text
stringlengths
1k
23.6k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
16
1.34k
file_path
stringlengths
125
126
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
2.05k
4.1k
score
float64
2.52
4.91
int_score
int64
3
5
Cyberloafing: Minimalizing Work Stress on Millennial Generations Employee Keywords:Cyberloafing Behavior, Work Stress, Mileniall Generation Employess In the era of industry 4.0, technological changes are accelerating rapidly. Internet technology provides many conveniences for employees to deal with their duties. The use of the internet that has become a characteristic of individuals, especially employees, has a negative or positive impact. This study aims to determine the factors that cause cyberloafing behavior in millennial employees, how the impact of cyberloafing behavior, what kind of work stress experienced by millennials and how cyberloafing behavior can minimize work stress in millennial generations. The research method applied is descriptive method with a qualitative approach. The data collection technique used is by conducting interviews with 2 millennial generation employees and 1 leader. The interview technique is done in semi-structured technique and list of questions are prepared for the interview which are developed based on the relevant literature. After the data is obtained, the presentation and data reduction are carried out, then conclusion is drawn. The result of this study indicates that cyberloafing behavior in millennial generation employees is an activity carried out by millennial generation employees to minimize work stress occurred during working hours in the company environment. This means that cyberloafing behavior among millennial generation employees is considered an activity that can refresh brain performance. This behavior is carried out to reduce or minimize the stress experienced such as entertainment when stressed, refreshing the brain from stress and boredom because they have to work continuously. Ardilasari, N. (2017). Hubungan Self Control Dengan Perilaku Cyberloafing Pada Pegawai Negeri Sipil. Jurnal Ilmiah Psikologi Terapan, 5(1), 19–39. https://ejournal.umm.ac.id/index.php/jipt/article/view/3882. Askew, K., Buckner, J. E., Taing, M. U., Ilie, A., Bauer, J. A., & Coovert, M. D. (2014). The role of the theory of planned behavior. Computers in Human Behavior, 36, 510–519. https://doi.org/10.1016/j.chb.2014.04.006. Astri, Y., & Zahreni, S. (2018). Pengaruh Iklim Organisasi terhadap Perilaku Cyberloafing pada Karyawan PT X: Effect of Organization Climate on Cyberloafing Behavior in Employees of PT X. Psikologia: Jurnal Pemikiran Dan Penelitian Psikologi, 13(1), 16–26. https://talenta.usu.ac.id/jppp/article/view/2264. Azizah, S. N., & Setyawati, H. A. (2019). Cyberloafing sebagai strategi mengatasi kebosanan kerja. Fokus Bisnis: Media Pengkajian Manajemen Dan Akuntansi, 18(1), 1–7. http://www.journal.stieputrabangsa.ac.id/index.php/fokbis/article/view/301. Betts, T. K., Setterstrom, A. J., Pearson, J. M., & Totty, S. (2014). Explaining cyberloafing through a theoretical integration of theory of interpersonal behavior and theory of organizational justice. Journal of Organizational and End User Computing (JOEUC), 26(4), 23–42. https://www.igi-global.com/article/explaining-cyberloafing-through-a-theoretical-integration-of-theory-of-interpersonal-behavior-and-theory-of-organizational-justice/119505. Blanchard, A. L., & Henle, C. A. (2008). Correlates of different forms of cyberloafing: The role of norms and external locus of control. Computers in Human Behavior, 24(3), 1067–1084. https://doi.org/10.1016/j.chb.2007.03.008. Blau, G., Yang, Y., & Ward-Cook, K. (2006). Testing a measure of cyberloafing. Journal of Allied Health, 35(1), 9–17. https://www.ingentaconnect.com/content/asahp/jah/2006/00000035/00000001/art00003. Bozbayindir, F. (2019). The Relationship between the Time Management Skills and Cyberloafing Behavior of School Administrators: A Quantitative Analysis. Educational Policy Analysis and Strategic Research, 14(3), 178–199. https://eric.ed.gov/?id=EJ1232184. Demir, M., & Melek, T. A. N. (2018). Relationship between demographic characteristic of employees and cyberloafing behavior. Journal of Tourism Theory and Research, 4(1), 40–56. https://dergipark.org.tr/en/pub/jttr/article/375791. Derin, N., & Gökçe, S. G. (2016). Are cyberloafers also innovators?: A study on the relationship between cyberloafing and innovative work behavior. Procedia-Social and Behavioral Sciences, 235, 694–700. https://doi.org/10.1016/j.sbspro.2016.11.070. Dursun, O. O., Donmez, O., & Akbulut, Y. (2018). Predictors of cyberloafing among preservice information technology teachers. Contemporary Educational Technology, 9(1), 22–41. https://dergipark.org.tr/en/pub/cet/issue/34282/378820. Elrehail, H., Rehman, S. U., Chaudhry, N. I., & Alzghoul, A. (2021). Nexus among cyberloafing behavior, job demands and job resources: A mediated-moderated model. Education and Information Technologies, 26, 4731–4749. https://doi.org/10.1007/s10639-021-10496-1. Huma, Z. -e., Hussain, S., Thurasamy, R., & Malik, M. I. (2017). Determinants of cyberloafing: a comparative study of a public and private sector organization. Internet Research, 27(1), 97–117. https://doi.org/10.1108/IntR-12-2014-0317. Hurriyati, D. (2017). Analisis Faktor-Faktor Yang Mempengaruhi Perilaku Cyberloafing Pada Pegawai Negeri Dinas Pekerjaan Umum Kota Palembang. Jurnal Ilmiah Psyche, 11(2), 75–86. http://journal.binadarma.ac.id/index.php/jurnalpsyche/article/view/40. Hussain, S., & Parida, T. (2017). Exploring cyberloafing behavior in South-central Ethiopia: A close look at Madda Walabu University. Journal of Media and Communication Studies, 9(2), 10–16. https://doi.org/10.5897/JMCS2016.0499. Jandaghi, G., Alvani, S. M., Zarei Matin, H., & Fakheri Kozekanan, S. (2015). Cyberloafing management in organizations. Iranian Journal of Management Studies, 8(3), 335–349. https://doi.org/10.22059/ijms.2015.52634. Jia, H. H. (2008). Relationships between the big five personality dimensions and cyberloafing behavior. Southern Illinois University at Carbondale. Khansa, L., Barkhi, R., Ray, S., & Davis, Z. (2018). Cyberloafing in the workplace: mitigation tactics and their impact on individuals’ behavior. Information Technology and Management, 19(4), 197–215. https://doi.org/10.1007/s10799-017-0280-1. Liberman, B., Seidman, G., McKenna, K. Y., & Buffardi, L. E. (2011). Employee job attitudes and organizational characteristics as predictors of cyberloafing. Computers in Human Behavior, 27(6), 2192–2199. https://doi.org/10.1016/j.chb.2011.06.015. Milles, M. B., & Huberman, A. M. (1992). Analisis Data Kualitatif (T. R. Rohidi & Mulyarto (eds.)). Universitas Indonesia Press. Ozler, D. E., & Polat, G. (2012). Cyberloafing phenomenon in organizations: Determinants and impacts. International Journal of EBusiness and EGovernment Studies, 4(2), 1–15. https://dergipark.org.tr/en/pub/ijebeg/issue/26199/275855. Rajah, R., & Lim, V. K. (2011). Cyberloafing, Neutralization, And Organizational Citizenship Behavior. PACIS, 152, 24–40. https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1151&context=pacis2011. Restubog, S. L. D., Garcia, P. R. J. M., Toledano, L. S., Amarnani, R. K., Tolentino, L. R., & Tang, R. L. (2011). Yielding to (cyber)-temptation: Exploring the buffering role of self-control in the relationship between organizational justice and cyberloafing behavior in the workplace. Journal of Research in Personality, 45(2), 247–251. https://doi.org/10.1016/j.jrp.2011.01.006. Romadhani, R. K. (2020). Anteseden Cyberloafing pada Karyawan Perusahaan Start-up. Acta Psychologia, 2(2), 173–182. https://journal.uny.ac.id/index.php/acta-psychologia/article/view/35104. Sawitri, H. S. R. (2012). Interaksi tekanan pekerjaan dan komitmen pada perilaku cyberloafing karyawan. Media Riset Bisnis & Manajemen, 12(2), 91–107. http://www.trijurnal.lemlit.trisakti.ac.id/mrbm/article/view/1107http://www.trijurnal.lemlit.trisakti.ac.id/mrbm/article/view/1107. Sugiyono. (2014). Metode Penelitian Pendidikan Pendekatan Kuantitatif, Kualitatif, dan R&D. Alfabeta. Yaşar, S., & Yurdugül, H. (2013). The investigation of relation between cyberloafing activities and cyberloafing behaviors in higher education. Procedia-Social and Behavioral Sciences, 83, 600–604. https://doi.org/10.1016/j.sbspro.2013.06.114. Yılmaz, F. G. K., Yılmaz, R., Öztürk, H. T., Sezer, B., & Karademir, T. (2015). Cyberloafing as a barrier to the successful integration of information and communication technologies into teaching and learning environments. Computers in Human Behavior, 45, 290–298. https://doi.org/10.1016/j.chb.2014.12.023.
