text
stringlengths
1k
23.6k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
16
1.34k
file_path
stringlengths
125
126
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
2.05k
4.1k
score
float64
2.52
4.91
int_score
int64
3
5
Monday - Friday 9am - 5pm Summer Sale – up to 30% off Rated Excellent ★★★★★ Sustainable Our Sustainability Promise 2 Year Guarantee on Beds and Furniture Pay Later with Klarna Price Match Our price match Posted on 16/04/2021 by Room to GrowHealth, Learning, Parent Health, Safety How you explain Covid-19 to your children will depend largely on their age and level of understanding; some may already know and understand more than others, some may be rather concerned and need reassurance more than anything and some may be entirely unaware. The key to explaining this difficult situation is to be open, understanding, reassuring and most importantly honest. The news, TV programmes, social media and general conversations are saturated with discussions of Covid-19 therefore it is likely your children have heard it being mentioned. Especially now most children are home from school it is important they are aware of exactly why. Some may be entirely aware of what it is and what it means whereas others may be largely unaware; either way it is important to discuss this with your children and reassure them as there is also a lot of misinformation being shared online; which for older children could be a concern. Keep in mind that the youngest of children probably won’t know or understand what’s going on and they may not need to however the older they are the more you may need to talk through with them. For younger children, simply talking through the new illness may be enough however for older children you may need to dispel rumours or false information they might have heard as What They Already Know Start by finding out exactly what your children already know. Again, exactly how you go about this will depend on their age and understanding. With younger children it might be best to ask them if they’ve heard of a new sickness or illness, whereas with older children you can ask them specifically if they have heard people in school talking about coronavirus or covid-19 and further ask what they are saying and exactly how much they know. This way you can decipher whether they are hearing false information. The most important thing to remember is to be honest; as mentioned, there is a lot of false information circulating online, especially on social media which your teen may be seeing. If you child isn’t interested in the discussion, that is fine but if they are make sure you are as truthful as Start with the facts about what the virus is and how it is going to affect people as well as the impact it is going to have on everyday How the Virus Spreads The virus is new and therefore not much is known about exactly how it is spread, but what is known is that it spreads quickly and can be very contagious. Based on how other virus’ spread it is believed it is spread through contact and may also be airborne. Based on this, the government and NHS are advising people to stay inside and wash their hands with soap and water frequently for at least 20 seconds and not to touch your eyes, nose or mouth if your hands are not clean. Whilst there are many potential symptoms of Covid-19, there are a few which are most commonly identified and therefore should be the main ones to be aware of and to make your children aware of. The above two symptoms are the most common, however other symptoms can include: As the virus is knew, full symptoms are not yet known however if you have any of the most common symptoms, NHS England are advising you to self-isolate. It is important to make children aware of the symptoms, should they experience any of them, however it is also important to reassure them not to worry. How Life is Going to Change As much as the virus itself can be concerning for children, the implications on daily life may be the most notable change for them. Especially if they are younger and don’t fully understand what is happening in the news and media. Currently the UK government is instructing everyone to stay inside aside from 1 form of exercise per day, essential travel for supplies such as food, and essential workers travelling to work. For children this means they won’t be attending school, unless their parents are key workers, and instead they will be at home with parents who may also be working from home. Whilst at first this may seem like more of a holiday to them, over time they may begin to question why they can’t go to school, play out and see their Explain to them how important it is to stay indoors to protect people from the virus and keep everyone safe. The UK government has full guidelines on children and covid-19 as well as key information on the importance of staying home. Children are generally quite curious so will likely have questions, make sure to answer them as honestly and as best you can. Be open when you don’t know the answer and instead see if you can find out; using government and NHS sources you will probably be able to find the correct answer. Q: How do you know if you have the virus? A: Most people experience cold or flu like symptoms; but, mainly a cough and a fever. You may also feel achy and tired. Most children appear to get mild symptoms. Q: Who can catch the virus? A: Anyone can catch the virus and it is spread through close contact with those who have it already so it is important to wash your hands more often and stay in your home. Q: Am I going to get sick? A: Even children who catch the virus don’t seem to experience bad symptoms, you may feel unwell like when you have a cold or flu and you will want to stay in bed and get rest. But, we will take care of you and make sure you have medicine to feel better. Q: What happens if you get sick? A: If I get sick, I will do the same, I might need to stay in bed for some days and I might have to see a doctor for a test. But family can take care of you and depending on how I am I should be at home, just Q: Why can’t I go to school or see my friends? A: The schools have closed so that less people get sick. If we all stay inside it helps stop the virus spreading and then the doctors can help the poorly people in the hospital. We have to stay in the house to help the doctors help the sick people. Q: Are my grandparents going to be ok? A: As with some other illnesses like the flu, older people might get sicker than younger people but the doctors and nurses in the hospital are doing their best to help everybody get better and we are all staying at home to protect the older people and those with health problems. Depending on your child’s age and understanding of the situation you may need to adjust the answers, and they may have different questions but as long as you stick to the facts and be as honest and reassuring as possible you will have everything you need to explain. Offer Comfort and Reassurance Make sure when discussing the virus, you speak calmly as children can pick up when their parents are worried. Explain to them the symptoms but reassure them most people who get sick will feel like they have the flu or a cold. Reassure them that they don’t need to worry but do explain the symptoms to them as best as possible. Give them space to air their concern; they will likely be concerned about getting sick but reassure them kids don’t seem to get as sick and talk about their fears openly. Also reassure your children that if they are worried, or scared about any aspect of the virus; from the symptoms to the effects it is having on daily routines, they can talk to you about it and you will comfort Be Aware of Online Information online sources when explaining the virus to children. Older children who have access to the internet may have already come across false information, so it is important you find out if this is the case. Unfortunately, there is a plethora of false or misinformation online and on social media so it is essential to find out what they may have seen and dispel any myths which may be circulating. Make sure you inform them about the likelihood of false information spreading online and assure them they can come to you with questions about this. Teach Them Ways to Feel in Control In times like this we can all feel a little out of control, and it can be the same for children. Teach them some things they can be doing to feel a little more in control. Explain what they need to do to stay strong and healthy such as eating well, exercising and getting enough sleep. In addition to this talk to them about washing their hands as a means of keeping germs at bay. Let them know its ok to feel stressed and worried but make sure to reassure them that these feelings will pass and they can talk about their Assure them that medical staff are looking after those who are sick, and it can even be reassuring for teenagers to know what scientists are doing to combat the disease as well. Keep Checking In Make sure to keep checking in with your children about how they are feeling, keep them updated so they don’t worry and let them watch the news with you if they wish so then you can be sure they are getting the right information and you can filter what they hear and explain developments to them properly as they occur. It can be a stressful time for all, but with a little reassurance and comfort we can ensure children feel secure yet aware of the current circumstances. This week is National Story Telling Week (28th January – 4th February), an important week… My youngest son is obsessed with Disney's Frozen. While he's not overly keen on the… It can definitely be said that childcare is evolving and that the changes being made… Share this post There are currently no products in your basket.
<urn:uuid:caede870-e498-4fc3-9f3f-97f4ac919093>
CC-MAIN-2022-33
https://www.roomtogrow.co.uk/blog/explain-covid-19-to-children/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00205.warc.gz
en
0.968374
2,214
3.203125
3
A breath-taking one-third of all food produced is lost or wasted, according to the Food and Agriculture Organisation (FAO). Globally, this translates into 1 billion tonnes of food, or a $1 trillion economic loss each year – and accounts for 6-7% of global greenhouse gas emissions. The losses go on: food that is harvested, but subsequently lost or wasted, guzzles about a quarter of all water used by agriculture, and consumes a land mass the size of China in growing space each year. With 820 million people going hungry every day, this is a truly woeful situation. Measuring the challenge Food loss and waste is a complex subject, and it is very difficult to source reliable data. The statistics above are, by the FAO’s admission, only broad estimates. The ‘measure’ element of the Target-Measure-Act approach tries to rectify this data problem. It’s tough. There are many theoretical and technical problems in measurement – should we focus on quantity of waste, or economic value or calories lost? Is food recycled as animal feed waste? Should the avocado stone and peel be included when making loss measurements? For the sake of definition; food losses occur along the food supply chain from harvest/slaughter/catch up to, but not including, the retail level. Food waste, on the other hand, occurs at the retail and consumption level. Food diverted to other economic uses, such as animal feed, is not considered as quantitative food loss or waste. Globally, the ambition for reducing food loss and waste is enshrined in the UN’s Sustainable Development Goal (SDG) 12.3. The goal is to, by 2030, “halve per capita global food waste at the retail and consumer levels and reduce food losses along production and supply chains, including post-harvest losses.” It also links into many of the other SDGs, including for example SDG 1 – ‘No Poverty’, SDG 2 – ‘Zero Hunger’, and SDG 13 on climate action. Across the board, the SDGs aim to cut negative human footprints on land, water and carbon, while increasing food security and lessening poverty. Product waste and loss: not good for business Putting personal views on the immorality of food waste aside, this is a very serious business issue – one that is highly relevant for us as investors in three major UK food retailers. First off, in any business, waste negatively impacts margins. Reducing waste therefore improves profitability. Second, as consumers become ever-more educated on these issues, food waste is bad for a retailer’s brand and image. Third, food losses push up food prices, impacting demand. And finally, waste at the retail end of the food chain has the greatest impact from a greenhouse gas emission perspective. Food that has gone from growing and harvesting, to processing, to potentially chilled store shelves, with transportation in between, has accumulated the maximum amount of emissions for the food chain. Added to the emissions caused by waste from the end consumer, it ramps up Scope 2 and Scope 3 emissions for our investee companies, exposing them to increasing carbon prices and the costs to mitigate emissions. Our investee companies are focused on meeting the SDG 12.3 goal. All three have committed to halving food waste by 2030 and they have also signed up to the UK-specific Courtauld Commitment 2025. Tesco is a company demonstrating leadership on the issue. A member of Champions 12.3 (a coalition of stakeholders to driving the agenda to achieve the SDG 12.3 target), it has reduced total food waste by 15% since its 2012/2013 base year. Tesco and Morrisons have tried to tackle the problem of the desire for food products to meet aesthetic standards in terms of colour, shape and size via their ‘Perfectly Imperfect’ and ‘Naturally Wonky’ ranges, respectively. Our three retailers (including M&S) are partnering with numerous charities to redistribute surplus food; these charities include FareShare, FoodCloud, City Harvest, The Bread and Butter Thing and the Felix Project. Careful how we judge Nevertheless, they continue to contribute to the UK’s approximately 10 million tonnes of wasted food every year. Tesco’s UK operations contributes 41 thousand tonnes of net food waste, after redistributions to charities and recycling of food waste as animal feed. This is an underestimate, as it doesn’t account for waste in the supply chain or by the end customer resulting from retailer behaviour. However, before we get too harsh with Tesco and its peers, the pie chart points to us, the end consumers, as by far the biggest culprits of food waste. We account for 70% of UK food waste post farm-gate; retailers directly account for less than 3%. The good news is that on a national level, the UK, along with the Netherlands, is leading on the SDG 12.3 goal. The UK has reduced food losses and waste by 27%, so we are over halfway to hitting the 2030 target. Organisations such as WRAP are doing heroic work in driving the agenda. We will support this agenda by encouraging our three food retailers to continue to reduce food waste, and to go faster if possible. As a team and as a firm we are also supporting one of the charities mentioned, the Felix Project, in redistributing surplus food to London-based charities. This is one of those sustainability issues where we are totally aligned in our fiduciary duty to our investors, and to the interests of wider society. We are aligned with those stakeholders in our local community and globally who want to tackle climate risk, hunger and poverty. Meanwhile, if our investee companies are successful in reducing waste, they will be more profitable, enjoy enhanced brands – and thereby generate more attractive returns for shareholders. No investment strategy or risk management technique can guarantee returns or eliminate risks in any market environment. The term “RWC” may include any one or more RWC branded entities including RWC Partners Limited and RWC Asset Management LLP, each of which is authorised and regulated by the UK Financial Conduct Authority and, in the case of RWC Asset Management LLP, the US Securities and Exchange Commission; RWC Asset Advisors (US) LLC, which is registered with the US Securities and Exchange Commission; and RWC Singapore (Pte) Limited, which is licensed as a Licensed Fund Management Company by the Monetary Authority of Singapore. RWC may act as investment manager or adviser, or otherwise provide services, to more than one product pursuing a similar investment strategy or focus to the product detailed in this document. RWC seeks to minimise any conflicts of interest, and endeavours to act at all times in accordance with its legal and regulatory obligations as well as its own policies and codes of conduct. This document is directed only at professional, institutional, wholesale or qualified investors. The services provided by RWC are available only to such persons. It is not intended for distribution to and should not be relied on by any person who would qualify as a retail or individual investor in any jurisdiction or for distribution to, or use by, any person or entity in any jurisdiction where such distribution or use would be contrary to local law or regulation. This document has been prepared for general information purposes only and has not been delivered for registration in any jurisdiction nor has its content been reviewed or approved by any regulatory authority in any jurisdiction. The information contained herein does not constitute: (i) a binding legal agreement; (ii) legal, regulatory, tax, accounting or other advice; (iii) an offer, recommendation or solicitation to buy or sell shares in any fund, security, commodity, financial instrument or derivative linked to, or otherwise included in a portfolio managed or advised by RWC; or (iv) an offer to enter into any other transaction whatsoever (each a “Transaction”). No representations and/or warranties are made that the information contained herein is either up to date and/or accurate and is not intended to be used or relied upon by any counterparty, investor or any other third party. RWC uses information from third party vendors, such as statistical and other data, that it believes to be reliable. However, the accuracy of this data, which may be used to calculate results or otherwise compile data that finds its way over time into RWC research data stored on its systems, is not guaranteed. If such information is not accurate, some of the conclusions reached or statements made may be adversely affected. RWC bears no responsibility for your investment research and/or investment decisions and you should consult your own lawyer, accountant, tax adviser or other professional adviser before entering into any Transaction. Any opinion expressed herein, which may be subjective in nature, may not be shared by all directors, officers, employees, or representatives of RWC and may be subject to change without notice. RWC is not liable for any decisions made or actions or inactions taken by you or others based on the contents of this document and neither RWC nor any of its directors, officers, employees, or representatives (including affiliates) accepts any liability whatsoever for any errors and/or omissions or for any direct, indirect, special, incidental, or consequential loss, damages, or expenses of any kind howsoever arising from the use of, or reliance on, any information contained herein. Information contained in this document should not be viewed as indicative of future results. Past performance of any Transaction is not indicative of future results. The value of investments can go down as well as up. Certain assumptions and forward looking statements may have been made either for modelling purposes, to simplify the presentation and/or calculation of any projections or estimates contained herein and RWC does not represent that that any such assumptions or statements will reflect actual future events or that all assumptions have been considered or stated. Forward-looking statements are inherently uncertain, and changing factors such as those affecting the markets generally, or those affecting particular industries or issuers, may cause results to differ from those discussed. Accordingly, there can be no assurance that estimated returns or projections will be realised or that actual returns or performance results will not materially differ from those estimated herein. Some of the information contained in this document may be aggregated data of Transactions executed by RWC that has been compiled so as not to identify the underlying Transactions of any particular customer. The information transmitted is intended only for the person or entity to which it has been given and may contain confidential and/or privileged material. In accepting receipt of the information transmitted you agree that you and/or your affiliates, partners, directors, officers and employees, as applicable, will keep all information strictly confidential. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon, this information is prohibited. The information contained herein is confidential and is intended for the exclusive use of the intended recipient(s) to which this document has been provided. Any distribution or reproduction of this document is not authorised and is prohibited without the express written consent of RWC or any of its affiliates. Changes in rates of exchange may cause the value of such investments to fluctuate. An investor may not be able to get back the amount invested and the loss on realisation may be very high and could result in a substantial or complete loss of the investment. In addition, an investor who realises their investment in a RWC-managed fund after a short period may not realise the amount originally invested as a result of charges made on the issue and/or redemption of such investment. The value of such interests for the purposes of purchases may differ from their value for the purpose of redemptions. No representations or warranties of any kind are intended or should be inferred with respect to the economic return from, or the tax consequences of, an investment in a RWC-managed fund. Current tax levels and reliefs may change. Depending on individual circumstances, this may affect investment returns. Nothing in this document constitutes advice on the merits of buying or selling a particular investment. This document expresses no views as to the suitability or appropriateness of the fund or any other investments described herein to the individual circumstances of any recipient. AIFMD and Distribution in the European Economic Area (“EEA”) The Alternative Fund Managers Directive (Directive 2011/61/EU) (“AIFMD”) is a regulatory regime which came into full effect in the EEA on 22 July 2014. RWC Asset Management LLP is an Alternative Investment Fund Manager (an “AIFM”) to certain funds managed by it (each an “AIF”). The AIFM is required to make available to investors certain prescribed information prior to their investment in an AIF. The majority of the prescribed information is contained in the latest Offering Document of the AIF. The remainder of the prescribed information is contained in the relevant AIF’s annual report and accounts. All of the information is provided in accordance with the AIFMD. In relation to each member state of the EEA (each a “Member State”), this document may only be distributed and shares in a RWC fund (“Shares”) may only be offered and placed to the extent that (a) the relevant RWC fund is permitted to be marketed to professional investors in accordance with the AIFMD (as implemented into the local law/regulation of the relevant Member State); or (b) this document may otherwise be lawfully distributed and the Shares may lawfully offered or placed in that Member State (including at the initiative of the investor). Information Required for Distribution of Foreign Collective Investment Schemes to Qualified Investors in Switzerland The representative and paying agent of the RWC-managed funds in Switzerland (the “Representative in Switzerland”) is Société Générale, Paris, Zurich Branch, Talacker 50, P.O. Box 5070, CH-8021 Zurich. In respect of the units of the RWC-managed funds distributed in Switzerland, the place of performance and jurisdiction is at the registered office of the Representative in Switzerland.
<urn:uuid:2be34c55-5aa4-4752-96cb-29ce6dfe6821>
CC-MAIN-2022-33
https://www.redwheel.com/au/en/professional/Insights/wilful-waste/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00605.warc.gz
en
0.943313
2,914
3.609375
4
Who were the great saints of Maharashtra? A variety of colorful Bhakti and Sufi developments that have been created since the eighth century are the embodiment of extreme devotion to God or love for God. Several gatherings cherished their own deities and goddesses before the emergence of enormous realms. Be that as it may, with the enhancement of municipalities, exchanges, and disciplines, individualities were united and groundbreaking studies started to produce. It is also worth noting that the Maharashtra saints draw their inspiration from the Bhagavata Purana, similar to other Vaishnava bhakti developments. Furthermore, after paying regard to the saivanath panthi that was likewise well known among the “lower” classes of Maharashtrian culture during the IInd and the twelfth centuries of time and managed to form their sections in Marathi during the same period. Maharashtra’s first bhakti holy person, Jnaneshwar (1275-1296), was an important trailblazer. Jnanesvara, or Jnanisvara, was a Hindu scholar who analyzed the Bhagavad Gita in a broad sense. Marathi’s writing was presumably the leading work of the same and fulfilled as a testament in Maharashtra for bhakti, devotion. The author composed a large number of poems and songs known as abhangs. As he taught, bhakti was the only way to access God; so, no distinction should be made between different ranks in bhakti. The Maharashtrian prophet Namdev (1270-1350) and the tailor rank is seen as the link between Maharashtrian bhakti and North Indian monotheism. Pandharpur was his home, but he also ventured into Punjab and other North Indian states. In addition to his devotional melodies for the Adi Granth, his bhakti compositions are also remembered. Named is considered part of the Maharashtrian tradition of Varkari (Vaishnava spiritual practices), however, in the North Indian tradition of monotheistic practice, he is considered a nirguna saint. Other unmistakable bhakti saints from Maharashtra were Eknath (1533-99) and Tukaram (1598-1650). There are many people associated with these two groups: - Sant Dnyaneshwar: Dnyaneshwar was probably the best holy person in Maharashtra. Dnyaneshwar was the child of a holy person turned householder named Vittalpanth whose father was the town bookkeeper called Govindapanth. Dnyaneshwar had two siblings and a sister, Nivritti, Sopana, and Muktabai. - Sant Tukaram: Tukaram likewise alluded to as Sant Tukaram, Bhakta Tukaram, Tukaram Maharaj, Tukabo and Tukobaraya was a seventeenth-century poet-saint of the bhakti second in Maharashtra. He was important for the libertarian, customized varkari devotionalism tradition. Tukaram is most popular for his Abhanga commitment verse and local area arranged love with profound tunes known as kirtans. - Sant Namdev: Scholarly works of Namdev were impacted by Vaishnava’s theory and confidence in Vithoba. Alongside the Jananeswari, a sacrosanct work of Jnaneswari, and of Bhakti development instructor essayists, for example, Tukaram, the compositions of Namdev structure the premise of the convictions held by the Varkari order of Hinduism - Sant Pundalik: SPundalik was perhaps the earliest kundalini Yoga expert. As He was the expert on Kundalini Yoga, individuals used to refer to him as “Kundalik”. Afterward, following quite a long while, Kundalik becomes Pundalik. He represented Kundalini energy as Lord Vitthal otherwise called Lord Pandurang after his name Pundalik. - Samarth Ramdas: Samarth Ramdas was a prominent seventeenth-century holy person and profound minstrel of Maharashtra. His Dasbodh textbook is considered the most important work of Advaita Venditism. - Sant Narhari Sonar: Narahari Sonar was a steadfast Shaiva who resided in Pandharpur, where the central sanctuary of Vithoba stands. Vithoba is a type of the god Vishnu and the benefactor divine force of the Varkari faction, part of the Vishnu-loving Vaishnava order and an opponent group of the Shaivas. - Sant Chokhamela: Maharashtra had a saint named Chokhamela around the 14th century. He belonged to the Mahar position considered” unobtainable” in India at that time. He composed manyAbhangas. He was relatively conceivably the foremost. As a Dalit poet, he was among the first in India. - Sant Mukta Bai: Muktabai or Mukta was a holy person in the Varkari Movement. She was brought into the world in a Deshastha Brahmin family and was the more youthful sister of Dnyaneshwar, the main Varkari holy person. She composed 41 abhangs all through her life. - Sant Damaji Pant: Sant Damaji Pant was an incredible lover of Lord Vitthal. He was devout, merciful, and invested the majority of his energy in Harichintana. He was designated by the ruler of Bidar as the overseer of a stockroom where grain was put away. Supposedly, there was once an extremely dry season around there because of which individuals and dairy cattle were passing on from starvation. He conveyed grain from the Homeric storehouse installations to individualities in shortage - Sant Janabai: Janabai was a low-station maidservant and writer. There are different renditions of her story, yet as per one of these, she was required as a five-year-old kid to the sanctuary of the God Vitthal or Vithoba in the city of Pandharpur, the focal point of strict commitment for the Varkari Hindu custom. She would not leave, that’s what let her folks know despite the fact that they cherished her, they would in time need to offer her in marriage, and on second thought she wished to stay in the sanctuary and commit herself to God. - Savata Mali: Savata Mali was a Hindu holy person and an impassioned fan of Lord Vithoba. He was brought into the world in 1250 in a town close to Pantharpur. He was a companion and an admirer of Namdev, an enthusiast of Vithoba. At his more youthful age itself, Savata got hitched to a devout and blessed woman from a close-by town named Janabai, who is likewise an incredible lover of Lord Vithoba. Savata Mali has an adequate farming area. Indeed, even while working in his fields, he will frequently sing about the greatness of Lord Vithoba. It is accepted that Savata Mali and his significant other Janabai got the darshan of Lord Vithoba in their home. A sanctuary is likewise committed to him in his local spot. - Sant Eknath: He was an extraordinary holy person of the Bhakti development in Maharashtra. He exhibited by his own decisions that there is a compelling reason need to deny common matters to achieve the most elevated truth, Paramarth. He formed numerous abhangas, for example, gavalana, bharud, and so on. His abhangas show the glow of dedication. - Sant Gora Kumbhar: Sant Gora Kumbhar was a Hindu sant related to the Bhakti development and the Varkari faction of Maharashtra, India. He was a potter by profession and a fan of Vithal. Gora Kumbhar, alongside different holy people, composed and sang many abhangs. - Sant Sopan: In addition to being a sant of the Varkari, Sopandeo was also the more youthful brother of Dnyaneshwar. He attained samadhi in a small village called Saswad near Pune. According to the interpretation of the Bhagavad Gita given by the Marathi, he compiled the Sopandevi along with about 50 abhangs. - Gajanan Maharaj: A Saint from India, Gajanan Maharaj came from Shegaon, Maharashtra. According to Hindu tradition, he is a manifestation of Lord Shiva. He took Samadhi on 8 September 1910 and the date is set apart as Samadhi- chatter by his sympathizers. - Master Samarth: Shri Swami Samarth is broadly viewed as the fourth (third in actual structure) manifestation of Dattatreya, an Indian priest, spiritualist and Hindu divinity. He is likewise accepted to be a resurrection of Narasimha Saraswati, one more prior profound expert of the Dattatreya order. - Sant Gadge Maharaj: Debuji Zhingraji Janorkar prominently known as Sant Gadge Maharaj or Gadge Baba, was a virtuous social reformer, a meandering beggar who held week by week celebrations with the assistance of his pupils across Maharashtra. His changes and dreams for towns in India are as yet a wellspring of motivation for different ideological groups and non-government associations. - Sant Tukdoji Maharaj: Tukadoji Maharaj was a profound existence in Maharashtra. Tukdoji Maharaj was associated with social changes in the rustic areas of Maharashtra. He composed Gramgeeta which depicts implies for city enhancement. Large figures of the advancement programs began by him have kept on working productively after his end. Question 1: How did the holy people of Maharashtra respond? Their work made fearlessness among the individualities of Maharashtra. They showed the genuine significance of religion. They showed the way of fidelity by living among individualities and participating their delights and torments. Question 2: Who was the lady holy person of Maharashtra? A Varkari womenish-holy person from Maharashtra, India, Bahinabai or Bahina or Bahini (1628-1700 Announcement) is called Bahina or Bahini. Question 3: Who began Bhakti development in Maharashtra? Gnanadeva was the organizer behind the Bhakti Movement in Maharashtra in the thirteenth 100 times. It was called Maharashtra dharma. He also composed a tract on the Bhagavat Gita called Gnaneswari. Another Bhakti holy person of Maharashtra was Tukaram, a contemporary of Shivaji.
<urn:uuid:2d042ee2-4f8e-48be-b831-eb7bbae3c449>
CC-MAIN-2022-33
https://origin.geeksforgeeks.org/who-were-the-great-saints-of-maharashtra/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00405.warc.gz
en
0.969976
2,264
2.71875
3
An imbalance in the body that causes general tiredness and pain can be due to many and very different causes, from lack of vitamins, extreme exercise to chronic diseases or depression. The range of possibilities that must be ruled out is very wide and, for each one of them, different treatment is needed. If you want to know the possible reasons that make you wonder why my whole body hurts and I am very tired? , keep reading this article from FastlyHeal . The body needs 8 hours of sleep to function properly. The body may adapt to our demands, but abnormal sleep patterns can lead to multiple problems over time. It is important to sleep so that the body does not feel tired. - The restless sleep can be one of the causes for which feel very tired and even pain in different areas of the body. - If the problem is insomnia , try to maintain sleep hygiene and, if that is not enough, you should consult a specialist. If you can accommodate your activities to get enough sleep, it is the ideal way to rest your body. Fatigue and chronic muscle aches can be caused by a problem with histamine metabolism , specifically a lack of an enzyme called diamine oxidase (DAO). Histamine is a molecule present in all people and in all living beings: one part is manufactured by the body and is responsible for many functions (digestion, immunity, circulation, among others) and another part can be ingested with certain foods (wine red, preserves, matured cheeses, among several others). The DAO enzyme has the ability to break down this exogenous histamine in order to eliminate it from the body, but when it does not work properly it can give a series of symptoms of high histamine , including: - Muscle pains. - Migraine headaches. - Allergy to asthma. If you have some of these symptoms, you can start by stopping one of those foods from your diet in order to eliminate histamine from the body . It is convenient to resort to the most natural foods possible, leaving aside processed ones. You can discuss it with your GP. Lack of vitamin D. The lack of vitamin D is one of the most common causes of health problems in the general population. Low levels of this vitamin have been linked to diseases such as: - Problems in pregnancy and childbirth. - Heart problems. - Growing problems. Among the many symptoms that can occur, it is very common for fatigue , lack of strength and muscle aches to appear , with which raising the levels of vitamin D could improve these symptoms in addition to preventing a large number of diseases. Luckily, the solution is very simple, free and at hand for most people: exposure to the sun for 5 to 10 minutes is enough at times when UV rays affect the skin well (10 in the morning to 3 pm). The exposure must be without sunscreen, which, as we see, is of a very short time, which would not increase the possibility of skin cancer, but rather would increase your defenses and the proper functioning of your body. It is convenient to expose large areas of the skin such as arms, legs and back, and you should avoid bathing immediately, to give time to the production of the vitamin and its absorption. There are supplements with vitamin D and also foods that have them (naturally or artificially), but the time they circulate in the blood and, therefore, the effects they have on the body, are much less than those that the vitamin D generated by Sun. Bad eating habits If you ask yourself “why does my whole body ache and am I very tired?”, It is probably also related to bad eating habits. The intake of foods that are difficult to digest, due to their residues, end up intoxicating the body can make you feel heavy, tired and even with body aches and pains (muscles, joints, headaches). The food products that you should avoid are: - Processed with preservatives, flavorings, colorants. - Refined products: sugar, salt and white wheat flour. - Meat: its degradation products are not well digested and its excessive consumption has been linked to various diseases, including cancer. - Dairy: they are much discussed, although they have a large amount of vitamins, they are inflammation producers in the body and the calcium they have is not so useful. - Alcohol and coffee. It does not mean that you should not eat any of these foods, but it does mean that they should not be the mainstay of your diet. It is recommended to replace them properly with these recommended foods : - Fruits and vegetables (raw are better, since their vitamins and properties are used more). - Olive oil. - Whole grain products: flour, sugar (called muscabo or panela), rice. - Legumes, seeds. - Sprouted and fermented. If the cause of your fatigue is related to bad eating habits and you apply these changes, little by little you will see how you recover your energy. It is essential to accompany this habit with good hydration. Fibromyalgia as a cause of body pain and fatigue It is a diagnosis that is usually reached after ruling out other reasons for body aches and fatigue when you wonder why your whole body hurts and you feel tired. Fibromyalgia causes pain in one area or another of the body, sometimes more and sometimes less intense. It usually produces symptoms in a chronic way , that is, you can have discomfort for a long time. Some of the causes related to fibromyalgia : - DAO deficiency, histamine problems. - Rheumatic problems. In this case, in addition to consulting your family doctor, you can implement a change of habits both in your diet and in starting to exercise, mild at first if you do not usually do it. Learn more about this disease in Fibromyalgia: symptoms, causes and treatment . Often times, depression can make you feel tired, dejected, and even cause pain in your muscles when you want to move. If you think you need help to get out of this state, do not hesitate to ask for it. You can try: - Find something that stimulates you : a good way is to find a daily routine of physical exercises, you do not need something very complicated, but movement causes endorphins to be released, which are hormones of well-being and happiness, which will make you feel better little by little. Put on music that is good for you, do not seek to deepen your state of depression with things that hurt you (sad music, movies or drama series, etc). - Talk to someone , find someone to support you. Asking for help is essential. - Do not harass yourself with bad thoughts, delving into your thoughts, pitying yourself and going back to what hurts you is not good. Seek out of that vicious circle. See more information on depression in Depression: Types, Causes, Symptoms, and Treatment . Chronic Fatigue Syndrome The cause of chronic fatigue syndrome is not known, but it tends to affect people in their 40s and 50s more . In this case, it is an abnormal tiredness in front of different activities, added to the fact that the sleep is not restorative. Other symptoms may appear in addition to fatigue: - Headaches, joint, muscular. - Sore throats - Lack of concentration. - Memory loss. - Exhaustion that lasts more than 24 hours, after not very intense exercise. The treatment of chronic fatigue syndrome can include therapeutic accompaniment (because it is usually associated with depression) and gradual physical training, among others. Other causes of tiredness and pain There are other more specific causes that can be related to body pain and general tiredness. These can be from problems of chewing efforts, infections or problems of the immune system. The temporomandibular joint (TMJ) or the jaw may be the epicenter of stress relief . When squeezing the bite, the chewing muscles contract, later those of the neck, giving rise to: - Neck, ear, throat, muscle or headache pain. Try to avoid chewing efforts : do not eat hard things or for which you need to open your mouth too much and put heat in the area of discomfort. You can resort to some analgesic if the discomfort becomes more frequent and it is convenient that you go to your doctor / a family dentist. Extreme or unusual physical exertion If the discomfort appears immediately or within a couple of days after having performed a physical activity for which your body is not prepared or is not used to, you may be experiencing tiredness or muscle aches for that reason. Try to properly rest your muscles and after doing a warm-up, you can try to stretch gently, but if it causes pain, do not do it. If the pain is persistent, you should see a professional for the possibility of muscle tears. Immune system problems Some rather chronic diseases can cause you to find yourself in this annoying state. If you notice that the discomfort is persistent, it is advisable that you consult your trusted doctor, so that together you can rule out the possible reasons for these pain and fatigue. It is convenient to discard: - Autoimmune diseases. - Metabolic problems An infection may be starting to affect you If the tiredness and muscle aches started recently, you may be starting a virus or bacterial infection. Take the temperature and watch for other symptoms. It is convenient that you do not self-medicate with analgesics or anti-inflammatories, since you can cover other problems. Consult with your doctor all the symptoms and possibilities to rule out causes and identify the correct cause that answers your question: “Why does my whole body ache and am I very tired?” This article is merely informative, at FastlyHeal .com we do not have the power to prescribe medical treatments or make any type of diagnosis. We invite you to see a doctor in the case of presenting any type of condition or discomfort. If you want to read more articles similar to Why my whole body hurts and I am very tired , we recommend that you enter our Brain and Nerves category . I am a Surgeon with a diploma in comprehensive ultrasound and surgical care residency, an area I am specializing in. During the exercise of my profession, I have realized the need for patients to know the diseases they suffer, and I can tell you that a large part of their complications is due to a lack of information. Being a health web writer allows me to transmit my experience, without borders, to all those readers eager for knowledge, educate them in the prevention of diseases and promote a healthy lifestyle.
<urn:uuid:1d9e964d-31d7-4a9c-aa13-c4208e4ead07>
CC-MAIN-2022-33
https://fastlyheal.com/why-does-my-body-ache-causes/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00405.warc.gz
en
0.949226
2,292
2.59375
3
Economic Changes: The Industrial Revolution 1. Many Inventions Great as was the wealth which all these changes created, it was as nothing compared with the results of the Industrial Revolution which was proceeding at the same time. The main features of this Revolution were three. First came the invention of machinery. To begin with, there were machines for making "textile fabrics," first of cotton, then of woollen and other stuffs. Next came machines and new processes for making iron and steel. And then followed a whole host of inventions—machines for manufacturing every kind of article, and machines for making other machines—an endless succession year after year. Some of these machines did what human hands had done before, but much faster and more accurately. With Kay's famous "flying shuttle"—one of the first inventions in the cotton weaving trade—one weaver could do what had hitherto been the work of four. With Hargreaves' "spinning jenny" a child could spin as much as eight men without it. A century later the spindles used by a single worker were reckoned not by ones but by thousands; and what was true of spinning and weaving was true of countless other industries. Other machines did what no man, and no number together, could do without mechanical help. They lifted weights that no human could raise. They dealt blows that not a thousand human arms together could strike. They poured out ceaseless streams of delicate and complicated work, so accurate that no one thing differed by a hair's breadth from another, though no unaided human skill could produce two alike. 2. Harnessing Nature This strength and evenness in machine work was partly due to the second great feature of the Industrial Revolution—the use by man of natural forces—wind, water, steam, and electricity—to furnish "driving power" to his machines. The idea itself, of course, was nothing new. Windmills and watermills had worked for centuries. Steam engines were known even in ancient Egypt. But wind, however great a power, was too fitful and uncertain to furnish an even and constant pressure. Water power was long used only for grinding corn. And, till the later eighteenth century, steam found no favour except for pumping engines, and was far too costly for general use. But now first water was employed to drive the new machines for spinning and weaving, and then steam replaced it for almost every purpose, and held sway till electricity in its turn came on the scene. The effect upon the life of the nation was enormous. For one thing, the distribution of the population was entirely altered. For centuries the cloth and iron trades had centred in the east and south, and the most populous counties had lain south of the Trent. But when water-power became all-important the sluggish streams of southern England were deserted for the shorter but swifter rivers of the north. Presently, indeed, steam replaced water, and steam could be produced at every time and place, so that the need for it did not tie manufacturers down to any particular spot. Yet other motives now caused them to congregate in the north and west. Lancashire, Cheshire, the West Riding of Yorkshire, Staffordshire, Nottinghamshire, Worcestershire, Warwick-shire, Durham, and the neighbourhood of Cardiff, in South Wales, became the most thickly peopled districts. For now coal was the all-important thing. It was the cheapest means of producing steam. Also, thanks to recent discoveries, it could now be used for smelting iron, whereas for centuries smelters had had to use wood, and had therefore worked their ore chiefly where timber was plentiful, as in Sussex. And, to save carriage of both coal and iron, it was best to work them where they lay close together, as in the "Black Country," and Durham and South Wales, while manufacturers naturally gathered where coal was near at hand, and therefore cheap. 3. The Factory System And now the third feature of the Industrial Revolution appeared in the rise of the Factory System, and the recasting of the whole industrial organization of the kingdom. When "power" replaced human muscles in driving machines, employers largely ceased to give their work out to men and women who bought or hired machines for use in their own homes. Instead, they gathered all the machines together in a single factory, or mill, where the "power" could be applied to all at once with the least trouble and expense. And thither the workers had to come, so that the man now came to the machine, not the machine to the man. Thus the factory system grew up. All over the coal and iron fields great towns sprang into existence. The old "domestic," or home, system of industry and the combination of agriculture with manufacture disappeared for ever. Enormous businesses were built up, employing armies of workmen; the whole character of industry changed, becoming far more adventurous and speculative; year by year England sent more and more goods to seek markets all over the world; and the wealth of the nation, and the power and importance of the commercial classes, grew ever greater. 4. The Price of Progress Yet neither the Agricultural nor the Industrial Revolution was wholly beneficial. The farmer's profits and the landlord's rents rose rapidly with the spread of the new farming, but the country labourer for many years lost more than he gained. His wages were still miserably low, and their value really fell when prices rose, since less could now be bought for any given sum. And too often an "encloser" laid hands on "common" land where his poor neighbours had long had the right to feed their sheep or pigs, or even on their own little plots. The small farmers or yeomen, too, who a century before were thought the backbone of the English nation, often found themselves obliged to sell their land. Without enclosing they could not compete against their wealthier neighbours; yet often they could not afford the cost of the enclosure. Even the new farming itself often required an expenditure to start it which was beyond their means. Yeomen and labourers alike, too, lost by the new separation of manufacture and agriculture. For, when factories took over the weaving and spinning that had been done so long in cottages and farms, few "bye," or secondary, industries remained to fill up idle hours or make amends for a bad farmer's year. So, too, the factory "hands," or workers, penned up in the smoke-stained streets of crowded towns, had neither space nor time to find health or profit or pleasure in gardening or farming. They also had now but one means of livelihood, and if it failed starvation stared them in the face. Moreover, partly because manufacturers worked now not merely for neighbours, or customers whose needs were known, but for distant and uncertain markets, more stock was often produced than could be quickly sold, and then, at least for a time, the men were unemployed. And, for a time, too, with almost every new invention, some men and women found their occupation gone, when perhaps they were too old to learn another trade. Often, indeed, such sufferers, in despair, took to violence, and smashed the hated machines which seemed the cause of so much evil. 5. Industrial Slavery But the factory "hands" suffered not only from times of unemployment, but also from the conditions of their labour while they were employed. Many factories—often mere barns hastily altered for the purpose—were badly built, badly lighted, badly ventilated, and badly drained. The hours of work were terribly long and the wages were miserably low. There were, of course, many kind masters, with healthy factories, large or small. Yet the Industrial Revolution certainly tended to make employers look on their "hands" simply as human machines, from which, as from the machines of steel and iron, the utmost profit must be wrung. Further, while the small master might grudge every penny spent upon his workers, the large owner often handed them over to the care of "overlookers," seeing but little of their life himself. And the overlookers, whose own earnings depended on the amount of work they could get out of their miserable charges, were strongly tempted to be harsh and brutal. Thus the lot of men was often terribly hard. Women endured not only hardship but bitter degradation. And worst of all were the sufferings of children. Orphans and other pauper children were often taken as "apprentices" by millowners eager to find cheap labour, and these, perhaps, suffered most, for they had no one to care for them or save them from their tyrants. They were, to all intents and purposes, slaves. Indeed, there were regular agents who took them over from the "Guardians of the Poor," carried them to manufacturing towns, and kept them—often in dark cellars—till a bargain was struck with their new masters. And then they could be treated just as their masters chose. The undertaking to teach them a trade need never be carried out. They could be kept throughout the fourteen years or so of "apprenticeship" always at the same hard but unskilled labour. If they lived they could then be turned out into the world without a single qualification for earning their bread. And if they died they could be easily replaced, and no one would care to make awkward inquiries. But children who were neither paupers nor orphans were also often forced into the same slavery. It might be through the pitiless greed of their relations—even in the old domestic industries children of four or five sometimes earned their daily bread. It might be through the wretched poverty of the whole family, which made every penny that could be earned important. And such children fared little better than the pauper apprentices. So day after day—in winter even before sunrise—little slaves of seven or eight, sometimes of five or six, were hunted out of wretched beds in the apprentice houses, or forced to leave their homes, perhaps miles away, and—still half asleep—drag their weary limbs along the hated road to the factory. And then, for twelve or fourteen or sixteen hours, often for just a penny a day, all had to toil in stuffy, dusty, badly lighted, evil-smelling rooms, straining body and mind in the effort always to keep pace with the never-halting machines. If they arrived a minute late, if for a moment they ceased to attend to their work, if something annoyed the over-looker, they might be beaten and kicked, picked up and shaken by the ears, hurled to the ground, tied up by their wrists to the roof, or tortured in a hundred other ways. Sometimes they were fed on food unfit for pigs: sometimes for many hours they had no food at all. If they tried to run away they might be flogged and kept in chains by day and night. It was only in death—and deaths were very frequent—that many of them found an escape. In mines, meanwhile, children and women, scantily clothed and harnessed like horses, spent their days in reeking galleries underground, crawling on hands and knees, dragging heavy trucks of coal. And tiny girls, who could do nothing else, sat alone hour after hour in pitch darkness, opening and shutting doors for the trucks to pass through. So a generation of children grew up who never knew what it was to play out in the sunshine and fresh air; who had no time to play at all; who, indeed, would have had no spirit or strength to play if they had had the time. Untaught, untrained, half-fed, half-clothed, dividing days and nights between exhausting toil and unrefreshing sleep, they grew up ignorant, stunted, often diseased and deformed in body, mind, and soul. 6. The Struggle for Reform Yet for years little attempt was made to stop the evil, for many Englishmen were then so impressed by the mischief which Government interference with trade and industry had done in days gone by that they really thought such interference worse than any evil, and employers quite honestly believed that they would soon be ruined by foreign competition if, unlike foreign manufacturers, they were hampered by law in dealing with their workers. Men, indeed, though only with extreme difficulty, could do something for themselves. They began to combine to protect their interests. They formed "Trade Unions" to demand better terms from their masters; they declared a "strike" (i.e. refused to work) if their demands were rejected; and in these and other ways—helped, too, by the unselfish labour of friends in Parliament and elsewhere—they slowly and painfully progressed. They made mistakes; they sometimes acted wrongly; they often failed. But on the whole their cause was just, and in time they obtained Acts of Parliament, from Conservative and Liberal Governments alike, to check oppression, to lessen the risks of dangerous callings, to secure compensation if they were injured in their employer's service, and the like. Women, however—and even more, children—could do little or nothing by their own strength. They had to depend almost entirely on generous champions like the first Sir Robert Peel, and the seventh Earl of Shaftesbury, and Robert Owen, and others of equal merit though smaller fame. These men helped them from sheer pity, and shame for the national disgrace. And they had a terrible fight against prejudice, and ignorance, and selfishness, though they were aided by the growing fear that the abuses of the factory system would undermine the national health—that the factories might become, as it were, plague spots, spreading infection all round them. A beginning of reform was made by Peel's Act of 1802, dealing with apprentices in "textile" factories. It limited the working day to twelve hours, and required some education, at least, to be given to the children. And in time it was followed by more general Acts affecting all children, and all factories, and mines, and shops, and even labour in the fields, where till quite recently there was much brutal treatment of children. These Acts compelled employers to arrange reasonable hours, limited to the daytime, and proper meal-times, and opportunities for education, and healthy surroundings. They forbade altogether the employment of women underground, and any employment at all of children under eight. They required dangerous machinery to be fenced in to prevent accidents. And they created an army of Inspectors to see that these and scores of other rules were obeyed. Many such rules, moreover, applied to women and "young persons" as well as children, and even benefited also, directly or indirectly, the men themselves. So—though trade and industry still grew, and manufacturers made ever larger fortunes—it was not, for the most part, by sacrificing the happiness, or health, or character of their workers. Evils, no doubt, remained, though less, perhaps, in the factories than among "home workers," slaving for starvation wages with no Factory Acts to protect them. But such evils were no longer considered matters with which neither the Government nor private people should concern themselves. On the contrary, public opinion urged ever more strongly the duty of removing them, even if the profits of employers suffered. Men of every class and profession—clergy and politicians, men of business and men of science—agreed that every citizen ought so to act as to promote not the mere wealth but the general welfare of his country. And every year saw some new attempt, both by public and by private efforts, to carry out this maxim. Ever since the Methodist Movement of the eighteenth century the spirit of mercy and kindness had been gaining ground. That movement had roused Churchmen as well as Nonconformists against the evils of the time, and when it was over other movements followed and kept the conscience of the nation alive. And so the work of John Howard and Elizabeth Fry for prison reform, and Thomas Clarkson and William Wilberforce for the abolition first of the slave trade and then of slavery, was followed by the labours of Charles Kingsley and "Christian Socialists" on behalf of oppressed workers and of Lord Shaftesbury in the cause not only of these but of dumb animals suffering from the cruelty or ignorance of human beings.
<urn:uuid:8a105ce2-6eb5-466c-8788-1d79f6a70636>
CC-MAIN-2022-33
https://www.gatewaytotheclassics.com/browse/display.php?author=gaskoin&book=hanoverians&story=industrial
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00405.warc.gz
en
0.984862
3,384
3.6875
4
Construction equipment refers to heavy-duty vehicles, specially designed for executing construction tasks, most frequently ones involving earthwork operations. Kindly check below the construction equipment types and construction equipment list. Moreover, construction equipment for building construction and construction machinery used in construction projects. They are also known as heavy machines, heavy trucks, construction equipment, engineering equipment, heavy vehicles, or heavy hydraulics. However, Proper use of appropriate equipment contributes to the Economy, Quality, Safety, Speed, and Timely completion of the Project. Construction equipment is an important part of any construction process. It is not always desirable or possible for the Contractor to own each and every type of Construction Equipment required for the Project. Notably, the basic operations involved in the construction of any Project are Excavation, Digging of large quantities of earth, Moving them to fairly long distances, Placement, Compacting, Leveling, Dozing, Grading, Hauling, etc. Construction equipment is generally categorized into; Table of Contents - Earth Moving Equipment - Skid Steer Loaders - Motor Graders - Motor Scrapers - Crawler Loaders - Wheeled Loading Shovel - Construction Vehicles - Material Handling Equipment - Construction Equipment - Tunnelling and Handling Equipment - Concrete Mixers - Road Making Machines - Road Rollers - Hot mix plants - Stone crushers - Slurry seal machines - Heavy-duty pumps (Slurry pump) Earth Moving Equipment First on the list is, earth moving equipments. Earthmoving equipment used to carry out the various excavation tasks such as digging and moving the earth. Following are the different types of earth-moving equipment have their unique applications and used mainly for repairing, constructing, elevating, agriculture, and demolition. Following are the earth moving equipment mostly used in construction projects. Importantly, excavators are popular earth-moving vehicles that feature a bucket, arm, rotating cab, and movable tracks. These components provide superior digging power and mobility, allowing this heavy equipment to perform a variety of functions, from digging trenches and breaking holes to lifting away waste and excavating mines. Thirdly, backhoe also called a rear actor or back actor — is a type of excavating equipment, or digger, consisting of a digging bucket on the end of a two-part articulated arm. Furthermore, it is typically mounted on the back of a tractor or front loader, the latter forming a “backhoe loader” A loader is a heavy equipment machine used in construction to move aside or load materials such as asphalt, demolition debris, dirt, snow, feed, gravel, logs, raw minerals, recycled material, rock, sand, woodchips, etc. into or onto another type of machinery (such as a dump truck, conveyor belt, feed-hopper, or railroad car). Above all, there are many types of loader, which, depending on design and application, are called by various names, including bucket loader, front loader, front-end loader, payloader, scoop, shovel, skip loader, wheel loader, or skid-steer. Then we have bulldozer, bulldozer is a large and heavy tractor equipped with a substantial metal plate used to push large quantities of soil, sand, rubble, or other such material during construction or conversion work and typically equipped at the rear with a claw-like device to loosen densely compacted materials. Skid Steer Loaders A skid loader, skid-steer loader or skidsteer is a small, rigid-frame, engine-powered machine with lift arms that can attach to a wide variety of labor-saving tools or attachments. Above all, skid-steer loaders are typically four-wheel vehicles with the wheels mechanically locked in synchronization on each side, and where the left-side drive wheels can drive independently of the right-side drive wheels. Moreover, the wheels typically have no separate steering mechanism and hold a fixed straight alignment on the body of the machine. A trencher is a piece of construction equipment used to dig trenches, especially for laying pipes or electrical cables, for installing drainage, or in preparation for trench warfare. Furthermore, trenchers may range in size from walk-behind models to attachments for a skid loader or tractor, to very heavy tracked heavy equipment. A grader, also commonly referred to as a road grader or a motor grader, is a construction machine with a long blade used to create a flat surface during the grading process. In civil engineering, a Motor-scraper or Wheeled Tractor Scraper is a piece of heavy equipment used for earthmoving. The scraper can transport its load to the fill area where the blade is raised, the back panel of the hopper, or the ejector, is hydraulically pushed forward and the soil or clay load tumbles out. Crawler loaders are heavy-duty earth-moving machines that give you the big power of a dozer and the heavy loading and lifting power. Wheeled Loading Shovel Wheeled loading shovel is a vehicle attached with shovel designed to perform heavy-duty tasks in earthwork and construction operations. This shovel has specific capabilities to accomplish the loading tasks. Depending upon various sizes, tasks, and design requirements, this wheeled loader is furnished as skid-steer, payloader, bucket loader, skip loader, and wheel loader. It is used to transport materials from one place to another. It is equipped with a front-mounted bucket, which is supported by a boom structure. For lifting, it loads the material into the bucket by the forward motion of the machine. After lifting the material, it transports the materials to its respective destination. Construction Machinery includes Construction Vehicles A dumper is a vehicle designed for carrying bulk material, often on building sites. Dumpers are distinguished from dump trucks by configuration: a dumper is usually an open 4-wheeled vehicle with the load skip in front of the driver, while a dump truck has its cab in front of the load. A dump truck, known also as a dumper truck or tipper truck, is used for taking dumps for construction as well as coal. A tipper is a heavy-duty truck chassis fitted with an open-top body, used for carrying aggregate, crushed rock, soil and other bulk materials to and from construction sites Next is a trailer is an unpowered vehicle towed by a powered vehicle. It is commonly used for the transport of goods and materials. Sometimes recreational vehicles, travel trailers, or mobile homes with limited living facilities where people can camp or stay have been referred to as trailers. Material Handling Equipment A crane is a type of machine, generally equipped with a hoist rope, wire ropes or chains, and sheaves. That can used both to lift and lower materials and to move them horizontally. It is mainly used for lifting heavy things and transporting them to other places. A conveyor system is a common piece of mechanical handling equipment that moves materials from one location to another. Conveyors are especially useful in applications involving the transport of heavy or bulky materials. Moreover, forklift is a powered industrial truck used to lift and move materials over short distances. Moreover, the forklift was developed in the early 20th century by various companies. Including Clark, which made transmissions, and Yale & Towne Manufacturing, which made hoists. Furthermore, a hoist is a device used for lifting or lowering a load by means of a drum or lift-wheel around which rope or chain wraps.Consequently, it may manually operated, electrically or pneumatically driven and may use chain, fiber or wire rope as its lifting medium. Construction Machinery and Equipment Tunneling and Handling Equipment Tunneling equipment. Conveyor systems provide an efficient, reliable, cost-effective, and lower-risk method of removing muck and spoil from tunneling excavation sites. Moreover, this equipment is specifically engineered to smoothly handle the transport of materials from the tunnel excavation site to the surface and beyond. Additionally, a concrete mixer (often commonly called a cement mixer) is a device that homogeneously combines cement, aggregate such as sand or gravel, and water to form concrete. Furthermore, typical concrete mixer uses a revolving drum to mix the components. For smaller volume works, portable concrete mixers are often used so that the concrete can made at the construction site, giving the workers ample time to use the concrete before it hardens. Road Making Machines Furthermore, these are the various machines used in the construction road. Though they are available in varying sizes to applicable in small as well as large construction sites, they are generally considered to heavy-duty equipment. A road roller is a compactor-type engineering vehicle used to compact soil, gravel, concrete, or asphalt in the construction of roads and foundations. Similarly, rollers are used also at landfills or in agriculture. Road rollers are frequently referred to as steamrollers, regardless of their method of propulsion. Hot mix plants Additionally, the asphalt plants or asphalt mixing plant is one plant that is used for mixing the dry warm aggregate, padding, and Asphalt for homogeneous mixture at the required temperature. Also, it is widely used to the construction of highway, city road and parking lot. A crusher is a machine designed to reduce large rocks into smaller rocks, gravel, sand, or rock dust. Plus, crushers may use to reduce the size, or change the form, of waste materials so they can more easily disposed of or recycled, or to reduce the size of a solid mix of raw materials (as in rock ore), so that pieces of different composition can differentiated. Importantly, crushing is the process of transferring a force amplified by mechanical advantage through a material made of molecules that bond together more strongly, and resist deformation more, than those in the material being crushed do. Slurry seal machines Slurry seal is a cold-mix paving system that can remedy a broad range of problems on streets, airfields, parking lots, and driveways. Moreover, the principal materials used to create slurry are aggregate, asphalt emulsion, and fillers which are mixed together according to a laboratory’s mixed design formula. Heavy-duty pumps (Slurry pump) Lastly, a slurry pump is a type of pump designed for pumping liquid containing solid particles. Slurry pumps change in design and construction to adjust to multiple types of slurry which vary in concentration of solids, size of solid particles, the shape of solid particles, and composition of the solution. However, slurry pumps are more robust than liquid pumps; they have added sacrificial material and replaceable wear parts to withstand wear due to abrasion.
<urn:uuid:80f67f10-7899-4c7a-bb32-910a9aa28fba>
CC-MAIN-2022-33
https://www.ghaniassociate.com/tag/construction-machinery-equipment/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00405.warc.gz
en
0.935802
2,357
2.90625
3
GuitarOS Practical Theory: Update The Operating System Between Your Ears the original GuitarOS musical operating system update: the confusion-free guide to professional grade music theory If you’re an American, you probably suck at the metric system. You don’t know if 20 kilos is too heavy to carry in one hand. You’re not sure if 100 kph is fast or slow. And other than 0 and 100, temperatures given in Celsius are probably meaningless to you. That’s not a problem while you’re in your native US, but as soon as you travel elsewhere, you start having difficulty. The newspaper they left outside your hotel room door says it’s going to be 35 degrees today, so you grab your coat as you leave. Except thirty-five degrees celsius is ninety-five degrees fahrenheit––way too hot for that coat. The guitar is like America. We have some truly great and admirable things going for us. But we’re so large, influential, and insular that we tend to think our way of doing things is automatically the best and only way of doing things. The way we teach guitar is analogous to learning inches, feet, miles, quarts, & degrees fahrenheit even though the entire rest of the world uses a different system. [Countries on the metric system shown in green. Get with the program Antarctica.] There’s a reason for that––if you simply want to have a little fun with a guitar, it’s easier to use the system that’s native to you. Shapes are the system most native to guitar. That’s why we all learned using shape-based methods––TAB, chord grids, scale shapes, & CAGED. But once you’re playing at an intermediate level, you start to run into trouble. If you decide that you like playing guitar enough to want to get better at it, you quickly discover that what got you here won’t get you there. You're at the top of the wrong ladder. Inches, feet, quarts, & pounds are a perfectly fine operating system for day-to-day living in your native America. Unless, of course, you want to be a scientist. Being a scientist requires thinking in the metric operating system. Not just converting back and forth between inches and centimeters, between pounds and kilos, between milliliters and ounces, but thinking in and intuitively knowing the OS of the metric system. If you just want to be pretty good at guitar, then the shape-based operating system of TAB, scale shapes, & chord grids is perfectly fine. Combine it with a really good ear, great taste, and a shit ton of luck, and you might even get famous this way. But if you want to deliberately become a badass guitarist? Then you need to learn the operating system that all serious musicians use. This used to mean you had to go back to square one to re-learn the instrument by reading through basic method books, and then diving into the deep end of music school and trusting that you’ll learn to swim before you drown. I’ve done it. It fucking sucks. And that’s why there are millions of guitarists who are pretty good at the guitar, but who can’t quite seem to make the leap to the next level––badassery. Even though we know what the problem is (how many times have you decided to “learn theory?”), we haven’t had the proper tools to do it well. Until now. You see, there’s another problem that’s invisible to us. Because most of us never venture out from our native Guitarlandia, we don’t realize that the rest of the world has already devised a slick, tidy, dare-I-say easy solution that actually works. Even if you have no need to read music, don’t read music, won’t read music, hate reading music, are terrified that I might ask you to read music… the answers you seek are found in the seeds of one tiny portion of the music-reading world: note names. If you switch your operating system over from shapes to names, a world of possibilities opens up to you. Once you can look at your instrument and see names of notes instead of a set of coordinates, your brain has a powerful new way to organize the huge amount of meta data that’s stored in each and every piece of music you ever learn, play, or hear. Once you’ve updated your “operating system” in this note name-centric way, everything useful about music theory flows logically from one thing to the next. - If you know the names of the notes, it leads ipso facto into understanding keys. - If you know both notes and keys, you can easily understand chord construction. - Once you know how to build chords from notes & keys, you can easily build progressions from chords. - If you understand notes, keys, chords, & progressions, then learning about rhythm goes from "nice to have" to "incredibly useful to have." - If you know about notes, keys, chords, progressions, and rhythms, you can easily learn to read & write basic charts. - If you understand enough about music to read & write basic charts, you can get paid to gig with other people, and you can hire the best musicians to play in your own band. - You can pick up a book on music theory and understand it in the same language it was written in, without needing to translate back and forth into guitar-ese. - You’ll think and talk about music in the same way that badass professional musicians do. Being a musician who doesn’t think in notes is like being a scientist who doesn’t use the metric system. It’s not that you can’t enjoy Neil DeGrasse Tyson without using the metric system, or that you can’t be famous without understanding notes on guitar. It’s that being a scientist is SO MUCH EASIER with the metric system, and becoming a badass guitarist is SO MUCH EASIER when you’re using a note-centric operating system. Let me show you. You & I Are Alike If you’re anything like me, you’ve avoided this path precisely because it’s so hard and because the benefits are so vague. I spent a long damned time trying to avoid the work of going back to square one, the work of having to re-learn the entire instrument from the beginning. You & I Are Different I'm way, way dumber than you on your worst day. Because I eventually did just that—relearned the instrument from the beginning. It was a shit show of failure. The only reason I succeeded at it is this: - I’m stupid - I'm stubborn - I have no sense of shame Anyone with any sense (I'm assuming that includes you) would've given up after the first few years of failure. Only the most ornery, obstinate idiot (hey that's me!) would've kept at it this long, scouring the world's instructional materials, trying to separate the astronomy from the astrology, trying to put the pieces in the right order. And only someone with a congenital lack of shame (hey that's me again!) would've spent so long pestering smarter, more talented, more accomplished players, asking Why? Why? Why? like some caffeinated toddler. I Was Stupid, Stubborn, & Shameless So You Don’t Have To Be One of the smartest things you've ever done was to let me go make all the mistakes for you. I'm like your personal failure mine sweeper. I went back to the very beginning and painfully re-taught myself the guitar. I've returned with excellent news for you: There are only a handful of things that are difficult about becoming a guitar badass. - Figure out what’s actually important. - Learn it in the right order so it all makes sense. - Show up consistently. Sadly, those three things took me over fifteen years to get right. Fifteen plus years of being so-so at guitar, of making haphazard, incremental progress in no particular direction. More than fifteen years of failing in ways both big & small. But it's funny—once I did get those three things right, it was like knocking over the first domino in a line. I want to save you the frustration and wasted time of figuring this out for yourself. Just because I wasted half my life getting this stuff together doesn’t mean that you have to too. It took me fifteen years... but most people never figure it out. Which really pisses me off, because if you approach it the right way, it's actually not that hard. Let me show you. StartCircle Of Fifths Day One (4:43) StartCircle Of Fifths Day Two (4:29) StartCircle of Fifths Day Three StartCircle Of Fifths Day Four StartCircle Of Fifths Day Five StartCircle of Fifths Day Six StartCircle of Fifths Day Seven StartCircle of Fifths Day Eight StartCircle of Fifths Day Nine StartCircle Of Fifths Day Ten StartCircle Of Fifths Day Eleven StartCircle Of Fifths Day Twelve StartCircle Of Fifths Day Thirteen StartCircle Of Fifths Day Fourteen StartChord Building One StartChord Building Two StartChord Building Three StartChord Building Four StartChord Building Five StartChord Building Six StartChord Building Seven StartChord Building Eight StartChord Building Nine StartChord Building Ten StartChord Building Eleven StartChord Building Twelve StartChord Building Thirteen StartChord Building Fourteen StartChord Building Fifteen A lucky break forced me to make the jump from "fairly decent bar band guitarist" to "professional musician" long before I was ready or qualified. Suddenly I was surrounded by elite professional musicians, people who'd toured with huge acts and had long lists of recording credits. It was a baptism by fire as I scrambled to quickly develop the skills & knowledge necessary to operate in this new space. Along the way, I discovered something surprising—internet gurus and big-name music schools alike are focused on all the wrong shit. Badass musicians the world over share a common language & a set of priorities I've never seen taught anywhere else. It took me awhile to piece it all together & put it all in the right order. But now that there's a clearly defined path, all that's left is for you to decide you're done with wandering blindly in the darkness, done depending on luck, ready to show up and put one foot in front of the other on the road to badassery. I hope you'll join us. Frequently Asked Questions If these were lessons taken in-person at a guitar shop, you'd pay at least $1500 for them. ($20+/half hour x 75 lessons). If you took these lessons at a university or music school, you'd pay even more. (I paid just over $90/hour for lessons at DePaul. Even if you hustled and covered three lessons per hour, that'd be $2250. Ouch.) But Practical Theory doesn't cost anywhere near that. It's roughly the cost of one month of guitar shop lessons, aka a hundred bucks. And maybe you already take in-person guitar lessons, so you're thinking do I even need this? First off: good on you for caring enough to take lessons. Seriously, that's awesome. But think of GuitarOS: Practical Theory as a booster pack for in-person lessons. One-on-one guitar instruction is a wonderful thing. Fixing problems as they arise, learning songs the student is interested in, answering questions, and tailoring lessons to fit the individual’s needs are the province of traditional guitar lessons, and I have no intention or desire to replace or change this. But individual lessons, spaced a week apart, are not well suited to learning the important bedrock material that all guitarists should know, understand and apply. These things require a shorter-but-more-frequent format. I want to lift that burden from your teacher, allowing him or her more time to focus on the fun things that work best in the lesson room. The fact that you'll show up better prepared to your lesson is just icing on the cake. Or you could keep doing what you've been doing, and keep getting what you've been getting. If you're as pig-headed (and quite frankly, lucky) as me, it might only take you another decade to figure this out. It's up to you. Update the operating system between your ears. Get started now! Beautiful methodology. A real breakthrough in thinking about guitar. Awesome. It has genuinely helped my playing. -Todd L, Los Angeles Now everything I’ve done over the last 25+ years makes a hell of a lot more sense! -David M, Wisconsin
<urn:uuid:4403fad8-a6df-440a-aa8f-307ebf018f0c>
CC-MAIN-2022-33
https://learn.guitaros.com/p/practical-theory
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00400.warc.gz
en
0.942889
2,913
3.03125
3
Family Considerations: Effects of Bipolar Disorder on the Family The effects of a person's bipolar illness on the family may vary from mild to devastating. As a family member, here's what you need to know. Effect of Bipolar Disorder on Family is Far Reaching Depending on the nature of an individual's manic-depressive illness (aka bipolar disorder), the family will be affected in many ways. Where mood swings are mild, the family will experience many forms of distress but, over time, may adapt well enough to the demands of the illness. If episodes are more severe, the family may need to work through extreme difficulties in several ways: - emotional effects of the illness - social effects - changes within family members - changes within family structure - ways of reducing stress - coping with the threat of suicide - ways of establishing good communication lines with family members and with outside resources If symptoms are related to an individual's aggression or inability to fulfill responsibilities, family members may well become angry with the individual. They may experience anger if they see the individual as malingering or manipulative. Anger can also be directed at the "helping" professionals who are unsuccessful in curing the illness "once and for all". Anger may be directed at other family members, friends or God. Typically, these same family members experience feelings of extreme guilt (read Bipolar Guilt) after the individual has been diagnosed. They are concerned about having had angry or hateful thoughts and may wonder whether they somehow caused the illness by being unsupportive or short-tempered (read about causes of bipolar disorder). Moreover, much literature and other media of the past few decades have largely supported (erroneously) a common notion that parents are somehow always responsible for producing mental illness in children. And so, parents and to a lesser degree, other family members may find that feelings of guilt and the wish to compensate for any wrongdoings prevent them from effectively setting limits and developing realistic expectations. If the individual's illness creates an ongoing burden for the family because of such things as decreased income or continual disruptions in family routines, it is not uncommon for family members to find themselves in a cyclic pattern of alternating feelings of anger and guilt. Equally painful is the sense of loss that is associated with the growing awareness that, in severe cases of recurrent manic-depressive illness, an individual may never be quite the same person the family knew before the illness. There is grieving over lost hopes and dreams. The mourning process is usually marked with periods of resignation and acceptance and intermittent periods of renewed grief stimulated perhaps, by the accomplishment of a peer, a family celebration or some other seemingly minor event. Eventually, as with any other loss, whether the end of a marriage, the death of a loved one, or the loss of ability through illness or accident, what is needed is a careful re-evaluation of goals and an adjustment of expectations. Related here, may be some feelings of shame associated with unfulfilled expectations and with the stigma of mental illness. It may be interesting for family members to realize that one of the reasons that mental illness carries with it such a stigma is that mental illness is often associated with decreased productivity. The value of productivity and the notion of "the bigger the better," have long formed a mainstay of North American culture. The family may have to grapple with whether they want to place such emphasis on these values. Shifting emphasis on to values related to family, spirituality or other focus may help to diminish any unnecessary suffering due to feelings of shame. Finally, anxiety may be ever present as family members grow to continually anticipate a change of mood, a return of bipolar symptoms. Families may find planning events fraught with worries of whether the ill relative will present any problems at the event. There may be fear that unprovoked conflicts will arise at any time, that other family members may suffer. Children may fear that they will inherit the illness, they fear that they may have to manage the care of their ill relative as well as manage their own lives when the primary caretakers can no longer do the job. To cope with such consuming anxiety, some family members learn to distance themselves (both physically and emotionally) from the family, while others may put their personal goals on hold in anticipation of the next crisis. In any event, families need support to learn to manage anxiety and to lead as fulfilling lives as possible. Attending bipolar family support groups can help to relieve the pressure experienced by families caught in their stressful situations. In severe cases of manic-depressive illness, families typically find that their social network starts shrinking in size for several reasons. The family is often embarrassed by the varied symptoms of an ill relative whether these symptoms have to do with poor self-care skills or belligerent behavior. Visitors may feel awkward about what to say or how to help the family. Usually, they say nothing at all and soon both family and friends find themselves participating in a conspiracy of silence. Eventually, it becomes easier to avoid each other. Going to a bipolar disorder support group is one way to help reduce the sense of isolation a family often faces. Through the practice of self-disclosure and the development of a vocabulary to use and the self-confidence to use it, a family can gradually learn how to communicate with extended family members and friends. Family members often feel exhausted because of the time and energy spent on issues related to the illness. There is little energy left to invest in other potentially satisfying relationships or rewarding activities. Increased tension leads to the risk of marital dissolution and stress-related physical symptoms. It is not uncommon to hear worn-out spouses desperately stating, half-jokingly, half-seriously, "I'm the one who will be in the hospital next." Siblings may experience jealousy if too much attention is devoted to the ill member and not enough to themselves. To deal with feelings of resentment and guilt, siblings spend more time away from the family. When the ill member is a parent who cannot meet the emotional needs of his or her spouse, a child may assume the role of confidante with the well parent and may sacrifice some of his or her own personal development as an independent individual. In general, the emotional welfare of all family members is at risk because of the ongoing stress. It is important for the family to be aware of these risks and to take appropriate measures (for instance, getting support from outside sources) in order to minimize the risks. Regardless of which family member is ill, role relationships often shift in response to the illness. If, for instance, a father is unable to provide financial and emotional support, the mother may have to take on additional responsibilities in both spheres in order to compensate. She may find herself in the position of a single parent but without the freedom of decision-making afforded by single parenting. Added to this, the wife may find herself parenting her ill husband as she monitors his symptoms, his medications, and deals with his hospitalizations. As the husband's capacity for work and family participation fluctuates, the wife is at risk for ongoing confusion and resentment. Children may take on caretaking responsibilities when the mother is absent and as mentioned previously, may even become the sole source of emotional support for the mother when she is present. If a sibling is ill, other siblings may have to take on the role of caretaker when parents are away. All members are subjected to demands far greater than would be normally expected. A major challenge facing families of manic-depressive patients is the formation of realistic expectations both of the mental health system and of the family member with bipolar. a) Mental Health System When families bring their ill member for medical help, they often expect a firm diagnosis and a clear cut bipolar treatment regimen, which will quickly and permanently cure the illness. They then expect the relative to resume normal life immediately following treatment. It is usually only after several experiences of trial medications, many disappointments at the hospital and at home over unfulfilled expectations that the family starts to appreciate the somewhat nebulous nature of the manic-depressive illness. The illness has no clear cut beginning or end. There are often residual impairments and ongoing vulnerabilities (weaknesses) after acute treatment. The family must start taking into account the limitations of the mental health system both in terms of knowledge base and resources. b) The Ill Individual Some of the residual symptoms an ill relative can experience after acute treatment include social withdrawal, poor grooming, aggression and lack of motivation. A family must try to sort out what a relative is and is not capable of doing. Unrealistically high expectations may lead to frustration and tension and finally, relapse while too low expectations may lead to prolonged symptoms and increased depression in the relative and a sense of helplessness in the family. It may be necessary to give a helping hand or at times, to completely take over the regular duties of an ill member. As he or she recovers, the responsibilities should be returned at a comfortable pace. Since the amount of stress in a person's life plays an important role in determining how seriously or how often a person may fall ill, it naturally follows that finding ways of reducing stress becomes a priority in a family dealing with manic-depressive illness. Establishing clear expectations and structure within the family does much to reduce stress. For instance, a family may find itself adjusting to the irregular routines of an ill member who may be going to sleep late, waking up late, eating at odd times. Altering family schedules to accommodate his or her daily living patterns will inevitably lead to resentment and stress. It becomes necessary to make clear expectations. a) Certain families may need to set up a regular daily schedule stating clearly when the recovering person is expected to wake up, eat meals, complete small grooming or household chores. Besides being an aid to reorganizing the ill person's thoughts, such a statement also serves as a message that the family wants the person included in their regular routine. b) Including a recovering person in the planning for any vacation, outing, visit and other activities helps to relieve the anxiety related to unexpected events. Plans might include how the person would like to deal with the situation. Would he/she prefer to join the activity or to have quiet, private time? c) Also, the family needs to have made specific plans regarding any problem behaviors so as to reduce the stress related to power struggles. Problem-solving, reaching an agreement, writing a contract as to what exactly is expected, when, how often, and what consequences will occur when the behavior takes place and when it does not, is often a useful purpose. d) Finally, each family member may want to take stock of their own lifestyle patterns. Special emphasis is on assuring time to pursue one's own interests. Particularly stressful is the threat of suicide. When a family member is overtly suicidal, most families realize the importance of immediate professional help. However, suicidal intentions are also expressed in more subtle ways. As suicide is often an impulsive act, quite unexpected by family, it is important to be aware of some of the common warning signs: - feelings of worthlessness, hopelessness - feelings of anguish or desperation - preoccupation with death or other morbid topics - social withdrawal - increased risk-taking, (speeding while driving, handling weapons, drinking heavily) - sudden burst of energy, or brightened mood after being seriously depressed - putting affairs in order (writing a will, giving possessions away) - having an actual plan by which to commit suicide - hearing voices that command self-mutilation or suicide - having a family history of suicidal behavior Immediate responses include: - removal of all weapons, even cars or other potentially dangerous vehicles - search for a stash of drugs to guard against an overdose. Ensure patient is taking medication - calm communication with person to assess situation without condemnation. The person may feel less cut off and both may judge more easily whether protective hospitalization is in order - communication with helping professionals - decision whether constant supervision would be useful Conflicts are a natural part of family life. When bipolar disorder enters the picture, the issues that lead to conflict and anger often seem highlighted. Effective communication can serve to reduce the volatility of such issues to more manageable proportions. Basic guidelines include: a) Be clear and specific about expectations, feelings, dissatisfactions, hopes, limits and plans. "Please stop playing the piano so late at night. The rest of the family needs their sleep. If you can't stop playing after 10:30 p.m., we will put the piano into storage," in contrast to, "Stop being so inconsiderate. Don't you know...." b) Be calm. Raising one's voice and becoming openly hostile only serves to escalate the conflict. c) Give acknowledgement. Too often people try to immediately reassure people in distress, which turns out to be far from reassuring. A person in distress is more likely to feel calmer when his or her experience has first been validated by another person. "I can see why you'd be so upset if you think Billy is going to criticize you again. Let's see if there's some creative, assertive way you can deal with Billy if he does that again," rather than, "Don't be so silly, he didn't mean anything by it, just learn to stand up to him." d) Be brief. Moralizing or going into great detail often leads to the message getting lost. e) Be positive. Avoid unnecessary nagging and criticisms. Make an effort to recognize and acknowledge positive attributes, actions of the person. f) Share information. Children find it particularly difficult to live at home with a parent suffering from a manic-depressive illness. They feel confused, afraid, hurt, ashamed as well as unknowledgeable about how to respond to a parent during the illness phase as well as after recovery. An open discussion about the illness can help to give the child some sense of control in an otherwise overwhelming situation. This sense of control helps, in turn, to preserve a sense of inner security. Tracy, N. (2021, December 28). Family Considerations: Effects of Bipolar Disorder on the Family, HealthyPlace. Retrieved on 2022, August 13 from https://www.healthyplace.com/bipolar-disorder/bipolar-support/effects-of-bipolar-disorder-on-the-family
<urn:uuid:269e4a6a-73de-4342-8fe2-780830f666f2>
CC-MAIN-2022-33
https://aws.healthyplace.com/bipolar-disorder/bipolar-support/effects-of-bipolar-disorder-on-the-family
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00004.warc.gz
en
0.967007
2,958
2.703125
3
Email: [email protected] I frequently mention the acronym “GEDCOM”. This week a reader wrote to me with an excellent question: “What is GEDCOM?” I realized that I haven’t explained that buzzword in a long, long time. So here is a brief, non-technical explanation of the term for the newer subscribers to this publication. GEDCOM is an abbreviation that stands for GEnealogy Data COMmunications. In short, GEDCOM is the language by which different genealogy software programs talk to one another. The purpose is to exchange data between dissimilar programs without having to manually re-enter all the data on a keyboard. To illustrate the importance of GEDCOM, step back in time with me for a moment. Back before the invention of GEDCOM and before the invention of the home computer, I entered onto 80-column punch cards the names and limited information about 200 or so of my ancestors. I did this after hours in my employer’s data center. I then used the employer’s mainframe computer that cost hundreds of thousands of dollars to sort the data and to print a few crude reports. Luckily for me, my employer allowed me to use all the mainframe time I wanted during the evening, after the company finished its daily work. Around 1980, I built my own home computer. I decided to put my genealogy database onto the new system, but it would not read 80- column punch cards. I manually re-typed every bit of data into a dBASE-II program that I wrote. My database had grown; I had to enter data on 400 or so individuals. I stored the information on 8-inch floppy disks attached to my homemade 8-bit CP/M computer that had 64 kilobytes of memory. Some time later I discovered a CP/M genealogy program that would operate on my system. Unlike my crude, homemade program, this new genealogy program printed pedigree charts, family group sheets, and other reports. I decided to convert to the new, more powerful program (although I must say that it was rather elementary when compared to today’s powerful programs). My database had grown to about 600 individuals, and I could not find any method of easily copying that data into the new program. I first printed out the information from the dBASE-II database. Then I sat at my computer for several evenings, reading the information on paper and re- typing every bit of it into my new program. I bet you can guess the next step: I purchased an IBM clone in 1984 and decided to move my data to this new powerhouse. After all, it had 640 kilobytes of memory and a 20-megabyte hard drive that I was certain that I could never fill. Having been rather active in my genealogy research, now I had information about 1,200 people to re-enter. I printed out the entire database from the old system onto paper and then manually re-typed it into the new PC powerhouse. That effort took weeks, and I promised myself, “Never again!” Newer genealogy programs appeared in the following years, each with new features that I found enticing. However, I continued to use the same program simply because I didn’t want to go through the keyboard effort again. Then the Church of Jesus Christ of Latter-day Saints announced something new: a file format called GEDCOM. This new proposed standard file format was designed to allow different genealogy programs to exchange data. There was only one problem at the time: the only program that could read and write GEDCOM data was the one written by the Church of Jesus Christ of Latter-day Saints. GEDCOM is a standard, not a program. As such, genealogy programs that are going to use the same data have to be written by the programmers to handle GEDCOM files. If you are trying to transfer data from one program to another, only to discover that only one of the programs supports GEDCOM, you are out of luck. Instead, both programs have to support GEDCOM. Slowly, over a period of several years, other genealogy programs began to add the ability to read and write GEDCOM files. It was now possible to move data from one genealogy program to another without manually re-typing everything. The author of the genealogy program that I used never did add GEDCOM capability. Luckily for me, someone else eventually wrote a small routine that would export data from this program in GEDCOM format, and I was then able to move my data to more powerful new programs. By 1990, I was writing articles on CompuServe, advising everyone to never use a genealogy program that lacked GEDCOM capabilities. Luckily, that is not much of an issue this year. All of today’s major genealogy programs will import and export GEDCOM data. Data transfer is still a problem for those using older genealogy programs without GEDCOM capability; many people still find their data trapped in these “islands.” For them, there is no easy solution. Unlike the “dark ages” of the 1980s, it is now common for people to use two or three or even more genealogy programs. You may find one program that you prefer to use for storing all the bits of information that you encounter in your research efforts. However, you might prefer the printed reports or multimedia scrapbook features of a different program. Thanks to GEDCOM, you can easily move your data from one program to another. You can also share information with distant cousins using yet other genealogy programs by sending GEDCOM files to each other by e-mail. The instructions for creating or reading GEDCOM files will vary from one program to another. You need to consult the program’s HELP files to find the exact sequence of instructions your genealogy program requires. You need to be aware that the creation of the GEDCOM standard was not a perfect implementation. For one thing, not all the data fields are specified precisely in the GEDCOM specifications. Next, not all the programmers of the various genealogy programs interpreted the specifications in exactly the same manner. For instance, your present genealogy program might be perfectly happy with a birth date listed as, “after 1847 but before 1852.” However, once that information is exported in a GEDCOM file and then imported into a different program, the birth date may say something else. Typically, it is simply left blank. Another problem is that not all genealogy programs have the same ideas about databases. One program may have only one field for “occupation,” assuming that every person on the face of the earth never, ever changed careers. Another genealogy program may have the ability to record multiple occupations during the person’s lifetime. When transferring data via GEDCOM from the more powerful program to the simpler one, some of these occupations will be lost. These are a couple of simple examples; you can find numerous other inconsistencies when moving data between dissimilar programs. Another limitation is the fact that the present GEDCOM standard was created before the popularity of multimedia. You can transfer textual data, such as names, dates and locations rather well in GEDCOM. However, transferring scanned images, sound clips and movies from one genealogy program to another is almost impossible to accomplish via GEDCOM files. There is another problem with translating from one format to another, that of data integrity. Translating from one program’s database to GEDCOM is sort of the same as translating from one spoken language to another. The basics work, but subtleties and details sometimes do not translate well. Then, when translating to the third language (the receiving genealogy program’s database), more translation losses creep in. I well remember reading a technical manual some years ago that had been written in Japanese and then translated into Chinese. At a later date, the Chinese version was translated into English. The resultant English manual was barely readable. The same may happen with translating a database from Program A into GEDCOM and then from GEDCOM into Program B. A new method of transferring data between different genealogy programs was announced some time ago by Wholly Genes Software. Their GenBridge technology reads data from one program directly into a second program without requiring a “double translation” via GEDCOM. The result is a much more accurate transfer process. However, other genealogy developers have yet to adopt GenBridge. To date, this technology is only available in software produced by Wholly Genes: The Master Genealogist and Family Tree Super Tools. Despite all the shortcomings, GEDCOM is still a simple and somewhat effective method of transferring genealogy data from one program to another. Most of the data will transfer properly, and then there are easy ways of reviewing the data to look for errors. The names, dates and locations normally transfer correctly. Text, events, notes and source citations may not always work perfectly. The exact problems encountered will depend upon the two genealogy programs involved. Most modern genealogy programs will create an error log of GEDCOM data imported but not understood by the receiving program. You can read that log file to see what the program detected as inconsistent, then manually go in and fix the errors. While tedious, this is still a lot better than re-keying everything! A few weeks ago a new GEDCOM standard was proposed that is to be based upon XML, a programming language that is popular on the World Wide Web. This new standard should greatly improve data transfer accuracy. See my article at http://www.ancestry.com/library/view/columns/eastman/5626.asp for details. However, don’t look for this new GEDCOM 6.0 any time soon. It is still a proposal and probably will not appear in genealogy programs for another couple of years. I offer this as a non-technical explanation of GEDCOM plus some commentary on its use. For more details and for technical explanations of the inner workings of GEDCOM, I would suggest that you read the following: The GEDCOM Standard Release 5.5: GEDCOM 6.0 XML proposal: Introduction to GEDCOM: GENTECH’s GEDCOM Test BookProject: GEDCOM 101 by Jan McClintock: GEDCOM Usage Guide: Ancestry World Tree: Is GEDCOM Dead? By Beau Sharbrough: SOURCE: This article is from Eastman’s Online Genealogy Newsletter published May 16, 2002 and is copyright 2002 by Richard W. Eastman. It is re-published here with Dick’s permission.
<urn:uuid:fae4242b-eebd-4c57-a2ef-72c351135b8e>
CC-MAIN-2022-33
https://www.acadian.org/home/about-the-cds/a-word-about-gedcoms/gedcom-explained-dick-eastman/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00605.warc.gz
en
0.942678
2,432
2.65625
3
Get Accurate and Customized Robotics Homework Help from Us! What is Robotics? Robotics is an integral part of computer science, mechanical and electrical engineering that deals with the design, planning, construction, operation and the application of robots. They also deal with their control system, information processing and sensory feedback through allied computer applications and software. But if you are facing any problems in robotics then use robotics assignment help from our expert team. It is a study that helps to understand the designing, operation and application of different forms of robots available. Robotics is a study about computer system which includes the advanced sensory and informational processes. It is one of the most challenging and vital technological departments, especially with globalization and the recent technological boom. Hence, if you’ve been bestowed with some robotics assignment by your institution, be sure of them being quite tricky. But if you’re planning to resort to our robotics assignment help, be prepared to get the best. Branches of Robotics Today, most of the students are eager to build up their career as robotics engineers. Myhomeworkhelp.com allows you to gain complete clarity on the topic. - Medical robotics: Today, there are different types of robots which are associated with the medical field, and it is vital to get involved in the study. Rehabilitation robots, pharmacy automation and telepresence robots are some of the technologies adopted in the medical field. - Robotics operating system: Through robotics homework help, you will also get to know the operating system of robotics which helps to change the design of the system. Getting associated with this profession will always demand that the person has enough knowledge of mathematics, and computer programming. Necessary skills on designing and handling of tools will certainly help you become a successful robotics engineer. Is Robotics fruitful in Today’s World? Of course, it is. Robotics is one of those branches of engineering that is continuously seeing a booming industry. Most factories and industries choose to use robots instead of human resources in numerous areas. Hence, with every passing day, the number of robotics-related jobs is increasing. If you want to study robotics, you need to possess a keen analytical mind and be exceptionally computer savvy. If you’re not, then you would need quite some time to learn these skills. Don’t worry if you’re going to take time—you should never rush. And, as for the assignments, projects and homework are concerned; we’re there by you to help you. With our expert and timely robotics homework help, you can now get to understand the subject and enjoy it while continuously bagging excellent grades at your institutions. The team of supervisors, guides and tutors at My Homework help are selected through numerous rounds based on their skills, their experience and their expertise in the subject. All these are done only to ensure a great result. And, the best part is, all these are available to you at the best possible rates. 10 Approaches to your Robotic Assignment’s Completion: - Priority papers – Nearest due dates’ projects should be completed first. - Dividing work – Breaking large portions into smaller portions for easy management. - Task approach – Prepare notes of such smaller tasks to complete your entire homework. - Recess – After finishing each task take a break before beginning the next work on the list. - Manage time – Always have a fixed time of working. - Stop your distractions – Focus entirely on your project when working and stay away from distractions during this period. - Encourage yourself – Give yourself the motivation to keep going by rewarding yourself after each task is completed. - Resources – Get to people for help like elders, parents, teachers, etc. - Learning websites on the internet – Go through several such sites to gather materials and any other solutions which are about your work. - Hire a robotics assignment tutor online – Getting help from a robotic homework tutor is the best approach. He/she can quickly assist you in everything you need to score well on a paper. Hire Robotics Assignment Help and Secure Best Grades Robotics in the last few decades has gained immense popularity, and it is the fastest-growing area which helps to understand the construction and design of any new robot function. Robotics homework help will make sure that you know the proper functioning of robots which are currently used to fulfil different goals either militarily, domestically and commercially. My Homework help is a prestigious academic help agency running on a global scale and your one-stop solution for all the assignment, project or homework problems given by your school, college or university. We are a team of well qualified and experienced scholars; teachers and guides who work relentlessly even on holidays to complete your project with expertise and finesse. So, if you’re thinking of bagging their help, you can rest assured of getting not only the best grades but also understand the core concepts, the theories and the analytical parts much better. We have been recommended repeatedly for our expertise by our clients from around the globe. And, to stand up to these tall claims, we aim at providing better robotics assignment help to every new client. Through our robotics assignment help, it is possible to gain knowledge on what the subject deals with. How can we help you in robotics assignments? Worried about how the experts can assist when you seek for robotics homework help? You do not have to worry about how to do my robotics homework. The qualified experts are available to guide you: - Prepare the draft: Once you send the details related to the assignment, the experts will do the research and come up with accurate information. The draft would further help to write the assignment in an organized manner. - Write down the assignment: It is an integral part of the homework. Once the information is collected, it is necessary to write the assignments correctly. We check for spelling errors and grammar mistakes. Our team is highly committed, and so we avoid all kind of errors to ensure quality assignment. The robotics assignment writers also focus on detailed plans and present necessary diagrams to support any idea. Why Should You Consider Our Service? - Free Register – Quick Solution - Free Revisions - Plagiarism Report - On-Time Delivery - Money Back Guarantee - Work Within the Deadline - Better Grades Guaranteed - 100% Confidential - 24×7 Tutors - Native Experienced Experts The Reason of Choosing Myhomeworkhelp.com Over the Years? - A+ Quality Assignments - 100 + Subjects Cover - 4000+ Assignment Experts - 100% Privacy Assured - 116247 Tasks Completed - Plagiarism Free Guaranteed - Global Tutors – Choose Your Local Tutor - HTTPS – Safe Payment - Affordable Price Quotes - Discounts Guaranteed for Existing Students Guaranteed service through talented writers! While delivering robotics assignment help, myhomeworkhelp.com emphasize on answering all your queries. You can believe in our service and ensure that your paper is accurate and original. We do not allow anyone to handle your work! Instead, we choose the best person to deal with academic writing. - The scholars are PhD degree holders from recognized universities that prove their efficiency in dealing with your paper. Most of our experts have earned the highest level of qualifications which ensures that they are aware of the academic requirements. - It is not only the educational qualification that our experts possess. Instead, the team is experienced, which gives them proficiency to handle academic writing even from a practical perspective. Robotics assignment help service is delivered through a team that includes ex-robotics engineers who have real-life experience in designing robots. Therefore, you can expect to get the best kind of service from us. If you are eager to impress your teachers and have a flawless assignment, then we are the best option for you! A Bit More About us With such an expert and efficient team aiming at perfecting your all-round performance more than anything, you can always be assured of bagging the best robotics homework help from us. Other than that, we— - Check for plagiarism - Check for any spelling, grammatical or silly mistakes - Provide you with proper in-text citations, references. - Research your topic well - Provide a timely delivery - Guarantee you a positive result - Charge extremely nominal prices What is the Process of Assignment Assistance in My Homework Help? It is straightforward and involves four steps: Step 1: Fill your Details – You need to submit the information about the online assignment and what exactly you need to about the same. Step 2: Take a Price Quote on your Assignment – Get an idea about how much you have to pay for homework assistance. $10 Per Hour is a minimum fee for an online tutor. Step 3: Make Payment – You have to do an online transaction which takes only a few minutes. Step 4: Receive Assignment Solution – You will receive your assignment in the specified time. So what are you waiting for! Hire the best services now! Your Common Questions with Answers:- - What are Robotics Assignments? An integrative part of science and engineering, which masters in operation, construction, application and designing of robots in addition to this computer systems to control information processing and sensory responses. To name a few robotics assignment topics includes sensors, instrumentations, CNC Machining Technology, principles of robotics, medical robotics, the operating system of robotics. For more details, drop your query! - How can I get an assignment done fast? Anyone can access us 24×7 from any part of world irrespective of linguistic barriers. - What are the elements of Robotics assignment? It mainly consists of robotics and automation. - How do I find help to complete my Robotics assignment? We aid students in completing their entire assignments by abiding all the provided standards with zero grammatical errors. Feel free to come up with your assignment questions. - What is assignment writing? On this platform, we take complete responsibility for your assignments, and on-time delivery is promised. The best part about us is we provide full plagiarize free works; our experts perform each task effectively emphasizes on every little instruction. - What are the types of assignment? There are programming, wiring, sketching a circuit, how to measure, coding (Python, Java, C++, scratch, CAD), Engineering, physics and lots more. - How to Write a Good Robotics Assignment? By writing unique content of good quality and with all the given standards met (special instructions and deadline of project submission), error-free, devoid of any grammatical errors or inappropriate words usage. - How to score higher in Robotics Assignment? The Guidance of our dedicated and hard-working experts is the path to bag good grades. - How does Robotics homework help make you better? Our well-qualified writers of Robotics homework help will give you a better understanding of the subject by reducing your burden for the assignment assigned to you. - What does a “do my Robotics assignment” inquiry mean for us? When you submit your “do my Robotics assignment” inquiry, we understand that all we can do for you is to provide you with custom Robotics essays. All the rest—communication and other practical skills included—is something you can get only with constant practice. From our part, when completing an assignment for you, we guarantee you affirmative answers to these questions: A. Will my paper be authentic? Yes, as we start working on your order only when you provide us with instructions which become guidelines for our writers. B. Can I be sure of the high quality of the paper I get? Yes, as we work with the best academic writers—experts both in the English language and in Robotics. C. Can you provide me with a refund if there is a need? Yes, thanks to our money-back guarantee, you can get a refund in case of any financial issues. D. Will I get a free revision if I don’t like my essay? Yes. As your satisfaction with our work is very important for us, we will provide you with revisions until you are pleased with your paper. E. Are the prices for Robotics homework help reasonable with your writing service? Yes. Thanks to our substantial experience, we can give you low prices.
<urn:uuid:2b5a8a15-95c3-4e05-95c2-7ed8a6f1d48c>
CC-MAIN-2022-33
https://myhomeworkhelp.com/robotics-homework-help/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00000.warc.gz
en
0.935161
2,580
2.921875
3
Mycobacterial cervical lymphadenitis |Mycobacterial cervical lymphadenitis| |Other names||Scrofula, scrophula, struma, the King's evil| |Scrofula of the neck, showing characteristic bumps on the skin| The disease mycobacterial cervical lymphadenitis, also known as scrofula and historically as king's evil, involves a lymphadenitis of the cervical lymph nodes associated with tuberculosis as well as nontuberculous (atypical) mycobacteria. Scrofula is the term used for lymphadenopathy of the neck, usually as a result of an infection in the lymph nodes, known as lymphadenitis. It can be caused by tuberculous or nontuberculous mycobacteria. About 95% of the scrofula cases in adults are caused by Mycobacterium tuberculosis, most often in immunocompromised patients (about 50% of cervical tuberculous lymphadenopathy). In immunocompetent children, scrofula is often caused by atypical mycobacteria (Mycobacterium scrofulaceum) and other nontuberculous mycobacteria (NTM). Unlike the adult cases, only 8% of cases in children are tuberculous. With the stark decrease of tuberculosis in the second half of the 20th century, scrofula became a less common disease in adults, but remained common in children. With the appearance of AIDS, however, it has shown a resurgence, and can affect patients at all stages of the disease. Signs and symptoms The most usual signs and symptoms are the appearance of a chronic, painless mass in the neck, which is persistent and usually grows with time. The mass is referred to as a "cold abscess", because there is no accompanying local color or warmth and the overlying skin acquires a violaceous (bluish-purple) color. NTM infections do not show other notable constitutional symptoms, but scrofula caused by tuberculosis is usually accompanied by other symptoms of the disease, such as fever, chills, malaise and weight loss in about 43% of the patients. As the lesion progresses, skin becomes adhered to the mass and may rupture, forming a sinus and an open wound. The fatal outcome some patients experienced in earlier times was due to a cheese-like presentation of the lungs and the King's Evil lesions. It was also associated with pulmonary tuberculosis. Cervical lymphadenitis is commonly caused by an infection of mycobacteria in the head region. This disease is very inconsistent; cases can have different laboratory findings. Sometimes the disease can occur due to tuberculosis disease. However it is vital that, on a case-by-case basis, it is determined whether the cause is tuberculous or nontuberculous mycobacteria, as treatment often differs between the two forms. Diagnosis is usually performed by needle aspiration biopsy or excisional biopsy of the mass and the histological demonstration of stainable acid-fast bacteria in the case of infection by M. tuberculosis (Ziehl–Neelsen stain), or the culture of NTM using specific growth and staining techniques. The classical histologic pattern of scrofula features caseating granulomas with central acellular necrosis (caseous necrosis) surrounded by granulomatous inflammation with multinucleated giant cells. Although tuberculous and non tuberculosis lymphadenitis are morphologically identical, the pattern is somewhat distinct from other causes of bacterial lymphadenitis. King's Evil was known as a frequent disorder in the 17th century, and was believed to be caused by bad blood coagulating in spongy organs such as the thyroid and the lymph nodes. A Hippocratic treatise stated that King's Evil was caused by an accumulation of phlegm that resulted in an imbalance of the four bodily humours (blood, bile, lymph, and phlegm). The treatment for mycobacterial cervical lymphadenitis consisted primarily of small incisions to remove the surrounding soft tissue and/or the abnormal mass. Until the 18th century, many doctors thought the only way to cure the disease was to be touched by a member of a royal family. In both France and England, the kings who were thought to have an inherited miraculous power to cure the illness, touched crowds of infected people. The 'touchings' began in France during the reign of King Philip I (1060–1108) and in England during the reign of King Henry I (1100–1135). This act of public healing by powerful kings and royal family members encouraged the nickname "King's Evil". After the touching, the sovereign presented the affected person with an angel on a gold-plated coin that was to be hung around the infected person by a ribbon. This was used as a way of warding off the disease. This coin could have weighed as much as 5 grams and was considered a touch piece of great value. The royal touch and surgical removal were not the only methods of healing employed: Scrophularia nodosa (common name: Figwort), which has nodular roots that resemble the swollen lymph nodes of the affected, was thought to be useful in treating the disease, according to the doctrine of signatures – the plant being hung around the neck of the affected. Figwort does, in fact, contain compounds that can help decrease inflammation, irritation and discomfort. 20th century to present Treatments are highly dependent on the kind of infection. Surgical excision of the scrofula does not work well for M. tuberculosis infections, and has a high rate of recurrence and formation of fistulae. Furthermore, surgery may spread the disease to other organs. The best approach is to use conventional treatment of tuberculosis with antibiotics. The cocktail-drug treatment of tuberculosis (and inactive meningitis) includes rifampicin along with pyrazinamide, isoniazid, ethambutol, and streptomycin ("PIERS"). Scrofula caused by NTM, however, responds well to surgery, but is usually resistant to antibiotics. The affected nodes can be removed either by repeated aspiration, curettage or total excision (with the risk in the latter procedure, however, often causing unsightly scarring, damage to the facial nerve, or both). Many different therapeutic options exist, particularly regarding non tuberculosis mycobacterial infections, such as incision and drainage, aspiration biopsy and chemotherapy. All of these methods have proved to result in a cure of the disease. However different treatments can cause different side effects along the way to recovery. Some of these side effects include facial nerve injury and scarring. Therefore, the course of treatment is tailored to each patient, taking into account their history as well as the severity of infection. With adequate treatment, clinical remission is practically 100%. In NTM infections, with adequate surgical treatment, clinical remission is greater than 95%. It is recommended that persons in close contact with the diseased person, such as family members, be tested for tuberculosis. History and etymology The term 'cervical' refers to the cervical lymph nodes in the neck; it is unrelated to the cervix. The alternative name scrofula comes from the medieval Latin scrōfula, diminutive of scrōfa, meaning brood sow, because swine were supposed to be subject to the complaint. In the beginning of the Modern Age some Western Europeans believed that royal touch, the touch of the sovereign of England or France, could cure diseases owing to the divine right of sovereigns. Henry VI of England is alleged to have cured a girl with it. Scrofula was therefore also known as the King's evil. From 1633, the Book of Common Prayer of the Anglican Church contained a ceremony for this, and it was traditional for the monarch (king or queen) to present to the touched person a coin—usually an angel, a gold coin the value of which varied from about 6 shillings to about 10 shillings. In England this practice continued until the early 18th century, and was continued by the Jacobite pretenders until the extinction of the House of Stuart with the death of the pretender Henry IX. King Henry IV of France is reported as often touching and healing as many as 1,500 individuals at a time. Queen Anne touched the infant Samuel Johnson in 1712, but King George I put an end to the practice as being "too Catholic". The kings of France continued the custom until Louis XV stopped it in the 18th century, though it was briefly revived by Charles X in 1825. Physicians, healers, and patent medicine sellers offered a wide range of cures for scrofula or the King's Evil. Since ancient times, the highly toxic heavy metal mercury, referred to as cinnabar, quicksilver or calomel, was administered as an ointment or pill or inhaled as a vapor to treat skin diseases. Mercury taken internally induced vomiting and sweating, reactions believed to cure the disease. In 1830 the New-York Medical and Physical Journal continued to recommend mercury as the best cure for scrofula, stating it caused an irritation that would counteract the disease and increased the working of the glands. Alternative treatments were also offered. Many rejected the harsh side effects of mercury, claiming their cures were made of "natural" or "vegetable" ingredients. Patent medicines labeled as sarsaparilla were recommended for scrofula. Examples of treatments recommended between the 17th and 19th century include the following: - Herbalist Nicholas Culpepper (1616–1654) claimed to have treated his daughter for scrofula with lesser celandine, and cured her within a week. Ironically, Culpepper would himself later die of tuberculosis. - In the 18th century, Elizabeth Pearson, an Irish herbalist, proposed a treatment for scrofula involving herbs and a poultice and extract of vegetable, and in 1815, Sir Gerard Noel presented a petition to the House of Commons advocating her treatment. - In 1768 the Englishman John Morley produced a handbook entitled Essay on the Nature and Cure of Scrophulous Disorders, Commonly Called the King's Evil. The book starts by listing the typical symptoms and indications of how far the disease had progressed. It then goes into detail with a number of case studies, describing the specific case of the patient, the various treatments used and their effectiveness. The forty-second edition was printed in 1824. - Richard Carter, a frontier healer in Kentucky, recommended several treatments for the King's Evil, or scrofula, in his 1815 home medical guide Valuable Vegetable Medical Prescriptions for the cure of all Nervous and Putrid Disorders. - In the 19th century in the United States, the patent medicine Swaim's Panacea was advertised to cure scrofula. Swaim's Panacea contained mercury. A three-year-old healthy young female presented with a bilateral cervical lymph node enlarged. The patient was admitted to the hospital after tuberculosis skin test became positive and further examination showed several other enlarged lymph nodes near her neck. At the hospital, she underwent an exploration surgery where they excised part of her presented lymph node and drained her retropharynx. The drained retropharynx grew methicillin-resistant Staphylococcus epidermidis and Streptococcus mitis. After these findings, the patient received oral linezolid for ten days and had antimicrobial drug therapy for 14 days. Once the patient returned for a follow up appointment, the lymph node had only slightly decreased in size. Due to this, it had to be completely removed from her neck. Bacterial cultivation of tissue from the excised lymph node resulted in the growth of "atypical Mycobacteria", which were identified by 16S gene sequencing as Mycobacterium florentinum. After she recovered and went home, there were no repeat signs that the infection was back for over a year. - Moazzez AH, Alvi A (April 1998). "Head and neck manifestations of AIDS in adults". American Family Physician. 57 (8): 1813–22. PMID 9575321. - Sun L, Zhang L, Yang K, Chen XM, Chen JM, Xiao J, et al. (March 2020). "Analysis of the causes of cervical lymphadenopathy using fine-needle aspiration cytology combining cell block in Chinese patients with and without HIV infection". BMC Infectious Diseases. 20 (1): 224. doi:10.1186/s12879-020-4951-x. PMC 7071630. PMID 32171271. - Duarte GI, Chuaqui FC (April 2016). "[History of scrofula: from humoral dyscrasia to consumption]". Revista Médica de Chile. 144 (4): 503–7. doi:10.4067/S0034-98872016000400012. PMID 27401383. - Bayazit YA, Bayazit N, Namiduru M (2004). "Mycobacterial cervical lymphadenitis". ORL; Journal for Oto-Rhino-Laryngology and Its Related Specialties. 66 (5): 275–80. doi:10.1159/000081125. PMID 15583442. - Rosado FG, Stratton CW, Mosse CA (November 2011). "Clinicopathologic correlation of epidemiologic and histopathologic features of pediatric bacterial lymphadenitis". Arch Pathol Lab Med. 135(11):1490–93. doi:10.5858/arpa.2010-0581-OA. PMID 22032579. - Sturdy DJ (1992). "The Royal Touch in England". European Monarchy: Its Evolution and Practice from Roman Antiquity to Modern Times. Franz Steiner Verlag. p. 190. ISBN 3515062335. - "Gold coin used in the ceremony of touching for the king's evil". BL.uk. The British Library. Retrieved 2020-12-15. - Furdell EL (2001). The royal doctors, 1485-1714 : medical personnel at the Tudor and Stuart courts. Rochester, New York: University of Rochester Press. p. 190. ISBN 978-1-58046-051-4. - Mandell DL, Wald ER, Michaels MG, Dohar JE (March 2003). "Management of nontuberculous mycobacterial cervical lymphadenitis". Archives of Otolaryngology–Head & Neck Surgery. 129 (3): 341–344. doi:10.1001/archotol.129.3.341. PMID 12622546. - Henry Hitchings (2005). Dr Johnson's Dictionary: The Extraordinary Story of the Book that Defined the World. John Murray. p. 11. - "The New York Medical and Physical Journal". 1830. - Resor C (March 18, 2020). "What is scrofula? Can it be cured?". - Reader's Digest Field Guide to the Wild Flowers of Britain. Reader's Digest. 1981. p. 26. ISBN 9780276002175. - "Petition of Mrs. Pearson Respecting Her Discovery For the Cure of Scrofula, or King's Evil". Hansard. 31: 1086–87. 3 July 1815. - Young JH (1961). "Chapter 5: The Toadstool Millionaires". - Bloch M (1973). The Royal Touch: Sacred Monarchy and Scrofula in England and France (Les Rois Thaumaturges). London: Routledge & Kegan Paul. - Syed SS, Aderinboye O, Hanson KE, Spitzer ED (September 2010). "Acute cervical lymphadenitis caused by Mycobacterium florentinum". Emerging Infectious Diseases. 16 (9): 1486–7. doi:10.3201/eid1609.100433. PMC 3294984. PMID 20735941. - Werrett, Simon. "Healing the Nation's Wounds: Royal Ritual and Experimental Philosophy in Restoration England". History of Science 38 (2000): 377–399. - Scrofula at MedPix Images
<urn:uuid:84221695-1b0f-43fe-9c11-6986572e8654>
CC-MAIN-2022-33
https://en.wikipedia.org/wiki/Mycobacterial_cervical_lymphadenitis
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00205.warc.gz
en
0.924019
3,624
2.9375
3
Autism is a spectrum disorder that affects human beings of all ages, but can cats have autism? There is no proof that cats can have autism, yet feline behavioral eccentricities may resemble the signs of autism in people. Indeed, cats occasionally display behaviors consistent with those seen in autistic persons. That doesn’t necessarily indicate that something is wrong, though. Some cats experience overstimulation, which is indicative of an autism diagnosis. Dilated pupils, flat ears, and biting movements indicate overstimulation. Aggressive cat hissing is frequently caused by overstimulation. Most scientists in this field believe that cats have autism, and some say that cats’ behavior may even be more “high functioning” than humans. However, there is currently no way to scientifically show whether or not Cats have autism or any other autism spectrum disorder. For this reason, the condition is often referred to as “shared incongruence of interests and behavior” or sometimes “Cat-like autism.” This means that cats may have these symptoms of autism spectrum disorder, but other people and other species don’t. To answer that question, we must first define autism and its symptoms. WHAT IS CAT AUTISM? It is sometimes believed that cats may be autistic because their abilities have been overlooked. They theorized that cat owners have been overly tolerant of cats’ behaviors and have low standards for cats’ abilities, especially compared to other animals. A cat’s only motor abilities include bending its ears, removing hairballs, scratching the floor with its paw, and catching bugs. However, more advanced cat behavior displays a lot of similarities to autistic children, and this is what we’ll explore today. Autism describes the various disorders in the autism spectrum. This spectrum includes conditions that affect behavior, language, interests, and learning ability. The autism spectrum is the range of traits and skills a person with autism can exhibit at one time or another. Autism diagnosis is based on a person’s sensory abnormalities and communication problems and lacks behavioral, emotional skills, or typical social behavior. However, like many others, cats are less likely to be diagnosed than autistic people. Most cats are also incapable of self-soothing, scratching an object or acting as if something is attacking them or communicating a complex thought showing interest in things such as screws or dog food). There are many physical clues with cats that could indicate autistic tendencies, but it’s most likely that the majority of cat parents will overlook them. Most Cat breeds could be considered “high functioning” due to their unique characteristics and can only display minimal behaviors. They can, however, still have very intense and eccentric behaviors. While cats may lack many obvious “autism” symptoms, this does not mean they are unaffected by any disorder. Cats’ behaviors and communication result from repetitive behaviors, sensory and communication difficulties, and learning disabilities. Therefore, the behaviors and sounds that cats may display can be compared to that of a child with autism. In other words, many cats may have autism but do not suffer from the full spectrum of autistic symptoms. They may only display occasional autistic behavior that leads their family members to this conclusion. Common Traits Of Autistic Cats While there’s no one definitive symptom of autism in cats, there are some common traits that may indicate your cat is on the spectrum. For example, autistic cats may be uninterested in social interaction, prefer to be alone, or have difficulty communicating with other cats. They may also exhibit repetitive behaviors, such as excessive grooming or meowing. One social deficit cats may notice is a lack of social interactions with people and other animals. It is worth noting that some cats do have social interactions. An affectionate cat has been known to play, groom or cuddle with other animals. But if your cat regularly goes off to be by itself, this anti-social behavior could indicate that you have an autistic cat. Does a quiet cat seeking time away from other family members sound familiar? Cats living with most children of a young age do this for their sanity, but an autistic cat may simply enjoy its own company and is experiencing sensory abnormalities, much like an autistic child. Some cat owners report that their cats enjoy being petted by other people. This is not necessarily a bad thing. However, it proves that not all cats are not as “isolated” as we sometimes assume. While cats have been known to have social interactions, these do not necessarily qualify as full-blown autistic behaviors. Be sure to seek veterinary guidance about treatment options if you think your cat may be autistic. However, be aware that even veterinary medicine doesn’t fully understand the scope of autistic cat behavior, similar to how we’re always discovering new information about autistic humans. What other symptoms can cats display? In general, cats have a low level of empathy. While many cat owners claim that their cats “feel” for their owners, this is not the case. As with all animals, cats are somewhat aware of what is happening around them. However, cats have a much more fundamental understanding of how emotions and thought processes work. This lack of awareness of how emotions work may explain why cats do not recognize when they are being looked at. They may not understand what it means to be “beautiful.” It has been noted that cats tend to follow in their owners’ footsteps. If a cat’s owner is smiling, the cat will also be happy. If the owner is angry, expect a similar mirroring in cat behaviors. However, the cat’s reaction differs from a human’s response to these emotions. While cats have been shown to show emotional reactions to humans because they have been trained to deliver this behavior and will continue to respond this way to stimuli if the owners provide them with rewards. Cat food is a big motivator of feline behavior, so when it comes to emotions, your cat may still have trouble relating and is more treat motivated than anything else. Autistic cats may also avoid eye contact and display compulsive behaviors similar to those in children diagnosed. Many cat owners notice that the feline behavior stands out from the other cats in the house. A household of three cats can all be quite different in personality. Still, some compulsive behaviors or typical signs of autism spectrum disorder may stand out in one cat over the other two cats. What kind of tests will be done to diagnose cat autism in my cat? The first step is to take your cat to a local veterinarian for a physical examination, behavioral assessment, and veterinary advice. Your vet will also ask questions about your cat’s behavior and development. If your vet suspects your cat may have autism, they will likely recommend further testing with a veterinary behaviorist or animal behaviorist. These specialists will use a variety of tests, including questionnaires, observation, and sometimes blood work, to diagnose autism in cats. The likelihood of your cat being autistic can sometimes be increased if you witness physical abnormalities, excessive vocalization, compulsive disorders, or any other social behavior that makes sense to the autism spectrum. How is cat autism treated? There is no one-size-fits-all answer to this question, as the treatment of cat autism will vary depending on the severity of the condition and the resources available to the owner. However, treatment options include behavior modification, medication, and environmental enrichment. But is this best for an adult cat? It’s important to remember that not all cases of cat autism are severe enough to warrant treatment, and your cat’s age may play a significant role in determining if treatment is even what is best for older cats. As with humans, there is a broad spectrum of severity when it comes to cat autism. Some cats may only show mild symptoms, while others have more significant symptoms that need treatment or management. Though there’s no scientific evidence that cats can have autism, some pet owners report seeing behavioral changes in their cats that may be attributed to the condition. If you’re concerned that your cat may display signs of autism, talk to your veterinarian about treatment options. Your cat can continue to live a happy and healthy life with proper care. FAQS (FREQUENTLY ASKED QUESTIONS) Q: How can you tell if a cat has autism? A: Some cats become overstimulated and display signs of it, such as dilated pupils or flat ear posture. This can indicate that they are experiencing too much stimulation in their environment, which may lead to aggressive behavior like hissing at others nearby. Q: How do I know if my cat has special needs? A: Cats can have some fascinating behaviors that might resemble those typically associated with Down syndrome, even though they are not affected by the condition. This is because many special needs cats display traits similar in nature to people with this diagnosis. Their physical disabilities would be easiest to spot, whereas automatically assuming a cat’s behavior means you have an autistic cat can be a little more complicated. If you want to learn more, it’s always best for pet lovers to seek veterinary advice on the matter. Q: Can cats be mentally disabled? A: Cats are just like people in that they can be affected by mental health issues such as depression, anxiety, mental illness, mental disorders, or other mental disabilities. Q: What disabilities can cats have? A: Common and/or inherited disorders in cats include: - Birth Defects - Devon Rex Myopathy - Manx syndrome (spina bifida) - Niemann-Pick Disease (sphyngomyelinosis) - Osteochondrodysplasia or Scottish Fold disease - Hypokalaemic polymyopathy - Polycystic kidney disease - Polydactyl cats - Progressive retinal atrophy - Glycogen storage disease type IV - Hypertrophic cardiomyopathy - Hypertrophic muscular dystrophy - Blood group incompatibility or neonatal isoerythrolysis - Burmese Head Defect - Pyruvate kinase deficiency - Spinal muscular atrophy in Maine coons
<urn:uuid:5d0efc09-e41f-402f-86df-086c333b04ff>
CC-MAIN-2022-33
https://www.heartsofpets.com/can-cats-have-autism/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00605.warc.gz
en
0.947519
2,142
3.125
3
The biology and behaviour of large theropod dinosaurs remains one of the most discussed and popular subjects within the entirety of vertebrate palaeontology, and continuing discussions demonstrate that the life appearance and external soft tissue anatomy of non-bird dinosaurs remain of equal popularity too. Today sees the publication of a new study – led by Chris Barker and involving myself and a team of co-authors – that has some bearing on both of these issues. The work revolves around the Early Cretaceous allosauroid Neovenator salerii from the Wessex Formation of the Isle of Wight, and specifically its facial anatomy. Unusually for British theropods, Neovenator includes an extremely well preserved, three-dimensional partial skull (Brusatte et al. 2008), and it was the well preserved nature of this material (combined with its proximity and availability) that inspired us to study it anew. Working at the University of Southampton’s µVIS X-ray Imaging Centre (‘µVIS’ is said Mu-Vis, if you’re wondering), Chris Barker, myself and colleagues opted to CT-scan the specimen in an effort to discover something new about the vasculature, detailed bone anatomy and pneumaticity of this dinosaur’s face. Our new study – Barker et al. (2017) – appears today in Scientific Reports, and I’m pleased to report that it’s open access. By now I’ve been involved in several CT-scanning projects. They’re often a bit of a gamble; sometimes the results are poor and sometimes they’re terrible. On this occasion, I’m pleased to report that they were excellent. We were immediately struck by the extensive, complex, anastomosing system of internal channels and branches present deep inside the premaxillae and maxillae, snaking and curving around the tooth roots. After eliminating the possibility that these structures might be something crazy like invading plant roots or an artefact of the scanning process, we confirmed that they’re exactly what they look like: evidence for a well developed neurovascular system that deeply invades the bones and is connected to a series of external openings, termed foramina (Barker et al. 2017). The connection of the channels with external foramina known in living reptiles to be the passageways for nerves, their separation from the pneumatic system, their overall morphology and size, and their position relative to the facial features of living reptiles all show that these structures correspond to parts of the nervous system – we think that they’re branches of the trigeminal nerve, in particular the ophthalmic and maxillary divisions (Barker et al. 2017). We worked out how large these nerves are (in volume) and what percentage of the bone they actually occupy. They appear to have been pretty big in comparison with the facial nerves of other animals. We do think that various of the facial arteries and veins occupied similar positions to these nerve branches, though it’s hard to say precise things about them. These big, invasive nerves provide – we think – evidence that Neovenator had a ‘sensitive’ face; that it was well able to receive a large amount of sensory information – pertaining to touch and perhaps temperature, pressure and other stimuli as well – via the sides and front of its face (Barker et al. 2017). It’s very tempting to think that its sensory abilities were similar to those of crocodylians where an enlarged trigeminal nerve – combined with structures termed dermal pressure receptions and integumentary sense organs – give these animals tactile and sensory discrimination perhaps “greater than primate fingertips” (Leitch & Catania 2012), as well as abilities to collect thermal and chemosensory information (Di-Poï & Milinkovitch 2013). This is, of course, far from the first time that a large theropod has been said to be in possession of a ‘sensitive face’. Many of you will recall that the giant, crocodile-snouted Spinosaurus of the north African swamps and deltas possesses a similar system (Ibrahim et al. 2014), and the same was apparently true of other spinosaurids as well (Foffa et al. 2014). Spinosaurids are thought to have been aquatic foragers, so the presence of an enlarged neurovascular system in their snout bones was initially linked to aquatic foraging (Ibrahim et al. 2014). The new data on Neovenator might negate this idea, since there are no indications from overall anatomy, detailed tooth anatomy or tooth wear that Neovenator was an aquatic forager. Admittedly, it isn’t impossible that it was, but we wouldn’t predict that it was on the basis of what we know. Indeed, direct evidence for its predation on large dinosaurs comes from taphonomic evidence involving an iguanodontian (there’s a much-delayed manuscript there that really should see print one day, sigh). What to do with a sensitive face. Why, then, do some (or most… or all?) big theropods have these sensitive faces? There are several possibilities. Facial sensitivity might have been useful in killing or feeding behaviour, assisting the animal’s ability to make careful, directed defleshing movement and avoiding bone during its bites. This is in keeping with tooth wear data from Neovenator (something else we hope to publish soon) and allosauroids in general (Hone & Rauhut 2010). Or it could be that facial sensitivity was linked to something like temperature detection? This would presumably be a useful ability as goes the nesting behaviour of these animals. Or what about the possibility that facial sensitivity had a role as goes communication and social life in these dinosaurs? Maybe they rubbed faces during courtship, in family settings, or relayed messages in combat. Crocodylians provide an obvious analogy here, their sensitive facial receptors (the integumentary sense organs – or ISOs – in particular) being involved in the face-stroking and nuzzling that occurs during courtship. Facial bite marks in allosauroids and tyrannosaurids indicate that face-to-face contact was important, possibly having a ritualised combat function (Tanke & Currie 1998, Peterson et al. 2009, Hone & Tanke 2015). These suggested functions for facial sensitivity are not, of course, mutually exclusive – maybe the enhanced sensitivity of the theropod face allowed them to perform all manner of complex operations and interactions that we primates associate with forelimbs more than faces. How ‘normal’ Neovenator was within the pantheon of theropods as a whole invites further work. Those contentious extraoral tissues. Does any of this mean anything in particular as goes the life appearance of Neovenator? Those of you familiar with the extinct archosaur research community will be aware of the never-ending debate on dinosaur facial tissues and on whether they had ‘lips’, ‘cheeks’ and other such structures. The latest contribution on this subject was published just a few weeks ago and concerned the new tyrannosaurid species Daspletosaurus horneri (Carr et al. 2017). Therein, it was argued that a rugose skull surface texture – extending all the way to the jaw edges – was linked with scalation and an absence of ‘lips’. There’s an aside I have to cover here: Carr et al. (2017) argued that tyrannosaurids were crocodylian-like in having a face covered by “many flat scales”, and they said that the rows of foramina on crocodylian skulls are correlated with “a scaly integument”. This isn’t quite right. The structures that look like scales on a crocodylian face actually represent polygonal cracking of a highly keratinised skin (Milinkovitch et al. 2013). If, ergo, tyrannosaurids shared such a highly keratinised skin with crocodylians, would their very differently shaped skulls generate the same sort of polygonal cracking, and would that cracking – if present – be distributed in the same manner? Large keratinous sheets on the altirostral snout of a big theropod (‘altirostral’ = narrow and tall-sided) might result in a very different look. I’ll leave this matter alone for now. Ultimately, however, our work doesn’t help that much on this issue. The external bone texture and large number of foramina suggests – we think – that a thick external tissue covering was present in Neovenator, and that this covering involved immobile tissue, albeit not rhamphotheca. As we note, even a thick skin is in no way inconsistent with exceptional sensitivity; such is demonstrated by the thick facial epidermis of crocodylians, which is nearly twice as thick as the skin elsewhere on the body. All that remains for me to say is to thank my co-authors – Chris, Elis, Orestis and Gareth – for all their work on this really fun and exciting project, and to promise that those additional studies on the palaeobiology of Neovenator will one day appear. Not only does this new study enhance our knowledge of extinct dinosaur behaviour and biology, it highlights the fact that even a well described and relatively well-studied species can reveal so much more when subjected to novel analysis. For previous Tet Zoo articles on big Mesozoic theropods see... - Of Becklespinax and Valdoraptor - My most favouritest dinosaurs: ceratosaurids - Early abelisaurs and fan-crested and stretch-jawed hadrosaurs - An American tyrant in London - 100 years of Tyrannosaurus rex - Oh no, not another new Wealden theropod! - The aquatic Majungasaurus, or not - Tyrant dinosaurs were not a Northern Hemisphere speciality: they also colonised Australia! - Concavenator: an incredible allosauroid with a weird sail (or hump)… and proto-feathers? Refs - - Brusatte, S. L., Benson, R. B. J. & Hutt, S. 2008. The osteology of Neovenator salerii (Dinosauria: Theropoda) from the Wealden Group (Barremian) of the Isle of Wight. Monograph of the Palaeontographical Society 162, 1-75. Carr, T. D., Varricchio, D. J., Sedlmayr, J. C., Roberts, E. M. & Moore, J. R. 2017. A new tyrannosaur with evidence with evidence for anagenesis and crocodile-like facial sensory system. Scientific Reports 7, 44942. Di-Poï, N. & Milinkovitch, M. C. 2013. Crocodylians evolved scattered multi-sensory micro-organs. EvoDevo 4, 1. Foffa, D., Sassoon, J., Cuff, A. R., Mavrogordato, M. N. & Benton, M. J. 2014. Complex rostral neurovascular system in a giant pliosaur. Naturwissenschaften 101, 453-456. Hone, D. W. E. & Rauhut, O. W. M. 2010. Feeding behaviour and bone utilization by theropod dinosaurs. Lethaia 43, 232–244. Hone, D. W. E. & Tanke, D. H. 2015. Pre-and postmortem tyrannosaurid bite marks on the remains of Daspletosaurus (Tyrannosaurinae: Theropoda) from Dinosaur Provincial Park, Alberta, Canada. PeerJ 3, e885. Ibrahim, N., Sereno, P. C. Dal Sasso, C., Maganuco, S., Fabbri, M., Martill, D. M., Zouhri, S., Myhrvold, N. & Iurino, D. A. 2014. Semiaquatic adaptations in a giant predatory dinosaur. Science 345, 1613-1616. Leitch, D. B. & Catania, K. C. 2012. Structure, innervation and response properties of integumentary sensory organs in crocodylians. Journal of Experimental Biology 215, 4217–4230. Milinkovitch, M. C., Manukyan, L., Debry, A., Di-Poï, N., Singh, D., Lambert, D. & Zwicker, M. 2013 Crocodile head scales are not developmental units but emerge from physical cracking. Science 339, 78-81. Naish, D., Hutt, S. & Martill, D. M. 2001. Saurischian dinosaurs 2: Theropods. In Martill, D. M. & Naish, D. (eds) Dinosaurs of the Isle of Wight. The Palaeontological Association (London), pp. 242-309. Peterson, J. E., Henderson, M. D., Scherer, R. P. & Vittore, C. P. 2009. Face biting on a juvenile tyrannosaurid and behavioural implications. Palaios 24, 780-784. Tanke, D. H. & Currie, P. J. 1998. Head-biting behavior in theropod dinosaurs: paleopathological evidence. Gaia 15, 167-184.
