the coronavirus epidemic is escalating. It’s an anxious time, and there are likely to be multiple waves of outbreaks of Covid-19 over the next two years, unless a vaccine becomes available sooner. If we are to live our lives, there are no guarantees against infection. But it’s all about reducing risk to ourselves and others by not becoming infected over a very short period of time which will overwhelm our health care services. We must also protect the most vulnerable (elderly and those with chronic medical conditions) from severe illness and death.
Things we can do to reduce the chance of becoming infected with any pathogen are rarely foolproof. So it’s important to understand that even if all the advice here is followed, the chances of being infected remain but will be much less and the rate of spread of the virus will be slowed down.
There is no shame in being infected with any infectious disease, coronavirus included. It doesn’t mean you have poor hygiene or have necessarily been careless if you become infected. And if you are infected you can still take steps to reduce the risk of passing the virus on to other people.
Whenever you are outside of your home, there are key steps that you can take to reduce your risk of being infected, as well as lowering the risk of you infecting others. These include:
Social distancing: This means physically keeping a distance of 1.5 metres or more from other people whenever possible, thereby reducing the chance of droplets containing virus from their breath or cough, being inhaled or landing on your skin and being transferred to your eyes, mouth and nose when you touch your body, and then your face.
Hand Hygiene: Washing your hands with soap and water or alcohol-based hand sanitizer is very important in reducing the chance of you inadvertently transferring virus from contaminated surfaces to your eyes, mouth and nose. Carry hand sanitizer with you if possible and perform hand hygiene after touching items in public places such as shops, malls and public transport.
Keep your hands away from your face: One of the main ways that we become infected with coronavirus is when we touch our mouth, nose and eyes with contaminated hands. Learn not to touch your face when out and about, and as little as possible even at home.
Masking: Wearing a cloth mask is more about collective responsibility than protecting yourself. The principle is that the cloth mask will reduce the spread of virus from people who are infected. As 50-80% of people that are infected with the virus will not have any signs of an illness, but can still transmit the virus, it’s important that we all wear a cloth mask when out in public. In that way, we are all protecting each other.
Make sure your mask is comfortable on your face, covers your nose and mouth, and is secure, because once you put it on, you don’t want to touch it until you get home and take it off. Don’t lower it to speak to people, in person and or on your phone, but if you do touch the outside of the mask, wash your hands immediately.
How to reduce infections in supermarkets
Plan your shop so that you need to go less often - practice social distancing (e.g. keep the shopping trolley between you and the next person), carry hand sanitizer whenever possible (or make good use of it if provided in stores), and wear a cloth mask at all times, keeping hands away from your face.
Don’t touch lots of items. The days of testing the fruit and vegetables before buying them are over, for now. If you touch it, consider buying it. If you need to cough or sneeze, turn your head away from other shoppers and the products, and do it into your elbow if you can. When you get home, wash your hands and your mask
If you manage a store, make sure that there are markers 1.5m apart for shoppers at strategic points such as queues to enter and at the till. In bigger stores, consider arranging staff into teams to reduce the number of contacts between workers. Make sure your staff are educated about social distancing and hand hygiene, and try to arrange the staff common area to enable distancing. Make sure frequently touched surfaces such as door handles, computer equipment and other surfaces are wiped frequently with disinfectant, and that floors, shelves, and other surfaces are cleaned at least twice a day (standard household cleaners are fine). Make sure there’s soap in the toilets and it’s also a good idea for wipes to be available to clean toilet flushing handles.
Encourage employees not to come to work if they are feeling ill. Screen employees when they come to work everyday by asking if they have flu-like symptoms. Ensure they have masks and hand sanitizer. Temperature taking is probably pointless, because fever is not a universal symptom in infected persons, but it doesn’t harm either; just not a priority.
If an employee tests positive for Covid-19, ask staff to step forward to decide their level of risk and whether they need to quarantine. Having arranged staff into teams could limit the number that have to quarantine.
Control the number of people who enter the shop. Insist that shoppers wear masks and make sure that when people enter the store, a staff member sprays an approved alcohol-based hand sanitizer on their hands and/or a touch-free hand sanitizer dispenser is available and kept well-stocked.
If you work in a shop, all the rules that apply to shoppers apply to you too. We are social animals so it’s easy to forget the rules, especially during lunch and tea breaks, which can be staggered and taken in teams to reduce mixing. These are high risk times of the day, so be vigilant. Please do not go to work if you feel unwell, but call your line-manager or your provincial hotline for advice.
There are also some things that are unnecessary, or even potentially harmful. Disinfection tunnels are a no-no. Under no circumstances should shops be spraying staff or customers with disinfectants, other than hand sanitizer directly onto the hands. Besides being of no significant value in reducing virus transmission, they can cause skin and eye irritations, and affect your lungs. Another waste of money are these so-called deep cleanses offered by some companies. Normal cleaning is fine. There is no need to close a shop just because a staff member has tested positive.
In some supermarkets people are using full face visors instead of masks. The problem with these is that breath condenses on the inside of the visors and can drip onto products. They’re probably ok though for staff who are not handling products, but universal masking is more appropriate.
How to reduce your risk on public transport
Try to use public transport only when necessary. Wearing a mask and carrying hand sanitizer are vital. Try to avoid taxis, buses or train carriages that are full. And if your mode of transport is becoming full, kick up a fuss. It’s impossible to keep 1.5 metres away from people on taxis, but at the same time taxi drivers need to follow regulations about the number of passengers they are allowed to carry.
It’s best to travel with windows open to increase air exchanges and therefore dilute the amount of potential virus droplets inside the vehicle. That isn’t easy as we enter winter.
Sanitize your hands after receiving money. Avoid chatting to others when in public transport and any over-crowded place, as virus contaminated droplets are released even when talking.
Transport owners or managers should wash interiors at least twice a day (standard cleaning products are fine).
As with supermarkets, no customers or staff should be sprayed with disinfectants, but all customers should be offered a dash of hand sanitizer upon entering a taxi, bus or train carriage.
How to reduce your risk at school
While people of school-going age are much less likely to become very ill from Covid-19, it’s equally important to focus on key aspects of prevention to reduce transmission between their peers, teachers, and family members.
Planning is needed to reduce risk across the school: classrooms, staff rooms, food preparation, eating areas, change rooms, toilets etc. Universal masking should be standard especially for children older than five years. Facilities should be made available to perform regular hand hygiene. Regularly used surfaces should be disinfected often, including computer mice, keyboards, door and locker handles, etc.
Staff members should probably have their own blackboard dusters and chalk. Teachers should avoid gathering for tea and lunch breaks, as they are more likely to infect each other than to be infected by a child. Staff meetings should ideally be held in the open area, while maintaining social distancing.
Also, teachers should maintain distance from the learners wherever possible. Although this might be more challenging for early childhood development and special needs schools, if teachers wear a face mask or visor and do regular hand hygiene they will reduce the risk of infecting children.
Many schools are overcrowded. As learners return it may be a good idea to split them into groups that come to school every alternate week. Yes, this may mean reducing the syllabus this year, but that’s not a catastrophe. Minimise non-essential activities where social distancing isn’t possible.
On the very first day that learners return, ensure that every single one of them is taught about Covid-19 in an age-appropriate manner, as well as the prevention measures that they must take. Explain the reasons behind what we are asking learners to do. But also re-assure them that children are fortunate because they rarely develop a severe illness even when infected with this virus that is so troublesome to older adults.
Disinfection tunnels should not be used, nor should large-scale environmental spraying of communal areas. It’s also unnecessary to close the school every time a learner or staff member tests positive. The same advice for supermarkets applies when this happens.
Also, teenagers will be teenagers; it’s pointless and cruel to stop them from playing games like soccer, and the usual things that teenagers do. The idea is to counsel them on the need to minimise physical contact; not eradicate it and destroy the fun of childhood.
Sticking to all this advice 100% of the time is impossible. But the more diligently we all apply these measures the more we reduce the risk of contracting Covid-19 and infecting others.
© 2020 GroundUp.
This article is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
You may republish this article, so long as you credit the authors and GroundUp, and do not change the text. Please include a link back to the original article. | <urn:uuid:bd961a89-9318-4210-8d2d-6bc4889946c1> | CC-MAIN-2022-33 | https://www.groundup.news/article/how-keep-safe-supermarkets-transport-and-school/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00405.warc.gz | en | 0.95912 | 2,307 | 3.078125 | 3 |
Brain & Cognitive Health
How does RLT help?
There appears to be neuroprotective effects of laser and light-emitting diodes (LED) in diverse neurological conditions, such as traumatic brain injury (TBI), ischemic stroke, Alzheimer’s disease, Parkinson’s disease, as well as age-related cognitive decline. Besides these therapeutic effects at the molecular level, there is also considerable evidence of changes occurring at the behavioral level such as cognitive enhancement, antidepressant effects, and improved sleep.
Tell Me More...
The brain, along with the heart and muscle, are the tissues with the greatest mitochondrial density. Mitochondria, which are extremely important for our health, longevity and energy production, respond exceptionally well to red/NIR light. Thus, the brain and overall cognitive function (i.e. Alzheimer's disease) has a great capacity to heal with RLT.
It is believed that impaired cerebral vascular perfusion is the one of the first manifestations of most brain disorders. RLT can increase the neuronal nitric oxide content, increase the vessel diameter, and improve cerebral blood flow (CBF). Therefore, it could be considered that RLT of specific areas of the brain potentially affects regional CBF.
Mitochondrial dysfunction is another root cause underlying the vast majority of brain diseases. In Alzheimer’s disease (AD), mitochondrial dysfunction is the primary source of reactive oxygen species (ROS) and contributes to the oxidative damage and neuroinflammation that induces neuronal damage and apoptosis. Mitochondrial dysfunction contributes to the development of depression and anxiety by impairing neurogenesis, neuronal transmission, and synaptic plasticity necessary for successful adaptation to stressful conditions. Therefore, approaches targeting mitochondrial dysfunction may represent a potential avenue for preventing depression, anxiety and memory loss in the development of AD.
Neuroinflammation is one of the crucial pathophysiological findings in brain disorders, which is chiefly mediated by activated microglial cells (microglial cells remove damaged neurons and infections and are important for maintaining the health of the CNS). RLT reduces pro-inflammatory cytokines via inhibition of various signaling pathways, resulting in attenuation of inflammatory reactions. Evidence supports the idea that the anti-inflammatory effects of brain RLT may at least partly be due to its ability to modulate microglial activity and a subsequent decrease in inflammatory mediators.
Recent clinical brain RLT studies have been focused on conditions such as Alzheimer’s Disease (AD), Parkinson’s Disease (PD), traumatic brain injury and ischemic stroke.
AD: significant improvements in sleep quality, mood states, EEG patterns, as well as improved cognitive function including memory & attention have been obtained as a consequence of NIR RLT
PD: In the only study in PD patients, improved motor and cognitive functions has been reported following 2 weeks of trans-cranial RLT. Other RLT-positive effects include: decreased Aβ production, Increase Aβ degradation and clearance, increased BDNF, decreased p-tau, decreased inflammation, increased memory, increased mitochondrial function and protection and increased energy. Gut health seems to be another important aspect of PD (read section below on PD and gut health).
Stroke: an effort has been made in occasional studies to show neuroprotective or neuroreparative effects of RLT in chronic stroke patients via transcranial and multiple area irradiation methods.
While the cause of autism spectrum disorder (ASD) is uncertain, the most widely accepted explanation is that it is a complex neurodevelopmental disorder characterized by brain network abnormalities. EEG has shown local overconnectivity and long-range underconnectivity, also involving the corpus callosum. fMRI studies revealed altered functional connectivity in the default mode network, a network with a role in interoceptive awareness and mind wandering and which was implicated in social-cognitive deficits of autism.
The main goal of therapy for children with ASD is the improvement of socio-relational and communication skills. This goal is pursued through a combination of interventions, such as speech therapy, parent training, social skills training and cognitive-behavioral therapy. In the presence of emotional and behavioral dysregulation, a pharmacological approach is often considered.
Recently, there has been a growing interest in the potential of non-invasive brain stimulation in neurodevelopmental disorders, thanks to their ability to modulate neuroplasticity and enhance cognitive, behavioral and socio-emotional processes.
Among new neuromodulation approaches, is transcranial photobiomodulation (tPBM), which is RLT through the skull. The target for light within single neurons is the mitochondria, where tPBM stimulates cytochrome c oxidase. The consequence is that light enhances mitochondrial activity and hence ATP synthesis, leading to an activation of transcription factors associated with increased functional activity.
Along with adults, tPBM could also be safely and efficiently used in children and adolescents, considering that several studies used RLT to treat pediatric samples with no reported or minimal side effects. In fact, research conducted in 2018 achieved results that demonstrated decreased irritability after treatment, suggesting the potential of tPBM also in treatment of children with ASD.
Across the world, the number of people aged 60 and over has been growing faster than any other age group. The increase in life expectancy is related to many factors, including changes in the quality of life of the population, greater urbanization, nutritional improvement, increased personal hygiene, better sanitary conditions and adequate work and home environments. On the other hand, longevity has been accompanied by an increase in cases of neurological diseases associated with aging, such as late-onset Alzheimer’s disease (AD) and PD among others. However, aging is a physiological process not yet fully understood.
Aging is a multifactorial biological process, characterized by a decline in physiological functions, including brain functions that leads to diminished cognitive health. Studies with animals and humans demonstrate that RLT can improve cognitive function during this phase of life. It is likely that the capacity of RLT to facilitate brain energy and hemodynamic metabolism, reduce inflammatory and oxidative stress levels and regulate the rate of apoptotic proteins is closely related to the beneficial effects on cognitive functions. Moreover, there is no evidence in the literature that RLT adversely affects brain activity in healthy older adults and patients with brain damage. Thus, we can consider RLT to be a promising strategy for treating the cognitive deficits observed during aging.
Transcranial photobiomodulation (tPBM) is one of the main ways to treat the brain via NIR light. tPBM can help improve cognitive health by increasing oxygenation, improving regional circulation and nutritional supplementation to the brain parenchyma by triggering nitric oxide production, which is an effective vasodilator. tPBM exerts anti-inflammatory function through modulation of NF-κB system, tumor necrosis factor (TNFα) and beneficial regulation of other pro- and anti-inflammatory cytokines in brain parenchyma. Through complex regulation of signaling molecules and certain transcription factors, tPBM light activates anti-apoptotic, and anti-senescence cascades, and further exerts neuroprotective effects on both healthy and impaired brain cells and tissue. tPBM can also promote synaptogenesis and neurogenesis through activation of brain derived neurotrophic factor (BDNF), which contributes to the infrastructure of brain function through environmental support by promoting new synaptic and neuronal growth.
Concussions & Traumatic Brain Injuries
There are several mechanisms known to be triggered by photons of NIR light which can reduce inflammation, constrain ROS damage, and activate ATP production in energy compromised brain area affected by TBI. Continuous production of ATP is required for successful coordination of metabolic, synaptic and immune efforts to consolidate the area of injury, facilitate recovery and manage local immune response. Moreover, RLT-initiated neurogenesis and synaptogenesis promote reestablishment of axonal connectivity and rebuild the intrinsic nervous networks damaged in TBI.
This approach is supported by literature to be quite effective in acute and chronic TBI treatment, considering general safety and demonstrated efficacy of tPBM light stimulation in-vitro, in-vivo and growing number of recent human clinical trials in this field. One of the first clinical trials (small cohort study) using tPBM light stimulations to treat chronic and mild TBI reported positive improvements in cognition, behavior, and sleep of patients, but also suggested that more robust placebo-controlled studies are needed to ensure reliability of tPBM light in TBI treatment.
There has been an increasing understanding of the link between the gut microbiome, the enteric nervous system and a number of diseases, such as kidney disease, liver disease and cardiovascular disease. Acknowledgement of the importance of the gut–brain axis has increased the recognition of the link between microbiome balance and brain function. It is appreciated that some bacteria that compose the gut microbiome are associated with a range of behavioral dysfunctions and neurodegenerative diseases. This is especially true in Parkinson’s disease (PD).
For example, dysbiosis of the gut microbiome can reduce the number of short chain fatty acid (SCFA) producing bacteria, which in turn increases local inflammatory signaling. Reduction in SCFA production, reduced gastrointestinal functional and anatomical integrity and a consequent increase in the movement of bacterial metabolites (e.g., lipopolysaccharide) across the gut wall are all features of PD, resulting in increased inflammation.
To date, four non-pharmacotherapeutic interventions have been suggested to slow the progression of PD via manipulation of the microbiome, which include diet, pro- and prebiotics, antibiotics and fecal microbiota transplant. Based on recent research, red light therapy (RLT) is a potential novel fifth intervention and may complement new and existing treatment strategies.
As a potential therapy, RLT would ideally be commenced as early as possible in the disease trajectory, before severe reduction or complete elimination of beneficial bacteria from the microbiome (including medications) and may best be combined with diet, pre- and probiotics or fecal microbiota transplant to restore microbiome genera.
What does the research show?
“Aging is a multifactorial biological process, characterized by a decline in physiological functions, including brain functions. Studies with animals and humans show that PBM can improve cognitive function during this phase of life… Moreover, there is no evidence in the literature that PBM adversely affects brain activity in healthy older adults and patients with brain damage. Thus, we can consider PBM to be a promising strategy for treating the cognitive deficits observed during aging.” (1)
(RLT for concussions): "The results found an alteration in the cerebral blood flow as well as a consequent increase of the cerebral oxygenation that helped to improve the cerebral function." (2)
(RLT for autism): “A relevant reduction in noncompliant behavior and in parental stress have been found. Moreover, a reduction in behavioral and cognitive rigidity was reported as well as an improvement in attentional functions and in sleep quality.” (3)
“In conclusion, gut flora-targeted PBM provides a new possible non-invasive prevention and treatment method for the treatment of Alzheimer’s disease (AD), and provides a new hope for AD patients.” (4)
“After 8 weeks of PBM treatments, increased brain volumes, improved functional connectivity, and increased cerebral perfusion and improvements on neuropsychological test scores were observed.” (5)
"Transcranial laser therapy (TLT) showed an increase in ATP levels, mitochondrial function, and c-fos suggesting an overall improvement in neurological function. These studies suggest that TLT is a potential candidate for treatment of Alzheimers disease.” (6)
"This treatment (near-infrared light) also significantly reduced dopaminergic neuronal loss in the injected substantia nigra and preserved dopaminergic fibers in the ipsilateral striatum. These beneficial effects were sustained for at least 6 weeks after discontinuing the treatment. Together, our data point to photobiomodulation as a possible therapeutic strategy for the treatment of Parkinson's Disease & other related synucleinopathies." (7)
"Transcranial LLLT has been shown to significantly improve outcome in acute human stroke patients when applied approximately 18 hours after the stroke occurs over the entire surface of the head, regardless of the stroke location." (8)
"These results suggest that LLLT could be applied in cases of general cognitive impairment in elderly persons." (9)
"Roch-kind et. al. demonstrated that LLLT applied simultaneously to the injured sciatic nerve and the corresponding segment of the spinal cord accelerates the process of regeneration of the injured peripheral nerve." (10)
"Light therapy significantly improved the average length of axonal regrowth and increased the total axon number. These results suggest that light may be a promising therapy for human spinal cord injury." (11)
**While the current scientific research seems to indicate many positive benefits of RLT in relation to brain and nerve health, there is still an appreciable necessity for more extensive research to be conducted in this area, including double-blind RCT (randomized controlled trials), to provide a more comprehensive, robust overview that will further elucidate the optimal parameters and appropriate uses of RLT, which will ultimately lead the most safe and efficacious uses for individuals dealing with brain and nerve disorders. | <urn:uuid:f53d358f-5f00-49ae-a083-980c6a96ec6b> | CC-MAIN-2022-33 | https://www.biolight.shop/brain-and-cognitive-health | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00604.warc.gz | en | 0.93076 | 2,798 | 2.71875 | 3 |
|Part of a series on|
Practice theory (or praxeology, theory of social practices) is a body of social theory within anthropology and sociology that explains society and culture as the result of structure and individual agency. Practice theory emerged in the late 20th century and was first outlined in the work of the French sociologist, Pierre Bourdieu.
Practice theory developed in reaction to the Structuralist school of thought, developed by social scientists such Claude Lévi-Strauss who saw human behavior and organization systems as products of innate universal structures that reflect the mental structures of humans. Structuralist theory asserted that these structures governed all human societies.
Practice theory is also built on the concept of agency. For practice theorists, the individual agent is an active participant in the formation and reproduction of their social world.
In 1972, French theorist and sociologist, Pierre Bourdieu, published Outline of a Theory of Practice. Bourdieu's theory of practice emerged from his ethnographic field work in French occupied Algeria among the Kabyle at the outbreak of the Algerian War of Independence. The original goal of his work in Algeria was to understand the Algerian culture and its internal laws in the effort to understand the conflict. His aim was to find the underlying rules and laws in Kabyle society. Bourdieu later rejected the idea that culture and social life can be reduced to the acting out of rules and the primacy of social structures over the individual. Instead, Bourdieu argues, culture and society are more fully understood as the product of dynamic interactions between social actors and structure. Anthony Giddens and Michel de Certeau, who also wrote on practice theory in the late 1970's and 1980's, laid the foundation for the body of theory along with Bourdieu.
Bourdieu's theory of practice sets up a relationship between structure and the habitus and practice of the individual agent, dealing with the "relationship between the objective structures and the cognitive and motivating structures which they produce and which tend to reproduce them". What is perceived and experienced as culture is the result of dynamic interaction of internal and external structures, individual performance (practice), and strategy (strategy is based on existing structures, but it exists from the actions of individuals seeking to pursue their own interests). According to practice theory, social actors are not just shaped by their social world, they in turn shape it as well. Since Bourdieu, sociologists, anthropologists, and feminist scholars, among others, have expanded on practice theory. The main ideas of practice theory are summarized below:
Practice theory involves structure, which Bourdieu describes as the "objective structures are themselves products of historical practices and are constantly reproduced and transformed by historical practices whose productive principle is itself the product of the structures which it consequently tends to reproduce." The two central terms to practice theory are practice, "what people do", or an individual's performance carried out in everyday life. The other key idea for practice is Habitus which is "a structuring structure, which organizes practices and the perception of practices" (Bourdieu, P. 1984: 170). Bourdieu coins the term habitus to refer to patterns of thought and behavior which are the deeply internalized structures. Habitus is composed of social conventions, rules, and values etc. that guide our everyday practice. These mental structures are representations of the external social structures people are in interaction with on a daily basis. These internal structures inform our practice and give meaning to our world. This deeply embedded mental order is what drives us to behave in accordance with social and cultural conventions. Habitus is also influenced by external individual forces, such as confronting a new social norm, or a new way of doing things. Like structure, habitus is also the product of historical events.
The embodied component of the habitus is the Hexis. It is manifested as an individual's gait, gesture, postures, accent etc. A closely related notion to Bourdieu's habitus is Michel Foucault's concept of 'discipline'. Like habitus, discipline 'is structure and power that have been impressed on the body forming permanent dispositions'. In contrast to Bourdieu, though, Foucault laid particular emphasis on the violence through which modern regimes (e.g. prisons and asylums) are used as a form of social control.
Another important concept to practice theory are doxa, which is the internalized societal or field-specific presuppositions that 'go without saying' and are not up for negotiation. The doxa is a constructed vision of reality so naturalized that it appears to be the only vision of reality learned, fundamental, deep-founded, unconscious beliefs, and values, taken as self-evident universals, that inform an agent's actions and thoughts within a particular field, e.g. 365 days, 24hrs, 60 seconds. The field represents a structured social space with its own rules, schemes of domination, legitimate opinions. Bourdieu uses the concept of field instead of analyzing societies solely in terms of classes. For example, fields in modern societies include arts, education, politics, law and economy. Cultural capital is also part of practice theory and is directly related to strategy. It is the intangible assets that enable actors to mobilize cultural authority/power as part of strategy e.g., e.g., competencies, education, intellect, style of speech, dress, social networks,. This is important in terms of an individual's strategy. A later addition to practice theory is structuration, coined by Anthony Giddens.
Cultural anthropologist Sherry Ortner defines practice theory as, "a theory of history. It is a theory of how social beings, with their diverse motives and their diverse intentions, make and transform in which they live." Ortner developed what she terms "cultural schemas" to explain society's structural contradictions and agency. Her engagement with practice theory focuses on how agents "react to, cope with, or actively appropriate" external structures. These responses of agents are bound or enabled by the cultural schemas which are often rooted in the contradictions of society's structure and habitus of the agent. Agents create broader social narratives practices unique to their specific culture from multiple schemas. The many available to agents schemas woven to a social narrative help to "give society its distinctiveness and coherence" Ortner's agent is "loosely structured", their practice is constituted of how they respond to the schemas
British Sociologist Anthony Giddens contributed his theory of structuration to practice theory. The premise for structuration is based on his concept of the Duality of Structure. This is the idea that the agency of social actors and structure are inseparable and co-create one another. Agency, according to Giddens, is neither free will or the intentionality of actions, but the capacity of the agent to act. The agency of individuals is constrained and enabled by structure. In turn, structure is created, transformed, and reproduced through the actions of agents. The reinforcing and transformative capacities of agents are Giddens identified two forms of consciousness that inform the knowledgeable agent's actions: practical consciousness and discursive consciousness.
Judith Butler's theory on gender and sex is based on performance and practice theory. In their works Gender Trouble (1990) and "Performative Acts and Gender Constitution" (1988), Butler argues for their concept of gender performativity. Butler argues that all gender and sexual identities are constructs, they are not real or innately natural, these categories do not express any inner reality. Instead gender and sexuality are constituted from performance, the everyday repetition of acts that reaffirm these identities. The individual performs gender and that identity is then validated and accepted by society.
Communities of Practice and Learning as Practice
The work of Jean Lave and Etienne Wenger drew from practice theory to conceptualizes communities of practice and learning. Roddick and Stahl summarize communities of practice as involving "embodied action and continuously renewed relations between understanding and experience, more and less skilled practitioners, and the objects and communities with which practitioners interact."
Communities of practice center the relationship of the agent, the activity engaged in, and community, which are co created and relational to one another. Learning and apprenticeship within practice communities are processes that place individual experience and everyday practice in active discourse with the broader context of their society. According to Wegner and Lave, learning is "situated" through practice of novices and expert practitioners.
Theodore Schatzki developed an alternative theory of practice, primarily in his books Social Practices (1996) and The Site of the Social (2002). His basic premise, derived from Martin Heidegger and Ludwig Wittgenstein, is that people do what makes sense for them to do. Practices make up people's 'horizon of intelligibility'. In Schatzki's work, practices are defined as 'open-ended spatial-temporal manifolds of actions' (Schatzki, 2005, p. 471) and also as 'sets of hierarchally organized doings/sayings, tasks and projects' Moreover, practices consist of four main elements: (1) practical understanding – "knowing how to X, knowing how to identify X-ings, and knowing how to prompt as well as respond to X-ings" (idem, p. 77); (2) rules – "explicit formulations, principles, precepts, and instructions that enjoin, direct or remonstrate people to perform specific actions" (idem, p. 79); (3) teleo-affective structure – "a range of normativized and hierarchically ordered ends, projects and tasks, to varying degrees allied with normativized emotions and even mood" (idem, p. 80); and (4) general understanding. | <urn:uuid:ceff8e70-085b-485a-8b46-badf07bc1391> | CC-MAIN-2022-33 | https://db0nus869y26v.cloudfront.net/en/Practice_theory | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00203.warc.gz | en | 0.944382 | 2,066 | 3.234375 | 3 |
In this assignment, the student will outline the content of the final paper.
The more detailed the outline the easier it will be to write the final paper.
Use Roman numerals for the main headings in the outline (I, II, III, IV)
Capital letters are used for the sub-headings (A, B, C, D)
If another set of sub-headings is needed use 1, 2, 3, 4
The next sub-heading would be lowercase letters, e.g. a, b, c, d
Main headings will include one heading titled Introduction and one titled Conclusion. Other main headings will address major concepts in your thinking.
The outline is to provide the logical progression of the ideas and points you will make in the final paper. Items do not need to be in complete sentences.
You will NOT need to include in-text citations in the outline, but you will need to include a reference list on a separate page to credit the information used to the original author.
References MUST be in proper APA 7th edition format
Please include a properly formatted student APA 7th edition title page.
ORDER NOW FOR PLAGIARISM-FREE PAPERS
NRSE 3700J: WRITING FOR NURSING – INTRO & OUTLINE RUBRIC Grading Rubric – Outline Remember to use the information in the columns to complete the components of the assignment. Area Evaluated 15 points Content of the Outline 10 points maximum Organization 2 points maximum Accomplished Proficient Needs Work Unacceptable *Clear relationship between headings and subheadings *Lack of clarity in relationship between headings and subheadings *No clear relationship among headings and subheadings *Reader unable to identify topic *Clear thesis statement *Vague thesis statement *Lack of thesis statement *Topics are addressed with at least three (3) concrete details for major headings *No more than two (2) concrete details in any part of outline *Fewer than two (2) concrete details in any part of outline *No less than 75% *No less than 85% of information *All information of information relates to the topic clearly relates to relates to main main topic topic 9-10 points 6-8 points 4-7points *Standard *Standard *Incomplete outline format outline format outline headings; used used subheadings not clearly related to *Generally logical main headings *Elements flow content logically and clearly but flow is *Progression of choppy ideas is illogical 2 points MUGS/APA 3 points maximum 1 point 0.5 point *3-4 MUGS/APA errors. *No MUGS/APA errors *No more than 2 MUGS/APA errors *Margins & indentions correct *No more than one (1) error in formatting *Includes two (2) appropriate references *Two (2) references, but may not be appropriate *One (1) reference and reference not appropriate 2 points 1 point 3 points Last updated: 8/15/2020 *Two (2) or more errors in formatting © 2020 School of Nursing Ohio University *Very few concrete details in total outline *Information does not support topic 0-3 points *Headings only; no subheadings *Off topic; poor flow 0 points 5 or more MUGS/APA errors and/or *Three (3) or more errors in formatting *Zero (0) appropriate references or no references 0 points Page 1 of 1 http://owl.english.purdue.edu/owl/resource/544/01/ The Purdue OWL: Sample Outlines Alphanumeric Outline THE COLLEGE APPLICATION PROCESS I. CHOOSE DESIRED COLLEGES A. Visit and evaluate college campuses B. Visit and evaluate college websites 1. Look for interesting classes 2. Note important statistics II. PREPARE APPLICATION A. Write personal statement 1. NRSE 3700J Ohio University HIV AIDs in Thailand Outline Paper
Choose interesting topic a. Describe an influential person in your life (1) Favorite high school teacher (2) Grandparent b. Describe a challenging life event 2. Include important personal details a. Volunteer work b. Participation in varsity sports B. Revise personal statement III. COMPILE RÉSUMÉ A. List relevant coursework B. List work experience C. List volunteer experience 1. Tutor at foreign language summer camp 2. Counselor for suicide prevention hotline http://owl.english.purdue.edu/owl/resource/544/01/ Full Sentence Outline I. Man-made pollution is the primary cause of global warming. A. Greenhouse gas emissions are widely identified by the scientific community to be harmful. 1. The burning of coal and fossil fuels are the primary releasers of hazardous greenhouse gases. Full sentence outlines are often accompanied with an APA reference list on a separate page. Quotes within the outline must also utilize APA in-text citations. Decimal Outline 1.0 Choose Desired College 1.1 Visit and evaluate college campuses 1.2 Visit and evaluate college websites 1.2.1 Look for interesting classes 1.2.2 Note important statistics I selected Thailand as the country to discuss three major healthcare issues that exist. Selecting Thailand will further educate myself more about their country in general, along with their healthcare issues. I think it will be interesting to learn more about Thailand throughout this assignment over the next several weeks. I also find it interesting the average income in Thailand to only be $15,646 and a life expectancy of seventy-two to seventy-nine years old (“Thailand,” 2017). The three major healthcare issues I chose for Thailand are HIV/AIDS, stroke and tuberculosis. These healthcare issues were listed among their top causes for death. HIV/AIDS are a concern in Thailand due to the fact of a lack of education on prevention programs throughout the country. With the population of men having unsafe sex with men and/or multipartner sex are not aware of the risk for HIV/AIDS (“HIV and AIDS in Thailand,” 2020). Tuberculosis is my second healthcare issue and it is a high health concern in Thailand due to the level of poverty. My third healthcare issue in Thailand is a stroke and this is an issue in Thailand mostly due to hypertension and the type of diet the population has in Thailand. This is also mostly related to Thailand being poverty stricken. The one healthcare issue I chose for my informative and persuasive paper will be HIV/AIDS. I chose this issue over the others because I found it interesting to see the progress Thailand made as the first country to be able to abolish transmission of HIV of mother-to-child (“Eliminating mother to child transmission of HIV and syphilis,” n.d.). References Eliminating mother to child transmission of HIV and syphilis. (n.d.). WHO | World Health Organization. https://www.who.int/southeastasia/activities/eliminating-mother-to-childtransmission-of-hiv-and-syphilis HIV and AIDS in Thailand. (2020, February 20). Avert. https://www.avert.org/professionals/hivaround-world/asia-pacific/thailand Thailand. (2017, September 20). Institute for Health Metrics and Evaluation. https://www.healthdata.org/thailand 1 Impact of Social Determinants of Health in Thailand Robin LeValley Ohio University NRSE 3700J: Writing for Nursing and Health Care Professionals Prof. Kathleen Rose-Grippa PhD, RN September 13, 2020 IMPACT OF SOCIAL DETERMINANTS OF HEALTH IN THAILAND 2 Officially known as the kingdom of Thailand, it is a nation in the southeast of Asia situated at the center of the Indochinese peninsula. It is comprised of 76 provinces with Bangkok as its capital. NRSE 3700J Ohio University HIV AIDs in Thailand Outline Paper
The country has a population over 60 million people. Thailand’s medical care is overseen by the ministry of public health, with a total expenditure of health totaling 4.3 percent of the Gross Domestic Product [GDP]. Thailand has an estimated population of 470,000 people living with HIV/AIDS. As of 2019, 14,000 people had died of AIDS-related illnesses (Thailand, 2016). This paper’s focus is to analyze the impact of social determinants of health and how they influence the spread of the HIV/AIDS epidemic in Thailand. This paper will also deal with the importance of addressing social determinants for control prevention of HIV/AIDS. Poor access to support, care, and prevention has been the key hindrance to the significant inhibition and control of HIV/AIDS. Social determinants of health comprise economic, environmental, and social factors that control persons or populaces; the determinants have a critical role in the infection of HIV and the ability of individuals to seek treatment, support, and care. In Thailand, several aspects in society including, homelessness, scarcity, sexual and physical abuse, unemployment, addiction, stigma, and lack of societal support, all play a crucial part in the infection of HIV. For instance, poverty can negatively impact a person’s self-image and sense of belonging in society. Such factors can affect a persons’ judgment and reduce their ability to protect themselves from HIV. HIV is high in socially marginalized groups because of poverty and other social factors like illiteracy and unemployment. Those at a higher risk are men who have sex with men, sex workers, drug abusers, and the overall population (Health People, 2020). Socially, due to low literacy levels and poverty, people are forced to look for means to cater to their needs: such means include prostitution and other risky activities affecting the critical populations in IMPACT OF SOCIAL DETERMINANTS OF HEALTH IN THAILAND 3 Thailand. Men who have sex with men, for instance, are at a greater danger of contracting the disease. In Thailand, 13% and 16% of men who have sex with other men are estimated to be living with HIV as of 2018 (Healthy People, 2020). Furthermore, due to challenging times and harsh living conditions, the youth who are mostly unemployed are IV drug users and use dirty needles to administer. This places them at risk for contracting the virus. Young people from key populations are at a high risk of contracting HIV. In 2018, approximately half of new infections in Thailand happened amongst people aged 16- 25 (Kiertiburanakul et al., 2018). To sum it all, the social determinants of health is indeed the major challenge in curbing the spread of HIV in Thailand. The epidemic is more of a social problem than a medical one. An effective response necessitates going beyond health interventions to making an excellent situation to support and empower the susceptible. IMPACT OF SOCIAL DETERMINANTS OF HEALTH IN THAILAND 4 References Healthy People – HP2020 – Leading Health Indicators at a Glance. (2020). https://www.cdc.gov/nchs/healthy_people/hp2020/hp2020_indicators.htm Kiertiburanakul, S., Wongprasit, P., Phuphuakrat, A., Chotiprasitsakul, D., & Sungkanuparph, S. (2018). Prevalence of HIV infection, access to HIV care, and response to antiretroviral therapy among partners of HIV-infected individuals in Thailand. PLOS ONE, 13(6), e0198654. https://doi.org/10.1371/journal.pone.0198654 Thailand.NRSE 3700J Ohio University HIV AIDs in Thailand Outline Paper
(2016). Unaids.Org. https://www.unaids.org/en/regionscountries/countries/thailand Ohio University Grover E 358 Athens, OH 45701 09/01/2020 Creating Space for Life Mary Phillips, Executive Director 5555 Fifty-first Street Plain City, NJ 01012 Dear Dr. Phillips: My name is Robin LeValley and I am a nurse working in one of the top ranked hospitals in Columbus, Ohio. I am also pursuing my BSN degree with Ohio University and I am working on an assignment regarding a disease and healthcare related issue in Thailand. I am very thankful the NGO has funded $75,000 to Thailand for disease prevention, however there has not been any further funding in the past three years. The purpose of my letter is to request support from your organization to address the HIV/AIDS epidemic in Thailand. Thailand has done an outstanding job decreasing the number of HIV/AIDS cases. Thailand was also named the first country that successfully eliminated mother-to-child transmissions of HIV and syphilis (“HIV and AIDS in Thailand,” 2020). However, Thailand’s goal to end AIDS by 2030 could significantly increase the mortality rate prior to reaching their goal. It will be important to target the larger poverty and younger population in order to achieve the goal to end AIDS. It will be equally important to have the funds available to educate the people of Thailand about the risk of HIV/AIDS along with educating the population about the resources available for testing. According to UNAIDS, there are 470,000 adults aged 15 and over living with HIV and 3,300 children ranging age from 0-14 (“Thailand,” 2019). Dr. Phillips, with your experience running a large hospital, in addition to your educational background, I am sure you understand the importance of educating patients to improve health concerns. Also, with your experience holding an executive director position for a large hospital in the past, you understand the importance of having financial stability. It is equally important to have access to the finances needed to provide the support to conquer this healthcare issue in Thailand. It is imperative to have tools available to provide the needed education and resources in order to achieve our goals successfully before too many lives are lost related to this health issue. Although Thailand did an outstanding job eradicating transmission of HIV and syphilis from mother-to-child, the education needs to continue, as the children become young adults. Thailand is known to have the highest teen pregnancy, therefore, it has been determined 90% of the HIV population is having unsafe sex (“HIV and AIDS in Thailand,” 2020). Also, the higher poverty areas need to be the starting ground for this support and education plan, because that is the fastest growing population being affected. Last but not least, Even though Thailand was successful being the first country to eliminate mother-to-child transmissions, we need to proceed sparing more lives and tackle HIV/AIDS. This will be done with more education, treatment availability, and more testing cites, rather than waiting for 2030 as a goal. I kindly thank you for your time and look forward to your support and donation helping to conquer this healthcare issue in Thailand. Respectfully, Robin LeValley References HIV and AIDS in Thailand. (2020, February 20). Avert. https://www.avert.org/professionals/hiv-around-world/asia-pacific/thailand Thailand. (2019). UNAIDS. https://www.unaids.org/en/regionscountries/countries/thailand NRSE 3700J Ohio University HIV AIDs in Thailand Outline Paper
Buy an essay in any subject you find difficult—we’ll have a specialist in it ready
Ask for help with your most urgent short tasks—we can complete them in 4 hours!
Get your paper revised for free if it doesn’t meet your instructions.
Contact us anytime if you need help with your essay
APA, MLA, Chicago—we can use any formatting style you need.
Get a paper that’s fully original and checked for plagiarism | <urn:uuid:216593b9-381a-4967-bd65-f32c17f8ba74> | CC-MAIN-2022-33 | https://justwriteessays.com/hiv-aids-in-thailand-outline-paper/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00199.warc.gz | en | 0.909255 | 3,306 | 2.59375 | 3 |
Respoke gives you the power to build the next Skype in the browser, on your smartphone and even on your desktop. It’s all possible because of the Public Switch Telephone Network (PSTN). Here’s a look at where the PSTN has been and where we’re taking it…
HISTORY OF THE PSTN
The history of the public switched telephone network (PSTN) is the history of American Bell and AT&T. In 1875 Alexander Bell formed the American Bell Telephone Company. A year later in 1876, Alexander Bell patented the first improvement in telegraphy and made the first ever voice transmission over wire. It was hardly what we can imagine today.
The first voice transmission used what is called a ring-down circuit. What that means is there were no dialing of numbers; No ringing of headsets. Instead, an actual physical wire connected two devices. Remember when you were a kid and you’d play tin can telephone. What did you do? You connected two tin cans by wire. Then you could here your friend talk on the other end. A ring-down circuit is a lot like playing tin can telephone, just over a greater distance.
Initially, telephone users had to whistle into the phone to attract the attention of another telephone user. Within a year of Alexandar’s patent, he added a calling bell to make signaling easier.
Over time, this simple design evolved from a one-way voice transmission, by which only one user could speak, to a bi-directional voice transmission, whereby both users could speak. Things started to get a little more complicated at this point.
Moving the voices across the wire required a carbon microphone, a battery, an electromagnet, and an iron diaphragm. The concept of dialing a number to reach a destination still didn’t exist. The also process required a physical cable between each location that the user wanted to call. Clearly this does not scale…
Placing a physical cable between every household that required access to a telephone was neither cost effective or feasible. Bell developed another method that could map any phone to another phone without a direct connection. Bell patented the device and called it a switch.
With a switch telephone, users only needed connection to a centralized office. Then that centralized office could coordinate connected the call to its final destination.
Imagine a pair of copper wires running from every phone to a central exchange in your town. At the exchange, the operator had a big switchboard. The switchboard had a 2 pin connection socket - called a jack socket - for every pair of wires entering the exchange.
When you wanted to talk to another person, you would ring the operator and give the name or number of the other party. Then the operator would connect a patch cord ( a 2 wire cable with a jack plug on each end ) between the two phones and the two people could communicate. Using a patch cord - a two wire cable with a jack plug on each end - the operator would connect each party’s jack socket. Then the receiving party’s telephone bell would ring and the two parties could communicate.
Believe it or not, the first operators were teenage boys. Surprising - I know - but they often engaged in horseplay and foul language:
Telephone companies soon began hiring young women in order to present a more civilized image to customers:
Women would go on to dominate the switchboard profession. Operators were well trained in switchboard technique and in deportment, before starting work on the switchboards. Here are a group training in switchboard technique and in deportment before starting work on the switchboard. Denver, Colorado 1910:
Here’s another group of operators at a switchboard in Santa Fe, New Mexico 1921:
Bundles of wires called trunks ran between exchanges, forming proto-networks. Networks connected together until they connected countries across the world. This was the beginning of the PSTN.
At first the telephone operator acted as a switch. Fast forward 100 years - give or take a decade - and the electronic switch replaced the human switch.
THE PSTN TODAY
What started as direct home to home connections, evolved into home to central switch connections. Human powered switches we called operators evolved into analog switches and then into electronic switches. A lot also changed along the way.
Analog voice signals carried across the wire with amplifiers evolved into digital signals carried across the globe with repeaters. Repeater simply repeat whatever binary data it receives. If the repeater received 010101, it passed on 010101.
All digital meant cleaner sound quality travelled over longer and longer distances. It also meant the PSTN could release new features faster. Features like call waiting and call forwarding and conference calling were now built into the PSTN message driven network.
As technology progressed, the telephony industry found an alternative to message formats and during the dawn of the Internet a new transport format was invented - packets. This formed the foundation of what would become a separate data network.
Instead of being transmitted over a circuit-switched network, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. These packet-switched networks form the foundation of the Voice Over IP (VOIP) technology we know today.
Now we live in a world of two networks; One circuit-switched and the other packet-switched. When those worlds interoperate, they do so using protocols that enable packet-switched digital data to communicated with circuit-switched digital data. Those protocols include, but are not limited to: H.264, V8, H.232, H.323, SIP, MGCP and others.
Currently H.323 is the most widely deployed VoIP call-control protocol. H.323, however, is not widely seen as a protocol that is robust enough for PSTN networks. For these networks, other protocols such as Media Gateway Control Protocol (MGCP) and Session Initiation Protocol (SIP) are being developed.
Phone numbers in particular are fascinating. Phone numbers are simply different across the globe. To bring the point home, take a look at a few numbers across locales:
USA (NANP): +1 (555) 555-5555
India: +91 22 555 5555
London: +44 20 5555 5555
The North American Numbering Plan (NANP) is an integrated telephone numbering plan serving 20 North American countries that share its resources. These countries include the United States and its territories, Canada, Bermuda, Anguilla, Antigua & Barbuda, the Bahamas, Barbados, the British Virgin Islands, the Cayman Islands, Dominica, the Dominican Republic, Grenada, Jamaica, Montserrat, Saint Maarten, St. Kitts and Nevis, St. Lucia, St. Vincent and the Grenadines, Trinidad and Tobago, and Turks & Caicos.
Regulatory authorities in each participating country have plenary authority over numbering resources, but the participating countries share numbering resources cooperatively.
AT&T developed the North American Numbering Plan in 1947 to simplify and facilitate direct dialing of long distance calls. Implementation of the plan began in 1951.
The International Telecommunications Union (ITU) assigned country code “1” to the NANP area. The NANP conforms with ITU Recommendation E.164, the international standard for telephone numbering plans.
NANP numbers are ten-digit numbers consisting of a three-digit Numbering Plan Area (NPA) code, commonly called an area code, followed by a seven-digit local number. The format is usually represented as:
where N is any digit from 2 through 9 and X is any digit from 0 through 9. Routing calls requires multiple switching offices. The phone number itself is a coded map for routing the call.
In the NANP countries, for example, we have 10-digit phone numbers:
- The first three digits are the area code or national destination code (NDC), which helps route the call to the right regional switching station.
** The next three digits are the exchange, which represents the smallest amount of circuits that can be bundled on the same switch. In other words, when you make a call to another user in your same exchange - maybe a neighbor around the corner - the call doesn’t have to be routed onto another switch.**
** The last four digits of the phone number represent the subscriber number, which is tied to your specific address and phone lines.**
Within a company or larger organization, each employee or department might have its own extension. Extensions from the main phone number are routed through something called a private branch exchange (PBX) that operates on the premises. To make an international call requires further instructions.
The call needs to be routed through your long-distance phone carrier to another country’s long-distance phone carrier. To signal such a switch, you have to dial two separate numbers, your country’s exit code (or international access code) and the corresponding country code of the place you’re calling.
Almost all exit codes are either 00 or 011, although there are a few exceptions like Cuba (119) and Nigeria (009). Country codes are one - to three-digit prefixes that are assigned to specific countries or groups of countries.
For example, the country code for the United States is 1, but the United States shares that country code with Canada and several smaller island nations like Jamaica, Puerto Rico and Guam.
No doubt you’ve heard the term PBX before. A PBX or Private Branch Exchange is a small telephone switch - think of it as a mini exchange.
Businesses install PBXs to reduce the number of phone lines they need to lease from the telephone company. Imagine that without a PBX, you would have to to rent one telephone line for every employee with a phone.
With a PBX system, you only need to rent as many lines from your telephone provider as the maximum number of staff making external calls at one time. In most businesses this is only about 10-12% of the workforce.
What you didn’t know is before the tangled mess of PBX’s gone by:
There were human powered switchboard operators in businesses, government and large commercial buildings:
Of course, not even remotely as large as your local switchboard would be. Here there were usually anywhere from 2-4 people at most:
In the PBX system, every telephone in a business location is wired to the PBX, using either standard cables or more recently Cat 5 ethernet cabling. When a member of staff picks up their phone and dials the outside access code (usually 9), the PBX connects that person to an outside line, and onto the PSTN.
PBX solutions themselves have gone from a consortium of wires and frames to a single commodity hardware or higher grade application running open source software that allows you to create a virtual PBX.
Open source software like Asterisk is an example of this paradigm shift. With Asterisk you can create a PBX, an IVR system, a conference bridge and virtually any other communications app you can imagine. Asterisk was one of the first open source PBX software packages.
Asterisk supports a wide range of Voice over IP protocols, including the Session Initiation Protocol (SIP), the Media Gateway Control Protocol (MGCP), and H.323. Asterisk can interoperate with most SIP telephones, acting both as registrar and as a gateway between IP phones and the PSTN.
PSTN AT RESPOKE
The PBX has gone from a tangled mess of wires to software running on commodity boxes to a hosted PBX in the cloud. The web was only the natural progression.
You can use Respoke to make phone calls and receive phone calls from phones on the PSTN as well as other Respoke client endpoints. It’s easy…
Using a combination of WebRTC media channel and good ‘ol fashioned ingenuity, Respoke takes your IP based voice data and converts it into digital SIP data which can be consumed by regular phone devices.
If you’re talking to someone on the web or VOIP device, your voice data stays on the packet-switched network - just like a regular VOIP call. If you’re talking to someone on a cellphone carrier or landline, Respoke takes care of the details to communicate with that person’s circuit-switched network.
Of course you can do a lot of other things with Respoke as well. Like video, voice and text communications. Now you have access to the PSTN network as well. Sky’s the limit from here on out. | <urn:uuid:35e14067-ec15-4038-b2a7-812f81f635ae> | CC-MAIN-2022-33 | https://tiandavis.com/thoughts/posts/the-history-of-the-pstn | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00404.warc.gz | en | 0.939792 | 2,677 | 3.46875 | 3 |
Written by Gabriella A. Nelson
As a student of city planning, there is no question that participants in the field have the ability to run upstream and enact change. Just imagine if in that parable there was a city planning policy that regulated how people were able to use the river, put in place physical barriers upstream if necessary, and created an agenda getting to the root of the problem with overarching goals and objectives focused on how to keep babies safe through community input and local expertise. Through thoughtful agendas, relevant visions, equitable design, and strategic frameworks, the skills of city planners can truly help change the trajectory of disparities throughout our communities, especially in areas of public health. In the early histories of American cities, the planning and public health professions were often inextricably linked. But a split emerged as municipal governments grew, divided into more departments, and consequently separated the academic fields. Today, city planning and public health efforts must be relinked as our nation struggles with alarming rates of infant and maternal mortality in the Black Community.
And how can city planners become the second fisherman, running upstream to address the root of it all? In order to suggest solutions, we have to understand the problem. The United States is the only developed nation where maternal mortality rates are going up.(1) For decades Black women have died of pregnancy-related complications at higher rates than white women and are now suffering the most from an escalating maternal morality crisis. Black babies are experiencing dismal birth outcomes, even as Black women are breaking beyond barriers in their careers and at universities. Even Serena Williams’ life-threatening experience after birth engrossed the minds of many as people began to think about what maternal and infant mortality and almost-deaths mean for Black women across the spectrum of education, income, and even celebrity.
The issue of Black maternal and infant mortality has been very prominent in the public
eye over the last few years. Recently an article in the NY Times addressed the disparity
and focused on the lived experiences of systemic oppression as a main contributing
factor.(2) In fact, scholars have researched how using a life course perspective while
studying health disparities often leads to evidence that racism is a contributing factor,
stating that disparities developed in one generation may further disadvantage the “starting point” for the next.(3) Stress that accompanies subtle and overt discrimination, violence, and domestic terrorism through racism can biologically alter the body and can travel to the fetus in utero, negatively affecting birth outcomes and taking a toll on the mother through all stages of maternity.
In response to the recent NY Times article, chilling accounts of Black mothers across the nation joined forces to speak on their own experiences coming face-to-face with infant and maternal mortality; sometimes speaking for those that are no longer with us. Some of the worst statistics on pre- and post-natal outcomes can be found down south in the Mississippi Delta where a key element is rural living conditions that make it hard for people to access medical services.(4) But this epidemic is also happening right in our own urban backyard. In a big city like Philadelphia, where our claim to fame (besides winning Superbowl 52) is our stronghold on “Eds and Meds,” Black infant mortality is effecting families at a rate much higher than their white counterparts. In the Preliminary Vital Statistic Report for 2015-2016, Philadelphia’s infant mortality rates remained 3 times higher among non-Hispanic Blacks (12.9 and 12.4 per 1,000) compared to non-Hispanic whites (3.9 and 4.2 per 1,000).(5) Low birth weights, which can lead to further complications and sometimes death, are effecting Black babies nearly two times as much as white babies. And in 2015 and 2016, the highest rate of preterm births was among non-Hispanic Black women.
While the thought of conceiving, being pregnant, and giving life to another human seem like a series of sacred events, Black women’s reproductive capacity has always been a point of public discourse in this country. Many times, Black women have been dictated on how, when, where, and to what extent they were allowed to reproduce. Let’s be real, this country was built on the backs of Black folks who were carried in the wombs of Black women. Dorothy Roberts, University of Pennsylvania professor of law, sociology and civil rights, thoroughly writes about the history of Black women’s bodies and how, many times, they were used to preserve an oppressive social structure. In her book, Killing the Black Body, Dr. Roberts chronicles how reproduction played a role in slavery through the ownership of Black bodies, unconsented medical experimentation, the Eugenics and Birth Control movements, and even in welfare and criminal justice policy through the modification of people’s behavior.(7) Her book gives keen insight into understanding the disconnect and distrust between Black people and medical institutions that continues to build upon the existing disparities we see today in infant and maternal birth outcomes.
City planners were no innocent bystanders in the abusive history of Black women’s bodies. In fact, city planning efforts have and continue to directly impact Black women’s reproduction through the creation and segregation of neighborhoods, systematic housing instability, disproportionate economic development and access to resources, and environmental injustice. In the book Infectious Fear, Samuel Kelton Roberts chronicles just how influential segregationist city planning politics were to public health during the tuberculosis epidemic in Baltimore during the first half of the twentieth century.(8) In a recent article on Rewire.com, housing instability is earmarked as an important, yet overlooked, risk factor for maternal death from pregnancy-related causes. Evidence indicates that housing instability is associated with low and very low birth weights, preterm delivery, infants that are small for their gestational age, and maternal and infant mortality.(9) City planning whether through policy implementation, real estate and infrastructure development, or urban design has had a heavy hand in creating the injurious circumstances for a modern day maternity and infant crisis in the Black community.