<urn:uuid:7c34fdef-7053-4f01-9c7c-a1944f686fbc>
CC-MAIN-2022-33
https://ejournal.undiksha.ac.id/index.php/IJSSB/article/view/36872
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00203.warc.gz
en
0.679687
2,656
2.515625
3
The Federalist Party, led by Alexander Hamilton, aimed to create a stable and secure country, safe for business and wealthy men of property. The opposition Democratic-Republican Party was bitterly opposed to the Federalists. Led by Thomas Jefferson, it tended to represent poor farmers, craftsmen, and recent immigrants. (The party was commonly referred as the Republicans or Jeffersonians. It was the forerunner of today's Democratic Party.) In foreign affairs, the Federalists detested the French Revolution of 1789 because it led to mob rule and confiscation of property. The Republicans supported the French Revolution for its democratic ideals. In 1794, President Washington negotiated a treaty with England to settle outstanding differences between the two countries. The resulting improvement in American-English relations angered the revolutionary French leaders, who were enemies of the English. In the election of 1796, Federalist John Adams won the most electoral votes to become president. Republican Thomas Jefferson came in second, which made him vice-president. (The 12th Amendment later changed this election method, requiring separate electoral ballots for president and vice-president.) Shortly after becoming president, Adams sent diplomats to France to smooth over the bad feelings. But three French representatives—dubbed X, Y, and Z—met secretly with the U.S. diplomats and demanded $10 million in bribes to the French government to begin negotiations. When the Americans refused, Mr. X threatened the United States with the "power and violence of France." News of the "XYZ Affair" enraged most Americans. Many Federalists immediately called for war against France. President Adams, however, only proposed war preparations and a land tax to pay for them. On the defensive, Republicans spoke out against the "war fever." Neither the United States nor France ever declared war. But the Federalists increasingly accused Jefferson and the Republicans of being a traitorous "French Party." A leading Federalist newspaper proclaimed to the nation, "He that is not for us, is against us." The Alien Acts Rumors of a French invasion and enemy spies frightened many Americans. President Adams warned that foreign influence within the United States was dangerous and must be "exterminated." The Federalist majority in Congress quickly passed four laws in 1798 to make the United States more secure from alien (foreign) spies and domestic traitors. Most of these laws, however, were also intended to weaken Jefferson's Democratic-Republican Party. The first law, the Naturalization Act, extended the time immigrants had to live in the United States to become citizens from five to 14 years. Since most immigrants favored the Republicans, delaying their citizenship would slow the growth of Jefferson's party. The Alien Enemies Act provided that once war had been declared, all male citizens of an enemy nation could be arrested, detained, and deported. If war had broken out, this act could have expelled many of the estimated 25,000 French citizens then living in the United States. But the country did not go to war, and the law was never used. The Alien Friends Act authorized the president to deport any non-citizen suspected of plotting against the government during either wartime or peacetime. This law could have resulted in the mass expulsion of new immigrants. The act was limited to two years, but no alien was ever deported under it. The fourth law was the Sedition Act. Its provisions seemed directly aimed at those who spoke out against the Federalists. The Sedition Act In general, sedition means inciting others to resist or rebel against lawful authority. In England, "seditious libel" prohibited virtually any criticism of the king or his officials. English common law held that any spoken or written words that found fault with the king's government undermined the respect of the people for his authority. The U.S. Sedition Act first outlawed conspiracies "to oppose any measure or measures of the government." Going further, the act made it illegal for anyone to express "any false, scandalous and malicious writing" against Congress or the president. Significantly, the act did not specifically protect the vice-president who, of course, was Jefferson. Additional language punished any spoken or published words that had "bad intent" to "defame" the government or to cause the "hatred" of the people toward it. These definitions of sedition were more specific than those found in English common law. Even so, they were still broad enough to punish anyone who criticized the federal government, its laws, or its elected leaders. Unlike English common law, the Sedition Act allowed "the truth of the matter" to be a defense. The act also left it to the jury to decide if a defendant had "bad intent." Penalties for different provisions of the law ranged from six months to five years in prison and a fine of up to $5,000 (more than $100,000 in today's dollars). The Republican minority in Congress argued that sedition laws violated the First Amendment to the U.S. Constitution, which protects freedom of speech and the press. The Federalists countered by defining these freedoms in the narrow English manner. According to English law, free speech and press only applied before the expression of ideas. The government could not censor or stop someone from expressing ideas. But after the words had been spoken or printed, the government could punish people if they had maliciously defamed the king or his government. The Federalist majority in Congress passed the Sedition Act and President Adams signed it into law on July 14, 1798. It was set to expire on March 3, 1801, the last day of the first and—as it turned out—only presidential term of John Adams. The Attack on the Republicans Secretary of State Timothy Pickering was in charge of enforcing the Alien and Sedition Acts. He immediately began to read as many Republican newspapers as he could, looking for evidence of sedition against President Adams and Congress. In October 1798, a Vermont Republican congressman, Matthew Lyon, became the first person to be put on trial under the Sedition Act. Like most Republicans, Lyon opposed going to war against France and objected to the land tax to pay for war preparations. Lyon wrote a letter published in a Republican newspaper, criticizing President Adams for "a continued grasp for power." He also read aloud at several public meetings a letter written by poet Joel Barlow who jokingly wondered why Congress had not ordered Adams to a madhouse. A federal grand jury indicted Lyon for intentionally stirring up hatred against President Adams. Unable to find a defense attorney for his trial, Lyon defended himself. The U.S. marshal, a Federalist appointee, assembled a jury from Vermont towns that were Federalist strongholds. Lyon attempted to prove the truth of the words he wrote and spoke, as permitted by the Sedition Act. This meant that the burden of proof was on him. Lyon had to prove the words in question were true rather than the prosecutor having to prove them false. Lyon also argued that he was only expressing his political opinions, which should not be subject to the truth test. The jury found Lyon guilty of expressing seditious words with "bad intent." The judge, also a Federalist, sentenced him to four months in jail, a $1,000 fine, and court costs. Lyon ran for re-election to Congress from his jail cell and won. Vermont supporters petitioned President Adams to release and pardon him, but Adams refused. When Lyon was released from jail, he was welcomed as a hero in his Vermont hometown. He was cheered along the route he took when he journeyed to Congress. Once Lyon returned to Congress, the Federalists tried to expel him as a convicted criminal, but this effort failed. Thirteen more indictments were brought under the Sedition Act, mostly against editors and publishers of Republican newspapers. While some Republican newspapers were forced to close down, many others were intimidated not to criticize the government. One Republican was convicted of sedition for publishing a pro-Jefferson campaign pamphlet that accused President Adams of appointing corrupt judges and ambassadors. Two men were found guilty of raising a "liberty pole" and putting a sign on it that said, "downfall to the Tyrants of America." Another was arrested, but never tried, for circulating a petition to repeal the Alien and Sedition Acts themselves. A drunk was fined $150 for insulting President Adams. In the most bizarre case, the Federalists in the U.S. Senate formed a special committee to investigate a Republican editor, William Duane. Republicans had leaked to him a Federalist proposal to change how presidential electoral votes were counted. Duane had printed the law and written editorials denouncing it. When summoned to the Senate to face charges of writing "false, scandalous, defamatory, and malicious assertions," he went into hiding and secretly continued writing for his newspaper. A New Definition of Free Speech and Press The Alien and Sedition Acts provoked a debate between Republican and Federalist state legislatures over freedom of speech and the press. In a resolution he wrote for the Virginia legislature, James Madison argued that the Sedition Act attacked the "right of freely examining public characters and measures, and of free communication among the people." In heavily Federalist Massachusetts, state legislators responded that a sedition law was "wise and necessary" to defend against secret attacks by foreign or domestic enemies. The Federalists in Congress issued a report accepting the old English common law definition of free speech and press. It argued that the First Amendment only stopped the government from censoring beforehand any speeches or writings. The government, argued the Federalists, should be able to protect itself from false and malicious words. Congressman John Nichols, a Republican from Virginia, challenged this Federalist view. He asserted that Americans must have a free flow of information to elect leaders and to judge them once they were in office. Nichols asked why government, which should be critically examined for its policies and decisions, should have the power to punish speakers and the press for informing the voters. In the end, the people settled this debate in 1800 by electing Thomas Jefferson president and a Republican majority to Congress. In his inaugural address, Jefferson confirmed the new definition of free speech and press as the right of Americans "to think freely and to speak and write what they think." For Discussion and Writing - What was the Sedition Act? Why was it passed? Do you think it was constitutional? Explain. - How did the Federalists and the Democratic-Republicans differ regarding criticism of the government and freedom of speech and the press? - Write a letter to the editor of a 1798 newspaper, expressing your views about the Alien and Sedition Acts. For Further Information The Alien and Sedition Acts. From the Avalon Project. The Alien and Sedition Acts of 1798 From Archiving Early America. Alien and Sedition Acts From Our Documents. Alien and Sedition Acts of the United States From NapoleonSeries. Alien and Sedition Acts From Columbia Encyclopedia. Alien and Sedition Acts From Wikipedia. Alien and Sedition Acts From AllRefer. Order vs. Liberty By Larry Gragg from American History Magazine. Matthew Lyon, "New Man" of the Democratic Revolution, 1749-1822 By Aleine Austin. University Park, Pennsylvania: Pennsylvania State University Press, 1981. John Adams By David McCullough. Teaching With Documents Lesson Plan: U.S. v. Thomas Cooper—A Violation of the Sedition Law From the National Archives and Records Administration. A C T I V I T Y Freedom of Speech and the Press The U.S. Supreme Court never decided whether the Alien and Sedition Acts were constitutional. In fact, it was not until the 20th century that the Supreme Court grappled with significant free speech and free press issues. In this activity, students look up some of these important Supreme Court decisions and report back to the class. 1. Divide the class into small groups. Assign each group one of the cases below. 2. Each group should: a. Find, read, and discuss the case. The Internet has each of the cases (try http://www.FindLaw.com) or research them at your public library. b. Write a summary of the case. It should include the facts of the case, the main issue, the decision of the court, the court's reasoning, and what the dissenting justices said. c. Prepare to report on the case to the class. Include in your presentation how each of you think the case should have been decided and why. 3 .Have the groups report and discuss each decision. Schenck v. U.S. 249 U.S. 47 (1919) Congress passed laws during World War I against distributing material that would interfere with the war effort. Charles Schenck, general secretary of the American Socialist Party, was convicted under this law for distributing leaflets urging draft-age men not "submit to intimidation" but to "petition for repeal" of the draft law. New York Times v. Sullivan (1964) During the civil rights era, the New York Times printed an ad asking for donations to help peaceful protesters at Alabama State College. L.B. Sullivan, police commissioner of Montgomery, sued the Times for libel saying that the ad had false material that damaged his reputation. New York Times Co. v. U.S. (1971) During the Vietnam War, the New York Times received a top-secret Defense Department 7,000-page history of U.S. involvement in Vietnam. It started publishing excerpts, and the government sued to have the newspaper stop publishing the excerpts. Yates v. U.S. 354 U.S. 298 (1957) In 1939 with World War II looming, Congress passed the Smith Act, which made it a crime to advocate overthrowing the government by violence. In the 1950s, 14 leaders of the American Communist Party were convicted under the Smith Act.