<urn:uuid:fc566ffb-6126-42bd-8812-fd985397ac2a>
CC-MAIN-2022-33
https://blogs.scientificamerican.com/tetrapod-zoology/the-sensitive-face-of-a-big-predatory-dinosaur/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00205.warc.gz
en
0.926857
2,907
2.734375
3
2091 Tree of Life. Shackleton Crater on the Moon.. A bonsai in a transparent flower pot from the Yue Liang Gong moon base. The oldest and only surviving plant of the station. The plant was the mascot of the hydroponics department. It came to the moon station in 2045 as a seedling with the private luggage of a taikonaut. For several years the plant grew without the mission management knowing. The hydroponics staff diverted fertilizers and minerals from the crop plants and over time they extracted some topsoil from composted plant remains. The crew pruned the bonsai to keep it small and hidden by the crops. But in 2055 it had to be moved from the hydroponic container to a larger container. The station crew 3d printed a flower pot made of transparent plastic. This process caught the attention of mission control. An investigation of the matter brought the bonsai to light. At that time, in the early days of space travel, resource consumption was meticulously monitored. From the point of view of the mission management, the bonsai was an irregular experiment conducted by the crew on their own. Resources used by this experiment were lacking in the overall planning. In addition, the mission management could not tolerate unauthorized activities of the crew. They demanded that the biomaterial be returned to the station cycle. The hydroponics employee in charge of recycling the bonsai resisted the order. Instead of composting the plant, he hid it behind a console casing. Another year passed with an improvised lamp and a low condensation driven water supply. Then the plant was rediscovered. In order to forestall the now renewed threat of composting, the station crew unanimously submitted a petition to save "Fusang, their tree of life". The petition text was ironic and entertaining. The style was so different from the usual rational and concise mission protocols that some ground station staff thought it was a particularly creative test message and did not think it would fall under the usual secrecy. Somehow the petition got into the public net, where it was taken seriously by some people. The text went viral. Within a few days, a "Save Fusang" movement emerged in social media. The psychological department of mission control finally supported recognizing the bonsai officially as an experiment and thus saved it from composting. Another ten years later, the Yue Liang Gong base has grown considerably. It has a permanent crew of 20 and is preparing to double its capacity. Nuclear-powered plasma tractors of the Chinese space program shuttle between earth and moon orbit. Each new rocket brings hundreds of tons of material to the moon base. Then in the early 70s, the economy collapses. Even major earth powers lack the funds for space programs. Transports to the moon are suspended. Ten of the 24 Taikonauts leave Yue Liang Gong Station 2071 as scheduled. But there is no replacement personnel. Stays are stretched out to bridge the difficult times. However, the situation on earth is getting worse and worse. In the following year eight taikonauts return to earth orbit using the station's rescue capsules. There is no transport capacity to evacuate the remaining six. They are preparing to stay on for a long time. The six, the so called "Lianggong Six", benefit from the greatly expanded life support and the enormous size of the station, which was built for 40 people. Hydroponics produces enough food for twenty. Surpluses are freeze-dried and stored. This is simple on the moon with vacuum easily accessible and temperatures of minus 150 degrees Celsius in eternal shadow. The supply situation is good. But maintenance of the station is a problem. The station is too big for six people. Out of 40 planned taikonauts at full capacity, 25 were supposed to work in station engineering and life support. The technology of the moon station is complex. Basically, it is a space station like the old ISS. It lies on the lunar surface, but the technology is the same. And it is equally demanding. Without scientific operations, they only need half of the technical staff. Twelve engineers can keep the station up and running easily. At a minimum, eight technicians would be enough if they have the right combination of skills. But of the remaining six, only four are technical. And after an accident during an outdoor activity in 2078, only three are still operational. That's not enough. They cannot solve all technical problems. Maintenance cycles are stretched. More and more failures remain unrepaired. And the material ages. It is not replaced by new equipment as has been planned. Especially the moon dust causes problems. Cleaning equipment and space suits requires a lot of personnel and resources. This is no longer possible. So, every outdoor activity turns into a risk. Some modules start leaking air. Some due to micrometeorites. Others break because of the omnipresent moon dust, which settles in bearings and seals. Some modules must be isolated and disconnected. The station fragments. There are technical areas that can only be reached from outside. This poses an additional obstacle to maintenance work. Then in 2088, the fusion reactor fails. The cooling facility of the cyclotron converter breaks down. It had not been inspected for years. The superconducting coil quenches, it loses its superconductivity and residual currents melt the coil. The reactor switches off automatically. Before the shutdown, fast alpha particles hit surrounding devices and walls. The area is slightly radioactive. No comparison with radiation levels of fission reactors. But the damage cannot be repaired by means of the station and with the available know-how. The solar collectors still provide power, yet much less. Also, the solar modules are old and dusty. They generate only a fraction of their original output. Many facilities and station modules including the hydroponics food production must be shut down. The bonsai Fusang, the small tree of life, is moved over to the last active habitat module. In the year 2090 the situation becomes untenable. Food supplies are running out, the oxygen level falls, and outdoor activities are no longer possible. The station sends distress calls. But the six taikonauts are the last humans on the moon. No one can help. There are still people holding out in earth orbit. They are also cut off from earth. But they have more people, more skills, and more technical capabilities – and no moon dust. Years ago modules of several nations met at the Indian space station if their orbital parameters allowed a synchronization of orbits. For 20 years they have survived in the so-called "Dher", the garbage heap. The Dher organizes a rescue operation for the Lianggong Six. An improvised rescue capsule reaches the Yue Liang Gong moon base in 2091. Three of the last four Taikonauts can be rescued. They reach the Dher in earth orbit after a dramatic journey. Eighteen years later, the first taikonauts of the new space program of the Zhu Republic enter the Yue Liang Gong base. In the entrance to the habitat module they find Fusang. The small bonsai stands with its plastic pot in the middle of the open air lock, shock frozen and preserved for eternity. In the year 2115, the new Zhu Moon base is established close to the old Yue Liang Gong Station. In the beginning it is a small venture, occupied by only five taikonauts and Fusang, who is carefully thawed and revived. -- Ad -- You always wanted to go to the Seychelles, but you don't have the money? Just get yourself a life-theme. It's much cheaper than going on a real trip. And it saves time. The life-theme "Seychelles 24/7" from Dream Theatre/Mumbai shows you the world as it is not. Life-themes change the optoacoustic perception. They make the world look different than it actually is by changing the sensory input from eyes and ears via neuro-implant. Walking through the real world, you see real things, but the appearance of everything is adjusted in real time to your chosen genre or theme. If you live in a big city but would rather live on a tropical island, you can have everything look like a South Sea island. Streetlamps look like palm trees; buildings are replaced by rocky cliffs. And the sun always shines from a blue sky. If you always wanted to live in the Middle Ages, you can choose from a huge collection of medieval themes. Buildings get battlements, concrete becomes brick and stone, vehicles turn into carriages, and even personal copters are translated into large birds or dragons, your choice. Life-themes are based on proven technology that many people have been using every day. More and more people have been experiencing a reality adapted to their own ideas. For some time now, neuro-implants have been changing perception by blocking out undesired parts and by augmenting reality with additional information. - Ad-blockers have been removing ads from the retinal data stream before the neural signals can reach the brain. - Virtual tags show annotations, cues, and directions like a kind of head-up display. - In gaming, so-called Real-Plays, an extension of 3D VR technologies into the real world. Have been around for a long time, these games show their content as a layer on top of reality. - One of the first applications of neuro-implants have been assistants analyzing the environment to provide real-time advice like data, talking points, or behavioral guidance. Wingman flirt-assistants have become notorious for analyzing biometrics of your interlocutor and providing statistical and profile-based advice. - Augmented reality assistants have proven indispensable for engineers, who have long since ceased to carry around construction plans as display sheets or paper rolls. Engineers can display diagrams through their implants at any time. - So called Shiva-assistants provide background information about the people you meet in everyday life including their reputation ratings. It would be unimaginable not to get up to date information about anybody. - Of course, there is also malware. Implant malware has long been manipulating the perception of its victims, some in a subtle way, others less so. Such malware may overlay advertising messages bypassing web blockers and meme filters. - There is even malware that presents real events differently to deceive viewers, so-called stream-spoofing. A life-theme is a software module installed as a plugin at the neuro-implant. Good themes are not cheap though. Real time analysis of all the sensory data is demanding. It can easily overload the processing capabilities of consumer implants. Some themes therefore use external scene analysis by streaming to a cloud service. Cloud-based scene handling faces two difficulties. Sending everything you hear and see to the net might pose a security risk, and secondly the real-time capability might suffer. Even a ping of a few tens of milliseconds is irritating. That basically rules out cloud-analysis for any serious application. In other words: local scene processing is a must. This in turn requires good (expensive) algorithms and powerful (expensive) hardware. In addition, themes contain transformation libraries, graphics routines, and graphics data, which all can be of very different quality and variety, depending on the price. A huge economy grows around the life-theme technology. Each genre has many variants: whether medieval, fantasy, steam punk or science fiction, popular genres have hundreds of themes and thousands of mods, hacks, and add-ons. Not long after live-themes became available, entertainment networks started to release themes based on their own IPs which can be used by fans to make the world look like their favorite series. Vacation themes are also very popular, as well as many other real-world themes that simply simulate a different, but real, environment – city trips without leaving your own city. Some themes are especially popular in certain seasons, such as the *Frau Holle* add-on from the Zugspitze weather station. The add-on conjures everything up with a layer of new snow. The height of the snow adjustable. There are also render themes that do not really change objects, but rather adjust their appearance to make everything look like a fresco or like a line drawing, for example the famous open-source theme *A-ha*. Comic themes not only show the world in comic style, but they also add speech bubbles and onomatopoeia boxes while the audio implant mutes voices and ambient noises. Most themes offer software interfaces where plugins can hook into the processing pipeline, thus cooperating with ad-blockers, assistants and all the other applications running on neuro-implants that have become indispensable, and which of course should also be displayed in the chosen theme.
<urn:uuid:42d6be36-002a-4598-9634-77e5cb13d320>
CC-MAIN-2022-33
https://www.galactic-developments.de/data2.html?lang=en&hilite=2091
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00204.warc.gz
en
0.947613
2,673
3.109375
3
Started recruitment for the Japan Donation Foundation "2022 Grant Program" A total of 1 million yen to support and solve social issues ... If you write the contents roughly The subsidy will be delivered by the method of transferring to the bank account designated by the subsidy target. 1 Toward the realization of world peace through the reconstruction of Japan's donation culture and raising the foundation 1.1 “2022 Grant Program… → Continue reading Wikipedia related words If there is no explanation, there is no corresponding item on Wikipedia. Subsidy(Hojokin,British: subsidy) Is政府One-sided to the private sector such as private companies and individualscurrencyBenefits.Central government("Country") orLocal government(Local government) Is a cash benefit that is unilaterally paid to public organizations, economic organizations, companies, private individuals (individuals), etc. without receiving any counter-benefits in order to achieve the administrative purpose and effect.. In economics, it may refer to the entire subsidy policy (including special tax cuts, public works, public services, etc.) in a broader sense, but in general, only one-sided monetary benefits are called subsidies.. Subsidies are divided into those paid by the central government (national) to local governments (local public bodies) and those paid by the government (central government, local government) to the private sector.. Subsidies from the central government to local governments include "general subsidies" whose use is not limited and "specific subsidies" (individual subsidies) whose use is limited.. - Subsidies to the private sector For subsidies from the government to the private sector,privateSubsidies for (individuals, consumers) "and"CompanyThere is a "subsidy for".. "Subsidy for private individuals"social welfareIt is used for the purpose of maintaining and improving the standard (for example, medical care and education) and for maintaining and expanding the consumption of various products... "Subsidies for companies" are the protection and development of new and immature industries.External economyIt is used to foster highly effective industries, foster strategically important industries, and control supply prices of consumer goods.. In recent years, instead of subsidy spending, "TaxThe method of achieving a similar effect (that is, the method of reducing the amount of tax that was originally planned to be collected) is increasingly being used...This can be said to be a "hidden subsidy," including special tax measures in Japan.. - Efficient allocation of subsidies publicEconomicsIn such cases, it has been pointed out that the economic irrationality of the arbitrary allocation of subsidies.However, if numerical criteria such as "CO2 reduction effect" can be created, such as subsidies for the spread of new energy and energy-saving equipment, the most achievement of the criteria will be achieved.Cost-effectivenessThis problem can be avoided by adopting a system that allocates subsidies from the highest. Subsidies in the UK United KingdomNational subsidies1825It is said to start with the exchequer grant created in..After the Industrial Revolution, the national government has responded to local governmentsWorker Ofpublic health,Pollution controlInstitutionalized to strengthen and force the construction of worker housing. Subsidies in the United States The United States of AmericaIs a federal stateStateIs relatively independent, and the state has taken the initiative in making financial adjustments between municipalities... There is nothing special to mention in the 19th century, except for the granting of state-owned land to be used as a land for state universities...The federal government began to actively intervene in local administration after the recession of the 1930s.Public worksBegan to promote economic policy through the agency of..Subsidies have changed from temporary to permanent and have the character of maintaining the national minimum (national required administrative level)..1964ToLindon johnsonFederal subsidies surged as president declared war on poverty. Subsidies in Japan In Japan, in addition to what is called subsidies themselves in laws and budget-related documents, in a broad sense, "subsidies," "subsidies," "incentives," "benefits," "grantes," and "contributions." It includes those with names such as "consignment money", and in a narrow sense, it refers to national treasury expenditure.. - The definition of subsidies under the law is not always clear, and the Subsidy Optimization Law (described later) does not give a clear definition.Money transferred by the private sector to the government or by a lower-ranking government to a higher-ranking or equal-ranking government with the consent of both parties is often referred to as a "contribution", but this is also dealt with collectively below. ..There are "benefits" and "subsidies" that are similar to subsidies and contributions, but there are many that have substantially the same characteristics as subsidies, and these are appropriate for subsidies as specified by government ordinance. It is the subject of the chemical law. As explained in the overview, subsidies from the national government to local governments include general subsidies with limited uses and specific subsidies (individual subsidies) with limited uses, but in Japan, As the formerLocal allocation tax, The latter is national treasury spending. National treasury disbursements are divided into national treasury contributions, national treasury consignments, and national treasury subsidies.National treasury contributions include those stipulated by law (compulsory education staff costs, livelihood protection costs, etc.) and those for public works projects based on plans formulated by the government. The "national treasury consignment" has the property of paying the expenses when the government entrusts the affairs that should be done to a local public body. Required for office workExpenseand so on. The Constitution has provisions that are also interpreted as related to subsidies,Article 89 of the Constitution of JapanThen,Public moneyOtherPublic propertyIt is,Religious organization or groupIt is stated that you must not spend or use for the use, benefit or maintenance of, or for charitable, educational or philanthropic businesses that do not belong to public control.But how to do this Article 89Legal interpretationThere is a complicated story about what should be done (such as the adequacy of subsidies for private schools), and the government's interpretation is changing.. Subsidies issued by the government, etc. CountryFor procedures such as subsidies, please refer to "Law Concerning Appropriate Execution of Budget for Subsidies, etc."(Subsidy optimization method) is used for processing.In addition, regarding subsidies, etc. that the national government grants to local public bodies,Local Finance LawThere is a regulation in. Subsidy optimization method As the responsibility of the person who pays the subsidy, the head of each ministry and agency is concerned with the subsidy, etc. under its jurisdiction.budgetSubsidies, etc.PeopleCollected fromtaxSubsidies, etc. are provided, paying particular attention to the fact that they are covered by other valuable financial resources.decreeAnd, it is said that efforts must be made to use it fairly and efficiently in accordance with the provisions of the budget, and the subsidies, etc. are covered by taxes and other valuable financial resources collected from the people. In accordance with the decree and the purpose of granting subsidies, etc., or the purpose of delivering or accommodating indirect subsidies, etc., we must endeavor to carry out subsidy projects, etc. or indirect subsidy projects, etc. in good faith. Must be. (Article 3, Paragraphs 1 and 2 of the Subsidy Optimization Law) Those who receive subsidies are subject to the stipulations of laws and regulations, the content of the decision to grant subsidies, the conditions attached to them, and the disposition of the heads of each ministry and agency based on the laws and regulations.Attention of a good managerIt is necessary to carry out subsidy business, etc., and use it for other purposes such as subsidies (for interest subsidies, by not reducing the loan or interest that is the purpose of the grant. , It means that the grant was received contrary to the purpose of granting the subsidy, etc.). (Article 11 of the same law) Those who receive subsidies must report the progress status to the heads of each ministry and agency, but the heads of each ministry and agency should report the contents of the decision to grant subsidies, etc. to the person's subsidy business, etc. If you find that you are not performing in accordance with the conditions attached to, you may order the person to carry out the subsidy business, etc. in accordance with these, and if you violate this order, that person It may be ordered to suspend the execution of the subsidy project, etc. (Article 12, Article 13, Paragraph 1, Paragraph 2 of the same law) The heads of each ministry and agency may use the subsidies for other purposes, such as subsidies, and the details of the decision to grant subsidies, etc. If the disposition of the head of each ministry or agency is violated based on this, it is possible to cancel all or part of the decision to grant subsidies, etc. When subsidies, etc. are issued, a deadline must be set and the return must be ordered. (Paragraph 1 of the same law, Article 18 Paragraph 1) Persons who have used subsidies for other purposes or indirect subsidies for other purposes in violation of the provisions of Article 11 of the Act on Appropriate Execution of Budgets for Subsidies, etc. Less than a yearImprisonmentOr less than 50 million yenfineOr both. (Article 30 of the same law) Local Finance Law Specific financial resources such as subsidies and contributions that the national government grants to local governments are collectively called national treasury disbursements, and the Local Government Finance Act calls this.National treasury contribution,National treasury subsidy,National treasury consignmentAfter classifying into, the responsibilities of the country and the principles for calculating the amount are stipulated. Subsidies, etc. issued by local governments Local governmentabout,Local government law"Ordinary local public bodies may donate or subsidize when necessary for their public interest." (Article 232-2), And based on this, subsidies are provided to other local public organizations or the private sector.Expenditures are based on the rules and guidelines of each local government in accordance with the provisions of the Subsidy Optimization Law. There is a system to attract companies from other places for the purpose of promoting industry.The amount of the subsidy is determined as a percentage of the purchase amount of equipment, buildings, land, etc., and will be paid if the application is evaluated and approved.In the evaluation, the flow of a series of purchases from ordering to delivery, payment based on the invoice, and subsequent receipt is confirmed, and the actual product is confirmed whether it is actually used for business. Audit by Audit Committee Audit CommitteeWhen it finds it necessary, or when requested by the head of an ordinary local government, the ordinary local government provides subsidies, grants, contributions, loans, loss compensation, interest supply and other financial matters. It is possible to audit those related to the financial assistance in the execution of accounts and other affairs of those who are providing assistance.Those that are funded by the ordinary local government and are specified by Cabinet Order, those that the ordinary local government guarantees the payment of the principal or interest of the loan, and the trust that the ordinary local government has the beneficiary right. The trustee of what is specified by the Cabinet Order and the ordinary local public bodyArticle 244-2The same shall apply to those who manage public facilities based on the provisions of Paragraph 3. (Article 199 of the Local Autonomy Law(Section 7) - ^ a b Kenichi Miyamoto, "Political Economy of Subsidies," Asahi Sensho, 1990, p. 8. - ^ a b c d e f g h i j k l m n "Encyclopedia Nipponica" [Subsidy] - ^ a b Kenichi Miyamoto, "Political Economy of Subsidies," Asahi Sensho, 1990, p. 9. - ^ a b c d e Kenichi Miyamoto, "Political Economy of Subsidies," Asahi Sensho, 1990, p. 10. - ^ Eijiro Arai "Government Interpretation and Private School Grants on Article 89 of the Constitution"The University of Tokyo Graduate School of Education Educational Administration Theory," Volume 26, The University of Tokyo Graduate School of Education School Development Policy Course, March 2007, pp. 3-1, two:10.15083/00031808. - Resident audit request - Private school grant - 16th Amendment to the United States Constitution - Orphan drugSubsidy subsidy business ...Local governmentAnd foundationsSubsidyAnd the same term is used in the act of providing business subsidies. - Overseas Immigration Association Law... the law on unions organized to subsidize foreign immigrants - Vergatario...ベネズエラGovernment subsidy - Japan Disaster Prevention Association Shonan Branch ... union members also participate as selection assistants and receive subsidies - Public survey ... the burden of the state or public body orSubsidy, Loans and other subsidized businesses
<urn:uuid:1048bd0a-15c0-418d-aedb-f38cce6c5200>
CC-MAIN-2022-33
https://portalfield.com/en/news/economy/3539934
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00205.warc.gz
en
0.929574
2,809
2.875
3
Smoking And Smoke Exposure 6.1.1. In vitro and animal studies In vitro studies by Giunta and colleagues168 showed that cigarette smoke condensate increased A140 and A142 levels in a concentration-dependent manner in cells transfected with human APP . In addition to elevated markers of OxS in cigarette smoke exposed rats, Ho et al.,175 reported these rats concurrently demonstrated significantly increased -sAPP, but not -sAPP, levels in homogenized hippocampal tissue and markedly increased A accumulation in the CA3 and dentate subfields of the hippocampus. The smoke exposed rats also showed significantly increased hippocampal hyperphosphorylated tau, but not total tau levels. Moreno-Gonzalez and colleagues208 exposed 3-month-old APP/presenilin1 transgenic mice to high or low dosage cigarette smoke 5 days/week for 4 months. The high-dosage group showed levels of cotinine, the primary metabolite of nicotine, that were physiologically consistent with human smokers. Both high-and-low-dosage groups begin to develop neuritic plaques at 56 months of age. The high-dosage group demonstrated a significantly greater number of A deposits and fibrillar neuritic plaques, increased density of activated microglia and reactive astrocytes, and positive hyperphosphorylated tau staining in the majority of the cerebral cortex and hippocampus relative the low-dosage group and controls. 6.1.2. Post-mortem human studies Aluminum In The Environment Aluminum has a non-metallic form that makes up eight per cent of the earth’s surface. In small amounts, aluminum is referred to as “trace elements”, and occur naturally in the foods we eat, in our drinking water and are even added to the water treatment process in some municipalities. Trace elements of aluminum may also be found in: - Many processed foods - Cosmetics and personal hygiene products, such as deodorants and nasal sprays - Some drugs in order to make them more effective or less irritating - The air we breathe from dry soil, cigarette smoke, pesticide sprays and aluminum-based paint. Smoking Linked To Alzheimer’s And Dementia Study Shows Heavy Smoking Between Ages 50 and 60 May Raise Risk of Alzheimerâs Disease Oct. 25, 2010 — People who are heavy smokers in their midlife years are more than doubling their risk of developing Alzheimerâs disease or other forms of dementia two decades later, a new study shows. While smoking has long been known to increase the risk of dying from cancer and heart disease, researchers in Finland say theyâve found strong reason to believe that smoking more than two packs of cigarettes daily from age 50 to 60 increases risk of dementia later in life. Scientists at the University of Eastern Finland and at Kuopio University Hospital, Finland, analyzed data from 21,123 members of a health care system who took part in a survey between 1978 and 1985, when they were between ages 50 and 60. Among the key findings: - 25.4% of the participants, or 5,367 people, were diagnosed with dementia an average of 23 years later. - Of patients with dementia, 1,136 were diagnosed with Alzheimerâs disease and 416 with vascular dementia. Researchers say that people who smoked more than two packs of cigarettes a day in middle age had an elevated risk of dementia overall and also of each subtype, Alzheimerâs and vascular dementia, compared with nonsmokers. Recommended Reading: Is Alzheimer’s A Type Of Dementia Smoking Doubles The Risk Of Alzheimers Sure, when you quit smoking you save money on mints, gum, and Febreze. Those are nice, but heres a HUGE reason to stop! Smoking DOUBLES the risk of Alzheimers! Also, your loved ones will love you for it. They love you long time, and you can loveem backeven longer! The World Health Organization estimates that 14% of dementia cases worldwide could be caused by smoking. Nicotine Nicotinic Acetylcholine Receptor Agonists And Antagonists And Ad Pathophysiology 6.2.1. In vitro and animal studies 6.2.2. Post-mortem human study In a human autopsy study, the effect of several nAChRs agonists and antagonists on 11C-Pitsburgh compound B binding were evaluated in frontal lobe homogenates of elder controls and AD. The smoking status of AD and control cases was not provided. The 7 nAChR agonists varenicline and JN403, but not the 42 nAChR agonist cytisine, increased PiB binding in both AD and controls. This effect was abolished by the 7 nAChR antagonists -bungarotoxin, mecamylamine, and methyllycaconitine, but not by the 42 antagonist dihydro–erythroidine. Increased PIB binding promoted by varenicline and JN403 was significantly inhibited by pre-incubation with the amyloid ligand, BF-227. The acetylcholinesterase inhibitor and allosteric nAChR modulator galantamine, and the N-methyl-D-aspartate receptor blocker memantine did not significantly influence PiB binding levels in AD cases.227 Read Also: Is Dementia Inherited From Mother Or Father What Should I Take Away From This Research Smoking is the main cause of avoidable death, through heart disease, stroke, and lung cancer. It is a risk factor for lung disease, diabetes, rheumatoid arthritis, and poor immune function, and also adversely affects fertility and maternal health. There are therefore many general health reasons for not smoking. Some of the known effects of smoking are known causes of the diseases that cause dementia, and there is evidence that a current smoker is more likely to develop dementia. Some researchers estimate that 14% of dementia cases worldwide may be attributable to smoking. However, on a positive note, stopping smoking reduces this risk, so it is never too late to adopt healthier lifestyle choices. It is also likely to help if second-hand smoke is avoided where possible. Drinking Smoking Up Early Alzheimer’s Study Shows Cigarettes and Alcohol Lead to Earlier Development of Alzheimer’s Disease In what is being lauded as a significant finding, research presented at the American Academy of Neurology’s 60th Anniversary Annual Meeting this week in Chicago shows that smoking and drinking are among the most important preventable risk factors for Alzheimer’s disease. Researcher Ranjan Duara, MD, of the Wien Center for Alzheimer’s Disease at Mount Sinai Medical Center in Miami Beach, Fla., found that a combination of heavy drinking and heavy smoking leads to an earlier onset of Alzheimer’s disease. “It has been projected that a delay in the onset of the disease by 5 years would lead to a nearly 50% reduction in the total number of Alzheimer’s cases,” Duara says in a news release. “If we can reduce or eliminate heavy smoking and drinking, we could substantially delay the onset of Alzheimer’s disease for people and reduce the number of people who have Alzheimer’s at any point in time.” Duara’s study involved 938 people aged 60 and older with possible or probable Alzheimer’s. Family members provided information regarding the patients’ alcohol consumption and cigarette usage. Heavy smoking was defined as one or more packs of cigarettes a day heavy drinking was defined as more than two drinks per day. The researchers also grouped participants according to whether they carried the apolipoprotein E-4 gene variant, which increases risk for Alzheimer’s disease. You May Like: How Does Alzheimer’s Affect A Person’s Family Does The Amount You Smoke Affect The Risk Of Dementia There were only four studies in the World Alzheimer’s Report that looked at the number of cigarettes smoked and dementia risk. Two showed a relationship between higher tobacco consumption and a higher risk of dementia, but currently, there is not enough evidence to know for sure whether this is the case. Can Nicotine Reduce Dementia Risk There is some evidence that exposure to nicotine, which is one of the components of cigarette smoke, can actually reduce the risk of dementia. Such reports may be useful in indicating possible research directions for drug design. However, nicotine intake through smoking would not be beneficial as any positive effects would be outweighed by the significant harm caused by the many other toxic components in cigarette smoke. You May Like: Why Do Dementia Patients Take Their Clothes Off Cigarette Smoke/combustion Products And Oxs Cigarette smoke is a complex admixture of approximately 5000 combustion products , which contains a high number of cytotoxic and carcinogenic compounds.164 The gas and particulate phases of cigarette smoke have extremely high concentrations of short-and-long-lived ROS, RNS, and other oxidizing agents.92, 133 In addition to increased free radical concentrations, smoking is associated with markedly elevated carboxyhemoglobin levels,165 altered mitochondrial respiratory chain function,166 and induction of proinflammatory cytokine release by peripheral and CNS glial cells,167 which collectively promote significant cerebral OxS. 5.2.1. In vitro and animal studies 5.2.2. Human studies Sonnen et al.,177 conducted post-mortem comparisons of human smokers and never-smokers without significant AD or microvascular pathology. Active-smokers showed significantly higher cortical F4-neuroprostanes, a measure of neuronal free radical-mediated lipid peroxidation, but groups were not different on measures of cerebellar lipid peroxidation. Additionally, numerous human studies have shown elevated markers of OxS in the serum or plasma of smokers.132, 178184 Smoking May Not Be Related To Dementia Risk After All There is no doubt that smoking damages health and increases the risk of many diseases and premature death. However, a study that followed hundreds of older adults for more than 10 years found no link between tobacco smoking and raised dementia risk. Dementia is the general name for conditions that diminish the capacity to think, remember, reason, and interact with others. These symptoms can progress to the point that people are no longer able to carry out their daily activities and take care of themselves. The recent finding contradicts many earlier studies that have tied smoking to higher risk of dementia. This could be because, for the new investigation, researchers from the University of Kentucky in Lexington analyzed the data in a different way. They used a statistical method called competing risk analysis to allow for the strong effect that smoking has on risk of death. In a paper that now features in the Journal of Alzheimers Disease, first study author Erin L. Abner Ph.D., an associate professor in the universitys Sanders-Brown Center on Aging, and her colleagues describe their approach and findings. Dr. Abner explains that while previous dementia studies had used solid data, they had not taken into account the idea of competing risk of mortality. 50 million people were living with dementia worldwide in 2015. The WHO expect this number to triple to 152 million by 2050. Read Also: How To Slow Down Dementia Why Does Smoking Increase Alzheimers Risk The dangerous brain consequences of smoking are probably linked with smokings effects on the brains blood vessels. Smoking increases circulating levels of a blood chemical called homocysteine, which is toxic to the arteries. Increased homocysteine levels have been linked with increased risk for stroke and dementia. Smokers arteries are damaged by atherosclerosis at an earlier age, and this is very dangerous to the brain, which relies upon blood flow for nutrients and oxygen. Smoking, furthermore, is associated with increased oxidative stress, a damaging effect that results in increased inflammation and the death of brain cells. Smoking is considered an additive risk factor, contributing additional risk to that resulting from other health features. Individuals already at increased risk for dementia as a result of having the e4 version of the APOE gene face even greater risk if they are current smokers.3 Researchers warn of an additional concern, the danger of exposure to second-hand smoke. Although not so damaging as direct exposure, one study evaluating the effect of second-hand smoke found that dementia risk was increased by more than 25 percent and that longer duration and greater frequency of exposure carried increased risk.3 What Is Good For The Heart Is Good For The Head We cant change our age or our genes, and there is currently no way we can completely prevent dementia. However, there are some simple steps we can all take to help lower our risk. Risk factors for cardiovascular disease, like high blood pressure, are also risk factors for dementia, so what is good for your heart is good for your brain. Looking after your health by stopping smoking will help lower your risk of cardiovascular disease and dementia. Other behaviours associated with good heart and brain health include being physically active, eating a healthy balanced diet, maintaining a healthy weight and, if you drink alcohol, drinking within NHS lower-risk guidelines. While its never too late to make positive changes, keeping your heart healthy in your forties and fifties seems to be particularly important for helping to reduce your risk of dementia. Also Check: How Does Someone Die From Alzheimer’s Smoking And Nicotine: Relationships To Ad Pathophysiology As previously summarized in section 5, cerebral OxS has been implicated in the initiation of AD neuropathology, rather than strictly developing as a physiological consequence of existing and/or progressing amyloid-or-tau-based pathophysiology.42, 131, 202, 203 Smoking is strongly associated with cerebral OxS , and OxS promotes increased-secretase cleavage of APP and abnormal tau phosphorylation. Thus, smoking-related OxS may directly facilitate the amyloidogenic pathway involved in A oligomers production and extracellular fibrillar A aggregation,168 as well as abnormal tau phosphorylation, which is the basis of neurofibrillary tangle pathology. Smoking Does Not Protect The Brain Against Dementia Or Alzheimer’s Disease For more about the effects of smoking on health, please visit our Forum on Smoking. And for further information about dementia andAlzheimer’s disease, please see our Forums onDementia and Alzheimer’s Disease. — Editor, MedicineNet.com Sir Richard Doll and colleagues from the Clinical Trial Service Unit and Epidemiological Studies Unit, Radcliffe Infirmary at Oxford reported on observations of over 34,000 male British doctors whose smoking habits have been reviewed every six to 12 years since 1951 to determine the impact on their health. The research team also reviewed the published data on the associations between smoking andAlzheimer’s disease. Over 24,000 of the doctors had died by the end of 1998.Dementia was mentioned on the death certificates of 483.Among 473 whose smoking habits were recorded at least 10years before their death, when they would not have beeninfluenced by the start of the disease, the prevalence of both Alzheimer’s disease and of other types of dementia was similar in both smokers and non-smokers. You May Like: Are Jigsaw Puzzles Good For Dementia What Can Make Quitting Easier Quitting smoking can be tough, but its possible. That said, there are steps you can take to help stay nicotine-free for life. - Talk to your doctor. Russell-Chapin says the first step is to consult with a healthcare provider, as quitting smoking often produces a variety of withdrawal symptoms. Your doctor can work with you to create a solid plan that includes ways to deal with cravings and symptoms. - Nicotine replacement therapies. There are a variety of medications and nicotine replacement therapies that can assist with quitting. Some over-the-counter products include nicotine gum, patches, and lozenges. If you need more support, your doctor may recommend a prescription for a nicotine inhaler, nicotine nasal spray, or medication that helps block the effects of nicotine in the brain. - Counseling support. Individual or group counseling can help you get support for dealing with cravings and withdrawal symptoms. It can also help when you know other people are dealing with the same challenges as you. - Learn relaxation techniques. Being able to relax and deal with stress may help you get through the challenges of quitting. Some helpful techniques include diaphragmatic breathing, meditation, and progressive muscle relaxation. - Lifestyle modifications. Regular exercise, quality sleep, time with friends and family, and engaging in hobbies can help keep you on track with your quit goals. Can Passive Exposure To Tobacco Smoke Cause Dementia Second-hand smoke has been shown to increase the risk of cancer, cardiovascular disease, and other diseases. Studies have shown that it may also increase a persons risk of developing dementia later in life. Research suggests that the more exposure to second-hand smoke a person has, the higher the dementia risk. You May Like: Is Herpes Connected To Alzheimer’s How Smoking Affects Atherosclerosis Risk Smoking is considered one of the biggest risk factors for atherosclerosis. Cigarette smoke increases the risk of atherosclerosis in the following ways: - Cholesterol: The toxins in tobacco smoke lower your HDL levels while raising levels of LDL . - Nicotine and carbon monoxide: The nicotine and carbon monoxide in cigarette smoke damage your endothelium, setting the stage for the build-up of plaque. - High blood pressure:While cigarette smoking won’t cause high blood pressure, if you smoke and you also have hypertension, smoking can increase the risk of malignant hypertension, a dangerous form of high blood pressure. Smoking In Mild Traumatic Brain Injury In those with a mild traumatic brain injury , we observed that active-smokers demonstrated significantly poorer recovery than never-smokers over 6 months post injury on measures of processing speed, visuospatial learning and memory, visuospatial skills and global neurocognition. Similar to AUD cohorts, greater smoking exposure was robustly related to less improvement on measures of visuospatial learning, visuospatial memory, working memory, visuospatial skills, and global cognition.128 Elevated Cholesterol And Triglyceride Levels Elevated levels of cholesterol and triglycerides in your blood cause damage to your endothelium. The body needs cholesterol , but too much comes with health risks. Your body usually produces most of the cholesterol it needs in your liver. The rest comes from animal fat in your diet. While our bodies also need some low-density lipoprotein cholesterol, too much can raise your cholesterol levels dangerously and put you at risk for atherosclerosis and heart attack. Foods that come from animals, such as chicken, eggs, dairy products, beef, and pork, contain cholesterol. Foods from plants do not contain cholesterol.
<urn:uuid:21bedd90-4132-400b-9ad0-93a146473d3f>
CC-MAIN-2022-33
https://www.dementiatalkclub.com/can-smoking-cause-alzheimers-disease/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00204.warc.gz
en
0.933201
3,999
2.703125
3
If you have been watching the hit TV series “The Handmaid’s Tale,” you may have noticed that many of the scenes look like they were taken right out of a painting. But what is it about this show that makes it look so painterly? In this blog post, we take a closer look at some of the key elements that will answer why the handmaid s tale looks like a painting. The Handmaid’s Tale is a painting, not a photograph. It captures a moment in time, but it also has a timeless quality. The colors are muted, and the composition is simple, but there is something about the image that makes it compelling. There are many interpretations of The Handmaid’s Tale. Some people see it as a commentary on the current political climate; others see it as a warning about the future of women’s rights. But regardless of how you interpret the painting, there is no denying that it is a powerful work of art. History Of The Handmaid S Tale Character The Handmaid’s Tale is a painting because it is full of color and detail. It is also a painting because it takes place in a different world, one that is not our own. The characters in the story are like paintings because they are not real people. They are just characters who live in a made-up world. The painting is also a painting because it is a story that has been told before. It is not a new story, but it is one that has been retold in a different way. The painting is also a painting because it is full of symbolism. There are many things in the painting that represent something else. The red dress represents blood. This is because the handmaids are fertile and have children. The blue sky represents hope. The handmaids are living in a world where they do not have any hope. The white trees in the painting represent purity. This is because the handmaids are supposed to be pure and not have any sex. They are living in a world where they are not allowed to have any children. They are living in a world where they are not allowed to have any children. The painting is also a painting because it is full of light and dark. The light represents hope, The Handmaid’s Tale is a painting because it is a story that has been told before, but it is also a story that is full of hope. The painting is also a painting because it is full of light and dark. The light represents hope, and the dark represents despair. The Handmaid’s Tale is a work of speculative fiction by Canadian author Margaret Atwood, first published in 1985. The novel is set in a near future in which a totalitarian society has emerged in the wake of a Second American Civil War. The United Artists Corporation produced a television series based on the novel, debuting on Hulu on April 26, 2017. The story centers on the life of June Osborne / Offred (Elisabeth Moss), a handmaid assigned to produce children for a powerful commander (Joseph Fiennes) and his wife (Yvonne Strahovski) in the dystopian Republic of Gilead. The show has been praised for its visuals, acting, and faithfulness to the source material. In addition, the Handmaid’s Tale is a 1990 film adaptation of the Margaret Atwood novel of the same name. It tells the story of a woman named Offred (played by Richardson), who is a handmaid in the Republic of Gilea. The film was directed by Volker Schlöndorff and starred Natasha Richardson, Faye Dunaway, and Robert Duvall.d. The film was directed by Volker Schlöndorff and starred Natasha Richardson, Faye Dunaway, and Robert Duvall. The film is set in a dystopian future where a totalitarian regime and women have taken over the government and are seated as property. Offred is one of the few remaining women who can still bear children, and she is forced to become a handmaid to serve the ruling class’s needs. Summarize The Content Of The Handmaid’s Tale By Author Margaret Atwood The Handmaid’s Tale is a novel written by Margaret Atwood in 1985. The story is set in a future society that is a theocratic dictatorship and follows the life of a handmaid named Offred. The purpose of the handmaids is to bear children for the elite class because a plague has decimated the population. The Handmaid’s Tale is set in a dystopian society where women are considered state property. The protagonist, Offred, is a handmaid who is forced to bear children for her commander and his wife. The book explores the themes of power, gender, and religion. The Handmaid’s Tale has been classified as a science fiction, dystopian, and speculative fiction novel. The story takes place in a future society where a totalitarian government rules. This government has taken away all of the women’s rights and turned them into slaves. The story’s main character is a woman named Offred, a handmaid. She is forced to live in a world where she is not allowed to read, write, or even think for herself. The only thing that she is allowed to do is reproduce. She will be killed if she does not comply with the government’s rules. The story is told from Offred’s point of view, and it gives readers a look into the life of a handmaid. It also shows how women are treated in this society and how they are forced to live. The book has been praised for its accuracy in predicting the rise of the religious right in the United States. It has also been critiqued for its lack of diversity, with some reviewers stating that it does not accurately represent the experiences of women of color. Atwood said she wanted to write a story that could be set in the United States and explore how a society could slide into totalitarianism. Developing Visual Style Of The Handmaid Characters There are some common characteristics among the handmaid characters in the book. They are all obedient and follow the rules without question. They also all have a certain level of strength and determination, which is necessary to survive in their oppressive society. Lastly, they are all incredibly brave and willing to risk everything for a better life. These characteristics make the handmaids such strong and compelling characters and why readers can’t help but root for them. One of the most striking elements of The Handmaid’s Tale is the way that it resembles a painting. The characters are all incredibly still, and their world is one of muted colors and sharp lines. This creates a feeling of detachment from the real world and lends the story an air of surrealism. Some common characteristics of the handmaid characters include their uniformity, passivity, and lack of individuality government tightly controls their lives, and they have no autonomy or agency. They are little more than breeding machines, and their value lies solely in their ability to produce children. This lack of individuality is intentional on the part of the author. It is meant to reflect the way that women are treated in a patriarchal society. They are seen as nothing more than objects, and their worth is based solely on their ability to reproduce. By contrast, the men in The Handmaid’s Tale are shown to be fully rounded individuals. They have agency and autonomy, and they can make choices. This is meant to highlight the inequity of gender roles in this society. The Handmaid’s Tale is a dystopian novel, and as such, it contains elements of social criticism. However, it is also a work of fiction, and it should not be read as an accurate representation of our world today. It is important to remember that the book is a work of art and should be appreciated. Do You Wonder Why the Handmaid S Tale Looks Like A Painting? It is easy to see why The Handmaid’s Tale looks like a painting. Director Reed Morano chose to shoot the entire series on 16mm film, lending it a hazy, dreamlike quality. The show also takes place in a dystopian future where most of the action happens inside Gilead’s walled compounds. This oppressive atmosphere is further enhanced by the use of wide-angle lenses and static shots. “The Handmaid’s Tale” is set in a dystopian society where women are treated as the state’s property. As such, they are assigned to specific societal roles and are not allowed to hold any other job or position. One of the most striking things about the show is the way that it uses color to create a specific mood and atmosphere. For example, the handmaids are always shown dressed in red, which symbolizes their fertility. This use of color creates a very stark and visually arresting image that feels almost like a painting. Another element that makes “The Handmaid’s Tale” look like a painting is the way that the show uses light and shadow. The scenes are often very beautifully lit, with shafts of light coming in from windows or doorways. This creates a sense of contrast and helps to create an ethereal feeling. Finally, the show’s use of symmetry is also very painterly. Many of the scenes are composed in a way that feels very balanced and harmonious. This creates a sense of orderliness that can be quite calming, despite the often chaotic and stressful nature of the show’s plot. All of these elements come together to create a show that looks like a painting. No wonder “The Handmaid’s Tale” has been a visually stunning show. Which Were Camera And Lenses Used To Create Tha Handmaid S Tale Looks Like A Painting? The camera and lenses used to create the Handmaid’s Tale look like a painting are important for creating the desired look. The camera creates the overall image, while the lenses control how that image is focused and framed. The Handmaid’s Tale looks like a painting because of the use of vintage camera lenses and filters. The camera and lenses used to create the look of The Handmaid’s Tale were a RED Weapon 8K camera and Leica Summilux-C lenses. The camera was chosen for its high resolution, and the lenses were picked for their sharpness and color rendering. The show’s cinematographer, Colin Watkinson, used old lenses and filters to create the show’s look. By using these older lenses, he achieved a softer look for the series. This gives it a more painterly appearance, which helps to create the show’s unique look. Watkinson also used a lot of natural light in the show’s filming, which furthers the painterly look. He also used a lot of foreground elements to give the impression that the characters are small in a big world. This makes the world of The Handmaid’s Tale feel both claustrophobic and foreboding. In addition, a wide-angle lens was used to capture as much of the scene as possible, while a shallow depth of field focuses on the main characters and their expressions. This combination creates an effect that makes it seem like the viewer is looking at a painting rather than a photograph. All of these factors work together to create the unique look of The Handmaid’s Tale. Elements That Make Scenes Look Like A Painting Scene 1: The Window Scene One element that makes the Window Scene look like a painting is the use of perspective. The window is placed in the upper right corner of the scene, and the viewer is positioned so that the bottom of the window is visible. This creates an effect of depth, as if the viewer is looking into another world. Additionally, the colors in the scene are very soft and muted, which gives it a dreamlike quality. Another element that makes this scene look like a painting is its composition. The way the different elements are arranged in the scene creates a sense of balance and harmony. The window is placed in the center of the frame, and the surrounding objects are arranged to lead the eye toward it. This creates a focal point for the viewer, and makes the scene feel unified. The use of light and shadow also contributes to the painting-like quality of this scene. The window is illuminated by a bright, natural light, which casts shadows on the surrounding objects. This adds dimension and depth to the scene, making it feel more three-dimensional. Overall, the Window Scene has several elements that make it look like a painting. The use of perspective, muted colors, and balanced composition contribute to this effect. Additionally, the light and shadow create a sense of depth and dimensionality. Together, these elements create a scene that is visually stunning and evocative. Scene 2: The Hanging Scare One element that makes Scene 2: The Hanging Scare look like a painting is the use of light and shadow. The light shines on the victim’s face, creating a dramatic effect. The way the light is shining on the house creates a sense of foreboding, while the shadows add to the eerie feeling of the scene. Another element that makes this scene look like a painting is the use of color. The muted colors give the scene a sense of calm, while the pops of color in the leaves and flowers help to create a sense of life and vibrancy. The reds and oranges create a warm and intense feeling, while the blues add a feeling of coldness and death. Besides, the tree in the foreground is closer to the viewer than the house in the background, which creates the illusion of depth. Finally, the overall composition of the scene helps to create a sense of balance and stability, furthering the illusion that this is a painting. Scene 3: The Long Take Some elements that make Scene 3: The Long Take look like a painting are how the scene is lit, and the characters are positioned. The scene is lit very brightly, which makes the characters stand out against the background. The characters are also positioned to form a triangle, often used in paintings to create a sense of depth. Other important elements are the use of light and color, the framing of the shot, and the slow pacing. The scene is bathed in a warm orange light, which gives it a cozy feeling. The shot is framed so that the viewer sees most of the character’s body, lending the scene a more intimate feeling. Finally, the background is very blurry, which also contributes to the painting-like appearance of the scene. Each of these elements works together to create a scene that feels like a painting coming to life. The light and color add to the warmth, while the framing gives the scene a sense of intimacy. And the slow pacing allows the viewer to take in all the details. Combined, these elements create a scene that feels like a painting coming to life. Make Some FAQs About This Question Q: What is the meaning of the handmaid’s tale? A: The Handmaid’s Tale is a painting because it is a story that is strikingly beautiful and horrifying at the same time. The story is set in a world where women are treated like property of the state and their value lies solely in their ability to bear children. The story highlights the importance of freedom and choice while also showing the terrible consequences that can come from losing those things. Q: What parallels can be drawn between the handmaid’s tale and paintings? A: One parallel that can be drawn between the handmaid’s tale and paintings is that both are incredibly visual mediums. Both paintings and the handmaid’s tale rely on striking visuals to communicate their messages. Another parallel is that both the handmaid’s tale and paintings can be used to explore the dark side of humanity. Paintings can depict violence and suffering, just as the handmaid’s tale does. Finally, both the handmaid’s tale and paintings can be used to comment on the role of women in society. The handmaid’s tale specifically highlights the oppression of women. At the same time, many paintings throughout history have been created by female artists who use their work to comment on women’s experiences. Q: What is the genre of The Handmaid’s Tale? A: The genre of The Handmaid’s Tale is dystopian fiction. Dystopian fiction is a genre that typically explores the dark side of humanity and the consequences of losing freedom and choice. The Handmaid’s Tale is a prime example of this genre, as it paints a picture of a world where women are oppressed and treated as property. Q: What are some themes in The Handmaid’s Tale? A: Some themes you can see from this story are: - The importance of family. - The power of storytelling. - The importance of freedom and choice. - The dark side of humanity. - Oppression of women. - The consequences of losing freedom and choice. - The role of women in society. Q: Who are some of the most important characters in The Handmaid’s Tale? A: The most important characters in The Handmaid’s Tale are Offred, Serena Joy, and the Commander. Offred is the handmaid assigned to the Commander and his wife, Serena Joy. The Commander is a high-ranking official in the new government. Serena Joy is a former television personality and now a stay-at-home wife. The Handmaid’s Tale is a painting and one that should be hung in every home. It is not just because the show is stunningly beautiful to look at, but also because its story is something we all need to see – no matter how hard it may be. The Handmaid’s Tale is not an easy watch by any means, but it is one that we all need to see. It is a story that needs to be told and will stay with you long after you have finished watching it. All these things answer why the handmaid s tale looks like a painting. Thank you for taking the time to read this blog post. We hope it has inspired you to watch The Handmaid’s Tale. Until next time!
<urn:uuid:a884a0a9-3e01-40ee-a2ed-4d894ede59b1>
CC-MAIN-2022-33
https://indymogul.com/why-the-handmaid-s-tale-looks-like-a-painting/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00203.warc.gz
en
0.961337
3,821
2.75
3
Original text by Pier Larson. I have edited this for the purposes of my HIST 473 class. Other than minor textual edits, my additions can be found in blue. Introduction. Myths about various people and places can develop and become popular in a society for a variety of reasons. Europeans and North Americans have developed myths about Africa, Africans and African history in the context of their enslavement of Africans, their colonization of Africa, and their history of racism. Racism perpetuated and perpetuates myths about black people to denigrate them and to “prove” that they have no worthy history. This distortion of African history served and serves the purpose of the social, political, and economic subordination of African people on both sides of the Atlantic. These myths ultimately concern Africa and Africans, the continent and people at the origin of the black diaspora. The primary way in which racism denigrates African experience is by creating negative images and stereotypes of Africans and their history. Racism accounts for most of the myths about Africa circulating in North America and more broadly today. A more recent and less important source of myths about Africa and African history comes from within the African community itself. In order to re-instill a sense of dignity and respect for African history denied by racist myths, some scholars and activists have invented new myths about Africans and African history that are not supported by evidence or that serve to elevate Africans at the expense of other people (for instance, the claim that homosexuality is not an African “thing” or that Africans are inherently communal vis-a-vis a individualistic and selfish West). Many of these represent positive stereotypes of Africans, but are wrong nevertheless. Many of the ten myths referred to below have become “common knowledge” and widely accepted in American society, in both black and white communities. It is necessary to discuss and unlearn them before we proceed with learning new things about Africa. Because unlearning these popular myths is very important for learning new things about Africa, I call them the student’s “Ten Commandments.” Knowing that these myths are wrong should be your foundational knowledge about Africa, its peoples and history. Myth One. Africa has no ancient cultures, histories or civilizations and has therefore made no meaningful contributions to world history. Subsidiary to this, the values that Westerners hold dear today like political freedom and democracy had and have no tradition or history in Africa. False. This is one of the most fundamental of all the myths and is so strong because African slaves, as dishonored people, were stripped of their history and the dignity and pride that accompanied it. Africans not only built so many ancient cultures, kingdoms, civilizations, and empires that one person can scarcely remember let alone adequately study them but Africa was the center of one of the oldest of all civilizations, Egypt, from which the ancient Greeks, so favored in Western history, borrowed and learned (Egyptians also borrowed and learned from the Greeks, in their time, as the Mediterranean Sea on which both Greece and Egypt were located, was a zone of cultural intercommunication.) Finally, citizen participation, autonomy, and local decision-making are significant themes in African political history. Like other areas of the world, Africa experienced significant historical tensions between political centralization and absolute power, on the one hand, and tendencies toward local autonomy and individuality, on the other. The Western world and ancient Greece have neither a monopoly nor a patent on the forms of government we now know and value as “democracy.” Myth Two. Africans are primarily tribal peoples; Africans are organized first and foremost into tribes while Europeans are primarily organized into nations. False. The word “tribe” is a European word, not an African one. It is a term originating in the Judeo-Christian tradition (the “tribes” of Israel) that Europeans have historically used to name Africans, not a term that Africans have historically used to refer to themselves. No one, in any case, knows precisely what a tribe is. There is no agreed upon definition because the word is not scientific or precise in any sense—it is an invented category. Essentially designating an “ethnic group,” the term “tribe” is employed by people who consider themselves “normal” to refer to others who they consider to be unlike themselves in a negative way. Thus Americans will immediately think of Africans as tribes, but talk about Norwegians, French, Mexicans, Poles or African Americans as “ethnic groups” or “nations.” In the West, “tribe” carries the connotation of socially backward, not advanced or sophisticated, and therefore Westerners employ it liberally to refer to Africans because they mistakenly believe these are primary African characteristics (this, like most of the other myths, is part of the inheritance of racism). Colonial-era anthropologists and other scholars essentialized the political and social organizations of “backwards” (in Europe eyes) peoples as tribalism. A further problem arises because in Africa today you will hear many Africans refer to themselves as members of tribes. This usage comes from an acceptance of the European terminology by some Africans, a terminology that was employed so much during the colonial period (the early 20th century) that many Africans have internalized it and continue to use the term. Like Americans, however, Africans are unlikely to employ the term “tribe” to refer to Europeans. Because some Africans employ the term “tribe” to refer to themselves, however, does not make “tribe” any more legitimate than when Europeans employ it. In this course, we will say that Africans have politics that they have used to organize their societies. There was nothing static about such organizations. They do not represent ethnic or “bloodline” purity. They were moving and dynamic, invented and remade through time. Myth Three. Africans are essentially primitive in lifestyle, art and technology because few or no innovations took or take place in Africa. False. Mention the derogatory word “primitive” (which, of course nobody thinks they are nor wants to be called) and many people in North America think straight away of Africa and Africans. How many times do we still hear of “primitive” people living in the forest here or there? Primitive has no scientific definition. Like “tribe” it is an epithet, a bad name, that Europeans/Americans have traditionally applied to people who live differently than they do, especially those who do not employ or have the kinds of technology Westerners today daily live with. Africans do not have a “primitive” lifestyle, art and technology, they have African lifestyles, arts and technologies that vary a great deal according to ecology, personal and group preferences, economic status, and a host of other factors. Each African society has produced and continues to produce its own innovations in technology, government, social structure, art, and literature. And some Africans employ some of the most sophisticated technology today available. Many telephone systems newly installed in African cities, for instance, take advantage of communications technologies that are well ahead of those available to you, the local telephone customer in the United States. Everyone reading this essay on myths would protest the insult if someone called them a “primitive tribesperson” to their face—or even behind their backs! Claiming someone is “primitive” does not reveal anything about them; it is an insult. Myth Four. Africans have no literary, philosophical and historical traditions in either the recent or the far past. False. Africans have literary and historical traditions reaching back to the dawn of civilization. Although writing was developed on its own in Egypt and several other ancient African civilizations, writing as a technology came late to much of Africa, during the 19th and early 20th centuries. But literary and historical traditions do not depend exclusively on writing. Verbal literature remained, and even today with the spread of writing as a technology of communication remains vibrant across Africa. Great African literary classics like Sundiata, an epic that stems from historical events in the 13th century, have been preserved as oral literature and subsequently written down for the enjoyment and edification of those who read. Africans have long excelled in the verbal arts and, where writing has a longer tradition, have also excelled in written literatures over the last centuries. For humanity as a whole, writing is a relatively new technology in which several African societies participated before the modern era, but humans had both a well developed sense and appreciation for history and a fascinating literature long before the prevalence of writing as a technology. Myth Five. All Africans are black. To be African is to be black. Africans are not culturally diverse. Africans share an essentially unified culture False. The majority of Africans have skin colors which in the United States, operating under the “one drop” rule, would be classified as “black.” But not everyone thinks like Americans, and this includes Africans. Africans come in a wide variety of skin colors and physical types that many Africans find significant among themselves. Most African cultures distinguish between, and have words to describe, different shades of skin color and hair types. In many societies, prejudices based upon these observed physical differences exist. Africans range from an almost dark blue-black skin color to a very light skin color that would “pass” in the United States as socially white. In addition to “indigenous” Africans whose ancestors remained on the continent (remember that all humans are Africans and their ancestors ultimately were Africans), there are immigrant Africans from all parts of the world. Immigrants to Africa compose only a small proportion of the African population. Africa has been connected to the wider world since the ancestors of non-Africans left Africa for Europe and Asia. It is therefore not surprising that, like anywhere else in the world, immigrants have come to live in Africa and in the process became Africans, just as Europeans and Africans became Americans in the Americas. Some immigrants to Africa are ancient immigrants like Persians and Arabs among the Swahili of East Africa, Arabs in North Africa, or Indonesians among the Malagasy. Most immigrants, however, are newer, having arrived during the last several hundred years or even in the last couple of decades. Newer immigrant Africans come primarily from Europe (especially France, England, Portugal and Holland) and Asia (especially India, China, Lebanon and Indonesia). Again, a comparison can be made with the United States. In North America the population consists of indigenous peoples (Native Americans) and those who immigrated voluntarily or forcefully (mainly Europeans and Africans, but people from all parts of the world). The existence of indigenous people and immigrants is also true in Africa, but there the indigenous Africans represent the vast majority instead of the minority. To claim that an Hispanic person is not an American citizen because she is Hispanic, or that an African American is not an American because he is African in origin, or that a Norwegian American is not American because her grandparents came from Europe (or because her far ancestors ultimately came from Africa) is nonsense and insulting. This is also true in Africa. If we tell African immigrants they are not truly Africans, or African citizens, they would probably either laugh at our ignorance or slap us in the face. In any case, they would show us their African passports. Myth Six. Africa is a country. False. The African continent contains more than 50 countries that are joined together in the Organization of African Unity. Africans speak thousands of different languages organized into five main language families. There are both important diversities and fundamental cultural similarities across Africa, as across any continent Myth Seven. Africa is mostly jungle, with some desert, and is highly overpopulated. False. Very little of Africa is jungle. It is true that Africa contains the largest stand of equatorial forest in the world, but like any other continent, and perhaps even more so, Africa is a continent of tremendous ecological and geographical diversity. The continent possesses the largest desert in the world, high snowy mountains, rich tropical forest, open grassland, mixed savanna (grasslands and trees), pine forests, temperate climates—pick a climate anywhere in the world (except Antarctica) and you can find it somewhere in Africa. Africa lies both inside and outside of the tropics, is massive, and has tremendous elevation differences. North American media reports on Africa often suggest that population control is desperately necessary, that Africa is brimming with people. Africa has only slightly more population per square mile than does North America. There are vast areas of Africa as large as North America itself (Africa being 3 1/2 times as large as the United States) that are almost totally unpopulated. Many African nations have very high rates of population growth, which can pose serious challenges for weak economies and fragile ecologies. These are kinds of problems that face many other nations in the world too. Myth Eight. North Africa is not a part of Africa. False. North Africa is often conceptually removed from the rest of Africa because (1) its people are, on average, of lighter skin color than the majority of Africans as a whole and (2) Arabic and Arab influences are more noticeable there than anywhere else in Africa. It is indeed important to understand North Africa, or at least parts of it, as part of what we commonly call “the Middle East.” At the same time, North Africa is an integral part of Africa itself, being a part of the continent. North Americans (both Black and White) are often uncomfortable with the idea of African diversity and are often quick to therefore separate North Africa from West, Central, East and South Africa. To make a comparison closer to home, removing North Africa from Africa is like removing the American South or West from America because each of the two areas contains distinct characteristics and unique cultures and has populations which are, on average, darker in skin color than those in the north and northwest. Cutting parts of continents off in such, a summary and unjustified (not to mention racist) manner because they do not fit preconceived notions is, of course, ridiculous. Myth Nine. Africans are not normal people. There are two very different versions of this fundamental myth. Form A: Everything Africans do is worthless, a failure, and Africans can essentially only do bad things; Africans have no part in the history of civilization. Form B: Everything Africans do is perfect, worthy, harmonious, better than anything anybody else can or did do; Africans are the only or the primary origin of all civilization, especially Western Civilization and even the ancient Native American civilizations. False. Let us begin with form A of the Myth. The idea that Africans have made no contribution to civilization is and has been the key Western myth of Africa and Africans. It is a myth, like other Western myths, born of racism and ignorance. It is related to all the preceding myths we have discussed. In this myth, Westerners see Africans not as competent and creative human beings like themselves but as stunted, “primitive tribespeople,” incapable of doing anything right, interesting, or worthwhile. Now let us turn to Form B of this myth, which is the flip opposite of the Western myth. The idea that Africans have a better civilization than others and in fact are the origin of everybody else’s civilization originates as an attempt to correct the lies perpetuated by the Western myth. It arises from the struggle to claim a rightful dignity and a respectable place in world history and civilization for Africans. To note the greatness of African civilizations and their contributions to Western civilizations is accurate. The relationships and contributions of Ancient Egypt to the civilizations of the Ancient Mediterranean (especially Greece), for example, have been historically underplayed by Western historians over the last several centuries. On the other hand, societies borrow from each other and Africans have incorporated elements of other cultures and civilizations into their own societies just as much as they have contributed to others. To claim that Africans are the single or primary origin of Western and Latin American civilizations (versus the fact that Africans have made significant contributions to those civilizations, just as they have received from them), is now common in some social circles. This myth does not rest on real evidence and reproduces the myth that civilization and culture originated only in ONE place and spread from there to everywhere else (in academic jargon this theory of civilization is known as “hyperdiffusionism” and has always been associated with racism; it was used effectively by the West to denigrate Africans and bolster racism). To claim that Africans invented civilization for Europeans and Latin Americans is as insulting to them as the claim that Europeans were the origin of all civilization is to Africans. Both of these versions of the myth that Africans are not normal people are wrong because Africans are not robots, they are human beings like everyone else. Africans love, hate, fear, promote excellence, tear down societies, build civilizations, wage war, appreciate diversity, act intolerant, cry, sing, are born, die, make good art, make bad art, fashion social justice, act like tyrants: they do and feel everything that everyone else does. Restoring Africans to their proper place in world history and civilization means neither seeing Africans merely as stereotypes—as devils or as angels—but as complex individuals building complex and varied societies and civilizations, doing the kinds of things that humans anywhere else in the world do. Myth Ten. African history is basically a history of poverty, ignorance, slavery, violence, failure—of negative things. It is therefore both boring and depressing to study. False. How could I, as a professor and human being, devote my teaching career to such a “depressing” topic as African history if this myth were true? African history is a total mix. Some of the more depressing aspects of African history are concentrated in the last two centuries, the modern times, in which Africa has been subordinated in the world economy. These experiences will feature prominently in this course, which includes African history during the time of the slave trade and colonization. If we look into Africa’s past we fund much that is positive and uplifting that more than counterbalances many of Africa’s problems today. To see African history only as negative is the equivalent, say, of considering European history and achievements only by the scores of wars that have been fought on that continent or by narrowing our vision to the Holocaust only. In this class we will explore a range of African experiences, from cultural and intellectual achievements to the scourges of slavery and colonization. We often encounter the notion that Africa is a “problem” that needs to be solved. Like all other human societies, Africa faces challenges, many of which aren’t unknown to us as Americans. Many well-intentioned Americans and Europeans see it as the West’s job to “save” Africa. Helping people in need is an admirable notion, but let’s dismiss the notion that Africans need us to save them. Let’s also avoid reproducing attitudes about African “backwardness” that helped create many of these myths to begin with! Put your myths aside, come, and learn about Africa and Africans in modern history.
<urn:uuid:63a24bab-9a96-48eb-b098-a9f36ad2b137>
CC-MAIN-2022-33
https://reedhistory.net/myths-about-africa-africans-and-african-history/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00205.warc.gz
en
0.964186
3,953
3.375
3
Luke has been using this section of his gospel to teach us about Christian discipleship. In our last lesson we noticed that Jesus taught that disciples realize there is only one necessary thing – sitting at the feet of Jesus. The scene before us in Luke 11 begins with Jesus praying. When he finished praying, one of the disciples as Jesus to teach them to pray. John apparently taught this disciples how to pray and now Jesus is going to teach us how to pray. Many of us probably think that we know how to pray. Many of us may not know how to talk to God. Jesus is going to challenge our prayer life as he teaches how true disciples talk to God. Disciples Pray Pursuing God’s Purposes (11:1-2) Jesus begins by calling God, “Father.” Jesus teaches his disciples that prayers do not need to begin with long flowing descriptions. We are instructed to speak intimately with God, speaking with him as our Father. Jesus does not say that only he can call God, “Father,” but we are also to God, “Father.” Talking to God does not require formalism. My children do not talk to me with Shakespearian English. Jesus continues by teaching us to pray for the name of God to be kept holy. The NLT does a good job translating this verse. “Father, may your name be kept holy.” I believe God’s words to Ezekiel explains what it means for God’s name to be kept holy. “Therefore say to the house of Israel, Thus says the Lord GOD: It is not for your sake, O house of Israel, that I am about to act, but for the sake of my holy name, which you have profaned among the nations to which you came. 23 And I will vindicate the holiness of my great name, which has been profaned among the nations, and which you have profaned among them. And the nations will know that I am the LORD, declares the Lord GOD, when through you I vindicate my holiness before their eyes. (Ezekiel 36:22–23 ESV) We are praying for the holiness of God to always be revealed. Further, we are reminding ourselves that we keep the name of God holy through our words and through our actions. We cannot exalt the holiness of God in prayer if our daily words and actions do not reveal God’s holiness. God told Ezekiel that he was acting on behalf of his holy name because the people of Israel had profaned God’s holiness through their actions. They claimed to be the people of God but they did not uphold God’s holiness. Disciples uphold the holiness of God through speech and action. We do not use God’s name as a curse word. We do not throw the name of God around as if it were a common exclamation. Our words uphold the high holiness of God. Our lives reveal God’s holiness not discredit the name of God to the world. Jesus continues by instructing the disciples to pray for the coming of the kingdom. It is possible that Jesus merely has in view the arrival of Christ’s kingdom which would take place in a year or two after speaking these words. But I do not think this is the case simply because this is the disciples asking how to pray. I do not believe that Jesus would teach them how to pray in way that future disciples would come to these words as say that we are not to pray these words because the kingdom already happened. Do not forget that Luke is writing to teach Theophilus in this gospel and writing for future disciples to come. When Luke writes, the kingdom of Christ had already arrived. Yet Luke still writes down our Lord’s words to pray for the kingdom to come. There is another aspect of that I believe is in view when Jesus teaches the disciples to pray for the kingdom to come. While the kingdom began in Acts 2 the scriptures teach that Christ must continue to rule in this kingdom until every knee bows and every enemy is destroyed. The apostle Paul states that Christ must rule in this kingdom until he destroys every rule and every authority and power (1 Corinthians 15:24-26). Jesus was not telling his disciples to pray for Acts 2 when the kingdom would arrive. Jesus is teaching to pray for the rule of the kingdom to come into the world and into the heart of every person. We are praying for all powers and authorities to be subjected to Christ. We are praying for every person to be subjected to Christ. The kingdom has come and the kingdom continues its reign until every enemies of Christ has been subjugated. Disciples Pray Relying on God’s Provisions (11:3-4) Finally, in verse 3-4 Jesus teaches his disciples to depend on God physically and spiritually. Praying for our daily bread reveals our dependence on God to provide our physical needs. We are recognizing that God is the giver of every good and perfect gift. We are acknowledging that our physical blessings are given to us by God. Further, we rely on God for our spiritual protection. Every prayer rightly asks for forgiveness from sins. But our forgiveness is contingent on forgiving others. A disciple readily forgives, not holding grudges or using offenses for selfish manipulation, because God has forgiven us. When we are not readily forgiving those who seek our forgiveness, then we are no longer Christians because God will not forgive us. We are lost in our sins when we do not forgive others when they offend us and seek repentance. Prayer is the way we express our dependence on God. Prayer humbles us so that we accept in our hearts that we need God and understand that we cannot live without him. Disciples Pray Boldly (11:5-8) Jesus continues to teach his disciples about how to talk to God by telling a parable. Hospitality was very important in ancient near eastern society. The man has a friend who arrived on a journey and the man has no food to give him. There is not a Walmart or 24 hour convenience store to go get food. It is the middle of the night. The friend says he will not get up and give him anything because the door is shut and the children are in bed with them. We cannot think of our three bedroom home with quiet doors. The house only has one room and the whole family is asleep together. The whole family will wake up if he gets up and open the door. Verse 8 is the point of the parable. The friend will get up, not because they are friends, but because of this man’s impudence. Many translations read “persistence” but many scholars point out that persistence is not exactly the point. Regarding the Greek word that the ESV translates “impudence,” Bock states, “It is a hard word to translate into English, for it refers to a combination of boldness and shamelessness. Thus, the stress is not on persistence or repetition of the request, as much as it is on the boldness or nerve of the request. This petitioner has gall” (Bock, BECNT, 1059). Philip Graham Ryken states the word means the man “acts without any sensibility to shame or disgrace” (Ryken, Reformed Expository Commentary, 585). The ESV Study Bible says it refers to “a lack of sensitivity for what is proper.” Thus, the ESV rendering of “impudence” is a good rendering as well as the NIV 2011 rendering, “shameless audacity.” Do you see that this is the point of the story? It is not the man’s persistence of the request. It is the timing of the request along with the persistence. This man had boldness and gall to make this request at such an hour. The friend in the house gives him the bread because he is such an irritant. Jesus’ point is that disciples pray boldly with shameless nerve. Prayer is the audaciously bold request for God to do what he has promised. This shameless boldness is not for selfish requests. We are not praying for things to fulfill our selfish desires (cf. James 4:3). Further, we see this point in this context. The model prayer does not have room for selfish requests. Rather, we are revealing our complete dependence on God. We are telling God what is happening in our lives and the things that we need spiritually or physically. Go to God in prayer boldly. Ask for great things to happen in your life. You are given the offer to make bold, audacious requests to your Lord. What have you been afraid to ask God to do in your life? Are you struggling with daily food because of economic conditions or physical hardships? God said to pray for that and pray boldly for it. Are you struggling in your faith? God tells you to make audacious prayers for your spiritual life. Are you trying to encourage another brother or sister in Christ? God says you should pray boldly for them. Are you trying to teach your friends the gospel? Shameless pray for their souls. God Responds to Prayer as a Father to a Child (11:9-13) The final paragraph shows how God will respond to such prayers. Verse 9 tells us to ask and keep asking. We are given the invitation to prayer. Seek and keep seeking. Pursue God and his will. Seeking the goals and purposes of the kingdom. Knock and keep knocking. We are entering through the door into God’s presence to receive blessing. Ask and it will be given to you. Seek and you will find. Knock and the door will be opened to you. God answers our bold requests in his name. Notice verse 10. “For everyone who asks receives, and the one who seeks finds, and to the one who knocks it will be opened.” God provides for his children. This is the illustration that Jesus uses to explain why God answers prayers. Notice verses 11-12. What father would give a snake to the son who asks for a fish? What father will give his son a scorpion when he asks for an egg? Here is the son who is in physical need. What father is going to give his child something that he does not need? Even more, what father is going to give his child something harmful? No father would do that. The father gives what the child needs and does not give what is harmful to them. Now watch the point in verse 13. If we are evil people and yet we know how to give good gifts to our children, how much more will our heavenly Father give us the Holy Spirit to those who ask him! If we know how to give our children what they need when they ask, and we are evil and sinful, then HOW MUCH MORE does our Father in heaven know what to give us? How much more will our heavenly Father do for us? Notice the interchangeable use of “good gifts” and “Holy Spirit” in this text. Matthew 7:11 reads exactly as Luke 11:13 except Matthew says “good gifts” rather than “Holy Spirit.” I think this is a very important point that Luke is making. Luke’s focus is on the good gifts that were promised through the Holy Spirit. The prophets wrote that the Holy Spirit would be poured out and the imagery signified the restoration of God’s kingdom, the restoration of God’s fellowship with them, and the restoration of God’s blessings to his people. The restoration of God’s blessings to his people is in view by Luke. We are given a blank check request for the necessities of the spiritual life. God is going to give you everything you need to get through this life. Ask him boldly for the things you need as you depend on him. God is going to provide for his children. He is not going to give a scorpion when you need an egg. God will give you the Holy Spirit. Do not try to make this mystical and strange. It is a simple promise made repeatedly through the scriptures. God is going to give you his blessings when you ask. What do you truly need right now? Ask God. Shamelessly be persistent in your request to the God who gives you every good gift and perfect blessing for your life.
<urn:uuid:13514c0e-adf4-43db-962b-10a3e9cc5bc9>
CC-MAIN-2022-33
https://westpalmbeachchurchofchrist.com/new-testament/luke/how-to-talk-to-god.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00405.warc.gz
en
0.971068
2,553
3.078125
3
Sept. 20, 2021 Variants, misinformation, vaccine hesitancy: Jeanine Guidry’s work is more crucial than ever Guidry, a VCU professor and researcher, has been studying public health communication for years. Amid the COVID-19 pandemic, it has become a topic of international importance. Share this story She didn’t know it at the time, but Jeanine Guidry, Ph.D., had been preparing for COVID-19 for years. Guidry, an assistant professor in the Richard T. Robertson School of Media and Culture in the College of Humanities and Sciences and director of the Media+Health Lab at Virginia Commonwealth University, studies social media and health communications, focusing particularly on effective public messaging in a health crisis. Her doctoral dissertation, “Designing Effective Messages to Promote Future Zika Vaccine Uptake,” explored how public health officials could best encourage people to be vaccinated against Zika virus, should a vaccine become available. She led a study, “(S)pin the Flu Vaccine: Recipes for Concern,” that analyzed 500 flu-vaccine Pinterest posts, providing insight into how misinformation can proliferate on social media. During major Zika virus outbreaks in 2016, Guidry collected and analyzed 1,000 Instagram posts to understand how public health messaging works — and doesn’t — amid a dangerous epidemic. “On one hand, I feel very grateful to be in the position that I’m in and to be alive right now,” Guidry said. “I’ve been getting ready for this for years. I didn’t know that, but I have been. And I play a very small role, like most scientists do, but all those little small pieces of information that we didn’t have before come together and begin forming a picture.” As soon as COVID-19 arrived, Guidry pivoted to focus on the new coronavirus. In March of 2020, she created and began teaching a new three-credit course, “Digital Crisis Communications for Global Pandemics.” “I started thinking about it on March 20, and then on March 30 the class started. We’re still teaching it,” she said. “I’m not sure I would recommend developing a brand new course in 10 days, but I’m glad we did it.” Her research quickly turned to COVID-19 as well. Prior to the pandemic, she had received a grant from the Arthur W. Page Society to study messaging about the flu vaccine. In March 2020, the organization gave her permission to study COVID-19 instead. That study, “Stay Socially Distant and Wash Your Hands: Using the Health Belief Model to Determine Intent for COVID-19 Preventive Behaviors at the Beginning of the Pandemic,” involved a survey of 500 adults. It looked at how likely they would be to adhere to preventive behaviors that were recommended at the time, such as not touching one’s face, social distancing, avoiding large gatherings and staying away from those who were sick. In December 2020, as the U.S. Food and Drug Administration approved the Pfizer-BioNTech COVID-19 vaccine under emergency use authorization, Guidry published a study that was among the first to investigate the psychological and social predictors of U.S. adults’ willingness to get a future COVID-19 vaccine and whether these predictors differ under an emergency use authorization. “I realized pretty quickly that while we’re in the midst of this outbreak, we need to not just figure out how to develop a vaccine but also figure out how people would receive it,” Guidry said. “Because the vaccine is only as good as the shots in people’s arms.” That July 2020 study, “Willingness to Get the COVID-19 Vaccine with and without Emergency Use Authorization,” involved a survey of 788 adults. It found that 59.9% of respondents were definitely or probably planning to receive a future coronavirus vaccine, but fewer than half of respondents planned to get it under emergency use authorization. It also found that white people were more likely than Black people to be vaccinated. Another study Guidry led, published in March 2021, used that same sample of 788 adults and was among the first to question whether the U.S. population would support donating part of its vaccine stockpile to low- and middle-income countries. That study, “U.S. Public Support for COVID-19 Vaccine Donation to Low- and Middle-Income Countries during the COVID-19 Pandemic,” found that older people, Republicans and the uninsured were less likely to support donating vaccines to less prosperous countries. A study she led for Massey Cancer Center — where Guidry serves as a member of its Cancer Prevention and Control research program — found that parents of children with cancer were more likely to believe misinformation and unverifiable content associated with COVID-19 than parents of children with no cancer history. The study also analyzed Centers for Disease Control and Prevention data to show that pediatric cancer mortality has increased during the pandemic due to delayed access to medical care, with COVID-19 misinformation cited as a potential contributing factor. “Dr. Guidry's work is very important right now. COVID-19 is an extremely complex challenge, and her research is key to understanding how information — and especially misinformation — about the pandemic is communicated,” said Jennifer Malat, Ph.D., dean of the College of Humanities and Sciences. “Dr. Guidry's findings have immediate real-world value as we strive to combat misinformation and will also be useful as we meet new health care challenges in the future.” ‘A science and art’ In late 2020, Arthur L. Kellermann, M.D., senior vice president for health sciences at VCU and CEO of VCU Health System, read about Guidry’s research and reached out. “He sent me an email and said, ‘I need to talk to you.’ You know, this is Dr. Art Kellerman, who is the head of VCU Health, and I am a very junior faculty member. I mean, let’s be real. That doesn’t happen every day.” Kellerman arranged for Guidry to take leave from teaching during the spring semester, allowing her to focus on her COVID-19 research. “Effective communication is a science and art,” Kellerman said. “No one understands that better than Dr. Guidry. Her expertise is critical, now more than ever, because we’re not only fighting a relentless and deadly virus; we are fighting a relentless barrage of misinformation that is extending the life of this pandemic. Although the science of public health has never been stronger, we need to do more to inspire the trust and confidence of those we serve. Dr. Guidry’s research helps us do that.” Guidry’s main project during the spring was the development of online decision aids, which will help people navigate the choice to get the COVID-19 vaccine. When the decision aids are rolled out in coming months, one will be aimed at the general public and another specifically for parents and children. Guidry and her collaborators are translating the decision aids into Portuguese and Spanish with plans to test them in South America in addition to the U.S. “We’re very, very lucky that the vaccines, in general, work so far with the variants, but there’s a whole bunch of them that are popping up and that is what you get with a brand new virus,” Guidry said. “We know a lot more than we did a year and a half ago. And that is wonderful, but it also keeps changing. So these decision aids, we’re going to be able to test them pretty quickly and start using them and making them available for people to use. And hopefully they will help some people make a decision to get the vaccine.” “Effective communication is a science and art. No one understands that better than Dr. Guidry.”Arthur L. Kellerman Also in early 2020, Guidry provided expertise to VCU Health as it developed strategies to encourage people to be vaccinated. Her work with colleagues at the VCU School of Medicine — where Guidry received her Ph.D. in social and behavioral sciences from the Department of Health Behavior and Policy — and with VCU Health, she said, is a reminder of the importance of interdisciplinary collaboration and that “we are one VCU.” “Our campuses may be a couple miles apart, but I believe that some of the most effective research is done when we work together and bring people together for things as big as COVID, but also climate change and other massive problems we’re facing,” she said. “To find solutions, we need everyone at the table.” What’s behind vaccine hesitancy? Among Guidry’s key findings related to COVID-19 are insights into why people are reluctant to be vaccinated. It was not a surprise, she said, because there has been hesitancy with previous vaccines. But it was a surprise — particularly given the number of deaths, the visual reminders of masks, the recommendations to avoid crowds and stay away from loved ones indoors — that Guidry found many people do not consider COVID-19 a serious risk. “The thing about vaccines is that it depends not just on: Are people convinced that the vaccine works? They also have to be aware of the disease and they have to be convinced that the disease itself is serious, and that they’re at risk or the people who they love are at risk,” she said. “One of the main findings, and we’re looking at different at-risk populations, there is, every time, whatever population you look at, a pretty significant percentage of people that say, ‘I don’t think COVID is that serious. I think that taking the vaccine is a greater risk or is a risk. And I don’t want to take that risk.’” Another finding, Guidry said, is that many people are reluctant because of a fear of needles. “Needle phobia pops up as a significant predictor of vaccine hesitancy almost every time we do a study,” she said. “There’s sufficient numbers of people in the samples that we study that say, ‘I just really don’t like needles.’ That’s a real thing.” Knowing that, she said, public health messaging should try to avoid sharing photos of needles on social media or in advertisements. Guidry received national media coverage in the spring, including in Kaiser Health News, for the finding that a fear of needles was a significant predictor of people refusing the COVID-19 vaccine. “If you’re really, really scared of getting the vaccine because of needles, we need to address that in an entirely different way than if somebody says I’m concerned that the Pfizer and the Moderna vaccines are going to change my DNA,” she said. Yet another finding is that misinformation continues to spread on social media. “I’m very grateful that social media platforms are really trying to make an effort. Let’s put it that way. I’m also thinking that we’re late with all that. We knew that social media was a breeding ground for misinformation, and especially misinformation about vaccines,” she said. “There are nefarious actors in this, but the majority of people who spread these pieces of misinformation are not, they’re truly people who are just scared, they’re concerned. They really think that this may hurt them or their family or their kids now, or in 10 years.” The persistent COVID-19 misinformation, she said, is driven by a loss of trust in science and underscores the need for better communication. “One of the things we see consistently when we look at what people say on social media, and in some cases what people say in our studies is, ‘Well, I did my own research and I found there are a thousand [deaths] every few days from the COVID vaccine, way more than from COVID,’” she said. “Here’s the problem: You can find that kind of information online. It’s not correct, but you can find it. So I don’t think we have done a particularly good job as a society in making sure that people understand how science works and how it should be communicated.” One key takeaway, Guidry said, is that encouraging someone to get vaccinated is probably best done person to person and not over social media. “It starts with listening to each other and it starts with keeping lines of communication open,” she said. “If you’re going to have a conversation with someone about [getting vaccinated], try and do it in person, or try and do it over private chat or over a phone call. People may not be willing to listen right now, but maybe they will in three months. And if that line of communication is closed, then how do we get past that?” Guidry has a number of forthcoming studies that she conducted with a team of collaborators that includes researchers at VCU across both campuses, such as Paul Perrin, Ph.D., an associate professor in the Department of Psychology; Mark Ryan, M.D., an associate professor in the Department of Family Medicine and Population Health; Kellie Carlyle, Ph.D., an associate professor in the Department of Health Behavior and Policy; and Bernard F. Fuemmeler, Ph.D., a professor and associate director for population science and interim co-leader of the Cancer Prevention and Control research program at Massey Cancer Center. The team also includes partners outside VCU, including Candace Burton, Ph.D., an associate professor in the Sue & Bill Gross School of Nursing at the University of California, Irvine; Linnea Laestadius, Ph.D., an associate professor at the School of Public Health at the University of Wisconsin-Milwaukee; Emily Vraga, Ph.D., an associate professor in the Hubbard School of Journalism and Mass Communication at the University of Minnesota; and Thomas Gültzow, a doctoral candidate and decision aid specialist at Maastricht University in the Netherlands, Guidry’s alma mater. One forthcoming study looks at the response to COVID-19 and vaccines among people who self-identify as evangelicals. Another will explore vaccine perceptions among people who are not white. “So we want African Americans, we want Hispanics. We want Asian Americans, we want Native Americans. Why? Because we’re still dealing with the fact that people of color tend to be more affected by COVID; when they’re affected by COVID, they’re affected more seriously; and this is a pattern that we see happen again and again. … So we need to do more to find out why could that be the case,” Guidry said. “Is there anything that would make a difference? Is there any insight that could be gleaned from this that would make it a little bit better?” she said. “Here’s the problem: You can find that kind of information online. It’s not correct, but you can find it. So I don’t think we have done a particularly good job as a society in making sure that people understand how science works and how it should be communicated.”Jeanine Guidry Another forthcoming study will look at how college students responded to COVID-19, particularly with social distancing. The study, which involved focus groups and surveys, included students from VCU as well as six foreign universities, including one in Wuhan, China. A similar study, launched at the request of the State Council of Higher Education of Virginia, explores why young people in Virginia are one of the least vaccinated populations. Guidry and her collaborators held focus groups and conducted surveys, asking young people why they were choosing not to get vaccinated. “It was just remarkable and scary, hearing all the same type of misinformation,” Guidry said. “[They said] ‘I heard it messes with fertility. I want to have babies.’ No, it doesn’t. It really, really, really doesn’t. But knowing that kind of misinformation is out there, I think, gives us some more specifics on how we can communicate. “We’ve got to find better ways to communicate specifically, and we need to find more culturally appropriate ways to communicate,” she said. “In a perfect world, we would make sure that these pieces of misinformation never take hold, but that ship has sailed.” Preparing for the next pandemic Guidry’s research is contributing to communication amid COVID-19. But an underpinning of much of her work, she says, is applying lessons from the current pandemic to the next one. Much of the response to COVID-19 was predictable based on past outbreaks, Guidry said. It was no surprise, for example, that misinformation continues to flourish online. It was no surprise that vaccine hesitancy continues to increase. Guidry hopes her research will help health officials more effectively communicate to the public when the next pandemic arrives. “The World Health Organization said recently that they don’t necessarily think this was the big one, that COVID wasn’t the big pandemic,” she said. “If this is not the big one, then I want us to be ready whenever it does show up.” Subscribe to VCU News Subscribe to VCU News at newsletter.vcu.edu and receive a selection of stories, videos, photos, news clips and event listings in your inbox.
<urn:uuid:0acaacc6-cf89-40db-b971-0d63a466568c>
CC-MAIN-2022-33
https://news.vcu.edu/article/2021/09/variants-misinformation-vaccine-hesitancy-jeanine-guidrys-work-is-more-crucial-than-ever
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00403.warc.gz
en
0.964751
3,844
2.8125
3
British No. 3 Mark 1 Pattern 14 Rifle: The No. 3 Mark 1 was a British service rifle of the First World War. This rifle is a bolt action rifle with an internal five round magazine. It was made by contract by companies in the United States. A shortage of industrial capacity led the British Government to contract with US manufacturers Remmington, Winchester and Eddystone to augment their supply of small arms. Each factory produced parts for these rifles that varied slightly and in many cases they were not interchangeable. This rifle was declared obsolete in 1947 British No. 1 Mark III Rifle: The British No.1 Mark III is one of a series of rifles which were modified, tested, and redesigned to meet varying demands of battle. Each of the rifles of this series were designated with numbers, marks and asterisks. The Lee-Enfield series began in 1895. Over the next 60 years, more than 13 million were manufactured. The Enfield series replaced the earlier, similar Lee-Metford bolt action rifles. The name of the rifle is derived from the designer's name, James lee and the small arms manufacturing location at Enfield Lock, Middlesex. The No. 1 Mark III is a short magazine Lee-Enfield (SMLE) standardized in 1907. The rifle weighs just over 8 pounds and has a 25 inch barrel. The SMLE has a 10 round detachable magazine and is chambered for the .303 cartridge. The No.1 Mark III sights were adjustable for ranges up to 1,000 meters. The rifle was first employed on the battlefield in 1914 during World War 1. The Lee-Enfield is an accurate rifle and is very effective when used by skilled marksmen. The 10 round magazine had greater capacity than many other conventional rifles of the time. The No.1 Mark III was a well made quality weapon with tight tolerances which required extra care in adverse conditions encountered in trench warfare to keep it functioning. British No. 2 Mark IV .22 Caliber Rifle: Number 2 MK IV rifles are externally identical to .303 SMLE MK III rifles except modifications to fire the .22 caliber cartridge. These rifles were developed to train cadets about firearms safety and marksmanship using a .22 cartridge, which was much cheaper than the standard .303 cartridge. These were initially created by modifying obsolete Magazine Lee-Metford and Magazine Lee-Enfield rifles, but were later made using SMLE rifles. French M 1892 8mm Carbine: The M1892 carbine was designed by Algerian railroad worker Emile Berthier. The M1892 was lighter, smaller and easier to handle than the standard Lebel rifle of 1914. Large full size rifles such as the Lebel were awkward in the confines of the trench warfare environment. This rifle fired the 8 x 50 mm cartridge fired by the Lebel using an Mannlicher style en-bloc 3 round magazine roughly similar to those used in an M1 Garand. The Mannlicher magazine was easier and faster to load than a conventional tubular magazine. When empty, the magazine clip fell from an opening in the bottom of the receiver. An unusual detail in the design is the omission of a safety, dictated by French colonial military doctrine. Instead the rifles were intended to be carried with the chamber empty. The rifle is just three feet long and was suitable for cavalry, machine gun and artillery crews and other non-front line troops. These rifles were widely adopted and very successful. Webley .455 MK I 1887 Revolver: The Webley MK I is a standard service revolver issued to British and Commonwealth military personnel. The Mark I was adopted in 1887. The Webley is a top break pistol design in which the pistol is reloaded by opening the revolver from the top using a catch lever. This action also extracts the spent cases. The .455 caliber model is the most powerful of all of the Webley series of top-break pistols. The Mark I had a four inch barrel and “birds beak” style grips. The .455 cartridge produced a relatively slow muzzle velocity of 620 ft per second. It was not intended for long range accuracy, but it had great stopping power at short range. This cartridge was one of the most powerful military cartridges ever produced. The Webley top break series revolvers were in service for over 75 years. These revolvers were known to be very rugged and reliable in harsh conditions. A notable feature is the lack of a safety in the Webley series. Smith and Wesson M1917 .45 Revolver: The US Military solicited design proposals from both Smith and Wesson, and Colt to augment the supply of the standard M 1911 semiautomatic pistol with a revolver firing the .45 cartridge. Using the same cartridge was intended to simplify logistics. The Colt and Smith and Wesson revolver designs were very similar, but did have some notable differences. Both revolvers are designed with a heavy frame and use a double action. The Smith and Wesson Revolver is slightly more complicated and took longer to disassemble and reassemble. The Colt has a slightly larger grip and a heavier barrel. The Smith and Wesson revolver has a shoulder machined into it to headspace on the case mouth of the rimless cartridge and does not require the use of half-moon clips. From 1917 until 1919, Smith and Wesson produced over 150,000 1917 revolvers. The M1917 Revolver was issued to officers, infantrymen, and support personnel. These revolvers were used extensively in World War 1, World War 2, the Korean War, and even saw some use by Tunnel Rats in the Vietnam War. French M1892 Ordinance Revolver: The Model 1892 was also known as the Lebel Revolver and the St Etienne 8MM. The Model 1892 is a French service revolver produced by Manufacture D’armes de St Etienne. This revolver was standard issue for officers during WW1. The Model 1892 is a solid frame double action revolver with the cylinder on a separate frame which swings to the right for loading similar to modern revolvers. The left sideplate of the revolver swings back to allow oiling and cleaning of moving parts. These parts are individually numbered to indicate order of assembly. The revolver was first issued in 1893 and was still used by French police until the mid 1960’s. The Model 1892 is a well finished pistol and fires an 8mm round with power similar to the .32 ACP which is smaller than many other military revolvers of the time. About 350,000 were manufactured between 1892 and 1924. This revolver was used in the 2018 Strasbourg Terrorist Attack. French Model 1916 8mm Rifle: The M1916 rifle is an upgraded design of the M1892 intended to address some unfavorable characteristics of the M1892. The three round magazine which had no protruding mechanism was favored by some but was generally considered too limited as it required frequent re-loading. The opening in the bottom of the receiver also allowed dirt and other contaminants to enter and foul the mechanism. The M1916 was equipped with a larger 5-round en-bloc magazine with a spring loaded trap door to keep out dirt. These rifles were still in use during World War Two but were eventually replaced by the MAS-36. German Erfurt 1917 Luger Pistol: Luger pistols were designed by Georg Luger and manufactured at Deutsche Waffen und Munitionsfabriken (DWM). The Luger was manufactured by several nations from 1898 through 1948. These pistols were introduced with the 7.65 Parabellum cartridge, but were later modified to utilize the 9mm Parabellum cartridge. The Luger was adopted by the German and Swiss Armies in early 1900. Luger pistols made in Switzerland and Germany were manufactured with high standards and craftsmanship using tight tolerances and quality materials. As a result these have a long service life. The Erfurt Luger was manufactured at the Royal Erfurt Arsenal in Central Germany. The Erfurt Arsenal was equipped with the finest machinery available to manufacture military weapons. The arsenal began manufacture of the Luger pistol in 1910. Almost 500,000 Luger pistols were manufactured here. German Spandau Machine Gun: The Maschinengewehr 08 or MG 08 was the German army’s standard machine gun during WW I and was an adaptation of the famous Maxim Machine gun. It is also referred to as the Spandau Machine gun since it was manufactured by the government's Spandau Arsenal. The Spandau was designated as the MG 08 as 1908 was the year in which it was adopted. The MG 08 was water cooled and required 3.7 liters (0.713 liquid Gallons) of water to operate. The MG 08 had a firing rate of between 500 and 600 rounds per minute. The gun used 250 round fabric ammunition belts and fired 7.92 x 57 mm ammunition. The gun used short barrel recoil and toggle lock during operation and would fire continuously as long as the trigger was depressed. The practical range of the weapon was 2000 – 3600 meters. Although associated with trench warfare, the MG 08 was a multipurpose weapon and was employed in aircraft, static defensive positions, and by the Navy, but was primarily considered an artillery weapon. The MG 08 was reported to perform with great effectiveness in the Russo-Japanese War in 1905. It was designed to be operated by two trained infantrymen on the ground in prone position. Despite the fact that, being water-cooled it was bulky, heavy (the MG08 with its tripod mount weighed 143 pounds without water) and somewhat difficult to move, it was the most heavily used German machine gun of WW I. The capability to provide sustained fire over long periods earned them the nickname “Devil’s Paintbrush”. German Gewehr Model 1888 7.92 mm Rifle: The 1888 Gewehr Rifle was a late 19th century bolt action rifle adopted in 1888. The introduction of the Gewehr 1888 Rifle was a response to the French adoption of smokeless powder invented in the late 19th century, which created an arms race between Germany and France. The first step for Germany to mitigate the advantage experienced by the French smokeless powder, the Germans developed a new cartridge. This new cartridge was the M88, a rimless 8 mm cartridge which utilized a 226 grain round nose projectile. This was later replaced by the 7.92 x 57mm Mauser cartridge. The M1888 employs a Manlicher-style en-bloc loading system which allowed re-supply of ammunition using stripper clips. One unique feature of the rifle is the sheet metal tube which encases the barrel and prevents it from touching the stock. This unusual feature also served as a moisture trap which promoted rusting. The Gewehr 1888 served as a front line weapon for German infantry until it was replaced by the 98K. After the full adoption of the 98K, many 1888 Gewehr rifles retained useful service by other foreign nations including China, Turkey and Spain. German Langenhan Pistol: The Langenhan Pistol is a German pistol designed by Friedrich Langenhan. The pistol was used by German military and police personnel. The design is similar to the FN M1900. These were produced from 1914 to 1917 during which time, about 55,000 were produced. The design incorporates a blowback mechanism and is fed by an 8 round magazine. It is interesting to note that the slide is held in place by one screw which can vibrate loose and allow the slide to fly off of the pistol when fired. Austro-Hungaria Steyr Model 1895 Carbine: This rifle is the carbine version of the M1895 straight pull rifle designed by Ferdinand Ritter von Mannlicher. It uses the same bolt mechanism as the infantry version of this rifle. As is the case with the infantry rifle, the carbine version has an internal five round magazine fed from the top using clips. The M1895 was the product of many evolutionary design changes, one of which was the strengthening of the bolt mechanism to accommodate higher chamber pressure for new smokeless powder cartridges. The carbine is just over 39 inches long and weighs approximately 7 pounds. This rifle was adopted by the Austro-Hungarian Army throughout World War 1. Many of these rifles saw continued use into World War II where they were issued to second line and reservists units. As is the case with the infantry rifle, the straight pull mechanism gave these rifles a high rate of fire. The M1895 was initially chambered for the 8x50 mm Mannlicher cartridge. Austrian Model 1895 Steyr Straight Pull Infantry Rifle: The Model 1895 Straight Pull Rifle is a bolt action rifle designed by Ferdinand Ritter von Mannlicher. The rifle is unique in that its design features what was considered a revolutionary straight pull bolt mechanism instead of the more conventional rotating bolt handle. The straight pull design allowed the operator of the rifle to cycle the bolt with just a single backward and forward motion. This resulted in an increased rate of fire. With adequate maintenance, the rifle performed extremely well and was reliable and sturdy. It is reported that during design trials, some rifles were able to fire over 50,000 rounds without lubrication. The receiver utilized helical grooves to force the bolt to rotate when retracted. The rifle is equipped with a five round en-bloc clip, but due to its design could not be fed single rounds. The rifle fires an 8 x 50 mm Mannlicher cartridge. Austrian Model 1886 Steyr Kropatschek Infantry Rifle: The Kropatschek Rifle is a bolt action repeating rifle with a tubular magazine. The design of this rifle was influenced by the German Mauser M71/84. These rifles were built for Portugal by Steyr. The rifle fires an 8mm black powder round, but is capable of firing the same round using smokeless powder. The sights have a maximum range setting of 2200 meters. The Kropatschek Rifle is the basis for the French Lebel Rifle. Italian Vetterli Model 1870 6.5 mm Rifle: The Vetterli Rifle was the standard service rifle for Italian military forces from 1870 through 1887. The M1870 was a single shot bolt action rifle which fired the 10.4 mm center fire cartridge. The design was later modified to utilize a 4 round internal magazine loaded from stripper clips. The clips were made of metal and wood and were removed when all ammunition was expended by pulling a string built into the clip. During World War 1 some of the M1870 rifles were modified to fire the 6.5 mm smokeless powder cartridge. A sleeve was inserted into the barrel and the magazine design of the Carcano rifle was implemented. Russian Mosin Nagant Model 1891 Rifle: The Model 1891 Mosin Nagant Rifle is a 5-shot, bolt action rifle. The Mosin Nagant fires the 7.62 x .54 mm cartridge and utilizes an internal magazine. This rifle was developed in 1882 thru 1891 and was used by the armed forces of Russia and the Soviet Union. The Mosin Nagant is one of the most numerous rifles ever produced with an estimated 37 million produced. This rifle has been used in conflicts all over the world and despite its antiquity, is still in use today. The design of the Mosin Nagant is actually a blending of design elements developed by two competing weapons designers, Mosin and Nagant. The rifle has some similarities to the Gewehr 1888 and the Italian Carcano Rifle. Ammunition is fed into the rifle in single rounds or more often by use of a 5-round stripper clip. The rifle was actually referred to as the Russian Three Line Rifle M 1891. The Term “Mosin –Nagant “ was an invention of Western literature. Production of the rifle began in 1892. Due to shortcomings in Russian domestic industry, 750,000 Mosin-Nagant rifles were produced by US firearms manufacturer Remington before the October Revolution. Excess rifles produced in the US after the revolution were purchased by the US Army. A modernized version of the M1891 was developed and saw widespread use in World War Two. The Mosin Nagant was eventually succeeded by the SKS rifle, and later the AK series rifles. German Artillery Luger: The Artillery Luger, also known as Lange Pistol P08, was a German manufactured Luger pistol authorized for production by the Kaiser in 1913. The P08 is a variant of the Luger series and was equipped with a 7.9 inch barrel. The pistol had an eight position rear sight calibrated to 800 meters. These pistols were typically issued with a leather holster and shoulder stock. For close combat the shoulder stock was connected to a lug on the pistol frame and the pistol was used as a carbine. The Artillery Luger was originally intended as a self defense weapon for artillery crews. It was lighter and less cumbersome than the K98 rifle. During World War One, the P08 Luger was frequently issued to Storm Trooper infantry units equipped with the new larger 32 round Trommelmagazin “Snail Magazine”. Production of the P08 ceased in 1918. The P08 was eventually replaced by the MP18 sub machinegun. However, production of the P08 was restarted in the early 1920’s. Note: the P08 was issued to artillery troops for the Shah of Iran in the 1930’s.
<urn:uuid:7dbf098a-1b04-4670-afa1-ccee62e329ac>
CC-MAIN-2022-33
https://memorialmuseum.org/collection/displays/item/world-war-one-weapons
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00604.warc.gz
en
0.974921
3,610
2.96875
3
Are baby ducks hard to raise? Raising ducklings is just as fun and rewarding as raising chicks, and you can absolutely raise them together! However, ducks do have different needs and require slightly different care than chickens. Ducklings need a ready source of clean water. Baby ducks love to play but can easily drown if they tire. via How long do baby ducks need a heat lamp? Raising ducklings can be a fun adventure, but if you aren't careful, you can lose the delicate babies to cold. Therefore it's necessary to provide ducklings with heat for the proper amount of time, usually between two and six weeks, depending on the weather and how quickly they develop feathers. via Can I raise a wild baby duck? Both wild and domestic ducks will abandon ducklings, and they usually don't make it more than a day or two. Wild ducklings are vulnerable to predators and drowning without a mother to guide them. A duck that already has babies will often adopt abandoned ducklings, so long as they're about the same age as her own. via What do you feed a baby duck as a pet? Leafy greens are an important part of a duck's diet. I start our ducklings off young getting used to cut weeds and grass, lettuce and Swiss chard. Ducks won't eat wilted greens, so I put the 'salad' in their water tub. It stays nice and fresh that way and keeps them occupied dabbling for the leafy treats. via Can 4 week old ducks be outside? Somewhere around their 6th-8th week they should have lost their baby fluff and be feathered out. But they can move outside permanently anytime after week 4 as long as nighttime temperatures are not too low (at least 50 degrees). via Do baby ducks need a heat lamp? Ducklings and Goslings do not take heat well, so be sure not to overheat them. Once they leave the brooder, it is a good idea to give them a heat lamp at night for the first week or so, unless the weather is very hot. Always make sure they have some shelter and a place to get out of the sun. via Can baby ducks survive without a heat lamp? The idea is to have your ducklings in a coop, an insulated coop. This will make them huddle together naturally and keep each other warm- with the aid of some added nesting materials, they should be able to grow- even without a heat lamp! via Is it OK to hold baby ducks? It's not safe to hold a duck's body under their wings because of the risk of injury. Do not lift them off their feet until they are calmly controlled on the ground! Instead, you should sit cross-legged near the duck and then hug them safely into your lap, securing their wings. via How do I know if my ducklings are too hot? However in excessive heat, ducks, and more specifically ducklings, can suffer heat stroke, so watch for signs over overheating such as panting, holding their wings out from their bodies or droopy wings, standing or sitting with their eyes closed, laying on their side not moving or in obvious distress. via Do ducks abandon their babies if humans touch them? Don't worry—parent birds do not recognize their young by smell. They will not abandon a baby if it has been touched by humans.” via Do ducks abandon their babies? Keep a safe distance as parent ducks can become extremely stressed and may abandon their ducklings. If relocated, a mother duck will attempt to find her way back to the lost ducklings, risking her life by crossing busy roads and dangerous paths. via What should I do if I find a baby duck? Contact a wildlife rehabilitator for advice. In the meantime, put the baby in a cardboard box and make sure it has a heat source. Do not give it any food or water. Even though ducks and geese are water birds, they need their parents to keep them warm. via What can you not feed baby ducks? What You Should Not Feed Your Ducks How long do ducks live as a pet? They are relatively long-lived pets—it's possible for them to live 10-15 years when well cared for. Keep in mind that they produce LOTS of manure. So, they are great pets if you have a garden. via What human food can ducklings eat? Cooked whole wheat or vegetable pasta, brown rice, millet, quinoa and oats all are good treat options. Whole-grain, sugar-free cereals are also okay in moderation. Sprouted grains including mung beans, alfalfa, broccoli, wheat berry or quinoa are extremely nutritious treats for ducks. via When can baby ducks swim? Ducklings and goslings can be introduced to swimming water as early as one week of age but you must be very careful. They must be able to walk in and out of the water very easily. The water should not be too cold and they must be able to find their heat lamp for rewarming without difficulty. via How do you save a dying baby duck? Find duckling-specific feed at farm or pet stores. In the meantime, offer him crumbled bread, cottage cheese, oatmeal, chopped greens or a hard-boiled egg with a finely chopped shell for calcium. Always provide clean, fresh water in a very shallow dish so the duckling does not drown. via How do you tell a ducklings age? Generally speaking, a duckling covered in fuzzy down with no sign of feathers is less than 3 weeks old. Ducklings with partially grown-in feathers are likely 3-5 weeks old, and fully feathered ducks are about 6 weeks old. via Do pet ducks need water to swim in? A: While ducks and geese DO need fresh, clean drinking water, and ideally have ready access to a shallow area with "dipping" water (enough for them to dip their heads in to clean their beak, nostrils, and eyes)...they DO NOT require water deep enough for swimming. via How cold is too cold for Ducklings? While ducks are incredibly more winter cold hardy than chickens, who can only comfortably tolerate 45 degree temperatures before illness or frostbite could occur. Ducks can waddle about down to temperatures of 20 degrees before seeking shelter or being in danger of frostbite to their legs and feet. via What is the best feed for Ducklings? Coarse sand or chick-sized grit needs to be available to the ducklings at all times to help them grind their food. I have found ducklings to be more picky about treats than chicks, but anything green, worms, cooked spaghetti, watermelon, corn and halved grapes all seem to be favorites. via Do ducklings sleep at night? Ducks are semi-nocturnal and very active at night unlike chickens. They emit lots of moisture when they breathe so if you keep them in your chicken coop at night, be sure that the coop is adequately ventilated to prevent a buildup of moisture which can cause respiratory issues in the hens. via Do ducks get attached to humans? Ducklings will often imprint on a human, especially from the time of hatching until they are up to five days old (though there may be cases of imprinting that have occurred later). This is even more likely to occur if there are no other ducks around. Imprinted ducklings need constant care. via How can you tell if a baby duck likes you? Can a duck change gender? Can ducks change their gender? Ducks can change their gender from female to male. When the ovary is removed then she starts to develop male plumage and also functions as a male sexually. via What temperature is too warm for ducks? Ducks are just fine down to temperatures around 20 degrees, but below that they can suffer frostbite on their feet which could lead to amputation. In addition to the straw, wooden planks, benches or even low stumps in their pen will help the ducks get off the frozen ground and keep their feet warm. via Why are my baby ducks dying? Domestic ducklings can become waterlogged and die from being too cold or even drown. This doesn't mean you can't let them play in the water. We put a shallow pan in the bathtub a few times a week so they can play and splash around in the water while we clean out their brooder. via At what age can ducklings go outside? By the time the ducklings are 3-5 weeks old, weather-dependent, they can spend warm, sunny days outside, carefully supervised and protected from predators. Until the ducks are fully feathered around 7-9 weeks old, they have trouble regulating their body temperature and need heat. via What happens if you touch a baby duck? The best rule of thumb if you find a baby bird or any animal infant is just to leave it alone. In most cases, the parents are nearby and may be waiting for you to leave the area. Touching animals can also result in diseases passing from wildlife to humans, or vice versa. via How long can baby birds survive without Mom? Nestlings can live 24 hours without food. See more on widows/widowers and what to do if one or both parents are gone. If the bird is clearly orphaned, and does need to be rescued bring it to a licensed wildlife rehabilitator as soon as possible. via Should you pick up baby birds? It's perfectly safe to pick up a fallen nestling and put it back in the nest, or to carry a fledgling out of danger and place it in a tree or shrub. via Where do ducks go at night? Waterfowl like ducks tend to roost through the night with their heads tucked under their wing on the water or an ice shelf for increased safety, as water really helps them to detect threats. Anything that would be swimming towards them would make sounds and vibrations, waking ducks up. via How long does a mother duck stay with her ducklings? The ducklings will stay with mom for up to two months before flying away to make their own way. via Can ducks take off without water? The only requirement ducks have is water deep enough for them to submerge their whole head. If a duck eats or digs in the dirt it has to be able to rinse the dirt out or wash the food down. A duck can easily choke without water. via Why is my duckling chirping so much? Along with their excessive chirping, they may show some obvious behaviors hinting discomfort of heat or cold. If they group near the heat source, and chirp loudly, they are possibly too cold. The happiest chicks are well-distributed despite the heat source and will chirp cheerfully. via What do I do if I find a duckling on its own? Once they are on the ground, in most cases it's best to leave a duck family alone. The mother duck will know what she's doing and is best placed to care for her young. Interfering carries the risk of the mother flying away and abandoning the ducklings. via Can you raise a single duckling? In most cases, probably not. Here's why: Ducks and geese bond strongly with their flockmates and almost never leave each other's side, so keeping a single waterfowl means a person must commit to giving the animal a LOT of attention. via
<urn:uuid:1d28ff56-0519-4917-b853-a539c65b1ecb>
CC-MAIN-2022-33
https://backyardanswer.com/how-to-raise-a-baby-duck/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00404.warc.gz
en
0.959753
2,405
2.59375
3
Strychninae Sulphas (U. S. P.)—Strychnine Sulphate. FORMULA: (C21H22N2O2)2H2SO4+5H2O. MOLECULAR WEIGHT: 854.24. SYNONYM: Strychninae sulphas (U. S. P., 1870). "Strychnine sulphate should be kept in well-stoppered vials"—(U. S. P.). Preparation.—To diluted, warm sulphuric acid, add a slight excess of pure powdered strychnine. Filter, and allow to crystallize. Rhombic, neutral, prismatic crystals, containing 5 molecules of water, are deposited upon cooling the saturated, hot solution. By dissolving the neutral sulphate in diluted sulphuric acid, long, thin needles of the acid salt (C21H22N2O2.H2SO4) are formed upon evaporation. Reversedly, the neutral salt may be obtained from the acid salt, by dividing a solution of the latter into two equal parts, precipitating one-half by aqua, ammoniae, and adding this precipitate to the other half (Rammelsberg, Amer. Jour. Pharm., 1881, p. 627; also see M. W. Coleman, ibid., 1883, p. 113). Description.—The U. S. P. describes the neutral salt as occurring in "colorless or white prismatic crystals, odorless, and having an intensely bitter taste, perceptible even in highly dilute (1 in 700,000) solution. Efflorescent in dry air. Soluble, at 15° C. (59° F.), in 50 parts of water, and in 109 parts of alcohol; in 2 parts of boiling water, and in 8.5 parts of boiling alcohol. Almost insoluble in ether. When heated at 100° C. (212° F.), the salt slowly loses its water of crystallization (10.51 per cent); more rapidly when heated to 110° C. (230° F.). When quickly heated to 200° C. (392° F.), the salt fuses. Upon ignition; it is consumed, leaving no residue"—(U,. S. P.). Tests.—"On adding potassium or sodium hydrate T.S. to an aqueous solution of the salt, a white precipitate is thrown down, which is insoluble in an excess of the alkali, and which should conform to the reactions and tests of strychnine (see Strychnina). Barium chloride T.S., added to the aqueous solution, throws down a white precipitate, insoluble in hydrochloric acid. On dissolving 0.05 Gm. of strychnine sulphate in 2 Cc. of nitric acid (specific gravity 1.300), in a small test-tube, the acid should not turn more than faintly yellow (limit of brucine)"—(U. S. P.). Action, Medical Uses, and Dosage.—Nux vomica and strychnine (see also Nux Vomica) act chiefly, if not solely, by stimulating the spinal cord and medulla oblongata, and without affecting the functions of the brain. The terminal nerves and nerve trunks are little, if at all, affected by strychnine, except in very large doses. Even then, its influence is not thought to be marked. The slightest observable effects from small doses are twitches of the muscles of the arms and legs, occurring especially during sleep, accompanied with restlessness, some anxiety, acceleration of the pulse, and generally slight perspiration. Sometimes the action of the bowels is increased, and the discharge of urine is either augmented or discharged more frequently; it likewise promotes the venereal appetite. Large doses occasion very violent starting of the muscles; even a tendency to lockjaw, succeeded by stiffness, weariness, pain or rending in the limbs. In their highest degree, these effects amount to violent tetanic spasms, occurring in frequent fits, with brief intervals of repose, acute sensibility, and dreadful alarm. If the spasms continue, opisthotonos ensues. The risus sardonicus is observed in strychnine poisoning. The convulsions may be so violent as to throw the victim off a bed. Through whatever form or structure strychnine is introduced into the body, it exerts this action more or less, operating with an energy proportioned to the activity of absorption where it is applied. It is supposed to be a cumulative poison like mercury or digitalis, nor does its activity diminish under the influence of habit, as with opium. M. Duclos states that, under the influence of positive electricity, the symptoms of poisoning by strychnine increase, while they lessen or cease altogether when negative electricity is applied. The long-continued use of strychnine, in excessive amounts, tends to impair the digestive organs, and while small amounts favor diuresis, large quantities impair that function by producing spasm of the bladder muscles. Strychnine is eliminated in part by the kidneys, and may also impair the contractile power of the sphincter vesicae. When strychnine kills, it usually does so by causing spasm of the respiratory muscles, producing asphyxia. As some patients are powerfully affected by the smallest doses of this agent, too much caution can not be employed in its administration. Thirty grains of powdered nux vomica (equal to about 1 seed, or ⅓ grain of strychnine), in 2 doses, proved fatal, while death followed the administration of 3 grains of the alcoholic extract; 1/16 grain of strychnine proved fatal to a small child in 4 hours, while ½ grain has killed an adult. Toxic symptoms are often produced by so small a dose as 1/12 grain. Poisoning by nux vomica is slower than by strychnine. The usual length of time in which the latter proves fatal is 2 hours, though death has resulted in 15 minutes, and has been delayed 6 hours. If the patient survives longer than 6 hours, he is likely to recover. There are no characteristic internal post-mortem appearances, though, as a rule, there is congestion of the meninges, and the blood throughout the body is black and liquid. The body stiffens after death, and may be arched, with incurvated toes. Rigidity of the body has been known to persist for months. In poisoning by strychnine or nux vomica, the patient must be kept absolutely quiet, no noises should be permitted, nor should even a draught of air be permitted to strike the body. Apomorphine, hypodermatically, or other emetics, by mouth, should be given to induce vomiting, while lard, sweet oil, milk, charcoal, or tannin, may be given with a view of enveloping the poison or retarding its absorption. The spasms should be controlled with chloroform. Chloral and potassium bromide have also been asserted to be effectual, as have also atropine, tobacco, and nicotine. Physostigma is also useful, but must be carefully employed, lest exhaustion follow its use. This may, however, be guarded against by the use of stimulants. Artificial respiration may be performed, the forcible action required being less likely to produce spasms than light and superficial contact with the skin. "I would observe here that, 13 years ago, a favorite Newfoundland bitch, with 3 pups about 2 months old, were poisoned by some evil-minded person, by strychnine placed on meat. One of the pups died in the convulsed condition common to the influence of strychnine; the others were attacked with spasmodic twitchings, which continued to increase. From some cause the bitch vomited up her meat, a portion of which was eaten by 2 chickens, about 6 or 8 weeks old. To the bitch and the remaining 2 pups, I gave about a gill of sweet oil to each, followed by about 4 grains of camphor to the mother, and 2 grains to the pups, in some bread. They recovered and were doing well. Of the chickens, one was apparently dying, lying on the ground, wings outspread, mouth open, and with frequent spasmodic jerks; the other trembled and spasmodically staggered around like an intoxicated person. To each of these I gave about a grain of camphor in butter, and fastened them up, and in an hour they had fully recovered. I mention these facts that further inquiries may be made as regards the antidotal power of camphor in poisoning by strychnine. To determine whether strychnine was the poison administered, the meat vomited by the dogs was carefully examined, and strychnine found present. Both dogs and chickens were actively purged. Since the above occurrence, tannin oil, freely given, and camphor, have been found excellent antidotes to strychnine, also the tinctures of iodine, and bromine, and chlorine" (J. King). Dr. John Bartlett strongly recommends a solution of common salt as an antidote to strychnine poisoning, from the invariable success attending its use with poisoned dogs (Amer. Drug. Cir., Vol. XI, 1868). Folker, in the Lancet, July, 1867, relates an instance where a healthy man had taken over 2 grains of strychnine, who was saved by the use of chloroform, internally and externally, aided by repeated small doses of tincture of aconite. In Amer. Med. Record, 1867, is a case related where a young man, residing at Chardon, Ohio, who had poisoned himself with 3 grains of crystallized strychnine, was saved by the internal use of camphor, and inhalations of chloroform, continued for several hours. The Medical Times and Gazette, May, 1868, also relates a case where a little girl, 4 years of age, had taken strychnine by mistake, and was saved by being kept under the anaesthetic influence of chloroform for a couple of hours. The Med. and Surg. Reporter of Philadelphia, 1867, relates a case where 3 ½ grains of strychnine had been swallowed, and, in 24 hours, the person was saved by the administration, every 5, 10, and 15 minutes, of ½- teaspoonful doses of tincture of Cannabis indica. J. Rosenthal, from the results of experiments upon animals, and having observed that artificial respiration caused the convulsions, arising from the influence of strychnine, to cease, and even saved the animals from dying, is strongly inclined to believe that, if any method can be devised by which artificial respiration can be maintained for a long time, all persons poisoned by strychnine can be saved, if too long a time has not been allowed to elapse from its ingestion. This method, if practicable, is reasonable, as strychnine kills by spasmodically arresting respiration. Strychnine increases the quantity of the blood in the spinal cord, and, hence, is not useful when there is congestion of the cord; it localizes its action entirely upon the sensitive nerves; it is injurious in epilepsy and paralysis, arising from lesions of the encephalon, or congestion of the spinal cord; it is useless in paralysis agitans; but, in small doses, is useful in slight paralysis, due to white softening of the spinal cord, and in all cases of functional derangement from want of nervous power. It should be employed in paraplegia, without irritation or without increase of the vital properties of the spinal cord, as in cases of reflex paraplegia, and white or non-inflammatory softening of the cord. It should be avoided in paralysis with symptoms of congestion, myelitis, or spinal meningitis. It is more useful in paraplegia than hemiplegia. Nux vomica is preferred in many gastro-intestinal affections, while strychnine is more generally employed in troubles affecting the nervous system, bladder, heart, and reproductive organs; and the action of the former is chiefly owing to the strychnine it contains. Yet their action differs but slightly, and most largely in degree. The uses of strychnine are those enumerated under Nux Vomica (which see). There are some conditions, however, in which strychnine is to be preferred, chiefly on account of its prompt action. Some that are mentioned under Nux Vomica are here repeated, and other conditions added. Strychnine may be administered subcutaneously, and is therefore, of great value in threatened heart failure, to prevent surgical shock, and in dyspnoea, to sustain the breathing function when it seems to be dependent most largely upon the influence of the will, as in low fevers and pneumonia. This action is particularly marked in typhoid and asthenic types of disease, with impaired spinal innervation, and imperfect or feeble respiration. Strychnine, hypodermatically, may be used with great advantage in atonic diarrhoea, cholera morbus, and Asiatic Cholera. One-fifth grain, in divided doses, is of marked utility in the cold stage of congestive intermittents, and in ague, with atony of the stomach and impaired innervation. Strychnine is preferred over nux vomica in impotence, from exhaustion or weakness, in urinal incontinence of the young and the aged, and in urinal retention from atony. Strychnine enters largely into the treatment of dipsomania, the sulphate or nitrate being preferred. The latter is said to be effectual in preventing surgical shock. It is antidotal to chloral, morphine, or opium (early stage of poisoning), and in asphyxia from gas or water, or in chloroform narcosis. The semi-paralytic state, produced by excess of bromides or lead, is somewhat relieved by it. Strychnine is of marked value in many nervous affections. Occasionally, it gives good results in tetanus and epilepsy, and, in chorea, it first aggravates, and then frequently cures. Oesophageal spasm and hay-fever are sometimes controlled by it. It has relieved writer's cramp. The forms of paralysis benefited by strychnine are those functional in character, and often reflex from excesses and rheumatism, neuralgia, concussion of the cord, hysteria, etc. In post-diphtheritic paralysis, it is one of our best agents. It relieves obstinate facial neuralgia, when atony is a marked feature. Strychnine is also useful in hemiplegia, paraplegia, partial paralysis of particular joints or muscles, and of the bladder. The paralyzed muscles are always first affected if they are thrown into spasms at all. If the remedy is to succeed, improvement begins speedily. It must not be used in recent cases of paralysis, or while general reaction prevails; neither when signs exist either of local irritation in the brain or spinal cord, or of determination of blood to the bead. It has been likewise used in various forms of neuralgia, amenorrhoea, dysentery, rheumatism, syphilitic osteocopa, and obstinate constipation. "In the treatment of gleet, urethral stricture, and recent enlargement of the prostate, I have found it a superior remedy, used internally and locally. In dyspepsia, when there is a want of appetite, constipation, and a sensation of epigastric weight after eating, I have found the combination of 1 grain of the alcoholic extract of nux vomica, well triturated with 40 grains of the oleoresin of ptelea, and divided into 20 pills, an excellent remedy. Likewise in dyspepsia connected with impotence, caused by masturbation or venereal disease; the dose is 1 pill, repeated 3 times a day" (John King). Strychnine will also be found advantageous in many uterine diseases, prolapsus uteri, etc. Prof. A. J. Howe found the following powder to produce an anodyne influence in cases of cancer of the uterus, and other severe diseases, attended with extreme pain: Take of sulphate of morphine, 5 grains; sulphate of quinine, 10 grains; strychnine, 1 grain; liquorice powder, 20 grains; mix thoroughly together, and divide into 20 powders, 1 of which may be taken every 4 or 6 hours, according to the urgency of the symptoms. Dr. Alexander Fleming recommended the following solution of strychnine, for internal use, as being much safer and more efficient than the galenical preparations of nux vomica: "Take of strychnine, 4 grains; distilled water, 10 fluid drachms; dissolve the strychnine thoroughly with the aid of a few drops of diluted hydrochloric acid, and then add alcohol, a sufficient quantity to make the whole measure 20 fluid drachms. This is of uniform strength, passes readily into the circulation, and the dose can be apportioned with accuracy. The commencing dose is 10 minims, and contains 1/30 grain of strychnine. It should be given on an empty stomach, and diluted with water, to insure its prompt and easy absorption. As a tonic, the dose is 5 minims, 2 or 3 times a day." He also stated that "strychnine should never be given in pill form, because it is hard of solution in the weak acids of the stomach, and several pills may remain unchanged and accumulate there or in the bowels. A change in the secretions may then dissolve and transport them simultaneously into the blood, and give rise to alarming tetanic symptoms. This is commonly the correct explanation of the so-called cumulative action of strychnine—the sudden solution and absorption of hard pills accumulated in the stomach or bowels." The dose of strychnine is from 1/30 to 1/10 grain, 2 or 3 times a day. It may be rendered more soluble in alcohol or water, by the addition of a few drops of an acid, as acetic, hydrochloric, nitric, or sulphuric. Specific Indications and Uses.—(See Nux Vomica.) Functional forms of paralysis, due to excesses; atony. Related Alkaloid.—BRUCINE exerts an influence upon the system very similar to that occasioned by strychnine, but is less energetic. Its dose is from ⅛ to ½ grain, 3 or 4 times a day. In the administration of brucine and strychnine, or any of their salts, great caution must be observed, and the patient carefully watched during their use. According to Prof. Brown-Sequard, strychnine and brucine have similar effects. Local anaesthesia is reported from the use of a 5 per cent solution of brucine upon mucous membranes, but not upon the skin.