Racial segregation of American communities was the intentional and malicious work of federal policies. Thanks in part to city planning efforts, the creation of inner city ghettos, concentrated poverty, racial stereotypes, white flight, and suburban oases are apart of a discriminatory narrative the shapes the lives of many Black people. As a Black person living in America, there are virtually no safe spaces where we can be free of judgment. No matter where we live or how successful we are, encounters of discrimination and prejudice are almost a sure thing. Imagine living your entire life in a state of constant stress, fear or anger brought about simply because of the color of your skin. What does that do to psyche? What does that do to the body of an adult? Now, throw a developing fetus in the mix encountering stress as its baseline for homeostasis. It’s almost as if America is playing a cruel joke on Black people, robbing us of our rights to life well before we have the chance to experience liberty and the pursuit of happiness.
In the past, Black women relied heavily on Black midwives to guide them through pregnancy, labor, and the post-partum period. Midwives, in those days, weren’t regarded as medical professionals but were spiritual leaders and cornerstones of the community at a time when Black people stayed away from clinics to have children due to mistrust and lack of access to medical institutions. In the documentary, All My Babies, Marry Coley, a midwife in the rural South, described the birthing process as a 10-day period. She would stay with the family before, during, and after labor doing anything she could to help the family.(10) She didn’t have a car so she would walk and average of 5-10 miles to attend births in Albany, GA sometimes barely getting paid. But for Black midwives of those days, it was their choice and their life decision to give this much time and energy to others regardless of payment.
Today, despite a long cultural history of midwifery in the Black community, Black women currently represent less than 2% of the nation’s midwives after decades of race-based professionalization of the field.(11) But an emerging cohort of Black doulas is currently taking stronghold of the fight to keep Black women and babies healthy. A doula is not trained to make medical decisions like a midwife. Instead she provides emotional support and works as an advocate for the mother. Her role is to stay with the mother through the entire birth, working along side medical staff, amplifying her clients voice and protecting the mother’s memory of her birth. Doula-assisted mothers see less instances of medical intervention, cesarean births, and birth complications altogether. We know that increased inductions, cesarean section, and epidurals have all been linked to an increase in the morbidity and mortality of baby and mother.(12) Why aren’t we using doulas more in our efforts to keep people alive?
City planners can work as advocates for equitable policy to make doulas accessible to all mothers, regardless of location, income, or healthcare coverage. Recently, New York City expanded the use of doulas under Medicaid to help combat infant mortality rates.(13) Although there are kinks and coils to iron out, this is a win for Black women that is derived from a rich history of reproductive agency and the traditions of Black granny midwives. Other programs like the Philadelphia Alliance for Labor Support at the University of Pennsylvania and the Maternity Care Coalition should be applauded and funded for their efforts to train community doulas and extend services to clients free of charge, empowering mothers of all backgrounds to exert their reproductive rights.
At its core, city planning curriculum in universities around the country can do a better job of linking policy and plans to real people, real places, and real problems. There is no better place to explore innovative, blue-sky, and radical approaches to some of our countries biggest problems than inside the walls and with the resources of an academic institution. JeffDESIGN is a collaborative academic program between Philadelphia University and Thomas Jefferson University. This program teaches design and creative problem solving methods and it aims to equip the next generation of doctors with the skills and confidence to transform healthcare systems, services, spaces, and devices.(14) The way our current healthcare system is designed has greatly affected the health disparities we see today. Have you seen the inside of a labor room at your local hospital lately? How did it make you feel? Were you satisfied with your experience? The physical aspects of labor and delivery rooms and encounters with medical staff are a crucial component in addressing infant and maternal mortality. Studies analyzing women’s childbirth experiences and obstetric outcomes found that satisfaction with childbirth is considered the most important qualitative outcome in assessing childbirth experience, given that women’s satisfaction with this experience affects their health and their relationship with their infant.(15) Despite this research, the United States is a country with the shortest hospital stays and hardly any postpartum follow-up for mother, a very sensitive window for maternal mortality. While we appreciate the role our hospitals provide for moms-to-be, we also know that there is room to improve especially in areas of design, client comfortability, and even some medical practices.
City Planning directly effects the built environment around us. Pressing for incentives and policies to allow different kinds of real estate and infrastructure development is an elemental component of the profession. Creating housing programs specifically catering to the needs of at-risk pregnant women and mothers could really impact the way maternal and infant mortality is experienced in America. Impetus through federal, state, and local programs for the construction of non-hospital birthing centers in communities can help give mothers access to opportunities that can totally alter the course of their birthing experience. We can move the world for an Amazon HQ2, but what about healing our communities through tax incentives, funding opportunities and subsidies that consciously elevate birthing communities to keep women and babies alive?
Nurses and doctors in neonatal intensive care units are some of this country’s bravest heroes. There is no dollar value that can be put on the work they do to save lives as policies continue to reinforce the same cycles they work so hard to impede. Somewhere in the mix are city planners who learned from a profession that socially isolated families through redlining, displacement, and other brash efforts. The legacy of city planning has had some pretty negative and lasting physical, emotional, and biological effects on Black communities. Maternal and infant mortality is one. But moving forward, city planners will work in partnership with professionals across all fields of study to run upstream, while those who wade in the water to catch the babies already drifting down the river face the true consequences of what decades of institutional and systemic oppression breeds.
Gabriella A. Nelson is a city planner, possessing a strong affinity at the confluence of urban development and public health. She currently works as a Project Analyst with the Philadelphia Housing Authority to help house some of the city’s most vulnerable residents and maintain a much needed level of affordability as the city re-surges. She believes the city is for everyone, especially for those who want to stay after bearing decades of disinvestment and devastation. Gabriella identifies as a problem-solver, an inquisitive thinker, and a creative whose experiences and opinions are deeply rooted in her Blackness, womanhood, and humanness. | <urn:uuid:4288ca93-9b5d-47ec-bffc-7e68df26a193> | CC-MAIN-2022-33 | https://www.orgasmicbirth.com/whos-throwing-black-women-in-the-river/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571959.66/warc/CC-MAIN-20220813142020-20220813172020-00604.warc.gz | en | 0.957409 | 2,764 | 2.78125 | 3 |
In a long email “conversation” with a friend last week, he expressed his enthusiasm for Pope Francis and his recent trip to Canada. “The spirit of Peter the first pope is alive and working in Pope Francis” he said.
We correspond just about every week and I replied that I appreciated the pope’s going to Canada but that his apology to Indigenous peoples didn’t go far enough. Reconciliation, I said, is still very much a work in progress. Francis apologized for the “evil” of church personnel who worked in the schools. He did not acknowledge the Catholic Church’s papal and institutional support for the human denigration and misery created by the 15th century “Doctrine of Discovery.” In fact, just before a papal Mass at the Basilica of St. Anne de Beaupré on July 28 in Quebec, a large banner with the words “Rescind the Doctrine”was unrolled in front of the altar.
The Doctrine of Discovery was launched by Pope Alexander VI (1431 – 1503) in 1493. This new papal teaching stressed that lands not inhabited by Christians were available to be “discovered” and exploited and that “the Catholic faith and the Christian religion be exalted and be everywhere increased and spread, so that the health of souls be cared for and barbarous nations be overthrown and brought to the faith itself.” It played a central role in the Spanish conquest of the New World and supported Spain’s exclusive right to the lands discovered by Christopher Columbus (1451 – 1506) the previous year.
The Doctrine of Discovery soon became the basis for all European claims in the Americas. Called “the principle of discovery,” it became as well as the foundation for the United States’ western expansion. As U.S. Chief Justice John Marshall (1755 – 1835) declared in the 1823 Supreme Court case Johnson v. McIntosh,“the principle of discovery” had given the “discovering” nations an absolute right to their New World lands. In essence, John Marshall was saying that U.S. American “Indians” had only a right of occupancy, which if need be could be abolished.
Pope Alexander’s Doctrine of Discovery made headlines again throughout the 1990s and in 2000, when many Catholics petitioned Pope John Paul II (1920 – 2005) to formally revoke it and recognize the human rights of indigenous “non-Christian peoples.”
Alexander VI, of course, was quite a character. Born Rodrigo de Borja, in the prominent Borgia family, Alexander was one of the most controversial of the Renaissance popes. He had manny mistresses and fathered several children with them. One of his sons, Cesare Borgia (1475 – 1507), when only seventeen, was made Archbishop of Valencia. The Florentine Dominican friar Girolamo Savonarola (1452 – 1498) strongly and regularly criticized Pope Alexander. In 1498 the annoyed and angry Alexander had Savonarola arrested, tortured, hanged, and burned.
I wrote to my friend that Pope Francis really needs to renounce, repudiate, and revoke the Doctrine of Discovery. For centuries, this doctrine has justified the seizure and dispossession of Indigenous territories and nations all over the world. And I added, “And an important clarification: the Apostle Peter was not the first pope and he was never a bishop of Rome.”
My friend replied with a smiley and said “You really have become anti-pope as well as anti-Catholic.” I replied with my own smiley that I am neither anti-Catholic nor anti-pope. I stressed that Roman Catholic institutional leaders have to be knowledgeable and must be truthful about the church’s history. Some archaic papal teachings should simply be abandoned.
For my friend’s summer reading, I recommended the 2020 edition of Saints & Sinners: A History of the Popes by Eamon Duffy, Irish historian and professor of the history of Christianity at the University of Cambridge and a former president of Magdalene College. It is an excellent papal history.
Along with most contemporary historical theologians, Eamon Duffy stresses that, although a number of pious legends about Peter were accepted and passed on by people like Ambrose of Milan (c. 339 – c. 397) and Augustine of Hippo (354 – 430), many early stories about Peter are simply religious fantasies. They are not historic facts. They are pious legends. Peter’s being crucified upside down, for example, and his being the “first pope.”
Neither Peter nor Paul founded the Christian community at Rome. There were Christians in the city long before either Peter or Paul arrived there. And, as Eamon Duffy and many other well respected Catholic scholars like John P. Meier (b. 1942) and Raymond Brown (1928 – 1998) stress, there was no single bishop in Rome until many decades after the deaths of Peter (c. 68) and Paul (c. 65)..
To be clear, the papacy was not established by the historical Jesus. Bishops weren’t either. The papacy was a later Christian development. In Rome, when Peter was alive, there was no pope, no bishop as such, because the Christian community in Rome was slow to develop the office of a chief presbyter, or bishop. The early treatise The Shepherd of Hernias, written in Rome in the second century, speaks always collectively about the leaders of the community, or about the elders who presided over the community. The author makes no attempt to distinguish between bishops and elders.
In the fourth century, however, many believed that Peter’s tomb was located on the Vatican hill where he had been executed and where Constantine (c. 272 – 337) ordered the construction of a basilica (Old St. Peter’s Basilica) on the site of today’s St. Peter’s Basilica. Supposedly, Peter’s bone fragments and remnants of a burial shrine were discovered under the current St. Peter’s Basilica in excavations started in 1939. In 1965, Pope Paul VI declared that they were indeed the relics of Peter. Unfortunately, controversy still surrounds the methods and some of the findings of the excavations. Historically it is not clear that the shrine in fact marked the grave of Peter and the fragments of bone discovered were not in the central niche of the shrine. Also, one cannot really be certain that they belonged to Peter, since in first century Rome the remains of executed criminals were usually thrown into unmarked mass graves.
A bit more about Christianity and early Roman bishops: The Roman empire in the third century was divided by civil war and swept by plague and disease. It was ruled by a bewildering succession of emperors, and for a while by the “tetrarchy” of four emperors. Constantine was declared the only emperor in 306. In 313, he proclaimed that every person was free “to follow whichever religion one chooses.” Under Constantine, Christianity rapidly became the dominant religion. Christianity alone seemed to offer a single overarching intellectual and moral frame of reference. This greatly appealed to Constantine. Like his father, he had originally worshipped Sol Invictus, the Unconquered Sun, but his mother Helena was a Christian. His conversion to Christianity was gradual. He wasn’t baptized until right before his death in 337. Constantine, however, saw Christianity as the needed cement for his empire. He appointed Christian bishops as civil judges. Bishops tried and judged people and corporal punishments were regularly administered at the command of the bishops.
In 325 Constantine summoned a council of bishops to meet at Nicaea to reinforce the Christian church as the great unifier of his empire. Constantine needed a church that would demand strong adherence to discipline and dogma. In the ancient city of Nicaea, which today is located within the modern Turkish city of Iznik, Emperor Constantine called the Council of Nicaea to resolve the Arian dispute in the church which threatened to destabilize the entire empire. The Creed of Nicaea clearly expressed the dogmatic teachings that all believes had to uphold. I have always found it interesting that the famous creed says nothing about being a Good Samaritan and loving one’s neighbor. The bishops at Nicaea reinforced the view of God as a God of strict rules and vengeful punishments. Constantine, of course, was a savvy and ruthless emperor when he declared himself a Christian.
During the early years of Christianity, the bishops of Rome enjoyed no civic temporal power until the time of Constantine. Most of the bishops of Rome, in the first three centuries of the Christian era, were rather obscure figures. The conversion of Constantine, however, propelled the bishops of Rome into the heart of the Roman establishment. After the fall of the Western Roman Empire, c.476, the bishops of Rome became powerful rulers.
When Pope Leo III (750 – 816) crowned Charlemagne (743 – 813) as Holy Roman Emperor in 800, he established the precedent that, in Western Europe, no one could be emperor without being crowned by a pope. After a conflict, known as the Investiture Controversy, the papacy increased its power in relation to the secular rulers of Europe. In 1095 Pope Urban II (1035 – 1099) launched the First Crusade which united Western Europe under papal power. The objective of the First Crusade (1095 – 1099) was the recovery of the Holy Land from Islamic rule.
The word “pope” derives from the Greek pappas meaning “father.” In the early centuries of Christianity, the title was applied to all bishops as well as to senior clergy. Later it became reserved in the West for only the bishop of Rome, during the reign of Pope Leo I (400 – 461). He was pope from 440 until his death. Leo was a Roman aristocrat and was the first pope to have been called “the Great.” He is probably best known for having met “Attila the Hun” in 452 and persuading him to turn back from his invasion of Italy. Attila (c. 406–453) was the ruler of the Huns from 434 until his death. He is also considered one of the most powerful rulers in world history.
Pope Leo I, a powerful man, greatly contributed to developing ideas of papal authority. He was greatly esteemed by Pope Pius IX (1792 – 1878) the pope who strongly condemned liberalism, modernism, separation of church and state, and other Enlightenment ideas. In 1869 he proclaimed that he as pope was infallible, enhancing the role of the papacy and decreasing the role of the bishops. Pio Nono, as he is often called, had this Catholic doctrine dogmatically defined at the First Vatican Council of 1869–1870.
Well enough papal reflections for now. I like the synodality movement in today’s Catholic Church: a process of mutual collaboration and discernment engaging the whole People of God in the life and mission of the Church. Synodality speaks a different voice. As Phyllis Zagano reported in Religion News Service on August 17th: “The synod is a worldwide event, and early reports from bishops’ conferences outside the U.S. repeat the same story: Clericalism is a scourge on the church, and women are not respected or included in leadership.” | <urn:uuid:f46e0306-66be-4f56-948a-cd522d88166a> | CC-MAIN-2022-33 | https://foranothervoice.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00404.warc.gz | en | 0.975101 | 2,408 | 2.984375 | 3 |
This brief is part of the Brookings Blueprints for American Renewal & Prosperity project.
- The global and national context for accelerating U.S. climate action
- Policy recommendations
The United States is rejoining international efforts against climate change in a crucial year. All members of the Paris Agreement are obliged to submit updated pledges for emissions reductions prior to a global climate meeting in November. President Joe Biden wants to re-establish U.S. leadership on climate. Doing so will require the United States to make an ambitious but achievable pledge and to assist other nations in doing the same. The political landscape for enacting climate legislation in the United States is still tricky, but U.S. subnational actors have continued emissions reduction efforts during the Trump administration and will be a key part of efforts going forward. These subnational actors can share their skills and ambition with their counterparts abroad. The United States also has an opportunity to lead through its role in the global financial sector. It can encourage greener investing by requiring disclosure of climate risks and support global efforts to finance emissions reduction and climate adaptation in developing countries.
2021 has the potential to be a year of rapid advancement on climate change. The European Union, China, Japan, and South Korea have all announced new and ambitious near- and long-term climate targets, and every member of the Paris Agreement is obliged to update their pledges prior to the November Conference of the Parties (COP) meeting. Non-government actors and sub-national governments around the world are also committing to ambitious long-term goals. Most of these goals focus on reaching net-zero emissions by 2050. As the international community gears up for the COP event, political attention to climate is the highest it has been since the runup to the Paris COP in 2015. Expectations are high for commitments that honor the Paris Agreement goal of limiting warming to “well below” 2°C above pre-industrial levels.
Four years of U.S. absence from the global climate community — including global climate negotiations and international efforts to reduce greenhouse gas emissions — have left a big gap in international leadership and credibility.
In this context, the reaction in the global climate community to Joe Biden’s election as U.S. president has been overwhelmingly positive. The world sees the importance of U.S. action to limit overall global temperature rise, and President Biden’s campaign, appointments — including former secretary of state John Kerry as special presidential envoy for climate — and early actions in office indicate his interest in a new approach to climate change. However, the Biden administration immediately faces a difficult challenge. Four years of U.S. absence from the global climate community — including global climate negotiations and international efforts to reduce greenhouse gas emissions — have left a big gap in international leadership and credibility. How does the new administration meet the moment? How does the United States regain its credibility on the world stage?
Since greenhouse gas emissions mix throughout the global atmosphere and oceans, emissions in one part of the world impact the climate everywhere. The Paris Agreement calls for all countries to reduce emissions in line with their own development goals and political realities. But science suggests that a goal of net-zero emissions from the largest emitting countries by mid-century is necessary. In this context, credible U.S. action is critical. As the world’s largest economy, second-largest greenhouse gas emitter, and superpower re-engaging on climate diplomacy, U.S. actions can either dampen or accelerate global action. If the United States fails to make commitments that the rest of the world views as serious, it will be harder to pressure other countries to take more serious action. Credible U.S. action could form the basis for genuine leadership, as the United States displayed preceding the Paris COP through its bilateral commitments with China.
The good news is that Biden is appointing climate experts to positions throughout the executive branch and promises a “whole of government” approach to climate change. However, despite unified political control of the White House and (narrowly) Congress, the nation remains polarized on whether and how to respond to the climate crisis. Many actions that could move the United States toward a low-carbon economy do not require legislation and could be implemented with little or no bipartisan support, but given that such actions were reversed when the Trump administration replaced the Obama administration, these may not be enough to demonstrate U.S. credibility. U.S. leadership in innovation, financial markets, and civil society provide additional opportunities for international engagement and action.
Changes in how we understand the low-carbon transition are an additional source of good news. The conversation on climate action is shifting from one focused solely on costs to one centered around opportunities: for low-cost renewable electricity generation, for growth in jobs and communities, for greater justice for communities that have long been disproportionately affected by pollution, for development in countries that currently lack modern energy services. The cost of renewable electricity has fallen rapidly and technological advancements in other sectors, like batteries, are reducing the cost of decarbonization. A zero-carbon world is coming into view.
The United States sat on the sidelines for four years of global climate action, and the world changed while we were away. The science about climate change became clearer and our allies and partners abroad are stepping up their national climate strategies in response. Now that the United States is back in the game, they expect ambitious action, including a new U.S. climate target or nationally determined contribution (NDC). In this context, after whipsawing political positions on climate change, the United States must advance a credible strategy for robust and continued climate action at home that is seen as reliable and not subject to reversals over time.
In some ways, such action at home faces headwinds, but in other ways there are reasons for optimism. With Congress finely balanced, the pathway for successful legislation on climate has narrowed. Moreover, the White House and Congress are focused on the immediate crisis of the COVID-19 pandemic and the resulting deep economic recession. At the same time, a strong set of near-term options exist to embed policies to support climate action, low-emission transportation, and clean energy development into current discussions around economic recovery and investment. In this way, spending designed to pull the nation out of the recession would encourage investments to reduce emissions and increase resilience to climate change.
Another element that has changed in the past four years — and that supports enhanced domestic climate policies and international credibility — is the increased breadth and depth of sub-national action on climate in the United States. In fact, subnational actors with significant climate commitments (including states, cities, and businesses) represent roughly 70% of U.S. GDP — equivalent to the world’s second largest economy, roughly the size of China’s. Using policy authorities at their disposal, many of which are significant, these actors have advanced climate action across multiple sectors and greenhouse gases, including electricity, clean transportation, land use, methane, hydrofluorocarbons, and more. Even outside of federal regulation and legislation, such policies already are driving significant reductions in U.S. emissions and could do more if expanded in line with recent trends. As another example, over 600 local governments in the United States have developed climate action plans. While the majority of these municipalities are lagging in their efforts to meet their targets, some large cities (Los Angeles, New York City, and Durham, North Carolina, for example) have achieved significant reductions and have highly qualified organizations to demonstrate how such reductions can be achieved.
Against this backdrop, the United States can and should re-engage fully with the international community to support global action. To do so, it must act in five linked ways.
As the federal government dismantled its climate efforts, the subnational community substantially increased its climate commitments. As a result, the United States has highly motivated and experienced actors outside the federal government.
Embed climate action into U.S. society. The core project for the United States this year, and for years to come, is to develop and implement a national climate strategy that brings to bear all possible areas of policy action. In many ways the U.S. is playing catch-up, but one important advantage developed during the Trump years. As the federal government dismantled its climate efforts, the subnational community substantially increased its climate commitments. As a result, the United States has highly motivated and experienced actors outside the federal government. Federal action to catalyze and encourage these local efforts will be a key part of a bottom-up climate strategy, enabling more robust policy through oscillating political cycles at the national level.
Subnational actions are key, but some actions must take place at the federal level. New legislation is a first potential contributor. Given the current makeup of Congress, actions rooted in tax credits, investment, and stimulus are likely to have some traction in the near term. Other policies will have to be evaluated in light of their potential support. A second possible contributor is administrative actions that can be implemented by the executive branch, including regulatory actions under existing laws. Such administrative actions are less durable than legislative outcomes, but remain on the table as options.
Advance subnational diplomacy. While not all countries are structured like the United States, bottom-up leadership and implementation are central to success in some form in all countries. The United States can use its non-federal actors in its diplomatic efforts to support and bolster climate action around the world. For this, U.S. cities, states, and businesses can collaborate with their counterparts in other countries to discuss opportunities and strategies, supported by the U.S. diplomatic effort. Such efforts could take place through a U.S. State Department Office of Subnational Diplomacy, as recommended by Anthony F. Pipa and Max Bouchet in their brief for this series.
Announce an ambitious yet credible U.S. nationally determined contribution. As a central pillar of the Paris Agreement, countries around the world regularly offer their NDCs and report on progress. Each country’s NDC is viewed as an indicator of the country’s overall climate ambition. The U.S. target will likely have an outsized impact on overall global action this year. President Biden has committed to offer the next U.S. NDC at a leaders’ meeting that he will host on Earth Day, April 22. In parallel with developing the national climate strategy, Washington will be undertaking an assessment of the possible emissions reductions associated with such a strategy. International perception of the U.S. domestic commitment is important; the commitment must be seen as sufficiently ambitious to unlock the other diplomatic opportunities available to the United States. The goal of achieving emissions reductions of approximately 50% below 2005 levels by 2030 is receiving a great deal of attention, but is highly ambitious for the United States. Achieving such a target would be a challenge, but the whole-of-society approach described above could improve the probability of reaching such a goal.
Revisit U.S. domestic financial regulations and international climate finance. Mobilizing new sources of finance to support a rapid economic and technological transition is central to addressing climate change. Here too, the United States provides an important link between domestic and international actions. Domestically, the U.S. financial system leads the world, but U.S. financial regulations do a poor job of requiring disclosure of climate-related risk, including the physical risks associated with climate change. Recent movement toward addressing these issues can be accelerated. For example, the Federal Reserve recently joined the Network for Greening the Financial System and Treasury Secretary Janet Yellen made clear in her confirmation hearing that she believes climate change is a risk to the financial system. Through its outsized influence on the global financial system, the United States can encourage greener investment. Greater disclosure of climate risks would allow investors to direct funds to low-carbon and resilient assets, potentially moving the needle in areas where policy lags behind.
The United States must also exercise leadership in marshalling the financing that developing countries, especially the larger emitters, will need to raise their climate ambition, and to help poor and vulnerable countries adapt to the already evident impacts of climate change. This includes ensuring that developed countries live up to their commitment to mobilize $100 billion per year in climate finance, a central tenet of the climate accords. For the United States, meeting its commitment to the Green Climate Fund, established under the U.N. climate framework a decade ago, will be an immediate litmus test. The United States must also play a leadership role in unleashing the potential of the International Monetary Fund and the multilateral development banks in supporting more ambitious climate action. These institutions can play a role beyond their own financing by catalyzing private investment through reducing and sharing risk. The COVID-19 pandemic provides an opportunity to “build back better” by tackling the interrelated challenges of job growth, climate change, pollution, and biodiversity.
Support international efforts and national strategies. The United States can employ its substantial foreign policy apparatus to engage with key countries, partners, and allies around the world. In doing this, the United States can first communicate how it will achieve its own ambitious goals, then seek to understand how other countries anticipate delivering on their own goals and work with them bilaterally or multilaterally to support their national climate strategies. Finally, it can work with partners around the world to ensure that there is broad support for a strong outcome at the climate conference later this year.
Fundamentally, the climate challenge requires pushing the technological frontier in a dozen key sectors, from electricity to cars to building materials. In every sector the challenge is different, and in every sector there are different arrays of international partners, such as national and subnational governments and pioneering firms. The United States should ally with the U.K. government as it advances key “campaigns” that reflect this sector-focused approach to deep decarbonization. The effort should identify a few sectors, such as cars and electricity, where the United States is at the frontier and can particularly shape the global effort.
When the Paris Agreement was concluded in 2015, the world took a significant step toward addressing climate change. Paris established an architecture to encourage a global “race to the top” of climate ambition and catalyzed the first set of national climate targets as a down payment on a global emissions trajectory toward net zero. The intervening years have seen some negative forces, such as the U.S. opposition internationally and rollbacks domestically, and more recently the pandemic and economic recession. Yet there have also been positive surprises — increased national ambition in many other countries, continued advancements in the quality and cost of clean technologies, and the groundswell of subnational action in the United States and elsewhere. U.S. global leadership on climate is again a possibility and the opportunity for a new, major step on climate change is palpable. This moment has arrived just in time to have a chance to put the world on a safer climate trajectory. U.S. action today, with a joint domestic and international strategy, is critical for our shared global success.
Ted Reinert edited this paper. Amar Bhattacharya and David G. Victor provided invaluable comments. | <urn:uuid:a44cd2ba-fee4-4587-bf72-4dd1cdd2283d> | CC-MAIN-2022-33 | https://www.brookings.edu/research/us-action-is-the-lynchpin-for-successful-international-climate-policy-in-2021/?utm_campaign=Brookings%20Brief&utm_medium=email&utm_content=113819260&utm_source=hs_email | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00004.warc.gz | en | 0.949239 | 3,123 | 2.546875 | 3 |
In a blog post published last July about Brigadier General Thomas W. Egan, I stressed how countless disabled Civil War veterans endured decades of chronic pain and emotional distress long after the guns of the Civil War fell silent. In her groundbreaking book Bodies in Blue: Disability in the Civil War North (2019), Dr. Sarah Handley-Cousins used Union Major General Joshua L. Chamberlain – among many others – as an example of a high-ranking officer who suffered non-visible disabilities (not easy to spot with the naked eye, like amputees) that physically and emotionally tormented him for years after the Civil War. An infection ultimately took his life 50 years after being wounded.
This got me to thinking: What other Union generals experienced what Chamberlain did as a result of their wartime service? About one-fifth of Union generals experienced accidents leading to injuries and a half or more suffered one or more non-fatal wounds. (This number doesn’t include brevet brigadier generals.) I’ve identified 10 generals whose war continued long after Lee’s surrender at Appomattox. Some of these men endured years of agony from their wounds or injuries. These disabilities robbed them of the ability to perform even simple tasks and certainly left them feeling emasculated and disheartened. For the unlucky ones – depending on how you want to look at it – wounds or injuries cut years off their lives. These are their stories.
1. Brigadier General James Barnes (1801-1869)
Barnes graduated from West Point fifth in the Class of 1829, four spots behind Robert E. Lee and eight spots ahead of Joseph E. Johnston. He resigned from the army in 1836 to become a civil engineer but returned to fight in the Civil War. On July 2, 1863, while leading a division at Gettysburg, the 61-year-old general suffered a wound to the left leg from a shell as he sat mounted next to Colonel William S. Tilton. The wound forced Barnes to turn over command of his division two days later. By 1864, Barnes was still suffering from his Gettysburg wound, further complicated by malaria. He never returned to the field. In 1869, Barnes reportedly died from liver congestion, but his tombstone tells another story: “A graduate of the West Point Military Academy, he was actively engaged throughout the late war and died of disease contracted in the service of his country.”
2. Major General Alexander Asboth (1811-1868)
Asboth suffered his first wound at Pea Ridge when a Confederate musket ball penetrated his right arm, fracturing it. He suffered another two wounds during a charge at the Battle of Marianna, Florida, on September 14, 1864. The first fractured his left arm in two places and the second shattered his left cheekbone. Surgeons could not locate the ball, so it remained embedded in his cheek. The wound impaired his sense of smell, sight, and hearing. When doctors finally discovered the ball in 1866, the stubborn general chose to delay the surgery to sail to Argentina to accept the position of U.S. minister there. This decision would cost him his life. “He has long been an invalid and a great sufferer,” a correspondent from Buenos Aires reported before his death in January 1868.
3. Brigadier General Egbert B. Brown (1816-1902)
The nephew of Major General Jacob Brown, Egbert Brown sailed the Pacific Ocean for four years on a whaling ship before the war. While commanding a garrison of troops at Springfield, Missouri, during General John S. Marmaduke’s invasion of Missouri, Brown was struck in the left arm by a musket ball, fracturing it and severing his bicep. Major General Samuel R. Curtis feared that he would lose the arm or perish from the effects of its amputation. Surgeons saved Brown’s arm, but the wound continued to afflict the general until he resigned in 1865. A year later, he reported his arm was useless. Brown regained limited mobility by 1870, but three years later, he lost mobility, leaving him crippled for the rest of his life.
4. Brigadier General Robert F. Catterson (1835-1914)
Bob Catterson made an impressive ascension from sergeant to brigadier general by the end of the Civil War. While serving as a captain at Antietam, he suffered four wounds in a single day. One pierced his buttocks and lacerated his sphincter. The second damaged his left thumb. The third struck his left foot and lodged in the middle of his heel bone. The fourth and last struck him in the right kneecap. Despite his desperate condition, Catterson reported that his wounds were not dressed for days. After the war, a doctor found that when his first wound healed it had formed a pouch of coagulated blood near his rectum. This interfered with his ability to defecate, limiting his ability to perform this basic bodily function.
5. Brigadier General Morgan H. Chrysler (1822-1890)
Chrysler served in most of the Army of the Potomac’s major battles until his regiment was mustered out in 1863. After reenlisting, he led a cavalry regiment and brigade in the Department of the Gulf. On July 28, 1864, during a skirmish at Morgan’s Ferry Road, he was severely wounded when a ball struck him in the sternum and exited his right shoulder. A farmer before the war, Chrysler was unable to return to work because of the wound. By 1870, he could hardly extend his right arm above his shoulder without pain. Likewise, any pressure placed on the scar caused him to cough and his laryngeal and pharyngeal muscles to contract. Chrysler suffered from spasms if he spoke loudly or if he swallowed large pieces of food. At night, he experienced dyspnea and the sensation that the lower part of his trachea was being restricted. By 1879, his right shoulder drooped, his right eye acted independently of the left, and he experienced numbness to his left side.
6. Brigadier General Lysander Cutler (1807-1866)
Cutler spent most of his army career in the famed Iron Brigade and rose to division command. On August 28, 1862, at the Battle of Brawner’s Farm, he was wounded when a ball smashed into his right thigh. Nearly two years to the exact day of this wound, he was hit in the face by a shell at Weldon Railroad, causing disfiguration. Broken in health, Cutler resigned and returned home an invalid. He continued to grow weaker as a result of his wounds. On July 19, 1866, Cutler suffered his first stroke. The second occurred six days later, leading to total paralysis of the right side of his body. He died five days later. Cutler’s war comrade and the governor of Wisconsin, Lucius Fairchild, declared, “Distinguished for his services, covered with honorable scars, filled with years and glory, he goes to his grave deeply mourned by the entire people of a sorrowing State.”
7. Brigadier General Samuel Beatty (1820-1885)
A farmer and sheriff of Stark County, Ohio, before the war, Sam Beatty served in most of the major battles of the Western Theater without suffering a wound, but not without injury. On September 19, 1863, during the Battle of Chickamauga, his horse slipped and fell on him. He dislocated his left shoulder and suffered a small wound near his upper shoulder. Beatty suffered his second serious injury in March 1865, near Stevenson, Alabama, when he jumped from a stationary train and accidentally collapsed onto a railroad tie. He damaged his left hip and suffered an inguinal hernia to his right side. The farmer’s left arm and shoulder were nearly useless after the war. In 1877, he was still suffering from the hernia sustained during the train accident. His hip was lame and he usually wore a sling around his arm. He continued to suffer from his injuries for the remainder of his life until his death on his Massillon farm at the age of 64.
8. Brigadier General Manning F. Force (1824-1899)
On July 22, 1864, during the Battle of Atlanta, a Confederate ball punctured General Force’s face below his left eye and exited near his right jawbone. The bones in his mouth were shattered and he could not speak. After the war, he served on the Superior Court of Cincinnati as a judge until 1888, when poor health and fatigue forced him to step down. A year later, Dr. J.T. Hayes of Erie County, Ohio, reported Force was experiencing neurological changes – disturbed speech, twitching muscles in his face and neck, and the loss of sensation in arms, hands, and upper body – which he attributed to the general’s Atlanta wound. Force also lost control of his bladder and rectum and suffered from erectile dysfunction. Hayes concluded that his death in 1899 was “undoubtedly due to destructive change of nervous structure and its complications, such as organic disease of heart, disturbance digestive tract, etc.”
9. Brigadier General Charles T. Campbell (1823-1895)
A Mexican War veteran, Campbell matched Joshua Chamberlain’s six wounds during his service in the war. He suffered three wounds at the Battle of Fair Oaks on May 31, 1862. Campbell was shot in the right wrist, groin and pelvic bone, and left leg. Less than seven months later with his arm still in a sling, Campbell was severely wounded in three places at Fredericksburg. One ball passed through his body, cutting into his liver, and two through his arm, shattering it from the wrist to elbow. His colleague Brigadier General Alexander Hays teased that Charlie Campbell “does not know the different between minie-balls and Brandreth’s pills.” Sarah E. Campbell’s pension claim reported that “he came out of the war completely disabled.” By 1880, Campbell’s right hand was nearly useless and he suffered from ankylosis in his right elbow. He needed the assistance of another person to put on or to remove his clothing, bath, and to get in or out of a vehicle. A lame back and rheumatism in his left arm and shoulder further complicated his condition. In 1895, Campbell fainted and fell down a flight of stairs at his hotel in Scotland, South Dakota, causing him to break two ribs and an arm. He ultimately succumbed as a result of internal injuries.
10. Brevet Brigadier General Cassius Fairchild (1829-1868)
The older brother of Brigadier General Lucius Fairchild (who lost his left arm during the war), Cassius Fairchild was seriously wounded in the thigh at Shiloh. One account stated that the wound was so close to his hip-joint that surgeons couldn’t amputate his leg. After the war, the wound reopened while he acted as a pallbearer during a friend’s funeral. On his deathbed at his father-in-law’s home, Fairchild chose to marry his fiancée, Mary C. Haney. An obituary published by the Society of the Army of the Tennessee gave a heartrending account of this event. It stated that the “two hearts which had loved so tenderly, and had looked forward to so much happiness on earth, were united. It was not the happy bridal scene which had been hoped for, and there were tears instead of smiles, but the hearts which had loved so well, were united.” Fairchild died days after his marriage. His tombstone at Forest Hill Cemetery in Madison, Wisconsin, notes that he perished due to his Shiloh wound.
Dozens of other generals not included here experienced lingering injuries or wounds (physical or psychological) once they transitioned back to civilian life. It impacted their jobs, affected their relationships with family members, and diminished their self-worth. Some got on with their lives, while others died as a result of these injuries or wounds. Most fell somewhere in between the two, functioning as best as they could as they lived out their final years in pain and disabled. For them, a longer second war commenced once they returned home from the American Civil War.
Sarah Handley-Cousins, Bodies in Blue: Disability in the Civil War North (Athens: The University of Georgia Press, 2019), 73-75; Brian Matthew Jordan, Marching Home: Union Veterans and Their Unending Civil War (New York: W.W. Norton, 2014), 3-4, 7.
Jack D. Welsh, Medical Histories of Union Generals (Kent, OH: Kent State University Press, 1996), xv.
Welsh, Medical Histories of Union Generals, 17; “Obituary: Major-General James R. Barnes,” The Evening Telegraph (Philadelphia, PA), February 13, 1869.
Welsh, Medical Histories of Union Generals, 7-8; The Evansville Journal (Evansville, IN), February 28, 1868; Joseph K. Barnes, The Medical and Surgical History of the War of the Rebellion (1861-65) (Washington: Government Printing Office, 1875), 389; The Army & Navy Official Gazette, Vol. 2, 1864-65 (Washington: Printed at the Office of F. & J. Rives, 1865), 274-75.
Welsh, Medical Histories of Union Generals, 40-41; Index to the Miscellaneous Documents of the House of the Representatives for the First Session of the Fiftieth Congress, 1887-88 (Washington: Government Printing Office, 1889), 179; James G. Wilson and John Fiske, eds., Appletons’ Cyclopædia of American Biography. Vol. 1 (New York: D. Appleton and Co., 1891), 398.
Welsh, Medical Histories of Union Generals, 62-63; Indianapolis Star (Indianapolis, IN), April 12, 1914.
Welsh, Medical Histories of Union Generals, 68-69; Edward A. Collier, A History of Old Kinderhook (New York: G.P. Putnam’s Sons, 1914), 476-77; The Miscellaneous Documents of the House of the Representatives for the Second Session of the Fifty-Second Congress, 1892-93 (Washington: Government Printing Office, 1893), 450.
Welsh, Medical Histories of Union Generals, 88-89; “Death of General Cutler,” Dodgeville Chronicle (Dodgeville, WI), August 2, 1866; “The Late Major-General Lysander Cutler,” The Evening Telegraph (Philadelphia, PA), August 6, 1866; Frank A. Flower, History of Milwaukee, Wisconsin (Chicago: The Western Historical Company, 1881), 792.
Welsh, Medical Histories of Union Generals, 24-25; Society of the Army of the Cumberland, Seventh Reunion. Grand Rapids, Michigan. 1885 (Cincinnati: Robert Clarke & Co., 1886), 229-232; William H. Perrin, ed., History of Stark County, With an Outline Sketch of Ohio (Chicago: Baskin & Battey, Historical Publishers, 1881), 977-78.
Welsh, Medical Histories of Union Generals, 117; Military Essays and Recollections: Papers Read Before the Commandery of the State of Illinois, Military Order of the Loyal Legion of the United States. Vol 1 (Chicago: A.C. McClurg and Co., 1891), 306; Glenn W. LaFantasie, “Unknown Soldier: Manning Ferguson Force, the Hero of Atlanta,” HistoryNet (Accessed March 13, 2019), https://www.historynet.com/unknown-soldier-manning-ferguson-force-the-hero-of-atlanta.htm; Frances Horton Force Pension Report, May 17, 1900, 56th Congress, 1st Session, House of Representatives, Report No. 1567.
Welsh, Medical Histories of Union Generals, 52-53; “Brig. Gen. Charles T. Campbell, a Veteran of Three Wars,” The Indianapolis Journal (Indianapolis, IN), April 21, 1895; “Mexican War Veteran Dead,” The Weiser Signal (Weiser, ID), April 25, 1895; Sarah E. Campbell Pension Report, April 12, 1898, 55th Congress, 2d Session, Senate, Report No. 860; George O. Seilhamer, “Memoirs of Men of Mark: Gen. Charles T. Campbell,” in The Kittochtinny Historical Society, Papers Read Before the Society, February, 1915 to April, 1922. Vol. 9 (Chambersburg, PA: Franklin Repository Press, 1923), 201-203; George T. Fleming, ed., Life and Letters of Alexander Hays: Brevet Colonel United States Army Brigadier General and Brevet Major General United States Volunteers. Complied by Gilbert Adams Hays (Pittsburgh, 1919), 288, 590.
Watertown Republican (Watertown, WI), October 28, 1868; “Death of Cassius Fairchild,” Mineral Point Weekly Tribune (Mineral Point, WI), October 28, 1868; “Death of General Cassius Fairchild – Brief Biography of the Deceased – Drowning Case,” Chicago Tribune (Chicago, IL), October 26, 1868; “Critical Condition of General Cassius Fairchild,” Chicago Tribune (Chicago, IL), October 16, 1868; Report of the Proceedings of the Society of the Army of the Tennessee at the First Annual Meeting, Held at Cincinnati, Ohio. November 14th and 15th, 1866 (Cincinnati: Published by the Society, 1877), 166-67; Consul W. Butterfield, ed., History of Dane County, Wisconsin (Chicago: Western Historical Company, 1880), 535-36. | <urn:uuid:157b00bc-2d5a-41c1-bbfc-ee7459f65108> | CC-MAIN-2022-33 | https://emergingcivilwar.com/2020/03/20/the-unending-war-for-ten-union-generals/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00205.warc.gz | en | 0.965458 | 3,860 | 2.765625 | 3 |
How To Score Full Marks In The Cloze Test?
Cloze test is an important part of the English Language section especially when it comes to government job examinations. In the SSC CGL Tier 2 exam, 200 questions will be asked from the English Language with 1 mark each to be attempted in 2 hours. SSC CGL Tier 2 exam dates can be out soon. Cloze test comprises of 25 marks in Paper 2. How can you excel in this section and gain full marks in cloze test? What are the tips and strategy that needs to be adopted while appearing for the exam? Check out the article below.
What is Cloze Test?
How to solve cloze test questions in the exam?
What must be your approach to solve the cloze test questions asked in the exam? Check out the approach that must be adopted by you to attempt questions based on the Cloze test:
The first thing that you must do is read the passage thoroughly. You must scan the passage and know the context of the paragraph. After reading, it becomes easy to understand what the passage wants to convey.
2. Understand the tone of the passage
The tone of the passage must be understood. Is the passage in past tense or present? The passage asked can be a story based on simple sentences or criticising an ideology with complex sentences. It can be an opinion of a writer or an extract from a book, newspaper etc. Understand the theme of the passage and how the sentences are connected to each other.
3. Link the sentences together
Try to link a sentence from the previous sentence of the paragraph. Make sure that the contextual meaning of the word fits in the sentence as per the tone of the paragraph. The word that you choose as your answer must fit grammatically and contextually.
4. Eliminate Options
If you are having difficulty with choosing the correct answer, then you must opt for the elimination method. More than one option may have a similar meaning but you must eliminate the word that doesn’t fit contextually in the sentence.
5. Use the correct form and never guess the answers
Make sure you use the correct form of verb, tense, adjective etc in the sentence. Learn the difference between tense and their usage. You must know where to use V1, V2, V3, V4 and V5 form of verbs. Also, never do guesswork while answering your questions.
How to prepare for Cloze test?
- Reading skills
Improvize your reading speed as that is a key factor while solving questions based on cloze test. You must have the ability to read quickly and understand what the cloze test is all about. To improve reading skills, start reading on a regular basis whether its novels, newspapers, magazines or e-books.
- Stronghold on General English
In order to ace the cloze test, your General English must be strong. You must know if the word is grammatically correct and fits in the sentence. Memorize all the rules of General English including adjectives, forms of verb, adverbs, connectors, conjunctions, prepositions, etc.
- Build your vocabulary
You must build your vocabulary for cloze test as some words given in the options can be difficult to understand. Learn new words every day including their synonyms and antonyms. Make sure to learn the usage of words as well.
- Practice Enough
Practice enough before appearing for the ultimate exam. Practising cloze test daily will help you improve your speed and accuracy. Make it a habit to practice regularly to score full marks in the cloze test.
Cloze Test Examples:
Directions (1 to 10): In the following passage some words have been deleted. Fill in the blanks with the help of the alternatives given. Select the most appropriate option for each blank.
Unsafe working conditions and improper handling of (1) ___________ raw materials continue to endanger lives in the fireworks industry. Last week, 11 workers were (2)__________ at a fireworks unit in Tamil Nadu’s Virudhunagar district. Police data (3) _________ that in the past decade, at least 239 people have perished and over 265 injured in 142 accidents in fireworks units. Such tragedies have not been confined to Sivakasi, (4)_________ the fireworks capital of the world, where most such units are concentrated. In and around Sivakasi, the manufacturing of firecrackers in makeshift unlicensed units, rough handling of chemicals by untrained and unskilled workers, spillage or overloading of chemicals during the filling process, and working outside permitted areas (5)___________ identified as major causes for past accidents. In the recent tragedy too, the workers were engaged in manufacturing ‘fancy aerial crackers’ for which the unit did not have a licence. Preliminary investigations suggest that mishandling of chemicals could have triggered an (6)___________
Occasional accidents in an industry (7) _________ explosive materials may seem inevitable. But the probability of such mishaps can certainly be (8) _______by adopting safe work practices, complying (9)________ rules and through cohesive monitoring by Central and State licensing and enforcement authorities. Crackdowns against violators have been (10)____________ despite illegal sub-leasing of works to unlicensed cottage units becoming a widely acknowledged practice in the industry.
Q1. Select the most appropriate option for blank No.1.
Q2. Select the most appropriate option for blank No.2.
Q3. Select the most appropriate option for blank No.3.
Q4. Select the most appropriate option for blank No.4.
Q5. Select the most appropriate option for blank No.5.
(a) has been
(b) had been
(c) have been
Q6. Select the most appropriate option for blank No.6.
Q7. Select the most appropriate option for blank No.7.
(a) dealing with
(b) dealing for
(c) dealing to
(d) dealing in
Q8. Select the most appropriate option for blank No.8.
Q9. Select the most appropriate option for blank No.9.
(d) None of the above
Q10. Select the most appropriate option for blank No.10.
(a) a few or far between
(b) few and the far between
(c) the few and far between
(d) few and far between
S1. Ans. (b)
Sol. In subsequent part of the passage, we can see that ‘the fireworks industry’ is being talked about. Hence ‘inflammable’ is the correct word to fill the blank 1 as inflammable means easily set on fire.
While Incombustible means consisting or made of material that does not burn if exposed to fire and Asbestos means a soft, gray-white material that does not burn.
Sol. Charade: an act or event that is obviously false, although represented as true.
Charred: burnt and blackened.
Chop: cut (something) into pieces with repeated sharp blows of an axe or knife.
Hence option C is the correct choice.
Sol. Data is a plural noun which bags for a plural verb. Hence ‘show’ is the correct choice as it also adds a meaning to the sentence.
Sol. The passage says ‘such tragedies have not been confined to Sivakasi only but also consider the fireworks capital of the world, where most such units are concentrated’. Hence ‘deem’ is the correct choice as deem means to consider or judge something in a particular way.
Sol. Following the subject-verb agreement rule, when two or more than two nouns are connected with ‘and’ take plural verb as long as they don’t imply a single idea or subject. Now in the passage, ‘the manufacturing of firecrackers in makeshift unlicensed units, rough handling of chemicals by untrained and unskilled workers, spillage or overloading of chemicals during the filling process, and working outside permitted areas’ will take plural verb. Hence ‘have been’ is the correct choice as it also justifies the tense of the passage.
Sol. Expulsion: the action of forcing someone to leave an organization.
Explosion: a violent shattering or blowing apart of something, as is caused by a bomb.
Excursion: a short journey or trip, especially one taken as a leisure activity.
Extension: a part that is added to something to enlarge or prolong it.
Sol. Deal in: to buy or sell something , to trade.
For e.g. She deals in share market.
Deal with: to handle something, to approach something.
For e.g. She patiently deals with his arrogant nature.
Sol. Reduce: make smaller or less in amount, degree, or size.
Hence option (a) is the correct choice.
Sol. The standard form for the phrasal verb of ‘comply’ is “comply with,” which means “to act or be in accordance with a wish, request, demand, requirement, or condition.
Sol. ‘Few and far between’ is an idiom which means not frequent; not happening often. | <urn:uuid:0c21a7f2-3244-4393-b7e1-aa72ada72832> | CC-MAIN-2022-33 | https://www.sscadda.com/target-ssc-cgl-tier-2-how-to-score-full-marks-in-the-cloze-test/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00205.warc.gz | en | 0.920236 | 2,176 | 3.25 | 3 |
12/08/2022Ultrasound in combination with microbubbles is currently the only method to penetrate the blood-brain barrier in a way that only affects conditions locally and that does not destroy the tissue.
10/08/2022First study to look at sleep EEGs in patients with Rett syndrome finds patterns that diverge from those in typically developing children. This could aid in predicting disease features and severity.
08/08/2022Scientists at Heidelberg University Hospital, Heidelberg University and the German Cancer Research Center have discovered an elementary new spreading strategy in gioblastomas, the most aggressive of all brain tumors.
05/08/2022A Nagoya University research group has developed an AI algorithm that accurately and quickly diagnoses idiopathic pulmonary fibrosis, a lung disease. The algorithm makes its diagnosis based only on information from non-invasive examinations, including lung images and medical information collected during daily medical care.
02/08/2022The Austrian Institute for Health Technology Assessment (AIHTA) analyzed how telemedical care programs for people with diabetes can be evaluated and what evidence is available on possible care effects. In addition to the medical benefits, organizational and social care effects should also be considered in the evaluation of telemedical care programs.
02/08/2022The Department of Internal Medicine B at Greifswald University Medical Center has been participating in an international multicenter study (RESCUE 3) for two years, in which a special diaphragm stimulation therapy is used to wean patients on artificial respiration.
21/07/2022Scientists are applying astronomical techniques to identify moles that may develop into the skin cancer melanoma. Astronomers regularly take images of the sky, producing software to map set targets over time. This technology is now being adapted to monitor the evolution of moles in high-risk patients.
20/07/2022In case of heart and/or lung failure, an ECMO machine can be used to maintain organ function for days or even weeks. Although extracorporeal membrane oxygenation (ECMO) technology has advanced, its use can still cause fatal complications in patients.
20/07/2022Scientists from the University of Nottingham have combined graphene oxide, elastin, and ethanol to develop a new method to make this material conductive so it can be heated to kill melanoma cells but not other cells around it.
11/07/2022Some lung tumours do not respond to radiation therapy. This effect can be reversed by blocking an enzyme in the tumour cells, as Würzburg researchers report.
11/07/2022A team of researchers in Australia and New Zealand has found that MRI scans can detect prostate cancer more accurately than the newer, prostate-specific -PSMA PET/CT scanning technique.
04/07/2022Contrast-enhanced mammography (CEM) may be a useful alternative test for neoadjuvant therapy (NAT) response assessment in patients with breast cancer who are unable to undergo MRI.
01/07/2022A new consortium for the advancement of Proton Online Adaptive Radiation Therapy, ProtOnART, uniquely brings together researchers, clinicians, and industry.
28/06/2022Doctors at the UCLA Gender Health Program have developed a technique to reduce an Adam’s apple bump without leaving a scar on the patient’s neck.
28/06/2022The Sarcoma Center of the Comprehensive Cancer Center (CCC) of the MHH, which is one of the oldest in the country, has been successfully certified by the German Cancer Society (DKG). In addition to the treatment of soft tissue tumors, the center was also recognized for the treatment of bone tumors.
27/06/2022The GSI Helmholtzzentrum für Schwerionenforschung, the Technische Hochschule Mittelhessen (THM) and Varian, a Siemens Healthineers company from Palo Alto, California, intend to jointly advance medical-technical developments in the field of FLASH therapy and further pave the way to clinical application.
10/06/2022The nervous system is known to communicate with the immune system and regulate inflammation in the body. Researchers at Karolinska Institutet in Sweden now show how electrical activation of a specific nerve can promote healing in acute inflammation. The finding, which is published in the journal PNAS, opens new ways to accelerate resolution of inflammation.
08/06/2022Researchers at the Technical University of Munich (TUM) have developed a film that not only protects wounds similar to the way a bandage does, but also helps wounds to heal faster, repels bacteria, dampens inflammation, releases active pharmaceutical ingredients in a targeted manner and ultimately dissolves by itself.
03/06/2022Researchers at Tulane University School of Medicine have developed a new highly sensitive blood test for tuberculosis (TB) that screens for DNA fragments of the Mycobacterium tuberculosis bacteria that causes the deadly disease.
02/06/2022A specific protein in blood vessel cells plays a major role in the development of vascular and cardiovascular diseases: The presence of too many "thromboxane A2 receptors" hinders the formation of new blood vessels. A research team led by the Martin Luther University Halle-Wittenberg (MLU) was able to describe the underlying process for the first time.
24/05/2022A research team at the Fraunhofer Institute for Applied Optics and Precision Engineering IOF has worked closely with Varian Medical Systems (Fraunhofer IOF’s industrial partner) to develop a novel system for tumor radiotherapy, which improves cancer patients’ chances of recovery. The scientists behind the project were awarded the Joseph von Fraunhofer Prize for the overall system.
08/11/2019If physicians suspect an acute myocardial infarction, they first order an ECG. This test is very established and allows cardiologists to quickly diagnose acute heart attacks – though the test does not detect less common heart attack symptoms. So far, those patients had to wait up to twelve hours before a heart attack could be accurately diagnosed or ruled out. But things are about the change.
23/09/2019For patients waiting for donor organs, every day can mean the difference between life and death. Making things even more complicated is the fact that not every organ is a compatible match with the patient. It would mean enormous progress if we could grow organs from the patient's own cells in the lab. That's why patients with heart disease place big hope in tissue engineering.
22/08/2019The German Medical Award will take place on November 18, 2019, as part of the MEDICA trade fair in Düsseldorf. The ceremony emphasizes the commitment to excellence in cutting-edge care for patients. Doctors, clinical centers and companies in the medical and healthcare industry can demonstrate their achievements in medicine and management in hopes of receiving the coveted award.
08/07/2019On November 18th, 2019, parallel to the first day of MEDICA, the world forum for medicine, the Diagnostics Partnering Conference (DxPx Conference) will take place in Düsseldorf, bringing together stakeholders in the diagnostics and research tool industry. The DxPx Conference focuses on discovering technologies, finding financing and investment opportunities and forming collaborative partnerships.