<urn:uuid:1836781a-f4df-4fe5-b578-97e53ea87aaf>
CC-MAIN-2022-33
https://www.crf-usa.org/bill-of-rights-in-action/bria-19-4-b-the-alien-and-sedition-acts-defining-american-freedom.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00005.warc.gz
en
0.969065
2,879
4.09375
4
12 Nov Men vs. women: Broadening our narratives about men on International Men’s Day November 19 marks International Men’s Day, coinciding with what is better known as ‘Movember’, an initiative created to help raise awareness about men’s health issues. International Men’s Day also draws attention to the challenges related to workplace diversity and inclusion faced by men. The 2021 theme is aptly: Improving gender relations between men and women. With so much going on around us, it is understandable that, when we consider workplace gender equality, it would be more convenient to opt for a simplistic narrative: men vs. women; us vs. them; radical transformation or no transformation at all. While this approach might provide some much-needed psychological relief from the utter inundation of information we all suffer, it also comes at a cost: missing out on the complexity of the issues at hand and, in this case, potentially neglecting a whole identity group — men. By indiscriminately simplifying the complex narratives related to men in managing gender relations, we risk omitting subtle yet critical complexities, such as their unique identity concerns. Our penchant for reverting to extremist epithets such as ‘it is too complicated’ is too readily exercised, and does nothing to justify our apathy and lack of urgency when it comes to improving gender relations between men and women. Discussions around gender, and men, in particular, tend to oscillate between oversimplification and succumbing to the limitation of thinking it is too complicated. Given the slow pace of change towards the creation of a more just society, I think it is safe to say that ‘business as usual' has not worked. Some of the prevailing narratives (particularly prevalent in diversity management literature) about men paint a rather static view of them, such as that they are merely a singular, dominant group. That said, dominant group theory — which explains the insularity and arrogance of the dominant — can be helpful in explaining the status threat felt by men, “born of a sense that the outgroup is doing too well and thus, is a viable threat to [their] own dominant group status.”(1) Scholarly perspectives of men such as this conveniently omit the human side of each man pejoratively labelled a dominant group member. In short, the narrative avoids the sticky but salient issue of identity. As a result, it fails to acknowledge men’s changing position in society. A case in point is the increasingly ostracised position of white blue-collar workers in the USA.(2) Members of this constituency feel that the ‘new elite’ — women, immigrants, and racial minorities — are jumping the queue at the expense of these men, making the men oppositional to public programmes, even those that would also improve their own quality of life. Similarly, in South Africa, where the debates around race and gender are often intertwined, the simplistic view of white men fails to account for nuances such as when “both black and white males feel discriminated against by female competitors.”(3) Prevailing narratives about men fail to include the various ways in which identity needs form a crucial part of why men might feel threatened by calls for gender equality — why support something that seemingly excludes you? Both men and women of all races need to self-reflect while bearing in mind that self-interest is the common denominator across race and gender. As a possible remedy, we should avoid shortcut solutions devoid of complexity. In our haste to find solutions, we forget that we are dealing with complex individuals with rich personal narratives. By lumping men into a singular grouping with a blanket narrative, we fail to gain a deeper understanding of the multivariate experiences of men, who have to adapt to changes related to increasing diversity in all spheres of society. Left unaddressed, we risk indefinitely forgoing their participation as part of creating more inclusive and gender-equitable organisations.(4) I recently came across Solution Journalism, an initiative to address the issue of polarisation in the media. Spearheaded by the Centre for Understanding Conflict in New York and headed by journalist Amanda Ripley, the focus of Solution Journalism is to transfer some of the insights from the field of mediation to journalism.(5) This includes changing the way journalists report on polarising issues through a move to widen the lens and ‘complicate’ the narrative. Whereas the typical approach would be to focus on a portrait of an individual, there should also be due consideration of “the neighbourhood, the family, the church and the government and all the things that have contributed to that person’s experience.”(6) By taking a more complex view, a more complete perspective can be created about polarising issues, to provide context and a nuanced view of the other side of a story. When taking this perspective, all parties to the debate are more likely to feel heard and included, and would be less inclined to revert to extreme measures to have their grievances recognised. This sense of being heard creates new links between stories, and thus also grievances that, at face value, would be regarded as opposites. Advocates for improving workplace gender relations and inclusion face the similar and just as daunting task of overcoming polarisation and forestalling an indefinite stay in ‘apathetic lane’. Far too often, the prevailing narratives related to gender equality divide us, and we miss out on engaging a crucial constituency — men — who should be on board and not just in the boardroom if inclusion is to work at work. Conflict expert John Burton’s focus on human needs theory in relation to conflict describes identity “as a sense of self in relation to the outside world.”(7) However, what is often ignored by prevailing narratives related to men is instances where their identity is not considered legitimate, resulting in an unmet human need. Drawing on the example of the Solution Journalism project, a possible corrective to this imbalance from the conflict management field would be to create richer, more complex, and more human views about men, to legitimise their identity needs. By layering narratives with information about communities, social norms, religious teachings, physical limitations, and competitive barriers, we provide a starting point for mutual recognition of human complexity in the quest for gender equality. Dr Peter Mark Roget, in his book It’s not complicated: The art and science of complexity for business, explains that “consciously managing complexity in a business context is broadly a function of four different strategies or tactics. They are: (1) recognize which type of system you are dealing with; (2) think ‘manage, not solve’; (3) employ a ‘try, learn, and adapt’ operating strategy; and finally, and perhaps most importantly, (4) develop a complexity mindset.”(8) Unfortunately, we seem to be more receptive to advice for dealing with complexity as it relates to other social and organisational challenges, but when it comes to gender, and particularly the complexity of multiple narratives related to men, we tend to opt-out. However, if individuals in this society are to thrive in the 21st century, we need not only cultivate a 'complexity mindset', but also the capacity to handle complexity wisely. It is here that dealing with complexity can benefit from insights from the field of conflict management in order to avoid unnecessarily complicating the journey towards the ideal of healthy relations between men and women. By taking a more complex view of men, recognition can be obtained for the multiple and varied experiences of what it means to be a man in today’s society. An approach of curiosity and inquiry is a more constructive way of gaining the buy-in of men. We then create a space for collaboration, not alienation. In this way, a more helpful perspective can emerge, as seen in the suggestions raised during the 2020 conference Men Promoting Gender Equality held in Estonia. These suggestions included, amongst others, facilitating programmes at work to enable men to be more engaged in the household, increasing parental leave for both parents, and removing the distinction between the primary and secondary caregiver.(9) Additional and richer narratives related to men broaden the options for this identity group and create more complex, more complete, and more representative narratives of men. Thus, from the perspective of gender conflict management, a new space is created for solution-orientated exchange between — on the face of it — opposites. In the same way, polarising journalism that advocates improving relations between men and women also stands to benefit from unorthodox insights to help create less polarisation. To overcome the impasse related to the prevailing narratives about men, a more complex characterisation of this identity group by the media can help us find more common ground for cooperation. This means we need to resist the kneejerk response of labelling the achievement of gender equality as too complex and thus impossible. That said, our efforts to add complexity to the gender debate should not be seen as equivalent to complicating the achievement of improved gender relations, which would only be to the detriment of finding mutually healing solutions. Drawing on the lessons from the field of conflict management, it is time to also embrace the complexity of men through multiple narratives. Gender relations and the narratives about men might be complex and multi-faceted, but complexity, when viewed from a mediator’s mindset, can also be a source of inspiration. Complexity, when properly managed, can lead to more common ground between opposites, and thus increase the possibility of more mutually enriching interactions between men and women. Paradoxically, adding complexity to the prevailing narratives about men will create a better chance of engaging them to become allies of women, and, in so doing, remove further barriers to improved gender relations. That said, the onus is on us to consider how to introduce complexity into the prevailing narratives about men. This International Men’s Day serves as a day of reflection on the limitations that prevailing simplistic and deliberately oppositional narratives about men hold for women’s workplace equality and gender relations. For diversity management to maximise inclusion, resistance should be minimised, which is why the support of men is indispensable(10). On 19 November, we can all choose to add richness to and widen the scope of these narratives, and improve gender relations to the benefit of all. |⇡1||Wilkerson, E. (2020). Caste: The origin of our discontent. Penguin.| |⇡2||Hochschild, A. (2016). Strangers in their own land. The New Press.| |⇡3||Oosthuizen, R. M., Tonelli, L., & Mayer, C.-H. (2019). Subjective experiences of employment equity in South African organisations. SA Journal of Human Resource Management. https://doi.org/10.4102/sajhrm| |⇡4||Shelton, C., & Thomas, D.A. (2013). The study on white men leading through diversity and inclusion. Available online at www.greenheartleaderlabs.com| |⇡5||Ripley, A. (2019, February 14). Amanda Ripley on complicating the narrative. Solutions Journalism Network. https://www.youtube.com/watch?v=2XUtgMR9avw| |⇡6||Ripley, A. (2019, February 14). Amanda Ripley on complicating the narrative. Solutions Journalism Network. https://www.youtube.com/watch?v=2XUtgMR9avw| |⇡7||Marker, S. (2003, August). Unmet human needs. Beyond Intractability. https://www.beyondintractability.org/essay/human_needs| |⇡8||Kinni, T. (2017, June 21). The critical difference between complex and complicated. MITSloan Management Review. https://sloanreview.mit.edu/article/the-critical-difference-between-complex-and-complicated/| |⇡9||Hearn, J. (2020). The 5th International Conference on Men and Equal Opportunities: Men Who Care.| |⇡10||Stevens, F. G., Plaut, V. C., & Sanchez-Burks, J. (2008). Unlocking the benefits of diversity: All-inclusive multiculturalism and positive organizational change. Journal of Applied Behavioral Science, 44(1), 116-133. https://doi.org/10.1177/0021886308314460|
<urn:uuid:f06cc381-86ae-46aa-84ff-223fa7f88fc1>
CC-MAIN-2022-33
https://www.womensreport.africa/men-vs-women-broadening-our-narratives-about-men-on-international-mens-day/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00403.warc.gz
en
0.93537
2,625
2.53125
3