<urn:uuid:28beba01-2378-4c61-a1bb-75358acb323a>
CC-MAIN-2022-33
https://www.henriettes-herb.com/eclectic/kings/strychnos-nux_strych-sul.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00205.warc.gz
en
0.935822
4,072
2.921875
3
Service handguns were among the first indigenous small-arms developments in the Soviet Union. In the mid-1920s, the Red Army was armed with a mix of obsolete Nagant M1895 revolvers and some Mauser C96 pistols purchased from Germany. Thus, the military needed a new service pistol, and the late 1920s saw a number of experimental developments in this field. Among others, for a brief period the Red Army pursued the “large pistol” concept, unquestionably inspired by the iconic Mauser C96. As a result, Fedor Tokarev designed a rather huge pistol with a 22-round magazine in the grip, a detachable shoulder stock/holster and a select-fire capability. Without the shoulder stock, it weighted 3.7 pounds with an empty magazine, and was 12 inches long. It fired 7.63x25mm Mauser ammunition. Not surprisingly, this monster never went past the prototype stage, as the Red Army selected much more compact Tokarev TT pistol as its new standard sidearm in 1931. However, by the late 1930s, the TT was found lacking in some respects. For one, it was not suited for use by tank crews because the firing ports in turrets were originally designed for pencil-thin Nagant revolver barrels. By 1939, the Red Army was already testing several semi-automatic 7.62x25mm pistols with thin, exposed barrels, but World War II broke out before the trials were completed, and the TT remained in production throughout the war. In 1951, the TT was replaced by an entirely new pistol, the Makarov PM, which was effective and reliable but a bit heavy for a compact sidearm. Therefore, in the early 1960s, Soviet manufacturers began experimenting with lighter Makarov pistols, first using aluminum alloys and later switching to modern polymers. By the mid-1960s, the Soviet Army was testing a TKB-025 pistol that had been designed in Tula. It was based on the PM but featured a polymer frame with an integral triggerguard. The TKB-025 passed military trials with good results but was eventually rejected because the army did not trust the longevity of contemporary polymers under variety of service conditions (arctic cold, desert heat, etc). It should be noted that in the post-war era, handguns were rather low on the army’s list of priorities, but we will mention another one before turning to larger guns. The Gerasimenko VAG-72 pistol was designed in 1972. But the VAG-73 that came out a year later is even more interesting. It featured a large 48-round magazine, made as a tandem box with two compartments. It also fired proprietary “caseless” 7.62mm ammunition that consisted of a projectile with a hollow base that contained the propellant and primer. This ammunition concept was similar to the 19th century Volcanic pistol, and it similarly failed to attract any military buyers. Experimental Weapons: Rifles Soviet designers began developing assault rifles as early as 1944. By 1947, more than a dozen designs were tested before the Soviet Army finally adopted the now-famous AK-47 rifle. One of the lesser known, but still historically important, designs of that era was the Bulkin AB-46 rifle, which competed directly against the Kalashnikov designs in 1946 and 1947. It outperformed the original Kalashnikov AK-46 in the trials of 1946, only to lose to the redesigned AK-47 a year later. Probably most irritating for its designer was the fact that the AK-47 borrowed heavily from the AB-46, which itself changed very little between 1946 and 1947. - RELATED STORY: Birth of the AK – A History of the Avtomat Kalashnikova The adoption of the AK-47 spurred further developments in an attempt to make new rifles cheaper, simpler and more accurate. One of the most persistent but unlucky Kalashnikov rivals of the time was designer German Korobov, who worked in Tula. From the 1940s to the 1970s, he produced a respectable number of highly effective and interesting weapons that were turned down by the army for various reasons. One of his earlier designs was the 7.62x39mmm TKB-512, a lightweight, delayed-blowback-operated rifle with a stamped-steel receiver, which spurred development of the new Kalashnikov design that later became the AKM. In the 1960s, Korobov worked in several directions. First, he tried to improve hit probability by following the same “shotgun” concept as American SALVO/SPIW systems. To this end, he built the 7.62x39mm TKB-059, a three-barreled, salvo-firing weapon. It was recoil operated, using a single bolt for all three barrels and a triple magazine. Firing three-bullet salvos, the TKB-059 achieved a noticeable increase in hit probability at the cost of increased weight, complexity and felt recoil. Later on, Korobov and his colleague, Nikolay Afanasiev, worked on a series of 7.62x39mm assault rifles using newly developed polymers for receivers and furniture. Throughout the 1960s they produced several polymer-stocked weapons, mostly in bullpup configurations. During this same period, the army began looking for a new sniper rifle. Among several entrants, a 7.62x54R Konstantinov semi-automatic sniper rifle stood out with its brick-red plastic stock. However, it was found less accurate than the more conventionally stocked Dragunov rifle. Also, judging by surviving photos, the plastic proved to be less durable than originally expected, chipping and cracking from the recoil of the powerful 7.62x54R ammunition. Some rather interesting and unusual rifles were born during the 1980s in an attempt to produce weapons capable of good accuracy in full-auto or burst-fire modes. Developed under the requirements of the “Abakan” R&D program, these included several systems that used a variety of more or less novel concepts. One of the most promising concepts was the “delayed recoil” system, where the receiver and barrel group were allowed to recoil inside a stock for a duration of a short, controlled burst of two or three rounds. The most notable proponent of this system, and the eventual winner of the entire trials, was designer Gennadiy Nikonov from Izhevsk. In the early 1980s, he designed a series of prototype 5.45x39mm assault rifles with receivers that recoiled against the stock. Nikonov experimented with the magazine’s position—behind the pistol grip in his NA bullpup of 1981, then on the right side in his AS rifle of 1984 and finally in front of the pistol grip in his AS rifle of 1986—before finally dropping the concept of allowing the magazine to move (which was obviously not well suited for military use) in favor of a stationary magazine and two-stage cartridge feed system, which he refined in the late 1980s for his trial-winning AN-94 assault rifle. Experimental Weapons: Machine Guns Machine guns also were of high importance for the Red Army. During the 1930s, some of the Red Army’s experts and small-arms designers became obsessed with high rates of fire. This resulted in the 7.62x54R ShKAS aircraft machine gun, which fired 1,800 rounds per minute from a single barrel. In late the 1930s, it was followed by even faster single-barrel aircraft machine guns—the Ultra-ShKAS and SN—which both clocked in at 2,200 to 2,400 rpms. However, these airborne weapons were badly suited for ground use, and the army wanted its own machine guns for use against low-flying attack aircraft and ground targets. One of the most interesting attempts to produce such weapons for ground use is attributed to designer Slostin, who produced a series of eight-barreled 7.62x54R machine guns by the late 1930s. The barrels were arranged in a rotating cluster, but unlike the well-known Gatling system, Slostin guns were self-powered. Also, there were no sliding bolts in his guns; instead, the barrels moved forward and backward against individual, stationary breeches, being operated by cross-linked gas pistons and chambers. These machine guns achieved firing rates in excess of 6,000 rounds per minute. However, war broke out before they were perfected, and the guns were never adopted. Despite that, the idea of the fast-firing, multi-barrel machine gun lived on after WWII, to be materialized again in a monstrous, eight-barreled heavy machine gun firing very powerful 14.5x114mm ammunition. This gun, also designed by Slostin, was intended to be used on super-heavy IS-7 tanks as their primary guns. However, all six of the IS-7 tanks that were actually produced were armed with two slower-firing but much more reliable 14.5mm KPVT machine guns that complemented their other weapons, which included a 130mm main gun and six 7.62mm SGMT machine guns. In terms of more conventional guns, during WWII the Red Army sought to replace its 7.62x54R DP light machine guns with a more effective, reliable and maneuverable weapon in the same caliber. About a dozen guns from various designers were tested between 1942 and 1943, mostly fed using convenient 20- to 30-round box magazines, but none were chosen. Instead, the Red Army adopted a slightly improved DPM machine gun, which served with frontline units until the late 1950s. Only A Glimpse This article is only a small glimpse of the huge amount of small-arms R&D that was conducted in the Soviet Union from its inception and until its fall. Most of this work never resulted in adoption or mass production. Unfortunately, in the Soviet Union, any small-arms work, however trivial, was automatically classified as “secret,” and accessing most records is still very complicated or impossible, as many reports and experimental weapons were destroyed once they weren’t needed anymore.
<urn:uuid:4106f2a5-ffb5-43b3-9fec-6d3749a0fcc2>
CC-MAIN-2022-33
https://www.tactical-life.com/firearms/soviet-experimental-weapons/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00403.warc.gz
en
0.980596
2,119
2.65625
3
The SUMIF function is a useful function when it comes to summing up values based on some given condition. But there are times when you will face some difficulties working with the function. You will notice that the SUMIF function is not working properly or returning inaccurate results. This mostly happens when you are new t0 this function and haven't used it enough. It doesn't mean that it can't happen to experienced Excel players. Excel surprises us with its secrets. There can be many reasons behind SUMIF's inaccuracy. In this article we will discuss all the cases in which SUMIF function may not work and how you can get it working. Before we discuss issue points with SUMIF function in detail, check these in your formula. You may get your SUMIF formula working. Now, if those haven't helped, you will get the SUMIF function working using below methods. Syntactical error is pretty common mistake among the new users. Even Experienced users can make syntactical error while using the SUMIF function. So first let's see the syntax of SUMIF function. Generic Excel SUMIF Formula: You can learn all about SUMIF function here. So the first argument is a range that contains your condition. The condition will be checked in this range only. The second argument is condition itself. This is the condition that you want to check in the condition_range. sum_range: The it is the range in that you want to some. So we had a quick summery of the SUMIF function. Now let's see what syntactical mistakes you can do while using the SUMIF function. Defining Criteria Mistakes Most of the mistakes are done when we define criteria. It is due to the variation of data. The criteria in SUMIF is defined differently in different scenarios. To understand it, let's see some example. Here I have a data set. Let's say I need to sum quantity of date 1-Mar-13. So we write this formula. Will it work? Correct! this SUMIF formula will not work. It will return 0. Why? The data we are working with is formatted as date. And dates in Excel are actually a numbers. And n number can be written without quotes as criteria. But still excel does not return the correct answer. Actually, in SUMIF in excel, accepts date as text in criteria (if not formatted as serial number). So if you write this formula, it will return the correct answer. The number equivalent of 1-mar-13 is 41334. So if I write this formula, it will return the correct answer. Note that I didn't use any quotes in this case. When we give number criteria, we don't need to use quotes. So this one was the one case. You need to specially careful when you work with dates. They get messy very easily. So if your formula includes dates in it, check if it is in right format. Sometimes when we import data from other sources, dates aren't imported in accepted formats. So first check and correct the dates before using them. Mistakes While Using Comparison Operator in SUMIF Function Let's take another example. This time let's sum up the quantity of dates later than 1-Mar-13. For this the correct syntax is" We don't include the criteria range in criteria because we already told SUMIF the range in which to look. Now if the criteria is in some cell, let's say in F3, than how would you use SUMIF function. Will the below formula work? This one should do than: A big NO. When we use comparison operators, we use ampersand to between operator and the range. The operator should be enclosed in quotes. The SUMIF formula will work properly. Note: When you need to sum values if a value matches exactly in criteria range, you don't need to use equal to sign "=". You just write that value or give the reference of that value at place of criteria, as we did in the first example. I have noticed that some new users use the below syntax when they want an exact match. This too much wrong. This SUMIF will not work. When using reference as criteria for exact matches you just need to mention the reference. The below formula will sum all quantities of date written in cell F3: So these are some syntactical mistakes that can be the reason behind SUMIF not working. Let's see some other reasons. A little bit of this, we have discussed in the previous section. But there is more to it. The SUMIF function deals with numbers. Of course only numbers can be summed up. So first you need to check the sum range, if it is in the proper number format. When we import data from other sources, it is common to have irregular data formats. It is very likely to have numbers formatted as text. In that case the numbers will not summed up. See the below example. You can see that sum range contains text values instead of numbers. And since text values can't be summed up, the result we get is 0. The green corner in the cell indicates the the numbers are formatted as text. It is possible that your range contains mixed formats. It is possible that only few numbers are formatted as text and rest are numbers. In that case those text formatted numbers will not be summed up and you will get an inaccurate result. How to solve this To fix this problem, select one cell that contains numbers and text and CTRL+SPACE to select entire column. Now click on the little exclamation mark on the left of the cell. Here you will see an option of "Convert to numbers" on second place. Click on it and you will have all the numbers in selected range converted to number format. This is one solution. But if you are not able to do this. Use the VALUE function to convert text into numbers. The VALUE function coverts any formatted number into number format (even dates and times). So this how it works. Use a column to convert all the numbers into values using the VALUE function and then value paste it. And then use that in the formula. Date and Time Formatted Value Summation with SUMIF. SUMIF may not visibly work when you try to sum up times. Yes visibly. See the below example. Here I have time in HH:MM:SS format. And I want to sum up the hours of date 1-mar-13. So I use the formula: The formula is absolutely correct but the answer I am getting is not looking right. Why am I getting 0.5. Shouldn't it return 12:00:00. Is it incorrect? No. The answer is write. As I said earlier, in Excel the time and date is treated differently. In Excel, 1 hour is equal to 1/24 unit. (I recommend you to understand excel date and time logic in detail. You can learn it here) So 12 hour will be equal to 0.5. If you want to see the result in hours convert the cell format of G3 to time format. Right click on the cell and click on the format cell. Here select the time format. And it is done. You can see that the result is converted to the correct format and returns an understandable result. If for any reason, the SUMIF function is not working, no matter what you do, use an alternative formula. Here this formula uses SUMPRODUCT function. For example if you want to do the same thing as above, we can use the SUMPRODUCT function to do so: We want to sum range D2:D20 if date is equal to F3. So write this formula. The order of the variables doesn't matter. The below formula will work perfectly fine: So yeah guys, this is how you can solve the issue if SUMIF function isn't working. I have covered every possible reason that can cause SUMIF's unusual behavior. I hope it helped you. If it didn't, let me know it in the comments section below. If you have some new insight, share that too in the comments section below. 13 Methods of How to Speed Up Excel | Excel is fast enough to calculate 6.6 million formulas in 1 second in Ideal conditions with normal configuration PC. But sometimes we observe excel files doing calculation slower than snails. There are many reasons behind this slower performance. If we can Identify them, we can make our formulas calculate faster. Center Excel Sheet Horizontally and Vertically on Excel Page : Microsoft Excel allows you to align worksheet on a page, you can change margins, specify custom margins, or center the worksheet horizontally or vertically on the page. Page margins are the blank spaces between the worksheet data and the edges of the printed page Split a Cell Diagonally in Microsoft Excel 2016 : To split cells diagonally we use the cell formatting and insert a diagonally dividing line into the cell. This separates the cells diagonally visually. How do I Insert a Check Mark in Excel 2016 : To insert a checkmark in Excel Cell we use the symbols in Excel. Set the fonts to wingdings and use the formula Char(252) to get the symbol of a check mark. How to disable Scroll Lock in Excel : Arrow keys in excel move your cell up, down, Left & Right. But this feature is only applicable when Scroll Lock in Excel is disabled. Scroll Lock in Excel is used to scroll up, down, left & right your worksheet not the cell. So this article will help you how to check scroll lock status and how to disable it? What to do If Excel Break Links Not Working : When we work with several excel files and use formula to get the work done, we intentionally or unintentionally create links between different files. Normal formula links can be easily broken by using break links option. 50 Excel Shortcuts to Increase Your Productivity | Get faster at your task. These 50 shortcuts will make you work even faster on Excel. How to use Excel VLOOKUP Function| This is one of the most used and popular functions of excel that is used to lookup value from different ranges and sheets. How to use the Excel COUNTIF Function| Count values with conditions using this amazing function. You don't need to filter your data to count specific value. Countif function is essential to prepare your dashboard. How to Use SUMIF Function in Excel | This is another dashboard essential function. This helps you sum up values on specific conditions. The applications/code on this site are distributed as is and without warranties or liability. In no event shall the owner of the copyrights, or the authors of the applications/code be liable for any loss of profit, any problems or any damage resulting from the use or evaluation of the applications/code.
<urn:uuid:197e3fb2-6a05-4aa2-813e-71a71132dee6>
CC-MAIN-2022-33
https://www.exceltip.com/tips/what-to-do-if-excel-sumif-is-not-working.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00205.warc.gz
en
0.889252
2,688
2.890625
3
“Amidst the tens and thousands of names of monarchs that crowd the columns of history, their majesty’s graciousness, and serenities and royal highness and the like, the name of Asoka shines alone almost as a star”-H.G. Wells. Devanampriya Priyadarsi Asoka ascended the throne of Magadha in 273 B.C. He was the grandson of Chandragupta Maurya and son of Bindusara. He was one of the greatest monarchs of history. We are furnished with a lot of information about him from his inscriptions and Buddhist literature. According to Buddhist tradition, Bindusara had 101 sons. Susima was the eldest son while Asok was the second son. His mother’s name was Subhadrangi. The Buddhist text Mahavamsa and the Divyavadana refer to a fratricidal struggle among the sons of Bindusara after his death. In this struggle Asoka is said to have killed ninety-nine of his brothers and only spared the life of Jisya, the youngest brother and waded through blood to the throne in 273 B.C. and for his ferocious nature he earned the title “Chandasoka”. But his coronation was delayed for four years and it took place in 269 B.C. According to Dr. Smith, those four years were, “one of the dark spaces in the spectrum of Indian History’s Vague speculation, unchecked by the salutary limitations of verified fact, is at the best, unprofitable.” But the story regarding the early life of Asoka is not accepted by Dr. Smith due to several reasons. He points out that the inscriptions of Asoka even prove that in the 17th and 18th years of his reign all his brothers and sisters were alive. In the Rock Edict Asoka expresses his anxious care for the family establishments of his brothers existing in the capital and the countries. Inscriptional evidences even indirectly suggest that some of his brothers were appointed as viceroys in important places like Taxila, Tosali, Ujjayini and Suvarnagiri and were known as the Kumaras and Aryaputras. According to Dr. Bhandarkar Buddhist texts only wanted to preach the greatness of Buddhism by the story of Asoka’s killing of his brothers and tried to show that how Chandasoka was converted into Dharmasoka under the influence of Buddhism. Conquest of Kalinga: The earliest event of Asoka’s reign of which we have reliable information, is his conquest of Kalinga in the 13th year of his reign in 261 B.C. The XIII Rock Edict of Asoka gives a vivid account of the conquest of Kalinga. The kingdom of Kalinga corresponds to modern Orissa and Ganjam. There were some causes for the invasion of Kalinga. First, Kalinga was once a part of the Magadhan empire when it was ruled by the Nandas. It became independent when Chandragupta Maurya rebelled against the Nanda king. Due to his pre-occupation in Northern India, Chandragupta Maurya had no time to reconquering it. Hence Asoka after his accession wanted to annex Kalinga to the Mauryan empire. Secondly, Kalinga posed a threat to Magadha as the Kalingan rulers considerably increased their military power from the time of Chandragupta to that of Asoka. According to Pliny, Kalingan army consisted of 60,000 infantry, 1000 cavalry and 700 war-elephants. The existence of such a big army was a source of danger to Asoka. Thirdly, the material prosperity of Kalinga was enhanced by commercial relation with Malaya, Java and Ceylon. Thus the growing Military power along with material prosperity and hostile attitude of Kalinga towards Magadha made her a powerful enemy to the Mauryan empire. Asoka felt the need of its subjugation and attacked Kalinga in the eighth year of his reign. It is not definitely known as to the name of the king and his dynasty then ruling over the kingdom of Kalinga because Asoka did not mention these facts in his inscription. According to scholars Kalinga might be at that time was like an oligarchical or republican state of the ancient type. The R E. XIII, of Asoka gives an account of the occupation of Kalinga after a terrible fight in course of which 1, 50,000 persons were captured, 100,000 were killed, and many times that number perished. Numerous people also suffered from violence, separation and other evils of war which caused Asoka much grief and remorse. So he abandoned the policy of conquest or “bherighosha” in favour of a policy of spiritual conquest or “dhammaghosa”. Thus the conquest of Kalinga gave a descent burial to the Magadhan imperialism and opened an era of peace and non-violent policy of inter-state relation. This Kalinga war converted Asoka as a Buddhist and missionary. The Kalinga war was a turning point in the life of Asoka. So far as his religion was concerned. After the Kalinga war he embraced Buddhism. It was sanyasi Upagupta who converted him and acted as his spiritual guru. According to Kalhana, the author of Rajatarangini, before his conversion Asoka was a patron of Brahmanical religion and Shiva was his favorite deity. But the feeling of remorse and misery led him to embrace Buddhism after the Kalinga war. According to tradition Upagupta the Buddhist monk converted him to Buddhism and acted as his spiritual guide. In the Bhabru Edict, he declares his faith in the Buddha, Dhamma and Sangha. He regarded Buddha as a Bhagabat and visited the holy places associated with the life of Buddha. He always kept himself in close contact with the Samgha. In spite of his patronage to Buddhism, Asoka was tolerant to all the religions of his time. Asoka’s Dhamma or Law of piety contained the following fundamental principles: 1. Mastery of Senses or Samyam. 2. Purity of thought or Bhavasuddhi. 3. Gratitude or Knitajnata. 4. Stead fastness of devotion or Dridh-Bhakti. 5. Kindness or Dya. 6. Charity or Dana. 7. Purity or Saucha. 8. Truthful or Satya. 9. Service or Sushrusa. The inscriptions of Asoka give us a clear idea about his religion. In the second Minor Rock Edict, it is mentioned that, “Father and mother must be obeyed; similarly, respect for living creatures must be enforced, truth must be spoken. These are the virtues of Law of piety which must be practiced.” In the Second Pillar Edict, Asoka mentioned that Dhamma consisted in little impiety, many good deeds, compassion, liberality, truthfulness and purity.” Missionary Activities of Asoka: The missionary activities of Asoka started from the tenth year of his reign. The Minor Rock Edict I records his success as a missionary. He exerted himself strenuously to propagate the religion in which he found solace and comfort of his life. Asoka adopted several measures for the spread of Buddhism. He went on tours to preach Buddhism. In the Rock Edict VIII he mentioned that in the tenth year of his reign he gave up Vihara Yatra or tours of pleasure and went on Dharma Yatra. He visited holy places of Buddhism and arranged religious discussions. He ordered his officers like the Yuktas, Rajukas, Purushas and Pradeshikas to go on tours and preach his Law of Piety to the people in addition to their official duties. He appointed a special class of officials called Dhamma Mahamatras whose sole duty was to propagate Dharma among the people. He also convoked the third Buddhist council at Pataliputra to settle internal disputes. With the consort of this council Asoka deputed missionaries to the various parts of the world. Majjhantika was sent to Kashmir and Gandhara, Maharakshita to Greek Country, Majjhima to Himalaya Country, Dharmarakshita to Aparantaka, Mahadharmarakshita to Maharastra, Mahadeva to Mahishamandala or Mysore, Rakshita to Varanasi or North Kanara, Sona and Uttara to Suvarnabhumi or Pegu and Sanghamitra and Mahendra Rashtriyg, Uttriya, Sambala and Bliadrasara to Lanka or Ceylon. He also sent missions to Egypt, Macedonia, Cyrene and Epirus. The names of missionaries, whose sphere of work lay in India proper, are preserved in Ceylonese literature. Asoka adopted the most novel means to make the people realize the doctrines of Buddha, was to engrave them on rocks, pillars and caves throughout his vast dominions. Fourteen Rock Edicts are to be found at Shahbazgarhi, Mansera, Kalsi, Sopara, Girnar, Dhauli, Jaugada, Chitaldmg, Rupnath, Sahsram, Bairat, Maski and Bhabru. The Pillar Edicts are to be found at Jopara, Meerut, Kausambi, Lauriya, Araraj, Lauriya Nandangarh, Rampurva, Sanchi, Rummindei, and Nigliva. The principles, Law of piety displayed on the Rock Edicts, Pillar Edicts and caves must have helped the spread of Buddhism in the country. Asoka tried to win over the goodwill of the people through philanthropic and benevolent activities. He introduced a series of humanitarian works. Although he didn’t abolish capital punishment, he provided a grace of three days to persons condemned with death. He ordered the planting of shady banyan tries and mango groves. He ordered the digging of wells and construction of rest-houses by the road side for the people. Watering places were established both for men and animals. He made arrangements for the treatment of men and animals. He also planted medicinal herbs for the treatment of people. He also issued a series of comprehensive legislations to check slaughter and injury to animals. In Pillar Edict V he mentioned a long list of animals and birds that were not to be killed. He also abolished Samajas where animals were killed for distributing meat to the people. Results of Asoka’s Missionary Activities: Asoka’s missionary activities had far-reaching consequences. His foreign policy was influenced by it. He told the rulers of the neighbouring states that they should not be afraid of him but trust him. He not only sent missionaries to foreign countries but also maintained friendly relations with Tamil neighbours like Cholas, Pandyas, Satyaputra, Keralputra. The message of dhamma spread to Burma also. Ultimately China, Japan and Tibet were brought within the folds of Buddhism. Indian art and architecture were also influenced. He substituted stone for wood for the construction of Pillars. He popularised lithic style. He also constructed 84,000 stupas. Brahmi script and Pali language were used by Asoka for preaching Dhamma. Because of his effort, Pali became the state lanaugage and Bramhi was used as the national script all over the country except extreme north-west. The political effects of Asoka’s missionary activities were not encouraging. He gave up the policy of conquest and followed a policy of non-violence in foreign relations. It has rightly been pointed out that a period of stagnation set in the history of India. The non-violence policy demoralized the army and the people. By abandoning the aggressive imperial policy, Asoka weakened the very foundations of the empire. Hence after the death of Asoka, a decline started in Maurya body politic. However, one should remember the great saying of Thucydides that all mortal glory is doomed to destruction, but the memory of greatness lives forever. Asoka occupies an important place in history for his policy of peace, non-violence and cultural conquest. He preached and practised the virtues of concord, toleration and non-violence. Thus in the words of H.G. Wells “Amidst the tens and thousands of names of monarchs that crowd the columns of history, their majesty’s graciousness, and serenities and royal highness and the like, the name of Asoka shines alone almost as a star. From the Volga to Japan, his name is still honoured. China, Tibet and even India, though it has left his doctrine, preserve the tradition of his greatness. More living men cherish his memory today than have heard the names of constantine or Charlemanue. He was the living embodiment of his time and he comes before us as quite a modern figure.”
<urn:uuid:2d648a51-88f5-4c1d-9cbf-b1f03689097d>
CC-MAIN-2022-33
https://www.historydiscussion.net/biography/the-life-and-achievements-of-ashoka/3070
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00005.warc.gz
en
0.971447
2,816
3.078125
3
The performance of avionics systems is dictated by the timely availability and usage of critical health parameters. Various sensors acquire and communicate the desired parameters. In current scenarios, sensors are hardwired and the number of sensors are growing due to automation, which increases the accuracy of intended aircraft functions. Sensors are distributed all over the aircraft and they are connected through wired networks for signal processing and communication. Line-replaceable units (LRUs) that integrate various sensors also use a wired approach for communication. The use of a wired network approach poses challenges in terms of cable routing, stray capacitances, noise, mechanical structure, and added weight to the structure. The weight of hundreds of miles of wires and cables contributes significantly to the overall weight of the aircraft, and, of course, as the weight of aircraft increases, the required fuel quantity also increases. The key driver for airline operational cost is fuel. Use of wireless sensors in aircraft brings in tremendous advantages in terms of design optimization, flexibility in sensor configuration, and weight optimization. However, even though the avionics industry is trying to adopt wireless sensors, there are some points of concern in deploying wireless sensors and networks across the aircraft. Some of the key factors to be considered for determining the feasibility of wireless technology and sensors are protocol, standards, compliance, and certification. Additional factors are internal and external infrastructure, various topologies for sensor networks, and expandability for the same. Signal integrity and fault detection methods are also key features of signal processing in aerospace applications. Sensor Network Topologies Various wireless technologies can be considered for communication inside aircraft, and to take advantage of them it is necessary to address and understand the sensor network topologies that provide the architectural framework. A peer-to-peer network allows each node to communicate directly with another node without needing to go through a centralized communications hub. Each peer device is able to function as both a “client” and a “server” to the other nodes on the network. This type of network can be used while communicating data from/to proximity sensor units. Tree networks use a central hub called a root node as the main communications router. One level down from the root node in the hierarchy is a central hub. This lower level then forms a star network. The tree network can be considered a hybrid of both the star and peer-to-peer networking topologies. This type of network can be used while communicating data from/to fuel sensor units. Based on the location of the fuel tank, each of the nodes can transmit the related information to the main node. Mesh networks allow data to “hop” from node to node, allowing the network to be self-healing. Each node is then able to communicate with each other as data is routed from node to node until it reaches the desired location. This type of network is one of the most complex and costs a significant amount of money to deploy properly. It can be used while communicating data from/to various data concentrator units. Star networks are connected to a centralized communications hub. Nodes cannot communicate directly with one another; all communications must be routed through the centralized hub. Each node is then a “client” while the central hub is the “server”. This type of network can be used while communicating data from/to the central data concentrator unit, which gets connected to the flight-management computer. Key Factors in Feasibility Consideration Besides considering wireless technologies, sensor and LRU interfaces, and sensor network topologies, there are additional factors specific to the avionics industry for deploying wireless sensors. Data integrity is a key factor in protocols used in the avionics industry. High reliability data communication without loss of data is critical for safety systems. With wireless sensors and LRUs it is important to have the robust protocols that will address the data-integrity needs. Existing wireless protocols may need some tweaks to address the high reliability data communication needed over wireless media. Selection of wireless standards and technology is important based on the type of the sensor and availability of a license-free spectrum. Wireless sensors are expected to work at specific speeds and most of the time as self-powered devices, so data rate for communication and power management techniques (duty cycle) plays an important role for selection. Location of the sensor (inside or outside of fuselage) and data rate (low or high) dictates wireless standards to some extent. To leverage the chipsets and radio, existing off-the-shelf wireless technology is recommended. Interference with other systems has to be analyzed thoroughly. Means of compliance and applicability of various aerospace DO standards is mandatory. DO-160 and DO-294C applicability and analysis is expected well in advance. For complex electronics hardware for LRUs, DO-254 is to be followed during the item/component design phase. The same is true for the software via DO-178B. Applicable wireless certifications for various transmitters (FCC, CE, EN standards, etc.) should be used. Usage of the certified chips and radios for Wi-Fi and Bluetooth helps for wireless certification at the component/item or LRU level, although the FCC mandates component-/item-level certification. There is a need to check the availability and usage of ISM band while selecting the wireless spectrum. Current scenarios use the 2.4 GHz license-free band for IEEE 802.11 b/g/n (Wi-Fi) and IEEE 802.15.4 (Zigbee). The spectrum should support low data rate as well as high data rate. Constraints, Challenges, and Guidelines Designers need to pay close attention to environmental, EMI/EMC considerations, and tests as per DO-160, “Environmental Conditions and Test Procedures for Airborne Equipment,” for wireless sensors and wireless LRUs. Various sections of DO-160 have an impact on wireless devices. Whether the wireless sensor is self-powered or aircraft-bus powered will dictate the applicability of Section 16 and 17. RF emission (conducted and radiated) applicable limit levels need to be checked against the FCC limits for specific wireless technology. If the DO-160 Section 21 limits are more stringent than the FCC limits, design and test should be based on Section 21, which will then in turn satisfy FCC requirements. In some scenarios (based on the location) of the wireless sensor and LRU, FCC limits should be sufficient. In addition to conducted and radiated emission considerations, the design should also consider conducted and radiated susceptibility. Some design techniques to consider are: specific EMI filters with small-form factors for various I/O's and power lines; impedance matching; and various layout considerations for avoiding current loops and proper isolation of RF. Different isolation techniques like physical isolation on printed circuit boards and digital isolators as well as various layout rules can be used. For specific wireless technology it is recommended to refer to the DO-294C, “Guidance on Allowing Transmitting Portable Electronic Devices on Aircraft,” characterization matrix for building/developing wireless sensors and LRUs. This will allow meeting characteristics of intended wireless design without violations. FCC regulations for the intentional and unintentional radiators must be studied for the specific wireless technology as well. Designers and integrators of wireless sensors need to coordinate with the appropriate certification agencies and authorities to determine all applicable wireless regulation standards and decide whether to fully comply or submit any necessary deviations/waivers. Portable electronic devices (PEDs) that intentionally radiate signals within the aircraft fuselage are potential sources for RF interference to installed aircraft systems. PEDs with intentional radiators (i.e. transmitters) are called TPEDs. All the PEDs will have both intentional and unintentional radiators. Unintentional radiators are also referred to as spurious emissions. Spurious emissions are the ones that fall (wideband and narrowband) outside the nominal range of operating frequency. Intentional radiators operate at the required transmitting frequency for wireless communication of PEDs. DO-294C provides guidance on the process of evaluating the T-PED effect on the aircraft operation. Challenges and Adverse Effects of Wireless Due to the RF signal propagation and reflections inside the aircraft environment, there is a possibility of the signal not getting detected by the antenna at receiver end. This is also known as the scattering effect. These reflections create the multiple paths for RF signal propagation. RF path propagation study and analysis for different types of antennas will enable the selection of the best antenna that can detect the RF signal under these multipath phenomena. Analysis, simulation, prototype, and testing of the antenna is the best approach. There are two types of diversities, referred to as antenna diversity and radio-level diversity. Antenna diversity consists of spatial diversity, in which two slightly offset antennas see different amounts of multipath fading: angle diversity, in which multipath levels are altered thereby changing signal amplitude; and polarization diversity, in which misalignment and multipath cause polarization loss. Dual polarization (two-in-one antenna) provides two polarizations to choose. This is more compact than two antennas and reduces the margin needed in link budget. Radio-level diversity consists of frequency diversity, which allows the switching of channels to diversify; temporal diversity, which consists of packet-based collision avoidance with guaranteed time slot transmissions; and code diversity, which consists of coding the signal in a unique way to reduce interference and simultaneous transmission of more radios. The majority of the wireless technologies discussed here support radio-level diversity. Antenna diversity is a major consideration, requiring due diligence as well as multiple antenna designs, simulations, and prototypes. Radiolevel diversity for the selected wireless technology and proper antenna diversity in the design of the wireless sensors and LRU will avoid unintentional jamming due to other wireless devices and radio towers. It will also avoid any catastrophic events due to failures. Low-power wireless networks will not contribute to conflicts between networks when two aircraft are close to each other. Such low-power networks will not have sufficient energy to propagate and interfere with the nearby aircraft wireless network. Various wireless consortiums and working groups are engaged in the development of wireless sensing systems. The general approach should be to categorize the non-essential/non-critical sensors and high-critical sensors in various systems over the entire aircraft. It is recommended to complete non-essential/non-critical sensor development first with prototyping and testing, so that the knowledge gained there can be used in developing high-critical sensors. LRUs/signal processing units that should be considered for the migration to wireless sensing in the near future include the engine control and health management system, proximity sensing system, aircraft structural health control system, lighting and cabin control system, and latch and landing gear sensors. This article is based on SAE technical paper 2014-01-2132 by Prashant Vadgaonkar, Ullas Janardhan, and Adishesha Sivaramasastry, UTC Aerospace Systems.
<urn:uuid:7f0181f7-7781-4f04-84d1-f4a879ca5c90>
CC-MAIN-2022-33
https://www.aerodefensetech.com/component/content/article/adt/features/articles/21508?r=26093
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00205.warc.gz
en
0.920985
2,263
3.15625
3
The abandoned and ruined dwellings of prehistoric man in the American West had aroused the interest and comment of explorers and colonizers for centuries. Not until after the Civil War, however, did these ruins, and the continuing discovery of still others, attract the serious attention of the eastern scientific community. Public interest in the continent's ancient civilizations brought about no less than five significant developments portentous for American archeology in the single year of 1879. They mark 1879 as the beginning of the movement that led, a quarter of a century later, to adoption of the Antiquities Act as the first national historic preservation policy for the United States. In this year Congress authorized establishment of the Bureau of Ethnology, later renamed the Bureau of American Ethnology, in the Smithsonian Institution to increase and diffuse knowledge of the American Indian. Major John Wesley Powell, who had lost his right arm in the Battle of Shiloh and who in 1869 had led his remarkable boat expedition through the Grand Canyon of the Colorado River, was appointed its first director.1 He headed the bureau until his death in 1902. During this long period, he and his colleagues became a major force for the protection of antiquities on federal lands. Five years earlier, in 1874, Frederic W. Putnam had begun his long and distinguished career as Curator of the Peabody Museum of American Archaeology and Ethnology at Harvard. For Putnam 1879 marked the appearance of a superbly illustrated book he had edited devoted to the ruined pueblos of Arizona and New Mexico and the archaeology and ethnology of the Indians of Southern California. This was Volume VII, Archeology, of the Report Upon United States Geographical Surveys West of the One Hundredth Meridian, in charge of First Lieutenant George M. Wheeler.2 For the next thirty-five years, until his death in 1915, Putnam profoundly influenced the rise and development of anthropology in America and served on several committees and boards concerned with federal legislation to protect American antiquities.3 In 1879 the American Association for the Advancement of Science for the first time elected an anthropologist as its president. He was Lewis Henry Morgan, then the foremost student in the United States in the comparatively new field of anthropology. Among many other works, he was the author of Ancient Society, or Researches in the Lines of Human Progress, published in 1877 to wide acclaim both in America and Europe.4 Frederic W. Putnam was also very active in the affairs of the Association. He served as its permanent secretary from 1873 to 1898, when he became president. During this period the Association inaugurated its "Section H, " in which growing numbers of students of anthropology gathered each year to read papers and discuss ideas. Eventually the Association established an influential committee to work for legislation to protect antiquities on federal lands. On February 10, 1879, a group of interested person, called together by Professor Otis T. Mason of Columbian College and others, assembled in the Regent's Room of the Smithsonian Institution and founded the Anthropological Society of Washington.5 In 1887 it was incorporated "for the term of one thousand years"6 and in 1888 began publishing The American Anthropologist. This Society drew support from the anthropologists, ethnologists, and geologists then being brought into the federal government as well as from many other persons active in the life of the National Capitol.7 In 1902 members of the "ASW," as it became known, formed part of a group that founded the American Anthropological Association, and The American Anthropologist was adopted by the national organizational as its official journal. The American Anthropological Association, in turn, provided crucial support for the American Antiquities Act in 1906. Lastly in 1879, Charles Eliot Norton, professor of the history of art at Harvard and for a quarter century one of its most influential scholars and teachers, with the help of friends and associates in and around Boston, founded the Archaeological Institute of America. Among those close friends was historian Francis Parkman. Almost thirty years before, as a young graduate of Harvard, Norton had helped the nearly blind Parkman prepare his first important work, The California and Oregon Trail, for publication.8 As one of Parkman's classmates at Harvard wrote long afterward, he "even then showed symptoms of 'Injuns' on the brain."9 He upheld the cause of American archaeology for support from the Institute. Other leading members in early years included William Watson Goodwin, professor of Greek literature at Harvard from 1860 to 1901 and first director of its American School of Classical Studies in Athens (1882-83); Russell Sturgis, architect, critic and writer; Alexander Agassiz, well-known zoologist and oceanographer, the son of Jean Louis Agassiz; and Henry W. Haynes, who for more than twenty years kept the Institute's members accurately informed about the progress of American archaeology.10 The purpose of the Institute was to promote and direct archaeological research, both classical and American; maintain schools for young classical scholars to Athens, Rome, and Palestine; publish the results of archaeological explorations and research; and hold meetings and sponsor lectures on archaeological subjects.11 Classical archaeology received substantially the larger support, but the Executive Committee from the beginning also held the view that "the study of the aboriginal life in America is essential to complete the history of the human race, as well as to gratify a legitimate curiosity concerning the condition of man on this continent previous to its discovery."12 In formulating its very first project in the field of American archaeology, the Institute turned naturally for advice and assistance to Lewis Henry Morgan. He believed that the most promising field for exploration was the social organization, usages, and customs of the Pueblo tribes of Indians and the architecture of the structures they occupied. "With the light thus gained," the Council reported to the Institute in 1885, "he thought a careful exploration and survey thought a careful exploration and survey should be attempted of the numerous remains of similar structures still to be found, especially in the San Juan region, near the point where Colorado, Utah, New Mexico, and Arizona join; and in other parts of New Mexico and Arizona."13 Morgan drew up a comprehensive scheme of the methods for prosecuting such an exploration, and he suggested that it should be extended to the imposing ruins in Mexico, Central America, and Yucatan. He emphasized the importance of architectural history and advanced the unique theory that "all the various ruined structures on this continent can be explained by the analogies of the existing communal buildings of New Mexico. Springing from a common mind, these exhibit only different stages of development, and form one system of works, from the Long House of the Iroquois to the Joint-Tenement structures of the Aztecs and Mayas."14 Not only did Morgan outline a program, he also recommended an investigator. Adolph F. Bandelier of Highland, Illinois, then forty years old, was born in Berne, Switzerland, but his family moved to America in 1848 and settled in Illinois. As a youth an ardent naturalist, he returned to Berne in 1855 and studied geology under Professor Streder at the University. Here, too, he met Alexander von Humboldt, who impressed him deeply. Back in America in the late 1850s, Bandelier turned to the study of history and ethnology, at first in his spare time, and acquired valuable knowledge of several European languages and of linguistics generally. Beginning in 1877, he published several scholarly works on the ancient Mexicans through the Peabody Museum at Harvard and also became known to Frederic W. Putnam.15 With the help of Parkman, Putnam and Morgan overcame Norton's reluctance and led the Institute to engage Bandelier to undertake its first project in America archeology -- an exploration in the Southwest exactly as recommended by Morgan.16 In August 1880, after calling on John Wesley Powell in Washington, DC, Bandelier journeyed to New Mexico and began a preliminary study of the great ruined pueblo of Pecos, about thirty miles southeast of Santa Fe. Knowledge of relevant Spanish documents persuaded Bandelier that Pecos has first been visited in 1540 by Alvardo, Coronado's lieutenant, during his search for the "Seven Cities of Cibola." Making elaborate architectural measurements of the ruins, Bandelier concluded that Pecos was "probably the largest aboriginal structure within the United States, so far described."17 He promptly wrote an account of his first season's works. In 1881 the Institute published it in two parts, entitled "Report on the Ruins of Pecos" and "An Historical Introduction to Studies among the Sedentary Indians of New Mexico."18 In Bandelier's report appeared these striking sentences on the condition of the great Pecos ruin in 1880: Mrs. Kozlowski (wife of a Polish gentlemen, living two miles south on the arroyo) informed me that in 1858, when she came to her present home with her husband, the roof of the church was still in existence. Her husband tore it down, and used it for building out-houses; he also attempted to dig out the cornerstone, but failed. In general the vandalism committed in this venerable relic of antiquity defies all description...All the beams of the old structure are quaintly...carved...much scroll work terminating them. Most of this was taken away, chipped into uncouth boxes, and sold, to be scattered everywhere. Not content with this, treasure hunters...have recklessly and ruthlessly disturbed the abodes of the dead.19 Bandelier's revelation of the great historical interest and incredible neglect of Pecos aroused wide interest and deep concern among the members of the Archaeological Institute of America and their friends, who noted that Pecos was of such great antiquity that it was "even older than Boston." Marshall P. Wilder, president of the New England Historic Genealogical Society, and a far sighted, scholarly but practical man undertook to do something about Pecos. He has been one of the founders of the Massachusetts Institute of Technology and the Massachusetts Agricultural College as well as a leader in the Massachusetts Horticultural Society.20 His interest in history and antiquities was of long standing, as was that of the Historic Genealogical Society's Corresponding Secretary, Edmund F. Slafter, for forty years a dedicated editor of source materials on American history. Supported by the Society's membership, Wilder and Slafter determined to raise in the Congress of the United States for the first time the whole question of legislation to protect American antiquities on federal lands. They decided to prepare a petition to Congress and to persuade Senator George Frisbie Hoar of Massachusetts to present it. They had reason to anticipate his sympathetic interest. He had served in Congress since 1869 and the Senate since 1877. He served for several years as a trustee of the Peabody Museum of Archaeology and Ethnology, an overseer of Harvard College, a regent of the Smithsonian Institution, and president of the American Antiquarian Society and the American Historical Association.21 On May 10, 1882, Senator Hoar presented the petition on the floor of the Senate: HISTORIC GENEALOGICAL SOCIETY Your memorialists, the members of the New England historic Genealogical Society, would respectfully represent: That there are in the Territories of New Mexico and Arizona twenty-six towns of the towns of Pueblos Indians, so called, in all containing about ten thousand inhabitants; that the number of their towns was once very much greater; that these remaining are the remnants of very ancient races in North America whose origin and history lie yet unknown in their decayed and decaying antiquities; that many of their towns have been abandoned by the decay and extinction of their inhabitants; that many of their relics have already perished and so made the study of American ethnology vastly more difficult; that the question of the origin of those Pueblos and the age of their decayed cities, and the use of some of their buildings, now magnificent ruins, constitute one of the leading and most interesting problems of the antiquary and historian of the present age; that relic-hunters have carried away, and scattered wide through America and Europe the remains of these extinct towns, thus making their historic study still more difficult, and, in some particulars, nearly impossible; that these extinct towns, the only monuments or interpreters of these mysterious races, are now daily plundered and destroyed in a most vandal way; that, for illustration, the ancient Spanish cathedral of Pecos, a building older than any now standing anywhere within the thirteen original States, and built two years before the founding of Boston, the metropolis of New England, is being despoiled by the robbery of its graves, while its timbers are used for campfires, sold to relic-hunters, and even used in the construction of stables. Your memorialists therefore pray you honorable body that at least some of these extinct cites or pueblos, carefully selected, with the land reservations attached and dating mostly from the Spanish crown, of the year 1880, may be withheld form public sale and their antiquities and ruins be preserved, as they furnish invaluable data for the ethnological studies now engaging the attention of our most learned scientific, antiquarian, and historical students. MARSHALL P. WILDER, President of the New England Gen. Society EDMUND F. SLAFTER, Corresponding Sec. of the New England Historic Genealogical Society.22 Senator Hoar noted that not only this society but also the American Antiquarian Society and others in New England and elsewhere were now paying great attention to "this matter of ethnology," and spending large sums of researches in Yucatan, Mexico, and the western Territories. By reserving selected lands from public sale and protecting these antiquities from ruthless destruction, the Government could, at small cost, give much aid to their researches. He moved that the petition be referred to the Committee on Public Lands. The issue was new in Congress, and in spite of the high character of the sponsors it received a reserved response from Senator Preston B. Plumb of Kansas, the recently designated chairman of the Senate Committee on Public Lands. Speaking on the floor of the Senate, even before his Committee had deliberated on the subject, Senator Plumb foresaw serious difficulties. He had visited Pecos, he said, and did not question its antiquity or the reported vandalism. But the southwestern country contained many similar ruins. It would be impossible for the government to protect them all. It would be better, he thought, for interested societies "to avail themselves of the license which now exists of going to the different localities and gathering up the relics, as I know has been done." He mentioned that such a party had been sent out from Philadelphia the previous year "and got some very significant relics," and that other expeditions had been sent out from Yale College. Furthermore, he said, "I have no doubt that there are today many curiosities under the control of tribes who have a right to the land...as sacred under the law as that of any man to his property, and which, by reason of their occupancy, will be preserved."23 The petition was nevertheless referred to Plumb's committee, where it quickly died. Many years were to pass, and much more vandalism and pot-hunting were to occur, before Congress was ready to act to stop it. But the presentation issue had been officially raised, and that was a significant first step.
<urn:uuid:b31ad686-7e5c-4b05-b10d-1fb797271054>
CC-MAIN-2022-33
https://www.nps.gov/archeology/pubs/Lee/Lee_CH1.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00005.warc.gz
en
0.966688
3,234
3.5625
4
Risk ethics is an emerging branch of philosophy that investigates the moral aspects of risk and uncertainty. Although one originating motivation in the pursuit of science and technology was an effort to reduce risk and uncertainty present in the natural world, it has been increasingly appreciated that the scientific and technological world presents its own constructed risks. Recognizing that one form of risk (natural) is overcome only at the cost of another form of risk (involved with science or technology) has stimulated critical reflection on risk in ways that did not occur in the absence of technological risk. A Brief Introduction to Risk Concepts Risk has vernacular and technical meanings. In everyday language a risk is simply a danger. But in relation to science and technology, risk is often defined as the probability of some harm. The probability of a benefit is often called a chance. According to another common definition, risk is identified with the value obtained by multiplying the probability of some harm or injury by its magnitude. With any attempt to spell out the details of how this might be done, however, problems arise since it is not clear that there is a single measure for all harms or injuries. Attempts have been made to measure all health effects in terms of quality-adjusted life years (Nord 1999). Risk-benefit analysis goes one step further and measures all harms in monetary terms (Viscusi 1992). However, as several critics have pointed out, such unified approaches depend on controversial value assumptions and may be difficult to defend from an ethical point of view (Shrader-Frechette 1992). Independent of methodological issues, however, are the assumptions of traditional moral philosophy, which has focused on situations in which the morally relevant properties of human actions are both well-determined and knowable. In contrast, moral problems in real life often involve risk and uncertainty. According to common moral intuitions it is unacceptable to drive a vehicle in such a way that the probability is 1 in 10 that one runs over a pedestrian, but acceptable if this probability is 1 in 1 billion. (Otherwise one could not drive at all.) It is far from clear how standard moral theories can account for the difference and explain where the line should be drawn. In utilitarian ethics, all moral appraisals are reducible to assignments of utility, a (numerical) measure of moral value. Furthermore, the utility of human actions is assumed to depend exclusively on their consequences. According to utilitarianism one should always choose the alternative that has the highest utility, that is, the best consequences. One utilitarian approach to risk is actualism, according to which the moral value of a risky situation is equal to the utility of the outcome that actually materializes. For example, suppose that an engineer decides not to reinforce a bridge in advance of it being subject to an exceptionally heavy load, although there is a 50 percent risk that the bridge will collapse under such use. If all goes well and the bridge carries the load, then according to the actualist standpoint what the engineer did was right. But examples such as this show that actualism cannot provide meaningful action guidance. Even if actualism is accepted as a method for retrospective moral assessment, another theory is needed to guide decision-making about the future. One such theory is expected utility maximization, which has become the standard utilitarian approach to risk. According to this theory, the utility of the prospect that an outcome may occur is obtained by multiplying the utility of the outcome itself by its probability. Then, the action with the highest probability-weighted value should be chosen. According to this rule, an action with the probability 1 in 10 to kill a person is five times worse than an action with the probability 1 in 50 of the same outcome. This method for weighing potential outcomes is routinely used in risk analysis. In intuitive arguments about risk, it is common to give the avoidance of very large disasters, such as a nuclear accident costing thousands of human lives, a higher priority than is warranted by probability-weighted utility calculations. For instance, people clearly worry more about the possibility of airplane crashes (low-probability but high-cost events) than automobile accident deaths (which are higher-probability but lower-cost events). Expected utility maximization disallows such cautious decision-making. Proponents of precautionary decision-making may see this as a disadvantage of utility maximization, whereas others may see it as a useful protection against costly over-cautiousness. Just like other forms of utilitarianism, expected utility maximization is strictly impersonal. Persons have no role in the ethical calculus other than as bearers of utilities whose values are independent of those who carry them. Therefore, a disadvantage affecting one person can always be justified by a sufficiently large advantage to some other person. No moral distinction is made between the act of exposing oneself to a serious danger in order to gain some advantage and the act of exposing someone else to the same danger for the same purpose. This is a problematic feature of utilitarian theory in general that is often aggravated in problems involving risk. Duty- and Rights-Based Theories A moral theory that is based on duties (rather than on the consequences of actions) is called deontological or duty-based. A moral theory in which rights have the corresponding role is called rights-based. Robert Nozick formulated the problem for rights-based theories in dealing with risks in this way: "Imposing how slight a probability of a harm that violates someone's rights also violates his rights?" (Nozick 1974, p. 7). Similarly, one may ask the following question about deontological theories: "How large must the probability be that one's action will in fact violate a duty for that action to be prohibited?" One possible answer to these questions is to prescribe that a (rights- or duty-based) prohibition to bring about a certain outcome implies a prohibition to cause an increase in the probability of that outcome (even if the increase is very small). But such a far-reaching extension of rights and duties is socially untenable. Human society would be impossible if people were not allowed to perform actions such as car driving that involve a small risk of developing into a violation of some prohibition. It seems clear that rights and prohibitions may lose their force when probabilities are sufficiently small. The most obvious way to account for this is to assign to each duty or right a probability limit below which it is not valid. However, no credible way to derive such a limit has been proposed. It is also implausible to draw the line between acceptable and unacceptable probabilities of harm with no regard to the benefits involved. (In contrast, such weighing against benefits is easily accounted for in utilitarian theories.) According to contract theories, the moral principles that rule humans' dealings with each other derive from a contract between all members of society. The social contract prohibits certain actions, such as actions that lead to the death of another person. Under what conditions should it also prohibit actions with a low but nonzero probability of leading to the death of another person? The most obvious response to this question is to extend the criterion that contract theory offers for the determinate case, namely consent among all those involved, to cases involving risk and uncertainty. This can be done in two ways because consent, as conceived in contract theories, can be either actual or hypothetical. According to the criterion of actual consent, all members of society would have a veto over actions that expose them to risks. This would make it virtually impossible, for example, to site industries that are socially necessary but give rise to emissions that may disturb those living nearby. With a rule of actual consent, a small number of nonconsenting persons would be able to create a society of stalemates, to the detriment of everyone else. Therefore, actual consent is not a realistic criterion in a complex society in which everyone performs actions with marginal effects on the lives of many others. Contract theory has a long tradition of operating with the hypothetical consent that is presumed to be given by every hypothetical participant in an ideal decision situation such as described in John Rawls's "original position." Unfortunately, none of the ideal situations constructed by contract theorists seems to have made the moral appraisal of risk and uncertainty easier or less dependent on controversial values than the corresponding appraisals in the real world. Widening the Issue Many discussions of risk have been limited by an implicit assumption that excludes important ethical aspects. It is assumed that once we have moral appraisals of actions with determinate outcomes, we can more or less automatically derive moral appraisals of actions whose outcomes are "probabilistic mixtures" of such determinate outcomes. Suppose, for instance, that moral considerations have led us to attach well-determined values to two outcomes X and Y. Then we are supposed to have the means needed to derive the values of mixed options such as 70 percent chance of X and 30 percent chance of Y. The crucial assumption is that the probabilities and values of nonprobabilistic alternatives completely determine the values of probabilistic alternatives. In real life, however, there are always other factors in addition to probabilities and utilities that properly influence our moral appraisals of an uncertain or risky situation. We need to know not only the values and probabilities of potential outcomes, but also who exposes whom to risk and with what intentions, the extent to which the exposed person was informed, whether or not the person consented, and more. Perhaps the most important foundational problem in risk ethics is the conflict between two principles that both have intuitive appeal. They can be called the collectivist and the individualist principles in risk ethics (Hansson 2004). According to the collectivist principle of risk ethics, exposure of a person to a risk is acceptable if and only if this exposure is outweighed by a greater benefit either for that person or others. According to the individualist principle, exposure of a person to a risk is acceptable if and only if this exposure is outweighed by a greater benefit for that person only. The collectivist principle dominates traditional risk analysis, but if carried to extremes it will lead to neglect of individual rights. The individualist principle is equally problematic, because it allows minorities to prevent social progress. It is a major challenge for risk ethics to find a reasonable and principled compromise between these two extreme positions. SVEN OVE HANSSON Hansson, Sven Ove. (2003). "Ethical Criteria of Risk Acceptance." Erkenntnis 59(3): 291–309. Discusses how risks can be dealt with in different moral theories. Hansson, Sven Ove. (2004). "Weighing Risks and Benefits." Topoi 23: 145–152. Discusses different ways to weigh risks against benefits. Hansson, Sven Ove, and Martin Peterson. (2001). "Rights, Risks, and Residual Obligations." Risk, Decision, and Policy 6(3): 157–166. Discusses the obligations that follow from exposing the public to risk. Nord, E. (1999). Cost-Value Analysis in Health Care: Making Sense Out of QALYs. Cambridge, UK: Cambridge University Press. One unified measure of human injuries. Nozick, Robert. (1974). Anarchy, State, and Utopia. New York: Basic Books. Discusses rights-based approaches to risk. Shrader-Frechette, Kristin. (1992). "Science, Democracy, and Public Policy." Critical Review 6(2–3): 255–264. A critical appraisal of cost-benefit analysis. Thomson, Judith. (1985). "Imposing Risk." In To Breathe Freely: Risk, Consent, and Air, ed. Mary Gibson. Totowa, NJ: Rowman and Allanheld. Person-related aspects of risk exposure.
<urn:uuid:28ed27f1-482b-4e24-8d7a-74c1df37f011>
CC-MAIN-2022-33
https://www.encyclopedia.com/science/encyclopedias-almanacs-transcripts-and-maps/risk-ethics
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572077.62/warc/CC-MAIN-20220814204141-20220814234141-00605.warc.gz
en
0.948351
2,438
3.34375
3
|KIT:||Pavla 1/72 TBY-2 Seawolf| |REVIEWER:||Carmel J. Attard| |NOTES:||Short run with resin bits.| The Sea Wolf was a naval design intended for use as a torpedo bomber to operate from deck of carriers. It performed its maiden flight as XTBU-1 and was intended as a development replacement to the Avenger. The origin goes back to 1940 when the Vought Company received a USN contract for a prototype, three-seat bomber. This was a mid-wing cantilever monoplane of a graceful shape with tail wheel landing gear and powered by a Pratt and Whitney R-2800-22 double Wasp radial engine rated at 2,000hp. It carried a crew of three seated in tandem beneath a long greenhouse canopy. Weapons were to be carried in a lower-fuselage weapons bay or on two under wing hard points. After successful testing the US Navy arrived to a decision for production of the type but as Vought Company lacked adequate production space as it was committed with the production of F4U corsair, it was agreed instead that the type shall be built by Consolidated. A contract for 1,100 aircraft of TBU type was placed with Consolidated in September 1943 and the type soon gained the name Sea Wolf. The TBY2 differed from the TBY1, of which one is known to have been built by having a radar pod mounted under starboard wing. Sea Wolf production was terminated after 180 aircraft had been completed. The Sea Wolf was armed with three 0.5 Browning fixed forward firing machine guns, one 0.5 trainable rearwards firing machine gun in a dorsal turret, one 0.3 rearwards firing machine gun in ventral turret position and 1600 lbs of disposable stores, which could be a 22” torpedo or a corresponding load of bombs in the bomb bay. It also carried an armored protection for the crew and fuel tanks. Two twin gun pods could also be carried under the wing inner pylons. After their equipment in the CASU-22 at the Quonset Pont base, Rhode Island, the series Sea Wolf were included in the VT-154 operational squadron that had to sail for the Pacific theatre with the USS Lyte CV-32, after training end in 1945. At the end of 1947, most of the remaining TBY-2 were withdrawn from service and scraped. The Sea Wolf had a maximum speed of 312mph at 17,700’ altitude, cruising speed of 156mph and had a range of 1025miles with one torpedo. The TBY-2 had a wingspan of 17.42M, Length of 11.39M and a wing area of 40.88 Sq.M It is the first time that the TBY-2 Sea Wolf has been released as an injection moulded kit form to a scale of 1/72 scale. Earlier release of the kit was by VAC Wings, which was a vacu form type of kit at same scale. The box cover states it is an Octopus kit but it is produced by Pavla Models. The kit is moulded in medium grey plastic that carry engraved detail panel lines on most of the parts and they come sealed in a large polytene bag. Another sealed bag contains resin parts and also included is a long greenhouse type vacform cockpit canopy. The kit can be built in sub assemblies in view of the many detail parts it contains. Starting with the cockpit which contains many resin parts and having a plastic floor and resin side paneling and bulkhead, a resin pilot seat and a control stick in plastic. This assembly was painted in interior colours with seat straps added and the instrument panel fixed in place and ahead of it is a firewall having the lower part forming the bomb bay front narrow extension. These are all fitted to one side of the fuselage half. There is another bulkhead behind the cockpit that is a ‘u’ shaped section and further aft there is the rear gunner’s compartment made up from five kit components. Before closing the fuselage halves and fix these together I found it very practical to glue 1/4 “long tabs made from cut plastic sprue to the inner edge of one side so that the two halves will self align together in the absence of locating guides. This also applies to the leading edge of the wings before these are fixed together. I tend to do this with most short run kits where there is absence of locating guide pins. The kit also contains three short resin exhaust pipes that are fitted to a port opening area located ahead of the wing on both fuselage sides. To simplify matters I glued a small piece of curved plastic card on the inside so that there was no chance of the small pipes from dropping inside the fuselage when added. After the fuselage was closed I fitted the upper decking which continue to add detail to the interior. Moving to the wings these were first glued together, the radar pod added and the wings are cemented to the fuselage with a butt joint. This was followed by the tail planes and after that the resin engine bulkhead added. After painting the engine and fixed in place, the resin front cowling is fixed using super glue. Allowing the assembly to set, I then added the detailed bomb racks, which are made in resin. I then added the gun pods to the wings. I drilled two holes and fitted cut measured pieces of surgical needles to simulate hollow gun barrels and fixed these in place. I then continued to assemble the two wing wheel wells complete with the undercarriage that comes quite well detailed. I then added the undercarriage doors. I did not fix the main wheels but painted them and left to a later stage. The wheel wells were painted semi mat white. The bomb bay was also painted in same colour. I did manage to find more detail that I could add to the open bomb bay in fact added extra four bomb backs internally and four 325 lb bombs thereby filing the somewhat empty spacious bay. These bombs complete with pylons were mounted on a separate rectangular thin plastic card which had webbing detail added to it before the whole bomb assembly was transferred insider the bomb bay and fixed for good. I could have added a Torpedo instead but preferred to add bombs as I had good reference material. Tail wheel assembly was then added. It was now the turn of the transparencies to fit in place. The rear turret transparency was first cut to correct height with a fine saw and a slot for the gun carefully cut vertically using a razor sharp modeling knife. This was lowered on a plastic ring that had a sloping bracket to hold the gun. The turret transparency was thicker at the lower end and needed careful trimming. After painting the turret interior, seat and gunner protection armour and gun, the transparency was then lowered and fixed in place using white glue. The frame was then masked with Tamiya strips of tape, which were cut on a glass flat plate. The turret clear part was then painted in sea blue. The main canopy was then test fitted and gently lowered in place securing with white glue. When these were dried I applied tiny drops of super glue to areas to secure and bond the cockpit parts in place. I used super glue after the cockpit canopies were sealed so that any fumes emitted will not seep to the interior, thus leaving the greenhouse as clear as crystal. The canopy was gently masked and the framing painted in same manner as the turret Perspex. Finally the port and fuselage antennae were added. |COLORS & MARKINGS| The leading edge radar pod was painted light grey and masked. The canopy parts and bomb bay and wheel wells were also carefully masked. The kit was given an overall coat of ‘Compucolour’ Sea Blue. This was followed by fine sanding in wet and dry and again given the final coat. After the paint has dried the masking was removed and any touching up applied with a fine brush in the respective colour. Like many limited run kits the propeller blades were separate from the hub. The resin hub was drilled with shallow holes and the blade roots fixed in them using a tiny drop of super glue giving chance and holding each blade in correct angle until it take hold before moving to the next blade. I think this was the most tedious step that I have encountered and believe me you need patience to match the right blade angle for all the three. The blades were now painted black and the hub silver. A shaft added to simplify fitting it to the resin engine front, which was also drilled to take the propeller shaft. Prop was fitted in place. The decals are of good quality, quite thin but the white pigment is opaque. There are war and post war colour scheme options and I opted for a post war machine in which case the separate red insignia bars were added. I finished my Sea Wolf to represent one of 24 machines forming Torpedo Squadron VTY-154/155 that was established on the NAS Quonset Point naval base circa 1947-48. The kit comes with sharp white wing walkway lines and legends. Alternatively one can choose another overall sea blue Sea Wolf that served at the ATTDTU (Torpedo Development Unit) at the NAS Norfolk naval base which is also the last surviving Sea Wolf. The other choice fell on one based at Convair Field factory airfield, August 1944, which was in 3 tone Navy wartime markings. Finally the kit was given a coat of semi matt varnish of Revell brand. This was another interesting Pavla Models kit that comes with an appreciable amount of detail in resin. Not a kit to go about rushing with it but in the end it results into an interesting addition to the USN collection. Carmel J. Attard If you would like your product reviewed fairly and quickly by a site that has nearly 350,000 visitors a month, please contact me or see other details in the Note to Contributors. Back to the Main Page Back to the Review Index Page
<urn:uuid:07986208-c0e7-4d50-b17a-815fb1dcaf66>
CC-MAIN-2022-33
http://modelingmadness.com/review/allies/us/usn/attardtby.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573242.55/warc/CC-MAIN-20220818154820-20220818184820-00605.warc.gz
en
0.974351
2,120
2.53125
3
A team of international experts renowned for debunking several black hole discoveries have discovered a stellar-mass black hole in the Large Magellanic Cloud, a neighboring galaxy to ours. “For the first time, our team came together to report on the discovery of a black hole, rather than rejecting one,” said study leader Tomer Shenar. What’s more, they discovered that the star behind the black hole had disappeared without any signs of a powerful explosion. The discovery was made thanks to six years of observations obtained with the Very Large Telescope (VLT) of the European Southern Observatory (ESO). “We identified a ‘needle in a haystack,'” says Shenar who started the study at KU Leuven in Belgium. and is now a Marie Curie Fellow at the University of Amsterdam, the Netherlands. Although other similar black hole candidates[ have been] – https://www.eso.org/public/news/eso2116/ proposed, the team says it is the first “dormant” stellar-mass black hole to be unambiguously detected outside our galaxy. Stellar-mass black holes form when massive stars reach the end of their lives and collapse under their own gravity. In a binary, a system of two stars revolving around each other, this process leaves behind an orbiting black hole with a bright companion star. The black hole is “dormant” if it does not emit high levels of X-ray radiation, which is how such black holes are usually detected. “It’s incredible that we barely know about dormant black holes, given how much astronomers believe them to be,” says co-author Pablo Marchant of KU Leuven. The newly discovered black hole is at least nine times the mass of our Sun and orbits a hot blue star weighing 25 times the mass of the Sun. Dormant black holes are particularly difficult to spot because they interact little with their environment. “For more than two years now, we have been searching for such black hole binary systems,” says co-author Julia Bodensteiner, a researcher at ESO in Germany. “I was very excited when I heard about VFTS 243, which in my opinion is the most compelling candidate reported to date.” To find VFTS 243, the collaboration searched nearly 1,000 massive stars in the Tarantula Nebula region of the Large Magellanic Cloud, looking for any that might have black holes as companions. It is extremely difficult to identify these companions as black holes, since there are many alternative possibilities. “As a researcher who has [debunked] – https://www.eso.org/public/news/eso2204/ potential black holes in recent years, I was extremely skeptical of this discovery,” Shenar says. The skepticism was shared by co-author Kareem El-Badry of the Center for Astrophysics | Harvard & Smithsonian in the United States, which Shenar calls the “black hole destroyer”. “When Tomer asked me to double-check his findings, I had my doubts. But I couldn’t find a plausible explanation for the data that didn’t implicate a black hole,” says El-Badry. The discovery also allows the team to have a unique view of the processes that accompany the formation of black holes. Astronomers believe a stellar-mass black hole forms when the core of a dying massive star collapses, but whether or not this is accompanied by a powerful supernova explosion remains unclear. “The star that formed the black hole in VFTS 243 appears to have collapsed entirely, with no signs of a previous explosion,” Shenar says. “Evidence for this ‘direct collapse’ scenario has emerged recently, but our study provides arguably one of the most direct indications. This has huge implications for the origin of black hole mergers in the cosmos. The black hole in VFTS 243 was found using six years of observations of the Tarantula Nebula by the Wide Fiber Array Multi-Element Spectrograph ([FLAMES] – https://www.eso.org/public/teles-instr/paranal-observatory/vlt/vlt-instr/flames/ ) instrument on ESOs[ VLT] – https://www.eso.org/public/teles-instr/paranal-observatory/vlt/ . Despite the nickname “black hole police,” the team actively encourages scrutiny and hopes their work, published today in Nature Astronomy, will lead to the discovery of other stellar-mass black holes orbiting Earth. massive stars, thousands of which are expected to exist in the Milky Way and the Magellanic Clouds. “Of course, I expect others in the field to carefully consider our analysis and try to concoct alternative models,” concludes El-Badry. “It’s a very exciting project to be involved in.” The work was carried out in the team led by Hugues Sana at the Institute of Astronomy of KU Leuven. A separate study led by Laurent Mahy, involving several of the same team members and accepted for publication in Astronomy & Astrophysics, reports on another promising stellar-mass black hole candidate, in system HD 130298 in our own galaxy. , the Milky Way. The observations used in the study cover approximately six years: they consist of data[ VLT FLAMES Tarantula Survey] – https://www.eso.org/sci/publications/messenger/archive/no.145-sep11/messenger-no145-33-38.pdf (edited by Chris Evans, United Kingdom Astronomy Technology Centre, STFC, Royal Observatory , Edinburgh; now at the European Space Agency) obtained from 2008 and 2009, and additional data from the[ Tarantula Massive Binary Monitoring] – https://www.aanda.org/articles/aa/full_html/2017/02/aa29844-16/aa29844-16.html program (directed by Hugues Sana, KU Leuven), obtained between 2012 and 2014. This research was presented in an article titled “An X-ray quiet black hole born with a negligible kick in a massive binary of the Large Magellanic Cloud” to be published in Nature Astronomy (doi: 10.1038/s41550-022-01730-y) . The research leading to these results has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation program (grant agreement numbers 772225: MULTIPLE) (PI: Sana). The team is composed of T. Shenar (Institute of Astronomy, KU Leuven, Belgium [KU Leuven]; Anton Pannekoek Institute of Astronomy, University of Amsterdam, Amsterdam, Netherlands [API]), H. Sana (KU Leuven), L. Mahy (Royal Observatory of Belgium, Brussels, Belgium), K. El-Badry (Center for Astrophysics | Harvard & Smithsonian, Cambridge, USA [CfA]; Harvard Society of Fellows, Cambridge, USA; Max Planck Institute for Astronomy, Heidelberg, Germany [MPIA]), P. Marchant (KU Leuven), N. Langer (Argelander-Institut für Astronomie der Universität Bonn, Germany, Max Planck Institute for Radio Astronomy, Bonn, Germany [MPIfR]), C. Hawcroft (KU Leuven), M. Fabry (KU Leuven), K. Sen (Argelander-Institut für Astronomie der Universität Bonn, Germany, MPIfR), LA Almeida (Universidade Federal do Rio Grande do Norte, Natal, Brazil Universidade do Estado do Rio Grande do Norte, Mossoró, Brazil), M. Abdul-Masih (ESO, Santiago, Chile), J. Bodensteiner (ESO, Garching, Germany), P. Crowther (Department of Physics and Astronomy , University of Sheffield, UK), M. Gieles (ICREA, Barcelona, Spain; Institut de Ciències del Cosmos, Universitat de Barcelona, Barcelona, Spain), M. Gromadzki (Astronomical Observatory, University of Warsaw, Poland [Warsaw]), V. Henault-Brunet (Department of Astronomy and Physics, Saint Mary’s University, Halifax, Canada), A. Herrero (Instituto de Astrofísica de Canarias, Tenerife, Spain [IAC]; Department of Astrophysics, University of La Laguna, Tenerife, Spain [IAC-ULL]), A. de Koter (KU Leuven, API), P. Iwanek (Warsaw), S. Kozłowski (Warsaw), DJ Lennon (IAC, IAC-ULL), J. Maíz Apellániz (Centro de Astrobiología, CSIC-INTA, Madrid, Spain), P. Mróz (Warsaw), AFJ Moffat (Department of Physics and Institute for Research on Exoplanets, University of Montreal, Canada), A. Picco (KU Leuven), P. Pietrukowicz (Warsaw), R. Poleski (Warsaw), K. Rybicki (Warsaw and Department of Particle Physics and Astrophysics, Weizmann Institute of Science, Israel), FRN Schneider (Heidelberg Institute for Theoretical Studies, Heidelberg, Germany [HITS]; Astronomisches Rechen-Institut, Zentrum für Astronomie der Universität Heidelberg, Heidelberg, Germany), DM Skowron (Warsaw), J. Skowron (Warsaw), I. Soszyński (Warsaw), MK Szymański (Warsaw), S. Toonen (API), A. Udalski (Warsaw), K. Ulaczyk (Department of Physics, University of Warwick, UK), JS Vink (Armagh Observatory & Planetarium, UK) and M. Wrona (Warsaw). The European Southern Observatory (ESO) enables scientists around the world to uncover the secrets of the Universe for the benefit of all. We design, build and operate world-class field observatories – which astronomers use to address exciting questions and spread the fascination of astronomy – and promote international collaboration in astronomy. Created as an intergovernmental organization in 1962, ESO is today supported by 16 Member States (Austria, Belgium, Czech Republic, Denmark, France, Finland, Germany, Ireland, Italy, Netherlands, Poland, Portugal, Spain, Sweden, Switzerland and the United Kingdom), with the host state of Chile and with Australia as a strategic partner. ESO headquarters and its visitor center and planetarium, the ESO Supernova, are located near Munich in Germany, while the Chilean Atacama Desert, a wonderful place with unique conditions for observing the sky, hosts our telescopes. ESO operates three observation sites: La Silla, Paranal and Chajnantor. At Paranal, ESO operates the Very Large Telescope and its Very Large Telescope Interferometer, as well as two survey telescopes, VISTA working in infrared and the VLT Survey Telescope in visible light. Also at Paranal, ESO will host and operate the Cherenkov Telescope Array South, the largest and most sensitive gamma-ray observatory in the world. Together with international partners, ESO operates APEX and ALMA on Chajnantor, two facilities that observe the sky in the millimeter and submillimeter range. At Cerro Armazones, near Paranal, we are building “the world’s largest eye on the sky” — ESO’s Extremely Large Telescope. From our offices in Santiago, Chile, we support our operations in the country and engage with our partners and Chilean society. * [Research paper] – https://www.eso.org/public/archives/releases/sciencepapers/eso2210/eso2210a.pdf * [Photos of the VLT] – https://www.eso.org/public/images/archive/category/paranal/ * [For journalists: subscribe to receive our releases under embargo in your language] – https://www.eso.org/public/outreach/pressmedia/#epodpress_form * [For scientists: got a story? Pitch your research] – https://www.eso.org/sci/publications/announcements/sciann17463.html
<urn:uuid:943e3f6d-1f51-4894-aba7-b078bcf195e2>
CC-MAIN-2022-33
https://ngc891.com/black-hole-police-discover-a-dormant-black-hole-outside-our-galaxy/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00605.warc.gz
en
0.865709
2,724
3.625
4
Alpha-Gal (Mammalian Meat) Allergy: Implications for Pharmacists Alpha-gal, a mammalian oligosaccharide, has recently been implicated in delayed anaphylaxis reactions to mammalian meat. What Is Alpha-gal and Mammalian Meat Allergy? Alpha-gal (galactose-alpha-1,3-galactose), a mammalian oligosaccharide, has recently been implicated in delayed anaphylaxis reactions to mammalian meat. First described in 2009, the alpha-gal allergy (red meat or mammalian allergy) is a novel form of IgE-mediated anaphylaxis; unlike most anaphylaxis, this reaction is delayed. Individuals with high IgE titers to alpha-gal have experienced urticaria, angioedema, and anaphylaxis symptoms 3 to 6 hours after ingesting mammalian meat (beef, pork, lamb, venison, goat, and bison), which is rich in alpha-gal.1 Many animal by-products may contain the alpha-gal epitope. Animal by-products derived from turkey, chicken, and fish, however, do not.2 Whereas the alpha-gal epitope is also present in cat IgA, a monoclonal antibody found in cat dander, cat exposure has not been associated with allergic reactions. However, patients with the alpha-gal allergy have shown positive skin and blood tests to cat IgA.1 The alpha-gal allergy affects both children and adults.3 The severity of the allergy and the allergy itself may recede over time.1 Evolution of Alpha-gal Humans do not naturally produce alpha-gal epitopes, as the alpha-1,3-glycosyltransferase enzyme is inactivated in humans, old world monkeys, and apes. Other mammals, like new world monkeys, placental mammals, marsupials, and prosimians, however, produce alpha-gal and the enzyme. Humans produce IgG2 anti-gal naturally, which protects them against normal bacteria flora in the gut that produces the alpha-gal epitope.4 Patients with blood group B or AB have fewer anti-gal antibodies and therefore may be less likely to develop the mammalian meat allergy (or develop a milder reaction).5 Research suggests that exposure to the alpha-gal epitope in a tick bite may cause normal anti-gal antibody formation to switch from IgG2 to the IgE involved in the delayed anaphylaxis response to the specific types of mammalian meat previously mentioned.5,6 Prevalence and Location Experts estimates that thousands of Americans have the alpha-gal allergy,7 with a causal relationship between lone star tick bites and these anaphylactic reactions. Individuals bitten by lone star ticks can develop IgE antibodies to alpha-gal. The highest infestations of lone star ticks occur in the eastern states.8 To prevent anaphylaxis, affected patients should avoid any medication, supplements, foods, etc that may contain the alpha-gal epitope; this is their only treatment option. A comprehensive list of medications containing alpha-gal or animal by-products is unavailable at this time. Alpha-gal allergy testing is commercially available and requires a serum sample. As previously mentioned, many animal by-products may contain the alpha-gal epitope. Gelatin, derived from beef, is one .9 Animal-derived magnesium stearate is another. Cetuximab, a chimeric mouse—human IgG1 monoclonal antibody against epidermal growth factor receptor, contains the alpha-gal epitope in its Fab arm portion and has been known to cause the alpha-gal allergy.11 Additional medications, inactive ingredients, and procedures are also known to contain or utilize the alpha-gal epitope such as: - Creon 102 - Protein powders with whey2 - Xenograft surgery6 The issue with xenograft surgery has been resolved by using knock-out pigs lacking the alpha-gal epitope.4 To obtain information on animal by-product content, health care providers must contact manufacturers. Manufacturers do not currently report alpha-gal content in their package inserts or test for alpha-gal content in products. Inactive ingredient information can change at any time, and the FDA does not require manufacturers to disseminate this information. To prevent unnecessary exposure to alpha-gal, pharmacists should ensure that alpha-gal allergic patients avoid meat-containing medications. To provide timely patient care, alpha-gal information needs to be readily available, which is an area in which pharmacists can make an impact.10 Drug Information Service Contribution At an academic medical center, a patient with the alpha-gal allergy with allergic reactions to antihypertensive medications presented to an immunologist.12 The medications contained gelatin and magnesium stearate. The drug information service proceeded to create an alpha-gal content database to support the selection of an appropriate antihypertensive pharmacotherapy regimen for patients who have the alpha-gal allergy. Pharmacists contacted manufacturers with the broadest range of antihypertensive medications, and asked, “Do your products contain galactose-alpha-1,3-galactose, alpha-gal, mammalian meat, or any animal by-products?” No manufacturers tested for the presence of alpha-gal in their product, but animal by-product content was available. All manufacturers took more than 24 hours to respond, and some required 1 or more call-back attempts. Based on correspondence with manufacturers, the Table lists medications that do not contain animal by-products, suggesting they are alpha-gal-free. The drug information service continues to review and add medications to its database. It has reviewed hyperlipidemia medications, narcotics, and dermatologic creams to date. Table: Medications that Do Not Contain Animal By-products (per the manufacturer) Losartan potassium tablet, film coated Although alpha-gal content cannot be completely ruled out, products without animal by-products theoretically may be used to safely treat patients with a documented alpha-gal allergy. One limitation of this database is that manufacturers do not routinely test for alpha-gal, so definitive conclusions cannot be drawn. However, the lack of information is intrinsic to the subject matter and not a database flaw. The rising incidence and the serious nature of the alpha-gal allergy underscores the importance of properly managing patients. There is a need for more information on this topic. This database simplifies the task of verifying critical information and promotes timely decision making. The flexible design also allows for expansion to offer a complete reference. In the future, this database aims to compile all alpha-gal—related information into 1 central location for all medication classes.10 Pharmacists should be cognizant of patients presenting with anaphylaxis symptom, with a history of exposure to ticks and of consuming mammalian meats. The delay in symptom presentation may be attributed to the time required to digest meats. As pharmacists, knowing a patient’s full history will enhance recognition of the allergy. Resources for pharmacists include the Alpha-Gal Allergy Awareness Web site (www.alpha-gal.org). The Robert Wood Johnson University Hospital drug information service database is available for use by pharmacists by calling 732-937-8842. Additional research is required on the effect of alpha-gal in medications for patients with the alpha-gal allergy. Pharmacists, especially in the emergency department and ambulatory care settings who see patients with tick bites, should be aware of this allergy and medication’s potential to elicit symptoms. Indrani Kar, PharmD, is a drug information resident at the Ernest Mario School of Pharmacy at Rutgers University and Robert Wood Johnson University Hospital in New Brunswick, New Jersey. Min Gong is a PharmD candidate at Ernest Mario School of Pharmacy. Christine Muglia, MD, is a second-year internal medicine resident at Robert Wood Johnson Medical School. Catherine A. Monteleone, MD, is a professor of medicine at Robert Wood Johnson Medical School. Evelyn R. Hermes-DeSantis, PharmD, BCPS, is director, Drug Information Service, and a clinical professor, at Robert Wood Johnson University Hospital, Ernest Mario School of Pharmacy. - Commins SP, Platts-Mills TA. Delayed anaphylaxis to red meat in patients with IgE specific for galactose alpha-1,3-galactose (alpha-gal). Curr Allergy Asthma Res. 2013;13(1):72-77. doi: 10.1007/s11882-012-0315-y. - Alpha-gal basics. Alpha-Gal Allergy Awareness website. http://alpha-gal.org. Published 2014. January 9, 2015. - Kennedy JL, Stallings AP, Platts-Mills TA, et al. Galactose-α-1,3-galactose and delayed anaphylaxis, angioedema, and urticaria in children. Pediatrics. 2013;131(5):e1545-e1552. doi: 10.1542/peds.2012-2585. - Tanemura M, Miyoshi E, Nagano H, et al. Role of α-gal epitope/anti-Gal antibody reaction in immunotherapy and its clinical application in pancreatic cancer. Cancer Sci. 2013;104(3):282-290. doi: 10.1111/cas.12084. - Rispens T, Derksen NI, Commins SP, Platts-Mills TA, Aalberse RC. IgE production to α-gal is accompanied by elevated levels of specific IgG1 antibodies and low amounts of IgE to blood group B. PLos One. 2013;8(2):e55566. doi: 10.1371/journal.pone.0055566. - Galili U. Anti-gal: an abundant human natural antibody of multiple pathogeneses and clinical benefits. Immunology. 2013;140(1):1-11. doi: 10.1111/imm.12110. - Van Nunen S. Galactose-alpha-1,3-galactose, mammalian meat and anaphylaxis: a world-wide phenomenon? Curr Treat Options Allergy. 2014;1:262-277. - Stromdahl EY, Hickling GJ. Beyond lyme: aetiology of tick-borne human diseases with emphasis on the south-eastern United States. Zoonoses Public Health. 2012;59(suppl 2):48-64. doi: 10.1111/j.1863-2378.2012.01475.x. - Mullins RJ, James H, Platts-Mills TA, Commins S. The relationship between red meat allergy and sensitization to gelatin and galactose-alpha-1,3-galactose. J Allergy Clin Immunol. 2012;129(5):1334-1342.e1.. doi: 10.1016/j.jaci.2012.02.038. - Gong M, Kar I, Monteleone CA, Hermes-DeSantis ER. Database creation of alpha-gal content in medications for patient care. Poster presented at American Society of Hospital Pharmacists’ Midyear Clinical Meeting; December 9, 2014; Anaheim, CA. - Berg EA, Platts-Mills TA, Commins SP. Drug allergens and food — the cetuximab and galactose- α-1,3-galactose story. Ann Allergy Asthma Immunol. 2014;112(2):97-101. doi: 10.1016/j.anai.2013.11.014. - Muglia C, Kar I, Gong M, Hermes-DeSantis E, Monteleone C. Anaphylaxis to medications containing meat by-products in an alpha-gal sensitized individual. J Allergy Clin Immunol Pract. 2015; In process.
<urn:uuid:abbf84e4-a631-4ebf-8349-ccdc38c76bc1>
CC-MAIN-2022-33
https://www.pharmacytimes.com/view/alpha-gal-mammalian-meat-allergy-implications-for-pharmacists
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00203.warc.gz
en
0.854256
2,581
2.796875
3
The article is written by Harmanpreet Kaur from Amity University, Kolkata. The article will provide the importance of mental health in the purview of the Shikha Nishcal case. Mental illness is common, complex and costly. According to the reports of 2019 by the World Health Organization, about 800,000 people have committed suicide because of mental illness and instability in their mental health. Besides that, there are many more people who attempt to end their lives. Many people are affected by mental illness, and about 75 percent of the countries in the world are low-income countries that are unable to access the treatment people need, and most of them are in India. Reasons behind mental illness and disorders in India are associated with poverty and living in urban areas, depressive, neurotic, and stress-related disorders among women, and alcohol use disorders among men. With psychiatry’s long-standing relationship with mental health legislation, legislative reform has the potential to improve mental health services and, in many countries, including India, achieve a positive right to mental health and mental healthcare. Since the 1990s, there have been significant reforms in this direction concerning the UN Convention on the Rights of Persons with Disabilities (CRPD),2008. Considering this, it was apparent that mental health and disability legislation in many nations needed to be modernized. Concerning the convention, India introduced reforms related to mental health by introducing India’s Rights of Persons with Disabilities Act, 2016, and Mental Healthcare Act, 2017. Physical health has always been prioritized over mental health. Mental health is a concern for everyone. It affects the person’s ability to cope with and manage change, life events, and transitions. Every human being has the right to proper mental health care needs. Mental health should not be different from physical health and should be taken care of at the same level as that of physical health and thus there should be provisions for mental health in the health insurance schemes. The article will talk about the importance of mental health for following compliance with the UN Convention on the Rights of Persons with Disabilities (CRPD), 2008. The legislation was enacted with the goal of providing individuals with mental health care and services without discrimination based on gender or financial consideration and also provide protection, promotion and fulfill the rights of the citizens suffering from any kind of mental instability or illness, thereby providing them with adequate mental health care facilities and services. The Act has been enacted complying with the basic principles of equality, justice, and fairness for every section of society. It has included some of the provisions like prohibiting sterilization that could be a reason for mental health-related issues, has decriminalized suicide and has promoted community-based treatment, and has also prescribed responsibilities to the agencies and the police officers in respect of mental illness of the persons. Health insurance can be referred to as the insurance that provides financial protection against any loss or harm to an individual for their future expenditures. It is a written agreement between the parties that is referred to as the health policy which promises to pay a specific amount of money to the individual if faced with any undesirable events including health. Health financing can be provided to the citizens either through government, state, or private health insurance, thus forming a crucial element for universal access and coverage. Mental health insurance – a part of the health insurance policy The health insurance schemes did not specifically cover the insurance policies for mental illness, mental disorder, or any problem related to psychiatric conditions. Thus, the non-coverage of the mental services under the health insurance schemes remained a glaring exception to mental health. The issue of including mental health in the health insurance policies was realized because such exclusion amounted to discrimination against vulnerable mental health consumers and also because the cases of mental illness were on the rise in the country. So, the first step towards its inclusion in the health policies was taken by the Ministry of Health by conducting a special meeting of the Central Mental Health Authority (CMHA) in February 2010, stating that mental health should be considered a part of health insurance for the welfare of the people suffering from mental instability. Further, the draft for Mental Health Care Act was introduced in 2013 and included a special emphasis on private and public insurance concerning mental health. The bill received assent, and finally, the Mental Health Care Act of 2017 was introduced in India. The Mental Health Care Act of 2017 has mandated the inclusion of mental illness and other mental disorders under the scheme of health insurance policies. Section 21(4) of the Act states that it is the responsibility of every health policy insurer whether private or public to include within the ambit of health insurance policy, the insurance related to mentally disabled persons if any or to make a provision in medical insurance for the treatment of mental illness, as has been provided for the treatment of any physical disability. Mental health insurance policies - Private health insurance scheme The private health insurance scheme is the type of insurance provided by the private companies wherein the individual is asked to pay a considerable amount of money at fixed intervals to the company, which could be utilized if there is any case of health problems or any harm or loss. According to the recent orders by the Insurance Regulatory and Development Authority of India (IRDAI), it has been directed to include mental illness and other mental disorders under the health insurance policies. - Public health insurance scheme The public health insurance scheme is the type of insurance that has been introduced by the government that aims at providing health insurance to the various sections of society, mostly the underprivileged and the vulnerable classes. These are the payments that are financed through taxes and do not require a premium or any kind of beneficiaries from the individuals. - Mediclaim policy The policy was started in 1986. It provides for hospitalization expenditures incurred by the insured owing to illness or any kind of accident. The government has exempted the premium paid by the individuals from their taxable incomes, though entire premium accounts are not exempted. The policy covers only health-related expenses and accidents. The case of Shikha Nishcal v. NICL, 2021 The case states that the health insurance policies should comply with the provisions of the Mental Health Care Act of 2017 and include all the expenses related to mental illness under the ambit of health insurance policies. Facts of the case In this case, the petitioner Shikha Nishcal was acquiring health insurance policies from the National Insurance Company Limited in 2016 in case of any harm or loss to her. She purchased the last medical healthcare policy named national Mediclaim policy in May 2020 which was valid for one year. In June 2020, she was diagnosed with Schizoaffective Disorder, a kind of mental illness. The treatment from the hospital incurred her an expense of about five lakhs. She claimed reimbursement from the National Insurance Company Limited as per their healthcare policy, which provided for all the expenses related to hospitalization if faced with any kind of suffering. The company rejected her claim stating that it is not liable to pay for expenses in case of any mental disorder or illness. The contention of parties to the case Petitioner’s claim against the National Insurance Company limited - The petitioner filed a complaint before the Insurance Ombudsman stating that the company should comply with the provisions of Section 21(4) of the Mental Health Care Act of 2017 and provide the petitioner with all the expenses that she incurred during her treatment and that the mental illness should be treated in the same way as that of the physical illness. - The petitioner filed a writ petition under Article 226 of the Constitution of India against the National Insurance Company Limited in the High Court of Delhi stating that the mental illness should be covered under the health insurance policies by the National Insurance Company Limited in compliance with Section 21(4) of the Mental Health Care Act of 2017. Respondent‘s claim against the contentions The respondent stated in its plea before the Insurance Ombudsman, that the company had paid the expenses of 3 lakhs to the petitioner and the maximum amount of 5 lakhs could not be paid as it was not mentioned in the policy. Findings of the Court The Delhi High Court held that all the insurance companies should include the provision of mental health within their ambit and they should provide all the expenses to the persons suffering from any mental illness or disorder. - Violation of Article 25 of the United Nations Convention on Rights of People with Disabilities Article 25 of the United Nations Convention on Rights of People with Disabilities was violated, which states that there should be no discrimination against persons with mental illness and it should be the responsibility of the states to keep a check on the insurance companies that they are acting fairly and reasonably in providing insurance to the people with both physical and mental illness. - Violation of Section 21 of the Mental Healthcare Act, 2017 Section 21 of the act states that: - Mental illness should be treated in the same ways as physical illness. - There should not be any kind of discrimination in terms of age, gender, sexual orientation, or any kind of disability. - Persons suffering from any kind of mental illness or disorder should be provided with the use of ambulances, equal living conditions in health establishments and are liable for every kind of health service. - The insurers should have a provision for the treatment of mental illness by providing medical insurance in terms of mental health. Thus, after analyzing the sections and conventions, the Court held that: - Equal protection should be extended to persons suffering from mental illness in the same way as that of physical illnesses. - It stated it is the function of the Insurance Regulatory and Development Authority of India to ensure that the laws enacted for the policymakers are compiled by the health insurance companies and with the provisions of Section 21(4) of the Act. - Rejected the order of the Insurance Ombudsman as it was contrary to the provisions of the Act and recognized the rights of the petitioner. Realizing the importance of mental health Mental health and mental illness are determined by the social, psychological, and biological factors, just as the way physical health and illness. There are indicators that have posed a threat to developed and developing countries. A few of these indicators are poverty, low levels of education, poor housing facilities, and income. - Mental health is linked to behavioral patterns that intensify effects on behavior and well-being. - Physical health and mental health are related to each other in close proximity, as the poor mental well-being of a person can lead to various physical diseases. - Mental ill-health can lead to social problems like unemployment, poverty, drug abuse, and economic problems. Problems faced in the implementation of the Mental Healthcare Act, 2017 Despite the introduction of the Mental Health Care Act of 2017, there are reasons why the Act’s policies are not implemented. They are: - Many state governments have still not established Mental Health Authority and Mental Health Review Boards, which play a crucial role in the implementation of the Act. - The Act faces the challenge for its speedy and effective implementation. - There has been a lack of political commitments at the bureaucratic level in addressing mental health as a legitimate health concern at par with physical health. - There is poor intersectoral coordination between different government departments and an inadequate trained mental health workforce. - The legislation has faced judicial scrutiny in matters of public interest for adjudicating important questions on constitutionalism and monitoring the implementation of the Act. There is no logical reasoning to exclude mental illness from the realm of health insurance policies and schemes. The Mental Health Care Act, 2017 is a welcome step in ensuring medical health that would enhance accessibility, affordability, and mental health care services. Mental health should be considered a priority, in the same way, that physical health. The medical health insurance schemes would protect people from any kind of mental illness and would act as a shield for the poor and marginalized sections that face financial risks. LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:
<urn:uuid:32d719d9-fcf9-4a13-a595-2c81dd19407e>
CC-MAIN-2022-33
https://blog.ipleaders.in/an-analysis-of-insurance-policies-and-their-inclusivity-towards-mental-health-in-light-of-the-case-of-shikha-nishcal-v-nicl/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00603.warc.gz
en
0.955034
2,682
3.59375
4
As anyone will notice who reads them, the Psalms are alive with human emotion, including not only peace, love, joy, and worship, but also anger, wrath, vengeance, and judgment. Many of the psalms were written in the midst of or in the aftermath of life-changing experiences. Many include annotations at their beginning explaining the circumstances that inspired the psalm. The first of these, Psalm 3, begins, “A psalm of David, when he fled from Absalom his son.” This article is the first in a series of articles looking into this psalm. (Visit this link to hear a song based on Psalm 3 by The Brooklyn Tabernacle Choir.) Before talking about Psalm 3, we need a bit of historical background to bring the story to life. The first part of that background deals with the infamous story of David and Bathsheba. If the story is unfamiliar, let me encourage you to read or review the story in the Bible in 2 Samuel 11:1-12:25. David was King of the nation of Israel. While his soldiers went off to fight a war, David stayed behind at the palace. While walking on the roof of the palace, he looked down on the roof of a neighboring house that belonged to one of his most trusted soldiers, Uriah. There, on the roof, was Uriah’s wife, Bathsheba, taking a bath. David lusted after her, sent someone to bring Bathsheba to the palace, and the rest is history. David conspired to have Uriah killed during a battle, then took Bathsheba as his own wife. Rest assured that, even though he was king, David did not get away with his crimes. At the risk of his own life, the prophet, Nathan, publicly called David out for his sins. Even though David confessed, repented, and was forgiven, there were still consequences of his decisions and judgments to follow, leaving indelible scars as reminders. In 2 Samuel, the prophet Nathan reported the words of the Lord to David… 2 Sam 12:10 Now therefore the sword shall never depart from your house, because you have despised me and have taken the wife of Uriah the Hittite to be your wife. 11 Thus says the LORD, “Behold, I will raise up evil against you out of your own house. And I will take your wives before your eyes and give them to your neighbor, and he shall lie with your wives in the sight of this sun. 12 For you did it secretly, but I will do this thing before all Israel and before the sun.” 13 David said to Nathan, “I have sinned against the LORD.” (cf. Psalm 51) And Nathan said to David, “The LORD also has put away your sin; you shall not die. 14 Nevertheless, because by this deed you have utterly scorned the LORD, the child who is born to you shall die.” The baby that was born from the adulterous union of David and Bathsheba died soon after birth as a result of the judgment of God. But there is an even more ominous warning in verse 11 that eventually leads to the text for today in Psalm 3, “Thus says the LORD, ‘Behold, I will raise up evil against you out of your own house.’” This warning leads to the second part of the historical background to Psalm 3. Verse 11 refers to the war that follows between King David and his son, Absalom. You can read the whole sad story in 2 Samuel 13-18. David had many wives and concubines. His fourth wife was named Maacah, a princess, the daughter of a king. By her, David became father to Absalom and Tamar. The Bible says that Tamar was beautiful, but it says of Absalom that there he was the most handsome man in all of Israel. (2 Samuel 14:25) When Tamar became a young woman, Amnon, David’s oldest son through his first wife, Ahinoam, and therefore half-brother to Absalom and Tamar, following in his father’s footsteps, allowed his lustful passions to overrule his self-control. The Bible says that he fell sick with his love for Tamar. His problem was not love, but lust. Through a conspiracy worked out by a first cousin, Jonadab, the son of David’s brother, Shimeah, Amnon tricked Tamar into coming into his house, pretending to be sick and calling upon Tamar to be his nursemaid. After excusing all of his servants, Amnon sexually assaulted Tamar. Immediately after, his lust now turned to disgust, Amnon threw Tamar out into the street in dishonor. When David found out about the assault, he was angry with Amnon, but he supposedly loved him so much, that he did nothing to punish Amnon. Such a disgrace overlooked by their father caused Absalom to seek his own revenge. Two years later, Absalom conspired with his own servants to have them murder Amnon at a feast Absalom hosted for all of David’s sons. To escape punishment, Absalom fled to the home of his maternal grandfather, the king of Geshur. Once again, instead of disciplining Absalom for his crime, the Bible says that David mourned for Absalom every day that they were apart. Absalom lived in Geshur for three years until David’s Commander in Chief of the Armies, Joab (who was also David’s nephew, the son of David’s sister, Zeruiah, and Absalom’s first cousin), convinced David to reconcile with Absalom and allow him to come home. David had already forgiven Absalom and loved him so much that he agreed. The only stipulation was that Absalom could not come to the palace or see David face-to-face. For two more years, they lived apart until once again, Joab interceded and convinced David to allow Absalom to come to the palace. The two reconciled, but Absalom was not satisfied with his position. The Bible says that by this time in his life, Absalom had three sons and a daughter, Tamar, named after his sister. Absalom was the most exceptionally handsome, but his crowning beauty was his hair. Apparently it was long and luxurious and the envy of every woman in town. Absalom only cut his hair once a year, and then only because it became so heavy. Each year, after it was cut, Absalom would weigh his hair. The Bible says that it weighed somewhere around five pounds. Absalom took advantage of his royal position and his good looks and began to work a conspiracy to take the throne of Israel from his father David. He assembled support from all over Israel, including those who served David in the palace. He also assembled a great army and, on a set day, had himself declare king over Israel in his father’s old capital of Hebron. By the time David got word that the conspiracy had broken out, the only thing he could do was flee for his life from the palace in Jerusalem. And so we see David, fleeing out the Eastern Gate of the city, crossing over the Kidron Valley into the wilderness and the darkness of night with his entire household, except for ten concubines left behind to take care of the palace. This is the picture of the scene as we come to verse 1 of Psalm 3, a picture of David, the humbled king of Israel, as he “…walked up the road to the Mount of Olives, weeping as he went. “His head was covered and his feet were bare as a sign of mourning. And the people who were with him covered their heads and wept as they climbed the hill.” And thus we come to Psalm 3, verse 1, where we hear David call out to the Lord through his tears… Psalms 3:1 Lord, how they have increased who trouble me! Many are they who rise up against me. (NKJV) While David and his entourage are escaping, Absalom with an army of tens of thousands rapidly closes in on the city of Jerusalem. At the moment, David does not know how bad things might be. He does not know the extent of the rebellion or if his kingdom can ever be restored. In his flight, David finds little to give him peace along the pathway to safety. Psalms 3:2 Many are they who say of me, “There is no help for him in God.” (NKJV) As the refugees came down off the Mount of Olives, they passed by the village of Bahurim, where a man named Shimei, who was a relative of the former King Saul, assaulted David and his followers with stones and shouting loud curses, referring to King David as a man of blood, a murderer, and a scoundrel. Shimei, himself a member of the tribe of Benjamin, also the tribe of King Saul, shouted out to David, “The Lord is paying you back for stealing the throne of Saul and for all the blood you have shed.” This only added anguish to the pain David was already experiencing from the rebellion of his son and the escape of his family, prompting him to add in verse two… All of us have been in situations where we could see very little hope of resolution. When we are caught up in adversity, we often find it a struggle to keep our focus on the purpose of God and the love of God. When we are in such straits, what we need is for someone to come along side of us and to encourage us. What could be more damaging to our faith than to have someone tell us that God no longer cares for us and that there is no hope that God will intervene on our behalf? Yet as downcast and as discouraged as David may have been, he did not despair. He did not doubt. And he did not forget that the God of Israel is a God of grace and mercy who will not forsake His people. And so we hear David pray in verse three… Psalms 3:3 But thou, O Lord, are a shield for me; my glory, and the lifter up of my head. (KJV) In the midst of one of the worst moments of his life, David did not forget who God truly is. You, O Lord, are a shield to me… David called out to God – not just any god, but to Yahweh – Jehovah – the proper name of the God of Israel, Creator of heaven and earth. He called out to the great I AM who revealed himself to Moses, who led the nation of Israel out of captivity, and who established David’s throne forever. He remembered the God of redemption, the God of hope and comfort and deliverance. David recognized God as his shield. This word “shield” refers to more than just a barrier to ward off a sword or spear. It means to cover or surround. David knew that God was more than the One who went before him, but that God was all around him, surrounding him as a fortress. In 2 Samuel 21, David and his warriors engage in battles against the giants of Philistia, relatives and relations of Goliath. In one encounter, David collapsed from exhaustion while fighting against one of Goliath’s sons. When he staggers and falls, his nephew, Abishai, the brother of Joab, stepped in and killed the giant. 2 Samuel 22:2 The Lord is my rock and my fortress and my deliverer, 3 my God, my rock, in whom I take refuge, my shield, and the horn of my salvation… On several occations, the Bible refers to God as our shield. Twelve of those occasions can be found in the Psalms, where the word is also translated “defense.” Psalms 5:12 For you bless the righteous, O LORD; you cover him with favor as with a shield. Psalms 28:7 The LORD is my strength and my shield; in him my heart trusts, and I am helped; my heart exults, and with my song I give thanks to him. Proverbs 30:5 Every word of God proves true; he is a shield to those who take refuge in him. All of us have been through adversity. Some of us may be facing an adversity as we speak. Certainly, all of us can know that we will face adversity at some time in the future. In fact, I believe that most of us realize that our country is in the midst of one of the greatest crises it has faced since the Cold War of the 1960’s and 1970’s. What will be our response when adversity and persecution become our own personal burden to bear? Will we yield to the temptation of Satan to curse God or to question God, or will we, like David, sing a hymn of assurance that God is our strong deliverer? If you are a Christian, one thing you can be certain of – Satan has your number, and he is out to kill you. Listen to this warning from the Apostle Peter… 1 Peter 5:8 Be alert and of sober mind. Your enemy the devil prowls around like a roaring lion looking for someone to devour. 9 Resist him, standing firm in the faith (NIV) And remember Paul’s words from… Ephesians 6: 11 Put on the full armor of God, so that you can take your stand against the devil’s schemes. 12 For our struggle is not against flesh and blood, but against the rulers, against the authorities, against the powers of this dark world and against the spiritual forces of evil in the heavenly realms… 16 …take up the shield of faith, with which you can extinguish all the flaming arrows of the evil one. (NIV) David knew that, even in his darkest hour, God still cared for him and was still guarding him as a shield. David believed in God. - He believed in the person and the power and the promises of God - He believed in the grace and the mercy and the longsuffering of God - He believed in God as his refuge, his strong tower, his fortress and his refuge All who are members of the family of God are called to follow after David in the belief that, even in the midst of the worst trials of life, God does not falter or fail. All people are called to believe in the name of the Savior, Jesus Christ, who came… - to destroy the works of the devil - to deliver us from the wrath of God - to die on an old rugged cross to pay the penalty of sin so that we might have everlasting life - and to make a way for us to be held in the everlasting arms of our holy, righteous, and sovereign God, even when our world seems to be crashing down around us.
<urn:uuid:c596709c-ace0-460d-9fd4-00fc4e8ae561>
CC-MAIN-2022-33
https://pastordanspost.com/2020/07/03/the-lord-our-shield-psalm-31-3/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00404.warc.gz
en
0.982368
3,202
3
3
Leading with authenticity and connectivity The interplay between two our fundamental human needs: Need for attachment and our need for autonomy. Life is a growth journey. All of us have started life from a point of complete vulnerability: As infants, we cannot take care of ourselves and are fully dependent on our caretakers. To what extent our needs are met during this early stage of life has a lasting impact on our relationships – whether we feel we can trust others, whether we perceive relationships as a supportive or threatening. As we grow up, we grow our capabilities, and our desire for autonomy increases. We are able to take care of ourselves and want to stand on our own two feet. Attachment and autonomy are two fundamental human needs. How we express these needs through our lifetime shapes who we become, and how we interact and lead. Basic human needs: attachment and autonomy Compared to animals, it takes a very long time for human children to become fully independent. That’s why, from an evolutionary perspective, caring emerged as a fundamental human need. Parents care about their children, and children are attached to their parents – this is how children can survive. Attachment is a basic human need – none of us are able to survive without relationships. This biological need to bond with others allowed humans to protect each other against threats, collaborate, and form communities. In many ways, the human need for attachment is the basis of our civilization. The other side of the coin is our need for autonomy. As our capabilities grow, we want to express ourselves, grow our skills, explore, and take care of our own lives. In middle and late childhood, children are slowly granted more freedom over their decisions, and teenagers usually long for greater independence. We all want to become self-reliant. When this happens, we get a sense of fulfillment. Our need for autonomy may evolve into the desire to shape our environment and contribute to a bigger purpose. Attachment and autonomy are like two legs that we stand on. Thriving requires fulfilment of both our need to be connected and our desire to be our authentic selves. But the circumstances of our lives can jeopardize this. Some children never experience truly being cared for – they are forced to stand on their own two feet way too early in life. Others have been forced to “fit in” and have never been encouraged to develop their own authentic selves. The life lessons we extract from our experiences will end up determining how we bond and understand any kind of relationship later on in life, as well as how we express our autonomy. For leaders, understanding how we relate to others and how we express our autonomy is crucially important. We might unconsciously replicate relationship dynamics we have learned in the past. Recognizing these patterns enables us to lead consciously. I will share three stories of leaders to demonstrate how life shapes how we act and lead. These stories are fictional – a blend of stories that I have encountered as a facilitator and coach. Story 1: Against all odds Our first leader grew up in a hostile family environment. He was the second, unplanned child and from his earliest memories, he was overlooked in favor of his older brother. His parents were struggling with life and devoted the little time and attention they could afford to his older brother – his brother was expected to do well, while he was neglected. He did not receive much love or support and had to fight for everything he ever received. Amazingly, the hostile environment in which he grew up, caused him to develop an incredibly strong drive and unique capabilities. He learned not to rely on others, but instead became self-sufficient early on as a child. He worked hard to grow his own skills and shaped his life in a very deliberate way. Not surprisingly, when he entered the work environment, people admired him for his willingness to take ownership, his work ethic and endurance, and his courage to address difficult topics. He moved up the ranks easily and was very successful in any role he took on. Nevertheless, he was acutely aware that something was missing: his own happiness. Deep down, even though he was wildly successful, he always felt alone. He felt he could not really trust anyone. When eventually he started working with a boss who made life difficult for him, his deep mistrust was triggered and confirmed. He felt he could trust no one and started to increasingly withdraw from interactions and relationships. He felt that he could only trust himself. As he was reflecting on his life experiences, he understood that he was over-relying on his autonomy – not because he wanted to, but because he had to from a very early stage in life. Growth for him meant that he wanted to learn to deepen relationships and start to trust people. This was initially very difficult for him – he had to overcome a deep-rooted fear to be hurt or passed over. As he did this, he learned that there were people who he could trust and on whom he could rely, and he eventually started to share the burden of leadership with his team. He kept his courage and his independent thinking, but at the same time became a more inclusive leader who provided more space for others. He stopped over-relying on his need for autonomy and brought more connectedness into his life. This made him happier, but it also made him a more effective leader. Story II: Competing for love Another leader grew up in a family where life was all about being successful. Her parents were successful entrepreneurs who delegated raising their only child to professional caretakers – they were too busy to attend to their child. Love from her parents was contingent on her showing extraordinary performance – as a young adult, this leader found herself under intense pressure to be extraordinary, to prove to her parents that she could follow in their footsteps. She soon found herself in professional sports, practicing more than 8 hours a day. She developed an extremely competitive profile and from her early childhood, life was a competition for her. Entering the corporate world, people appreciated her steady work ethic, her drive and tenacity. She quickly moved up and whatever project or role she took on, she performed incredibly well. But there was a downside: for her, everything was about winning and losing. She also approached relationships with colleagues as a competition. Whenever she was part of a team, others felt suppressed and sidelined – she always needed to show that she was the best, and she always expected to get more rewards than others. At one point, her career came to a standstill, as the organization realized that although she performed really well individually, she created and aggravated conflict with peers and had a negative influence on the performance of the team and the broader organization. She was denied a promotion and increasingly received signals from the organization that no matter how hard she worked, she was not seen as someone with potential for more responsible roles. This pushed her into an existential threat situation – she had to face the hard truth that although she pushed herself beyond her limits, she was seen as damaging others’ growth and performance. Her career had come to a standstill. She realized that the absoluteness of her competitive drive was instilled into her during her childhood – winning was the only way for the child to receive love, attention, and respect. Once she saw how things connected, she was able to step back and re-organize her life. She gave herself and others more space to breathe, restored balance into her family life, and spent more time understanding others’ needs. Doing so required her to confront her deep-rooted fear of not being “good enough”, not measuring up to others’ expectations. Confronting this fear enabled her to move from a “me first” to an “us together” approach. It also enabled her to stop pushing for her own advancement and recognition and instead put her extensive skills and experience to work in service of the organization. Story III: Finding myself Another leader grew up in a troubled family setting. Her mother had experienced a difficult childhood and always seemed fragile and vulnerable, in need of protection. Her father spent most of his time at work and was not very present. As the oldest child with two younger siblings, she felt responsible for her siblings, acting like a mother to them. During school years, the brothers struggled quite a bit and the attention of the family was always on the them. While she was still young herself, she personally took on the responsibility to help them overcome their struggles and grow up. As a result, she developed a self-sacrificing approach to life. She always focused on others’ needs and emotions, – her mother, her bothers – and put her own needs last. She was busy sensing others’ needs and emotions and worked in a diligent manner to make everyone safe and happy. She was always the shoulder that others cried on. When she entered the business world, she quickly became the “go to” person for others, no matter which role she took. Her caring, mindful, and selfless approach made her many friends and brought her into highly responsible roles. However, as the complexity of her work increased, she over-extended herself, working extreme hours and going beyond her limits. She also realized that while making everyone else happy, she lost herself. When her team had to face an important transformation, many employees reacted with resistance. And in trying to make everyone happy, she found herself unable to put her foot down and provide a clear direction to her team. She realized it was time for her to change her approach. She needed to get frank with her team. She explained that the transformation was taking place, why it was happening and what was expected of them. She sought feedback and actively invited contribution, but her stance was strong. To be able to do so, she had to confront her fear of damaging relationships, the fear of not being liked by others, the fear of not being useful. Turns out, her employees had needed that sort of clarity, and the transformation was well-received in the end. This change was possible because this leader realized that she was never given the opportunity to develop her own autonomy. Her growth journey implied listening to her own needs, developing self-compassion, finding her voice, and learning to express herself in a clear and honest manner. She also learned to set boundaries and strive for balanced relationships. She had to grow her autonomy and learn not to be absorbed by others. Today, she is still a very caring and empathetic leader, but she is also able to state her position and set clear boundaries. This enabled her to achieve more balance in her life while improving her leadership impact. A quote by Abraham Maslow says, “you cannot choose wisely for a life unless you dare to listen to yourself, your own self, at each moment of your life.” If we want to grow to our full potential, we must look in the rearview mirror. We must reflect on our own growth journey with acceptance and compassion and recognize how our life experiences have shaped us. This process of deep introspection enables us to understand our autopilots and gain inner freedom and choice. For those of us who tend to over-emphasize autonomy over attachment, growth implies letting go of our strong need for control and achievement. It often means confronting the fear of not being successful, respected, recognized. It implies recognizing that we are good enough. This process of letting go enables us to step back from needing to protect our ego and lead from a place of authenticity. It enables us to let go of the need to defend and position ourselves and instead connect to our deeper self. Letting go of our own need for control also opens us up to listen and truly take in the needs of others. When we realize that we over-emphasize attachment over autonomy, we need to face up to the fact that we are neglecting our own needs, always trying to meet others’ expectations, putting others first. Growth implies developing compassion, caring, and nurturing for ourselves, embracing our own needs, and expressing ourselves with full authenticity. We need to stop walking on eggshells and let go of the fear of damaging relationships or making others unhappy. Sharing openly what we truly believe in enables us to build honest and balanced relationships. Life is a never-ending growth journey that challenges us to balance our two fundamental human needs: the need to be deeply connected to others and the need to develop our authentic selves. In times when we notice that we are either not being ourselves or that we are disconnecting from others, we are challenged to reflect and re-balance consciously. (Written with the support of Inés Escobar Borruel)
<urn:uuid:4fff57a4-2f0b-4b90-a31b-263d33a96992>
CC-MAIN-2022-33
https://breakthroughs.atrain.com/leading-with-authenticity-and-connectivity
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00205.warc.gz
en
0.987923
2,610
2.6875
3
Reviewed by William E. Pemberton (University of Wisconsin-La Crosse) Published on H-Pol (December, 1997) Richard Nixon called psychobiography "pure baloney," (p. 143) and many scholars agree with him. At a 1987 conference on the presidency, Wilbur Cohen, who had served in every presidential administration since Herbert Hoover, told the group: "To be President, you need to have a good mother. The father doesn't matter. You need a good mother" (p. 143). The audience burst out laughing. The authors of this psychoanalytic biography believe that Cohen was on the right track. They argue that psychoanalytic understanding of Nixon, or any president, is necessary to fully comprehend his administration: "A person's actions, decisions, style, and speeches are all influenced by...unconscious drives and defenses against them, by personality organization, and by intelligence and physical condition. Social, legal, military, economic, and historical factors must, of course, be taken into account, in order to see how one's internal world intertwines with external realities" (p. 144). Vamik Volkan is a psychoanalyst and specialist in the psychology of international relations; Norman Itzkowitz is a historian with psychoanalytic training; Andrew Dod, a former student of Itzkowitz, conducted interviews with Nixon associates and acted as a catalyst to get this study underway. Volkan and Itzkowitz collaborated on two earlier books, including a psychobiography of Mustafa Kemal Ataturk. Nixon's mental processes have attracted psychologically informed studies by, among others, Fawn Brodie, Bruce Mazlish, Blema Steinberg, and James D. Barber and psychologically perceptive biographies by Stephen Ambrose and Garry Wills. Nixon's own writings and interviews often contained intriguing psychological insights, as did those of such close Nixon associates as H. R. Haldeman, Henry Kissinger, and John Ehrlichman. Despite the interest in Nixon's psychology, Volkan, Itzkowitz, and Dod have provided the first detailed psychoanalytic biography. It uses technical psychoanalytic concepts and terminology but is written for the general reader, with most technical discussion relegated to the footnotes. Nixon prided himself on the cold rationalism he brought to the problem of engineering detente with the Soviet Union or of normalizing relations with China. Yet he also made disastrous miscalculations, such as spreading the Vietnamese War into Cambodia and Laos. He had the 1972 election easily won, but his paranoia set a tone that led to the Watergate break-in and to his politically fatal participation in the coverup that destroyed his presidency. The authors find a pattern of Nixon's undoing his triumphs by seeking defeat. They search for a "psychic truth" (p. 4) created by his unconscious demands that help explain both his successes and his self-destructiveness. The authors briefly--the entire book amounts to about 150 pages of text--sketch Nixon's life, paying particular attention to his early years. His father, Frank Nixon, was a restless, frustrated, and angry man, a mean-spirited person who psychologically abused his five sons and sometimes beat them. Richard's mother, Hannah Milhous, a devout Quaker, was quiet, honest, industrious, but also reserved, private, and unemotional. Their second son, Richard, born in 1913, entered the Nixon household at a particularly tense time, just after Frank uprooted Hannah from her Quaker community and tight-knit family in Whittier, California, and moved her to nearby Yorba Linda, where he bought a lemon orchard. The move was financially disastrous and subjected Hannah to anxiety and depression. Richard Nixon did not receive "good enough mothering" --a key term in the authors' analysis--not because of any particular failure on Hannah's part but due to the family's circumstances. Hannah had three sons born from 1909 to 1914, took in and nursed her sister's son six months after Richard was born, was hospitalized for a serious operation followed by a long recovery, leaving Richard without his mother at a particularly vulnerable time in his development. During his early life, Richard lived with his relatives at various times, had two brothers die, and had his mother leave home for two years to be with one of his brothers who was dying in Arizona of tuberculosis. This emotional upheaval was taking place in a family wracked by economic insecurity and headed by an angry and abusive father. In these circumstances, "The foundation of Richard's personality was laid down: overtly, he depended in an exaggerated manner on self-reliance, intellectualism and self-adulation; covertly, he would remain a child of deprivation and physical abuse" (p. 35). The authors go on to sketch Nixon's rise to power. He was an intense, driven young man, who, although a loner, took leadership in every setting he entered. He compiled an outstanding record in college and law school, married his attractive and popular wife, Pat, achieved success in law practice and the navy, and rose quickly after WWII to national prominence, first in the House of Representatives, then the Senate, followed by the vice presidency under Dwight Eisenhower. His defeats in the 1960 presidential election and in the 1962 California gubernatorial election revealed another aspect of his personality: his unwillingness--perhaps inability--to accept defeat. The authors find that the key aspect of Nixon's early development was the creation of his narcissistic personality, which shaped his later life and career. Healthy narcissism is the foundation for self-esteem and balances independence with dependence on others. But a narcissistic personality is maladaptive and contradictory. On the one hand it consists of an overt grandiose self and on the other a hidden hungry self that is dependent on other people. The grandiose self must be protected at all costs, and, when it is not, the resulting feeling of humiliation leads to rage, envy, and paranoia. "With Richard Nixon," the authors write, "we see exaggerated narcissism....Nixon organized his personality at such a level that he had an exaggerated need to be 'number one' in his own eyes as wel1 as in the eyes of others, to maintain his self-esteem and to avoid the anxiety of acknowledging his 'hungry self'" (p. 91). These needs can be seen in his drive to collect titles and offices from his high school days on, his need for applause, his obsession with racking up historical "firsts," his bending truth to maintain his grandiose self, his collecting of White House tapes (useful for supplying his narcissism), his periodic withdrawal into a glass bubble, his dislike of the media (whose probing threatened grandiosity), his psychosomatic disorders at times of crisis. The authors believe that Nixon's personality structure produced three political "faces." His grandiose self generated his first face, that of the bold leader trying to make his place in history by radically reforming the welfare system or by forging an opening to China. His periodic attempts to integrate the divided parts of his personality led to his second political face, to his peacemaking gestures. Here he projected himself as a healer who would reunify a nation deeply divided by conflict over civil rights and the Vietnam War. His second face resulted in Nixon's move toward detente with the Soviet Union and normalization of relations with China. "Unfortunately," wrote the authors, "Nixon could not tolerate success--and he could not maintain an integrated inner world. He had to show his third face" (p. 127). The third face was his paranoid self: "Healing was a big factor in his motivations, as he wanted to heal the splits in his life--i.e., in his personality--between his grandiose self and his hungry self....Unfortunately, he could not maintain his grandiose self and/or his healing activities for long....Whenever he could not maintain his grandiosity, he felt threatened and humiliated by his devalued aspects and was unable to accept them. These devalued aspects he projected onto others (or other things) whom he then distrusted. He frantically attempted to control them and even destroy them. He regressed, and his responses to his regression included paranoid expectations that ultimately contributed to his downfall" (p. 128-29). His paranoia--stemming from his need to protect his hungry self--led him to install electronic surveillance of various people, including his own associates, to have the Secret Service tap his brother Donald's telephone, and to create the atmosphere that led to the break-in of Daniel Ellsberg's psychiatrist's office, and to the Watergate debacle: "In trying to be greater than everyone else, Nixon stomped where he should have stepped" (p. 149). The authors conclude: "Richard Nixon could have enjoyed greatness without challenge, but he lost sight of his priorities because of internal pressures that, paradoxically, had pushed him to excel as a historical figure in the first place. Only with psychoanalytic insight can we grasp why a powerful president would destroy himself when there was no need to do so" (p. 149). He was a Don Quixote tilting at nonexistent windmills, the authors say, and did not understand that he surely was his own worst enemy. Many scholars will find it difficult to leap from Nixon's lack of "good enough mothering" during childhood to his adult decisions regarding China or his actions against his political opponents. Still, when scholars factor in all of the relevant political, economic, and other domestic and international pressures operating on Nixon, a gap remains in their explanations of his actions and decisions. The authors help close that gap. Copyright (c) 1997 by H-Net, all rights reserved. This work may be copied for non-profit educational use if proper credit is given to the author and the list. For other permission, please contact firstname.lastname@example.org. [The book review editor for H-Pol is Lex Renda <email@example.com>] If there is additional discussion of this review, you may access it through the network, at: https://networks.h-net.org/h-pol. William E. Pemberton. Review of Volkan, Vamik D.; Itzkowitz, Norman; Dod, Andrew W., Richard Nixon: A Psychobiography. H-Pol, H-Net Reviews. Copyright © 1997 by H-Net, all rights reserved. H-Net permits the redistribution and reprinting of this work for nonprofit, educational purposes, with full and accurate attribution to the author, web location, date of publication, originating list, and H-Net: Humanities & Social Sciences Online. For any other proposed use, contact the Reviews editorial staff at firstname.lastname@example.org.