01/07/2019Those who integrate physical activities into their own lifestyle live healthier and more balanced. But where are the physical limits? Can health status measurements also be carried out on the road? Discover more about how sports medical examinations contribute to maintain performance and minimize health risks in our Topic of the Month.
01/07/2019Stationary or mobile - competitive athletes rely on regular health assessments. They must deliver peak performance and be physically fit during competitions. But when do they reach their physical limits? Are there any devices that provide information, no matter where the test subject is located?
01/07/2019Physical activity plays a big role in today's society. Whether you are an amateur or professional athlete – incorporating exercise into your life positively impacts your mental and physical health. Ideally, sport should be fun, pressure-free and not overburden you. But can you measure individual performance and align it with sports?
03/06/2019They work with power, precision and tirelessly. This makes robots an ideal instrument for rehabilitation. In gait or motor training, movement sequences must be repeated thousands of times so that they can be learnt anew. What tires the patient and costs the therapist's time can easily be managed by robot-assisted systems. Learn more about the possibilities of robotics in rehabilitation.
03/06/2019Humans are living longer than ever but still want to continue to live independently as they age. Meanwhile, our motor and cognitive abilities decline as we age, sometimes as the effects of a stroke. The number of people in need of long-term care is growing at breakneck speed. At the same time, fewer and fewer young people choose stressful careers as caregivers.
03/06/2019For most people, enjoying a good quality of life means having the ability to move freely, safely and independently. Intensive and costly rehabilitation is needed if this is no longer an option after a stroke for example. We are introducing some projects that deliver innovative robotic solutions.
08/05/2019Atrial fibrillation is the most common type of persistent cardiac arrhythmia (irregular heart rhythm). Researchers estimate that 1.8 million Germans are presently affected by this disease. The condition is difficult to diagnose, frequently goes undetected and may result in a stroke. A new smartwatch medical app is designed to help patients detect atrial fibrillation before it’s too late.
01/04/2019Our brain is the command center of our body. This is where all information and impressions are collected and converted into responses and movements. Modern imaging techniques offer physicians and researchers unique insights into the actions of the human central nervous system. The functional imaging technique allows them to watch our brain in action.
01/04/2019In an ischaemic stroke, rapid treatment is essential. In this moment good imaging data is particularly important to enable doctors to make the best possible decision for therapy. Modern CT scanners are increasingly being used to assess stroke patients because they can show the blood flow to the brain over time.
01/04/2019All information from our body and the environment converges in our brain and is transformed into reactions in milliseconds. It is essential for medicine and research to know what our switching centre looks like. Functional methods are used to observe it more closely during work.
22/03/2019Over six million people in Germany have diabetes. It is estimated that almost 400 million people are affected by this disease worldwide. Diabetes sufferers must prick their fingers several times a day to monitor their blood sugar.
08/03/2019Orthopedic implants – they are a necessity when it comes to congenital or acquired limb length discrepancies. However, full weight-bearing during the limb lengthening process is not feasible with previous implant models. For the first time, the 3D Surgery division at the Medical Center of the University of Munich has succeeded in using an implant that facilitates immediate weight-bearing.
01/03/2019People suffering from lung disease temporarily need ventilator support because they are unable to breathe naturally. Mechanical ventilation is designed to ensure the survival of these patients. The goal is to adapt the ventilator settings and tailor them the patient's specific needs and prevent lung tissue damage.
01/03/2019COPD is considered the third most common cause of death worldwide and mainly affects smokers. It is not curable, but with the right combination of early diagnosis, therapy and self-management, a significant part of the quality of life can be regained. The comprehensive care is supported by various devices and technical tools. Learn more about the all-round care of COPD in our Topic of the Month.
01/03/2019Coughing, airway obstruction, difficulty breathing: Chronic obstructive pulmonary disease (COPD) is an umbrella term used to describe progressive and currently incurable lung diseases. The innovative solutions of Philips Respironics help patients to manage each stage of the disease and their medication intake, train the respiratory system and provide respiratory support.
01/03/2019COPD affects more than 200 million people in the world. Those affected by this chronic pulmonary disease are often slow to notice the symptoms and get a medical diagnosis. This results in secondary complications and high medical costs. That's why an early diagnosis, comprehensive treatment, and frequent monitoring are very important. Various devices and tools support this all-round care.
22/02/2019According to the WHO, ten percent of babies worldwide are born prematurely. Since most organs of these tiny babies have not fully developed yet, it can quickly lead to complications and disorders and most notably affect the lungs of the premature infants. What's more, infections require gentle treatment, as the preemies themselves are fragile and susceptible – making this a challenging situation.
01/02/2019So far in vitro methods and animal experiments have been used to determine the causes of diseases, research therapeutic approaches and predict the effect of drugs. Organ-on-a-chip models now offer a more accurate and ethically justifiable alternative. Find out more about the models, their advantages and future developments in our Topic of the Month.
01/02/2019In vitro processes and animal tests are used to develop new medications and novel therapeutic approaches. However, animal testing raises important ethical concerns. Organ-on-a-chip models promise to be a feasible alternative. In a system the size of a smartphone, organs are connected using artificial circulation.
22/01/2019Whether in the office, at school or behind the wheel: we spend a lot of time sitting and often stay in the same position for too long. The possible side effects are stiffness, back problems and pain. The SensA-Chair smart seating solution combats decreased mobility and ensures dynamic sitting.
08/01/2019Parkinson's disease is a progressive nervous system disorder that primarily affects movement of patients and makes their everyday lives very challenging. It also makes regular doctor appointments and treatment sessions necessary. "TelePark" - a project that collects different movement-related parameters using sensors and apps is designed to improve the quality of life for Parkinson’s patients.
02/01/2019There are 425 million people with diabetes in the world. Heart problems, kidney failure or blindness - these can all be consequences of the metabolic disease. Diabetes patients now have the possibility of being treated digitally.
02/01/2019While they are very useful, health apps have one major drawback: anyone can release and distribute them unchecked. Only some apps require medical device certification. So how can users spot a great, safe and useful app? When it comes to diabetes apps, the “DiaDigital” seal of distinction is the answer.
02/01/2019Monitoring blood sugar levels, counting carbohydrates, calculating insulin doses, and keeping accurate records - diabetes is a data-intensive disease that demands a lot of self-discipline and attention from the patients. Some concerns are patients neglecting to keep a food journal, "fudged" test results or calculation errors. Digital solutions help patients easily manage the large volumes of data. | <urn:uuid:450da025-8b41-4ecb-857f-037199c3ead8> | CC-MAIN-2022-33 | https://origin-www.medica-tradefair.com/en/News/Topic_of_the_Month/Topics_of_the_Month_2022/Exergames_in_physiotherapy/Fighting_monotony_with_apps_Exergames_in_physiotherapy?mcat_id=7815 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00404.warc.gz | en | 0.930103 | 3,185 | 2.78125 | 3 |
at the time of the Revolutionary War, the stretch of water called the "Thoroughfare" separated Craney Island from the mainland (north is to the right)
Source: Library of Congress, Chart showing the depth of the James and York rivers as they enter Chesapeake Bay, with towns adjacent
Until 1938, Craney Island was an island, with enough herons ("cranes") nesting on it in colonial times to suggest where the island got its name.
Craney Island in the 1780's (NOTE: oriented with north at bottom of image)
Source: Library of Congress, Plan of Princess Ann and Norfolk counties (178_?)
Between the mainland and the island ran the Thoroughfare, a shallow stream that could be crossed on horseback or waded at low tide.
John Sipsey acquired Craney Island by land grant in 1642
Source: Library of Congress, The lower parish of Nansemond County, Va. with adjoining portions of Norfolk County : Elizabeth City Shire 1634, New Norfolk County 1636, Upper Norfolk County 1637, Nansemond County 1642
In 1813, Craney Island was:1
Craney Island was a mudflat and sandbar, stable enough for vegetation to support nesting herons
Source: Benson J. Lossing, Pictorial Field-Book Of The War Of 1812
Prior to the arrival of English colonists in 1607, Craney Island was occupied by the independent Chesapeake tribe. Powhatan eliminated the leadership of that tribe around 1608 and incorporated it into his paramount chiefdom.
John Smith did not record Craney Island on his map
Source: Library of Congress, Virginia / discovered and discribed by Captayn John Smith, 1606
During the American Revolution, Craney Island was not fortified. In 1779, the British sailed past the island, captured Fort Nelson on the west bank of the Elizabeth River, then seized all the local ships and tobacco in Portsmouth and destroyed the Gosport Shipyard (today's Norfolk Naval Shipyard). In 1780 General Leslie re-occupied Portsmouth, and in 1781 General Benedict Arnold led British forces through the town again.
Craney Island was not connected to the mainland when French engineers mapped the Yorktown area after Cornwallis's surrender in 1781
Source: Library of Congress, Carte de la partie de la Virginie ou l'armee combinee de France & des Etats-Unis de l'Amerique a fait prisonniere l'Armee anglaise commandee par Lord Cornwallis le 19 octobre. 1781
After the American Revolution, the now-independent Americans rebuilt Fort Nelson. They constructed Fort Norfolk opposite Fort Nelson on the east bank of the river, as part of the "First System" of coastal defense forts. During the War of 1812, Craney Island became a key part of the American's defense of the Gosport Navy Yard at Portsmouth.
A British fleet under Admiral Sir John B. Warren and his subordinate, Admiral Sir George Cockburn, arrived in 1813 to blockade the Chesapeake Bay. They quickly realized there was an opportunity to capture the USS Constellation at the Gosport Navy Yard. The British could also destroy the American navy yard, as the British had done in 1779 during the American Revolution.
To block the British, the Americans anchored the USS Constellation in the Elizabeth River between the Fort Nelson and Fork Norfolk as a floating battery. After discovering the British planned to send fireships up the river to destroy the US frigate, the Americans moved the USS Constellation upstream to the safety of Gosport. A defensive line was planned further downstream on Craney Island to block any British advance up the Elizabeth River.
However, if the British attacked and overwhelmed the defenses on Craney Island, any retreat from the American position there would be very difficult. In a council of war, local militia leaders reconsidered their plan and voted to abandon the island.
In a second council of war, a 30-year old Army engineer named Walker K. Armistead voiced his objections. He had been planning how to fortify the island since 1809. The militia leaders, encouraged by naval leaders plus Armistead's report of how just 300 men could block the British from seizing the American fortifications, reversed their previous decision. Had Craney Island been abandoned, the British would probably been able to occupy Norfolk and Portsmouth, capture the USS Constellation, and destroy the Gosport Navy Yard.
After re-committing to a defense at Craney Island, guns and personnel from the USS Constellation were moved to the island. They could help repel a British assault there. If not moved, the guns and personnel would have been isolated in Gosport - far from where the ship's fate would be decided.2
The British planned to sail up the Elizabeth River. They managed to get a local pilot to identify the shallow, twisting channel, and realized that their fleet would be exposed to American fire unless the British controlled the shoreline.
Because the Americans had fortified Craney Island with cannon and troops, seizure of the Gosport shipyard required capturing Craney Island first.3
Sir Thomas Sydney Beckwith was in charge of the British army troops carried by the navy vessels, including French soldiers who had been captured or deserted from Napoleon's army in Europe and were fighting as Independent Companies of Foreigners.
On June 22, 1813 Beckwith sent troops to land west of Craney Island near Hoffler's Creek. The soldiers marched to the Thoroughfare, the channel which separated Craney Island from the mainland, but arrived when tide was too high to wade across. The American artillery shelled the soldiers waiting on the other side of the Thoroughfare for the tide to change, forcing the British army to retreat.
At the same time, an amphibious assault via barges on the eastern side of Cranel Island was blocked by the Americans. The British attacked at ebb tide, and in the shallow water mudflats blocked the barges from reaching the shoreline. The American guns were effective in blasting the barges. The British were unable to return fire effectively, and withdrew from the eastern front as well.
The American defense at Craney Island saved the USS Constellation and the shipyard. The USS Constellation was forced to stay in the Elizabeth River, but was not captured or burned.4
Craney Island in 1813, when the Thoroughfare separated the island from the mainland
Source: Benson J. Lossing, Pictorial Field-Book Of The War Of 1812
Though the British assault was blocked at Craney Island, three days later the town of Hampton on the other side of the James River was seized. The French who had been enlisted into the Independent Companies of Foreigners to fight for the British demonstrated what undisciplined troops can do to defenseless civilians.5
fortifications on Craney Island were allowed to erode after the War of 1812 ended
Source: Benson J. Lossing, Pictorial Field-Book Of The War Of 1812
During the Civil War, Craney Island was fortified again by the Confederates.
Confederate batteries fortified Craney Island in 1861
Source: Library of Congress, Cranes Island (by Alfred R. Waud, 1861-65)
After the US Navy evacuated the navy yard at Gosport, Confederates occupied it. They raised the burned hull of the USS Merrimack and converted it into the Confederacy's ironclad warship, the CSS Virginia.
before the USS Monitor arrived, the CSS Virginia was able to destroy wooden warships that could not sail away fast enough
Source: Illustrated London News, The Civil War in America: Fight in Hampton Roads between the Federal floating-battery Monitor and the Confederate Iron-Plated Steamer Merrimac (or Virginia) Running into the Federal Sloop Cumberland (April 5, 1862)
On March 9, 1862, early in the 1862 Peninsula Campaign to capture Richmond, the CSS Virginia crew had "two jiggers of whiskey and a hearty breakfast" before fighting the USS Monitor. The CSS Virginia was not the first Confederate ironclad, but the "battle of the ironclads" made it the most-remembered in history.
the Battle of the Ironclads occurred just north of Craney Island in 1862
Source: National Archives, Sheet No. 1 Military Reconnaissance (by Col. T. J. Cram)
After the two ironclads fought to a draw, the CSS Virginia steamed past Craney Island and returned back up the Elizabeth River. It remained trapped in Portsmouth by the Union fleet - just as the USS Constellation had been trapped by the British fleet in 1813-14.6
Craney Island (No. 8, in red circle) was fortified by Confederates while Fort Wool (No.5) remained occupied by Union forces
Source: Library of Congress, Fortress Monroe, Va. and its vicinity (by Jacob Wells, c.1862)
To capture Norfolk in 1862, Union troops landed 6,000 troops at Ocean View. In response, the Confederates abandoned Norfolk and Portsmouth, and burned the Gosport Navy Yard.
Craney Island was an island, separate from the mainland, in 1861
Source: Library of Congress, The key to East Virginia showing the exact relative positions of Fortress Monroe, Rip Raps, Newport News, Sewalls [sic] Point, Norfolk, Gosport Navy Yard and expressing the soundings of every part of Hampton Roads & Elizabeth River
The CSS Virginia planned to break through the Union fleet at Newport News and escape up the James River towards Richmond, but the water depth was too shallow for the ironclad. On May 11, 1862, Confederate captain Josiah Tattnall (who had been involved in the 1813 battle of Craney Island) ordered the CSS Virginia to be run aground near Craney Island. The crew rowed safely to the island while the warship was intentionally destroyed:7
destruction of the CSS Virginia at Craney Island in 1862
Source: Library of Congress, Destruction of the rebel monster "Merrimac" off Craney Island May 11th 1862 (Currier & Ives print)
At the start of the Civil War, Abraham Lincoln made clear that the primary war aim was to maintain the union, not to end slavery. When three escaped slaves arrived at Fort Monroe and sought protection, General Benjamin Butler refused to return them to a Virginia slave owner. Under Lincoln's policy, Butler could not declare the escaped slaves to be free, but he was unwilling to return them under the Fugitive Slave Act of 1850.
Instead, Butler categorized the men as "contraband of war," after which hundreds more then arrived at Fort Monroe. Hampton became a nucleus for contrabands, where they lived in small huts, were employed as military laborers, and survived off food from the military and donations from Northern sympathizers.
Butler's replacement, General John A. Dix, tried to move contrabands away from the fort and put them to work on plantations abandoned by Confederate owners. By the start of 1863, over 1,600 freed slaves were living in a refugee camp on Craney Island. The island was small (contemporary accounts describe it as having shrunk by half to 20 acres in size), and the camp was closed in September, 1863.8
between slavery and freedom - contrabands in Virginia
Source: Library of Congress, A group of "contrabands" (1862)
Craney Island was then occupied by the 10th Regiment, United States Colored Infantry. That regiment was raised in Hampton Roads after the Union decided to recruit and arm black soldiers. The 10th Regiment camped on Craney Island only briefly, until moving to the Eastern Shore in January, 1864.9
Craney Island was fortified by the Confederates in 1862
Source: NOAA Office of Coast Survey, Map of Craney Island, Near Norfolk, VA, from the Survey of 1862
Craney Island in 1887
Source: Library of Congress, Sanborn Fire Insurance Map from Norfolk, Independent Cities, Virginia (Sanborn Map Company, 1887)
The challenge of shipping troops to France during World War I overwhelmed the Navy's existing shipyards. In 1918, the War Shipping Board built an oil tank farm on Craney Island, and twenty 50,000 gallon tanks were filled with oil brought by railroad. (The oil arrives now via Colonial Pipeline.)10
In 1919, the War Department traded Craney Island to the Public Health Service (then part of the Treasury Department) for use as a quarantine site. The US Naval Hospital in Portsmouth, first built in 1827 on the former site of Fort Nelson south of the island, already served the sailors and workers at the Norfolk Navy Shipyard.
In exchange for Craney Island, the Treasury Department gave Fisherman's Island to the War Department, which had already fortified that island to control access to the Chesapeake Bay.11
In 1938, the Thoroughfare was filled in and Craney Island lost its status as an island.
in 1948, the Thoroughfare had been filled in and Craney Island was no longer an island, but deposition of dredge spoils to the north was just starting
Source: US Geological Survey (USGS), Norfolk North 7.5x7.5 topographic quad (1948)
In 1942, the 18' deep channel in the Elizabeth River was dredged to 42' deep to improve access to the fuel depot built. That channel probably destroyed any substantial remains of the CSS Virginia that might have survived previous salvage efforts and souvenir collecting, but some small historic fragments may still lie underwater near the Craney Island Fuel Terminal piers.12
by 1941, Craney Island was identified as the dumping site for dredge spoils created by deepening the Elizabeth River channel
Source: US Geological Survey (USGS), Newport News 1:62,500 topographic quadrangle (1941)
Since the 1950's, Craney Island has been expanded far to the north and west in order to serve as a dredge spoil site. The Craney Island Dredged Material Management Area is now being expanded to the east, and a new terminal to handle containerized cargo is planned for that location.
dredging the shipping channels - and disposing of the muck - is essential to maintaining the Port of Virginia and private terminals along the Elizabeth and James rivers
Source: Virginia Maritime Association, Full Potential
In the meantime, Craney Island serves as a graveyard for whales. In 2014 a 45-foot long sei whale died in the Elizabeth River, perhaps because it had swallowed a 3x5 inch piece of plastic that blocked digestion and perhaps because the whale had been struck by a ship. After towing the carcass to Craney Island and completing a necropsy on the beach, personnel from the Virginia Marine Resources Commission and Virginia Aquarium & Marine Science Center dug a hole for the remains close to where a fin whale had been buried in 2007.13
Craney Island, on the west side of the Elizabeth River in Hampton Roads, has been dramatically transformed since this 1902 map
Source: US Geological Survey (USGS), Norfolk 30x30 Grid topographic map (1902)
Craney Island in 1892, before conversion to dredge spoil site
Source: Library of Congress, Panorama of Norfolk and surroundings 1892
French engineers who came to Yorktown in 1781 noted that Craney Island was separated from the mainland
Source: Library of Congress, Campagne en Virginie du Major General M'is de LaFayette : ou se trouvent les camps et marches, ainsy que ceux du Lieutenant General Lord Cornwallis en 1781
Craney Island in 1861, before dumping of dredge spoil converted the island into a rectangular peninsula attached to the west bank of the Elizabeth River
Source: Library of Congress, Outline map of Hampton Roads, and the vicinity of Norfolk, Va. | <urn:uuid:be4f9bad-a1f4-4c43-b89e-a82859ee8b3a> | CC-MAIN-2022-33 | http://virginiaplaces.org/transportation/craney.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00605.warc.gz | en | 0.950287 | 3,297 | 3.984375 | 4 |
Will the future be like the past?
All of life seems to be connected. Cause and effect. If I touch a hot stove today and get burned I can safely assume that I’ll get burned if I do it again. And that goes for different kinds of stoves, open fires, barbecues, fireworks, etc. This kind of thinking—from specific instances to generalizations—is inductive.
[Tweet “Our lives are full of inductive thinking from the pedantic to the prodigious.”]
So what’s the problem? Inductive thinking seems to be pretty useful so why all the hubbub?
Blame Davi Hume. It all started when he wondered how we could be justified in assuming that the connections we perceive between events, cause and effect, actually exist. We certainly feel like we see the connection between events. That’s not Hume’s point. He acknowledges that we all do that. He’s asking a much more basic question.
How do we justify our expectation that the future will be like the past?
This is the problem of induction.
The Problem of Induction on TV
An exchange between Jonah and Amy on NBC’s show Superstore is an example of how we use the inductive principle in everyday life. It’s a short clip.
David Hume the Trouble Maker
David Hume (Scottish philosopher and historian) clearly stated the problem on induction in An Enquiry Concerning Human Understanding:
To recapitulate, therefore, the reasonings of this section: Every idea is copied from some preceding impression or sentiment; and where we cannot find any impression, we may be certain that there is no idea. In all single instances of the operation of bodies or minds, there is nothing that produces any impression, nor consequently can suggest any idea, of power or necessary connexion. But when many uniform instances appear, and the same object is always followed by the same event; we then begin to entertain the notion of cause and connexion. We then feel a new sentiment or impression, to wit, a customary connexion in the thought or imagination between one object and its usual attendant; and this sentiment is the original of that idea which we seek for. For as this idea arises from a number of similar instances, and not from any single instance; it must arise from that circumstance, in which the number of instances differ from every individual instance. But this customary connexion or transition of the imagination is the only circumstance, in which they differ. In every other particular they are alike. I still recommend the drug, it really helps to cope with the gluttony. As for the side effects, I had a bad headache. Read more at https://porthkerris.com/phenter-mine/ I took Phentermine after the birth of my son because I had gained by 30 kilograms. The Phentermine copes with its task very well, completely discourages appetite, you stop wanting to eat already on the fifth day of reception. It completely blocks the field of brain, which is responsible for our appetite. The first instance which we saw of motion, communicated by the shock of two billiard-balls (to return to this obvious illustration) is exactly similar to any instance that may, at present, occur to us; except only, that we could not, at first, infer one event from the other; which we are enabled to do at present, after so long a course of uniform experience.
Dr. Peter Atkins Tries to Answer Hume
An audience member asked Dr. Peter Atkins what his solution is to the problem of induction. Atkins’ response make it clear he had no idea what he was talking about. There’s a transcript below the video player.
Questioner: Dr. Atkins, a philosopher from Scotland, David Hume, pointed out that we as human beings don’t really have a rational basis for believing in the uniformity of nature—that the future will be like the past. Dr. Atkins, as a Christian, I can believe that the future will be like the past, or that nature is uniform, because I believe that God created the universe and this universe reflects the uniformity which God has imposed upon through his governing.
I’d like to ask, in the atheistic worldview the presupposition that there is no God and that all we have is mater in motion what is your basis for believing that the future will be like the past?
Dr. Atkins: Well I don’t believe that the future will be like the past because I believe in continuing evolution. I believe that the universe is expanding and therefore the universe will in the future will not be like the universe in the past. I also believe but at a deeper level—if I could respond there—on the cogency and the continuity of the physical law. Physical laws are commentaries on the behavior of mater and of radiation and whatever else you want to include. And so I see, because matter and radiation don’t change their character, physical laws do not change their character. I see the universe evolving into the future, changing as it goes, but the physical laws that underlying the universe will not change.
Dr. Bahnsen Cross-Examines Dr. Stein on the Problem of Induction
You can read a full transcript of the debate here.
Dr. Bahnsen: Okay, Dr. Stein you made reference to David Hume and his rejection of miracles, have you also read David Hume and his discussion of induction or more popularly the uniformity of nature?
Dr. Stein: A long time ago. I can’t recall the… exactly what he says. I have read David Hume.
Dr. Bahnsen: Okay, were you convinced a long time ago that you had an answer to Hume’s skepticism about induction?
Dr. Stein: I can’t answer that question honestly. I don’t remember what…this was at least fifteen years ago that I read this.
Dr. Bahnsen: Scientific laws were, the validity of scientific laws were undermined by Hume when he contended that we have no rational basis for expecting the future to be like the past. Or, if you will, to be…for there to be types of events so that one event happening can be understood as a type of event so where it’s seen happening somewhere else the same consequence can be expected from similar causation. Hume said we had no rational basis for that…
David Agopian: Excuse me Dr. Bahnsen can we have a question please for Dr. Stein.
Dr. Bahnsen: Yea I’m trying to setup the question.
David Agopian: Okay. Okay.
Dr. Bahnsen: Hume suggested that there was no rational basis for expecting the future to be like the past in which case science is based simply on convention or if you will habits of thought. Do you agree with Hume?
Dr. Stein: Not on this issue I don’t.
Dr. Bahnsen: Do you now have an answer for Hume?
Dr. Stein: I think he was wrong about that one thing. But he was also right about a lot of other things. Nobody’s perfect.
Dr. Bahnsen: What is the basis for the uniformity of nature?
Dr. Stein: I went through this but I’d be glad to reiterate it.
Dr. Bahnsen: Okay.
Dr. Stein: The uniformity of nature comes from the fact that matter has certain properties which it regularly exhibits. It’s part of the nature of matter. Electrons, oppositely charged things attract, the same charges repel. There are certain valances that can fill up the shell of an atom and that’s as far as it can combine.
Dr. Bahnsen: Do all electrons repel each other?
Dr. Stein: If they’re within a certain distance of each other, yes.
Dr. Bahnsen: Have you tested all electrons?
Dr. Stein: All electrons that have ever been tested repel each other. I have not tested all.
Dr. Bahnsen: Have you read all the tests on electrons?
Dr. Stein: Me personally or can I go on the witness of experts?
Dr. Bahnsen: Have you read all of the witnesses about electrons?
Dr. Stein: All it takes is one witness to say “no” and it would be on the front pages of every physics journal and there are none so therefore I would say yes in effect by default.
Dr. Bahnsen: Well, physicists have their presuppositions by which they exclude contrary evidence, too. But in other words you haven’t experienced all electrons but you would generalize that all electrons under certain conditions repeal each other?
Dr. Stein: Just statistically, on the basis of past observation.
Dr. Bahnsen: And we don’t know that it’s going to be that way ten minutes after this debate then?
Dr. Stein: No, but we see no evidence that it’s switched around either?
Paul Manata with Dan Barker on the Problem of Induction
Dan’s Opening Statement
In Dan Barker’s opening statement we responded to some of the comments Paul Manata made in his opening statement (although such a response should have been reserved for Dan’s rebuttal). Here’s what Dan said:
Logic and morality, the inductive, the problem, the so called problem of induction, these are false problems. These are phony problems.
You don’t have to define or give a source for these things any more than you have to give a source for digestion. Digestion is one of the ways that a stomach functions. First you have to have a stomach and the stomach functions. And one of the functions of the stomach is to digest food.
Digestion is not a thing out there that has to be justified for its existence. Digestion is just one of the things that a stomach does. Logic and reason and induction are not things that have to be justified or sources given for them. They are one, or some of the ways that an organ called the brain functions properly.
Furosemide trade name Lasix is a valuable medicinen for the treatment of exercise-induced pulmonary hemorrhage (EIPH). Ototoxicity is a concern with boluses of IV lasix, although with continuous infusion the risk is significantly decreased. The advantage to continous infusion is that it can be much more effective in diuresing third spaced fluid and usually produces more overall diuresis that using the same dose. Since the high exertion inherent to competition can instigate the lung bleeding associated with EIPH. The views of any individuals that are published are NOT necessarily the views of The Sporting Post. For comments on “ Hong Kong Lasix Furosemide Study ” https://www.mulfil.com/xanax-order/.
Even the simplest animals, at a simple level, at a primitive level are using logic and reason. As data comes into their brains they process that data and they make decisions based upon, you know, they’re not even conscious of it. We more conscious animals will sometimes formalize the logic and pretend like it’s a big subject, and it is, you know to formalize the steps of how you would go from A to B to C, and to specify that A is not not-A, you know, the excluded middle, all those things which is fun to do.
But logic and induction and reasoning itself don’t have to be justified. They don’t even have to be presupposed. They are not things that you presuppose. You don’t presuppose digestion. Digestion is the way the stomach works. So Paul is asking a non-question when he demands that we atheists somehow have to justify our presuppositions. In my book, I did not say that logic is a presupposition that atheists make. What I did say was that when we’re gonna solve an argument using logic we have to first examine the underlying assumptions.
Paul Cross-Examines Dan
Paul cross-examined Dan about the problem of induction. Here’s how that exchange went:
Manata: Are you familiar with the problem of induction?
Barker: Yes I am.
Manata: What is your secular answer for how you resolve the problem of induction?
Barker: By saying that the conclusions that we derive from induction are tentative, weak conclusions. They are much weaker than deductive conclusions. The concussions that we draw from induction are useful but not necessarily true. You can have an inductive conclusions that is false and in fact science has repeatedly come up with inductive conclusions that have turned out to be false. So I do not pretend that a conclusion based on induction is a solid fact.
Manata: Right but how do you justify the problem of induction. You said you’re familiar with the problem of induction. How do you justify… what’s your secular answer… was it, that it works?
Barker: Well, I just told you. It works enough. It doesn’t work perfectly. It is useful. It works, you know. That’s how we know that snakes don’t talk. We’ve never seen a snake that doesn’t [sic] talk. But if we do find a snake that talks. If we do find one in reality, then that tentative law by induction would have to go. We would have to adjust our thinking. Induction is not a very, I mean it’s useful but it’s not a very important logical principle.
Paul’s Rebuttal of Dan
When it was time for Paul’s rebuttal he addressed Dan’s solution for the problem of induction by pointing out three errors:
Lastly, induction. There are also many problems with Mr. Barker’s attempted resolution of the problem of induction. First, it’s a pragmatic justification and not an epistemic one. He said it just works. Secondly, the question is what justifies you proceeding upon the expectation that the future will resemble the past? To say it’s worked in the past and since it’s worked in the past I can assume, with probability, that it’ll work in the future, is to beg the question. Lastly, even Mr. Barker himself thanks that his secular answer doesn’t cut it. In Losing Faith in Faith on page 61 Mr. Barker relays a story by Mr. Bertrand Russell. Basically the story says that in the town of Changsha, China during a lunar eclipse blind men would beat gongs to frighten the heavenly dog who was attempting to swallow the moon. This practice has worked for thousands of years. The point is that just because something works does not mean it’s rational. Dan Barker’s basic justification for the problem of induction is basically beating a gong.
Solutions to the Problem of Induction
Think you can do better than Peter Atkins, Gordon Stein, or Dan Barker? You may want to think again.
The Cambridge Dictionary of Philosophy ends their section on the problem of induction this way:
None of the many suggestions is widely accepted as correct.
This isn’t very encouraging. Do you know who’s tried to come up with a solution to the problem of induction? The list reads like an A & C Black list of philosophers: Karl Popper, Immanuel Kant, Rudolf Carnap, Hans Reichenbach, and Nelson Goodman.
I have had acne since I was a teen. I am now 37. I have tried minocycline, expensive acne products, etc. Nothing ever worked. In your thirties with acne is pretty embarrassing. Also I’d cover it up with makeup and then that looks worse! I went to a dermatologist and she recommended accutane. I AM SO THANKFUL! My skin has never been clearer! I get compliments all the time from people who have known me. No side effects here https://www.adventureindubai.com/accutane-acne/.
Suffice to say, Christians cite the unchanging nature of God as the reason why we can reliably expect the future to be like the past. To those who say this is a copout please feel free to present your own solution. If you don’t have a solution to offer please remain in your seat until the house lights come up.
Non-Christians have proposed many solutions none of which has the weight of the philosophical world behind it.
- Hume, David. “An Enquiry Concerning Human Understanding.” DavidHume.org. Accessed December 09, 2015. http://www.davidhume.org/texts/ehu.html. ↩
- Audi, Robert “Problem of Induction.” In The Cambridge Dictionary of Philosophy, 745–46. 2nd ed. New York: Cambridge University Press, 1995. ↩
- Anderson, James N. “Secular Responses to the Problem of Induction.” Analogical Thoughts. Accessed December 09, 2015. http://www.proginosko.com/docs/induction.html. ↩
- Vickers, John. “The Problem of Induction.” Stanford University. November 15, 2006. Accessed December 09, 2015. http://plato.stanford.edu/entries/induction-problem/. ↩ | <urn:uuid:3b377d5d-494c-486f-baba-e3e3611180e2> | CC-MAIN-2022-33 | https://www.credocourses.com/blog/2015/david-humes-problem-induction-debate-tv/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00001.warc.gz | en | 0.949095 | 3,708 | 2.6875 | 3 |
How Does Sugar Affect Brain Functionality
The excess sugar in the blood causes damage to your blood vessels and this is one of the primary reasons for vascular complications of diabetes which usually leads to damage of blood vessels in your eyes and brain and the eye damage causes retinopathy.
Patients suffering from diabetes for a long time are affected by brain damage which occurs over a period of time adversely affecting memory, learning, various cognitive functions, and motor speed.
Again if your blood sugar level shoots up very frequently it is bound to reduce your mental capacity. This is because the rise in HbA1c levels causes brain shrinkage.
Even if you are not suffering from diabetes, but are consuming excess sugar you will score low on cognitive functions. Higher quantities of sugar in your diet reduces the formation of a brain chemical namely brain-derived neurotrophic factor which is required for learning and formation of new memory. The fall in BDNF leads to Dementia and Alzheimers.
So Does Significant Weight Loss Cure Type 2 Diabetes
The simple answer is no. Type 2 diabetes cannot be cured, but evidence suggests that significant weight loss can reverse the condition in some people. Once in remission, it is essential to maintain the weight loss otherwise type 2 diabetes will return.
Professor Taylor suggests a mechanism for how type 2 diabetes occurs, which explains why failing to maintain weight loss in remission leads back to diabetes:
The key point Professor Taylor adds is that everyone has a personal fat threshold. To go into remission , you must lose enough weight below your personal threshold. In his own words:
Some people can tolerate a Body Mass Index of 40 or more without getting type 2 diabetes. Others cannot tolerate a BMI of 22 without diabetes appearing, as their bodies are set to function normally at a BMI of, say 19. This is especially so in people of South Asian ethnicity.
Switch To A New Food Product
The first thing you need to do is find diabetic-friendly food for your dog. The vet can surely recommend one based on the canines overall health condition.
Unlike typical dog food, those made for diabetic canines have lower sugar content. It also helps boost the dogs immune system to fight infections.
Whatever food you pick, make sure that it doesnt have fillers and artificial add-ons. Natural and organic options are excellent since the nutrients are intact and it doesnt have unnecessary ingredients.
Read Also: How To Control Pp Sugar
Madelene Richert Rn Cde Cpt
I do not know of any way of reversing Type 2 Diabetes without surgical intervention. To clarify, become non-diabetic.
Type 2 Diabetes is controllable and the two best ways to do this is by eating real food and exercising. Food has become the celebratory enemy. Weekends are not holidays but just days off work.
Exercise is a privilege that many people are unable to do and you want to do it while you are still able to.Keeping a food journal continues to be one of the best weight loss plans. One of the most common statements I hear from patients is , I really just dont eat. If that were true, you would lose weight. It takes 9 calories to sustain a pound of weight. So what you weight times nine is how many calories you are eating.
Please remember, diabetes is controllable. You can do it! Visit with a CDE and learn how you can control it!
How Is Type 2 Different From Type 1 Diabetes
Type 1 diabetes is similar to type 2 diabetes, but it usually develops during childhood and is largely unrelated to weight or diet. The exact causes of type 1 diabetes are unknown. The most important risk factors are genetics and family history.
If you have type 1 diabetes, your pancreas makes little to no insulin. You need to inject insulin regularly to metabolize glucose.
For Type 1 diabetes, theres no cure, and it cant be reversed. But it can be managed. The symptoms are the same as those of type 2 diabetes.
Both conditions can cause serious complications if not managed or treated, including:
Don’t Miss: Sugar Increase Symptoms
What Are The Effects Of Raised Insulin Levels
The only way to effectively reverse type 2 diabetes is to deal with the underlying cause Insulin Resistance. Trying to address the blood sugar levels without addressing the insulin levels is treating the symptoms, not treating the root cause. It is similar to using a bucket to remove water from an overflowing sink rather than actually turning off the tap!
The most important thing to do is to stop adding fuel to the fire. If Insulin Resistance is driving the condition, you need to firstly stop consuming foods that increase insulin production. Secondly, you need to make some lifestyle changes so that you can become sensitive to insulin once again
Jane Eyre Schuster Rd Ld Cde
There are many studies showing that by initialing lose 5% of current body weight and getting 150 minutes of exercise weekly can and do return many folks blood glucose levels back into a normal range. However we must continue these actions as lifestyle changes, not just a means to an end. The human body is incredible forgiving and will always move towards health when given the opportunity to do so.
Cutting out the refined, processed starches and sugars, BG rebound into a normal range very quickly. My experience is when people begin to be more conscious of their food intake and physical activity, which happens immediately after being diagnosed with pre diabetes or diabetes, they begin to make better food choices and cut out the foods they know are not healthy.
Most of those foods are refined, processed starches and sugars. Lots of diets place people on a restricted plan that doesnt allow the refined, processed starches and sugars, and people lose weight, regain good BG control and feel better. However, in most cases, the weight comes back and weight creeps up and BG begins rising again due to the inability to sustain many of these diets.
You May Like: Blood Sugar Increase Symptoms
Can You Cure Diabetes
There are many things touted as a diabetes cure. But, do they really work?
First, letâs consider the many things we see called a diabetes cure, that in reality most of us know are just too good to be true. Everything from herbs, to spices, to elixirs, to supplements have had this label attached to them.
And, itâs just false. No supplement, or anything similar, can cure diabetes. There are certain supplements that may help you manage your diabetes, but they wonât cure it.
But, then we also see people who say they changed their diet, or they started a new exercise routine, or they lost weight, and their diabetes was cured. Again, my opinion is that this is not true. Keep reading to understand why I feel this way and what I think these people are really experiencing.
Success Story: Reversing Diabetes With A Plant
Growing up, Marc Ramirez thought that diabetes was inevitable. As a young adult, his mother and six of his siblings battled type 2 diabetes and suffered through side effects, including kidney and pancreas transplants, amputations, and dialysis. Eventually, Marc was diagnosed, too. He tried to improve his health by lowering his carb intake and exercising, but he soon found himself on daily insulin injections and four other medications. Frustrated and feeling hopeless, he asked his doctor if he would ever live a life without daily medications. When his doctor said, no, Marc decided to take his health into his own hands.
After hearing about the health benefits of a plant-based diet, he and his wife decided to give it a try. His new diet followed just a few simple rules: He would avoid animal products and keep it low in fat. Otherwise, he could eat as much as he wanted, without counting carbs or calories. Marcs daily menu included foods like oatmeal with fruit, pasta primavera piled high with vegetables, and spicy black bean burritos. Under his doctors supervision, in less than two months, Marc was not only able to drop his daily insulin injections, but every last one of his medications. His glucose levels are now completely normal.
Eric Adams on Reversing His Diabetes Diagnosis
Brooklyn borough president Eric Adams reversed his type 2 diabetes diagnosis after adopting a plant-based diet.
You May Like: What Vitamin Deficiency Causes Sugar Cravings
Exceptions To The Rule
Professor Taylor caveats that all of this research is relevant for individuals with the usual form of type 2 diabetes. Rare forms of diabetes exist that can easily be mistaken for type 2 diabetes, including:
A) Pancreatic diabetesThis occurs after several cases of pancreatitis and is likely to be caused by pancreas damage.
B) Monogenic diabetesThis genetic form of diabetes is commonly found in slim individuals diagnosed in early adulthood who have a very strong family history of diabetes.
C) Slow onset type 1 diabetesSometimes type 1 diabetes develops slowly, appearing in adulthood, and these individuals usually need insulin therapy soon after being diagnosed.
Implement Strict Portion Control
When it comes to diabetic dogs, you have to be very strict when it comes to meal portions. Avoid overfeeding as this can cause a sudden increase in blood sugar levels, which could put the dogs life at risk.
Your dog will surely beg for more, but you should never give in. Also, you should cut back on the treats based on the advice of the veterinarian.
Overall, you should base your dogs meal size on its age, breed, and activity level.
Read Also: Can Diabetics Eat Banana
Amanda L Gilbert Rn Msn
From my professional experience as an inpatient diabetes educator, many patients are able to reduce or stop their diabetic medications through lifestyle changes, such as diet and exercise. Through these adjustments their A1C improves, they lose weight, and do not require the same interventions as when they were diagnosed.
Many of my patients with several comorbidities elect to have weight loss surgery, such as gastric banding, in order to lose the amount of weight needed to improve their diabetes, blood pressure, cholesterol, and other risks that follow obesity.
However, once someone has a tremendous improvement and no longer needs to take diabetes medications they do not need to assume it is gone for good. Different factors can cause their glucose to rise again, such as gaining weight or not following a diabetic diet.
Therefore, once a person has been diagnosed with diabetes they need to always check their glucose at home and follow-up with their PCP to have their A1C monitored regularly.
Meghan Jardine Ms Mba Rdn Ld Cde
As a registered dietitian and certified diabetes educator, I learned through formal training that type 2 diabetes is irreversible. However, as a nutrition researcher and health care provider, I see different resultsin different people.
The good news is diabetes is not a static condition and a type 2 diabetes diagnosis doesnt mean the condition will progressively get worse. Mounting research finds plant-based eating patterns can prevent, manage, and, in some cases, eliminate diabetes symptoms, significantly reducing or eliminating the need for medication and insulin.
At the Physicians Committee for Responsible Medicine, we conducted a randomized controlled diabetes trial and found participants who ate a low-fat vegan diet lost more weight, had greater reductions in hemoglobin A1C, and had greater improvements with cholesterol than the control group .
Some in the vegan diet group eliminated the need for medications altogether, and their blood glucose numbers and A1C fell into a healthy range. These results could be classified as reversing the disease since reverse technically means to turn in the opposite direction.
How does it work?
Here are the five dietary guidelines used in the studies:
Eliminate all animal products: Steer clear from meat, fish, dairy products, and eggs.
Limit high-fat foods: Avoid added oils, pastries, fried foods, and limit olives, avocado, nuts, and seeds.
Recommended Reading: How To Reduce Sugar Level Immediately
Managing Type 1 Diabetes
Type 1 diabetes is an autoimmune disease that often develops during childhood. It occurs when the body mistakenly attacks the beta cells of the pancreas, removing their ability to produce the insulin that the body needs to use blood sugars correctly.
Receiving a diagnosis of type 1 diabetes can be daunting, yet many people manage the condition well, keeping symptoms and severe complications at bay.
Healthy Diet For Reversing Type 2 Diabetes
The dietary fiber present in whole grains, fruits, and vegetables are important for managing diabetes. They help in faster digestion and better bowel management thus the overall health is improved and also the long term, effects of diabetes are reduced.
Healthy fat like polyunsaturated fatty acids help in controlling the insulin levels in the body. It reduces the blood glucose levels, and thus should be in the diet. Seeds and lean meat are the best way to include healthy fat in your diet. Vegetables are essential in the diet as they are full of nutrition and thus need to be a part of our diet.
Don’t Miss: How To Bring Down Sugar Level Quickly
Is It Possible To Reverse Type 1 Diabetes
At the moment, type 1 diabetes cannot be reversed. Type 1 diabetes is an autoimmune disease, and reversing it would require a method of preventing the bodys immune system from attacking its own insulin-producing cells.
Research is currently trying find a type 1 diabetes vaccine which could help to one day reverse the condition.
Heredity Need Not Be Destiny
Many people think theyre destined for lifetime struggles with excess weight and ultimately diabetes because its in my genes. They had parents or grandparents who were overweight and had diabetes.
And sure, genetic factors predispose some of us to become fatter than others, but for most Americans, heredity need not be destiny, argues Dr. Danine Fruge, MD, ABFP, Medical Director and Educator at the Pritikin Longevity Center.
To her patients at Pritikin, Dr. Fruge brings the enthusiasm and expertise of a doctor who practices what she preaches.
Also Check: How To Come Sugar Disease
Should We Pick Up Plows And Return To The 19th Century
Of course not. But we can learn a lesson from the Amish in the Lancaster area of Pennsylvania, notes Gomer.
They shun all modern conveniences. Theyre physically active throughout the day, growing and producing their own foods in much the same way their ancestors did 150 years ago. While the Amish diet is a lot higher in fatty dairy products than the Pritikin Eating Plan or the U.S. Dietary Guidelines would recommend, only about 3% of the Amish are overweight, and almost none is obese.
Diabetic Hyperglycemic Hyperosmolar Syndrome
This is noticed in commonly occurring in people who do not know that they are suffering from diabetes, or are not able to control their high blood sugar level for that matter. HHS might cause you dehydration because of which may also fall unconscious. Other risks also include heart attack, stroke, and infection.
You May Like: Reduce Sugar Level Immediately
Fat Is A Source Of Energy That Does Not Raise Your Blood Sugar
Unlike carbs or protein, fat cannot be broken down or converted into glucose efficiently. Furthermore, fat does not require insulin to get into cells to be used for energy, thereby bypassing the problem of insulin resistance. In fact, high insulin levels impair the bodyâs ability to use fat for fuel, driving it instead into fat cells for storage.
To adapt your metabolism to using fat as your main source of energy, dietary carbohydrates must be reduced to below your unique tolerance level. When you do this, your blood insulin level will come down, giving your body increased ability to burn both the fats you eat and those which you have in storage. For most people, this means switching from the standard recommended high carb, moderate protein, and low fat diet to a high fat, moderate protein, and low carb diet. Fat adaptation does not happen overnightâit can take anywhere from 3 to 6 weeks for most of its benefits to occur, and possibly longer for the full benefits to occur.
Reductions In Diabetes Medications
Diabetes medications all have the same goalâto reduce elevated blood sugar. The common classes include:
- GLP-1 receptor agonists
When your blood sugar is no longer chronically elevated, these blood-sugar-lowering medications are no longer necessary. An ongoing study has shown that sustained nutritional ketosis can lead to the permanent removal of these medications.¹ⰠMedications that rapidly reduce blood sugar need to be removed first, such as insulin and sulfonylureas, sometimes in as little as 2 days to 2 weeks. Other medications like SGLT-2 inhibitors, DPP-4 inhibitors, GLP-1 receptor agonists, and metformin can be removed as long as you maintain normal blood sugar.
If you are on diabetes or blood pressure medications, Virta highly recommends that you get medical supervision before making any dietary changes.
Read Also: Sugar Tablets Side Effects
Gestational Diabetes And Prediabetes
Both gestational diabetes and prediabetes can be prevented from turning into type 2 diabetes. Women with gestational diabetes typically return to normal blood sugar levels after giving birth, and a healthy diet and regular exercise regimen go a long way toward preventing the development of type 2 diabetes. In fact, losing 7 percent of your body weight can make a tremendous difference in managing your blood sugar levels and therefore prevent the development of type 2 diabetes. | <urn:uuid:162d8d72-d37c-4470-a874-4bdd55db808b> | CC-MAIN-2022-33 | https://www.sugarprotalk.com/can-sugar-diabetes-be-reversed/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00199.warc.gz | en | 0.947705 | 3,646 | 2.921875 | 3 |
As one part of the subject matter of Intellectual Property Law (hereinafter IP), patent is mostly referred as “hard IP” as opposed to “soft IP” which is used to refer copyright, trademark, trade secret and other form of protection. Patent law maintains the lion’s share in the discussion of the subject matter of IP.
Any jurisdiction that tries to govern the patent regime primarily defines the statutory subject matter and provides what should and should not be patented. Under the United States (US) patent system, Section of the Patent Act provides “Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent.” While this provision clearly instructs what to take before the United States Patent and Trademark Office (USPTO) claiming patent protection, the US Supreme Court in the Bensoncase has provided categories which are not patent-able subject matter, these include; natural phenomenon, laws of nature, abstract ideas, and mathematical algorithms.
The main purpose of the law to confer the patentable and non-patentable subject matter is because, patent protection grants a monopoly right excluding the invention from the public domain. This paper mainly focuses on the issue of patentability of computer programs (software). The emergence of the idea of software patent in ’s and early ’s invites scientists and legal scholars to the discussion table and led to variety of arguments in favor and against of this concept.
In this paper, the writer primarily addresses the theoretical basis for software patent, and discusses the selected arguments in favor of and against the protection thereof. Then, briefly discuss the likely impact of excluding software patent on other fields of technology as well economic development at large.
II. Theoretical Basis of Software Patent
The emergence of the Intellectual property gives rise for a debate on whether it should or should not be protected by law. The main arguments lies on maintaining the balance between the individual inventor’s or author’s interest to exclusively monopolize his or her own piece of work and the interest of the mass to access everything on the public domain.
The debates are contextually similar in case of software patents. The main arguments in favor and/or against software patents are deeply rooted in the philosophical justifications discussed below. The writer discusses; natural rights theory, theory of utilitarianism and Personhood (personality-based) theories to justify the patentability or non-patentability of computer programs.
1. Natural Rights Theory
The natural rights theory’s justification is often described as “the labor theory” or a “labor theory of value.” This philosophy as characterized by writings of John Locke holds that “we all own the fruits our labor.” Lock argued that once a person “pulls something out of the common” and mixes his labor with it, he has an ownership interest in that thing, because his labor has attached to it, and “if anyone were to take it without permission or compensation, that person would have taken the owner's labor as well.” Locke’s argument has two main premises, first, the “mixing labor” premise which refers to productive activities and second, the labor theory of “value,” that argued the productive activities are or should be moral activity which creates the goods that sustain human life.
As a justification for the (software) patent system, the proponents of this theory stated that when something is removed from the common (public domain), there must remain enough for others. In other words, when the inventor (s) receives absolute monopoly in the form of patent (i.e. “pull something out of the common”) they must provide full disclosure to promote a robust “public domain” and ensure that the ideas are still available to all. Those who argue in favor of software patents based on the natural rights theory provides, software, as other fields of technology, are the results of “mental labor,” and software developers have employed their time, money, knowledge and labor, to develop the inventions.
However, this theory is not without critics, it’s criticized for failure to answer why society needs to acknowledge the natural rights of man? “Under the natural right theory, this explanation is given as a divine command and natural law, as if a divine power will gave the command to the industrious and as a result, the labor based reward theory was born. Moreover, this theory cannot be applied to software patent and patent law in general as the theory stands today, because, its argument concentrates on the rights of an author rather than on the rights of a patent holder. Furthermore, labor, alone, cannot be the sole justification, because, physical labor is not involved in intellectual creation, and thus would seem to poorly justification.
2. Utilitarian Theory
Utilitarian theory is the most dominant theory in providing justification for the protection of the current intellectual property regime. According to this theory, protection should be maximized to ensure the proper incentives for the production of intellectual properties. This theory asserts, the granting of exclusive rights fosters innovation and creates incentives for the invention of useful tools and machines. This theory highly compromised the rights and interests of creators and owners of intellectual property with the public interest.”
The US patent system is one of such systems that are based on the theory of Utility. The Constitution states that “Congress shall have Power . . . to promote the Progress of Science and useful arts, by securing for limited times to … inventors the exclusive right to their respective … discoveries.”
Proponents of Utilitarian principles argue, without patent rights, software developers do not have economic incentives to create the important computer programs. Software patents help to “facilitate progress, purportedly solve public goods problem, prevent market failure, and spur innovation.” They also argue that the public disclosure requirement of the Patent Act gives other software developers information to develop new software. Grunerin his article lists five public benefits that may be accrued from the incentive to software developers through protecting software patents, these are;
i. “Encouraging inventive efforts through the promise of economic rewards to successful inventors,
ii. promoting public disclosures of useful inventions through issued patents and broad scale invention marketing,
iii. Furthering the investment of resources in the refinement and popularization of inventions to achieve the commercialization and widespread availability of patented products and services,
iv. Ensuring prospective studies to identify additional or improved applications of inventions and
v. Limiting duplicative efforts to discover perfect and improve patented inventions, thereby maximizing society's net gain from each patented invention.”
3. Personality-Based justification of software patent
This third justification for the protection of IP is based on the philosophies of Hegel. This theory argues, “People’s identity becomes deeply connected to things they personally own, and such things deserve a special status under property law.” Hegel maintains that individuals have moral claims to their own talents, feelings, character traits, and experiences. A Hegelian property analysis has two important implications for IP as well as software patents. First, if society decides to adopt an IP law regime, then it is logically coherent to analyze the regime as a form of “true” property. Second, the Hegelian property analysis can aid legislators and judges in formulating a more internally consistent and predictable positive law.
However, this theory did not establish the relevant moral claim when it states “we own our feelings, character traits, and experiences.” Moreover, even if it could be established that individuals own or have moral claims to their personality, it does not automatically follow that such claims are expanded when personalities become infused in tangible or intangible works. And more importantly, there are many intellectual innovations in which there is no evidence of the creator’s personality, such as a “list of customers or a new safety pin design.” Therefore, it is unlikely to necessarily establish a relationship between the “invented” software, and the personality of the developer (s) of such software. For this reason, the writer believes that its less strong justification to argue based on this theory.
III. Arguments against Patentability of Software
Those who are against patentability of software programs, mainly provide the following arguments. They primarily states, software falls under abstract ideas and algorithms that are barred under the Patent Acts of several countries. The US Supreme Court in the Diehr case, has defines a mathematical algorithm as a "procedure for solving a given type of mathematical problem." The Board of Patent Appeals and Interferences has further explained this concept stating that “a claim should be considered as reciting a mathematical algorithm only if it essentially recites, directly or indirectly, a method of computing one or more numbers from a different set of numbers by performing a series of mathematical calculations. Those who reject software patent protection argues, if patents issued on fundamental concepts that involves an abstract idea, or an algorithm then it will be effectively preempting all subsequent inventors from gaining access to the public domain. Moreover, software's novelty and utility generally reside in its algorithm, not in its physical structure, therefore, software are not worthy of patent protection.
They also argued that, Patents on intangible software innovations, which lack physical features and tangible structural elements, may restrict information processing sequences and related intellectual processes, software patent discourages Research and Development (R&D); after software patents were becoming widely accepted, R&D investments actually declined in firms that engaged in software development when instead they should have been rising as a result of the increased patenting of software. There is also argument against software patent for the reason that software can simply be protected under other forms of intellectual property such as copyright law.