Issues Of The Environment: Audit Of Recycling In Parts Of Washtenaw County Now Underway Curbside recycling is common practice, yet many residents are still placing unrecyclable materials in their bins. That's why the Washtenaw Regional Resource Management Authority (WRRMA) has started an audit and educational program to help property owners make better recycling decisions. Della DiPietro, who serves as both Ann Arbor Township treasurer and WRRMA representative, discusses the program in detail with WEMU's David Fair. - Michigan is investing in both local recycling systems and manufacturers who use recycled materials through the Renew Michigan Fund. The goal is to increase recycling in Michigan to 30% by 2025. - Last year, Washtenaw Regional Resource Management Authority won a $200,000 grant to improve the quality of our recycling stream. The grant is funded by the Michigan Department of Environment, Great Lakes, and Energy (EGLE) and the national nonprofit The Recycling Partnership. It builds on the success of Michigan’s national award-winning Know It Before You Throw It recycling education campaign that EGLE launched last year. - This month, the campaign kicks off in WRRMA’s seven local government members (Ann Arbor Charter Township, Pittsfield Charter Township, Scio Township, Ypsilanti Charter Township, and the cities of Dexter, Saline, and Ypsilanti). Trained staff will conduct four quick-glance field inspections of curbside recycling carts at single family homes. “Oops” tags will provide direct feedback to residents about any contamination of materials in their carts. - If something in the recycling cart does not belong there, an orange “Oops” tag will be left behind with feedback on how to fix it. If it happens again, a red “Oops” tag with feedback will be left, and the recycling cart will not be emptied. Fix the problem and remove the tag, and your recycling will be picked up on the next scheduled date. - EGLE research shows that the campaign is very useful for residents to learn how to properly recycle. For example, EGLE found that 50% of Michigan residents mistakenly believe they can recycle plastic bags in curbside recycling, and 76% are unaware that failing to rinse and empty items before putting them in the recycling bin poses a risk of contaminating everything in the bin. Measurement of contamination rates after the campaign will assess its effectiveness. - Della DiPietro is Treasurer for Ann Arbor Charter Township, an elected position that she’s held since 2008. The treasurer is one of seven members of the Township Board. Prior to that, she served as a Trustee on the Township Board from 1996 - 2008. Della is also Township’s representative for Washtenaw Regional Resource Recovery Authority. David Fair: This is 89 one WEMU, and I'm betting most of you recycle to one degree or another. Fact of the matter is Michigan lags behind many states and is looking to catch up and get to an overall recycling rate of 30 percent by the year 2025. I'm David Fair, and I'd like to welcome you to this week's edition of Issues of the Environment. The state is investing in local recycling systems and in manufacturers that use recycled materials to get to that goal. Knowing what you put in your recycling bin is going to be very important, as bin audits are being conducted through much of Washtenaw County. Our guest today is Della DiPietro, and she serves as an arbiter shift treasurer, and she's also the township's representative on the seven-community Washtenaw Regional Resource Recovery Authority. Thank you so much for the time today, Della. Della DiPietro: I am so pleased to be with you, David, and so pleased to talk about recycling. David Fair: And I know you are passionate about the subject matter, but, just as a matter of curiosity, in adding to your responsibilities as treasurer, is treasurer and recycling representative more linear than it sounds to me? Della DiPietro: That's a great question. You know, if you were the treasurer, as I am, you're really looking at community resources and using them appropriately. Of course, most of us know we're the tax collectors, right? So it's cash flow we're managing. But, you know, you can consider that our recycled materials are just another community resource. And we all want to make sure that when we're recycling, we're doing it in the way that's going to make the most difference. David Fair: For a little background, the Washtenaw Regional Resource Recovery Authority includes not only Ann Arbor Township, but Pittsfield, Scio, and Ypsilanti Township, as well as the cities of Ypsilanti, Saline and Dexter. Were their efforts to get more communities involved, or was this what we settled on as the most solid way to move forward immediately? Della DiPietro: The authority went to many additional--when the county, excuse me--when we were forming the authority went many additional communities and some, for whatever reason, decided this was not either the topic for the time. Although, we are now in the conversation with the city of Ann Arbor, who has petitioned the authority to join. So we're excited about that possibility and something that we think is going to happen this year. David Fair: And that, yeah, that could make a huge difference for all involved. Eighty-Nine One WEMU's Issues of the environment conversation on recycling and upcoming recycling audits continues with Della DiPietro. Della represents Ann Arbor Township on the Washtenaw Regional Resource Recovery Authority. The Michigan Department of Environment, Great Lakes, and Energy conducted research that showed about 50 percent of us that do recycle make common mistakes. And when those mistakes happen, there are ramifications to the manner in which our waste is handled and where it ends up, right? Della DiPietro: Absolutely. What some of those mistakes, such as putting in yard waste or such as putting in dirty items, can actually contaminate not just your bin, but then the whole truck. So, we have to be very careful about what we put in the recycling bin, not, for two reasons. One, to make sure it doesn't contaminate other recyclables, but then when it gets to what's called the materials recovery facility, or MRF as we commonly call it, that those materials can be appropriately recycled or put into the recycling stream. David Fair: Improving the quality of the area's recycling stream is exactly why the Resource Recovery Authority was awarded a 200,000 dollar grant in 2020. How is that money being used to achieve the desired results? Della DiPietro: Well, you mentioned just a moment ago that we're going to do audits and they are starting this week. And what that actually looks like is trained staff from the recycling partnership, which is a national nonprofit. We'll be looking for the seven communities the recycle bins for single home use, looking for quick places, not crawling all through the quick glances to see if what is in there is appropriate to be in the recycling bin. And if they find, maybe there's an issue, they'll put a little oops tag, the cute little tag on a child's face on it. And the first time it would be an orange tag. The tag will have information about what needs to be corrected. And if you get a second time, when they find something, and they're going to do it four times--it's a quick glance inspection throughout the summer. Then the second time your recycling bin will not be emptied until you fix what needs to be fixed. David Fair: And that is a way to educate and for people to learn at the same time, and it's really hard to get mad at something that says "oops." I mean, a lot of thought went into selecting that word to put on the tag, right? Della DiPietro: Absolutely. This is it called Know It Before You Throw It campaign. A lot of research has gone into it. It's been very effective in other communities. And that sort of wanting a little bit of frivolity around it is, I think, really critical. I just might mention Grand Rapids did the same campaign last year and their contamination rates went down by 40 percent. David Fair: I don't think anybody could have anticipated 40 percent. Della DiPietro: That's a very big number, very big number. David Fair: So with that in mind, what are you hoping to get? 42, aren't you? Della DiPietro: I can't get as much as we can and we will. Part of the campaign is to measure the effectiveness. So, last week, we, actually the the recycling partnership staff, did a survey of how much contamination was in the recycling stream. And then there will be one post-campaign to see how effective the campaign was. But, yes, we want to be great about that. No kidding. David Fair: Have you projected out how much money could be saved on just, I mean, maintenance and related recycling costs by achieving something closer to full compliance? Della DiPietro: Well, there's an EPA model, and it estimates that if all of the thirty seven point four million tons--think of that--of all of those single family recyclable were put to productive use, it would reduce, you know, throughout the country greenhouse gas emissions by 96 million metric tons of carbon dioxide equivalent. And that would be the equivalent of saving one hundred and fifty four million barrels of oil. David Fair: A huge difference. We're talking with Washtenaw Regional Resource Recovery Authority Representative Della DiPietro on Eighty-Nine One WEMU's Issues of the Environment. She is the treasurer in Ann Arbor Township as well. Is there a percentage you are trying to hit through the course of the summer, or do you think you can actually get to everyone's recycling bin in this seven-community region? Della DiPietro: Everybody who has a contract for recycling pick-up for the single family use, we will hit every single one of those. We estimate about 37,000 households four times throughout the summer. They just did a similar campaign in Canton. So they're coming over to Washtenaw County for there. The recycling partnership is the ones that both hire the people and train them. David Fair: Now that you are in this, and you are dedicated to recycling, how closely do you look and think about your bin before you put it out on the curb? Della DiPietro: I'm a recycling Nazi, I call myself, and I'll tell you where it really comes into play is at work at the township. I'll go through all the recycling bins and tell people, "Wait a minute, this candy wrapper can't go in there or plastic." That's another thing. A lot of people think plastic bags are flimsy plastic. David Fair: That can really break down the machinery and be very expensive. Della DiPietro: You're right. You're right. It is. And sometimes, it's not that material can't be recycled, but it doesn't go well with the automatic machinery. And so that's the reason plastics--flimsy plastics--are just not something we can put in the recycling bin. David Fair: So now that people are going to get back to working in the office and there's going to be more people around and more waste generated and more bins for you to check, are you going to carry around your own oops stickers and put those on office doors? Della DiPietro: Well, I'm only a volunteer. I'm not trained staff, so I just do it verbally. But I'm very, very, very cautious about what I put in the bins. And I will tell you that being part of WWRMA, we call the authority commonly, being part of that has raised my own knowledge base. There are things that I thought we could put in the recyclable bin. Here's another example, David. Styrofoam, A lot of Styrofoam has an insignia on it that leads one to believe it can be recycled and it perhaps can be recycled in certain places, but not in your car. So just because there is a recycling insignia on an item doesn't mean it can be recycled in your curbside bin. David Fair: Now, once we've made the mistake, we get the little oops sticker, the best way to educate ourselves is to go where as a resource to find out all we can and cannot recycle in the area. Della DiPietro: The authority--WRRMA-- has a website, and it's w w w dot W R R M A dot org. There's lots of great materials on there, including, oh, just a one page rule poster of dos and don'ts for recycling. David Fair: Stick it on the refrigerator, and you're good to go. Della DiPietro: You're good to go. And there's also a special hotline during the campaign this summer and that's area code 734, of course, 222-3920. David Fair: And, Della, we will include all of that information on our website at WEMU dot org and get everyone linked up to where they need to go. Thank you so much for the time today. I appreciate it. Della DiPietro: What a pleasure to speak with you in this air. You know my passion about recycling. Thank you, David. David Fair: That is Della DePietro and she serves as Ann Arbor Township Treasurer and as the township's representative on the Seven Community Washtenaw Regional Resource Recovery Authority. For more information on the topic again, go to our website at WEMU dot org. Issues of the Environment is produced in partnership with the office of the Washtenaw County Water Resources Commissioner. And you hear it every Wednesday. I'm David Fair, and this is your community NPR Station, Eighty-Nine One WEMU FM and WEMU HD-One Ypsilanti. Washtenaw County Launches Recycling Bin Audits Last year, the Washtenaw Regional Resource Management Authority won a $200,000 grant to improve the quality of our recycling stream. The grant is funded by the Michigan Department of Environment, Great Lakes and Energy (EGLE) and the national nonprofit The Recycling Partnership. It builds on the success of Michigan’s national award-winning “Know It Before You Throw It” recycling education campaign that EGLE launched last year. The campaign kicked off on Monday, June 21st in WRRMA’s seven local government members (Ann Arbor Charter Township, Pittsfield Charter Township, Scio Township, Ypsilanti Charter Township, and the cities of Dexter, Saline and Ypsilanti). Trained staff will conduct four quick-glance field inspections of curb-side recycling carts at single family homes. “Oops” tags will provide direct feedback to residents about any contamination of materials in their carts. If something in the recycling cart does not belong there, an orange “oops” tag will be left behind with feedback on how to fix it. If it happens again, a red “oops” tag with feedback will be left, and the recycling cart will not be emptied. Fix the problem and remove the tag and your recycling will be picked up on the next scheduled date. EGLE research shows that the campaign is very useful for residents to learn how to properly recycle. For example, EGLE found that 50% of Michigan residents mistakenly believe they can recycle plastic bags in curbside recycling, and 76% are unaware that failing to rinse and empty items before putting them in the recycling bin poses a risk of contaminating everything in the bin. For more information about the program, what can be recycled, or to find alternate locations for hard-to-recycle materials, visit WRRMA’s website at www.wrrma.org or call the recycling hotline at (734) 222-3920. Michigan is investing in both local recycling systems and manufacturers who use recycled materials through the Renew Michigan Fund. The goal is to increase recycling in Michigan to 30% by 2025. EGLE-commissioned research shows that education is key for residents to learn how to properly recycle. For example: - 50% of Michigan residents mistakenly believe they’re allowed to recycle plastic bags in their curbside recycling, which is prohibited by most municipalities. - 76% of Michiganders are unaware that failing to rinse and dry items before putting them in the recycling bin poses a risk of contaminating everything in the bin. - Michigan recycles more than 90% of bottles and cans, but bottles and cans represent only 2% of all the waste Michiganders recycle every year. Almost 53% of the state’s municipal solid waste goes to landfills instead of recycling facilities. Non-commercial, fact based reporting is made possible by your financial support. Make your donation to WEMU today to keep your community NPR station thriving.