<urn:uuid:7931d768-820b-4e66-973b-b40b4ac9f9de>
CC-MAIN-2022-33
https://www.h-net.org/reviews/showrev.php?id=1509
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00004.warc.gz
en
0.977842
2,286
2.625
3
Generally speaking, the rolling bearing itself does not produce noise. The commonly felt “noise of NTN tapered roller bearing” is actually the sound effect of vibration between the bearing and the surrounding structure directly or indirectly. This is why many times the noise problem can be regarded as a vibration problem involving the whole NTN tapered roller bearing application. Excitation caused by the change of the number of loaded rolling elements When a radial load is loaded on an imported bearing, the number of rolling elements bearing the load will change slightly during operation, i.e. 2-3-2-3 This causes an offset in the direction of the load. The resulting vibration is inevitable, but can be reduced by axial preloading, which is applied to all rolling elements (not applicable to cylindrical roller bearings). Waviness of components In the case of close fit between NTN tapered roller bearing ring and bearing seat or transmission shaft, NTN tapered roller bearing ring may be deformed by matching with the shape of adjacent components. If deformation occurs, vibration may occur during operation. Therefore, it is important to machine the bearing pedestal and drive shaft to the required tolerances. Due to incorrect operation or installation, a small number of NTN tapered roller bearing raceways and rolling elements may be damaged. In operation, rolling over damaged NTN tapered roller bearing components will produce specific vibration frequencies. Vibration frequency analysis can identify damaged bearing components. Vibration behavior in applications In many applications, the stiffness of NTN tapered roller bearings is the same as that of the surrounding structure. Because of this feature, as long as the correct selection of NTN tapered roller bearing (including preload and clearance) and its configuration in application, it is possible to reduce the vibration in application. There are three ways to reduce vibration: – remove critical excitation vibration from the application; – suppress the critical excitation vibration between the excitation part and the resonance part; – change the stiffness of the structure to change the critical frequency. The quality indicators of lubricating oil can be divided into two categories: one is the physical and chemical performance indicators of oil products, and the other is the application performance indicators of oil products. (mainly introduce several main physical and chemical indexes) a. Color: the color of lubricating oil, like all substances, has a Ntn Tapered Roller Bearing corresponding and fixed color, which is related to the refining system of base oil and the additives added. However, in the process of use or storage, it will deteriorate due to its oxidation, so as to change the color, and the degree of discoloration is related to the degree of deterioration. If it is milky white, it indicates the presence of water or bubbles; Darker color indicates oxidative deterioration or pollution. b. Viscosity: viscosity is the degree of internal friction Ntn Tapered Roller Bearing resistance of lubricating oil, that is, the measure of internal friction. Viscosity is usually divided into dynamic viscosity, kinematic viscosity and relative viscosity. Viscosity is the main index of classification, classification, quality evaluation, selection and substitution of various lubricating oils. Dynamic viscosity: dynamic viscosity is a measure of the internal friction of a liquid flowing under a certain shear stress. Relative viscosity: relative viscosity refers to the viscosity expressed in conditional units measured by different specific viscometers. Generally, there are three expression methods: Engler viscosity, Sayer viscosity and Rayleigh viscosity. Kinematic viscosity: kinematic viscosity is a measure of the Ntn Tapered Roller Bearing internal friction of a liquid flowing under the action of gravity. Unit of measurement: mm2 / S; In China, the viscosity of lubricating oil is divided into 20 grades according to its size, which is called viscosity grade. ISO viscosity grade GB/T3141-1994 Kinematic viscosity at the middle point of 40 ℃ 40 ℃ kinematic viscosity range two two two point two 1.98~2.42 three three three point two 2.88~3.52 five five four point six 4.14~5.06 seven seven six point eight 6.12~7.48 ten ten ten 9~11 fifteen fifteen fifteen 13.5~16.5 twenty-two twenty-two twenty-two 19.8~24.2 thirty-two thirty-two thirty-two 28.8~35.2 forty-six forty-six forty-six 41.4~50.6 sixty-eight sixty-eight sixty-eight 61.2~74.8 one hundred one hundred one hundred 90~110 one hundred and fifty one hundred and fifty one hundred and fifty 135~165 two hundred and twenty two hundred and twenty two hundred and twenty 192~242 three hundred and twenty three hundred and twenty three hundred and twenty 288~352 four hundred and sixty four hundred and sixty four hundred and sixty 414~506 six hundred and eighty six hundred and eighty six hundred and eighty 612~748 one thousand one thousand one thousand 900~1100 one thousand and five hundred one thousand and five hundred one thousand and five hundred 1350~1650 two thousand and two hundred two thousand and two hundred two thousand and two hundred 1980~2420 three thousand and two hundred three thousand and two hundred three thousand and two hundred 2880~3520 Viscosity is an important quality index of lubricating oil. If the viscosity is too small, it will form semi liquid lubrication or boundary lubrication, which will accelerate the wear of friction pairs and easily leak oil; Excessive viscosity, poor fluidity, poor permeability and heat Ntn Tapered Roller Bearing dissipation, large internal friction resistance, difficult overshoot and high power consumption. Therefore, the reasonable selection of viscosity is the guarantee of sufficient lubrication of friction pairs. c. Viscosity temperature characteristics: the characteristics of lubricating oil change with temperature into viscosity temperature characteristics. At present, viscosity index VI is often used to express the quality of viscosity temperature characteristics. The greater the VI value of general oil, the greater the change of its viscosity value with temperature, so it is more suitable for occasions with variable temperature or wide range of change. The better the viscosity Ntn Tapered Roller Bearing temperature characteristics of the oil. Oil with VI = 0 is represented by 0 VI, and oil with VI = 100 is represented by 100 VI. Viscosity index is an empirical value, which is obtained by comparing the viscosity of 40 ℃ and 100 ℃ with two lubricating oils with good viscosity performance (viscosity index is set as 100) and poor viscosity performance (viscosity index is set as 0). Classification of viscosity index classification Viscosity index range Low viscosity index < thirty-five Medium viscosity index 35~80 High viscosity index 80~110 Higher viscosity index > one hundred and ten d. Freezing point and pour point Freezing point: the freezing point refers to the high temperature at which the lubricating oil stops under the specified cooling conditions; Pour point: the pour point refers to the low temperature at which the lubricating oil can continue to flow under the specified conditions. Both pour point and pour point represent the low-temperature performance of lubricating oil, but the pour point better reflects the low-temperature fluidity of oil, which is better than the pour point in actual use. Therefore, at present, the pour point is mainly used to represent the low-temperature performance of lubricating oil in the world. The pour point is about 3 ℃ higher than the pour point, and the working temperature of general lubricating oil is 3 ~ 4 ℃ higher than the pour point. e. Lightning: the flash point refers to the low temperature when the lubricating oil is heated and the evaporated oil vapor is mixed with air under the specified conditions to a certain concentration to produce a short flash fire when in contact with the flame. f. Acid value: acid value refers to the mass of potassium oxide required to neutralize the organic acid contained in 1g lubricating oil, in mgKOH / g. Acid value has different meanings for new oil and old oil. For new oil, the acid value indicates the refining depth of the oil, and for 110 oil, the acid value indicates the degree of oxidation and deterioration of the lubricating oil during use. Excessive acid value indicates serious oxidation and deterioration. g. Moisture: moisture refers to the mass percentage of water content in lubricating oil. Due to the existence of water, when the temperature drops below 0 ℃, the viscosity temperature characteristics will become worse. When the temperature rises, the water will vaporize, produce bubbles, destroy the oil film, emulsify the oil, reduce the viscosity and deteriorate the lubrication effect. h. Mechanical impurities: all solid impurities suspended and precipitated in lubricating oil are collectively referred to as mechanical impurities. The existence of mechanical impurities will destroy the lubricating oil film and accelerate the wear of friction pairs. k. Carbon residue: carbon residue refers to the coke like residue generated after the lubricating oil is heated, vaporized and decomposed with air, which is expressed as a percentage of the oil.
<urn:uuid:d2065106-af75-4248-8e53-5d82ddd4e32f>
CC-MAIN-2022-33
https://www.bearingsupplier.cn/ntn-tapered-roller-bearing-in-operation.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00004.warc.gz
en
0.891897
2,062
2.703125
3
The Right to Life is the heart of the Constitution of India. It is the most organic and progressive provision in our constitution, the foundation stone of our laws. As per the definition under Article 21, it can only be claimed when a person is deprived of his “life” or “personal liberty”. Violation of the right by private individuals is not within the purview of Article 21. The Article 21 of Indian Constitution grants the Right to Life only. It does not allow the Right to Die. Right to Life, the most organic and democratic provision of our constitution has been held to be the nucleus of the Constitution. Article 21: “No person shall be deprived of his life or personal liberty except according to procedure established by law.” The Right to Life is expressed in Article 3 of the Universal Declaration of Human Rights, which states that - “Everyone has the right to life, liberty and personal security”. The Right to Life is undoubtedly the most fundamental of all rights. Even during proclamation of emergency, the Right to Life that is enshrined in the fundamental rights cannot be suspended. The right is available to both citizens and non-citizens. Whether Right to Life includes Right to Life with dignity? If, yes then why a patient who is suffering from a lethal disease or is in a Permanent Vegetative State (PRS) has to suffer until they are dead. How can we say that a person is living with dignity, if he/she has already lost all the hope of reviving and is dependent on their acquaintances for all that their needs? The only option left in the case remains Euthanasia. The question about the Right to Die arose for the first time in Maharashtra v. Maruty Sripati Dubal. The court declared that the Right to Life includes the Right to Die. This judgement, by the Bombay High Court contradicted with Section 309 of IPC. Hence, Section 309 was held unconstitutional. On the contrary, the Supreme Court of India in Gian Kaur v. State of Punjab held that Right to Life does not include “Right to Die” or “Right to be Killed”. It was only after the case of Aruna Ramchandra Shanbaug v. Union of India that the Supreme Court in its judgment declared that Passive Euthanasia is legal in India. THE CONCEPT OF RIGHT TO LIFE In discussions on topics of capital punishment, war, abortion, euthanasia, justifiable homicide and public health care, the definition of the Right to Life emerges. The scope of Article 21 has been explained by the Supreme Court in the case of Unni Krishnan, which provided the list of some of the rights covered under Article 21 based on earlier pronouncements. The Supreme Court also included many of the non-justifiable Directive Principles embodied under part IV of the Constitution. In the case of Sunil Batra v. Delhi Administration, the Supreme Court observed that the “right to life” included the right to lead a healthy life to enjoy all facilities of the human body in their prime conditions. It will also include the right to preserve the tradition, culture, heritage and all that gives meaning to the life of a man. It covers the right to live in peace, the right to sleep in peace, the right to rest and to health. The Supreme Court in Kharak Singh v. State of Uttar Pradesh quoted, “By the term ‘life’ as here used something more is meant than mere animal existence. All those limbs and services in which life is enjoyed expand the inhibition toward its deprivation. Similarly, the law forbids the mutilation of the body by the amputation of the armour leg or the pulling out of the eye or the removal of some other body organ by which the soul interacts with the outside world. RIGHT TO LIFE WITH DIGNITY Human dignity is related to individual life and to the basic rights of constitutional jurisprudence. Dignity signifies the display of honour and particular personal merits. The definition of human dignity is related to the defence from abuse and violations of inalienable rights. The word human dignity is widely used to defend an individual's status and honour, without that person being unable to survive on earth. The Article 21 gives a constitutional importance of rights to every citizen. Justice Krishna Iyer has stated that, Article 21 is characterised as protective of life and liberty and corresponds to the Magna Carta case. The Magna Carta became the first text to proclaim that the crown had civil rights and that the king should be bound by the constitution, giving all men legal rights. A new dimensional approach towards Article 21 was established in the case of Maneka Gandhi by the Supreme Court. Maneka Gandhi v. Union of India “The right to live is not merely a physical right but includes within its ambit the right to live with human dignity.” The Supreme Court amplified the horizon of the aforementioned view in the case of Francis Coralie v. Union Territory of Delhi, where it stated that the right to live requires the right to live with human dignity and all that goes with it, that is, the bare necessities of life RIGHT TO DIE Article 21 gives a person the right to live a dignified life. Does it also confer a right not to live or a right to die if a person chooses to end his life? If so, what is the fate of Section 309 of Indian Penal Code, 1860 that punishes a person convicted of attempting to commit suicide? The question about the right to die arose for the first time in the case of Maharashtra v. Maruty Sripati Dubal , where the Bombay High Court held that the right to life guaranteed under Article 21 includes right to die, and the Hon’ble High Court struck down Section 309 of Indian Penal Code that provides punishment for attempt to commit suicide by a person as unconstitutional. In P. Rathinam v. Union of India, A two-judge Supreme Court Division Bench took cognizance of the relationship/contradiction between Section 309 of Indian Penal Code, and Article 21. In support of the decision of the High Court of Bombay in the case of Maruti Sripati Dubal, the Court held that the right to life was also reflected in Article 21 by the right not to live a forced life, to its detriment or disadvantage. The court argued that, in Article 21, the word life implies the right to live with human dignity and that it does not merely imply continued drudgery. Thus, the court concluded that the right to live of which Article 21 speaks of could be said to bring in its trail the right not to live a forced life. The court further stressed, "The attempt to commit suicide is in fact a plea for help rather than punishment." In a writ petition filed in the Supreme Court of India, Common Cause vs Union of India, it was again established that euthanasia in its passive form is allowed. The Supreme Court of India also laid down the foundation of “Living Will”. Living will is a written document that allows a patient to give clear advance guidance about the medical care to be offered when he or she is terminally ill or can no longer give informed consent. "Quoting the Supreme Court, "A thinking adult human being is entitled to reject medical treatment entirely or to decide not to take medical treatment and can decide not to take medical treatment to embrace the death in natural way.” EUTHANASIA AND RIGHT TO DIE At the express request of the individual who wishes to die, the term Euthanasia implies a deliberate termination of life by another human. Euthanasia is defined as the act of killing an incurably ill individual out of respect and consideration for the suffering of that person. Euthanasia, according to Black's Law Dictionary, means "the act or practice of killing or causing the death of a person suffering from an incurable illness or condition, in particular" a painful one, for reasons of mercy.” The definition of Euthanasia suggests that it is a practising of relieving a person from pain & suffering due to a lethal & incurable disease by providing him death. Euthanasia has been classified into two categories: Active Euthanasia & Passive Euthanasia. Active euthanasia requires the use of lethal drugs or forces to kill a person given to a person with terminal cancer who is in terrible pain, such as with lethal injection. Passive euthanasia means withholding medical care for the continuity of life, such as withholding antibiotics from a coma patient, where a patient is likely to die without giving it, or removing the heart lung machine. The Supreme Court had made a clear distinction between Active and Passive Euthanasia in Aruna Shanbaug case. In Active euthanasia, death is brought about an act, e.g. Injecting a toxic agent into the patient like sodium pentothal which in a few seconds allows the person to go into deep sleep and the person dies painlessly in sleep, so it amounts to killing a person by a good act in order to end a person's suffering in a terminal disease state. It is considered a crime all over the world except where permitted by legislation. In India too, active euthanasia is illegal and a crime under Section 302 or 304 of the Indian Penal Code. Physician assisted suicide is a crime under Section 306 of Indian Penal Code, i.e. abetment to suicide. Passive euthanasia involves withholding of medical treatment or withholding life support system for continuance of life e.g., withholding of antibiotic where without doing it, the patient is likely to die or removing the heart-lung machine from a comatose patient. Also without regulation, passive euthanasia is legal if certain requirements and protections are upheld. As noted by the Supreme Court, the key point of difference between active and passive euthanasia is that something is done to end the life of the patient in active euthanasia, while something is not done in passive euthanasia that would have maintained the life of the patient. "In passive euthanasia, to quote the words of the learned judge in Aruna's case, "the doctors are not deliberately killing anyone; they are clearly not saving him. The Court stated, "While we typically applaud someone who saves the life of another human, we usually do not condemn someone for failing to do so. out that according to the proponents of Euthanasia, while we can debate whether active euthanasia should be legal, there couldn’t be any doubt about passive euthanasia, as “You cannot prosecute someone for failing to save a life.” The Supreme Court allowed passive euthanasia by virtue of ‘living will’ and interpreted Right to die with dignity as a Fundamental Right under Right to Life only. However, no one in this world can guarantee that a law cannot be abused. The relief provided under Euthanasia by the Supreme Court can also be used in a mala fide pretext. An particularly dangerous feature is that it is possible to make such violence undetectable. Though, Euthanasia seems to be morally justifiable yet its practicality is still under doubt. Justice Markanday Katju quoted Mirza Ghalib while stating his judgement of 141 pages in euthanasia plea for Aruna Ramachandra Shanbaug, a sexual assault victim lying in a vegetative state in a Mumbai hospital for over four decades. “Marte hain aarzoo mein marne ki, Maut aati hai par nahin aati” One die longing for death but death, despite being around, is elusive. Constitution of India, Article 352. Sunil Batra v. Delhi Administration 1980 AIR 1579, 1980 SCR (2) 557 Kharak Singh v. State of Uttar Pradesh 1963 AIR 1295, 1964 SCR (1) 332 Magna Carta is famous as a symbol of justice, fairness, and human rights. Maneka Gandhi v. Union of India 1978 AIR 597, 1978 SCR (2) 621 Francis Coralie v. Union Territory of Delhi 1981 AIR 746, 1981 SCR (2) 516 Attempt to commit suicide Maharashtra v. Maruty Sripati Dubal 1987 Cri LJ 743 P. Rathinam v. Union of India 1994 AIR 1844, 1994 SCC (3) 394 Common Cause v. Union of India WRIT PETITION (CIVIL) NO. 215 OF 2005 Author 1 -ASAD ZAHIDI 4 TH Year, B.B.A., LL.B. (Hons.) CHANAKYA NATIONAL LAW UNIVERSITY, PATNA Author 2- MOHAMMAD ATIF AHMAD 5 TH Year, B.B.A., LL.B. (Hons.) DELHI METROPOLITAN EDUCATION, GURU GOBIND SINGH INDRAPRASTHA UNIVERSITY, NEW DELHI
<urn:uuid:2ce5909a-a24b-4ddd-9c34-f6b5810a2667>
CC-MAIN-2022-33
https://www.jurisreviewpublications.com/post/euthanasia-the-conundrum-of-life-and-death
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00005.warc.gz
en
0.935433
2,740
3.1875
3
Restaurants play an integral role in the lives of many people since they offer a variety of products and services. This enables people to enjoy themselves as they continue with their daily lives. Restaurants offer varieties of food as well as services such as outside catering services and Wi-Fi services especially to the working class because of time constraints. There has been a tremendous change in the restaurant sector because of the demands from the customers, majority of them changing their customer service and quality food preferences. This has made restaurants change their menu as well as offer exceptional services that attract different categories of customers (Egerton-Thomas, 2006). In this case, the paper will be based on the hypothesis that “Restaurants offering different services have a competitive advantage than simple restaurants.” Current trends in the workplace have seen many people enjoy their meals without worrying about returning to the offices. The world is increasingly turning into a global village because of the tremendous technological change. In addition, people can sit and eat in a restaurant as they continue to work. It is now possible to see majority of customers in a restaurant working on their laptops as they eat. These customers are multi-tasking whereby they are enjoying their meals and at the same time working. Previously, people did not have time to sit and enjoy their meals because they were always on the move. This was the period when many fast-food restaurants emerged that served many people who did not have time to sit and enjoy meals. Majority of the people could be seen walking while eating on the streets, but these times have changed (Lee, 2011). The hospitality industry consists of a wide variety of categories offering services to consumers and some of these categories include cruise line, transportation, theme parks, event planning, lodging, bars, hotels, travel, leisure, and restaurants. The hospitality industry is among the noble sectors in the tourism industry, which is also a service industry. The hospitality industry ensures that customers are served food and drinks and it ensures that customers can enjoy their leisure time, conference facilities and accommodation if need be. The hospitality industry is a vital sector in the economy since it generates a lot of revenue from both tourists and the local people (Henkel, 2006). On the other hand, a restaurant is mainly a business outlet that serves and prepares food and drinks for its customers, but the difference between various restaurants depends on what they offer. There has been an emergence of classy restaurants lately due to the changing trends of customer preferences. Majority of the restaurant customers’ value and enjoy quality food and drinks in a restaurant. They also prefer a classy ambiance as well as exceptional customer service. Current technological changes are making restaurants offer different cuisines in various specialty restaurants. People nowadays are knowledgeable of cuisines from any corner of the world since that information can be found on the internet (Miller, 2010). Majority of these customers want to have a taste of foods from various parts of the world. This is the paramount reason why there are various types of restaurants such as Arabic, Chinese, African dishes, and Oriental cuisine restaurants, which offer a variety of cuisines. In addition, a restaurant that incorporates various cuisines will most likely succeed in the competitive world of business. The reason for this is that, it has a competitive advantage over the other restaurants, which offer simple menus such as lunch and breakfast (Egerton-Thomas, 2006). A menu is mainly an offering of a variety of food and beverage presentation where a customer can choose what he/she wants to eat and drink. The menu consists of a list of various dishes, which are readily available in a particular restaurant. This list contains food to be served or is available at a meal or in a restaurant. A catering bar contains a variety of food items, which a customer can prefer eating. A catering bar is also referred to as a buffet whereby a customer pays a fixed amount of money and he/she has the freedom to eat what they desire. There is no strict limitation to the food quantity, which the customer will eat. Happy hour is a special time set by a restaurant whereby it serves various foods and drinks at a reduced price. Breakfast, lunch, and dinner are the normal meals, which people take although they differ in terms of the time and the food that is served (Brown, 2007). Outside catering refers to providing restaurant services but in a different environment, which is outside the restaurant. This includes hiring restaurants services in weddings, graduation ceremonies, and during special events. Fine dining and specialty restaurants offer a unique blend of fine dining whereby customers enjoy exotic foods and expensive drinks as they enjoy themselves. This offers a lifetime experience although it is expensive. Wi-Fi services are nowadays among the current trends in the restaurant industry since many people can now continue working as they enjoy their meals at a restaurant. Majority of them can be seen busy working on a laptop, iPad and a Smartphone doing their work as they eat. Since these gadgets need an internet connection, many restaurants have offered free Wi-Fi Services so that they attract this kind of customers because their spending power is high. Free Wi-Fi services provide these restaurants with a competitive advantage over the other simple restaurants (Lee, 2011). Restaurants have also diversified their services, and nowadays they are not only offering their restaurant facilities for eating and drinking but they have taken advantage of the numerous meetings that people and organizations hold. This is a major reason restaurants have introduced conference facilities whereby they offer rooms where meetings can be held at the same time offer food and drinks to these meeting participants. This is a revenue-generating avenue since a restaurant can offer their meals at the normal times and then provide the restaurant facility for meetings especially when the restaurant is not busy. This also offers the restaurants an opportunity to sell their foods and drinks. Such restaurants have a competitive advantage, and they will continue succeeding as compared to the other simple restaurants, which only offer the traditional breakfast and lunch menu (Henkel, 2006). Restaurants have also embraced events planning services in their wide range of services, which they offer to their customers. Event planning involves organizing an occasion or an event, which brings people with a common goal together mainly for celebration, or launching a certain product. Restaurants have been able to tap into this noble market, offer their restaurant facilities, and serve guests with food and drinks. This is an income-generating avenue, which has made many restaurants succeed since they have taken advantage of this great opportunity (Miller, 2010). Today’s restaurant customer is health conscious, very knowledgeable, and selective on the food they eat since they want to live and maintain a healthy lifestyle. Such customers will require special menus with details about a particular type of food and restaurants have responded positively through offering special menus to these customers. These restaurants have gradually increased because they attract many customers who are health conscious (Lynn, 2009). Some of these restaurants will even offer cooking facilities for the customers to cook their favorite dishes using the restaurant facilities. This makes the customers very happy and proud because they are comfortable eating food that they have prepared and cooked. These restaurants ideally offer a home experience, and some of them attract tourists who are away from their homes and still miss eating their local cuisines. These customers will most likely be high spenders, and this will make the restaurant make good revenue and, therefore, succeed eventually. The special menu option offered by these restaurants will make them grow as compared to other simple restaurants offering breakfast or just lunch (Alonzo, 2008). It is evident from the above services, which are offered by some restaurants that they will be more successful than those restaurants that offer simple breakfast or just lunch. These valuable services ensure that these restaurants continue enjoying a competitive advantage over the other restaurants, which offer breakfast or just lunch. It is, therefore, paramount for the restaurants to diversify their products and services so that they can become relevant in the business world. Customer preferences are gradually changing, and restaurants have to be abreast with these trends so that they can take advantage of any emerging trends. This gives them a competitive advantage over the other restaurant (Brown, 2007). However, there are many restaurants, which have stuck to the traditional functions of the restaurant. Such restaurants only serve breakfast only or lunch only, or both and this minimizes their chances of succeeding since they are not able to take advantage of the emerging trends. These restaurants should conduct competitive analysis studies on other restaurants, and they will be surprised to note that they will eventually close shop. The reason for this is that, majority of these restaurants came into operation some years back where they attracted customers, but they have refused to change with the current trends. Customers nowadays are more knowledgeable on what they want to eat, and they will most likely go to eat, in a restaurant that offers special menus. This means that the restaurants that offer breakfast or lunch only will miss this great opportunity of making revenue, and they will be chasing away potential customers (Alonzo, 2008). Restaurants with diversified services such as those mentioned above will always have customers coming back to eat at their restaurants since they have portrayed that they are abreast with the current customer preferences. However, those restaurants that offer breakfast or lunch only will attract those customers, who have no other option, but to eat there. A restaurant is a business, and its main purpose is to make profits. Therefore, it should ensure that it conducts market surveys so that it can be abreast with the latest customer preferences (Rainsford, Bangs & NetLibrary, Inc., 2007). It is evident that those restaurants with diversified services and products will be more successful than those restaurants that offer simple breakfast or just lunch. The exceptional services that these restaurants offer ensure that these restaurants will always continue enjoying a competitive advantage over the other restaurants, which offer breakfast or just lunch. Restaurants need to continue diversifying their products and services in accordance to the customer’s preferences. Such an initiate will ensure that such restaurants continue becoming relevant in the business world (Parrish, 2014). Customer preferences are gradually changing, and restaurants have to be abreast with these trends so that they can take advantage of any emerging trends. This gives them a competitive advantage over the other restaurants. Restaurants with diversified services will ensure that they offer the above-mentioned services whereas those simple restaurants that offer breakfast or just lunch will only offer those limited services. This means that these simple restaurants are limiting themselves from many business aspects, which include limiting their revenues, potential customers, and chances of business growth. Thus, those restaurants that offer diversified services will always have a competitive advantage over those simple restaurants that only offer breakfast or just lunch (Taylor, 2014). Restaurants are supposed to continue always conducting competitive analysis so that they can know current customer preference, as well as the current trends in the restaurant sector. Such an activity and the implementation of the recommendations provided will ensure that it succeeds since it has attained a competitive advantage. It is integral for restaurants to introduce these noble services mentioned in this study so that they can have a competitive advantage. Today’s world is changing gradually, and restaurants need to be abreast with these changes since they also affect customer preferences. There is no doubt that those restaurants that have diversified services such catering bar, happy hour, breakfast, lunch, Wi-Fi Services, conference facilities, event planning, dinner, special menus, are more successful than simple breakfast or just lunch restaurants. Alonzo, R. S. (2008). The Upstart guide to owning and managing a restaurant. Chicago, Ill: Upstart Pub. Brown, D. R. (2007). The restaurant manager’s handbook: How to set up, operate, and manage a financially successful food service operation. Ocala, Fla: Atlantic Pub. Egerton-Thomas, C. (2006). How to open and run a successful restaurant. Hoboken, N.J: John Wiley & Sons. Henkel, S. L. (2006). How to open a financially successful pizza & sub restaurant. Ocala, Fla: Atlantic Pub. Group. Lee, R. (2011). The everything guide to starting and running a restaurant: The ultimate resource for starting a successful restaurant!. Avon, Mass: Adams Media. Lynn, J. (2009). Start your own restaurant business 3E: Pizzeria, coffeehouse, deli, bakery, catering business. Irvine, Calif: Jere L. Calmes. Miller, D. (2010). Starting A Small Restaurant. New York: Routledge. Parrish, G. (2014). Starting a Successful Restaurant 101. New York: Brain Food. Rainsford, P., Bangs, D. H., & NetLibrary, Inc. (2007). The restaurant start-up guide: A 12-month plan for successfully starting a restaurant. Chicago: Dearborn. Taylor, W. (2014). How To Start A Successful Restaurant Business. Washington: Epic Publishing.
<urn:uuid:40be4a40-e4f8-4aa9-8288-af8e6200b6cd>
CC-MAIN-2022-33
https://essaybizlab.com/restaurant-services-and-competitive-advantage/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00204.warc.gz
en
0.965622
2,681
2.71875
3
More Than Tired By Sharon Livingstone Misunderstood, misdiagnosed and poorly funded, Chronic Fatigue Syndrome (CFS)* affects between 101000 and 240000 Australians. According to CFS support organisation, Emerge Australia, CFS is a complex, multi-system, neuroimmune condition with a multitude of symptoms related to the dysfunction of: - The brain - Gastro-intestinal system - Immune system - Endocrine and cardiac systems. While the exact cause of CFS is unknown, it may involve: - Genetic predisposition - Acute or chronic infection (including viral, bacterial and/or parasitic infections – for example glandular fever, Q fever and Ross River fever - A flu-like illness - Exposure to toxic chemicals, environmental pollutants or heavy metals - Immunisation – there have been some reports of ME/CFS onset following certain vaccinations - Severe physical or emotional trauma. As an invisible illness, you can’t tell by looking at someone that they have CFS. Symptoms of CFS include:1 - Post-exertional malaise as a result of minimal cognitive, emotional or physical effort - Sleep problems/disturbances - Widespread pain and headaches - Neurocognitive dysfunction: short term memory loss, impaired concentration, confusion, disorientation, hypersensitivity to light and sound, emotional overload - Problems with dizziness and balance - Problems with body temperature (including intolerance of extremes of temperature) and weight - Recurrent flu-like symptoms - Gastrointestinal problems (e.g. nausea, abdominal pain, bloating, irritable bowel syndrome) - Sensitivities to food, medications, odours or certain chemicals. I have CFS – Here’s My Diagnosis Story 25-year-old Rianna Giraud was diagnosed with CFS after living with symptoms for 9 years. “After contracting glandular fever in 2008, I spent 6 weeks bedridden with my mum waking me up to do basic tasks like going to the toilet. Once I was able to go back to school, I had approximately one day off each week. I gave up basketball and swimming, sports I excelled at, as my energy levels didn’t permit it. After a full day at school, I rarely had energy for things like assignments and homework. Luckily, when I reached Year 12, I was accepted into a university program which allowed me automatic entry into my chosen course as long as I passed the small university course during Year 12. I focused all my energy into that, whilst barely passing at school, so I had a chance at a future in design. Once at uni, the battle continued. Not only with my energy levels, but finding answers and solutions from my doctors. My recurring tonsillitis, achey body and poor immunity were put down to stress. Stress was never something I had issues with. I have always been very carefree and I found this a lazy diagnosis. Finally, I was recommended to see a doctor who looks at things a little differently. His motto is “treat the cause” compared to the “treat the symptoms”. (In 2017) I received a diagnosis of chronic fatigue as a result of Epstein Barr virus.” Massage Therapist Deb Carroll’s CFS diagnosis took 2 years. “I was a full time student with a full-time business, a husband who travelled a lot and two kids under 12. I was a competitive triathlete, I played hockey and our family holidays included bushwalking and camping. I commuted to work on my bicycle. My onset was obscure. I got a cold in 2004. I ended up hospitalised 6 months later with a serious lung infection. There were a LOT of other factors involved. I was under some serious stress with both my business and family at the time. Diagnosis took two years, during which my marriage fell apart, and only after several hospitalisations where every test under the sun was made with no outcomes. I could barely walk and when I could move enough to work I did it sitting or lying down. I was sent home to a psychiatrist and (an exercise programme) administered by a physio. I walked out of my business, sold all my sell-able possessions and moved in with my mum and dad. The kids stayed with their dad as I was deemed unfit as I could barely care for myself. Once I was able to stand unassisted, I moved in with some friends (then) couch surfed for two years, slept in my car and showered at the uni.” Ashley Kalagian Blunt, author of My Name is Revenge, wrote about her 6-month journey to CFS diagnosis. Massage for CFS People with CFS obviously have massage. Apart from my own brief survey which showed around 30% of massage therapists have treated people with CFS, other surveys of people with CFS confirm that massage is used as a management tool. Although one study of US people with chronic fatiguing illnesses2 found that the most commonly used CAM was prayer, it also reported: “People with CFS-like illness were significantly more likely to use body-based therapy (chiropractic and massage) than non-fatigued participants (OR = 2.52, CI = 1.32, 4.82). Use of body-based therapies increased significantly in a linear trend across subgroups of non-fatigued, prolonged fatigued, chronic fatigued, and CFS-like subjects (p-trend = 0.002). People with chronic fatigue were also significantly more likely to use body-based therapy (OR = 1.52, CI = 1.07, 2.16) and mind-body (excluding prayer) therapy than non-fatigued participants …” An unverified survey3 apparently conducted by the CFIDS (Chronic Fatigue and Immune Dysfunction Syndrome) Association of America in 2013 found “Almost half used alternative therapies such as massage therapy, yoga, acupuncture and meditation to treat CFS”. With little/no information on HOW massage should be undertaken, we rely on our commonsense to devise a treatment plan. This involves treating each CFS client as an individual with different requirements to every other CFS client we’ve ever treated. There are common themes amongst the clients I’ve seen with CFS: The intake involves a lot of talking and there’s always tears. Those tears may be for many reasons but they’re probably something to do with how big an impact CFS has on the client’s current way of existing. Something commonly reported is post-massage fatigue. This massage side-effect was enough for Ashley to stop getting massages: “I used to love getting massages, both remedial ones for back/neck issues, and just for relaxation. But once I got CFS I had to stop completely – a massage is just as tiring for me as trying to go for a jog. Every time I got one, I ended up exhausted in bed for 1-2 days, so I stopped because I already spend enough time in bed.” For Rianna, who had regular massages before she got CFS, it’s all about planning: “I am often exhausted by it. Generally I plan only the massage for that day in case I need to nap afterwards. I find the next day I am extra achey, but from then on I see rather vast improvements.” Deb now has fortnightly bodywork, utilising a variety of modalities and self-treatment, however, initially: “Remedial work knocked me for 6. I’d sleep for hours after and suffered excruciating DOMS for days post treatment. Cupping was a disaster too; subsequent bruising from cupping actually led to open bleeding sores.” Like Deb, Rianna finds her symptoms reappearing around 2 weeks after her massage. The Treatment Plan Massage therapy may be able to assist with symptoms and provide short-term relief. It can’t, however, “fix” or “cure” CFS. AMT member, Gabby Griffiths reminded me of something Robert Libbey spoke about during his LAST workshops at the 2018 AMT Conference, which was along the lines of, if 100% (in health/wellness/pain-free) is not achievable, then what do you hope to get from the treatment today? That philosophy is helpful in determining a treatment plan for clients with CFS. The respondents to my survey consistently said that massage pressure varied from CFS client to CFS client. It was down to individual preference. Massage Therapist Suz Wenzel explained how she works with her CFS client: I base my treatments on his needs, his pressure requirements for what he felt. Sometimes it’s a medium pressure over the same part of the body (as in a ‘good pain’ sensation and he wants that release from the tension or pain). (It) all depends on their pain tolerance on the day and what they feel they want with type or style of treatment and depth of pressure. As a massage therapist with CFS, Deb adds: “You end up being more than a massage therapist. You’re a counsellor, advocate and much more. If you take someone on remember you are likely to be in there for the hard yards. I find keeping them positive the most important thing in each treatment. These folks have to re-imagine themselves. Create another them. They will never be able to do the energetic things they once used to enjoy. … Be patient. Be flexible. This condition is so very variable.” Working with someone with CFS may require business flexibility too. As Deb notes: “Sometimes they will simply not be able to get to an appointment.” According to my survey, the frequency of massage varied from weekly/fortnightly sessions to spasmodic. For some with CFS, it’s about prioritising how their daily energy is used in what is commonly known as spoon theory. One of my CFS clients has children and prioritises being able to play with their children over massage when their energy levels were low. With something like CFS, which turns someone’s world upside down, the client knows the condition better than any massage therapist (without CFS). They have researched the treatment options. They have read all the articles. They have tried all the treatments, supplements and seen all the specialists to improve their health. Although well-meaning, asking someone with CFS “Have you tried …” is discouraged. It’s time to listen to the person and learn from their experience. Deb Carroll manages her working week by factoring in time for sleep in the middle of the day. Ashley Kalagian Blunt works part-time and reduced hours on the days she works. Rianna Giraud started her own design business which enables her to set her own hours and rest when she needs to. The Last Word Trying to find information about treating people with CFS is like swimming up a creek of crunchy peanut butter. With little research on any benefit or contraindication of massage for people with CFS, it is obvious that more research is warranted. *Although Chronic Fatigue Syndrome is also known as Post-Viral Fatigue Syndrome (PVFS) or Myalgic Encephalomyelitis (ME) or abbreviated as ME/CFS, for the purposes of simplicity, this article only refers to Chronic Fatigue Syndrome or CFS. 2. Complementary and alternative medical therapy utilization by people with chronic fatiguing illnesses in the United States by James F Jones et al, BMC Complementary and Alternative Medicine 2007; 7:12 April 2007 Complementary and alternative medicine for patients with chronic fatigue syndrome: A systematic review by Terje Alraek et al, BMC Complementary and Alternative Medicine 2011; 11:87 October 2011 The Voice of the Patient – A series of reports from the U.S. Food and Drug Administration’s (FDA’s) Patient-Focused Drug Development Initiative – Chronic Fatigue Syndrome and Myalgic Encephalomyelitis Report Date: September 2013 Epstein-Barr Virus May Be Turning On Pathogenic Genes In ME/CFS By Cort Johnson, ProHealth.com, 13 July 2019 As Terrible Lotteries Go by Ashley Kalagian Blunt Symptomatology A-Z by Ashley Kalagian Blunt The author thanks Deb Carroll, Rianna Giraud and Ashley Kalagian Blunt for sharing their experience of life and massage with CFS. About the Author Sharon Livingstone is a massage therapist in Sydney, NSW. A love of sport drew her to the industry but discovering job satisfaction came from helping people live with less pain keeps her in it. Sharon is a writer, keen bushwalker and frustrated traveller who is also a coffee snob.
<urn:uuid:2033c858-2420-406e-888f-0217266ef721>
CC-MAIN-2022-33
https://blog.amt.org.au/index.php/2019/08/14/more-than-tired/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00403.warc.gz
en
0.962112
2,755
2.546875
3
The following article is posted with permission from theNational Renewable Energy Laboratory. Thirty-five years ago this month, when President Jimmy Carter opened the Solar Energy Research Institute (SERI) in Golden, Colorado, gasoline cost 62 cents a gallon, and solar power about $100 a watt. Now, in the summer of 2012, the price of gasoline at the pump is $3.89 per gallon, the installed cost of solar power about $4 a watt. That’s a six-fold increase in the cost of gasoline, and a 95 percent reduction in the cost of solar. And with solar and wind energy growing by about 35 perecent a year, and biofuels burgeoning, the laboratory in Golden is more vital than ever. After 14 years as a solar institute, SERI achieved national lab status in 1991 under President George H. W. Bush. SERI became NREL, the U.S. Department of Energy’s (DOE) National Renewable Energy Laboratory. 35 Years of Innovations, Breakthroughs, Discoveries What a 35 years it’s been. From its start on July 5, 1977, to today, NREL has pushed the boundaries of what’s possible, leading the way to a clean energy future. Wind turbines have grown from farmhouse curiosities to multi-megawatt behemoths. NREL scientists inaugurated the era of the super-efficient multi-junction solar cell and combined those cells with lenses that concentrate the sun’s rays by 500 times to multiply the power of photovoltaics. The laboratory worked with industrial partners to lower the price of enzymes used to refine alternative biofuels by 97 percent. And NREL scientists found ways to get two electrons from a photon of light; discovered a cost-effective way to virtually eliminate wasteful reflection off a solar cell; helped engineer an economic way to place transparent solar cells in window glass; engineered ways to get biofuels and hydrogen from algae; mapped renewable energy resources in dozens of countries; came up with new standards for aerodynamic wind turbines and concentrating solar power; and set the bar higher for sustainable buildings. NREL researchers have won 52 R&D 100 awards — the “Oscars of Invention.” That places NREL among the top national labs in R&D 100 awards per employee. Just this year, NREL won two: one for the highest-efficiency solar cell, and another for a revolutionary new type of air conditioning that uses 75 percent less energy than typical systems and can work in any climate. From Rented Space to the Laboratory of the Future From its origins in rented office space, NREL has expanded to a 327-acre campus that is a model for what a sustainable, green office park can look like. “When I bring visitors on the site, I often tell them that when I came to SERI, this site was 300 acres of nothing but sage brush and rattlesnakes,” said Stan Bull, NREL’s former associate director for Science and Technology. “But look at it now.” Today, the NREL campus is a living model of sustainability, hosting hundreds of architects, planners, and lawmakers each year, along with a multitude of scientists from around the world. It wasn’t always so. “The people who joined SERI early, who suffered through the great swings of support and inattention in the 1980s, were like monks in a monastery keeping the candle of hope and dedication burning while nobody else cared,” said Art Nozik, an NREL senior research fellow emeritus whose breakthroughs on singlet fission opened the door to greater solar cell efficiency. “Today, when the awareness and importance of our mission is understood and appreciated by a large fraction of the world’s population, we can be confident that we can move forward at an accelerated rate to help our society and planet to survive and flourish.” Ron Judkoff arrived in 1978, as the organization’s first building energy efficiency scientist. “Back then, we were all in rented space, and when NREL built its first major building on campus, the Field Test Laboratory Building, no one thought to invite our small group of building energy efficiency scientists and engineers into the process,” recalled Judkoff, who is now NREL’s principal program manager for building energy research. “In fact, most of the staff and management probably thought the term ‘building science’ was an oxymoron.” Last month, Construction Digital, a monthly online magazine, named NREL’s Research Support Facility (RSF) — a 326,000-square-foot building housing 1,300 employees — the top net-zero energy building in the world. “Net zero” means the building uses no more fossil-fuel-based energy in a year than it makes up for in on-site renewable energy. In all, the RSF has received more than 30 awards for sustainable design and construction. Now, with several buildings that have achieved lofty LEED (Leadership in Energy and Environmental Design) status, the technologies developed by NREL and its industrial partners are found on the campus and in the world market. The “SolarWall” transpired collector, light louvers, electrochromic and thermochromic windows, thermal storage walls, and NREL’s Open Studio software tools that simplify optimal energy design, are getting friendly receptions in the marketplace. “I expect the awards to keep coming, and our campus to serve as a shining example of energy efficiency throughout the world for many years to come,” Judkoff said. Origins Traced to 1970s Oil Embargo SERI was approved by Congress and championed by President Carter in large part because of the oil embargo that pushed the price of gasoline from about 36 cents a gallon in 1972 to 62 cents in 1977. From a focus on solar energy, NREL has grown to also include cutting-edge breakthrough research in wind, biofuels, energy efficiency, transportation, and geothermal energy. Walt Musial was hired in 1988 as a testing engineer at a time when many of the U.S. wind power companies were going bankrupt because of canceled tax credits. “The industry was moving to Europe, and NREL’s National Wind Technology Center [NWTC] was one of the last safe havens where good-quality research was being done to explore big problems still facing the technology,” Musial recalled. NREL’s wind center became the go-to site for companies, both foreign and domestic, to test their turbines and blades in the wind blowing down from the foothills of the Rocky Mountains and in the NWTC’s dynamometer. Not Just a Research Lab, but a Factor in the Marketplace In its early years, SERI/NREL was a research lab that didn’t involve itself in the realities of the marketplace. That changed in the early 1990s as NREL reached out to industry to help turn science into technology, working with the private sector to ramp up and bring renewable energy and energy efficiency to market. Many of today’s top solar companies percolated their ideas in the DOE Incubator program run at NREL. NREL has been issued 262 patents and has agreements with 305 industry partners, 64 universities, and 33 not-for-profit organizations. It currently has 116 Cooperative Research and Development Agreements (CRADAs) with industry. An International Reach; a Helping Hand in Disasters NREL’s reach spreads across five continents — from wind and solar studies in Indonesia to biofuel-powered vehicles in Antarctica. NREL’s Roger Taylor and Dick DeBlasio recall that in the wake of the Earth Summit in Rio de Janeiro in 1992, they implemented the first stage of what later became a Brazilian national program to deploy solar and small wind power systems in communities without electricity in rural Brazil. “Luz para Todus” (Light for All) became a multi-year rural electrification program after the installation of more than 100 lighting, water pumping, and health clinic systems. “Our work in Brazil was very rewarding and fun,” said DeBlasio, a chief engineer. “I started here in May of 1978, but it seems like yesterday.” NREL scientists and engineers have helped rebuild communities devastated by hurricanes, floods and tornadoes — showing how to bring sustainable energy and architecture to cities and towns, from tornado-ravaged Greensburg, Kan., to New Orleans, flooded in the wake of Hurricane Katrina. Renewable Energy’s Growth Has Exploded In the 35 years that NREL has led the way to a clean energy future, renewable energy has exploded: - Installed renewable energy tripled between 2000 and 2009 in the United States and globally. - While renewable energy comprised 2 percent of all new electrical capacity installations in the United States in 2002, by 2009 renewable energy comprised 55 percent of all new installations. - Installed wind energy capacity increased by a factor of 14 between 2000 and 2009 in the United States. - The weighted average price of wind power in the United States fell to 4.4 cents per kilowatt hour, making it cost competitive with fossil fuels. - The United States leads the world in wind energy capacity at more than 35 gigawatts. Just in the past decade, solar energy generation quadrupled in the United States. The annual growth rate of installed solar photovoltaic electricity capacity was 39 percent, while wind energy capacity grew by 34 percent a year. Bull recalls the early days as “a mixture of wild-eyed hopes and utter disappointment,” as the lab at first grew rapidly, then “declined precipitously overnight” when half the staff was laid off. Now, more than 2,000 people are employed at NREL. “SERI/NREL has been and I think always will be a special place because the staffers have such a deep-seated dedication and commitment to the vision and mission,” Bull said. “Just the name NREL is an incredible ‘door opener’ both nationally and internationally. It’s almost frightening at times the impact the name alone has on acceptance in the world of energy.” Learn more about NREL’s 35 years of innovation.
<urn:uuid:55db99e9-cb45-4cd9-843a-9eeadb04bc4e>
CC-MAIN-2022-33
https://www.motherearthnews.com/sustainable-living/renewable-energy/nrel-energy-leadership-zwfz1207zhin/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00402.warc.gz
en
0.948715
2,176
3.59375
4
There are at least a thousand reasons to visit Sicily, the great island - indeed the largest in the Mediterranean - that forms the triangular football to the boot that is the Italian peninsula. They are all very good reasons, including amazing landscapes, a uniquely complex and delicious cuisine, a history that is diverse and multifaceted beyond belief, excellent wines, a vast array of archaeological sites, an even vaster one of historical towns and villages. A great way to explore all of those aspects is our Exploring Sicily tour, which takes place for the first time next April. But one key reason to visit the island is missing from the list above: Greek temples! Greek temples are one of the earliest well-defined expressions of what we now recognise as the Western tradition in architecture, and one of the most influential ones by a vast margin to this day. They go back to the 8th or 7th centuries BC, and, as the name entails, they are indeed a key achievement of the Archaic Greeks, originating in what is the south of modern Greece, namely the Peloponnese and Central Greece, where Greek temple architecture appears to have its main roots, probably derived from local wooden predecessors. The Greek mainland's architectural style is the Doric one, considered to be the most austere and "male" in character. On our Exploring Athens, we see no less than three key examples of that purest form of Greek temple: The Parthenon on the Athenian Acropolis, most emblematic of all Greek temples, the Temple of Hephaistos in the city's Agora, best-preserved example in Greece (both are from the mid-5th century BC), and the wonderfully set temple of Aphaia on the island of Aigina, predating them by half a century. The eastern Aegean and Asia Minor were famous for their own development, the more elegant and "female" Ionic style, conceived about a century after the Doric one. Its most prominent examples at Samos, Ephesus and Didyma (much better preserved than the other two) are also marked by their vast monumental size. We visit them on our Cruising the Dodecanese and Cruising to Ephesus tours, respectively, in each case exploring visible remains of the 4th century BC or later. What's so remarkable about the Greek temples of Sicily then? The short answer is simply that Sicily possessed a greater density of monumental temples than any other area of the Mediterranean, and now contains more well-preserved examples than anywhere else. Not only do they make for an unusually rich ensemble of particularly impressive ancient monuments, but moreover, each of them has its own distinctive character and peculiar features, its own history and its own specific setting within a town- or landscape. The reason for Sicily's wealth in such a specific type of monument lies in the early history of the island. In the 8th century BC, Sicily became a target of the movement known as Greek colonisation, which affected much of the Mediterranean and Black Sea. Greek settlers, mostly from the city states of the Southern Greek mainland, set off to found a whole series of new cities in the island, including Syrakousai (modern Syracuse), Akragas (Agrigento), Messene (Messina) and Selinous (Selinunte). In fact, Sicily (and the south of the Italian mainland) received so many Greek colonies that the region was later called Megale Hellas or Magna Graecia ("Great Greece"). These settlers brought their Greek identity, lifestyle, culture and traditions with them, a package that also included their religion. The great temples of Sicily are the most striking expression of that package. First of all, they fulfilled the practical need of providing a place of worship or sanctuary with a house for the statue of the respective god or goddess. At the same time, the choice of an architectural type from the "motherland", the Doric temple, served as a clear indication of the colonists' background and cultural alignment. Soon, the size, format and individual characteristics also began to express the "new" cities' wealth, ambition and specific Sicilian identities. Syracuse (Syrakousai), founded by Corinthians in 733 BC, was originally limited to the small island of Ortygia, which is still the heart of its Old Town. Two major temples are found on the islet. The temple of Apollo is one of the oldest among the Greek temples of Sicily, built before 550 BC. Although it is only partially preserved, its monumental character is still appreciable through the closely-placed thick columns, as is its already very Sicilian plan, with an adyton, an inner holy-of-holies housing the statue of Apollo, at the back of the internal sanctuary. An inscription on the front steps names Kleomenes as its architect and Epikles as the creator of the columns - such a proud commemoration of the builders would have been unthinkable in mainland Greece at that time. For the modern visitor, the temple of Apollo at Syracuse is outshone by that of Athena, one of the most spectacular sights in Sicily. Erected by the local tyrant Gelon after a great victory over the Carthaginians in 480 BC, this was another monumental Doric temple, built of local limestone (which would have been covered in fine stucco), with a superstructure of marble imported from the Cyclades, some 900km (550mi) away. What makes the temple of Athena unique, and not just among the temples of Sicily, is the fact that it still serves as a place of worship for its city after nearly 2,500 years. It was rededicated as a Christian church around AD 600, later served as a mosque, and now is Syracuse's Roman Catholic cathedral. Hidden behind an ornate baroque façade, the visitor finds what is essentially an Early Christian basilica built into and around the basic structure of a Late Archaic Doric temple. Agrigento (Akragas) was settled by people from nearby Gela and from faraway Rhodes around 582 BC. The city flourished especially in 6th and 5th centuries BC, after which it frequently changed hands between Greeks and Carthaginians before eventually falling to Rome. During its heyday, Akragas appears to have spent a lot of resources on lavish architecture, a fact criticised by the 5th-century BC philosopher Empedocles, who was himself a citizen there: The Agrigentines live delicately as if tomorrow they would die, but they build their houses well as if they thought they would live for ever. Indeed, Akragas is known to have had at least ten large temples. The most impressive of them today is the one traditionally called the Temple of Concordia, although its deity remains unknown. Dated to c. 425 BC, it is among the last of the Greek temples of Sicily to be completed. It counts as one of the three most completely preserved Greek temples across the ancient world (the others being the so-called Temple of Poseidon at Paestum near Naples and that of Hephaistos in Athens). The inner shrine, outer colonnades and pediments all survive in what is essentially their original state, showcasing the fine proportions of Classical architecture. Its good preservation is thanks to its early conversion into a Christian church. Also visible at Agrigento are substantial remains of three further large temples, including the structure known (probably falsely) as the Temple of Hera. The most noteworthy of them, however, must be the huge Temple of Olympian Zeus, of which only foundations and fallen masonry survive. Built by the local tyrant Theron (brother of the aforementioned Gelon) after the 480 victory, it was dedicated to the chief god. While modelled on the idea of the Doric temple, it was in fact a highly unusual structure for several reasons, including its huge dimensions (110 by 52m or 360 by 170ft), its partially walled-off colonnade, and the use of massive block-built "atlantids", relief figures of giants, to support the superstructure. Some scholars have interpreted the Temple of Olympian Zeus as a hybrid of a Greek Doric exterior and a more Carthaginian/Phoenician interior. You can read more impressions and view more pictures from Agrigento in our post Impressions of Sicily 1: Agrigento/Akragas. Selinunte (Selinous) is located in the far west of Sicily. It was founded in 628/627 BC by Sicilian Greeks from Gela, with some involvement from Megara near Athens. In many ways, it was an outpost among the Greek cities of Sicily, located close to the Phoenician/Carthaginian centres of power. This did certainly not stop its inhabitants from engaging in the construction of temples: we know of at least seven, several of them of massive dimensions. Four were located on the acropolis, the hilltop citadel of the city. One of them, Temple C, is still very impressive. We do not know what deity was worshipped at Temple C, of which one side is preserved. It dates to before 550 BC. It shares some similarities with the slightly older temple of Apollo at Syracuse, such as the adyton at the western end of the sanctuary, housing a statue of its god or goddess. Nonetheless, its columns and overall proportions are more gracile. Especially impressive, however, are the grooves that allowed the huge bronze doors at its eastern end to open and close. It was approached via a monumental stairway of eight steps, the oldest we know in the Greek World. The museum at Palermo holds examples of its rich sculptural decoration. A second group of three huge temples stood just to the east of Selinunte, by its harbour. Two, G and F, lie in ruins, but the third, temple E stands proud, partially as the result of modern reconstructions. This was the temple of Hera, wife (and sister) of Zeus and goddess of matrimony. From the mid-5th century BC, this temple incorporated a strong influence from the Greek motherland, where the style we now call "Classical" was then in full swing, while also following Sicilian architectural traditions. Temple E is characterised by a harmony of proportion that is unusual among the great temples of Sicily. Its sculptural decoration, while modest in quantity, is among the finest achievements of Greek art in Sicily. Overall, it is strongly reminiscent of the very slightly older and far less well-preserved temple of Zeus in Olympia, a site that would have been familiar to many Sicilian Greeks, due to the athletic competitions held there every four years. Segesta, inland from Sicily's northwestern extremity, is in a way the odd one out among the cities mentioned here. It was not the product of Greek colonisation, but founded in the mists of time by Elymians, a local Sicilian tribe. Throughout its history, it chose a role between the Greek and Carthaginian spheres, adopting aspects of Greek culture, but not necessarily allying itself with its Greek neighbours. Segesta was in constant conflict with nearby Selinous. Nevertheless, late in the 5th century BC, the Segestans engaged in the construction of a fine Doric temple on a hill outside their city, probably using expert builders from their rival and enemy Selinous. Perhaps due to the outbreak of war, it was never completed. Its remains look complete at first sight, with the exterior colonnades and pediments in place. On a closer look, one notes that the delicate column flutings and other sculptural details were not applied, and that the temple is lacking an interior sanctuary. With its relatively late date and in its incomplete state, the temple at Segesta is a fit point to end this post about the important architectural achievement that are the Greek temples of Sicily. If you are interested in seeing these impressive monuments, along with prehistoric cemeteries, Phoenician settlements, Norman churches and baroque towns, you should join us on our brand-new epic Exploring Sicily tour this spring! (We'd like to thank P.C. Hall for all images not otherwise marked, except that of the fallen atlantid)
<urn:uuid:f7e996a9-b28f-4d6f-b7af-6a8300a0f2cf>
CC-MAIN-2022-33
https://www.petersommer.com/blog/italy-travel/temples-of-sicily
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00396.warc.gz
en
0.968858
2,543
3.046875
3
Answer to Part 2.Design problems . Design a basic MOSFET current mirror for Io = 200 microamps with VDD = 5V, Kn= 80 mA/V 2 , Vt = 1V and lambda= 0. . Can someone who has had this problem before and solved it let us. Cadence Simulation of Basic Current Mirror. We plotted the output current Imirror (Current Flowing through the NM1 transistor) with respect to output voltage Vout which is nothing but VDS of transistor NM1. Here we are using gpdk045 which is 45nm technology. Here, we are mirroring the double of reference current i.e we should get Imirror= 20uA. The current mirror circuits are simple current sources which gives constant current. The current mirror circuits are based on the principle that, if the gate to source voltage of two identical MOSFETs are equal then the drain current flowing through them is equal. The basic current mirror circuit is shown in Figure below. 1) Recalibrate your tester and always have a working reference cable . 2) Test again. If the cable passes, you probably had a poor connection with your test cables . If it fails, go to the next step. 3) Check your terminations. There should be no more than 0.5 inch of exposed twisted-pair cable on 110 terminations (panels and jacks). MOSFET Implementation. When the Wilson current mirror is used in CMOS circuits, it is usually in the four transistor form as in Fig. 5. If the transistor pairs M1-M2 and M3-M4 are exactly matched and the input and output potentials are approximately equal, then in principle there is no static error, the input and output currents are equal because there is no low frequency or DC current. Twin Flames are also called Twin Souls . Are literally the other half of our soul . We each have only one twin , and generally after being split the two went their separate ways, incarnating over and over to gather human experience before coming back together. In this video, the solution of Quiz # 322 is provided.Here is the detail of the Quiz.Subject: Analog ElectronicsTopic: MOSFET- Current Mirror#ALLABOUTELECTRO. . In the previous article, we discussed about Current Mirror Circuit and how it can be built using Transistor and MOSFET. Despite the fact that basic current mirror circuit can be constructed using two simple active components, BJTs and MOSFETs or using an amplifier circuit, the output is not perfect, as well as it has certain limitations and dependencies on the. current mirrors 1. A New CMOS Voltage Divider Based Current Mirror, Compared with the Basic and Cascode Current Mirrors Presented by M.V.Mounika, 14204116. 2. Introduction: • Current Mirrors made by using active devices have come to be widely used in analog integrated circuits both as biasing elements and as load devices for amplifier stages. Design the current mirror. Jul 19, 2015 · A constant- current source is a current limiter or current regulator that freely allows the flow of current , but only up to a set limit. It is a practicable version of an ideal constant- current source, which would be something like a special battery that delivered a fixed current flow, not a fixed voltage; in other words, it would deliver a. An example application of the current mirror is the transconductance op amp. The circuit is shown in Fig. 3. The circuit consists of an input diff amp and four Wilson current mirrors. For the analysis, we assume β →∞and VA →∞for each bjt so that the output current from each mirror is equal to the input current. This article lists 100 MOSFET MCQs for engineering students.All the MOSFET Questions & Answers given below includes solution and link wherever possible to the relevant topic.. A FET (Field Effect Transistor) is a class of transistors that overcomes the disadvantage of the BJT transistor. It is capable of transferring high quantity resistance to low quantity. Find Rq=. +5V 40 ΚΩΣ 40 KS V2 Vc Vc 200 MA -5v 4. Replace the 2001A current sink above with a B.JT current mirror with a resistor Rq to sct the current. A MOSFET current mirror is shown in Fig. 2 of the Design Report, where the Il 80uA current source is a place holder for Rq, similar to Huwk 3 diode problems. View Details. Request a review. Learn more. MOSFET MCQ Question 8. Download Solution PDF. Consider an n-channel metal-oxide-semiconductor field-effect transistor (MOSFET) with a gate-to-source voltage of 1.8 V. Assume that W L = 4 , μ n C ox = 70 × 10 -6 AV -2, the threshold voltage is 0.3 V, and the channel length modulation parameter is 0.09 V −1. Bjt amplifier problems and solutions pdf select edge loop blender shortcut who is paul in then she was gone ford 1210 tractor parts uk dobbs ferry restaurants on the water is gac family part of hallmark 1935 chevy coupe for sale. the GATE of the depletion mode n – channel MOSFET. (True/False) [GATE 1994: 1 Mark] Soln. The MOSFET is of depletion mode and n – channel type. Like JFET, depletion mode MOSFET is normally ON device. i.e. has drain current when V GS = 0 V In depletion mode MOSFETs drain current can exceed I DSS (not like JFETs) if the gate voltage is of. Answer to Part 2.Design problems. Design a basic MOSFET current mirror for Io = 200 microamps with VDD = 5V, Kn= 80 mA/V 2 , Vt = 1V and lambda= 0 . For an ideal MOSFET, λ is zero. Since λ always greater than zero, due to which drain current varies linearly with V ds even in the saturation mode. Fig. 6: Cascode Current Mirror Applications Here are some examples of current mirror application: Scale W 2 /W 1 to save power. In typical current mirror design, W 2 /W 1 are not always 1:1. Since the gate voltage of diode-tied (Gate tied to drain) MOSFET is biased with I REF, this will create a voltage level for the output branch to mirror and. 3. What is a current mirror? It is a circuit that outputs a constant current that is equal to another current called “reference current”. I_ref I_out Figure 1: Current mirror basic circuit Q1 along with the series resistance before it determines the reference current. While Q2 is responsible of delivering the output current or mirrored. 1. Id is same in Q1, Q2 and Q3 (Current Mirror). Calculate it at Q1, using: I D = 1 2 μ n C o x W L ( V G S − V T H) 2. Apply the same equation for Id at Q3 and solve for its VGS. Now, find Vs of Q3 using: V G S = V G − V S. where. V G = 0. In this video, the solution of Quiz # 322 is provided.Here is the detail of the Quiz.Subject: Analog ElectronicsTopic: MOSFET- Current Mirror#ALLABOUTELECTRO. The implementation of the current mirror circuit may seem simple but there is a lot going on. The simple two transistor implementation of the current mirror is based on the fundamental relationship that two equal size transistors at the same temperature with the same V GS for a MOS or V BE for a BJT have the same drain or collector current. To best understand this. CH 9 Cascode Stages and Current Mirrors 38 Example 9.15 : Different Mirroring Ratio Using the idea of current scaling and fractional scaling, Icopy2 is 0.5mA and Icopy1 is 0.05mA respectively. All coming from a source of 0.2mA. It is desired to generate two currents equal to 50uA and 500uA from a reference of 200uA. Design the current mirror. For the MOSFET Amplifier problem where several parameters are being asked to be calculated utilize the same MOSFET current mirror diagram and the table of values. Please read the 1st Please read the 1st one and know that all questions are written out there so you work off that information on the whole problem on your papers and once done, you just click your right. A basic MOSFET current mirror (section 6.3.1 in the text). 2. A simple MOSFET differential amplifier (section 7.1 in the text). ... A MOSFET differential amplifier with current mirror biasing. A list of the parts that you will need to complete this lab is provided in Table 1. Breadboards, wiring, and parts can all be obtained from the EE.. Basic MOSFET current mirror. The basic current mirror can also be implemented using MOSFET transistors, as shown in Figure 2. Transistor M 1 is operating in the saturation or active mode, and so is M 2.In this setup, the output current I OUT is directly related to I REF, as discussed next.. The drain current of a MOSFET I D is a function of both the gate-source voltage and the drain-to. Jan 18, 2013 · Chrysler radio problems Fix Chrysler radio problems. The code is 4312, but I cannot explain how you arrive at that answer from the note This is a push block puzzle. Hemigod420 · 5 d ago. By easy-hack, 3 years. 10/22/2004 Steps for DC Analysis of MOSFET Circuits.doc 3/7 Jim Stiles The Univ. of Kansas Dept. of EECS Note for all cases the constant K is: 1 2 W Kk L ′⎛⎞ ⎜⎟ ⎝⎠ and V t is the MOSFET threshold voltage. 3. ANALYZE The task in D.C. analysis of a MOSFET circuit is to find one current and two voltages! a) Since the gate current G I. For the MOSFET Amplifier problem where several parameters are being asked to be calculated utilize the same MOSFET current mirror diagram and the table of values. Please read the 1st Please read the 1st one and know that all questions are written out there so you work off that information on the whole problem on your papers and once done, you just click your right. The basic current mirror can also be implemented using MOSFET transistors, as shown in Figure 2. Transistor M 1 is operating in the saturation or active mode, and so is M 2.In this setup, the output current I OUT is directly related to I REF, as discussed next.. The drain current of a MOSFET I D is a function of both the gate-source voltage and. Jan 13, 2021: M: Use of PSpice model in LTSpice - MOSFETs from Infinéon: Power Electronics: 3: Mar 20, 2020: L: LTspice model for ZVNL120A and. In this video, the solution of Quiz # 338 is provided.Here is the detail of the Quiz.Subject: Analog ElectronicsTopic: MOSFETUseful videos related to MOSFET:. The current mirror is created as a part of the major MOSFET structure with common drain (D) and gate (G) terminals and separated source terminals (S and CS). To minimize errors related to the voltage drop on bounding wires from the source current of the major device, two separate terminals, one for a current mirror current return (SR) and. Two implementations exist for the simple current mirror: BJT and MOSFET. BJT The BJT implementation of the simple current mirror is used as a block in the operational amplifier. V2 0.65Vdc 1.425mA 0V VCC Q2 Q2N3642 23.47uA 1.425mA-1.449mA VCC 0 R1 2k 1.472mA Io 0 Q1 Q2N3642 23.47uA 1.425mA-1.449mA I 0V 3.600V Vo IREF Vo I 3.600V 655.3mV. Current Mirror MCQ Question 6: The current mirror shown below, assume that the emitter area of transistor Q 1 is equal to that of transistor Q 2. The value of R is. 5.75 kΩ. 4.65 kΩ. 6.45 kΩ. 7.25 kΩ. Answer (Detailed Solution Below) Option 2 : 4.65 kΩ. Soln. The current equation for BJT is =𝜷 +( +𝜷) As temperature increases, the leakage current I CO increases, so the current I C increases in BJT . Since mobility decreases as temperature increases. So in MOSFETs current I DS decreases with rise in temperature Option (b) and (c) 4. When the gate – to – source voltage (V GS. The Wilson current mirror. This clever circuit eliminates load current variation due to the Early effect by keeping the collector voltages of both transistors constant. FIGURE 2. The classic two-transistor current mirror may be all you need if you are not too worried about the load current changing due to the Early effect. This circuit is. A current mirror may consist of many MOSFET current sources This circuit is particularly useful in integrated circuit design, where one resistor R is used to make multiple current sources the current mirror simply ensures that the gate to source voltages of each transistor is equal to the gate to source voltage of the reference. · Current sink. A current mirror may consist of many MOSFET current sources This circuit is particularly useful in integrated circuit design, where one resistor R is used to make multiple current sources the current mirror simply ensures that the gate to source voltages of each transistor is equal to the gate to source voltage of the reference. · Current sink. 3pm pst to hawaii timeaqa a level biology exam questionssherp price used2020 chevy 3500 upfitter switchespanasonic digital pianocorporate governance duke lawhow to change zebra printer settingsanthem walmart healthy benefitsshould i turn on mprt ffxiv housing ideas largefind inorder from preorder and postorderwellesley college tuitionuw headache clinicsunsetter shade installation instructionsmitsubishi j2534 softwarenegative thinking patterns in relationshipsscarborough public transportpass ccie lab a320 cockpit simulator for saleeagle pass news accidentkasingkahulugan ng palamaracarmax paystubsbrett yang diseaseaudi a3 central locking fusenazar emoji whatsapprj property management llcaccident a264 east grinstead 2 timothy 4 devotionallg 32gp83b b driversrosedale funeral home obituariesmurrurundi steam trainhow to reset anti theft on 2011 chevy equinoxuline d containernorthern lights 4g delta 8 disposable reviewgroup vbs songsfem harry potter is klaus daughter wattpad are varilux lenses worth itmurders in okca company has an opportunity to bid on three contractssonicwall virtual labzio patch monitor applicationairbnb manager job descriptioncan i leave olaplex 8 overnightsafelite bonuscheckpoint operation failed cannot create the checkpoint rsi stock chartis scope creep inevitableunseen materials edexceldrunk bucky barnes x readerinstall truenas on virtualboxgeometry name polygons worksheet period name eachazure vm reapplyortho ohio1967 lincoln continental length kimber 1911 stainless lw pricemileage odometer not workingphone plans no activation feemdpi templatetamiya semi bodycurative covid test escondidoue4 debug logrhode island hospital speech therapydo tesla batteries emit radiation rentals with all utilities included near mereplacement glass globe atomizer60 years bible versepenn state application deadline 2022am i a girl quizpac industriesintel nuc can t boot from usbrightmove humberstonsa80 airsoft full metal 55 places lakewood njwhy are oral nutritional supplements given to malnourished patients at dialysis clinicsjourneys grade 4 lesson 11harley air cleaner cover blackpyshark packet fieldswrx fa20 buildgeeni wifi camera mac addressessex car showenergy trader reddit 22 mag pocket revolververmeer bc1000xl manualmks robin mini configark 2 ps5 release datetom chalky vintage collectionabaqus job commandqemu tap networkingfsuipc7 msfs 2020shooting in sioux city yesterday - Basic MOSFET current mirror. The basic current mirror can also be implemented using MOSFET transistors, as shown in Figure 2. Transistor M 1 is operating in the saturation or active mode, and so is M 2.In this setup, the output current I OUT is directly related to I REF, as discussed next.. - Soln. The current equation for BJT is =𝜷 +( +𝜷) As temperature increases, the leakage current I CO increases, so the current I C increases in BJT . Since mobility decreases as temperature increases. So in MOSFETs current I DS decreases with rise in temperature Option (b) and (c) 4. When the gate – to – source voltage (V GS. - Activity points. 7,263. you have to calculate the needed gate voltage not the current. What about input capacitance of gate which has to be charged and discharged and hence draw current. It is directly proportional to input frequency. For 50HZ, it is low. A - Incomplete or Ongoing Percy Jackson Fanfiction Son of the Western Sea by Mac Ceallach (6 Chapters) Even though this one is incomplete and possibly abandoned, what is here is enjoyable. I especially love the bringing in characters from other mythologies like Shinto and Hindu. Plus, this has a far deeper character development for Percy.
<urn:uuid:77f429ae-6817-48bc-8b8f-540d606b2c27>
CC-MAIN-2022-33
https://lkoev.babebo.pl/current-mirror-mosfet-solved-problems.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00605.warc.gz
en
0.866954
3,924
3.1875
3
Ashwagandha (Withania somnifera dunal) Withania somnifera or ashwagandha is a plant traditionally used in Ayurvedic medicine in its simple form and in combination with other plants. Preclinical studies indicate an antimicrobial, anti-inflammatory, neuroprotective, anxiolytic and cardioprotective effect. (Nawab 2015). Ashwagandha is considered as an excellent adaptogen. This terminology was proposed by the Russian Doctor Israel Brekhman (Brekhman 1969). Common names: Withania, Indian ginseng and in Sanskrit: ashwagandha. Native to India, this plant has spread to the Far East and the Mediterranean. It can even be found in parts of southern Spain. The plant grows wild and is also cultivated for medicinal purposes. Bushy, somewhat woody plant, up to 1.5 m high, with a pubescent stem and greyish or whitish hair. The flowers are axillary, in groups of three or four, short-stemmed and with a yellowish-green corolla. The fruit is a small orange berry, about the size of a pea, which, before ripening, is covered by a calyx. Origin of the name "Ashwagandha" The fresh roots of the plant have a strong and somewhat unpleasant odor, similar to that of horse sweat, from which it derives its Sanskrit name Ashwa-gandha, which means "horse smell". Withania somnifera (Ashwagandha) is a botanical plant used for its roots in Ayurvedic medicine. The root is said to have similar properties to Chinese ginseng, hence its name "Indian ginseng" in Europe. The main chemical constituents of ashwagandha are: withanolides (steroidal lactones, especially withaferin A), alkaloids piperidinic and pyrazolic (anaferine, tropine), phytosterols and flavonoids. From a pharmacological point of view, the active ingredients are essentially withanolides, with a chemical structure similar to that of many solanaceous plants (tomatoes, potatoes, aubergines, chillies etc...). Benefits and applications of ashwagandha roots In the traditional Ayurvedic medicine, ashwagandha is known as "a good remedy to achieve longevity." It is a relaxing and calming herb, which, along with its adaptogenic effect, makes it particularly interesting for managing stress. In addition, it is considered as an immunomodulator, and antioxidant. Finally, it is also known to increase SOD (superoxide dismutase) activity and strengthen the immune system (Birla 2019). Ashwagandha for anxiety and stress Ashwagandha exhibits cholinergic activity. Indeed, it is thought to increase the activity of acetylcholine and of choline acetyltransferase (Schliebs 1997). A meta-analysis of the various studies on the efficacy of ashwagandha on anxiety and stress was conducted (Pratte 2014). Five clinical studies met the selection criteria and measured anxiety and/or stress scores. All five studies concluded that intervention with Withania somnifera resulted in greater improvement (significant in most cases) than placebo of the anxiety or stress scales. Stress and weight gain relationship Because of the relationship between stress and weight gain, ashwagandha has been shown to be effective as a complementary treatment for weight loss in stressed individuals by reducing cravings during the day (Choudhary 2017). Effect on cortisol levels In stressed adult individuals, taking ashwagandha root extract for 60 days produced a significant reduction (P<0.0001) in all stress scales compared to the placebo group. Also, the authors reported a significant decrease (P=0.0006) in serum cortisol levels after two months of intake (Chandrasekhar 2012). Benefits of ashwagandha and mood GABA mimetic action Preclinical studies suggest that ashwagandha contains an ingredient with a GABA-mimetic action, inhibiting 5-Hydroxytryptophan (5-HTP) receptors and stimulating 5-HTP2 receptors. This action results in reduced levels of anxiety and depression in animal models. (Candelario 2015) The relaxing and calming effect of ashwagandha At doses of 1 g/day, the effect of ashwagandha on mood has been shown to be significant after 15 days of treatment. Similarly, in medium-term studies, it has been observed that the effect does not diminish right away after 18 months of continuous treatment. Also, the calming effect of withanolides has been demonstrated in laboratory animals by administering 20-50 mg/kg for 5 days, comparing the results with those of lorazepam and imipramine. (Bhattacharya 2000). Finally, one study shows a calming dose-response relationship at daily doses between 125 and 500 mg (Auddy 2008). Ashwagandha and intellectual performance A clinical study demonstrated the stimulating effect of ashwagandha on memory (Pingali 2014). Two 250 mg capsules of aqueous extract of ashwagandha roots were administered daily. Cognitive and intellectual performance tests were performed before admission, 3 hours after admission and again on the 15th day after administration. In this study, it is concluded that ashwagandha improves reaction time compared to placebo. Similarly, it improves vigilance and card-sorting test scores. Immunomodulatory botanical extract Ashwagandha is considered an adaptogenic herb, characterized by the improvement of physical and intellectual performance. In addition, it contributes to the improvement of the immune response. Ashwagandha is considered an adaptogenic herb, characterized by the improvement of physical and intellectual performance. Contraindications - Precautions Ashwagandha is not recommended for pregnant women. People with psychiatric problems should seek the advice of their doctor before consuming ashwagandha. Consumption of this herb increases T3 and T4 levels in laboratory animals. Therefore, the use of this supplement in people with hyperthyroidism should be evaluated by a physician. Recommended daily doses The usual dose is 3-6 g of herb per day. The usual titration of withanolides in extracts varies from 3 to 8%. A dosage of 300-600 mg dry extract per day may be recommended as supplement of ashwagandha root extract. Ashwagandha dietary supplement / ashwagandha capsule supplement Optim Serenity is a dietary supplement made from Ashwagandha (Withania somnifera) and Rhodiola Rosea. These two adaptogenic herbs help to manage stress and mental fatigue. The supplement comes in the form of plant-based capsules easy to swallow. Auddy et al (2008)A Standardized Withania Somnifera Extract Significantly Reduces Stress-Related Parameters in Chronically Stressed Humans: A Double-Blind, Randomized, Placebo-Controlled Study, JANA, Vol 11, 1, Pages 50-58. Birla H et al (2019): Neuroprotective effects of Withania somnifera in BPA-induced-cognitive dysfunction and oxidative stress in mice. Behav Brain Funct. 2019 May 7;15(1):9. Brekhman I et al (1969). New substances of plant origin which increase nonspecific resistance. Ann Rev Pharmacol 9: 419-30 Candelario M et al (2015): Direct evidence for GABAergic activity of Withania somnifera on mammalian ionotropic GABA A and GABAr receptors. J Ethnopharmacol. 2015; 171:264-272. Chandrasekhar K et al (2012): A prospective, randomized double blind, placebo-controlled study of safety and efficacy of a high concentration full spectrum extract of Ashwagandha†root in reducing stress and anxiety in adults. Indian J Psychol Med. 2012 Jul-Sep; 34(3): 255-262. Choudhary et al (2017): Body weight management in adults under chronic stress through treatment with Ashwagandha root extract: A double-blind, randomized, placebo-controlled trial. Journal of Evidence-Based Complementary & Alternative Medicine 2017, Vol. 22(1) 96-106 Pingali U et al (2014): Effect of standardized aqueous extract of Withania somnifera on tests of cognitive and psychomotor performance in healthy human participants.Pharmacognosy Res. 2014 Jan;6(1):12-8. Pratte A et al (2014): An Alternative Treatment for Anxiety: A Systematic Review of Human Trial Results Reported for the Ayurvedic Herb Ashwagandha (Withania somnifera). The Journal of Alternative and Complementary Medicine 20, No. 12, 901-908. Schliebs R et al (1997) V: Systemic administration of refined extracts from Withania somnifera (Indian Ginseng) and Shilajit differentially affects cholinergic but not glutamatergic and GABAergic markers in rat brain. Neurochem Int. 1997, 30: 181-190. Wagner H (1994): Plant adaptogens. Phytomedicine Volume 1, Issue 1, June 1994, Pages 63-76
<urn:uuid:616d6224-8da9-4676-98de-493dae5322c1>
CC-MAIN-2022-33
https://laboratoire-optim.com/blogs/en/ashwagandha-withania-somnifera-benefits-supplement-monograph
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00205.warc.gz
en
0.882218
2,049
2.5625
3
- Kedarnath – One of the most spiritual, powerful, holiest places on earth whose beauty is eternal The Kedarnath is one of the holiest cities in Hinduism which is named after The Kedarnath Temple. It is situated at an elevation of 3,583meter above sea level. The Kedarnath Temple is more than 1200 years old and is located in the Garwal region of the Himalayan range, near the Mandakini River in the state of Uttrakhand, India. However, the temple is not directly and easily be reached by road. That’s because one has to trek a 22 Km uphill route from Gauri Kund to reach here. The existence of people in Kedarnath and the total region of Kedarnath came into consideration only due to the Kedarnath Temple. The temple is dedicated to Lord Shiva and is considered one of the most powerful temples of Lord Shiva in the world. It is also the home of 1 of the 12 most powerful Jyotirlingas (the symbol of Lord Shiva) in the world. The temple is highest Highest among all the 12 other Jyotirlingas and is in the middle of massive Himalayan mountains which seems like Big Guardians of the Temple and the whole Kedarnath Valley. Kedarnath Temple is one of the parts of the famous Char Dham yatra. How Kedarnath Got Its Name The Word Kedarnah was derived from the Sanskrit words – kedara (“field”) and the Natha (“lord”). The Combination of both the words means “ Lord of the Fields”. Concerning this word, there is a text in Sanskrit “Kashi Kedara Mahatmya” which tells the actual meaning and purpose of Kedarnath. The Text Means – “the crop of liberation” or the place where the crop of liberation is grown. History of Kedarnath The Story of Kedarnath starts with the Pandavas. When Pandavas won the battle of Mahabharat, they were happy but at the same time, they were very sad because they have killed so many people. They then wanted to pray to the Lord and ask for forgiveness. Accordingly to one of the renowned Saint of those times, they visited Kedarnath valley via Haridwar and did Penance (Tapasya) for lord Shiva and established a Jyotirlinga. After This, the Pandavas were blessed by the appearance of the lord shiva in front of them. This was how the Kedarnath Temple Came into existence. However, In the year 2013, a tragic thing happened in Kedarnath Valley. A sudden cloud – burst resulted in a devastating tsunami which worst hit the Kedarnath town. The incident is considered as the worst Natural disaster happened since 2004. The destruction was so massive at that time, thousands of people died and tons of people went missing. Many rescue teams were deployed and were trying harder and harder to save as many people as they can. This Incident attracted eyeballs all around the world. The incident was so tragic and mind-numbing that Bollywood thought to make a film n it and pay the tribute to the lost lives. Then in 2018, a movie was made featuring Late Sushant Singh Rajput which told the story of the incident by virtually recreating it to the whole world. But At the time of the Incident, one Great thing happened. A Big Tree Trunk gets stuck between the 2 rocks, resulting in the diverting heavy tsunami pressure sideways which eventually saved The Kedarnath Temple. Was it a coincidence or a miracle by god himself? Although there is so much to do in Kedarnath But we have listed 4 Topmost places to visit in Kedarnath : 1. Kedarnath Temple: The 1st place on your list when you are in Kedarnath should be the place the city known for and where visiting is a form of a blessing – The Kedarnath temple. Build by the Greatest scholar and philosophies of Hinduism, Adi Shankracharya. The Temple is dedicated to Lord Shiva and is one of the jyotirlingas out of the 12 lingas in the country. The Kedarnath Temple is also one of 275 Paadal Petra Sthalams (The most Powerfull Temple of Lord Shiva all over the world). Situated at a height of 3,580meters and surrounded by the mighty snow-scrapped mountains of the Himalayan range, The temple seems the Heaven of the Earth where the lord lives. One can feel a highly spiritual aura at and near the temple. The temple alone attracts tons of visitors both domestic and International every year. How to visit: – One has to Trek about 16 Kms uphill to reach The temple, from Gaurikund Rudraprayag. Exploration Time: – 5 Hrs (Including the time of Trekking) Timings: – 4:00Am – 9:00Pm Entry fee: – Free Entry 2. Bhairav Temple The Bhairav Temple or The Bhairavnath Temple is a very powerful temple of Lord Kala bhairava or Kalbhairava (who is the fierce form of Lord Shiva and is associated with Destruction). It is said that Lord bhairav is the guardian of the Kedarnath Dham and the whole Kedarnath valley. And it is also said that in the winter season, at the time of heavy snowfall it is the Lord kalbhairava who protects the Dham and the valley. There fore to honour him the temple was built. The Temple is located at the southern side of the Kedarnath temple on the edge of an eastern hill. The temple is without any roof which further enhances its beauty. How to visit: – The temple is about 0.9 km uphill from the Kedarnath Dham and one have to trek to reach here. Exploration Time: – 2 hr ( Including Trek time) Timings: – There are no Gates and roofs of the temple, Hence no limited timing. Entry fee: – Free Entry 3. Rudra Cave or The Dhyan Gufa The Rudra Cave is the underground Meditation cave that offers an Intense peaceful and Spiritual environment for meditation activities near the holy Kedarnath Dham. However, The Cave was built by Garhwal Mandal Vikas Nigam and Nehru Mountaineering Institute. It is located at the other end of the Mandakini River. However, It is the same place where India’s honourable Prime Minister Mr Narender D. Modi sat in the state of deep meditation and whose pictures got very viral. How to visit: – 1.5. TREK FROM The Kedarnath Temple. Exploration Time: – 2.5 hr ( Including Trek time) Timings: – 6:00 Am – 6:00Pm Entry fee: – 990 Per Person. 4. Gaurikund Temple This Temple is dedicated to the wife of Lord Shiva, Goddess Gauri or also Known as Mata Parvati. Accordingly to the holy history books of Hinduism. It is said that at this place, Mata Parvati did penance (Tapasya) which included Harded Yoga practices and ascetic to win Lord shiva’s Heart. The Temple is situated in the Gauri Kund at a height of 1982 meters. And it is the starting point of the trek to the Kedarnath Dham. The Dham is around 22 Km uphill from the Gauri Kund. How to visit: – In Gaurikund, Enroute Kedarnath Temple. Exploration Time : – 1Hr Timings: – 4:00 Am – 9:00Pm Entry fee: – Free Entry When to visit Kedarnath |Travel Seasons||Min/Max Temperature||Season| |April to June||15-30 degrees||Summer – Cool and comfortable| |July to September||12-27 degrees||Monsoon – Rains with chances of landslide| |October to March||0-20 degrees||Winter – Freezing cold| The summer season is the best season to visit Kedarnath, that’s because it is the most ideal environmental condition to visit Kedarnath. The mixture of warm sun and cool breeze makes the day very pleasant and one can enjoy the visit comfortably. However, the other seasons, monsoon and winter season make unfavourable conditions for the Kedarnath visit. Even Though there is not much rain possibility in the monsoon season, but when it does it rains heavily and makes favourable conditions for landslides and roadblocks. On the other hand in the winters, the temperature can get as low as -20 degree celsius which make conditions favourable for heavy snowfall. On this day the land of Kedarnath is covered by multiple feet of snow which looks very beautiful. But the gates of the temple are closed in the entire season and it is not advised to trek these days. So there is no worth visiting Kedarnath when the temple is closed. Hence, both the season period (July – September) and (October – March) are not the best times to visit Kedarnath. How to reach Kedarnath The Jolly Grant Airport of Dehradun is the closest airport to Kedarnath with a total distance of 240 Km. The airport is one of the major operational airports in the country. One can easily find taxis and buses from Dehradun to Gauri Kund, after exiting the airport Rishikesh Railway Station is the closest railway station to Kedarnath. But one has to travel around 210 Km from Rishikesh to Gauri Kund by road. And then 15 Km on foot from Gaurikund to reach Kedarnath Dham. Gaurikund (starting point of Kedarnath Trek) is well connected by road with the major cities of Uttarakhand like – Rishikesh, Haridwar, Kotdwar, etc as well as with the Country’s capital Delhi. The conditions of roads are very good both in the Plain and the Hilly areas. One can choose between plenty of buses options like – Ac, Non Ac, Volvo luxury buses and the Uttrakhand local buses. Taxi service is also very easily available on this route and one can also choose to take their private vehicle for the journey. Where to stay Since Kedarnath is one of the holiest and important places in Hinduism, It is very much commercialized at both places – Near the Kedarnath Temple as well as the starting point of the trek, The Gauri Kund. One can find various accommodation options from budget-friendly PGs, hostels, to luxurious hotels. However, Kedarnath offers various budget-friendly ashrams, all thanks to its holy nature. But one has to book the rooms in the ashrams in the advance in the peak season, as the rooms get full very quickly at this time.
<urn:uuid:1620f0c8-6199-4006-97be-ccb94b36cbc9>
CC-MAIN-2022-33
https://ydnews.in/kedarnath-home-to-1-out-of-12-jyotirlingas/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00000.warc.gz
en
0.956935
2,365
2.734375
3
Intrauterine devices (IUDs) or intrauterine contraception devices are among the most popular birth control measures. IUDs are available in two variants: hormonal and non-hormonal. These tiny devices are placed inside the uterus to prevent pregnancies for three to ten years. They function by preventing the sperm from fertilizing the egg and making changes in the uterus. Read this post to learn about the types, uses, advantages, and associated risks of using an IUD. What Are The Types Of IUDs? IUDs are available in hormonal and non-hormonal variants. 1. Non-hormonal IUDs They are medical contraception devices, usually with copper as the active ingredient. - Copper frame IUD: These are T-shaped soft polymer devices wrapped with a thin layer of copper wires. These can be safely used up to ten years at a stretch. - Frameless IUD: A modern variant of copper IUD comes with a frameless design that lacks a large T-shaped frame. Here, a hollow copper tube is wrapped over a polypropylene thread. This design allows minimal discomfort and molds easily into the shape of the uterus (1). 2. Hormonal IUDs These are T-shaped, polymer-based devices containing the hormone progestin. These devices are placed in the uterus, where they release the hormone progestin. The hormonal IUDs help control heavy periods, and they are often used during estrogen replacement therapy (2) (3). How Do IUDs Work? The non-hormonal IUDs use copper, which is a spermicidal agent that affects sperm quality, making it nearly impossible for it to fertilize the egg. The hormonal IUDs work by primarily preventing ovulation and altering the cervix lining, making fertilization and implantation of an egg almost impossible. Below are other attributes of the functioning of IUDs. - Non-hormonal copper IUDs do not directly prevent fertilization. They release copper ions in the uterus. It leads to a “foreign body effect,” an inflammatory reaction in the intrauterine cavity, making the endometrium (lining of the uterus) unfavorable for implantation of the zygote. This inflammatory reaction also causes the release of prostaglandins, and white blood cells (WBC) are released within the uterine and tubal fluids. Thus, a combination of copper ions, hormones, and WBC has a toxic effect on spermatozoa and oocytes in the uterus. - Hormonal IUDs work by releasing a type of hormone, progestin, in the uterus. Progestin is a synthetic form of progesterone hormone that makes the uterus unfriendly to sperm. In addition, the progestin hormone causes thinning of the uterus lining and partly suppresses ovulation. Progestin-containing IUDs also help control heavy menstrual periods in some women. In addition, estrogen replacement therapy patients, having an excessive build-up of the uterus lining, use them to clear out the endometrium. How Effective Is An IUD? IUDs are reliable contraception methods and provide more than 99% efficiency (4). However, no method of contraception is 100 % effective, and there is always a chance of getting pregnant. How Long Does An IUD Work? According to the US Food and Drug Administration (FDA), the copper IUD will safely work over three to ten years. The hormonal IUDs are approved to work from three to five years (5). How Is An IUD Inserted? The IUDs are prescription medical devices and should only be inserted by a qualified medical practitioner. IUDs are preferably inserted immediately after menses or after the heavy flow of menses settles by day three or four. During this time, the cervix is open and hence more receptive to introducing IUDs without much discomfort to the woman. During the intrauterine device insertion, a short procedure will be followed (6). - The vagina and cervix will be examined using a vaginal speculum. Then, the body parts will be cleaned using a cleaning solution. - A special instrument will be used to align the cervical canal and the uterine cavity. - The depth of the uterine cavity will be measured. - The horizontal arms of the T-shaped IUD will be folded, and using an applicator tube, the device is delivered into the uterus. - Lastly, the extra-long thread at the bottom of the IUDs is shortened. - Sometimes a small yet significant length of the thread attached to the IUD is left behind in the vagina for the woman to periodically check the presence of IUD in utero when in doubt. The presence of thread on palpation or touch indicates the presence of the IUD inside the uterus. If the thread is not felt, it could either be because of the coiling of the thread or due to a misplaced or fallen IUD. - In conditions when the thread cannot be palpated or felt. The woman should immediately consult the doctor and use alternative methods of contraception (condoms or pills) till it is either confirmed clinically by the doctor (on visual examination of the thread on the examination table) or radiologically using X-ray or ultrasonography. Frameless IUD is inserted using a specialized instrument directly into the myometrium of the uterine fundus. The optimal insertion period is right after the menstrual cycle, although it can be done anytime. The procedure of insertion might be painful and may cause cramping in some women. A qualified medical practitioner should also carry out the removal of IUD. The IUDs come with two monofilament threads to aid in the removal. A force is used to gently pull out the IUD, which will fold upward and come out. What Are The Advantages Of An IUD? IUDs let the woman have intercourse without having to worry about male contraception. IUDs generally offer the following benefits. - IUDs reduce the risk of unwanted pregnancy: You do not have to worry about contraception, and it may make intercourse more convenient. - Work from three to ten years: You do not have to remember using or having an IUD since it is always there. - Reversible nature: An IUD can be removed anytime to regain your fertility. Advantages of copper IUDs are: - Copper IUDs are the choice of action to avoid hormonal alternatives. - It can be safely used by women who have never given birth. - It lets you avoid any potential side effects of hormones from hormone IUDs. - You can use them while on medications. Advantages of frameless IUDs are: - The design does not have a bulky structure. As a result, they are comfortable to use compared to the conventional T-shaped design. - They significantly reduce pain, abnormal bleeding, and embedment. - They have a low risk of expulsion, reducing the chance of pregnancy. - The frameless design adapts to the shape of the uterus. Advantages of hormonal IUDs are: - They reduce menstrual bleeding and pain. - They reduce the risk of endometrial cancer. - They reduce the risk of pelvic infection. - They offer less risk than direct estrogen-based birth control measures. - The use of hormonal IUDs over a long time may lead to the cessation of periods in some women. What Are The Disadvantages Of An IUD? IUDs do come with their share of drawbacks that you may discuss with your doctor (8). - Framed IUDs may not comfortably fit all types of uterus. Poor fit may cause discomfort and pain during menstruation. Some IUDs may slip out due to a poor fit. If it happens during or after intercourse, there could be a risk of pregnancy. - Copper IUDs are associated with the risk of pelvic inflammatory disease (PID). They are not recommended for women with existing pelvic infections. They are also not recommended for women with copper allergy, Wilson’s disease, and certain cancers. - IUDs are not 100% effective, and there is still a chance of pregnancy. In such cases, the presence of the IUD may affect the health of the growing fetus and the mother. It may also lead to infertility in some cases. - Hormonal IUDs may cause acne, headaches, mood swings, breast tenderness, irregular bleeding, cramping, and pelvic pain. - You may not be able to take certain medications if you use a hormonal IUD. - Some women may take time to regain fertility on the removal of an IUD. - IUDs do not protect you from sexually transmitted infections, and you still have to use contraceptives such as condoms. - Hormonal IUDs are not recommended for women with or with a history of breast, cervical, or uterine cancer. It may also not be suitable for a few women with liver disease and uterine abnormalities. - Hormonal IUDs are usually advised after at least six to eight months post-delivery to avoid uterine damage. - Hormonal IUDs may increase the risk of ectopic pregnancy. - Some women may experience longer and heavier periods while using an IUD. How Much Does An IUD Cost? The cost of IUDs depends on the choice of device, government norms, and the medical facility provider. The cost of an IUD can be up to $1300 in the US (7) (9). Most insurance providers cover the cost of IUDs in the US, and the Affordable Care Act (ACA) has further ensured that women do not have to bear a high cost of IUDs. You may contact your local healthcare provider’s clinic for specific details regarding the cost of IUD in your area. When To Call The Doctor? While using an IUD, it is advisable to seek a healthcare provider if you notice the following symptoms (10). - Severe bleeding or abdominal pain - Menstrual cycle stops suddenly - Device falls out - You do not feel the string of the IUD Frequently Asked Questions 1. Can IUDs be used as emergency contraception? IUDs may be used as emergency contraception. Hormonal and copper IUDs should be placed within three and five days of unprotected sex, respectively. However, it may not always prevent pregnancy, so you must not entirely rely on it for the prevention of pregnancy. 2. Can my partner feel it? Your partner usually cannot feel anything. In rare cases, the string attached to the IUD could be felt, although it does not interfere with intercourse. IUDs are long-acting, reversible contraceptives and remain active for three to ten years. In addition, hormonal IUDs may help reduce excessive bleeding and pain during menstruation. The copper IUDs are the choice of contraception if someone wants to avoid hormonal alternatives. You may pick the right IUD after a discussion with your healthcare provider. - Intrauterine contraception devices (IUDs) can be hormonal or non-hormonal. - Hormonal IUDs prevent ovulation and alter the cervical lining to prevent pregnancy. - Non-hormonal IUDs are made from copper, a spermicidal agent that alters sperm quality. - Intra-uterine Devices. - Dirk Wildemeersch et al.; (2015); Intrauterine systems: a frameless future? - Jennifer K. Hsia et al.; (2016); Intrauterine Contraception. - How effective are IUDs? - Intrauterine Devices (IUDs): Access for Women in the US. - IUD Insertion. - Contraception – intrauterine devices (IUD). - Intrauterine Device (IUD) for Birth Control. - How can I get an IUD? - Intrauterine contraceptive device (IUD,IUCD).
<urn:uuid:82daa070-7334-41fa-b97b-79a9e35be673>
CC-MAIN-2022-33
https://www.momjunction.com/articles/iud-birth-control-types-cost-efficacy-benefits_00777370/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00001.warc.gz
en
0.878052
2,890
3.28125
3
(rotating and 3D model) |Conway notation||oC or deC| |Vertices||26 = 6 + 8 + 12| |Symmetry group||Oh, BC3, [4,3], *432| |Rotation group||O, [4,3]+, (432)| arccos(−7 + 4√/17) In geometry, a deltoidal icositetrahedron (also a trapezoidal icositetrahedron, tetragonal icosikaitetrahedron, tetragonal trisoctahedron and strombic icositetrahedron) is a Catalan solid. Its dual polyhedron is the rhombicuboctahedron. Cartesian coordinates for a suitably sized deltoidal icositetrahedron centered at the origin are: - (±1, 0, 0), (0, ±1, 0), (0, 0, ±1) - (0, ±1/2√, ±1/2√), (±1/2√, 0, ±1/2√), (±1/2√, ±1/2√, 0) - (±(2√+1)/7, ±(2√+1)/7, ±(2√+1)/7) The long edges of this deltoidal icosahedron have length √ ≈ 0.765367. The kites have three equal acute angles with value and one obtuse angle (between the short edges) with value . Occurrences in nature and culture The deltoidal icositetrahedron is a crystal habit often formed by the mineral analcime and occasionally garnet. The shape is often called a trapezohedron in mineral contexts, although in solid geometry that name has another meaning. The deltoidal icositetrahedron has three symmetry positions, all centered on vertices: The solid's projection onto a cube divides its squares into quadrants. The projection onto an octahedron divides its triangles into kite faces. In Conway polyhedron notation this represents an ortho operation to a cube or octahedron. The solid (dual of the small rhombicuboctahedron) is similar to the disdyakis dodecahedron (dual of the great rhombicuboctahedron). The main difference is that the latter also has edges between the vertices on 3- and 4-fold symmetry axes (between yellow and red vertices in the images below). A variant with pyritohedral symmetry is called a dyakis dodecahedron or diploid. It is common in crystallography. It can be created by enlarging 24 of the 48 faces of the disdyakis dodecahedron. The tetartoid can be created by enlarging 12 of its 24 faces. The great triakis octahedron is a stellation of the deltoidal icositetrahedron. Related polyhedra and tilings The deltoidal icositetrahedron is one of a family of duals to the uniform polyhedra related to the cube and regular octahedron. When projected onto a sphere (see right), it can be seen that the edges make up the edges of an octahedron and cube arranged in their dual positions. It can also be seen that the threefold corners and the fourfold corners can be made to have the same distance to the center. In that case the resulting icositetrahedron will no longer have a rhombicuboctahedron for a dual, since for the rhombicuboctahedron the centers of its squares and its triangles are at different distances from the center. |Uniform octahedral polyhedra| |Symmetry: [4,3], (*432)||[4,3]+ |[1+,4,3] = [3,3] |Duals to uniform polyhedra| This polyhedron is topologically related as a part of sequence of deltoidal polyhedra with face figure (V3.4.n.4), and continues as tilings of the hyperbolic plane. These face-transitive figures have (*n32) reflectional symmetry. - Deltoidal hexecontahedron - Tetrakis hexahedron, another 24-face Catalan solid which looks a bit like an overinflated cube. - "The Haunter of the Dark", a story by H.P. Lovecraft, whose plot involves this figure - Pseudo-deltoidal icositetrahedron - Conway, Symmetries of Things, p.284–286 - "Keyword: "forms" | ClipArt ETC". - "Kite". Retrieved 6 October 2019. - Isohedron 24k - The Isometric Crystal System - The 48 Special Crystal Forms - Both is indicated in the two crystal models in the top right corner of this photo. A visual demonstration can be seen here and here. - Williams, Robert (1979). The Geometrical Foundation of Natural Structure: A Source Book of Design. Dover Publications, Inc. ISBN 0-486-23729-X. (Section 3-9) - Wenninger, Magnus (1983), Dual Models, Cambridge University Press, doi:10.1017/CBO9780511569371, ISBN 978-0-521-54325-5, MR 0730208 (The thirteen semiregular convex polyhedra and their duals, Page 23, Deltoidal icositetrahedron) - The Symmetries of Things 2008, John H. Conway, Heidi Burgiel, Chaim Goodman-Strass, ISBN 978-1-56881-220-5 (Chapter 21, Naming the Archimedean and Catalan polyhedra and tilings, page 286, tetragonal icosikaitetrahedron)
<urn:uuid:20051100-f046-4603-a561-7945de472257>
CC-MAIN-2022-33
https://en.wikipedia.org/wiki/Deltoidal_icositetrahedron
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00204.warc.gz
en
0.751424
2,097
2.765625
3
The gate separates the profane world from the sacred one, which we will enter having left behind our daily routine, unsolved problems and troubles. The entrance through the gate is special: by singing sutartinė (a Lithuanian polyphonic song) and walking in circles around each pole of the gate, we consecrate the gate in a particular way. Then, we can wash our hands, thus symbolically washing away all our worries, so that we can enter in for the celebration clean and ready to celebrate and can be renewed. A pole whith branches, decorated with flowers and plants (Kupolė), is a symbol of the tree of life, the flourishing and maturity of plants. It is also no coincidence that the feast of Rasos was chosen to be celebrated at the point when the sun and nature itself are at their peak. It is the point of transformation, when all the flora shifts from the blooming stage to that of maturing seeds and fruit, thus giving rise to new life. In a human life, it is the period of weddings; therefore, young girls willing to get married play the following game: standing backwards to the Kupolė, they throw their flower wreaths over their heads. The number of tries needed until the wreath stays on a branch indicates the number of years left until the girl’s marriage. In the period of the Summer solstice, herbs and plants are particularly full of vital and magical power. These plants used to be called kupolės, since, just as with crops, this is the time they thrive and flourish (Lith. kupa). However, when picked after the Feast Day of St. John, the powers of the herbs fade, so people used to try and pick all medicinal herbs before or during the feast. The Rasos feast itself was the time for picking the magical kupolė (a special bouquet of flowers, herbs, and plants), which was used to tell the future and to protect oneself from evil forces… For the future-telling, one has to pick a separate bouquet of 9 herbs and plants, which must be picked in bunches of three herbs from three different spots, by walking three steps in ever different direction to go from one spot to another. The plants must be collected in silence. Ancient Lithuanians believed that wading in new grass and picking medicinal herbs fortified humans and protected them from evil spirits. A wreath with no beginning or end is a symbol of eternity and continuous reoccurrence. While weaving a wreath, we create a circle of flowers that we place on our heads, thus crowning ourselves. A circle is a shape that symbolises a never-ending movement, plenitude, harmony, completeness, and perfection. Thus, a wreath as a circle of flowers allows us to experience plenitude coming from the gifts of Nature, which are plants, and – through them – the never-ending energy of the Universe itself. Wreaths are to be woven by everybody, including women, men, and children; and everyone should do it by themselves. Crops used to be an element of great importance in the Rasos feast. It was obligatory that girls with wreaths on their heads or young men carrying firebrands of the main Joninės fire should walk around crop fields, thus ensuring their protection from natural disasters and securing a good harvest. The act of walking in circles around the field is magical in itself, linked to the idea of a round circle that lies in the wreath. In the Rasos feast, the blooming of rye is referred to as clouding (Lith. rasoti) or scudding (Lith. plaukti) of rye… It is believed that this might have given rise to the name of the feast itself as it was always celebrated at the time when rye and wheat bloomed. Crops are future bread. Bread is a symbol of human life and prosperity. It was cherished and held in particularly high esteem. By paying homage to rye and bread through songs and polyphonic sutartinės, we give thanks for all the prosperity in our lives. Later, we break bread and share it, as a sign of solidarity and assistance to each other. To ancient Lithuanians, the oak used to be a sacred tree, a mediator between the here and the beyond; therefore, it was also in oak groves that our ancestors used to build altars to their gods. By singing songs about oaks, we first of all think about our Homeland, wishing it the firmness of the tree, and longevity along the paths of history. By lighting an altar, we pay our respects to our ancestors’ faith, which was always their main support and value in life. Every moment in life or action that had more significance used to be accompanied by rituals of faith, which, just like the perception of God itself, evolved over time. Humans are spiritual beings; therefore, we too can address our God (or a Higher Power) according to our level of faith, using the ancient sign of expression and means of faith, namely, the fire of an altar. By throwing grains of rye on the altar, we thank God and entrust him with our daily lives, with all their worries and joys. By sacrificing amber dust, we think of our goals and dreams, and pray for them to come true. The sun on this feast day is the main “character” since its journey is at its peak at that time. It is the time when the sun, at sunrise and sunset, seems to freeze on the horizon. This happens twice a year: in winter and in summer. The Latin word “solstitium” means the standstill of the sun. When the sun is at a standstill in the sky, humans must celebrate, not work. In the old days, the feast of Rasos used to last at least for a weak rather than one day. And it is said that on the 29th of June, on St. Peter’s Feast Day, those who do not sleep can see the sun dance. Such a saying can be explained by the change in the trajectory of the rising sun, which is already visible at that time, when the sun turns around and its daily route over our heads and the horizon begins to get increasingly shorter. By singing songs at sunset, we bid farewell to the sun, as from now on we will enjoy its light and warmth less and less, and for a shorter time… Since time immemorial, the bonfires of St. John’s Feast Day have been lit every year as a substitute for the sun during the brief period of its absence, thus ensuring the complete victory of light over darkness at least once a year. We light the bonfire with the fire brought from the altar, which makes it special, purifying, and cleansing… People used to take this new fire home to bring protection and blessing to their houses. Jumping over the bonfire on the night of Rasos is a must for everyone who whants to improve their health and gain strength for the upcoming work in the fields during the summer, as well as for those wanting to insure their homes against fire. And if a young man and a girl succeed in jumping over the bonfire holding hands, this is a sign they will become a couple or get married in the coming year. This is a rite of bringing together and paying respect to the coalescence of all the four elements: earth, air, fire and water. A wreath of plants with a fragile flame in the middle is a reflection of a human life itself, set to float down the river. We can watch the wreath try and keep the light alive amidst the element of water, especially if the weather conditions are not that favourable that year… And if the wreaths of a young man and a girl met, tradition used to see it as a sign of the coming wedding of the two that year… Constructions of Baltic patterns on tall poles symbolize the climax in the journey of the returning Sun. In the old days, there was a belief that the flames of Joninės do not only substitute the missing Sun for a short while but also provide protection and welfare to humans and their environment for the whole year… To us, these Baltic signs are symbols of the beauty and wisdom of our ethnic identity, and the flaming stebulės serve as our endeavour to preserve and reveal the Baltic culture to the rest of the world. As we know, this plant has no flowers. The only description of a fern flower in folk stories says that it shines. According to legends, the perseverant, the brave, and the selfless might be lucky enough to find a fern flower on the night of Joninės. The fern flower of the Rasos feast is associated with knowledge and light. It is not without reason that we refer to a wise person as a bright person. In order to find the fern flower, a person must go deep into the forest before midnight, and once they find a fern, they must stay there waiting, resisting the terrifying attempts of the world of the spirits to scare them away. If the person succeeds and resists, at midnight the fern flower might light up for them, opening up the path to knowledge to them. It is the knowledge that comes from spiritual effort rather than by accident. Therefore, the one who finds the flower acquires clairvoyance and finds their happiness, love, and friendship. However, there is one condition: once you find a fern flower, you are not to use its powers for selfish purposes, or else all the forces it provides will disappear. Stories say that the one who finds the fern flower and gains understanding of the language of birds, animals, trees, and all nature, is transformed from a subjugator of nature into its protector, living in harmony with nature. At sunrise, everyone gathers on a hill to welcome the sun. Ceremonial songs are sung to welcome it. It used to be said that on that morning “the sun dresses up, changes colours, bounces or is encircled with coronas.” As M. Glemžaitė put it, “on the morning of Joninės, the sun is encircled with coronas. The coronas turn and bolt around the sun… Some coronas are pink, others take other colours, similar to a rainbow. The village youth await the sunrise to see the coronas of the sun. They later boast about it not being the first time that they see them.” The descriptions of the rituals are based on insights by J. Vaiškūnas, L. Klimka, A. Žarskus, and others. Translated by Rasa Galkytė
<urn:uuid:20cc8b49-4d76-41f9-8429-acc5dc8668f7>
CC-MAIN-2022-33
http://jonines.belglietuviai.eu/wp/en/rituals-and-their-meaning/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00604.warc.gz
en
0.951994
2,270
2.515625
3
‘Mary’ sat on a stool, a stack of glossy magazine pages beside her. Deftly, she manipulated each page until it was but a fraction of its original size. She went about her work swiftly and silently, only nodding a greeting as we arrived. Mary (‘my English name!’, she proudly boasts) lives in a small-ish Chinese city with her family. She and her paper crafts claim a prominent place in the household; as the senior household member, she takes her job of protecting and passing on traditional culture seriously. I just wondered why she was busily folding and refolding magazine pages. Later, around the dinner table, I got my answer. By each food bowl lay a paper bowl that Mary had folded meant for table scraps: fish bones, peppers and slivers of ginger. There is some argument over whether the art of sculpting animals out of folded paper originated in China or in Japan but one thing is certain: the Japanese words for this practice are the ones that everyone knows. Come with us now as we explore how the Japanese learned to make paper, who the first origami artists were and why they practised their art. We’ll also look at how far origami has strayed from its iconic cranes and flowers. Paper: the Essential Ingredient of Origami No matter how you cut it, paper had to be invented before anyone could fold it. Our first step to tracing the origins of origami is discovering paper-making, an act often credited to a Chinese inventor and politician named Cai Lun. Rather than inventing it, he refined the paper-making process; archaeologists found samples of a cruder type of paper along the ancient Silk Road that predates Cai Lun’s by about 300 years. Nevertheless, the relative ease and low cost of producing these hemp-fibre sheets in the manner he established meant that paper could be widely used. Soon, other provinces were making paper using a variety of fibres. The paper-making craft spread throughout Asia. In Korea, artisans discovered how to make paper out of seaweed, rice straw and bamboo fibres. Paper took the Korean Peninsula by storm! Soon, everyone had a use for paper and some envisioned even more paper possibilities: in 1234, Koreans invented the first metal movable type machine. The Chinese invented the movable type some 200 years earlier but they used wooden blocks. We’re getting much further ahead of ourselves than we should... the question we need to answer should be: how did paper making get to Japan? A Korean Buddhist monk named Don-Cho demonstrated the practice of paper-making to the Japanese emperor sometime around 610 AD. Soon, Japanese craftsmen were using paper to make fans, parasols and even body armour. In homes, windows consisted of rice paper; even the walls were sometimes made of paper! And then, someone had the idea to craft a keepsake box out of paper. Coating it with varnish and lacquer made it both beautiful and durable; thus an entire industry was born. In spite of its functionality, origami today still symbolises very specific aspects of Asian culture. Origami: the Symbol of Discipline Early in Japan’s history of paper, it was very expensive so its usage was restricted to religious purposes. For instance, a wedding might feature origami butterflies. Such designs still feature in weddings today. Unfortunately, it is not known exactly when origami became a staple of Japanese culture. It is widely thought that the Shogun, an ultra-disciplined military force that ruled Japan (off and on) from 1185 to 1868 used the art of folding to teach discipline, precision and patience. Here, we have to make a distinction between two different types of Japanese origami: ceremonial and recreational. The aforementioned discipline exercises the Shoguns used would fall under the header of recreational origami – believe it or not. As for ceremonial origami, besides being used in weddings, this type had a more official purpose. Those samurai warriors were known to exchange gifts. The recipient who would receive such a parcel adorned by a noshi – a type of ceremonial origami with a strip of dried meat or fish folded into the paper would have been a fellow well thought of indeed! Records of such gifts prove that, by the Muromachi period (1336 to 1573), origami was firmly ingrained into Japanese culture. Do you know why origami is so important in Japanese culture? One Thousand Cranes for Sadako In traditional Japanese culture, cranes are a symbol of longevity and luck. They are also among the most renowned origami designs. Still today, a common belief in Japan holds that if someone folds one thousand paper cranes, s/he would be blessed with happiness, health and peace. This pervasive myth fuels one of Japan’s most endearing legends. Sadako Sasaki was only two years old when the bomb dropped on Hiroshima. Ten years later, as leukaemia was ravaging her small body, she endeavoured to fold 1,000 cranes so that she might cheat death. Now incarcerated in the children’s cancer ward, she realised her hopes of living were in vain so, as she continued to fold the delicate origami bird, she directed her fervent hope toward peace. When she died, she was buried with a flock of origami cranes; some that she had folded and others created by her classmates – who went on to campaign for a statue of her to be placed in the Hiroshima Peace Park. Every year, millions of paper cranes make their way there from around the world, expressing a global wish for peace. Would you like to learn how to make origami animals? Origami in Europe Paper made its way to Europe via East Asia somewhere around the 11th Century but, here again, it was not used frivolously until a few hundred years later. The first recorded instance of an origami boat in Europe was in a book published in 1490. The next, most obvious example of origami in Europe came in John Webster’s play, The Duchess of Malfi, published in 1623, wherein a character alludes to ‘a paper prison’ - what is known today as a water bomb. Before paper made its way to northern European kingdoms, royal courts enjoyed displays of napkin folding – a decorative type of folding done with napkins. Some designs were rather simple; a diagonal pocket or what was known as a bishop’s fold. Others were quite elaborate: fans and roses; a fleur-de-lys fold was quite popular in France. Ironically enough, napkins were ideal for decorative folding because they were square; unfortunately, they lacked the rigidity of origami paper and, because of their use, quickly lost their form. That is why napkin folding was only a passing fad. After the 18th Century, it fell out of fashion, possibly because porcelain took its place as decorative tableware. Nevertheless, the ground had been laid for folding things into decorative shapes; all the royal courts needed was the right material. The next, most significant advance in European origami was surely Friedrich Froebel’s Kindergarten Method of instruction. He maintained that learning should be a hands-on activity rather than a passive exercise and rote repetition. He devised a system of student engagement that incorporates something remarkably similar to the day’s popular practice of napkin folding, except using paper rather than cloth. A few years after his death in 1852, when Japan opened her borders, they imported Froebel's method of learning and, oddly enough, adopted his recommendations for how to make an origami: double-sided square paper and no cutting or trimming allowed. Prior to the Japanese incorporating the educational benefits of origami into their schools’ curriculum, their origami practice permitted cutting (kirigami) and glueing or sewing (kusudama). To this day, Froebel’s style of easy origami using a square piece of paper is standard practice in Japan; in fact, it has opened up new avenues of industry to support the Japanese art. Japanese paper, specifically Washi paper has been voted the hands-down best by paper folders around the world. And did you know that they are now producing fold paper with crease patterns already imprinted? So, whether you are just learning how to fold or you already have several origami models under your belt, you can rest assured your paper art will turn out finer the higher quality paper you use. Check Superprof to learn Japanese London. The Japanese word for folding paper is universally recognised even though it was thought to have originated from the German language. It’s not so far-fetched that the German word inspired the Japanese one; it was likely imported, along with the Kindergarten Movement, sometime around 1880. Sadly, other words incorporating the Japanese ‘ori’ or ‘gami’ have fallen by the wayside: - orikata: literally 'folded shapes'. Compare to martial arts katas which also involve assuming a pose or 'shape'. - orimono translates to 'folded thing' (you might recognise ‘mono’ from the Japanese word ‘kimono’; that word's literal translation is 'wearing thing'. - tatamigami: tatami is a straw floor matting common in Japanese homes; these mats are smaller; something we might use as place mats on our tables. - kirigami: to cut paper Still, origami, at its purest, is not a lost art! Would you like for someone to suggest a few origami projects or maybe show you how to fold a tessellation? Perhaps point you to a few origami books for kids or talk you through a simple origami? Today, fans of the folding technique can get their origami on at clubs throughout the UK: the British Origami Society, the Folding Society; even NetMums has an origami club. And, just when you thought folding origami was merely a paper craft... would you be surprised to know that origami has engineering applications? Indeed, if you are in that line of work, you most likely have a few constructions you could bring to the next meeting... From a small town in China to a farm in rural Minnesota where I learned 3D origami (folding pages of a periodical to make a tree), origami folding has proven to be timeless, universal craft. And to think, if that Chinese politician hadn’t figured out how to make a thinner, more durable sheet of paper... We've now determined that, although origami is not strictly Japanese, it has firm roots in Japan. Now we just need to know why... The platform that connects tutors and students
<urn:uuid:648e4b37-43c8-42a5-b418-cc7635238d65>
CC-MAIN-2022-33
https://www.superprof.com.my/blog/origami-history/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00004.warc.gz
en
0.968879
2,296
3.078125
3
A World of Forests: Mammoth Lakes Ecosystems Jul 14, 2021 Forest Ecosystems of Mammoth Lakes Mammoth Lakes is legendary for providing outdoor adventurers access to long, scenic hiking trails and flowing, epic mountain bike single track. These trails wind through a wide variety of forest ecosystems, providing majestic environments rich in natural beauty and diverse in flora and fauna. The term ecosystem refers to a collection of organisms interacting with each other and with the surrounding physical environment. Ecosystems are comprised of numerous components, most notably being the kinds and numbers of inhabiting organisms, whose existence may be limited by physical factors such as altitude, soil, climate, topography, history, and moisture. In the Eastern Sierra, forest ecosystems are defined by the predominate tree species, which are bound by elevation restrictions. Five distinct forest ecosystems may be explored in the Mammoth Lakes region and each contains a diverse assemblage of interacting plants and animals. In increasing altitude, these biotic zones are the pinyon pine/juniper forests, riparian forests, lower montane forests, upper montane forests, and sub-alpine forests. Ecosystems of the Eastern Sierra are located at much higher altitudes than similar biotic zones of the western slope of the Sierra Nevada Mountains. These legendary mountains act as a water barrier, making the western slope much wetter and allowing similar forest ecosystems to exist at much lower elevations than on the much drier eastern flank. Lower Montane Forest Ecosystems The lower montane ecosystem in the Eastern Sierra region occurs between 7,000 ft. to 8.500 ft. in elevation and is marked by the noticeable dominance of large Jeffrey and ponderosa pines. At the lower elevations of this biotic zone, expect to see more of the ponderosa pine with it’s jig saw puzzle-like bark. Jeffrey pine, whose bark is less coarse and smells of vanilla, become more abundant as elevation increases. Additional tree species found within the diverse forests of the lower montane ecosystem include white fir, incense cedar, and juniper. At these elevations, the climate is characterized by cool, wet winters and dry, relatively warm summers. Once the blanketing snows retreat in the early spring, the lower montane zone becomes the seasonal home of large mammals, such as mule deer, black bear, and coyote. Migratory birds often feed within this ecosystem and industrious squirrels are very common at all levels. The wooded areas within and adjacent to the town of Mammoth Lakes provide excellent examples of lower montane forests. Shady Rest Park, located on the eastern edge of town near the visitor’s center, has several hiking trails that wind through majestic stands of pine. To become immersed within giant old growth ponderosa and jeffrey pines in a more secluded setting, take a half-day hike to Sherwin Lake. The trailhead is located just outside of town and for trail conditions and directions, stop at the visitors center on your way into town. Upper Montane Forest Ecosystems Upper montane forest ecosystems are characterized by mature stands of red fir, jeffrey pine, western juniper, and most commonly, lodgepole pine. This biotic zone extends from 8,500 ft. to just above 10,000 ft. in elevation in the Eastern Sierra and at these heights, snow often remains well into the months of May and June, making the upper montane forests ideal for late-season (July-August) wildflower blooms. The easily distinguishable lodgepole pine dominate the upper montane ecosystem. These straight trunk pines have a very scaley, or reptile-like, bark and do not grow as large as their ponderosa or jeffrey pine cousins. Lodgepole pine are important for a variety of wildlife characteristic of this ecosystem, including ground squirrels, long-tailed ferrets, gray owls, and songbirds (throughout the late summer). The best places to become immersed within the upper montane forests around Mammoth Lakes are near the Mammoth Mountain Main Lodge area and along the many hiking and biking trails of the Lakes Basin at the end of the Lake Mary Road. Look for large stands of flakey-barked lodgepole pine and giant, short needle red firs of the high altitude forests. Sub-Alpine Forest Ecosystems The sub-alpine forest ecosystem extends from around 10,000 ft. to up to 11,500 ft. in elevation in the Easter Sierra. These forests commonly contain whitebark pine and lesser amounts of white and lodgepole pines, with foxtail and bristlecone pines prevalent in some areas. The high elevations of the sub-alpine forests subject the ecosystem to severe winds and prolonged winter conditions. Species making these elevations their home must be equipped to deal with the harsh, cold climate. Many of the trees found within the sub-alpine forest do reach the heights of the lower elevation ecosystems. Animals making the sub-alpine their home include the jackrabbit, marmot, coyote, and Clark’s nutcracker (see the blog on the wildlife of mammoth mountain). Visitors will find themselves in the lower levels of the sub-alpine ecosystem at the top of Minaret Summit, just past the Mammoth Mountain Main Lodge, where the transition from the upper montane forest to the sub-alpine forest occurs. For the adventurous, many of the high altitude trails leaving from the Lakes Basin pass through this incredibly beautiful forest ecosystem. Riparian ecosystems are collections of organisms that are restricted to areas adjacent to wetlands or streams. These organisms are not suited for the prevailing dry, desert climate of the Eastern Sierra and may only be found along the banks of mountain streams or within moist, swampy meadows. The influence of elevation and climate is less noticeable and riparian forests may extend into the upper montane biotic zone. Common riparian trees include deciduous species of quaking aspen, mountain alder, willow, and cottonwood. Because they are deciduous, the leaves of these trees will change color in the fall, making for a spectacular experience when hiking one of the many stream side trails in the region during the months of September and October. To experience the oasis-like riparian ecosystem of the Eastern Sierra, take a hike from town. Mammoth Creek, which flows adjacent to a paved bike path along most of it’s course, is lined with thick stands of quaking aspen and mountain alder. As the stream leaves town, stands of large cottonwood begin to dominate and provide shade for a teeming population of trout. Pinyon/Juniper Forest Ecosystems Below 7,000 ft. in elevation to about 5,000 ft. in elevation, forests of the Eastern Sierra are dominated by pinyon pine and juniper. These short, yet hardy trees are drought tolerant and can handle the limited precipitation and arid conditions common at these elevations. In areas of higher than normal moisture, stands of ponderosa and jeffrey pine flourish and tower above the dominant pinyon pine and juniper forests. The biotic zone is easily identified by the noticeable appearance of sagebrush and mesquite underbrush densely growing between the trees. The pinyon pine and juniper forest ecosystem of the foothills below Mammoth Lakes is a great place for bird watching. Mountain bluebird, mountain chickadee, a variety of birds-of-prey, and sage grouse are common throughout this biotic zone. Additional wildlife that thrives within this ecosystem includes mule deer, desert jackrabbits, and coyote. For those with high clearance vehicles, many of the primitive dirt roads that bifurcate from the Benton Crossing Road, located 6 miles southeast of town on 395, wind into this low elevation forest ecosystem. Additional areas to experience the wonder of the pinyon pine/juniper forest ecosystem are near the McGee Creek trailhead and the community of Crowley Lake, both located only a few miles south of Mammoth Lakes on Rt. 395. Alpine Zone Ecosystems The high altitude mountaintops of the Eastern Sierra are within the alpine ecosystem and although devoid of forests, this biotic zone is worth a mention. Above 11,500 ft. in elevation, there is an overall absence of trees and the growth of other vegetation is extremely limited. At these heights, harsh winters combined with extremely short summers and intense winds keep the rocky slopes barren of most life. Sparse patches of grass and ground clinging flowers keep herbivore rodents like the American pika and marmot fed and sustained throughout the brief snow free periods. Several of the hiking trails leaving the Mammoth Lakes basin eventually ascend well above the treeline into the alpine ecosystem. Popular day hikes include Duck Pass and sections of the John Muir Trail. For high altitude multi-day excursions, the Pacific Crest Trail (PCT) from Mammoth Lakes weaves through vast alpine stretches with epic views the entire way. For expansive, picturesque views of the rocky high alpine mountaintops, travel to Minaret Vista to the west of town on State Route 203 or just look up! The forests of the Eastern Sierra provide clean water, clean air, wildlife habitat, recreation, and land conservation to the visitors and residents of the region. These high desert ecosystems are very sensitive to human impacts, so please remember to leave no trace. Preservation is the key to the future and many of the forested areas around Mammoth Lakes contain trees that are several centuries in age. These invaluable resources should be respected in order to preserve the natural beauty of the region’s forests for future outdoor adventurers and vacationers. The majestic and diverse forests surrounding the town of Mammoth Lakes are waiting to be explored. Next time you find yourself immersed within one of the many Eastern Sierra forest playgrounds as a camper, hiker, photographer, fisherman, or biker, take a break from your pursuits to experience the awesome natural beauty of Mammoth’s many different forests. With this information, you may be able impress your adventure buddies with your knowledge of Eastern Sierra forest ecosystems while exploring the many trails of the region. Steps for Practicing Stewardship - Leave no Trace. Don’t leave evidence of your presence in the forest. Remember the motto, “Pack it it; Pack it out.” - Leave the trees and wildflowers alone. Avoid cutting down, damaging or removing any live vegetation (including wildflowers). - Green or live wood will not burn. Use only dry, dead wood for campfires. - Picking wildflowers means they will not reproduce, limiting the following year’s bloom. - Stay on the trails. Remain on marked trails and roads at all times to prevent erosion and vegetation damage. - Riparian and moist environments are most prone to damage and should be respected. - Practice fire safety. Obey all fire regulations at all times. For updates on fire regulations and restrictions, contact the Inyo National Forest Office at 760-873-2400 For more information about forest stewardship in the Eastern Sierra region, stop by the National Forest office at the Mammoth Lakes Visitor Center at 2520 Main Street in Mammoth Lakes (near the town’s entrance).