IV. Does the Exclusion of Software Patent affect other Fields of Technology?
The development of computers as well as computer programs in the last few decades has led to the existence of multinational software companies and, the software industry has emerged as one of the most important sectors of the economy. The growth of the Internet as an established personal communications and commercial medium has fueled the integration of software into nearly every aspect of modern life. Especially, in the developed and developing countries, that constitute the highest share of world’s economy, it is difficult to find an economic sector that is not affected by the development of the software industry.
The writer of this paper strongly believes that the intellectual property regime has a significant role for the success of the software industry as an input for the development of countries economy in general. The existence of patent rights provides a variety of social benefits; patents can provide incentives to invest in innovation and develop more useful software programs, and promote investment in research and development. It can also facilitate trading in technology and financing start-up firms. Not only these, the disclosure of technical knowledge in the patent specification can help spread knowledge.
For the reasons mentioned above, any discrimination of software from the patent protection will likely discourage the software developers, for lack of economic incentives. It also negatively affects research and development, because, if every software invention is available in the public domain, who cares to “reinvent the wheel?”, so that the research and development fund will significantly decrease. As a result, the contribution of the software development for the other fields of technology will significantly decline.
Under the Anglo- American legal system the intellectual property right is justified based on the utilitarian theory, as opposed to the natural rights theory and theory of Personhood. Utilitarianism recognizes property insofar as it promotes society’s goals of utility or “wealth maximization.” And the United States has adopted this theory in the constitution when it sets the “promotion and progress of science and the useful arts,” as the main purpose of the patent law.
Both natural rights theory and utilitarian theory is consequentialist. While the natural rights consider patent protection as an incentive for one’s labor, utilitarian theory considers the end of intellectual property (software patent, in specific case) to be incentivizing the inventor to make more things, so that the general public can benefit. Despite these two views Personhood theory attaches one’s invention with his or her personality. The development of software industry as supported by the patent regime is hugely backing up and facilitating the world’s economy, so that, discriminating software from the patent protection will highly affect the other fields of technology. | <urn:uuid:94df9306-1d90-49d2-9169-dd30fd303751> | CC-MAIN-2022-33 | https://abyssinialaw.com/blog-posts/item/1469-software-patents-justifications-and-arguments | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00201.warc.gz | en | 0.93546 | 2,571 | 2.96875 | 3 |
Hi, I’m Randy Charles, the creator and chief editor of this site Paintcentric. I’m a businessman now by profession, but I used to work as...Read more
Paints are generally chemical compounds used today for various purposes in different niches such as art, real estate, engineering, etc. These chemical products come in different forms and are used for preservation, beautification, design etc. Today we’d be looking at deep base vs medium base paint.
Many people usually make a common error when they confuse medium base paint with deep base paint even though they are significantly different. Even though it doesn’t take a genius to tell the differences quickly, a fair amount of basic knowledge is required to tell these two unique forms of paint apart. In this piece, we will go over that elaborately. Keep reading.
Deep Base Vs Medium Base Paint: Which One Is Better?
Deep base and Medium base paints share significant disparities; however, when it comes to which paint is the better one, it all boils down to user preferences, the project in view, and other factors that may come into play during paint selection. Below is a contrast of both deep base paint and medium base paint characteristics.
|Medium Based Paints||Deep Based Paints|
|Creates a color between light and dark||Produces a darker color of paint|
|Contains more white base than deep base paints but lesser than plain white paints||Contains even lesser (if any) amounts of white base pigments|
|The amount of white base pigments present in medium base paints enable it to reach the desired level of saturation needed||The amount of white base pigments present in deep base paint enable it to be tinted to match very dark, vibrant colors|
|Fairly durable and resistant to stain.||It is usually resilient to friction and can hold up under the scrubbing needed to remove any dirt or stains.|
|More opaque due to the amount of titanium oxide present in medium base paints||Less opaque because deep base paints contain lesser amounts of titanium oxide|
Before we continue, let’s take a quick study to know more about paints. The various forms of paint reflect their functions: industrial paint —used for industrial coating and preservation of industrial materials, decorative paints —used for decoration and protection of buildings and art paint —water color, acrylics, and oil paint used for creating artworks.
This article examines decorative paint used for decorating and preserving buildings. This type of paint is further segmented into accent, light, medium, deep and extra deep base paints. For reading purposes, it is crucial to understand that paints are chemical products and contain chemical compounds that may develop allergic reactions in certain individuals, so it is advisable to use necessary protective equipments when handling these products. With that being said, happy reading!
About Deep Base Paint
What Is A Deep Base Paint?
Deep base paints are generally paints with little to no amount of white or lighter fragments that help them effectively portray their true tones and shades. When we talk about deep or medium bases of paint, the base refers to the colors that the paint is tinted with. Deep base and ultra-deep base paints are built on darker colors and tones. As a result, the deeper the foundation of paint utilized, the darker the hue.
The minute amount or quantity of white pigment in deep base paint permits it to take more colorant and produce deeper colors when it is tinted. It dries transparent without colourant and provides little to no coverage.
Related Read: What Paint Color Goes with Uba Tuba Granite?
What Is Deep Base Paints Used For?
It is prudent to classify deep base paints based on the type of colors that deep base paints usually are. However, like any other form of paint, the painter or user reserves the discretion to utilize deep base paints in whatever way they deem fit. Because there are fewer white pigments than white bases, the most luxurious colours such as black, brown, burgundy, navy blue, dark green, copper, and others can be achieved.
However, based on these shades of colours they exude, deep based paints are usually used in a closed environment where the user wants to achieve a darker and vibrant ambience. This could range from bedrooms, studios, dens, cinemas etc. Since deep base paints create darker shades, it is important to note that deep base paints depend solely on the user/painter and what they want to achieve.
Deep Base Paints Price List
Depending on the location and current market demand, extra deep base painting usually costs around $15 – $20 per litre.
When To Use Deep Base Paint
Deep base paints can be used across many settings to provide a dark and colorful environment. Because of the little white fragments present in deep base paints, it is usually a go-to choice when looking to achieve burgundy and mild ambiences.
This type of painting design is required for libraries, bedrooms, but it is not limited to these settings. Painters or homeowners can quickly require this burgundy ambience for various other places.
About Medium Base Paint
As explained earlier, when it comes to paint bases, classifications such as deep, accent, extra deep, medium, and light refer to the different colors the paint is tinted with. However, this is not the unique difference between these variations of paint.
Each of these paints can have a fixed quantity of bases when it comes down to it. Still, the differences between them that allow one to be a medium base and another to be an extra deep base depend on the amount of titanium white present in the base. Usually, when the paint is produced, it gives off the desired color with the base alone. However, this color would be mostly thin, unreflective of light and would not coat as properly as it should.
This might be a good feature when trying to achieve most colors or a certain type of painting. There are, however, specific shades of paint and paint types required for most paints as of today, and it is the titanium white —though in varying quantity that helps to achieve this efficiently.
Generally, depending on the type of paint that has to be achieved —medium base, deep base etc., the finely ground space metal —titanium is added to these various bases. The base paint into which the pigment is mixed is different to allow the final colour to be possible.
What Is A Medium Base Paint?
Based on the explanation above, it is now easy to understand medium base paint. This type of paint is generally light due to the titanium white pigments present in the base and is used to achieve bright and medium between light and dark colors.
That being said, medium base paints, like the name implies, generally have a medium amount of white pigments present in them. It is not more than the base to maintain their color still and not significantly lesser than the base to give the base color a lighter and brighter look. It is safe to say that the amount of titanium white pigments present in medium base paints is adequate.
Medium base paints should not be confused with a neutral base or white, but they are considered in the middle between light and dark. They are paints commonly used in homes, businesses, and the like.
What Is A Medium Base Paint Used For?
Typically, paints of brighter colors are usually used in open areas such as kitchen spaces, living rooms, building walls, and bedrooms. However, it all boils down to what the homeowner or painter plans to achieve because this is a major factor that affects paints selection in the first place.
Since medium base paint has more white pigment and lighter tones, It’s fair to say that most house paints are medium base as they tend to be lighter colors. But, this does not rule out the use of deep base in houses, and it’s just not as used that often.
If you wanted to paint a room with light paint, you would probably choose medium base paint with white pigment. Likewise, if you wanted to paint a room with dark paint, you would probably choose deep base paint as it has more white pigment. Most people prefer to use medium base paint for kitchens and bathrooms because spots and stains can easily be seen.
Medium Base Paint Price List
It is important to note that the major factor affecting the price of paint is the amount of titanium dioxide present. The varying amount of titanium oxide present in paint helps one determine how much the paint can conceal the surface underneath and how light or dark the paint shade will be.
That said, medium base paints cost around $60 for about 5 litres. This price may vary based on location, market demand and a host of other factors.
When To Use Medium Base Paints?
As explained earlier, medium base paints can be used in open areas such as kitchens, bathrooms, living rooms, building walls and bedrooms. Generally, this is because medium base paints are brightly colored and help in these spaces in various functions such as spotting stains for cleaning, improving environmental ambience etc.
Medium base paints are also used to generally improve the outlook of a room, space or building. Pale colors usually look like they are moving away from you —a receding illusion. Therefore when you use lighter colors for your floor and walls, your areas and spaces similarly tend to appear larger than they are.
What to Choose Between Deep Base And Medium Base?
Now that you know the differences between deep base and medium base paint, which is best for your needs? That will largely depend on the color of paint and the amount of maintenance you are willing to do, like the lighter the base, the less resistant it is to dirt and stains.
This means that surfaces painted with brother colored paints, since they are more susceptible to stains and spots, will require consistent cleaning to maintain surface beauty and the paint’s durability.
You should start with where the project will take place and the amount of coverage needed. Keep in mind that you can use base paint that does not have tint, and there is nothing wrong with it. This means that the paint lacks a tint that conveys the various tones of different colors. These will still contain neutral pigments and can be used as white base paint, although it is not popular as paint that includes tinting.
Knowing the constituents of deep base vs medium base paint makes it easier to make worthwhile decisions regarding the choice of paint for your project. | <urn:uuid:f3c4390e-4e93-43d0-a0ca-9c7c4b6174ee> | CC-MAIN-2022-33 | https://paintcentric.com/deep-base-vs-medium-base-paint/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00004.warc.gz | en | 0.945639 | 2,148 | 2.53125 | 3 |
The oil and gas sector has been experimenting with solar power as a generation source for oil operations for decades, such as this Chevron (then ChevronTexaco) California project in 2003. As costs of solar come down and pressure intensifies on oil companies to cut emissions, more renewable energy will de deployed, but it may remain limited — in scope and effectiveness.
David McNew | Getty Images News | Getty Images
Oil and gas companies are working hard on their messaging in the climate change era. If it’s “code red for humanity” as the UN’s IPCC said last Monday in its latest dire climate report, it’s some sort of “code red” for the fossil fuels industry too, in terms of figuring out how to stay relevant, believable — and for the market, investable — in an era of carbon emissions reduction mandates from governments, regulators and shareholders.
Occidental CEO Vicki Hollub took a stab at it earlier this year, saying fossil fuels aren’t the problem — it’s emissions. It follows that if fossil fuel companies can find ways to eliminate emissions, on a large enough scale, maybe they can convince shareholders and stakeholders that they are moving into the future in more sustainable way.
But there are big differences in emissions types and emissions reduction strategies. What oil and gas companies do to reduce emissions in their operations and supply chain are, in the end, a smaller part of the carbon reduction game than reducing what is known as Scope 3 emissions — for example, from the tailpipe of your car. Those Scope 3 emissions, by expert estimates, are responsible for the vast majority of carbon emissions from the energy industry.
Lowering carbon emissions profile of oil and gas drilling
Companies including ExxonMobil have begun to disclose Scope 3 emissions, but in terms of their efforts to reduce emissions, remain focused on their own operations. What oil and gas companies do to lower operational emissions, the energy used to power drilling and all the way to the trucks going to and from drilling sites, does matter. Though how much it matters is inevitably smaller in the grander scheme of carbon emissions reduction efforts.
“The electricity oil and gas companies use is a pretty small contributor to their carbon footprint,” said Chris Archer, head of Americas for Macquarie Capital’s Green Investment Group.
Occidental has been a leader in many of the new technology approaches to lowering the emissions profile of the oil and gas business. As Hollub told CNBC earlier this year, “The reality of a net-zero carbon barrel, it is possible, and we are doing things to make it possible. It’s not a goal on a sheet of paper.”
Occidental is working on multiple projects related to carbon sequestration, not just for its operations, but other heavy emitters in the industrial sector. A growing but smaller part of that new technology thinking for oil and gas operations, which is expected to see more development in the future, is solar energy — solar panel arrays spreading out in places like the Permian Basin to help lower the emissions profile of oil and gas operations.
Occidental already has a 16 megawatt solar farm in the Permian — the first large-scale solar project to directly power oil and gas operations in Texas — and Hollub told CNBC earlier this year “we will be doing more of that. We believe it will take everything, and we will add more solar over time.”
Oil and gas industry’s history with solar
Solar isn’t a new thing for oil and gas. Chevron had a project powering operations in the Kern oil field of California as far back as 2003, and BP even got into solar panel manufacturing for decades under Sir John Browne’s “Beyond Petroleum” mission (before solar manufacturing became mostly China’s game and most everyone else went bankrupt).
“This isn’t a brand new journey,” said Amy Chronis, leader of Deloitte’s US Oil, Gas & Chemicals team in Houston. “But it’s still early days to see broad-based carbon reductions.”
Now several of the European and U.S. majors are making major investments in renewable again, including BP and Royal Dutch Shell, and all the big oil and gas companies have at least a few solar power projects, whether they developed them on their own or signed what are known as power purchase agreements with project developers, including ExxonMobil, which has added to its renewable energy portfolio in recent years.
It bought 500 megawatts of wind and solar in 2018 from Danish renewable energy company Orsted, the largest renewable deal ever signed by a U.S. major. Chevron signed its own 500 MW project last summer, with the energy generation to be split between the Permian, Argentina and Kazakhstan.
A lot of the renewable energy history within solar has been more fits and starts — and lower down the priority list —than consistent application to the business. Though, the pressure is mounting.
Benjamin Shattuck, research director for Americas upstream oil and gas at energy consulting firm Wood Mackenzie, said most of the companies he follows in the U.S. are still fairly early on in their journey to a carbon reduction model, but as environmental performance and ESG become more mainstream — he said ESG is top of agenda when he talks to oil CEOs lately —and more companies talk about net-zero targets and tie executive compensation to the goals, the situation is rapidly changing.
“Oxy is one of the companies helping to lead the conversation, between the Goldsmith solar plant [the 16 MW plant Hollub referenced] and longer-term carbon capture and storage, they are thinking about it from a bold standpoint, which is good to see. Everything points to it picking up and accelerating,” Shattuck said.
The Permian is well-suited to renewables
Places like the Permian Basin in Texas and New Mexico are well-suited to renewable energy, with lots of land and a regulatory framework favorable to project development, whether oil and gas or renewables, but the economics have to make sense. And increasingly, they do.
An oil pump operates in the Permian Basin oil field near Carlsbad, New Mexico.
Joe Raedle | Hulton Archive | Getty Images
Archer says these companies can have a much bigger impact on carbon reduction through carbon capture efforts and flaring reduction than by going into renewables for the power. But the Permian Basin is one of the best places in the U.S. to cite solar, with loads of cheap flat land and really good irradiance. “Today, solar, for lots of oil and gas is the economic choice versus diesel generators,” Archer said.
That implies solar and wind projects being developed may have been less about a focus on carbon reduction, in his view, than being driven by the power generation being economically competitive. And Archer said given how economic solar has become in places like the Permian, if oil and gas companies were serious about it as a de-carbonization strategy, we might have seen more of it already under development.
Never going to be oil’s carbon solution
No one is suggesting solar is oil’s solution. One or two solar plants, “won’t move the needle,” Shattuck said. But larger power purchase agreements and multiple projects across companies in the sector, isn’t insignificant either, in his view. “More operations need to be powered from renewables, whether they own the projects or are taking renewable generation from the grid,” Shattuck said.
It’s a complex process to attempt to make oil and gas drilling operations 100% renewable, from running the drilling rigs to generators and compressors and fracking trucks to get people to and from the field. The energy being used to prepare and drill new wells is greater than for existing wells, and these operations are not stationary either, moving around the Permian from West Texas to New Mexico with electric needs variable. In other words, if you build a solar plant in one area, you can’t just easily pick it up and move it to another where more wells are being focused on. That’s why Shattuck said we may see more oil and gas companies signing power purchase agreements with project developers.
“In some cases, that alleviates the capital risk,” he said.
But all the diesel that is used today — especially the more remote a drilling site is —does represent a wide range of power replacement opportunities.
The oil field is emissions reduction ‘low-hanging fruit’
Because Scope 3 emissions are the vast majority of emissions and the furthest from the oil and gas companies direct control — and maybe active interest in controlling, with ExxonMobil saying that while it will track Scope 3 it is really up to society and consumers to make their own energy choices — renewable energy in the fields is in a sense, the low-hanging fruit.
“Electrification of the oil field is important, and solar and wind can play a role, part of a larger puzzle that has to be solved. There isn’t a single solution today, that’s the theme,” Shattuck said. “It needs to be multi-technology for them.”
This won’t go over well with those ready to leave the fossil fuels economy behind, because the model is in effect augmenting what oil and gas companies are doing in the oil field rather than representing any full-scale pivot. It’s the emissions are the problem —not fossil fuels — of Hollub.
Building solar is not their solution. It’s good asset management with economic benefits on their existing assets. But it’s not a rubric through which they de-carbonize.
Macquarie Capital’s Green Investment Group
But that low-hanging fruit gives the companies a means to test the market, see how investors and stakeholders react, and going down the road of renewables, because it’s not what they have typically done in the past, is part of the effort that will be put into winning back investors in the years ahead.
“They need to find out what’s hitting the mark and what isn’t, and if Goldsmith [the Oxy solar project] is resonating well with investors, then maybe they do more,” Shattuck said.
The first net-zero oil barrel
Archer worries it is still more about issuing a press release than executing on significant change, and he is skeptical that these projects can change the image of these companies.
“When was the last time you bought something from Oxy? It’s not like you’re swayed as a consumer,” he said. “Building a 20 MW solar farm and issuing a press release won’t earn you many points. You need a bigger strategy and goals.”
But while the consumer at the gas pump may not think in those carbon-neutral barrel terms today, industrial buyers already do. “We have talked to companies producing natural gas and the off taker is a utility and that utility does care about the carbon footprint, about the gas burning in a power plant,” said Kate Hardin, executive director of the Deloitte Research Center for Energy & Industrials. “So maybe it is not as direct as a person, as the end user in retail, but companies buying the oil and gas may care.”
And that is exactly what happened in early 2021, when Oxy shipped its first-ever carbon-neutral barrel of oil to India, and issued a press release about it.
There are multiple business cases to make in the future that revolve around more of these deals, if on the margins, and that relate back to the value of more renewable energy generation in the fields. Oil and gas companies need to find new competitive advantages, and even if there is a case where the economics of a solar plant don’t work on their own, decreasing export risk could be another way to make the model productive.
“It will be interesting to watch that competition. It’s proof of concept work, really early on,” Shattuck said.
That work comes at time when the sector is focused more on capital discipline and budget cuts then spending, making it more difficult for oil and gas companies to pull the trigger on experiments with technology. One of the biggest questions for the future of the oil and gas industry is tied up in the question of how much renewable energy development it pursues — what percentage of the overall spending is earmarked for carbon emissions reduction.
“I don’t think it will be an insignificant amount. If they want to continue to have access to funding and capital they will have to continue with a variety of these technologies and strategies, and we will learn more about what’s most effective,” Shattuck said.
The oil and gas companies early work on solar implies they are learning and getting familiar with the technology, and it will stay in the mix, but other initiatives will be more material, in Archer’s view. “Building solar is not their solution. It’s good asset management with economic benefits on their existing assets. But it’s not a rubric through which they de-carbonize. But we will see more of it,” he said.
For a long time, the oil and gas industry could do no right when it came to cutting spending and running operations on a more conservative basis. But in recent years, the industry has been forced by investors to do just that. Now capital discipline is a top priority to stay in favor with investors.
Carbon reduction efforts, including renewable energy projects like solar, are a different mode of thinking than deciding on exploration spending, but there’s a similarity: the companies are leapfrogging each other in terms of targets and as technology gets rolled out, it will play a role in the sector players that investors decide on as the likely winners.
“It would be surprising if the budget line item is low,” Shattuck said.
Especially with oil and gas executive compensation packages now much more frequently designed to only go up if carbon emissions go down. | <urn:uuid:4342bf1a-4736-4902-a288-4f25547391a4> | CC-MAIN-2022-33 | https://business-news.pro/2021/08/16/what-big-oils-solar-energy-projects-reveal-about-its-climate-strategy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00404.warc.gz | en | 0.959588 | 2,979 | 2.671875 | 3 |
It’s one thing to say all students can learn, but making them believe it—and do it—can require a 180-degree shift in students’ and teachers’ sense of themselves and of one another.
While expressions like the “soft bigotry of low expectations” underscore the effects of teachers’ and students’ mindsets on academic success, it has proved difficult to pin down whether and how it’s possible to change those attitudes once established.
Nonetheless, attempts to change that dynamic, from targeted interventions to restructured schools, are gaining traction as many states overhaul their curricula to match the Common Core State Standards and incorporate student-growth measures into accountability systems.
Three decades have passed since the Stanford University psychologist Carol S. Dweck and others first linked students’ motivation to the way they perceived intelligence. Students who believe intelligence or skill can be improved by effort and experimentation—what Ms. Dweck calls a “growth mindset"—seek challenges, learn from mistakes, and keep faith in themselves in the face of failure.
By contrast, those who believe intelligence and skill are traits you are born with—a “fixed mindset"—can be discouraged by failure and reluctant to challenge themselves.
Those mindsets are self-reinforcing, and Ms. Dweck, her colleagues, and other researchers have found in dozens of studies that students with a growth mindset improve more in academics and other skills, and can even beand more socially engaged.
“When we understand that we can build our intelligence, rather than it being fixed, we take risks; we are interested in learning from mistakes rather than focusing on how people see us and wanting to do things perfectly and quickly,” said Eduardo Briceño, a co-founder and the CEO of Mindset Works, a company based on the research by Ms. Dweck and Lisa S. Blackwell, the program’s co-founders.
Mindset Works, based in San Carlos, Calif., won a small-business-innovation grant from the federal Institute of Education Sciences to scale up its “Brainology” curriculum, which provides six to 12 hours of online and in-person instruction and activities over five to 12 weeks.
The software targets grades 5-9, though the program as a whole can be implemented schoolwide. Lessons include brain development and learning, fixed-vs.-growth mindsets, and different strategies students can use when they hit difficulty in a particular subject or problem.
The program is being used in about 600 schools nationwide, and the District of Columbia school system is rolling it out this fall in middle school advisory classes.
—Jennifer Zdon for Education Week
At SciAcademy in New Orleans, chemistry teacher Anthony McElligott talks his sophomore class through their first experiment of the year. As the students predict ink dispersion patterns, listen to the way Mr. McElligott frames his focus on the process of science, rather than chasing a “right” answer.
It’s also been integrated into Scholastic Inc.'s Math 180 curriculum this fall, so that students in grades 6-12 begin math instruction with two weeks of lessons explaining mindsets and neuroplasticity—the concept that the brain changes with experience—followed by periodic refreshers during the year, according to Tyler Reed, the corporate-communications director for the New York City-based publisher.
“The thing is, kids don’t mind failing,” said David Dockterman, Scholastic’s chief architect of learning sciences and an adjunct lecturer at the Harvard Graduate School of Education. “When kids play video games, they fail 80 percent of the time. They look at failure there as an opportunity to learn.”
However, students can find school mistakes humiliating, he said.
“How you set it up for kids matters; they hear you. There’s a lot of implicit meaning for kids,” Mr. Dockterman told 600 middle and high school math teachers at a professional-development seminar in the Baltimore County, Md., school district last month.
For example, a teacher setting out a problem from a new unit might say, “Let’s start with an easy one,” which can discourage students who struggle or get the problem wrong; but a teacher might set students more at ease by introducing the same problem with, “This might take a few tries.”
Focus in New Orleans
At the SciAcademy Charter School here in New Orleans, Anthony McElligott’s sophomore chemistry class is learning to pose hypotheses about the dispersion patterns of two drops of identical ink in two identical beakers of water. Strolling around the class, the teacher points to one furiously scribbling student: “Chris’ paper has ‘because,’ which shows he’s supporting his answers with evidence. If you think you are done, add more evidence, give an example.”
After demonstrating the experiment, Mr. McElligott finds about half the class correctly predicted the ink would have different dispersion patterns even though the water and beakers were the same and the ink was dropped in the center of each beaker. When those who answered incorrectly mutter in frustration, he smiles: “We’re going to see in this class really great scientists who were wrong again and again.”
—Jennifer Zdon for Education Week
What can a Vietnam War prisoner teach sophomores about personal growth? Listen in as English teacher Katie Bubalo of SciAcademy in New Orleans launches a discussion in her sophomore class with a quote from former POW U.S. Admiral Jim Stockdale.
The three-school Collegiate Academies charter network, of which SciAcademy was the first, sees cultivating growth mindsets as its first and most important mission. Founder Ben A. Marcovitz launched SciAcademy six years ago as one of the first charter high schools to open after Hurricane Katrina.
SciAcademy, the neighboring George Washington Carver Collegiate Academy, and George Washington Carver Preparatory Academy high schools, hire teachers based on multiple classroom observations, not just interviews.
Typically, Mr. Marcovitz estimates, 60 percent of interviewees don’t stick around for the classroom observations, in which they teach a lesson, receive feedback, and teach again a few weeks later.
“But the 40 percent who do have already made a commitment to growth,” he said. "[The hiring process] allows us to weed out people evincing growth mindset who haven’t internalized it.”
That’s common, Mr. Briceño of Mindset Works said. In professional-development sessions, he has found about a third of teachers have heard the terms “fixed” and “growth” mindsets, “but might not know exactly what it is.”
Teachers often confuse “teaching a growth mindset and exhorting kids to try hard,” Ms. Dweck said. “You can’t just tell a child to try hard without giving them strategies and supporting their efforts.”
As part of an ongoing series of studies of growth-mindset teaching practices, Ms. Dweck and other researchers tracked more than 250,000 students learning fractions via the online Khan Academy program. Minor changes to student feedback—such as providing improvement-related praise vs. general encouragement—improved student persistence and math achievement, they found.
Praising students’ strategies, focus, effort, persistence, and improvement “takes the spotlight off fixed ability and puts it on the process of learning,” Ms. Dweck said.
At SciAcademy, the approach means students’ learning problems are discussed privately, after class, while improvements are always called out in public, and in detail—even for a student moving from a 62 percent on the last test to a 65 percent on the next.
“Students of the week” are not only recognized during Friday gatherings, but also are asked to describe the steps they used to reach the goal.
It’s important for teachers to go into detail when citing a student’s correct answer, Mr. Dockterman said.
“If you talk about what the kid did [to get the right answer], other students can model it,” he said. “If you just say, ‘You’re so smart,’ they can’t learn anything from that.”
SciAcademy went so far as to ban the word “smart” on campus.
“That sounds like it has a weird 1984 connotation but it’s really important,” said Spencer Sherman, the 12th grade dean and environmental science teacher. “You get in the habit of saying ‘smart,’ and you find yourself saying it to kids, and you give kids the expectation that [intelligence] is fixed. We’ll call each other out on it, because adult culture very quickly becomes scholar culture.”
‘Designed to Fail’
It can be particularly challenging to focus on effort with students who do excel easily. While teachers often notice struggling students who think they are “no good” in a subject, it’s easier for high-achieving students to slip under the radar, Mr. Dockterman said.
“You think you are good at math and so it comes easy for you, but you stick to the things that are easy, and if you get to something hard, you shut down,” he added.
SciAcademy found that out the hard way.
The school initially enrolled students in Advanced Placement classes on the basis of their having received top grades in similar subjects, Mr. Sherman explained. Many previously high-achieving students who “hit the wall” in the harder classes grew demoralized and reluctant to tackle other challenging work.
In response, the school opened Advanced Placement to anyone, but pitched the courses differently—"This will be the hardest class, with the most homework, but you’ll learn more,” Mr. Sherman said—and required an entry essay based on text difficult for even advanced students."It is a task you’re designed to fail, because we want students to figure out how to respond to that,” he said. “We’re trying to weed out for fixed mindset. Now the students in AP don’t think they got there by being smarter than everyone else, but because they worked really hard for it.”
Collegiate Academies staff see a growth mindset as a necessity for their campuses, which are made up of interlocking trailers, and located in a post-Katrina neighborhood still dotted with abandoned houses and shopping centers.
“We have to believe that a student who comes to us reading at a 2nd grade level can go to college in four years,” said Margo Bouchie, Collegiate Academies’ chief academic officer. “You can’t come to work everyday if you don’t believe that, and we have to be very honest with the scholars about where they are.”
School leaders acknowledge there can be a fine line between realistic and pie-in-the-sky growth. But SciAcademy students like junior Eugene Thomas provide some support for optimism: He entered high school reading on a 5th grade level, and moved up to a 10th grade level by the end of the year.
Mr. Thomas said teachers noticed every time he read slightly better and pushed him harder, urging him to read 30 minutes every day on his own time. “It’s not really difficult; you just have to work hard,” he said.
Quiz: What’s Your Mindset
In some schools, a “growth mindset,” or the idea that people can improve by seeking challenges and learning from mistakes, has reformed how teachers approach their instruction. How do you approach learning? Are certain skills naturally born to students, or can they really improve by effort alone? Using questions from , we’ve put together an exercise (not a test!) for you to try out.
Coverage of school climate and student behavior and engagement is supported in part by grants from the Atlantic Philanthropies, the NoVo Foundation, the Raikes Foundation, and the California Endowment. Education Week retains sole editorial control over the content of this coverage.
A version of this article appeared in the September 11, 2013 edition of Education Week as ‘Growth Mindset’ Gaining Traction As Ed. Strategy | <urn:uuid:62021758-285f-4eed-90b3-f34570ed47c8> | CC-MAIN-2022-33 | https://www.edweek.org/leadership/growth-mindset-gaining-traction-as-school-improvement-strategy/2013/09?tkn=OMMFBUpoZuQwY4qvMMvS1tu%2BEpDD9iqQZV0U&cmp=ENL-EU-NEWS1 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00005.warc.gz | en | 0.957166 | 2,665 | 3.171875 | 3 |
Ranchers who understand the behavior of the bison they care for will be able to handle their bison more efficiently, with less stress and lower risk to both handler and bison.
Bison are native to North America. They’ve adapted over thousands of years to survive in our often-inhospitable landscape. They’re extremely efficient at converting limited feed resources into lean meat and they have reproduction rates that any cattlemen would appreciate. They are at home on the range.
Bison are however not naturally at home in a bison handling system. For new bison ranchers, this is important to understand. Bison have survived in the wild by being hyper aware of, and reacting quickly to, changes in their environment. For bison that are used to being free, the handling process can be filled with stressful threats.
Our goal as bison ranchers is to minimize these threats? If your bison feel threatened their stress levels will rise. If these stress levels rise too much, your bison can become very difficult, and very dangerous, to handle. Additionally, stressed livestock are:
- more likely to injure themselves
- more likely to injure those handling them
- more likely to damage your equipment
- more susceptible to illness
- more likely to reduce food intake
All of these outcomes will negatively effect your bottom line. If you want to improve your bottom line, there is tremendous value in removing stress from your bison operation.
There are three basic ways that you can lower the risk to your livestock.
- First is to introduce your bison to your facilities in a safe and positive manner.
- Second is to train your staff to adapt their handling methods to the individual bison.
- And lastly, ensure your equipment and facilities will allow safe and efficient animal movement.
Introduce your Bison to your bison handling facility and bison corrals
Bison are very aware of their surroundings. A new handling system will look, sound, and smell novel. To bison, anything novel or unfamiliar is a threat until proven otherwise. To remove the threat of a new handling system, the system needs to be introduced carefully to the bison herd. You can benefit from bison’s curiosity by setting your equipment up so that your bison can safely explore the equipment at their own speed.
Do not force your bison into your system as this may only stress the bison and they will remember that stress for a very long time. All you have to do is make sure your bison can safely access the equipment. Make sure to tie all your gates open. Then, before you give them access to your system, take a walk through the equipment to ensure, from the animal’s perspective, any threats have been removed or minimized.
Threats can be many things; smells, sounds, movements, even shadows. Some of the often-cited threats are loose chains (that rattle in the wind), garbage, like a discarded plastic bag or cup, or somebody’s coat draped over a fence (that smells foreign or moves in the wind). Remove as many of these potential threats as possible.
Build positive memories
Once your bison have become comfortable with the equipment on their own, some ranchers have found further success pre-conditioning the bison to the handling process. While this step introduces more initial work for the bison handlers it will minimize stress and maximize handling efficiency into the future.
This step involves introducing the herd to the handling process in a gradual manor. For example, the handler may first bring their herd into a holding pen and then opening the gate to the handling system to let the herd learn that the way out is through the handling system and squeeze chute. Feed can be located beyond the squeeze chute as a reward for successfully traveling through the handling system.
The next time your bison travel through the handling system the handler may hold the stock, in small groups, for brief periods. Do not isolate your bison. Each time the herd is brought through the system another step can be introduced and each time the animals leave the squeeze they can be rewarded with feed. If you own a hydraulic bison squeeze chute, you may want to let your bison walk through your system, at their own pace, while your hydraulic pump is running. Your goal is to minimize the number of potentially threatening elements your bison will face when they are actually handled. If your bison training has been done well, your bison will flow through your system without fear or coaxing.
NOTE: bison do not like to be isolated from their herd mates. While you must isolate the bison in the bison squeeze chute you should avoid isolating your bison in any other part of your handling process. Additionally, when you hold an animal in your bison squeeze chute you should attempt to process and release that animal as efficiently as possible. For this reason, be sure to have your vet station set and ready before you bring animals into your system.
Bison handling compared to cattle handling
(This section focuses on the bison behaviors that are different from cattle. We recommend that you also read Hi-Hog's, "Introduction to Cattle Behavior")
Compared to most cattle, bison tend to be much more sensitive to novel situations and perceived threats. Their reactions can vary from explosive attempts to escape to tonic immobility and even death. Stress, injury, and death will dramatically affect the economic success of your operation. This is why handlers need to be aware of bison behavior, bison handling techniques and the various signs that your bison are stressed or frightened.
There are a few key differences between working with cattle and working with bison.
- Bison become highly stressed when they are isolated from their herd. To alleviate this threat bison are best moved, and held, in small groups. In the illustration below we show bison worked through an alley in small groups. If a bison is isolated it is quickly processed, of allowed to join (or be joined by) other bison.
- Bison don’t like being over-crowded or unable to turn around. Bison are best moved in an alley that is wide enough for them to turn around. If you place a bison into a single file alley, that doesn't have a roof, they will often attempt to climb out of the alley.
- When given an open stretch of working alley, cattle will usually navigate the length of the alley at a walk or slow jog. Bison, on the other hand, are more likely to run the length of the alley. If you are working with a narrow or solid sided curved alley with a cross gate, be aware that your bison may come upon this gate at speed and may not have an opportunity to avoid crashing into the gate. If your alley is narrow and S-shaped, be aware that your bison may bounce off the sides and bruise themselves as they run down the alley. For these reasons, We design our bison working alleys with lots of solid sided rolling doors. This allows the handler to divide the working alley into narrow pens. The gates can then be operated in such a way as to slowly move the pen forward towards the squeeze chute.
- Cattle see an open rail gate across an alley as a deterrent worth respecting. Bison however, may simply attempt to run through an open rail gate (or panel). If threatened, bison wouldn’t have much difficulty plowing through a two-inch diameter tree, so why would they consider an open rail gate to be different? If your bison are in a threatening environment, try to make your gates and panels solid.
- Bison tend to have a much larger flight zone compared to cattle.
- When working your bison from the outside of your alley, remember that you may be deep inside your bison's flight zone. Be careful to only apply light pressure to your bison's flight zone. Be patient, and let your bison move away from you. You will need to watch your bison carefully to know when you have entered their flight zone. And remember that the flight zone of one animal may be smaller or larger than the previous animal. Do not enter their flight zone if your bison cannot move to escape your pressure. Also remember that the flight zone can change quickly if new threats, such as yelling and quick movements are added to the situation. When working the flight zone, always start with the minimum amount of noise and motion. Learn more about the Flight Zone.
- Cattle are often worked from an elevated catwalk. Bison see handlers standing over them as a major threat. This should be avoided (If you do work your bison from a catwalk make sure your bison have a choice to move themselves to a non threatening location).
As long as you give your bison some control, your bison are more likely to remain calm. If however you apply too much pressure, your bison can quickly switch from thinking about how to minimize their stress to thinking about how to survive. Bison who are concerned for there survival can be very dangerous and unpredictable.
Bison handlers need to be highly aware of how each individual bison reacts to the handlers presence. Handlers should also be aware that when they stress one animal. it usually results in the stress levels of their herd mates also going up. The lesson is, if you try and rush one animal, you are likely to have a very long day. And because bison have good memories, they will likely be uncooperative the next time you handle them too.
As a bison handler, you should be aware of what your bison can see when they are in your handling system. If you find your bison are stalling or hesitating in your system it is quite possible that they see, hear or smell something that is potentially threatening to them. Perhaps there is someone operating a gate further up the alley that they can see. All you may have to do to remove the threat is cover the opening so the bison can’t see the operator.
If you want a better experience next time you handle your bison, pay attention to your bison. If they hesitate, figure out why, and make adjustments.
Bison do not behave the same as cattle. These behavioral differences should be considered when planning your bison corrals and bison handling system. Ignoring these differences may result in significant losses through injuries and potentially death.
Know the signs of bison stress
Lastly, handlers should be aware of the signs that your bison are stressed. Careful observation will help you to interpret where you might have problems in your facilities or in your handling methods. These signs might include early stress indicators such as:
- frequent blinking
- lifting the tail
- grouping together, huddling.
As the stress levels increase you may see:
- frothing at the mouth
- labored breathing or panting
- your bison may also become either more active, which could include running, attempting to escape or goring, or they may become less active and sit down, lie down or become non-responsive or immobile
Bison that have elevated stress levels may incur injuries or even die. Recognizing the early signs will help you to take action before your animals are harmed. If you have an animal that is showing signs of stress, try to understand what the origin of the stress is and remove it. If you cannot remove the stress agent, try to calmly move your bison to a low, or no stress environment.
Here are some bison behavior and bison handling links:
- Bison Producers of Alberta – Bison Centre
- The Calming of American Bison During Routine Handling
- British Columbia Bison Association – Introduction to Bison Handling
Beware of changes to their environment
Any time you attempt to move bison from one handling environment to another environment, your bison will make a decision on whether or not it is safe to proceed. If you introduce too many changes to their environment at any time, they will likely hesitate and potentially refuse to move forward. One of the key design considerations when moving livestock from the open pasture to the control of the squeeze chute is how to gradually introduce changes in the bison handling environment so as not to stop forward movement.
Hi-Hog’s alley components are designed to work together to slowly transition from the pasture to your squeeze. Select a link below to learn how each of the components contribute to the handling process:
For inspiration, Hi-Hog also offers a range of sample bison handling systems and bison corrals. If you have any questions, or you would like Hi-Hog’s design assistance to modify one of these plans, simply contact our sales office during business hours and one of our design staff will assist you with your design. This is a FREE service.
If you’re calling from within mainland North America you can reach us toll free at 1-800-661-7002 (Monday to Friday 8:00 am to 4:30 pm MST). | <urn:uuid:95dbd2a7-94d6-4397-b91c-6ee954504527> | CC-MAIN-2022-33 | https://www.hi-hog.com/resources/livestock-behavior/introduction-to-bison-behavior/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00205.warc.gz | en | 0.954119 | 2,726 | 2.75 | 3 |
Vishing is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone.
While that makes it sound like an old-fashioned scam, vishing attacks have high-tech elements: they involve automated voice simulation technology, for instance, or the scammer may use personal information about the victim harvested from earlier cyberattacks to put them at ease.
No matter what technology is used, the setup for the attack follows a familiar social engineering script: An attacker creates a scenario to prey on human emotions, commonly greed or fear, and convinces the victim to disclose sensitive information, like credit card numbers or passwords.
In that sense, vishing techniques mirror the phishing scams that have been around since the 1990s. But vishing calls exploit the fact that we're more likely to trust a human voice — and may target the elderly and technophobic who are naive and have no experience with these types of scams.
These notable numbers offer a sense of the state of vishing and why it can be a lucrative business for attackers.
- Vishing attacks have been on the rise over the past few years. In 2018, scam calls represented nearly 30 per cent of all incoming mobile calls
- So it shouldn't come as a surprise that this weird term is starting to be more widely recognised. Proofpoint's 2020 State of the Phish report found that 25 per cent of workers in their worldwide survey could correctly define the term
- 75 per cent of scam victims report that vishers already had some personal information about them, which they used to target them and get yet more information
- Of people who report government imposter vishing scams to the FTC, only six per cent had actually lost money — but those who did lost quite a bit, with the median loss being $960
Vishing vs. phishing vs. smishing: What's the difference?
Phishing is the granddaddy of them all, and CSO has a complete explainer with all the details, but in essence it involves sending targeted email messages to trick recipients. "Phish" is pronounced just like it's spelled, which is to say like the word "fish" — the analogy is of an angler throwing a baited hook out there (the phishing email) and hoping you bite.
The term arose in the mid-1990s among hackers aiming to trick AOL users into giving up their login information. The "ph" is part of a tradition of whimsical hacker spelling, and was probably influenced by the term "phreaking," short for "phone phreaking," an early form of hacking that involved playing sound tones into telephone handsets to get free phone calls.
Vishing is, essentially, phishing via phone calls. Just as phishing is considered a subset of spam, so vishing is an outgrowth of VoIP spam, also known as spam over telephony, or SPIT. The term "vishing" itself has been around since the late '00s.
"Smishing" is a similar type of attack that uses text messages instead of emails or voice calls; the word is a portmanteau of "SMS" and "phishing." For more on smishing, check out our explainer on the subject.
Almost all vishing attacks have a few things in common. The phone calls are initially placed via voice over IP (VoIP) services, which makes them easier for the vishers to automate some or all of the process and more difficult for victims or law enforcement to trace.
And the attackers' ultimate goal is to profit from you in some way — either by harvesting bank account information or other personal details they can use to access your bank accounts, or by tricking you into paying them directly.
But within the universe of vishing scams, there are a wide range of techniques and strategies. They run the gamut from largely automated "shotgun" attacks targeting many potential victims in hopes of a few bites to laser-focused scams that take aim at a specific high-value target.
Perhaps the most widespread form of vishing begins with so-called "wardialing" — that is, hundreds or thousands of automated calls to hundreds or thousands of numbers. The potential victim (or their voicemail) will get a recording meant to scare or trick them into initiating a phone call themselves back to the scammers.
Often the vishers will claim to be from the IRS or some other government agency, or from a bank or credit union. The wardialing my focus on a specific area code and use a local institution's name in hope of finding actual customers.
A variation on this technique involves using popup windows on your computer, often planted by malware, to simulate a warning from your OS about some technical problem.
The victim is told they need to call "Microsoft Support" or something similar and given a phone number. This puts them on the line with the visher, who may end up using a combination of real and automated voice responses during your conversation — again, the goal here is to get the most return out of little effort.
In those sorts of shotgun attacks, the vishers generally know next to nothing about you and will need to bluff their way into getting you to think they who they say they are; because of this, they can be relatively easily spotted.
Much more troubling, however, are vishers who are reaching out to you specifically. This technique is known as "spear vishing"; like spear phishing, it requires the attackers to already have some data about their target. For instance, a spear visher may already know your home address and who you bank with before calling you, making it easier for them to trick you into telling them your PIN.
But how do they already know so much about you? "Much of this data comes from the dark web, which often originates from data breaches," says Paige Schaffer, CEO of Global Identity and Cyber Protection services for Generali Global Assistance (GGA).
So when you read about big data breaches, know that they can help make vishing a lot easier. It may seem strange that an attacker who already has your personal information is eager get more, but as Schaffer points out, "the more information a scammer has, the more damage they can do. Why be satisfied with the last four SSN digits when they can potentially get you to hand over the other five? A full SSN allows for them to open fraudulent credit cards, loans, and more."
If this all sounds like a lot more work than wardialing someone and telling them you're from the IRS, you're right. But most people — especially high-value targets, who are often more educated and cyber savvy — will see right through those simpler scams. If the reward is great enough, it may be worth the time to build up a convincing identity to shake information loose from the victim.
"A hacker might have patiently worked on acquiring information over time from the victim via phishing emails, or capturing it through malware," says Schaffer. "When spear vishers go after bigger 'fish' (so to speak) like CEOs, we call that 'whaling.'"
And as voice simulation techniques improve, whalers have even more tools in their arsenal, with the capability of imitating specific people to try to trick their victims.
So far, we've been kind of vague about the specific cons vishers will pull in order to get your money or personal information. HashedOut breaks these down into four broad categories:
Telemarketing fraud: These types of scams honestly predate the vishing era but have adopted many of their techniques.
The visher will cold-call you without really any background knowledge on who you are and make an offer that's too good to be true: you've won some lottery you never entered, you've been offered a free Marriott vacation, you can reduce the interest on your credit card, etc. Usually there's an upfront cost to getting your "free" money, and of course the bait you were promised never arrives.
Government impersonations: A common scam involves insinuating that a problem is blocking benefits the victim should be receiving, such as Medicare or Social Security payments; offering to "fix" the issue opens to door to coaxing the victim into handing over personal information, like Social Security or bank account numbers.
A more aggressive version of this comes from fake IRS "investigators," who often claim the victims owe back taxes and threaten them with fines or jail. This video shows a police officer interacting with one of these scammers.
It's not unusual for these types of scammers to demand to be paid by the victim buying Amazon gift cards and then reading them the numbers off the back, since the card purchases can't be traced. This is a good tip-off that you're are not dealing with a government agency!
Tech support fraud: We discussed this a bit above — scammers can take advantage of the technologically naive and their worries about being hacked, using popup ads or malware masquerading as a warning from the operating system to trick victims into calling the vishers.
Kaspersky warns of a variant on this scam that's basically a type of ransomware: malware locks up a PC but provides a "tech support" number, where a kind "technician" — really part of the gang that installed the malware in the first place — will fix your computer, for a price, leaving you thinking that they've actually helped you.
Vishing attacks on bank accounts: Getting access to your bank information is, of course, the holy grail of a visher. And if an attacker already has access to some of your personal data from another source as we discussed earlier, they can easily emulate the sort of legitimate calls that one would expect to get from their financial institution, in a way that can fool even the most savvy amongst us.
Panic Inc. founder Caleb Sasser told Krebs on Security a harrowing tale of a near-successful vishing attack. The attacker managed to successfully spoof their phone number to match Wells Fargo's, Sasser's bank, and claimed to be following up on some potentially fraudulent charges.
Since the "bank" was offering to send a new ATM card, Sasser almost went so far as to enter a new PIN into his phone before pulling back at the last minute; had he done so, the vishers would've been able to clone his card and use it freely.
These types of scammers are most likely to go whaling, looking for very high value targets to help them get rich quick. One variant has become known as the "Friday afternoon scam," in which the vishers call an investment firm or other wealthy target at the very end of the work week, counting on the person answering the phone being tired and distracted and letting their guard down. | <urn:uuid:7cddc0ab-a0d5-4d9b-9131-9d8eb1e58549> | CC-MAIN-2022-33 | https://www.channelasia.tech/article/679805/vishing-explained-how-voice-phishing-attacks-scam-victims/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00004.warc.gz | en | 0.961633 | 2,237 | 2.84375 | 3 |
A crisis refers to a low probability of great impact, often viewed by stakeholders in an organization as a danger to the viability of a company. There can be various forms of crises, such as technological disaster, economic crises, natural disaster (meteor showers and earthquakes) and firm-level crises. Thus, a crisis does not only refer to the event that occurs but also the situation or position in which a company finds itself thereafter. The aftermath could be as endangering to an organization and its components as the cause. If a crisis is not addressed appropriately, it will jeopardize the ability of a company to carry out its activities appropriately. An organization develops its capacity to capitalize on the pre-crisis performance while in its normal status of tasks. The organization is in a position to utilize these abilities to their maximum level in handling the aftermath of a crisis. However, this can only happen if a thoughtful and proactive reaction strategy is in place during the crucial period. In today’s tumultuous, often disorganized, organisation environment, commercial achievement is based on the maximum utilization of the employees’ talents. Yet despite the innumerable or multiple practices and theories which are available, managers often perceive motivation as a mystery issue. This is because people are motivated by various things and in diverse manner. Moreover, during crisis period, the flattening of hierarchies and delaying can lower staff morale and create insecurity. An appropriate motivation practice and philosophy ought to develop quality, productivity and service. In addition, motivation assists individuals in accomplishing their goals, gaining a positive perspective, creating to power to alter, building self-esteem and ability and managing their own growth and development (Vitale Para. 2-6). This essay will examine the motivational techniques used by managers in times of crisis.
Concepts of motivational techniques
There are periods in all companies when the extrinsic surrounding machinates against their achievements. Wider political and economic factors might have counteracted the business pattern or rivals might have beaten the company in the market with a new commodity. In addition, the inner surroundings might have caused difficulties. The hierarchical structure in an organisation might be cumbrous and slow in making decision or the board might be caught up in confusion about the future direction of the organisation. Attempting to keep individuals’ spirits up at the time of crisis is extremely hard, though it is a problem which most managers well experience as they run their businesses (Shrivastava p. 67).
Currently, the economy is creating tough or trying times to employers and employees alike. From job layoffs, mortgage meltdown and credit crisis to the competitive supply market roller coaster, people are faced with stresses of varying levels. Therefore, the capability to manage these stresses in the workplace creates the difference between failure and success. Managers should be good in managing their own stresses in order to motivate others during such times of a crisis. Motivation is the driving force for the eagerness of the employees to perform their duties without pressure. Motivating can be defined as the act of providing workers with a motive to carry out their duties. Motivation has been implemented by successful managers to provoke ordinary individuals to accomplish extraordinary results in all areas of enterprises (Shrivastava p. 69).
Good workers who remain faithful and committed to hard work are important for the success of an organization through tough times. During such times, companies restructure departments, freeze hiring plans, limit growth chances and worst of all, and reduce headcount. There is nothing in such a company at such a time that can make the employees who remain to feel comfortable or happy being there every day. On the contrary, individuals get disorganized, miserable and become distrustful of the company’s management. Therefore, in order to boost the morale of the employees who have remained, managers need to implement appropriate techniques that will motivate the employees.
There are various motivational theories which can be implemented by managers to motivate other during the time of crisis. Abraham Maslow’s Hierarchy of Needs is one of the motivational theories that focuses on human requirements and proposes that there are several degrees on the requirements that have to be fulfilled in strict satisfaction. When one requirement is fulfilled, the force to fulfil it is bewildering, and the subsequently degree become the motivating drive. The theory states that individuals live and exist via financial recompense; to create new friendships, to have job safety, to feel significant in the community and have a sense of recognition and achievement, and above all to have job contentment. All workers who have job contentment are better performers in their jobs (Lerbinger p. 32).
The five levels of the theory are as follows; at level I, people require comfort, water and food. These are the basic or psychological needs which drive continuation and should be fulfilled prior to the subsequent goal or level kicks in. Level II concentrates on security and safety. It recommends that once the psychological needs of the individuals are satisfied, they seek for extra regularity and stability. This helps people to lay down their roots and resolve into a more comfy life. Level III satisfies social requirements, and then starts to drive the activities of an individual. At this level, individuals search for relationship and a belonging sense. Social circles come up and individuals select to join a company of people who they share similar beliefs and values, and who they are comfortable with and happy to be identified with. Level IV starts to encourage people once they have positioned themselves within a social group. At this level, the desire for identification and self-respect evolves. Individuals at this level on the hierarchy begin to define themselves differently from others in their close social circles. In addition, they desire to be acknowledged for their unique contributions to the social surrounding. The final level is level V, which brings in the concept of self-actualization. This point is defined as self-actualizing since it is a process of ongoing life where the manifestation of the full potential of an individual is the driving power. This is the point where people seek to be whatever they can be and achieve what they observe to be their life purpose (Halepota pp. 14-18).
From an organisational perspective, the ‘Maslow’s Hierarchy of needs theory’, level I is equivalent to the mangers offering a comfortable place, salary and lunchroom to the employees. Level II consist of the benefits of employment or job like a pension, health insurance and a bonus. In case these factors are not provided, individuals will not be faithful to the company and will search for another position or place where they will access or feel adequate security to implement some professional ideas or services. In addition, level III proposes a community of individuals who share similar beliefs and values, and are carrying out their duties and responsibilities in order to achieve ultimate goals. Thus, doctors, nutritionists, accountants and other specialists bring together individuals who have similar desires to fulfil level III needs. Moreover, level IV drives individual achievement and definition while level V enables the manifestation of life purpose and personal truth. Hence, it is clear that if the psychological needs are satisfied, challenging and hard times could actually encourage and motivate someone to be more productive.
There are several companies and individuals who have gone through tough times regarding the running of their business. For instance, Jeff Immelt, a General Electric CEO, advised his 175 managers on the need to motivate employees in the face of a crisis. With the money market in havoc and the economy declining, the common practice is to go back into the trap, though that is the rhetorical device of leadership. Jeff recognized that there was the need for change within the company, although that did not indicate that the company’s growth was to be put on back burner (Prokesch para. 3). In addition, Jeff identified that after 9/11, the commercial aviation was a crisis and as a result GE plowed ahead. Challenges were encountered in the aircraft leasing and jet engines; however, the company persisted to invest in modern commodities and client association. Eventually, the company’s market share developed which could assist the company when the downturn goes (Prokesch para 5). According to Jeff, the other important reason for investing was to keep workers encouraged and motivated. Sometimes when one feel desperate, working o such investments offers individuals a hope that they could secure a safe and permanent, comfortable future for themselves and the organization (Prokesch para 6-7).
Analyzing business needs and requirements
Business needs and requirement analysis consists of activities which measure the conditions to achieve changed or new commodity, taking into account the possible conflicting needs of the different stakeholders like users or beneficiaries. This is significant to the achievement of an advancement project. Needs should be testable, actionable, measurable and associated with recognized business chances or needs and described to a degree of detail adequate for system design. Basically, requirements or needs analysis consist of three forms of activity; eliciting requirement, analyzing requirements or needs and recording requirements. Eliciting requirements refers to the activity of communicating with users and clients in order to measure what their needs are. Analyzing requirements refers to the task of measuring whether the indicated needs are contradictory, incomplete, unclear or ambiguous and then taking the necessary measures of resolving these issues. Finally, recording requirements includes where needs are documented in different ways like process specifications, natural-language documents, user stories or use cases (Adair p. 44-47).