<urn:uuid:5b47585c-bfe5-4a0a-9cd6-d13f507abcd6>
CC-MAIN-2022-33
https://www.wemu.org/issues-of-the-environment/2021-06-30/issues-of-the-environment-audit-of-recycling-in-parts-of-washtenaw-county-now-underway
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00403.warc.gz
en
0.963052
3,630
2.90625
3
MongoDB initially gained traction as a backend for web applications, in which it was mostly concerned with so-called "CRUD" operations—creating, reading, updating, and deleting documents. Since then, MongoDB has broadened its capabilities remarkably, but it is still typically deployed as an operational database rather than as an analytic DB or data warehouse. Posted March 11, 2022 The design of a schema in MongoDB is just as important as it is in RDBMS. Indeed, schema design can be even more complicated in MongoDB. At least in SQL databases, we have the "first normal form" representing the starting point for a well-designed first cut data model. In MongoDB, we have more choices, but as a consequence, we have more potential pitfalls. Posted January 03, 2022 One of the big-ticket items at the recent MongoDB 5.0 launch was the introduction of specialized "time-series" collections. The key concept in a time-series database is that, for a lot of data, the timestamp of the data is a critical element, both in terms of operational cost and analytic value. Time-series collections represent another attempt by the MongoDB company to extend the use of MongoDB to a wider set of applications and scenarios. They are a welcome addition. Posted November 01, 2021 It's been 3 years since MongoDB 4.0 was announced at the 2018 MongoDB World conference—and that is a long time in the software industry. Posted September 16, 2021 MongoDB has had quite a wild ride over the past 10 years and has succeeded beyond expectations. However, what got them here won't get them where they want to be in the next 10 years. I can't wait to see the next phase of MongoDB's technology evolution. Posted July 15, 2021 Setting up a distributed MongoDB cluster by hand is a complex and error-prone process. However, MongoDB provides a Kubernetes operator, which allows such a deployment to be established within a Kubernetes cluster amazingly easily. The "operator" is a controller program that runs within the Kubernetes cluster and contains the MongoDB-specific logic for establishing MongoDB cluster topologies. One need only supply the operator with a configuration file, and the operator will do the rest—creating and configuring MongoDB nodes, setting up best-practice security, and handling the connectivity between nodes. Posted April 29, 2021 It's hard to overstate the impact WiredTiger technology has had on MongoDB. When MongoDB announced its storage engine API in 2014, the WiredTiger team immediately saw the opportunity and raced to provide the best solution. The rest, as they say, is history. Posted March 01, 2021 Posted January 07, 2021 Since the very inception of MongoDB, Eliot Horowitz, MongoDB's CTO and co-founder, has been a consistent and articulate owner of the MongoDB technical vision and the apparent creative force behind MongoDB's architecture and feature set. In appointing replacement CTO Mark Porter, MongoDB has chosen someone with a high degree of "geek cred" that will hopefully satisfy developers who want to hear from someone who can speak their language. However, he also brings experience from the enterprise database and cloud world that will undoubtedly be useful. Posted November 04, 2020 MongoDB has worked hard over the past few years to improve the security of its flagship MongoDB database server. It desperately needed to do this because MongoDB has been subjected to more high-profile attacks than any other database platform. Posted September 09, 2020 This year, an in-person MongoDB World conference in New York City was inconceivable. With NYC and the world still in various levels of COVID-19 lockdown, MongoDB World was held in the cloud as a virtual event—MongoDB.Live—in the first week of June. Holding the annual conference in the cloud is quite apt in many ways. Posted July 01, 2020 To predict how MongoDB may navigate COVID-19 and post COVID-19 environment would require an ability to predict how our industry as a whole will fare—which is a big ask. Nevertheless, let's give it a shot. Posted May 13, 2020 Posted March 05, 2020 When I was a young man—a long, long time ago now—I worked as an Oracle DBA (Oracle version 6, if you must know). I remember my astonishment at finding out that information in the database was stored in plain text within the database files. That meant if I could gain read access just to those files, I could read all the information in the database. It didn't matter what security controls I, as the DBA implemented at the database level—an attacker who could gain read access to the files on disk could read everything. Posted January 02, 2020 Despite the failed promises of the data lake, the concept retains some resonance in larger enterprises, and so MongoDB has chosen to leverage the term for one of its latest offerings. MongoDB's Atlas Data Lake bears only superficial similarity to Hadoop-powered data lakes. Nevertheless, it's a useful feature that stands to see significant uptake. Posted October 31, 2019 MongoDB 4.2 may seem like a grab bag of features, but all of the features represent useful additions to your MongoDB toolkit. Some features—the Atlas Data Lake, for instance—need significant enhancements to cover all conceivable use cases. Nevertheless, MongoDB 4.2 will be a useful upgrade and I'd expect it to be widely deployed. Posted September 03, 2019 MongoDB gained popularity with developers very early on, but serious database engineers were often skeptical about MongoDB architecture and implementation. One area that came under some criticism was cluster consistency. Posted July 18, 2019 If you have been wondering whether the tipping point for database-as-a-service (DBaaS) has arrived, it's instructive to look at the success of MongoDB Atlas. Posted May 01, 2019 MongoDB's recent and well-publicized new license—the Server Side Public License (SSPL)—was explicitly designed to prevent cloud vendors such as Amazon from deploying a MongoDB cloud service without paying MongoDB license fees. In early January, Amazon announced DocumentDB, a MongoDB-compatible cloud database service. Posted March 04, 2019 For some time now, the majority of open source investment has come from venture capital and mega-corporations. There is good reason to think that this level of patronage will not persist indefinitely. Should VC-funded open source companies fail to return on investment, then VC investment will dry up. The high-profile companies bolstering open source do so primarily for selfish motives and can't necessarily be relied on to do so forever. So it's essential that companies that develop and market open source products be able to generate some return on their investment. Posted January 02, 2019 It's been a while since MongoDB has felt threatened by another document database vendor. Historically, the closest contender for document database dominance was Couchbase, the offspring of the original CouchDB database, which arguably ignited the document database segment. Posted November 01, 2018 The MongoDB 4.0 release introduced multi-document transactions to the popular open source NoSQL DB. The lack of a transactional capability has been a key limiting factor in MongoDB uptake, so it's not surprising that the company, it's users and the technology press have been enthusiastic about this latest release. However, it's worth remembering that the transactional capabilities of MongoDB have been commonplace for many decades. Posted September 04, 2018 The introduction of transactions in MongoDB 4.0 represents possibly the most significant change in MongoDB's architecture since its original release. The lack of a transactional capability previously defined the capabilities of the database: Without transactions, MongoDB was blocked from consideration for a wide range of application scenarios. With the implementation of transactions, MongoDB can for the first time truly claim to be a general purpose DBMS. Posted July 02, 2018 It's understandable that those new to MongoDB - a so-called "schema free" database - might assume that they no longer need to be concerned with the art-science of data modeling. However, in reality data modeling is just as important in MongoDB as in other databases. Indeed, because of some of the modeling principles for MongoDB are less well understood, arguably, more attention needs to be given to the data modeling process. Posted March 07, 2018 MongoDB 3.6 was announced publically in November and should be in production by the time this article is posted. There are no shock features in this version, but it is an attractive release that should see rapid uptake. Posted January 02, 2018 MongoDB Files for IPO and Reveals Its Official Strategy for Success Posted November 01, 2017 MongoDB recently announced some interesting, though incremental, enhancements. These included improved "joins" in the aggregation framework, better document validation using JSON schema, and more reliable behavior in the event of network failures. These features attempt to close the gap between the functionality of MongoDB and traditional relational databases - joins, schemas, and commits. On top of these incremental updates, MongoDB announced a couple of features that intrude on functionality usually provided by application servers or desktop programs. Posted September 07, 2017 Posted July 05, 2017 MongoDB faced its worst-ever public relations challenge earlier this year when a spate of ransomware attacks plagued tens of thousands of Mongo instances. It's important to realize that we are not talking about some sort of obscure vulnerability here - these MongoDB databases were configured with NO passwords at all, and were easily found listening on the default port (27017) on publicly-accessible servers. Posted May 05, 2017 Welcome to the inaugural MongoDB Matters column, which will appear six times a year in Database Trends and Applications. Over the past 8 years, we've seen a truly once-in-a-generation explosion of new database technologies which have challenged—if not overthrown—the dominance of the venerable relational database. Of all these upstart databases, MongoDB seemed to us to most deserve dedicated coverage because of its strong momentum and adoption. Posted March 02, 2017
<urn:uuid:2a3fa874-7b9c-4919-bdce-7b503837ff54>
CC-MAIN-2022-33
https://www.dbta.com/Columns/MongoDB-Matters/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00404.warc.gz
en
0.956769
2,394
2.515625
3
Lion's tooth; Priest's crown; Swine's snout; Taraxacum officinale While many people think of the dandelion (Taraxacum officinale) as a pesky weed, it is chock full of vitamins A, B, C, and D, as well as minerals, such as iron, potassium, and zinc. Dandelion leaves are used to add flavor to salads, sandwiches, and teas. The roots are used in some coffee substitutes, and the flowers are used to make wines. In the past, dandelion roots and leaves were used to treat liver problems. Native Americans also boiled dandelion in water and took it to treat kidney disease, swelling, skin problems, heartburn, and upset stomach. In traditional Chinese medicine (TCM), dandelion has been used to treat stomach problems, appendicitis, and breast problems, such as inflammation or lack of milk flow. In Europe, dandelion was used in remedies for fever, boils, eye problems, diabetes, and diarrhea. So far, there have not been any quality scientific studies on dandelion. Today, the roots are mainly used to stimulate the appetite, and for liver and gallbladder problems. Dandelion leaves are used as a diuretic to help the body get rid of too much fluid. Hundreds of species of dandelion grow in the temperate regions of Europe, Asia, and North America. Dandelion is a hardy perennial that can grow to a height of nearly 12 inches. The plants have deeply-notched, toothy, spatula-like leaves that are shiny and hairless. Dandelion stems are capped by bright yellow flowers. The grooved leaves funnel rain to the root. Dandelion flowers open with the sun in the morning and close in the evening or during gloomy weather. The dark brown roots are fleshy and brittle and are filled with a white milky substance that is bitter and slightly smelly. Dandelion leaves act as a diuretic, increasing the amount of urine your body makes. The leaves are used to stimulate the appetite and help digestion. Dandelion flower has antioxidant properties. Dandelion may also help improve the immune system. Herbalists use dandelion root to detoxify the liver and gallbladder, and dandelion leaves to help kidney function. Medicinal Uses and Indications Most scientific studies of dandelion have been in animals, not people. Traditionally, dandelion has been used as a diuretic, to increase the amount of urine and eliminate fluid in your body. It has been used for many conditions where a diuretic might help, such as liver problems and high blood pressure. However, there is no good research on using dandelion as a diuretic in people. Fresh or dried dandelion herb is also used as a mild appetite stimulant, and to improve upset stomach. The root of the dandelion plant may act as a mild laxative and has been used to improve digestion. Preliminary research suggests that dandelion may help improve liver and gallbladder function. But this study was not well designed. Preliminary animal studies suggest that dandelion may help normalize blood sugar levels and lower total cholesterol and triglycerides while raising HDL (good) cholesterol in diabetic mice. But not all the animal studies have found a positive effect on blood sugar. Researchers need to see if dandelion will work in people. A few animal studies also suggest that dandelion might help fight inflammation. You can find dandelion herbs and roots fresh or dried in a variety of forms, including tinctures, liquid extract, teas, tablets, and capsules. Dandelion can be found alone or combined with other dietary supplements. How to Take it Ask your doctor before giving dandelion supplements to a child so the doctor can determine the dose. Ask your doctor to help determine the right dose for you. The use of herbs is a time-honored approach to strengthening the body and treating disease. However, herbs can trigger side effects and interact with other herbs, supplements, or medications. For these reasons, you should take herbs under the supervision of a health care provider. Dandelion is generally considered safe. Some