<urn:uuid:e3ddf114-4a79-436e-b489-08d95f0f0cfa>
CC-MAIN-2022-33
https://www.visitmammoth.com/blogs/world-forests-mammoth-lakes-ecosystems/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00404.warc.gz
en
0.924816
2,378
3.21875
3
Most of the Corps and Regiments of the New Zealand Army observe a day significant to the respective Corps or Regiment - The Royal New Zealand Artillery celebrates “Gunners Day” on 26 May, marking the formation of the Royal Regiment of Artillery in 1716. - The Royal New Zealand Armoured Corps celebrates “Cambrai Day” on 20 November, marking the Battle of Cambrai in 1917, which saw large numbers of tanks first employed. - The Royal New Zealand Corps of Transport celebrated “RNZCT Corps Day” on 12 May, which marked the formation of the New Zealand Army Service Corps in 1910. For the Royal New Zealand Army Ordnance Corps (RNZAOC), the day of significance was 12 July and as “Corps Day” commemorated the day in 1947 when the New Zealand Army Ordnance Corps (NZAOC) was granted Royal Status. The granting of Royal Status to the NZAOC was an acknowledgement of New Zealand’s Ordnance services from 1912 and the valuable contributions of the NZAOC during the Second World War. 1 May 1912 – New Zealand Ordnance Corps For a military force to remain effective, the ability to maintain and repair firearms is an essential function. From the 1860’s Armourers and Arms Cleaners of New Zealand’s Defence Stores Department, in conjunction with civilian gunsmiths, kept New Zealand’s stock of weapons maintained and repaired. With the introduction of Bolt Action rifles and Maxim Machine Guns, the increasing complexity and quantity of weapons systems available to New Zealand’s Military Forces required the secondment of Armourer Sergeants from the United Kingdom’s Army Ordnance Corps in 1900. Arriving in New Zealand in 1901, AOC Armourer Sergeants Bertram Buckley and John Hunter immediately set to upskilling New Zealand’s military armourers. Providing further support to Buckley and Hunter was the secondment 2nd Class Armourer Sergeant William Edward Luckman to New Zeeland from the AOC in 1903, who was appointed as the Chief Armourer of New Zealand’s Military Forces. By 1911 Armourer Sergeant Major Luckman, having had his secondment extended several times, was well established as the Chief Armourer of New Zealand’s Military Forces. His Armourers provided inspection, maintenance, and repairs in Armourers workshops in Auckland, Wellington, Christchurch and Dunedin. Although on secondment to the New Zealand military, Luckman, Buckley, and Hunter were still Armourers in the AOC and required to maintain their professional proficiency. New Zealand Armourers trained under Luckman’s supervision required a trade structure and recognition of their ability in sync with the AOC. To provide this structure, General Order 118 was released on 1 May 1912, establishing the New Zealand Ordnance Corps (NZOC) and providing a career path from Apprentice to Armourer Sergeant Major for Armourers of the Defence Stores Department. 1 April 1915 – Royal New Zealand Artillery, New Zealand Army Ordnance Section While the Defence Stores Department were responsible for Small-Arms and associated ammunition, the Royal New Zealand Artillery was responsible for supplying and maintaining the various types of Ordnance (Artillery) and associated ammunition utilised by the Regiment of New Zealand Artillery, New Zealand Garrison Artillery and New Zealand Field Artillery. This functional separation between the Defence Stores Department and Artillery had existed since the 1880s, remaining extant in 1915. While the Colonial; Ammunition Company factory at Mount Eden in Auckland allowed a measure of self-sufficiency in Small Arms Ammunition, the same could not be said for artillery ammunition. In 1911 The Artillery Stores Accountant, Lieutenant Robert George Vining Parker, produced a cost-benefit analysis of the virtues of locally made-up Artillery and imported artillery ammunition. It was estimated that by cleaning and refilling casings, inspecting and refurbishing propellant bags, and manufacturing new ones as required, savings of £3,333 (2022 NZD$633,605) could be made. To achieve these savings, a recommendation that a specialist Artillery Ordnance Corps Section be established to manufacture and modify ammunition was made. Approved by the Commandant of the New Zealand Military Forces, General Alexander Godley, in mid-1914, formal authority was not granted until 1 March 1915, with New Zealand Defence Forces General Order 90 authorising the raising as a component of the Royal New Zealand Artillery, the New Zealand Army Ordnance Section with effect from 1 April 1915. The NCO and six Gunners of the New Zealand Army Ordnance Section were based at Wellingtons Fort Balance. 1 February 1917 – New Zealand Army Ordnance Department and New Zealand Army Ordnance Corps On 31 May 1917, regulations constituting the New Zealand Army Ordnance Department (NZAOD) and NZAOC, backdated to 1 February 1917, were approved and published in the New Zealand Gazette on 7 June 1917, concluding forty-eight years of service provided by the Defence Stores Department. From January 1917, the legacy Defence Stores Department remained in existence only in name as the Director of Equipment and Ordnance Stores, Major Thomas James McCristell, put the pieces together for the final establishment of New Zealand’s military Ordnance Services. Ordnance Procedures for the New Zealand Defence Forces drafted in 1916 were released on 23 January 1917, providing the New Zealand military with regulations concerning Ordnance Services. These procedures were a forward-looking document and can be considered the foundation of New Zealand’s military store accounting procedures. In line with the British AOC organisation, the New Zealand Ordnance Services were to consist of the, - Officers organised into the NZAOD as, - Directing Staff. - Executive Staff. - Inspectorial Staff. - Warrant Officers, Non-Commissioned Officers and soldiers organised into the NZAOC, - Clerical and Stores Section. - Armourers Section. - Armament Artificers Section. Included in the establishment of the NZAOC were Artificers of the Royal New Zealand Artillery, the Artillery Ordnance Corps Section and the Armourers of the NZOC. It must be noted that from 1917 the New Zealand Military now maintained two NZAOCs whose only relationship was in name and had no technical relationship. These were, - The New Zealand Expeditionary Force NZAOC was formed as a unit of the NZEF in 1915 and was disestablished in 1921. This NZAOC consisted of Officers, Warrant Officers, NCOs and Other Ranks. 27 June 1924 – Reconstitution of the New Zealand Army Ordnance Corps On 3 July 1924, a notice published in the New Zealand Gazette revoked the regulations that established the NZAOD and NZAOC on 1 February 1917. Backdated to 27 June 1924, the NZAOD was reconstituted as part of the NZAOC, resulting in one Ordnance organisation serving as part of the New Zealand Permanent Forces. 1 November 1940 – New Zealand Ordnance Corps Unlike the New Zealand Army Service Corps, which consisted of the New Zealand Permanent Army Service Corps (NZPASC) as part of the Permanent Army and the NZASC as its Territorial Army component, the NZAOC did not maintain a Territorial Army component of part-time citizen-soldiers. With the onset of war in 1939 and the mobilisation of the Territorial Army in 1940, the Quartermaster General, Colonel Henry Esau Avery, decided that Light Aid Detachments were an Ordnance responsibility and established the NZOC as the NZAOC Component of Territorial Army as of 1 November 1940. As in the First World War, the 2NZEF also maintained Ordnance units. 2NZEF Order 221 of March 1941 set NZOC as the title of Ordnance in the NZEF. 1942 saw the separation of maintenance and repair functions from the Royal Army Ordnance Corps (RAOC) with the formation of the Electrical and Mechanical Engineers (EME) in the Brutish Army. The New Zealand Division followed suit and formed the New Zealand Electrical and Mechanical Engineers (NZEME) on 1 December 1942, placing repair and maintenance elements into the NZEME with the Ordnance Stores and Services functions remaining as the NZOC. However, as the NZEME was a 2NZEF element and not formed as part of New Zealand’s Force at home and in the Pacific, men posted to the NZEME were still listed as part of the NZOC. The NZEF NZOC was disestablished along with the NZEF in 1946. 1 September 1946 – NZAOC Reorganisation On 1 September 1946, the NZAOC underwent its first major post-war reorganisation with several significant changes reshaping the NZAOC, including, - MT Workshops, Ordnance Workshops, and Armourers Workshops separated from the NZAOC to form the NZEME. - The Distinction between Regular and non-Regular soldiers in place across the army since 1909 was removed. The NZOC was disestablished, and its Officers and Soldiers integrated into the NZAOC. 12 July 1947 – Designation as a Royal Corps In recognition of the valuable services provided by New Zealand’s Military Forces during the Second World War, King George VI approved in 1947 the addition of the prefix “Royal” to be granted to the following Corps of the New Zealand Military Forces - The New Zealand Armoured Corps - The New Zealand Engineers - The New Zealand Corps of Signals - The New Zealand Infantry Corps - The New Zealand Army Service Corps - The New Zealand Army Medical Corps - The New Zealand Army Ordnance Corps - The New Zealand Electrical and Mechanical Engineers - The New Zealand Army Dental Corps - The New Zealand Chaplains Department. Taking effect from 12 July 1947, the Royal New Zealand Army Ordnance Corps, further embraced this honour by adopting 12 July as the RNZAOC Corps Day. “Two armourer sergeants imported from England,” Archives New Zealand Item No R24403217 ( 1902). “Buckley, Bertram,” Personal File, Archives New Zealand (Wellington) 1900,. NZ Armourers, New Zealand Military Forces, General Order 118/12, (Wellington, 1 May 1912), 44-45. ; “Boyce, John – WWI 35094, WWII 4239 – Army,” Personal File, Archives New Zealand (Wellington) 1914. In 1914 the stocks of New Zealand Artillery consisted of a variety of obsolete, obsolescent and current field and fixed coast artillery pieces, including 6-Pounder Hotchkiss gun; QF 6 pounder Nordenfelt; QF 12 pounder 12 cwt gun; Ordnance QF 18-pounder; QF 4.5-inch howitzer; BL 6-inch Mk VII naval gun, 6-inch gun Mk V; BL 8 inch Mk VII naval gun.”(Capt J O’Sullivan Director of Stores – Return of Ordnance and Ammunition in New Zealand),” Archives New Zealand Item No R24750839 (14 March 1906), .; Peter Cooke, Defending New Zealand: Ramparts on the Sea 1840-1950s (Wellington, NZ: Defence of New Zealand Study Group, 2000, 2000), 833. Major J.S Bolton, A History of the Royal New Zealand Army Ordnance Corps (Trentham: RNZAOC, 1992), 54-56. Formation of Army Ordnance Corps Section, New Zealand Defence Forces, General Order 90, (Wellington, 1 April 1915). “New Zealand Army Ordnance Department and New Zealand Army Ordnance Corps Regulations,” New Zealand Gazette, No 95, June 7, 1917. organised into five sections covering all the Ordnance administrative and accounting required of the New Zealand Military: Section 1 – Administration, Section 2 – Charge of Storehouses, Magazine and Workshops, Section 3 – Charge of Stores, Section 4 – Small-arms and machine guns, Section 5 Supply and Receipt of stores and clothing, Section 6 – Transmission and consignment of Stores, Section 7 – Stocktaking, survey and sales of stores, Section 8 – Receiving, issuing and Accounting “Regulations “New Zealand Army Ordnance Department and New Zealand Army Ordnance Corps Regulations,” New Zealand Gazette No 95 (Wellington), June 7 1917, 2292-93. Robert McKie, “Ordnance at the Front – The New Zealand Army Ordnance Corps in the NZEF, 1914 to1920,” The Volunteers: New Zealand Military Historical Society 46, no. 1 (2020): 7-24. “NZAOD and NZAOC,” New Zealand Gazette July 3 1924. “Formation of New Units, Changes in Designation, and Reorganization of Units of the Territorial Force. ,” New Zealand Gazette, No 127, 19 December 1940, http://www.nzlii.org/nz/other/nz_gazette/1940/127.pdf. Designation of Units – Ordnance Corps, 2NZEF Order 221, (March 1940). “Organisation – Policy and General – Royal New Zealand Army Ordnance Corps 1946-1984,” Archives New Zealand Item No R17311537 (1946). “Formation of Unit of the New Zealand Permanent Force,” New Zealand Gazette No 60, 29 August 1946, http://www.nzlii.org/nz/other/nz_gazette/1946/60.pdf. “Designation of Corps of New Zealand Military Forces altered and Title ” Royal ” added,” New Zealand Gazette No 39, 17 July 1947, http://www.nzlii.org/nz/other/nz_gazette/1947/39.pdf.
<urn:uuid:a825e391-3db5-42d4-ac93-09b7be24147d>
CC-MAIN-2022-33
https://rnzaoc.com/2022/07/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00204.warc.gz
en
0.943102
3,010
2.640625
3
What Is a Pre-Diabetic Diet? Here's Everything You Need to Know Pre-diabetes is a more common condition than you might think. Approximately one in three American adults are pre-diabetic—and 90 percent don't even know it. If you've been diagnosed with this condition, you may feel overwhelmed or disappointed, but it may actually be a blessing in disguise. Catching pre-diabetes before it turns into full-blown diabetes, and eating a pre-diabetic diet, offers you a window of time to get proactive about prevention. Your best defense in the fight to regulate your blood sugar? Your diet. By limiting empty calories, choosing the right carbohydrates, and implementing portion control, it's entirely possible to reverse pre-diabetes. Here are some surefire steps for getting your blood sugar under control through a pre-diabetes diet. The difference between pre-diabetes and diabetes With terms like type 1, type 2, and pre-diabetes (and even the relatively new concept of type 3 diabetes) teasing apart the various versions of blood sugar disorders can get a little confusing. Let's set the record straight. What exactly is pre-diabetes and how does it differ from "regular" diabetes? As its name indicates, pre-diabetes is a precursor to full-fledged diabetes. Technically, it's possible to be pre-diabetic prior to developing type 1 (also called "juvenile-onset") diabetes, but more commonly, pre-diabetes refers to an intermediate state between normal blood sugar levels and type 2 diabetes. You can receive a diagnosis of pre-diabetes in one of two ways, both of which measure the sugars in your blood. A fasting blood glucose test looks at your blood sugar when you haven't eaten for at least eight hours. If this number measures between 100 and 125 milligrams per deciliter, it's considered pre-diabetes. The A1C blood test, on the other hand, can detect average blood sugar levels over the past two to three months. A measurement of 5.7 to 6.4 qualifies as pre-diabetic. Anything higher than these levels means an actual diabetes diagnosis. Thankfully, being pre-diabetic doesn't necessarily mean you'll develop diabetes, but it's not something you want to brush off, either. Having pre-diabetes puts you at an increased risk of heart disease, stroke, and nerve damage. The basics of healthy eating for pre-diabetes Because pre-diabetes and diabetes are so closely related, the recommended diets for each are remarkably similar. "There is limited difference in nutrition therapy for pre-diabetic patients versus diabetic patients, aside from more education regarding blood glucose testing and management," says registered dietitian and certified diabetes educator Aubrey Uhling, MBA, RD, CDE. Therefore, if you see foods, recipes, or restaurant meals marked as "diabetic-friendly," they're probably a good bet for your pre-diabetic eating plan as well. Like a diabetic diet, much of a pre-diabetic diet has to do with the number and quality of the carbohydrates you eat. This is because, as carbs get digested, the body converts them into glucose (aka sugar). As you embark on a pre-diabetic diet, your doctor or dietitian may recommend you limit or track the number of carbs you eat in a day using a carb counting program or app. From there, you can transition to learning what types of foods offer complex, or healthier, carbs. "Once the individual becomes comfortable with monitoring carbohydrates, we often begin refining their diet, focusing on the quality of carbohydrates," says Uhling. This might look like choosing high-fiber whole grains over white bread or fresh berries over fruit snacks. Some people with pre-diabetes also find it useful to consult a glycemic index of common foods. This numerical scale tells you how much certain foods raise blood sugar, clarifying which choices can keep your levels steady. Another important task on your pre-diabetes checklist: Get wise about portion control. Eating just enough and not too much can help you shed some unwanted pounds, reaping major dividends in your anti-diabetes efforts. A 2013 study showed that people who lost 10 percent of their body weight within six months of a pre-diabetes diagnosis dramatically reduced their risk of developing type 2 over the next three years. Not sure what a right-sized steak or serving of mashed potatoes looks like? Start with the USDA's MyPlate, which divides a dinner plate into appropriate portions for each food group. Or consult a dietitian. Many of them have handy tips for using familiar images to size up your servings, such as picturing a deck of cards for the amount of meat to eat at dinner or using your clenched fist to gauge a cup of ice cream. Finally, to keep blood sugar stable, it's best to eat regularly. "Avoid skipping meals or eating too frequently," says Uhling. A high-fiber, low-carb snack or light meal every two to three hours can prevent harmful spikes and drops. Types of foods to eat Focusing on whole, unprocessed foods can go a long way toward keeping diabetes at bay. High-fiber whole grains, low-carb fruits and veggies, lean meats, and plant-based protein are all building blocks of a healthy pre-diabetic diet. Some best choices to incorporate include: - leafy greens High-fiber, low glycemic fruits - whole wheat pasta - brown rice - skinless chicken breast - lean ground beef or flank steak - eggs or egg whites Beans, legumes, and nuts - black beans - kidney beans - cannellini beans - lima beans Types of foods to avoid When you're trying to bounce back from pre-diabetes, cutting back on processed foods is key. Too often, packaged convenience foods are loaded with refined sugars and other low-quality carbs. Here are a few specifics to watch out for: - High-sugar foods: To keep sugar intake low, limit foods like sweetened cereals, granola bars, breakfast pastries, and desserts. - Empty calorie drinks: Soda, fruit juices, and sweet coffee drinks may be tasty, but they don't satisfy and offer very little nutrition. When you need a sweet fix to drink, try a sparkling water with a splash of juice. - Refined grains: Why go refined when you could get the fiber and nutrients of whole grains? Take a pass on white breads, pastas, crackers, and rice. - Alcohol (in excess): Steer clear of happy hour over-indulgence. Excessive alcohol consumption causes inflammation, which many researchers believe is involved in the type 2 diabetes disease process. Keep it moderate with one drink per day for women or two drinks per day for men—or less. A typical pre-diabetes menu A sample day of a healthy pre-diabetic diet could look as follows: - Breakfast: Strawberry almond oatmeal (1/2 cup rolled oats, ½ cup strawberries, 2 Tbsp. almonds, 2 tsp. brown sugar, sprinkle of cinnamon) - Lunch: Turkey salad wrap (fresh spinach, shredded carrots, diced turkey, avocado slices, 1 Tbsp. citrus vinaigrette); tortilla chips and salsa - Dinner: Baked tilapia with lemon and olive oil, garlic-herb quinoa, steamed broccoli - Afternoon Snack: Peach smoothie (Greek yogurt, frozen peaches, drizzle of honey) - Dessert: Black bean brownies - Bedtime Snack: Cheese and whole wheat crackers Special diets for prediabetes As more and more Americans develop pre-diabetes (whether they know it or not), new research is exploring how special diets might treat this condition. Some evidence has linked vegetarian, keto, intermittent fasting, and DASH diets to a reduced risk of developing diabetes. Talk with your doctor or dietitian before you embark on any of these eating plans, however. You certainly don't want to throw your blood sugar out of whack with an eating approach your body might not be used to. There's no one-size-fits-all diet for everyone with pre-diabetes, but most people respond well to a portion-controlled, whole-foods diet high in fiber and low in empty calories and refined carbs. "We treat each patient as an individual because everyone is different and responds differently to foods, exercise, stress, etc.," says Uhling. Start with the basics outlined here, and communicate with your healthcare team as you work to gain the upper hand with your pre-diabetic diet. More content from Healthy Eating - – 6 Worst Snacks for High Blood Pressure - – Can You Eat Ice Cream if You Have High Blood Sugar? - – The 4 Worst Breakfast Habits for Blood Sugar According to Dietitians - – This Is the Best Eating Habit for Type 2 Diabetes, New Study Says - – What Coffee Does to Your Blood Pressure, Says Science - – The Most Crucial Eating Habit for High Blood Pressure - – The #1 Best Snack for Blood Sugar, Says Dietitian - – The #1 Best Eating Habit for Heart Health, New Study Suggests
<urn:uuid:9c10111a-73f1-4723-a6cd-1b361737336b>
CC-MAIN-2022-33
https://www.eatthis.com/pre-diabetic-diet/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00404.warc.gz
en
0.925392
2,102
3
3
- Vaccine requirements, exemptions, severity of fines and repercussions for vaccine refusal are as varied across Europe as the countries themselves. - Until recently, most European countries mandated few vaccines but, in the past few years Italy, France, Romania and other countries have moved to expand vaccine mandates and punish families who do not comply. - With the objective of increasing childhood vaccination rates by compelling parents to give their children multiple vaccines recommended and promoted by the WHO, international medical and vaccine trade organizations, and national health care plans, it is expected that public health officials in other countries will urge legislators to pass similar legislation. A number of countries—namely Italy, France and Romania—have passed legislation to expand vaccine mandates and punish families refusing to comply. Others, such as the U.K., do not have compulsory vaccination laws but parents are facing more pressure and disapproval from physicians and government health officials for questioning or declining to use every recommended vaccine. Mandatory use of more vaccines and stricter enforcement of vaccine laws in European countries is coinciding with growing public distrust of vaccine safety as governments move to enforce recommendations by the World Health Organization, medical and vaccine trade organizations and national health care plans.1 2 3 4 5 Compulsory vaccination was abandoned in Britain in the Victorian era after smallpox vaccine mandates, which included fines and imprisonment for parents who refused to comply, were met with massive public protests.6 The subject of mandating vaccines resurfaced and created a contentious debate in June 2017 at a British Medical Association’s annual representatives conference that resulted in a motion to examine the pros and cons of making childhood immunizations mandatory and how it could be achieved in the U.K.7 Voluntary Vaccination Programs in Europe Yield High Vaccine Uptake Historically, most European countries have preferred to strongly recommend vaccination rather than instituting mass, mandatory vaccination programs for their populations. A 2012 Eurosurveillance report analyzed vaccination programs in 27 E.U. countries plus Norway and Iceland found that more than half had no compulsory vaccination laws, while 14 mandated at least one vaccine. A key finding was that “compliance with many [vaccination] programmes in Europe is high using only recommendations.”8 A 2016 ASSET analysis published by Science in Society and co-funded by the European Union, once again did not find evidence of a relationship between national mandatory vaccination policies and increased vaccine uptake in European countries. The analysis found that, “countries where a vaccination is mandatory do not usually reach better coverage than neighbor or similar countries where there is no legal obligation.”9 A Council Recommendation on Strengthened Cooperation against Vaccine Preventable Diseases proposal is scheduled to be adopted in mid-2018 and reportedly public comment will be taken until March 2018. Waning Confidence in Vaccination A global survey of people living in 67 countries was published in July 2016 and offered further insight into public confidence about vaccination.10 The report, which was authored by doctors in the U.K., France and Singapore, looked at the perceptions of more than 65,000 people across the world on the importance, safety, and effectiveness of vaccines and whether vaccination was compatible with personal religious beliefs. They found that seven of the 10 least confident nations were in Europe, including France, Bosnia and Herzegovina. An earlier 2015 study published by the European Centre for Disease Prevention and Control revealed that there is growing vaccine hesitancy and concern about vaccine safety among healthcare workers and their patients in Europe. Researchers reported that healthcare workers had “significant mistrust of pharmaceutical companies who not only had financial interests but also did not communicate sufficient information about side effects and tried to exert pressure on doctors.” Italy Mandates 10 Vaccines Despite Massive Public Protests In the summer of 2017, the biggest public demonstrations against forced vaccination held in Europe since the mid-1800s were held in Italy.11 Tens of thousands of Italians of all ages marched in Rome, Florence, Milan, Bologna, Turin, Cagliani and other cities protesting in opposition.12 They marched in opposition to a May 19 decree endorsed by the government’s Health Minister and President mandating that school children receive multiple doses of 12 vaccines or be prohibited from attending school. Despite public opposition, Italy’s parliament voted on July 28, 2017 to make 10 vaccinations mandatory for children under the age of 16.13 Parents are required to show proof of vaccination for the child to go to school or they must pay a noncompliance fine of approximately $600 USD. Philosophical exemptions are not allowed under the new law. In addition, a government operated vaccine tracking system with a national digital registry will merge the databases of 19 regions and two provinces. There continues to be strong public opposition and advocates for voluntary vaccination hope for change with the upcoming March 2018 elections. Two Italian political parties have pledged to get rid of the mandatory vaccination law.14 Romania and Slovenia Take Hardline Position A mandatory vaccination law was proposed in Romania in the fall of 2017, which sparked large public protests and debates. One proposal that was particularly alarming was that parents, who refuse vaccinations for their children, could be charged with child abuse and possibly murder if their child experiences injury, health damage or death from a disease for which there is a vaccine available.15 Under legislation adopted in August 2017 by one legislative branch of government, Romanian parents would be required to show vaccination records in order for their children to go to school. Proposed fines for vaccine refusal, which were attached to the October 2017 version of the bill, can be up to nearly $3,000 USD. In addition, it is assumed that informed consent is given when compulsory vaccinations are administered to children. However, the proposed law’s implementation date has not yet been set, and Romania’s Chamber of Deputies still needs to vote on the bill. Another country with strict mandatory vaccination policies is Slovenia, which requires children to receive nine vaccinations and strongly recommends pneumococcal and HPV vaccinations. Although medical exemptions are allowed, philosophical and religious exemptions are not allowed and failure to comply will result in a fine. All medical exemption applications need to be approved by a Ministry of Health commission and then by the health minister; however, a child’s vaccination status is considered private and schools cannot require a child be vaccinated to attend. France Adds Eight Vaccines Over Public Opposition In France, eight more childhood vaccines where added last year to the previous mandatory list of three (polio, tetanus and diphtheria) for children born on or after January 1, 2018.16 Entry to preschool, schools and children’s camps will be dependent on being up-to-date with the mandated vaccinations and booster shots. But there has been an increasing amount of public resistance from citizens and physicians in France, who have increasingly lost trust in the safety of vaccines.17 On June 21, 2017, the Court of Justice of the European Union ruled in a compensation case involving a French man who sued Sanofi Pasteur for design defect after a hepatitis B vaccine left him with multiple sclerosis. The court ruled that E.U. laws do not stop courts from considering “serious, specific and consistent” circumstantial evidence along with “scientific” evidence and that lawsuit will proceed.18 There was public opposition to hepatitis B vaccine mandates in France in the 1990s and, additionally, there have been lawsuits against Merck for Gardasil vaccine injuries suffered by young girls in France.19 Germany Requires Kindergarten Reporting In June 2017, Germany instituted a requirement that kindergartens notify government health authorities if parents do not present proof they have participated in “vaccination counseling” with their physician. Non-compliance can result in expulsion of their children from school. The policy for the previous three years had required parents to submit proof of counseling but had not requested schools to report parents for non-compliance. Although the law required more strict enforcement of physician counseling on vaccination, legislators did not make vaccination compulsory in Germany last year. Finland Targets Health Care Workers Meanwhile, in Finland, disease control has been more front and center as a new law will go into effect in March 2018 requiring employees working in the social and health fields be vaccinated against influenza, measles, varicella and pertussis. This includes those working with vulnerable populations, including young children, the elderly and medically high-risk people. The employee can be terminated for vaccine refusal if the employer is unable to offer another non-public contact position.20 A new parliamentary group has been solely created to advertise and legislatively promote vaccination.21 Finland already has a high vaccination rate despite no mandatory vaccination laws for children and the general population. Vaccine Laws Vary from Country to Country Elsewhere in Europe, only those working in state institutions and those administering vaccines are required to be vaccinated in Latvia. That being said, individuals need to attend an education session with a health care provider and sign a refusal form if they choose not to get the recommended doses. The country has a high rate of vaccination at well over 90 percent. - Belgium has implemented a mandatory polio vaccine law since 1966 but the country is divided when it comes to vaccination policies and requirements. The Belgian National Bureau for Childbirth and Childhood requires not only polio vaccine, but also proof of diphtheria and pertussis vaccinations for attendance at French-speaking preschools and childcare centers. - The Ukraine government requires that parents provide a certificate of immunization for their children to attend school. Yet, the country is experiencing a high level of distrust with a 2012 UNICEF survey showing that close to 30 percent of parents were against vaccinations. - Sweden is experiencing resistance from citizens similar to other European countries. There was public opposition to a Swedish Parliament Social Committee Report that was presented in May 2017 with several motions related to compulsory vaccinations.22 In addition to calling for the country’s vaccine program to be made compulsory, the report called for adding influenza and HPV vaccines to the childhood vaccine schedule. The committee and the parliament both rejected the proposals. Looking beyond Europe’s borders, Australia’s “no jab, no play” and “no jab, no pay” policies have taken a hard line against parents with children, who have not received all government recommended vaccines. Not only are unvaccinated children not allowed to attend daycare or preschools, but the directors of daycare and preschool facilities are fined more than $4,000 USD if unvaccinated children are enrolled. In addition, the parents are deemed ineligible for government payment benefits for child care. Vaccine requirements, exemptions, severity of fines and repercussions for vaccine refusal are as varied across Europe as the countries themselves. With the objective of increasing childhood vaccination rates by compelling parents to give their children multiple vaccines recommended and promoted by public health officials, as well as multi-national medical and vaccine trade organizations, it is expected that other countries in Europe and around the world will introduce more vaccine mandates even as public confidence in vaccine safety declines and public protests opposing forced vaccination laws continue. 2 Sarmadi D. Merkel’s ‘vaccine summit’ raises $7.5 billion. Euractiv.de Jan. 28, 2015. 3 Gates Foundation. Bill and Melinda Gates Pledge $10 Billion in Call for Decade of Vaccines. Press Release January 2010. 4 CDC. Who We Are: CDC and Our Global Immunization Partners. Dec. 14, 2011. 5 LaVigne P. Global Vaccine Market Surging to More than 70 Billion by 2024. The Vaccine Reaction Nov. 10, 2016. 6 Earl E. The Victorian Anti-Vaccination Movement. The Atlantic July 15, 2017. 7 Moberly T. UK doctors re-examine case for mandatory vaccination. Brit Med J 2017; 358 (July 18, 2017 online). 8 Haverkate M., D’Ancona F, Giambi C et al. Mandatory and Recommended Vaccination in the EU, Iceland and Norway: Results of the VENICE 2010 Survey on the Ways of Implementing National Vaccination Programmes. Euro Surveill 2012; 17(22). 9 Science in Society. Action plan on Science in Society related issues in Epidemics and Total pandemics (ASSET) Report: Compulsory vaccination and rates of coverage immunisation in Europe. January 2016. 10 Larson HJ, de Figueiredo A et al. The State of Vaccine Confidence 2016: Global Insights Through a 67-Country Survey. EBioMedicine 2016;12:295-301. 11 Fisher BL. Vaccine Freedom Marches Across Italy Highlight Global Vaccine Agenda. The Vaccine Reaction June 20, 2017. 12 Repubblica. ‘Italia del “free vax” in piazza: da Cagliari a Torino si manifesta per chiedere liberta di scelta. June 3, 2017. PHOTOS and VIDEO. 13 Associated Press. Italy Approves Hotly Contested Mandatory Vaccination Program. US News & World Report July 28, 2017. 14 Italian populists promise to scrap compulsory vaccines. The.Local.it Jan. 16, 2018. 15 Benezic D. Romania Argues About Compulsory Vaccination. Civil Liberties Union for Europe Jan. 9, 2018. 16 Association Française de Pédiatrie Ambulatoire. Obligation vaccinale: ce qu’il faut savoir. Jan. 1, 2018. 17 Chamblette A. France Is Fighting the Anti-Vaxxer Movement with Actual Science. Vice Aug. 14, 2017. 18 Castelle L, Butler D. Vaccine ruling from Europe’s highest court isn’t as crazy as scientists think. Nature June 28, 2017. 19 Reuters. Sanofi sued in France over Gardasil vaccine. Yahoo Nov. 24, 2013. 20 Hankonen R. Uusi laki tuo pakkorokotukset työpaikoille. Tehy-lehti Feb. 8, 2017. 21 Smedberg C. Riksdagen får vaccinationsgrupp. Vasabladet June 28, 2017 22 Sveriges Riksdag. Socialutskottets Betänkande 2016/17:SoU7. Social Committee report May 10, 2017.
<urn:uuid:e74c0b31-4a72-4169-8d3c-0914fde156bf>
CC-MAIN-2022-33
https://thevaccinereaction.org/2018/02/european-countries-move-to-expand-enforce-vaccine-mandates/?replytocom=25859
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572220.19/warc/CC-MAIN-20220816030218-20220816060218-00603.warc.gz
en
0.94053
2,973
3.109375
3
Sea-Ice Situation in the Weddell Sea An expedition report by Dr Stefanie Arndt 5 July 2021 While the Arctic sea ice continues to decline, a glance at the Southern Ocean reveals a different picture: in recent years and decades, the sea-ice extent has increased slightly – albeit with clearly recognisable interannual fluctuations and significant regional differences. Nevertheless, we can expect this situation to change, even in the ice-covered Southern Ocean, and it is likely that in the future we will be reporting on a decline in the Antarctic sea ice. Before then, it is therefore all the more important to understand what the actual situation is before the change – and whether there have already been small changes in the sea-ice system compared to 20 or 30 years ago. With this aim in mind, at the beginning of the year we embarked on the 124th Polarstern expedition (PS124). An expedition that couldn’t have been more exciting – before we even entered polar waters. Due to the continuing COVID-19 pandemic, on 16 January the entire scientific team, together with the ship’s crew, first had to go into a two-week quarantine at a hotel in Bremerhaven’s fishery harbour district. Also there: the crew of the Lufthansa plane that would take us to the Falkland Islands in early February – on the airline’s longest passenger flight to date. Once everyone at the hotel had had three negative coronavirus tests, we were able to take off from Hamburg on the evening of 31 January 2021 – and less than 16 hours later, through the window we could catch sight of our German research icebreaker, Polarstern, off the coast of the Falklands. On board, everything went very quickly: securing containers, setting up laboratories, making everything seaworthy – then we weighed anchor; and at 5 pm local time on 3 February our expedition to the Antarctic began. The ‘Roaring Forties’ and ‘Furious Fifties’ lived up to their names, and greeted us accordingly. Just two days later, the conditions became a bit calmer, and we glimpsed the first icebergs on the horizon and the first sea-ice remnants crossed our path. And so the work on the ship work soon began, not just for the oceanographers and marine biologists – but also for us sea-ice physicists and sea-ice biologists on board. Due to the abnormally low ice cover in the eastern Weddell Sea this summer (minimum reached in February 2021), for our sea-ice work we sometimes had to accept long helicopter flights in order to find floes that were able to bear the weigh of our equipment. On 10 February, for the fist time we were once again able to step onto an Antarctic ice floe and start our work. We first investigated the characteristics of the snow cover – the layer that separates the sea ice from the atmosphere. To do so, we analysed the various sub-layers, which resemble tree rings, to determine what the snow had been through in the past year (Photo 1). Here the focus was on the crystal size and structure (Photo 2). The additional investigation of the snow density revealed just how compact the snow was. This is an important parameter in gaining a better understanding of the interactions between the sea ice and atmosphere. At first glance, however, we were barely able to detect any differences between these measurements and those from previous years – a good sign for the sea ice! We also performed similar analyses on the sea ice. Here we gathered several ice cores at the individual ice stations and took them back to the ship. In the ice laboratory we then sawed open one of the cores and studied the structure of the ice crystals (Photo 3). “Using these ice samples, we can, for example, reconstruct how the ice grew, and as a result we can draw conclusions about where the ice floes we sampled were formed. If, for instance, we find large amounts of granular ice in the lower portion of the core sample, this indicates that the floe likely formed under extremely turbulent conditions, such as in a polynya. If, on the other hand, we see columnar ice, we can assume that the ice formed in quieter waters, through completely ‘normal’ thermodynamic growth,” explains Stefanie Arndt, a sea-ice physicist at the AWI. On board, the other ice cores were melted and filtered for various biological analyses. In our laboratories at the Institute, the first follow-up analyses are currently being performed – and we’re eager to see the results. But, of course, we weren’t just interested in the structure of the sea ice and snow, but also in their thickness. Accordingly, at the end of each ice station we walked across the floe with our ice-thickness measuring sledge (using an electromagnetic measuring technique) and a snow-thickness probe to measure these parameters (Photo 4). The data gathered over all of the ice floes showed an average ice thickness of 1.86 m, which means that it was, just like the average snow thickness of 24 cm, comparable with the findings from previous expeditions to a similar region. Once all the probes had been safely packed and all the data had been collected, the helicopter picked us up and we continued our work on board in the ice and filtration laboratory. In addition, on this expedition we deployed our ice-thickness probe, the so-called EM-Bird, which was towed underneath the helicopter, in order to measure the ice thickness over a larger radius, again using an electromagnetic technique. Since most of the time the RV Polarstern was at the ice edge or even in open water, we weren’t able to fly in nice triangles, as usual, and instead had to actively engage in ‘ice-floe hopping’ with the helicopter; a challenging task for the pilots, too. In the end, we completed six successful flights, which showed us: over a large radius, the thickness of the sea ice had hardly changed – which meant that we found ourselves in an ice-covered Southern Ocean that was still in a stable condition. On our journey further southwards, however, we didn’t encounter white sea ice as expected, but instead frequently passed bands of yellowish ice slush, or pancake ice that was predominantly characterised b y this yellowish-green colour (Photo 5). It may not have been particularly pretty to look at, but for the biologists among us, it was all the more exciting. On board, the first microscope investigations of this so-called ‘super bloom’ revealed increased phytoplankton on the upper side of the pancake ice samples and ice algae on the underside – as such, here, too, we can’t wait to see what the follow-up lab analyses will reveal. While we were conducting our research on the ocean and sea ice on board the RV Polarstern, a fascinating event occurred not too far away: on 26 February 2021, a giant iceberg, with an area of 1,270 square kilometres, calved from the Brunt Ice Shelf (Photo 6). Needless to say, we wanted to take a closer look at the iceberg, or rather at the ocean floor, which was now accessible and no longer covered by an ice shelf. The biologists, oceanographers and geologists were immediately all for it – so once we had finished our research, we made a small detour. The pictures were fascinating – also above the waterline. In some parts the shelf ice had broken away cleanly, and a few metres further along, the ice was fractured and jagged. We all asked ourselves just how loud it must have been when the iceberg calved. Even with our equipment, we were unable to answer this question. We were only able to provide some insights into life on the seabed. Here recordings by our onboard video sledge showed the astonishing biodiversity found there (Photo 7). Anemones, ophiuroids and small fish species were all present – impressive diversity, despite the hostile environment. We also collected sediment and water samples, which will provide detailed information on the ecosystem and offer us insights into the nutrient content and water flow at the ice-shelf edge. Following this excursion, there was just one stop left: our overwintering station, Neumayer Station III. Here the ‘old’ overwintering team and the summer crew were waiting for us to pick them up – since the usual journey home by air wasn’t possible, due to the pandemic. We sea-ice physicists and sea-ice biologists couldn’t pass up the chance to take measurements and probes in Atka Bay one last time. The ice here differs fundamentally from the sea-ice samples previously collected in the Weddell Sea – the ice in Atka Bay is firmly connected to the surrounding ice shelf; it’s what we refer to as fast ice. Our measurements are an optimal supplement to our year-round time series on the ice, which the overwintering team has attended to for over eleven years. Once all the passengers, freight, data and samples were on board, our journey slowly but surely neared its end – and we headed for our final destination, Port Stanley on the Falkland Islands. Here the Polarstern’s crew was exchanged, and while the new crew safely manoeuvred the ship back to Bremerhaven, Lufthansa once again took us on board and flew us back to Germany. The 124th Polarstern expedition then ended in early April, and we can look back on an exciting experience. “But also on an expedition with unusually bad weather, several storms and, unfortunately for us, not very much ice. Nevertheless, we can’t complain about all we brought back with us from the 18 ice stations – and can’t wait to see what the subsequent laboratory analyses will tell us about the stations where we collected our samples,” Stefanie Arndt sums up in her report. Dr. Stefanie Arndt Do you have any questions?
<urn:uuid:4170d546-fd70-4d39-8706-2805cc7b9d9a>
CC-MAIN-2022-33
https://www.meereisportal.de/en/archive/2021-kurzmeldungen-gesamttexte/sea-ice-situation-in-the-weddell-sea/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571959.66/warc/CC-MAIN-20220813142020-20220813172020-00605.warc.gz
en
0.964058
2,119
2.75
3
Established in 1808 under the superintendence of William Clark, Fort Osage served as a US military outpost and a government-trading factory. Situated on a high bluff overlooking the Missouri River near the present town of Sibley in Jackson County, Missouri, the installation consisted of an upright log palisade with four blockhouses, a connected two-cabin factory store with a cellar, barracks for the soldiers, and assorted other buildings. After its closing in the 1820s, the abandoned fort fell into disrepair and ruin. A reconstructed version of the historic fortification took shape between 1948 and 1961, and following the project’s completion the National Park Service designated Fort Osage a National Historic Landmark. The location also received NPS certification as a site on both the Lewis and Clark and the Santa Fe National Historic Trails. In 1807 President Thomas Jefferson appointed Meriwether Lewis to be governor of the Louisiana Territory, and William Clark brigadier general of Louisiana’s territorial militia and Indian agent for its western tribes. After his arrival in St. Louis in 1808, Governor Lewis attempted to quell the restive Osage bands on the lower Missouri River and nearby western plains and pressed ahead with the War Department’s plan for establishing a combined trading factory and military post near their villages on the Osage River. By selling good, reasonably priced merchandise at government stores, US officials hoped to curry favor with Native American traders. Additionally, Jefferson believed that the factory system would foster commercial dependency and indebtedness, rendering indigenous people more susceptible to the American government’s attempts to extract land concessions. The US troops stationed adjacent to the trading factories provided security and protection. Lewis tasked his partner in discovery Clark with overseeing construction of the proposed facility, which upon completion became the nation’s westernmost military outpost and its largest government trading factory. The War Department’s instructions called for the fortification’s placement on the Osage River, but at Clark’s urging the secretary of war agreed to move it to a prominent Missouri River bluff the explorer had noticed when he passed by it on his way to the Pacific in 1804. The site Clark recommended had many advantages. It was easily accessible, would place vessels on the river within range of the fort’s guns, and would enable US officials to monitor traffic along the heavily traveled stream below. In early August of 1808, six keelboats under the command of Captain Eli Clemson headed upriver carrying men and supplies for the Missouri River installation. Eighty-one members of Clemson’s First Infantry Company were assigned for posting at the new fortification and joined the expedition. A short time later, General Clark accompanied Captain Nathan Boone’s St. Charles Company of Mounted Dragoons when they traveled overland to join Clemson and his forces at the proposed site. Construction on the facility was soon under way, and as the log structures began to take shape in mid-September, Clark dispatched Boone and an interpreter to the Osage towns to inform them of his intent to build a fort overlooking the Missouri and to summon them to take up residence nearby if they wished to enjoy US protection. A restoration of peaceful relations with the out-of-favor tribe was only part of his plan. He also elected to take advantage of the situation and press for an agreement transferring historic Osage tribal lands to the incoming American regime. After tribal members from the Osage River towns arrived at the Fire Prairie adjacent to the fort, it took Clark only two days to cajole them into signing an agreement ceding nearly fifty thousand square miles of tribal lands to the United States in return for the government’s assurances of protection and its promises to ensure their access to merchandise at the new trading factory. The ink on the treaty was barely dry before disaffected tribal leaders showed up in the territorial capital expressing their displeasure with what amounted to a land grab. The angry leaders claimed that the treaty’s tribal signers lacked authority to bind the Osage nation to any such transfer. Their protests prompted Governor Lewis to make changes in the original version, but nevertheless the revised treaty dispossessed the Osage of vast tracts of their homelands and initiated their gradual removal from Missouri. Years later, with the benefit of hindsight, a wiser and more reflective Clark, who presided over the negotiation of thirty-seven such Indian treaties, had developed second thoughts about his role in shaping the 1808 Osage treaty. He confided to an aide that it was the hardest treaty on the Indians he ever made and if he was to be damned in the hereafter, it would be for making that treaty. In the meantime, with work on the installation completed, the trading factory opened its doors for business. A significant number of tribal members from the Osage River towns had taken up residence nearby. The establishment, initially called Fort Clark but later known as Fort Osage, was a thriving place in its early days. Representatives of various lower Missouri River tribes came there to trade, confer with officials, or simply linger about. The factory at Fort Osage was the busiest and most profitable of all such government-operated stores. George Sibley, who served as the factor during the entirety of its operations, was in large measure responsible for its successes. A sincere and hardworking government official, Sibley managed to remain on good terms with both the Indians who came there to trade and the fort’s nonmilitary workers. That was not the case, however, with his dealings with the military personnel at Fort Osage who served under Captain Clemson’s command until his reassignment in 1813. Relations between Sibley and the fort’s military garrison were never harmonious. While Fort Osage’s factor was conscientious and competent, he typically seemed stiff and overbearing, especially to the rough-hewn frontier troops at the fort whom he treated like servants. On one occasion when an altercation between an Osage band and a party of traders heading upriver threatened to get out of hand, Clemson and his soldiers refused to aid Sibley’s attempts to quash the fray. Sibley unsuccessfully protested their inaction, and the strained relationships persisted for the remainder of Clemson’s tenure. Business at Sibley’s store declined as the Osage who had taken up residence near the fort returned to their old towns and private traders aggressively wooed away his Indian customers. Factional divisions within the Osage nation compounded the problems and encouraged rival tribes to challenge their dominance. In an 1812 letter to the secretary of war, the officers at Fort Osage decried the installation’s reduced state, enumerated the reasons for its decline, and petitioned to have it removed to a more secure location farther downriver. Asserting that it had outlived its purpose, they labeled it “a moth on the public purse.” The following year, in the wake of the outbreak of war with Great Britain, federal officials heeded their complaints and ordered the fort’s closing and the trading factory’s relocation in a less exposed location. Members of the Osage nation objected to the factory’s shuttering even though Sibley reopened for business at Arrow Rock, but overall they remained loyal to the Americans at a time when many tribes east of the Mississippi lent their support to the British cause. After the war, Sibley resumed business at the Fort Osage factory, but the installation’s days were numbered. Diminishing game and growing pressures to transform Indians into farmers gave renewed strength to advocates seeking to do away with the factory system. America’s fur moguls had long opposed government involvement in the fur trade, and in response to intense lobbying from the influential Chouteaus in the West and John Jacob Astor in the East, Missouri’s Senator Thomas Hart Benton successfully pushed legislation through Congress in 1822 abolishing the factory system. With the ending of the factory system, Sibley closed up shop at Fort Osage and liquidated its remaining stores of merchandise and equipment. Two years earlier Fort Atkinson, situated on the Council Bluff in Iowa, had supplanted Fort Osage as the westernmost US military outpost, and the last few troops stationed there were withdrawn following the factory’s closing in 1822. Within five years the old fortification was deserted and in a state of disrepair. When Prince Maximilian and artist Karl Bodmer passed by the Fort Osage site on their way upriver in 1833, only a few ruins remained. Nearby settlers had carried off the fort’s hewn timbers for use in their buildings. The abandoned site was largely forgotten until the early years of the twentieth century, when local historical organizations sought to revive interest in the once-proud fort that in its heyday had attracted a host of noteworthy visitors, including Manuel Lisa, Andrew Henry, Pierre Chouteau, Pierre Menard, Ramsay Crooks, Wilson Price Hunt, Daniel Boone, John Bradbury, Henry Marie Brackenridge, Prince Maximilian, and Karl Bodmer among others. Historian Kate Gregg’s publication of Westward with Dragoons: The Journal of William Clark on His Expedition to Establish Fort Osage in 1937 spurred further interest and helped propel a campaign spearheaded by the Native Sons of Kansas City to locate and reconstruct the historic structure. In early 1941 Jackson County purchased a fourteen-acre tract at the site of the original fort. Later the same year a National Park Service archaeologist initiated excavation work that uncovered the limestone fireplace of Blockhouse No. 1, remnants of the foundation of the officer’s quarters, post molds from the palisade, and the foundation of the subcellar of the trading factory. America’s entry into World War II halted further work, but in 1947 the Fort Osage enterprise was revived when Jackson County officials authorized a project utilizing the 1941–1942 archaeological discoveries and archival research to reconstruct the fort as it had appeared in 1812. The completion of Blockhouse No. 1 in 1948 marked the opening of Fort Osage Park. The remaining structures were rebuilt between 1951 and 1961. In 2007 Jackson County opened its new Fort Osage Education and Visitors Center adjacent to the reconstructed fort. Foley, William E. The Genesis of Missouri: From Wilderness Outpost to Statehood. Columbia: University of Missouri Press, 1989. Foley, William E. Wilderness Journey: The Life of William Clark. Columbia: University of Missouri Press, 2004. Gregg, Kate L. “The History of Fort Osage.” Missouri Historical Review 34 (July 1940): 439–88. Gregg, Kate L., ed. Westward with Dragoons: The Journal of William Clark on His Expedition to Establish Fort Osage. Fulton, MO: Ovid Bell Press, 1937. Smith, Jeffrey E. Seeking a Newer World: The Fort Osage Journals and Letters of George Sibley 1808–1811. St. Charles, MO: Lindenwood University Press, 2003. Winn, Kenneth H. “The Frown of Fortune: George Sibley, Breach of Promise, and Anglo-Francophone Conflict on the Missouri Frontier.” In Missouri Law and the American Conscience, ed. Kenneth H. Winn (Columbia: University of Missouri Press, 2016), 35–61. Published September 7, 2018; Last updated July 12, 2022 Creative Commons Attribution-NonCommerical-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
<urn:uuid:5293baad-2001-490f-a2da-c711ae1236c6>
CC-MAIN-2022-33
https://missouriencyclopedia.org/places/fort-osage
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00204.warc.gz
en
0.955091
2,388
4
4
Email phishing allows cyber criminals to target specific users. Criminals deliver fraudulent email messages, with the intent to steal critical information or infect the user’s device with dangerous malware. Phishing attacks are becoming more sophisticated, making it more important than ever for businesses to have a response plan in place for detecting, preventing, and responding to email phishing. By implementing the necessary security measures and learning how to identify phishing emails, you can protect your business from this ever-growing security threat. Email is a unique form of attack, because it uses social engineering to deceive a user into downloading or permitting malicious content. And phishing is only becoming more effective. According to Retruster, 90% of data breaches are caused by phishing. Additionally, phishers are now moving past attacking individuals to attack entire organizations. This means that it’s more important than ever to know how to handle phishing emails. What is Email Phishing and Why is it Dangerous? Email phishing is an online scam that appears to be legitimate. Phishers are cybercriminals that try to retrieve personal information, often by instructing you to follow a link or asking you for the information directly. Some scammers already have access to a portion of your information, and they may use this to try and gain your trust. Furthermore, phishing messages often appear genuine, making them even harder to detect as they become more advanced. Phishing may present itself in many forms. Some emails are sent out to hundreds of users, in the hopes that at least a few of them will be fooled and fall susceptible to the scam. Types of Phishing But most phishing emails are becoming increasingly more targeted. “Spear Phishing” targets a specific individual or organization in order to seek unauthorized access to sensitive information. “Clone Phishing” occurs when someone is able to steal and clone an email address in order to make email messages look legitimate. The criminals then send the infected email to an unsuspecting user. Another form of phishing, called whaling, occurs when phishers target high-profile employees in an effort to obtain sensitive information. Sometimes, scammers will impersonate managers and company leaders. Unsuspecting employees are then tricked into giving out confidential information or transferring money into fraudulent accounts. What could a phishing attack cost you? Severe cases of phishing can cost companies millions of dollars. The Ponemon Institute revealed that some of the most successful phishing attacks in 2016 earned attackers up to $3.7 million. With access to account credentials and/or sensitive information, cyber criminals can hijack usernames and passwords, leaving accounts compromised. This also gives them the ability to change account passwords, steal money or credentials, or sell information to third parties. Due to its high frequency and deceptive nature, email phishing poses a variety of risks. On the surface, email phishing can lead to a large degree of equipment damage, stolen funds, and identity theft. These attacks might also induce greater financial loss for companies, due to investigation costs, increased insurance premiums, regulatory fines, and damage to the company’s reputation. How Can I Detect Email Phishing? Phishing emails are particularly dangerous because they may not initially look fraudulent. However, there are several clues you can look for that might indicate a scam. If you receive an email from a company with which you don’t have an existing account, or if an email asks for personal information, like passwords and credit card numbers, you are very likely dealing with a scam. Yet many fraudulent emails appear legitimate. They might even look like they’re from a company that you know and trust, like a bank. So how can you detect spam among emails that aren’t as obvious? Watch for Red Flags There are several details you can pay attention to that might indicate email phishing. If you receive an email from a company with which you have an account, they will usually call you by your first name, so an email without a personal greeting might raise a red flag. Some phishing emails also contain poor grammar and misspellings. However, almost every fraudulent email will try to get you to click on a link or open an attachment. They use scare tactics or urgent requests in order to motivate the user to take immediate action. If you receive an email that urges you to follow a link, be aware that it might be a scam, even if everything else about the email seems normal. Train Your Employees One of the best ways you can protect yourself from email phishing is to train your employees to recognize fraudulent emails. In 2015, Mcaffee discovered that 97% of consumers are unable to recognize a phishing email. Employees can become your greatest risk if they aren’t prepared to respond to an attack. Hold one or more training sessions in which you discuss the signs of phishing emails and create a plan for responding to them. At CR-T, we offer frequent phishing training for our own employees, and we can provide this same service for you and your employees. What Can I do to Prevent Email Phishing? You can protect yourself against email phishing by learning how to recognize and respond to phishing emails when you receive them. Don’t open emails from unknown senders and avoid clicking links embedded within the email. According to Proofpoint, 50% of phishing sites now use https, meaning that you can’t necessarily trust a link, even if it looks secure. Instead, enter the website address directly into your browser, or search for it on Google. If you receive an email claiming to be from a company you know and trust, you can contact the company by phone or through their website. Instead of following a link through your email, access the website using your own link, or search for it online. If there is truly an error with your account—or if some other action is required—you can solve the issue directly through the company, without having to click on any suspicious links. Secure Your Network In addition to following smart practices, secure your network through antivirus. According to Alert Logic, 92.4% of malware is delivered via email. An antivirus solution will prevent viruses from entering your computer through your email and protect you if you accidentally download dangerous attachments. Antivirus will also automatically block dangerous websites, helping you stay protected if you unintentionally follow a malicious link. Be aware that antivirus won’t stop you from receiving fraudulent emails. Antivirus can prevent phishing emails from infecting your computer, but you still need to be smart when deciding whether to follow a link or open an attachment. In addition to antivirus, spam filters can help you detect and transfer spam mail to a separate location. Wombat Security estimates that 97% of businesses utilize email/spam filters to safeguard against phishing. Spam filters detect and block fraudulent emails before they can reach the user’s inbox, protecting you from spam, viruses, malware, email phishing, and other attacks. By implementing these security measures, you can mitigate the amount of spam you receive and reduce the risk of an attack. How do I Respond to a Phishing Attack? Keep Yourself Protected One of the best ways to protect yourself against security threats is to have an incident response (IR) procedure in place. Make sure all staff are trained on what to do if any accounts or devices are compromised. If you fall victim to a phishing attack, change your computer password, your email password, and any other passwords you think may have been compromised. Update your software and run a virus scan to see if your device is in danger. If you have a spam filter, adjust the perimeter email filters to block similar messages to the one sent in the fraudulent email. Save any information you can, in case you need to take further action. - Obtain a copy of the email with full headers and original attachments, including a copy of the IP address. - Use a threat intelligence site to check the IP address. Search the web for any information regarding the sender, subject line, message ID, source IPs, or file attachment names. - Check the sender details to see if you can identify the fraudulent email address—or website name—and notify credit agencies of the fraudulent email. - Report all phishing emails to the Federal Trade Commission (FTC) and the Anti-Phishing Working Group. After taking the necessary steps to secure your network, continue to monitor the account for any unusual behavior. Check all accounts regularly for suspicious activity. Keep a list of known phishing sites to prevent a future attack. Learn From Your Mistakes Although no one wants to fall prey to a phishing email, you can use any negative experiences to better train your employees and help them take email phishing seriously. Teach them to be skeptical about following links sent through email. Use phishing tests and security awareness training to keep them prepared for future threats. Security solutions, combined with smart behavior, will prepare you to respond to the dangers of email phishing. We want to help you stay protected. Our team of experts can provide you with the resources you need to maintain an efficient and secure network. Start Today—Get a Free Consultation Here at CR-T, we take pride in providing enterprise-level IT services at prices that work for small businesses. Our team of experts can become your IT support department, responding to issues quickly, often before you even know about them. Covering everything from your servers and network infrastructure, to your computers, workstations and mobile devices, we provide end-to-end solutions for all your technology needs. Time and experience have helped us develop best practices and workflow procedures designed to keep your focus on your business, not your technology. Blog & Media Managed IT Support Amazon Web Services Developing new IT skills is one of the best ways to demonstrate your value as an IT director so you can advance within your organization.
<urn:uuid:16273592-3310-4569-9a65-092fbc5ceeaf>
CC-MAIN-2022-33
https://www.cr-t.com/blog/what-is-email-phishing-and-how-do-i-prevent-it/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00404.warc.gz
en
0.929494
2,102
3
3
The decision to have a second dog is an important and responsible step. When you bring another pet into the house, you may face problems such as jealousy, disobedience, and aggression. To avoid this kind of trouble, you need to know how to befriend another dog and make their life together as pleasant as possible for each other and also for you. All dogs, without exception, need socialization, even puppies. An important detail – if you have a problem with the hierarchical relationship with the dog, you need to solve it before bringing a new dog into the house. How to prevent fights between your dogs. - The first meeting should be “at eye level”. Meeting in the home gives the first dog a territorial advantage, so it is better to meet pets on the street. After the walk, the pet will be calmer about the intrusion of a new resident into its area, but once the dogs enter the house, they should be confined to different rooms and fed. - Dogs should be calm and slightly tired during the acquaintance. It is better not to let them off the leash. Do not pull or tug, but control the situation so you can intervene if necessary. - Do not encourage rivalry. Dogs can be territorial about food or toys. Some breeds are more inclined to protect their property, while others like to share it. To do this, you need to know your pet’s character traits. - Give equal attention to dogs, avoid jealousy in one of the pets, but strictly stop trying to dominate. - You can not violate the “personal space” of the first pet – rearrange his bed and bowl, put next to or in its place a bed or bowl of a newcomer. This may provoke old-timers to defend their territory. - The best option is to put pets in different rooms or at least feed them in separate rooms. - Teach your dog to eat only from his bowls. - Teach your dog to play safely. When you first bring a dog home, it is your responsibility to teach the dog not to attack others. Use positive incentives to encourage good behavior. If a dog bites, growls, or otherwise misbehaves, separate it from the other dog it is playing with and leave one until it calms down. - Never allow dogs to stay together when toys are around. Toys are triggers for fights. NO TOYS should be placed nearby. Dogs need to know that all toys are yours to play with from time to time but are always taken back after playtime. - Teach your dog to come to your call. If the dog is obedient when you call her, you can get her out of most stressful situations before they grow into something bigger. Start teaching her to come to the call and stay close when she is young. Practice this often, especially around other dogs. - Encourage good behavior in your dogs. It will teach them what is right and what is wrong. - In extreme cases, if you are unsure of the situation, both dogs should be in the mouth. - Well, the easiest option is to go to a dog club. There, the animals play and get used to each other under the supervision of experienced dog breeders and trainers. The trick is that you only need two soft, damp cloths to befriend another dog. Wipe one pet or the other with a piece of cloth and spread them out in different rooms, leaving the cloth with the scent of another dog. This will help the dogs get used to each other faster. How to make an adult dog with a puppy. The best option for a second pet is to get a puppy. It is in the nature of dogs to have a friendly and forgiving adult attitude towards children. If your older pet has been socialized, there should be no problems. But still don’t let the process of dating and habituation drift. To introduce a dog living in the house with a newly acquired puppy, you need to show him that this new creature also has the right to be a neighbor, and the owner is interested in the fact that the baby is not offended. - To do this, together with the newcomer, bring new bowls and a blanket – it shows the dog that the baby does not claim his things. - Release the puppy and show the adult dog how to sniff properly. Stop all unwanted actions on their part with a strict ban. - Puppies carry their mother’s scent, so it’s best to wash them with a neutral shampoo before the appointment. - Watch your baby’s behavior – it should not flirt, or become too obsessive, so as not to irritate the older pet. If the puppy is too active, it should be temporarily moved to another room to give it time to calm down. - Most adult dogs are loyal to their puppies and quickly lose interest in the new resident. If an adult behaves in a threatening manner, be sure to report it and drive it to the site. - If you feed your baby, you can give some of its food to another dog, which will greatly appreciate such an offer, as it will see the positive side of the puppy’s stay in its territory. - It is important to feed them from their bowls so that the baby cannot taste the dog food. - The dog may also lie on the puppy mat, this is allowed. The more pleasant moments she has with her new neighbor, the more likely they will become friends. - Walking together is a very important moment. If your first dog is well-behaved and follows and obeys commands unconditionally, this is a big plus. The child begins to actively copy the behavior of the older pet. The process of raising and socializing a puppy is greatly facilitated and accelerated. If you decide to get a puppy of another breed as a second pet, be sure to take into account the differences in size, temperament, and character of the dogs. It will be difficult if too many pets get along in one home. A scenario of action in case of a fight between your dogs. The best way to stop a fight is to prevent it from starting. Watch your dog closely, and if you think he (or another dog) might get angry, just walk away from the situation until nothing happens. The first step is to UNDERSTAND THE DIFFERENCE BETWEEN FIGHTING AND PLAYING. If you know what behavior your dog normally exhibits in the company of other dogs, it will be easier to understand the beginning of the fight that needs to be stopped. Learn your dog’s behavior in play – watch how your dog interacts with other dogs: - Barking, jumping, or biting other dogs during play. - How cruel she can be in a normal game - Observe the dogs’ bodies – if they look free and relaxed and are wagging their tails, they are probably just playing. However, if the bodies are tense and the tails are squeezed, there is most likely the possibility of a fight. - Observe if the dogs are equally interested in the game. Sometimes one dog will play and the other will not go. In this case, you need to stop the game, even if your dog has not planned anything bad. This is how you end a fight when it has already started: - Determine what provokes a fight and eliminate that factor. For example, it may be a fight over food. If so, make sure there is enough food for both. - Distract the dogs from each other. - Spray them with water. One of the easiest ways to break up a fight is to pour a bucket of water or pour it from a dog hose. This will immediately stop their attack instinct and each of the dogs will forget about their aggression towards each other. In most cases, the dogs will simply scatter. - Scare them with a loud noise. Bang two metal objects above their heads or use a sonic horn to scare them. If you don’t have something like that on hand, try clapping loudly or yelling. Sound has the same effect as water. They will forget why they were fighting and disperse. - Use the barrier to separate them. It can be a large piece of cardboard, plywood, or a lid from a trash can. - Throw a blanket over the dogs. Some dogs will stop fighting if they can’t see each other. If you don’t have a large blanket, try throwing a tarp or other opaque material over the dogs to calm them down. - With the help of an assistant, pull the dogs in different directions. Each person should approach the dog from behind, grab the dog by the tail or hind legs and pull them away from the opponent. After that, you need to distribute quarreling pets in different directions as quickly as possible. - Keep dogs away from each other. They might start fighting if they see each other again. Lock the dog behind the door or put it in the car as soon as possible. - Muzzle the offender and do not remove it until feeding time. A few days of such punishment will give the dog a clear understanding that this is not possible. - Be sure to encourage both pets to behave well. If you can’t stretch the dogs. Doing things together is not always easy either. But there is a way to get a dog to open its jaws. To do this, you need to pinch (squeeze, squeeze) it very sensitively in the groin (behind the genitals). The dog changes its attention and can open its jaws. Making a loop from a leash and throwing it on the dog’s hind paw is also recommended. This will make it safer to bring the dog to safety. However, such a loop should not be thrown around the animal’s neck! What not to do: 1. Hit the dog. During a fight, the dog is unlikely to feel pain – on the contrary, blows can irritate him. 2. Do not stretch the jaws of pets with your hands – you may hurt yourself. No need to swing your arms, legs, or a dog. This not only encourages the attacker but also risks becoming a victim. 3. DO NOT grab a dog by the collar. This may be the first impulse, but in this fight, you risk being bitten if you reach for the collar. The dog will instinctively get out and bite, even if he has never shown aggression. When dogs’ bodies are tense and it’s clear they are fighting, not playing, don’t risk squeezing their hands. There are better ways to stop this. In conclusion, the best dog can only be two dogs. But if the hostility continues, consider hiring a professional trainer or an experienced dog owner. To effectively help you and your dogs, you need to identify the causes of aggressive behavior, accurately identify situations where aggression occurs, and other factors that lead to problematic behavior. Therefore, it is necessary to consult and monitor the relationship between dogs.
<urn:uuid:6fed19f7-8a78-4be7-8739-451dca048e1f>
CC-MAIN-2022-33
https://true-dog.com/behavior/how-to-stop-dogs-from-fighting-in-the-same-household/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00605.warc.gz
en
0.953455
2,285
3.015625
3
Most businesses in the supply chain industry look for ways to reduce the impact of their operations on the environment, improve workplace conditions for employees, and benefit society. Many companies have realized the importance of supply chain sustainability as a critical component of corporate social responsibility. Managing supply chains’ environmental, social, and economic impacts is critical to your business development and growth. Today’s article will highlight the best supply chain sustainability practices. What is Supply Chain Sustainability? Supply chain sustainability is an umbrella term that focuses on managing social, environmental, and economic impacts while implementing suitable governance practices throughout goods and services’ lifecycles. The primary goal of supply chain sustainability is to create, establish, protect, and grow short and long-term social, environmental, and economic value for stakeholders that bring products or services to the market. Why is Supply Chain Sustainability Important? Companies focus on implementing a solid supply chain sustainability strategy for various reasons. The primary reason is to ensure compliance with governmental and global laws and regulations. Supply chain sustainability allows you to adhere to and support international principles for appropriate and eco-friendly business conduct. Besides, companies take action to achieve better environmental, social, and economic impacts because societies and communities expect this from businesses. At the same time, green practices can benefit your company in various ways. So, when you manage and seek to improve social, environmental, and economic performance and implement good governance throughout your supply chain operations, you can act in your own interest, stakeholders’ interest, and society’s interest. How to Achieve Supply Chain Sustainability? Building or achieving supply chain sustainability requires a step-by-step approach, careful planning, and preparation. Here are a few tips/tricks to streamline the entire process and achieve your goals. Build a Business Case There are numerous reasons for taking concrete actions and improving your supply chain’s environmental and social impacts. Corporate values and culture drive most companies to address sustainability issues. Supply chain sustainability is the best thing to do because it drives environmental protection and social development, creating internal buy-in and commitment. Therefore, identifying specific business drivers for sustainability is crucial. The business case for your company depends on various factors, such as the industry or sector, stakeholder expectations, supply chain footprint, organizational culture, and business strategy. Supply chain sustainability practices can respond to multiple drivers, allowing you to boost your business growth and improve efficiency. We recommend focusing on the following points. - Minimize business disruptions from social, environmental, and economic impacts - Protect your brand’s reputation and business value - Reduce costs of materials, energy, and transportation - Focus on labor productivity and create efficient processes across supply chains - Address business partner and customer issues - Innovate to meet the needs of evolving markets You can protect your company from potential delays and interruptions via supply chain sustainability. We recommend implementing suppliers’ human rights, labor, social, environmental, and governance practices by ensuring your business partners and stakeholders have robust compliance programs and effective management systems. Risk management is critical to ensure consistency and reliable access to those resources if your company has a single source for necessary inputs. Consider investor and customer expectations to drive your company toward sustainability and responsible supply chain management. Solid management of environmental and social issues can help your company analyze and manage risks. You can also use supply chain sustainability to ensure vendors and suppliers adapt and maintain ecological regulations and product responsibility legislation and reduce future liabilities. We recommend partnering with vendors or suppliers to ensure minimum standards in practices, particularly management strategies, such as minimum hiring age, health, and safety conditions, and contracts with workers. Focus on Operational Efficiency When you focus on operational efficiencies in the supply chain, you can reduce your supply or transportation costs and reduce the carbon footprint of your supply chain, including water, energy, natural and synthetic material use, and improve worker health, productivity, and motivation. Advantages of focusing on operational efficiencies within your supply chain are: - Health and safety practices that result in improved productivity and cost efficiency - Understanding of critical processes, including natural resource management - Analysis of extraction, manufacturing, and logistics, leading to better resource management - Efficiency in designed processes and systems, reducing inputs and lowering costs Moreover, efficiency and productivity programs require a complete understanding and analysis of various supply chain processes, including social and environmental impacts and cost drivers. Address the root causes of problems is critical, and you can do this via solid communication capabilities, a thorough understanding of business drivers, and following up with sustainability trends. An excellent example of operational efficiency is to reduce costs without impacting your supply chain operations, such as shipping products through ocean fright instead of air cargo when applicable. Create Sustainable Products Collaboration with vendors and suppliers on problems can strengthen product innovations. You can embark on initiatives to add new features and performance qualities to your existing products. At the same time, this allows you to generate new products. For instance, sustainable products can have fewer negative social and environmental impacts than conventional products. Likewise, they have improved disposal options. In addition, you can introduce sustainable products and make them a differentiating factor, leading to increased sales and higher investment returns. For example, you can source raw materials with environmental and social impacts, such as bioplastics emitting fewer emissions throughout their lifecycle. So, you can reduce your carbon footprint and greenhouse gases. Establish a Vision A solid vision and goals for your sustainable supply chain strategy will provide a clear direction for your operations. It also helps you define your business’s commitment and evaluate your strategy’s success. You can even identify areas that require continuous improvement. However, your company’s vision and goals must come from the top of your company and ensure support from the leadership. Consult your company’s executives and managers from different departments when establishing a business vision. Similarly, it would help to consider how you include representatives from supply chain management functions, including procurement, operations, corporate responsibility, design, logistics, marketing, quality assurance, legal human resources, compliance, and health and safety functions. Considering these factors is critical to creating a solid business vision because each function is crucial in implementing a sustainable supply chain strategy. Even if you run a small company, ensure all leaders agree on the vision. The output of your strategy is the statement of your company’s vision and commitment. When developing the statement, consider the factors that motivate your company to invest in sustainable supply chain practices. Ask yourself the following questions! - What are customers’ demands and concerns? - Do NGOs claim over supply chain practices and affect the brand reputation? - Do investors inquire about my company to understand how I manage supply chain risks? - Will non-compliance with standards and regulations prevent me from doing business? - Is there intense pressure from my industry peers who develop sustainable supply chain strategies? - Do I want to improve my company’s culture and increase performance via sustainability? Adopt a Code of Conduct A code of conduct is critical to establishing and managing vendors/suppliers and customers’ expectations. It creates a shared foundation for eco-friendly practices and sustainability, allowing supply chain management professionals to make informed decisions. A supplier code of conduct is integral to your corporate values statements. Most companies see it as an affirmation of current expectations instead of a new set of requirements. Here are a few steps to develop a code for your business! - Consult with stakeholders, including vendors - Establish expectations based on global norms of behavior - Avoid inventing new standards and regulations - Avoid undermining global law and prevent conflicts with stakeholders - Consult with cross-functional departments and teams, including supply chain management teams Develop policies that align with international compact principles to streamline your supply chain sustainability operations and improve efficiency. Here are the fundamental principles to focus on when adopting or developing a code of conduct. - No Forced labor - No Child labor - Wages and benefits - Humane treatment - Adequate working hours - Freedom of collective bargaining - Emergency preparedness - Occupational safety - Industrial hygiene - Fire safety - Machine safety - No material toxicity - No harsh chemicals - Raw material use - End-of-life products - Reduced greenhouse emissions - Optimal energy use - Appropriate wastewater treatment - Avoid conflict of interest - Say no to Bribery and kickbacks - Gifts, meals, and entertainment - Proper accounting management - Streamlined business record maintenance - Information security and privacy - No reporting misconducts If you want to meet your business’s goals for supply chain sustainability, you must use the code as the foundation for establishing internal and external expectations. The code is also suitable for developing a framework for engagement and action with vendors, suppliers, and other stakeholders. In addition, you must share the new code throughout your organization to raise awareness regarding the standards. Your supply chain management team should gain familiarity with the code of conduct and communicate it to existing and new vendors. The purpose is to explain how your business intends to work with vendors and ensure compliance. Some of the best communication channels are websites, training programs, new staff, and online portals for senior management to strengthen the significance of the code. Moreover, depending on your company’s structure and organizational complexities, it is crucial to establish internal policies and implement procedures to explain how your staff can execute the code. Map Your Supply Chain Operations Define your company’s supply chain strategy to understand the scope of sustainability management. You can use a supply chain mapping strategy to trace critical activities within your organization and the people involved in streamlining processes. Mapping your supply chain requires you to: - Identify your service categories and focus on procurement - Trace the flow of materials, collect data, and information - Don’t stop with your direct vendors - Go back to the original vendors - Avoid making assumptions - Understand your working relationships - Gather information on human rights and labor - Collect data on environmental, social, and corruption issues - Identify the potential risks and opportunities - Have thorough discussions with peer companies and industrial bodies - Meet with civil society activists and organizations Segment Your Supply Chain Proper segmentation allows you to balance the fact that some risks will always exist, but specific problems can be addressed to avoid complications for your business, environment, and society. It would be best if you considered various criteria in your supply chain segmentation, such as: - What are the most significant risks to human and labor rights, the environment, and supply chain ethics? - What are the risks in your business that can impact your operations? - How to meet your business vision and achieve supply chain sustainability? - What are the risks of excluding small-medium businesses when implementing code demands? - How do I monitor and audit supply chain sustainability processes? Supply chain sustainability is a strategy implemented by a company to ensure human rights, employees’ health, and safety and reduce a negative impact on the ecosystem. It helps you reduce water and energy consumption, generate less waste, adapt more energy-efficient and sustainable systems, manage inventories, avoid overstocking, and decrease the carbon footprint. However, most companies find it challenging to develop a sustainability strategy or implement the best practices. Developing a supply chain sustainability strategy requires thorough planning and preparations. You can use the tips/tricks above to streamline your operations and achieve your sustainability goals. Until Next Time!
<urn:uuid:7d65e286-4bc2-4ad4-a983-14bbc5a2b7c6>
CC-MAIN-2022-33
https://www.gpsi-intl.com/blog/best-practices-of-supply-chain-sustainability/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00203.warc.gz
en
0.9158
2,426
2.796875
3
Global Helium Market: Snapshot Helium is the second component on the periodic table. It is a dreary an unscented gas yet it has various utilizations, some of which may shock you! Helium gas is actually ‘lighter-than-air’ because of its amazingly low thickness, which clarifies its most notable use; enhancing inflatables. Helium’s quality on earth was affirmed in 1895, anyway it was first found in 1868 when French space expert, Pierre Janssen, saw an obscure gas during a sun based overshadowing. This is the place the name ‘Helium’ began, as it was named after the Greek God of the sun, Helios. Since the gas is used in variety of applications, its demand has skyrocketed in recent years. Owing to this growing demand, the global helium market is expected to grow exponentially in coming years. - Helium is industrially recouped from flammable gas stores, for the most part from Texas, Oklahoma and Kansas. This allows, North America to dominate the regional front of global helium market. It is utilized as an idle shield for curve welding, to pressurize the fuel tanks of fluid energized rockets and in supersonic windtunnels. Helium is joined with oxygen to make a nitrogen free air for remote ocean jumpers so they won’t experience the ill effects of a condition known as nitrogen narcosis. Fluid helium is a significant cryogenic material and is utilized to examine superconductivity and to make superconductive magnets. This helps the global helium market to grow exponentially in coming years. - The developing trend of helium application in areas such as nuclear power plants, metal works, and semiconductor production is turning into a top need for makers in the helium market. Although, fluid and oleous coolants fill in as an option in contrast to helium, because of the beginning of helium deficiency in the market. In that capacity, makers should concentrate on expanding helium holds with the assistance of extraction from petroleum gas and oil mining. This also helps the global helium market to grow substantially in coming years. Sales of Cryogenic Devices Surge with Improvements in Manufacturing Processes Helium is a synonymous term with most cryogenic applications. Its exceptional cooling abilities are proving to be useful for the development of various cryogenic devices. Cryogenics currently accounts for the second-highest production amongst all applications in the helium market, with a ballpark output of ~38 million cubic meters in the year 2018. Hence, companies in the helium market are innovating cryogenic turbines that provide the liquefaction of helium. As such, companies in the helium ecosystem are increasing their capabilities to enhance the quality of cryogenic devices to cater to the needs of stakeholders in the aerospace industry. This trend is also helping in magnetic resonance imaging for the purpose of scientific research. Companies in the helium landscape are expanding their scope of application in tissue and organ preservation, superconductivity, and mechanical engineering. The sales of cryogenic turbines are estimated to surge during the forecast period. As such, companies in the helium market are simplifying complex manufacturing processes with improved and optimized titanium and stainless steel parts. These parts are processed with the help of vacuum brazing and chemical nickel coating. They are also expanding the use of electron beam welding in manufacturing processes that are validated through several samples. On the other hand, companies are developing cryogenic compressors and pumps. They are also increasing their focus on aerodynamic gas bearings. To gauge the scope of customization in our reports Ask for a Sample Paradigm Shifts in Aerospace Industry of Asia Pacific Create Opportunities in Healthcare Helium-3 is gaining increased importance in aerospace and healthcare industries. Helium-3 helps doctors diagnose lung diseases, as this element offers real-time imaging of lungs. The healthcare segment is estimated to reach a value of ~US$ 940 million by the end of 2027, which is the second-highest amongst all end users in the helium market. Hence, stakeholders in the aerospace industry are increasing efforts to discover deposits of helium-3 on the moon. This trend is gaining momentum in the aerospace industries of Asia Pacific. As such, Asia Pacific holds the largest market share in the helium market, and is projected to exponentially grow throughout the forecast period. Hence, stakeholders in the Indian aerospace industry are planning an upcoming space probe to locate deposits of helium-3 that are worth trillions of dollars. Get an idea about the offerings of our report from Report Brochure Stakeholders in the aerospace industry are successfully carrying out the development of lunar landing crafts. For instance, Lockheed Martin – an American aerospace and defence company, revealed the company’s crewed lunar lander concept that aligns with NASA’s flight-proven technologies and systems. Hence, stakeholders in the helium market are increasing focus on the aerospace industry, as the moon is a million times more abundant in helium-3 gas as compared to the Earth. Other countries in Asia Pacific, such as China, are also aiming to make history in achieving a first-of-its-kind soft landing on the far side of the moon with the help of their lunar landing craft. Manufacturers Streamlining Production Methods to Avoid Shortage of Helium in End Markets The helium market is predicted for high growth potential during the forecast period, with an estimated production output of ~173 million cubic meters by the end of 2027. However, the challenge of production shortage is likely to affect market growth. Stakeholders in the helium landscape are constrained with the shortage of helium in the sector of technology and healthcare. Analysts of Transparency Market Research (TMR) anticipate that, helium reserves are going to deplete in the coming years. This trend is presumed to affect the steady supply of coolants for notable projects in the aerospace industry. Hence, manufacturers in the helium market are increasing their production capabilities to extract helium through the process of uranium and thorium decay, which is acquired from natural gas and oil drilling. Another challenge that manufacturers in the helium market come across is poor industrial safety practices that have led to increased risks of explosions and fires in recent years. Hence, manufacturers in the helium landscape are increasing awareness about safety practices amongst stakeholders in the value and supply chain. Looking for Regional Analysis or Competitive Landscape in Helium Market, ask for a customized report Helium Market: Overview - Helium is produced from natural gas through the treatment of vent gas in nitrogen rejection units or LNG plants. Helium is colorless, odorless, tasteless, and non-toxic. It constitutes around 23% of the mass of the universe; however, it is a rare gas on the Earth. Just 0.000524% of helium is available in the Earth’s atmosphere. - The gas is widely used in several industries such as electronics & semiconductors, manufacturing, healthcare, aerospace, and defense. - The global helium market is projected to expand at a CAGR of ~4%, increasing from a value of ~US$ 2.5 Bn in 2019 to ~US$ 3.5 Bn by the end of 2027. Increase in Investments in Electronics Sector to Drive Helium Market - The global electronics industry has been expanding significantly since the last decade, due to improvements in the standard of living and rapid urbanization. According to the Government of India, investments toward the manufacturing of electronics reached US$ 22.13 Bn in 2017, a rise of 27% as compared to US$ 20.15 Bn in 2016. - Electronic devices such as smartphones, tablets, and PCs contain semiconductor chips that carry out computing, storage, and communication functions. A majority of these chips are made from silicon, a common semiconductor material. - Helium is extensively utilized in the manufacture of semiconductors, owing to its ability to offer high thermal conductivity, which helps control the temperature of the silicon. Furthermore, helium offers low temperature and inert gas features. This is expected to boost its adoption in the electronics industry. Thus, increase in investments in the electronics industry is anticipated to propel the global helium market. Increase in Prices of Helium to Hamper Global Helium Market - The prices of helium have increased rapidly due to the mismatch between demand and supply. Currently, the world is experiencing its third major helium shortage in the last 14 years. According to leading publishers, the prices of helium gas surged 135% year-on-year at a U.S. government auction in 2018. - The depletion of existing sources and delay in new helium extraction projects, refinery equipment failures, geopolitical issues, and maintenance requirement at production facilities are major factors hampering the supply of helium across the globe, thus hampering the growth of the global helium market. - Decrease in the production of helium in the U.S. is further expected to create a shortage of supply of the gas, as the Bureau of Land Management has been rationing supply since February 2018, after a group of countries led by Saudi Arabia announced an economic embargo on Qatar. - The shortage of helium has consistently increased its prices. This rise in prices of helium is estimated to adversely affect the growth of the overall helium market. More Trending Reports by Transparency Market Research – https://www.prnewswire.com/news-releases/oil–gas-epc-market-to-reach-a-valuation-of-us-64-7-bn-by-2027-growth-in-ep-in-oil-and-gas-industry-boosting-growth-states-transparency-market-research-301005816.html Increase in Production of Natural Gas to Offer Opportunities - The natural gas industry has been witnessing significant expansion since the last few years, as it limits environmental impact. According to the International Energy Agency (IEA), global demand for natural gas rose by 4.6% in 2018, the fastest since 2010. - The demand for natural gas is also driven by strong economic growth and the transition from coal-fired electric power. According to IEA, gas accounted for nearly half of the increase in global demand for energy in 2018, with significantly high consumption attributed to China and the U.S. - Significant rise in the consumption of natural gas has driven investments by gas operators toward the development of conventional and unconventional gas reserves. Helium is obtained as a by-product of natural gas. Therefore, increase in capital expenditure on the development of the field is anticipated to mitigate the inconsistency in supply, thereby enhancing helium recovery during the forecast period. - Growth in investments toward the exploration & production of natural gas is expected to offer lucrative opportunities to players involved in the processing and extraction of helium gas, as uninterrupted supply of industrial gas makes its adoption lucrative among end users. Global Helium Market: Recent Developments, Expansions, Acquisitions, and New Contracts - On August 30, 2018, Taiyo Nippon Sanso Corporation (‘TNSC’) acquired all the shares of IMI Co., Ltd., a company handling medical devices, primarily respiratory and emergency/intensive care equipment, including ventilators and temperature management devices and monitoring equipment. The acquisition is expected to help TNSC expand its respiratory business by leveraging synergies in IMI’s product development capabilities. - On September 04, 2019, Messer Group invested US$ 38 Mn in the construction of a new air separation plant in Indianapolis, Indiana, the U.S. The plant is likely to produce air gases (oxygen, nitrogen, and argon), and is scheduled to commence operations by early 2021. The plant is estimated to produce industrial and medical grade gases for various sectors of the local and regional economy, including healthcare, chemicals, food, glass, and metal. Request for covid19 Impact Analysis – https://www.transparencymarketresearch.com/sample/sample.php?flag=covid19&rep_id=2132 Asia Pacific to Dominate Global Helium Market - Asia Pacific dominated the global helium market in 2018. The helium market in the region is estimated to expand at a significant pace during the forecast period, due to rapid growth in end-user industries such as electronics & semiconductors, healthcare, and manufacturing, especially in developing countries such as China, Japan, and India. - Europe also accounted for large share of the global helium market in 2018. Rise in investments in manufacturing, aerospace, and healthcare end-user sectors; and development in aerospace and defense industries are likely to boost the demand for helium in the region. - The helium market in North America is projected to expand at a moderate pace during the forecast period, as the helium market in the region is mature. Highly Competitive Global Helium Market - The global helium market is moderately consolidated; large multinational players dominate the global market. - Key players operating in the global helium market include - Linde Plc. - Axcel Gases - Taiyo Nippon Sanso Corporation - Air Products and Chemicals, Inc. - Messer Group - Weil Group - Iwatani Corporation - Matheson Tri-Gas, Inc. - The Southern Gas Limited - Ellenbarrie Industrial Gases - US Gas - Air Liquide - North American Helium.
<urn:uuid:53a3e0cc-99cb-404a-aebf-8530300a8715>
CC-MAIN-2022-33
https://knnit.com/helium-market-valuation-worth-us-3-5-bn-by-2027/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00205.warc.gz
en
0.938242
2,756
2.6875
3
In this paper we are exhibiting our Final Year Project which is Speech Emotion Recognition. Today\'s hot study issue is speech and emotion detection, with the goal of improving human-machine connection. Currently, the majority of research in this field relies on discriminator extraction to classify emotions into several categories. The majority of the present research focuses on the utterance of words that are employed in language-dependent lexical analysis for emotion detection. This study employs strategies to classify emotions into five categories: anger, calm, anxiety, happiness, and sorrow using Machine Learning algorithm Convolutional Neural Network. The approach of collecting emotion characteristics from computer voice signals, comparing them, and analysing the parameter values and the associated emotion changes is known as speech emotion recognition. To recognise emotions from audio sources, feature extraction and classifier training are necessary. The feature vector is made up of audio signal components that characterise the speaker's distinguishing characteristics (such as pitch, pitch, and energy) and is used to train the classifier model to properly detect certain moods. In the social media and on the Web, there is a tremendous amount of opinionated data in the shape of Twitter, message boards, Facebook, blogs, and user forums. Ideas shared on the internet by a varied collection of thought leaders and common individuals impact people's decision-making processes. Text-based reviews are one way for people to communicate their feelings/opinions about items or societal concerns. Another common approach to convey one's thoughts is through audio/video. Millions of videos on product and movie reviews, product unpacking, political and analysis of social issue, and opinion on these issues may be found on YouTube. There are several audio venues on the Internet where individuals may express themselves. In many cases, audio is more appealing than text because it gives more information about the speaker's opinions. This vast resource is mostly underutilised, and collecting society sentiment/opinion on specific items, as well as mass opinion on social or political problems, will be incredibly useful for data analysis. Sentiment analysis in audio is still a relatively new area. Speech-based emotion extraction is a very young and challenging area. This study describes robust methods for extracting sentiment or opinion from natural audio sources. II. RELATED WORK Previous research used the highest cross correlation between audio recordings to categorise audio data into one of few emotion groups. As a result, more work in MATLAB has been done to determine the emotions of each audio recording supplied as an input. In MATLAB's toolbox, many classifiers are utilised, and classification learners categorise just a few emotion types. Classification, Environment Sound-Classification, and Audio Generation have all been accomplished with CNN-based models. Various 1-D convolution models have been created for working with raw audio waveforms; EnvNet and Sample-CNN are two examples. However, CNNs on Spectrograms were used to derive the majority of the SOTA results. The majority of these models make the design more complicated by combining many models with diverse inputs and aggregating their outputs to produce predictions. raw audio, spectrograms, and delta STFT coefficients were processed using three networks; Are inputs to two networks, mel-spectrograms and MFCCs were used. We demonstrate however, that state of the art may be achieved using basic mel-spectrograms. III. SYSTEM ARCHITECTURE Models based on CNN have been employed in a variety of applications. The System Architecture is a formal description and representation of system that is organised so that its structures and behaviours can be reasoned about. It shows the structure, behaviour, and other characteristics of a system. An architectural description is a formal description and representation of a system that is organised in such a way that the architecture and behaviours of the system are easier to comprehend. The components and subsystems of a system architecture are interrelated. This system is trained to recognize a person voice behaviour which consists of various emotions. This Speech Based Emotion Recognition architecture flow consist of following Splitting into Training and Testing sets Connecting model to the Interface IV. CNN MODEL A CNN model is a learning system that can take a voice and prioritise (learnable weights and biases) particular aspects/objects while still identifying them. Other classification methods require a lot more pre-processing than a CNN. Although the hand-engineering of filters is required for basic operations, CNN may be able to learn these filters/characteristics with the correct training. Convolution is used to extract high-level input properties like edges. For CNN, a single Convolutional Layer is insufficient. The first ConvLayer is commonly used to capture low-level data like edges, colour, and gradient direction. With the addition of layers, the architecture responds to the attributes at the highest level, giving us a network that knows the photographs in the dataset as well as we do. Regardless of its flaws, convolutional neural networks have unquestionably ushered in a new era in artificial intelligence. Today, CNNs are used in face recognition, image search and editing, augmented reality, and other computer vision applications. As advancements in convolutional neural networks develop, our findings are stunning and valuable. networks demonstrate, but we are still a long way from reproducing the core components of human intellect. Convolutional neural networks stack artificial neurons. Artificial neurons, like actual neurons, compute the weighted sum of a vast number of inputs and output an activity value. A CNN's layers generate a large number of activation functions, which are passed on to the next layer. As input, a sample audio file is provided. To extract the MFCC, we utilise the LIBROSA python package (Mel Frequency Cepstral Coefficient) Remixing the data, splitting it into train and test groups, and analysing the results training the dataset with a CNN model and its layers. Predict human voice sentiment using the training data The CNN model outperformed the others in the classification task. This trained model has the highest validation accuracy. There are a total of 18 levels. The CNN model is divided into four layers: a. Convolutional Layer: Detects significant regions at intervals, displays the feature map sequence, and recognises utterances of varied duration. b. Activation Layer: As is common, a non-linear Activation layer function is applied outputs of the convolutional layer. The ReLu activation layer is used. c. Max Pooling Layer: This layer provides the greatest possibilities for the Dense layers. It's simpler to keep variable-length inputs confined within a fixed-size feature array with this method. d. Flatten and Dense: The pooled feature map is reduced to a single column, which is then transferred to the fully linked layer. Dense offers the neural network a layer that is totally coupled. V. CONFUSION MATRIX It's a table that's used to figure out where model flaws originated in classification problems. The rows reflect the category in which the results should have been. The columns, on the other hand, show our forecasts. It's simple to identify whose forecasts were incorrect with this table. We may utilise the confusion matrix function on our actual and expected values after the measurements have been imported. Confusion_matrix = metrics.confusion_matrix To make the table more clear, we should transform it into a confusion matrix presentation. cm_display = metrics.ConfusionMatrixDispl- This speech-based emotion recognition may be used to interpret the opinions/thoughts by feeding the audio into the model. For example, the sentiments they transmit about a product or a political viewpoint. This approach might be used in conjunction with a number of music apps to provide users with song recommendations depending on their emotions. This may also be used to enhance product suggestions for customers of online shopping applications like Amazon. M. Dong, “Convolutional neural network achieves human-level accuracy in music genre classification,” 2018. A. Guzhov, F. Raue, J. Hees, and A. Dengel, “Esresnet: Environmental sound classification based on visual domain models,” 2020. A. v. d. Oord, S. Dieleman, H. Zen, K. Simonyan, O. Vinyals, A. Graves, N. Kalchbrenner, A. Senior, and K. Kavukcuoglu, “Wavenet: A generative model for raw audio,” arXiv preprint Y. Tokozume and T. Harada, “Learning environmental sounds with end-to-end convolutional neural network,” in 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2017, pp. 2721–2725. X. Li, V. Chebiyyam, and K. Kirchhoff, “Multi-stream network with temporal attention for environmental sound classification,” 2019. Y. Su, K. Zhang, J. Wang, and K. Madani, “Environment sound classification using a two-stream cnn based on decision-level fusion,” Sensors, vol. 19, no. 7, p. 1733, 2019 A Research of Speech Emotion Recognition Based on Deep Belief Network and SVM Chenchen Huang, Wei Gong, Wenlong Fu, and Dongyu Feng https://www.hindawi.com/journals/mpe/2014/749604/ https://vesitaigyan.ves.ac. in/recogni zing-emotion-from-speech-using-machinehttps://vesitaigyan.ves.ac.in/recognizing-emotion-from-speech-using-machine-learning-and-deep-learning/learning-and-deep-learning/
<urn:uuid:60c2bd84-9b7c-46a8-9d8a-ea5a14aa0865>
CC-MAIN-2022-33
https://www.ijraset.com/research-paper/speech-based-emotion-recognition
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00004.warc.gz
en
0.898543
2,162
2.90625
3
It is not easy to answer the question “How long does Bitcoin take to send.” There are many factors that influence the transfer time when sending or buying Bitcoin. We should take into consideration the exchange we use, the network congestion and the fees paid. If we have a clear idea of these parameters, then we could also answer the above-mentioned question. This guide will be reviewing all these paraments. Although there will be no certain estimation about how long does Bitcoin take to send, it would give us a clear approximation of this time. How Long Does Bitcoin Take to Send? The Bitcoin (BTC) network is currently the largest in the world. With it, users can send and receive BTC as long as they are connected to the internet. There is no centralized authority controlling the transactions that take place or not in this network. This is why we consider Bitcoin a decentralized blockchain. To answer the question of how long does it take to send Bitcoin, we would have to focus on different parameters that we need to understand. These parameters are key values that would allow us to understand the level of congestion of the network. In the next sections, we will analyze each of these factors and how it influences transaction times. Each exchange would require different transaction confirmations in order for a BTC transfer to be accepted. This is why the answer would depend on the platform we are using rather than on a Bitcoin network feature. Bitcoin Network Congestion The congestion of the Bitcoin network is the main factor to take into consideration to understand how long does it take for Bitcoin to send. To understand Bitcoin’s congestion, we also have to know how Bitcoin mining works. Understanding Proof-of-Work (Mining) The Bitcoin network works with a Proof-of-Work (PoW) algorithm. This PoW algorithm requires miners located all over the world to process and approve the BTC transactions. Confirming transactions is a task that would have a clear impact on how long does bitcoin take to send. Miners have to process complicated mathematical puzzles through specialized hardware devices called ASIC. ASIC devices are very expensive and consume a lot of electricity. Miners are then rewarded with newly created BTC and the fees they collect from transactions. Transactions are grouped in blocks. These blocks on the BTC network have a size of 1 MB where information about transfers can be stored. Each Bitcoin block takes 10 minutes to be processed by miners around the world. When the blocks start getting full, miners will start prioritizing transactions that pay higher fees. Each transaction performed on the BTC network requires users to pay for fees. When blocks reach the 1 MB limit, miners process the transactions with higher fees. This is an incentive for miners to continue processing transactions. In some wallets, you can decide the level of fees paid. In some exchanges, the fees are standard calculations performed by the platform. Let’s have a closer look at Bitcoin fees and their impact on how long does bitcoin take to send. This information is only valid for proof-of-work digital currencies such as Bitcoin or Litecoin (LTC). Nevertheless, there are some differences between Bitcoin and other PoW blockchain networks. Thus, transaction times and fees might be different depending on the virtual currency used. Some people tend to use LTC or XRP for transfers and exchange the coins back to Bitcoin once the funds arrive at another platform. This helps users reduce waiting times and also spend lower fees on transfers. Nevertheless, this does not offer the same security level as handling BTC and there is also a price risk involved as well. Bitcoin fees are one of the main things to take into consideration to understand how long does Bitcoin take to send. When you perform a Bitcoin transfer, you can select the fees you want to pay. If you are using a crypto exchange or a wallet, the interface itself will ask you to select the fees you want to pay. The higher the fee you pay, the faster the transaction will be processed. If the transaction is included in the following block, then it can take 10 minutes to be confirmed by a miner. If instead, the transaction has the lowest transaction fees (i.e. 1 satoshi), it would definitely have to wait to be processed until blocks start getting empty. If you decide to pay for the lowest network fee, you might not see your BTC processed in hours or even days if the network is congested. This is why understanding the effect of fees in the processing times is key. This does not mean, however, that we should pay for the highest fee. For example, during the 2017 bull market, the average BTC transaction fee reached $55. Thus, sending a fast Bitcoin transaction could be very expensive for a retail user. Most of the transactions at that time using the standard transfer fee were processed in several days. Cases of transactions being stuck for days have also been reported. Consequently, if you want your transaction to be processed immediately (as soon as in the next block), you have to pay the highest possible fee. But be cautious, if the network is congested the fee can get extremely high for a simple transfer. Nevertheless, if you use the lowest fee, it might not be processed at all in days. Exchange and wallet confirmations are also an important thing to analyze and understand how long does Bitcoin take to send. This is because each of these exchanges and wallets requires several blockchain confirmations (in general between 1 and 6) to accept BTC and other digital assets. If you want to know how long does it take to send Bitcoin from Coinbase, the answer would require you to analyse the fees you pay (low, standard, high) and the network confirmations required in the receiving exchange. The larger the network confirmations, the longer the time it would take for the transaction to be processed. Coinbase requires 3 confirmations for Bitcoin to be transferred into its platform. Other exchanges require a larger number of confirmations. That means that the answer to how long does Bitcoin take to send would require us to know the confirmation times for each exchange. If your exchange is not sharing this information, then you might not be able to calculate the estimated arrival time. Nevertheless, you can always contact the support team and get more information regarding the number of confirmations you need. The number of confirmations is certainly important in terms of security. Blockchain confirmations allow the network to verify and confirm a transaction is legitimate and valid. This is the method Satoshi Nakamoto invented in order to keep the Bitcoin network secure and decentralized. If a Bitcoin transaction is rejected because it is not valid, it would not be processed by the network. Furthermore, the larger the number of confirmations, the more secure the funds transacted are. With 0 Bitcoin confirmations, the funds can be reversed. This is extremely important. If you want to be sure the funds would be processed, you should always wait for at least one blockchain confirmation. For users that handle small amounts, one confirmation is enough to be almost sure the funds would arrive. The security of the transfer increase as new confirmations are added. For example, with 6 blockchain confirmations, most of the services and crypto platforms would consider the transfer processed. With more than 60 confirmations it might be literally very difficult to have an issue with the funds transferred. Most of the exchanges, as we have already mentioned, require between 1 and 6 transactions for the funds to be considered valid. Bitcoin Transfers From and to Coinbase Bitcoin transfers from and to Coinbase work as any other BTC transfer you can do using Bitcoin. Nevertheless, you need to take into consideration the time it would take for the BTC to arrive at the other platform or wallet. How long does Bitcoin take to send, Coinbase users generally ask. Surprisingly, the answer does not depend on Coinbase but on other exchanges and on the network congestion at that time. Indeed, Coinbase would release the funds immediately after you execute your withdrawal. How Long Does Coinbase Take to Send Bitcoin? As soon as you process a BTC transaction in the Coinbase platform, the coins are sent immediately after. That means that there is no withdrawal delay for BTC transfers from Coinbase to any other platform. You should expect your funds to reach your wallet as soon as the transaction is processed by the miners. This brings us to the question: how long does it take for Coinbase to send Bitcoin? The answer is very simple: it takes just a few seconds for BTC to leave the Coinbase exchange. As we mentioned, we need to analyse the number of confirmations needed by other exchanges rather than by Coinbase. How Long Does It Take to Send Bitcoin to Binance? The main aspect we have to take into consideration to send BTC funds from Coinbase to Binance is related to the number of confirmations Binance need to accept the transfer. Binance currently requires 1 block confirmation to receive funds. That means that as soon as you send the BTC from Coinbase, they should reach the Binance exchange after one confirmation. Depending on the level of fees paid and the congestion of the network, the transaction can be processed between 10 or 30 minutes. In some cases, it may take a few hours if the BTC network is congested. Despite that, it is worth taking into consideration that it is faster to send BTC to Binance than to Coinbase. Binance only requires one network confirmation compared to three network confirmations from Coinbase. How Long Does it Take to Send Bitcoin from Coinbase to Bittrex? Bittrex is another cryptocurrency exchange that allows users to trade digital assets. Users send and receive Bitcoin and many other digital currencies. As it happened with Coinbase and Binance, to know how long does Bitcoin take to send to Bittrex, we will need to have a clear idea of the number of confirmations they require for BTC to be accepted in this platform. In order to transfer Bitcoin from Coinbase to Bittrex, users would have to wait for two network confirmations. This is the number of blockchain confirmations needed in order to Bittrex to accept your coins. This can take between 20 and some more minutes depending on the congestion of the network. It is faster than Coinbase but slower than using Binance to receive BTC. Never forget that confirmations are not the only thing to take into consideration. If you don’t use enough fees to send your funds from Coinbase to Bittrex, it might take longer. It is worth noting that transactions are usually sent immediately from any exchange once you execute and confirm the transfer. The receiving platform would be the one deciding the number of confirmations required for a transaction to be considered confirmed. Final Words on Bitcoin Transaction Times There are three main things we need to consider to understand how long does bitcoin take to send: transaction fees, network congestion and the number of confirmations required by exchanges. - Transaction Fees - Network Congestion - Wallet and Exchange Number of Confirmation These things are going to play an important role to define the time it takes to send Bitcoin. The higher the congestion, the higher the fees you would have to pay for a transaction to be included in the next block. But even if your transaction is included in the next block, each of the exchanges would require a different number of confirmations before your coins would be credited to your wallet. For Coinbase, we have seen only three confirmations are needed. Bittrex is now requiring users to wait for two confirmations. Finally, Binance works with just one confirmation. This information will help you know how long does bitcoin take to send, how the BTC network works and which exchanges offer better solutions.
<urn:uuid:011653f3-badb-4881-9813-531053a4471c>
CC-MAIN-2022-33
https://bitcoinnewsfeeds.com/guides/how-long-does-bitcoin-take-to-send/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00604.warc.gz
en
0.948854
2,385
2.65625
3
Corruption is worse than prostitution. The latter might endanger the morals of an individual, the former invariably endangers the morals of the entire country. - Karl Kraus Corruption is a worldwide phenomenon. It has come to a level where it is visible in every walk of life and has become a part and parcel of our daily life. Corruption is now deep rooted in our society and to prevent the evil of corruption in India, lawmakers of India enacted the Prevention of Corruption Act. 1988. The Prevention of Corruption Act India was enacted after the recommendations of Santhanam committee. The committee was formed by the central government in the year 1960. The Chairman of this committee was K. Santhanam. The report given by this Santhanam Committee in 1962 clearly stated that “Corruption in India or any other country cannot be eliminated or reduced unless proper preventive measures are been taken and implemented in a proper manner. These preventive measures must be inclusive of administrative, educational, social, legal and economical means. Only after the recommendations of this Committee, Central Vigilance Commission was formed by Central Government in 1964 to look into the matters of Corruption against Government. Recommendations made by the Santhanam Committee There were various recommendations which were made by the Santhanam Committee in order to prevent the situation of growing termite known as “CORRUPTION”.These are as follows: That, a thorough study of every Department of Government or Ministry is needed which must be inclusive of social, legal, economic and educational preventive measures. Citizens should be educated and made aware of their rights and responsibilities. Citizens should have knowledge about the working of Government. Basic amenities should be provided to employees such as increment in salary, housing, and medical facilities. Companies and businessman should maintain a detailed and complete record of accounts of expenditure. Only Candidates who satisfy the requirements for the concerned posts shall be appointed as the Administrative Officers. Regular recreational activities should be conducted for the employees by the respective departments. After retiring from the Government Office Services, no government servant can immediately join any private commercial employment within the period of two years. Administrative delays should be reduced to avoid corruption practices. Higher authorities of Government should keep a regular check on the working of officials and make sure that laws are properly enforced. Nowadays, Media is playing the role of 4 organs of the Government. Media should play a positive role in encouraging honesty and discouraging corruption. Licenses and permits granted should be reviewed on a regular basis along with the taxation laws. The Prevention of Corruption Act “If we cannot make India Corruption-free, then the vision of making the nation develop by 2020 would remain as a dream”.- Dr. A.P.J. Abdul Kalam Corruption is that termite which is eating every pith of the society. As a whole, it hampers the growth of a nation. The Prevention of Corruption Act came into force in September 1988. It includes the provisions of Prevention of Corruption Act 1987, Indian Penal Code, Criminal Procedure Code and the Criminal Law Act, 1952. At the time before and after the Second World war, Corruption in India, amongst officers and public servants considerably increased. The provisions of Indian Penal Code and Criminal Procedure Code were unable to cope up with the rising situation of corruption. So, to tackle the situation of Corruption, The Prevention of Corruption Act was passed in 1947. Under the Prevention of Corruption Act of 1947, Special Judges are being appointed by the Central and State Government. Special Judge appointed should be a Sessions Judge or Additional Sessions Judge or the Assistant Sessions Judge under the Code Of Criminal Procedure, 1973. Under the Criminal Procedure Code, 1973 Offences against any Public Officer or Government servant are considered as Non- Cognizable offence. But under this Prevention Of Corruption Act, it is obligatory for the court to make the certain probability of guilt against the accused. Accordingly, the investigation process takes place by the Deputy Superintendent of Police. The act of investigation shifts the burden of proof on the accused more than that of the side of Prosecution. The Act has redefined the meaning of the term, ‘Public Servant’. As per definitions, the term ‘Public Servant’ means any person employed in government services or in pay of the government, or its departments, its companies or any undertaking or control of the government. The Act applies to the whole of India except the parts of Jammu and Kashmir. Member of Parliament(MPs) or Member of Legislative Assembly(MLAs) are kept in exclusion of this act. When it comes to trial or hearing of ‘Public Servants’, proceedings are conducted by the Special Judge and appeal for them lies before the High Court and then before the Supreme Court. If the alleged offences against Public servants, MPs or MLAs are proved then, the punishment shall not be less than six months of imprisonment which may extend to five years as per the gravity of the offence. Few most common offences that fall under this act are Misappropriation, abusing official position, misappropriate income, obtaining misappropriate pecuniary advantage and etc. Departments Set up by Central Government as Anti-Corruption Measures Or Measures setup for Prevention of Corruption in India The Central Government has taken following steps to deal with the situation of Corruption and is Working hard to overcome the scenario of Corrupt and dishonest officials. There are basically four departments set up by the Central Government in the interest of the public. These four departments are currently working as Anti-Corruption measures in the society: 1. Administrative Vigilance Division in the Department of Personnel and Training This division was set up by the Ministry of Home Affairs in August 1955 to take adequate measures to deal with corruption. Under this scheme, one member from each department not less than the post/ designation of Deputy Secretary was required to be nominated for being eligible for the status of Chief Vigilance Officer of respective Departments. Main tasks are given or main works which were assigned to Chief Vigilance Officer were to deal with all the matters related to Vigilance. They formulate and implement the policies of Central Government in the field of Vigilance, integrity in public services and anti-corruption. 2. Central Bureau of Investigation (CBI) The department of Central Bureau of Investigation or CBI is constituted under the Resolution No.4/31/61-T, of Ministry of Home Affairs, Government of India, Dated- 1 April 1963. In this department, the investigation work is carried out by the S.P.E. wing of the CBI which derives its police powers from the Delhi Special Police Establishment Act, 1946. The SP.E. gives CBI the powers to enquire and investigate in certain specified offences or class of offences relating to Corruption and other kinds of malpractices including the involvement of public servants. This department helps in putting the public servant behind the bars who involve in the act of Corruption or who misuse his designation or powers he has got. 3. Domestic Vigilance Units Working in Ministries, Public Undertakings. Departments and Nationalised Banks 4. Central Vigilance Commission (CVC) CVC was set up after the recommendation of the Santhanam Committee in 1964. It is a non- statutory body, its jurisdiction and functions can be amended by the Central Government. It generally deals with the cases where, Gazetted officers of Central Government, Union Territories, PSUs and Nationalised banks are held in the matters of Corruption. This commission works as the autonomous and advisory body. It comprises a Chief Vigilance Commissioner, assisted by a Secretary, five branch officers and eleven Commissioners for Departmental Inquiries. Investigation under the Prevention of Corruption Act Investigation in the cases of Prevention of Corruption shall be done by a police officer, not below the rank of: In case of Delhi, of an Inspector of Police. In metropolitan areas, of an Assistant Commissioner of Police. Elsewhere, of a Deputy Superintendent of Police or an officer of equivalent rank shall investigate any offence punishable under this Act without the order of a Metropolitan Magistrate or a magistrate of the first class, or make any arrest therefore without a warrant. If a police officer below the rank of an Inspector of Police is authorized by the State Government in this behalf by general or special order, he may investigate such offence without the order of a Metropolitan Magistrate or a Magistrate of First Class, may make any arrest therefore without any warrant. Ofences and Penalties under Prevention of Corruption Act The following are the offences under the Prevention of Corruption Act, India (PCA) along with their punishments:- Taking gratification other than legal remuneration in respect of an official act, and if the public servant is found guilty he shall be punishable with imprisonment which shall not be less than 6 months but which may extend to 5 years and shall also be liable to fine. Taking gratification in order to influence a public servant, by corrupt or illegal means, shall be punishable with imprisonment for a term which shall not be less than six months but which may extend to five years and shall also be liable to fine. Taking gratification, for an exercise of personal influence with public servant shall be punishable with imprisonment for a term which shall be not less than six months but which may extend to five years and shall also be liable to fine. Abetment by the public servant of offences defined in Section 8 or 9, shall be punishable with imprisonment for a term which shall not be less than six months but which may extend to five years and shall also be liable to fine Public servant obtaining valuable thing without consideration from person concerned in proceeding or business transacted by such public servant shall be punishable with imprisonment for a term which shall be not less than six months but which may extend to five years and shall also be liable to fine. Punishment for abetment of offences defined in Section 7 or 11 shall be punishable with imprisonment for a term which shall be not less than six months but which may extend to five years and shall also be liable to fine. Any public servant, who commits criminal misconduct shall be punishable with imprisonment for a term which shall be not less than one year but which may extend to 7 years and shall also be liable to fine. Habitual committing of the offence under Section 8, 9 and 12 shall be punishable with imprisonment for a term which shall be not less than two years but which may extend to 7 years and shall also be liable to fine. Get legal advice from the best legal experts- Email us at firstname.lastname@example.org or call us at +919811782573. MyAdvo acts as Client's legal concierge providing technology solutions for Lawyer Discovery, Price Discovery and Case updates. With the use of technological solutions, we match the client’s requirements with the lawyer based on expertise, location etc. Our dedicated team of 60+ in Delhi, Mumbai, and Bangalore strive to do everything to help the client in taking the better-informed decision by understanding his legal situation and requirement. Further, for any query regarding the operational or financial debtor, you can consult the lawyer online and also ask legal advice online. MyAdvo lets you find the lawyer anywhere in India online.
<urn:uuid:19a9adae-a6ff-47df-8f9a-7de40bc859d2>
CC-MAIN-2022-33
https://www.myadvo.in/blog/know-everything-about-prevention-of-corruption-act/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572898.29/warc/CC-MAIN-20220817092402-20220817122402-00604.warc.gz
en
0.955752
2,354
2.984375
3
Congestive Heart Failure (Heart Failure; Chronic Heart Failure; Left Ventricular Dysfunction; Left Ventricular Failure) In congestive heart failure (CHF), the heart is unable to pump the necessary amount of blood throughout the body. This causes blood to back up in the veins. Fluid pools in the liver and lungs. Swelling occurs first in the feet, ankles, and legs. Then the swelling occurs throughout the body as the kidneys begin to retain fluid. Problems with the heart's valves due to: - Rheumatic heart disease - Bacterial endocarditis]]> - Congenital defects - Calcium deposits - ]]>High blood pressure]]> - Heart muscle damage after a ]]>heart attack]]> - ]]>Coronary artery disease]]> (weakened, damaged heart muscle) due to: - Excess alcohol ingestion - Genetic defect - Certain medications - Complications from the use of beta-blocking or digitalis-containing medications - ]]>Hyperthyroidism]]> (overactive thyroid) - Excess salt intake - Kidney and/or liver failure - Anabolic steroid use - Thiamine (vitamin B1) deficiency Risk factors include: - Sex: male - Race: Black - Advancing age - Excess alcohol intake - Excess intake of salt and fat - High fever - Chronic lung disease - Use of beta-blocking or digitalis-containing medications in certain settings - Heart valve disease - Heart muscle damage from heart attack, infection, or medications - ]]>Overactive thyroid]]> - Fatigue, weakness - Shortness of breath—at first only with activity, progressing to shortness of breath at rest - Cough—may be dry and hacking or wet sounding with a pink, frothy sputum - Need to sleep propped up - Swelling of feet, ankles, or legs - Frequent urination, especially at night - Unexplained weight gain - Abdominal pain and tenderness The doctor will ask about your symptoms and medical history. A physical exam will be done. In particular, the physical exam will include: - Listening to the lungs and heart with a stethoscope - Feeling the abdomen for tenderness and liver swelling - Checking the legs for swelling Tests may include: - Blood tests—to look for certain markers in the blood that help the doctor determine what is happening with your heart - Urine tests—to look for certain markers in the urine that help the doctor determine what is happening with your heart - Electrocardiogram (ECG, EKG)]]> —records the heart's activity by measuring electrical currents through the heart muscle - ]]>Echocardiogram]]> —uses high-frequency sound waves (ultrasound) to examine the size, shape, function, and motion of the heart - ]]>Exercise stress test]]> —records the heart's electrical activity during increased physical activity, may be coupled with echocardiogram - Patients who cannot exercise may be given a medication to simulates physical exertion - Nuclear scanning—radioactive material (such as thallium) is injected into a vein and highlights areas with diminished flow Electron-beam CT scan (coronary calcium scan, heart scan, )—measures the amount of calcium deposits in the coronary arteries to help to determine the risk of heart disease, including heart attacks - The American Heart Association (AHA) published guidelines in 2006 that heart scans are not for everyone and those most likely to benefit from the procedure are patients at intermediate risk of coronary artery disease - ]]>Coronary angiography]]> —x-rays with a special dye that allows the doctor to look for abnormalities (narrowing, blockage) in the arteries and evaluate the function of the heart Treatment of Underlying Conditions CHF may be caused by another condition. Treating the other condition should improve or cure your CHF. - Avoid alcohol. - If you smoke, quit]]> . - Lose weight if necessary. - Eat a ]]>healthy diet]]> . This may include a diet that is low in fat and salt, and high in fiber. - Ask your doctor if you need to restrict fluids. Find out how much salt and fluid is right for you. - Begin an exercise program with guidance from your doctor — aerobic training may help improve your level of physical activity and your quality of life. ]]>*¹]]> - Weigh yourself every morning so you can detect fluid retention early. - ACE-inhibiting medications Left-Ventricular Assist Device (LVAD) This is a mechanical pump that can be implanted in your chest. It temporarily assists the heart's pumping. The pump may take over the function of either or both ventricles. Initially it has been used only for patients awaiting heart transplant. In recent years it has emerged as possible long-term treatment for some patients. This is a surgical procedure in which a muscle from the back is removed and wrapped around the heart. A mechanical device stimulates the transplanted muscle to squeeze the heart, thus assisting the heart's pumping action. Implantable Cardioverter Defibrillator (ICD) Placement Patients with heart failure are more prone to certain heart arrhythmias that put them at risk for sudden cardiac death. ]]>ICDs are implanted]]> in those patients to prevent such arrhythmias from occurring. Cardiac Resynchronization Therapy Some patients with heart failure benefit from a specific type of electrical stimulation to the ventricles. This allows the ventricles to contract in a synchronized matter. It can improve CHF symptoms. This is reserved for the most severe cases of CHF. To prevent CHF or to prevent the condition from worsening: - If you smoke, quit. - Avoid alcohol. - Maintain a healthy weight. - Lose weight, if necessary. - Eat a healthy diet. It should be low in saturated fat and salt. It should also be rich in whole grains, fruits, and vegetables. - Begin a safe exercise program with the advice of your doctor. American Academy of Family Physicians American College of Cardiology American Heart Association About Kids Health Heart and Stroke Foundation of Canada ACC/AHA Practice Guidelines. American College of Cardiology website. Available at: http://www.acc.org/qualityandscience/clinical/guidelines/news/hf.htm . Accessed July 16, 2008. Congestive heart failure. American Heart Association website. Available at: http://www.americanheart.org/presenter.jhtml?identifier=4585 . Accessed July 16, 2008. Dambro MR. Griffith's 5-Minute Clinical Consult. 2001 ed. Philadelphia, PA: Lippincott Williams & Wilkins;2001. Heart pumps. Mayo Clinic website. Available at: http://www.mayoclinic.com/health/heart-failure/HB00076 . Accessed on Accessed July 16, 2008. Hunt, SA, Abraham, WT, Chin, MH, et al. ACC/AHA 2005 Guideline Update for the Diagnosis and Management of Chronic Heart Failure in the Adult: a report of the American College of Cardiology/American Heart Association Task Force on Practice Guidelines. Circulation . 2005; 112:e154. Hunt SA, Baker DW, Chin MH, et al. ACC/AHA guidelines for the evaluation and management of chronic heart failure in the adult. American College of Cardiology Foundation (ACCF) . 2001 Sep;56. Paterna S, Parrinello G, Cannizzaro S, et al. Medium term effects of different dosage of diuretic, sodium, and fluid administration on neurohormonal and clinical outcome in patients with recently compensated heart failure. Am J Cardiol. 2009;103:93-102. Epub 2008 Oct 17. What is heart failure? National Heart, Lung, and Blood Institute website. Available at: http://www.nhlbi.nih.gov/health/dci/Diseases/Hf/HF_WhatIs.html . Accessed July 16, 2008. *¹4/16/2009 DynaMed's Systematic Literature Surveillance http://www.ebscohost.com/dynamed/what.php : Nilsson BB, Westheim A, Risberg MA. Effects of group-based high-intensity aerobic interval training in patients with chronic heart failure. Am J Cardiol. 2008 Nov 15;102:1361-1365. Epub 2008 Sep 11. Last reviewed February 2009 by ]]>Igor Puzanov, MD]]> Please be aware that this information is provided to supplement the care provided by your physician. It is neither intended nor implied to be a substitute for professional medical advice. CALL YOUR HEALTHCARE PROVIDER IMMEDIATELY IF YOU THINK YOU MAY HAVE A MEDICAL EMERGENCY. Always seek the advice of your physician or other qualified health provider prior to starting any new treatment or with any questions you may have regarding a medical condition. Copyright © 2007 EBSCO Publishing All rights reserved.