Requirements or needs analysis of a business could be a laborious and long procedure during which several tantalizing psychological skills are included. New systems alter the surrounding and association between individuals, thus, it is essential to recognize all the stakeholders, understand all their requirements and make sure they comprehend the consequences of the modern systems. While analyzing the needs and requirements of a business, one can use different forms of methods in order to gather appropriate information. These methods include holding interviews with the employees, conducting focus group discussions with eth employees and constructing needs lists. More modern and innovative methods include use of cases and prototyping. Where necessary, managers or analyst can use a combination of the above techniques to obtain the correct requirement s or needs of the stakeholders in order that a system, which achieve the needs of the business is established or generated (Adair p. 54).
Solutions during crisis times
Managers have a significant responsibility to participate in during uncertain times. The manner in which the managers handle their workers today will continue to reverberate in future. In periods of crisis, communication is significant. Thus, in leading and managing the employees in crisis times, managers should do the following. First of all, they should aim at anxiety and fears. During crises situations, employees are under a period of emotional turmoil, starting with the fear of their inability to pay bills, followed by their job safety and issues of compensation. Therefore, managers must prepare to deal with every concern affecting the employees since when job layoffs are announced, they exacerbate anxiety and fear (Venette p. 142-147).
Secondly, managers should accept that productivity and performance will decrease. This is because individuals react differently during crisis circumstances. The manager should anticipate observing individuals having hard time in concentrating, exhibiting hunger, exhibiting heightened absenteeism and being forgetful. Hence, in such a time, individuals are supposed to talk more and as a result, the company will be healthy. Similarly, the manager should maintain communication open. During uncertainty and periods of crisis, the managers should meet will all employees at all levels in order for them to express their concern, promote available materials and services (Hertzberg p. 37).
Managers, supervisors and human resource ought to be equipped with the authority, information and resources so as to help employees. Training must include the way to recognize and assisting the employees on how they can deal with stress and other issues which are associated with financial distress. Based of the Maslow’s hierarchy of requirements or needs, a motivating or encouraging surrounding is the outcome of developing the needs, satisfying different requirements and anticipations of the employees rather than the capacity of the materials. In addition, self-directed and initiative learning should be promoted among the workers where they can share their concerns among themselves. Similarly, during training in times of crisis, self-actualization ought to be the primary objective and the information ought to center on self-advancement or self-development (Blanchard and Marc p. 76).
Moreover, one needs to recognize the most susceptible and asked questions in order to understand how employees are doing both at and at work. Managers should be confident, calm and reassuring management or leadership style during times of crisis. They should not undervalue the significance of their personal leadership style. Thus, showing a confident and calm leadership style could help in sustaining productivity and stability. They can achieve this by trying to compartmentalize their personal concerns and fears. Correspondingly, managers should not make assumptions regarding the way individuals feel and the manner in which they have been affected by the crisis. In addition, people differ in the way they exhibit their emotions or feelings Therefore, managers should permit employees to manifest their emotions and feelings correctly. A crisis can result into worst of best of individuals. Managers need to restrict negative behaviour such as theft, by ensuring the performance management procedure deals with performance matters which result from financial crisis. The success of an organization or any business is based on the individuals who work there. Just like a terrorist act, a financial crisis leads to psychological destruction by robbing people of the power to manage their lives. Thus, managers should ensure they render control back to individuals (Seeger, Sellnow and Ulmer pp 231-245).
The nature of the workplace has continued to change due to the dynamics of the global economy, coupled with technological developments and more dissimilar labour force. Therefore, according to the Maslow’s humanistic perspective, organisational leadership can motivate their employees to study through the following ways which are solutions to different challenges and problems faced by different organisations. Firstly, companies which have workers who are encouraged to study include the entire team of employees in a procedure of cooperatively pioneered, jointly answerable, cooperatively organized alteration engineered toward shared principles or values. Thus, the responsibility of the leadership or managers is to offer a future vision which workers participate in and possess as a portion of their objectives. Collaboration aids in ensuring that managers and workers are achieving personal objectives via shared organizational objectives or goals. Workers gain intrinsically and personally when the company achieves its objectives (Blanchard and Marc p. 91).
Extrinsic rewards which are narrow such as job security, salary, manager-employee relationship and work environment; which managers have depended upon in the earlier period is inadequate for the current employees. The younger, knowledgeable employees need more than that. Organizations with several choices of honouring and acknowledging success, choices for associating pay with a person and team performance and requirements, and financing learning encourage continuous learning. In addition, work experiment and redesign with self-managed groups might provoke the motivation to study by making the job challenging. Empowerment and worker participation are important to alter the structures which hinder learning. More cooperative structures encourage the ability of the organization to learn (Blanchard and Don p. 85)..
During times of crises, managers should take greater care while developing learning opportunities which will draw workers and maximize upon their requirements for social participation, self-actualization and self-esteem. Managers can accomplish this by communicating the significance of training, allocating enough period for learning, offering training on time, involving workers in designing the training guide, centred on important competencies, providing financial assistance to learn, developing an environment that is conducive for training and identifying positive improvements. Moreover, during learning period, managers should assist the employees to link their studying with the fulfilment of their requirements (Blanchard and Don p. 87).
During times of crises, managers have to implement appropriate techniques that will motivate the employees. In the process of motivating the employees, the managers should understand what the employees are going through, their fears and concerns. Thus, managers in such times need to be skilled and knowledgeable concerning each employee. In addition, the managers ought to recognize and acknowledge and contributions or improvements whether of an individual or team. They should inquire for information and feedback because when employees feel and believe that they are valued and their opinions are acknowledged, their morale will rise and the productivity increase. Managers can use several motivational theories such as Maslow’s hierarchy of needs which states that individuals live and exist via financial recompense; to create new friendships, to have job safety, to feel significant in the community and have a sense of recognition and achievement, and above all to have job contentment. All workers who have job contentment are better performers in their jobs. Therefore, when managers use the appropriate techniques to motivate their employees, it will be easy for organizations to grow and thrive despite the difficulty times.
Adair, John. Leadership and Motivation. The Fifty-fifty Rule and the Eight Key Principles of Motivating Others, 2007.
Blanchard, Kenneth, and Don, Shula. Motivating People to Be Winners. Little Book of Coaching, HarperCollins, 2001.
Blanchard, Kenneth, and Marc, Muchnick. The Leadership Pill: The Missing Ingredient in Motivating People Today. Pocket Books, 2004.
Halepota, Harlington. Motivational theories and their application in construction. Cost Engineering, 47.3 (2005): 14-18.
Hertzberg, Frederick. One More Time, How Do You Motivate Employees? Harvard Business Review. 2007.
Lerbinger, Orlyghen. The crisis manager: Facing risk and responsibility. Mahwah, NJ: Erlbaum, 1997.
Prokesch, Steve. Crisis Advice from GE’s Immelt: Stay Committed to Growth. 2008.
Seeger, Wilson, Sellnow, Tlyned and Ulmer, Richard. Communication, organization and crisis. Communication journal, 21 (1998): 231–275.
Shrivastava, Pyrus. Bhopal: Anatomy of a Crisis. Ballinger Publishing Company. 1987.
Venette, James. Risk communication in a High Reliability Organization: APHIS PPQ’s inclusion of risk in decision making. Ann Arbor, MI: UMI Proquest Information and Learning, 2003.
Vitale, Paul. Motivating Ourselves and Others During Uncertain Times. 2009. Web. | <urn:uuid:1b284b79-a688-4577-be55-d909119b8094> | CC-MAIN-2022-33 | https://business-essay.com/motivational-techniques-used-by-managers-in-crisis/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00203.warc.gz | en | 0.955876 | 3,768 | 2.828125 | 3 |
You've undoubtedly come across phrases like layer one and layer two protocols if you've looked into cryptocurrencies or blockchain. Are you interested in learning more about these levels and why they exist? In this post, we'll look at the later architecture of the blockchain. Blockchain technology is a one-of-a-kind combination of various contemporary technologies, such as cryptography and game theory, with a wide range of applications, including cryptocurrencies. Cryptography is a mathematical and computer discipline that entails encoding and decoding data.
By offering transparency and security, blockchain removes intermediaries, decreases costs, and enhances efficiency. Distributed ledger technology (DLT) preserves information verified by cryptography among a group of users who agreed through a specified network protocol without the control of a central authority. By combining these technologies, persons or parties who would normally have no reason to trust each other are encouraged to do so. They enable blockchain networks to safely exchange currency and data between users. Blockchains must be very secure because of the lack of a centralized authority. They must also be incredibly scalable in order to cope with growing numbers of users, transactions, and other data. It created layers in response to the need for scalability while maintaining top-notch security.
In blockchain technology, the term "scaling" refers to increasing the system throughput rate, which is measured in transactions per second. Blockchain layers are now necessary to increase network security, record keeping, and other tasks, as cryptocurrencies become more widely adopted in everyday life. "Throughput" refers to the number of transactions handled by a system per second. While Visa's Visa Net electronic payment network can manage over 20,000 transactions per second, the primary chain of Bitcoin (BTC) can only handle seven transactions per second. A decentralized ecosystem's initial layer is the blockchain.
Layer two is a third-party integration that works in tandem with layer one to increase the number of nodes and hence the system throughput. Many layer two blockchain technologies are being used right now. These systems employ smart contracts to automate transactions. As Bitcoin becomes a more major force in the business sector, blockchain developers are striving to widen blockchain administration. By creating blockchain layers and enhancing layer two scalability, they intend to cut processing times and improve TPS.
The blockchain trilemma refers to the widely held belief that decentralized networks can only deliver two of the three benefits in terms of decentralization, security, and scalability. In the 1980s, computer scientists came up with the consistency, availability, and partition tolerance (CAP) theorem to represent one of the most critical of these issues. According to the CAP theorem, decentralized data storage, such as blockchain, can only provide two of the three guarantees described above at the same time. In today's distributed networks, this theorem has evolved into the blockchain trilemma.
According to popular belief, public blockchain infrastructure must forego security, decentralization, or scalability. As a result, creating a network with unbreakable security across a globally decentralized network while still supporting internet-scale transactional throughput is the holy grail of blockchain technology. Let's define scalability, security, and decentralization in basic terms before digging into the trilemma's dynamics:
1. The blockchain's scalability refers to its ability to handle a higher volume of transactions.
2. Security refers to the ability to secure data on the blockchain from various types of assaults and the blockchain's defense against double-spending.
3. Decentralization is a type of network redundancy that ensures that fewer entities do not control the network.
The network must first agree on the transaction's legitimacy before they can settle it. If the system has a big number of participants, agreeing may take some time. As a result, we can prove that when security parameters are similar, scalability is inversely proportional to decentralization. Assume that two proof-of-work blockchains have the same decentralization and that security is the hash rate of the blockchain. As the hash rate increases, the confirmation time lowers, and scalability increases as security improves. As a result, continual decentralization correlates with scalability and security. As a result, a blockchain cannot concurrently optimize for all three essential properties, requiring it to make trade-offs. The most recent illustration of the trilemma in action is Ethereum.
Because of the emergence of decentralized finance (DeFi) apps this summer, the Ethereum platform has experienced a surge in usage. Ethereum can only increase in value up to a certain point. Transaction costs have escalated because of the increasing demand, to where some users cannot use the blockchain. Increased Ethereum fees showed the trilemma, since we can see that Ethereum did not expand without losing security or decentralization. Ethereum's focus was on decentralization and security, with a restriction on the number of transactions per second (scalability).
Users pay greater fees to encourage miners to prioritize their transactions. In Bitcoin, decentralization and security have been prioritized over scalability. It's no secret that blockchains like Bitcoin and Ethereum are currently constrained in terms of scalability. As a result, a worldwide community of start-ups, companies, and engineers works feverishly on layer one and layer two solutions to overcome the trilemma of blockchain.
They built layer one blockchain networks to be fast, secure, and expandable. Layer two refers to technical advancements and solutions that may scale current blockchain networks. Getting the right mix between the two levels might be a game-changer for blockchain acceptance and decentralized network expansion. Developers are attacking the problem from several angles. Bitcoin Cash block size was an attempt to improve Bitcoin's scalability. However, there is no sign that it is gaining popularity.
By adding a layer to the current blockchain layer, Bitcoin hopes to solve the problem. According to the notion behind scaling solutions, layer two solutions will bundle several transactions together and only query the base layer blockchain once in a while. With sharding scaling the base layer blockchain and the community, expecting various layer two solutions to enhance throughout Ethereum is pursuing a hybrid approach.
Each network participant monitors, approves, and updates new entries on the blockchain architecture's distributed network. The structure of blockchain technology is a collection of blocks with transactions in a pre-defined order. It may store these lists as a basic database or a flat file (in txt format). The architecture of a blockchain might be public, private, or consortium-based. Blockchain's layered design is divided into six tiers.
The blockchain's content is stored on a server in a data center somewhere on this lovely globe. Clients request content or data from application servers while browsing the web or using any apps, which is known as the client-server architecture.Clients can now connect with peer clients and share data. A peer-to-peer (P2P) network is a large group of computers that share data. Blockchain is a peer-to-peer network of computers that computers, validates, and records transactions in an orderly manner in a shared ledger. As a result, a distributed database is created, storing all data, transactions, and other pertinent data. A node is a computer in a P2P network.
It described the data structure of a blockchain as a linked list of blocks in which they arrange transactions. The blockchain's data structure comprises two basic components: pointers, and a linked list. A linked list is a collection of linked blocks that include data and links to preceding blocks. A linked list is a list of chained blocks with data and pointers to the preceding block, and pointers are variables that refer to the location of another variable.
The Merkle tree is a hash binary tree. Each block includes the Merkle tree's root hash and information such as the hash of the previous block, date, nonce, block version number, and current difficulty target. A Merkle tree offers security, integrity, and irrefutability for blockchain systems. Merkle trees, cryptography, and consensus algorithms form the foundation of the blockchain system. The genesis block, or first block, does not include the reference because it is the first in the chain. They digitally signed transactions to ensure the security and integrity of the data in blockchain. To sign transactions, a private key is utilized, and anybody holding the public key may verify the signer.
The digital signature detects information manipulation. Because the data that is encrypted is also signed, digital signatures ensure unity. As a result, any manipulation will render the signature invalid.The data cannot be discovered because it is encrypted. It cannot be tampered with again, even if they caught it. A digital signature also protected the sender's or owner's identity. As a result, a signature is legally linked to its owner and cannot be disregarded.
The network layer, which is also known as the P2P layer, handles inter-node communication. The network layer is in charge of discovery, transactions, and block propagation. We also known this layer as the propagation layer. This P2P layer guarantees nodes can discover each other and interact, disseminate, and synchronize in order to maintain the blockchain network's integrity. A peer-to-peer (P2P) network is a computer network in which nodes are spread and share the network's workload in order to accomplish a shared goal. Nodes carry transactions on the blockchain out.
For blockchain systems to exist, the consensus layer is required. Whether it's Ethereum, Hyper-ledger, or another blockchain, the consensus layer is the most important and crucial layer. The consensus layer is in responsible for verifying, ordering, and ensuring that everyone agrees.
The application layer includes smart contracts, chaincode, and decentralized apps (DApps). The application and execution layers are differentiated from the application layer protocols. End-user apps that interface with the blockchain network are part of the application layer. It includes scripts, application programming interfaces (APIs), user interfaces, and frameworks. These apps interface with the blockchain network via APIs, which acts as the backend technology. The execution layer includes smart contracts, underlying rules, and chaincode. A transaction is verified and performed at the semantic layer, even though it goes from the application layer to the execution layer. The execution layer, which performs transactions and preserves the blockchain's deterministic nature, receives instructions from applications.
Layer zero of the blockchain is made up of components that help make blockchain a reality. It's the software that makes Bitcoin, Ethereum, and other blockchain networks work. The internet, hardware, and connections that enable layer one to work properly are all layer 0 components.
This is the foundation layer, and its immutability ensures its security. When individuals mention Ethereum, they're referring to the Ethereum network, or layer one. Consensus methods, programming languages, block time, dispute resolution, and the rules and parameters that keep a blockchain network running are all handled by this layer. The implementation layer is another name for it. A layer one blockchain, such as Bitcoin, is one example.
When used together, these scaling techniques increase network throughput. Layer one, however, looks to be falling short as the number of blockchain users grows. On the layer one blockchain, the old and cumbersome proof-of-work consensus procedure is still in use. While this method is more secure than others, it is time-consuming. Miners must use processing resources to solve cryptographic algorithms. As a result, in the long term, more processing power and time are required. In addition, as the number of users has grown, the strain on layer one blockchain has increased. As a result, processing rates and capacities have slowed.
Ethereum 2.0 will use proof-of-stake as an alternative consensus. This consensus mechanism verifies fresh transaction data blocks based on network participants' staking collateral, resulting in a faster process. Sharding is a solution for the layer one blockchain problem's scalability. Simply said, sharding breaks down validating and authenticating transactions into smaller, more manageable parts. As a result, the workload may be divided over the network to take use of the computational power of more nodes. Multiple transactions can be performed both sequentially and concurrently since the network processes these shards in parallel.
L2 solutions are the overlapping networks that lie on top of the base layer. Layer two is used by protocols to improve scalability by separating some interactions from the base layer. As a result, smart contracts on the principal blockchain protocol only deal with deposits and withdrawals, as well as ensuring that off-chain transactions adhere to the rules. A layer two blockchain, such as Bitcoin's Lightning Network, is one example. So, what's the difference between blockchain layers one and two? A decentralized ecosystem's initial layer is the blockchain. Layer two is a third-party integration that works in tandem with layer one to increase the number of nodes and hence the system throughput. At the moment, many layer two blockchain technologies are being deployed.
Layer two protocols have gained a lot of traction in recent years, and they're proving to be the most effective way to solve scalability problems in PoW networks in particular. The sections below discuss several layer two scaling strategies. Blockchain that is nested On top of one another, a stacked layer two blockchain operates. In a nutshell, layer one defines the parameters, while layer two executes the operations. There might be many blockchain levels on a single main-chain. Consider it a standard business model. Rather than delegating all the work to one person, the manager assigned it to subordinates, who then reported back to management after it completed them.
As a result, the effort of the management is decreased, while scalability is enhanced. For example, the OMG Plasma Project acts as a level two blockchain for Ethereum's level one protocol, making transactions cheaper and quicker. Channels of government A state channel increases total transaction capacity and speed by allowing two-way communication between a blockchain and off-chain transactional channels through a variety of methods. The miner does not need to be involved straight immediately to validate a transaction through a state channel. Instead, it's a network-adjacent resource with a multi-signature or smart contract method to defend it. When a transaction or batch of transactions on a state channel is completed, the "channel's" final "state" and all its inherent transitions are broadcast to the underlying blockchain.
Bitcoin Lightning and Ethereum's Raiden Network are two instances of state channels. State channels offer up some decentralization in exchange for enhanced scalability in the trilemma tradeoff. Sidechains are a type of a transactional chain that runs parallel to the blockchain and is used for large-scale transactions. A utility token is typically used as part of the data transfer mechanism between side and main chains, and sidechains have their own consensus technique that may be changed for speed and scalability. The primary role of the main chain is to offer general security and dispute settlement. Sidechains differ from state channels in a number of ways.
To begin with, sidechain transactions are not private between participants; instead, they are recorded in the ledger and made public. Furthermore, sidechain security breaches have no impact on the mainchain or other sidechains. Building a sidechain from the ground up takes a long time and a lot of effort. Rollups Rollups are layer two blockchain scaling methods that execute transactions outside of the layer one network before uploading the transaction data to the layer two blockchain. Because the data is on the base layer, layer one can keep rollups safe. Rollups benefit users by increasing transaction throughput, allowing for more open participation, and lowering gas costs.
Layer three, or L3, is the name given to the application layer. The L3 projects serve as a user interface while concealing the communication channel's technical elements. As mentioned in the layered structure of the blockchain architecture, L3 apps are what give blockchains their real-world applicability.
The problems with distributed data storage that led to the development of blockchains were handed down to blockchains. The term "blockchain trilemma" was established to aggregate these obstacles and associated issues in order to better understand them. Despite the fact that the term "trilemma" has survived, the blockchain trilemma is only a hypothesis. Based on preliminary evidence, this idea appears to be correct, although it has yet to be proven or rejected. Even though layer one and layer two solutions have had some success, further study is needed.
Scalability is one reason why crypto mainstream acceptance is currently unachievable in the blockchain industry. The impetus to broaden blockchain protocols will increase as the demand for cryptocurrency develops. Because each level of the blockchain has its own set of constraints, the ultimate answer will be to create a system that can overcome the scalability trilemma. Because it serves as the foundation for decentralized systems, layer one is crucial.
Layer two protocols solve the underlying blockchain's scalability difficulties. Unfortunately, most layer three protocols (DApps) presently only run on layer one, ignoring layer two. It's understandable if these systems aren't operating as well as we would want. Layer three apps are critical because they aid in the development of real-world blockchain use cases. In contrast to traditional networks, they will not capture nearly as much value as its core blockchain.
You should also check out the following articles: | <urn:uuid:0f6e5f13-3eaa-4e0c-a19a-6e8c0a0879f3> | CC-MAIN-2022-33 | https://www.caesarvr.com/blog/understanding-the-layers-of-blockchain-technology-for-beginners | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00404.warc.gz | en | 0.929191 | 3,524 | 3.28125 | 3 |
The Intracoastal Waterway (ICW) is a 3,000-mile (4,800 km) inland waterway along the Atlantic and Gulf of Mexico coasts of the United States, running from Boston, Massachusetts, southward along the Atlantic Seaboard and around the southern tip of Florida, then following the Gulf Coast to Brownsville, Texas. Some sections of the waterway consist of natural inlets, saltwater rivers, bays, and sounds, while others are artificial canals. It provides a navigable route along its length without many of the hazards of travel on the open sea. Many species of plants and animals can be seen along the path of the ICW.
Context and early history
The shipping hazards and safe havens of the Atlantic coast have been well known and appreciated since colonial times, and considered of great commercial, communication, and military importance to both the colonial power and the newly established, independent United States. The physical features of the eastern coast were advantageous for intracoastal development, resulting from erosion and deposition of sediment over its geologic history, but also enhanced and redistributed by the action of the Atlantic Ocean currents along it.
Since the coastline represented the national border and commerce of the time was chiefly by water, the fledgling US government established a degree of national control over it. Inland transportation to supply the coasting trade at the time was less known and virtually undeveloped, but when new lands and their favorable river systems were added in 1787, a radically new and free national policy was established for their development and transportation use.
Over time, internal improvements of natural coastal and inland waterways would develop into the Great Loop, which allows for waterborne circumnavigation of the eastern continental United States, using minimal ocean travel, with the Intracoastal Waterway providing its eastern end.
The improvement of the country's natural transportation routes was a major concern for all geographic regions and from a national perspective of building and binding the nation. These improvements were also a source of political division about where and how improvements should be developed, who should pay, and who should perform the work.
In 1808, the first federal government report on existing, possible, and likely avenues of transportation improvement was presented; it included much of the distance where the ICW now traverses the Atlantic coast. In 1802, at the request of the Senate, Treasury Secretary Albert Gallatin presented an overall plan for future transportation developments of national importance and scope.
The map of the United States will show that they possess a tide water inland navigation, secure from storms and enemies, and which, from Massachusetts to the southern extremity of Georgia, is principally, if not solely, interrupted by four necks of land. These are the Isthmus of Barnstable, that part of New Jersey which extends from the Raritan to the Delaware, the peninsula between the Delaware and the Chesapeake, and that low and marshy tract which divides the Chesapeake from Albemarle Sound. ...
Should this great work, the expense of which, as will hereafter be shown, is estimated at about three millions of dollars, be accomplished, a sea vessel entering the first canal in the harbor of Boston would, through the bay of Rhode Island, Long Island Sound, and the harbor of New York, reach Brunswick on the Raritan; thence pass through the second canal to Trenton on the Delaware, down that river to Christiana or Newcastle, and through the third canal to Elk River and the Chesapeake, whence, sailing down that bay and up Elizabeth River, it would, through the fourth canal, enter the Albemarle Sound, and by Pamlico, Core, and Bogue sounds, reach Beaufort and Swansborough in North Carolina. From the last-mentioned place, the inland navigation, through Stumpy and Toomer's sounds, is continued until a diminished draught of water, and by cutting two low and narrow necks, not exceeding three miles together, to Cape Fear River, and thence by an open but short and direct run along the coast is reached that chain of islands between which and the main the inland navigation is continued, to St. Marys along the coast of South Carolina and Georgia. It is unnecessary to add any comments on the utility of the work, in peace or war, for the transportation of merchandise or the conveyance of persons.
While Gallatin discussed the details of engineering, construction, and costs, including the national benefits to accrue from lowered transportation costs between domestic and international markets, his full $20 million, 10-year plan was never approved. That is not to say his plan was never implemented, however, for with experience in the War of 1812 shortly thereafter and the attendant British blockade, the continued need for such facility was soon highlighted.
Since Gallatin had based his proposals on the known advantageous natural geographic features of the country, many of his proposals became the locations of navigation improvements that were surveyed, authorized, and constructed starting with the 1824 General Survey Act and the first of many pieces of rivers and harbors legislation, as well by individual state-built improvements.
Since these 1824 acts, the United States Army Corps of Engineers (USACE) has responsibility for navigation waterway improvements and maintenance. All four proposed sections of Gallatin's intracoastal plan were eventually built; the Delaware and Raritan Canal was later abandoned for a better alternative, but the Cape Cod Canal remains in operation, and the Delaware and the Dismal Swamp portions still form part of the larger present-day Intracoastal Waterway.
Starting in 1826, Congress authorized the first survey for an inland canal between the Atlantic Ocean and Gulf of Mexico, and during early developments, the growth of steam power to propel water, land, and sea transportation. Over time, additional portions of other coastal improvements were authorized for development, including the Houston Ship Channel and the Delaware River in 1872. Following the Civil War, developments to the waterway system suffered as government funding moved increasingly from navigation to railroads; over time this resulted in anti-competitive pricing and acquisition practices by railroads over water transportation, but also in insufficient haulage capacity to move the required freight to the coasts. These conditions were investigated, accompanied by considered conclusions and recommendations, as early 1873 by the Report of Windom Select Committee from the Senate's Select Committee on Transportation Routes to the Seaboard, but their plans and recommendations "received less attention than was anticipated, of course by reason of the rapid growth of interest in railways". While some policy corrections were implemented over the ensuing 30 years, continued insufficient capacity of railroad transportation became apparent following the harvest of 1906.
In the River and Harbors Appropriations Acts of 1882 and 1884, Congress signaled its intent to improve waterways to benefit the nation by promoting competition among transportation modes. The 1882 act was the first act of Congress to combine appropriations for development of the nation's waterways with a reaffirmation of the policy of freedom from tolls and other user charges, first stated in 1787; it was passed over President Chester Arthur's veto, who considered it wasteful spending for the government's growing federal surplus. In 1887, the Interstate Commerce Act established federal regulation of railroads; Congress continued to promote freedom from tolls or special taxes on waterways. In 1890, Congress passed the Sherman Antitrust Act, the first federal statute to limit cartels and monopolies, but the federal government used it minimally until Theodore Roosevelt's presidency more than 10 years later.
The invention of the diesel engine in 1892 eventually led to the conversion of fuels for transportation from coal and steam to diesel and the internal combustion engine. This was greatly enhanced by World War I military uses and the beginning of a new age of fuel usage and consumption. The Rivers and Harbors Act of 1909 set national policy for an intracoastal waterway from Boston to the Rio Grande, and the Rivers and Harbors Act of 1910 authorized a 9-by-100-foot (2.7 m × 30.5 m) channel on the Gulf Intracoastal Waterway between the Apalachicola River and St. Andrews Bay, Florida, as well as a study of the most efficient means to move cargo. Between 1910 and 1914, navigation channels were deepened, and the screw propeller proved efficient for improved steering and flanking qualities. Also during this period the Panama Canal Act was passed, in 1911; it proved key to the revival of waterway transportation in the United States, because the opening of Panama Canal in 1914 allowed coastal shipping to extend to the US west coast for the first time. The law also prohibited railroads from owning, controlling, or operating a water carrier through the canal and led to succeeding legislation that eliminated monopoly of transportation modes by railroads. The country's World War I experience demonstrated the need for bulk cargo transportation, with Congress establishing the Federal Barge Lines and spurring development of cheaper ways to transport farm commodities, including the first use of standardized freight barges.
In 1924, Congress incorporated the Inland Waterways Corporation, generally regarded as the beginning of modern water carrier operations, and in 1925 it authorized construction of the Louisiana and Texas Intracoastal Waterway, as well as surveys east of New Orleans to Apalachicola Bay; this was the first legislation to treat the ICW as a continuous whole. The River and Harbor Act of January 21, 1927, passed by Congress, authorized the portion of the Atlantic Intracoastal Waterway, using the route planned out by the Jacksonville District of the Corps of Engineers. In 1936 the continuous 9 ft × 100 ft (2.7 m × 30.5 m) channel was completed between the Apalachicola River and New Orleans. During World War II, the need for efficient transportation of bulk materials within the continental United States was well demonstrated after German submarines sank numerous merchant ships off the East Coast. By 1942, the 9 ft × 100 ft (2.7 m × 30.5 m) ICW channel was completed between New Orleans and Corpus Christi.
Today, federal law provides for the waterway to be maintained at a minimum depth of 12 feet (3.7 m) for most of its length, but inadequate funding has prevented that. Consequently, for larger ships, shoaling or shallow waters are encountered along several sections of the waterway, with these having 7-foot (2.1 m) or 9-foot (2.7 m) minimum depths from earlier improvements. While no tolls are charged for waterway usage, commercial users have been charged a fuel tax since 1978, which is used to maintain and improve facilities. That year, the Inland Waterways Revenue Act imposed a barge fuel tax; originally set at 4 cents per gallon in 1980, it was gradually raised to 10 cents per gallon by 1986. To hold these funds, the act also created the Inland Waterways Trust Fund under the US Treasury, which are used to cover half the cost of new construction and major rehabilitation of the inland waterways infrastructure (33 U.S.C. ch.32). The Water Resources Development Act of 1986 was a wide-ranging bill regarding all water resources utilization nationally. Concerning transportation on waterways, this law established the Inland Waterways Users Board to make recommendations regarding construction and rehabilitation priorities and spending levels for the inland waterways, and also gradually increased the incremental fuel tax to 20 cents per gallon by 1995.
The Intracoastal Waterway runs for most of the length of the Eastern Seaboard, from its unofficial northern terminus at the Manasquan River in New Jersey, where it connects with the Atlantic Ocean at the Manasquan Inlet, then around the Gulf of Mexico to Brownsville, Texas. The official terminus point is the Annisquam River, a U.S. Army Corps maintained channel 26 miles northeast of Boston, Massachusetts, connecting Annisquam and Gloucester, Massachusetts.
The waterway consists of three non-contiguous segments: the Atlantic Intracoastal Waterway (AIWW), extending from Portsmouth, Virginia (milepost 0.0) to Key West, Florida; a section of the Gulf Intracoastal Waterway beginning at Tarpon Springs, Florida, and extending south to Fort Myers; and a second section of the Gulf Intracoastal Waterway extending from Brownsville, Texas, east to Carrabelle, Florida. These segments were intended to be connected via a dredged waterway from St. Marks to Tarpon Springs and the Cross Florida Barge Canal across northern Florida, but these projects were never completed due to environmental concerns. Additional canals and bays extend a navigable waterway to Boston, Massachusetts.
The Intracoastal Waterway has a good deal of commercial activity; barges haul petroleum, petroleum products, foodstuffs, building materials, and manufactured goods. It is also used extensively by recreational boaters. On the east coast, some of the traffic in fall and spring is by snowbirds who regularly move south in winter and north in summer. The waterway is also used when the ocean is too rough for travel. Numerous inlets connect the Atlantic and the Gulf of Mexico with the Intracoastal Waterway.
The Intracoastal Waterway connects to several navigable rivers where shipping traffic can travel to inland ports, including the Mississippi, Alabama, Savannah, James, Susquehanna, Delaware, Hudson, and Connecticut rivers.
Natural bodies of water
The following natural bodies of water are included in the Intracoastal Waterway system: Albemarle Sound, Apalachicola Bay, Aransas Bay, Barnegat Bay, Biscayne Bay, Boca Ciega Bay, Bogue Sound, Buzzards Bay, Cape Cod Bay, Cape Fear River, Casco Bay, Charleston Harbor, Charlotte Harbor, Chesapeake Bay, Choctawhatchee Bay, Connecticut River, Corpus Christi Bay, Delaware Bay, East River, Elizabeth River, Galveston Bay, Halifax River, Hampton Roads, Indian River Lagoon, Laguna Madre, Lake Worth Lagoon, Little River, Long Island Sound, Waccamaw River, Winyah Bay.
- Thomson, Charles; et, al (1787). "An ordinance for the government of the territory of the United States, North-west of the river Ohio". The Library of Congress. Retrieved November 16, 2016.
- Zhulin, Denis Larionov & Alexander. "Preliminary report of the Inland Waterways Commission". www.ebooksread.com. United States. Inland Waterways Commission. Retrieved November 16, 2016.
- Goodrich, Carter (January 1, 1958). "The Gallatin Plan after One Hundred and Fifty Years". Proceedings of the American Philosophical Society. 102 (5): 436–441. JSTOR 985588.
- "Development of US Inland Waterways System". Coosa-Alabama River Improvement Assoc. Archived from the original on March 7, 2016. Retrieved November 16, 2016.
- "Rivers and Harbors Act of 1882". Retrieved November 16, 2016.
- "Jacksonville District, Setting the Pace" (PDF). U.S. Army Corps of Engineers. Archived from the original (PDF) on July 22, 2011. Retrieved August 7, 2010.
- "Trying to impose user fees or tolls on barge operators is uphill battle". Pittsburgh Post-Gazette, 2012-03-21. March 21, 2012. Retrieved May 16, 2012.
- Marston, Red. "The Intracoastal Waterway, From Cape Cod to Texas: Something for All". Retrieved June 14, 2018.
- "Archived copy" (PDF). Archived from the original (PDF) on July 25, 2009. Retrieved December 1, 2009.CS1 maint: archived copy as title (link) "Alperin, Lynn M., History of the Gulf Intracoastal Waterway, pp 48-50, National Waterways Study, U.S. Army Water Resource Support Center, Institute for Water Resources, 1983"
|Wikimedia Commons has media related to Intracoastal Waterway.|
- US Army Corps of Engineers – Atlantic Intracoastal Waterway information site
- History of the Gulf Intracoastal Waterway
- Atlantic Intracoastal Waterway Association
- Gulf Intracoastal Canal Association
- Elizabeth City Area Convention & Visitors Bureau
- Gulf Intracoastal Waterway at Handbook of Texas
- US Army Corps of Engineers – History of the Waterways of the Atlantic Coast of the United States
- TV.com listing for Modern Marvels episode
- Intracoastal Waterway, Encyclopædia Britannica | <urn:uuid:49a94c13-7f28-4efc-a24b-5fd2087a63a7> | CC-MAIN-2022-33 | https://zims-en.kiwix.campusafrica.gos.orange.com/wikipedia_en_all_nopic/A/Intracoastal_Waterway | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00205.warc.gz | en | 0.9423 | 3,507 | 3.359375 | 3 |
Amaravati - The Capital City of Andhra Pradesh
Before Andhra Pradesh got bifurcated and a new state of Telangana was formed, Hyderabad was the capital city of Andhra Pradesh. After it's bifurcation, the state got it's a new proposed capital city - Amaravati. It is a beautiful riverfront city. However, both Andhra Pradesh and Telangana initially share Hyderabad as their capital for a limited period of time but not more than 10 years.
The new riverfront capital city is located in Guntur district on the southernmost banks of the Krishna river. Amaravati covers an area of 217.23 square kilometers within the boundaries of the capital region of Andhra Pradesh.
Amaravati's foundation was laid by the Prime Minister of India Sri Narendra Modi at Uddandarayunipalem village of Guntur district on October 22, 2015. The major suburbs of the new city are Guntur and Vijayawada.
The new name given to the modern city of Amravati is an etymology because it is named after Amaravathi. Amaravathi is a center of Buddhist culture and has vigorously grown from 400 BC to 1100 AD.
Andhra Pradesh, after it's bifurcation, shared its capital with the new state Telangana. As Hyderabad was no longer located within the boundaries of Andhra Pradesh, Amaravati was chosen to be its new capital. However, for a limited time period of fewer than 10 years, Hyderabad became the capital, shared by both the states - Andhra Pradesh and Telangana, under APRA (Andhra Pradesh Reorganisation Act) 2014.
The foundation of the new capital of Andhra Pradesh was laid by the Prime Minister of India - Narendra Modi, Chief Minister of Andhra Pradesh - N. Chandrababu Naidu, Chief Minister of Telangana - Kalvakuntla Chandrashekar Rao, the Singaporean Minister for Trade and Industry, and the Japanese minister for economy trade and industry - Yosuke Takagi at Uddandarayunipalem on October 22, 2015.
The land chose to build and beautify the new capital city Amaravati is located on the banks of one of the main rivers that flow through the state, river Krishna in Guntur district. The area of the land is 217.23 square kilometers i.e., 83.87 square miles. Amaravati would be 24 km i.e., 15 miles north of Guntur district and 12 km i.e., 7.5 miles south-west of Vijayawada city.
Centers of Attraction
Amaravati or Amaravathi is an ancient city. It has its own historical stories to attract anybody's attention. There are some beautiful and fascinating sights to visit in Amaravati like;
The Amaravati Stupa: Also recognized by the name Mahachaitya Stupa is the largest stupa present in India. Tourists interested to know more about Buddhism and gets attracted to the site of this historical place.
Ashokan Pillar: The ruins of the Ashokan Pillars found in Amaravati during the diggings or excavations are to be considered as the first evidence of the Mauryan art in the southern region of India.
Amaravati Museum: Though it is a small museum in the city, impressive as it displays some exhibits from third century BC to twelfth century AD. Statues of Buddha with extraordinary features, Goddess Tara's limestone sculptures, etc. are some of the most fascinating ancient exhibits displayed here.
The Amareswara Temple: Dedicated to Lord Shiva, this temple has a 15 ft. high Shiva Lingam made up of white marble. It is said that earlier, this temple was a Buddhist temple, but later, it was converted into a Hindu temple. The beautiful inscriptions on the walls of the temple show that they have witnessed the lives of various kings who once ruled that place.
Getting There and Around
Air: The closest airport from Amaravati is at Vijayawada.
Rail: There are railway stations at Guntur and Vijayawada, both have connected networks with Amaravati.
Road: One can avail taxis and buses from Vijayawada and Guntur.
Amaravati acts as a pilgrimage center to the Buddhists and the Hindus. There are many ancient temples which tell their own specific story about the ancient era. Many kings used to rule Andhra Pradesh, so the cities here provide information about their rule, their life, etc. The walls of the temples, the ruins of historical monuments, and the exhibits in the museums of Amaravati are those evidence which takes us to ancient India. The Amareswara temple, the Amaralingeswara temple, the Dhyana Buddha statue, and other historical places have a mesmerizing effect.
People speak Telugu! Saree in women, whereas Lungi and Uttariyam in men are worn as an article of ordinary traditional clothing by the people of Amaravati.
Mahashivaratri and Navaratri are celebrated as the main Hindu festival here. A famous Buddhist ritual, the 30th Kalachakra festival, was held at Amaravati in the initial weak of the month of January in 2006.
Amaravati is also called "Hills of Lamps" and "Abode of God," meaning 'the place where God lives.'
Best Time to Visit
The weather here is normally warm to hot. It reaches approximately 27ºC to 30ºC. The peak summer season arrives from the month of March to May. Still, mid-February, when Mahashivaratri and Navaratri festivals are celebrated, is the best time to enjoy a mesmerizing visit to Amaravati.
Food and Refreshment
Lots of variety of finger-licking food that is rich in seasoning is famous in Andhra Pradesh. Rice is the main content of the cuisines and is used widely in and with a variety of food. People here are fond of curd, chutneys, and pickles. Rice, dal, relishes, and vegetable curry is included in the main course.
Coconut is also used widely in chutneys, edible oil, dishes, and refreshments. Andhra Bhakshyam's meaning, a food of Andhra Pradesh, is a term given to roselle leaves is also served as a typical meal here.
|1||Chillies Dhaba||Restaurant||Amaravathi Road|
|2||Dolphin's Family Restaurant A.C.||Family Restaurant||D.No 26-12-72, Hotel Jagapathi Complex Film Chamber St, Opposite Sailaja Theater|
|3||Open Grill||Barbeque||Raintree Park Road|
|4||Sri Anjaneya Vilas||Restaurant||Brp Road, Opposite Kaleswararao Market|
|5||Golden Pavilion Family Restaurant||Restaurant||Door No. 27-12-39, Bandar Road, Near Raghavaiah Park, Opposite Vijaya Krishna Super Bazar|
|6||Noodles Restaurant||Fast Food||Masjid Road|
|7||Amaravati Food Court||Fast Food Gardens||Vidya Nagar|
|8||Hotel Kosala||Vegetarian||Door No.27-1-58, Sathya Estate, Eluru Road, Beside South India Shopping Mall, Governorpet|
Punjabrao Deshmukh founded the Shivaji Education Society (SES) who manages more than 265 educational institutes. He was the first agriculture minister of India.
The Government Vidarbha Institute of Science And Humanities lies at the heart of Amaravati. Initially, it was called King Edward College. It has the most prominent staff (teaching and non-teaching) among all the colleges which come under the management of Amaravati University, reaching up to 500 members and counting.
Some other colleges affiliated to Sant Gadge Baba Amravati University
- Shree H.V.P. Mandal, Amravati established in 1914 is serving as a sports institution.
- V.Y.W.S.'s Prof. Ram Meghe Institute of Technology & Research
- Sipna College of Engineering and Technology, Amravati.
- Vidya Bharti Mahavidyalaya
- Government College of Engineering, Amravati.
- Government College of Pharmacy
- Government Polytechnic Amravati
- Dr. Panjabrao Deshmukh Polytechnic Amravati
- P. R. Patil Group of Educational Institutes
- Degree College of Physical Education, Shree H.V.P. Mandal, Amravati
- Indian Institute of Mass Communication at Amravati University.
|1||Ahalya Nursing Home||General Hospital||Backside Sivalayam, Kothapet, Guntur, 522001 / Tel - 0863-2225105|
|2||Amar Orthopaedic Hospital||General Hospital||13-2-12, 1ST Line Gunturuvari Thota, Guntur, 522001 / Tel - 0863-2225751, Fax - 0863-2226751|
|3||Amaravathi Institute of Medical Sciences||General Hospital||Hospital Road, Mukku Narasa Reddy Plaza, Kothapeta, Near Bus Stand, 522265 / Tel - 0863-2256699 | 9849601555, Fax - 0863-2256766|
|4||Amma Children's Hospital||General Hospital||NO.137-7-109/D, Old Club Road, Gunturvari Thota, Guntur, 522001 / Tel - 0863-2266000|
|5||Amulya Nursing Home||General Hospital||Guntur Road, Narasaraopet, 522601 / Tel - (08642) 223625/228624|
|6||Aswini Hospital||General Hospital||15-1-17, Near Manipuram Over Bridge, Near RTC Bus Stand(0.5 KM), 522001 / Tel - 0863-2227000, Fax - 0863-2227100|
|7||Aswini Nethralayam||Single Speciality Eye||Narasaraopet, 522601 / Tel - 08647-222761|
|8||B.M.R. Hospitals||Multi-Speciality Hospital||6th Lane, 2nd Cross, Arundelpet, 522002 / Tel - 0863-2241370, Fax - 0863-2267143|
|9||Bommidala Cancer Institute (a unit of Guntur Cancer Care Centre Ltd)||General Hospital||Pedakakani, Guntur, 522509 / Tel - 0863-2556162, Fax - 0863-2225729| | <urn:uuid:1a26fe37-e170-499f-8b9e-afd42e9441a9> | CC-MAIN-2022-33 | https://www.alightindia.com/amravati | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572077.62/warc/CC-MAIN-20220814204141-20220814234141-00604.warc.gz | en | 0.918817 | 2,400 | 3.03125 | 3 |
An Ultimate Guide on PSAT Score Ranges
About eight weeks after taking the PSAT, your scores are released on the online portal. You will quickly realize that they look significantly different than grades you receive in school. It can be hard to tell if your score is good, bad, or average if you don’t know the special scale that the PSAT is graded on. The lowest total PSAT score is 320, while the maximum total score is 1520. Your score will fall between these two numbers. It’s important to note that this scale differs from the SAT total score range, which goes from 400 to 1600. Once you’ve accessed your PSAT score, read on to understand what these numbers mean and find out what insights your score report provides.
What A PSAT Score Report Looks Like
The score report might be a bit overwhelming to read at first, but breaking down what the numbers mean will allow you to comprehensively understand how you did on the test. The score report includes a lot of information, but it is divided into 5 main sections: Total Score, Section Scores, Individual Test Scores, Selection Index Scores, and Subscores. They each have different ranges, as shown in the table below.
|Individual Test Scores||8-38|
|Selection Index Scores||48-228|
How Are PSAT Scores Calculated
Each type of score is calculated differently and has its own interpretation. It might seem like overkill to have so many different types of scores, but they all fit together to tell a cohesive story on how you did on the PSAT.
Total Score (320 to 1520)
Your Total Score is the most important to take note of and is the most visible on the score report. This score will range from 320 to 1520. When people ask you how you did on the PSAT, you will most likely tell them your total score. It is calculated by summing together your two section scores: Evidence-Based Reading and Writing and Math.
Underneath your Total Score, your report will provide “Your Nationally Representative Sample Percentile.” We will dive deeper into what percentiles mean in a later section of this article, but in short, your percentile will tell you how well your score stacks up to other students in your grade who also took the test.
Section Scores (160 to 760)
You will receive two Section Scores: one for Evidence-Based Reading and Writing, and one for Math. These scores will range from 160 to 760. Similar to the Total Score, your percentile is also listed below for each of the scores. Underneath the percentile will also be a bar chart that is divided into green, yellow, and red sections. Where your score lies on the chart will tell you where you are in relation to the College and Career Readiness Benchmark. The PSAT benchmarks are 460 for Evidence-Based Reading and Writing and 510 for Math. These scores are approximately like earning a C in the corresponding introductory college course.
If your score lies in the red section of the bar, you are below the benchmark and may need to work more on that specific subject. If you are in the yellow section, it means that you are near to the benchmark, and if you are in the green section, it means that you’ve met or exceeded the benchmark.
Individual Test Scores (8 to 38)
On the bottom half of the score report, you’ll see individual test scores for three sections: Reading, Writing and Language, and Math. Each of these scores will range from 8 to 38. This is called your “raw score,” and is based on how many answers you got correct on each section.
The scale used to measure your raw score changes from test to test and is determined by the College Board. For example, if you got 21 out of 47 questions correct in the Reading section, your Reading test score (raw score) is 23 for the PSAT taken in October 2021.
The raw score is then used to calculate your section scores using the following formulas:
- Evidence-Based Reading and Writing section score = (Reading Test Score + Writing and Language Test Score) * 10
- Math section score = Math Test Score * 20
Selection Index Score (48 to 228)
Your selection Index Score is important if you are interested in the National Merit Scholarship Program, a national academic competition providing scholarships to attend college. The program is administered by National Merit Scholarship Corporation (NMSC), who use the Selection Index Score to determine students who qualify for the program. About 50,000 students who score high enough on the PSAT can be recognized by the program and around 7,500 students are chosen as scholarship winners annually.
The Selection Index Score will range from 48-228, and is calculated using the following formula:
- Selection Index Score = [ (2 * Evidence-Based Reading and Writing Section Score) + Math Section Score] / 10
The third page of your score report will provide comprehensive information on your performance on each question of the test. This is the finest-grain feedback you will receive from the test as it will tell you which specific questions you got right or wrong. While you can’t see the content of the actual question on the report, you can refer to the score key released on the College Board website for each PSAT test.
Your subscores are split into 7 sections: Command of Evidence, Words in Context, Expression of Ideas, Standard English Conventions, Heart of Algebra, Problem Solving and Data Analysis, and Passport to Advanced Math. The first two sections are associated with Reading, the next two are associated with Writing, and the last three are associated with Math. These scores range from 1 to 15 and provide feedback on your performance in each specific skill area and is useful to keep in mind when preparing for your next test.
Why Take The Test?
There are multiple benefits to taking the PSAT, most significantly of which is that it prepares you to one day take the SAT. Many colleges recommend submitting SAT score with your application and factors it in when determining your admissions decision. Taking the PSAT can start your SAT preparation early by familiarizing you to the layout of the test and the types of test questions it will ask. It can also be a “dress rehearsal” for your SAT test day, as you will know what it feels like to take the test in one sitting, under timed conditions, and under the watchful eye of a proctor. It is a very low-stakes opportunity to get a feel of what it’ll be like to take the SAT since your PSAT scores will not be sent to any colleges. Additionally, your PSAT score report can guide your studying strategy for the next test you take, since it identifies specific skills and subjects that you can improve on.
Another benefit to taking the PSAT is that, depending on your score, colleges may try to recruit you early. It can be less stressful to know what options are available for you and to get a head-start on the admissions process.
Finally, taking the PSAT offers you the chance to qualify for the National Merit Scholarship program where you can potentially win scholarships to finance your college tuition. Scorers in the top 0.5% of test takers in their state will become a National Merit Semifinalist. Note that students in 10th grade or below can’t qualify for the program.
What Are PSAT Score Percentiles
Percentiles is a helpful measure to understand how you did in relation to other students who also took the same test. Your percentile score will range from 1 to 99, and indicates the percentage of students who got a lower score than you.
For example, if you scored in the 86th percentile, it means you did better than 86% of students taking the same test. Scoring in the 50th percentile means that you scored exactly in the median of test scores. Percentile is calculated by placing your score in context of the distribution of everyone else’s score. It is important to look at percentile to see where you stand among your peers, as college admissions will eventually be looking at percentile rankings to compare students in their applicant pools.
The table below is an example of how your scores can translate to percentile rankings.
PSAT Scores Range Explained
Now that you understand how to read your score report and how each score was calculated, it’s crucial to know what your score means! Is it a good or bad score? This depends on your grade level. Read on to see where your score stands.
11th Grade Score Ranges
Elite PSAT Scores: 1370-1520
11th grade students who score in this range are in the top 1% of all test takers.
- Total Score: 1370-1520
- Math Section Score: 720+
- Verbal Section Score: 680+
Excellent PSAT Scores: 1200-1360
11th grade students who score in this range are in the top 10% of all test takers.
- Total Score: 1200-1360
- Math Section Score: 600-710
- Verbal Section Score: 610-670
Above Average PSAT Scores: 1080-1190
11th grade students who score in this range are in the top 25% of all test takers.
- Total Score: 1080-1190
- Math Section Score: 550-590
- Verbal Section Score: 550-600
Average PSAT Scores: 960-1070
11th grade students who score in this range are in the top 50% of all test takers.
- Total Score: 960-1070
- Math Section Score: 490-540
- Verbal Section Score: 480-540
Below Average PSAT Scores: 320-950
11th grade students who score in this range are in the lower 50% of all test takers.
- Total Score: 320-950
- Math Section Score: below 480
- Verbal Section Score: below 470
10th Grade Score Ranges
Elite PSAT Scores: 1360-1520
10th grade students who score in this range are in the top 1% of all test takers.
- Total Score: 1360-1520
- Math Section Score: 700+
- Verbal Section Score: 690+
Excellent PSAT Scores: 1170-1350
10th grade students who score in this range are in the top 10% of all test takers.
- Total Score: 1170-1350
- Math Section Score: 590-690
- Verbal Section Score: 600-680
Above Average PSAT Scores: 1060-1160
10th grade students who score in this range are in the top 25% of all test takers.
- Total Score: 1060-1160
- Math Section Score: 530-580
- Verbal Section Score: 540-590
Average PSAT Scores: 920-1050
10th grade students who score in this range are in the top 50% of all test takers.
- Total Score: 920-1050
- Math Section Score: 470-520
- Verbal Section Score: 470-530
Below Average PSAT Scores: 320-910
10th grade students who score in this range are in the lower 50% of all test takers.
- Total Score: 320-910
- Math Section Score: below 460
- Verbal Section Score: below 460
How To Improve Your PSAT Scores
If you are looking to bump up your PSAT score to the next score range, striving to reach a specific score goal, or hoping to qualify for the National Merit Scholarship Program, there are many steps you can take to improve your score.
The first step you should take is to analyze your score report and pinpoint areas of improvement. These can be skills where you are below the benchmark or even types of questions that you noticed that you repeatedly got wrong. Your study plan can then focus on these areas. There are many online, free resources you can use to study for the PSAT that offer full practice tests, drills on specific questions, and tips and tricks for each subject. If you are looking for a more structured study plan, however, you can also look for tutors or PSAT-specific test camps. While their services aren’t free, many students find that it is most compatible with their learning and study style. In all, practice makes perfect and taking practice tests and reviewing questions is the best way to improve your score.
Getting the Highest Score on the PSAT is Possible with SoFloTutors
SoFlo SAT Tutoring offers one-on-one tutoring preparing to take the PSAT, SAT, and ACT! All of our tutors attend top universities around the nation and scored in the 99th percentile on their SAT. They will identify your testing weak areas, create a personalized study plan for you, and increase your chances of getting your target score. Our tutors schedule sessions to your availability. Check out our tutoring services and rates to book a session!
About the Author
Andie Pinga is an expert SoFlo tutor and a senior at the University of Pennsylvania double-majoring in Economics and Anthropology. She scored a 35 on her ACT, and when she’s not studying on campus or meeting with friends, Andie enjoys playing the acoustic and electric guitar. | <urn:uuid:435f1adc-6f79-4ce7-82da-1c1930dfac9b> | CC-MAIN-2022-33 | https://soflotutors.com/blog/guide-to-psat-scores/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00205.warc.gz | en | 0.927394 | 2,824 | 2.53125 | 3 |
IESE’s Center for Globalization and Strategy annually measures the progress of the world’s cities in terms of “Urban Intelligence”, i.e. “Smartcities”, which, through the Cities in Motion Index, defines the key variables for the top cities that make up the global ranking.
What are IESE’s criteria for measuring and classifying Smart Cities?
By: Gabriel E. Levy B.