people may have an allergic reaction from touching dandelion. Others may get mouth sores. If you are allergic to ragweed, chrysanthemums, marigold, chamomile, yarrow, daisies, or iodine, you should avoid dandelion. In some people, dandelion can cause increased stomach acid and heartburn. It may also irritate the skin. People with kidney problems, gallbladder problems, or gallstones should consult their doctors before eating dandelion. Dandelion leaf may act as a diuretic, which can make drugs leave your body faster. It also interacts with a number of medications that are broken down by the liver. If you are taking prescription medications, ask your doctor before taking dandelion leaf. Medications that may interact with dandelion include: Antacids: Dandelion may increase the amount of stomach acid, so antacids may not work as well. Blood-thinning medications (anticoagulants and antiplatelets): It is possible that dandelion may increase the risk of bleeding, especially if you already take blood thinners such as aspirin, warfarin (Coumadin), or clopidogrel (Plavix). Diuretics (water pills): Dandelion may act as a diuretic, causing your body to produce more urine to get rid of excess fluid. If you also take prescription diuretics, or other herbs that act as diuretics, you could be at risk of electrolyte imbalances. Lithium: Lithium is used to treat bipolar disorder. Animal studies suggest that dandelion may worsen the side effects of lithium. Ciproflaxin (Cipro): One species of dandelion, Taraxacum mongolicum, also called Chinese dandelion, may lower the amount of the antibiotic ciproflaxin that your body absorbs. Researchers do not know whether the common dandelion would do the same thing. Medications for diabetes: Theoretically, dandelion may lower blood sugar levels. If you take medications for diabetes, taking dandelion may increase the risk of low blood sugar. Medications broken down by the liver: Dandelion can interact with a number of medications. To be safe, ask your doctor before taking dandelion if you take any medication. Cho SY,Park JY, Park EM, et al. Alternation of hepatic antioxidant enzyme activities and lipid profile in streptozotocin-induced diabetic rats by supplementation of dandelion water extract. Clin Chim Acta. 2002;317(1-2):109-117. Clare BA, Conroy RS, Spelman K. The diuretic effect in human subjects of an extract of Taraxacum officinale folium over a single day. J Altern Complement Med. 2009 Aug;15(8):929-34. Davies MG, Kersey PJ. Contact allergy to yarrow and dandelion. Contact Dermatitis. 1986;14 (ISS 4):256-7. Hu C, Kitts DD. Antioxidant, prooxidant, and cytotoxic activities of solvent-fractionated dandelion (Taraxacum officinale) flower extracts in vitro. J Agric Food Chem. 2003;51(1):301-10. Hudec J, et al. Antioxidant capacity changes and phenolic profile of Echinacea purpea, nettle (Urtica dioica L.), and dandelion (Taraxacum officinale) after application of polyamine and phenolic biosynthesis regulators. J Agric Food Chem. 2007;55(14):5689-96. Jeon HJ, Kang HJ, Jung HJ, Kang YS, Lim CJ, Kim YM, Park EH. Anti-inflammatory activity of Taraxacum officinale. J Ethnopharmacol. 2008 Jan 4;115(1):82-8. Kim HM, Shin HY, Lim KH, el al., Taraxacum officinale inhibits tumor necrosis factor-alpha production from rat astrocytes. Immunopharmacol Immunotoxicol. 2000;22(3):519-30. Kisiel W, Barszcz B. Further sesquiterpenoids and phenolics from Taraxacum officinale. Fitoterapia. 2000;71(3):269-73. LaValle JB, Krinsky DL, Hawkins EB, et al. Natural Therapeutics Pocket Guide. Hudson, OH: LexiComp; 2000:420-421. Mascolo N, et al. Biological screening of Italian medicinal plants for anti-inflammatory activity. Phytotherapy Res. 1987:28-29. Miller L. Herbal Medicinals: Selected Clinical Considerations Focusing on Known or Potential Drug-Herb Interactions. Arch Intern Med. 1998;158:2200-2211. Petlevski R, Hadzija M, Slijepcevic M, Juretic D. Effect of 'antidiabetis' herbal preparation on serum glucose and fructosamine in NOD mice. J Ethnopharmacol. 2001;75(2-3):181-184. Qian L, Zhou Y, Teng Z, Du CL, Tian C. Preparation and antibacterial activity of oligosaccharides derived from dandelion. Int J Biol Macromol. 2014;64:392-4. Schutz K, Carle R, Schieber A. Taraxacum--a review on its phytochemical and pharmacological profile. J Ethnopharmacol. 2006;107(3):313-23. Sigstedt SC, Hooten CJ, Callewaert MC, Jenkins AR, et al. Evaluation of aqueous extracts of Taraxacum officinale on growth and invasion of breast and prostate cancer cells. Int J Oncol. 2008 May;32(5):1085-90. Swanston-Flatt SK, Day C, Flatt PR, Gould BJ, Bailey CJ. Glycaemic effects of traditional European plant treatments for diabetes. Studies in normal and streptozotocin diabetic mice. Diabetes Res. 1989;10(2):69-73. Sweeney B, Vora M, Ulbricht C, Basch E. Evidence-based systematic review of dandelion (Taraxacum officinale) by Natural Standard Research Collaboration. J Herb Pharmacother. 2005;5(1):79-93. Trojanova I, Rada V, Kokoska L, Vlkova E. The bifidogenic effect of Taraxacum officinale root. Fitoterapia. 2004;75(7-8):760-3. Zhi X, Honda K, Ozaki K, Misugi T, Sumi T, Ishiko O. Dandelion T-1 extract up-regulates reproductive hormone receptor expression in mice. Int J Mol Med. 2007;20(3):287-92. Review Date: 6/22/2015 Reviewed By: Steven D. Ehrlich, NMD, Solutions Acupuncture, a private practice specializing in complementary and alternative medicine, Phoenix, AZ. Review provided by VeriMed Healthcare Network.
<urn:uuid:649b68ad-13ca-43c0-b500-dc006f39e9cf>
CC-MAIN-2022-33
https://ssl.adam.com/content.aspx?productid=107&pid=33&gid=000236&site=makatimed.adam.com&login=MAKA1603
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00603.warc.gz
en
0.85839
2,500
2.78125
3
And here is his picture of his hand: Magnetic Creation and Fractals The Beginning: Magnetic Creation There is a basic, underlying force that allows for creation. This force originates from Creator and is very much like magnetism. It has two aspects to it. Part of the force is attraction, like when a magnet pulls toward another magnet. The other aspect repels, or pushes away. The magnet itself is neutral. Creator, like a magnet, creates both attracting and repelling forces, but is itself neutral. With each split, the individual pieces lowered in frequency. Each fragment set off to gain experience and to create, and the Universe was formed, with all its diversity. This creation could not have happened without the repelling force being dominant. It is through this magnetic force that Creator communicated with its creation. Ahrazu calls it the Outbreath of Creator. Creator’s desire to separate became the desire of the fragments. This desire led the parts to seek separation, lower vibration and increase density. This magnetic force is the deepest communication from Creator. Attributes of the Repelling Force Veils of Illusion Attributes of the Attracting Force During the Outbreath the energies continued to divide. Each fragment would retain awareness of itself and it’s fragments, but the fragmented parts are aware of only their individual part and their fragments. With an infinite amount of life to begin with, we could divide and divide and never run out of life. Though the creation of the Universe is not only two dimensional, I don’t know a way to illustrate that on this piece of “paper”. Figure 1 is a two-dimensional illustration representing a multi-dimensional experience. With each division we spread out from the center. The lower frequency parts are shown as being farther from and smaller than the center. Since Creator is comprised of all that is, then no part is actually outside of Creator. The fragments are fractals of the greater whole. From Wikipedia “Fractals are typically self-similar patterns, where self-similar means they are the same from near as from far. Fractals may be exactly the same at every scale.” Below is a very simple fractal based on the simple Y shape and forming a tree. Fractals exist in all levels of creation, from the micro particle like the atom to the macro solar system and both larger and smaller. Fractals were discovered by a researcher at IBM named Benoit Mandelbrot in the 1970’s. It wasn’t until the creation of computers and their processing power that the complex math could be expressed in images. Wikipedia has a great video of a complex and beautiful fractal created from the Mandelbrot Set, which is a “mathematical set of points whose boundary is a distinctive and easily recognizable two-dimensional fractal shape”. http://en.wikipedia.org/wiki/File:Mandelbrot_sequence_new.gif Creation of Individual Souls Life continued to divide down to the level of an individual Being that has been call the Higher Self or Oversoul. (I call it the Greater Self because it’s not higher or better than you, it just more of you.) There are many places in the universe that are inhabited by beings like this. They can’t die and so know themselves to be immortal. The Greater Self Beings then fragmented themselves into individual souls. The Oversoul shares in the lives of all its fragments. The fragment is a part of the Oversoul but at the same time it is something separate. It is like your relationship with your thumb. It is part of you, you feel what it feels, but you are aware of yourself as more than just your thumb. On Earth the Oversoul or Greater Self is fragmented into individual souls, each with its own lens through which it will experience life. The souls have a masculine/feminine ration. Most are in the range of about 70/30 either way. Souls will have more incarnations in bodies that match their majority energy (male or female) and will be more comfortable in those bodies than in bodies of the minority energy. But that’s not the end of the dividing. Within each lifetime there is a body, mind/ego, several energetic “bodies” as well as the soul itself. On a psychological level you have inner parts, such as your inner child, male, female, critic etc. Also, traumatic experiences can cause one to psychically split. Part of ones’ life can be hidden away, pushed outside of the person’s energy field, possibly forgotten. And our bodies have their own consciousness’ as do each organ and gland, down to each cell and smaller. The amazing thing about fractal creation is that it is infinite; infinitely large and infinitely small. Cycles of Creation Creation is cyclical; Outbreath, Inbreath. Within the great cycle are smaller cycles of expansion/contraction, separation/unification, lower vibration/higher vibration. These cycles are fractal. There are large cycles and small cycles. Figure 3 shows two levels of the cycles of creation in a 2-D representation. There are actually an infinite number of levels that are multi-dimensional. But, I don’t know how to draw that. A cycle that many are aware of is the 26,000-year turning of the ages. Thirteen thousand years ago Earth was at the end of an Inbreath or higher vibration cycle. Then the Outbreath began as the repelling force dominated, warlike societies overran the peaceful ones. This began a period of darkness that lasted up until fairly recently. The longer the cycle, the longer the transition from Outbreath to Inbreath (and visa versa) takes. The Outbreath cycle that began about thirteen thousand years ago started turning around toward the Inbreath about 2000 years ago with the joint energies of Jeshua and Miriam (Christ and Mary Magdalene). There have been smaller cycles within the 26,000-year cycle, such as those times called the Dark Ages and the Renaissance. Currently our planet is at a stage of very rapid change as we transition into a thirteen thousand year cycle of Inbreath energy and more and more people are waking up. During the Medieval Renaissance we experienced an awakening to the value of beauty and art. This Renaissance is about becoming aware of and opening to the power of the awaked human heart and “magical” manifestation. At the farthest point of separation, the end of the Outbreath of Source, Each of these pieces is unaware of the rest of itself. At this point the body was considered to be the self, all of the self. From Ahrazu: It is important to understand that during the Outbreath, the energies sought to lower their vibration and forget their true nature. This was the will of Creator and so it was desirable and appropriate at the time. It was perceived as being right or good. At the present time Creator’s will is to unite so we currently seek to raise our vibration and remember more of our multi-dimensional selves. When you are tempted to look down on someone who is of a lower frequency than you are, remember that at another time it would be the other way around. During the Outbreath there was a spiritual competition to achieve density, forgetfulness and to experience the drama and trauma on this planet. No level of experience is better than another. It is all part of the game. This expansion continued for eons of time, with minor cycles happening within the major cycles. At a point, the scattered fragments were so far apart that the force of separation diminished and the two forces came to a balance. The Inbreath Begins From Ahrazu: And so the Inbreath began. The will of Creator was to re-unite. The parts began to become aware of each other. First you discovered that you were not just a body, you had a soul and this was the beginning of religion. This was when the concept of God began as a powerful life force outside of the self. More recently we discovered that we had a mind, separate from the body. Psychology was developed to reunite the mental/emotional parts of the self that have split during this life. Psychological understanding developed to include the concept of the inner sub-personalities such the inner child work that has been so popular in recent times. As the parts reunite they don’t blend together and loose their individuality. They are, instead, incorporated into your concept of your self. Imagine that you meet someone who you knew long ago, perhaps at a family reunion or school reunion. They say to you, “Remember when we did …?” For a second you don’t remember, then suddenly is comes back to you, a part of you that you had forgotten has now been remembered. You sense of self has expanded to hold a bit more of you. During past life regression work, people begin to integrate an even larger part of themselves. Each life is remembered as a separate experience, yet they are all part of YOU. It is like remembering the different grades in school. Each year was a separate experience, with a different teacher, different classmates and lessons, but they are all part of your life. In exponentially increasing numbers humans