<urn:uuid:82456780-2ea9-4b41-b26d-e9de668dd3ee>
CC-MAIN-2022-33
https://www.empowher.com/media/reference/congestive-heart-failure
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00204.warc.gz
en
0.834438
2,263
3.296875
3
Out of ten physical senses, the five sense-organs are of knowledge or perception (Giaan Indriyas — eyes, years, nose, tongue and skin), and the five sense-organs of action (Karam Indriyas — the genital, anus, mouth, hands and legs). Man engages in the world of gross objects with his sensory faculties and the pleasures they afford only make him desire for more and more. But it’s not possible to satisfy desires. Accordingly, we are repeatedly asked by the Gurbani to learn to control them. We all like to think and believe that we are not slave of our senses! Under the influence of Maya, however, the deluded mind nurses the defiled senses. The deluded mind is like a mirage. When the mind rests in delusion, the conditioned consciousness reflects through the defiled senses. - ਪੰਚੇ ਰੁੰਨੇ ਦੁਖਿ ਭਰੇ ਬਿਨਸੇ ਦੂਜੈ ਭਾਇ ॥੧॥: The five relatives (the five senses of perception) weep and wail painfully, and waste away through the love of duality ||1|| (sggs 19). - ਅਖੀ ਦੇਖਿ ਨ ਰਜੀਆ ਗੁਣ ਗਾਹਕ ਇਕ ਵੰਨ ॥: The eyes are not sated with what they see. All senses are enticed towards their respective sensory objects. (sggs 147). But the senses are not so easily tamed, controlled or conquered. - ਨਉਮੀ ਨਵੇ ਛਿਦ੍ਰ ਅਪਵੀਤ ॥ ਹਰਿ ਨਾਮੁ ਨ ਜਪਹਿ ਕਰਤ ਬਿਪਰੀਤਿ ॥: Naoumee (denotes the ninth day of the lunar cycle): The nine holes of the body (sense organs) are defiled. (They) do not try to understand the Naam (Giaan or Wisdom…) and act contrary (to the Naam). (sggs 298). The Gurbani has cited many examples in this context. For example, those who want to catch a deer entice it by the sweet notes of a flute. An elephant is enticed by tempting it with the touch of a she-elephant. A moth dies by getting lured to a flame or fire without knowing it will scorch it, while a fish can be baited by a piece of flesh. In the case of the black bee it gets attracted by the perfume of a flower and meets its end in the process. But, the Gurbani wants us humans to remember that in man ALL FIVE senses are active! What then needs to be said of man? A human being, therefore, becomes a slave to all his five senses which pull him in all directions. - ਮ੍ਰਿਗ ਮੀਨ ਭ੍ਰਿੰਗ ਪਤੰਗ ਕੁੰਚਰ ਏਕ ਦੋਖ ਬਿਨਾਸ ॥ ਪੰਚ ਦੋਖ ਅਸਾਧ ਜਾ ਮਹਿ ਤਾ ਕੀ ਕੇਤਕ ਆਸ ॥੧॥: The deer, the fish, the bumble bee, the moth and the elephant are destroyed, each for a single defect [ardent desire to hear sound (deer); fish: desire of tongue or taste (fish); desire for smell (bumble bee); desire for seeing (moth); desire of lust (elephant)]. So the (mortal) who is filled with the five incurable defects (i.e., lust, anger, greed, attachment, pride) – what hope is there for him? ||1|| (sggs 468). One can then imagine his predicament and what an awesome task it is to control his senses. Thus, even a great Bhagat can become a slave to his senses IF he allows his senses to act loosely. - ਉਰਝਿ ਰਹਿਓ ਇੰਦ੍ਰੀ ਰਸ ਪ੍ਰੇਰਿਓ ਬਿਖੈ ਠਗਉਰੀ ਖਾਵਤ ਹੇ ॥੧॥: (Man) lures in the pleasures of the senses is eating poison (of Bikaars, sense-objects, etc., ||1|| (sggs 821). So to safeguard against temptations of the senses, the Gurbani time and again reminds us that we must not be complacent. Instead, we need to be alert and keep our mind focused on Truth. Senses are liken to venomous serpents. Like snakes, the senses do not like to be restricted. Rather, they like to act not only loosely but also without any control. A Spiritual seeker needs to be very strong to control these serpents of senses — like a snake charmer, who never allows his snakes to act on their own. Such person is called the ‘Gurmukh‘ in the Gurbani. - ਗੁਰਮੁਖਿ ਕੋਈ ਗਾਰੜੂ ਤਿਨਿ ਮਲਿ ਦਲਿ ਲਾਈ ਪਾਇ ॥ ਨਾਨਕ ਸੇਈ ਉਬਰੇ ਜਿ ਸਚਿ ਰਹੇ ਲਿਵ ਲਾਇ ॥੨॥: Some ‘rare’ who has become the Gurmukh knows the ‘Gaarurr’ Mantra (that neutralizes the poison of Maya-snake); he has trampled her (Maya) and destroy its influence or affect. Only those who remain absorbed in Truth are saved. ||2|| (sggs 510). - ਦਸਨ ਬਿਹੂਨ ਭੁਯੰਗੰ ਮੰਤ੍ਰੰ ਗਾਰੁੜੀ ਨਿਵਾਰੰ ॥ ਬ੍ਯ੍ਯਾਧਿ ਉਪਾੜਣ ਸੰਤੰ ॥: It is believed that the ‘Gaarurr’ Mantra removes poison of the snake and its fangs become bereft of poison. Likewise the Guru (Giaan or Wisdom) ends one’s (mental ailments. (sggs 1361). - ਬਿਨੁ ਸਿਮਰਨ ਜੈਸੇ ਸਰਪ ਆਰਜਾਰੀ ॥ ਤਿਉ ਜੀਵਹਿ ਸਾਕਤ ਨਾਮੁ ਬਿਸਾਰੀ ॥੧॥: Without remembering (Naam, mortal’s life is) like that of a snake. This is how the faithless cynic lives, forgetting the Naam, the Name of the Lord ||1|| (sggs 239). - ਆਸ ਅਨਿਤ ਗੁਰਮੁਖਿ ਮਿਟੈ ਨਾਨਕ ਨਾਮ ਅਰੋਗ ॥੧॥: Hopes and desires for transitory things are erased for who has become the Gurmukh; O Nanak; the Naam alone keeps (him) free of the disease (of desires etc.) ||1|| (sggs 254). In nutshell, defiled senses are said to be harmful or disadvantageous to caution learners (i.e., Sikhs-ਸਿਖਿਆਰਥੀ) to be always on the alert to the enticements of his senses, and to develop non-attachment towards the sensory objects in order to progress spiritually so that we don’t end up squandering this human birth (which is said to be rare and precious) in sensory pursuits. - ਆਜੁ ਮਿਲਾਵਾ ਸੇਖ ਫਰੀਦ ਟਾਕਿਮ ਕੂੰਜੜੀਆ ਮਨਹੁ ਮਚਿੰਦੜੀਆ ॥: O Sheikh Farid! Here and now (Rabb) can be realized, (so) control the senses that stir the mind. (sggs 488). - ਆਸ ਅਨਿਤ ਗੁਰਮੁਖਿ ਮਿਟੈ ਨਾਨਕ ਨਾਮ ਅਰੋਗ ॥੧॥: Desires for transitory things (ਨਾਸ-ਵੰਤ ਪਦਾਰਥਾਂ ਦੀ ਆਸ) are effaced for (the person) who has become the Gurmukh; O Nanak; Naam alone keeps (that person) free of the disease (of desires etc.) ||1|| (sggs 254). At the same time, the Gurbani does not want us to starve either, or stop drinking water or breathing air etc.! - ਤਿਨ ਕਾ ਖਾਧਾ ਪੈਧਾ ਮਾਇਆ ਸਭੁ ਪਵਿਤੁ ਹੈ ਜੋ ਨਾਮਿ ਹਰਿ ਰਾਤੇ ॥ ਤਿਨ ਕੇ ਘਰ ਮੰਦਰ ਮਹਲ ਸਰਾਈ ਸਭਿ ਪਵਿਤੁ ਹਹਿ ਜਿਨੀ ਗੁਰਮੁਖਿ ਸੇਵਕ ਸਿਖ ਅਭਿਆਗਤ ਜਾਇ ਵਰਸਾਤੇ ॥: Those whose (minds) are imbued with the divine Naam (Wisdom, Virtues etc.), their food, clothes and wealth are untainted (i.e. obtained by fair means). Their houses, mansions, palaces and inns for travelers — where Gurmukh Sikhs and needy travelers go and benefit — are all untainted (i.e. free of ill-gotten money). (sggs 648). In short, the Gurbani challenges us to be engaged in this world, but with a detached attitude and with Wisdom (ਅਕਲ, ਬਿਬੇਕ-ਬੁੱਧ, keen understanding, discerning intelligence) — be in the word, but not of the world! - ਬਿਨੁ ਖਾਏ ਬੂਝੈ ਨਹੀ ਭੂਖ ॥: Without eating, hunger is not satisfied. (sggs 1149). - ਨਾਨਕ ਸਤਿਗੁਰਿ ਭੇਟਿਐ ਪੂਰੀ ਹੋਵੈ ਜੁਗਤਿ ॥ ਹਸੰਦਿਆ ਖੇਲੰਦਿਆ ਪੈਨੰਦਿਆ ਖਾਵੰਦਿਆ ਵਿਚੇ ਹੋਵੈ ਮੁਕਤਿ ॥: O Nanak! Meeting the Satigur (i.e. when True Knowledge – ਸੱਚਾ ਗਿਆਨ – is obtained) then the right Way to live life is found. (Thus) while laughing, playing, dressing and eating (i.e. doing all the work in the world), one remains liberated (i.e. Free from negative impact of Maya, Bikaar: lust, anger, greed, attachments, pride, etc.). (sggs 522). Thus, the Gurbani asks us to make the senses widow! - ਦਸ ਨਾਰੀ ਮੈ ਕਰੀ ਦੁਹਾਗਨਿ ॥ ਗੁਰਿ ਕਹਿਆ ਏਹ ਰਸਹਿ ਬਿਖਾਗਨਿ ॥ ਇਨ ਸਨਬੰਧੀ ਰਸਾਤਲਿ ਜਾਇ ॥ ਹਮ ਗੁਰਿ ਰਾਖੇ ਹਰਿ ਲਿਵ ਲਾਇ ॥੫॥: I have made widows of the ten sensory organs (I don’t engage in sense-gratification anymore). The Guru has told (i.e., the Gurbani’s Giaan or Wisdom has revealed to me) that pleasures (sense-gratifications) are the poison-fire (that brings death to the spiritual life: ਆਤਮਕ ਮੌਤ). Those who associate with them fall into lower region (of consciousness, degradation or downfall of Spiritual Life – spiritual death, ਆਤਮਕ ਮੌਤ, ਅਧੋਗਤਿ…). By attuning me to the Lord, the Guru (i.e, the Gur-Giaan or Wisdom) has saved me (from the sense pleasures) ||5|| (sggs 1347).
<urn:uuid:be7fe863-49e4-4639-9d9a-73482e4e8290>
CC-MAIN-2022-33
https://www.gurbani.org/gurblog/slave-to-the-senses/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571959.66/warc/CC-MAIN-20220813142020-20220813172020-00605.warc.gz
en
0.722276
3,327
2.9375
3
Population growth, rising affluence, energy policy and climate change – these are the “four corners” of the food crisis. Arguably one of the most important geography in the news stories of 2008 is “The Food Crisis”, because it has already touched so many people’s lives. Global food prices are being driven upwards by a series of inter-connected factors. Population growth, rising affluence, energy policy and climate change – these are the “four corners” of the food crisis, a serious state of affairs leading to escalating prices and a growing shortage of food for many of the world’s poorest people. The World Bank estimates food prices have on average risen by 83% over three years. The price of rice – a staple for billions of people - has risen by three-quarters over the past year, that of wheat by 130%. In Bangladesh, 50,000 households need emergency food aid following the rice price rise. China has put price controls on cooking oil, grain, meat, milk and eggs while in the UK, the price of pasta has risen by 80%. There have been protests against high prices in Guinea, Egypt, Morocco, Uzbekistan, Yemen, Burkina Faso, Mauritania, Niger, Uzbekistan, Senegal, Haiti, Bolivia and Indonesia. How can all of this be explained? It must be stressed at the outset that the causes are complex and are not simply due to changes in crop yields. On the contrary, at 2.1 billion tonnes, the global grain harvest broke all records last year - it beat the previous year's by almost 5%. “There is plenty of food. It is just not reaching human stomachs. Of the 2.13bn tonnes likely to be consumed this year, only 1.01bn, according to the United Nation's Food and Agriculture Organisation, will feed people.” (The Guardian, 15 April 2008). In fact, there are four key factors to consider, summarised in Figure 1. Figure 1: Four corners of the food crisis Population growth and change With world population growing at 78 million a year, there are always more mouths to feed. By mid-century, numbers will reach nine billion. But this in itself is not enough to explain a food shortage as crop production is also growing – for instance, according to the World Bank, global maize production grew by 51 million tonnes between 2004 and 2007. However, much of this gain was soaked up by other crop uses, mainly increased dairy and meat production along with biofuel manufacture. Rising affluence (increased meat and dairy demands) Growing numbers of people want more food than they used to, especially meat and dairy products. As a result, 760 million tonnes of grain will be used to feed animals - which could cover the global food deficit 14 times (The Guardian, 15 April 2008). “If you care about hunger,” says one Guardian journalist, “eat less meat.” Thanks to the inefficient way food chains work, animals use up a lot of converted biomass energy roaming around, defecating and respiring. Beef cattle eat about eight kilograms of grain or meal for every kilogram of flesh they produce; a kilogram of battery-reared chicken needs just two kilograms of feed (but this introduces new ethical concerns). With meat consumption starting to take-off in the BRICS (Brazil Russia China and India), less grains and cereals are left to be sold as food on global markets to people in poorer nations. UK government new chief scientific adviser Professor John Beddington explains that development and increasing wealth are adding to the food crisis. “Once you move to [an income of] between £1 a day and £5 a day you get an increase in demand for meat and dairy products ... and that generates a demand for additional grain.” (The Guardian, 07 March 2008). About 2.7 billion people in the world currently live on less than £1 a day. As more of them are lifted out of poverty, as seems to be occurring in Asia and South America, grain demand can be expected to rise steeply to meet the expanding needs of meat producers. At present there are just 350 million households worldwide living on £8,000 a year. That is projected to increase to 2.1 billion by 2030 (The Guardian, 07 March 2008). On the one hand, this is great news – but will there be enough food resources to go around, if more people want to eat greater amounts of meat? Energy policy By many estimates, the moment of peak oil production is almost here and supplies will soon start to decline. Many nations are concerned with their future energy security and want to find alternatives to oil and gas. Climate change science tells us that we need to reduce our carbon footprint in any case, and that reduced dependency on fossil fuels should be a priority. There are thus many reasons why world production of biofuels is rising rapidly (this is fuel derived from plant sources, such as ethanol). Indeed, American cars already burn 114 million tonnes of corn each year – enough to cover the import needs of 82 nations classified by the US as “low-income food-deficit countries” (New Statesman, 21 April 2008). The Earth Policy Institute believes that land turned over to biofuels in the US over the last two years would have met the average grain needs of 250 million people (The Guardian, 5 April 2008). Meanwhile, the EU has set ambitious targets for its member states to switch from conventional oil to greater use of biofuels. Criticising such moves, government adviser Professor John Beddington has argued that the global rush to grow biofuels is compounding the food supply problem, and is, in many cases, “profoundly stupid” (The Guardian, 7 March 2008). But unless plans change, biofuel production is due to increase hugely in the next 15 years. The US alone plans to produce 30 billion gallons of biofuels by 2022. A recent confidential World Bank report has stated that biofuels have forced global food prices up by 75% - far more than previously estimated. The figure emphatically contradicts the US government's claims that plant-derived fuels contribute less than 3% to food-price rises (The Guardian 4 July 2008). Climate change Weather plays a major role in current food supply problems. Recently, Cylone Nargis devastated crops in Burma – and increased high-intensity cyclonic activity may very well be one symptom of climate change on account of higher sea temperatures. Droughts in southern Africa and Australia wiped out crops in 2007 and the IPCC (intergovernmental panel on climate change) expects food production to decline in low-latitude regions near the equator; some rain-fed crop yields could decline as much as 50% by 2020. Can things get better? Recommendations have recently been made that the EU scrap its goal of having 10% of transport fuel made from biofuels by 2020. “Europe’s well-meaning rush to biofuels… created a harmful ripple of effects, including deforestation is South-east Asia and higher prices for grain” according to one viewpoint (New York Times, 3 March 2008). However, biofuels are only a part of the food supply equation. Climate change-related food supply problems are more or less certain to get worse, with last year recording one of the highest annual increases in CO2 levels on record (The Guardian, 13 May 2008). Meanwhile, there is no sign of the “Asian miracle” running out of steam, with both Chinese and Indian economies still growing at around 10% per annum, producing more and more affluent consumers with each passing month. The prognosis for world hunger is therefore not good. Genetically modified crops might be one solution to the problem – but these have proved highly controversial and not everyone agrees with their use (The Observer, 27 April 2008). Figure 2: Rising food prices in the UK since 2007 - The Daily Mail Cost of Living Index Impacts of the food crisis Thousands of demonstrators in Mahalla el-Kobra loot shops and throw bricks at police during protests at rising food prices and low salaries. The military have been put to work baking bread. At least four people killed in the southern city of Les Cayes after food prices rise 50% in the past year Police injure more than 10 protesters as several hundred demonstrators demand government action to curb food prices Riots last four days and result in at least 40 deaths and 1,600 arrests. Unrest is due to high fuel and food prices, with soya prices rising by 125% since last year. At least four people killed and 100 injured following fuel price rises Five days of rioting and a hundred arrests after the price of wheat doubled over two months. ...and also in Mauritania, Bolivia, Indonesia, Mexico, India, Burkina Faso, Pakistan Senegal and Uzbekistan. World Food Programme officials say 33 countries in Asia and Africa face political instability on account of food shortages. (Source: New Statesman, The Guardian & New York Times) Thomas Malthus’ An Essay on the Principle of Population (1798) argued that: In the absence of checks, human population can potentially grow geometrically, for instance doubling in size every 25 years Production from the land can, at best, increase at an arithmetic rate, for instance climbing more slowly by the regular intervals After a century, the population: food ratio could potentially reach 16:5 Lack of food is thus the principal check to population growth: a positive check will be brought about by famine, disease and war Negative (preventive) checks can, however, be introduced as the ceiling to growth approaches (including later age of marriage or sexual abstinence) Malthus was the first writer to recognise the importance of the ceiling to growth which may exist; he argued that there is a fixed carrying capacity for every environment. Two Twentieth Century texts by the Club of Rome, The Limits to Growth (1972) and Beyond the Limits (1991), argued that the world was approaching a point where a Malthusian positive check to further growth seemed inevitable when viewed globally. Is the latest “food crisis” evidence that Club of Rome – and before them, Malthus – might have the correct viewpoint? Not necessarily. First and foremost, we should remember one key fact – that more grain crops were grown worldwide last year than ever before (2.1 billion tonnes). Further increases in world population could easily be supported by existing grain yields (which are themselves still growing each year by 0.5%). The shortages currently experienced by some societies have more complex origins than simply being a product of the number of people alive on the planet. For instance, 100 million tonnes of food will be diverted this year to feed cars as biofuel. The World Bank has recently pointed out that “the grain required to fill the tank of a sports utility vehicle with ethanol ... could feed one person for a year” (The Guardian, 15 April 2008). Finally, the shift in Asian diets towards meat and dairy further complicates the population-resources relationship – as incomes of people, rather than just subsistence-level numbers, now need to be taken into account. Clearly, there is no shortage of factors at work in the modern world that complicate the Malthusian growth model. “Well-being = Resources ÷ Population.” Discuss. This essay question was first asked on an A Level paper in the 1980s and is still worth giving students to tackle today - perhaps more so than ever, given the multiple complexities of the food crisis, all of which lend a perfect “synoptic” slant to the task. Critical thinking should be applied to this rather simple equation that models overpopulation “ills” according to a simple Malthusian ratio. Implicit is the assumption that social well-being – perhaps measured by the absence of famine and illness – depends upon a simple equitable division of resources. However, as the rest of this article has shown, demands differ between income groups according to their dietary demands. Also, the political context of the biofuels debate – and the diversion of food resources to produce motor fuel for people who are already well-fed - needs to be explored. Finally, there is scope to investigate the moral or spiritual dimension of well-being. Recent work on “the geography of happiness” could be incorporated into the essay to great effect. New Economics Foundation Happy Planet Index BBC video on Bhutan (where the government promotes happiness) BBC report on 2006 University of Leicester survey UK geography teachers’ happiness project (supported by RBS-IBG) This article is written by Dr Simon Oakes, a Principal Examiner in A Level geography for both 2008 and existing (legacy) courses. Featured image: Timo Volz @magict1911 / Unsplash By placing a booking, you are permitting us to store and use your (and any other attendees) details in order to fulfil the booking. We will not use your details for marketing purposes without your explicit consent. You must be a member holding a valid Society membership to view the content you are trying to access. Please login to continue. Join us today, Society membership is open to anyone with a passion for geography Cookies on the RGS website
<urn:uuid:ab352d4c-1054-4ae0-b910-c9749b241c71>
CC-MAIN-2022-33
https://www.rgs.org/schools/teaching-resources/the-four-corners-of-the-food-crisis/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00205.warc.gz
en
0.951363
2,820
3.53125
4
Understanding the Book of Job! An overview of what it is and what it is not! Part 1 (Ver 1.3) This is Part 1 of a series about understanding the Book of Job. The book of Job is a highly controversial book of mostly confusing information. The book of Job has been widely given the theme of patience and we see this mentioned in the New Testament book of James. This reference in James is the only time Job is mentioned by name in the N.T. The name Job is mentioned only 54 times and mostly just in the book of Job. However, the name does occur in Genesis 46 and Ezekiel 14. The book of Job is primarily about the afflictions of Job. However, the initiator of the problems in Job’s life and the cause of the problems are widely misinterpreted. The book of Job is often quoted at funerals and this is another misapplication of the scriptures and I will probably get into these verses later. The first two chapters reveal the afflictions occurring to this righteous man and then starts the words of Job in chapter 3 in an apparent conversation with some of his friends that have come to tell him what to do and this continues for many chapters. The discourse between Job and his friends go back and forth and finally end when God comes into the conversation with some new information that shuts everyone up. The last chapter of Job ends with God’s blessings on him being restored more than he ever had before. Most Bible scholars agree that Job is probably the oldest book of the Bible. The timeframe of Job is probably somewhere between Noah and Moses since it does not refer to Israel, the Old Testament law or any reference to God’s covenant with Abraham. The author of Job is probably the man Job himself, but we do not know this for sure. There are several verses found in Job that reveal things to us that confirm that it belongs in the Bible and that it is the inspired information from the Spirit of God. So I will not attempt to do a verse by verse study of the entire book, there is just too much unknown information found in this book to do this. I will attempt to teach some key verses that I have seen and I will try to use other verses in the Bible to help us to interpret what we find in Job correctly. Always remember that the Bible interprets itself. Let’s start with verse 1: Job 1:1 There was a man in the land of Uz, whose name was Job; and that man was perfect and upright, and one that feared God, and eschewed evil. The first verse informs us where Job lived and what his nature and character was in the eyes of God. God calls the man Job a complete man, in other words a righteous man. He was humble and feared God and resisted evil. This is the type of man that God can stand behind as we will find out shortly. Job 1:2 And there were born unto him seven sons and three daughters. The man Job was married as we will also find out and he had 10 children. In the next verse we will see that the blessing of God were upon him. Job 1:3 His substance also was seven thousand sheep, and three thousand camels, and five hundred yoke of oxen, and five hundred she asses, and a very great household; so that this man was the greatest of all the men of the east. According to this verse Job was the greatest of all of the men of the east. This is strictly in terms of wealth and the blessings of God on his life. This is also a hidden hint to the reasons of things to come. If God’s blessing are on someone, he will get the attention of everyeone else physcially and spiritually speaking. When Satan sees the blessings of God upon Job, Job became a target. In verse 4 of Job 1, you can see that Job had problems with his children. They like to party, eat, drink and be merry. They were into having fun more than they were into work and doing right. This caused Job vast concern of what would happen to his children. This is the introduction to what Job worried about the most. Job 1:5 And it was so, when the days of their feasting were gone about, that Job sent and sanctified them, and rose up early in the morning, and offered burnt offerings according to the number of them all: for Job said, It may be that my sons have sinned, and cursed God in their hearts. Thus did Job continually. So Job does some things that I find very interesting. His kids have stopped their partying and Job is offering burnt offering for the number of his children to the Lord. Where does Job get the idea for this? I honestly do not know. As far as I know there is no law, no priests and there was no precedence for doing what he is doing. Is Job a priest of God? I do not know? We know from the N.T. that without the shedding of blood there is no remission of sins (Heb 9:22). So Job was doing the right things, but where did he get this information? Plus was it doing any good since it was his children that were sinning and not him? This verse ends with the statement that Job did this continually so we assume that his kids were continually in a party mode. There is another scripture in the N.T. that I believe should be applied to this information we are given, and it goes like this “God is not mocked, for whatsoever a man sows, that shall he also reap” (Gal 6:7). What were Job’s children sowing? Will they reap what they sow regardless of what their father does? I believe God says they will. Job 1:6 Now there was a day when the sons of God came to present themselves before the LORD, and Satan came also among them. So here we go with another introduction to some highly confusing information. The book of Job seems to change dramatic focus from the earth to a place in heaven. The “sons of God” are the angels of God and this would include all angels, the good and the bad. This verse says Satan came with them like he is not included in the group of “sons of God”, but I totally disagree with that interpretation and I believe that Satan was their leader and the most high angel. You can see this by reading verses in Ezekiel 28:14 that describe Satan as the anointed cherub and the covering cherub. Then in Isaiah 14:12, Satan is called Lucifer, the son of the morning. Morning is the “Early Light” and since God is Light we can see that Lucifer is called an early son of God. Job 1:7 And the LORD said unto Satan, Whence comest thou? Then Satan answered the LORD, and said, From going to and fro in the earth, and from walking up and down in it. We are now told that Satan has come from the earth, so we know that he is not on the earth while he is holding this conversation with God. We also learn that Satan is not omnipresent. He must walk across the earth and go from place to place. We therefore know that Satan is not everywhere on the earth at once. However, we do not know how many angels that Satan has under his control on the earth so there may be many angels tormenting people simultaneously and not just Satan doing everything. However, many angels there are, the Bible says in Revelation 12 that 1/3 of them are fallen with Satan. There is also another reality given to us found in the N.T. that helps to explain what is happing to Job. In 1 Peter 5:8 God informs us that Satan is our adversary and he goes about as a roaring lion seeking who he may devour. Is this not exactly describing what is happening here in Job? Satan had just come from walking the earth and he came across Job. He is obviously the adversary of Job that God has hedged out. But, he is seeking to devour Job as we will see as we continue to read in this chapter. We learn from reading 1 Peter 5:8 that Satan is not able to devour everyone if he is seeking ways to do this. This indicates that Satan is not omnipotent and neither does he have direct access to anyone unless certain conditions are met to allow him to come in. Keep 1 Peter 5:8 in your mind as we continue to read about Job: Job 1:8 And the LORD said unto Satan, Hast thou considered my servant Job, that there is none like him in the earth, a perfect and an upright man, one that feareth God, and escheweth evil? Why do you think that God brings up Job? I believe it is because God knows what you are thinking. God knows why Satan is there. Job is a spiritually righteous blessed man of God; there is none like him on the earth. In the eyes of God this is why Satan was there to contend for this man. Job 1:9 Then Satan answered the LORD, and said, Doth Job fear God for nought? Satan starts to ask God questions about Job. Why does Satan ask this question? Does Job fear God for no reason or for nothing as he said to God? This sounds like a complaint or accusation to me. Job 1:10 Hast not thou made an hedge about him, and about his house, and about all that he hath on every side? thou hast blessed the work of his hands, and his substance is increased in the land. Now we begin to see the problem that Satan has and why he is there to see God. Satan is questioning God’s authority to place a hedge of protection around Job and his family. You can clearly see what God is being accused of, the fact that God has blessed Job and given him great wealth and placed a spiritual wall of protection around him so that Satan could not touch him. What gives Satan the right to do this? That is an excellent question to consider, we know that Job’s children are living in sin in a constant state of partying. Job is continually offering sacrifices for his children who do not want sacrifices to be made or at least it appears that they do not care if they are made. The children of Job are not repentant or sorry for what they are doing, they are just being wild crazy rich kids who can get away with whatever they want, or so they think. We know that Satan is called the accuser of the brethren in the Revelation 12:10. This verse in Revelation says that Satan accuses the people of God on the earth both day and night. To accuse is a legal term that means “to charge with an offense”. You do understand that God is the ultimate supreme Judge of the Universe? Satan is the “Plaintiff” that brings accusations against righteous people before the Judge. So why does Satan do this? So these righteous people can be found guilty of violating the spiritual laws that God has established in the spiritual realm. Do you understand this? Satan is looking for a way into your life, he watches your every move, your every action, your every reaction and your every word to see what he can accuse you of doing that violates God’s laws. This is how it works until Revelation 12 comes around and Satan is cast down and he is no longer welcome to come into the heavenly realm to accuse us anymore. Job 1:11 But put forth thine hand now, and touch all that he hath, and he will curse thee to thy face. So here is where it starts to get even more difficult to understand and to interpret correctly. Satan tells God to stretch His hand and touch all that he has and Job will curse God to His face. So is God the curser or was God the one that blessed Job? If you recall from reading earlier we know that God was the one that blessed Job and made him exceedingly wealthy. It was God who had placed the hedge of protection around him and his family so what would happen if God changes and does the opposite like Satan just said for God to do? If God does what Satan just said, then God becomes a liar. That is pretty strong words, but that is what the Bibles says: Mal 3:6 For I am the LORD, I change not; According to the Bible, God is a constant never changing force of good. If God would have blessed Job and suddenly bent to the pressure from Satan to change and curse Job then God is guilty of changing. Do you understand that this is impossible? The Bible describes God as being Light. Do you know that the speed of light is a constant? The speed of light does not diminish or change it always stays the same. The distances of stars in our universe are measured in the terms of light years. A light year is the distance that light travels in the course of a year’s time. This is a constant value or we have a major problem on our hands. If you do not understand laws of physics and science about light and the speed of light, just fix your mind on God. If God blessed someone today and tomorrow takes it all away, then God changed and now God is a liar. That is a major problem with most people’s Bible interpretations, they interpret a book of the Bible like Job in a vacuum and ignore the rest of the Bible and this is not a valid interpretation. Here is another challenge for you to consider from something that God said in the book of Deuteronomy: Deu 30:19 I call heaven and earth to record this day against you, that I have set before you life and death, blessing and cursing: therefore choose life, that both thou and thy seed may live: If God sets before us life or death, blessing or cursing and says to us to choose between the two, whose fault is it which one we get? Uh oh? That is a problem isn’t it? It would appear that if Job got curses instead of blessings, then he made the wrong choices to cause them to occur. Do you understand this? Job 1:12 And the LORD said unto Satan, Behold, all that he hath is in thy power; only upon himself put not forth thine hand. So Satan went forth from the presence of the LORD. So we now have God giving permission, or so many people think it says. This however, is not what this verse says. Nowhere in this verse does it say you have won your case, I give you permission. People just read this into the statement because that is what they want to see that it says. All God said was “Behold” and that means look, open your eyes and see. Do you understand that? That is not a statement of permission; it is a directive for Satan to see what has already happened. You cannot behold something that is not already there. I mean God can see into the future, but Satan cannot. If Satan is told to see something it has to be something that he can already see. This is clearly not rocket science, so surely you can comprehend the simple words of the Bible. Then God tells Satan that all that Job has is in his power. Again this is not I give you the power; this is a simple statement that says you already have the power. There is such a huge difference between those two perspectives. The only thing God does is limit what Satan can do and this was not to touch Job. So God was guilty of still trying to protect his righteous man Job. God never gives Satan permission to do anything. God simply said you already have the right to do what Job has chosen. So who is the author of destruction? Who causes death and tornadoes? We will find out in our next lesson about the story of Job. I hope that you will join me as I continue with this series of very different Bible lessons. Thanks for your time and your comments. God Bless. If you would like to continue reading in this series you can go to “Part 2“. Posted on September 7, 2010, in Bible Study, Job and tagged Bible, Christianity, Church, Genesis, God, Jesus, Job, Patience, Prophecy, Religion, Revelation, Satan, Symbolism, Truth. Bookmark the permalink. 26 Comments.
<urn:uuid:dceafd03-9288-416b-a5f7-3c21525abc50>
CC-MAIN-2022-33
https://agapegeek.com/2010/09/07/understanding-the-book-of-job-an-overview-of-what-it-is-and-what-it-is-not-part-1/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00405.warc.gz
en
0.979671
3,379
2.53125
3
International Mother Earth Day aka Earth Day is observed every year on April 22. The day is marked to raise awareness about the rising levels of pollution and other activities that hurt the environment, either directly or indirectly, and lead to the planet’s annihilation. According to earthday.org, Earth Day aims to “build the world’s largest environmental movement to drive transformative change for people and the planet.” The movement’s mission is “to diversify, educate and activate the environmental movement worldwide.” Earth Day 2022 ‘Invest in our Planet,’ is the theme for this year’s International Mother Earth Day. Given the limited time available, the theme emphasizes the necessity for people to band together and begin taking steps to safeguard biodiversity and the environment. Climate change is no longer a distant prospect, and with more floods and fires on the horizon, it’s critical to assess the situation and take appropriate action. In this context, let us look at how Corporates across the globe are celebrating Earth Day 2021, by conducting various CSR initiatives for mitigation of climate change and/or spreading awareness about it. Ahead of Earth Day 2022, Apple made a slew of announcements that iterate the company’s commitment to environmental causes, including its use of recycled materials in its products and new content offerings relevant to earth day. Apple has announced that the company has expanded the use of recycled materials across its products. The company says that it introduced certified recycled gold for the first time and that it double its use of recycled tungsten, rare earth elements and cobalt. Apple claims that nearly 20 per cent of all the materials used in its products in 2021 was recycled, its highest-ever use of recycled content. These details were released by the company in its 2022 Environmental Progress Report. The company also announced new ways for its customers to help support environmental conservation efforts including supporting the World Wildlife Fund by using Apple Pay. Another innovation announced by the company was Taz, a machine that improves material recovery from traditional electronics recycling. The Cupertino-based tech giant claims that 59 per cent of all the aluminium in the products it shipped in 2021 came from recycled sources and that many products feature 100 per cent recycled aluminium in their enclosure. The company also claims that it has made significant process towards its goal of eliminating plastics in its packaging with plastics accounting for just 4 per cent of its packaging in 2021. Ahead of Earth Day, Apple Maps is making it easier for customers in the US and Canada to find green spaces, family fin in nature, city walks and trails with 25 guides from Lonely Planet, AllTrails and The Nature Conservancy The company is also adding a new episode to its “audio walking experience” Time to Walk, where it hosts environmentalist Jane Goodall who will share stories about her work and her observations about the interconnectedness of all living things. On Earth Day, Apple will be offering an immersive augmented reality experience on Snapchat, which will allow users to learn about the environmental innovations behind the iPhone 13, including the Daisy recycling robot. Meta has announced that people in more than 30 countries can donate and create fundraisers directly in Instagram Reels for more than 1.5 million nonprofits. In celebration of Earth Day on April 22, Meta (formerly Facebook) said that it is adding new features, including highlighting everyday actions and solutions people can take and showcasing new data visualisations that show country-level emissions and curating new content. On Instagram, the company collaborated with illustrator Ping Zhu to create stickers that encourage people to express their support for Earth Day and the environment. “On Facebook, we’re adding profile frames that let people show their support. On Messenger, we’re releasing a custom sticker pack and 3D Avatar stickers built just for Earth Day,” said the company. Meta said that starting in 2020, its global operations reached net zero greenhouse gas emissions and are supported by 100 per cent renewable energy. “We’ve also set an ambitious goal to achieve net zero emissions across our value chain and be water positive in 2030,” it added. “With over 500 megawatts announced this month, we are announcing we have reached over 8 gigawatts of new wind and solar energy in support of our global operations,” the company added. Toshiba America Business Solutions commemorates Earth Day 2022 through its year-round sustainability initiatives to function as good stewards for the planet while reducing carbon footprints for the company and its customers. Toshiba’s ongoing eco efforts include recycling 64.46 tons of used toner cartridges and replanting nearly 19,000 trees worldwide in 2021. Toshiba’s Managed Print as a Service program also helps organizations attain individual environmental goals by improving print visibility and efficiencies. Toshiba has collaborated with PrintReleaf to replant trees in the United States, Madagascar, Dominican Republic, Mexico, Ireland, Canada, Brazil, and India. Since 2016, this partnership has led to the planting of 121,965 trees across global reforestation projects in these countries. Agrocorp, a leading land investment company based out of Bengaluru, has announced a green initiative ‘April Cool’ this World Earth Day. As part of the initiative, Agrocorp shall plant a tree for every new follower added to their social media pages. Many cities across the country saw extreme climate changes this year. Bengaluru witnessed the “Hottest March in fifteen years”. Agrocorp recognizes the strong connection between a healthy planet, healthy people, and with the thought of fostering a green environment where people can thrive and breathe easy, they launched the ‘April Cool’ campaign which inclusively lets people participate & contribute to improving the environment from the comfort of their home while getting a tree planted by their small deed of following Agrocorp on social media. “April Cool” is an initiative through which Agrocorp wants to increase the green cover of the country, with the support of its community. India has seen rapid deforestation in recent years, primarily due to its focus on economic development. According to government data, 14,000sq km of forests were cleared to accommodate 23,716 industrial projects across India over the last 30 years. The founders of Agrocorp, Ayan Nagpal & Arush Nagpal quoted, “For Agrocorp, acting responsibly towards the country and society is part of our mission and vision. When we initiated this campaign, our goal was to ensure that we can apply the innovative power we hold to make a difference for the betterment of people by building a better and greener tomorrow. Torchbearers to the spirit of community, Agrocorp aims to grow the company responsibly and sustainably and, therefore, we are constantly setting ambitious social and environmental goals. Since 2016, Agrocorp and its stakeholders have planted more than 100000 trees at their farms.” Agrocorp will plant these trees in their upcoming 25 acre farm in Doddaballapur called “The Vineyard”. This is a unique project which lets people invest in land but at the same time own a farm with a “Vineyard in their Backyard”.This project is being done in technical collaboration with India’s leading premium wine producer Grover Zampa to give the best vineyard experience to farm owners. On the eve of Earth Day 2022, Tetra Pak, a world-leading packaging and processing solutions provider, has joined hands with Eco Roots Foundation, an NGO working to conserve ecosystem, environment, and biodiversity to launch a program called Happy Wings. This program will reach out to over 200 schools across the country, covering over 20,000 students to educate children about the importance of protecting biodiversity, while also teaching them how to make nests for small birds using household waste like jute, coconut husk and recycled beverage cartons. Launched at Mount Abu Public School, Rohini through a nest-making workshop, the program saw participation from representatives of 30 schools across the National Capital Region where children learnt to make nests using household waste, as well as composite sheets made from recycled cartons. This will be followed by a workshop at Delhi Public School, Faridabad with participants from over 20 schools. The program aims to inspire a behavioral change among children at a primary level and increase sensitivity towards the environment. The workshops will be conducted by Rakesh Khatri, Founder – Eco Roots Foundation, popularly known as The Nest Man of India, who has built more than 2.5 lakh bird nests throughout India, thus helping several sparrows & other small birds find their way back to the national capital. Announcing the association, Mr Ashutosh Manohar, Managing Director, Tetra Pak South Asia, said, “Our approach to protecting the planet is grounded in our commitment to a low-carbon circular economy. Over the years, we have focussed a lot on responsible sourcing of material to protect biodiversity, while also enabling recycling of our used packages to give them an effective afterlife. Happy Wings is a beautiful blend of both – bringing sparrows and small birds back to our cities, while also putting recycled cartons to good use.” Mr. Rakesh Khatri, Founder Eco Roots Foundation, added, “Happy Wings is the result of a shared sense of purpose between Tetra Pak and Ecoroots to protect the planet. I am delighted to collaborate with Tetra Pak, in creating the next generation of conscious citizens, our children, who can change the course of our collective future for good. Over the past 14 years, we have reached out to 10 lakh students across the country, and with committed partners like Tetra Pak, we will take this to the next level.” This Earth Day, Kimberly-Clark India in partnership with the Plastics for Change Foundation, celebrates the successful conclusion of ‘Project घर’. An initiative launched in 2021 to address the mounting challenge of plastic waste by collecting and recycling 22.5 metric tons of single-use and multi-layered plastic to build sustainable housing units for the on-ground waste collectors in the Hubli-Dharwad coastal region of Karnataka. Thus, enabling them to live better, healthier, and financially stable lives. Kimberly-Clark India has been at the forefront of driving meaningful change through circular solutions, and ‘Project घर’ is yet another step in this direction. Over the course of a year, the initiative has aided the diversion of 22,500 kg of multi-layered and low-density polyethylene from the ocean by using innovative and ethical methods of recycling plastic, producing nearly zero waste, and further empowering 300 beneficiaries at the bottom of the waste management value chain to secure greater income. “The success of Project घर and the learnings gathered along the way have only strengthened our resolve to develop a circular economy and a more sustainable future. Through our partnership with Plastics for Change Foundation, we have been able to adopt innovative solutions to tackle the growing environmental and societal concerns, while delivering on our global sustainability vision to advance the well-being of underserved communities.”, said Mainak Dhar, Managing Director, Kimberly-Clark India on the completion of the project. Andrew Almack, CEO, Plastics for Change said, “In the last one year, through Project घर, we have been able to create better and safer livelihoods for the waste collector community in Hubli. We are extremely proud to have collaborated with Kimberly-Clark India, who shares our commitment to improving the lives of the underserved while reducing the social and environmental impact of plastic waste.”
<urn:uuid:f96b1c3e-94e3-4791-809c-1514d4e794a6>
CC-MAIN-2022-33
https://thecsrjournal.in/earth-day-2022-invest-in-our-planet/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00605.warc.gz
en
0.942973
2,456
2.515625
3
Only in America could some people complain that other people enjoy systemic privilege. All over the world it is simply an accepted fact that some families or clans have an advantage in social and economic circles. There is no place on Earth where equality is ubiquitous. It is an uncontested reality that there is no such thing as social and economic equality. It is also true that racism exists to some degree or another in every large country where the population is not homogenous. The Japanese have not cross-pollinated with other populations like we have in America. Within their society they have internecine conflicts and hatreds, but little conflict over skin color. The point is, over thousands of years, humans have shown little interest in total integration. The concept of "White Privilege" is a cultural construct of 17th century colonialism. As light-skinned Europeans dominated world exploration and migration, they also tended to reap the economic benefits of modernization. Under those conditions, industrialization and wealth creation led them to exploit those advantages, as would be expected of any biological life form, plant or animal. That is why, if given the opportunity, Bermuda grass will crowd out Fescue grass in your lawn. Should humans work to mitigate our aggressive tendencies? Of course. But it is simply a utopian dream to think we will ever be passive-submissive patsies. Evolution requires competition, winners and losers, and only the most unforgiving competitors survive to play another day. As a species, we have to be proficient physically and mentally. And we have to maximize our resources, too. And people are always the most valuable resource in any organization. Have you ever heard the phrase, "It's not what you know, it's who you know"? The concept of networking applies to every culture. Forming alliances of like-minded people is a natural outcome of networking, sharing and building a culture. It is not inherently racist to prefer to hang with people like yourself. "Birds of a feather flock together" to lubricate social interaction, to promulgate their species, and to maintain a defensive system, a proverbial "department of homeland security". It is a process better described as survivalism than as racism. The planet is a dangerous place and all life forms have to battle the elements and other competitors to sustain themselves. This explains why humans regularly practice physiological profiling, look for commonality, and form affinity groups, just as do other species. Over the past 500 years, America has co-mingled more human DNA than at any time in human history. That is why we are referred to as a "Melting Pot". Anyone can move to America and eventually become an American. That makes America exceptional in and of itself. Those of us who were privileged to be born in a particular area called the United States of America, are by far, the luckiest of all humans to have ever existed. We are extremely privileged because we live in a nexus where freedom, resources and opportunity all come together. Americans are blessed with the highest standard of living, the longest life span, and the most diverse social environment to have ever existed in human history. I hear so-called "woke" social justice activists say "White people don't understand their own racism." Most of them have advanced degrees from major educational institutions or at least some exposure to cell phones, laptops and the internet-of-things. Ergo, Americans enjoy a systemic privilege over everyone else on Earth. The rest of the world lives in our shadow. Listening to American's of any ethnicity complain about their problems with oppression is baffling. You can't call yourself "woke" if you are ignorant of your own privilege. After years of teaching cultural tolerance, our community standards are lower now than at any point in my lifetime, for almost everything. We have learned to tolerate and accept boorish language and meager communication skills, angry confrontational conflict resolution techniques, selfish exhibits of temper and poor workplace performance in almost any service industry setting. By setting standards too low, we are effectively abrogating any parenting or professional responsibilities at all. Instead of harshly demoting or firing people who fail, we just tolerate them. I say this because I encounter workplace incompetence daily, at the most surprising points of contact. I could write a book about bad initial contact with customer service reps who have the exact opposite effect they were hired to achieve. It is not racist to notice that I can't understand a word they say! That they are reading from a script, or that they can't understand me either. Not too many years ago, many consumer services companies hired experts to monitor their management teams, and their customer service interactions, to assure that customers came away with positive experiences. Now they warn callers that "this call may be monitored" but I can't believe that is true because the next thing that happens is dreadful and unacceptable. How can the managers let that happen? If you can get a live person on the line when you call customer service (which is next to impossible), very seldom do they actually resolve the issue. They either respond by asking you a series of mostly irrelevant and inane questions or they refer you to a webpage or a YouTube tutorial. Recently, when subscribing to a computer security program, I spent nearly 90 minutes with an agent that kept sending me in circles with misdirected links and ineffective measures. Finally, after passing me on to a "Manager" I got what I was looking for. Why did I have to play charades in the first place? Do you live in a development with a Homeowners Association? You know how hostile those can be. How about interacting with government agencies like the DMV, Post Office, or planning departments at the city or county? It is nearly impossible to get the task done the first time, if ever. The new norm is that too many people have never been properly trained for their position, or they simply don't care enough to bother learning. Either way, our culture has failed to install any sense of pride in how people do their work. All of which reflects our social dysfunction and the complete failure of the progressive educational model based on "tolerance" and "diversity" training. When was the last time you hired a contractor to do work around the house? How did that go? Despite digital apps like Angie's List and Home Advisor that supposedly vet vendors, my experience has been that too many of them are underqualified, overpriced and unreliable. I call it "talent relativism" because when I challenge their work, the first thing they do is trash talk their competitors. They learned those techniques from politicians and academics. "Yeah, that faucet isn't quite right. But at least it is better than what the last guy put in!" We are living in an atmosphere that has been contaminated by our own bastardized educational system. After decades of Progressive Educational Theory, where the objective was to create socially homogenized and inclusive citizens, we have instead created tribes of emotionally underdeveloped, ill-prepared, and woefully unskilled workers that have little or no social skills, work ethic or pride in what they are attempting to do. Have you noticed how unhappy people are about just about everything? Whether it is the service industry (restaurants, post office, auto repairs, etc.) or professional services (tax preparer, dentist/doctor, lawyer, etc.) or especially public services like politicians, police or military, no one gets a pass. Most of us think the other guy is overpriced and under-performing. In too many instances, we are right! People are just pissed about everybody and everything and we know this because social media is loaded with video documentation of irate individuals screaming invectives at receptionists, security guards, policemen, teachers, store managers and even sports team mascots! Whether it is City council, PTA or school boards, any meeting of people where decisions have to be made over policy, budgets, rules or procedures is going to result in conflict and emotional outbursts, fist fights and even arrests. Customer service, consumer complaint resolution, communication and mitigation skills, are all insufficient or totally absent. And the most irritating part of it, is that they think they are doing a great job! "Baby Boomers have wallowed in the economic perks of the Allied victory over fascism in World War II and the subsequent collapse of the Union of Soviet Socialist Republics and the Berlin Wall. They were too busy building fortunes to notice the migration of disenfranchised Marxists to college campuses around the world, where their communist dogma could be distributed under the guise of academic freedom and the intellectual pursuit of social justice. The heirs of the Greatest Generation defaulted on the difficult and demanding chore of raising and disciplining their children and vetting their educators. They pampered them and gave them too much veto power, showered them with positive reinforcement and false achievement. They inflated their egos and told them they were never wrong, eventually sending them off to be indoctrinated by fake academic patriots who filled their heads with anti-American hatred and Neo-communist propaganda. They were told they were more 'progressive' than their parents and supplied required-reading textbooks by radical leftists like Howard Zinn and Hillary Clinton's favorite docent Saul Alinsky. Boomers put their kids in re-education indoctrination centers for four years and most of them were good students. Now they are leaders in their field of endeavor and to a large degree, Marxists." -- The Illusion of Knowledge: Why so many educated Americans embrace Marxism (Permission to repost has been granted by the author) When you ask why I won’t wear a mask and say - “It’s just a mask.” .....”It's just a mask" can turn into "it's just a vaccine" very quickly. And it will, you can bet your bottom dollar on that! In less than 5 months, our government has successfully divided the country into "obedient mask wearers" versus "selfish people that refuse to wear masks.” "It's just a mask, you guys.” It's for "the greater good!” Where have we heard this phrase before? In less than 5 months, our government has dictated what events are acceptable versus unacceptable to attend. Riots are OK, but church and family funerals are not. Standing in a graduation line is a "safety hazard,” but feel free to line up at WalMart, Lowes, and Home Depot. But it's "just a mask" & "safety precautions,” you guys. In less than 5 months, our government successfully facilitated the closing of family-owned businesses while granting authority to large corporations that they have invested interests in. It's "just a mask" and "safety precautions" you guys. Oh & here's a measly $1200 that we stole from you in the first place. Enjoy! In less than 5 months, our government was able to successfully sway the population into believing that a CASHLESS SOCIETY is a good thing! In the name of a government sponsored virus. In less than 5 months, our government closed down public schools, and has "restructured" school moving forward under the guise of "public safety" from a "virus.” These same schools fed children crap per the corrupt USDA food pyramid. But "health" matters when it comes to a government sponsored virus. It's "just a mask" & "heightened safety precautions,” you guys. In less than 5 months, our government demonstrated how easily people assimilate to "guidelines" (that have NO scientific premise whatsoever) when they are fearful. What was up with all that toilet paper? It's "just a mask" & "6 foot social distancing,” you guys. Oh, and dooky paper. In less than 5 months, our government has successfully instilled fear in a majority of the population in America. But citizens are not "afraid" of the people in power who are responsible for the removal of their "freedoms.” Instead, they're fearful of their neighbors and family, human touch, and air. Government created division. There are thousands of viruses that *could* affect the population, but these viruses do not matter because MSM didn't say they do. It's absolutely terrifying to me that so many people do not question authority because they see that authority as "all knowing." It's even more terrifying that these same people rely on corrupt "leaders" to be led, thus lacking all critical thinking skills/independence. Slaves to the system that keeps them oppressed. How quickly history is forgotten and repeated! What's most problematic to me about all of this is that the people who are wearing masks "for the greater good" will be the first to sign up for this shiny new vaccine that's had 0 longitudinal safety tests against an inert placebo. What's more problematic to me is that this Vaccine MAY be the deciding factor in life moving forward. You thought a mask was inconvenient? Wait until you're told that you cannot enter a store without proof of the Covid-19 vaccine. Wait until you cannot go to public events, or travel, without proof of having received this vaccine. To everyone that doesn't believe this is possible - do you understand that our government just successfully dictated to people WHEN they were allowed to be outside, where they were allowed to go, and how their children would be educated, in less than 5 months? And that a majority of the population followed blindly because they were told to do so. You're kidding yourself if you believe that they're not going to repeat this behavior with a vaccine. If people have not protested the occurrences in America over the last 5 months, they will assuredly continue to abide by unsubstantiated "guidelines" that will include a vaccine. It’s not about a mask, it’s about CONTROL.
<urn:uuid:869ebb1b-5f04-4a89-88e9-a8ba8529c2fd>
CC-MAIN-2022-33
https://turnrightatlost.weebly.com/blog/archives/07-2020
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00405.warc.gz
en
0.968056
2,927
2.578125
3
Businesses frequently use videos as a promotional or marketing tool. But many governments, non-profits, and health organizations aren’t yet leveraging video in their communication efforts. This is a major missed opportunity, as videos can be a great way to engage with your community and quickly communicate important information. With 81% of Americans using smartphones, most of your community can watch your videos on the go. There’s simply never been a better time to start using videos. How Governments and Other Organizations Leverage Video Governments and various organizations can use videos in several ways, each achieving a different objective. Do you have important information that your community needs to see? New systems for your team to learn? Dates and times for upcoming events? You can achieve all of these objectives with video. By making the right video for your goal, you can start communicating via video in no time. Here, we’ve compiled a list of the types of videos governments and organizations typically use, with examples to illustrate how you can translate your specific goal into the right kind of video for your audience. Quickly Communicate New Services or Programs Did your city or organization release a new tool for managing utilities? Or maybe a centralized hub for finding the latest city events? This is great, but unfortunately, many people will likely miss out on this new, helpful service. At least, they will if you’re not promoting it in the right ways. Video is a great way to quickly showcase a new service or tool available to the public. With video, you can show how to use the new service, tell a fun narrative, and, best of all, promote the video online where your community can see it. The City of Calgary Digital Portal What is it? The City of Calgary uses a fun, animated video to tell residents about a new online portal. This portal helps users to make the most of publicly available data to save money on utility bills, understand traffic patterns, avoid crowds, and more. What makes this video especially useful is the inclusion of the actual tool interspersed with animated visuals. Why does it matter? By the end of the video, viewers understand what the web portal is and a few ways to use it. This information would be easy to miss if it were simply included in a text-only email update. The video makes it easy to understand and much quicker to absorb. San Diego for Every Child What is it? San Diego for Every Child (SDEC) is a nonprofit organization that works with various local organizations to help children at a disadvantage as a result of poverty. In the animated video above, SDEC details its mission while using numerous stats and charts to show how widespread poverty and financial hardships are. Why does it matter? San Diego for Every Child has a grand mission that could easily get lost in translation. Their video uses animated maps and charts to show the scale of the problem they’re tackling. Organizations can use this approach for several topics, from showcasing a nationwide issue to advertising a service area. Cleveland Water Web Portal Navigation What is it? Once Cleveland Water drove signups to their new web portal, it was time to ensure people knew how to use it. This video outlines the many functions of the web portal, helping users go from newly signed up to experienced power users. Why does it matter? The web portal navigation video uses actual images and footage of the Cleveland Water web portal. The use of the real web portal interface makes the advice in the video more applicable than if it were represented via an animation. Coupled with an animated cursor that guides users, this video is useful for its audience. Read more about how The City of Cleveland uses video. Template Video: Transit Update Use this template to share information about public services, such as transportation. The video is currently about changes in transportation service, but you can update it with text and backgrounds from Vyond’s library to make any type of announcement. Access the template video here. Support Public Health Communications There are often issues that the general public needs to know about. Unfortunately, disseminating information to a broad population can be a challenge. Video is a great way to spread the word and quickly communicate public health messages to your community. Nigeria Federal Ministry of Health COVID-19 Emergency Response What is it? The Federal Ministry of Health for Nigeria relies on social media to disseminate information as public health emergencies unfold. This video was used to convey the importance of wearing a face mask in response to the COVID-19 pandemic. Why does it matter? Pandemic response relies on sharing emergent and rapidly-changing information with citizens. Using easy-to-update animations and social media channels enabled Nigeria’s FMOH to reach their constituents and save lives. Wisconsin Department of Health Services Radon Testing Posted by Wisconsin Department of Health Services on Monday, January 27, 2020 What is it? The Wisconsin Department of Health Services puts out regular updates for their local community. This video explains that 10% of Wisconsin homes have elevated levels of radon, which can cause cancer, and goes on to explain how to test for radon. Why does it matter? Radon is a dangerous public health issue. The video does a great job of communicating the importance of the issue and the simple steps to take against it. NHS North West Boroughs Healthcare on Loneliness What is it? The NHS North West Boroughs Healthcare team offers mental health support. The North West Boroughs Healthcare team created the above video to spotlight loneliness and how to overcome it. Why does it matter? Using animation, the video drives home the importance of community and ensures as many people as possible know how to reach out in a mental health crisis. Watch more from NHS North West Boroughs. NHS North Cumbria Integrated Care What is it? NHS North Cumbria, a provider of community and health services in the U.K., uses live-action Twitter video with an animated overlay (note: GoAnimate is now Vyond). The short video details the effect that extended hospital stays can have on elderly patients. Why does it matter? Health-related information can be difficult for those outside the healthcare industry to understand. This Twitter video uses animations alongside the live-action video to highlight important information and stats, which makes it easier to understand the main takeaways. Template Video: Why Social Distancing Works Various governments and organizations are using video to communicate public health updates around Coronavirus. The video below shares basic preventative measures against Coronavirus and explains why social distancing works. Update some or all of the template to reinforce your local public health messaging and align with your current policies. Access the template video here. Disseminate Updates to the Public with Informative Videos Not everyone likes to read, and many of us lead busy lives. With a video, you can reach your audience on social media, by email, and even via text alert. This makes it possible to inform the public of any pressing matters, regardless of whether they’re out of town, they hate reading, or they’re just busy. Wake County Board of Elections What is it? This video from the Wake County Board of Elections shows viewers the steps that election workers go through to ensure ballots are kept safe and secure during the voting process. The video uses live-action footage of polling-place workers alongside text to drive home the narrative. Why does it matter? The above video makes great use of mixed media, using live-action footage and text to appeal to multiple types of learners. The video also does a great job of showcasing the hard work of the election workers, while also acting as a public service announcement about voting. This shows that it’s possible to accomplish multiple objectives with a single video. Watch more videos from Wake County. The Laboratory of Everyday Things: Neighborhood Transit What is it? The Laboratory of Everyday Things, a group of Florida-based architects, took first place in the Smart City Solutions Competition using the above video. The video details a feasible way to alleviate traffic congestion by taking a different approach to traffic flow, as made clear in their fun, animated video. Why does it matter? The above video uses animation, scene transitions, narration, and text callouts to tell an interesting story that’s as educational as it is entertaining. While the video is from a group of architects, any organization or government could use the same narrative approach to inform the public of a new service or initiative. Read more about this project. Tennessee Valley Authority Awareness What is it? Tennessee Valley Authority (TVA) provides electricity and other services to the entire Tennessee Valley region. Their promotional video gives some of their employees the chance to shine, as they inform viewers of the hard work they did throughout the summer. Why does it matter? Promotional videos don’t always have to sell something. The TVA video makes excellent use of actual footage to spread awareness about their company’s hard work and people, which can help brand awareness and give TVA workers pride in their company. Santa Clarita Valley Gran Fondo Promotion What is it? Bob Roll, a cyclist and YouTube personality, partners with SCV Gran Fondo ride in the animated video above, in which he details the ride and when it takes place. The video uses colorful animation, a lively voice-over, and live-action footage to give viewers an idea of what the event is and why they should be interested. Why does it matter? The above video features a great narrator, who happens to be involved in the event itself. This, along with the combined use of animation and live-action footage of the event, gives the entire video a personal feel. This approach can be useful for promoting virtually any event, as it will help viewers connect with the video. Leverage Video to Simplify Internal Training & HR Processes As your department grows and changes, it’s vital to keep all of your team up to date. An effective way to do this is to develop an internal learning program or a series of courses that can help team members learn quickly and memorably. Videos are a great way to quickly convey complex information, and they can plug into an eLearning course or stand-alone. City of London Corporation Customer Service What is it? More than 9.3 million people are living in London. To better serve the community, the City of London Corporation team put together a short informational video that helps those working for the city get a better idea of customer service. It’s easy to forget that the community members are the customers, and this video serves as a succinct reminder for city staff. Why does it matter? This video is the definition of concise, coming in at just under one minute. This short runtime, along with narration and colorful, animated scenes, makes for a quick watch that’s immediately engaging. This style of video is fantastic for internal training, public service announcements, or even event promotion. Watch more from the City of London Corporation. City of Houston Dental Plans What is it? The City of Houston offers its employees multiple dental insurance plans. Insurance is often overwhelming and difficult to understand. This video avoids overwhelming by instead showing viewers relatable scenarios with scenes of people in offices looking over insurance and consulting with their dentists. Why does it matter? Animation makes the video more visually appealing, while charts simplify information and make it easier to understand the differences between the plans. The result is a clear breakdown of the different dental plans. Leicester Hospital Safer Surgery Checklist What is it? Surgeries are complex and involve many people, steps, and variables. Safety is always a top concern, making a tried-and-true process incredibly important. The Leicester Hospital created a safer surgery checklist, which helps doctors and their staff keep patients safe while staying efficient. They showcase this checklist in the above video, which puts viewers right in the middle of a hospital. Why does it matter? The above video doesn’t just talk about the checklist—it shows the checklist being used. Seeing it in use helps drive home its effectiveness while also educating audiences on how it works. Watch more from Leicester Hospital and learn how Providence St. Joseph’s Health (a US-based hospital system unaffiliated with Leicester Hospital), uses video and augmented reality in their training. City of Houston 2016 Enrollment Video What is it? Dental insurance is one thing, but benefits in general? That’s an even more complex subject. The City of Houston once again uses animation to break down benefits in a digestible, fun manner. Unlike their dental video, this piece focuses on all benefit changes for 2016. Why does it matter? On-screen text and a voice-over allow the City of Houston to cover a lot of ground quickly in several ways. This caters to all learning styles, ensuring the viewer retains the information. Management Concepts: Merit System Principles What is it? Management Concepts helps find and train employees for the public sector. The above video offers a quick overview of the Merit System Principles, which guide federal employees across the country. Why does it matter? Management Concepts tackles the complicated Merit System Principles in less than two minutes, using a narrator and text. This quick approach is great for eLearning and can be especially useful for tackling one-off concepts—like the Merit System Principles—or even a new regulation. RNLI: Safeguarding Awareness Training What is it? The Royal National Lifeboat Institution (RNLI) has the big responsibility of ensuring those under their watch are safe. They make this message clear in their in-depth eLearning video on awareness training. The video uses animation, narration, and text to guide readers through the many safety issues to be aware of. Why does it matter? The RNLI safeguarding awareness video is lengthy, clocking in at more than 20 minutes. But it covers a wide breadth of material by using animation, narration, characters, scene changes, and formatted text. You can use this combination to cover virtually any topic for internal training, making this approach great for eLearning. Taking your communications to the next level The above examples are only scratching the surface. Videos can help your government or organization in any number of ways. You can even pull inspiration from marketing videos, which often do a great job of grabbing viewers’ attention. Video is flexible and, thanks to animation software, affordable. With the right inspiration, you can create videos that your audience watches, learns from, and even enjoys. Start a 14-day free trial
<urn:uuid:f4823b74-38f6-49e0-bab6-7ea97597d983>
CC-MAIN-2022-33
https://www.vyond.com/resources/video-communication-for-governments-organizations-examples-tips/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00003.warc.gz
en
0.93177
3,028
2.59375
3
R Hamza, A Youssef, W Mouharam, A El Danasoury deficiency, iodine, maternal, neonatal, thyroid R Hamza, A Youssef, W Mouharam, A El Danasoury. Maternal and Neonatal Iodine Nutrition In Cairo. The Internet Journal of Pediatrics and Neonatology. 2007 Volume 8 Number 2. This study was conducted to assess iodine nutritional status of Egyptian pregnant women and their newborns in Abbassia district. Increasing dietary iodine intake during pregnancy is mandatory. The campaign of salt iodization in Egypt must be reinforced. Iodine deficiency is a global health problem [3,4]. Goiter has been known to exist in Egypt since Ancient times, Papyrus dating since 1500 BC reported thyroidectomy and there are suggestions that Cleopatra had goiter. The first scientific report of goiter in Egypt was in 1924 by Dolbey and Omar. Iodine deficiency is the world`s single most important cause of preventable brain damage and mental retardation. It manifests as goiter and a range of physical and mental handicaps which are collectively included in the term Iodine Deficiency Disorders (IDD). The best known indicators for assessment of IDD are: urinary iodine concentration, thyroid size (preferably by ultrasound) and TSH determination. So, it is important to assess these parameters in pregnant women being vulnerable to iodine deficiency .It is well known that urinary iodine measures the current dietary intake of iodine while prevalence of goiter gives an idea of the past history of iodine nutrition . Iodine supplements during pregnancy together with proper salt iodization relieve the stress of iodine deficiency of both maternal and fetal thyroid function, together with prevention of the frightening fetal brain damage that results from maternal iodine deficiency . This study was undertaken to assess the iodine nutritional status of Egyptian pregnant women and their newborns in Abbassia district. This cross-sectional study was conducted in Cairo Governorate in Abbassia district (West Cairo) during the period from March 2006 till December 2006. The target population was 113 healthy pregnant women (mean age: 28.97± 4.95 years) and their newborns (mean gestational age: 38.68 ± 1.82 weeks) among whom 47.4% were males and 52.6% females. Mothers were admitted for delivery at Maternity Unit, Ain Shams University Hospitals, Abbasia district. They gave birth to apparently healthy singleton full term newborns. A written consent was obtained from all mothers. Screening was done by random sampling technique. On the 3rd day after delivery, all mothers and their newborns were subjected to the following: Full medical history including socioeconomic status according to El-Bouhy (1988), history of intake of iodized salt and its type and exclusion of any thyroid disease or intake of any thyroid modifying drugs. Collection of spot urine samples for iodine estimation (ug/dl) according to the method of Dunn etal, 1993. In mothers, urinary iodine >10 ug/dl was considered adequate, from 5-9.9 ug/dl was considered mild deficiency, from 2-4.9 ug/dl moderate and < 2 ug/dl severe. In newborns, values >5ug/dl were considered adequate, from 3.1-5 ug/dl were considered mild deficiency , from 3-1.5 ug/dl moderate and values <1.5 ug/dl severe deficiency . Free T3, free T4 and TSH assay using Immulite Automated Immunoassay Analyzer . Thyroid ultrasound using Acuson Computed Tomography device with a 7.5 mHZ, 6.25 cm linear transducer to determine thyroid volume. The volume of each lobe (ml) was calculated according to the formula of prolate ellipsoid and thyroid volume was calculated as the sum of volumes of the 2 lobes. Goiter was considered in pregnant women if thyroid volume was >18 ml and in newborns if thyroid volume was >1.5 ml . Statistical analysis and data management The data were statistically analyzed using SPSS statistical soft ware package, Echo soft corporation, USA, 2004. Description of quantitative variables was in the form of mean ± SD and range while that of qualitative variables was in the form of frequency and percentage. Chi-square test with cross tabulation was used to compare 2 categorized quantitative data. Pearson correlation coefficient (r-test) was used to rank different variables against each other. A p value of < 0.05 was considered significant. Among pregnant mothers, 29.2% (33/113) were iodine deficient with mild degree being most frequent (21/113, 18.5%) followed by moderate (10/113, 8.84%) and lastly the severe deficiency in 1.77 (2/113). On the other hand, 19.46 % (22/113) of their newborns were iodine deficient with 14.15% (16/113) being mild, 4.42% (5/113) moderate and 0.88% (1/113) severe. Also, there was a positive correlation (r = 0.56, p<0.05) between maternal and neonatal urinary iodine values (Figure1). Goiter was detected by ultrasound in 10.6% of mothers (12/113) and in 7.07% of newborns (8/113) with a positive correlation between maternal and neonatal thyroid volumes (r = 0.68, p<0.05). The overall prevalence of hypothyroidism among mothers with iodine deficiency was 15.15% (5/33) with 12.12% (4/33) being compensated. Also, positive correlations were detected between maternal and neonatal values of each of TSH (r = 0.5, p<0.05) and fT3 (r = 0.8, p<0.05) but a non-significant correlation was detected between maternal and neonatal fT4 (p>0.05). The percentage of newborns having a blood TSH level of >5 mU/L was 8.85% (10/113). Also, there was a negative correlation (r= - 0.67, p<0.05) between maternal urinary iodine and neonatal TSH values (figure2). The percentage coverage of the use of iodized salt by pregnant mothers was 46.02 %. Among mothers who consumed iodized salt, 84.62% had normal urinary iodine excretion and 15.38% had iodine deficiency. On the other hand, among mothers who consumed non-iodized salt, 40.99% had iodine deficiency while 59.01% were non-deficient inspite of consumption of non-iodized salt. Also, there was an increase in severity of iodine deficiency with lack of salt iodization (p<0.05, table 2). In our study, the mean maternal urinary iodine on the 3rd day after delivery was 10.29 ± 3.11 (1.6–14.2 ug/dl) with 29.2% of mothers being iodine deficient. Mild degree was the most frequent (18.5%) followed by moderate (8.84%) and lastly severe degree (1.77%). Based on the criteria of WHO set in 1994 for adequate urine iodine concentrations in populations (mean value >10ug/dl and <20% of population with concentrations <5ug/dl), our sample is considered to have mild iodine deficiency. IDD in Cairo has not changed much in the past few decades. In 1968, Abdou etal reported a prevalence rate of 19.5%. In 1980, Said etal found a rate of 13.3 %. In 1992, the Cairo Nutritional Institute and WHO reported a rate of 5.2%. In 1995, El-Sayed etal found a rate of 13.5%. In Alexandria, Hamed (1997) found a rate of 19.4%. The problem is more serious in upper Egypt and Delta region. In 1996, UNICEF and HIPH found an IDD prevalence of 19.4% among primary school children in upper Egypt. After implementation of Universal Salt Iodization Program, UNICEF and HIPH studied the IDD prevalence in New Valley (a desert oasis) in 1999 and the rate was 57.5% which was much lower than the rate reported by UNICEF and HIPH in 1993 (before implementation of salt iodization program). Lastly, Mansour etal in 2001 reported a rate of 31.9% and 60.1% in 2 Delta Governorates. Thus, the prevalence of IDD is still high despite the implementation of Universal Salt Iodization Program in Egypt. The problem of IDD is also prevalent in other Eastern Mediterranean countries. In 2004, WHO/UNICEF/ICCIDD studied the prevalence of IDD in the Eastern Mediterranean area where the highest rate was detected in Syria (70%) and the lowest in Tunisia (0.58%). In our study, the mean neonatal urinary iodine was 6.13 ± 1.72 (1.2–9.7 ug/dl) which correlated positively with maternal urinary iodine values. This goes with the result obtained by Kurtoglu etal, 2004 who suggested that maternal iodine nutrition influences urinary iodine levels of their newborns. Moreover, maternal iodine deficiency affects fetal brain development through hypothyroidism [28, 29,30] . In our sample, the mean maternal thyroid volume was 10.85 ± 5.65 ml (4.91 – 31.2 ml) and ultrasonographic evidence of goiter was detected in 10.6% of mothers. The finding of an increase in thyroid volume during the 3 trimesters of pregnancy and after delivery is consistent with previous reports from areas of low dietary iodine intake (~50 ug/day) in which the thyroid gland enlarges as an adaptation to the threat of iodine deficiency. Moreover, a positive correlation (P<0.05) was detected between maternal and neonatal thyroid volumes which was also confirmed by another study . The overall prevalence of hypothyroidism among mothers with iodine deficiency was 15.15% with 12.12% being compensated. In normal pregnant women, the thyroid gland maintains euthyroidism with only minor fluctuations in the serum T4 (transient decrease) and TSH (transient rise). However, in women with limited thyroid reserve, due to iodine deficiency, hypothyroidism can develop[32,33]. Also, a positive correlation (P<0.05) was detected between maternal and neonatal values of TSH and fT3 which proves the fact that changes in thyroid functions as a result of maternal iodine deficiency directly influence fetal thyroid functions causing impaired fetal brain development indirectly by producing hypothyroidism in mother and fetus. On the other hand, a non significant correlation (P>0.05) was detected between maternal and neonatal fT4. 0ur finding was confirmed by some authors and was opposite to others . In our series, the mean neonatal TSH was 3.87 ± 3.19 mU/L with 8.85% of newborns having a blood TSH level of >5mU/L. According to the criteria set by WHO/UNICEF/ICCIDD in 1994 to asses the severity of iodine deficiency based on frequency of elevated TSH concentrations in newborn screening programs, our sample is said to have mild iodine deficiency. Also, WHO/UNICEF/ICCIDD, 1994 suggested that thyroid function in the newborn reflects fetal thyroid function. So, if iodine deficiency impairs fetal thyroid function, this should result in higher TSH concentrations in the newborn. Moreover, a negative correlation was detected between maternal urinary iodine and neonatal TSH confirming that maternal iodine deficiency is responsible for maternal and fetal thyroid dysfunction. On the other hand, a non-significant correlation was detected by other authors [4,36] who suggested that raised TSH levels might be attributed to factors other than iodine deficiency such as transient congenital hypothyroidism. Concerning the consumption of iodized salt, 46.02% of mothers in our sample consumed iodized salt and there was an increase in the severity of iodine deficiency with lack of salt iodization (P<0.05). The universal salt iodization program started in Egypt in 1996. WHO, United Nations International Children's Emergency Fund and ICCIDD emphasized the importance of periodic monitoring and adjustment of salt iodide concentrations especially in developing countries since salt iodization is arguably the most effective way to correct iodine deficiency in the long run. Moreover, in our sample, among mothers who consumed iodized salt, 84.62% had normal urinary iodine levels while 15.38% had iodine deficiency inspite of consumption of iodized salt. This means that although adequate iodine intake is the main permissive factor in occurance of iodine deficiency and goiter, yet other factors as bacterial contamination, pollution, malnutrition and concomitant iron deficiency anemia might play a role.. Such factors are frequently encountered in rural areas and areas with poor socioeconomic conditions which is the situation in Abbassia district where our study was conducted as most of the population were of low social class. Also, in Egypt, increased consumption of bread among lower social classes can be considered an important contributing source of dietary iodine deficiency. Also, WHO in the year 2000 reported that in many developing countries including Egypt, despite improvement of salt production and marketing technology, the quality of salt is still poor, or the salt is incorrectly iodized or spoilt due to excessive exposure to moisture, light, heat and contaminants. On the other hand, 59.01% of mothers in our sample were non-deficient inspite of intake of non-iodized salt which raises the role of genetic susceptibility in occurrence of iodine deficiency as suggested by Ghalioungui in 1965 and Lisenkova etal, 1991 . In conclusion, iodine deficiency remains a public health problem in Egypt. The campaign of salt iodization in Egypt must be reinforced and periodically monitored to achieve proper elimination of IDD with its frightening consequences. Successful iodine supplementation must target reproductive-age and pregnant women.
<urn:uuid:b365e24c-b9c8-48ba-a00d-ca18bc71a8ad>
CC-MAIN-2022-33
https://ispub.com/IJPN/8/2/10524
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00205.warc.gz
en
0.944232
3,087
2.53125
3
Will Cities Soon Be Able to Feed Themselves? Skyrocketing food costs, worries about food security and an urge to do things ourselves have led to a huge surge in urban farming -- gardens in backyards, on roofs, in abandoned lots and even, in the dream of a Columbia professor and his students, in high-rise buildings in the middle of cities. During World Wars I and II, victory gardens were considered a patriotic effort to take the pressure off the food supply and to boost morale by having people see their labor translated into produce. An urban farmer in Oakland, Esperanza Pallana, doesn't necessarily garden as a patriotic effort, but she does enjoy what her work in the garden gives her. "There are so many things I like about it, besides just having a food supply, though it is like magic to go out in backyard and get eggs that are fresh and delicious and to have a source of honey," she says. "It's so satisfying when I sit down to a meal and 75 percent is straight out of the backyard." Pallana didn't start her garden with the thought of growing anything edible -- she merely wanted to fix up her front yard, which was so messy that people routinely threw trash in it. A peach tree in the yard inspired her to plant more food, but she says she just bought things at the nursery and put them in the ground; she had no idea about harvesting the food. After birds ate the broccoli she had planted, she determined to learn what she was doing and started again. Now her garden, along with produce, includes bees, turkeys and chickens. Pallana's interest in soil and food systems has taken over her life. She now works at Urban Sprouts, a nonprofit school gardens organization, and she says she has seen the interest in urban farming grow in the four years she has been doing it. "When we built our chicken coop, we had to design it ourselves -- I couldn't find anything about how to do it," she says. "Now there are all these books and designs online. I just see a lot of excitement and enthusiasm about this." Barbara Finnin, the executive director of Oakland's City Slicker Farm, also sees that excitement with the people she works with in the organization's Backyard Garden Program, which helps low-income people start their own gardens. "They tell us they didn't think it was possible to get this from a dirt patch full of weeds," Finnin says. "People feel like they have access in their backyard and they can go to pick some lettuce and collards and cook. They are really engaged with, literally, the fruits of their labor." Having accessible healthy food is particularly important in West Oakland, where City Slicker Farm is located, Finnin says. The 21,000 residents have to leave their neighborhood to get to a grocery store, and many of them, she adds, don't have a car. To meet that immediate need for fresh food, City Slicker started in 2001 by setting up a stand and giving away food; now the organization has six lots that produce about 10,000 pounds of produce, which is sold on a sliding scale. More and more urban agriculture projects are springing up throughout the country. When Taja Sevelle moved to Detroit in 2005 and saw the hunger, vacant lots and health problems associated with lack of fresh food, she decided that growing food on unused land was the answer. Her organization, Urban Farming, now has about 600 community gardens, many of them in Detroit, but throughout the United States and the world as well. Its lofty mission is to "eradicate hunger." This may seem daunting, but Executive Director Sevelle, who studied to be a botanist before signing a record contract with Prince, thinks this is a reachable goal. She points to the success of the victory gardens and says her organization fed about a quarter of a million people in Detroit last year. "This is absolutely doable. It needs to be solved and can be solved," she says. "More and more I'm seeing and hearing people making bold statements. Look at the amazing things we've done as humans. If we're able to go to the moon, certainly we can solve the problem of hunger." Sevelle says a standard size garden of 20 feet by 20 feet will produce a quarter to a third of a ton of food and that food banks define a meal as one pound of food. Savelle sees opportunity to grow that food everywhere: Her organization plants school and rooftop gardens, and works with corporations to do edible landscaping. But we don't live by produce alone. Kristin Reynolds, from the Small Farm Program at the University of California, applauds people's efforts to grow food for themselves, but she thinks people wouldn't be able to really feed themselves without growing grains. "I think it would be very difficult to be self-sufficient," she says. "And I question whether that is the best use of space." Urban farming the way Columbia University professor Dickson Despommier envisions it includes grains. Despommier and his graduate students in a medical ecology class came up with a plan they call vertical farming, which would allow farming in high-rises. It's estimated that by 2050, the population will grow by at least 3 billion and about 80 percent of the world will live in urban centers. That means we need to find a new way to produce more food, Despommier says. And corn, wheat and rice are easy to grow indoors, says the professor of environmental health sciences and microbiology. There would be no soil in a vertical farm -- things would be grown using in the air with a method called aeroponics; or hydroponically, where plants are grown in a mineral nutrient. The energy would come from a variety of sources, including geothermal, wind, solar and incinerated sewage, and the water would be recycled. Despommier says there are all sorts of reasons why his plan is the way to go. He cites the advantages of growing food indoors: no weather-related disasters, no plant diseases, no chemical sprays, lower water usage and lower food miles. All that is needed to make it happen is money and political will, he says. And Despommier is confident that we'll see vertical farming within the next decade, as governments get more concerned about food. "I can guarantee you there are city councils meeting right now about this," Dickson says. "Dubai is very interested, and Shanghai and Las Vegas. Manhattan Borough President Scott Stringer is pursuing this idea, and the Department of the Environment in San Francisco is interested." Kevin Drew, the special projects coordinator at that department, says he and his colleagues are intrigued by the possibilities, particularly Despommier's projection of the land now used for farming going back to nature. "His notion that you could replace a lot or all farming on the land is one of the most radical," he says. "Then you'd let the earth go back to forests and wetlands, which are some of the most efficient climate drivers in the right direction." Drew says San Francisco already has community and school gardens that grow food, but vertical farming would increase the amount of food the city could produce. He admits to being slightly skeptical at the thought of a 30-story building supplying enough food for 50,000, as Despommier suggests, but says it's an idea he wants to explore. "Given state of pot farming in California, there is ample evidence extremely effective farming can be done inside, not growing in soil," he says. Drew says the agency is looking at trying to retrofit existing buildings or perhaps putting a vertical farming building in some of the more toxic areas of San Francisco. "You could spend umpty-umph million trying to get the toxicity out of soil, or you could pour six feet of concrete over it and call it done," he says. Sadhu Johnston, the chief environmental officer for the city of Chicago, says city officials there are committed to urban agricultural and locally produced food. And with the constraints of weather and land in the city, Johnston says he would like to see food grown in high-rises -- he believes doing so could revitalize neighborhoods and employ people. Vertical farming would also cut down on water use by not spraying and save transportation costs of food being shipped in, Johnston says. Growing food locally would undoubtedly save on transportation, says Bruce Bugbee, a professor of crop physiology at Utah State University. But he scoffs at the rice-in-the-sky idea because he believes the energy costs of growing food indoors are far too great. "It can't work. That's the quick answer," Bugbee says. "The electric bill will make it far more expensive than what you can buy in the stores, and the produce is of lesser quality. And I'm saying that from 25 years of working with NASA, growing food in controlled environments." Bugbee argues that we won't, as Despommier suggests, run out of land to grow food on. "China has five times the population of the U.S., and they feed themselves," he says. "This is a horrible ecological idea because it takes such massive amounts of energy to run it whereas sunlight is free. It looks good to somebody who's never tried it." But Despommier is undaunted by criticism. He says there are all kinds of alternative sources of energy to be tried, such as sun and wind. Despommier also wants to recycle waste, the way he says cities in Europe do. "We're not behaving very ecologically," he says. "Today, Germany incinerates everything. Why don't we do that? Because we're living in the 19th century." Despommier cheerfully admits that at first vertical farming will need to be subsidized -- the way farms are now, he says. "At first nobody is going to make any money whatsoever doing vertical farming," he says. "But what you will make is food, and tell me you don't need that."
<urn:uuid:fedf8289-3ce4-4115-b5ed-466cf0ace134>
CC-MAIN-2022-33
https://www.alternet.org/2008/10/will_cities_soon_be_able_to_feed_themselves/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00794.warc.gz
en
0.980681
2,088
2.84375
3
T4 Should Be to Disabled People What Auschwitz is for Jewish People By Prof. David Mitchell, The George Washington University “T4 should be to disabled people what Auschwitz is for Jewish people.” I made this statement while leading American study abroad students through a tour of the Brandenburg Euthanasia Memorial Centre in March 2015. Brandenburg was one of the first two killing centers developed to systematically exterminate disabled people held in German psychiatric institutions in fall 1939. In January 1940 it also served as the site of a demonstration project for top Nazi medical officials to contrast which was more humane: death by lethal injection or death in a disguised shower room by gassing (Friedlander 87). The Brandenburg barn that was converted for this purpose on the grounds of the old city jail sits in the center of the complex but also in the center of town; before it was a prison, the institutional buildings served as a poor house. This transitional use scenario from charity to prison to killing center is not unusual. All of the killing centers were situated in either active psychiatric institutions or prisons or charity wards or all of the above as the worlds set aside as "provisions" for disabled people represent carceral lock-down facilities whose purpose -- from the beginning -- is to prevent disabled residents from fouling up the smooth workings of non-disabled social orders. They are, in effect, tainted spaces that cannot be used for more productive ends as the sites they occupy are in some manner always already designated as unrecuperable. This form of spatial contamination is due to the fact that disability is recognized as an uninhabitable condition; a miscoding error in the otherwise stable program of normative biology. This assumption of a disruption in an otherwise fixed biological outcome belies the fact that species development is rife with "miscodings" -- these alternative patternings of organisms are more accurately called “mutations” and they are the messy stuff of all species diversity. Darwin remained suspicious throughout his career that human beings could ever effectively direct their own evolution, thus the theory of evolution is one of opposition to eugenics despite their common linkage in a philosophical tradition. The point of the process is that the randomness of mutation proves no reliable prophet for the future of the organism or the species; disability was thought to predict what characteristic alteration in an organism might prove inherently deleterious to its survival; yet, based on the fact that advantage remains a contingent, mutable affair, survival actually depends upon multitudes of biological, social, and environmental variables. So the key thing about disability is that human societies have relied on it to predict which organismic expression will prove most likely to succeed without the contrasting and more truthful recognition that disability is not an effective predictor of value, contribution, or longevity. Haphazardness is the only rule. Thus, T4 and the attendant misreading of the theory of evolution as not haphazard and therefore controllable provided a foundation upon which Nazi eugenics enacted with destructive haste an outcome that was not anticipatory from a biological point of view. But not only were the bodies of disabled people designated for the most radical forms of social invisibility (i.e. death by mass killing in a medical factory adoption of the modern industrial assembly line), the space in which the killings were performed already represented the principle of radical exclusion. Whether the killing center evolved out of a former existence of charity sequester of the poor or psychiatric institution for those considered cognitively nonnormative or imprisonment for breeching social laws and norms, the space itself was already marked by the human corruption which it housed. T4 was a further perversion of a perversion that already existed in the buildings and local geography of the space given over to the project of carceral segregation for certain human beings. All of these forms of biological, social, spatial, and cultural avoidance of interaction with those marked undesirable help to explain why the history of T4 rides two seemingly contradictory trajectories. The first is provision of assistance for those who cannot or, more commonly, are prevented from meaningful participation. Such set aside worlds always meet with resentment from others who feel excluded themselves from the “benefactor group” of the excluded. Two, the space to which the presumed benefactors of the modern are relegated to receive their "special treatment" is always a form of punishment, and the punishment arrives in the form of detention within a consciously fabricated uninhabitable location. Thus, the common descriptor of "special treatment" could be taken up in altered form by Nazi eugenicists wholesale. Aktion T4, 14f13, the decentralized killing phase, and the exponential rise in post-liberation psychiatric institution mortality rates into the late 1940s in Germany, Austria, Poland, and beyond all adopted and continued to apply the classification of "special treatment" to those receiving a form of radical exclusion intended as the benefit of death-making (Klee 82). This kind of modernity in the labor of mortality production is not an aberration, but rather, as Zygmunt Bauman argues, part and parcel of the kind of modernity human beings have evolved (Modernity and the Holocaust 93). The bodies cannot be retrieved as we often do not even know where they've gone. At the Bernburg Euthanasia Memorial Centre, according to Director Ute Hoffmann, they believed for years the ashes of the T4 victims had been tossed into the local river. It turned out through investigating the institution's meticulous administrative payment records that a guy on a horse drawn cart was paid to dump the ash in the local pit of a nearby town dump. Today the dump is covered by a soccer field used by residents as a privilege of their residency in Bernburg. At the Sonnenstein-Pirna Euthanasia Memorial Centre, a guide told us the sloping hill out behind the T4 building, when excavated, yielded up sediment 3-4 feet deep of human remains and victims' personal keepsakes that went undetected by the strip down cursory medical inspection of their bodies in the waiting room outside of the gas chamber. The labor of getting rid of all evidence of the human lives eradicated proved not entirely possible. Yet, the difficulty of erasing all traces of disabled peoples' passage through this deadly process had to be accompanied by an even larger erasure: their evacuation from history. When we first visited Bernburg in the early 2000s with a former German student, Rebecca Maskos, she grew incredulous about the fact that she had never heard of T4 in all of her encounters with the Holocaust. As a disabled woman who had navigated Germany's public education system, Rebecca -- like other students -- were expected to study the Holocaust. There was even a mandatory provision that all students visit a concentration camp or death camp memorial site. There were memorials throughout Berlin to all of the different victim groups -- Jewish, Roma/Sinti, Slovakian, Communist, Russian, etc. -- but no dedicated memorial to disabled people murdered in the T4 program. This avoidance of disability history seemed purposeful; an active form of state-sanctioned neglect of victims whose extermination continued to be defended in court by the medical perpetrators as "benign", as "a medical intervention", as a "merciful death". T4 should be to disabled people what Auschwitz is to Jewish people: a reminder and an active refusal to forget what is "unspeakable" and "unspoken". In our time of proliferating physician suicide laws, the lowering of age of consent to request euthanasia, the pilfering of healthcare coffers to balance the ledger sheets of bankrupt nation-states, the reduction of welfare doles and personal assistance payments to disabled people, the expansion of for-profit medicine that empties the private bank accounts of disabled citizens and families, cut backs on access to life saving medical treatments, and the abandonment of states to end lifetime carceral institutionalization, we stand at a precipice where T4 can be recognized alongside other genocides as closer than we like to imagine. The perpetrators of medical mass murder were set aside at the Nuremberg war crimes trials to be tried (if at all) in local German courts as the killings could not be imagined as tantamount to the religious and racially motivated mass murders of other "social" groups. In fact, after the Nuremberg trials the UN adopted a revised definition of genocide to exclude "political and social" rationale from religious and ethnic -- this is exactly where disability always sits: at the cusp between defective citizenry and defective biology (Applebaum). Nonnormative bodies appear to hold questions of material capacity as the basis of their devaluation, and therefore, their social and political potential is clouded by how their materiality matters or not. This haunting question of the early 20th century as to whether or not disability represents a biological or social unfitness continues to pursue us into the 21st century. Thus, we are grateful that digital humanities projects such as gedenkort-T4 and the recently created T4 Memorial in Berlin keep these historical matters relevant to contemporary disabled lives today. The Euthanasia Memorial Centre network in Italy, Germany, and Poland that include tours of the apparatus of mass death and research archives were kept alive for many years only by local collectives and volunteers. These grassroots memorializers protected many of these tainted spaces from being destroyed and the past further covered over. T4 should be to disabled people what Auschwitz is to Jewish people. Applebaum, Anne. “The Worst of the Madness: A Review of Timothy Snyder’s Bloodlands: Europe Between Hitler and Stalin and Norman M. Naimark’s Stalin’s Genocide.” New York Times Review of Books. 11 November 2017: http://www.nybooks.com/articles/2010/11/11/worst-madness/ Bauman, Zygmunt. Modernity and the Holocaust. New York: Cornell University Press, 2001. Friedlander, Henry. The Origins of Nazi Genocide: From Euthanasia to the Final Solution. Chapel Hill: University of North Carolina Press, 1997. Klee, Ernst. “Those Who Honour the Perpetrators Murder Their Victims A Second Time.” The Holocaust in History and Memory Vol. 5(2012): 75-84. Aktuelle Beiträge im Blog Veranstaltungen zur Erinnerung an die Opfer der "Euthanasie"-VerbrechenDer Förderkreis Gedenkort-T4 e.V. und die Stiftung Denkmal für die ermordeten Juden Europas richten am 2. und am 14. September 2022 zwei Veranstaltungen aus. Damit soll an die Opfer der nationlsozialistischen "Euthanasie"-Verbrechen erinnert werden. Auf den 1. September 1939 ist der Befehl Adolf Hitlers zum Beginn der so genannten Aktion T4 datiert. Am 2. September findet am Gedenk- und Informationsort für die Opfer der nationalsozialistischen »Euthanasie«-Morde in Berlin die Gedenkveranstaltung statt. Begleitet wird sie von der Aufführung des Theaterstückes "Hierbleiben, Spuren nach Grafeneck" des Theaters Tonne aus Reutlingen. Am 14.AuthorTagconnections Online-Seminar: Doppelte VerfolgungYad Vashem veranstaltet ein Online-Seminar zum Thema: "Doppelte Verfolgung. Psychisch kranke und behinderte Jüdinnen und Juden im NS & inklusive Ansätze in der Geschichtsvermittlung." Eine Anmeldung ist nur noch bis 17. Juni 2022 möglich. Mehr Informationen in der PDF. Direkt zur Anmeldung geht es hier: https://forms.yadvashem.org/event-registration-intl?id=1356 Save the Date - Online-Veranstaltung zur Ukraine am 13.5.2022, 19.00Online-Veranstaltung "Patientenmorde in der Ukraine unter deutscher Besatzung - Perspektiven auf den Krieg heute" am 13.5 um 19.00. Mit Prof. Dmytro Tytarenko und Janna Keberlein sind zwei ausgewiesene Kenner*innen der Geschichte der Patientenmorde in der besetzten Ukraine im Zweiten Weltkrieg zu Gast. Launch-Veranstaltung „Geschichte inklusiv“Am 10. Februar 2022 um 16.00 Uhr stellt die Gedenkstätte für die Opfer der Euthanasie-Morde Brandenburg an der Havel eine neue Informationsressource vor, die es ermöglicht, sich mit dem Themenkomplex der nationalsozialistischen Euthanasie-Verbrechen in einfacher Sprache und mit leichter Navigation online auseinanderzusetzen. Eine Teilnahme ist online (via Zoom) oder vor Ort (2G-plus) möglich. Die Webseite bietet Nutzerinnen und Nutzern in Zukunft unter www.geschichte-inklusiv-sbg.de eine barrierearme Auseinandersetzung mit der Geschichte. Wir twittern und posten auf Facebook. Neueste und hervorgehobene Biografien von Opfern Die Sammlung von Opferbiographien begann im Jahr 2010 und wächst seither stetig. Hier sehen Sie Biografien, die kürzlich hinzugefügt wurden und solche, die aus Anlass eines Jahrestages oder Ereignisses hervorgehoben wurden. Angehörige und Erinnerungsinitiativen haben sie uns zur Verfügung gestellt.
<urn:uuid:8f8cb577-c31d-4fcb-af91-6b325ee93559>
CC-MAIN-2022-33
https://www.gedenkort-t4.eu/en/blog/t4-should-be-to-disabled-people-what-auschwitz-is-for-jewish-people
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00404.warc.gz
en
0.803307
3,075
2.640625
3
Asia’s ‘Water Tower’ was the subject of a recent The Democracy Forum’s panel debate on the water crisis facing the region, and its impact both locally and globally The politicisation of water and China’s responsibility to develop a more consensual approach to water in the Himalayas were among points discussed by participants at a June 22 seminar hosted by London-based not-for-profit The Democracy Forum, titled ‘Impending Himalayan water crisis: causes and effects’. In his opening comments, TDF Chair Barry Gardiner MP spoke of how the webinar brought together complex natural phenomena such as climate change and its effects on fresh water, and the most complex geopolitical problems, such as the tense relationship between those countries that depend on Hindu Kush Himalaya. He addressed stresses in both water demand and supply: more use through increasing urbanisation, rising industrial production, intensive dam-building, etc, compounded, on the supply side, by the threat of climate change. Since climate rises faster at high altitude, even meeting the Paris goal of keeping to 1.5 degrees as a global average could still see a 2.1 degree rise in the HKH, a scenario that would see drastic glacier melt, which would have significant impact on food and energy production, and on wildlife. One-third of people living in HKH and depending on its resources already live below the poverty line, said Gardiner, and half face malnutrition – so the threat to agricultural production becomes a political issue. The transboundary nature of the region’s water resources, added Gardiner, creates the potential for serious political and security impacts, and riparian countries need to seek opportunities for cooperation. Because China controls the Tibetan Plateau, it controls the head-waters of transboundary rivers that stretch across all four regions of Himalayan Asia. Yet its own needs are huge, with limited water supply and gargantuan demand. China’s upstream position gives it outsize power, and this hydrological asymmetry is matched by geopolitical asymmetry. China refuses to participate in multilateral forums surrounding transport boundary water use; instead, it negotiates through bilateral economic diplomacy, such as through the BRI, where it holds the whip hand. India’s existential fear is that China will someday divert the Brahmaputra River northward, while China also views India’s intentions through a security lens, seeing India as a threat. There are also deep wells of distrust between India and Pakistan over the Indus, and Gardiner wondered if the Indus Water Treaty is either comprehensive or malleable enough to deal with novel challenges such as climate-driven changes in Indus water levels. Dr Paromita Ghosh, a scientist at the G.B. Pant National Institute of Himalayan Environment, approached the discussion on the Himalayan water crisis, its causes and effects from an ecological and socio-economic perspective. She addressed issues such as deforestation, climate change, melting and retreating glaciers, change in land use, landscape alterations by building roads, dams and hydropower projects and loss of religious and cultural values regarding water, all of which have led to the Himalayan water crisis.Scarcity of water is leading to loss of livelihoods in agriculture, tourism and other water-related occupations, argued Dr Ghosh, and also leads to food insecurity, while lack of clean water results in water-borne diseases and other health threats. Water deficit causes human conflicts too, not only across nations and states but at local and regional level, and is one of the major factors of outward migration from the hills. There is a need to create curricula in simple language, and local leaders are required who have knowledge of hydrological cycling in their region and are able to motivate people towards participatory conservation and management of Himalayan water. Social science, economics and ecology must be blended with hydrology and hydro-geology, concluded Dr Ghosh, to prevent the impending Himalayan water crisis. Indus Water Treaty provides over 70% of glacial water to Pakistan, and less than 30% to India Dr Anil Kulkarni, Distinguished Scientist at the Divecha Center for Climate Change, Indian Institute of Science, examined the fate of the Himalayan cryosphere under a warm climate and how this will affect water security in the subcontinent. He addressed issues of temperature change, decrease in rain and snowfall, the vulnerability of drying mountain streams, the problem of glaciers rapidly losing mass – especially in the Karakoram region, where there is little water coming from monsoons – and how investment is needed to help communities, particularly agricultural, affected by glacier melt. Dr Kulkarni also highlighted the great inequity of the Indus Water Treaty, which provides over 70% of glacial water to Pakistan, and less than 30% to India. With a differential loss in mass balance – the eastern river mass loss is higher than the western – this can influence water sharing. Is the Himalayan water crisis ‘natural’ or the result of bad science, mal-development and mismanagement? wondered Dipak Gyawali, an Academician at Nepal Academy of Science and Technology (NAST), and a former Minister of Water Resources of Nepal. He looked at the drivers of the problem, the biggest of which is verticality, as people can’t carry water from great heights and the cost of pumping it is prohibitive. He also considered six different types and qualities of Himalayan water, saying that for each of these ‘problems’, there is not even an agreed definition of what they are or who created them, let alone solutions. Gyawali also addressed the concerns of very different social organising styles that regard water differently: for example, as private goods to be taken care of by the market and those with money; public goods, which need regulating by municipalities, government departments etc; or common pool goods. Himalayan waters are going to find salvation, said Gyawali, only when different organising stylesall find a place at the democratic policy table, and have their voices not only heard but also responded to. But, he concluded, we are very far from that stage. The focus for Dr Aditi Mukherji, Principal Researcher, International Water Management Institute (New Delhi), was on some of the latest findings from the IPCC and the Hindu Kush Himalayan Assessment on the impact of climate change in the region. Climate change is man-made, not natural, she insisted, and human influence has warmed the climate at a rate unprecedented in at least the last 2,000 years. We are thus living in a climate-changed world – it is not a future phenomenon. Hot extremes are increasing in almost all regions, as is heavy precipitation, and this has an impact across the world. So, what do global changes mean for the Himalayas? she asked. HKH will warm more compared to the global mean and warm more rapidly at higher elevation. Even 1.5 degrees is too hot for the Himalayas, as at that temperature, glaciers will lose 36% volume by 2100.Regarding what these changes mean for the region’s water resources, Dr Mukherji spoke of climate justice issue – those that have contributed least to global warming, with the lowest carbon footprints, are worst and disproportionately affected. So while we need infrastructure, we need to rely less on hydropower and more on solar. The IPPC reports say this must be decade of mitigation, adaptation and adopt just transitions. Dr Mukherji concluded with the warning: ‘Every bit of warming matters, every year matters and every choice matters.’ Hydropower projects should be built only with the consensus of local people For Dhondup Wangmo, a Research Fellow at the Tibet Policy Institute’s Research Fellow, Environment and Development Desk, the key issue was the Third Pole, and why climate change there matters. Encompassing 46,000 glaciers that play a crucial role in sustaining the Asian atmospheric circulation, the Tibetan Plateau is vital. The disruption and decline of glaciers, snow and ice on the Tibetan Plateau will affect the water security of all involved counties. Hence, climate change on the Tibetan Plateau is a global concern, not only Tibet. Wangmo agreed with some previous speakers that climate change was anthropogenic, activities, and she spoke of the impact of the Chinese invasion of Tibet, such as excessive development and mining. On the question of how to save the Third Pole, Wangmo said importance should be given to ecological processes vital for sustaining the mountain system. With China being the supreme power of rivers flowing downstream, all involved countries should be integrated with China in combating the water crisis, and China should be pressurised into negotiating with them. In the name of ‘development’, China’s continued dam-building has ignored human rights, and social and environmental impacts.Hydropower projects should, Wangmo stressed, be built only with the consensus of local people, while the wider issue should be addressed at a global level. Offering an overview and broader perspective on water security and global water risk was Charles Iceland, Global Director, Water (Acting) at the World Resources Institute. He addressed the matter of chronic risk – using too much water relative to what we have naturally from rainfall – and episodic risk, such as flooding. Iceland also discussed problems of forced migration or displacement caused by water shortages, conflict over water scarcity, and spoke of how droughts and floods can contribute to food price spikes, food insecurity and subsequent unrest. Like his fellow panellists, he addressed the political aspects of water, referring to the Indus Treaty, simmering tensions between India and Pakistan over water, and between India and China over potential damming. In his closing remarks, TDF President Lord Bruce said the politicisation of water was a recurring theme throughout the seminar, and referred to the need for China, given its control of Tibet, to take responsibility for developing a more consensual approach to water in the Himalayan region. Putin’s ideal for a secure Russian state is one where society also conforms to traditional conservative ideas about gender - ‘Impending Himalayan water crisis: causes and effects’ - Date: 22nd June, 2022 | 14:00 – 16:00 UK time - Venue: Virtual Seminar London
<urn:uuid:ff889f02-9a5c-48ea-95af-a575646a819c>
CC-MAIN-2022-33
https://www.thedemocracyforumltd.com/seminar-report-the-weight-of-water/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00204.warc.gz
en
0.946946
2,133
2.8125
3
Why do we call ball mills the most efficient grinding ... Answer: As is known by us, the ball mill has a wide range of applications among so many mining machines, with the highest working efficiency. But what reasons lead to the good reputation of the ball mills? Here our experts will tell you the secret of the most efficient grinding machine, namely th... Principles of Grinding in Ball Mills | Orbis Machinery, LLC. Principles of Grinding in Ball Mills. Action inside a Ball Mill drum is not a haphazard process. Stirring is not random nor is the throwing of the charge. There is a very specific operating speed for the most efficient grinding. Depending upon the Mill’s speed, there is a point in which the load along the wall of the cylinder will break free ... cement machinery roller mills Roller mill. Roller mills are mills that use cylindrical rollers, either in opposing pairs or against flat plates, to crush or grind various materials, such as grain, ore, gravel, plastic, and others.Roller grain mills are an alternative to traditional millstone arrangements in gristmills.Roller mills for rock complement other types of mills, such as ball mills and hammermills, in such ... Why use Different Size Balls in a Mill The first one was only 3 feet long. A taper of 2 inches to the foot was ample to segregate the largest balls in the big end and the smallest balls in the small end. Grinding tests in this mill with a rationed ball load were compared with the old cylindrical mill loaded with the old style ball load. A decided advantage was gained by the newer ... What Are the Differences between Dry and Wet Type Ball Mill? 3 Wet ball mill has a simple transportation device with less auxiliary equipment, so the investment is about 5%-10% lower than that of dry ball mill. 4 The grinding particle size is fine and uniform, and the wet ball milling can not only grind agglomerate into fine particles, but also mix the lean material and the plastic material well. What it is the optimun speed for a ball mill ... Posted 21 October 2006 - 04:24 PM. Congratulations on your ball mill! You'll want to further reduce your motor speed by 3:1 to mill more efficiently. Right now, your RPM is just slightly under the speed where the media won't do any work. The optimum speed for your jar to turn is around 90 RPM like Frozentech said. making your own porcelain ball mill jars - Studio ... 1. You don't need a round jar. Make a jar and mount it in a round metal sleeve that has been turned true and cylindrical or make your ball mill so that it has a cradle to hold the jar. 2. see #1. It makes #2 a non issue. Usually you want to make ball mill jars thicker than normal wares to make up for the wear of the grinding media inside. How to Ball Mill Chemicals Safely — Skylighter, Inc. It took 12 boxes of these 1/2" diameter lead balls (from Bass Pro) to fill the mill jar half full, which is the ideal media "charge" in this1-gallon jar setup. The total weight of the media is 30 pounds. That is an important note: Fill the mill jar half full of media for optimal milling. United Nuclear - Black Powder Manufacture Turn on your Ball Mill and let it rotate for 2 to 4 hours. As the Ball Mill rotates, the lead balls will crush the chemicals together and reduce them into a super fine powder. The longer you let it grind, the stronger your Black Powder will be. Let the Ball Mill do its grinding in an uninhabited area, not in … of rotational speed on ballmills bond ball mill rotation speed Comparison of Grinding Media-Cylpebs versus Balls, types of grinding media in a laboratory Bond ball mill at various conditions of equality suchModel-based procedure for scale-up of wet, overflow ball mills, Part:The speed of rotation of the mill determines three basic types of operation. Live Chat How To Fabricate Ball Mill | Crusher Mills, Cone Crusher ... See how a homemade ball mill can turn lead balls into an extremely fine powder for use in any pyrotechnics project. Ball Mill – Heavy Industry – Crusher & Mill, Jaw … Ball Mill is one of the fine mining equipments, which manufactured by Henan Heavy Industry in China. Make a Ball Mill in 5 Minutes : 4 Steps - Instructables Wiki says "A ball mill is a type of grinder used to grind materials into extremely fine powder for use in paints, pyrotechnics, and ceramics." Many instructables refer to United Nuclear Ball Mills. Their small ball mill cost between $70 and $80 dollars. For no more than $30 and in 5 minute you can build a ball mill of appreciable performance. Ball Nose Milling Strategy Guide - In The Loupe Ball Nose Milling Without a Tilt Angle. Ball nose end mills are ideal for machining 3-dimensional contour shapes typically found in the mold and die industry, the manufacturing of turbine blades, and fulfilling general part radius requirements.To properly employ a ball nose end mill (with no tilt angle) and gain the optimal tool life and part finish, follow the 2-step process below (see Figure 1). The working principle of ball mill - Meetyou Carbide Therefore, in the rolling ball mill, the grinding efficiency is increased as the ball diameter decreases. It has been proven that the highest grinding efficiency can be obtained with a small ball of .mm diameter. However, the ball diameter is too small to wear too fast, and it is also difficult to discharge due to the small gap of the ball. How I built a quick and easy home-made ball mill I have been powering the ball mill with my bench variable power supply so I could fine tune the rotation speed. I wanted it to turn as fast as possible to speed grinding, but not so fast that centrifugal force pins the balls to the wall of the drum preventing them from tumbling over each other. Milling Speed and Feed Calculator Milling operations remove material by feeding a workpiece into a rotating cutting tool with sharp teeth, such as an end mill or face mill. Calculations use the desired tool diameter, number of teeth, cutting speed, and cutting feed, which should be chosen based on the specific cutting conditions, including the workpiece material and tool material. Using Ball Mills in the Energy Industry - NoakMech Quiet-Operation Slow Ball Mills run with a turning speed of 16-23 revs each min. Fast-Action Tangential Mallet Mills have an functional speed of 590 to 980 revs each minute; and there are also Medium Roller Mills which turn at 40 to 78 revs each min. The table of ultra-fine coal dirt obtained is listed below, relying on the kind of equipment ... Speeds And Feeds For Milling With End Mills Please be advised that published lead times may not be accurate for HTC. If you need fast deliveries, please call us to check stock prior to ordering. We apologize for this inconvenience, but we are confident that things will improve as their suppliers get back to normal. ... Ball End Mills. Bull Nose End Mill. Flat End Mills. Metric End Mills ... I can't do mills mess. : juggling Try and do the first 3 throws, but don't worry about catching at first. I honestly think you won't' have much of a problem. This is actually good, because I think it's good learning 4 ball mills mess by starting with 3 balls anyways. The first 3 throws happen really fast in the 4 ball version. Rod Mills, How Do They Work? - Mine Engineer Rod Mills, How Do They Work? Rod mills are very similar to ball mills, except they use long rods for grinding media. The rods grind the ore by tumbling within the the mill, similar to the grinding balls in a ball mill. To prevent the conditions leading to rod charge tangling, the length to diameter ratio is maintained at 1.4 to 1.6. Mill Speed - Critical Speed - Paul O. Abbe Mill Speed . No matter how large or small a mill, ball mill, ceramic lined mill, pebble mill, jar mill or laboratory jar rolling mill, its rotational speed is important to proper and efficient mill operation. Too low a speed and little energy is imparted on the product. Quick and Easy Black Powder Ball Mill — Skylighter, Inc. Powerful black powder can be made with mill runs of between 2 and 4 hours. Use long drop cords. Unplug the cords at the electrical source, not at the ball mill, when you want to stop the mill. Run your mill remotely, outdoors, at least 150 feet away from people and inhabited buildings. Some questions on milling/turning tool steels - Machining ... Do your best to look at the big picture instead of being short sighted like your co-workers. Milling prefers dry, especially hard so you don't shock the tool. I don't know how big your parts are but if you can swing an inserted high feedmill like this: Iscar FF EWXD0.62-2-1.5W0.62-04 you will be amazed how fast it will run and for how long. small ball mill | Gold Refining & Metal Extraction Forum Does not turn fast enough to get the balls to drop on the stuff you want crushed. It just rolls the contents around together. And it's easy to put too much in them and stop them from turning at all. Look on the home re-loaders forums they have many plans for small ball mills for milling the contents of black powder, etc. Building a Ball Mill for Grinding Chemicals - TutorialTub Be careful of catching your hands or clothing into the rotating belts and pulleys. I suggest that you build a wooden guard around any fast-moving shafts to protect yourself. Don't attempt to construct a ball mill if you do not know how to safely operate power tools like … Ball Mills - Mineral Processing & Metallurgy Ball Mills or Rod Mills in a complete range of sizes up to 10′ diameter x 20′ long, offer features of operation and convertibility to meet your exact needs. They may be used for pulverizing and either wet or dry grinding systems. Mills are available in both light-duty and heavy-duty construction to meet your specific requirements. Indexable Mills Speed Cavity Cutting | Modern Machine Shop Using the Chip Surfer’s toroidal high feed tip, the shop increased cavity roughing feed rates from 100 to 200 ipm and cutting depth from 0.004 inch to 0.012 inch (both the Chip Surfer and the old ball mill ran at a spindle speed of 3,750 rpm.) That’s an 8-to-1 gain in the corners as well as the straightaways. For finishing, the shop ... 4x1000ml Gear-Drive 4-Liter Planetary Ball Mill PQ-N4 series planetary ball mills may be used for mixing, homogenizing, fine grinding, mechanical alloying, cell disruption, small volume high-tech material production and even colloidal grinding. They are the ideal wet/dry milling tools for acquiring research samples with high efficiency and low noise. Vacuum jars may be used to process sample within a vacuum environment. Ball Mill - an overview | ScienceDirect Topics The ball mill is a tumbling mill that uses steel balls as the grinding media. The length of the cylindrical shell is usually 1–1.5 times the shell diameter (Figure 8.11).The feed can be dry, with less than 3% moisture to minimize ball coating, or slurry containing 20–40% water by weight. How Does Lab Ball Mill Work? - Ball Mill Mills are important to grind, pulverize, and chop samples for routine analysis. Excellent for dry & wet fantastic grinding , mixing, reacting of color paints, emulsifiers, enamels, refractoriies and so on. Micro Ball Mills are provided with twin mouths for charging & discharging. Ball Mill Supplier Manufacturers in India – Micro Ball Mills are adding […] Ball Mills - an overview | ScienceDirect Topics 220.127.116.11 Ball mills. The ball mill is a tumbling mill that uses steel balls as the grinding media. The length of the cylindrical shell is usually 1–1.5 times the shell diameter ( Figure 8.11). The feed can be dry, with less than 3% moisture to minimize ball coating, or slurry containing 20–40% water by weight. How Particle Size Distribution Of Cement Grinding In Ballmills And Roller Presses Effects How To Grind On A Skateboard How The Crushing And Grinding Machines In Industries Works Swf How To Grind Iron Ore Fines Particle Learn How To Grind In Cement Mill How Coal Crushed In Ball Mill Animation How Much Is A Fine For A Mill Or Chemical Plant To Dump Chemical Waste 657 How To Setup A Ball Mill How To Build Gypsum Podwr Mill How It Work Grinding Machinisthow It Work Stone Crusher How To Calculate The Wear Factor Of A Grinding Media Ball How To Use End Mill Grinding Fixture How To Mill A Trapezoidal Part A Hammer Mill Cyclone Has How Much Pressure How Grinding System Works In Cement Making How Many Type Of Gtc Grinding Machines How To Make Grinding Machine How Mutc Czmeity Elctric Hp Hammer Mill - Search Results 11671 How Does A Ball Mill Works How Do You Mine Iron Ore ? Grinding Mill China - Search Results How To Adjust Wiley Mill Blades - Search Results How To Start New Small Grinding Mill Plant With Cost
<urn:uuid:32a53cce-ec32-4819-8607-c9aaa96436a0>
CC-MAIN-2022-33
https://www.ciandebia.it/Nov_17-13435.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00205.warc.gz
en
0.905356
2,916
2.546875
3
Lessons for a new century With the world's urban areas holding four times the population they did in 1950, the time has come to redefine mobility. The ability of an unlimited number of people to go an infinite number of places at any given time in any given conveyance must yield in the new century to the ability to move among strategically-located home, work and play in the most efficient way. The word mobility automatically conjures up the word automobile, and the United States bears both the credit and blame for creating a car culture that has ushered in unpre-cedented prosperity along with pollution, carnage and skewed priorities. Europe and some nations on other continents have embraced the automobile, and many societies have absorbed it within a planned transportation network, encompassing a vigorous rail system as well. In the rest of the world, ranging from the faded industrialism of Eastern Europe to largely-agrarian Africa, decisions are being made now that will determine whether transportation will serve development or whether, as in the United States, development will serve transportation. The Road to Autocentricity Since the United States was the first autocentric nation, it serves as a living laboratory for developing nations to study if they wish to capitalize on its transportation successes and avoid its failures. A supreme irony is that overuse of the motor vehicle is erasing the very mobility that highway building sought to achieve, while causing freeways to crumble beyond the resources of government to repair. In the 1880s, the United States's metropolitan areas were rail-centered, with housing and commerce often clustered around depots, where breadwinners boarded trains to commute downtown. But many railroads had fouled their nest with predatory pricing and stock manipulation, and the Populist movement that resulted threw a regulatory noose around the runaway railroads while embracing the nascent automobile industry and its promise of individual freedom. An unprecedented government-business partnership promoted the “freedom of the American road” and, in the 1950s, lay the groundwork for the Interstate Defense Highway System. Automobiles and highways offered access to cheap land outside the cities, and Congress subsidized home mortgages and water and sewer facilities, making possible thousands of housing subdivisions, whose residents commuted to the central city and used its services but didn't have to pay taxes there. Congress paid states 90 per cent of the cost of interstate highways but only half the cost of rail lines. Unfettered by fixed rails, development sprawled outward from the urban core rather than centralizing around transportation nodes. When local zoners decided housing, commerce and offices should each have separate locations, it became obvious that only the automobile could provide access to them, and the two-car family was born. Recognizing mutual self-interest, auto, tire, steel, rubber and glass manufacturers, road builders, developers, contractors, hoteliers and fast food emporia linked arms to form the most potent lobby the world had ever known, seeking bigger and faster highways. Federal road builders designed the Interstates on the German model, to go around developed cities, not through them, but shortsighted U.S. mayors insisted that the freeways bulldoze into downtown to bring in new shoppers, failing to realize that they threatened also to suck out the stable middle class to suburban subdivisions. Today, the Worldwatch Institute estimates that 36 per cent of federally-aided highway mileage is located within cities. That the result is affluent suburbs surrounding impoverished cities is well-known. Recent efficiency gains in gasoline engines have been offset by increased traffic congestion as two per cent more vehicles stream onto the roads each year, leaving air pollution and its demonstrable effect on health a public policy challenge. Even though 91 per cent of auto commuters drive alone, traffic gridlock in many cities is no longer limited to rush hours. Studies estimate that only a tenth of children under 15 walk to school, contributing both to obesity and excessive parental dependence. Can lessons be learned from the American experience and elsewhere that can foster mobility in developing nations? Not every one of the following principles will be appropriate to each society, but they offer both validating and cautionary signals to those societies with the enviable prospect of starting with a blank slate. 1) Start with a plan. Unfortunately, America's road, rail, air and water modes each developed in a vacuum, without unified planning at any level, causing rampant inefficiencies and overlapping jurisdictions. Private rail and public highways developed as competitors, often operating at cross purposes. Only comprehensive planning can conserve resources by positioning schools, housing and commerce near urban transportation access points; adding bike paths and public transit to already auto-centered areas, or closing downtowns to auto traffic, to encourage walking commerce. Portland, Oregon preserved its city's livability by drawing a circumferential boundary around the core and encouraging development within it and proscribing development outside it. Try that, Adam Smith. 2) Ask the people. Ironically, such a deceptively simple principle has seldom been applied meaningfully in American transportation planning. Typically, public hearings ask citizens to react to a plan devised by bureaucrats. Conversely, cities as diverse as Salt Lake City, Utah; and Santiago, Chile have used a visioning process, asking folks what kind of a community they'd like to live in and what it would contain. Dedicated busways weren't on the table in Santiago, for instance, until the public suggested them, and they've now speeded up traffic dramatically. Citizens who make transportation choices daily may be the real experts. Contemporary politicians often seem reluctant to ask citizens to help shoulder public burdens. However, once people accepted that the environment is in danger, citizens began to sort their recyclables without complaint and, as in California's recent crisis, agreed to conserve energy. They might also be willing to leave their cars at home a day a week and ride the bus, but nobody's asking them. 3) Let government build the foundation. The United States essentially built and paid for its road, air and water transportation infrastructures, but the railroads constructed their own lines, building in capital costs that doom them as competitors with the other modes. Cars are overused today, in part, because no serviceable competitive alternative, such as public transit or a network of bicycle paths, exists. When government builds the infra-structure for all modes, they can all compete on a level playing field. 4) Let business run the store. While it makes sense for government to lay concrete and rail in the national interest, responding to public pressures for location and design, business is much better equipped than government to manage those systems, once established. It would be folly to let business decide where a public transit line should run; citizen input is vital to that decision. But in studies of Canadian railroads, Australian airlines and American buses, results show that the bottom-line mentality of private enterprise consistently nets higher productivity. 5) Let road and rail do what each does best. Rail, because it can link up many railcars, is far better than trucking in hauling bulk freight and passenger traffic long distances. But the motor industry can move people and goods to an exact destination address. Consequently, they each have comparative advantages that any developing nation should recognize. 6) Transportation and land use are joined at the hip. Build a rail line or road, and people will come. And the way land is developed determines the kind of transportation that must serve it. Yet building an auto-serviced housing subdivision uses up far more land than does a village clustered around a rail station. Urban expert David Rusk studied 58 American metropolitan areas and concluded that, between 1950 and 1980, they developed land at four times the rate their populations grew. “New Urbanist” developers in 150 U.S. counties, who are clustering development so people can live, work and play within walking distance, find this uses far less land, building material, automobiles, and gasoline. 7) New transportation is magic that turns land into gold. In the Interstate age, the value of unimproved land surrounding new highway interchanges grew sometimes twenty-five fold or more. America should have required the enhanced taxes from that development be used to maintain the roads and to build public transit. But because maintenance and repaving was swept under the rug in the 1950s, government faces a $300 billion bill to restructure the Interstates. Developing economies should use value-capture creatively in shaping its transportation. Emerging nations should help workers reach the workplace, but downtown land can be far better used than as parking garages. Yet this is what resulted when the American Congress decided to subsidize downtown employee parking more than twice as much as public transit. 8) Let the user pay. One-third of Americans lack a driver's license yet, through property and sales levies, they pay for road construction and maintenance along with licensed drivers. The Highway Lobby has long fought the notion that gasoline taxes should include external costs of driving, such as cleaning polluted air from emissions, protecting foreign oil reserves, subsidizing downtown parking, and disposal of junked vehicles. Accordingly, state and federal gasoline taxes total well under $1 a gallon, compared to $2-3 in Europe, where such external costs are included. A nation which makes driving reflect its true costs will see total mileage lowered, thereby reducing congestion and insuring that public transit remains in competitive balance with highway driving. Peak-time tolls, used by utility companies for decades, can reduce congestion by requiring that drivers in an express lane pay a premium. When total traffic is reduced, even non-toll payers benefit. Summary. New nation-builders have the enviable advantage of being able to avoid the mistakes of others while copying their successes. Just as human tissue thrives when blood flows unimpeded through its arteries and weakens and dies when blockage occurs, smooth transportation access builds prosperity, and congestion yields stagnation. An ideal system will proceed from a well-conceived plan, involving citizens at the outset. Government should build and own its infrastructure and let private companies manage it, recognize the unique advantages of road and rail and the inextricable link between transportation and land use. And tax breaks and concessions are vital to fine-tuning a new society's system. Ukraine’s former prime minister wants a new kind of peace deal for her country The pair believe a paradigm shift in Taiwan’s military strategy is now critical A large-scale counterattack is possible. But Ukraine must not strike Russia prematurely, says the military expert
<urn:uuid:9d75ffd4-26e9-4f9c-b63a-8b5a4d645b12>
CC-MAIN-2022-33
https://www.economist.com/by-invitation/2001/11/13/lessons-for-a-new-century
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00203.warc.gz
en
0.956486
2,158
2.890625
3
The Belt and Road Initiative (BRI) is a strategy articulated by the People’s Republic of China to address this gap by developing better transport connectivity within Asia and everywhere else. It is a transcontinental long-term policy and investment program which aims at infrastructure development and acceleration of the economic integration of countries along the route of the historic Silk Road. More specifically, BRI is defined as a vast collection of investment and development initiatives that stretch from Asia to Europe with the focus to strengthen the trade and investment partnerships and the strategy is to expand China’s political and economic influence around the world by: - Promoting mutual learning, economic prosperity, and world peace by improving human capital, financial and physical connectivity across the continents; and - Coordinating policy, facilitating connectivity, unhampering trade, integrating finance, and people’s connectivity. The Chinese President Xi’s vision included creating a vast network of railways, energy pipelines, highways, and streamlined border crossings, both westward—through the mountainous former Soviet republics—and southward, to Pakistan, India, and the rest of Southeast Asia. BRI is a global initiative which was created based on the Original Silk Road Concept. The original Silk Road arose during the westward expansion of China’s Han Dynasty (206 BCE–220 CE), which forged trade networks throughout what are today the Central Asian countries of Afghanistan, Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan, as well as modern-day India and Pakistan to the south. Those routes extended more than four thousand miles to Europe. The Silk Road was the longest ancient overland trade route. BRI symbolizes the following two ingenuities: - New Silk Road Economic Belt: It’s a land-based development initiative which includes rail, roads, pipelines, and associated infrastructures. It was proclaimed in September 2013 by President Xi Jinping on his state visit to Kazakhstan. According to the Vision and Action, the plan is to: - Connect China with Europe through Central Asia and Russia; - Link China to the Persian Gulf and the Mediterranean through Central and West Asia; and - Bring together China and Southeast Asian, South Asia and the Indian Ocean. - 21st Century Maritime Silk Road: It’s a sea-based development which involves ports, maritime infrastructure, and shipping route. It was announced by the President Xi in October 2013 in Indonesia with the focus to connect China with Southeast Asia, Middle East, Africa, and Europe. According to the Vision and Action, the plan is to: - Start from China’s coastal ports to the Indian Ocean through the South China Sea, and extend to Africa and Europe; and - Connect China’s coastal ports with South Pacific Ocean through the South China Sea. It is ever conceived most aspiring infrastructure development and regional integration. The long-term BRI strategy is designed to span through the following six overland economic corridors: - The China–Mongolia–Russia Economic Corridor: Linked by land, China, Mongolia and Russia have long established various economic ties and cooperation by way of border-trade and cross-border cooperation. - The New Eurasian Land Bridge: The New Eurasia Land Bridge, also known as the Second Eurasia Land Bridge, is an international railway line running from Lianyungang in China’s Jiangsu province through Alashankou in Xinjiang to Rotterdam in Holland; - The China– Central Asia–West Asia Economic Corridor: This Corridor runs from Xinjiang in China and exits the country via Alashankou to join the railway networks of Central Asia (Kazakhstan, Kyrgyzstan, Tajikistan, Uzbekistan, Turkmenistan) and West Asia (Iran, Turkey, etc.). - The China–Indochina Peninsula Economic Corridor: The Corridor mainly covers the Greater Mekong Sub-region. In particular, Guangxi has opened an international rail line running from Nanning to Hanoi, as well as introduced air routes to several major Southeast Asian cities. - The China–Pakistan Economic Corridor: The objective of China-Pakistan Economic Corridor is to build an economic route running from Kashgar, Xinjiang, in the north, to Pakistan’s Gwadar Port in the south; and - The Bangladesh–China–India– Myanmar Economic Corridor: BRI proposes developing the Bangladesh-China-India-Myanmar Economic Corridor and facilitate cooperation through building a closer relationship. Subsequently, the following three components were added to the overall scope of BRI: - The Digital Silk Road (DSR): The focus is to improve digital connectivity in participating countries, with China as the main driver of the process. DSR was launched in 2015 as a component of BRI. Like the BRI, the DSR is not monolithic and involves many actors at all levels across the Chinese public and private sectors. It is amorphous and the line between official and unofficial DSR projects is often blurry. Comprehensive data on DSR investments is difficult to come by. According to one estimate, by 2018, DSR-related investments in digital infrastructure projects outside of China had reached $79 billion; - Clean Silk Road (CSR): This component was launched to demonstrate strong commitment to transparency and clean governance in pursuing BRI cooperation around the world. It was also focused on pursuing high standard cooperation to improve people’s lives and promote sustainable development by promoting zero tolerance for corruption. Furthermore, it was designed to demonstrate the commitment to widely accepted rules and standards and encourage participating companies to follow general international rules and standards, including: 1.Project development, operation, procurement and tendering and bidding; and 2. The laws and regulations of participating countries; and - Green Silk Road (GSR): Green Silk Road, as its name, is conveying greenery. It tries to make all the activities under BRI environment friendly. Xi Jinping Outlined Green Silk Road in these words “We should uphold the concept of green development, advocate a low-carbon, recyclable and sustainable lifestyle, and strengthen ecological cooperation to make it a part of our life so that we can join hands in achieving the United Nations Sustainable Development Goals by 2030.” As far as the BRI scope is concerned, the colossal scale of the BRI is exemplified by the 4.4 billion people (70 per cent of the world population) and the cumulative gross domestic product (GDP) of around US$21 trillion that it is set to encompass. Infrastructure corridors spanning primarily in Asia and Europe but also including Oceania and East Africa, will cost an estimated US$4–8 trillion. Here are some additional facts about BRI which highlights the progress: - Chinese engagement through financial investments and contractual cooperation for the year 2021 in the 144 countries of the Belt and Road Initiative was about US$59.5 billion. Of this engagement, about US$13.9 billion was through investment, and US$45.6 billion through contracts (partly financed by Chinese loans); - China’s overall engagement is a steady development compared to 2020, when Chinese engagement was about US$60.5 billion. In that time, contract volume rose from about US$37 billion, while investment shrank from US$23.4 billion; - Compared to 2019, the year before the COVID-19 pandemic, Chinese engagement declined by about US$53 billion (about 48 percent). With COVID-19 ongoing, BRI investments were at their slowest pace since China’s overseas investment strategy was coined “BRI” in 2013 when China became the major investor in many of the BRI countries. According to Green Finance & Development Center, in March 2022, the number of countries that have joined BRI by signing a Memorandum of Understanding (MoU) with China is 147. Here is a graph to reflect the current countries associated with BRI: Focusing on the environmental impacts, here is the reality – all infrastructural and constructional activities affect the environment nd BRI is no exception. BRI is designed to focus on infrastructure development around the world which is the construction of basic foundational services in order to stimulate economic growth and quality of life improvement. Most advanced economies have gone through periods of intensive infrastructure building that have, no doubt, improved the efficiency and competitiveness of regions. The BRI projects essentially related to infrastructural developments in the transport, energy, mining, IT and communications sector but also cover industrial parks, Special Economic Zones (SEZ), tourism and urban development. Nevertheless, the majority of these projects in various countries are in the transport sector. Considering the magnitude of the overall environmental implications for the BRI projects around the world, this article is dedicated to addressing the environmental impact only on the transport sector. It’s acknowledged that while improving multimodal transport connectivity on multilateral trade and economic growth in countries and regions across the BRI projects is inspiring, it is also challenging. Here is the justification for undertaking those projects: - Good transport infrastructure reduces transport costs and transport times and improves delivery reliability. Empirical evidence shows that cost of transport, in both time and money, has a significant impact on trade flows. Good transport infrastructure facilitates trade expansion; - Efficient transport infrastructure facilitates industrialisation and also enables more efficient regional and global production networks. This results in more employment, positively affecting industries and sectors; - Better transport infrastructure enables regions to be well connected and supports regional economic integration; and - Better transport infrastructure can lower transport and trade costs, accelerate industrial agglomeration, increase labour productivity and foster development and regional and national welfare. Nevertheless, the transport projects emit greenhouse gas (GHG) emissions. Speaking of GHG emissions and looking at the global picture, the world emits around 50 billion tonnes of greenhouse gases emissions each year and the transport sector contributes 16.2 percent to this total. The following graph illustrates the configuration of the transport percentage: The following explains each point: - Road transport (11.9 Percent): Emissions from the burning of petrol and diesel from all forms of road transport which includes cars, trucks, lorries, motorcycles and buses. Sixty percent of road transport emissions come from passenger travel (cars, motorcycles and buses); and the remaining forty percent from road freight (lorries and trucks). This means that, if we could electrify the whole road transport sector, and transition to a fully decarbonized electricity mix, we could feasibly reduce global emissions by 11.9 percent; - Aviation (1.9 Percent): Emissions from passenger travel and freight, and domestic and international aviation. 81 percent of aviation emissions come from passenger travel; and 19 percent from freight. From passenger aviation, 60 percent of emissions come from international travel, and 40 percent from domestic; - Shipping (1.7 Percent): Emissions from the burning of petrol or diesel on boats. This includes both passenger and freight maritime trips; - Rail (0.4 Percent): Emissions from passenger and freight rail travel; and - Pipeline (0.3 Percent): Fuels and commodities (e.g. oil, gas, water or steam) often need to be transported (either within or between countries) via pipelines. This requires energy inputs, which results in emissions. Poorly constructed pipelines can also leak, leading to direct emissions of methane to the atmosphere – however, this aspect is captured in the category ‘Fugitive emissions from energy production’. According to the International Energy Agency (IEA), transport demand in 2021 is rebounding, with demand for passenger and cargo transport expected to continue increasing rapidly. Even with anticipated growth in transport demand, the Net Zero Emissions by 2050 Scenario requires transport sector emissions to fall by 20 percent to 5.7 Gt by 2030. Achieving this drop would depend on policies to encourage modal shifts to the least carbon-intensive travel options, and operational and technical energy efficiency measures to reduce the carbon intensity of all transport modes. Concentrating on BRI, the World Bank Group published a Policy Research Working Paper on the subject in 2019 to examine and scrutinize the BRI projects with the focus to determine how GHG emissions are being emitted by these projects. The paper presages the potential for indirect effects of land-use change and deforestation from BRI road and rail construction could not only profoundly affect forest over and ecosystem health but also generate a significant impact on the global climate. Accordingly, deforestation, especially in the tropics, represents a significant source of carbon emissions, to the point of contributing close to one-fifth of all anthropogenic ally-produced emissions. likewise, BRI projects can have indirect effects on GHG emissions through the secondary impact via shifts in trade and resultant changes in vehicle traffic and land use. Another report published by the World Bank Group on the subject of Opportunities and Risks of Transport Corridors explains that direct BRI impacts on environment include pollution from traffic, topographical and hydrological damage, and the alteration of habitats at the expense of biodiversity. For traffic pollution, the BRI should induce greater traffic along its routes, raising air and noise pollution. But many routes have electric-powered rail, tending to lower air pollution and GHG emissions (compared with road and air transport), and noise pollution (compared with roads). To the extent “greener” rail transport substitutes for previous road and air journeys, pollution may be reduced. This is particularly salient for the BRI, which tends to follow existing transport routes, making substitution more likely. At the same time, road and rail also affect biodiversity by fragmenting and altering species’ habitats and by preventing animal movement. These barriers split populations and reduce genetic diversity in breeding, particularly for migratory and nomadic species. In addition, roads and rail lines change habitats along their edges, with impacts on species competition and survival. Changes in wind intensity, pollution, light, and noise along a road or railway may be subtle but can tip species competition in favor of more “edge-adapted” species; these tend to be less local, more resilient high breeders (weedy species), while endemic and vulnerable species suffer. Incidentally, as per a briefing paper, published in May 2017, the BRI area includes many different environmentally important areas such as Protected Areas, key landscapes, Global 200 Ecoregions, and biodiversity hotspots that cover the distribution range of flagship species, as well as areas that are important for delivering ecosystem services that provide social and economic benefits to people. They classified their findings into the following areas: - Threatened Species: Their analysis showed that BRI corridors overlap with the range of 265 threatened species including 39 critically endangered species and 81 endangered species – including saiga antelopes, tigers and giant pandas; - Environmentally Important Areas: They found BRI corridors overlap with 1,739 Important Bird Areas or Key Biodiversity Areas and 46 biodiversity hotspots or Global 200 Ecoregions5; - Protected Areas: all protected areas in BRI corridors were potentially impacted. In addition, 32 percent of the total area of all protected areas in countries crossed by BRI corridors were potentially affected; - Water-Related Ecosystem Services: They highlighted the key natural and semi-natural ecosystems that are important for supporting water-linked ecosystem services (e.g., natural forests and grasslands) in areas where there is the biggest pressure on water supply and the highest risk of large floods. This analysis therefore highlights where there are social and economic risks from environmental damage; - Wilderness Characteristics: They analysed areas with the greatest wilderness characteristics. 8 New activities in these areas (e.g., a road through a previously remote, inaccessible area) can cause more serious long-term impacts than an extra road in an accessible area; and - Overall Impacts: They also produced an equally-weighted summary of layers 1-5. This provides an initial summary of the areas that are likely to be at highest risk as a result of the BRI corridors. It is predictable that Chinese investment in environmental regulations can induce innovation in cleaner technologies. Some Chinese banks under the environment protection bureau can halt the loans or grants if their activities threaten unfavorable environmental outcomes for other countries. That is how they can reduce water pollution. One study found that firms were compelled to use end-of-pipe treatment since the imposition of this policy, long-term pollution, can be constrained. The sad reality is that while China aims to dramatically improve environmental regulations, reduce pollution and transform industries by adopting new green technologies and higher environmental standards but for many other developing countries benefiting from the BRI investments, raising social and economic standards as well as the protection of natural resources is not yet a priority. Ottawa, Ontario, Canada 30 July 2022
<urn:uuid:87e1a682-1bf4-497e-8a4b-f762d1ae2821>
CC-MAIN-2022-33
https://mirfali.com/several-articles-on-various-topics/belt-and-road-initiative/the-environmental-impact-of-belt-and-road-initiative/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00002.warc.gz
en
0.939746
3,474
3.5
4
Technology works its way into your life in ways that you might not realize. The Jetsons ran on television 58 years ago and imagined a futuristic world with video calls, robot maids, and watch phones. In 2020, Zoom, Roomba, and the Apple Watch are used every day by millions of people without giving a second thought to the technologies that enable them. Technology surrounds us in ways that you might not even appreciate. Data runs throughout your home in the data and network cabling embedded in your walls and the WiFi radio waves permeating your air. Your garage door, air conditioner, and even your septic tank can have embedded electronics to monitor and control them. Here are nine technologies used in everyday industries: One of the most pressing global technology trends is research into generating electricity from green, alternative energy sources. Windmills, watermills, solar, and solar thermal are all technologies that have earned a foothold in the residential power generation industry. These technologies generate electricity for residents and businesses independent of the electric grid and often in a more environmentally friendly way than the local coal or gas-burning power plant. As a result, they lower the operator’s cost of electricity without creating any pollution by turning sunlight, moving water, or wind into electricity. But what about turning poop into electricity? Research into microbial fuel cells suggests that it may be possible to convert your septic tank into an electric generator. These devices use bacteria to oxidize chemicals near an anode and reduce chemicals near a cathode to generate an electric current. This is the same principle as a battery, but it uses bacteria to catalyze the reactions that generate electricity. Most importantly, the bacteria use sewage waste found in septic tanks to produce the reactions. While microbial fuel cells would not eliminate the need for septic pumping services, this technology could reduce your power bill or even make you energy independent using nothing more than poop for fuel. Monetizing Security Cameras One of the fastest global technology trends is the expansion of electronic security systems. Small cameras, fast servers, and cheap storage have allowed almost every business and residence to install a security monitoring system. While these systems are commonly viewed as an expense by the businesses that use them, there is a growing trend to find other ways of using the video footage captured by the security system to generate revenue. One way to generate revenue from security cameras is to gather information from the security camera footage and either sell the data or use the data to fine-tune the business’s operations. - Analyze movement patterns to improve traffic flow. - Identify which products are or are not examined by customers. - Determine when a space is occupied to turn off lights or HVAC to save money. Since the business has already installed the camera system for security purposes, using the images collected for a revenue-generating (or cost containment) purpose is essentially found money. A business merely invests in the software to analyze the images and it has a whole new data set for use. Improving Water Safety The COVID-19 pandemic has highlighted the pathways that viruses, bacteria, and parasites use to infect people. A water treatment service kills coronavirus before it can be transmitted through tap water. However, some parasites, like giardia and campylobacter have a hard outer shell that protects it in pools and hot tubs. Global technology trends for 2020 include new ways to deliver clean and safe water. Residential ultra-violet (UV) water treatment systems will gain traction as residents install these systems in their homes to remove any pathogens missed by municipal water treatment systems. These systems will improve in price, sustainability, and energy consumption as new technologies like UV LED lamps can be used in place of older UV lamps that generate waste heat and require the use of toxic chemicals such as mercury in their manufacturing. Delivering Health Care Safely Due to concerns about infecting patients with pre-existing conditions with coronavirus, the use of technology to deliver health care safely will become one of the widest global technology trends. For example, the use of telemedicine and remote doctor visits has already become commonplace during the coronavirus pandemic. Health care providers and medical technology companies will continue to develop these technologies to incorporate virtual reality to give a nurse or doctor a greater ability to examine the remote patient. Moreover, advanced analytics can be applied to cell phone data and home automation system data to help public health officials predict disease outbreaks. And artificial intelligence can look at huge data sets of disease and disease transmission to recognize patterns and identify factors in disease transmission that might have been overlooked by human analysts. By identifying health care workers who might contract coronavirus so they can be tested, and providing ways for health care workers to effectively interact with patients remotely, health care services can be delivered more safely. This will allow nursing home residents, hospice home health care patients, and other patients vulnerable to complications due to coronavirus to receive care for their medical issues without exposing them to the pandemic. Finding New Ways to Provide Services Financial necessity has driven many businesses to shut down or limited by the coronavirus pandemic and stay-at-home guidelines to use technology to find new lines of business or new ways of delivering their services. For example, 3-D printers have allowed manufacturers to quickly shift their manufacturing to produce face masks and other personal protective equipment (PPE). However, the pandemic has been especially devastating to the services industry. Theme parks, hotels, restaurants, gyms, and hair salons had to close completely. Many factors can play a part in the risk that a business faces in becoming a vector for transmission of coronavirus including: - The proximity of workers to other workers: Factories and food processing plants could become hot spots of disease transmission because of the proximity of workers on assembly lines. - The proximity of workers to customers: Hair salons, nail salons, and tattoo shops require workers to be in physical contact with customers. - The proximity of customers to other customers: Theme park queues and movie theaters place customers close to each other to keep pathways open and to maximize revenue. - The ability of customers and workers to wear PPE while the services are provided: Some services, like restaurant dining, cannot be delivered with PPE. - Whether steps can be taken to reduce the risk without reducing the quality or safety of providing the services. To take one example, restaurant dining rooms were shut down very early in the pandemic when it was discovered that the disease is carried on respiratory droplets. One diner with a cough risked infecting everyone inside the dining room as the droplets in the air fell onto food, tables, utensils, plates, cups, and other surfaces. As these businesses transitioned to take out, delivery, and pick up services, global technology trends, such as online ordering and gig worker delivery, were used to improve the efficiency of the process. For example, a customer might order Italian food online through a delivery service that would dispatch a driver via a phone app to pick up the food and deliver it to the customer. However, even more advanced global technology trends, like robotics and drones, may be used as the pandemic continues. Importantly, current robots and drones are not completely autonomous and, as a result, still require an operator. However, the operator can stand at a safe distance while the robot or drone completes the delivery. In other words, the risk of transmission is reduced by using a robot or drone as a go-between for the worker and the customer. Improving Building Safety Safety will dominate global technology trends in 2020 due to the pandemic. This is, in some ways, a natural reaction by technology companies. Technology companies will have a ready-made customer base of businesses that need technology to provide a safe environment so they can reopen. One of the most difficult parts of the coronavirus pandemic is that the circulation of air is prone to spread the virus because it is carried on respiratory droplets. Thus, every cough, sneeze, or even spoken word can result in a spray of infected droplets hanging in the air. As air moves, it carries those droplets to other people. In one notorious case, a person infected with coronavirus ate at a busy restaurant. Several people at the restaurant became infected with the virus and later analysis found that air conditioning played a critical role in transmission. Every customer who was infected was in the path of the air conditioning and downwind of the infected person. No person who was outside the path of the air conditioner was infected. Thus, the air conditioner blew the droplets carrying the virus directly toward other diners and was the sole factor that determined whether someone was infected. Thus, one of the global technology trends will be to retrofit air conditioners with features that will reduce or eliminate the risk of transmitting coronavirus. High-efficiency particulate arrestance (HEPA) filters are the most effective filters widely available for home or business use. Unfortunately, even HEPA filters have openings large enough to allow a small percentage of viruses through. When combined with UV disinfection, however, the HEPA filter catches most of the droplets carrying the virus and the UV light destroys the virus in any droplets that escape. Because of the urgency of this problem, you can expect manufacturers to incorporate these technologies into kits for air conditioning service businesses to use to retrofit air conditioners for the 32.5 million businesses in the U.S. Refining Medical Technologies Not all global technology trends are focused on coronavirus. Other technological developments center around refining existing technologies to improve their outcomes and effectiveness. For example, within the past few years, laser vision correction has undergone an evolutionary change from using a laser to shave a thin layer off the eye’s lens to improve a patient’s vision to a custom reshaping of the lens to correct the patient’s specific vision problems. Through the custom reshaping, anomalies that cause astigmatism can be corrected along with near-sightedness. This is possible through a combination of technologies. - The shape of the patient’s lens is measured precisely using imaging technology. - A computer calculates how the lens must be reshaped to correct the patient’s vision. - Another computer controls precisely the location and duration of laser bursts to reshape the lens according to the calculations. Only through the application of imaging, lasers, and mechanical control technologies can this happen. As these technologies advance, laser eye surgery and other forms of laser surgery will produce improved results. Improving Home Technologies Home automation has been and will continue to be one of the leading global technology trends. Home automation systems that control your lights and thermostat and secure your doors and windows are increasingly available to both new construction and existing homes. In fact, home automation may become so common that it is part of the electrical installation in every new home. As the market for these systems evolves, technological developments will take place in a few areas: - More devices will be controlled: As manufacturers incorporate controllers into more products, your home automation system incorporates a larger system of devices. For example, automated window shades, kitchen appliances, and door locks are becoming more common and will be incorporated into home automation systems of the future. - Controllers will get smarter: Artificial intelligence will enable controllers to learn your habits and change their behaviors by observing you rather than requiring step-by-step programming. This will customize your home automation system to your preferences regardless of your technological abilities. - You will have more ways to interact with the controller: Voice control was a major advance in home automation systems. Before voice control, a remote control, phone app, or tablet app was required to control your system. Now you need nothing more than a voice. In the future, your system’s cameras will watch you and anticipate your commands before you even say anything. Advancing Home Security and Safety Although both violent crime and property crime have declined since the early 1990s, it has not dropped to zero, and homeowners are rightly concerned about security. These concerns have led to global technology trends in home security and home safety. Home security leaped forward with Internet-based doorbell cameras. These devices allowed you to monitor your doors regardless of your location. As camera technology continues to evolve, cameras will become ubiquitous throughout the home. More importantly, the camera controllers will become smarter so you will receive alerts when a package is delivered but not when the neighbor’s cat crosses your porch. Likewise, more businesses will incorporate notifications so you know when to expect them and when the person knocking on your door is a scammer or thief. For example, a garage door company may alert you when the garage door repair technician arrives so that you know the technician is legitimate. Global technology trends are as varied as the industries they affect. As computers become faster, storage becomes cheaper, and software becomes smarter, you can expect technology to make its way into almost every device and system you interact with every day. Despite this expectation, technology has a way of surprising us. The most radical technology advances may come in the least likely of places.