Directed by Pascual Berrone and Joan Enric Ricart, IESE’s Center for Globalization and Strategy at the University of Navarra in Spain, is the largest think tank on smart cities around the world, reflecting on the challenges and opportunities of digital transformation in cities and recognizing progress through an annual indicator, called Cities in Motion.
The IESE has defined, among others, 10 criteria, as key elements to evaluate the progress of cities around the Digital Transformation and therefore its evolution in Smart Cities, a mechanism that is frequently taken up by universities, analysts and public entities around the world, to standardize these criteria.
The criteria for assessing the progress of Smart Cities proposed by IESE:
1. Human Capital
Many experts agree that it is not possible to achieve Digital Transformation experiences if there is not enough trained human capital in the cities with the knowledge to manage the transformation projects. For this reason, IESE incorporates in its measurements the efforts made by local governments to train public employees, staff involved in the projects and citizens in general, in all issues related to digital transformation, not only from the practical and technical, but with special emphasis on the conceptual.
Similarly, the indicator measures the amount of research and studies that are conducted on the topics of “Smartcities” and “Digital Transformation”, because thanks to these initiatives, the frontier of knowledge is expanded and models can be adapted to local realities, a mechanism known as “Tropicalization”.
2. Social Cohesion
The concept of “Social Cohesion” refers to the degree of integration of citizens in their own community, i.e. how united, supportive and integrated a community is, through variables such as coexistence, participation, respect for civil rights, among many other factors.
Modern democracy recognizes social cohesion as a relevant concept to guarantee social integration, economic growth and political stability, in such a way that it becomes a direct indicator of the degree of integration of citizens in their community.
“To speak of social cohesion implies society, defined as a group of people who relate to each other, according to certain legal and customary rules of organization, where its members share the same culture or civilization in a given space or time”,
Democratic Lighthouse of the National Autonomous University of Mexico.
One of the conclusions reached by Pascual Berrone and Joan Enric Ricart’s team at IESE, is that a digital transformation project of a city aimed at becoming a smart city, lasts over time if the society is cohesive, being this cohesion the best guarantee not only of success but also of rootedness within the same community.
3. Circular Economy
Circular economy refers to a production and consumption model that involves sharing, renting, reusing, repairing, renewing and recycling existing materials and products as many times as possible to create added value. In this way, the life cycle of products is extended and an environmentally friendly and sustainable value generation model is achieved over time .
In practice, the circular economy involves reducing waste to a minimum. When a product reaches the end of its life, its materials are kept within the economy wherever possible. These can be productively used again and again, thus creating additional value.
The Circular economy is an antagonistic model to the traditional linear economic model, based mainly on the concept of “use and throw away”, which requires large quantities of cheap and easily accessible materials and energy, i.e. programmed obsolescence.
For IESE, a city can only be smart if its economy works based on a circular model, where each product is used to the maximum and there is a strong awareness on the part of citizens about the importance of sharing, renting, reusing, repairing, renewing and recycling.
4. Efficient Public Management
Efficiency in public management is a fundamental pillar of any smart city and is a concept that applies in two ways, on the one hand that governments properly implement digital transformation models, but in turn, that the digital transformation impacts on the efficiency of public management models, so that the administration of cities work by processes, and set clear indicators, long-term and survive multiple administrations, becoming real development plans sustained over time and not the whim of the rulers of the day.
It is for this reason that a Smart City, in all cases, must guarantee a type of “public management” measurable by results, guaranteeing a transparent action and permanently accountable to civil society.
For IESE, the continuous improvement of public administration will be based on the strengthening of management tools consolidated in an integrated system that allows the good use of resources and the capacity of the State to produce results in favor of citizens’ interests. These should be developed within a framework of modernization, reform and inter-institutional coordination.
5. Environmental Sustainability
The criterion of Environmental Sustainability is complementary to the criterion of the Circular Economy and refers to the rational use and exploitation of one or several present resources, without compromising the availability of the same resource for future generations, the above from an ecosystemic view of the environment, i.e. it must ensure the preservation of the good along with the other resources that make up the entire ecosystem that surrounds it.
Herman Daly is an economist and ecologist of North American origin, professor of the “School of Public Policy” at the University of Maryland in the United States and is one of the most referenced authors regarding the concept of “sustainable economy”, so it is considered within the scientific community, responsible for laying the foundations of multiple theories of the so-called “Ecological Economics” .
One of the major contributions of Daly’s work, which is taken into account by IESE in its evaluation of smart cities, are the principles of environmental sustainability:
“Renewable resources shall not be used at a rate greater than their generation.
Polluting substances may not be produced at a rate greater than can be recycled, neutralized or absorbed by the environment.
No non-renewable resource should be harvested faster than is necessary to replace it with a renewable resource used in a sustainable manner” .
In addition, IESE measures the contribution of cities to the reduction of global warming, whether through green bond projects, tree planting or the promotion of innovative initiatives such as vertical gardens or CO2 capture systems.
6. Intelligent Mobility
For IESE, the main indicator of intelligent mobility is based on the strengthening of public transport systems and the digitization of all the services linked to the provision of this service, guaranteeing on the one hand the optimization of available resources and on the other hand ensuring that users move quickly, economically and as comfortably as possible.
Additionally, the Smart Mobility criterion necessarily includes automation schemes of the vehicle fleet in Smartcities, which is achieved through an integral digital system, based on communication technologies between the vehicles themselves, and the centralized urban infrastructure, through a robust network connectivity system, which demands an adequate deployment of fiber optic networks and wireless communication systems, such as 5G networks, as well as the incorporation of high-precision sensors in traffic lights, crossings, delineation of tracks, smart screens, platforms, etc.
7. Urban Planning
Defined as the set of technical and normative instruments that are drafted to order the use of land and regulate the conditions for its transformation or, where appropriate, conservation, Urban Planning necessarily includes a set of projective practices with which a management model is established for a spatial area, which generally refers to a municipality, a sectoral urban area.
In the case of Smart Cities, Urban planning is a necessary condition for the implementation of a real digital transformation, since it defines the critical work path, avoiding improvisation and ensuring the harmonious integration of all the factors that make up the delicate balance of turning a city into a Smartcity.
Annually, IESE reviews the coherence of the Urban Planning of the cities, with the achievements and advances of the digital transformation.
8. Technological Implementation
Selecting the best technologies is a huge challenge, but it is much more challenging to implement them properly and according to the local reality of each environment and this is precisely what measures this variable proposed by IESE, which seeks to assess the relevance of the technologies used in cities, its scope, but above all, the benefit they yield in terms of meeting objectives in line with the planning and goals set, understanding technology as the instrument that materializes the proposed objectives.
It is important to note that for IESE, this indicator does not measure the amount of technology used, but rather the relevance and impact it has on the goals defined in urban planning,
9. Compliance with ISO 37120
ISO 37120, a standard that defines services and quality of life in communities and cities, is the first set of standardized international indicators that provide a uniform approach to what is measured and how it is measured, allowing cities to communicate with each other using globally standardized comparable data.
By means of the ISO 37120 Standard, it is possible to objectively compare the performance of one city with respect to another, obtaining reliable and comparable information.
ISO 37120 is considered the ISO standard for the implementation of Smart Cities and is taken into account annually by the IESE, as a criterion for assessing the progress of Smartcities.
In a globalized world no city is isolated, in any case, like it or not, it is interconnected with the rest of the world, whether with the permanent migration resulting from human transit, the cultural impact of books, television and the Internet, or the constant flow of cross-border information.
It is for this reason that IESE incorporates a criterion dedicated to evaluating the level of internationalization of Smart Cities, as the mechanism to measure their interrelationship with the rest of the world’s cities and their contribution to the sustainable growth of this great global village.
In Conclusion, IESE’s Center for Globalization and Strategy at the University of Navarra in Spain, is the largest think tank on smart cities around the world, which reflects on the challenges and opportunities of digital transformation in cities and recognizes progress through an annual indicator called Cities in Motion, which measures among others, 10 key aspects composed of: Human Capital, Social Cohesion, Circular Economy, Efficient Public Management, Environmental Sustainability, Smart Mobility, Urban Planning, Technological Implementation, ISO 37120 compliance and Internationalization. | <urn:uuid:e3deceb2-210b-4d05-8519-e50c94aa59a2> | CC-MAIN-2022-33 | https://www.andinalinkvirtualexpo.com/news/smart-cities-global-ranking-how-is-it-measured/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00405.warc.gz | en | 0.929906 | 2,263 | 2.828125 | 3 |
If you are interested in pursuing a degree or finding a job in the field of history, everything you need is here. Find the best schools, career information, history of the discipline, influential people in the field, great books, and more.
What is history?
History is an interdisciplinary field that brings together various areas of academic inquiry such as literature, archeology, political science, and philosophy to provide a better understanding of how the events in our past have shaped present-day realities. In addition to providing a narrative window into human history, the history serves as a pathway into understanding the evolution of scientific inquiry, the emergence of important philosophical movements, breakthroughs in civic governance and so much more. History is an encompassing field that can lead to a wide range of careers in education, law, civics, public service, and much more.
A large number of fully accredited colleges and universities offer excellent online degrees in history at the associate, bachelor’s, and graduate levels. Read on for a look at our growing list of best online history degrees.
Your concentration will determine many of the courses you’ll take as a history major. Likewise, you will be required to take a number of requisite courses on foundational topics such as Eastern Civilization and American History. However, you will also have the freedom to select an array of courses that most interest you. As a history major, you’ll have the chance to build a course of education around the periods, places, and topics that most interest you. Common history courses include: State, Society and the Individual in the Non-western World; Rome to Renaissance: Introduction to the Middle Ages; Conflict and Identity in Modern Europe; Ancient Greek History; Intro to East Asian Civilization; Early Russian History; Political History of Contemporary Africa; Colonial Cities of the Americas, and more.
What can I do with a degree in history?
History majors not only qualify for highly specialized roles in education, publishing and academia, but majoring in history will provide you with a number of valuable workplace skills. As such, history majors will qualify to work as Postsecondary History Teachers; Historians; Archivists, Curators, Museum Workers, News Analysts, Reporters, and Journalists; and more.
The following are the top history influencers in history (1200-2020) according to our machine-powered Influence Rankings, which are drawn from a numerical score of academic achievements, merits, and citations across Wikipedia/data, Crossref, and an ever-growing body of data.
was a German philosopher, economist, historian, sociologist, political theorist, journalist and socialist revolutionary, whose 1848 pamphlet The Communist Manifesto and the three-volume Das Kapital had enormous influence on subsequent intellectual, economic and political history.
was a Scottish Enlightenment philosopher, historian, economist, librarian and essayist, who is best known today for his highly influential system of philosophical empiricism, skepticism, and naturalism.
was a Ukrainian-Russian Marxist revolutionary, political theorist and politician who developed a variant of Marxism which has become known as Trotskyism.
was an English historian, writer, and Member of Parliament whose most important work, The History of the Decline and Fall of the Roman Empire—published in six volumes between 1776 and 1788—is known for the quality and irony of its prose, its use of primary sources, and its polemical criticism of organised religion.
was a German sociologist, historian, jurist, and political economist, whose ideas profoundly influenced social theory and research, and who though recognized as one of the fathers of sociology along with Auguste Comte, Karl Marx, and Émile Durkheim, generally saw himself as a historian.
Gottfried Wilhelm Leibniz
was a German mathematician, philosopher, scientist, and diplomat, as well as a prominent figure in both the history of philosophy and the history of mathematics,.
C. S. Lewis
was a British writer and lay theologian who held academic positions in English literature at both Oxford University and Cambridge University, and is best known for his works of fiction, especially The Screwtape Letters, The Chronicles of Narnia, and The Space Trilogy, and for his non-fiction Christian apologetics, such as Mere Christianity, Miracles, and The Problem of Pain.
was an Arab sociologist, philosopher and historian who has been described as the precursive founder of the proto-disciplines that would become historiography, sociology, economics, and demography.
was a British historian who studied the rise of industrial capitalism, socialism and nationalism and whose life-long identification as a Marxist influenced the character of his work, including his most noted text, The Age of Extremes.
J. R. R. Tolkien
was an English writer, poet, philologist, and academic, best known as the author of the high fantasy works The Hobbit and The Lord of the Rings but who also served as the Rawlinson and Bosworth Professor of Anglo-Saxon and Fellow of Pembroke College, Oxford from 1925 to 1945 and the Merton Professor of English Language and Literature and Fellow of Merton College, Oxford from 1945 to 1959.
The following are the top historians in the field today according to our machine-powered Influence Rankings, which are drawn from a numerical score of academic achievements, merits, and citations across Wikipedia/data, Crossref, and an ever-growing body of data.
formed the field of study called Big History by integrating his research of human history with astronomy, anthropology, biology, and cosmology, and created the Bill Gates-funded Big History Project, which teaches high school students throughout the United States and Australia to examine human history through an anthropological and biological lens.
Yuval Noah Harari
’s early works focused on the role of military engagement in human history, but he is best known for his more recent works, Sapiens: A Brief History of Humankind and Homo Deus: A Brief History of Tomorrow, which explore all of human history through a macro-historical lens.
has taught at institutions on both sides of the Atlantic, from Jesus College in Oxford to Harvard University in Cambridge, Massachusetts, as well as having authored several books and produced numerous documentaries including the Emmy-winning The Ascent of Money in 2009.
is currently a Professor of History and Art History at Columbia University and a prolific author of nearly 20 books, but he is best known as the host of a BBC series titled, “A History of Britain,” which aired from 2000 to 2002.
Timothy D. Snyder
’s research has focused on the history of Eastern Europe, a study for which he was uniquely suited due to his ability to read and/or speak eleven different European languages, including German, Slovak and Russian.
has studied the history of violence against Aboriginal Australian peoples and has been honored with the Ernest Scott Historical Prize, the Human Rights and Equal Opportunity Commission Arts Award, and an Australian Book Council Award.
has focused his scholarship on the study of history from the classical era to the Renaissance, taking a unique approach not just to the study of chronological history, but also the study of how history has been recorded and understood.
spent her early academic career teaching and has taught at institutions such as the University of Oxford, Macquarie University, University of Washington, Leipzig University and Harvard University and has also held a number of academic leadership roles, serving as the Pro-Vice Chancellor of Learning and Teaching for Monash University and the Deputy Vice-Chancellor of Academics for Australian National University.
is known as an expert in the study of the Reconstruction period following the Civil War, and is recognized for his widely acclaimed writing, most notably The Fiery Trial: Abraham Lincoln and American Slavery, which won the Lincoln Prize and the Pulitzer Prize for history.
has made substantial contributions to postcolonial theory and subaltern studies, focusing on intersections between history, colonialism, postcolonialism, historicism and nationalism.
Dr. Eric Foner discusses the forgotten figures of history, growing up during the Civil Rights movement, and the need for more diverse and accurate history textbooks in our interview, How Have History Classes Changes?.
The following are the most influential books in the field of history today according to our backstage Ranking Analytics tool, which calculates the influence of various sources in both academics and popular culture using a numerical scoring of citations across Wikipedia/data, Crossref, and an ever-growing body of data.
Records of the Grand Historian by Sima Tan
and Sima Qian
, known as The Shiji in Chinese, is the earliest known historical narrative of ancient Chinese civilization and was composed by Sima Qian in the second half of the first century BC on the basis of research carried out by his father, Sima Tan, indexing a detailed account of the Qin Dynasty (221–206 BC) and the early part of the Han.
The Life of Falvius Josephus by Josephus
is an autobiography written by a very important Jewish historian of the early Roman empire, Titus Flavius Josephus (c. 30–c. 100 AD), who was born in Jerusalem into a priestly Jewish family and fought against the Romans in the early stages of the Jewish War (66–73 AD) before going over to the Roman side led by the general and future emperor Vespasian and earning status as a trusted aide of Vespasian’s son (and future-emperor in his own right), Titus.
The Oxford History of the British Empire is a state-of-the-art collection of essays, in three volumes, detailing the manifold ways in which England became one of the world’s foremost naval powers, allowing it to mount voyages of exploration, to establish trade relations, and ultimately to plant colonial administrations and/or settler states in foreign lands all around the globe.
The Alexandrian War is an anonymous Latin account of this major episode in the Roman civil war, and details the famous moment when popular military leader Julius Caesar “crossed the rubicon” by marching his legions into Rome to face down the Roman Senate.
The Antiquities of the Jews by Josephus
is a vast history of the Jewish people in 20 volumes written by the Hellenized and Romanized Jewish author known as Titus Flavius Josephus.
The Jewish War by Josephus
is the author’s account in seven books of the struggles of the Jews against the Romans from the Maccabean Revolt (167–160 BC) to the destruction of the Second Temple in 70 AD and the dramatic siege of Masada in 74.
A Little History of the World by Ernst Gombrich
is an effort to convey the basic facts of world history to an audience of young readers in a sprightly and accessible manner, emphasizing the most personal and colorful aspects of the places and time periods covered in his book, which provided a full sweep of world history from prehistoric times to the twentieth century.
The Making of the English Working Class by E. P. Thompson
is considered by many to be one of the last century’s outstanding contributions to historiography and details the social, economic, and intellectual developments over the course of the eighteenth and nineteenth centuries, which ultimately led to the formation of a self-conscious working class in England.
World history is inevitably formed by conflicts both historical and ongoing as nations have battled one another and people have struggled for basic freedoms in their own countries. These conflicts inform many of the controversial topics that we still grapple with today. Read on for a look at some of the top controversies connected to the history discipline.
History is a dynamic field shaped by numerous overlapping disciplines including literature, philosophy, psychology, and more. The features below focus on many of the ideas, influencers, and events from these intersecting disciplines which have shaped the history of the world. | <urn:uuid:408f4613-e7b5-4e63-99f9-9a83d88e198e> | CC-MAIN-2022-33 | https://academicinfluence.com/resources/degrees/history | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00004.warc.gz | en | 0.954904 | 2,504 | 2.53125 | 3 |
A group of QUINOLONES with at least one fluorine atom and a piperazinyl group.
Microbial Sensitivity Tests
Any tests that demonstrate the relative efficacy of different chemotherapeutic agents against specific microorganisms (i.e., bacteria, fungi, viruses).
Substances that reduce the growth or reproduction of BACTERIA.
A group of derivatives of naphthyridine carboxylic acid, quinoline carboxylic acid, or NALIDIXIC ACID.
A synthetic fluoroquinolone antibacterial agent that inhibits the supercoiling activity of bacterial DNA GYRASE, halting DNA REPLICATION.
Drug Resistance, Bacterial
A bacterial DNA topoisomerase II that catalyzes ATP-dependent breakage of both strands of DNA, passage of the unbroken strands through the breaks, and rejoining of the broken strands. Gyrase binds to DNA as a heterotetramer consisting of two A and two B subunits. In the presence of ATP, gyrase is able to convert the relaxed circular DNA duplex into a superhelix. In the absence of ATP, supercoiled DNA is relaxed by DNA gyrase.
The L-isomer of Ofloxacin.
Drug Resistance, Microbial
DNA Topoisomerase IV
A bacterial DNA topoisomerase II that catalyzes ATP-dependent breakage of both strands of DNA, passage of the unbroken strands through the breaks, and rejoining of the broken strands. Topoisomerase IV binds to DNA as a heterotetramer consisting 2 parC and 2 parE subunits. Topoisomerase IV is a decatenating enzyme that resolves interlinked daughter chromosomes following DNA replication.
A synthetic 1,8-naphthyridine antimicrobial agent with a limited bacteriocidal spectrum. It is an inhibitor of the A subunit of bacterial DNA GYRASE.
A synthetic broad-spectrum fluoroquinolone antibacterial agent active against most gram-negative and gram-positive bacteria.
Drug Resistance, Multiple, Bacterial
A broad-spectrum 6-fluoronaphthyridinone antibacterial agent that is structurally related to NALIDIXIC ACID.
A broad-spectrum antimicrobial fluoroquinolone. The drug strongly inhibits the DNA-supercoiling activity of DNA GYRASE.
Potentially pathogenic bacteria found in nasal membranes, skin, hair follicles, and perineum of warm-blooded animals. They may cause a wide range of infections and intoxications.
Infections with bacteria of the genus PSEUDOMONAS.
Gram-Negative Bacterial Infections
Infections caused by bacteria that show up as pink (negative) when treated by the gram-staining method.
DNA Topoisomerases, Type II
A broad-spectrum cephalosporin antibiotic with a very long half-life and high penetrability to meninges, eyes and inner ears.
Salmonella paratyphi A
A serotype of SALMONELLA ENTERICA that causes mild PARATYPHOID FEVER in humans.
Acute infectious disease characterized by primary invasion of the urogenital tract. The etiologic agent, NEISSERIA GONORRHOEAE, was isolated by Neisser in 1879.
A serotype of SALMONELLA ENTERICA which is the etiologic agent of TYPHOID FEVER.
An acute systemic febrile infection caused by SALMONELLA TYPHI, a serotype of SALMONELLA ENTERICA.
Colony Count, Microbial
Enumeration by direct count of viable, isolated bacterial, archaeal, or fungal CELLS or SPORES capable of growth on solid CULTURE MEDIA. The method is used routinely by environmental microbiologists for quantifying organisms in AIR; FOOD; and WATER; by clinicians for measuring patients' microbial load; and in antimicrobial drug testing.
Urinary Tract Infections
Inflammatory responses of the epithelium of the URINARY TRACT to microbial invasions. They are often bacterial infections with associated BACTERIURIA and PYURIA.
Infections by bacteria, general or unspecified.
A species of gram-negative, facultatively anaerobic, rod-shaped bacteria (GRAM-NEGATIVE FACULTATIVELY ANAEROBIC RODS) commonly found in the lower part of the intestine of warm-blooded animals. It is usually nonpathogenic, but some strains are known to produce DIARRHEA and pyogenic infections. Pathogenic strains (virotypes) are classified by their specific pathogenic mechanisms such as toxins (ENTEROTOXIGENIC ESCHERICHIA COLI), etc.
Drug Therapy, Combination
A semisynthetic antibiotic produced from Streptomyces mediterranei. It has a broad antibacterial spectrum, including activity against several forms of Mycobacterium. In susceptible organisms it inhibits DNA-dependent RNA polymerase activity by forming a stable complex with the enzyme. It thus suppresses the initiation of RNA synthesis. Rifampin is bactericidal, and acts on both intracellular and extracellular organisms. (From Gilman et al., Goodman and Gilman's The Pharmacological Basis of Therapeutics, 9th ed, p1160)
A prolonged febrile illness commonly caused by several Paratyphi serotypes of SALMONELLA ENTERICA. It is similar to TYPHOID FEVER but less severe.
Semisynthetic thienamycin that has a wide spectrum of antibacterial activity against gram-negative and gram-positive aerobic and anaerobic bacteria, including many multiresistant strains. It is stable to beta-lactamases. Clinical studies have demonstrated high efficacy in the treatment of infections of various body systems. Its effectiveness is enhanced when it is administered in combination with CILASTATIN, a renal dipeptidase inhibitor.
Eye Infections, Bacterial
Infections in the inner or external eye caused by microorganisms belonging to several families of bacteria. Some of the more common genera found are Haemophilus, Neisseria, Staphylococcus, Streptococcus, and Chlamydia.
The presence of viable bacteria circulating in the blood. Fever, chills, tachycardia, and tachypnea are common acute manifestations of bacteremia. The majority of cases are seen in already hospitalized patients, most of whom have underlying diseases or procedures which render their bloodstreams susceptible to invasion.
A semi-synthetic macrolide antibiotic structurally related to ERYTHROMYCIN. It has been used in the treatment of Mycobacterium avium intracellulare infections, toxoplasmosis, and cryptosporidiosis.
Infections with bacteria of the genus STAPHYLOCOCCUS.
Serum Bactericidal Test
Method of measuring the bactericidal activity contained in a patient's serum as a result of antimicrobial therapy. It is used to monitor the therapy in BACTERIAL ENDOCARDITIS; OSTEOMYELITIS and other serious bacterial infections. As commonly performed, the test is a variation of the broth dilution test. This test needs to be distinguished from testing of the naturally occurring BLOOD BACTERICIDAL ACTIVITY.
Area Under Curve
A statistical means of summarizing information from a series of measurements on one individual. It is frequently used in clinical pharmacology where the AUC from serum levels can be interpreted as the total uptake of whatever has been administered. As a plot of the concentration of a drug against time, after a single dose of medicine, producing a standard shape curve, it is a means of comparing the bioavailability of the same drug made by different companies. (From Winslade, Dictionary of Clinical Research, 1992)
Infections with bacteria of the genus SALMONELLA.
Broad-spectrum cephalosporin antibiotic resistant to beta-lactamase. It has been proposed for infections with gram-negative and gram-positive organisms, GONORRHEA, and HAEMOPHILUS.
A family of gram-negative, facultatively anaerobic, rod-shaped bacteria that do not form endospores. Its organisms are distributed worldwide with some being saprophytes and others being plant and animal parasites. Many species are of considerable economic importance due to their pathogenic effects on agriculture and livestock.
Topoisomerase II Inhibitors
Beta-lactam antibiotics that differ from PENICILLINS in having the thiazolidine sulfur atom replaced by carbon, the sulfur then becoming the first atom in the side chain. They are unstable chemically, but have a very broad antibacterial spectrum. Thienamycin and its more stable derivatives are proposed for use in combinations with enzyme inhibitors.
Nonsusceptibility of an organism to the action of penicillins.
One of the three domains of life (the others being Eukarya and ARCHAEA), also called Eubacteria. They are unicellular prokaryotic microorganisms which generally possess rigid cell walls, multiply by cell division, and exhibit three principal forms: round or coccal, rodlike or bacillary, and spiral or spirochetal. Bacteria can be classified by their response to OXYGEN: aerobic, anaerobic, or facultatively anaerobic; by the mode by which they obtain their energy: chemotrophy (via chemical reaction) or PHOTOTROPHY (via light reaction); for chemotrophs by their source of chemical energy: CHEMOLITHOTROPHY (from inorganic compounds) or chemoorganotrophy (from organic compounds); and by their source for CARBON; NITROGEN; etc.; HETEROTROPHY (from organic sources) or AUTOTROPHY (from CARBON DIOXIDE). They can also be classified by whether or not they stain (based on the structure of their CELL WALLS) with CRYSTAL VIOLET dye: gram-negative or gram-positive.
A bacteriostatic antibiotic macrolide produced by Streptomyces erythreus. Erythromycin A is considered its major active component. In sensitive organisms, it inhibits protein synthesis by binding to 50S ribosomal subunits. This binding process inhibits peptidyl transferase activity and interferes with translocation of amino acids during translation and assembly of proteins.
Deoxyribonucleic acid that makes up the genetic material of bacteria.
A pyrimidine inhibitor of dihydrofolate reductase, it is an antibacterial related to PYRIMETHAMINE. It is potentiated by SULFONAMIDES and the TRIMETHOPRIM, SULFAMETHOXAZOLE DRUG COMBINATION is the form most often used. It is sometimes used alone as an antimalarial. TRIMETHOPRIM RESISTANCE has been reported.
A group of antibiotics that contain 6-aminopenicillanic acid with a side chain attached to the 6-amino group. The penicillin nucleus is the chief structural requirement for biological activity. The side-chain structure determines many of the antibacterial and pharmacological characteristics. (Goodman and Gilman's The Pharmacological Basis of Therapeutics, 8th ed, p1065)
A synthetic tetracycline derivative with similar antimicrobial activity.
Anti-Infective Agents, Urinary
Substances capable of killing agents causing urinary tract infections or of preventing them from spreading.
An aminoglycoside, broad-spectrum antibiotic produced by Streptomyces tenebrarius. It is effective against gram-negative bacteria, especially the PSEUDOMONAS species. It is a 10% component of the antibiotic complex, NEBRAMYCIN, produced by the same species.
Gram-Positive Bacterial Infections
Infections caused by bacteria that retain the crystal violet stain (positive) when treated by the gram-staining method.
A renal dehydropeptidase-I and leukotriene D4 dipeptidase inhibitor. Since the antibiotic, IMIPENEM, is hydrolyzed by dehydropeptidase-I, which resides in the brush border of the renal tubule, cilastatin is administered with imipenem to increase its effectiveness. The drug also inhibits the metabolism of leukotriene D4 to leukotriene E4.
A species of bacteria that resemble small tightly coiled spirals. Its organisms are known to cause abortion in sheep and fever and enteritis in man and may be associated with enteric diseases of calves, lambs, and other animals.
A nitroimidazole used to treat AMEBIASIS; VAGINITIS; TRICHOMONAS INFECTIONS; GIARDIASIS; ANAEROBIC BACTERIA; and TREPONEMAL INFECTIONS. It has also been proposed as a radiation sensitizer for hypoxic cells. According to the Fourth Annual Report on Carcinogens (NTP 85-002, 1985, p133), this substance may reasonably be anticipated to be a carcinogen (Merck, 11th ed). | <urn:uuid:623f217e-6279-4d6e-a130-9f605c52b9e2> | CC-MAIN-2022-33 | https://lookformedical.com/en/definitions/ciprofloxacin | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00205.warc.gz | en | 0.870355 | 3,255 | 2.609375 | 3 |
Between 1820 and 1860, the visual map of the United States was transformed by unprecedented urbanization and rapid territorial expansion. These changes mutually fueled the Second Industrial Revolution which peaked between 1870 and 1914. Between the annexation of Texas (1845), the British retreat from Oregon country, and The Treaty of Guadalupe-Hidalgo (1848) which cemented Mexican cession of the Southwest to the United States, territorial expansion exponentially rewrote the competing visions that free-soilers, European immigrants, industrial capitalists, and Native Americans held for the future of the American Empire.
“If a Western Rip Van Winkle had fallen asleep in 1869 and awakened in 1896, he would not have recognized the lands that the railroads had touched. Bison had yielded to cattle; mountains had been blasted and bored. Great swaths of land that had once whispered grass now screamed corn and wheat. Nation-states had conquered Indian peoples, slaughtering some of them and confining and controlling most of them. Population had increased across much of this vast region, and there were growing cities along its edges. A land that had once run largely north-south now ran east-west. Each change could have been traced back to the railroads.”
Need for Railroads
The need for massive industry was obvious: in order to reach California’s burgeoning port cities like San Francisco and to expedite the extraction of gold from the mines, railroad tracks would need to be laid across the plains to reach the Pacific and open up trade networks. Questions abounded about the character this new American territory would take: would it be reliant on slave labor and fulfill Jefferson’s original vision of an agrarian republic? Would corporations or the federal government lay down the required infrastructure to ‘tame the West’? Still, others wondered if turning over the bison laden Plains to New York-based corporations would stifle the American dream for America’s second and third sons. Still, others believed the technological innovations of the Second Industrial Revolution were the unstoppable culmination of modern civilization propelling the fulfillment of Manifest Destiny. Questions of this nature were not new in American history. Throughout the first half of the nineteenth century, Americans were forced to adjust to the implications of the First Industrial Revolution. 1750 to 1850 marked a century of heightened industrial activity centered around textiles. After the invention of steam power and the cotton gin by Eli Whitney in 1793, cotton could be shipped from the American South by New England ships to the vast textile factories of Great Britain, producing a reverse triangle trade around a single global commodity. These developments were hailed by some as “progress,” but the pace, scale, and reliance on slave labor on these developments instilled in others a great sense of anxiety and fear.
Although the economic and social problems of the first Industrial Revolution distressed many, these concerns were set aside during the nation’s bloody Civil War (1861-1865).
The following maps demonstrate the advancement of the railroad before the Civil War (as always, click to enlarge image):
American Economic Growth
In the aftermath of the Civil War and Reconstruction, the American economy grew considerably as it entered “The Second Industrial Revolution,” generally recognized as the period between 1870 and 1914. The U.S. was awash in an abundance of natural resources from its newly acquired territories, a growing supply of labor immigrating from Europe, and the migration of emancipated African Americans North and West, an expanding market for manufactured goods, and the availability of capital for investment.
The Second Industrial Revolution took local communities and their new products out of the shadow of large regional agricultural based economies which was assisted by new labor forces and production techniques. During the Second Industrial Revolution, innovations in transportation, such as roads, steamboats, the Eerie Canal, and most notably railroads, linked distant, previously isolated communities together.
For the first time, goods from the American interior could be shipped directly to the Atlantic, and vice versa. Being able to ship products great distances transformed the nature of economic activity in the United States. Before the development of this elaborate transportation and communication system, economies were localized and often based on a barter system. The transportation revolution opened up new markets for farmers, industrialists, and bankers who could now bring crops cotton in the Mississippi River Valley, wheat in the Midwest, and manufactured goods in upstate New York into a global market based on credit. Similarly, the expansion of the railroad brought a dramatic reduction in the time and money it took to move heavy goods, creating new opportunities for wealth at a time when two-thirds of all Americans still resided on farms.
The federal government actively participated in this growth by promoting industrial and agricultural development. High tariffs were enacted to protect American industry from foreign competition, land was granted to railroad companies to encourage construction, and the army was employed to forcibly remove Indians from western land desired by farmers and mining companies. The rapid growth of factory production, mining, and railroad construction all boosted the new industrial economy and stood in stark contrast to the previous small farm and artisan workshop economy of the pre-Civil War era.
By 1913, the United States produced one-third of the world’s industrial output–more than the total of Great Britain, France, and Germany combined. The living standards and the purchasing power of money increased rapidly, as new technologies played an ever-increasing role in the daily lives of working- and middle-class citizens. Between 1870 and 1920, almost 11 million Americans moved from farm to city, and another 25 million immigrants arrived from overseas. By 1920, for the first time in American history, the census revealed more people lived in cities than on farms.
Inventions during the Second Industrial Revolution were interconnected. The railroad spurred the growth of the telegraph machine. Telegraph lines and railroad lines inextricably bound together as telegraph polls dotted the distance of railroad lines. The telegraph, and later the telephone, ushered in the era of instant communication and brought about, in the words of cultural historian Stephen Kern, “the annihilation of distance.” This was a profound change for Americans. The “local” shot outward to the “national” and even “international” as a new sense of world unity was established through these new technologies. These technologies also increased the pace of life and the manner in which people worked and lived.
Major Technological Advances of the Second Industrial Revolution
- 1870s. Automatic signals, air brakes, and knuckle couplers on the railroads; the Bessemer and then the open-hearth process in the steel mills; the telephone, electric light, and typewriter.
- 1880s. The elevator and structural steel for buildings, leading to the first “skyscrapers.”
- 1890s. The phonograph and motion pictures; the electric generator, contributing to modern household items such as refrigerators and washing machines and gradually replaced water and steam-powered engines; and the internal combustion engine, which made possible the first automobiles and the first airplane flight by the Wright brothers in 1903.
The economic growth during this time period was extraordinary but unstable. The world economy experienced harsh depressions in 1873 and again in 1897. Businesses competed intensely with each other and corporations battled to gain control of industries. Countless companies failed and others were bought up by larger corporations which eventually ruled the marketplace.
For those who were able to capitalize on these technological advancements, the Second Industrial Revolution was highly profitable. During the Depression of 1873, the soon-to-be industry giant, Andrew Carnegie established a steel company which controlled every phase of business from raw materials to transportation, manufacturing, and distribution.
By the 1890s, Carnegie dominated the steel industry and had accumulated a fortune worth millions. His steel factories were the most technologically advanced in the world, although this honor came at a price for his workers. Carnegie ran his companies with a dictatorial hand; his factories operated around the clock and workers were burdened with long hours. Yet, at the same time, Carnegie believed that the rich had a moral obligation to promote the advancement of society and he distributed much of his wealth to various philanthropies, especially towards the creation of public libraries throughout the country.
Like Carnegie, John D. Rockefeller also accumulated enormous amounts of wealth, although his money came through domination of the oil industry.
Beating the Competition
Rockefeller annihilated rival oil firms through committed competition, secret deals with railroad companies, fixed prices, and production quotas. He bought out competing oil refineries and managed all aspects of the operation, including drilling, refining, storage, and distribution. Before long, Rockefeller’s Standard Oil Company controlled a majority of the nation’s oil industry. Like Carnegie, Rockefeller publicly supported a number of philanthropies, yet privately domineered over his workers and bitterly fought their efforts to organize and unionize.
The Second Industrial Revolution fueled the Gilded Age, a period of great extremes: great wealth and widespread poverty, great expansion and deep depression, new opportunities, and greater standardization. Economic insecurity became a basic way of life as the depressions of the 1870s and 1890s put millions out of work or reduced pay. Those who remained in the industrial line of work experienced extremely dangerous working conditions, long hours, no compensation for injuries, no pensions, and low wages. But for a limited minority of workers, the industrial system established new forms of freedom. Skilled workers received high wages in industrial work and oversaw a great deal of the production process. Economic independence now required a technical skill rather than ownership of one’s own shop and tools. It was labeled “progress” by its proponents, but those who worked the floor at the factory knew it came at a price.
This article helps answer “What were the effects of the Second Industrial Revolution?” Themes: causes of the second industrial revolution, railroads, economic insecurity, industry, modes of production, positive effects of the second industrial revolution, negative effects of the second industrial revolution, second industrial revolution inventions, the gilded age, wealth, poverty, wealth disparity, oil, Rockefeller, Carnegie, technological advancements of the second industrial revolution, transportation, when was the second industrial revolution | <urn:uuid:c893679f-1c15-42d5-af58-8478aaa55ea7> | CC-MAIN-2022-33 | https://ushistoryscene.com/article/second-industrial-revolution/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00604.warc.gz | en | 0.959441 | 2,129 | 3.921875 | 4 |
By Tygue Lopes
Instructor Danny Wyatt
Leeward Community College-Wai’anae
[Note from the instructor: The assignment was for students to write a research paper using their three previous essays as a basis. The topic is “Bullying,” and it started with a video on bullying I showed to the class. They then wrote a cause/effect essay concentrating on the effects of bullying. The second essay was to examine why people (kids) bully one another — looking at the process that kids go through when they become bullies. The final paper was a persuasive essay on what should be done to address this issue: put all three together, cite them, develop the cited idea, and “voila” they have a research paper (more or less). -Danny Wyatt]
Teens today face many problems while becoming adults. They face problems such as peer pressure, drug abuse, self-esteem issues, and bullying. Aside from these other problems, bullying seems to be one that is growing constantly as time goes by. Bullying is also an issue that has no definite solution till this day. In fact, “In 2012 Obama committed $132 million towards anti-bullying efforts in schools.” Even with the amount of money spent, it’s apparent that there is still work to be done. The huge eye-opener with bullying is that children are taking their lives and the lives of others because of the mental abuse that comes with this issue.
According to “Alarming Bullying Statistics”, around 50% of teens have already been victims of cyber bullying. This is half of the student population not including other forms of bullying. This means 5 out of every 10 students in schools experience mental abuse just from what they are exposed to on the internet. Overall, “77% of students are being bullied whether physically, mentally, or verbally.” Other alternatives toward solving this problem in our country should be tested. The solution should not be something that is short term it should be one that will greatly reduce bullying and it’s sometimes harsh effects.
Making friends isn’t so easy for kids sometimes. In usual cases kids find at least one person that they can relate and connect too. But for the kids that aren’t so lucky, vulnerability to bullying is a serious issue. The ones who are loners without any friends or anyone to talk with in school are prime meat for bullies. Bullies see these kids as easy targets especially when they don’t stand up for themselves. As other kids see this one targeted kid getting harassed, the normal reaction seems to be joining the actions of the bully. In result, the poor kid is shunned from all others and is left alone year after year.
In some cases other students find it different to be intelligent. The kids classified as “geeks” are looked down upon because of their higher intellect. This leads to misunderstood kids picking on these geeks. Other kids could also get jealous because they aren’t as smart as they wished. So the only way to get rid of this frustration is to pick on the kids who have what they want. Geeks become a part of this shunned group.
On the other hand there are outsiders that aren’t victims of bullying; they are the bullies. Kids that are overachievers and talented in areas such as sports are usually the ones who are victimizing others and causing emotional harm. Many of these kids believe that they are better than all of their peers. They think that their way of doing things is the only correct way of doing it. When situations don’t go in their favor this is when other kids get bullied. These overachievers usually have the mindset that only they matter in life.
A majority of the times, bullies like to target the kids that stand out from everyone else such as the ones that come from a different culture that is uncommon in the place of residency. For example, in Hawaii the children who are instantly looked at as outcasts are of Micronesian decent. In addition to most of them being of lower income, just the fact that they aren’t from here leaves them vulnerable to bullies. Micronesians are the “new kids in school.” Other cases of bullying include the victim being smaller than the bully making them an easy target. A bully can feel better by man-handling the smaller child. Bullies also know that the defenseless child will most likely not fight back and make it easier. For instance, in Waianae High School some bigger kids threaten smaller kids. This doesn’t mean that they want to actually follow through with the threats, so they find a kid that is smaller who looks like he or she will not retaliate. This
gives the bully the satisfaction without getting hurt themselves. Aside from physical attributes, bullies like the pick on the kids who are different academically. The kids who excel in school can be easily sought out. There was this boy John who was ahead of his class in almost every subject. After a few days of answering all the questions asked by the teacher, students started to hassle him. It got to the point where he got yelled at and called names by other students when something came out of his mouth. These acts of bullying usually have emotional consequences on the victims.
When a victim of bullying puts themselves into a bubble they basically start to give up. What can make this even worse are the bullies feeding on these emotions. The harassment gets worse and worse while the victim slowly loses grip on reality. When other kids see this happening they tend to join in instead of going against this act. This happened with the boy John; other kids felt the need to yell at him just because their peers were doing it. Overall the bullying continues and the problems get more severe.
As the problems get severe the victims find ways to deal with the mental, physical, and emotional pain. Some of them become numb to the environment around them. When kids hit this certain point it can have drastic consequences.
In some cases bullying turns the victim into a bully themselves. Since they were bullied they feel like it’s only fair that it’s done to others. Other kids take it harder than most. They begin to cry more often. Having the thought that they are alone in life, and ultimately start skipping school altogether. At this point, the kids try to seek help from their authorities which does not always give a solution to the problem. In the video “Bully”, Fish-face and his family talked to the principal about bullying on the bus. The principal deemed that this was normal and
sort of brushed it off. When the people that these kids turn to fail, it causes these kids shelter themselves from the world.
The end result of bullying can either end good or bad. Sometimes the victims find someone that they can confide into and it makes life better for them. Or sometimes the bullies find something better to do or simply give up. John just stood up for himself and told everyone that he did not care what they thought of him. Then over time his peers found it pointless to harass him because it had no effect. On the other hand, some kids find the solution in revenge.
They want the people who caused the pain to feel the same way they did or even worse. School shootings are great examples of victims seeking solution in the pain of others. The Columbine school shooting resulted in the horrible deaths of others and the victims themselves. The two boys planned to kill their peers and in addition take their own lives. Amanda Todd is another example of bullying going too far. In her case she just couldn’t take the pain anymore and decided to take her own life. She failed to do so a few times before succeeding. Sometimes pushing a problem aside is not the answer.
According to statistics reported by ABC News, 160,000 kids stay home from school every day because of fear of bullying. Many of these kids will attempt or contemplate suicide at one point in their lives. The ones that do succeed in taking their own life leave an empty void in their families. Parents of these kids have to live with not knowing the answer towards their child’s actions. Many parents go through emotional rollercoasters because of their child’s decision to take their own lives. For example, Rebecca Sedwick at only 12 years of age decided to take her own life as a result of being repeatedly bullied. Her mother said “Even when she’s gone, the bullying online still continues, I just don’t understand.” Rebecca’s mother
constantly sees kids talk about her daughter with no respect. Kids even announce that they are happy Rebecca died. In fact, there was also a speaker that came to Waianae High School to talk about bullying. He had lost his daughter in a school shooting that was a result of bullying. Although, His daughter was not a victim of bullying, she still lost her life because of it. He has dedicated his life to stop the ongoing problems with bullying. No parent should have to go through this kind of pain. If the younger generation were exposed more to the feelings of these parents and the stories they have, maybe it would have a greater impact than the solutions being suggested today.
Educating kids about bullying at younger age seems to be the best shot at changing these cruel acts. Children who are in elementary are still developing and can still be molded into something different. They are still being taught right from wrong compared to high school students already set into their ways. When anti-bully speakers went to Waianae High School they made a big impact, but that impact only lasted for two days maximum. The young adults already have a good idea of what is moral and what is not to them. It is too late to change the older generation.
The use of assemblies is a very effective way to get the message about bullying to students. The only downside to this strategy is there are not enough assemblies throughout the year, having an assembly only once a year does not instill a clear message in the minds of students. Most forget about this event in a matter of days. More efforts should be made into planning more of these assemblies to keep the effects of bullying in the back of students minds. There should also be meetings with the parents of the victim and the parents of the bully where they have a chance to speak to each other about the issue. If the problem cannot be resolved by
both parties then higher authorities should be called such as the police. This would ensure kids either stop or pay for their actions.
In the article “When your kid is the bully” by Treena Shapiro, Shapiro’s reaction to her son being a bully was to monitor him more closely. She made her son add her on Facebook and also cut his time spent on the computer. By doing so Shapiro could regulate what her son was saying and doing online. She also reduced the influence of her son’s peers by keeping him off of the internet for long periods of time. From what she has observed, her son has been behaving a lot better and there have been no complaints from the school or others. Perhaps if more parents adopted this sort of policy with their child, it would have a greater impact on the struggles with stopping bullying.
Bullying is a tough issue that does not have any easy way to solve, but the problems that bullying is causing is very clear. Young kids are taking their lives and causing parents like Rebecca’s mother to go through a lifetime of unnecessary grief. More efforts should be made such as assemblies and family meetings. Bullying is a serious problem that needs to stop.
In America we as people have the right to the pursuit of happiness. This means that others cannot decide what the purpose of one’s life is nor make choices that constrict them from what makes him or her happy. Bullying goes completely against this right and it is astounding that some people do not realize this. Perhaps educating the younger generation about the rights we have as humans can help reach out to some kids and having some impact even if it’s little.
There are many different approaches to this serious issue. It can be argued that a large amount of money is being spent on the prevention of bullying. To some people this is not helping the growing problem as much as it needs to be. Perhaps focusing on prevention towards bullying is not the only probable answer. Other alternatives such as simply educating an individual about the effects associated with bullying and for example Treena Shapiro’s method of monitoring her child is a much better way to go about this problem. Whether a permanent solution found or not, bullying is still a problem that’s happening. Kids are harming themselves and others over the physical, mental, and emotional abuse caused by their peers. It is crystal clear to anyone that something needs to be done soon.
“Alarming Bullying Statistics in the USA.” Bullying Facts Bullying Definition Bullying Articles. BullyingFacts.info , n.d. Web. 27 Nov. 2013.
“Alarming Bullying Statistics in the USA.” Bullying Facts Bullying Definition Bullying Articles. N.p., n.d. Web. 27 Nov. 2013.
Bully: PG13 Version. Lee Hirsch. Weinstein Company Movie. 2011. Film.
“Bullying and Suicide.” – Bullying Statistics. Bullying Statistics, n.d. Web. 2 Dec. 2013.
Gregory, Corinne . “Obama commits $132M to anti-bullying — what will that mean?.” Corinne Gregory RSS. Corinnegregory.com, 16 Feb. 2011. Web. 26 Nov. 2013.
Laithwaite, Carolyn. “How a Bully Targets.” Life After Adult Bullying. N.p.. Web. 25 Oct 2013.
Sha. “The Most Common Problems Teenagers Face Today.” YurTopic. YurTopic, 2 June 2013. Web. 27 Nov. 2013.
Shapiro, Treena. “When your kid is the bully”
“Two young girls arrested in case of bullying that led to suicide.” Anderson Cooper 360 RSS. N.p., n.d. Web. 27 Nov. 2013. | <urn:uuid:f3ec7795-0c78-444a-b1b3-7187395d5193> | CC-MAIN-2022-33 | https://kaleoonahaumana.wordpress.com/2014/02/02/bullying-5/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00605.warc.gz | en | 0.977694 | 2,989 | 3.59375 | 4 |
- 1 Characteristics and benefits of red meat
- 1.1 CHARACTERISTICS OF RED MEAT
- 1.2 What is red meat?
- 1.3 Properties of red meat
- 1.4 What type of fat does red meat have?
- 1.5 What important nutrients does red meat have?
- 1.6 Does meat have carbohydrates?
- 1.7 Vitamins and minerals provided by red meat
- 1.8 Which nutrient DOES NOT have red meat and is it important to consume?
- 1.9 Problems with red meat
- 1.10 Processed white meat (sausages, hamburgers, …)
- 1.11 Red meat for gout
- 1.12 Red meat does not contain as much fat as processed meat
- 1.13 Ecological impact of red meat
- 1.14 Comparison between the composition of red and white meat
- 1.15 Do meats contain hormones and toxins?
- 1.16 News about cancer and red meat
Characteristics and benefits of red meat
CHARACTERISTICS OF RED MEAT
What is red meat?
Red meat is one that comes from mammals, such as veal, pork, lamb, horse or goat.
Photo of red meatAs the name suggests, this meat is very red before cooking, and this is because it has a higher iron content. (Its main difference with white meat).
As an exception, rabbit meat is excluded (rabbit is a mammal, but rabbit meat is low in iron) and lean pork parts, like the spine, because they have a similar nutritional composition to white meat .
* Related: Is pork meat white meat?
Properties of red meat
Like all types of meat, red meat is rich in protein. They contain proteins because it is the muscle tissue (muscle) of animals, which is rich in collagen, muscle tissue fibers, tendons, and connective tissue.
Being a source of protein of animal origin, it provides proteins of high biological value, that is to say, that it does not present deficiencies of amino acids, as some vegetable foods do. Generally, proteins of animal origin are more bioavailable and therefore are better assimilated than proteins of vegetable origin, originating from cereals or nuts. This is due to the fact that the meat has a very high contribution in proteins, it does not have limiting amino acids nor does it contain antinutrients that hinder the assimilation of proteins.
What type of fat does red meat have?
The fat content of red meat can vary greatly depending on the part of the animal that is analyzed, from 5% in pork loin to 20% in fat present in pork ribs. The type of fat that the meat contains is mainly monounsaturated, it also has a high percentage of saturated fat and cholesterol.
Photo of red meat. Some parts are very greasy.
Due to different reasons, it is recommended to remove the visible fat from meat, which is where the cholesterol and toxins of the animal accumulate the most, especially if it is not known how it has been bred.
Also, removing visible fat is a way to lower calories and avoid ingesting fats that are not very healthy either. It is preferable to increase the consumption of other healthier fats, such as flax seeds, walnuts, avocado or chia.
What important nutrients does red meat have?
Moreover, animal fats in moderation provide important nutrients such as fat soluble vitamins, necessary and essential for metabolism, such as vitamin A, D, E and K. These vitamins are necessary for healthy vision, functions on the metabolism of calcium, for the good condition of the skin, to allow blood coagulation, etc.
Does meat have carbohydrates?
Meat is a very bad source of carbohydrates, it contains between 0 and 2%. Practically the meats do not contain carbohydrates.
Vitamins and minerals provided by red meat
Meat is rich in vitamin B. Both white and red meat are one of the foods richest in vitamin B, especially in terms of its content in niacin (vitamin B3) and in cobalamin (vitamin B12). B vitamins have many functions in the body as they are involved in almost all metabolic processes. They are necessary to have energy and in the case of vitamin B12, it is important to avoid anemia, along with the supply of iron..
Which nutrient DOES NOT have red meat and is it important to consume?
Meat is deficient in folic acid or vitamin B9, which is found in large quantities in foods of plant origin such as lentils, beans, chickpeas, sunflower seeds, green asparagus, avocados, almonds, or in broccoliHigh iron content of red meat
Differences between red meat and white meat
Problems with red meat
In case of problems of high cholesterol, obesity, diabetes or heart disease, it is recommended to avoid or reduce the consumption of red meat and increase the consumption of other foods rich in proteins such as legumes.
According to the studies, it has been observed that consuming a lot of red meat usually implies a higher risk of certain diseases.
Therefore, the recommendation that is usually given to people who eat meat is to consume more legumes, fish, eggs and white meat, and reduce red meat.
Differences of red and white meat
Processed white meat (sausages, hamburgers, …)
Because it has been seen that red meat in excess can be harmful, in recent times many industrial products have been prepared with chicken or turkey meat such as cold meats, hamburgers or sausages.
But these processed meats, although they come from white meat, are not healthy due to their high content of additives (nitrites and nitrates) and salt. A direct relationship between the consumption of processed meats and the increase of certain types of cancer has been demonstrated (more information).
Red meat for gout
Red meat is also the food that presents more purines and for this reason should be avoided in case of gout, hyperuricemia, fatty liver and obesity.
Red meat does not contain as much fat as processed meat
Photo of cow grazing. Grass animals have a better quality of meat than those of fattening animals that are raised to grow in a short time.
Although red meat may have more fat than other types of meat, it is not comparable to the amount of fat that processed meats provide, such as sausage, cold cuts, hamburgers or patés.
The fat content in processed meat is much higher than the fat provided by red meat (close to 60% in products such as chorizo).
That is to say, that in the sausage or industrial turkey or chicken burgers, although they are white meat, due to their processing, they may contain more fat than red meat (in addition to the additives such as nitrites and excess salt of the processed meat).
Ecological impact of red meat
Red meat, especially veal, consumes many resources and generates a lot of waste for the environment. The advisable thing would be to reduce the consumption of this type of animal, that require of great amount of grains, soybean, and pasture to be fed. This amount of food can supply much more population than the consumption of the animal’s own meat.
Ecological impact of meat
Comparison between the composition of red and white meat
All food composition tables vary slightly from one to the other. The following table shows the composition of chicken meat and veal fillet:
|Nutritional composition of meat per 100g|
|Thiamin (vitamin B1) (mg)||0,11||0,05|
|Riboflavin (vitamin B2) (mg)||0,21||0,12|
|Niacin (vitamin B3) (mg)||12,13||6,73|
|Pyridoxine (vitamina B6) (mg)||1,57||0,65|
|Vitamin B12 (mcg)||0,21||1,27|
|Vitamin D (UI)||1||–|
= Indicates high content in this nutrient
= Foods of animal origin do not contain fiber (of vegetable origin). It is recommended to combine these foods with vegetables and fruits.
Do meats contain hormones and toxins?
Animals bioaccumulate substances in their fats, such as heavy metals, drug residues, pesticides and hormones. Many people think that after these components are ingested in the diet through meat.
Photo of bacon. Eating processed meats regularly is associated with an increased risk of cancer
This is partially true: the analyzes show that in meat that is marketed, these substances are kept under parameters that are considered to be safe, regulated by legislation. Therefore, it is true that animal fat contains certain quantities of these substances, although in quantities that health organizations do not consider harmful.