are waking up, breaking free from the limiting belief systems and reconnecting to their Greater Selves. At first the Greater Self is perceived as being separate from the self. It is joyous and inspiring experience to connect to one’s Greater Self. Since this part is aware of being immortal and so can’t be threatened, you experience a profound sense of peace when connecting. It feels like everything is truly OK, all is as it should be. There’s nothing that you need to do to fix anything or change yourself in order to be loved. You are inherently loved and valued just as you are, simply because you are a part of Creation. This is the aspect of our selves doesn’t judge or blame because it knows that the concept of good and bad, right and wrong is an illusion. It knows that we have all played the roles of victim and perpetrator in many lifetimes and many variations. It knows that during the Outbreath cycles it felt good and right to do things that lowered the frequencies and created separation. What matters is that we obtain experience, sometimes quite intense experience. Our remembering who we are in a larger, multi-dimensional way is the beginning of freedom from the rules of the Earth Game reality. What’s happening here and now is an exciting and unprecedented transformation. The whole Universe is watching us as we remember who we truly are while still keeping our physical manifestation. Our success is assured! Breathe deeply and feel it. It’s happening! The transition can be challenging. We know the possibilities of the New Reality but the Old Reality is still overlapping it. Our minds and bodies are transforming also. This process creates takes us through many small Inbreath/Outbreath Cycles. I use the metaphor of water to represent the programming, limiting beliefs, suppressed emotions etc. that we all carry. This water is held in a vessel, your physical and non-physical system. When you make a shift in consciousness, everything that doesn’t match the frequency of the new awareness will automatically come up and out for clearing. This could be emotions, thoughts, and even physical symptoms. I call this phenomenon Splash Out. The Inbreath experiences are beautiful gems. When they drop into your vessel the Outbreath energies splash out. One way that a gem can be tossed into your vessel is when something really loving and supporting is given to you. Imagine someone telling you that (s)he loves you very much. That’s a nice big gem getting tossed into your vessel. What splashes out is all the energy of feeling “un-lovable”. The key is to realize it’s just Splash Out, feel it and let it go. If you judge it, you will try to suppress it and you’ll just have to do it later. Say, “Yeah, here it comes, up for clearing and out it goes.” Avoid trying to understand it or figure it out. You haven’t done anything wrong. Creation is cyclical, inherent in the process of transformation are various large and small cycles. It’s just experience. Be like the magnet, able to contain the energies of both poles, yet being neither. You are neutral.
<urn:uuid:3ac1268e-4be4-4140-ba4a-58c5e2113afc>
CC-MAIN-2022-33
https://www.chromographicsinstitute.com/tag/fractals/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00603.warc.gz
en
0.962223
2,700
2.59375
3
Andaman and Nicobar is home to many indigenous tribes and tribes that settled here from other parts of the world. Thus Andaman and Nicobar has an amalgamation of different cultures. And dances of these tribes represent the distinctness in cultures. Nicobari dance is one the most important and oldest traditional dances of Andaman & Nicobar. It is practiced by the Nicobari tribe, who live in the Car Nicobar Island. One can witness the Nicobari dance during the Ossuary Feast, which is more commonly known as the Pig Festival. Music & Dance In Andhra there are nearly thirty-three kinds of foresters, hill men and tribals. All have, their own dances. These dances can be broadly classified into three heads (i) Religious dances (ii) Social dances (iii) Dance as a past time. Kuchipudi, one of the classical dance forms of the South had its origin in Andhra Pradesh. The dances, performed by the tribes of Arunachal Pradesh, have been broadly divided into four groups. The first group is the ritual dances which may again be divided into five sub-groups. The first sub-groups includes those dances which form part of the various rituals performed to secure prosperity, good health and happiness of the dancer, his family, village or the whole community. The second sub-group comprises of those dances performed in ceremonies related to agriculture and domestication of animals to secure a good harvest and increase of domestic animals respectively. Dance culture of Assam also represent another facet of Assam rich culture. There are two well known dance form in Assam, namely the Bihu Dance and the Sattriya Dance. Bihu dance is mostly performed during the Bihu festival and Sattriya Dance is a classical form of dance often termed together with the most popular classical dance of India like Kathak, Bharatnatyam etc. Over thousands of years various traditional dance forms have evolved in Bihar. The folk dance tradition in Bihar can be divided into three groups. First, the dance performed during poetry performance. The second stream is those of the tribal people who are closer to mother earth and their dances are heavily influenced by indigenous development. The third stream relates to the other regions of south Bihar. Most of the folk dances are religious in nature, in which, gods and goddesses are invoked through dance, performed to the rhythm of folk songs and music. Folk music Chandigarh has a rich tradition of folk dances, borrowed from the parent states of Punjab and Haryana. The people of the city are very lively and celebrate all the occasions to the fullest, with the folk dances accompanying each of them almost always. Bhangra, Giddha, Jhumar, Luddi, Julli, Dhamal, Sammi, Jaago, Teeyan, Dankara, Kikili and Gatka are some of the popular folk dances of the city. Dance and Music are very much part of the daily life of Damanite. Here is a true fusion of cultures - tribal, urban, European and Indian. This ornate amalgam is reflected in the traditional dances of Daman. Various Portuguese dances are well preserved and still widely presented. Tribal dances with caustic social comments are much in vogue. Incredible India Tours with Indian Travel agent. India is a land of music and dance, and Delhi is no exception. The music engenders both a spirit of identity and provides entertainment as relief from the daily grind of wrenching a living from a modern way of fast-paced lifestyle. There is a unavoidable medley in Delhi's music which comes from a tradition that is old and tranquil, and from a culture that has imbibed the best from all over the country. People from all over the nation come here to perform, and Delhi echoes the pulse with an immense concentration all through the night. Besides being a heaven of natural beauty and serenity, Goa is also a land of artistic people who are credited for lending the region with a rich cultural heritage, amalgamating the east and west perfectly. Besides the different forms of traditional dance and music, each region of the state also has its own unique form. The urban areas have also adopted western and other music forms from around the world. Indian Travel Agent offers Visit India and explore India. Dance forms of Goa Gujarat has been successful in preserving its rich tradition of song, dance and drama. The state is known for its popular folk dances like Ras, Garba, Garbi, Rasaka, Tippani, Padhar-Nritya,and Dangi-Nritya. Tour Incredible India with Indian Travel agent. Folk drama in Gujarat is known as Bhavai. Most of the art traditions trace back their origin to the ancient period of Lord Krishna. The contribution of Gujarat to the Indian traditional music is no less encouraging. Tour Incredible India with Indian Travel agent.There are several ragas named after various regions of the state – Gujaqri Todi, Bilaval (from Veraval), Sorathi, (from Sorath), Khambavati (from Khambhat, Cambay), Ahiri and Lati. These ragas are valuable gifts to the Indian classical music. The tradition of music and dance goes back to the times when India was the land of kings and queens, princes and princesses. The people have simple tastes and preferences and have their own distinctive lifestyle. Music in Haryana Every dance is accompanied with music or singing which, in India, can sound like music when sung like it is supposed to be sung. The tradition of music in Haryana goes back to the Vedic times, and it is the only state in India to have towns and villages named after different ragas. It is said that dance is one of the best mediums through which you can express yourself. So, what better way to know about the culture of the state than through exploring its various dance forms. The people of Maharashtra celebrate a large number of fairs and festivals and dancing, as a part of the celebration, is a feature that is common in almost all of them. Apart from that, there are a number of special occasions, such as weddings, where dance makes a part of the festivity. In this article, we have provided information on the most popular folk dances of the state. Dance is the most important part of Maharashtrian culture. Various folk dances are performed during festivals and special occasions. The important dances of the state are described below. Its own art-forms and cultural expressions and ramifications distinctly showcase Manipur to the World. Its famous classical dance remains unique in all Manipuri dance forms whether it,s folk, classical or modern and has a different style and gesture of movement. Love of art and beauty is inherent in the people and it is difficult to find a Manipuri girl who cannot sing or dance. Manipuris are artistic and creative by nature. This has found expression in their handloom and handicraft products, which are world-famous for their designs, ingenuity, colorfulness and usefulness. Meghalaya is the home of music and dances. The dances are associated with their festivals or seasons and hence are to be enjoyed through out the year. The dances are social, religious, agricultural, funeral and recreational. The land echoes the sound of perfect tempo, beautiful songs and traditional instruments. The dances of Meghalaya are generally held under the open sky. The state has also a variety of folk dances depicting the way of life of the people. The most widely seen and popular among them are the Cheraw and Khuallum Dance. The people dance and enjoy the festivals in much enthusiasm, which is the indication of their rich tradition and vibrant people. The male performer usually wears shirt that are sleeveless and wrap-around-traditional clothes. The female wears a longer wrap-around and shirt with sleeves. But depending upon the dance they may or may not wear a headgear. The term "Naga" is a general one, which covers many tribes of that region. Thus, Nagaland is the home of various hill-tribes and the dances performed by these different tribal communities are altogether, most popularly known as Naga dances. All these dances have been deeply rooted in their environment, occupations, religious beliefs and practices and the social patterns that prevail here. 'Odissi', the traditional dance of Orissa, has been accepted as an important classical form of Indian dance for its exquisite beauty and charm. Among the folk dances of Orissa, 'chhau' has earned world-wide reputation. The people of Rajasthan live life to the hilt. After hard work in the harsh desert sun and the rocky terrain whenever they take time off they let themselves go in gay abandon. There is dancing, singing, drama, devotional music and puppet shows and other community festivities which transform the hardworking Rajasthani into a fun-loving and carefree individual. Each region has its own folk entertainment, the dance styles differ as do the songs. Interestingly enough, even the musical instruments are different. The cultural heritage of Sikkim is expressed in its traditional folk dances. Sikkim is domiciled by many ethnic castes and tribes; each of them has its own interesting folk dances. The major inhabitants of Sikkim are divided into three communities, the Lepchas, the Bhutias and the Nepalese respectively. The folk dances and music have become an inseparable part of Sikkim Culture. A majority of the dances are associated with the startling beauty of the natural environs. Some of them depict the harvest season and other dances are performed for opulence. The traditional dances of Sikkim go together with the tunes of many musical instruments. Dance in South-India, is anchored to age-old tradition. This vast sub-continent has perpetuated to varied forms of dancing, each shaped by the influences of a particular period and environment. These pristine forms have been preserved through the centuries, to become a part of our present culture, a living heritage which is both our pride and delight. Nurtured in temples, princely courts or villages, dance has moved into the auditorium of today, bringing pleasure to many more people, in far-flung regions. Uttar Pradesh has a very vibrant culture. Various rulers who have ruled Utter Pradesh in the course of history have consolidated the culture of this state. The same effect can be clearly seen on the songs and dances of this state after all these too are an integral part of any culture. The dances in Uttar Pradesh can be broadly classified in to two categories namely Classical and Folk. The first group comprises Kathak where as the later has Charkula, Karma and Dadra in its list. Kathak is one of the most famous classical dances of India. The dance has its origin in the courts of Emperors and Nawabs but it has traversed a long path to come to the masses. UP has produced some of the greatest exponents of this art form. West Bengal is renowned for its rich art and culture as well as the intellectual aura of its people. The richness of Bengali culture also reflects in the music of the state. Music, more than being an art, is a passion for Bengalis. More than a millennium old, Bengali music has become diverse with so many varieties within. The variety is such that once you get familiar with it, you will not need to look beyond it. From classical to rock, folk to devotional, you will get almost every possible music form in Bangla Sangeet. Then, there is the display of a wide range of emotions - be it love, sadness, anxiety, motivation, devotion or spirituality. Let us know more about the music of West Bengal.