<urn:uuid:2328d808-c45d-44d0-9042-f6d7ef701052>
CC-MAIN-2022-33
https://technologymagazine.biz/9-ways-technology-is-used-in-different-industries/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00202.warc.gz
en
0.942028
2,720
2.640625
3
When I set foot in the Indian city of Vellore, 145 km from Chennai for the first time, I was unaware of the importance of this city to Sri Lanka. While being driven though the city I came across a board which displayed, among other important sites to visit - “The tomb of last king of Ceylon”. In my subsequent visits to Vellore I was able to see all places related to our last king’s stay in the city. Outwardly Vellore is no different from any other south Indian city, being busy, dusty, noisy and smelly. It lies between Chennai (145 km) and Bangalore (215 km) and the temple towns of Thiruvannamalai and Tirupati. On the banks of the Palar River, surrounded by a rocky terrain, it is thought to be one of the oldest cities in South India, and has a population of about 500,000. It has two prominent sites, one being the famous Christian Medical College and the other the Vellore Fort. Christian Medical College Founded as a one-bed clinic in 1900 by an American missionary doctor Ida S. Scudder, this establishment occupies a prominent place among medical institutions in India and the world. Today it has a 1,700-bed multi campus tertiary care hospital and proudly claims that it has been the pioneer institution in many an advanced medical procedure in the South Asian region. The Vellore fort, in which our last king was held captive for 17 years, spreads over an area of 133 acres. It was built around 1566 by Chinna Bommi Nayak and Thimma Reddy Nayak, chieftains of the Vijayanagar Empire. Ironically, King Sri Wickrama Rajasinghe belonged to the same Nayak clan which built the fort. |The interior of the tomb The fort is considered to be among the best examples of military architecture in Southern India and is famous for its grand ramparts, wide moat and robust masonry. In the 1760s, the British took possession of the fort and used it as a major garrison up until Indian independence. In 1799, Tippu Sultan, the son of Hyder Ali, died defending the Mysore kingdom against the combined forces of the British and the Nizam of Hyderabad. After his death, his family was detained in the Vellore fort until 1806. After the mutiny of 1806 by Indian sepoys of the Madras regiment, the British decided to shift and isolate Tippu Sultan's family from Vellore to faraway Calcutta. After the family was moved the fort lay in silence but when the British captured the last king of Kandy in 1815 they considered Vellore Fort to be the ideal place to keep him under arrest. Sri Wikrama Rajasinghe: from Kandy to Vellore Upon the advance of the British forces in February 1815, the last king of Kandy Sri Wikrama Rajasinghe abandoned Kandy and sought refuge in the home of one his loyal minor officers in Udupitiya at Mada Mahanuwara with his four queens. After capturing the abandoned city of Kandy without much bloodshed on February 15, the British army and their local collaborators started searching for the king. Acting on information they received, the search parties reached Mada Mahanuwara and captured the king and his queens on February 18. Major Hook of the 2nd Ceylon Regiment was entrusted the custody of the king and under a strong escort, the king and his relatives were brought to Colombo, judiciously avoiding the capital city Kandy where the Governor Sir Robert Brownrigg and the officials were preparing the Kandyan convention to subjugate the kingdom. Coming through Teldeniya, the king and his escort proceeded towards Colombo and crossed the Kelani River at Grandpass on March 6, 1815. While the king was on the move towards Colombo, the Kandyan Convention was signed on March 2, ending Sri Lanka’s uninterrupted independence of 2300 years of written history. In Colombo the king and his relatives were accommodated in a spacious and luxurious house close to Galle Face. They remained in this house for ten months under house arrest until the king and his queens, with an entourage of fifty, were deported from Colombo port on January 25, 1816, aboard the H.M.S Cornwallis to Madras. The ship reached Madras port on January 21 and the king and his party started their journey to Vellore the very next day. The road the king travelled, from Madras to Vellore, is now a main highway leading to Bangalore (Bangalaru). Having arrived in Vellore on February 28, the king and the party was accommodated in the house located inside the Vellore fort, which the royal family of Tippu Sultan had previously occupied. “Kandi Mahal” in Vellore Located inside the Vellore fort, this large house is better described as a housing complex (or mahals) which is a group of houses and courtyards. I was surprised to see that even now it is named “Kandi Mahal” after the last king of Kandy. It is also known as Hyder Mahal / Tippu Mahal after the family members of Tippu Sultan. |“Kandi Mahal”: Named after the last king of Ceylon The entire housing complex is now occupied by government offices. The section in front, which is the district land registry, is in a dilapidated state and the rest is used as a Police training college and hence is a restricted entry area. It is in this place that our last king was held captive by the British for 17 years. Governor Brownrigg’s instructions were to, “treat him like a prisoner of war, without splendour or honours, but that he should live in comfort though in perfect retirement.” Though the king was living on a payment (Privy Purse) by the British government he wished to keep his dignity and refused to be treated as an object of curiosity, to be shown to visitors. On one occasion in 1830 he refused to meet the Governor of Madras, Mr. Lushington, who was touring Vellore and wished to see the king. According to Henry Marshell M.D. who was the Inspector General of Army Hospitals in Ceylon, in January 1832, the 52-year-old king fell ill with “Dropsy”. Dropsy is an old term for the swelling of soft tissues due to the accumulation of excess water (edema). In years gone by a person might have been said to have dropsy without describing a specific cause for it. Thus the king might have had edema due to congestive heart failure or any other organ failure. According to Dr Marshell, “from the commencement of the month he died the reports of the native medical attendants respecting his health were considered very unsatisfactory: and he was visited by Mr. Reid, an English surgeon, who found him afflicted with general dropsy. He at first consented to abide by Mr. Reid’s prescriptions, but afterwards declined his assistance, and again called his native attendants. He (the king) died at Vellore, on the afternoon of the 30th January 1832 aged 52 years, having being seventeen years a state prisoner. At the desire of the family the body was conveyed to the place of burning before sunset, under the escort of a military guard, and accompanied by his male relatives and servants.” The location where the king was cremated on the banks of Palar River is now known as “Muttu Mandapam”. A lotus-shaped structure has been built by the Indian Government at this site enclosing the tombs of the king and his descendants. As the local community was unaware of this location, I found it with much difficulty. It was at an end of a gravel road running through low-roofed cadjan huts, separated from the surrounding huts by a high wall. The premises were kept locked. Determined to get the gate opened I roamed through the sea of huts several times and finally, with the help of my interpreter and trishaw driver, I found the caretaker, a lady who happily came out of her small hut with the keys to the premises to show me the tomb of our last king. When the iron door of the dome was opened I was emotionally shaken to see the tomb surrounded by the tombs of some of his relatives. Colourful pictures of the king and one of his queens are displayed inside. A great grandson of the king, A. Vikrama Rajasingha erected a tombstone on July 27, 1932, describing the king’s tomb one hundred years after his death. A. Vikrama Rajasingha is probably a descendant of one of the late king’s daughters. The Dynasty of the Last king The Nayakar dynasty of Kandy, of which Sri Wickrama Rajasinghe was the last king, ruled the Kandyan kingdom from 1739 to 1815.They were part of the royal family of the Madurai Nayak dynasty, of Telugu origin. The king had four wives. The king’s only son, by Queen Venkatha ammal, was born in Vellore Fort and died in 1842 without children. The two daughters of Queen Muthukammama married and their descendants received an allowance (Privy Purse) from the government of Ceylon till 1965. According to the caretaker, the king’s tomb is hardly visited now. Forgotten by his descendants and his country, the tomb of our last king stands in isolation on the banks of Palar River in Vellore.
<urn:uuid:ea61cf8f-b15b-475f-aa8f-da2d5b38d069>
CC-MAIN-2022-33
https://sundaytimes.lk/120311/Plus/plus_01.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00005.warc.gz
en
0.980226
2,084
2.859375
3
Chinchero, Peru (photo credit: Natalie Deuschle) The rainbow was born in the town of Chinchero, Peru, according to Incan mythology. Today, when the weavers of the area gather to dye wool in vats of boiling water, myth seems to become reality. The women wear bright red jackets as they tend to the vats, samples of already dyed wool are laid out — from blue to saffron to purple — and a weaver stirs a pot of deep moss-green wool with a long wooden pole. Chinchero is situated in the central Andes, a short distance from Cusco, on the way to the Inca Trail and Machu Picchu. It has developed into a tourist hub, although the community remains seemingly untouched by time. Quechua, the language of the Inca people, is spoken by many of the inhabitants, and the town still commands the vistas that long ago earned the region the moniker “the cloud kingdom of the Incas.” Peru hosted the 20th annual Conference of the Parties (COP) to the United Nations Framework Convention on Climate Change late last year, and was the backdrop for far-reaching negotiations among more than 190 countries about the impact of climate change. And Peru is also home to the small-scale but powerful work being done by artisans like weavers in Chinchero, especially in terms of how their work supports and preserves the biodiversity of the region. Today a dyeing workshop run by the Center for Traditional Textiles of Cusco (CTTC), a group that supports and promotes traditional weaving and spinning, has drawn more than 100 people to the area to master the centuries-old traditional technique of making naturally dyed wool. Participants tend the vats of boiling water and work with the dyestuff, which includes chillca flowers from the nearby mountains, used to produce the color green; shapy, a vine that makes the color pink, collected from the jungle beyond the neighboring community of Accha Alta; and the insect cochineal, which feeds on cactus and is ground to make the color red. “They have been there since 4:30 in the morning,” explains Peggy Clark, director of the Alliance for Artisan Enterprise, a group that supports the global handicraft market, including the weavers of this region. “It is physically difficult, labor-intensive work, a community effort — but really peaceful. Time slows down over this whole day. It’s an all-hands-on-deck kind of thing.” Sallac Village, Peru (photo credit: Natalie Deuschle) Until recently, many of the ancient weaving customs of Chinchero, which are rooted in the stunning biodiversity of the area — from natural dyeing to harvesting alpaca wool — had all but disappeared for decades, during which chemical dyes and machine weaving pushed out the old techniques. Now, however, natural dyeing and traditional weaving methods can take some of the credit for having brought an economic, environmental, and social renewal to the region. The textiles produced in Chinchero are sold globally and are on display in museums around the world, and that’s partly thanks to one woman, Nilda Callañaupa. Forty years ago, Chinchero was home to a young girl, whose job it was to tend sheep as they grazed. As the many hours of the day passed on the hillside, she spun wool as she watched her animal charges, as girls her age were expected to do, producing usable skeins of wool. The wool was used to make the textiles that were an important part of the community — as blankets, clothing, in farming, and in sacred rituals. And as the girl spun, she became entranced with the act — so much so that she found herself dreaming of spinning as she slept each night. “I am proud that I learned skills and knowledge from my Chincero grandmothers and their ability to lay out and weave complex designs, carrying on ideas passed from their mothers and grandmothers,” says Callañaupa, now 54 and founder director of the CTTC. ” … I saw how my grandmothers took strength from their Inca rituals and ceremonies, especially those connected with weaving and spinning.” As that girl spinning on the mountainside grew older and her interest in weaving became a passion, she noticed that the traditional methods of dyeing wool and weaving were disappearing from Chinchero. The techniques, handed down orally over the years, were not recorded in writing, and the younger generations showed greater interest in leaving Chinchero for the cities of Peru than in learning from their elders. Textiles were still important to the community, but cheap chemical dyes, acrylic yarn, and machines were being used more widely by the weavers. “The textile process was poorly managed,” says Callañaupa. “The younger generation was not working with the same attention to quality as the elders.” The growing tourist market had created a demand for simple, quickly produced designs and products of lesser quality: belts, bags, friendship bracelets from exotic, “foreign” lands. Commercially produced synthetic dyes were bright, cheap, and easy to use (natural dyeing is a much longer, more expensive process), and the weavers in Chincero were rapidly abandoning the traditional methods. Beyond the degradation of quality that such developments implied, Callañaupa saw the loss of the connection between nature and culture looming. The ecosystem management systems that went along with the old methods (sustainable use of plants, animals, water, and land), developed over thousands of years, were becoming lost — and the ecosystem was suffering. It’s a phenomenon that occurs far beyond Chinchero, in fact. As Greenpeace reported, the textile industry’s impact on the environment in terms of water and land use, energy efficiency, waste production, chemical use, and greenhouse-gas emissions is alarming. Groups like SlowColor are trying to tackle this problem, as their website explains. “SlowColor rejuvenates centuries-old fabric dyeing techniques and handlooming traditions, protects the environment and creates fabrics that are healthy for life. SlowColor connects artisan to audience, tradition to global market.” And in the highlands of Peru, these are precisely the methods advocated by Callañaupa and the CTTC. As a teenager, Callañaupa became close friends with an older woman of the community, who taught her how to weave in the traditional ways. Callañaupa’s love of learning led her to become the first in her community to go to university, then on to study in the United States at Berkeley — and she took her spindle with her. Callañaupa easily could have made a life for herself away from Chinchero. But after earning graduate degrees, she returned to the lush valley of her youth, with a commitment to researching and revitalizing the ancient weaving and dyeing techniques of her elders. It was a calling that led Callañaupa to establish the CTTC in 1996. In addition to holding periodic dyeing workshops for weavers in the region, the Center runs programs for youth and elders. “Not only do I hope that young people will continue their traditions but I would like to see Inca children today experiencing the joy, sense of identity and accomplishment that spinning and weaving can bring to their lives,” says Callañaupa. In a relatively short span of time, this community, in which it seemed that the ancient ways would be lost forever, has reclaimed its roots — and the change has gone beyond the weaving. When you walk through Chinchero, perhaps through the Sunday market where many textiles are sold, many of the townspeople are dressed in traditional garb; as recently as 10 years ago, this wasn’t the case. It was Callañaupa and others in her community who encouraged the community to begin dressing as their ancestors had, as a way of strengthening their connection to the old ways — to strong criticism at first. It seemed, Callañaupa explains her book Textile Traditions of Chincero, “that what I was doing seemed to be going backwards in our history because traditional clothes were used by women without education, and educated people should change. Many women and girls received strong criticism, but we have already overcome that complex phase of unwarranted embarrassment.” It has been, in fact, by “going backwards” that Chinchero has not only survived but thrived. The old weaving techniques, once scorned, now have great value. More young people are staying in Chincero and making a living from weaving, as opposed to going to the cities and facing an uncertain and potentially dangerous future. Women are now economically empowered, which has a net positive effect on their families and the community as a whole. “We Are Helping the Land” Although preservation of their ecosystem is not the main objective of the Center, their work has had a positive impact on the land in any case. “By giving opportunity to the weavers,” Callañaupa says, “that creates income for families, so they don’t need to overwork the land for income [from agriculture] … we like alpaca wool, so we are raising more. When they graze in the open air, they fertilize the land. In some small scale, we are helping the land.” Water use is an important part of the picture, too. Any dyeing process — whether it’s with synthetic or natural dyes — uses large amounts of water, so to be environmentally responsible, there has to be some awareness of where the water comes from. The region of the CTTC is part of an innovative watershed services project that is protecting Lake Piuray, a major source of water for Cusco and Chinchero. This project is backed by the national water regulator, SUNASS, and executed with the funds of water users, via the Cusco water company (SEDACUSCO). Such a collaboration is unique, and has generated enthusiasm among the various actors and the desire to replicate these kinds of win-win projects throughout Peru. And after the dyeing process, there is the matter of the waste water. As SlowColor’s Tricia O’Keefe says about chemical dye use, “What happens to the after you’re done dyeing? Where are those chemicals going? That is a huge issue … the thing about the natural dyes is that you could completely recycle that water.” In using natural dyes over synthetic, Callañaupa and her weavers are ensuring that toxic chemicals are not released into the environment via the run-off water. The use of natural dyes over chemical dyes, the preservation and promotion of biodiversity in the indigenous plant and animal species that are vital to the weaving, in the bigger picture of recovering centuries-old environmentally friendly methods of weaving, has made the Center a model for climate change mitigation. Callañaupa’s work — which preserves and respects the ecosystem in which it exists — means that the ancient ways can work; in fact, they may do the best job at strengthening communities and improving livelihoods. This is vital, says O’Keefe. There is a trend of “migration from rural to urban, and then into urban poverty, because what skills do they really have once they get [to the cities]? … What’s happening to the land they’re abandoning?” Opportunities offered by the CTTC offer a positive scenario both the region’s people and the land. “It’s great in Peru that this is happening,” says O’Keefe. “It gives people at least a choice … If you want to stay in your rural village where you grew up, you actually have something sustainable to do that. If you want to go study computers in the city, you can do that. There are choices.” As the Alliance for Artisan Enterprise‘s Peggy Clark describes the reasoning behind her group’s support of Callañaupa, “One of the things that people think is that environment is separate from economy, so there’s not enough support and investment to move the needle and make a difference. The only way to do that is to broaden the tent. “Not only does [the work of the CTTC] make sense at a policy level or an investment level, it makes sense at an individual level. Like with Nilda and her family: they are preserving the natural environment as well as finding ways to create products from their environment for their livelihoods. They can send their kids to school, they can support their families.” Later this year, world leaders will gather in Paris for the next COP to find solutions for dealing with climate change. They will come by airplane and limousine, and they will fill the finest hotels. While they negotiate and debate, in a “cloud kingdom” across the world, a group of weavers, led by one woman, will be doing what their ancestors did for centuries, weaving stories of sustainability and solution, using the astonishing biodiversity of the region responsibly and with great success. As Callañaupa says, “It is becoming clear that the survival of diversity contributes to the valuable storehouse of world resources.” “Artisans are often the stewards of the natural world,” says Clark. “Often in traditional ways … they are working in their communities with products that are from their environment, be it fibers from leaves, bark from trees, or natural dyes from difference sources. So they are invested in ensuring that those resources will always be there.” In the introduction to one of Callañaupa’s books, Weaving in the Peruvian Highlands, anthropologist, ethnobotanist, author, and photographer Wade Davis writes: “These textiles are sacred cloth, woven from the threads of memory by Andean hands that are at last firmly in control of their destiny. Each tells a story, and each story is a prayer for the well-being of the people, the land, and the community.” Callañaupa’s work means that we can produce goods that have global value in a way that doesn’t ruin the soil or deplete the water table or poison the air. We can engage the youth in our communities in healthy, life-affirming activity, and we can reward their efforts with a sustainable livelihood. And while the leaders convene at COP, Callañaupa and her weavers will be creating art — each piece a “story” — that preserves and promotes the biodiversity that sustains us all, one thread at a time. This report was filed by Ann Clark Espuelas.
<urn:uuid:e54d6356-3d26-4299-a17b-c68063dfc166>
CC-MAIN-2022-33
https://julzcrafts.com/tag/textiles/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00604.warc.gz
en
0.970778
3,141
3.0625
3
“ I hate to tell you...but the black jews are not dead. Not yet.” Scientists suspect excessive melanin was the cause of the Black Death. |Carried by||Varies (see text)| |Causes||Varies (see text)| |Treatment||Varies (see text)| |Deadliness||Varies (see text)| |Usefulness of this information box||Not very| The Black Death, or the Black Plague (not to be confused with Jack Black) was a deadly infectious disease pandemic of the 1300s believed by historians to have resulted in the deaths of 50 million people worldwide, killing over 60% of Europe's population. Other more conservative estimates place the death toll at "a buttload", but never below "a whole damned lot", and it is widely recognized as the worst plague since sliced bread. Of the exact count nobody is sure, for anyone who could have told so is currently either deceased or unavailable, and nobody thought it important enough to keep track. Newly discovered evidence, however, suggests that they lost count. The disease is named so because it causes the pigment of the skin to darken and afflicts the speech centers of the brain, degrading the victim's ability to speak any language but jive. Few know what the mysterious cause of this disease was. Some believe it was those rat bastards and others claim it was the fleas on those rat bastards. Leaders from a few prominent organizations, however, took a more nuanced approach and accused the Jews of causing it all by killing Jesus and altogether being racially inferior. A really spoiled, dickish, smart-alecky, stuck-up (and therefore extremely rich) prick from some high-class family who obtained a doctorate in law, medicine and the new scientific field of study of "being a dick" from some big-name Ivy League school said that the disease was caused by the presence of a certain pathogen in the body. He was subsequently classified as one of the bourgeois oppressors and lynched. Other researchers believe the Black Death to be caused by excessive stereotyping and racism, or the mere result of extreme paranoia and severe xenophobia. Upon the announcement on televised news that paranoia and xenophobia might cause the deadly disease, society was immediately hurled into chaos and anarchy while the entire public panicked about in the streets, looting and rioting, in some hysterical, apocalyptic craze. This would become known as the Harlem Race Riot. It was really hard to be cured, but rats and fleas started it. By biting the rats or humans and infecting them... Symptoms and Progression The first sign of the Black Death was an unusual predilection for Eddie Murphy videos. Within days, these poor, formerly white people would begin listening to the rap and the hip-hop musics, and show a peculiar interest in Ebonics and slang. These victims would then start to wear baggy clothing, sag their pants to their knees and wear boxer shorts. In some of the worse cases, they would become extremely skilled in athletics and sports, and may even find themselves accepted to random basketball teams without trying out beforehand. As the disease progressed, the helpless victim's skin color began to darken. Women would find that their buttocks are experiencing abnormal growth, while men would find that all of those "natural male enhancement" medications are actually beginning to pay off. Once its victims turned black, they would never go back. In the final stages, the victim would begin to rant about how the White Man is always keeping them down and the prevalence of racism "in ev'y damn ho an' playa". Shortly thereafter, the victim is usually smoked in a drive-by. Some victims reportedly became so crippled with AIDS that they could do nothing to prevent a large black man from coming into their house, having his way with their wife, eating their food, drinking their milk, going back in for seconds on their wife, staying over for dinner, humping their wife a few more times and then stealing their bike. Thus, the Black Death is sometimes known as "Hey, that dude gone stole mah bike!" syndrome. But in the end it is a well known white man`s disease, just like most diseases in the world. Scientists and historians hold the current belief that the plague started in Israel as punishment for a bunch of Jews stealing stuff like they always do, while some religious groups say that God did it because he hates America, the City Council of Salem, Massachusetts blames witches, and Joseph McCarthy blames Karl Marx. Others call these ideas ridiculous and say that it was obviously the lepers' and cats' faults. In the modern era, however, people know this was part of the blacks' conspiracy to genocide the superior white people and steal white women to make interracial internet pr0ns. The magnanimous Europeans, however, helped the poor Africans and liberated them from the Black Death by invading Africa, divvying up the land amongst themselves in order to conduct a more organized effort, setting up temporary posts to collect for their quest to save human civilization all the necessary resources, and then setting about, destroying any trace of the disease. To make the process go more quickly, the Africans were moved to temporary relocation camps where they were fed and where more sophisticated people educated the Africans on why their culture was inferior, their religious beliefs wrong, and their rituals barbaric. At some of the more labor-intensive camps, these Africans were taught the advantages of forced labor and the proper punishments for not understanding these advantages. Somehow, it all turned into a really big misunderstanding, which wasn't quite cleared up until the late 1800s or so, while the countries continued to stay in Africa for another century until they were sure that the reason all Africans were black wasn't because they had some sort of disease. Spread Through Europe Whatever the origins, the Black Death quickly went on tour throughout Europe, hitting the 80s' rock band particularly hard and inspiring the dying members to write and release their one hit, "Final Countdown." The disease hit the continent much like a mother-in-law, leaving destruction in its wake only to come back time and again, year after year, to start the process anew. By the time of the last outbreak of the Black Death in 2003, some 89.4% of the European population had succumbed to the plague. Attempts to Fight In attempt to combat the disease, Europeans began shipping the afflicted to Africa. Unfortunately, slave traders brought these exiles back and sold them as servants. Thus, Europe was hit hardest of all, with some heavily afflicted areas suffering a mortality rate of over 90.00%. Cities attempted to dispose of their dead by throwing them into the river, until someone realized that these bodies were probably what was contaminating the water, giving everyone typhoid and generally making things worse. Thus, the dead were then dumped in the rivers of rival towns. Most doctors, realizing that Europe was absolutely screwed, left. Thus, ordinary peasants volunteered as plague doctors, tasked with the job of filling in for the real doctors by telling the infected just how fucked they were. Thus, without licensed physicians, treatments for the disease began to include the wearing of white hoods and gowns, while other ways included persecuting minorities and Jews. Less effective methods included rubbing the afflicted with black rats, flogging oneself and drinking poison. The best method, as discovered by the Irish and the Scottish, was getting stone drunk. The South of the United States suffered an outbreak of the Black Plague after the end of its Civil War in 1865, which Southerners attempted to combat by separating the non-afflicted from those who were afflicted. Although successful, the situation took a turn for the worse when President Lyndon B. Johnson decided that this violated the blacks' constitutional right to turn everyone black and steal their bikes. The most obvious effect of the Black Death was a decrease in the world's population. Since most of those who were infected were poor, poverty levels amongst whites decreased greatly, while blacks consequently became extremely poor. Most modern white people agree, however, that it was all the black people's fault for catching the disease in the first place. As tradition in Europe, most of the blame for the disease went towards the Jews. Thus, Europeans kept themselves busy for the next few centuries by ignoring any evidence to the contrary of their conclusion while they persecuted the Jews. Since clergymen could not, in fact, cure deadly diseases, and more often than not contracted the disease themselves and died, many began to realize that the clergy were not all that holy, and the clergy began to realize that their healthcare plan was absolute bullocks. With all the dying and such, some Europeans (most prominently the descendants of the Goths, Visigoths and Ostrogoths) became obsessed with black and death and took it upon themselves to be miserable all the time for no real reason whatsoever. This would later turn into the movement known as "Romanticism". In addition, European art and literature, which was hitherto primarily used as kindling, had, instead of just containing random scribbles, actually started to portray a time or place, a highly revolutionary concept. Eventually, people began reading books before burning them, and after the discovery of wood, stopped burning books except on weekends and holidays. However, those who read a book and didn't burn it afterward were still declared witches and burned at the stake (with their book). From here, it is almost unanimously accepted that art began to go downhill. - Some people died more than once or twice. The disease was so horrible that it killed one some 25 times, took an hour for lunch, came back ten minutes late, received a stern warning from its manager, daydreamed for a bit, pretended to be a lumberjack, accidentally cut a coworker in half with a chainsaw, received another warning from its manager and then finally got around to killing the infected another 25 times before deciding it was finished and took the rest of the day off to lay low and avoid the police.
<urn:uuid:e8748e30-8c1e-49e8-8380-5954e1459fcd>
CC-MAIN-2022-33
https://uncyclopedia.com/wiki/Black_Plague
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00405.warc.gz
en
0.979169
2,105
2.84375
3
#24: What Are The Implications Of This Week's Supreme Court Ruling In West Virginia vs. EPA? A big Supreme Court decision landed Thursday, which will shape the U.S. Government's ability to regulate emissions. This leads to important realities around coordination, politics and certainty. PRESSED FOR TIME? In an enormous two weeks of judgments in the U.S Supreme Court, a 6-3 conservative majority ruled the EPA did not have the authority to regulate power plant emissions in the way they hoped. It’s both a very big deal and not all bad because the judgment stopped short of more sweeping action, and so much action on air quality and emissions reductions are actually taken at the local/city level. Understanding this decision is important for thinking about how hard it will be to see coordinated action in the U.S. for the foreseeable future, but also why this leaves investors and consumers with windows of opportunity if they understand existing trends. WHAT IS THE KEY HISTORY LEADING UP TO THIS CASE? The Clean Air Act, which some legal experts call the most powerful environmental law in the world, was enacted in 1970, at the birth of the environmental movement. Since then it has been the source of scores of landmark regulations on air pollution, including soot, smog, mercury and the toxic chemicals that cause acid rain. The Clean Air Act does not explicitly direct the EPA to regulate carbon dioxide — rather, it more broadly asks the agency to regulate pollutants that “endanger human health.” In 2007, the Supreme Court ordered the EPA to determine whether carbon dioxide fit that description, and in 2009, the agency concluded that it did. As recently as 2009, the Clean Air Act was generally not viewed by climate policy advocates as a great tool for greenhouse gas regulation; it was a fallback and politically tradable for getting bipartisan Congressional action on climate. The late 2000s feels like a foreign country in many ways, but to refresh: actors such as Sens. John Kerry (D-MA) and Lindsey Graham (R-SC) worked on bipartisan cap and trade bills that never succeeded. Other 2000s-era proposals included Sen. John McCain (R-AZ), who sponsored multiple global warming pollution reduction bills and advocated significant reductions during his 2008 presidential campaign. Sen. Olympia Snowe (R-ME) also co-sponsored global warming bills in previous Congresses. And in 2006, Sen. Sam Brownback (R-KS) said: “It seems to me just prudent that we recognise we have climate increase and temperature change. We have CO2 loading and we need to reduce the amount of CO2 in the atmosphere.” None of these senators publicly supported action or engaged in serious negotiations with key climate legislation crafters Sens. Kerry, Lieberman, or Graham in 2010. (NB: This history will be important to understand when we reach one of the judgment’s main points). Unfortunately, there was not a 60-vote supermajority for climate action in the Senate in 2010, a time when the Democratic majority including a substantial number of members from fossil fuel extraction states. In 2010, House Democrats from states like Louisiana, North Dakota, Nebraska approached the Obama White House and recommended they shelve their signature climate change legislation plans. Where are many of those House members today? Defeated anyway, or gerrymandered out of contention as America’s red and blue states have become ever more polarised at the local level. Obviously, as far as legislative numbers go, we are in no better situation today. For context, the first Clean Air Act, Clean Water Act, Endangered Species Act, and Resource Conservation and Recovery Act (hazardous waste disposal) were all enacted when unemployment was 6 percent or lower. Another way to say this: it’s historically been hard to pass environmental legislation when the economy is a greater priority for legislators and voters. President Obama, after unsuccessfully trying to enact a climate change law through Congress, turned to the Clean Air Act, using it to release major regulations on vehicle and power plant pollution. The controversial rules were intended to transform the nation’s economy — shifting Americans from gasoline-powered cars to electric vehicles and from coal and gas-fired power plants to wind and solar-powered electricity. The Clean Power Plan, announced by Obama in August 2015, set the first-ever limits on carbon pollution from U.S. power plants. The Supreme Court then stayed the implementation of the Clean Power Plan in 2016 (NB: This was a radical decision by almost any measurement, it simply didn’t let the law proceed and there was no precedent for doing this when it was under review in lower courts). The Trump Administration then rolled back the Clean Power Plan, which meant the Supreme Court really had to backflip in a few different ways to even hear a case for a programme that wasn’t even in existence. WHAT IS THE DECISION FOR A NON-LAWYER? On Thursday morning, Chief Justice Roberts led the conservative judges in a 6-3 ruling, which effectively focused on Section. 111 of the Clean Air Act, and stated the following: The EPA does not have the authority to adopt what are called ‘generation shifting’ rules under this Section. 111 provision, which are rules that would require power plants to use methods of producing energy other than coal, in order to reduce its emissions below the level set by the EPA The EPA is not prohibited from regulating other kinds of greenhouse gases Broader problems with the Clean Air Act were not found Broader problems with the EPA were not found Broader problems with the regulatory process at large were not found IN THE LAST 24 HOURS I’VE JUST LEARNED ABOUT THE “MAJOR DECISIONS DOCTRINE”, WHAT DOES THIS MEAN? The Court based its decision largely on a relatively new idea, with next to no precedent in the history of the Court before this century. It began from a case known as FDA v. Brown & Williamson Tobacco Corp, where the Food and Drug Administration claimed that its authority over “drugs” and “devices” included the power to regulate, and even ban, tobacco products. The Court said on that occasion they felt the FDA didn’t have the authority to leap into a multi-billion industry, not directly connected to drugs and devices, and begin sweeping reforms (that would ultimately lead to its permanent hobbling). At the end of their opinion, the majority included a small section effectively saying they didn’t believe the statutory analysis gave the agency the right to do something so economically or politically significant. And this, in only the year 2000, is where the ‘major decisions doctrine’ had its first seed planted. In plain English, it’s saying if a Federal agency wants to do something related to an area of major economic and political significance (i.e. something contentious), there’d better be clear direction from Congress this was intended. Congress does not usually grant agencies the authority to decide significant issues on which they have no particular expertise. So when there is a mismatch between the agency’s usual portfolio and a given assertion of power, courts have reason to question whether Congress intended a delegation to go so far. This new doctrine argues that when power is given to a Federal agency, Congress must be very specific if it relates to a “major decision”. Bluntly, it's a legal theory that conservative judges have used with increasing rigour to place special obstacles on important regulatory initiatives, and because it’s ambiguous what a ‘major decision’ might be, it hasn’t appeared in a clear decision until very recently. The Court has determined the EPA’s regulation of greenhouse gases fits this description, and so it expects Congress to be explicit in the future. A counterargument is well put by Justice Kagan in her dissension: “Over time, the administrative delegations Congress has made have helped to build a modern Nation. Congress wanted fewer workers killed in industrial accidents. It wanted to prevent plane crashes, and reduce the deadliness of car wrecks. It wanted to ensure that consumer products didn’t catch fire. It wanted to stop the routine adulteration of food and improve the safety and efficacy of medications. And it wanted cleaner air and water. If an American could go back in time, she might be astonished by how much progress has occurred in all those areas. It didn’t happen through legislation alone. It happened because Congress gave broad-ranging powers to administrative agencies, and those agencies then filled in—rule by rule by rule—Congress’s policy outlines. This Court has historically known enough not to get in the way.” IS THIS DECISION THE END OF THE WORLD? Honestly, no. I have great respect for many observers who have given takes I simply wouldn’t agree with at all: To restate, this decision was not the cataclysmic piece of judicial activism many feared. The EPA is free to keep regulating greenhouse emissions, and the rest of the Clean Air Act received no mention. This newsletter enjoys an audience of both conservative and liberal readers on these shores, and in the spirit of hearing multiple perspectives — A conservative worldview would be right to say any of the following: The conservative members of the Supreme Court are educated people, and likely no less concerned about climate change than the vast majority of the population. They simply approach this problem like many others with scepticism the administrative state is as efficient as the liberal parts of America would like to believe Chief Justice Roberts in his opinion writes, in response to Kagan’s dissent: “In reaching its judgment, the Court hardly professes to “appoin[t] itself” “the decision-maker on climate policy.” This is in part, true: if they truly wanted to be activist they could’ve ruled the Clean Air Act had no place in regulating carbon, and thrown down the gauntlet to Congress to pass new legislation dedicated to this issue. Chief Justice Roberts also wrote: “[T]he Court acknowledges only that, under our Constitution, the people’s elected representatives in Congress are the decision makers here—and they have not clearly granted the agency the authority it claims for itself.” The first sentence of this last point is infuriatingly true. Congress simply doesn’t do enough. Democrats and moderate Republicans who see the value in clearer, more sweeping climate legislation fail to make the case in the public arena, and for this reason imperfect but worthwhile legislation has stalled for two decades. The frustration you see across social media at this decision is partly driven by the present cultural frustrations with the Court and its composition, but also (if we’re honest) government as a whole for not leading as it should. A liberal worldview would also be right with the following rebuttals: The truth is we don’t know what a 6-3 majority court will say on greenhouse gases until another case is brought forward. Chief Justice Roberts writing a lead judgment has shielded the other conservatives from showing their colours, and so we are left to wonder what kind of (more hawkish, anti-regulation) 5-4 decisions might arise in the future. The majority decision does not have the intellectual rigour and textual commitment of the Kagan dissent (it would be hard for a legal scholar to say otherwise), and so concern on future decisions is not baseless. There is a large problem at the heart of a conservative court seeking to roll back regulations and limit the actions of the administrative state with something like the major decisions doctrine. Industry actually hates it when regulations are uncertain. The nature of energy infrastructure means firms need clarity in multi-year and multi-decade capex timelines. Want evidence of this? Virtually the entire power industry sided with the EPA in this case! When governments set 2030 and 2040 targets, even when industry is opposed to the aggressive nature of them, they appreciate the roadmap. If a judge now invokes a major decisions doctrine and a subsidy, grant scheme, transition directive or pollution cap is held up in the courts for years, it’s bad for consumers and investors. WHERE TO FROM HERE? As ever, Climate and Money sees positive news on a few fronts. Coal (and increasingly gas) power plants can’t compete with renewable energy and Supreme Court decisions won't change that. This Energy Innovation Report found 80% of U.S. coal plants are already more expensive to run than replacement with local renewables Utilities keep announcing coal retirements (or are being driven into bankruptcy by hanging onto coal) — GA Power, Duke, AES, to name a few. None of those decisions were driven by greenhouse gas regulations, there is a cost reality to the overall investment cycle of renewables that is proving increasingly compelling Whenever we burn fossil fuels in power plants (or anywhere else) it creates dangerous air & water pollution like mercury, lead, arsenic, smog. Breathing deadly air is politically unpopular everywhere. This decision leaves that squarely within the EPA's authority, and they'll keep tackling that pollution, much of which leads to ancillary steps that address/close down the fossil fuel supply chain States, counties and cities keep locking in renewable energy mandates — 1 in 3 Americans live in a place committed to 100% clean energy, and in just the past year states including MD, CT, and RI have joined the list of those with strong net-zero laws on the books. The last point is especially instructive. Just like the world cannot fix climate change in one coordinated act, the U.S. is no different. American public policy’s role in decarbonisation is much like the rest of the federal experiment: laws, directives, targets and deadlines across different cities and states produce many results. And what is the ultimate result? College educated talent and capital flows to cities with the best air quality, the cleanest rivers and lakes (or at least plans to keep cleaning them), the widest range of transport options, the biggest commitments to accessible green space, and the most liveable features of a sustainable place. Look at any liveable cities table and you’ll find the top places started building sustainability elements into their laws a long time ago. Were I an investor, I’d keep following that trend. The Supreme Court’s decision this week placed a handbrake on the EPA’s effort in one domain, but the velocity of change, and the early mover advantage enjoyed by cities and jurisdictions that are pressing on regardless, is irrefutable. Given this is the free market and creative local government at work in countless urban experiments, the Court can do little to slow this. Owen C. Woolcock 3 Questions I Am Asking Myself This Week 1. A caveat on my own writing above. 2. The Supreme Court judgment in full. 3. A different perspective on another topic? Interesting.
<urn:uuid:dc3f9662-c119-4f60-9830-a3a884c803e6>
CC-MAIN-2022-33
https://climateandmoney.com/p/24-what-are-the-implications-of-this#%C2%A7what-is-the-key-history-leading-up-to-this-case
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00000.warc.gz
en
0.953939
3,108
2.765625
3
For as long as cars have existed, three fundamental truths appeared to be eternal. First, every car contains safety critical components, second these components are mostly metal and third, they are manufactured by one of two methods—stamping or cold forming. These eternal truths always led to an equally durable legal reality, that if the safety critical component fails the manufacturer will be liable to the injured party. It’s hard to think of a more trite and dependable set of principles. But these timeless precepts are about to become disrupted as the automotive industry continues to explore the innovation of 3D printing. Also known as additive manufacturing, 3D printing is attractive to automobile manufacturers and other entities looking to expand their footprint in the industry because of its unique advantages—namely reduced costs, reduced times for production, and customization. With these novel benefits, however, come unprecedented liability questions. Imaginary Case Study To demonstrate this let’s take an imaginary future scenario. A driver takes his truck in for service and discovers that it needs new brake discs. Unfortunately, these are out of stock and there is a three day wait to source the genuine ‘OE’ (original equipment) parts from the manufacturer. Since these are safety critical components, the customer wants OE parts, but he also does not want to wait 3 days. Now, suppose the dealer offers a solution: he has a 3D printer which he purchased online, the necessary print materials from a third party vendor and a CAD file provided by the manufacturer. With these assets he offers to create a set of brake discs the same day, by 3D printing. This sounds good to the customer, who happily accepts. At this point, this story looks like a case for the virtues of 3D printing. Aluminium is difficult to work with by conventional means, but it is ideal for 3D printing, and parts can be printed, even customized, on demand. So far so good. Now suppose that a week later the brake discs underperform and lead to a catastrophe. Let us pause to remember the steps which manufacturers follow to create safety-critical parts. They can be summarised as 1) material selection 2) design 3) manufacturing 4) testing and 5) quality assurance. These five stages will be recognised as the conventional ‘process pentagon’. But in this case, none of these things have happened. The manufacturer may have provided the CAD file but had no other direct involvement in the part or its manufacture. The component may not have been made from the selected material in accordance with the design, there was no production control, or post manufacture testing or quality assurance. Key Issues & Uncertainties From a litigation standpoint, who is responsible for the accident? This question introduces a number of variables which never existed in the automobile industry under the traditional manufacturing model. Were these brake discs even original equipment? Was the vehicle subject to an unauthorised modification such, quite apart from invalidating the warranty, it relieves the manufacturer of all liability? The uncertainty does not stop at these threshold questions about where liability rests in the design and manufacture process. The above scenario also leads to several unique questions which span the main three theories of products liability law – defect in design, manufacture and warning. In terms of design defect, the primary issue is who is the designer? Assuming the manufacturer who provides the CAD file is considered a designer, then design defect inquiries will focus on the testing done by the manufacturer before releasing that CAD file. But with 3D printing, how does the manufacturer know what exact materials, manufacturing environment, and printer the dealer will use? Does the manufacturer need to test for all of these “worst case scenarios”? Perhaps not, but then the manufacturer will need to provide adequate warnings on these issues, which will then lead to potential ‘failure to warn’ claims. Warnings and disclaimers to customers are critical for manufacturers. But with 3D printing parts, the warnings accompanying the CAD files are equally critical. The customer is likely to be a dealer or some other trade intermediary, not an end user. As noted above, there are a number of variables that could greatly impact the manufacturer of a 3D printed part. As a designer of the CAD file it is nearly impossible to envision, let along test all of these scenarios. Thus, it will be critical, but not easy, to give clear warnings around many variables, such as the conditions in which 3D printed parts have been and should be tested. For example, a critical factor in 3D printing is the build path, i.e.,the physical path the printer takes to build a product—clockwise, diagonal, etc. Because the materials used are likely to be hot when applied, how long a layer has to cool before the next layer is added could greatly impact the strength of the part. The manufacturer may have tested the design with one ideal build path, but if that build path is not exactly followed by the dealer, the integrity of the part may be impacted. The manufacturer will therefore need to provide clear and precise warnings on the exact build path to be used and the risks and concerns if going outside of those specifications. Build path is just one example of a variable to be warned against. Specifications will also need to be considered regarding the materials selected, the climate in which the printing takes place, and ensuring integration between the printer and the software selected. Manufacturers may also seek to shift testing responsibility to the dealer, and with justification. To take another example, 3D printing of metal parts is often done using raw powder which is expensive. Each print will likely leave unused powder. In other industries using 3D printing, this material is often “recycled” for use in a later print. For medical devices, for example, the FDA has issued draft guidance that a device manufacturer should provide specific warnings regarding the maximum percentage of recycled powder that can be used in any print. Otherwise, a disproportionate amount of recycled powder, that may have already been altered or compromised by being exposed to a prior printing environment, can lead to a deviation from the intended specification of the product. Similarly, other variables that could impact the integrity of a printed part include the age and maintenance of the printer used, integration of the printer and selected software, the temperature where the print is performed, and any cross contamination of the powder with material or powder inadvertently left in the machine from a prior print. 3D printing is ripe for potential manufacturing defect claims given the number of variables in each print. Dealers, manufacturers, printer manufacturers and material vendors all need to be aware of these variables, and be sure to have warnings and safeguards in place for preventing, or at least mitigating, the risk of manufacturing deviations. Despite these unique challenges, 3D printing remains an exciting opportunity in the automotive industry. The opportunities and potential of this innovation are seemingly endless and the continued evolution of the technology will benefit both manufacturers and consumers. Nothing in this article is intended to dampen the spirits of those pursuing this innovation. However, such enthusiasm should not blind manufacturers from seeing unique potential liability risks, especially where the innovation is moving quickly and is outpacing the regulation. This makes it all the more critical that all entities in the design and manufacture chain carefully evaluate each step of the process and implement necessary safeguards and warnings to best protect themselves against unique products liability issues and challenges that may arise if a catastrophe occurs. About the Authors Sean Burke is the partner and vice-chair of the products liability trial division at Duane Morris. He is in the firm’s Washington, DC office. Mr. Burke’s practice focuses on the representation of manufacturers of medical devices in product liability cases across the country, including in consolidated multi-plaintiff matters in both federal court and state courts. His experience includes the defense of large total joint replacements (hips, knees, ankles, and shoulders) and resurfacings, tissue matrices and patches, fusion plates, and surgical instruments. He has a particular interest and focuses on additive manufacturing, consulting, and advising clients on best practices in the early stages of development to reduce the risk of product liability exposure. He has tried medical device cases before juries in both state and federal courts while also handling numerous mediations. He works closely with scientific experts to advance causation and liability defenses in the areas of biomechanical engineering, toxicology, histology, epidemiology, orthopedic surgery and FDA regulations. Alexander M. Geisler is a team lead for the Duane Morris Transportation/Automotive Industry group. He practices in the areas of commercial litigation and dispute resolution, with an emphasis on product compliance, safety compliance, and product liability. Mr Geisler is well-known in the auto industry as a manufacturer’s lawyer. He defends auto makers and suppliers in litigation all over the world, both as a trial lawyer and a defence coordinator. His workplace is largely field-based, at manufacturing plants, accident locations and courtrooms. Mr Geisler also advises manufacturers on regulatory and ethical issues affecting autonomous vehicles, and he is retained for future-proofing projects, investigations, process reviews and silo-busting exercises, as well as supporting recalls and managing critical concerns. Subscribe to Our Email Newsletter Stay up-to-date on all the latest news from the 3D printing industry and recieve information and offers from thrid party vendors. You May Also Like 3D Printed Biocomposites Could Help Reduce Marine Plastic Pollution Concerns about the impact of plastic litter and microplastics in the oceans are at the forefront of environmental study. For decades, the marine environment has suffered from the degradation of... Markforged Buys Digital Metal: What Does it Mean for the 3D Printing Industry? It’s been a few months since the additive manufacturing (AM) industry had a notable corporate acquisition, which seems like an eternity after all the competitive consolidation and shakeup we saw... Black Buffalo Partners with Xerox to Finance Client’s Construction 3D Printing Purchases Black Buffalo 3D, an emerging additive construction (AC) startup, announced a strategic partnership with FITTLE, Xerox’s equipment financing arm. Through the alliance, FITTLE will help make it easier for Black... 3D Printing News Briefs, July 21, 2022: Layoffs, Heat Exchangers, & More In today’s 3D Printing News Briefs, starting with business, manufacturing company Fast Radius recently cut 20% of its workforce. Then, Xometry has introduced new digital sourcing tools and more. A...
<urn:uuid:d64bb2c4-454f-4778-b927-ebccb632e5fc>
CC-MAIN-2022-33
https://3dprint.com/277706/3d-printing-and-its-implications-for-the-auto-industry/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00605.warc.gz
en
0.946644
2,172
2.609375
3
Eating behavior is an issue that creates greater interest and concern overtime, since the physical and mental health affectation of people is increasing day by day and so it presents a relevant role within it. The brain has a set of mechanisms that motivate us to eat and drink and even induces the consumption of the type of nutrients that are needed for each moment. These mechanisms, such as emotions, cognition or motivation, can be influenced and/or altered by multiple factors. Psychopathology and psychotropic medications may affect eating behavior, either by increasing or decreasing food intake. The foods and nutrients that are ingested may also affect our emotional state and even alter the absorption of psychotropic drugs. In addition, this behavior is also directly influenced by the society in which we live: the standards of beauty highlighted in the media or even our closest environment can affect our self-esteem and, consequently, our patterns of eating. All of these factors are important for those healthcare professionals in nutrition and psychology, for them to understand how eating behavior works and how to deal with it during consultation. The Psychology and Psychopathology of Nutrition program aims to offer education in psychology and neuroscience applied to the field of nutrition to address all situations that you may find as a healthcare professional in day to day nutrition and psychology. Who is the programme for? The Psychology and Psychopathology of Nutrition program is aimed at: - Nutritionists who wish to specialize in the field of psychology in food and nutrition. - Psychologists who wish to deepen their education on eating behavior. - All those healthcare professionals who want to consolidate and/or expand their knowledge in the area of psychology applied to nutrition. The Psychology and Psychopathology of Nutrition program is the ideal supplement for those professionals interested in broadening their education in the Psychology of Nutrition. The successful completion of the Program will allow the student to obtain the degree of Experto Universitario en PSICOLOGÍA Y PSICOPATOLOGÍA DE LA NUTRICIÓN, issued by the University where he or she has registered. The Psychology and Psychopathology of Nutrition program has a duration of 6 months. Regarding time distribution: - Since it is an online program, it does not have a specific starting date, by which the student may enroll at any time, provided there is available space. - The Program has a maximum time of 6 months to be completed. During this period, the student must have completed the evaluations corresponding to the subjects. The credit structure of the Psychology and Psychopathology of Nutrition program is as follows: a. The equivalence in credits may vary according to the University that issues the Diploma. One (1) ECTS credit (European Credit Transfer System) corresponds to 10 + 15 hours. If students attending the program are enrolled in a university not belonging to the European Higher Education Area (EHEA), the relationship between credits and hours may vary. b. Length in months. - Provide the healthcare professional with the tools to optimize nutritional and psychological care for their patients. - Learning the fundamentals involved in neurological and psychological motivation, emotions and cognition, and how these have an impact on people’s diets. - Analyzing the influence of the different elements - such as the media, the environment or family, among others - that can affect our eating behavior. - Understanding how psychopathology and psychoactive drugs can interfere in eating behaviors and vice versa. - Providing the professional with the tools that facilitate detecting and and taking action before an altered eating behavior. Some of the careers in the Psychology and Psychopathology of Nutrition are as follow: - Psychologists, nutritionists, physicians, nurses and other healthcare professionals exercising their profession who wish to specialize in the field of psychology and psychopathology applied to the field of nutrition. - Teachers in formal and non-formal education teaching programs. - Advisors associated with sick people who have an altered eating behavior. Note: practicing the profession is governed by the laws of each individual country. The subjects of the Psychology and Psychopathology of Nutrition course aim to ensure that students acquire an overall idea of psychobiological and neurological foundations and eating behavior, as well as those influencing factors and existing disorders, for use by healthcare professionals to channel this knowledge into their performance as usual. The corresponding subjects and credits of the program are shown in the following table: |PSYCHOLOGY AND PSYCHOPATHOLOGY OF NUTRITION| |1||Neuroscience and Psychobiology||40| |2||Psychology and Psychopathology within the Field of Nutrition||40| |3||Mass Media Influence on Eating Behavior||30| |4||Psychological Orientation in Nutritional Counseling||40| Note: The contents of the academic program may be subject to slight modifications, depending on the updates or the improvements made. - Dr. Maurizio Antonio Battino. Biochemist researcher and professor at the School of Specialization in Food Science. Professor at the Polytechnic University of Marche. Scientific Director in the European University of the Atlantic. General Academic Coordination - Dr. Irma Dominguez Azpíroz. International Academic Coordinator of the postgraduate area in Health. Nutritionist and Doctoral candidate in Education. - Dr. Laura Natalia Pérez. Doctor (Cum Laude) and Master's Degree in Cognitive Science and Language from the University of Barcelona, Spain. Academic Director of the Master’s Degree in Clinical and Health Psychology and teacher at the International Iberoamerican University in Mexico. Teaching staff and Authors - Dr. Angélica Quintero Flórez. Doctor in Health Sciences from the University of Jaén. Professor at the International Iberoamerican University. - Dr. Cecilia Otero.Doctor in Neuropsychology and Master in Clinical Neuropsychology from the University of Santiago de Compostela. - Dr. Joana Pérez. Doctor in Psychology: Individual, Group, Organization and Culture and Degree in Psychology from the University of the Basque Country. - Dr. Tatiana Lacruz Gascón. Doctor in Clinical and Health Psychology from the Autonomous University in Madrid. Master's degree in General Health Psychology from the Autonomous University in Madrid. - Dr. Paola Espinoza Guzman. Doctor in Clinical and Health Psychology from the University of Barcelona. Professor in Masters in Psychology, Nutrition and Medicine at the Autonomous University in Barcelona and at the University in Barcelona. - Dr. Priscilla Almeida. Doctor in Biomedicine, University of Zaragoza. Professor at the International Iberoamerican University - Dr. Angélica Quintero Flórez. Doctor in Health Sciences. Professor at the International Iberoamerican University. - Dr. Andrea Arreguín. Doctor and Master's Degree in Nutrigenomics and Personalized Nutrition from the University of the Balearic Islands. Professor at the International Iberoamerican University. - Dr. Mercedes Briones. International Doctorates in Child Nutrition, University of Granada. Professor at the International Iberoamerican University. - Dr. Nohora Milena Martínez. Doctor in the Mental Health Program: Genetics and environment by the Universitat Rovira i Virigili and University of Almería. - Dr. Susana Martínez. Doctor in Biology from the University of León. Professor in the European University of the Atlantic. - Dr. Isabel Martorell. Doctorate in Biomedicine, Rovira i Virgili University. Professor at the International Iberoamerican University. - Dr. Claudia Nelly Orozco. Doctor of Public Health Sciences from the University of Guadalajara. Professor at the International Iberoamerican University. - Dr. Silvia Quer. Doctorate in Clinical Psychology and Health. Professor at the International Iberoamerican University. - Dr. Clicia Jatahy Peixoto. Doctor in Psychogerontology. Professor at the International Iberoamerican University and the International University in Valencia. - Dr. Iñaki Jordi Elío. Doctor in Health and Nutrition Projects in International Iberoamerican University. Academic Director and professor in the Degree in Human Nutrition and Dietetics in the European University of the Atlantic. - Dr. Sandra Sumalla. Doctor in Health and Nutrition Projects in International Iberoamerican University. Dean and professor in the Faculty of Health Sciences in European University of the Atlantic. - Dr. Rosa Elena Yáñez. Doctorate in Nutrition and Metabolism, Rovira i Virgili University. Professor at the International Iberoamerican University. - Dr. (c) Irma Domínguez. Doctoral Candidate in Education by the Iberoamerican International University. Professor in the European University of the Atlantic. - Dr. (c) Anna Marín. Doctoral Candidate in Education. Professor in the European University of the Atlantic. - Dr. (c) Thania Chio. Doctoral Candidate in Education. Professor at the International Iberoamerican University and collaborating universities. - Dr. (c) Lucibel Vásquez. Doctoral candidate in Psychosocial Intervention. Professor at the International Iberoamerican University. - Mg. Laura Martín. Master in International Health and Cooperation and Expert in Digital Health Communication and Marketing. Consultant/Auditor of Food Quality. Professor at the International Iberoamerican University. - Mg. María Eugenia Delvaux. Master in Nutrition and International Dietetics. Professor at the International Iberoamerican University. FUNIBER Training Scholarships The Iberoamerican University Foundation (FUNIBER) periodically destines financial resources of an extraordinary nature for the FUNIBER Scholarships. To apply, please fill out the information request form that appears in the FUNIBER website or directly contact the Foundation’s office in your country who will inform you if you need to provide any additional information. Once the documentation is received, the Evaluation Committee will determine your application's eligibility for the FUNIBER Scholarship.
<urn:uuid:40ef6319-608c-4dcc-a7b5-02e7a920790b>
CC-MAIN-2022-33
https://www.funiber.us/psychology-and-Psychopathology-of-nutrition
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00605.warc.gz
en
0.857402
2,227
2.640625
3
Brighter, younger, healthier looking skin? We’d all say yes to that. Exfoliation is to key to a smoother, glowing complexion but it’s a step often neglected in our regular routine. Let’s take a look at what you need to know about exfoliation and why it’s an essential part of a healthy skincare routine, no matter your skin type. What is skin exfoliation? Exfoliation is the removal of dead skin cells from the surface of the outer most layer of your skin; the epidermis. Exfoliation freshens, smooths and brightens skin by combating the effects of ageing and environmental stress which leaves skin looking wrinkled, dull, and uneven. The life cycle of a skin cell Let’s get started from the beginning. Our skin naturally sheds dead skin cells through a process called desquamation. The epidermis has five layers and new skin cells are produced in the deepest layer called the basal layer. The new, springy cells are ‘born’ in the basal layer and travel through the layers of the epidermis. Once the cell reaches the outer layer, the stratum corneum, it settles there and becomes dry and flaky. This is what we call a ‘dead’ skin cell. Cells are continually pushed up through the layers as new cells are produced. The process of desquamation happens all over your body, not just your face. It’s also known as skin cell turnover. As we age, skin cell turnover slows down. When we’re young, our bodies are hard at work producing new skin cells rapidly. By the time we hit our 30’s the rate has slowed to around 28 – 45 days and then 45-60 days in our 40’s and 50’s. As the cell lifecycle slows down and skin ages, dead cells accumulate on the surface, causing the skin to look rough, dry and flaky. Our body produces less collagen as we age too, so skin increasingly becomes thinner and weaker and fine lines begin to appear. The dead skin cells piling up on the outer layer can emphasise the look of these wrinkles and lines. In addition to the decline in skin cell turnover, we’re battling environmental stressors and free radical damage every day that can lead to dry, dull skin. UV rays can be blamed for many signs of premature skin ageing like wrinkles, dark spots and uneven skin tone. Smog and pollution are other factors that affect the look of skin and if you live in city areas you might be familiar with the skin-dulling effects of pollution. Benefits of exfoliation Exfoliation is one of the easiest ways to see major skincare benefits quickly. In the scheme of all things skincare, it can create big results from minimal effort. Here are some great reasons to commit to a regular exfoliation session! Who doesn’t want a brighter, lighter complexion! Exfoliating products help you achieve an oh so glow skin tone by removing those dull, old skin cells which are darker than the skin below. Exfoliation also helps thicken the underlying live layers of the epidermis which makes the skin healthier and more radiant looking. Maximise product absorption Using a face exfoliator is has the added bonus of boosting the brightening, wrinkle-fighting and moisturising benefits of other skincare. Without regular exfoliation, the face products in your skincare arsenal won’t absorb properly because they have to fight their way through a layer of dead skin. Removing this barrier encourages maximum absorption, allowing each product to penetrate as deeply into the skin as possible. Battling breakouts? Choose the best skin exfoliator for oily, acne prone skin. One cause of breakouts is the bacteria that thrive in the pores when they become clogged with dirt, oil and dead skin cells. The result? Pimples and persistent breakouts. Exfoliation keeps the top layer of your skin fresh, sloughing away the impurities. While gentle exfoliation can help get breakouts under control, if your skin is overly sensitive, stick to a weekly session and choose an exfoliator for sensitive skin. Minimise the look of pores While there’s nothing you can do to actually change the size of your pores, regular exfoliation can definitely make them appear smaller. All kinds of oil, dirt and makeup get trapped deep in pores and it’s this build up that makes them look larger than they actually are. Clear out the gunk and they’ll appear cleaner and smaller. Who doesn’t love a quick skin payoff? Unlike some skin treatments that take a little time to deliver results, we love that the right face exfoliator gives you an instant skin high! It’s a quick way to reveal brighter, fresher skin. The Do’s and Don’ts of Exfoliation Let’s talk about how to exfoliate your face the right way and the wrong way. Even if you’ve got the best skin exfoliator for your complexion, if you’re not using it properly, your skin will end up irritated, not illuminated! The do’s and don’ts of exfoliation Don’t go overboard with exfoliation It depends on your skin type as to how often you should exfoliate. Oily skin by nature can usually handle more frequent exfoliation sessions than dry or sensitive skin. Start off exfoliating once or twice a week and pay attention to how your skin feels. If it’s becoming blotchy and irritated, you’re overdoing it. Do be religious about your sunscreen application after exfoliation Applying sunscreen every day (we repeat; Every.Day) regardless of the weather really is the golden rule of skincare. Your skin is particularly vulnerable to environmental and UV damage after you’ve exfoliated so it’s especially important not to skip sunscreen. Use a broad spectrum sunscreen that protects against both UVB and UVA rays. Do cleanse before you exfoliate Cleansing to remove makeup and surface impurities first will maximise the effectiveness of your exfoliator. For an easy to use and super gentle cleanser, suitable for all skin types check out The Uncomplicated Cleanser Don’t apply too much pressure Your exfoliating your skin, not cleaning a stovetop. Go easy with the rubbing motion or you’ll end up with raw, irritated skin. Exfoliate gently using circular motions. Do choose the best exfoliator for your skin type Exfoliators are not always a ‘one size fits all’ kind of deal, be cautious in your selection and use the right exfoliating products in the right places. This also means don’t use a body exfoliator on your face, they’re usually too harsh for the more delicate skin on your face. Don’t forget to follow up with hydration Your skin will need a boost of hydration after you exfoliate so don’t forget to apply a moisturiser afterwards. Chemical exfoliation vs physical exfoliation If you’re wondering what the best face exfoliator option is, first it’s important to understand exfoliation can be achieved with two different methods; chemical exfoliation or physical exfoliation. Don’t worry, chemical exfoliation isn’t as scary as it sounds! The first thing that comes to mind when you think of exfoliation is probably a scrub or cleanser with small, exfoliating particles or granules. These products are a type of physical exfoliant, so too are tools like facial brushes, konjac sponges and face cloths. Microdermabrasion and dermaplaning are also forms of physical exfoliation. Chemical exfoliation, on the other hand, is achieved by products that include AHAs (alpha hydroxy acids) and BHAs (beta hydroxy acids). AHAs are water soluble and work on the surface while BHAs are oil soluble which means they can get down into the pore, unclogging and removing the build-up of impurities from deep within. Common examples of AHAs + BHAs Glycolic Acid (AHA) Glycolic acid is an exfoliant that naturally occurs in plants including sugar cane and citrus fruits. Glycolic acid holds the title for having the smallest molecular structure of the AHAs group. This means your skin absorbs it quickly and it works faster than other AHAs. It can also help treat uneven skin tone, reduce the appearance of pores, combat dullness, fine lines and acne scars. Lactic Acid (AHA) A sensitive skin hero, lactic acid is the gentler, yet effective, exfoliator of the acids group. It’s a great all rounder but especially suited to sensitive and mature skin. Lactic acid is detoxifying and more moisturising than glycolic acid while still sloughing off dead skin cells to reveal a radiant, smoother complexion. Salicylic Acid (BHA) Salicylic acid more oil soluble than AHAs. This means while it exfoliates the surface of the skin, it also gets down deeper and unclogs pores, removing the build-up of sebum and impurities. Salicylic acid is one of the best skin exfoliator options for acne prone skin as it regulates sebum secretion and is an anti-inflammatory working to calm angry skin. Our Detoxifying Exfoliating Charcoal Serum is a skin game changer and contains a blend of lactic and Glycolic acid. This powerful duo works together to slough away dead skin on the surface, reducing the appearance of blackheads and drawing out impurities. Not sure where to start? Talk to our skin specialist team who will guide you through your FREE personal Skin Care Plan and help you get on top of your skin concerns today. The team at esmi are always here to support you on your skin journey.
<urn:uuid:f483097d-6b33-4203-a6d4-96b2666f6e3e>
CC-MAIN-2022-33
https://www.esmi.com.au/blogs/esmi-skin-central/why-exfoliation-is-important
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00203.warc.gz
en
0.904136
2,184
2.671875
3
« AnteriorContinuar » action of purely personal and arbitrary power. Sovereignty itself is, of course, not subject to law, for it is the author and source of law; but in our system, while sovereign powers are delegated to the agencies of government, sovereignty itself remains with the people, by whom and for whom all government exists and acts. And the law is the definition and limitation of power. It is, indeed, quite true, that there must always be lodged somewhere, and in some person or body, the authority of final decision; and in many cases of mere administration the responsibility is purely political, no appeal lying except to the ultimate tribunal of the public judgment, exercised either in the pressure of opinion or by means of the suffrage. But the fundamental rights to life, liberty, and the pursuit of happiness, considered as individual possessions, are secured by those maxims of constitutional law which are the monuments showing the victorious progress of the race in securing to men the blessings of civilization under the reign of just and equal laws, so that, in the famous language of the Massachusetts Bill of Rights, the government of the Commonwealth "may be a government of laws and not of men.' For the very idea that one man may be compelled to hold his life, or the means of living, or any material right essential to the enjoyment of life, at the mere will of another, seems to be intolerable in any country where freedom prevails, as being the essence of slavery itself. In the present cases we are not obliged to reason from the probable to the actual, and pass upon the validity of the ordinances complained of, as tried merely by the opportunities which their terms afford, of unequal and unjust discrimination in their administration. For the cases present the ordinances in actual operation, and the facts shown establish an administration directed so exclusively against a particular class of persons as to warrant and require the conclusion, that, whatever may have been the intent of the ordinances as adopted, they are applied by the public authorities charged with their administration, and thus representing the State itself, with a mind so unequal and oppressive as to amount to a practical denial by the State of that equal protection of the laws which is secured to the petitioners, as to all other persons, by the broad and benign provisions of the Fourteenth Amendment to the Constitution of the United States. Though the law itself be fair on its face and impartial in appearance, yet, if it is applied and administered by public authority with an evil eye and an unequal hand, so as practically to make unjust and illegal discriminations between persons in similar circumstances, material to their rights, the denial of equal justice is still within the prohibition of the Constitution. This principle of interpretation has been sanctioned by this court in Henderson v. Mayor of New York, 92 U. S. 259; Chy Lung v. Freeman, 92 U. S. 275 ; Ex parte Virginia, 100 U. S. 339; Neal v. Delaware, 103 U. S. 370; and Soon Hing v. Crowley, 113 U. S. 703. The present cases, as shown by the facts disclosed in the record, are within this class. It appears that both petitioners have complied with every requisite, deemed by the law or by the public officers charged with its administration, necessary for the protection of neighboring property from fire, or as a precaution against injury to the public health. No reason whatever, except the will of the supervisors, is assigned why they should not be permitted to carry on, in the accustomed manner, their harmless and useful occupation, on which they depend for a livelihood. And while this consent of the supervisors is withheld from them and from two hundred others who have also petitioned, all of whom happen to be Chinese subjects, eighty others, not Chinese subjects, are permitted to carry on the same business under similar conditions. The fact of this discrimination is admitted. No reason for it is shown, and the conclusion cannot be resisted, that no reason for it exists except hostility to the race and nationality to which the petitioners belong, and which in the eye of the law is not justified. The discrimination is, therefore, illegal, and the public administration which enforces it is a denial of the equal protection of the laws and a violation of the Fourteenth Amendment of the Constitution. The imprisonment of the petitioners is, therefore, illegal, and they must be discharged. To this end, The judgment of the Supreme Court of California in the case of Yick Wo, and that of the Circuit of the United States for the District of California in the case of Wo Lee, are severally reversed, and the cases remanded, each to the proper court, with directions to discharge the petitioners from custody and imprisonment. DUE PROCESS OF LAW AND ITS RELATION TO THE The 14th Amendment to the Constitution provides: “Nor shall any State deprive any person of life, liberty or property, without due process of law.” MUGLER v. KANSAS. The State of Kansas in 1880 adopted a constitution which prohibited in one of its sections the manufacture and sale of intoxicating liquors except for medicinal, scientific and mechanical purposes. In 1881 by statute the manufacture or sale, except for the specified purposes was made a misdemeanor, and it was further provided that no one should sell for either of the excepted purposes without having secured a druggist's permit therefor. Mugler was convicted of manufacturing and also selling without a permit. His conviction was affirmed by the Supreme Court of Kansas and the case was brought into the United States Supreme Court on a writ of MR. Justice Harlan delivered the opinion of the court. The facts necessary to a clear understanding of the questions, common to these cases, are the following: Mugler and Ziebold & Hagelin were engaged in manufacturing beer at their respective establishments (constructed specially for that purpose) for several years prior to the adoption of the constitutional amendment of 1880. They continued in such business in defiance of the statute of 1881, and without having the required permit. Nor did Mugler have a license or permit to sell beer. The single sale of which he was found guilty occurred in the State, and after May 1, 1881, that is, after the Act of February 19, 1881, took effect, and was of beer manufactured before its passage. The buildings and machinery constituting these breweries are of little value if not used for the purpose of manufacturing beer; that is to say, if the statutes are enforced against the defendants the value of their property will be very materially diminished. The general question in each case is, whether the foregoing statutes of Kansas are in conflict with that clause of the Fourteenth Amendment which provides that "no State shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any State deprive any person of life, liberty or property, without due process of law." That legislation by a State prohibiting the manufacture within her limits of intoxicating liquors, to be there sold or bartered for general use as a beverage, does not necessarily infringe any right, privilege or immunity secured by the Constitution of the United States, is made clear by the decisions of this court, rendered before and since the adoption of the Fourteenth Amendment; to some of which, in view of questions to be presently considered, it will be well to refer. Keeping in view these principles, as governing the relations of the judicial and legislative departments of government with each other, it is difficult to perceive any ground for the judiciary to declare that the prohibition by Kansas of the manufacture or sale, within her limits, of intoxicating liquors for general use there as a beverage, is not fairly adapted to the end of protecting the community against the evils which confessedly result from the excessive use of ardent spirits. There is no justification for holding that the State, under the guise merely of police regulations, is here aiming to deprive the citizen of his constitutional rights; for we cannot shut out of view the fact, within the knowledge of all, that the public health, the public morals, and the public safety may be endangered by the general use of intoxicating drinks; nor the fact, established by statistics accessible to every one, that the idleness, disorder, pauperism, and crime existing in the country are, in some degree at least, traceable to this evil. If, therefore, a State deems the abso lute prohibition of the manufacture and sale, within her limits, of intoxicating liquors for other than medical, scientific and manufacturing purposes, to be necessary to the peace and security of society, the courts cannot, without usurping legislative functions, override the wills of the people as thus expressed by their chosen representatives. They have nothing to do with the mere policy of legislation. Indeed, it is a fundamental principle in our institutions, indispensable to the preservation of public liberty, that one of the separate departments of government shall not usurp powers committed by the Constitution to another department. And so, if, in the judgment of the legislature, the manufacture of intoxicating liquors for the maker's own use, as a beverage, would tend to cripple, if it did not defeat, the efforts to guard the community against the evils attending the excessive use of such liquors, it is not for the courts, upon their views as to what is best and safest for the community, to disregard the legislative determination of that question. So far from such a regulation having no relation to the general end sought to be accomplished, the entire scheme of prohibition, as embodied in the constitution and laws of Kansas, might fail, if the right of each citizen to manufacture intoxicating liquors for his own use as a beverage were recognized. Such a right does not inhere in citizenship. Nor can it be said that government interferes with or impairs any one's constitutional rights of liberty or of property, when it determines that the manufacture and sale of intoxicating drinks, for general or individual use, as a beverage, are, or may become, hurtful to society, and constitute, therefore, a business in which no one may lawfully engage. Those rights are best secured, in our government, by the observance, upon the part of all, of such regulations as are established by competent authority to promote the common good. No one may rightfully do that which the law-making power, upon reasonable grounds, declares to be prejudicial to the general welfare. This conclusion is unavoidable, unless the Fourteenth Amendment of the Constitution takes from the States of the Union those powers of police that were reserved at the time the original Constitution was adopted. But this court has declared, upon full consideration, in Barbier v. Connolly, 113 U. S. 27, 31, that the Fourteenth Amendment had no such effect. After observing, among other things, that that amendement forbade the arbitrary deprivation of life or liberty, and the arbitrary spoliation of property, and secured equal protection to all under like circumstances, in respect as well to their personal and civil rights as to their acquisition and enjoyment of property, the court said: "But neither the amendement, — broad and comprehensive as it is,-nor any other amendment, was designed to interfere with the power of the State, sometimes termed its 'police power,' to prescribe regulations to promote the health, peace, morals, education, and good order of the people, and to legislate so as to increase the industries of the State, develop its resources, and add to its wealth and prosperity." Upon this ground—if we do not misapprehend the position of defendants—it is contended that, as the primary and principal use of beer is as a beverage; as their respective breweries were erected when it was lawful to engage in the manufacture of beer for every purpose; as such establishments will become of no value as property, or, at least, will be materially diminished in value, if not employed in the manufacture of beer for every purpose; the prohibition upon their being so employed is, in effect, a taking of property for public use without compensation, and depriving the citizen of his property without due process of law. In other words, although the State, in the exercise of her police powers, may lawfully prohibit the manufacture and sale, within her limits, of intoxicating liquors to be used as a beverage, legislation having that object in view cannot be enforced against those who, at the time, happen to own property, the chief value of which consists in its fitness for such manufacturing purposes, unless compensation is first made for the diminution in the value of their property, resulting from such prohibitory enactments. This interpretation of the Fourteenth Amendment is inadmissible. It cannot be supposed that the States intended, by adopting that amendment, to impose restraints upon the exercise of their powers for the protection of the safety, health, or morals of the community. In respect to contracts, the obligations of which are protected against hostile State legislation, this court in Butchers' Union Co. v. Crescent City Co., 111 U. S. 746, 751, said that the State could not, by any contract, limit the exercise of her power to the prejudice of the public health and the public morals. So, in Stone v. Mississippi, 101 U. S. 814, 816, where the Constitution was invoked against the repeal by the State of a charter, granted to a private corporation, to conduct a lottery, and for which that corporation paid to the State a valuable consideration in money, the court said: “No legislature can bargain away the public health or the public morals. The people themselves cannot do it, much less their servants. . . Government is organized with a view to their preservation, and cannot divest itself of the power to provide for them.” As already stated, the present case must be governed by principles that do not involve the power of eminent domain, in the exercise of which property may not be taken for public use without compensation. A prohibition simply upon the use of property for purposes that are declared, by valid legislation, to be injurious to the health, morals, or safety of the community, cannot, in any just sense, be deemed a taking or an appropriation of property for the public benefit. Such legislation does not disturb the owner in the control or use of his property for lawful purposes, nor restrict his right to dispose of it, but is only a declaration by the State that its use by any one, for certain forbidden purposes, is prejudicial to the public interests. Nor can legislation of that character come within the Fourteenth Amendment, in any case, unless it is apparent that its real object is not to protect the community, or to promote the general well-being, but, under the guise of police regulation, to
<urn:uuid:bc3143cc-1293-4045-acb9-ab7b5374ade2>
CC-MAIN-2022-33
https://books.google.com.mx/books?pg=PA285&vq=%22two-thirds+of+each+house,+remove+such+disability.+SEC.+4.+The+validity+of+the+public+debt%22&dq=editions:LCCN01001758&lr=&id=3nRDAAAAIAAJ&output=html_text&hl=es-419
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00002.warc.gz
en
0.964926
3,059
2.609375
3
In this lesson, we will start learning verbs, in particular intransitive verbs. By the end of this lesson you will be able to say what you do, for example, eat, sleep, or travel. This text was written by a beginner K’iche’ student when asked to describe his daily routine. Mauricio le nub’i. Kimpe pa le tinamit Austin, pa le amaq’ Estados Unidos. In tijoxel pa le nimatijob’al. Ronojel q’ij kimb’e pa le nimatijob’al. Aretaq kinwa’lijik kinwa’ik. K’a te k’u ri’, kimb’e pa le nimatijob’al. Kinb’inik. Utz kinwil le nutinamit. Aretaq kinopan pa le nimatijob’al, k’o le nutijonik rech k’iche’. Tat Wel ub’i’ le wajtij. Pa le tijonik, kojch’aw ruk’ le qajtij pa k’iche’ ch’ab’al. Sib’alaj utz kinwil le nutijonik rech K’iche’! My name is Mauricio. I am from the city of Austin in the United States. I am a student at the university. Everyday I go to the university. When I get up, I eat. Then I go to school. I walk. I like my town. When I arrive at school, I have K’iche’ class. My teacher’s name is tat Wel. In class, we talk with our teacher. I like my K’iche’ class a lot! In K’iche’, there is an important distinction between transitive and intransitive verbs. Intransitive verbs in K’iche’ include verbs referencing events that do not directly affect anyone/anything except the subject (You can think about them as having a subject but not an object, if it helps). Verbs like walk, go, dance, sleep, etc. are intransitive. Verbs referencing feelings are also intransitive: dream, worry, be sad, be happy, etc. Intransitive verbs are marked for person (agent) with a set of prefixes generally known by Mayanists as set B. |1st||-in- or –im- before b’||I||-oj-||We| |2nd (Formal)||-la||You (Formal)||-alaq||You all (Formal)| |3rd||Ø||He/she/it||-e- or glottal stop||They| Table 1. Intransitive verb subject markers (Set B) Kimb’e pa le tinamit. K-im-b’e / pa / le / tinamit. Incompletive Aspect – 1st person singular Set B – go / locative / article / town I go to (the) town. We’ve seen with constructions such as possession that K’iche’ is an agglutinative language, which means that particles attach to words to determine their meaning (for example: tinamit, nutinamit, qatinamit, por ejemplo). To form a verb in k’iche’, the marker for the person that is doing the action (the agent) becomes part of the verb, as we see with the marker im (1sB: first person singular, set B) in Ex. 1. –B’e is the verb root for the verb “to go.” The k- at the beginning marks the tense or aspect of the verb. In this case, it is in incompletive (INC) aspect; the action is taking place. (This is similar, though not equivalent to what we would call the present tense in English). La katb’e pa le tinamit? La / k-at-b’e / pa / le / tinamit INT / INC-2sB-go / loc. / art. / town Are you going to town? In Ex. 2 the second person singular marker –at– (2sB) precedes the verbal root –b’e. The so-called incompletive aspect marker k- (INC) precedes the person marker. The marker k- references ongoing or habitual actions. Note the interrogative proclitic la (INT) preceding the phrase. Like in the first example, the particle pa (loc) is a locative and le is an article (art). Je’, / k-im-b’e-k Yes, / INC-1sB-go-PFM Yes, I am going to town When an intransitive verb comes at the end of a phrase, it takes a phrase final marker (PFM). This marker is usually -ik, though for the verb b’e it’s just -k. In Ex. 3 the suffix –k is a phrase final marker (PFM). As you can see in the table above, the third person singular (he/she/it) is not marked. Instead of the marker, as a place holder we’ve written as Ø. In Nahualá, if the intransitive verb begins with a consonant, an a is added to the aspect marker k- in order to avoid having two consonants in a row. The third person singular form of to go, then, as you will see below, is kab’ek in phrase final position, or kab’e in a sentence such as “the student goes” “Kab’e le tijoxel.” where the verb is not at the end of the phrase. The formal markers for the second person singular and plural (la, alaq) actually come after the verb, so verbs in the formal will never have a phrase final marker. Look over the following table, where b’e is marked and broken down for each person: |Person marker||Root||Formal marker||Phrase final marker||Full form||Gloss| im (only before b’ or p) (2nd sing. formal) |you go (f)| |you all go| (2nd pl. formal) |you all go (f)| Now take a look at the verb war(ik), “to sleep.” Can you predict how this verb would be marked for each person before looking at the table? |Person||Root||Formal pronoun||Phrase final marker||Full form||Gloss| |you sleep (f)| |you all sleep| |you allsleep (f)| |“Kimpe pa…”||“I am from…” (Literally: I come from)| |wa’lij(ik)||to get up| |el(ik)||to leave, to go out| |opan(ik)||to arrive (at a place where you are not at the time)| |ul(ik)||to arrive (at the place where you are at the time)| |“Kinopan pa le tijob’al.”||“I arrive at school” (said if you are not at school)| |“Kinul pa le tijob’al.”||“I arrive at school” (said if you are at school)| Mark the following verb roots with each grammatical person. -wa’lij(ik) – to get up -ch’aw(ik) – to talk/speak -chakun(ik) – to work -b’in(ik) – to walk -wa'(ik) – to eat -etz’an(ik) – to play -pet(ik) – to come Go back to the tzijonik. Can you understand it better than the first time you read it? Can you write a few sentences about yourself and what you do everyday?
<urn:uuid:c57fa7ee-398d-44ee-b5be-1f9c054ed047>
CC-MAIN-2022-33
https://tzij.coerll.utexas.edu/tijonik-10/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00404.warc.gz
en
0.787559
2,407
3.90625
4
A decade ago, many people were still unfamiliar with cloud computing. Today, most citizens do their banking, shopping, and socializing in the cloud. Business is also being done in the cloud, especially in the post-Covid era, where hybrid workgroups are the new norm. According to Flexera’s 2021 State of the Cloud Report, 92% of organizations use multiple cloud services, while 90% migrate to the cloud faster than expected due to Covid-19. But how do the different clouds work? What advantages does cloud computing offer companies? And what are the benefits of using a single cloud provider whenever possible? What We Mean By Cloud Computing Cloud computing delivers IT resources (servers, software, data storage and processing power) over the Internet on a pay-as-you-go basis. Instead of investing in expensive equipment and building large server rooms on company premises to host data and communications, companies outsource their services to a cloud provider with a global network of secure data centers. Instead of buying software licenses, installing the software on multiple computers, and updating it regularly on each machine, companies pay subscription fees to use online portals and platforms hosted and maintained by cloud providers. Users can access these cloud-based solutions by logging in from anywhere, using any device with an Internet connection, and storing files in shared online databases. This is not always possible on company servers with limited storage space and computing power. Your computer hard drive is not suitable either, preventing other team members from accessing it. Typical Uses Of Cloud Computing Cloud computing includes a wide range of services that replace legacy business software. They also offer new features that have emerged in the cloud: – File Storage And Sharing: Cloud storage solutions like Google Drive and Dropbox offer businesses unlimited storage capacity. They also enable teams to access information from anywhere, collaborate on documents in real-time, and ensure version control. Data Protection And Disaster Recovery: Cloud-based data protection solutions such as Backblaze, Acronis, and Amazon Web Services enable companies to store critical data in the cloud automatically. It is safe there and can be quickly restored if a natural disaster or IT incident destroys the data stored on on-premises servers. – Big Data Analytics: When raw enterprise data is synchronized in the cloud, companies can leverage it for predictive analytics, artificial intelligence (AI) enhanced strategic planning, Internet of Things (IoT) automation, and a host of other future-facing capabilities. Cloud-based big data analytics solutions can be task-specific, industry-specific, or a native component of other cloud-based software. – Business Processes: There are cloud-based solutions for CRM (Salesforce, HubSpot), operational resource planning (Oracle, SAP), accounting (FreshBooks, Quickbooks), human resources (Bamboo, Namely), and virtually any other type of business software that is used to require installation media was. – Communication: Cloud communication solutions include unified communications, collaborative work applications, virtual presentation tools, contact center solutions and communication APIs. These Service Models For Cloud Computing Exist There are four primary service models for cloud computing, depending on the types and scale of IT resources deployed: – Software-as-a-Service (SaaS): The most popular cloud service is a complete third-party application designed for a specific function, such as customer relationship management (CRM) or document sharing. The SaaS provider manages the cloud application remotely and takes care of maintenance, troubleshooting and updates. – Platform-as-a-Service (PaaS): PaaS provides a development framework for building software, allowing users to build custom applications and tech stacks without starting from scratch. The backend is already equipped with a secure infrastructure, data integration, hosting facilities and a programming environment with API libraries and preconfigured application functions. – Infrastructure-as-a-Service (IaaS): Like PaaS, IaaS guarantees a secure IT infrastructure with hosting facilities and storage space, but companies bring their applications, operating systems and middleware and manage their data. This gives the IT department more control but provides a virtual data centre that eliminates purchasing hardware. – Desktop-as-a-Service (DaaS): DaaS is a cloud-based virtual desktop with a unified workspace without specific hardware requirements. Users can access “their desktop” via a web portal from any internet-enabled device, including SaaS solutions and virtualized traditional applications. According to Gartner, SaaS represents the most significant public cloud services market segment. Overall, the market grew by 21% last year and reached a volume of $332.3 billion in 2021. SaaS accounted for $122.6 billion of that in 2021. However, IaaS and DaaS saw the fastest year-over-year growth since 2020, at 38.5% and 67.7%. Cloud Hosting Main Models Four cloud infrastructure models exist public, private, hybrid, or multi-cloud. They differ in who owns and manages what: – Public Clouds: With public clouds, the IT infrastructure is owned and managed by a third party. Customers pay a subscription fee to use the service. You share resources with other “cloud tenants”, keeping data separate and secure. Private Clouds: In a private cloud, the company owns and manages the IT infrastructure and cloud computing resources. They pay a subscription fee to use the third-party software but host the data on their own shadow. Also referred to as “data centers,” private clouds reside either on on-premises servers or are hosted by a third party. In both cases, the network remains confidential, and IT resources are not shared. – Hybrid clouds: In a hybrid cloud environment, companies host some applications and sensitive data in a private cloud. Other applications and information end up in public clouds, where they take advantage of cloud computing on a pay-as-you-go basis. – Multi-clouds: In a multi-cloud environment, companies use multiple SaaS and PaaS solutions, often from different providers. These solutions can be integrated, but there is no such thing as a private cloud. Multi and hybrid clouds are becoming increasingly popular. According to the Flexera report, 92% of companies use a multi-cloud strategy, and 82% use a hybrid cloud strategy. On average, companies use 2.5 public and 2.7 private clouds. Benefits Of Cloud Computing Technology With an effective cloud migration strategy and the right vendors in place, companies gain access to technologies that: Supporting Remote And Hybrid Workforces Many knowledge workers already have experience working from home, so they no longer want to return to the office every workday. Employers are now exploring hybrid working models that offer their teams flexibility beyond the pandemic. As of September 2021, 76% of workers who have been working remotely during the pandemic told Gallup that their employers would allow them to work at least part-time from home going forward. With cloud computing, employees can access their work tools and business communications anywhere. All they need is a device with an internet connection and a login. Integrate Systems And Optimize Data Cloud-based solutions can often be integrated to improve collaboration and increase workflow efficiency. For example, a unified communications platform can be combined with a CRM. As a result, employees can see customer information when answering incoming calls and automatically log these calls in the CRM. Integrating systems enables organizations to pull data out of silos and apply predictive analytics that provides valuable insights for strategic decision-making. Gartner predicts that by 2022, 90% of organizations will “regard information as a critical business asset and analytics as an essential competency.” Use AI And IoT Technology Once all data is in one cloud (or interconnected clouds), companies have a lot of opportunities. For example, you can apply machine learning algorithms to automate processes, use IoT technologies to optimize supply chains, and use predictive analytics to eliminate inefficiencies. This makes the company future-proof. Cloud services also allow businesses to deploy new tools and features such as virtual assistants, chatbots, and other AI-powered solutions. Enable Agility And Innovation Markets across all industries are becoming increasingly competitive while consumer expectations rise and rise. Companies must be prepared to adapt quickly lest they be eclipsed by disruption to survive and thrive. They also need to focus on continually improving the customer experience, or they will fall behind the competition. With an effective cloud strategy, companies can innovate faster, deploy resources strategically, and gain valuable insights into optimizing the customer journey. Good cloud providers constantly add new features and product upgrades, so customers always have access to the latest and greatest features. Ensure Reliability, Security And Disaster Recovery If the technology no longer works, the company suffers. If there is a threat of data loss, the company’s reputation and (in some industries) legal standing are also at risk. The servers are considered resilient and reliable with a public cloud infrastructure because they are constantly updated and geographically dispersed. This protects them from local disasters that could affect service availability and recovery from an outage. IT engineers handle data backup, whose main job is to oversee security and ensure data protection logs remain practical and up-to-date. Reduces IT Complexity With a public cloud, IT doesn’t have to maintain hardware or servers, update fleets of computers, and worry about backing up data or troubleshooting. This gives her more time for innovative projects. While managing a private cloud is more complex and requires more IT resources, using SaaS, IaaS, or PaaS saves IT from developing everything from scratch and routinely updating software. With just-in-time subscription pricing for critical business systems and applications that never become obsolete, cloud solutions save companies big bucks on hardware costs, integrations, and IT support. According to ZK Research, they typically save 30-40% over five years by switching to a SaaS solution. Accenture also found that migrating parts of an organization to public clouds reduces the total cost of ownership by up to 40%. Scale With Ease For most companies, the number of employees fluctuates over time, increasing in excellent years and decreasing again in bad economic times. This meant estimating roughly how many licenses the company would need for the subscription period with traditional software. With cloud services, they pay based on the number of users or the services they need. Adding or removing users is a breeze. Most cloud applications are highly customizable: features can be turned on and off based on the size and needs of the business. The performance, storage space and bandwidth can also be flexibly selected if requirements change. Of course, the customization and scalability capabilities and the ability to take advantage of all the other cloud computing benefits mentioned above depend on the particular cloud provider. Also Read: The Most Important Cloud Trends At A Glance Choosing A Cloud Provider But how do decision-makers find the right providers for their requirements? When evaluating potential technology partners, it’s essential to consider certain aspects of each vendor: – Features and development plan: Does the solution have all the features that the company or departments concerned need or might need in the future? Does the vendor’s development roadmap align with the company’s IT vision? Are there AI-based features supporting automation and taking the hard work off end-users? – Location: Are all services available at every company location, and, more importantly, do they work reliably? If the employees work in different locations or the global customer base, does the service work for everyone? – Service and support: What is the average availability of the cloud provider? Does it reimburse customers for lost time if the service goes down? How much support does it offer? What is the average response time for support requests? – Integrations and APIs: Does the solution integrate with other essential business software? Does the vendor have tools to integrate legacy software or proprietary technologies? Does it provide open APIs that allow customers to integrate their applications? – Scalability: Scalability is one of the key benefits of cloud computing, but does the provider have the capacity and capacity to adapt to the ever-changing needs of the business? How quickly can users be added or removed? –Security and data protection compliance: How does data backup work? Is the solution certified for compliance with industry-wide regulations (e.g. payment card industry standard)? How is it aligned with international privacy laws like the European General Data Protection Regulation (GDPR)? – History and Reputation: How long has the provider been in business? What is their track record? What do existing or previous customers say about the service and customer support? It is advisable to collect as much information as possible about potential suppliers. If a solution doesn’t meet the needs of the business, moving to a new cloud provider doesn’t mean making significant investments in hardware and infrastructure. You have to learn a new (hopefully better) system. Less Is More: Number Of Cloud Providers Most companies today work in a multi-cloud environment. And with good reason: there is no single solution that meets all the IT needs of an entire company. But there are cloud solutions that meet all the needs of a single department or function. Cloud communication example: A complete communication stack includes all of these: – Unified Communications (UCaaS): Multi-channel communication platforms that replace traditional phone systems with advanced features such as call recording and cellular phone synchronization. Contact-Center-as-a-Service (CCaaS): Multi-channel communication platforms designed specifically for customer interactions, with voice assistants and intelligent call routing features. – Communications-Platform-as-Service (CPaaS): Development platforms that enable companies to integrate various communication APIs such as chatbots and SMS marketing. – Team Collaboration: Applications that allow teams to collaborate and share information. – Virtual presentation tools: video-based software used in webinars, training courses or conferences. Some cloud communication providers combine these functions, but in many cases, the different parts are provided by other cloud providers and are already integrated into one platform. This might be seamless enough for end-users, but from an IT perspective, difficulties can arise when there are service outages or technical support issues that the vendor cannot resolve. Even if customers want new functions that the provider does not offer because they do not have the technology, there can be friction. Vonage owns its entire technology stack, including UCaaS, CCaaS, CPaaS, team collaboration and virtual presentation tools. All can be combined in a single platform. Vonage is responsible for customer data and can respond to customers’ changing communications needs with complete control of the technology and development plan. There is only one bill to pay – and only one party to take responsibility for technical issues. Cloud computing offers many benefits, but results also depend on each organization’s cloud infrastructure and technology stack. However, most cloud migrations have one thing in common: In the competitive digital age, where everything is constantly changing, customers expect seamless interactions and employees can work from anywhere; companies must be flexible and agile. Cloud computing paves the way. Also Read: Data Backup Trends In The Cloud
<urn:uuid:55bd260f-ad7a-4d23-bfef-3d45c8888a98>
CC-MAIN-2022-33
https://www.techbuzzupdate.com/cloud-computing-offers-these-eight-advantages/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572898.29/warc/CC-MAIN-20220817092402-20220817122402-00605.warc.gz
en
0.925611
3,162
2.796875
3
If you dangle a nice juicy carrot in front of many of the world’s leading experts advising the governments on vaccine policies, they will accept the carrot like any other ‘ass’. This has been proven over and over, however, agreeing to use little girls in experiments for the HPV vaccine Gardasil, is stooping about as low as anyone could go. This, however, is exactly what one group of experts from Norway have done. According to the Norwegian newspaper the VG NETT in their report Fikk betalt av vaksineprodusent – VG Nett om Helse og medisin the Norwegian experts received money from Merck and then advised their government on the HPV vaccine Gardasil, which at the time was only in it’s experimental stages, thus putting their own financial gain above the lives of the innocent children of Norway. The report reads:- “Four of the experts who advised the government to vaccinate all 12-year-old girls with the HPV vaccine Gardasil have received money for research from the U.S. pharmaceutical giant Merck. A fifth expert, senior research worker Ellen Nilsen, went directly from the group which gave Health Minister Sylvia Brustad advice, to a position with the company that markets the vaccine in Norway. There are 13 persons in the expert group. The newspaper VG revealed that all 12-year-old girls will in fact be research test persons for Merck, if the Norwegian experts get their will.” To be fair the experts, did rather weakly (in my opinion) try to defend their position. “– In small countries it is a problem to find people who are both competent and who have not had any commitments related to the products for which there should be given advice, or companies that have produced the products” says director Geir Stene-Larsen at the Norwegian Institute of Public Health (NIPH) to VG. The report continues:- In April NIPH gave clear advice to the government: HPV vaccination should be implemented in the national vaccination program for girls 11-12 years of age. The advice was based on the expert group’s assessment. Professor Ole-Erik Iversen at the women’s clinic at Haukeland Hospital has participated in several clinical trials and has been the national coordinator in Norway for studies of the two vaccines against HPV viruses that currently exist. He has also served on Merck’s steering committee, and has, according to Innovest received 120 000 kroner plus 35 000 kroner in travel expenses for this work since 2000.” The rest of the article is in the same vein:- “– Should I count the hours I would have earned more doing extra shifts at the hospital. I have done this because I think it’s important work which can be of great significance for women all over the world. This is contract research which is supported by the university and the hospital”, says Iversen to VG. He emphasizes that he does not have shares, options or receive bonuses for vaccine sales. My heart bleeds:- “Professor Harald Moi at the Olafia Clinic leads a research project in which vaccine efficacy in young men is investigated. “– This is mission-based research and it is Merck who is funding this study. The funds go to the Research Forum, I receive no extra remuneration for this work” said Moi. Aud Berstad at the pediatric clinic at Haukeland Hospital has participated in clinical trials for Merck’s vaccine. “– I have not received any personal compensation, the money has gone to the Merck research company Innovest at Haukeland Hospital. I do not remember the exact totals, but there is not much money” she said. Agnes Kathrine Lie, chief physician at the Cancer Registry of Norway, has held two lectures for Merck and received payment for them. “– She received just under 5000 kroner for these lectures. This is not lectures she made for Merck, but which she has held previously. It is also important to emphasize that Lie has not taken active part in connection with the development of the vaccine or in carrying out the studies” says Lie’s director at the Cancer Registry, Rita Steen. Senior Ellen Nilsen participated in the group until 1.November last year. Then she left because she took a position at Sanofi Pasterur MSD, where Merck is one of part owners, and who markets the vaccine in Norway. Eivind Smith, law professor, said Ellen Nilsen should not have been in the group: “– This is an obvious argument against her participation, even though she left when she signed the contract with her new employer ” says Smith. Ellen Nilsen emphasizes that her role in the group was as an observer for her former employer, the Norwegian Knowledge Centre for the Health Services “I had therefore no influence on the work. The employment process with my current employer took place in the usual way in which I, as one of several were contacted by a recruitment agency in the beginning of September. I had two interviews with people in the management of the company, one mid-September, and one in October. I received an offer 31. October and accepted 1.November. The Knowledge Center was notified on the same day, and I left my observer role in the group,” writes Nilsen in an e-mail to VG. “– In this case, I have been very interested in receiving impartial advice. I sent a letter to the National Institute of Public Health in January”, Health Minister Sylvia Brustad writes in an e-mail to VG. Beyond that, she was unavailable yesterday to comment on the impartiality issue. “– It is very important is that there is full openness about the commitments one has. So we will consider in each case how strong the commitment is and how strongly one can expect that it affects the attitudes of the person. In this case we have found that the question of impartiality is acceptable” says Geir Stene-Larsen at the NIPH. The article was kindly translated from Norwegian for me by my colleague Sandy Lunoe whom I thank. Another report Human Papillomavirus (Types 6, 11, 16, 18) Recombinant Vaccine … confirms that as usual these experts did indeed persuade Norway to sign up for the experiment and on Google the write up for this article says – “the Nordic Region (Sweden, Norway, Iceland, and Denmark) to assess long-term outcomes following administration of GARDASIL in approximately 5500 subjects” The consequences which we have since learned from Janny Stokvia, an activist from Denmark and a member of the TruthAboutGardasil http://truthaboutgardasil.org/ have been far from pleasant and she has helped demonstrate this as part of a power point presentation accompanied with documents that a group of six women presented to the FDA in March. Even more disturbing is that some months earlier, in another article – Honorar til forskningssjef er korrupsjon – Stavanger Aftenblad which translated means – Fees to research director is corruption, we see another expert, this time the research director Steinar Ø. Thoresen from the Cancer Registry, also accepting large sums of money totalling 233,900 dollars from Merck, which the Christian Demoncrate party leader and the former Minister of Health to NRK, calls corruption. The article states:- “The U.S. company also Thoresen cover travel expenses. Money transfers, a total of 233,900 dollars, started two years before Thoresen ensured that Merck had one million agreement with the Cancer Registry for the development of a vaccine against cervical cancer” This shows that Mr Thoresen and the other experts advising their Government had massive and rather lucrative conflicts of interests which were in their interest to keep quiet about. Mr Dagfinn HøybrÃ¥ten the former Minister of Health to NRK however calls their silence and dirty dealings corruption and states in the report that “Such remittances have a name, and there is corruption,”. The report continues:- “He has asked the health minister to get involved in the case that there is unhealthy links between the pharmaceutical industry and physicians in Norway is no secret. But this case is so special that it can not be called common practice, “he said. Thoresen and a subordinate at the Cancer Registry according to VG signed personal contracts with pharmaceutical giant in 2002 without informing the management.The agreements took place in violation of the guidelines that applied for medical managers. Auditor General should investigate. Even Thoresen says that he has not done anything wrong.” However, these experts are not alone in their misdemeanour’s by a long way. Reports show that Indian experts also had some hidden conflicts of interests, revealing that these to, had links with Merck when they advised their government on this vaccine. In April I revealed these conflicts of interest when I wrote the article Are panel chosen to investigate Gardasil in India fit for purpose? I spoke at this time of a press release released by the organisation the TruthAboutGardasil. http://truthaboutgardasil.org/ which said:- “North Hollywood, CA. Members of TruthAboutGardasil.org and women around the world are disappointed with the panel of investigators selected to examine alleged violations of guidelines for conducting ‘clinical trials’, inadequate research, false advertising, along with various moral and ethical concerns in connection with a recent health ‘demonstration project’ involving HPV vaccines amongst disadvantaged women in India. With apparent disregard for the women and organizations that brought these injustices to the attention of the world, the government of India has chosen S. P., Agarwal former Director-General of Health Services; Sunita Mittal, head of the Department of Obstetrics and Gynecology at the All-India Institute of Medical Sciences; and Pharmacologist, Ranjit Roy to serve as the primary investigators. Now the world is wondering if these three men; a retired government official, a practicing physician and a practicing pharmacist are capable – or willing – to impartially review their peers and/or supervisors conduct and the trial reports without bias.” ‘Capable’, is possible, ‘willing’, is doubtful and to be ‘impartial’, now that is the one that is really questionable especially as one of the panel of investigators appears to have a secret that he just conveniently forgot to mention. The secret, well you guessed it, he is connected to the manufacturer of the Gardasil vaccine Merck. On the front page of the The Hindu on the 14th April 2010 in a letter to Azad it read- “Another issue which unfortunately has not been addressed in your letter is the conflict of interest involved in the PATH project. This NGO is a partner of the manufacturing company MERCK in other projects. As a partner, it can be easily understood that the conflict arises from the interests of the subjects of the project, in this case children, on the one hand, and the vaccine manufacturer, on the other. If there is not to be a cover-up of what appears prima facie to be a case of connivance with a vaccine manufacturing company in violation of set guidelines, I would once again request you to kindly look into the aspect of the inquiry, both in its terms of reference and in its composition.” So if The Hindu’s research is correct and this is so, he can hardly be impartial now can he?” I have since found other links proving that India foster many alliances with Merck that they would hardly want to surrender as Merck also offer to adopt talented students in India and prevent them from dropping out of education due to lack of resources. POSTER 2010_final_for print This clearly shows how Merck gives chosen students scholarships of a fixed amount per year upon the submission of authentic invoices/bills to be utilised towards payment of academic and tuition fees and stationary expenses. Very commendable, however with these sort of grants, is it any wonder that India appear to be in favour of vaccines manufactured by Merck? In fact after researching I found that Merck are very noble and offer a considerable amount of money to various causes worldwide. This article Colloidal Silver Secrets: Big Drug Companies Fund Groups Behind …written by Tony Issacs is fascinating as it reveals detailed information on an organisation called the ‘John Merck Fund’. The John Merck Fund was set up by Serena Merck who was the widow of Merck Pharmaceuticals CEO George W Merck in honor of their short lived son John. This fund is responsible for funding groups from Greenpeace to the American Corn Growers Association. A small sample of some of their activities have been listed on the website John Merck Fund the full extent of the actual funding is huge. The world cannot get away from the fact that Merck is huge and holds power and influence over many of our countries experts. With their cash rewards and our experts being the weak individuals they are, most cannot resist the nice juicy carrots that are held out in front of them even if this means sacrificing our children in experiments involving vaccines. After all when counting the cash it is easy to kid yourself that it is for good of mankind, especially if it does not affect you personally. I have written this in memory of those that have died after receiving the vaccine Gardasil. Especially Megan my friend Karen’s daughter. Information video made by activist Janny Stokvia. Conflicts of interest – I am a mother of a vaccine damaged child
<urn:uuid:0f99f6ac-a16e-4c05-9f7e-82bfdab5d6ac>
CC-MAIN-2022-33
https://vactruth.com/2010/06/28/merck-paying-experts-gardasil/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00603.warc.gz
en
0.96851
2,931
2.515625
3
The one with the glaring glow in his eyes, who stands straight and tall, a ‘fellow’ composed of pure determination. The one who gave up his comfortable upper-class life to fight for the oppressed and exploited. Ernesto ‘Che’ Guevara, a man who has inspired countless people across the world, yet seems also to spark hatred in many as well. The ninth of October was the day that he was murdered, and we would like to ask the correct questions about him in his memory. Who was this man? What did he actually fight for? It’s hard to know in this world of ours, but let us see how far we can get. Let me solidify my views: Che Guevara was a hero who fought for the freedom of the various nations he struggled in. In Cuba, he fought against the corrupt puppet dictator – Fulgencio Batista, who retained power through autocratic behaviors and sold out his nation to the Americans. What Cuba was before the revolution was a mafia state, a nation that served no purpose but to act as an American satellite. Throughout his life, Che Guevara helped out various anti-imperialist movements throughout the world, which eventually led to his death. I believe that figures like Che should be protected from the lies that are sent their way, even after their deaths. Ernesto Guevara was an Argentine revolutionary and guerilla fighter most notable for his principle part in the Cuban Revolution. He grew up in a moderately well-off family, and studied in the medical sciences. Early on in life, he took no interest in politics, but as time went on he progressively became more attracted to it. One very important part of his personal political development was his trip through Latin America with his friend, Alberto Granado. During this journey, he witnessed the misfortunes of the people of Latin America, of how foreign business would enslave the peoples of these nations, how the ruling classes lived so well through the exploitation of these other nations. This solidified his anti-American and anti-Imperialist political world-view. While he was not yet a Marxist, his beliefs were closely aligned with Marxism. The Communist world-view of his came from his interaction with Communist contemporaries and through study of the classic theorists of Marxism. He slowly became more and more engaged in Marxism and eventually identified as a Marxist. Now, we are not here to discuss his life and development, but who he was and the impact he had on the world. For a biography, one that is generally seen as the one definitive impartial biography, and which dispels many of the lies hurled against him, is Che Guevara: A Revolutionary Life by Jon Lee Anderson. We are here, instead, to see whether he actually was the villain that the Yankees made him out to be. In terms of violent activity, what other way did the activists of that time have to change their society? Peaceful methods for change were not possible. The dictatorship allowed no force of legal resistance against itself. The only way to fight against violence that has been imposed on a society is to fight back with violence. The guerillas did not kill innocent people. They only fought the necessary fight against the state’s forces. We cannot criticize oppressed peoples across the world for utilizing the only method we left them with to fight against their oppressors. It is time to look at some myths about Che Guevara. One that is quite famous is the viewpoint that he was a racist. This is founded on a passage that Che Guevara wrote in his diaries when he was young and not politically engaged as an anti-imperialist and Communist. One quote that is seen is this: “The black is indolent and a dreamer; spending his meager wage on frivolity or drink; the European has a tradition of work and saving, which has pursued him as far as this corner of America and drives him to advance himself, even independently of his own individual aspirations.” Of course this is a horrid quote, we cannot say that there is something that could be vindicated about this. What is to be said on this is that he was 24, still evolving from the ideals of his upper-class European Latin-American society. Later on in his life, he had many black comrades who fought along with him. He was a stubborn anti-racist who gave support to many African struggles, some examples being in South Africa and the Congo. Here is a quote from Nelson Mandela, a figure in the fight against apartheid in South Africa: “The life of Che is an inspiration to all human beings who cherish freedom. We will always honour his memory.” Here is a quote from Che Guevara himself talking about racist discrimination in South Africa: “We speak out to put the world on guard against what is happening in South Africa. The brutal policy of apartheid is applied before the eyes of the nations of the world. The peoples of Africa are compelled to endure the fact that on the African continent the superiority of one race over another remains official policy, and that in the name of this racial superiority murder is committed with impunity. Can the United Nations do nothing to stop this?” How can we say this man was a racist? It all comes from manipulating information to fit your own narrative. Let this lie show, as an example, how dishonest people can be when talking about historical figures, and that it is up to you to be well informed. What is another lie we hear about Che Guevara? It is that he was a notorious homophobe, and it is ironic that those who spread this lie are some of the biggest homophobes. Considering that he came from Latin American countries that were more socially conservative, it is very likely that he did have homophobic tendencies. Otherwise, there is absolutely no proof that he was homophobic, or filled concentration camps with gay people. The mistreatment of gay people in Cuba was much worse before the Revolution, and Fidel Castro also later on apologized for the mistreatment of LGBTQ+ peoples in Cuba . Today Cuba has a very accepting view of LGBT peoples, much more so than countries such as the United States. Was Che a murderer? Depends on what we see as murder. Did he kill people? Yes, he did, just as anyone who has served in action in the military has. Che Guevara was a guerilla fighter. It is absurd to think that one should not take up arms against a corrupt dictatorship that has sold out their country to foreigners and has imposed violence on the peoples to solidify its own foundation. In wars against dictatorships, and after revolutions, very strict measures must be taken. You are harassed from all points. Agents are sent in, materials are hard to come across, and your opponent has the support of the world’s largest superpower. What are we to do? This is the nature of guerilla warfare; it is a strict but unusual method of warfare in which forces from the masses fight unexpectedly. Then, the idea that he was an ‘authoritarian’ leader and therefore shouldn’t be supported is also absurd. Che Guevara was not the leader of Cuba. He was merely a famous fighter known for his dedication to the cause. He did all he could to consolidate the power of the new state, a state which gave its citizens universal suffrage, free healthcare, literacy, and for the first time in the lives of many, conditions in which one could actually live. Currently, Cuba has a higher total life expectancy than the United States, even though it has one of the world’s largest embargoes placed upon them. Now that we have gone over the lies, what did Che Guevara do that was deserving of praise? The most obvious is that he was a great fighter in the war against the Batista dictatorship in Cuba. He left his comfortable life in Argentina to fight for justice across the world and to fight against dictatorships. Unlike Fidel Castro, Che had larger ideas than just staying within Cuba. He fought in other places, and it led to his death in Bolivia. Even though Che had a respect for Fidel Castro, he was critical of the USSR, and was more aligned with China during the Sino-Soviet split. Fidel was less of a Communist than Che and therefore aligned with the USSR, which was larger economically than China, which was even poorer before the Chinese Revolution than Russia was before the Russian revolution. We also have to see that Che Guevara was a romantic. His actions and perceived want of heroism led to him making bad choices such as the one that led to his death in Bolivia. He believed that groups of guerillas could create the conditions for a revolution, and this theory of his was largely seen as romantic and not the way to achieve justice. Yet he proceeded. This only shows his will to fight for others, and disproves the view that he was a power-hungry man who fought for personal gain. The figure of Che Guevara has inspired so many people around the world. A personal connection I have is the figure of Che in Turkey, the country which my family is from. In Turkey, Che Guevara is one of the largest figures of resistance who is idolized. In the 1980s, when a US-supported military dictatorship was established, when my own father was tortured for months, Che Guevara was a figure of hope and of resistance. The example of the Cuban Revolution served as an example for people in Turkey back then, and for those who struggle for change, he still does. Today the figure of Che Guevara still stands, despite the lies sent in his way by those who uphold oppression. It is our duty to disprove the lies sent against all historical figures, especially those such as Che Guevara, who leave behind lives of luxury to fight for the oppressed peoples of the world. We must continue the fight that was started by these people to work towards a better world, hasta la victoria siempre, always until victory!