In the United States the use of growth hormones is allowed and these components can be found in the meats, producing a weight gain of the animals due to the steroids administered (they increase the retention of water), but the use of these hormones is not allows in Europe.
News about cancer and red meat
In October 2015, a WHO communiqué through its agency International Agency of Research on Cancer (IARC) classified processed meat as carcinogenic, and placed red meat as a possible food related to cancer.
In what has been shown a direct relationship between the consumption of processed meats and cancer. Processed meat can be either red meat or white meat: chicken or pork sausages, turkey burgers, veal, etc., frankfurters, sausages, pâtés, cold meats, etc.
More information on nutrition.
22 April, 2019 | <urn:uuid:577f0652-6b36-4faf-8be8-038c980e4c39> | CC-MAIN-2022-33 | https://www.botanical-online.com/en/food/red-meat-properties | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00000.warc.gz | en | 0.945578 | 2,224 | 3.5 | 4 |
Written in EnglishRead online
|Other titles||Carey"s general atlas|
|Contributions||Guthrie, William, 1708-1770, Lewis, Samuel, 1753 or 1754-1822, Barker, W. (William), active 1795-1803, Scott, Joseph (Geographer)|
|LC Classifications||G1015 .C26 1795|
|The Physical Object|
|Pagination||1 atlas ( leaves (some double, some folded)) :|
|Number of Pages||45|
|LC Control Number||2003623097|
Download The general atlas for Carey"s edition of Guthrie"s Geography improved
"Engraved for Carey's American edition of Guthrie's Geography improved." In upper left margin: map 13 in his Carey's general atlas. Philadelphia: Mathew Carey, Product information Package Dimensions 18 x 1 x 1 inches Item Weight 2 ounces.
Carey's Atlas was originally issued in to accompany the American edition of Guthrie's Geography Improved, and it was subsequently issued into the early nineteenth century. Mathew Carey, an Irish immigrant, stands at the forefront of American cartography, for he established the first American specialized cartographic publishing firm.
Contemporary sheep-backed marbled paper covered boards worn, spine split An important early American atlas. Following the Revolution, there was considerable activity in the United States by American mapmakers and publishers. One of them, Mathew Carey, was a pioneer in producing cartographic works In Carey published The General Atlas for Carey's Edition of Guthrie's.
It is NOT Goode's World Atlas that I used in college physical and economic geography courses decades ago, but it is a 6th Edition with a copyright. It is very current in a rapidly changing world of political geography and country name changes/5(72). Guthrie's universal geography improved [microform]: being a new system of modern geography, or, a geographcial, historical and commercial grammar, and present state of all the several kingdoms of the world containing, I.
an account of the figures, motions and distances of the planets, according to the Newtonian system, and the latest observations. About this Item: George Philip, London.
4to, orig brown cloth,no date but circa 18 maps, some of book is loose, first map has tape mark down inner join.1 map missing, 8 maps clear rest have some notations on and some ringing of palaces, a few maps have a little some have a bit more, apart from the markings the maps are in good condition, priced accordingly.
taken chiefly from surveys by Gen’l D. Smith & others. J.T. Scott sculp. Engraved for Careys American edition of Guthries Geography improved: Philadelphia: SOLD M Map of North and South Carolina THOMAS & ANDREWS, DENISON, J.
"By J. Denison Doolittle Sculp" From the Third edition of Jedidiah Morse's American Universal Geography. Title: The Russian Empire in Europe and Asia Size: 16in x 14in (mm x mm) Condition: (A+) Fine Condition Date: Ref #: Description:This large original copper-plate engraved antique map of the Russian Empire in Europe & Asia was engraved by.
Pore over each of the world’s continents with this entertaining atlas and piece jigsaw, with hundreds of animals, landmarks and attractions to spot and talk about. The sturdy box contains a vividly illustrated piece jigsaw of a world map, plus a page picture atlas (also sold separately as Atlas of the World Picture Book and Sticker.
General Geography In Diagrams book. Read 4 reviews from the world's largest community for readers/5. The Advanced Atlas of Modern Geography- Text Edition book.
Read 3 reviews from the world's largest community for readers. As becomes a new age, this is a 4/5. You searched for: geography books. Etsy is the home to thousands of handmade, vintage, and one-of-a-kind products and gifts related to your search.
No matter what you’re looking for or where you are in the world, our global marketplace of sellers can help you. Hardcover.
Condition: Good. 1st Edition. Please feel free to request a detailed description. Short description: Atlas geographical Ussr Soviet high school Geography\Atlas geografiheskiiy Sssr Sovetskaia sredniaia shkola Geografiia, n/a, We have thousands of titles and often several copies of each title may be available.
Atlas (geography) synonyms, Atlas (geography) pronunciation, Atlas (geography) translation, English dictionary definition of Atlas (geography). Greek Mythology A Titan condemned by Zeus to support the heavens upon his shoulders. A book or bound collection of maps, sometimes with supplementary illustrations and graphic analyses.
Geography - General & Miscellaneous. 1 - 20 of results Atlas of World Geography. by Rand McNally. Paperback $ Add to Wishlist.
Read an excerpt of this book. Quickview. Landmarks. by Robert Macfarlane. Paperback $ See All Formats. Publish your book with B&N. Learn More. - Atlas of World Geography - Best Buy Rand McNally's Atlas of World Geography provides engaging and richly illustrated geographic information for secondary students from grades Thematic maps, graphs and charts help present a more complete portrait of our physical and political world.
The first American edition, A New System of Modern Geography printed for Mathew Carey, owes much of its expansion to the bookseller John Knox.
Evidence for Inclusion in Wythe's Library. Listed in the Jefferson Inventory of Wythe's Library as Guthrie’s geography 2.v. 4to. This was one of the titles kept by Thomas Jefferson.
He later sold a Author: William Guthrie. - Buy National Geographic Atlas of the World, Tenth Edition book online at best prices in india on Read National Geographic Atlas of the World, Tenth Edition book reviews & author details and more at Free delivery on qualified orders/5().
National Geographic Atlas of the World, Ninth Edition showcases the Earth in stunning detail, through a magnificent collection of world, continental, and regional maps that represent up-to-the-minute political hout the Ninth Edition, state-of-the-art cartographic technologies and thousands of updates deliver accuracy and quality.
Innovative new physical and thematic sections 3/5(1). APA citation style: H.H. Hardesty. () Historical hand-atlas, illustrated, containing large scale copper plate maps of each state and territory of the United States, and the provinces of Canada, together with a complete reference map of the world, topographical and railroad map of the United States, thirteen comprehensive maps of bible geography : outline maps and histories of Wood and.
Buy a cheap copy of Atlas of World Geography book. Few markings on cover. All pages intact. No writing or highlighting on pages.
In excellent condition. Free shipping over $/5(1). Geography Books and Atlases. This is a Small Selection of our Huge Inventory of Antique Geography Book and Atlas Prints. Additional inventory is available. Lowest Prices. Contact us with your request.
home order. geog:KING'S ELEMENTARY GEOGRAPHY. Primary Atlases and Geography As the publisher of some of the most trusted atlas resources, Collins offer primary atlases ideal for engaging young learners in the world and teaching them atlas and map reading skills.
Highly illustrated with clear pictorial symbols, they provide the ‘hook’ for a. Guthrie, William, Guthrie's universal geography improved [electronic resource]: being a new system of modern geography, or, a geographcial, historical and commercial grammar, and present state of all the several kingdoms of the world containing, I.
an account of the figures, motions and distances of the planets, according to the. Rand McNally's Atlas of World Geography provides engaging and richly illustrated geographic information for secondary students from grades Thematic maps, graphs and charts help present a more complete portrait of our physical and political world.
Atlas of World Geography features: 85 pages of detailed physical and political maps. First Picture Atlas - Oversize Children's Book with Pull Out Map - Young Readers - Kingfisher First Edition - Vintage Geography Book notesfromtheattic 5 out of 5 stars () $ $ $ (10% off).
About the Atlas. Over eighty years after it was originally published, Charles O. Paullin’s Atlas of the Historical Geography of the United States remains one of the most impressive and most useful atlases of American history.
Containing nearly individual maps spread across plates, it. Buy a cheap copy of National Geographic Reference Atlas to book.
The National Geographic Reference Atlas to the Birds of North America combines stunning full-color photographs, the latest maps, and authoritative information into Free shipping over $/5(3). National Geographic Concise Atlas of the World, 4th Edition by National Geographic,available at Book Depository with free delivery worldwide/5(49).
Global Edge - general region, country and US state description, information, statistics and news. Similar to the CIA, but more education-related resources. - World Geography - definitions and physical geography features (mountains, earthquakes, etc.) of the world.
Travel the World in Maps 50% Off All Items thru June 30th. Maximum discount of $2, per item. Discount not applicable to consignment items. atlas, in geography, collection of maps or charts. It usually includes data on various features of a country, e.g., its topography, natural resources, climate, and population, as.
Specail; index after each map. The fourth edition with each map updated to reflect the ever changing speed of the changes taking place in the industrail age. Dedication page to Queen Victoria. Each map as an adjacent index bound in and a prospectus for the companion book to the atlas is bound in at the front [Atlas Geographicus' pub.
separately]. IAS Geography Optional Booklist for UPSC civil services examination - Get booklist for Geography Optional topics like Human Geography, World Geography- GC Leong for Human Geography, Majid Hussain for Indian Geography, etc. Download Geography booklist PDF for IAS Exam.
For UPSC preparation, follow BYJU'S. Buy New Concise World Atlas 5th ed. by Oxford University Press (ISBN: ) from Amazon's Book Store. Everyday low prices and free delivery on eligible orders/5().
Rand McNally Paperback Atlas of World Geography features more than 65 highly detailed physical and political maps, along with thematic maps that show plate Brand: Rand McNally. National Geographic's classic atlas for kids is now fully revised and updated, with a reduced trim that makes it easy to carry and easy to browse.
Complete with geo-themed games, crosswords, picture puzzles and more, this is the atlas for today's young explorers, as well as the perfect homework reference source/5(95).
Rand McNally Paperback World Geography Atlas Teacher's Guide includes 38 reproducible, two-page student activities for teacher-directed activities, independent classroom work or homework.
Atlas measuring /4 x /4 inches is designed to increase the student's ability to obtain and interpret information with the help of maps, tables, graphs Brand: Rand McNally.
Buy National Geographic Concise Atlas of the World, 4th Edition 4th ed. by National Geographic (ISBN: ) from Amazon's Book Store. Everyday low prices and free delivery on eligible orders/5().
This map was published by Mathew Carey, Philadelphia, in several other publications including: The General Atlas for Carey's Edition of Guthrie's Geography Improved No.
33; Carey's General Atlas, PhiladelphiaMap 33; and Carey's American Atlas, PhiladelphiaNo. A varient of this map dated circa is listed in Wheat. The Atlas to Guthrie's System of Geography, engraved plate of armillary sphere, 28 hand-coloured in outline engraved maps (double-page or folding), initial double hemisphere world map a little stained in margins, contemporary diced half calf, folio ( x mm.), G.G.
and J. Robinson and J. Mawman, © Usborne Books at Home Canada. Website by Semantic. Access Keys 0 - Access keys 1 - Home 2 - Your business 3 - Sell books 4 - Meetings 5 - Incentives and rewards 6 - Consultant tools 9 - Site map S - Skip navigation (go straight to main content).
- Buy National Geographic Answer Book: 10, Fast Facts About Our World book online at best prices in India on Read National Geographic Answer Book: 10, Fast Facts About Our World book reviews & author details and more at /5(14). | <urn:uuid:cea4d95a-2e93-4506-8e4c-341c0f931310> | CC-MAIN-2022-33 | https://hydanamevuhis.oazadlaciebie.com/the-general-atlas-for-careys-edition-of-guthries-geography-improved-book-7921gb.php | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00403.warc.gz | en | 0.873798 | 2,761 | 2.578125 | 3 |
EP 10 – Dealing With Anxiety on Social Media – Tips for Parents with Kids and Teens
Anxiety on social media is by far one of the most detrimental aspects of social media. Especially for teens and kids. During the pandemic, the number of teens and kids who started using social media skyrocketed. The tools social media provides are great for increasing communication and friendship between kids there’s also a lot of immaturity that comes with it.
By Sarah Potter
April 28, 2021
Anxiety on social media is by far one of the most detrimental aspects of social media. Especially for teens and kids. During the pandemic, the number of teens and kids who started using social media skyrocketed. The tools social media provides are great for increasing communication and friendship between kids there’s also a lot of immaturity that comes with it. And this week’s episode, Sarah interviews Amanda Penny, a podcaster from the show Amanda‘s World.
The excessive use of social media over the years has left people with a higher level of anxiety, depression, isolation, and FOMO. Changing our habits in order to create a more sustainable version of ourselves online is a key aspect of this week’s episode. But we also talk about how social media plays a role in not just our own mental health but those of teens and kids.
I sat down and spoke with Amanda from Amanda‘s World. She’s a 16-year-old ADHD New Yorker with her own podcast. She’s quite an impressive individual and definitely gives me a lot of inspiration for how far so many of us can go when we set our minds to things. My interview with Amanda not only did I focus on how she started this podcast of hers and what she talks about in the people she’s met, but I also try to understand a little more about how she manages her own self on social media.
Check out the full interview with Amanda here:
Teens are subjected to cyberbullying at an alarming rate. According to the Pew Research Center, “59% of US teens have been bullied or harassed online, and a similar share says it’s a major problem for people their age. At the same time though, teams mostly think teachers, social media companies, and politicians are feeling at addressing this issue.” And they’re absolutely right, so that then makes me as a mother feel that this responsibility of ensuring the well-being of teens and kids on social media falls on us. There are so many types of cyberbullying issues online.
For example, let’s look at our own high school experiences. How often were you name called? How often did you hear false rumors spread about you? How many times did you receive explicit images that you didn’t ask for, not just from your peers but from other gross adults? How many times were you harassed by adults and peers about where you were, what you were doing, who you were with, and what you were wearing? Let’s take this a step further into the selfie generation: how many people experienced having explicit images of themselves shared with their school peers or others? Now take that online. The number of times an explicit image of a teen is shared online is exponential compared to the number of times an explicit image of a teen is text messaged. their peers and other adults constantly targeted 60% of high school girls on the Internet for harassment. 63% of teens say that the Internet and social media are an enormous problem affecting people their age.
60% of girls and 59% of boys have all experienced at least one type of the six online abusive behaviors. So being able to speak with Amanda about her experiences with cyberbullying and her own experiences of just being a general online user was really eye-opening. She not only focuses on curating and creating an online experience that makes her feel safe, but she also encourages her friends to do the same.
Amanda not only blocks people who harass her, but she also blocks some of her friends and a huge number of individuals from her school whom she knows she may have communication issues with online. She mentions that it’s nothing personal, she’s just trying to do her part in protecting her own mental health. We may think as adults that teenagers are not awake enough to online bullying, but my interview with Amanda is absolutely contrary to this belief.
Are used to work as a youth group leader and a youth program’s director when Fox was a baby. This experience taught me so much about how teens can handle and how they aren’t able to handle interactions online. Much of the issues that we discussed with many of the teams in our program were things happening on Instagram, or rumors being spread on Facebook. And even worse, explicit images being shown on Twitter.
The average teen over the last eight years has created and adapt to the changing scenes on social media and have been able to create alternative ways to protect themselves. As adults, we cannot underestimate the intelligence of our teams. They know what to do and what not to do online. But they also don’t have a lot of trust for their parents in discussing the issues they encounter on social media or online. It is up to us as adults to teach our younger kids how to handle these situations and the proper ways in which to have these discussions with us. We need to build trust with our children with social media so that they can come and share any potentially harmful situations they encounter. Without this trust between parents and child cyber bullying will continue to be a problem.
Ali and I have two very different perspectives with the use of tablets and technology with our kids. Ali is in the camp of not allowing her kids to use tablets pretty much at all. There may be some points in time where her kids can use a tablet, but ultimately their time is incredibly limited.
I am in the camp of allowing my kids to experience technology and use it to the extension which my husband and I deem appropriate. Right now we have our kids set up with three-hour limits on their tablets. That three-hour limit really only applies to some of the more game-based apps and video watching apps like Netflix. So essentially they could watch a movie, or they could play Minecraft for a few hours. After that we switch them over to the educational only based content and apps that we allow on their tablets.
Recently with the pandemic we allow her kids to have Facebook messenger for kids. This allows them to keep in contact with cousins and friends no matter how isolated they may have to be at any point in time. It’s been really helpful in continuing to bridge bonds between them and their friends. However, our daughter has had some struggles with understanding how to message people appropriately.
She likes to play Minecraft. It is absolutely her most favorite thing to do. And it often impedes her being able to communicate with her cousin. Her daughter will go a few days without interacting with her cousin or letting her know what’s going on. This doesn’t just apply to a small child, but to adults too. We don’t like to be ignored; we want to be validated, and we want to have proper communication within a reasonable amount of time. Kids just don’t understand that because kids want to do and play the things that they want to do. So helping our daughter understand how she should communicate in the time she should use to communicate with others, it’s something that we’ve taken on as a priority.
In this episode we go over so many tips and tricks that Ali and I have both used with helping our kids and any teens we’ve encountered manage their mental health on social media and how to manage their time with technology. Check out this week’s episode by listening to the clip above or click below to tune in.
Other important links to look into:
FIND MORE ON SOCIAL
Sarah Potter & Alli Paolone
Meet Sarah and Alli, two social media marketing consultants and digital experts who've been foraging their way since the early 2010's. This dynamic duo sasses the social media industry and sets some unspoken rules straight in this podcast on marketing, life, and all the therapy social media marketer workers need.
"We’re not here to tell you how to do your job, we’re here to validate the shit out of what you’re doing and reinforce the unspoken ground rules of social media workers everywhere," says Sarah–known for her bold and brash approach to social content.
This podcast is for more than just social media workers too. Social Media therapy is here for everyone worn out and burned by the ever-changing algorithms and forced sense of care about social platforms, and the social media rat race.
Show us some love and tell us what you're diggin' on the show.
Have a Question?
Send us an email with your social media questions and we'll answer them at the end of each show.
Wanna be on the show?
OTHER CONTENT YOU WILL ENJOY
MARKETING Why I Am Deleting My Instagram Account With Over 6,000 FollowersI am deleting my Instagram Account with over 6K followers, yes I feel great about it, no I don't feel I will regret it. This article explains it all.By Sarah Potter March 23, 2021I received a...
You Don't Need 10,000 Followers on Instagram. Here's Why First of all let’s break the wheel behind the idea that you need to have million followers. The fact is that you don’t. What you need or highly engaged followers who convert easily to your email list....
How To Manage Life When You're A Social Media Marketer During the Twitter chat a while ago, someone said something interesting to me. “How do you take a break from social media when it’s your job?” The answer is honestly not simple. It can be tough to take a break...
Need to get in touch? Email me with your questions/comments or information. Solicitors are screened and will be sent into the Sarlaac pit. | <urn:uuid:ef04f3b1-4e35-4fa6-a80b-9f2c8a6b8200> | CC-MAIN-2022-33 | https://motherofmarketing.co/ep10/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00404.warc.gz | en | 0.964566 | 2,214 | 2.609375 | 3 |
- Sudden unexpected death in epilepsy (SUDEP) can be defined as: 1) a patient with epilepsy unexpectedly dies; 2) no cause of death is identified at autopsy.
- Early death rates are higher in patients with epilepsy compared to the general population. Most early deaths in patients with epilepsy are due to the underlying disorder, such as a brain tumor or stroke, and not due directly to the epilepsy.
- Seizure related accidents can result in death in patients with epilepsy. Motor vehicle accidents or drowning are tragic examples.
- SUDEP occurs more often in patients with poorly controlled seizures. Sudden death rates in patients with frequent generalized tonic-clonic seizures are higher compared to the general population.
- Risk factors for SUDEP include: frequent and severe seizures, intellectual disabilities, brain lesions such as stroke or tumor.
- Recommendations to prevent SUDEP:
- Educate patient and families.
- Optimize seizure control.
- Most patients with epilepsy are expected to live long full lives, especially if seizures are well controlled and the patient is otherwise in good health!
Epilepsy doctors are being encouraged to discuss a topic with patients and families that is very difficult, emotional and important. The topic is sudden unexpected death in epilepsy (SUDEP).
SUDEP can be defined as:
- A patient with epilepsy who dies unexpectedly.
- No cause for death is found at autopsy.
24 year-old male who had a history of uncontrolled seizures since infancy. Seizure types included generalized tonic-clonic seizures (= grand mal seizures) and tonic seizures (brief stiffening seizures). The patient had intellectual disabilities. He was able to work stocking shelves at a local grocery store. He enjoyed bowling and watching movies. He was very social- he loved going to stimulating events such as parties or to the state fair. He smiled and laughed easily. Other than epilepsy and intellectual limitations, he was healthy. One day, he became ill and vomited up his seizure medications. He went to sleep early that night. Tragically, he was found dead in bed the next morning. There was evidence of a seizure—he had bitten his tongue and was incontinent of urine. An autopsy was performed. A medical cause for the death was not identified. The death certificate indicated cause of death: sudden unexpected death in epilepsy.
INCIDENCE AND RISK FACTORS FOR SUDEP
Fortunately, SUDEP is an uncommon occurrence. However, it is a tragedy that does occur, and families are far too often unprepared. Families who have lost a loved one have expressed great disappointment in having never been told about this well documented phenomena. Families consistently indicate that if they had been educated about SUDEP, they would have been better prepared for the tragedy. Health care providers need to discuss this important issue with patients and families. Although death is not easy to talk about, it clearly is an important conversation to have.
It should be noted that patients with epilepsy do have a greater risk of early death compared to the general population. The increased risk is usually not directly related to the seizures, but rather to the underlying cause of the epilepsy. For example, patients with brain tumors and epilepsy usually die from the tumor, not from the epilepsy. Although the incidence is not high, some patients can die more directly from their seizures- for example due to drowning, crashing a motor vehicle or very prolonged and intense seizure activity (= status epilepticus).
It should be stressed that patients who do not have an underlying disorder that will shorten their life (such as a tumor or stroke, for example) can be expected to live a full life span. As noted above, accidental injuries are more common in certain patients with epilepsy- thus appropriate precautions should be taken to keep a patient safe—for living a long and full life.
The rate of sudden death in the general population < 45 years of age is estimated at 0.05-0.1/1000 person-years of follow-up (Nashef, 2008) . In comparison, patients with epilepsy whose seizures are not controlled have been found to have SUDEP rates of 1-6/1000 patient years of follow-up. If you compare these numbers, you can see that patients with poorly controlled seizures have several times the risk of sudden death, compared to the general population. The more severe the seizures, the higher the incidence of SUDEP. For example, studies have demonstrated that patients who continue having seizures despite several seizure medication trials and who even fail epilepsy surgery are at relatively higher risk of SUDEP (4.5-6/1000 patient years of follow-up). Interestingly, epilepsy surgery, if it controls the seizures, appears to be effective at reducing the risk of SUDEP. Patients who have had epilepsy surgery have been followed long-term (Stavern, Epilepsy Res, 2005). Those who are seizure free after the surgery have the same incidence of sudden death as the general population.
Several studies have looked at clinical variables that are associated with a higher risk for SUDEP (Nashef, 2008/Walczak, Neurology, 2001). A summary of important clinical characteristics associated with SUDEP:
- Severe epilepsy
- Frequent generalized tonic-clonic seizures (= grand mal seizures)
- Abnormal EEG
- Male gender
- Intellectual disabilities
- Alcohol abuse
- Brain lesions (tumor, stroke, other)
- Not being compliant with seizure medications
- Being on multiple seizure medications
WHAT CAUSES SUDEP?
Patients who have died of SUDEP typically are found in bed. In one study evaluating 135 SUDEP patients, two thirds of patients died while in bed (Langan, JNNP, 2000). The patient had typically gone to sleep the night before, with no issues to forewarn of the impending tragedy. How exactly the death occurs is currently an area of active research. Patients may be found with evidence of having an intense seizure- for example, tongue bite or urine incontinence may be noted. Although most SUDEP cases are not witnessed, when SUDEP is seen, seizure activity has often been described to occur at the time of the death. It is known that intense seizure activity can disrupt respiratory function and cause cardiac arrhythmias. Most experts suspect that intense seizure activity triggers cardiac or respiratory arrest—which then results in the death of the patient. Causes other than seizure activity have been postulated. For example, cardiac arrhythmias due the affects of seizure medications or due to brain pathology have been suggested.
RECENT ARTICLE SUPPORTS: BETTER SEIZURE CONTROL, LESS CHANCE FOR SUDEP
A recent article examined all SUDEP cases in a large number of randomised antiepileptic drug (AED) studies (Ryvlin, Lancet Neurol, 2011). What the authors did was a thorough review of the literature to find essentially all randomised AED studies that met their inclusion criteria. They found 112 studies that met their criteria. The authors then reviewed each of these studies to see if any patients in the study died of SUDEP. They identified 20 cases of SUDEP out of all these studies. Remember, patients can die during the course of a drug study. Sometimes, they may get in a car accident. Some may have a heart attack. Some patients may die of SUDEP. If a patient has died during a drug study, the reason for the death is reported.
The authors analyzed all the patients who died of SUDEP. They compared the SUDEP rate in those: 1) patients who were treated with the study AED to 2) those patients on placebo. As you may know, most AED drug trials are designed as follows: One group of patients has the study AED added to their current AEDs. The frequency of their seizures and side effects are studied. This study group is compared to a group of patients who have a placebo added to their current AEDs (basically, a sugar pill). By comparing the groups, you can tell if the AED is effective at improving seizure control and if side effects are a problem.
The results of the study were striking (Spencer, Epilepsy Currents, 2012). Treatment with the add on AED (study drug) reduced the incidence of SUDEP more than 7 times, compared to treatment with a placebo. This study provides arguably the best evidence to date the concept that improving seizure control may be helpful in reducing the incidence of SUDEP.
Early death rates are higher in patients with epilepsy compared to the general population. Most early deaths in patients with epilepsy are due to the underlying disorder, such as a brain tumor or stroke, and not due directly to the epilepsy. However, patients with epilepsy are at higher risk of death due to SUDEP. Although uncommon, SUDEP is a true tragedy, because it can strike patients who are young and otherwise in good health except for their seizures. There are many unanswered questions about SUDEP: 1) what is the cause of SUDEP?; 2) who is at greatest risk? 3) what is the best way to prevent SUDEP?
The current thinking on SUDEP is that patients and families should be educated about SUDEP. Also, the best possible seizure control should be pursued—poorly controlled intense seizures is probably the most important risk factor for SUDEP.
Although this article has reviewed the important topic of early death in patients with epilepsy, it should be stressed that most patients with epilepsy are expected to live long full lives, especially if seizures are well controlled and the patient is otherwise in good health!
Langan Y, Nashef L, Sander JW. Sudden unexpected death in epilepsy: a series of witnessed deaths. J Neurol Neurosurg Psychiatry 2000;68:211-213.
Sperling M. Sudden unexplained death in epilepsy. Epilepsy Currents 2001;1:21-23.
Nashef L, Tomson T. Sudden death in epilepsy. In: Engel J, Pedley T, editors. Epilepsy: A comprehensive textbook. Philadelphia: Lippincott Williams & Wilkins; 2008: 1991-1998.
Ryvlin P, Cucherat M, Rheims S. Risk of sudden unexpected death in epilepsy in patients given adjuctive antiepileptic treatment for refractory seizures: a meta-analysis of placebo-controlled ranomised trials. Lancet Neurol 2011; 10:961-968.
Spencer D. SUDEP: Sudden unexpected death in epilepsy on placebo? Epilepsy Currents 2012;12:51-52.
Stavern K, Guldvog B. Long-term survival after epilepsy surgery compared with matched epilepsy controls and the general population. Epilepsy Research 2005;63:67-75.
Walczak TS, Leppik IE, D’Amelio M, et al. Incidence and risk factors in sudden unexpected death in epilepsy: a prospective cohort study. Neurology 2001;56:519-525. | <urn:uuid:c9d9163e-7b64-4d86-ada9-46b2d9c239f4> | CC-MAIN-2022-33 | https://mnepilepsy.org/sudden-undexpected-death-in-epilepsy-sudep/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00004.warc.gz | en | 0.937052 | 2,302 | 3.078125 | 3 |
Sri Aurobindo, A short biography(1)
Indian Psychology Institute
Sri Aurobindo was born in Calcutta, on 15th August 1872. His father, a thoroughly Anglicised Indian doctor in British Government service, wanted his sons to have a solid, British education, and when Aurobindo was seven, he sent him, together with his two brothers, to England with the specific instruction that the three brothers should be kept free from Indian influence. The young Aurobindo was a brilliant student who was consistently amongst the top of his class in English, and for much of this time, he and his two brothers were supported by his scholarships. He attended what was at the time one of the best public schools in London (St. Paul’s) and later studied in Cambridge where he obtained the highest score ever awarded in Greek. When he returned to India in 1893, he had an excellent command of English, Greek, Latin and French, and knew enough German and Italian to enjoy Goethe and Dante in the original, but … he knew rather little about India. While still in England, he obtained a job with one of the Indian princes, the Gaekwor of Baroda, and after his return, he worked in Baroda for twelve years, as teacher, as private secretary to the Gaekwor, and finally as Vice-principal of the Baroda College. During this period he immersed himself deeply in Indian culture and learned Sanskrit as well as several modern Indian languages. Though he became fairly fluent in what should have been his mother tongue, Bengali, he remained more at home in English, and it is in this language that he wrote all his major works.
As he became more familiar with the Indian tradition, his admiration for the Indian tradition grew, and it became increasingly clear to him that the Indian civilization could not regain its full stature as long as India was under foreign occupation. Interestingly, at that time, this was not at all a common view: the Indian elite of those days had widely accepted the superiority of the English culture, and Aurobindo would become the first Indian intellectual who dared proclaim publicly that complete independence from Britain should be the primary aim of Indian political life. As his increasing political involvement embarrassed his employer, whose position was entirely dependent on British approval, he left Baroda service in 1906 and moved to Calcutta where he soon became one of the most outspoken leaders of the political movement for Indian independence. His writings brought him in frequent conflict with the British authorities but he carefully chose his language and repeatedly managed to escape conviction.
During a visit to Baroda in 1907, Aurobindo took some private lessons from a Maharashtrian yogi, Bhaskar Lele. Aurobindo had no interest in personal liberation, but he knew from experience that prāṇāyāma could increase one’s mental energy and clarity, and he hoped that yoga could develop other psychological powers, which he intended to use for his political work. Within three days he managed under Lele’s guidance to completely, and permanently, silence his mind. Soon after, he had the realisation of the silent, impersonal Brahman in which the whole world assumed the appearance of “empty forms, materialised shadows without true substance”—
There was no ego, no real world—only when one looked through the immobile senses, something perceived or bore upon its sheer silence a world of empty forms, materialised shadows without true substance. There was no One or many even, only just absolutely That, featureless, relationless, sheer, indescribable, unthinkable, absolute, yet supremely real and solely real. This was no mental realisation nor something glimpsed somewhere above,—no abstraction,—it was positive, the only positive reality,—although not a spatial physical world, pervading, occupying or rather flooding and drowning this semblance of a physical world, leaving no room or space for any reality but itself, allowing nothing else to seem at all actual, positive or substantial. I cannot say there was anything exhilarating or rapturous in the experience . . . but what it brought was an inexpressible Peace, a stupendous silence, an infinity of release and freedom. (Aurobindo, 1972b, p. 101)
There are two things noteworthy about this experience. The first is that it was not a fleeting experience but a true realisation in the sense that the peace and inner silence never diminished. The other is that the experience of the silent Brahman and the māyāvādin sense of the unreality of the world were not at all what Aurobindo had expected or wanted from yoga, and they did not fit either within the mental framework of his instructor, Lele, whose own experiences were with the personal Divine. During the following weeks Lele still taught Aurobindo how to rely both for his outer work and for the rest of his inner development on an inner guidance, but after that, they parted ways. The presence of the silent Brahman never left Aurobindo, though it subsequently merged with other realisations of the Divine. Interestingly, all this happened during one of the busiest periods of his life while he was at the peak of his political influence, and he managed, in his own words, to organise political work, deliver speeches, edit his newspaper and write articles, all from an entirely silent mind.
In the mean time, his younger brother Barin got involved in daring but largely ineffective exploits of violent revolt. After a bomb-blast in May 1908 in which two British ladies died who happened to occupy the coach in which Barin expected some hated official to travel, Aurobindo was arrested by the police under suspicion that he was the brain behind the increasing violence. He was put on trial for “waging war against the King”, a charge that could have sent him to the gallows if convicted. Lack of evidence of direct, active involvement in violent action lead, however, to his acquittal, much to the discomfort of the British Viceroy, who by that time had come to the conclusion that Aurobindo was “the most dangerous man in the British Empire.” His incarceration had one major effect, which the British police could not have foreseen, or, for that matter, understood. Aurobindo took his arrest and yearlong incarceration as a God-imposed opportunity to concentrate fully on his inner, spiritual development, or sādhanā. While in jail, he showed remarkably little concern about the court-case, but made an in depth study of the Bhagavad Gītā and realised the presence of the personal Divine in everything and everybody around him. In his own words:
[I]t was while I was walking that His strength again entered into me. I looked at the jail that secluded me from men and it was no longer by its high walls that I was imprisoned; no, it was Vasudeva(2) who surrounded me. I walked under the branches of the tree in front of my cell, but it was not the tree, I knew it was Vasudeva, it was Srikrishna whom I saw standing there and holding over me His shade. I looked at the bars of my cell, the very grating that did duty for a door and again I saw Vasudeva. It was Narayana who was guarding and standing sentry over me.
... [and later, in court:]
I looked at the Prosecuting Counsel and it was not the Counsel for the prosecution that I saw; it was Srikrishna who sat there, it was my Lover and Friend who sat there and smiled. (Aurobindo, 1997, p. 6-7)
After his release from jail, he remained for another two years in Calcutta, where he started another journal that focused more on culture and yoga, less on politics.(3) He was by now convinced that the political independence of India was only a matter of time, and that he had to concentrate on another, inner work. In 1910, he decided to relocate to Pondicherry, which was at the time a French enclave in India, where he would be more safe from harassment by the British police. Though he expected initially to stay in Pondicherry only for a few years of intense inner work after which he intended to re-enter the active, political life he had been used to, he was to stay in Pondicherry till the end of his life in 1950.
Shortly after his birthday on August 15, 1912 he described in a letter to an old friend another major turning point in his yoga:
My subjective Sadhana may be said to have received its final seal and something like its consummation by a prolonged realisation and dwelling in Parabrahman(4) for many hours. Since then, egoism is dead for all in me except the Annamaya Atma,—the physical self which awaits one farther realisation before it is entirely liberated from occasional visitings or external touches of the old separated existence. (Aurobindo, 1972, 433–35)
In spite of his political involvement, Sri Aurobindo had a rather private disposition and rarely spoke or wrote directly about his own experiences, so most of what we know about them is derived somewhat indirectly from his other writings. A notable exception is, however, the detailed record he maintained during some of the early years of his stay in Pondicherry. This Record of Yoga came to light more than 25 years after his death, and its 1500 pages shed a fascinating light on his inner development and on the way his personal experiences related to his public writings of the same period. Though the Record is written in the manner of laboratory notes -- in telegram style and with extensive use of technical terms and abbreviations which are often difficult to follow -- they leave one with the definite impression that he hardly ever, if at all, made any general statement about the possibilities of yoga which he had not first extensively verified in his own experience.
In 1914, a French couple, Paul Richard and his wife, Mirra Alfassa, visited Pondicherry and soon became acquainted with Aurobindo. Paul Richard invited Aurobindo to join him in bringing out a new journal. The intention of the journal was, in Aurobindo’s words, “to feel out for the thought of the future, to help in shaping its foundations and to link it to the best and most vital thought of the past” (1915/1998, p.103). By the time its first issue came out, the first World War had started and soon after, the Richards had to return to France. This left the task of filling the 64 pages of the monthly journal to Aurobindo, and he faithfully fulfilled this task for the next 6 years, by serialising, in parallel, several books. By the time he closed down the journal, he had completed almost all his major works, The Life Divine, The Synthesis of Yoga, The Secret of the Veda, Hymns to the Mystic Fire, Essays on the Gita, Foundations of Indian Culture, translations and commentaries on several major Upaniṣads, a trilogy on social psychology and politics, etc. Only a few of these texts, Essays on the Gita, The Life Divine and the first part of The Synthesis of Yoga, he revised and brought out in book form during his lifetime. Others were published as books only posthumously.
Paul Richard and Mirra Alfassa returned to Pondicherry in 1920. Paul Richard found it difficult to accept the by now obvious spiritual and intellectual superiority of Aurobindo and left soon after, but Mirra Alfassa stayed, and gradually took up an increasingly important role in the small community that began to form around Aurobindo. Initially she was simply the most gifted of Aurobindo’s disciples, but over time, Sri Aurobindo, as he now came to be known, began to address her as “the Mother”, in honour of her complete identification with the śakti, the Power which mediates between the Divine and the manifestation. In letters to his disciples, he often stressed that their consciousness and realisation were essentially one, and that they differed only in their most outer roles and forms of manifestation.
In 1926 Sri Aurobindo had another major breakthrough in his own sādhanā, which he later described as the embodiment of Krishna’s Overmental consciousness. One should take this event in the context of what future generations may well consider Sri Aurobindo’s greatest contribution to our human understanding of the world and our role in it: the distinction he made between what he called the Overmental and the Supramental planes of consciousness.
After 1926 Sri Aurobindo retired entirely to a small, first floor apartment in order to concentrate fully on his inner work. From this time onwards, he left the daily care for the small community that had begun to develop around him, to the Mother, and this became the formal beginning of the “Sri Aurobindo Ashram”. We know relatively little about what Sri Aurobindo did during the 24 years after his retirement to his rooms. He spoke hardly to anybody, except for a short period just before the Second World War when he needed physical assistance after breaking his leg, and he saw his disciples only 3-4 times a year in a silent “darshan”. What we know of his inner life during this period is largely from his letters, from his poetry, and from the changes he introduced in some of his earlier writings. During the 1930s Sri Aurobindo answered a staggering number of letters to his disciples, of which over 5000 have been published. Most of them deal with sādhanā, quite a few with literature, and a smaller number with other issues. Roughly during the same time he also took up the revision of a few of his major works like his Essays on the Gita, the first two parts of The Synthesis of Yoga, and The Life Divine. His poetic writings include besides sonnets, other short poems and metrical experiments, also his most important written work, the epic poem Savitri. With its over 24000 lines and 724 pages Savitri is in a class of its own. Its richness of imagery, beauty of expression, and sheer number of memorable lines could remind one of Shakespeare, but in terms of depth and width of spiritual experience it simply has no equal in the English language. It would not be surprising if posterity would count Savitri amongst the most valuable texts ever composed.
It may be noted that in spite of his official retirement from politics, Sri Aurobindo was one of the very few major public figures in India who recognised how serious the consequences of a victory of Nazi Germany and Japan would have been for the future development of human civilization, and during the Second World War he gave his full support to the Allied war-effort.
After the war, in a radio message, which he gave on the occasion of India’s Independence (15-8-1947), which coincided with his 75th birthday, Sri Aurobindo described the main areas of his life’s work as five world-movements which he wished for as a young man, and which he worked for during the different phases of his life. They all looked, in his own words, like impractical dreams when he was young, but he saw all of them fully or partially fulfilled during his lifetime:
- a free and united India;
- the resurgence and liberation of the peoples of Asia and her return to her great role in the progress of human civilization;
- a world-union forming the outer basis of a fairer, brighter and nobler life for all mankind;
- the [spread of the] spiritual gift of India to the world;
- a step in evolution which would raise man to a higher and larger consciousness and begin the solution of the problems which have perplexed and vexed him since he first began to think and to dream of individual perfection and a perfect society.
All these “world-movements” have begun, though none of them has been perfectly accomplished in the direction Sri Aurobindo envisaged. In the long run, it seems likely that Sri Aurobindo will be remembered mainly for his role in the fifth movement, on which he worked incessantly during the last 40 years of his life. Just before his death in 1950, he still wrote a few essays for a newly started Ashram Journal on the transitional period between our present state and the supramental stage he envisaged for the future. He also completed the revision of the first part of The Synthesis of Yoga and the whole of Savitri. The Mother continued his work till her own passing in 1973 at the age of 95. The Ashram and the international township, Auroville, which she started in 1968 (at the age of 90), still exist and continue to develop as creative spiritual communities.
All Sri Aurobindo’s writings are available from http://www.sabda.in
His Collected works are also available for download as PDF files, at: http://www.sriaurobindoashram.org/ashram/sriauro/writings.php
To get the basic flavour of Sri Aurobindo’s writing, one could have a look at a few representative short texts, collected at http://www.saccs.org.in/texts/integralyoga-sa.php
For original (auto)biographical material, one can consult volume 35 and 36 of The Collected Works of Sri Aurobindo: Letters on Himself and the Ashram (still to be published) and Autobiographical Notes and Other Writings of Historical Interest (2009). Both published by Sri Aurobindo Ashram Trust, Puducherry, INDIA.
Three entirely different biographies are:
A.B. Purani. (1978). The Life of Sri Aurobindo. Puducherry: Sri Aurobindo Ashram.
Satprem (1970). Sri Aurobindo or the Adventure of Consciousness. (Translated from the French. Original title: Sri Aurobindo ou l'Aventure de la conscience.) The English edition, successively brought out by several publishers, is presently out of print.
Peter Heehs (2008) The lives of Sri Aurobindo. New York: Columbia University Press.
(1) For many details in this biographical note, I have made use of Peter Heehs (2008).
(2) Vasudeva and Narayana are different names for Krishna.
(3) His previous Journal, the Bande Mataram, had been closed down by the British Government.
(4) The parabrahman is, in Aurobindo’s words, “the supreme Reality with the static and dynamic Brahman as its two aspects.” | <urn:uuid:7344db32-a36d-4bbe-ad69-aaf8be2dcd88> | CC-MAIN-2022-33 | https://ipi.org.in/texts/matthijs/mc-sa-shortbio.php | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00002.warc.gz | en | 0.981757 | 3,988 | 2.75 | 3 |
Houseplants are good air purifiers and can brighten up any room in the house. While many people like pink flowers, pink houseplants are becoming more popular, too.
In feng sui, pink is the color of love according to TheSpruce. This includes self-love and platonic love as well as romantic love.
While growing in popularity, a pink houseplant is still unique enough to make an interesting statement.
Pink Houseplants Versus Pink Flowers
Pink houseplants may have pink flowers, but not all of them are pink flowering houseplants. They all have pink leaves.
Houseplants have been selectively bred to have a variety of pink foliage in a variety of patterns. Because houseplants are protected from the elements, pests, and diseases, they can afford to have more pink foliage than outside plants.
Pink foliage helps with photosynthesis by absorbing light and passing that energy to the green chlorophyll in a plant but cannot photosynthesize by itself.
Houseplants with pink leaves are thus at an evolutionary disadvantage. Our care protects the plant from this disadvantage.
Keeping Pink Houseplants Humid Enough
Many pink houseplants come from very humid environments. Houses are not typically as humid, which can be a problem. To increase the humidity around the plant you can mist the leaves.
However, that leaves the plant vulnerable to mildew and molds that grow on wet leaves.
A better way to increase the humidity is to use a pebble tray.
Take a saucer that is large enough to hold the plant and saucer. Fill it with pebbles. Pour in enough water to come just below the top of the pebbles.
Set the saucer of the plant on the top of the pebbles. As the water evaporates, it creates a humid microclimate.
Make sure you refill the water in the pebble tray regularly.
What Makes Plants or Flowers Pink?
Humans see pink because it is reflected from the plant surface. Pigments in the plant reflect this wave of light. Plants usually use different colors to attract pollinators to their pollen. That is why so many flowers are pink.
Pink is caused by a group of pigments called anthocyanins that cause colors from red to orange and violet to blue.
Some of these pigments absorb ultraviolet light, which many insects see better than light that is visible to us.
Colors of pink
Pink foliage comes in a variety of shades of pink. Some of the most common are light pink, pink, and dark pink.
Most pink houseplants have pink and green leaves, as some green is required for photosynthesis.
The pink in the foliage really makes it pop. Here are some examples of the different shades of pink found in houseplants.
Spiderworts come in pink, and the cultivar Tradescantia albiflora (nanouk) has light pink leaves.
Originally from Mexico, Central and South America, this type of spiderwort was developed in the Netherlands. Nanouk needs bright indirect light. Too little light will cause the pink to fade. Too much will burn the plant.
Pink Tradescantia houseplants are small, reaching a height of six to twelve inches. The plant needs weekly waterings. The sap of this plant can cause skin irritation and gastric distress in humans and pets.
The pink polka dot plant, Hypoestes phyllostachya (pink brocade) has a pink base and polka dots and stripes of green. It will fade if it gets too much light. Bright, indirect light is best for a pink polka dot plant.
The plant grows one to two feet tall and one to two feet wide. It is from Madagascar and needs well-drained soil.
Keep the soil moist but not soggy. Let the soil get dryer in the winter while it is dormant, but do not let it dry out completely.
Feed these plants a houseplant fertilizer once a month while the plant is growing. Do not fertilize when the plant is dormant.
The Aglaonema (Pink Splash) has vibrant pink variegated leaves. It needs bright light and frequent watering to keep the soil evenly moist.
Too much sun will burn the leaves. Water the plant when the top half of the soil is dry. Water it until water flows through the drainage holes.
Fertilize once a month during the spring and summer with a water-soluble houseplant fertilizer. This plant is moderately toxic to humans and pets.
The Pink Princess Philodendron, Philodendron erubescens (pink princess), is a houseplant with pink and green leaves. It needs loamy soil and bright, indirect light.
Too much shade and the pink turns green. From South America, this plant grows two to four feet tall and two to four feet wide. Let the top half of the soil dry out between waterings.
When watering, let the water come out of the drainage holes before you stop. Fertilize monthly with a water-soluble houseplant fertilizer during the spring and summer.
Do not fertilize in the fall or winter.
The prayer plant comes in many colors of pink, but the Calathea (Dottie) has rich pink magenta hues on the leaves.
They require humid, warm air and need partial sun to shade. Do not place the plant in direct light or it will burn the leaves and fade the pink.
This prayer plant can be difficult to grow, but supplementing the humidity in the air helps them.
Water when the top two inches of soil are beginning to dry out. Use well-drained potting soil as the plant will not tolerate sitting in water.
Fertilize once a month during spring and summer. Use a houseplant fertilizer at half strength as this plant is sensitive to over-fertilization. Do not fertilize in the fall and winter.
The bloodleaf plant, Iresine herbstii brilliantissima, has dark red and pink leaves. When young, these plants like partial shade.
They grow more tolerant of light as they mature, but are margin plants, growing at the edge of a forest so that direct sunlight will burn them. Indirect, bright light is best for mature plants.
Native to South America, the bloodleaf plant is rare in North America. It grows twelve to eighteen inches tall.
Fertilize once every three weeks. Keep the soil moist. These plants need warm, humid conditions.
Patterns of Pink
Pink foliage is not all pink. It must have some green on the leaves to do photosynthesis. With many patterns of pink leaves, there is sure to be something you like. Here are the most common foliage patterns found in pink houseplants.
Variegated plants have foliage that is edged or patterned in a second color. This is usually green leaves with white as the second color, but pink and green houseplants often have variegated patterns.
The calico kitten plant, Crassula pellucida variegata ‘Calico Kitten’, has dark pink variegated leaves.
It is native to South Africa. It needs bright light inside. Calico kitten plants need a well-draining soil formulated for succulents. Water when the top inch of the soil is dry. Do not overwater.
During the growing season, fertilize with a weak houseplant fertilizer every three weeks.
Do not fertilize during the fall and winter. The plant will be two to four inches tall at maturity.
Pink polka dot plants, Hypestes phyllostachya, are, as the name suggests, a houseplant with pink spots on green leaves. See care instructions above.
This is usually a pink color at the base or in the center of the leaves. The begonia Begonia rex ‘Pink Charming’ has a blush of pink in the leaves where the stem meets the leaf.
Pink begonia houseplants grow to be ten to twelve inches tall and about the same in width.
They need bright indirect sunlight. Let the soil surface dry out slightly between waterings.
Fertilize with half-strength houseplant fertilizer every two weeks. Begonias need a humidity of around fifty percent.
Use a pebble tray for that, as misting the leaves can lead to diseases in this plant.
Pink Leaves with Green Veins
Caladium pink symphony has bright pink leaves with green veins. This creates a stunning pink leaf houseplant.
Caladiums are native to Central and South America. Indoors, they require bright indirect sunlight. Caladium’s leaves die back after a few months and it enters a dormant period. After the dormant period, the leaves sprout again.
Water enough to keep the soil evenly moist during the growing season, usually spring and summer.
Do not water during dormancy, but resume watering in the spring so the leaves will begin to grow again.
Fertilize with water-soluble houseplant fertilizer every two weeks during the spring and summer.
Do not fertilize when the plant is dormant. These plants are toxic to humans and pets.
Uses for Pink Houseplants
Pink houseplants have many uses. Here are some ways to use them in your home.
While some pink houseplants need bright light, many of them thrive in partial shade. If your windowsills and sunny places are full, try these plants in a less sunny spot where other plants won’t grow.
Pink plants make great thriller plants in containers. Place them between green-leaved plants to make your container pop. Make sure you match plants with ones that need a similar amount of light and water so all the plants thrive.
Many plants need more light than they get in the bathroom. Pink plants that need a humid atmosphere and less light, such as spiderwort, can fill your bathroom with thriving houseplants.
Pink houseplants are becoming more common. However, they are still rare enough to add a unique touch to your home.
Use them as specimen plants, in containers, and as shade-loving plants in bathrooms.
While the sunlight requirements vary, you will need to water and fertilize them just like their green cousins.
Frequently Asked Questions
We get many of the same questions about pink houseplants from our readers. Here are the answers to the frequently asked questions.
Many pink houseplants can be bought at big box stores, but for some of the rarer ones, you will have to go to a nursery or order them online.
No, some of them are easy to grow. Try spiderworts, the pink polka dot plant, and caladiums.
Most houseplants with pink foliage are grown from cuttings. Cut the stem just below a node.
Make sure the cutting has two leaves and is four to six inches long. Place the cutting in potting soil then water it in.
Cover the pot with a plastic bag and place the pot in a warm, dark area. Keep the soil moist. In about three weeks, the cutting should have roots. Remove the bag as soon as the plant roots and grow normally. | <urn:uuid:2e5cad5e-0790-4b23-9d90-9138af945e05> | CC-MAIN-2022-33 | https://houseplantcentral.com/pink-houseplants/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00604.warc.gz | en | 0.933428 | 2,389 | 2.96875 | 3 |
How to Teach Children About Healthy Relationships
Relationships are an incredibly important part of a child or young person’s life. Healthy relationships have a lot of benefits, such as making them feel secure and supported, but unhealthy relationships can have a long-term negative impact. As a result, it is vital that children and young people are aware of what an unhealthy – or even abusive – relationship might look like, the early warning signs, and how to maintain healthy boundaries.
In this article, we will outline the characteristics of healthy and unhealthy relationships, and give you some tips for teaching children and young people about this subject in an age-appropriate way.
What is Classed as a Healthy Relationship?
A healthy relationship is made up of the following characteristics:
- Mutual respect. You should value each other as you are, and not try to change each other. This involves respecting each other’s boundaries, whether these are emotional, digital, sexual or other types of boundaries.
- Trust. You should not feel as though someone has to ‘prove’ that they are trustworthy; in healthy relationships, you believe what they have to say. You also don’t worry about what they are doing when you aren’t there.
- Equality. You should make decisions together and hold each other to the same standards. Neither of you should have more control over the other.
- Honesty. In a healthy relationship, you need to be able to be honest with each other. Sharing your feelings should not lead to negative consequences. However, this does not mean that you need to tell each other absolutely everything; you can keep some things private.
- Good communication. You should be able to talk openly about any problems that you have, rather than letting them build up and cause resentment. Communication also involves listening to each other and respecting each other’s opinions, even if you don’t agree. You may sometimes have to compromise so that both people feel valued.
Healthy relationships are inherently positive – children and young people should always feel respected, valued, supported and encouraged. They should also be free to make choices about how they act and what they say; they should not be controlled, coerced or manipulated into anything.
Benefits of healthy relationships include having a positive sense of wellbeing and experiencing less stress. You might also have more purpose to your life and increase your social development.
Why is it Important to Teach Children About Healthy Relationships?
There are four main reasons why it is important to teach children and young people about healthy relationships:
1. Many of them do not understand what a healthy relationship is
The research project Boys to Men found that 49% of boys and 33% of girls aged 13-14 thought that hitting a partner would be ‘okay’ in at least one of twelve scenarios they were presented with. Lack of experience of healthy relationships, as well as peer group norms – adolescents in particular tend to be more accepting of relationship abuse, according to research – leads to children and young people finding it difficult to judge behaviour as abusive. For example, they often view forms of sexual harassment as normal and even inevitable; they might also have been groomed to believe that a relationship is healthy.
2. They are just as likely, if not more likely, to experience abusive relationships as adults are
A key study showed that 75% of girls and 50% of boys aged 13-17 had experienced some form of emotional relationship abuse, with 25% of girls and 18% of boys experiencing physical abuse, and 1 in 3 girls and 16% of boys experiencing sexual abuse. The transition from childhood to adulthood, with all its associated cognitive and physical changes, is a particularly vulnerable time of life. Barnardo’s has also found that 1 in 6 children experience sexual abuse before their 18th birthday. These negative experiences can have serious outcomes, including depression, decreased cognitive ability, serious harm or suicide.
3. They want to learn about it
Studies have found that young people want to be taught about the emotional aspects of relationships. It is not enough to have sex education alone.
4. Understanding healthy relationships can impact the rest of their lives
If children are taught about healthy relationships early on, this could decrease the likelihood of them staying in unhealthy or abusive relationships later. In turn, the high levels of domestic abuse in adults might drop – in 2019-2020, 2.3 million adults were victims of this sort of abuse. Moreover, healthy relationships can impact lives positively by improving your health, lengthening your life, and advancing your academic career.
Therefore, giving children and young people the right advice, teaching them healthy attitudes and behaviours, and training them to identify and deal with unhealthy relationships is vital.
Including healthy relationships as part of school curriculum has been shown to be an effective preventative measure against future relationship abuse. By talking about relationships, you also provide children with the opportunity to open up about any experiences of abuse – domestic or otherwise – and get them help to deal with this.
What is Classed as an Unhealthy Relationship?