<urn:uuid:5bf053f9-3390-41fd-96d6-6be3463d2bef>
CC-MAIN-2022-33
https://www.thereckoner.ca/ernesto-a-fellow/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00005.warc.gz
en
0.980769
2,666
3.125
3
Through the Eyes of a Geologist Tewksbury with Astronaut Victor Glover Training Astronauts To Think Like Geologists By Maureen A. Nolan Professor of Geosciences Barbara Tewksbury thinks like an astronaut. To her mind, blasting off in a rocket-powered spacecraft is the coolest thing an earthling could experience. Following the twin stars of science and exploration, Tewksbury applied to be a NASA astronaut in the late 1980s, nearly 10 years in as a professor at Hamilton. Her eyesight wasn’t good enough to get past the medical screening, and her career as a teacher and scientist continued its ascent. But in 2008, she was invited to help support the kind of missions she would have loved to be on — she became part of a NASA program to teach astronauts to observe geology from the International Space Station, one of the best vantages points of Earth that a geologist could have. “These are people who will live in the International Space Station for three to six months at a time, and to look down on a planet when you don’t understand what you are seeing is a real shame, you know? And that’s one of the reasons we’ve been pushing the geology training,” Tewksbury says. It’s possible to track the space station’s whereabouts on NASA’s website, and one night late this summer, she and her husband, Dave Tewksbury, a geosciences technician, stepped outside and caught a spectacularly bright pass. With its huge solar panels throwing off sunlight, the station glittered high across the sky and winked out of view. Tewksbury waved as it passed. Aboard Expedition 41 was Reid Wiseman, one of her NASA students. She usually refrains from contacting the astronauts, who are among the busiest people on or above the planet, but after that sighting she couldn’t resist. “The next day I emailed Reid and I said, ‘You know, it was one of the greatest moments of my life to stand out on my deck and watch that go by and know that you’re up there, and I waved and felt silly,’” Tewksbury says. Wiseman promptly replied to say they’d seen some fabulous geology from orbit, which is the objective of the NASA training program Tewksbury helped develop. Tewksbury is a structural geologist who has held three endowed chairs at Hamilton, where she is a geosciences professor and the Upson Chair of Public Discourse. She conducts ongoing research in Iceland and Egypt. As a professor who loves teaching as much as she does science, she’s acquired a national reputation for her expertise in geoscience education. That’s one reason she was invited to work with NASA. Dean Eppler, a volcanologist who oversees NASA’s astronaut geology training program, turned to Tewksbury in 2008 as he assembled a group to rethink the curriculum. They’d met as undergraduates at St. Lawrence University, and Eppler knew the NASA project could benefit from Tewksbury’s expertise in teaching and in structural geology. The group’s task was to design a curriculum that would make the most of the opportunity presented by the space station. There are only a few geologists among the astronaut corps. Providing astronauts who lack that background with a more targeted, hands-on course in geology would better equip them to be the eyes in the sky for geologists back home. (NASA Expedition 41, which launched in May and returned home in November, included a geologist, European Space Agency astronaut Alexander Gerst.) Eppler and Tewksbury, among others, developed the curriculum that was used with the 22 members of the two most recent classes of NASA astronauts. Tewksbury was among 13 geologists who taught them during a three-week intensive summer program that included two weeks of classes at NASA in Houston and one week of fieldwork in New Mexico. She volunteers her time, and NASA pays her travel expenses. “Next to working with the astronauts, the most fun is working with this team because they’re really good, and they are really interested in tackling this problem, which isn’t easy,” Eppler says. “Because it’s like — how do you take four years of undergraduate training and maybe a little bit of graduate work and stuff it into two weeks in the classroom?” Astronaut students are quick studies and an elite group. For the 2013 class, which Tewksbury worked with this summer, about 6,000 people applied for eight astronaut slots. “They ask the most unbelievable questions, and they are very, very smart. They haven’t had any geology to speak of, but they see what the critical questions are,” she says. In the classroom, the astronauts do preliminary analysis and mapping based on satellite images, the kind of images they could see from the space station, and then venture into the field to check their work. The work on the ground gives them a better idea of what they will observe from the space station and the tools to work more effectively with Earth-bound geologists. NASA uses a mentorship model for teaching in the field and assigns two astronauts per geologist. Even so, fieldwork is a challenge. Geologists map using a limited data set because rock exposures are discontinuous, and three-dimensional exposures are rarely extensive. People who are good at field mapping make critical observations at each outcrop, factor them into their evolving hypotheses and decide based on limited information where to go next in the field to test their ideas about what is there, how it evolved and when. Wiseman turned out to have the right stuff for mapping. He’d study an outcrop, take notes and talk things over with his field partner. “Then, his head would go up, and he’d say, ‘OK, I need to go over there next,’” Tewksbury recalls. “As I thought about it, I realized that this is exactly what fighter pilots do, which is what Reid was in the Navy. They take limited but complicated information, evaluate it in the light of a number of options and make a decision quickly about what to do next to best solve the problem.” Duane Ross, NASA’s manager of astronaut candidate selection and training, likes to tag along on Tewksbury’s field training because he always learns something. “She’s awesome. I think her forte is that she understands how to tell people what’s going on in terms they understand,” he says. Hamilton alumni could testify to that. Geology major Will Hoffman ’07 says Tewksbury’s love of science was contagious, and she would go the extra mile for her students. She supported his effort to create an independent study in advanced structural geology. She hung in there for his fieldwork in Iceland even after she fractured her wrist. And Tewksbury helped him find a good graduate school and steered him toward Penn State, where he earned a master’s degree in geosciences. “She has a special gift for teaching as well as a passion for creating innovative and exciting curricula for students,” says Hoffman, who works as a geoscientist for ExxonMobil. Tewksbury fell for geology early on. She grew up backpacking in the Adirondacks, and the summer before ninth grade, her physicist father and chemist mother took her to climbing school in the Canadian Rockies. Back at school, she took her first earth science course with a knowledgeable teacher who took his students out in the field. She was learning about things she’d seen during her trips to the mountains. “And I suddenly realized at 14 that I could do science and be outdoors. I just couldn’t even imagine anything more fantastic than that,” she says. She learned to love space exploration even earlier. Tewksbury was 10 in 1962 when astronaut John Glenn became the first American to orbit the Earth, and she followed all the Apollo moon landings. When the first space shuttle went up in 1981, Tewksbury was at a professional conference and holed up in her hotel to watch the launch. “And it still gives me tingles on the back of my neck, because ‘hero’ has a very restricted meaning to me — I don’t have very many heroes. But I’ll tell you, John Young is one of my great heroes. He and Bob Crippen sat in that vehicle that had never ever been launched as a test vehicle, never flown in space, never landed from space. And they sat there and rode this thing into space,” she says. Veteran astronaut Mike Fossum, whose most recent mission was to the International Space Station in 2011, tosses a bit of that respect back at Tewksbury. Fossum has seen her transmit her passion for geology to the astronauts-in-training. “She is just one of my favorite people on the planet because she’s so passionate about what she does. And she infuses that passion — she passes it along to a group of people who are high-speed professionals,” he said during a telephone interview from Kazakhstan, where he was helping manage an Expedition 41 launch. From the space station, astronauts can see active processes such as river systems, ocean currents and short-term catastrophic processes like volcanoes and the aftermath of large earthquakes and storms. “And they can also see the results of both past and ongoing geologic processes, so one of the things that you can see like gangbusters from space are faults and fault systems because they look like giant scars across the land,” Tewksbury says. Eppler’s favorite example of astronaut geology-in-action came in 2009 as the space station was flying over the Kuril Islands in the Russian Far East. Japanese astronaut Koichi Wakata noticed a brown cloud that looked like dirt in the upper atmosphere and concluded that a volcano was going off or about to. He had about 90 minutes to get the cameras in the right place, and with a bit of serendipity, the station was over the top of the volcano as it blew. “They got the most phenomenal sequence of photographs of this eruption cloud developing that anybody has ever seen,” Eppler says. “And it’s in textbooks now and studied in great detail by people. They are just simply the best pictures of these things that have ever happened.” Only one geologist has ever walked on the surface of the moon, says Tewksbury, and she’s worked with him. He’s Jack Schmitt, who was the lunar module pilot for Apollo 17, the last mission that carried humans to the moon. Tewksbury’s daughter Carolyn introduced her to Schmitt years ago when she was a high school student competing in planetary geology at the International Science and Engineering Fair. Schmitt was a judge. Now Carolyn Tewksbury-Christle is geophysicist and a captain in the U.S. Air Force where she teaches physics at the U.S. Air Force Academy. She would love to be an astronaut some day, too. She and her mother both have worked as part of NASA’s Desert Research and Technology Studies project, which tests vehicles and equipment that astronauts would use on missions to other planets. Tewksbury was part of the “back room” of geologists and scientists who tested data collection and communications while astronauts operated NASA’s new generation of rovers in the field. On a mission that simulated the use of the rovers on a near-Earth asteroid, Tewksbury was in the back room at Mission Control in Houston, hallowed ground for sure. Still, she felt a twinge of jealousy. “I was the lead for imagery for one of the rovers, but Carolyn,” Tewksbury says with pride, “got to be one of the rover drivers.”
<urn:uuid:7cce32a9-9e50-4a81-857c-7bbab8f1896a>
CC-MAIN-2022-33
https://my.hamilton.edu/magazine/fall14/through-the-eyes-of-a-geologist
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00205.warc.gz
en
0.977504
2,564
2.578125
3
As a young boy turtles played only a small role in my life. While weeding my mother’s garden or playing in the back yard I came across the occasional boxer turtle. Bemused by the slow moving animals I loved watching their halting movements through the underbrush. It never occurred to me turtles could be a source of food or reinforce social status. How unaware I was! A recent review of whaling journals at the San Francisco Public Library has made clear how little I still know about the central role of turtles and turtle soup on whaling voyages in the Age of Sail. It is Americans’, particularly whaling seamen’s, fascination with sea turtles during the Age of Sail and how turtles and turtle soup helped shape identities that I want to discuss in this post. With the exception of New Orleans restaurants and some cruise ships, there are not many American public dining spaces that today serve turtle soup. Most contemporary Americans have never eaten turtle soup. The same could hardly be said for early settlers of the Americas or their European cousins. Englishmen sailing to Virginia who found themselves shipwrecked on Bermuda in 1609 subsequently set out for Virginia on the Sea Venture with supplies that included green turtles. Despite early seventeenth century attempts to limit harvesting of turtles the Bermudian turtle population was quickly depleted. As a result, Europeans spread out over the western Atlantic to Florida, the Cayman Islands and elsewhere in search of turtles. Turtlers, i.e. small vessels harvesting turtles, became an important component of the Western Atlantic maritime economy. These small vessels were critical to the development of a web of commercial connections whereby turtles were captured and then shipped to North American and European consumers. In the ensuing centuries overhunting resulted in turtle canneries, such as A. Granday’s of Key West, having to limit their production of turtle soup, and eventually lead to strict regulation of turtle harvesting. With the passage in 1971 of the Endangered Species Act, killing of sea turtles in United States waters was prohibited and Granday’s and other turtle canneries went out of business. But in the 18th and 18th centuries turtles were an important food staple in the Atlantic. A market for turtles and turtle soup was well developed in England as early as 1753 when Gentleman’s Magazine contained several notices of large sea turtles being dressed in London public houses. Demand for turtles grew so significantly that ships from the West Indies constructed wooden tanks in which live turtles could be transported. And an association between turtle soup and upper class pretensions developed fairly quickly. Even before the American Revolution turtle soup was associated with fops or dandies, wearers of macaroni wigs. “The Drowsy Contrast or Turtle & Bone Soup Macaronies” http://www.britishmuseum.org/research/collection_online/collection_object_details/collection_image_gallery.aspx?assetId=124832&objectId=1619123&partId=1 Residents of North American were not far behind their British cousins in both developing a taste for turtle soup and associating its consumption with refinement. It appears that Charleston was the first major North American city which developed a market for the consumption of turtle soup in public dining spaces. Given the city’s proximity to West Indian and Floridian sources of sea turtles this is hardly surprising. In 1784 the Charleston Coffee Shop offered “Turtle Soup every Monday, Wednesday and Friday.” Soon competitors such as Moore’s Exchange Coffee-House and Tavern and Browne’s Eating-House placed similar notices in local papers. By the 1790s advertisements regularly appeared in New York, Philadelphia, Baltimore and Boston newspapers offering the public “Real Green Turtle Soup!” that was “of the best quantity,” while “gentlemen of the city” were urged to partake in dinners in which turtles would be “dressed in the finest style” before heading to the theater. The popularity of turtle soup during the 18th century is also apparent from the1798 country dance called “Turtle Soup.” (Those of us of a certain age might remember the Turtles‘ last album was called “Turtle Soup.” I doubt that Flo and Eddie were inspired by the eighteenth century dance, but stranger things have happened). In the first three decades of the nineteenth century, whether dancing to the sounds of “Turtle Soup” or not, many Americans and Europeans who were or aspired to be among the leisure classes ate turtle soup. Dining proprietors in Newburyport, Salem, Hartford, Newport, Providence, and Albany all advertised that turtle soup was on their menus and sought “gentlemen” to feast on the delicacy. Turtle soup came to be seen as a symbol of Victorian opulence, associated with lavish Lord Mayor’s and aldermen’s banquets. At most such galas, as well club dinners at hotels such as Young’s, the Parker House and the Albion Hotel, turtle soup was almost “invariably offered” as the first course of a extensive menu. Well off families were urged to have their servants pick up soup so the “families can be supplied.” In contrast workers who crowded into noisy crowded nineteenth century sixpenny restaurants where rapid fire meals were consumed in less than thirty minutes did not expect to be served turtle soup. The expense of turtle soup and what Miss Corson’s Practical Cookery’s calls the “inconvenience” for families in killing large turtles did not stop those of limited means from aspiring to eat turtle soup. Price may have deterred workers from purchasing turtle soup but inventive cooks soon came up with an alternative – mock turtle soup. Mock turtle soup was popular in both England and North America and recipes for it can be found cook books of the late 18th and early nineteenth centuries. Typically , as did Mrs. Raffald’s 1807 Experienced Housekeeper recipe for “artificial” turtle soup, calf’s head was used to provide the gelatinous texture found in traditional turtle soup. But whether the mock turtle soup utilized calf’s head or fried ham it offered workers a means to experience the pleasure and associations of turtle soup without the expense or fuss involved in killing a large turtle. For seamen whose diets were, to be charitable, dull and unvarying, sea turtles offered both an opportunity to ‘spice up’ their diet and partake in an activity that on land was generally limited to those of greater means than the typical Jack Tar. Baltimore Patriot, July 1, 1821 Sailors, particularly whaling seamen, had a good deal of experience capturing and eating turtles. This resulted in mariners expressing preferences concerning the types of turtles they ate as well as how the turtles were prepared. New Bedford men often considered the green turtle “somewhat coarse food” causing them to leave the “flat-shelled fellows on the beaches behind us.” However, Massachusetts whalers did like terrapin turtles that they toasted, claiming that toasted terrapin was “sweeter than almond.” Other seaman, such as William Whitecar, expressed a preference for Madagascar terrapins. Whitcar and his mess mates found that despite some turtles having lived in the ship’s hold for a year they were “quite fat, and [provided] a delicious meal.” When whaling crews captured large numbers of turtles ships’ cooks were said to create dinners “surpassing a civic banquet in the quality and quantity.” Given the immense size of some sea turtles, which could weight as much as two hundred pounds, the killing and cooking of these animals in the tight confines of a whaling ship was no easy feat. Sailors appreciated the efforts of ship cooks in preparing turtle meals. The mariners described their dinners of turtle meat and/or turtle soup as “feast[s] fit for a prince.” In describing turtle dinners on board a whaling ship the American seaman Thomas Beale remarked that “our black cook” had presented a feast that was “aldermanic.” Clearly Beale and other whalers enjoyed the fact that despite their physically demanding and often isolated lifestyle they were able to partake in eating high end food and engaging in a dining experience that on land was generally only experienced by more wealthy individuals such as aldermen. Whether the turtles they ate were green turtles from Florida, Madagascar terrapins or Pacific sea turtles, seamen’s dining on turtles constituted an inversion of usual class roles. Whaling seamen engaging in turtle fests at sea was the maritime equivalent of Election Day or Pinkster Day, where a black slave was elected Governor for a day. While neither turtle-fests at sea nor Election or Pinskter Days undid existing class structures, they did provide the underclass – sailors and slaves – a brief respite in which roles were reversed. Wealth typically translates to greater health, meaning wealthier individuals who can afford better quality and diversity of food on average live longer. It is likely that eating turtle meat and soup allowed some unknown number of whaling seamen to reap benefits of a more diverse diet typically limited to those of greater means, and perhaps live longer lives than seamen who had less diverse diets. What might be most interesting about the class implications of turtle soup is how long it retained its character as a dish for society’s elites. When John Lusty, chairman of the English firm which imported turtles, died in 1947, his obituary noted Lusty’s turtles had “graced the table of many a prince and society hostess,” as well as three monarchs. And yet, as the below image of Worthman’s Mock Turtle Soup indicates, even today there are still some who cannot afford turtle soup who seek to enjoy the luxurious experience associated with eating the soup without paying its cost.
<urn:uuid:c0bdeb4f-9b0c-4ea7-81a2-e66444736c94>
CC-MAIN-2022-33
https://uncoveringhiddenlives.com/tag/charles-w-morgan/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00004.warc.gz
en
0.971571
2,093
3.421875
3
In Industrial Cooling Towers (CTs), biofouling is a major concern as they can have a crippling effect on cooling water circuits. Bio films are layers of bacterial colonies, which form saccharide or ‘sugar’ linkages between these colonies. This results in the formation of a film or slime layer on the substrate or any surface in the water circuit. They utilise nutrients and other microbes present in water to propagate and increase in thickness. Biofilms are the result of evolution by microorganisms to survive in fast moving streams of water. They use the linkages to strongly adhere to any surface or substrate. The structure of these biofilms is referred to as “Woven Matrix Colony”. This makes their removal a major challenge in CTs. The matrix is basically water. The microbes are dispersed in this matrix of water. Biofilms are made up of 85 to 95% water. The temperature and free nutrient availability in cooling towers make them ideal for biofilm growth. The protection afforded to the microbes by the slime allows for rapid multiplication in the numbers of bacterial colonies – causing the biofilm to increase in thickness, and it results in various problems in the cooling circuit. Reduction of heat transfer efficiency Biofilms have one-fifth the conductivity value of carbonate scale. Hence, 1mm of bioslime has the same effect as a 5mm carbonate scale layer. Carbonate scale of around 5 mm thickness reduces the heat transfer efficiency by at least 27%. Since biofilms have one fifth the conductivity of a carbonate scale, it can be inferred that a 1mm layer of bio slime causes the same decrease in heat transfer efficiency. Hence, for the same circulation rate ΔT will be reduced by the same amount. Conversely, for the same ΔT, the circulation rate required will increase by an equivalent amount. Increase in Corrosion: Sulfate and Iron Reducing Bacteria in the circuit can greatly increase the corrosion rate in the pipelines. If unchecked this can even result in the need for changing of the entire pipeline. Friction Loss: Biofilms function as stagnant films of Water. This reduces the effective pipe diameter, resulting in the increase of friction losses leading to higher head requirements. For power plant and Industrial cooling towers, the circulation rates are so high that even a marginal increase in head loss or pump head requirement leads to a huge increase in BKW and energy costs. Shut Down for Cleaning: If biofouling reaches an alarming level where shut down and cleaning of the cooling towers is required, then the process shutdown costs in the industries or the zero power generation costs in power plants are enormous. If not properly controlled, this can occur with greater frequency causing huge losses. Complex Biocide Programs: If disinfection is not satisfactory, complicated biocide programs with frequent change in biocides become necessary. These result in high chemical costs. Use of Surfactants, Cleaning Agents: The need for surfactants, cleaning agents etc., are increased with increase in fouling and this also leads to higher chemical costs. Circulating water systems operate mostly between 30 to 40OC. These are ideal breeding grounds for various pathogenic and resistant bacteria. Bacteria like Legionella residing in the biofilm can reach critical pathogenic concentrations and result in outbreaks of Legionnaires disease. It is essential to keep biofilms under check to prevent any such outbreaks. Conventional treatment and its problems Chlorine is most commonly used for the treatment of biofouling. Disinfection effect of chlorine is highly pH dependent – almost nil beyond pH > 8. Chlorine has limited action against biofilm and Blue Green Algae. It is ineffective against certain deadly pathogens like Legionella, which are the most common problems in CTs. If sodium hypochlorite is used then the degradation of its concentration is much faster. In case of chlorine gas, there is a high risk in storing and handling. Also, statutory regulations are high in storing chlorine tonners. When organic biocides are used, certain bacteria and pathogens become resistant over the period of time, and hence, the treatment programme needs to be continuously revised. Biocides are generally proprietary, and hence expensive. Biofouling treatment with ClO2 Chlorine dioxide (ClO2) is a highly effective, environmentally friendly microbicide. It is a selective oxidant that eliminates both planktonic and sessile bacteria, disinfects surfaces, and destroys biofilms very rapidly. Chlorine dioxide is a stable, dissolved gas that is a strong bactericide and virucide at concentrations as low as 0.1 ppm. With minimal contact time, it is highly effective against many pathogenic organisms – such as Legionella, amoebal cysts, Giardia cysts, E. Coli, and Cryptosporidium. ClO2 destroys biofilms, and therefore bacterial regrowth is significantly impeded. Chlorine dioxide is becoming increasingly popular in the field of water treatment as the disinfectant of choice for many water treatment applications. The chemical formula for Chlorine Dioxide is ClO2. The properties of ClO2 seem to be an ideal mix of the salient properties of ozone and chlorine. Chlorine dioxide is environment friendly, and in fact, is a pollution free technology, that assists in protecting the environment and human health, from bacteria and by-products formed from other disinfection methods. Effective even at wide range of pH Unlike chlorine and bromine, it does not form weak acids in aqueous solution. For example, in case of chlorine it forms hypochlorous acid (HOCl) in aqueous solution which actually is the disinfectant and not the chlorine as such. This reaction is highly pH dependent. The formation of HOCl is highly pH dependent, at lower pH (<4) value it remains as chlorine. When the pH goes beyond 7 it starts forming hypochlorite ion. Hypochlorite ion is a weak disinfectant. Especially, for CT applications where the pH is maintained between 7.8 and 8.2, only 65 to 85% of chlorine dosed will remain as hypochlorous acid (HOCl) to do the disinfection – rest will be as weak hypochlorite ion. In other words, to have desired result, we may end up dosing 3 to 4 times of the actual demand. Since chlorine dioxide is a dissolved gas, this allows ClO2 to be effective over a wide pH range. ClO2 being a neutral species with rapid disinfection kinetics, is 100% available for disinfection in hard or soft water. So, in case of ClO2, we just need to dose what exactly is required. Fig. 2 is a graphical representation showing how the pH affects the biocidal activity. Mechanism of disinfection by ClO2 Chlorine dioxide disinfects by disrupting metabolic cycles of microorganisms due to its effect on DNA. This makes it very effective even against virus spores. This characteristic of ClO2 also ensures perfect disinfection of the water eliminating bacteria, viruses, fungi, algae, protozoa etc. It is approximately 2.5 times more oxidizing than chlorine and hence is able to penetrate tough biofilm layers. This makes chlorine dioxide the ideal disinfectant for biofilm removal. The mechanism of disinfection coupled with its very strong oxidizing nature allows chlorine dioxide to destroy chlorine resistant biofilms, and many other chlorine resistant germs. Biofilm is similar to a spider web in design and function. When certain microbes reach a surface, they attach themselves by producing polysaccharides (the web). This material is sticky and very difficult to remove. Channels are formed in this film, through which water flows. The sticky web catches nutrients and other microbes that pass by, providing food and a quick growth mechanism. Once a biofilm is established it is very difficult to remove, often requiring manual cleaning. It forms a habitat for pathogenic organisms. Even if all water-borne microorganisms are eliminated, regrowth quickly occurs due to bacterial communities and nutrients in the biofilm. The microorganism in biofilm is often vastly in excess of the quantities of those in the planktonic phase. Chlorine, by and large, is a good disinfectant (when we use around the pH of 7). However, chlorine cannot be used as a substitute to biocide. Biocidal activity of chlorine is very less. In presence of biofilm, chlorine also loses effectiveness as disinfectant – as it cannot penetrate biofilm cells and kill the pathogens that are underneath the biofilm. ClO2, like ozone, is a dissolved gas that penetrates biofilm by molecular diffusion. However, unlike ozone ClO2 is stable and soluble, allowing it to travel to the base of the film – where it attacks microorganisms and destroys the biofilm at its point of attachment. Other oxidizers react mostly on the surface of the biofilm to form an oxidized layer, like charring on wood. This precludes further penetration. No biocide has proved to control biofilm better than ClO2. In terms of stability, ClO2 is much better than Cl2 or ozone. The residual ClO2 remain in a longer time compared to that of chlorine or ozone in a closed environment. Fig. 3 shows how stable ClO2 is in comparison with chlorine. Unlike chlorine, ClO2 is very selective in its reaction. It does not unnecessarily react. For example, if the water has got ammonia and urea, in case of chlorine it gets consumed, so the dosage goes higher than the demand. In case of chlorine dioxide, it does not react with ammonia and urea, hence, we dose only for the biocidal and disinfection activities, which make it ideal for fertilizer plants. Also, chlorine dioxide does not react with oils that makes it suitable for applications in petrochemical industries. In early part of this article, we have seen sulfide and iron reducing bacteria in the circuit can greatly increase the corrosion rate in the pipelines. In addition to this, if we dose more oxidants than the demand – it will worsen the situation and cause more corrosion that happens more often with chlorine. In case of chlorine dioxide, it can oxidise sulphide and iron reducing bacteria, and prevent corrosion that are caused only by this. Secondly, the dosage rate requirements are very less compared to chlorine, and hence there is no additional corrosion associated with excess dosing. In other words, chlorine and chlorine dioxide have similar effects in causing corrosion, but as the dosage rate of chlorine dioxide is very less compared to that of chlorine, corrosion rate will also be proportionately less. Though the cooling waters are not in direct contact with humans, there are health issues related to poor treatment of cooling water through Legionnaires. Legionnaires’ disease is a potentially fatal pneumonia caused by Legionella bacteria. Infection is caused by breathing in small droplets of water contaminated by the bacteria. The disease cannot be transmited by physical contact. Everyone is potentially susceptible to infection. But some people are at higher risk, e.g., those over 45 years of age, smokers and heavy drinkers, those suffering from chronic respiratory or kidney disease, and people whose immune system is impaired. Legionella bacteria is common in natural water courses such as rivers and ponds. Since Legionella are widespread in the environment, they may contaminate and grow in other water systems – such as cooling towers and hot and cold water services. They survive in low temperatures and thrive in temperatures between 20-45OC, if the conditions are right, e.g., environments present with nutrients such as rust, sludge, scale, algae and other bacteria. They are killed by high temperatures. Awareness about Legionella in India is slowly rising, and awareness is needed further. In some of the developed countries, they monitor the deaths due the Legionnaires as we do the same for road accidents. Some of the countries have made some guidelines for the employers to understand the health risks that are associated with Legionella – and how to control them. Chlorine dioxide is very effective against this deadly bacterium. Secondly, in case of ClO2, there is no hazard of storing deadly chemicals such as chlorine gas, since ClO2 is generated onsite and dosed immediately. Generation of ClO2 Chlorine dioxide cannot be transported or stored for longer periods, and it needs to be generated on site using safe generation methods with the required safety tips and monitoring systems. Chlorine Dioxide can be generated by various methods, however for industrial applications, the below methods are used: Generation from chlorite and hydrochloric acid This process is most commonly used in the field of drinking water disinfection given the reliability of its operation and no problems associated with chlorine handling. 5 NaClO2 + 4 HCl → 4 ClO2 + 5 NaCl + 2 H2O Generation from chlorite and chlorine There are two processes for the production of chlorine dioxide by means of oxidation of sodium chlorite with chlorine: the first uses chlorine in aqueous solution in the form of hypochlorous acid, while the second one uses chlorine in molecular gas form. The first system for the production of chlorine dioxide consists in pumping a sodium chlorite solution into a chlorine aqueous solution. The two solutions react as follows: 2 NaClO2 + Cl2 → 2 ClO2 + 2 NaCl Generation from chlorite, hydrochloric acid and hypochlorite In this process chlorine dioxide is generated using three chemicals. Because of the volatile nature of hypochlorite, purity and yield of the ClO2 is not so consistent in this method of generation. 2 NaClO2 + NaOCl + 2 HCl → 2 ClO2 + 3 NaCl Though the chemistry looks very simple, the equipment part of generation is not as simple as the chemistry. Yield and safety are the most important parameter of equipment performance. Yield is the ratio between theoretical and actual amount of ClO2 generated. On the safety front, ClO2 can be explosive above a concentration of 30 g/l in water, and so the safety interlocks should be fool proof to ensure the maximum concentration in any part of the system is well maintained within this. There are basically 2 types of generators available: Surface mounted and Underwater. In this type of generator, the reactor and chemical dosing pumps are mounted on a common skid with all safety interlocks hooked up – to a Programmable Logic Controller (PLC) to ensure safe and efficient generation. These types of generators are best suited for smaller amount of ClO2 generation say up to 500 g/hr, which are the most common requirements in food, beverage and pharmaceutical water disinfection. In this type of reactors, the formation of chlorine dioxide takes place only in the water, and it is not present in any other part of the plant. For capacities higher than 500 g/hr, we can say it is a safe generator – because there is no possibility for ClO2 to be released to the atmosphere. Also, the size of the reactors are much compact and the yield is 95% +/-2 compared to 80 to 85% for the surface mounted reactors. Dosing pumps used for chemical injection into the reactors play a major role for the high yield. The latest technology-based Grundfos Digital dosing pump, that uses stepper motor technology has got high accuracy of +/-1% with very low pulsation, and is best suited for this application. The other alternatives such as electromagnetic or mechanical dosing pumps, which are having accuracy level between 4 and 8%, will reduce the yield and thereby increase the operating cost substantially. In terms of operating costs, with high yield ClO2 generators, the operating cost will be lower than that of conventional systems for cooling tower applications – and offers high degree of environmental safety – and better life for the capital equipments. Grundfos has got highly reliable, safe and efficient ClO2 generators. The Grundfos team, with its vast experience and expertise, can provide effective solution to your cooling tower biofouling problems.
<urn:uuid:6022c117-440d-45f3-92f0-d12051661c07>
CC-MAIN-2022-33
https://www.coolingindia.in/biofouling-treatment-with-chlorine-dioxide-for-cooling-towers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00005.warc.gz
en
0.932941
3,408
3.4375
3
Bury St. Edmonds Witches Of the various witch trials of Suffolk, England, conducted in Bury St. Edmonds during the 17th century, two episodes stand out. In 1645, 68 witches went to their deaths on the gallows, victims of the witch-hunting zeal of Matthew Hopkins and John Stearne. Seventeen years later, in 1662, Sir Matthew Hale presided over trials that led to the condemnation and execution of two witches based on the flimsy spectral evidence of hysterical, “possessed” children. The 1662 trials heavily influenced officials of the Salem witch trials in 1692–93, the worst witch incident in the history of America Bury St. Edmonds Witches. The Hopkins trials. In 1645 Matthew Hopkins, England’s most notorious witch-hunter, and his associate, John Stearne, a rigid Puritan, were storming about the countryside routing out “witches” in exchange for exorbitant fees. Using unscrupulous methods to extract confessions, the witch-hunters, according to surviving records, charged at least 124 Suffolk men and women with witchcraft, who were tried at Bury St. Edmonds in August. (There probably were more persons charged than surviving records indicate.) Most of the “confessions” concerned the possession by evil imps, the making of compacts with the Devil, and having carnal relations with the Devil, the latter of which was guaranteed to inflame Puritan outrage. Some of the witches also were charged with the murder of livestock and people. Victims were thoroughly searched for witch’s marks , a most humiliating ordeal for women, since the “marks” usually were found in or on the genitals. These marks, which were said to be supernumerary teats from which imps sucked, were discovered in the folds of the labia or were sometimes the clitoris itself. Stearne had a particular fondness for searching for witch’s marks and boasted that 18 of the Bury St. Edmonds witches “all were found by the searchers to have teats or dugs which their imps used to suck. . . . And of these witches some confessed that they have had carnal copulation with the Devil, one of which said that she had conceived twice by him, but as soon as she was delivered of them, they ran away in most horrid, long and ugly shapes.” Men also were said to have these teats. John Bysack confessed that he had been compromised 20 years earlier by the Devil who came in through his window in the shape of a sandy-colored, rugged dog and demanded that Bysack renounce God, Christ and his baptism. Bysack agreed, and the Devil used his claw to draw blood from Bysack’s heart. The Devil gave him six imps in the forms of snails, who sustained themselves by sucking Bysack’s blood. Each snail was an assassin with a particular assignment: Atleward killed cows, Jeffry pigs, Peter sheep, Pyman fowls, Sacar horses and Sydrake Christians. Stearne claimed he found snail marks on Bysack’s body. Margaret Wyard confessed to having seven imps, including flies, dogs, mice and a spider. She had only five teats, however, which forced her imps to fight “like pigs with a sow.” Wyard said the Devil had come to her seven years earlier in the likeness of a calf, saying he was her husband. She would not submit sexually to him (a comment, perhaps, on the state of her marriage) until the Devil returned as “a handsome young gentleman.” Imps of other accused witches included a chicken named Nan; two “heavy and hairy” mice; and three imps “like chickens.” Stearne recorded that 68 witches were executed; one who was tried at Ipswich instead of Bury St. Edmunds reportedly was burned to death. Dozens more may have been hanged—records are uncertain—and still others died in prison. Ironically, Parliament had established a special commission to oversee witch-hunting activities, in response to reports of excesses. The commission, however, benignly accepted the “evidence” for Devil’s pacts and the existence of imps, leaving Hopkins and Stearne free to wreak their havoc for another two years. The hysterical children of 1662. Rose Cullender and Amy Duny of Lowestoft, Suffolk, were two old widows who were accused of bewitching seven children, one of them to death, and performing various other malicious acts upon their neighbors over a period of years. Sir Matthew Hale (later Chief Justice), who heard the trials, was a believer in witchcraft and did nothing to discourage the most outrageous accusations. The trials of the two unfortunates were recorded by Cotton Mather in On Witchcraft: Being the Wonders of the Invisible World (1692). Duny’s fate as a witch was sealed when she was hired as a baby-sitter by Dorothy Durent for her infant. Duny tried to nurse the baby, William, contrary to Durent’s instructions, and was reprimanded, much to her (obvious) displeasure. Not long after, the baby began having fits that went on for weeks. Durent took it to a “white witch” doctor (a man), who told her to hang the child’s blanket in a corner of the chimney for a day and a night, then wrap the infant in it and burn anything that fell out. According to Mather: . . . at Night, there fell a great Toad out of the Blanket, which ran up and down the Hearth. A Boy catch’t it, and held it in the Fire with the Tongs: where it made a horrible Noise, and Flash’d like to Gun-Powder, with a report like that of a Pistol: Whereupon the Toad was no more to be seen. The child recovered. The next day, Duny reportedly was seen with burn marks. Now labeled a witch, Duny was accused of causing fits in other children who had had contact with her. The Durents’s 10-year-old daughter, Elizabeth, fell into fits, complaining that the specter of Duny plagued her. The girl became lame in both legs and died within three days. Mrs. Durent herself went lame and had to walk about with crutches. Another Durentchild, Ann, suffered fits and swooning spells and vomited pins, blaming her maladies on the specter of Rose Cullender. The nine- and 11-year-old daughters of Samuel Pacy, Deborah and Elizabeth, suffered fits that included lameness, extreme stomach pain as though being stabbed with pins and “shrieking at a dreadful manner, like a Whelp, rather than a rational creature.” They also vomited crooked pins and a two-penny nail. These girls cried out against Duny and Cullender, claiming to see them as specters, and saying that the witches threatened them not to talk, lest they be tormented 10 times greater than before. The Pacy girls could not pronounce the names of Lord, Jesus or Christ without falling into fits. But the names of Satan or the Devil made them say, “This bites, but it makes me speak right well!” The Pacy children also saw invisible mice, one of which they threw on the fire, and it “screeched like a Rat.” Another invisible mouse thrown on the fire “Flash’d like to GunPowder” just like the toad of Durent. The specter of Duny, meanwhile, tempted one of the girls to destroy herself. Jane Bocking was so afflicted with fits and pain caused by the specters of Duny and Cullender that her mother had to testify in her place. Another girl, Susan Chandler, said Cullender would come into her bed, and that she was accompanied by a great dog. Chandler had fits and vomited pins. Cullender was searched for a witch’s mark. According to Mather. They found on her Belly a thing like a Teat, of an inch long; which the said Rose ascribed to a strain. But near her Privy-parts, they found Three more, that were smaller than the former. At the end of the long Teat, there was a little Hole, which appeared, as if newly Sucked; and upon straining it, a white Milky matter issued out. To bolster the testimony of the girls and their families, the court heard “evidence” from others. John Soam testified that one day, while he was bringing home his hay in three carts, one cart wrenched the window of Cullender’s house. She flew out in a rage, shouting threats against Soam. The cart that wrenched the window later overturned two or three times the same day. The men had such difficulty with the carts—one got stuck in a gate, so that the gateposts had to be cut down—and were so exhausted that their noses bled. Robert Sherringham testified to a similar incident, in which the axle-tree of his cart broke off a part of Cullender’s house. (Perhaps Cullender’s house was in an unfortunate position on a roadway; if these accidents happened regularly, it is understandable that she would lose her temper.) In an angry fit, Cullender told him his horses should suffer for it. Within a short time, his four horses died, followed by many of his cattle. Sherringham also was afflicted with lameness and was “so vexed with Lice of an extraordinary Number and Bignes, that no Art could hinder the Swarming of them, till he burnt up two Suits of Apparel.” As for other testimony against Duny, she was said to have been overheard saying the Devil would not let her rest until she revenged herself on the wife of one Cornelius Sandswel. The Sandswels’ chimney collapsed and their chickens died suddenly. Sir Thomas Browne, a respected physician, testified that the victims were bewitched and commented that witches discovered in Denmark afflicted their victims in the same manner, with fits and vomitings of pins. Mather wrote of Hale’s instructions to the jury: He made no doubt, there were such Creatures as Witches; for the Scriptures affirmed it; and the Wisdom of all Nations had provided Laws against such persons. He pray’d the God of Heaven to direct their Hearts in the weighty thing they had in hand; for, To Condemn the Innocent, and let the guilty go free, were both an Abomination to the Lord. The jury took exactly half an hour to convict Duny and Cullender on 19 counts of witchcraft. The next morning, the children were miraculously restored to good health. Duny and Cullender confessed nothing, and were hanged. When the witch hysteria broke out in Salem in 1692, the authorities took their cue from the 1662 Bury St. Edmonds trials and Hale’s reputation as a judge. As Mather wrote in Wonders of the Invisible World: It may cast some Light upon the Dark things now in America, if we just give a glance upon the like things lately happening in Europe. We may see the Witchcrafts here most exactly resemble the Witchcrafts there; and we may learn what sort of Devils do trouble the World.
<urn:uuid:55f67da9-f950-451c-9e8b-47024034b5eb>
CC-MAIN-2022-33
https://asolitarypagan.com/bury-st-edmonds-witches/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572898.29/warc/CC-MAIN-20220817092402-20220817122402-00603.warc.gz
en
0.98222
2,439
2.953125
3
Why LED curing is important for your print shop As part of our Learning Curve series, Simon Eccles investigates the increasing use of LED light arrays for ultraviolet curing of photopolymer inks in large format inkjets. LEDs are an attractive technology that generates intense light with minimal power consumption, while emitting very little heat and usually enjoying very long lifetimes. They are starting to replace power-hungry, hot and short-lived mercury vapour lamps (aka metal halide) on modern UV inkjets. Low power consumption, cool running, great flexibility in use, long life and little problem with disposal means that LEDs are a very attractive technology in both practical printing terms and as a much more environmentally friendly alternative to mercury lamps. Precisely what the savings are varies depending on the systems, and LED cost-performance and power outputs are changing all the time. However as a rough guide, Mimaki says that a typical UV-LED unit for a large format printer, that outputs 10W of UV energy, consumes about 60W of electricity for the lamps plus about 20W for the cooling fan and the output control circuitry. So, 80W in total, a bit less than the old generation of 100W tungsten filament domestic light bulb. By comparison, the total power consumption of a traditional metal halide lamp is about 1.2KW, which is rather more than a single bar electric fire heater. These lamps run very hot – between 600 to 800 Deg C internally – and they generate radiant heat which transmits to the rest of the printer components, including the heads, ink and most critically, the media. Like-for-like then, a metal halide lamp uses about 15 times as much electricity as a UV-LED curing system. However, because UV-LEDs can be switched on or off near-instantly, printers only need to switch them on during the actual printing cycle. Once a metal halide lamp has been turned off, it cannot be turned on again until it cools down. Thus, it is generally left on constantly while the printer is in use. With a 50% operation cycle a UV-LED array consumes only 1/30th as much electricity as metal halide. This doesn't mean that the whole printer is 30 times more efficient with LED. All printers have common elements such as motors, control electronics, ink supplies and vacuum pumps. So the actual difference in power consumption of the printer as a whole would be less. Even so, a printer with a metal halide lamp consumes three to ten times as much electricity as the one with UV-LED, says Mimaki. Mimaki launched its roll-fed UJV5-160 at FESPA last year, with LED curing. Using UV-LEDs doesn't make a lot of difference to the purchase price of a printer, so over time the LEDs just save more and more money, as a combination of less electricity usage, lower maintenance and virtually no replacement costs. Apart from the obvious reduction in electricity bills, this can be an important factor for companies that are trying to reduce their carbon footprint or get a certificate for carbon neutrality, and may have some relevance to carbon credits. LEDs (Light Emitting Diodes) are solid state electrical components that are widely used in modern lighting applications, with new uses appearing all the time. The UV emitting type (generally called UV-LED) are just more specialised and expensive. For ink curing purposes they are built into arrays of multiple LEDs. They produce a relatively narrow range of wavelengths of UV, compared to the wider range of mercury vapour lamps. It's best to use inks that have formulated been for maximum sensitivity in those wavelengths. Printer manufacturers will be able to supply own-label inks for LED use on their own printers, but it's a factor to be aware of if you use third party inks. Unlike mercury lamps, UV-LEDs don't emit infra red light or radiant heat. This means that the print media doesn't heat up significantly during printing, so heat-sensitive materials can be used. Alternatively, you can use thinner plastics such as vinyls than you would with mercury lamps, as they won't buckle under the LEDs. Thinner media means savings on materials and lighter weight rolls, with benefits throughout the supply chain from delivery trucks to waste disposal. The driver electronics to LEDs do heat up, so large array lamp housings still need some water or fan cooling, but as we've seen, this needs a lot less power than mercury. Lower lamp temperatures may also mean less ambient heating in the pressroom. Normally this is a good thing, though in some cold climates this may mean you have to turn the factory heating up a bit in the winter to compensate, so you lose some of the cost benefits. On the other hand, in warm climates the operators will appreciate a cooler pressroom, and you won't need as much air conditioning power if you have that fitted. The lamp life of a MH lamp is normally considered to be about 1000 hours (up to the time of 30% light reduction). If the lamp operates for 8 hours per day, it will have to be replaced in 125 days (about 6 months with 20 operation days/month). The service life of a single chip with UV-LED is about 10,000–15,000 hours depending on the heat dissipation. If a UV-LED operates for 8 hours a day, with 10,000 hours service life, it lasts for 1,250 days (about 5 years assuming 250 working days per year). Since the UV-LEDs are turned off in non-printing mode, the actual service life would be longer. Most UV-LEDs would never need replacement during the service life of the printer. Old high pressure mercury lamps generated ozone gas, which is hazardous to operators and needs to be extracted by ventilation. However, this is largely overcome by using a glass that filters out the specific ozone-generating wavelength. LEDs don't generate ozone either. Mercury is poisonous so lamps need to be disposed of in line with environmental regulations. There are no significant hazardous materials LEDs, and because they last longer there is lower waste anyway. Another big benefit is that LEDs can be switched on and off rapidly, or varied in intensity, without damage. Mercury lamps work by in effect striking a short-circuit arc through the mercury in the lamps. It takes specialist electronics to fire them up and once fired, you want to keep them running, so they are normally left on throughout the shift, using power and generating heat whether you are printing or not. Printer speeds vary so the energy requirements of the UV curing vary too. There's only limited scope for varying mercury lamp output intensity by changing the power input, so they are in effect on full power all the time and mechanical shutters are used to control the amount of light reaching the media, or to shut it off completely. By contrast, LEDs can be switched so rapidly that this can be used to vary the light output, though it's also possible to vary the brightness by changing the input power levels. As the LEDs are only switched on when needed and can be pulsed to reduce their power output, their lifetime can be extended to years, potentially more than the lifetime of the printer. Higher light emissions are being developed all the time, pointed out Chad Taggart, vice president of marketing and development at Phoseon, a US based developed of LED curing lamp arrays. "The power of LEDs in terms of radiance and energy density or dose, is increasing dramatically," he said. "Every two to three years we're doubling the output capability. For instance we went from 4 Watts per cm2 in 2008 to 8 in 2010, to 16 in 2012. There's no reason it can't hit 24 or more in future. "We believe that the perception of low power is from people not staying up to date with our technology. We have many customers in large format today that are using LEDs for the highest speeds available. Some printers are air-cooled, some are water-cooled. Typically our highest powered products are water cooled. If you keep them cool they'll last 20,000 or 30,000 hours." Although the electronics, firmware and other issues mean that it's unlikely that end users could modify an existing UV mercury lamp printer to use LEDs, it's getting easier to manufacturers to build them in without major modifications. For example Integration Technology Ltd (ITL) in the UK introduced MZero LED lamps at FESPA 2012. These are a straight component swap for its MZero mercury lamp units, which are already used on head carriages in wide format printers. Printers that are designed from the start for UV-LEDs can be smaller, as there is less need to build in space for cooling and extraction fans. Which printers use LED? Inkjet manufacturers are increasingly fitting LEDs to new UV printers as they are launched. Mimaki claims to have been the first to introduce LEDs for wide format, on the UJV-160 in 2008, having first started development in 2003. At FESPA Digital in London last year the same company introduced a pair of fast LED cured printers, the flatbed JFX500-2131 and the roll-fed UJV500-160. Fujifilm's roll-fed Acuity 1600 LED and Roland's roll-fed VersaUV 640 LEJ and flatbed 640 LJF are also among the printers that use LEDs. EFI VUTEk using UV-LEDs as it introduces new variations of its HS and GS printer ranges. However, for its very fastest flatbed, the HS 100 Pro, LEDs alone are not powerful enough. Instead they are used in a hybrid curing system, where the LED are mounted on the head carriage and pin the ink immediately after printing to keep the dots sharp, while more powerful mercury lamps perform the full cure. The EFI VUTEk HS100 high speed flatbed uses a mix of LED and mercury lamps to cope with high throughput Varying the relative timing of the two lamp sets allows EFI to vary the adhesion and gloss levels of the inks. At FESPA Digital in Munich this year Mutoh introduced three new printers with UV-LED lamps. These are the compact 24 inch ValueJet 628, the more conventional ValueJet 1626UH for rigid and roll materials. The third is a new "desktop" A3 format flatbed, the ValueJet 426UF, to rival Mimaki's UJF-3042/6042 family and Roland' LEF-12 and LEF-20 small flatbeds, which also use LED lamps. What they don't work for The initial build cost of very large, high output LED arrays means they're not yet suitable to the very fastest UV flatbed presses such as the biggest HP FB machines or Inca Onsets, or to full-width arrays on solvent-UV hybrid ink presses. However, given the increasing power outputs and falling prices of UV-LED over recent years, it seems inevitable that this trend will continue to the point where it's affordable to replace mercury vapour on all new printers within a few years. So far LEDs aren't cost-effective for full-width arrays either. This prevents them being used in the solvent-UV hybrid ink printers that are currently being shipped by Mimaki (the JV400SUV), Fujifilm (Vybrant F1600) and Colorific (which sells conversion kits for Roland, Mimaki and Mutoh eco-solvent printers). In this case a small amount of solvent is used in the ink, which flashes off on the printer bed to pin the ink, which is then cured by a full-width UV lamp array about 60 cm downstream from the print carriage. A 40 to 60 inch LED array would cost a fortune. However, a lower UV light output is needed than for the lamps used on scanning print carriages (which need to transfer more energy as they only illuminate a small area as the carriage passes over it), so light pressure UV tubes can be used. These use less power than mercury lamps, and generate less heat with no ozone. Visible and wireless futures Although not directly relevant to UV presses, visible wavelength LEDs are seeing more and more use for general lighting, including printing factories. It's likely they will gradually replace conventional incandescent and fluorescent lamps for room and exterior lighting over the next decade. They not only have the power saving, cool running and longevity benefits discussed above, but by building them in RGB colour clusters it's possible to vary the colour output. Ultimately LEDs may be built into glowing wall and ceiling panels so that conventional bulb or strip lamps may disappear completely. Today's LED lamps fit into standard light bulb sockets,. Right now they are much more expensive than the energy-saving fluorescent lamps that have become common across Europe in the past few years. However, prices will fall as adoption rates go up, while their lower power consumption and longer life will make them popular with users. Unlike energy-saving 'CFR' (Compact Fluorescent Reflector) lamps, which contain mercury, there's less of an end-of-life disposal problem with LEDs too. Bright white LEDs are an increasingly familiar sight as running lights on cars, and are just starting to be offered as main headlamps too, though they cost more than even gas discharge headlamps today. There's a computing aspect too. LEDs are currently being developed into a form of wireless data transmission system, called Li-Fi. This could be built into LED lamp units in future and works by switching the LEDs on and off thousands of times per second, so the eye doesn't notice. It has the potential for very much higher bandwidths than today's radio-frequency Wi-Fi. So, LEDs sit neatly at a cross-roads. They are becoming increasingly cost effective on some printers, while larger platforms are not quite there. There are still costs to bear in converting your curing systems, but the savings you can make in bulb-life alone will pay for the investment quickly and you improve your environmental performance while saving money on electricity. If you want to invest in a more profitable future, the scales are tipping towards LED curing - and supported by savings which help the bottom line as well as the environment, that makes it an obvious choice for any printer. FESPA Global Print Expo 2022 Exhibitor Testimonials FESPA Global Print Expo 2022 returned to Berlin from 31st May - 3rd June at Messe Berlin. The exhibition was co-located with FESPA Global Print Expo 2022 and received 11,647 unique attendees with 15,969 visits from 126 countries. Watch testimonials from FESPA's exhibitors here. FESPA Global Print Expo 2022 Visitor Testimonials FESPA Global Print Expo 2022 returned to Berlin from 31st May - 3rd June at Messe Berlin. The exhibition was co-located with FESPA Global Print Expo 2022 and received 11,647 unique attendees with 15,969 visits from 126 countries. Watch testimonials from FESPA's exhibitors here. Watch testimonials from FESPA's visitors here. European Sign Expo 2022 Exhibitor Testimonials European Sign Expo 2022 returned to Berlin from 31st May - 3rd June at Messe Berlin. The exhibition was co-located with FESPA Global Print Expo 2022 and received 11,647 unique attendees with 15,969 visits from 126 countries. Watch testimonials from FESPA's exhibitors here. Watch testimonials from FESPA's exhibitors here. European Sign Expo 2022 Visitor Testimonials European Sign Expo 2022 returned to Berlin from 31st May - 3rd June at Messe Berlin. The exhibition was co-located with FESPA Global Print Expo 2022 and received 11,647 unique attendees with 15,969 visits from 126 countries. Watch testimonials from FESPA's exhibitors here. Watch testimonials from FESPA's visitors here.
<urn:uuid:2023dd4f-68e5-47a7-8e09-c349ee970131>
CC-MAIN-2022-33
https://www.fespa.com/en/news-media/features/why-led-curing-is-important-for-your-print-shop
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00205.warc.gz
en
0.95212
3,340
2.59375
3
In today’s internet age, everyone spends most of their day online. The internet has aided people in different ways. Communication has been enabled with people in various parts of the world making the world feel like a global village. Through various messaging and social media platforms, people can communicate irrespective of their location. Again, businesses and multinational companies have also been supported by the internet. Connections of these multinational companies have been enabled, and online sales have become the order of the day for businesses, aided by the various e-commerce platforms available. Despite the various strides brought by the internet, it has also been the cause of other immoral and criminal behaviors. The internet has enabled various social evils, and also a crime to be conducted such as the sale of illegal equipment and drugs on the dark web, and cyberbullying. Cyberbullying has become the most emerging con of the internet whereby people using the internet are harassed when over the internet. Laws to protect people from any cyber threats have not be developed concretely thus it is almost impossible to classify cyberbullying as a crime. The police can therefore not control threats from the internet because they cannot persecute the perpetrators. This paper discusses the issue of the police policy that hinders the prosecution of cyber bullies. Cyberbullying is one of the problems that arose with the advent of the internet. Cyberbullying refers to the use of technology to any hostile, repeated, and deliberate behavior towards a specific person to harm them. These includes any threats that the victim received from people. Cyber bullying has been used hand in hand with cyberstalking and trolling. Most of these instances happen on social media platforms such as Facebook and Twitter, and in gaming platforms where people interact. Different reasons exist explaining why it is close to impossible for the police to control any threats that happen online. Most of the reasons why the police cannot be able to control threats on the internet revolve around policies in place in the law. These policies include geographical and law jurisdiction, and policies revolving around the definition of the crime. These policy-related issues are what make controlling online threats through persecutions difficult. The first policy that prevents the police from controlling Internet threats is the jurisdiction issue in the branches of law. In most countries, branches of law are classified into the penal system, the civil system, and the regulatory system. The criminal (penal) system of law deals with offenses that are prosecuted by the government whose punishment is either monetary fines, serving prison terms, or both. In crimes seen as serious crimes, this punishment can also result in capital punishment. The civil system deals with disputes between organizations or individuals in which whoever loses the court battle pays the other party regarding damages or receives court injunctions depending on the case, or both. The regulatory system is in charge of specific sectors and can either give or take away licenses depending on the case. All these systems have dedicated departments for dealing with specific crimes. There are judges who deal with traffic offenses while others deal with divorces. With cyber bullying, it becomes difficult to classify the act as a crime in the first place due to the law that defines the crime. This is what makes it impossible to control threats from the internet. No dedicated agencies have been set up by the government, or by the law to deal with any cases dealing with cyber bullying. Therefore, when such cases of bullying get reported to the police, they are seen as removing resources from other departments that need them the most. An example of such a case is when Caroline Criado-Perez was being trolled on Twitter, and the police regarded the issue as having huge volumes of threats that made it hard for ‘a hard-pressed police service’ to investigate. This would divert the police from ‘dealing with something else’. This shows that the there should be a dedicated section of the law and the police to deal with online threats. Another reason why it is difficult for the police to control threats from the internet is that of the geographical jurisdiction. Geographical jurisdiction talks about the authority over a specific location that crime, or in this case threats and bullying occurred. The court refers to the location as the venue. For any court or even government agency such as a specific police department, they only have power or jurisdiction over crimes that happen in the specific geographical locality. This means the location of the perpetrator of the crime, that of the victim, or the place of occurrence of the crime. With threats that happen on the internet it is hard for the courts or the police to claim jurisdiction since that specific threat can be committed by a person living in a different jurisdiction, the crime can happen in a different jurisdiction, or the victim of the crime can live in a different jurisdiction from that which they have authority. These jurisdiction issues make it extremely difficult for the persecution of the perpetrators. Before any department or government agency can start any investigations of any kind, it has to have jurisdiction. For cyber crimes, it is difficult to get that ‘perfect crime’ where the victim, the venue of the threat, and the perpetrator are all in an area where a court or the police department tasked with investigating the threats have jurisdiction. The complexity of geographical jurisdiction has made it difficult to act on any of the internet threats that may occur. Consequently, the reason why the police cannot be able to control threats from the internet is that these threats are not recognized as a criminal offense. Most people do not categorize anything that happens on the internet as a crime, and therefore it is difficult for the police to control threats on the internet. According to the definition of crime as stated by the police, a crime must be ‘unequivocal, unconditional, immediate, and specific’ and clearly show ‘gravity of purpose and an immediate prospect of execution of the threat.’ Therefore, if the threat does not contain all of the above, the police do not consider it to being a crime. This is the main reason why it is hard for the police to control any threats happening on the internet. Many people do not believe that any threats that happen online are that serious. Take an example of a few students playing games on the internet. If one of them gets beaten by the rest, they might result to abusing or even threating the rest of the gaming mates. Those who are threatened might result in giving back threats of their own. This shows that most people on the internet do not take threats from the internet seriously. Again, Amanda Hess in her article Why Women Aren’t Welcome on the Internet talks about how she felt for feeling scared after someone on Twitter threatened to decapitate and rape her. She says that she felt embarrassed for being scared, and then pissed off. According to her, it was unlikely that the person would actualize their threats. For most people who are seen as controversial on the internet especially due to the stand that they take on certain topics, then it is normal for threats to fly around from the people affected by the said topic. Despite most threats not being actualized, some crimes do happen. In some rare occurrences, some people do threaten to commit crimes via the internet and later actualize those threats. It is such rare cases that make the rest of the people threatening internet users look bad. Here is why: one might threaten someone as a joke but at the end of the day, the victim using examples from cases where threats from the internet have been carried out decides to take the issue seriously. Therefore, people should be careful about what they say online since it might end up not being understood contrary to how they had intended it to be understood. Consequently, online threats can turn physical too. According to A Pew Research survey, about five percent of women who had been threatened online or even abused had got into ‘physical danger’ after the online incidence. This shows that though rare, online threats can be actualized in the form of stalking, or in some extreme cases, even physical abuse. Most of these occurrences happen to girls. Research shows that teenage girls are most likely to be threatened online than boys. This is what develops to when the teenage girls grow to women. for the women, just an online appearance can be what inspires abuse. Therefore, girls and women should be careful online and report any cases of harassment or threats to the authorities just to be safe. Doing so ensures one’s security since the authorities would be on the lookout for any potential incidences. All said, most of the threats are not actualized. From the Pew Research, only five percent of threats led to some physical danger: therefore, about 95% of the threats did not lead to physical danger. This shows that most people making the threats, or even harassing women online are not capable of actualizing the threats physically. They just do so due to the privacy policies, and anonymity they enjoy from the internet. Without this anonymity or privacy policies, then these online stalkers, bullies, and trolls could not dare threaten or harass anyone. They would be afraid of getting in trouble with the authorities. Despite online trolls not actualizing their threats physically, this harassment needs to stop or be stopped by those in authority. The threats can have a negative impact on the victims. They might live their lives in fear of being physically hurt by those who threatened them. Although the police do not have any form of control for what happens online, the lawmakers need to pass various policies that would protect all online users from trolls. So as not to infringe on privacy policies developed by the owners of the internet platforms, such policies would be achieved by developing them in collaboration with the owners of the platforms. In conclusion, the use of the internet has not only brought advantages but disadvantages to the users. Online harassment and threats are the main issues that have given a bad name for the internet. The police cannot be able to control what happens on the internet especially due to the anonymity offered by the internet. All they can do is be on the lookout for users who have reported any online harassment. To give more authority for the police act on, then the policy makers need to develop laws that are favorable to the prosecution of online trolls.
<urn:uuid:9e679a1a-7407-4152-baee-40f82d55bf35>
CC-MAIN-2022-33
https://great-essays.com/essays/cyberbullying/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00605.warc.gz
en
0.963191
2,422
3.40625
3
How aware are you about infections in medical tourism that can happen due to many reasons? Whether you are a patient or any medical tourism business, you need to have a good understanding of this and take adequate measures. Infections can be mild or serious, which may again vary from patient to patient. Endemic diseases tolerant to the local population may turn out fatal for foreign patients. In this guide you will read about: Guide on How to Take Protection from Infections in Medical tourism: Tips for patients, hospitals and other facilities Common infections in medical tourism One of the most common illnesses medical travelers face is the traveler’s diarrhea and the major reasons for this ailment is the ingestion of certain organisms found in contaminated food or water. Anxiety, allergies and dietary changes could also be the reason for traveler’s diarrhea. Other travel-related health issues include malaria, dengue, yellow fever, hepatitis A, hepatitis B, typhoid fever, and cholera. In a foreign land, the infections can occur due to many reasons. Even a small allergy, if left ignored, could potentially trigger serious infections. The most common vector-borne diseases are the yellow fever and malaria. It is important to note that if you do not receive the right treatment for such diseases, they can turn fatal. If proper medication is on hand, you could avoid any further damage to the body. In case of certain infections, the old adage “prevention is better than the cure” holds true. Prevention from infections is not easy. It is even more difficult for people who are already suffering from diseases. It is particularly important for patients who intend to undergo surgery in a foreign land to follow strict guidelines, as they are at an increased risk. Medical tourists should have the necessary information on how to stay healthy and how to self-medicate or seek medical help in case they contract any disease in the foreign country. Medical preparation is even more important if you are traveling to a country where vector-borne diseases are widespread. When it comes to prioritizing travel-related health recommendations, a medical tourist should always keep in mind the risks of travel-related illness and the importance of vaccination and medicine. How to protect against infections The first step towards protection against infections is maintaining hygiene.Medical tourists, as they are mostly unfamiliar with the climatic conditions and the region-specific ailments in a particular destination, are always at a greater risk of falling sick when compared with the natives of that particular country. Usually, the locally or internationally accredited medical facilities tend to follow strict hygiene and sanitary requirements. It is useful to determine whether the hospital or clinic where you are seeking care has received proper accreditation. Checking for the hospital’s accreditation is an important step in determining the standards of hygiene and the healthcare services provided by the facility. Importance of immunization Before you embark on your medical trip, it is important to discuss your travel plans in detail with your local or treating doctor, as well as the medical tourism facilitator company, who can also guide you.The concerned doctor can then make recommendations, considering the patient’s age, medical history, vaccine history, destination and the length of the trip. When it comes to medical tourism, proper vaccination plays an important role in protection against a number of infections in a foreign country. In some cases, your local physician might refer you to a travel medicine specialist for detailed information on travel medicine. The process of vaccination usually consists of a few steps. Medical tourists should always undertake the entire immunization process prior to traveling, as it is important to ensure that the vaccine will work as desired. You must ask your travel medicine physician about the vaccination you will need for protection against food- and water-borne illnesses, and other travel-related illnesses. Although it is important for all medical tourists to consider the significance of vaccinations and medications, you should always rely on safe health practices, such as eating health food and drinking pure water, in order to prevent yourself from various infections. Also ask your medical tourism consultant who can guide you to hygienic restaurants and health facilities. Many of the diseases are water- and food-borne. Therefore, consciousness about the consumption of street food or tap water is very important in preventing certain diseases. Some countries might ask for the proof of vaccination required to enter the country. For example, if you are traveling to sub-Saharan Africa or other yellow fever areas, you might need the proof of vaccination against yellow fever. Your medical tourism facilitator company can provide you with the details of the vaccinations you need. While contaminated water and food are the major sources of diseases overseas, a medical tourist should consider many other things for successful prevention of infectious diseases. Apart from food and water, you must also be cautious against insect bites. Mosquitoes can cause a number of life-threatening diseases. You should always carry mosquito repellent as a preventive step against mosquito bites. Most internationally traveling patients visiting tropical countries are concerned about the possibility of contracting malaria. Tropical countries have a relatively higher risk of mosquito borne illnesses. You can easily find various ointments, creams and pills that could protect you from the danger. Certification and documents form a very important part of the medical endeavor. When going to a foreign country, carry all the records that certify the immunizations you have received in the past. This will enable the doctors at the medical tourism destination to have a proper knowledge about the kind of drugs and further treatment, so that they can attend to your case appropriately. If the documents are in a language that is not internationally recognized, then it is wise to translate this into a language that is acceptable at the destination. The common vaccines you may need when going overseas include hepatitis A, hepatitis B, influenza, pneumococcal, polio, rabies, typhoid fever, yellow fever, tetanus and Japanese encephalitis. Irrespective of the country you are visiting for your medical treatment, you should be up to date on all the routine immunizations you will require for effective prevention against infectious diseases in unfamiliar environments. Even if you have to embark on a medical journey in less than three to four weeks, you should consult with your local doctor to check if you need any vaccines or medicines. In nutshell, the recommendation of the right vaccinations is one of the major components of a pre-travel medical consultation. How to protect yourself from various infections during medical tour More than 800 million people travel abroad for different kinds of medical treatment, every year. Medical tourism involves patients crossing international borders more often; it has become essential for potential medical tourists to seek pre-travel suggestion in order to avoid unpleasant situations and stay healthy during the journey. Every country has different standards of healthcare. It is very important for the patient to adhere to the guidelines set by experts in a medical tourism destination in order to stay fit and healthy during the trip. As a medical tourist, you should get familiar beforehand with the different conditions at a particular destination that could have bad effects on your health. You should take care of all these things, such as pollution levels, standards of healthcare services, necessary immunizations or vaccination and the availability of medical supplies. You should prepare a complete travel medicinal kit along with the other essential travel- related things you plan to carry to the foreign destination. There are many medical tourism locations where the chances of contracting infectious diseases are considerably high. One of the most common illness medical traveler faces is diarrhea. The major reason for this ailment is the ingestion of certain organisms found in contaminated food and water. Even though protection from infections is not easy, still you can protect yourself from these infections with little care and attention. One of the main reasons for large number of infections is the lack of hygiene, so it is important to maintain hygiene. It is important to discuss your travel plans in detail with your local physician. Immunization is process by which the immune system of an individual becomes prepared against the potential disease. Medical tourists should always undertake the entire immunization process prior to traveling. It is important to ensure that the vaccine will work properly as a defense against the potential disease in a particular destination. A Medical tourism consultant can advise you about the prevalent diseases that you need to protect yourself from. Travel medicine kit It is important to prepare a travel medicine kit. You must sure that the kit has enough medicinal supplies to prevent common infectious, such as illness and minor injuries. Why Medical tourism hospitals should go for AMR checkups? The rising incidence of travelers carrying Antimicrobial Resistance (AMR) infections during repatriation may cast a shadow on medical tourism. Medical tourism hospitals need to arrange AMR checkups for better patient outcomes. Incidences of AMR infections and associated complications are creating fresh doubts in medical travelers. - Are we safe from drug-resistant infections in foreign healthcare settings? - Do hospitals have the required infrastructure and follow recommended practices in AMR prevention and treatment? Antibiotics are life-saving but its misuse can be killing. An estimated 700,000 people worldwide die from it every year and failure to curb it would result in 10 million deaths by 2050 surpassing the global cancer death number of 8.2 million. When drug-resistant microbial infections fail to respond to treatments, it prolongs illness, increases treatment cost and heightens the risk of death. Failure to treatments also results in extended periods of infections raising the chances of spreading the same in the community. How does AMR spread? - Individuals taking prescribed antibiotics may develop AMR as a natural adaptive reaction and may spread it to other persons. - Antibiotics prescribed during the hospital stay can also cause AMR and spread to other patients via contaminated objects and unclean hand touch. - Patients carrying resistant bacteria after getting released from the hospital can spread to other persons in the community. - Traveling to a country with a high prevalence of AMR increases the risk of AMR contamination. First-line antibiotics previously effective in such patients cease to be effective in patients with AMR calling for second-line antibiotics. It cannot be ensured that the last line antibiotics can provide the necessary cure in saving the patient’s life. AMR infections: How threatening it is for medical tourism? Misuse of antibiotics Hardly there exists any treatment that does not require antibiotics. Consider the large fraction of medical tourists traveling to other countries seeking a range of affordable surgical treatments in foreign countries. Doesn’t it expose them to antimicrobials and associated AMR infections? Growing evidence collection suggests widespread overuse of antibiotics in most healthcare settings is responsible for AMR. Medical tourism has the potential to spread it more in case of inadequate AMR prevention strategies in hospitals/clinics. Limited regulation in antibiotic usage, the ready availability of over-the-counter antibiotics, poor sanitation and overcrowding are common in some developing nations also popular for medical tourism. Few new antibiotics are in the development process New antibiotic development has dropped sharply since last two decades. No new classes of antibiotics to treat gram negative bacilli are available for the last 40 years. Physicians have limited arms in their arsenal. If optimal antibiotic usage is not practiced, medical tourists would be at a higher risk of contacting AMR infections. Medical tourism hospitals/destinations need to realize this soon else it may jeopardize the growth in this sector. How medical tourism is facilitating the spread of AMR infection? A considerable number of patients carrying drug-resistant infections had a previous history of traveling abroad. They may be either medical travelers or vacationers forced to medical treatments in the foreign country owing to an accident or sudden illness. Although data shows that the number of intended medical travelers infected with AMR is very low but this cannot be considered as a relief factor. Indeed, medical tourists are more aware of risk factors. They do more research and gather authentic information from reliable sources before deciding on the destination or facilities. But is that enough? Healthcare facilities also need to provide thorough information of their AMR prevention strategies to win trust and confidence of foreigners. Healthcare strategies to combat AMR in Medical Tourism Global healthcare is still grappling to prevent the spread of multidrug-resistant Gram-negative bacteria. Although countries have stepped up efforts serious gaps remain. Some European nations have been working on this for over four decades while others have recently launched their action plans to control the growing threat. High-income countries are much ahead in the progress and implementation of AMR policies than the low-income countries. But a majority of medical tourism business activities are happening in developing nations. This poses a greater threat of AMR infection. Healthcare facilities need to formulate a strategy which would include: - Educating patients and physicians about proper the proper drug, its dose and duration. - Promoting judicious use of antimicrobials in healthcare settings. - Monitoring drug intake adherence. - Implementing effective infection-control practices to prevent the spread of AMR infection from the infected patient to non-infected ones. - Establishing foolproof antimicrobial surveillance - Enhanced use of immunization - Developing and implementing an Antibiotic Policy and Standard Treatment Guidelines - Adequate planning for identifying, transferring, treating, discharging and readmitting patients with colonized AMR infections. - Monitoring AMR and providing feedback about it. - Campaigns to create public awareness about the dangers of AMR and what could be done to tackle it. Steps medical tourism hospitals should take to prevent AMR: AMR is likely to be a community-driven problem where a significant population may be carrying antimicrobial-resistant germs. Similarly, medical travelers coming from different countries can also be the carriers. Hospitals attending international travelers can take several steps to prevent antimicrobial resistance: 1. Maintaining health-hygiene and other preventive methods A considerable number of physicians in a survey feel poor hand hygiene as one of the leading causes of anti-microbial infections. Most surveys of hand-washing in various patient-care settings reveal appropriate hand washing practices exist in only 25%-50% opportunities. Hospitals should improve hand washing practices by enforcing the use of alcohol-based hand-rub and disposable examination gloves with regular surveillance in operation. Other methods include isolating the infected patients and proper cleaning and disinfection of the environment and equipment. 2. Have a well-framed antibiotic policy Does the patient require antibiotics at all? This is the first and foremost issue to be addressed in all cases be it domestic or international travelers. Such an approach sets a culture for optimal antimicrobial use. This should be applied at the prophylactic phase as well. The hospital antibiotic policy should be evidence-based and align with the national antibiotic policy barring a few changes as warranted by the local antibiotic resistance profile. The policy should include: - The range of antibiotic activity - Pharmacodynamics of the drugs and its adverse effects - Potential to selective resistance - Special requirements of individual patients/groups - Set the level of antibiotic prescription. First-line drugs can be prescribed by all physicians while specific ones can be prescribed only after due consultation with the antimicrobial team head. The team formulating antibiotic policy must be from multiple disciplines and perform important functions including scheduling antimicrobial regimen, monitoring drug therapy, discontinuation of prophylaxis antimicrobials, approving restricted antimicrobials, suggesting additional laboratory testing and others. The policy should be reviewed periodically incorporating updated medical knowledge, clinical practices and local situations. This practice would boost medical tourism business and lead to economic benefits. 3. Identifying patients who are at high risk of infection Screening of patients is a useful way to identify patients carrying AMR infection. They can be segregated and treated in isolation. Before putting them on antimicrobials, hospitals should go for cultures and target empiric therapy based on the progress of the disease. 4. Utilize the hospital’s antibiograms in Medical Tourism Antibiograms constitute a periodic summary of antibiotic susceptibilities to locally isolated bacteria in the hospital’s repository of clinical microbiological reports. Clinicians often refer these reports to assess the susceptibility rates. This helps in selecting empiric antimicrobial therapy and monitoring resistance trends developing over time within the particular healthcare setting. 5. Use microbiology tests to check AMR infection A multicenter cohort study conducted in hospitals of West Norway concluded microbiology tests can have a positive influence on patient outcomes and limit the use of broad-spectrum antibiotics. Unfortunately, the potential of these tests is yet to be fully utilized in healthcare settings. Hospitals can review the existing pattern of ordering microbiology tests and utilize the test reports in a more targeted and overarching approach. 6. Surveillance of antimicrobial resistance in Medical Tourism Mandatory inclusion of antimicrobial stewardship program to monitor antimicrobial usage, improve patient outcomes, reduce incidences of AMR infection and prevention of its spread. It should: - Be able to predict the evolution of antimicrobial resistance - Monitor antimicrobial consumption - Measure of antimicrobial consumption in accordance with the daily defined dose (DDD) of the Anatomic Therapeutic Chemical (ATC) classification system. The program is an ongoing process of systematic data collection followed by analysis and interpretation for successful implementation and evaluation of clinical practice. Therefore, a standard surveillance system should have the following features: - Laboratories should maintain a definite standard in reporting quantitative AMR data. - They should generate a reliable numerator discarding duplication of data. - Participate in routine quality assessment programs for proficiency testing. - Employing well-trained microbiologists - The selection of microbes and antimicrobials should be based on its implication on public health. - Apart from laboratory data, inclusion of clinical data. - Flexibility to accommodate changing information and inclusion of new data related to new AMRs and health conditions. - Use of the open-source software with the WHO, WHONET for seamless data entry and analysis. Development of Standard Treatment Guidelines (STG) STG helps in bringing a change in treatment approach and clinical behavior impacting more positive outcomes. Physicians should be involved in the ownership of guidelines. The guidelines should be based on: - Local antibiograms - Syndromes and symptoms - Clinical settings – outpatient, in-hospital or ICU - Strong rationale - Evidence-based recommendations Medical tourism growth has picked up. Apart from offering affordability, quality and comfort in services, destinations should emphasize on AMR checkup facilities and infection prevention. They should ensure safe homecoming of patients free from any bug.
<urn:uuid:b67438a4-6124-4393-9873-2ea2be61b62a>
CC-MAIN-2022-33
https://drprem.com/medical-tourism/medical-tourists-must-take-extra-care-for-protection-against-infections/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00404.warc.gz
en
0.92735
3,834
3.25
3
Indian Fantail Standard (översättning kommer) Foreword: The Indian Fantail can be divided into six main areas for judging purposes, and are as follows: stance, tail, body, condition, color and markings. The allocation of points total 100 and describes the ideal toward which we are striving. Balance is of primary importance, with the dominating factor to be an all-balanced bird. A breakout of points and detailed description of each area follows: I. Stance (15 pts.): Proper stance reflects a harmonious blending of all parts, providing balance and a natural stylishness. The carriage of the head and neck should be such that they are perpendicular to the ground with the eyes directly above the tips of the toes when the bird stations itself. The tail should be carried upright at a slight angle or tilt away from its feet, not on the tip of its toes. Body carriage should give the impression of levelness. As a guide the angle of the body should be 20 degrees up from horizontal. Faults: Carrying breast too high; head carried back too far; tail carried too nearly parallel to the ground or tipped too far forward; shaking of neck. II. Tail (30 pts.): MThe tail should be large, full, round, held upright and cover from ¾ to 7/8 of a complete circle. Tail feathers should reach 1 ½ to 2 inches above the top of the head. The tail should not be perfectly flat, but saucer shaped. A double layer of tail feathers is to be preferred. Faults: Cone-shaped or scopp tail; feathers making less than ¾ or a complete circle; splits on the tail sides caused by flight feathers; excessive twisting of tail feathers so that they do not lie flat. III. Body (30 pts.): A. Size (5 pts.): A medium size bird about 14 to 18 ounces, as in Show Racers or English Trumpeters. When all else is equal, the advantage should go to the larger bird. B. Head, Eyes, & Neck (5 pts.): The head must be full and round in proportion to the rest of the body. In all cases both eyes must be the same color. The neck is medium in length and full in feather. Faults: Shaking of neck. C. Crest (5 pts.): The base of the crest must be in direct line with the eyes and beak setting. Peak Crest, as seen in an Archangel or Turbit, to be preferred, or a small shell crest. D. Breast and Back (5 pts.): The breast must be round and full. Breast feathers are to cover wing butts. The back must be medium in length and width, leaving about a 1 ½ inch space between the head and tail when at station, standing naturally. E. Legs, Muffs, and Flights (5 pts.): The legs are medium in length. The muffs are full-feathered and about two inches in length, with hock feathers to match. The feathering must be sufficient to cover all toes. Flights should be carried under the tail, but should not drag on the ground. • A split in the center or top of the tail • Crooked or slanted tail • Eyes not of the same color or split-colored eyes • No crest • Lacing of tail feathers • Any cut feathers • Any excessive plucking • Any sick bird • Any crippled or maimed • Excessive signs of parasites Faults: Bare toes/feet or excessively over muffed. F. Feather Texture (5 pts.): Feathers to lie smoothly and to be medium to hard in texture. Feathers to be broad, especially the main tail feathers. The backing feathers of the tail are to fit closely against the tail. IV. Condition (5 pts.): The bird should be healthy, alert, clean, and free from parasites. V. Color (10 pts.): Recognizing the difficulty in achieving superior color, if other points are equal, preference can be given to a superior colored bird in the self classes. All colors to be rich, lustrous, and pure with as little smut as possible and with a maximum of sheen. In all colors the ground color becomes darker as progression is made from barred, to check, to T-pattern. All self colored birds to be evenly colored throughout. Colors to include the intense and dilute version of each. • Blue in: Barless, barred, check, T-pattern and spread in intense and dilute • Brown in: Barred, check, spread in intense and dilute • Ash red in: Barred and check, intense and dilute • Recessive red • Recessive yellow • Other color modifiers as they are bred into the Indian Fantail. Beak and toe nail colors to be harmonious with plumage color: dark-colored birds to have dark beak and nails and light-colored birds to have lighter beak and nails. * For detailed color description refer to appendix. VI. Markings (10 pts.): A. Classes for recognized colors and markings are as follows, and all birds identifiable to a particular or marked class are to be shown in that class even if they do not meet full requirements. Recognizing the difficulty in achieving correctly-marked birds, if other points are equal, preference to be given a well-marked bird. Solid selfs: Black, dun, brown, khaki, and recessive red and yellow. Patterned selfs: Blue, ash red, and brown; barless, barred, checked, and T-pattern. White: An all white bird. Bodymark: All white main tail with colored body. Saddle: All white bird with colored wing shield; primary flights are white and secondaries, colored. Tailmark: All white body with a colored main tail. Ribbontail: Solid-colored body and tail except for a ½" and ¾" white or near-white ribbon or band running continuously across every feather of the tail. The band should be ½" to 1" from the tips of the tail feathers. Almond: Any pigment, T-pattern, almond factor. Splash: This class to include partially colored birds having at least 40% of their body covered with white feathers in a random pattern. This class should not include any bird that is recognizable as a mismark of a recognized color, mark, or pattern. A.O.C. (any other color): this class is to include all new colors such as indigo, grizzle, gold, spread lavender, and new markings as well as any other new or experimental colors and marks. B. New classes are to be created for any colors or marks, whether described above or not, when there are eight birds in that color or marking in a show exhibited by two or more exhibitors. Color Description for Indian Fantails A. BLUE SERIES 1. Barless blue: Head color a rich, even shade of medium blue-gray. Neck feathers a bit darker shade showing a rich sheen. The wing feathers to be a lighter shade of blue-gray, with the color carried out through the secondary to primary feathers and blending in with the blackish tips of these feathers. The lower back and rump should be a rich, light blue-gray. All other body feathers should be an even shade of medium blue-gray. The tail to be a little darker shade of blue-gray. 2. Barred: Same color description as above with the addition that, when the wings are folded, there should be two bars of rich black. 3. Checked: The head and body similar to the blue bar, but a darker shade. The check marks on the wings to be open and carried evenly to the wing butts. Tail to be a darker shade of blue-gray. 4. T-Pattern: Head and neck to be an even shade of dark blue-gray, approaching black. The wing feathers to be dark blackish gray showing occasional small lighter gray areas. Tail to be dark gray with a black band. 5. Black: Color over entire body; head, neck, wings, and tail to be a jet black with plenty of green sheen – especially on the neck. The black should be even throughout and should. 1. Barless silver: Head color a rich shade of light gray shading to fawn. Neck feathers a little darker shade of the same color. The wing feathers should be a light shade of gray-fawn with color carried well out through the primary and secondary feathers blending in with the dun-colored tips. The tail a somewhat darker shade of gray-fawn. 2. Barred silver: Same color description as above with the addition that when the wings are folded there should be two bars of a rich dun color. 3. Checked silver: The head, neck, and body a medium shade of fawn-gray – a little darker than for the barred silver. The check marks on the wing to be open and carried evenly to the wing butts. The tail a dark shade of fawn-gray. 4. T-pattern silver: The head, neck, and body to be a deep dun. Wing color dun, with occasional lighter fawn areas. Tail to be dun with a dark dun bar. 5. Dun: Color over entire body; head and neck to be a rich, even shade of dun. Tail to be dark dun showing no terminal bar. B. Brown SERIES 1. Silver dun (Brown bar): The body and wing color to be a light, clear, brownish gray throughout, shading to brown on the head and neck. Wing bars to be a rich red-brown. 2. Brown checked: The head, neck, and body color to be a clear, medium shade of brownish gray – a little darker than for the barred silver. The check marks on the wing to be open and carried evenly to the wing butts. The tail a medium shade of brown-gray. 3. Brown: The head, neck, body, wings, and tail to be an even shade of rich chocolate brown. Color to extend into the under plumage. 1. Silver cream: Body, head, neck, wings, and tail to be a soft tan-gray shading to khaki on neck. Bars on wings to be an even shade of ocher. 2. Silver checked: The body, head, neck, wings, and tail a medium shade of tan-gray. A little darker than the silver cream. Checking on the wings to be open and carried to the wing butts. 3. Khaki (Dilute brown spread): The head, neck, wings, body, and tail to be an even shade of Khaki. C. Ash Red SERIES Intense 1. Mealy (Red-barred silver): Body and wing color a clear lavender-gray shading to a rich claret-red on the head and neck. The bars to be a clear claret-red. The tail an even shade of lavender-gray with as little flecking as possible. 2. Red checked: The body a clear medium dark lavender-gray shading to rich claret-red on the head and neck. Checking on the wings to be open and carried evenly to the wing butts. The tail to be lavender-gray with as little flecking as possible. 1. Cream bar: The body and wing color a soft cream gray shading to a rich golden cream on the head and neck. Wing bars to be rich golden cream. Tail a pale cream gray showing as little flecking as possible. 2. Yellow checked: The body color a soft cream gray shading to a rich golden cream on the head and neck. Body color a bit darker than on the creams. Checking on the wings to be open and carried evenly to the wing butts. Tail a pale cream gray showing as little flecking as possible. D. Other Colors 1. Red: Red pigment, intense, spread, recessive red factor. A deep even shade of chestnut red over all portions. Color carried down to under plumage. Feather shafts to be colored red. Should show plenty of sheen on neck. 2. Yellow: Red pigment, dilute, spread, recessive red factor. A deep even golden yellow color throughout. Color carried down to under plumage. Feather shafts to be yellow. Should show plenty of sheen on neck. 3. Gold: Red pigment, pale factor, spread, recessive red factor. A color midway between red and yellow, but with a deep orange tone. Color to be rich, even, and carried down to under plumage. Feather shafts to be gold. Should show plenty of sheen on neck. a. blue series, pattern, milky factor, intense or dilute b. ash red series, pattern, milky factor, intense or dilute The bird should have the basic color in its series and pattern, but overlaid with a soft, rich, powdery shade which gives a milky look to the plumage. Can be found in either intense or dilute version. a. blue pigment, milky factor, spread, intense or dilute b. ash red pigment, milky factor, spread, intense or dilute 6. Indigo: Blue pigment, intense, spread, indigo factor. The body and tail an even shade of midnight blue shading to black on the head and neck. The wing is a little higher with dark blue edging on each feather. 7. Grizzle: Any pigment, intense or dilute, grizzle factor, bar, check or T-pattern. The head, neck, body, wing and tail color to be the same as for the series and pattern, with the addition of white flecks superimposed on top of the color. The grizzling effect to be most noticeable on the head, neck, and shoulder areas, while almost absent on the bars of wing or tail. An even distribution of grizzling is desired. 8. Almond: Any pigment, T-pattern, almond factor. Almond is a modifying factor that, when introduced, causes various flecks of color to appear on the feathers of the bird. The base color to strive for is a rich, yellow-brown or almond color. The flecks vary in size, but should be even in distribution. There must be at least three colors on the bird. Flecking is usually more pronounced on the head, neck, and flights, but if on every feather, so much the better. Each feather of the primaries and secondaries should have three colors in patches. The even distribution of the three colors on the bird is called break. Perfection would be the same amount of break on each feather. The more break and the better distribution, the better the color of the almond. 9. White: Head, neck, body, wing, and tail pure white. Quills on all feathers to be white. Vi har i många år deltagit i räddnings-arbetet av den utrotningshotade lantrasen Gotlandskanin, och vi har haft en liten genbank med gotlandskaniner sedan 2005. De har alla prefixet Mossedal. Just för tillfället är genbanken vilande. Copyright @ All Rights Reserved
<urn:uuid:42f10c88-5fcb-4629-aa05-23f5f27296c0>
CC-MAIN-2022-33
https://mossedal.se/djur/pafagelduvor/ips.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00405.warc.gz
en
0.88215
3,289
2.828125
3
Department of Materials Science & Engineering, North Carolina State University, USA *Corresponding author: Mikhail Gamero, Department of Materials Science & Engineering, North Carolina State University, Raleigh, NC 27695, USA Submission: November 02, 2017; Published: November 29, 2017 ISSN : 2576-8840Volume2 Issue2 Ceramic nanomaterials have exhibited extraordinary characteristics, based in its low density, hardness and when properly engineered, good corrosion properties in high temperature applications. In the nanoscale world, we can find nanomaterials that do not necessarily apply to the correlation of strength and density. It has been studied that ceramic nanomaterials have some control boundaries that are critical in high temperature applications; grain sizes, grain boundaries density, operating conditions (thermal cycles), nano-crystalline structure and large voids (because of the porous nature of ceramic materials). In this research paper, it will be discussed some of the most important applications, processing methods and several adhesion methods to metal substrates with the final purpose to enhance metal properties and mitigate high temperature corrosion. As a quick review, it will be discussed some of the environmental health & safety (EHS) concerns and some parallel experiments that could be done for reinforcing the investigations done in this subject. One of the most studied applications is the use of ceramic nanoparticles as pigments to enhance the material properties and products life-cycle. This application is more focused to polymers. The idea is a mitigation of the polymer degradation that can be observed when exposed to ultraviolet light. It has been observed that with the proper blending and binder's ratio, the mechanical and elevated temperature properties can be improved. Ceramic pigments have shown to be a good option in the nano-level for high quality coatings. As reported by Sankar S et al. ceramic pigments show good impact-resistance for ferrous metals and its application in corrosive environments as well as high temperature applications based in the thermal behavior of the coating. One of the most important applications for this nano-materials, it's the direct application to aggressive environments or high temperature applications like nozzle tips for the inside combustion parts in the automotive industry or its use in turbomachinery, more specific, in combustion and hot gas path components of aviation engines or heavy duty gas turbines for the power business. For being able to apply this technology, it is important to consider the adhesion into the metal substrate of the ceramic coating, where spallation, cracking or not-homogeneous distribution can be observed when improperly added together. As reported by Vert R et al. air plasma spraying technique was used for making a thin film of few micrometers thick, where it was confirmed by Vickers indentation and tensile tests, the compatibility of these two different materials (metal substrate with a ceramic coating). There are several processing methods that will be briefly discussed in this section, some of this are in experimental phase as nano-powder infiltrated transient eutectic phase (NITE) process, sol-gel method and carbon nanotubes. As reported by Kuznetsov NT , NITE based in the use of silicon carbide nano-powders and its mixture of yttrium and aluminum oxides to be subjected to a temperature of 1800-1950 °C at a pressure of 15-20MPA (usually referred as hot pressing) so that the melted film favors the orientation and a good matrix control of the nanoparticles. With NITE method, good mechanical characteristics are exhibited along with stress limit of 400MPA and an elasticity modulus of 310GPA with good oxidation resistance. Figure 1 shows a cross section of SiC/SiC NITE micrograph, composite material suitable for high temperature applications. It can be clearly distinguished the fiber from the matrix and its interaction. Sankar et al. , was a silicone resin binder developed by high temperature ceramic pigment nanoparticles with a high hardness that can be used under high temperature or aggressive environment applications. The preparation of the ceramic pigments was through cobalt and alumina compounds by a thermal decomposition with a limited supply of air or oxygen (calcination) and crushed. After the raw material process was finished, this concentration was applied to a mild steel specimen by hand application and dried, giving a result of a layer coating of 80±5&3956;. The results revealed that the system is not degraded up to 600 °C, which makes a suitable polymer-pigment product that can withstand medium range temperature and aggressive environments . Figure 1: Cross section of NITE SiC/SiC other processing method reported by S. Another elevated temperature application was documented by Chichkan AS et al. , which is basically the use of carbon nanomaterials for the creation of ceramic nanomaterials. The preparation of the sample was with the binding of thermochemical activation (TCA) and hydration (OAO Katalizator). A plasticized product was made aqueous using nitric acid which was then dried and compacted to 30mmx2mm pellets. After obtaining the pellets, it was then subjected to a heat treatment that went from 150 °C to 1200 °C. Figure 2: Electron microscopy image of the CNF-SiO2 composite . The result was a porous structure of CNM-SiO2 of ceramic membranes that allowed a good control of the porous structure of ceramic membranes, which could be controlled by composites and additives. Figure 2 is an electron microscopy of the carbon nanofilaments CNF-SiO2 composite where it can be appreciated the SiO2 film produced on the CNM surface improving the ceramic matrix with the formation of mullite phase. Figure 3a: TiO2-Nc concentration 1g/l . Figure 3b: TiO2-Nc concentration 3g/l . Figure 3c: Coating layer fabricated in two steps . An excellent processing method for nickel composite coating was studied by Moustafa EM et al. , where it was discussed the formation of a composite Ni-NC (nanocontainers) for a bi-functional coating. The idea is based in three fundamental steps, adsorption of positively charged TiO2-NC on SAM-covered gold coated steel substrate. Secondly, a metalized NC layer by electroplating of a thin Ni layer and finally, the conduction of current density in the Ni-NC composite for showing good adhesion to the substrate. The result showed an NC finely dispersed in the Ni coating with a high density incorporated which increased the concentration in the Ni solution. It was very interesting how the use of gold coated steel electrodes helped in the stabilization of the SAM showing good adhesion to the metal substrate. A comparison of Figure 3a, 3b and 3c is for showing the interface between Au and Ni (Figure 3a), at different TiO2 concentrations (Figure 3b) and in the fabrication with different steps (Figure 3c). The first step was the adsorption of TiO2-NC and second, the electroplating for obtaining a 6pm thickness layer. The last processing method that will be discussed is a ceramic nanomaterial based in a Ti-Si-C-N by sol-gel which was investigated by Biedunkiewicz A . The process is based in two different stages, the first one at low temperature, where the resulting product is raw nc-TiCx material and the second one is at high temperature stage carbonization where the carbon traces (carbides essentially) are eliminated of excessive organic compounds. The second condition enables the purification and limits the growth of crystallites to ensure the carbonization. After dry-out, the sol-gel solution was evaluated, showing uniform distribution, grains of silicon, titanium and carbon were regularly distributed. The only problem was that a higher oxidation resistance could was not favorable. Figure 4 shows a distribution of Ti-Si-C homogenous distribution. Figure 4: HRSEM image of Ti-Si-C powder . One critical step for the coating use is its adherence to a metal substrate. In his work, Vert R et al. , it was studied the adhesion of a coating with a plasma process application. The surface was firstly prepared with a blasting process to make the smooth surface tougher; the blasting process impacts the surface leaving it under a compressive stress. The most suitable application of the coating layer was in two steps, the first one using air plasma spraying (APS) technique and the second one using suspension plasma spraying (SPS), which is essentially spraying a ceramic powder into the surface. The adhesion of the coating was measured with a hardness test and by a tensile test. It was noticed that after the air plasma spraying (APS) application, if the coating layer was bigger than required, the adhesion was not optimal. Yttria-stabilized Zirconia was sprayed in the already cleaned surface, during the application of the spraying. One critical step for the proper adhesion of the ceramic coating to the metal substrate is a controlled temperature of 200 °C, used in a preheated surface of 400 °C. The result showed two different surface that are clearly observed with the microscope, the first layer was thin and dense, composed of oxides while the second layer showed a columnar grain structure with a granular structure. Figure 5a shows the microstructure and the difference between the two-applied coating processes. Figure 5b shoes the interface of the SPS and APS layers. Figure 5a: YSZ microstructure duplex-coat . Figure 5b: Interface between SPS and APS layers . The results for the tensile bond strength were between 12-24 MPa, depending on the thickness of each individual layer and the thickness of them both. Vickers indentation test confirmed that the failure of the duplex coating occurrs in the APS coating, closer to SPS-APS interface. The remark of this methodology showed an excellent adhesion of the insulating coating to the metal surface. In other words, the first coating serves as a bond coating between the metal substrate and the thicker coating layer. The coating of the second layer is important because the thicker the layer, the colder the metal substrate surface but the it is also hotter the ceramic coating surface. It is important to find the proper balance because a hotter ceramic surface impacts the life of the part since it is suitable to spallation and cracking. The use of nanomaterials has increased enormously during the last years. Although we are not discussing a biological or disease treatment application in this research, it is important to consider that the EHS concerns increase with a large use but it has not been completely studied. The use of crystalline silica (like the one used as a matrix for several of the examples of ceramic composites) can raise the question of medical implications. As reported by Johnson SM , it has been studied the concern of toxicity for the exposure of this materials and it has pointed in two critical directions, inhalation studies show pulmonary and cardiovascular symptoms which arise the question of its implications for long-term exposition use. The oxides can cause inflammation because of the accumulation and engineered nanoparticles can cause the blood pressure to become unstable, impacting the myocardial infarction or stroke. Before the use of this nanomaterials at a big scale, it shall be further investigated the EHS implications, and its awareness to engineers, manufacturers and consumers. TaC-SiC ultrahigh temperature composite was analyzed by Yan Lu et al. . The main goal was the use of cross-linking nanocomposites prepared by the blend of the precursors in an inert atmosphere (Argon). The precursor was obtained by the blending of poly-carbosilane (PCS) and poly-tantaloxane (PT) for obtaining a metal-ligand interaction for the polymer. After annealing of 1000-1800 °C, it was obtained a homogeneously distributed sample with traces of free carbon. The annealing precursors at 1600 °C gave a ceramic nanocomposite with promising application of high temperature and aggressive environment conditions [10-12]. This same ceramic composite TaC-SiC synthesis can be applied to some other compositions consisting of a group IV transition metals, in other words, the use of nitrides, or borides can be used for ultrahigh temperature ceramics as it was TaC-SiC . A finely dispersed network of borides or nitrides could be use along a silica-based matrix. This could be verified with some other experiments using SiC and Si3N4 as the matrix former complimented with nitrides, carbides of borides for the ceramic composite high temperature material [14-16]. We have discussed several technologies that have been developed for enhancing the high temperature properties of a metal substrate, and more specifically, improving the oxidation resistance. It was further reviewed techniques like NITE and APS/ SPS multilayer coatings, the use of ceramic pigments and more importantly, the adhesion of the ceramic coating to the metal surface and some of the most critical elements to consider during the process (like coating thickness and surface preparation). Some other critical points discussed were the size of grains and the importance of maintaining the proper conditions like voltage (for Au electrode methodology) and the room temperature during spray nozzle technique process. Additionally, it was discussed several tests of how to characterize the product, like Vickers indentation, tensile tests, coating thickness and to determine if the crack or spallation observed might be related with the procedure followed. It was discussed how this nanomaterial technologies need further investigation to better understand the problems related to environment, health and safety because of the nature of their scale size and exposure. There is no question that ceramic coatings are an excellent option for enhancing the high temperature properties and are a potential solution for the corrosion mitigation, which is observed at those aggressive operating conditions. They have been used in combustion elements, hot gas path components (like buckets or nozzles) and even for tip nozzle inside automotive engines [17,18]. Producing homogenous, uniform, dense and crack-free coatings is suitable only with well-controlled manufacturing process. Nanomaterials open an enormous number of options when we talk about different oxides or multilayer coatings. © 2017 Mikhail Gamero. This is an open access article distributed under the terms of the Creative Commons Attribution License , which permits unrestricted use, distribution, and build upon your work non-commercially.
<urn:uuid:3281f04a-6815-4c24-8d15-ec29f8de4b9b>
CC-MAIN-2022-33
https://crimsonpublishers.com/rdms/fulltext/RDMS.000535.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00405.warc.gz
en
0.939146
3,078
2.53125
3
Related: abstract film - experimental film - German Expressionism - avant-garde - Surrealism in cinema Films: Ballet Mécanique (1924) - Un Chien Andalou (1929) Practitioners: Luis Buñuel - Maya Deren - Viking Eggeling - Oskar Fischinger - Hans Richter - Walter Ruttmann - Dziga Vertov Anémic cinéma (1926) Avant Garde - Experimental Cinema of the 1920s & 1930s (2005) - Various [Amazon.com] The European avant-garde and experimental film Un Chien Andalou (1928) - Luis Buñuel [Amazon.com] [FR] [DE] [UK] Two conditions made Europe in the 1920s ready for the emergence of experimental film. First, the cinema matured as a medium, and highbrow resistance to the mass entertainment began to wane. Second, avant-garde movements in the visual arts flourished. The Dadaists and Surrealists in particular took to cinema. René Clair's Entr'acte took madcap comedy into nonsequitur, and artists Hans Richter, Jean Cocteau, Germaine Dulac and Viking Eggeling all contributed Surrealist shorts. The most famous experimental film is generally considered to be Luis Buñuel and Salvador Dalí's Un Chien Andalou. Working in France, another group of filmmakers also financed films through patronage and distributed them through cine-clubs, yet they were narrative films not tied to an avant-garde school. Film scholar David Bordwell has dubbed these French Impressionists, and included Abel Gance, Jean Epstein, and Dimitri Kirsanov. These films combines narrative experimentation, rhytmic editing and camerawork, and an emphasis on character subjectivity. The Soviet filmmakers, too, found a counterpart to modernist painting and photography in their theories of montage. The films of Dziga Vertov, Sergei Eisenstein, Alexander Dovzhenko and Vsevolod Pudovkin were instrumental in providing an alternate model from that offered by classical Hollywood. While not experimental films per se, they contributed to the film language of the avant-garde. The U.S. had some avant-garde filmmakers before World War II, but as a whole pre-war experimental film culture failed to gain a critical mass. --http://en.wikipedia.org/wiki/Experimental_film#The_European_Avant-Garde [Aug 2005] Reception in the USAWe don't want false, polished, slick films-- we prefer them rough, unpolished, but alive; we don't want rosy films-- we want them the color of blood.--Jonas Mekas, 1961 The history of film reveals that its avant-garde begins in Europe and Russia in the 1920s and 1930s. By the 1940s it arrives in America, mostly in the suitcases of artists escaping the World War Two fiasco across the ocean. By the 1950s the American avant-garde film field is emerging and by the 1960s it has coalesced into something called the New American Cinema. By 1974 the American avant-garde film is sufficiently ripe so that it's first history can be written. Much of the credit for the promotion of the work of the American avant-garde filmmakers must go to Jonas Mekas who stands as its chief chronicler and journalist. In 1955 Mekas founded Film Culture magazine which became the primary publicity organ for the American avant-garde film movement. By 1958 his "Movie Journal" column was a regular feature in the Village Voice weekly newspaper. In 1960 he created the Independent Film Award to recognize outstanding accomplishment in the independent film arena. In 1962 he organized the Film-Makers Cooperative which provided an alternative method of film distribution. Mekas regularly set up screenings of experimental films through the Film-Makers Showcase programs which later became the Film-Makers Cinematheque. In 1970 he was directly involved in the creation of the Anthology Film Archives which supported the preservation and frequent screening of selected "Essential" examples of film art. Mekas was a tireless polemicist and promoter of the New American Cinema as he called it. Credit must also be given to P. Adams Sitney who established himself as the senior theoretician and historian of the American avant-garde movement. His essays found in Film Culture and in introductions to several books about the movement including The Essential Cinema and The Avant-Garde Film: A Reader of Theory and Criticism provided the uninitiated with profoundly detailed maps allowing the new art to be understood and better appreciated. In 1974 Sitney published Visionary Film a detailed history of the American avant-garde enterprise which remains the chief text of the phenomenon covering the period from the 1940s up through the 1970s. (A second edition of the book was published with some revisions in 1978.) Sitney is also the author of "Autobiography in Avant-Garde Film" which is one of the most intriguing and inspiring essays on the subject of the relationship between the artist and his art. That relationship remains a significant and recurring theme in many of the personal films representative of the avant-garde. --http://www.cosmicbaseball.com/99bpr.html#ag 1968 - THE ESSENTIAL COLLECTION OF THE ANTHOLOGY FILM ARCHIVES In 1968, thanks to the foresight of Jerome Hill, a film-maker and a visionary philanthropist, there arose an occasion to create in New York a film museum dedicated exclusively to film as an art. Lengthy discussions took place to determine the purposes and functions of the new museum. It was decided that one of its main functions would be to serve as a continuous critical tool in the investigation of the essential works created in cinema. Therefore it was decided to create what became known as the Essential Cinema Repertory collection. A special Film Selection Committee was created to begin to compile such a repertory. The understanding was that the Committee would constitute a permanent part of Anthology Film Archives and it would continue into the future reviewing old and new cinema works, in all their different manifestations, and keep adding and expanding the Essential Cinema Repertory collection. With the enthusiastic support of Jerome Hill, the Committee, consisting of P. Adams Sitney, Peter Kubelka, James Broughton, Ken Kelman and myself and for a brief period Stan Brakhage began its work. During the following few years it held numerous and lengthy selection sessions, compiling the first Essential Cinema Repertory collection consisting of about 330 titles. -- Jonas Mekas via http://www.unlv.edu/programs/filmarchive/catalog_archive100/1968_anthology.html [Aug 2004] Light Moving in Time: Studies in the Visual Aesthetics of Avant-Garde Film (1992) - William C. Wees Light Moving in Time: Studies in the Visual Aesthetics of Avant-Garde Film (1992) - William C. Wees [Amazon.com] [FR] [DE] [UK] To view a film is to see another's seeing mediated by the technology and techniques of the camera. By manipulating the cinematic apparatus in unorthodox ways, avant-garde filmmakers challenge the standardized versions of seeing perpetuated by the dominant film industry and generate ways of seeing that are truer to actual human vision. Beginning with the proposition that the images of cinema and vision derive from the same basic elementslight, movement, and timeWees argues that cinematic apparatus and human visual apparatus have significant properties in common. For that reason they can be brought into a dynamic, creative relationship which the author calls the dialectic of eye and camera. The consequences of this relationship are what Wees explores. Although previous studies have recognized the visual bias of avant-garde film, this is the first to place the visual aesthetics of avant-garde film in a long- standing, multidisciplinary discourse on vision, visuality, and art. see also: http://ark.cdlib.org/ark:/13030/ft438nb2fr/ [Oct 2004] Avant-Garde Film (2003) - Michael O'Pray Avant-Garde Film (2003) - Michael O'Pray [Amazon.com] [FR] [DE] [UK] This title examines the variety of concerns and practices in the long history of avant-garde film. It covers the development of experimental film-making since the modernist explosion in 1920s Europe through to the Soviet film experiments, American underground and French new wave. Avant-Garde Film: Forms, Themes and Passions examines the variety of concerns and practices that have comprised the long history of avant-garde film at a level appropriate for undergraduate study. It covers the developments of experimental film-making since the modernist explosion in the 1920s in Europe through to the Soviet film experiments, the American Underground cinema and the French New Wave, structuralism and contemporary gallery work of the young British artists. Through in-depth case-studies, the book introduces students not only to the history of the avant-garde but also to varied analytical approaches to the films themselves - ranging from abstraction (Richter, Ruttmann) to surreal visions (Bunuel, Wyn Evans), underground subversion (Jack Smith, Warhol) to experimental narrative (Deren and Antonioni). In each chapter, O'Pray supports his generalizations and brings some specific details to his overviews by focusing on a few representative films and filmmakers. For 'The 1920s: the European Avant-Gardes' O'Pray singles out Hans Richter's _Rhythmus 21_, Walter Ruttmann's _Lichtspiel Opus 1_, Man Ray's _Retour a la raison_, and Bunuel and Dali's _Un Chien Andalou_ for special consideration. For 'The 1920s: Soviet Experiments' he selects Eisenstein's _October_ and Vertov's _Man with a Movie Camera_; for 'The 1920s and 1930s: British Avant-Garde Film', Len Lye's _Trade Tatoo_ and John Grierson's _Granton Trawler_ (one of the few surprises among O'Pray's choices of exemplary works); for 'The 1940s: American Mythology', Maya Deren's _A Study in Choreography for Camera_ and Kenneth Anger's _Eaux d'Artifice_; for 'The 1950s: The Aesthetics of the Frame', Stan Brakhage's _Anticipation of the Night_ and Robert Breer's _A Man and his Dog Out for Air_; for 'The 1960s: The New Wave', Godard's _Deux ou trois choses que je sais d'elle_, Huillet and Straub's _Chronicle of Anna Magdalena Bach_, and Antonioni's _L'Eclisse_ (another surprising choice, but then purists would probably object to including any New Wave directors in a book on avant-garde film); for 'The 1960s: Sex, Drugs and Structure' (a desperately inclusive title), Andy Warhol's _Sleep_, Jack Smith's _Flaming Creatures_, and Michael Snow's _Wavelength_; for 'The 1960s and 1970s: Form Degree Zero', Peter Gidal's _Action at a Distance_, Malcolm LeGrice's _Berlin Horse_, and Kurt Kren's _15/67 TV_; for 'The 1980s: The Ghost in the Machine', Win Evans's _Epiphany_, Patrick Keiller's _The End_, and Jane Parker's _The Pool_. In his final chapter, 'The 1990s: The Young British Artists', O'Pray discusses three film/video artists, Sam Taylor-Wood, Gillian Wearing, and Douglas Gordon, but only Taylor-Wood's _Method in Madness_ receives more than a couple of sentences of commentary. --William C. Wees, http://www.film-philosophy.com/vol8-2004/n32wees [Oct 2004] Avant Garde - Experimental Cinema of the 1920s & 1930s (2005) - Various Avant Garde - Experimental Cinema of the 1920s & 1930s (2005) - Various [Amazon.com] [FR] [DE] [UK] In the latter half of the 20th century, Raymond Rohauer was one of the nation's foremost proponents of experimental cinema. Programming diverse films at the Coronet Theatre in Los Angeles, and making the films in his personal archive available for commercial distribution, he helped preserve and promote avant-garde cinema. This two-DVD collection assembles some of the most influential and eclectic short films in the Rohauer Collection, including works by Man Ray, Hans Richter, Marcel Duchamp, Watson & Webber, Fernand Leger, Joris Ivens, Dimitri Kirsanoff, Jean Epstein, and Orson Welles. your Amazon recommendations - Jahsonic - early adopter products
<urn:uuid:5adcee9c-1c3b-4e2b-b764-ba9d07a3a530>
CC-MAIN-2022-33
https://jahsonic.com/AvantGardeFilm.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00605.warc.gz
en
0.909679
2,804
2.546875
3
Waller County is in the lower coastal plain of southeast Texas. The center of the county lies at 29°11' north latitude and 96° 01' west longitude. Hempstead, the county's seat of government and largest city, is twenty-five miles northwest of Houston. The county covers 514 square miles of land, from the rolling timbered area in the northern part of the county to the coastal prairie in the south, where marsh and bunch grasses grow. Elevations range between 100 and 300 feet above sea level. Soil types vary from the fertile alluvial soil in the Brazos river bottoms to the sandy loam soil in the prairie region and the black waxy soils in the small southern area of the county. The Brazos River defines the county's western boundary and is the area's most important stream, but the county is also crossed by a number of creeks, including Clear, Spring, Walnut, Brushy, Pond, Birch, Mound, Besser, Iron, and Cedar creeks; Hubbard Springs provides mineral waters. Small lakes in the area include Garrett Lake, Mound Lake, and Hannay Lake. Pine trees predominate in northeastern Waller County, while pecan trees are found on the Brazos river bottom, and live oak, sycamore, ash, elm, cottonwood, walnut trees, and wild fruits and berries are found elsewhere. Temperatures range from an average low of 41° F in January to an average high of 95° in July. The average annual precipitation is forty-two inches, and the average growing season lasts 288 days. The economy of Waller County revolves primarily around farming, cattle, and forest products. Mineral resources include oil and gas, salt domes, shell, gypsum, sulphur, sand, gravel, and brick clay. Waller County is served by U.S. Highway 290, State Highway 6, the Union Pacific Railroad, and three airports. Before settlement large herds of mustangs and wild cattle roamed through what is now Waller County; deer and prairie chickens were also abundant. The Bidai Indians lived a migratory life in the area, where they engaged in hunting and fishing. By the time of Anglo occupation, this group had been reduced to only about 100 members. European explorers apparently did not enter the area before the 1800s. The area that is now Waller County was originally part of the Municipality of Washington under Mexican rule, then became part of Washington County and then Austin County. The area began to be settled in the early 1820s as part of Stephen F. Austin's original colony. In 1821 Jared Groce moved from Alabama with 100 slaves and established Bernardo Plantation, four miles from the site of present Hempstead. Groce grew a crop of cotton in 1822 (perhaps the first in Texas), and in 1825 he constructed the first cotton gin in Texas. A blacksmith shop and commissary were also established at Bernardo, and the plantation became the nucleus of settlement in the area. In April 1836, during the Texas Revolution, Sam Houston's army briefly camped at the plantation. Other early settlers on the east bank of the Brazos were Isaac M. Pennington, first schoolteacher in Austin's colony, and two free Blacks, Lewis B. Jones and Samuel Hardin. The southern part of what became Waller County developed more slowly than the northern sections did. James Pattison established a plantation close to the site of present-day Pattison, and Edwin Waller settled near the site of the present community of Clemons sometime after 1840. Most settlers in the area came from the southern United States. By 1845 the east bank of the Brazos had become a prosperous, cotton-exporting plantation area; about 200 Whites owned more than 1,000 slaves. Jared Groce's son, Leonard W. Groce, acquired some of his father's land in 1854 and built Liendo Plantation, which became the area's social center. During these years most of the area's cotton crop was taken to Houston for marketing. Planters had to rely on inadequate steamboat and poor road transportation until the late 1850s, but development of the area was accelerated in 1858, when the Houston and Texas Central Railway built into the county. Hempstead, a new town located at the railroad's terminus in the northwestern part of the county, was incorporated in November 1858 and soon became a major trade center for the area, as cotton and other agricultural exports were increasingly shipped down the railroad to the coast. Hempstead's importance as a trade center grew in 1861, when the Washington County Rail Road connected the town to Brenham. The formation of Hempstead caused a shift in the county's population, as people moved away from the northern village of Rock Island, which earlier had been the only community in the region. During the Civil War Confederate camps Carter, Groce, and Hebert were established near Hempstead; the town became a Confederate supply and manufacturing center, and a Confederate military hospital was established there. Camp Groce was one of two locations holding Union prisoners of war. Support was strong for the Confederacy in the area. Dr. Richard R. Peebles, a prominent local citizen who helped to found Hempstead, was imprisoned and exiled by Confederate authorities for speaking and writing against the war. Union soldiers marched into Hempstead in the summer of 1865, and about 4,000 troops commanded by George Armstrong Custer camped near Hempstead from August to October. An agency of the Freedmen's Bureau was established at Hempstead in 1866, and in 1867 two companies of federal troops were assigned there. The emancipation of the area's slaves disrupted the local economy and led to the breakup of many of the large plantations; cotton production plunged, and as late as 1870 remained significantly below prewar levels. (The Liendo Plantation was purchased by Edmund Montgomery and his wife, sculptor Elisabet Ney, in 1873). Though according to some reports the White citizens of Hempstead established a good relationship with the occupying soldiers, the city's peace was disturbed by a race riot in 1868. The area's majority Black population became active in local politics during Reconstruction, and a number of Blacks were elected to county and state offices. After Waller County was established in 1873, a majority of the county's voters supported the Republican candidates in every presidential election from 1872 to 1896. Settlers on the east bank of the Brazos had attempted to obtain legislative approval to separate from Austin County as early as the 1850s. As a result of political maneuvering during Reconstruction, the state legislature established Waller County in 1873 from parts of Austin and Grimes counties; Hempstead was designated the county's seat of government. The construction of new rail links and new sources of livelihood soon encouraged the growth of old communities and new towns. Pattison grew rapidly after the Texas Western Narrow Gauge Railroad arrived in 1878; Prairie View State Normal School, a state school to train Black teachers, was established in 1879. In 1880 the first United States census to record the new county reported 9,024 people, including 5,830 African Americans, living in the area. The agricultural census for that year found 596 farms encompassing 103,369 acres. Waller County residents planted over 10,000 acres in cotton that year and had 10,500 cattle. Immigrants from Central and Eastern Europe, Ireland, and Italy arrived during the later nineteenth century, with Germans forming the largest immigrant group; Catholic and Lutheran churches grew with the arrival, especially, of German, Polish, and Czech immigrants into the early twentieth century. A Jewish synagogue, established in 1873, also increased religious diversity. Brookshire grew after 1893, when the Missouri, Kansas, and Texas Railroad built through the area from Houston. South Texas Baptist College was established in the town of Waller in 1898, but did not survive the great storm that pushed through the area in 1900. The Narrow Gauge Railway closed in 1899. By 1900 the county's population had increased to 14,246, including 7,874 Blacks. The agricultural census reported 2,000 farms that year, and cotton production had spread to over 24,000 acres; another 18,300 acres were planted in corn, and 16,000 cattle were reported that year. The county's Black majority population regularly delivered Republican victories in local, state, and national elections during much of the late nineteenth century, but in the 1880s a White Man's Party was organized to reduce Black political participation, and some elections were marked by violence. As a result, the county's Republican vote dropped by 50 percent between 1896 and 1900; although 1,493 Republican votes were cast in the Presidential election of 1896, in 1900 the Republican ticket received only 760 votes. The 1903 state White primary law all but eliminated Blacks as a political power in the county, and in the Presidential election of 1912, only 144 Republican ballots were cast. Cotton production continued to expand in the first decade of the twentieth century but then began to decline. More than 30,000 acres were planted in cotton in 1910, but by 1920 only 23,000 acres were devoted to the fiber. Though cotton cultivation expanded again briefly in the early 1920s—to over 34,000 acres by 1924—it declined again later in the decade, and by 1930 only 24,000 acres were planted in the crop. By that time, a number of farmers had turned to truck farming. The county's Black population declined sharply during this period. By 1930 only 4,952 Blacks were living there. Overall, the population dropped to 12,138 by 1910, to 10,292 by 1920, and to 10,014 by 1930. Cotton farming in the area continued to decline during the Great Depression of the 1930s, due to federal crop restrictions, low prices, and other problems. A number of cotton gins closed during the 1930s, and by 1940, 14,000 acres were planted in cotton. Cropland harvested declined from 58,000 acres in 1930 to only 47,000 acres in 1940. The discovery of petroleum in the county in 1934 helped to diversify the area's economy during and after the depression, but production remained fairly limited. Oil production rose from 80,000 barrels in 1938 to more than 385,000 barrels in 1944 and to almost 591,000 barrels in 1948. By 1960 production had dropped to just under 332,000 barrels; about 217,000 barrels were produced in 1974, and under 134,000 barrels in 1982. In 1990 just under 199,000 barrels of crude were produced. More than 1,501,000 barrels of oil and 6,852,751 cubic feet of gas-well gas were produced in the county in 2004; by the end of that year 27,752,794 barrels of oil had been taken from county lands since 1934. As cotton cultivation continued to decline after World War II many small communities lost population. Farming declined relative to ranching after the 1950s, and by the 1980s irrigated rice had replaced cotton as the area's important crop; the county's last cotton gin closed in 1976. Meanwhile, truck farming and egg production became increasingly important, while watermelon growing declined. After 1960 Waller County's population grew rapidly, as more people moved into the area to commute to jobs in Houston. The United States Census counted 12,071 people in the county in 1960, and 14,285 in 1970; in 1973 the federal Office of Management and Budget began to include Waller County in the Houston Standard Metropolitan Statistical Area. By 1980 almost half of the county's residents lived in urban areas, and the population had increased to 19,798. In the 1980s the county had only ten manufacturing firms, generally specializing in metal fabrication and drilling equipment and supplies, and three banks. Most nonagricultural workers were employed in oil and gas extraction, service industries, and construction. In 1982 about 81 percent of the land was in farms and ranches; about 33 percent of the farmland was cultivated, and about 23 percent was irrigated. Major crops included soybeans, corn, hay, and rice; watermelons, peaches, and pecans were also produced. That year about 53 percent of the county's agricultural income was derived from livestock, particularly cattle, sheep, and hogs. Forest products are also important to the local economy, and in 1981 over 1,921,000 cubic feet of pine was harvested. In 1982 almost 139,265,000,000 cubic feet of gas-well gas and 134,000 barrels of petroleum were produced in the area. Tourism also contributed to the area's economy. Two weekly newspapers, the Brookshire Banner and the Hempstead News Citizen, were published. The town of Prairie View experienced particularly rapid growth as Prairie View A&M's enrollment expanded, and by 1990 it was the largest population center in the county. The school's growth has also shaped the social and political development of the county. In the 1960s Prairie View students boycotted Hempstead businesses to force integration. Black voters became a more potent political force in 1976, after students at Prairie View A&M successfully challenged obstacles to their local voting registration. By 1990 there were 23,390 people living in Waller County. In national elections a majority of the voters of Waller County supported the Democratic candidates in every presidential election from 1900 to 1948. However, the county swung to Republicans in 1952, 1956, and 1960. The county's voters then supported the Democratic candidates in most presidential elections from 1964 through 1996, except in 1972, when Republican Richard Nixon carried the county, and 1984, when Ronald Reagan did. In the 2000 and 2004 presidential elections Republican George W. Bush carried the county with solid majorities. In 2014 the census counted 46,820 people living in Waller County. About 43.6 percent were Anglo, 25.8 percent were African American, and 29.5 percent were Hispanic. Almost 74 percent of residents age twenty-five and older had four years of high school, and almost 17 percent had college degrees. In the early twenty-first century agriculture, education, and some manufacturing were key elements of the area’s economy. In 2002 the county had 1,453 farms and ranches covering 277,000 acres, 45 percent of which were devoted to pasture, 45 percent to crops, and 6 percent to woodlands. In that year Waller County farmers and ranchers earned $37,884,000, with crop sales accounting for $21,935,000 of that total. Cattle, rice, nursery crops, aquaculture, corn, hogs, poultry, horses, goats, hay, and watermelons were the chief agricultural products. More than 274,000 cubic feet of pinewood and almost 5,000 cubic feet of hardwood were harvested in the county in 2003. Hempstead (population, 6,476) is the county’s seat of government; other communities include Brookshire (4,831), Prairie View (5,809), Katy (15,094, mostly in Fort Bend and Harris counties), Waller (2,445, partly in Harris County), Pine Island (1,012), and Pattison (513). Hempstead hosts a watermelon festival in July, and the Waller County Festival is held in October. Is history important to you? We need your support because we are a non-profit organization that relies upon contributions from our community in order to record and preserve the history of our state. Every dollar helps. Carrie B. Coss, Liendo Plantation (Hempstead, Texas: Waller County Historical Commission, 1977). William L. Richter, The Army in Texas during Reconstruction, 1865–1870 (College Station: Texas A&M University Press, 1987). William L. Richter, Overreached on All Sides (College Station: Texas A&M University Press, 1991). Waller County Historical Survey Committee, A History of Waller County, Texas (Waco: Texian Press, 1973). The following, adapted from the Chicago Manual of Style, 15th edition, is the preferred citation for this entry. Carole E. Christian and John Leffler, Handbook of Texas Online, accessed August 09, 2022, Published by the Texas State Historical Association. All copyrighted materials included within the Handbook of Texas Online are in accordance with Title 17 U.S.C. Section 107 related to Copyright and “Fair Use” for Non-Profit educational institutions, which permits the Texas State Historical Association (TSHA), to utilize copyrighted materials to further scholarship, education, and inform the public. The TSHA makes every effort to conform to the principles of fair use and to comply with copyright law.
<urn:uuid:134822d9-490e-4a37-99ff-d74725496734>
CC-MAIN-2022-33
https://www.tshaonline.org/handbook/entries/waller-county
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00401.warc.gz
en
0.97155
3,482
3.296875
3