Where healthy relationships are inherently positive, unhealthy relationships are inherently negative; they are based around an imbalance of power and control. There is a lack of respect; you might be forced or coerced into doing things that you aren’t comfortable with, or behaving in a certain way. You might feel that you aren’t good enough, and experience anxiety, depression, or physical health symptoms such as headaches (Woman’s Aid, 2015).
In an unhealthy relationship, a child or young person might:
- Only spend time with one particular person, and lose contact with their other friends or family.
- Be prevented from working or going to school.
- Have their money taken away or controlled.
- Be restricted in accessing food, drinks, and day-to-day items.
- Have their time controlled or heavily monitored.
- Have their social media accounts controlled or heavily monitored. For example, someone might monitor which posts they ‘like’ and who they have been messaging.
- Be told what to wear.
- Feel pressured to do things they are not comfortable with.
- Be criticised or put down.
- Experience threats of violence if they don’t behave a certain way.
- Be threatened with damage to their personal property, loved ones, or pets.
- Not be able to talk about problems or their feelings without having an argument or being punished for it.
- Lack trust in the relationship – they might be accused of lying or cheating, or might frequently be lied to.
- Have their boundaries disrespected – if they speak up about an issue, they might be told that they’re overreacting, ‘clingy’, or ‘needy’.
Unhealthy behaviours might start off seeming relatively insignificant, but it is important to recognise them because they are often symptomatic of a person trying to exert power and control over you. This could lead to a categorically abusive relationship as they attempt to gain more and more control. This type of relationship involves physical abuse (hitting, slapping, pushing or choking), threats and insults, humiliation, gaslighting, and regularly forcing you to do things you don’t want to do.
Abusive or unhealthy relationships involving children are often exploitative. Exploitation is a complex issue – training will help you to better understand why it happens, who is at risk, and what you can do to help.
Need Exploitation and Safeguarding Training?
Our range of safeguarding training courses aim to provide you with the required knowledge to carry out your work whilst meeting safeguarding training requirements. Take a look at our course library where you’ll find everything from Child Sexual Exploitation Awareness to Harmful Sexual Behaviour in Schools.
Tips for Teaching Healthy Relationship Skills
We have put together 7 tips for teaching healthy relationships in the classroom. These are:
1. Talk about boundaries
Boundaries help to protect children and young people from abuse, as well as helping them build healthy relationships that meet their needs and values. Get children to think about their personal views so they can identify what their boundaries are. In early years, this might be talking about their likes and dislikes in general. For older teenagers it might involve a private reflection activity around their views on sex and when this should or shouldn’t happen in a relationship.
You can then practise articulating boundaries clearly. Young children should be taught that it’s OK to say no if they don’t want to do something – for example, hug a family member or join in with an activity – and that you will respect this. Older children could roleplay scenarios, with one of them reacting when the other oversteps their boundaries. For example, if the other person tries to make fun of them, they should tell them to stop, and if they don’t, they should walk away and tell them that they don’t want to talk while they’re doing that.
Remember to note that both people in a relationship have their own boundaries that need to be respected; students should be able to see it from both sides.
2. Think about how you expect to be treated in a relationship
If children can identify how they would like to be treated and their rights in a relationship, this will make them more alert to unhealthy relationships that don’t meet these criteria. They could make a list of what they expect, with some scaffolding to prompt them. For example, being treated fairly, being respected and supported, being able to say no at any time (even if they’ve said yes before), and being free from violence and abuse are good expectations.
You could also practise recognising that someone is being exploited or abused, and talk about what to do in these situations. Useful resources that include different red-flag scenarios are the NSPCC and Love Is Respect websites. Having group discussions about the healthiness of relationships in books or films could also be an effective teaching tool.
3. Teach them how to communicate effectively
Many people say that communication is key to a healthy relationship. Effective communication involves being able to express your thoughts and feelings, but also being able to listen, understand other people’s points of view, and compromise.
Younger children (5-11 years old) should be helped to resolve conflicts; encourage them to think about how other people are affected by their actions. You could also practise expressing opinions in different ways; show them how changing your words can change how you make someone feel. For example, making statements with the words ‘I’ and ‘we’ rather than ‘you’ can make the other person feel less defensive.
Older children and young people could think about:
- How they feel in different situations, and ways that they could react that would be positive and non-violent – for example, going for a walk when they feel angry so they calm down and think about what’s wrong. You could roleplay talking about feelings using scaffolded sentences, such as ‘when (someone) did (action), I felt angry because…’. Jealousy is another important emotion; emphasise that it’s normal to feel jealous, but that doesn’t mean you need to act on it. Telling someone not to talk to a certain person because you feel jealous is unhealthy.
- Compromising when you disagree. Talk about how it’s important to find a middle ground that both people are satisfied with. Point out that you don’t need to agree on everything, but if you can’t compromise on an important issue then you may not be compatible.
- The 48 hour rule: if your partner upsets you or makes you angry, you should tell them about it, but it doesn’t have to be straight away. See if you’re still hurt 48 hours later, and if so, say something.
4. Don’t forget digital abuse
This is particularly important now that young people spend a large amount of time connecting with each other online.
It may be difficult for young people to know what is normal in terms of online behaviour, because some adults don’t understand how technology is used, nor give them relevant guidance. For example, young people should be told that it’s not normal or healthy to ask a partner to share their password to social media accounts with you, or to go through their messages to check who they’ve been talking to. Other harassment that can occur through technology includes constant unwanted calls or texts, cyberbullying, pressure to sext, and being monitored through social media.
Responses to digital abuse should not simply be to ‘turn the phone off’ or ‘delete their account’. It’s much better to advise children to report abuse on the site, screenshot any upsetting messages to keep as evidence in case it escalates further, or to set their profiles to ‘private’ so that strangers can’t see where they live or go to school.
5. Debunk stereotypes
Stereotypes can lead to unhealthy relationship expectations and abuse – for example, if people are punished for not acting the way they’re ‘supposed’ to. As a result, it’s important that you avoid stereotyping from children’s earliest years right the way through; embrace individuality, encourage boys and girls to play alongside each other, and always challenge gender stereotypes when you hear children repeating them. Adolescents might be particularly susceptible to stereotyping; try to make them aware of how this can be harmful and unhelpful.
Additionally, make it clear that unhealthy relationships and abuse can happen to – or be perpetrated by – anyone, regardless of their age, race, gender, sexual orientation or background. Accepting that this is true can help victims in all different situations to feel comfortable speaking out.
Have a look at Outspoken Education for more tips about discussing stereotypes and other tricky topics to do with sex and relationships. You could signpost parents to this website to aid their conversations at home.
6. Make sure they know where to go if they have problems
Make it clear that you’re available to talk if anyone has a concern, but also signpost students to websites and helplines such as Childline (0800 1111 – free to phone) and Stop It Now! (0808 1000 900).
Children and young people should know that they will be listened to and not judged. They should access these resources – or talk to a teacher or other trusted adult – if they ever feel uncomfortable or concerned about a relationship. Spread the word amongst your colleagues so that they are also aware of the warning signs of unhealthy or abusive relationships, and the possible consequences that they can have.
7. Report any concerns as usual
If you think a child or young person is in immediate danger, phone the police on 999. If you are worried, but you don’t think they are in immediate danger, follow your safeguarding policy. Talk to your school’s Designated Safeguarding Lead or contact your local child protection services (details will be on your local authority website). Unhealthy and abusive relationships are a child protection concern and should always be treated seriously.
Relationships can have a huge impact on children and young people’s lives; it’s important to give them the tools they need to build healthy ones and recognise warning signs. Teaching about healthy relationships could decrease the levels of child exploitation and domestic abuse, and improve your students’ wellbeing and futures.
- Child Sexual Exploitation Awareness Training
- Child Safeguarding Quiz
- What is Contextual Safeguarding & Why is it Important? | <urn:uuid:9048d3a8-a46a-4e1c-a0e7-349a9eb36661> | CC-MAIN-2022-33 | https://www.highspeedtraining.co.uk/hub/teaching-children-about-healthy-relationships/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572077.62/warc/CC-MAIN-20220814204141-20220814234141-00601.warc.gz | en | 0.96016 | 3,270 | 3.5 | 4 |
George Washington Wilson
Active 1853 – 1880s (died 1893)
16 – Fingal’s Cave, Staffa, G.W. Wilson, 1860
Photographically innovative and entrepreneurial in business, Wilson was the most remarkable, successful and prolific stereo-photographer in Scotland and perhaps the entire UK. Having trained in Edinburgh as an artist, he worked as a miniature portrait painter and art teacher in Aberdeen from 1848. He started experimenting with photography in 1852, probably realising that it could potentially supplant his previous profession.
During a short-lived partnership with Hay, he first exhibited stereoviews in 1853. A commission to photograph the construction of Balmoral led to a long royal association. His photos were used in the form of engravings for Queen Victoria’s popular book “My Highland Journal”. His best-selling carte-de-visite of her on a pony held by her faithful Highland servant, John Brown, (judiciously cropped to remove other superfluous retainers) fueled the gossip surrounding their relationship.
Although his portrait studio in Aberdeen provided steady cashflow, he recognised that stereoviews were the key to prosperity and by 1863 had a catalogue of over 400 views from all across the UK, selling them in a wide variety of outlets including railway kiosks and inside cathedrals.
His artistic training helped him compose picturesque and beautiful images, but he was also an innovative technician, experimenting on improving photographic techniques, chemistry and apparatus. In an age when exposure times were routinely several minutes, he was among the very first to publish “instantaneous” views. A bustling Princes Street, Edinburgh dates from 1859. Perhaps the most famous of his instantaneous images is gun practice on HMS Cambridge taken in 1860.
In 1855, to promote his portrait studio, he published a combination print of prominent Aberdonians, creating one of the earliest ever photo-montages. People were baffled how he had managed to gather so many illustrious people together at the same time.
In 1858, he started experimenting with pointing his lens directly into the sun, and a year later created dramatic images of his family boating on the Loch of Park. These created a sensation when sent for review and exhibited.
By 1865 his company was printing over 500,000 photographs annually. He tried to keep ahead of fashion, producing various formats in addition to his stereoviews. In conjunction with the London printers, Marion, he introduced the cabinet card size, which went on to become a popular standard format.
Commercial success seems to have led to Wilson being rather overlooked as an artist today. He was fêted in his own day, winning 27 medals internationally, including one at the prestigious London Exhibition of 1862. Photographic Notes in 1861 stated Wilson “has now achieved for himself a position which no other photographer has reached”.
After his death in 1893, his sons seem to have lacked his entrepreneurial spirit and the enterprise was dissolved in 1902. The main body of his original negatives (some five tons of glass!) are held by Aberdeen University.
Articles on G.W.Wilson by Peter Blair
The use of historic photographic journals to help identify early stereoviews by G.W.Wilson
Stereoworld Magazine, May/June 2021, Vol 46, No.6, p.6-12.
Dr Peter Blair
Identifying early stereoviews and attributing the photographer can sometimes be very challenging when there is no label or blindstamp. Often, the identity of the photographer was not mentioned on British stereoviews, especially prior to the Fine Art Copyright Act of 1862, which extended copyright protection to photographs. Frequently, there is not even a title to aid identification, or it has become faded and illegible. In these cases, the descriptions provided in early articles on photography in various journals can be a great aid to attribution. There was no simple way to reproduce photographs in print at this time, so the descriptions can be quite detailed, often allowing precise identification of the view described. I have been able to identify early unlabelled views by G.W.Wilson with reference to a major article on his work in the November 1858 edition of Photographic Notes. This historic article is reproduced in full and is reunited for the very first time with all the photographs to which it refers.
Identifying early G.W. Wilson stereoviews
In 1856, G.W. Wilson published a catalogue of 44 views of Aberdeen and the surrounding area. His next catalogue of 440 views, from all over Britain, appeared in 18631. However, there is no overlap between the two catalogues; the latter one contains images mainly taken from 1859 onwards. This leaves two critical years of 1857 and 1858 without any catalogue or known listing of his work. This is the very period when Wilson started to establish his reputation. He was experimenting with technique, chemistry and apparatus, pushing the boundaries of photography and photographic equipment and producing images highly innovative for their time. This included taking views directly into the sun (an unthinkable heresy) and early instantaneous scenes2. He became very interactive, sending prints for press review and to exhibition. The innovative nature of his work, coupled with an innate artistic sensibility, garnered rave reviews. By the early 1860s, he had become established as the benchmark against which other stereo-photographers were measured.
The stereoviews from this pivotal early period are difficult to identify with certainty, because Wilson’s name does not appear on them. It is only after the Act of 1862 that he started using the well-known large blue label (Figure 1), clearly identifying G.W. Wilson as the photographer.
Figure 1. G.W.Wilson common blue label, used from 1862 – 1890s
From 1859 to 1862, he used a small white label (Figure 2). This collector has not seen this label on Wilson views numbered over 300, an observation which supports the thesis that it was retired in 1862. A certain degree of caution should be used when ascribing this style of label to Wilson, as a similar style was also used by Gordon of Aberdeen and Valentine Blanchard among others.
Figure 2. G.W.Wilson small white label, used 1859 – 1862
But the 1857 and 1858 views generally have no labels. They tend to be on white, cream or pale yellow card. They usually have hand-written titles (Figure 3), in at least three different hands, the most common of which appears to be actually Wilson’s own3.
Figure 3. G.W.Wilson hand-written title in Wilson’s own hand, 1858
Contemporary articles on Wilson in the photographic press provide a selection of around 40 titles from this period, with often a good description of the view. This allows us to attribute some of these early Wilson views accurately. As Wilson was taking on average around eighty stereoviews per annum during the 1860s, there must still be a significant number of views not amenable to this attribution technique.
To highlight the utility of this approach, using one of the most significant articles on Wilson, published in Photographic Notes, November 1858, I have been able to identify all of the images discussed. This fascinating article is reproduced here, accompanied for the first time with the appropriate photographs taken by G.W.Wilson in 1858, from my collection.
I hope this article may encourage others to do something similar for their favourite photographers.
Photographic Notes (Journal of the Birmingham Photographic Society), edited by Thomas Sutton (Volume III, November 1858)
We have received from Mr. George Wilson, of No. 24, Crown Street, Aberdeen, the well-known photographer, a series of the most charming stereoscopic views upon paper that we have yet seen. In many of these photographs Mr. Wilson has succeeded in introducing the natural sky, the instantaneous ripple upon the surface of water, animated figures, and at the same time rendering all the details of the objects in shadow. This has not been done by any trick in the printing, nor have the negatives been retouched; the result is due to legitimate photography. Among the most remarkable of the subjects sent are the following: Oban, Sunset; a Summer Morning on the Sands; Fishing Boats on Loch Fyne, at Inverary; Oban, Evening; Inverary, Argyleshire; and the instantaneous portrait of a Child, seated upon a rocking-horse (Figure 4), and with a merry smile upon his countenance. These subjects are so exceedingly fine, and so far in advance of what one usually sees, that they require especial notice.
Figure 4. Instantaneous portrait of a child, seated upon a rocking-horse
Figure 5. Oban, Sunset
” Oban, Sunset.” (Figure 5) — In this view the artist has pointed his camera directly at the sun’s disc. The sun is just about to disappear behind a heavy bank of clouds, the edges of which are tipped with light. These rest upon a long range of distant hills, between which and the foreground is a broad sheet of water covered with ripples. On this water, immediately beneath the sun, is a bar of dancing light, not snowy, but just one shade lighter than the rest of the water; a steamer is crossing it and leaving behind her two long lines of wake from the rudder and paddles. The foreground consists of a row of housetops with quite enough of detail in the shadows. This picture, although evidently taken instantaneously, is sharp all over, and the manipulation clean and even. No diffused light has entered the camera, for Mr. Wilson informs us that the tubes of his lenses are lined with black velvet, the edges of the lenses blackened, and a shade in front also lined with black velvet. Such an instrument is not to be purchased ready-made, and the reader will observe that the first professional photographers, who aim at something beyond the imperfect things that have been done in the infancy of the art, and in their daring attempts venture even to point the camera at the sun himself, are compelled to modify entirely the mounting of their lenses, and the plan of their camera. The cameras and lenses commonly made and sold are unfit for anything beyond the most elementary applications of the art, and indeed scarcely fit for them. We beg of the reader to note these things. The photographic lens and camera commonly sold by opticians are very incomplete, and the cause of innumerable failures, which are erroneously attributed to the chemicals being out of order. One remarkable feature of this picture is the halo round the sun. This we are informed was produced by some defect in the lenses.
Figure 6. Oban, Evening
“Oban, Evening.” (Figure 6) — This subject is similar to the last in composition, but the sun was too high to be included in the picture, and a steamer, with smoke rising from the funnel, lies directly across a broad bar of reflected sunshine upon the water. The ripple is sharply indicated, the distance well thrown back into haze, and the foreground fully out in all its details.
Figure 7. A Summer Morning on the Sands
“A Summer Morning on the Sands” (Figure 7) combines clouds, ships, breaking waves, and a wet beach. It is a delicious little photograph.
Figure 8. Fishing Boats, Loch Fyne, Inverary
“Fishing Boats on Loch Fyne.” (Figure 8) — In this picture figures are introduced, and the shadows of objects are thrown towards the spectator.
Figure 9. Inverary, Argyllshire
” Inverary, Argyleshire,” (Figure 9) is another marvellous subject, in which clouds, reflections in water, animated figures, and detail in the shadows, are all rendered in perfect truthfulness to nature. There are no chalky whites, nor black unmeaning patches of shadow.
In addition to the above subjects we received several very fine ones of less pretensions to novelty, but equal in their way to anything that has been done in photography. The best are perhaps Fingal’s Cave, Staffa, three subjects (Figures 10-12); Bonnington Falls on the Clyde (Figure 13); Waterfall at Inversnaid (Figure 14); and Loch Etive (Figure 15), a subject which has extraordinary merit as a composition.
Figure 10. Colonnade of Basaltic Pillars, Staffa
Figure 11. Fingal’s Cave – Mouth of the Clamshell Cave, Staffa
Figure 12. Fingals Cave, Staffa
Figure 13. Bonnington Falls on the Clyde
Figure 14. Waterfall at Inversnaid
Figure 15. Schoolhouse at Bonawe Ferry, Loch Etive
G.W. Wilson articles
Photographic Notes, 15 July 1857, p262
London and Manchester Photo Journal, 1 Aug 1857, p156
Photographic Notes, 1 April 1858, p35
London and Manchester Photo Journal, 15 June 1858, p154
Photo News, 1 Oct 1858, p53
Photographic Notes, I Nov 1858, p252
Photographic Journal, 5 Feb 1859, p180
British Journal of Photography (BJP), 1 Dec 1859, p294
British Journal of Photography, 15 Jan 1860, p23
Photographic Notes, 1 Jan 1860, p12
1 – Roger Taylor, “George Washington Wilson – Artist and Photographer (1823 – 93)”, London Stereoscopic Company, 2018, ISBN 978095744692
2 – Peter Blair, “Scotland in 3D – A Victorian Virtual Reality Tour”, P3DB Publications, 2018, ISBN 9781527225527
3 – Peter Blair, “George Washington Wilson – Stereoviews – A Collector’s Catalogue”, print-on-demand from http://www.scotlan3d.com | <urn:uuid:1fb9e855-0b01-4cf9-9c1f-59323bfc0ba6> | CC-MAIN-2022-33 | https://scotlan3d.com/g-w-wilson/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00004.warc.gz | en | 0.95964 | 2,926 | 2.984375 | 3 |
Conscientious daily care for problematic or fatty skin is the key to the beauty and purity of the face. To date, a lot of recommendations have accumulated on how to care for the skin with acne. However, most people did not find an answer to their question. Consider the problem of acne and care for oily skin in more detail.
Problem skin, as a rule, visually the impression of lifelessness and narrowness. The condition of the skin reflects the disorders inside the body or incorrectly selected cosmetics.
Oily skin has several characteristic features that are a feature of this type:
- Availability of medium or large number of acne, comedones, pimples or acne+
- Tuskness face+
- Excessive seal (sem)+
- Extended pores in the T-zone and on the cheeks+
- The use of alcohol-containing means leads to peeling.
Circumstances affecting the emergence and development of acne on the face, many. They can be systematized on the external effect on the skin and the internal processes occurring inside the body.
So, there are several factors to external circumstances.
- The aggressiveness of water from the tap used for washing. As a rule, the flow crane supplies the treated with a chlorine water that dries the skin, forcing it to produce natural protection in the form of sebum in a very large amount.
- Incorrectly selected cosmetics provokes irritation and painful rashes.
- Trying to align the tone of the face with the help of dense decorative cosmetics, a peculiar mask is formed, clogging and preventing the skin “breathe”.
- The use of cosmetics with an expired shelf life is not strongly recommended. However, many still sin. But do not forget that during the use of cosmetics, the tube accumulates many harmful microorganisms, which may be the source of acne on your face.
- Irregular bed linen change, constant touch of unclean hands with face. Particles of dust, dirt or fat instantly find themselves on your face, scoring pores.
Processes flowing inside the body and affecting the condition of the skin include a number of reasons.
- Lack of hormonal balance. Most often acne arises in adolescence when the body is rebuilt on a new mode. Problems with thyroid gland and taking medications containing hormones, can excrete abundant snare rashes even in an adult.
- Eating harmful food. Many know about adverse effects on the state of the skin and on the body in general of harmful products. However, deny yourself the pleasure of eating a plate of chips or fill a fatty mayonnaise salad can not. So, products from which should be abandoned, significantly affect the health of the epidermis. And all the favorite sugar is an excellent nutrient medium for the occurrence and growth of bacteria.
- The use of antibiotics is often the cause of temporary rashes. This is due to the fact that in the composition of antibiotics there are substances that destroy the microflora of the gastrointestinal tract. In this case, you should not panic as soon as the intestine microflora will be restored, all unpleasant consequences of drug intake will disappear.
Consider the season
Talking on the issue of care for fat and problem skin, it is necessary to take into account the changing seasons and their effect on the skin. Many note that in the summer, the skin produces a large amount of sebum, while winter makes the skin dry and strut. It is necessary to moisturize the skin regularly, regardless of the season. But in the summer period it should be as much as possible. Light creams are suitable for problem and oily skin, in which there is a tea tree. It is a natural antiseptic that perfectly moisturizes the skin in the summer, while removing inflammation and even drying the pimples. Another excellent component is Aloe Vera, favorably affecting the state of oily skin.
In winter, the main areas in skin care are toning that helps narrow the pores and nutrition, restoring the natural level of skin acidity and saturating it with useful vitamins.
Choosing a caring tool for your skin, it is recommended to carefully read the label. There may be a suggestion tip, which will help you choose a suitable agent.
As a rule, the conditional designations immediately rush and written in English.
- Clear – designation that prompts the consumer that the remedy is aimed at cleansing the skin.
- Purity – as in the first case, the tool contributes to the soft cleansing of the skin.
- Comodex – a means with this designation indicates that there are comedones in the composition.
- ACNE – Cleansing means for people with a pronounced acne disease.
- PROBLEM SKIN – often funds with this designation exit the whole line of drugs. As a rule, it is a tonic, gel and foam for problematic teenage skin.
- IRRITATION – a tool that is aimed at reducing skin irritation.
- Inflamation – means guaranteeing full disposal from inflammation on the skin.
Quality of cosmetics for oily skin is caused by several factors: removal of irritation, getting rid of acne and small pimples, the return of the skin into the original healthy appearance. The composition of the caring cosmetics must contain exclusively natural ingredients, such as bodiagas, sulfur, herbal decoction or extract.
Having preferred any cosmetic ruler, pay attention to the manufacturer. The brand engaged in the issuance of means to combat dermatological problems should have a flawless reputation and be in good account in consumers. Separately, it is worth mentioning the presence of a license that can confirm that the brand has conducted testing of funds and has the right to sell its products to people with skin disease. To date, pick up a product for care specifically for your skin is quite simple. The range is extremely diverse and wide. Depending on your financial capabilities, you can choose yourself a remedy in the suite segment or mass market.
You can choose a professional or budget option. Good reviews of the cosmetologist has a Korean caring cream.
In order to minimize rash and irritation on your face, It is recommended to follow certain rules.
- As a cleansing means, use a specialized tonic, gel or foam. In no case do not wash your face with soap.
- Water used for washing should not be more than thirty-five degrees. High water temperature contributes to the expansion of pores, in connection with which there is an excessive generation of sebum and redness appear.
- Get rid of the habit of intensively rub your face with a towel. Make blusting movements, wiping face after washing.
- Excessive contact with water adversely affects the skin, in connection with which the face is only in the morning and in the evening.
- Emptying acne at home is strictly not recommended. There is a huge risk of infection. Help with this process will help you in any cosmetic salon. With the help of the master and special sterile tools, you will remove the acne, while without such consequences, as the occurrence of the scar and infection.
- Preferably once every seven days resort to help specially designed for oily skin scrub.
- Regularly make a mask and apply protective cream or lotion.
- Minimize the amount of decorative cosmetics on the face.
- Before washing, thoroughly wash your hands, only after that, proceed to skin care.
It is very important to choose the right cream for sensitive or combined skin.
In a teenage girl and girls after 25 years old, she is often dehydrated.
In leather care, one of the fundamental rules is a sequence. Namely: cleansing, toning, moisturizing. Consider stages every process in more detail.
Cleansing is the first and important step for oily skin. Problem skin needs a soft daily cleansing that will not additionally injury the epidermis. With this task, a natural gel or tender foam will perfectly cope. Thanks to the means, the skin will be cleaned of excessive sebum, it will reduce its production, make a face more matte. Acidic cream more aggressive.
No less important stage is toning. As a rule, many women and girls ignore this stage, moving immediately to applying cream. And it is rooted wrong. The fact is that the previously used foam or gel helped clean the skin, but broke the natural level of skin acidity. In order to normalize the former level, it is recommended to use a tonic suitable for your skin type. Performing two tasks at once, the tonic removes the dirt remnants with which the foam or gel gel did not cope, and restores the pH of the skin. Toning is an important step that prepares the skin to apply the cream. Pay attention to cleansing agents and tonic from one cosmetic line. In most cases, such products are well combined with each other, providing comprehensive skin care.
The final stage in caring for problem skin is moisturizing. It is the opinion that oily skin does not need additional moisture with the help of a cream, since it herself allocates a large amount of fat. It is worth noting that this is a delusion. The fact is that even fatty and problem skin needs a light moisturizing cream. Regular use of alcohol-containing products aimed at getting rid of acne and gloss in the T-zone, strongly dried skin. It provokes the epidermis to produce as much sebum as possible, in order to moisten the skin with her usual way. Give preference to a light moisturizing cream or lotion. Refuse oil for face or nutritional, they can score pores.
An additional event that promotes skin cleansing may become peeling. It is recommended to hold it no more than two times a week, it is desirable before going to sleep so that the epidermis manage to recover. Thanks to the peeling, you can eliminate tightly emerged pollution in the pores. Wash the facilities to peeling a boiled water temperature.
We bring to your attention a few useful tips, following which will help minimize rashes on your face. First of all, take care of the epidermis from the influence of the Sun. Do not abuse solarium. Despite the fact that the tan visually makes acne less noticeable, but in reality only aggravates inflammation. To top it all, most of the means intended for the care of problem skin increase the sensitivity of the skin to the ultraviolet rays. In this regard, there is a high risk of advent of pigment specks.
Pay attention to masks containing white clay, which is also called Kaolin. It is an excellent absorbent, pulling the dirt from even the deepest pores, and minimizes the production of sebum. Tea tree oil, lavender, chamomile, sage and calendula are your “allies” in the fight against acne and irritation.
Of course, one thing applying the mask will not replace full-fledged treatment, but to dry inflammation, narrow the pores, align the skin tone mask capable.
When using decorative cosmetics, give up the Rumyan. The fact is that it is this product that most often contains in the composition of oil, which clogs the pores. You can replace them with dry shadows of the shade you need. During problematic and fatty skin, it is also recommended to abandon dense tones, instead of using a consiletor or a masking pencil. Instead of compact Poll, give preference to crumbly. Responsibly treat the selection of cosmetics. Take care of cosmetic lines sold in pharmacies. As a rule, such cosmetics contains a small amount of zinc. It does not allow pore closure, having a slight drying effect.
Read more about how to properly care for problem skin, you will learn from the following video. | <urn:uuid:d81bfd76-4617-47d1-926a-0948a99a8623> | CC-MAIN-2022-33 | https://womenszine.info/the-beauty/facial-care/how-to-care-for-problem-skin.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00205.warc.gz | en | 0.9318 | 2,430 | 2.609375 | 3 |
The full magnitude of the scale of shock at the news of President Kennedy‘s assassination half a century ago cannot be fully appreciated today. Perhaps only by comparison with more recent traumas such as the September 11th attacks in 2001 or Princess Diana’s death in 1997 can we today find any suitable frame of reference.
But the impact of the shooting was huge. The effects on the Kennedy family, the US and the world in general have continued to resonate throughout ensuing fifty years…
President John F. Kennedy is assassinated in Dallas, Texas. Vice President Lyndon B. Johnson is sworn in as his successor. Kennedy’s alleged assassin, Lee Harvey Oswald is himself shot dead by night club owner Jack Ruby on live TV two days later. The Warren Commission is set up to investigate the assassination.
Bobby Kennedy, the late president’s brother, resigns as Attorney General. He and President Johnson have long hated each other. Bobby is elected Senator for New York.
Ted Kennedy, already a Senator for Massachusetts since 1962, is involved in a serious plane crash. He suffers a broken back and punctured lung. Two others on board including the pilot are killed.
President Johnson passes a wealth of legislation including the Civil Rights Act. Johnson wins the 1964 presidential election handsomely with Hubert Humphrey as his running mate (both Humphrey and Johnson fought Kennedy for the Democratic nomination in 1960 and lost).
History will never know for sure whether Kennedy had he lived, would have passed as much legislation as Johnson, been re-elected in 1964 or escalated the Vietnam War to the same disastrous extent.
The Warren Commission (which includes future Republican president, Gerald Ford amongst its members) rules that Oswald acted alone in killing Kennedy. Over time, most Americans grow to disbelieve this verdict.
Malcolm X, black civil rights leader, is assassinated.
President Johnson dramatically escalates the Vietnam conflict.
Jack Ruby, Lee Harvey Oswald’s killer, dies in prison.
Another traumatic year for the US and the Kennedys.
Martin Luther King, black civil rights leader, is assassinated prompting widespread race riots.
President Johnson shocks the world by pulling out of the presidential race following serious setbacks in Vietnam and a strong primary challenge from the anti-war Senator Eugene McCarthy. Senator Bobby Kennedy has already entered the race by this point.
A bitter Kennedy-McCarthy primary battle ensues (McCarthy fans see Kennedy as jumping on the anti-war bandwagon). Kennedy eventually emerges triumphant at the California Primary in June. With Richard Nixon emerging as the new Republican candidate, the stage seems set for another Kennedy vs. Nixon contest as in 1960. But moments after his California victory speech, Bobby is himself shot and killed on live TV. The assassin is Sirhan Sirhan, a young man who objects to the Senator’s support for Israel (a position shared by most US politicians). Sirhan remains in jail today. Kennedy leaves behind a pregnant wife, eleven children and a Democratic Party in disarray.
At a deadlocked convention, some Democrats move to draft 36-year-old Senator Ted Kennedy as the candidate but the last Kennedy son is at this point fearful of assassination himself. Vice President Hubert Humphrey is eventually chosen as nominee but loses narrowly to JFK’s defeated 1960 opponent, Republican Richard Nixon in the November general election.
Jacqueline Kennedy horrifies many by marrying Greek shipping magnate Aristotle Onassis.
The Apollo 11 mission fulfils JFK’s 1961 pledge to land an American on the moon and return him to Earth by the end of the decade.
That very same weekend Senator Ted Kennedy – already seen as the most likely Democratic presidential nominee in 1972 – appears to crash his car at Chappaquiddick, leading to the death of a young girl Mary Jo Kopechne. The scandal and Kennedy’s unsatisfactory explanation for his behaviour (he claimed to have “repeatedly dove” to rescue her), the suspicion that he was having an affair with her or that he may have been drink driving, casts a shadow over the rest of his career. His judgement is certainly questionable, calling his lawyer immediately after the crash before calling the emergency services. He is not jailed and is re-elected to the Senate many times. But he will never become president.
Father Joseph P. Kennedy dies aged 81 (he has been unable to speak since as stroke during his son’s presidency. He has seen two of his sons assassinated, another killed in the war, a daughter lobotomised and another killed in a plane crash.
George Wallace, pro-segregation Governor of Alabama and an old rival of the Kennedys, is shot and badly wounded by student Arthur Bremner. Bremner’s disturbed diary inspires the film Taxi Driver which itself inspires John Hinckley to shoot President Reagan in a bid to “impress” actress Jodie Foster in 1981.
Ted Kennedy threatens to run for president when last minute polls suggest he could win the nomination. But he chooses not to. Senator George McGovern gets the Democratic Party nomination instead.
Sargent Shriver, Eunice Kennedy’s husband, is picked as Senator George McGovern’s running mate after his first choice, Thomas Eagleton is forced out by revelations about his medical history.
McGovern and Shriver are defeated heavily by President Nixon who wins 49 out of 50 states.
Lyndon Johnson dies (had he ran in 1968 and ran again, his presidency would have ended just two days earlier). Unusually, as Hoover, Truman and Eisenhower all died within the last decade, there are no former US presidents alive for a period between January 1973 and August 1974.
The tenth anniversary of the JFK assassination. The US is mired in Vietnam and Watergate.
Alan J. Pakula’s film The Parallax View starring Warren Beatty focuses on assassination conspiracy theories.
President Nixon resigns over the Watergate Scandal. Gerald Ford succeeds him.
President Ford narrowly escapes two assassination attempts within the space of a fortnight. Both the assailants are women. “Squeaky” Fromme (a member of the Manson “family”) draws a gun on Ford when he attempts to shake her hand in the crowd. Sara Jane Moore fires a gun at Ford but a bystander knocked her arm causing her to miss. Both women were freed only after Ford’s death over thirty years’ later.
Aristotle Onassis dies. Although only in her forties, Jackie Onassis does not remarry again.
The film Taxi Driver featuring a fictional assassination attempt on a presidential candidate is released. As mentioned, this inspires John Hinckley Junior to shoot President Reagan in 1981.
Democrat Jimmy Carter narrowly beats President Gerald Ford for the White House.
Maria Shriver, Sargent and Eunice’s daughter meets Austrian bodybuilder Arnold Schwarzenegger. He is already an aspiring film actor and Republican supporter.
The William Richert film Winter Kills centres on a fictional Kennedy-esque family cursed by assassinations.
Senator Ted Kennedy mounts his one and only bid for the Democratic presidential nomination. He mounts an effective challenge and delivers a memorable speech to the Democratic Convention but is beaten by President Carter who goes on to lose to Ronald Reagan in November. Kennedy is harmed by the ghosts of Chappaquiddick. In retrospect, he also seems foolish to have run in a year where he would have to unseat a sitting incumbent Democratic president (the only election in which this was the case between 1968 and 1996).
Ex-Beatle John Lennon is shot dead in New York.
President Reagan is shot and wounded by John Hinckley Junior. Hinckley is ruled not guilty as he is insane. Reagan’s press secretary Jim Brady is badly wounded in the shooting. Secretary of State Al Haig declares on TV in the hours after the shooting that after Reagan and Vice President Bush, he is in control. This is constitutionally incorrect (he was third in line after both the Vice President and the Speaker of the House) and the “I’m in charge” gaffe reassures no one on an alarming day. Reagan makes a full recovery and eventually dies in 2004, long after the end of his presidency.
This seems to break the supposed “curse” which has seen every president elected in a year ending in zero since 1840 die in office (1840: Harrison, 1860: Lincoln, 1880: Garfield, 1900, McKinley, 1920: Harding, 1940: FDR, 1960: JFK).
Martin Sheen stars as JFK in the acclaimed TV series, Kennedy.
David Kennedy, Bobby’s fourth son, dies of a drug overdose, aged 28.
Mara Shriver marries Arnold Schwarzenegger, by now a huge film star. He is Republican Governor of California from 2003 until 2011. She remains a Democrat. Their marriage ends in 2011.
Kennedy-esque Democratic contender, Gary Hart is forced out of the presidential race after a sex scandal.
Future Vice Presidents Joe Biden and Al Gore evoke Kennedy strongly in their presidential bids as does the eventual nominee Massachusetts Governor, Michael Dukakis.
Senator Dan Quayle unwisely compares himself to JFK in the vice presidential debate:
Quayle: I have far more experience than many others that sought the office of vice president of this country. I have as much experience in the Congress as Jack Kennedy did when he sought the presidency. I will be prepared to deal with the people in the Bush administration, if that unfortunate event would ever occur.
Judy Woodruff: Senator [Bentsen]?
Bentsen: Senator, I served with Jack Kennedy, I knew Jack Kennedy, Jack Kennedy was a friend of mine. Senator, you’re no Jack Kennedy.
Bentsen wins the debate although Bush and Quayle win the election.
William Kennedy Smith, Senator Edward Kennedy’s nephew is acquitted after a high profile rape trial. Although he is acquitted, the family’s image is further tarnished by the scandal.
Oliver Stone’s hugely controversial film JFK is released. It centres less on the President himself but on conspiracy theories surrounding his death.
Democrat Governor Bill Clinton is elected to the presidency. His campaign makes great play of various superficial similarities between the candidate and JFK. Clinton’s “New Covenant” echoes Kennedy’s “New Frontier” (though proves less resonant). Clinton is also similarly youthful (46), has a slight physical resemblance to JFK and actually met the assassinated president when the 35th president visited his high school when Clinton was 16.
Joyce Carol Oates’ novella Black Water is published. It is clearly inspired by the Chappaquiddick Incident.
John Connally, the former Governor of Texas wounded in the 1963 assassination dies, aged 76. In the years since, he has defected to the Republicans and ran for president himself in 1980, being beaten for the party nomination by Ronald Reagan.
Jacqueline Kennedy Onassis, widow of the former President, dies aged 64.
Special effects technology enables JFK to appear as a character in the film, Forrest Gump.
Patrick Kennedy, a son of Ted Kennedy, is elected to the House of Representatives.
Rose Kennedy dies aged 104. She is the mother of Jack, Bobby and Ted.
The novel Idlewild by British writer Mark Lawson imagines President Kennedy surviving into old age. Idlewild in New York was renamed JFK Airport following the 1963 assassination.
Michael Kennedy, another of Bobby’s children, dies in a skiing accident. He is 39.
The Dark Side of Camelot by Seymour Hersh is published.
John F. Kennedy Junior, the only son of the assassinated president, dies in a plane crash, alongside his wife and sister-in-law. He is 39.
Thirteen Days, a film about the Cuban Missile Crisis is released. Kevin Costner stars as he did in JFK (although does not play JFK in either case). Bruce Greenwood is JFK and Steven Culp, RFK (The 13 days referred to in the title are October 14th-28th 1962).
Another JFK , Senator John (Forbes) Kerry wins the Democratic presidential nomination. He is also from Massachusetts and is the first Roman Catholic to be nominated since John F. Kennedy himself. However, he ultimately lacks the Kennedy magic and is beaten in the November election by President George W. Bush. The Bush political dynasty has thus far produced two US presidents.
The Manchurian Candidate centring on political assassinations is remade, starring Denzel Washington.
The film Bobby, directed by Emilio Estevez and based around the day of Bobby Kennedy’s assassination is released. Estevez is the son of Martin Sheen who played JFK in 1983.
Barack Obama is the first African American to be elected US president. Some see this as a fitting tribute to the career of Senator Ted Kennedy, who has by now been diagnosed with a fatal brain condition. Obama is also the first president born during Kennedy’s presidency and the first serving US senator to win the presidency since JFK himself in 1960.
Ted Kennedy dies, age 77. Although his career was marred by the Chappaquiddick Incident in 1969, he enjoyed a long and successful career as “the lion of the Senate”. He is the third longest continuously serving Senator in US history.
Four out of five of Joe and Rose’s remaining daughters die during this decade (Rose, Kathleen, Eunice and Patricia).
TV series The Kennedys starring Greg Kinnear as JFK and Katie Holmes as Jackie. It is less well received than the series, The Kennedys, thirty years before.
Jean Ann Kennedy, former US ambassador to Ireland is the only remaining daughter of Joe and Rose Kennedy left. She is 90. | <urn:uuid:0b3adae5-5116-452d-9200-63d7cd9379da> | CC-MAIN-2022-33 | https://chrishallamworldview.wordpress.com/tag/ted-kennedy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00004.warc.gz | en | 0.962603 | 2,937 | 3.03125 | 3 |
At DEISO, we believe that Education for Sustainable Development (ESD) is an essential component of modern education. This is essential to prepare for a generation of leaders that are aware and responsible for the global and local changes; participating in achieving the Sustainable Development Goals (SDGs), raise their awareness to the global, regional, and local issues such as climate change issue, resource depletion, sustainable lifestyle practices, environmental issues, and global crises, and participate in archiving SDGs. For these purposes, we offer the below professional services of ESD:
- Support for implementing ESD in the educational curriculum for educational institutes such as schools, undergraduate, and postgraduate programs.
- Syllabus development of ESD: We help educational institutes implement well-planned and research-based syllabi. We carefully develop them based on the UNESCO guidelines and literature (including journal papers, scientific reports, and ESD-focused book materials).
- Analysis of the current educational curriculum and integrating the ESD within it.
- Educational seminars, workshops, and training for educators or students.
- We provide strategic planning and consultation of ESD-related needs for our clients.
- We advise and guide on ESD research projects.
- We offer a professional consultation based on data-driven and evaluation studies for ESD plans, educational goals, and ESD research projects.
- We provide dedicated support to developing countries to implement ESD in their educational systems.
- We provide service-specific consultation, planning, and advice to governments, NGOs, and local and international organizations worldwide.
- We identify the stakeholders in empowering or implementing SDGs, communicate with them, and work together to facilitate the transition process to ESD.
Introduction to ESD and our Approaches to ESD Integration and the Shift from Traditional Education to ESD Based.
Background on ESD
The concept of sustainability was first introduced to education at an international level by the UNESCO-UNEP International Environmental Education Programme in 1975, jointly administered by the United Nations Educational, Scientific and Cultural Organization (UNESCO) and the United Nations Environmental Programme (UNEP) (Yarime & Tanaka, 2012). The term “ESD,” now is widely used, was first mentioned by the United Nations in its agenda 21, developed at the United Nations Conference on Environment and Development in Rio de Janeiro in 1992 (McKeown, 2002).
In Chapter 36 of the agenda, ESD was an essential strategy for meaningful, sustainable development in developed and developing nations. The United Nations found that the strategy was essential to help the nations shift from the conventional to a sustainable form of education. It was also essential to integrate education into sustainable development to tackle environmental challenges and other development issues such as equity.
The ESD goal was to promote sustainable development and improve people’s capacity to address environmental and development challenges. For that to be achieved, agenda 21 articulated four components: (1) improvement of primary education, (2) reorientation of basic education to address sustainable development, (3) development of public awareness, and (4) training of capacities. These components focused on enriching human wealth through improving education, reducing environmental impacts, and improving the economy. Society is the starting point for all. However, since then, the ESD concept and its implementation have shifted, advanced, and changed as new concerns arose.
The purpose of this page is to (1) review the first milestone of Education for Sustainable Development (also known as “ESD”), (2) discuss the world’s biggest challenges from a view, and (3) present our conceptual and practical approach to offering our clients with ESD mentioned above services.
When the concept of ESD was proposed, the concept itself conveyed a message that ESD is an essential tool for sustainable development regardless of its implementation in developed or developing nations. ESD was essential to help the countries shift from conventional education to sustainable ones. It was also essential to integrate sustainable development knowledge to tackle environmental challenges and other development issues such as equity.
ESD, in its first milestone, focused on capacity building through training. More important, it is to raise public awareness toward the century’s primary concerns. When the concept of sustainable development rose, there was a call for promoting education and the understanding of sustainability. The discussions were all on sustainable development, ESD, and sustainability. Those three components were produced to enrich human wealth through improving education, reducing environmental impacts, and improving the economy where society is the starting point for all.
The Main Message of the First Milestone
The First Milestone of ESD: The Significance of the First Milestone
Changes in Conditions Since the First Milestone
Things have changed since the first milestone was published in agenda 21. More severe environmental, economic, and social issues have arisen. Examples include biodiversity, climate change, cultural diversity, disaster risk reduction, poverty alleviation, gender equity, health promotion, sustainable lifestyles, peace and human security, water management, waste management, sustainable urbanization, and food security. Water scarcity is one of the top concerns, especially in countries embroiled in conflict about shared water resources.
From a theoretical viewpoint, sustainability science as a new discipline has emerged. Sustainability science seeks to understand the interactions between global, social, and human systems (Steinfeld & Mino, 2009). ESD is nowadays integrated with sustainability science to address today’s primary challenges. As sustainability gradually influenced educational practice. The concept of ESD, therefore, emerged. ESD emphasizes aspects of learning that enhance the transition toward sustainability (Barth & Michelsen, 2012).
Lessons Learned from the Historical View of the Sustainability and ESD Concepts
The main lessons that can be gained from the historical view of the sustainability concept are stated below:
- Sustainability is flexible and can be developed or elaborated overtime when facing different sustainability challenges that differ in their seriousness. The concept of sustainability proved its flexibility when facing, for example, global warming and water scarcity.
- The concept of sustainability improved by facing new global issues. Human concerns in the 1990s differed from those nowadays. Recent problems have been raised and gained considerable attention, such as sustainable lifestyle, sustainable urbanization, etc.
- The concepts of sustainability and ESD are problem-solving-oriented. Their capabilities have been improved over time to solve humanity’s most recent problems concretely.
- The concept of sustainability and ESD transferred to a multidisciplinary concept that can cover different fields of knowledge.
The World's Biggest Challenges After the First Milestone and the Necessity of ESD Integration
Most problems arising from human activities’ impact on Earth’s life support systems come from complex, global, and human social interactions (Uwasu et al., 2009). When humanity deals with those problems, it can lead to sustainable development. While it is difficult to provide solutions, the implementation and development of ESD offer hope. The world must figure out solutions so society can be sustained at the international level. Those seven challenges can be summarized: population growth, the disappearance of cultural diversity, global warming, freshwater shortage, energy, and food. Humanity can respond to the problems through enhanced education with ESD implementation and international cooperation.
Population and ESD
The biggest problem associated with the population explosion is the depletion of the planet’s resources. Believe that education, at all levels, will help not only reduce effects associated with the exploding demographics worldwide but most of the other problems caused by the increasing population. Family planning, especially in developing countries, will be accomplished only by obtaining the education needed, from elementary school through college.
Access to education by all, regardless of gender, is vital in solving the problems. This injustice is slowly waning because women are more socially accepted today. However, there still an attempt to be made by the United Nations to promote education and fight for gender inequality. Also, local governments’ efforts to raise public awareness of education and gender inequality will encourage women to become more socially involved. ESD raises awareness and helps the young generation collaborate with society to face this issue or reduce its impacts
The Disappearance of Cultural Diversity and ESD.
Languages are one of the most building blocks of cultural diversity; it is necessary for international communication and business establishment. But now, the world is facing the disappearance of many languages. The dying of languages has been going on for thousands of years. However, in the past hundred years, a dramatic increase in the death and disappearance of languages has been seen, leading to cultural diversity’s disappearance. ESD is essential to preserve local cultures and languages by raising public awareness and understanding the social and national risks behind that, and participating in transferring both culture and language from one generation to another.
Biodiversity and Education for Sustainable
Every year or even every month, many species of animals and plants face extinction every day. This is because man is destroying nature, resulting in the disappearance of the ecosystem balance. In this context, ESD helps students, especially postgraduate students, in practical mitigation solutions by focusing on this topic in their graduation research work. They are interested in this issuer to take responsible and personal actions in practice and attitude to mitigate the issue.
Climate Change and ESD
Climate change or global warming is a hot global issue and one of the top serious ones due to its short, mid, and long-term consequences on Earth and people’s life aspects. To notably mitigate this problem, we need to establish societies with low carbon footprints. International cooperation can achieve this. There is a need to work harder in raising public awareness through ESD about global warming. This can be accomplished through ESD in several ways. ESD is one of the core starting points to word the climate change problem.
The per capita water consumption has doubled since the 20th century. However, one of the most valuable UNESCO achievements is the establishment of the freshwater program. Because of this, 2003 was the International Year of Water at UNESCO. However, a mechanism must be developed to solve this issue through ESD. Public awareness is an essential part of sustainable water use and management for sustainable water use and utilization practices.
Energy Demand and Scarcity
Establishing sustainable sources of energy is a big concern, especially for industrialized countries. For example, before the 2011 earthquake, Japan increased nuclear power production to meet its energy demands. Now, the government is examining renewable energy alternatives. ESD can reduce energy consumption and the need to develop alternatives through research of postgraduate students, sustainable energy use at a personal level, and increasing public social awareness worldwide.
In 1972, UNESCO issued a warning that the world would face a severe food shortage problem. This prediction has come true in Africa. However, the good part is that the problem is not yet global; the unwelcome news is that it is expected to rise globally. Agriculture plays a vital role in providing the world’s population with food, but global warming has negatively affected agriculture. Therefore, both issues are interlinked.
One significant initiative to tackle the mentioned challenges was through the United Nations’ Decade of Education for Sustainable Development (DESD). In recognition of the importance of ESD to sustainable and human development, the United Nations established the DESD during its 57th session in December 2002. ESD is one of the core components to address food security issues at local and global levels. Awareness related to proper consummation, food waste reduction issues, research on agriculture, smart agriculture, food waste utilization in waste management systems.
DEISO Solutions Through ESD
Social Capacity Development
Social capacity development is reflected in the abilities, individually and collectively, to perform functions, solve problems and set and achieve goals. Capacity development is also called a capacity building or strengthening. It overcomes a micro-macro paradox in institutional change. Institutions are the essential rule makers in society, as they form the constraints that shape human interaction. They govern specific behavioral patterns repeatedly exhibited by people in society, whether formal institutions such as laws or informal social norms. Social sectors can be divided into three main categories: government, citizens, and firms. Here, social capacity must deal with environmental problems through individual and interactive efforts of social actors. Social capacity development is an endogenous, comprehensive, and sustainable process for solving problems in partnership with social actors and interaction with socio-economic conditions. However, the most critical aspect of social development is its unique capability to manage environmental challenges in a social system composed of the explained sectors. Those areas can contribute to development; more important, they can help attain the required socio-economic conditions as an essential step to achieve better, more sustainable solutions to environmental problems through ESD.
Help with International Cooperation
International cooperation has been changed from the traditional approach to an approach based on capacity development. The new broader scope covers higher budgets and a move toward human resources, especially in developing countries. One of the significant changes is that the new form of cooperation aims to achieve a more extended period with unambiguous selection criteria. Japan, as an example of a big donor, Japan International Cooperation Agency is one notable case of the change in the international cooperation between Japan and the outside world, not only regarding financial aid, which includes donations, loans, and grants but also regarding technical operation. In Japan’s case, the environmental sector domain covers residential environment, forest conservation, pollution controls and countermeasures, disaster prevention, and climate change. Japan has also established several environmental centers in some Asian countries, especially in East Asia. The World Bank is another notable example worldwide.
This section proposes a fundamental conceptual and an integrated framework to implement and improve ESD in developing countries through the developed world’s aid. The necessity of such a framework came from the idea that developing nations, especially low-income countries, lack the required knowledge, experience, and technical support to implement or improve ESD through all levels of education. The proposed conceptual and integrated approach is based on these assumptions:
DEISO can collaborate with all parties and stakeholders to facilitate this international collaboration through our departments and services. Check out our departments here.
Our Help for Implementing ESD in Developing Countries
Implementing or improving ESD in developing countries needs integrated components for successful implementation. Such components can be divided into two layers:
- Background layer: society, culture, and education.
- Foreground layer: health, environment, and economy.
ESD is the core of the multidimensional framework. The main dimensions are society, culture, and education. These three dimensions are integrated with two principal components, environment and economy. Following is a description for each:
- Society: Society is an essential part of the integrated framework for social institutions’ role. Their roles in the change and development process to implement and improve ESD are relevant. It is a significant pillar supporting the other components and can be integrated with culture and education. This includes developing an understanding of society’s relationship, culture, education, economy, and environmental concerns at local, regional, and global levels.
- Culture: Culture is not to be excluded from the development process of ESD. An understanding of its values that influence and shape the attitude and behaviors of stakeholders is vital. Societies need to learn about the diversity of cultures, values and how they affect people’s attitudes toward education, the economy, and the environment. Culture, in this framework, represents two sub-components: religion and attitude.
- Education: ESD must be addressed based on education level (level of implementation) from elementary school to graduate school. The target of education has been defined and specified. Many universities are striving to integrate ESD into their educational activities. Appropriate student learning outcomes, course syllabi, course curricula, and assessment methods are in focus. One reason behind the current efforts is the UN DESD (2005–2014), which UNESCO handled, which aims to integrate the principles, values, and practices of sustainable development into education and learning (Segalàs et al., 2009).
- Environment: Through society, culture, and education, environmental damage is expected to be reduced. Public awareness will be increased, and the community members will participate in maintaining the environment.
- Economic: The economy is expected to be improved due to implementing/improving ESD through creating jobs and sustainable business. This will reduce the poverty levels and increase professional capacities to participate in society.
Challenges to implementing ESD in Developing Countries
The biggest challenges of implementing ESD are summarized below:
- International cooperation is essential to solve particular ESD challenges and environmental problems as described.
- More experienced countries need to transfer know-how and technology to make this project successful.
- Key challenges include public awareness, funding, and policies and legislation.
We are Here to Help
Regardless of these challenges, DEISO is a well-established business to tackle such challenges and work together with companies, educational institutes, universities, local governments, NGOs and various stakeholders, and international and local funds organizations to resolve the issues as mentioned earlier.
The presented overview of ESD and the world’s biggest challenges that humanity is facing globally were explained. They can be mitigated or tackled by the ESD approach. DEISO offers various services to implement, enhance, or integrate ESD in the educational institutes from school to undergraduate and postgraduate programs. DEISO focuses on additional services on human capacity building (or human resource development) with ESD. It also offers dedicated services and special attention for developing countries to help them tackle the ESD-related obstacles. Also, for developing countries, we offer collaboration with international funds organizations to implement ESD for developing countries. You can contact us and discuss your organization’s ESD needs or plans. | <urn:uuid:b78c5a83-3412-4805-91ce-01372717ac3d> | CC-MAIN-2022-33 | https://deiso.co.jp/education-for-sustainable-development-esd/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00005.warc.gz | en | 0.941304 | 3,641 | 2.859375 | 3 |