<urn:uuid:31e60d4b-758c-42ef-a9dc-bb88685c915f>
CC-MAIN-2022-33
https://www.indiaunveiled.in/musicdance
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00004.warc.gz
en
0.964543
2,431
3.25
3
A Tour of the Troubles In 2016, a life-long dream came true when I visited Northern Ireland for the first time. I had always wanted to see the sprawling green countryside, the charming cities, and the beautiful ocean views. I also wanted to soak up the history and culture of Belfast. My travel buddy booked us a cab tour so we could learn it all in the comfort of a nice car. The next morning, Patrick, our friendly Belfast Tours guide, picked us up at our hotel. As the tour began, I quickly realized this wouldn’t be a typical showing of historic buildings and local hot spots. Patrick instead steered us through a series of violent events in Northern Ireland known as “The Troubles.” The Troubles? Just when I think I can call myself a history buff, I find this whole other battle going on. And believe me, it was a battle. Since that tour of Belfast, I have struggled to get a grip on the Troubles. I think anyone who knows about them can agree it’s a complicated subject. But here are the basics, or at least the basics that I can wrap my head around. The roots to the modern-day Troubles are best traced to 1609. Scottish and English settlers (deemed “planters”) put down their stakes in lands of the Irish Plantation of Ulster. As a result, “Ulster” became the first Protestant pocket on a largely Catholic island. Unfortunately, the Protestants and Catholics mixed about as well as oil and water. Tension simmered fast, and it boiled into all-out religious wars that spanned the 1600s. One of these was the “Williamite War,” a struggle between the forces of Catholic King James II and his Protestant counterpart, William of Orange, to determine the rightful king of the English empire. William came up with huge victories as well as the throne. He also spelled the end of any good tidings between Catholics and Protestants, firmly establishing British (and therefore Protestant) rule in Ireland. As the years wore on, the split became more than just religious. As a general rule, Protestant peoples in Ireland supported loyalty to the British Empire (therefore called Loyalists). Catholics (or Nationalists) wanted independence from the British Isles. It created more fertile ground for conflict, and plenty broke out over the next few centuries. Uprisings and rebellions (one of the fiercest in 1798) by the Nationalists and their allies kept many a Loyalist on their toes. They even formed an entire order (the Orange Order) dedicated to preserving the legacy of William of Orange and keeping Ireland British and Protestant. Things really exploded in 1916 during the infamous Easter Rebellion. Started by an offshoot of the Irish Volunteers (a Nationalist force), the bid for independence was one of the bloodiest. England got alarmed enough by it to suck forces from the all-consuming Western Front and send them to Ireland, where they put down the rebellion after a week of bitter fighting. They captured and interned over 1800 people and executed fifteen of the rebellion’s ringleaders. It was the most violent demonstration since the rebellion of 1798, and it turned world attention to the issue. After World War I, the Government of Ireland Act officially split Ireland into two different sections – Northern Ireland, which would remain under the jurisdiction of the UK but have its own government, and the Irish Free State for Nationalists in the South. Most thought it a win, but not the Nationalist (and mostly Catholic) population of Northern Ireland, especially around Belfast. Catholics in this area found themselves increasingly isolated from government, voting, and decent housing. Tensions mounted once again and Nationalist tempers flared. hey even formed their own volunteer force known as the IRA (Irish Republican Army). While both the Northern Ireland and British governments tried to mediate the quarreling Belfast populations, corruption on both sides only led to more violence. Government policy deteriorated into arrests and internments of political agitators, and in 1969, all civility reached an end. That summer, a series of violent riots broke out in Belfast. They shed the first blood of the Troubles and caused untold damage to the city. It took intervention from military troops to restore order, and even that didn’t last long. Crude barricades sprung up between Nationalist and Loyalist areas. Meant to be temporary, they actually expanded until they turned into an official “Peace Wall” that split up the entire city. It also hosted paramilitary forces on both sides. Scattered shootings and bombings became prevalent around Belfast. The dawn of the 1970s brought some of the darkest days to Northern Ireland. While the British and Northern Ireland governments haggled over the best way to handle the spiraling situation, UVF (Ulster Volunteer Force) and IRA forces devolved into all-out war. Buildings got bombed, houses were looted, and innocent bystanders all too often wound up caught in the crossfire. In 1972, “Bloody Sunday” saw the biggest increase in violence since the Easter uprisings of 1916. During a Nationalist rally to protest Internment, thirteen civilians lost their lives and a dozen more were injured when the protest erupted with gunfire. It spurred a severe uptick in violence all over the city. 1972 became the most lethal year of The Troubles and saw over five hundred deaths. By the late 1970s, both sides were getting exhausted but there was still no end in sight. The Northern Ireland government continually switched hands, and no one could agree on the best way to halt the violence. Peace groups seeking an end to paramilitary activity sprang up. Although one achieved a Nobel Peace Prize in 1976, even their efforts were hampered in the end. Violence continued in the wake of a Loyalist policy to treat IRA political prisoners the same as convicted criminals. IRA prisoners started a hunger strike in protest in 1980, and ten died of starvation. The first was Bobby Sands, and his funeral was attended by over 100,000 Nationalist sympathizers (today, his mural resides on the side of a building in Belfast). The 1990s finally saw some cease fires and negotiations between the paramilitary forces. While it took multiple attempts and most of the decade, both sides eventually reached a shaky settlement in 1998. Known as the Good Friday Agreement, it restored self-government to Northern Ireland with concessions to include Irish Catholics in the predominantly Protestant political bodies. It also saw the withdrawal of many military forces on both sides, and the closing down of barricades and watch towers. A shaky truce at best, since scattered violence continued into the new millennium. Although the worst of the Troubles are over, signs of the turbulence still linger. The most prominent is the giant peace wall still separating Belfast into different blocks. It’s taller than most buildings, covered with graffiti, and lined with barbed wire in some spots. It reminded me of something you’d see in a prison, and looking at it made me feel shackled. Apparently, I wasn’t the only one, because tension still sizzles in the areas closest to the wall. Our tour guide warned us that even today, it’s not safe to be caught on the wrong side of the wall after sundown. But nobody is giving up hope, evidenced by the countless signatures spanning one end of the wall to the other. It is part of a long-held tradition for people to sign the wall in hopes that it will someday come down. There are also the murals. Known all over the world, these vibrant yet haunting paintings cover buildings all over the city on both sides of the wall. One pays respect to the riots of 1969. Some commemorate members of the UVF or the IRA, depending on which side of the wall you’re on. Patrick brought our attention to the story of an Ulster Defense member who got into multiple firefights on the wrong side of the wall before taking his own life. His victims were commemorated with a haunting memorial on the Nationalist side of the wall. On the other side, he had his own mural and is considered a hero. A striking reminder of how history tells us two different stories – one for each side of the wall. I’ve often been told I can see both sides of any argument. Which is nice I suppose, but it makes it extremely difficult for me to choose a side. I felt both sides of Belfast pleading with me to pick theirs. “Hear the voices of our dead,” the murals whispered. “Take up your cause with us.” True to form, I couldn’t pick one. Because I don’t know who’s right or wrong, I just know that like the painters of those murals, I hate to see people suffer. I think we all do deep down inside. To this day, the Troubles remain out of reach for me. I just can’t grasp the whole picture. Hell, I bet a lot of people in Ireland can’t even grasp the whole picture. I think we can all agree on one thing though. We don’t want people to die. That’s why I joined the millions of others and left my signature on the Belfast Peace Wall. It’s just one small drop in the vastness, but if you get enough drops you can make an ocean. Maybe if we all unite together we can make a difference. The walls can come down, and we can discover the beauty that lies in all of us – illustrated by those murals on the buildings in Belfast. Belfast Tours – Guided by Patrick A Short History of Ireland – S. McMahon Making Sense of the Troubles – D. McKittrick & D. McVea The Troubles – T.P. Coogan NOTE: This is just one humble tourist’s perspective on a very complex and sensitive issue. Please feel free to add your own thoughts and perspectives below, but let’s all be nice and keep them clean! M.B. Henry thanks you! All photos by M.B. Henry. To see more photos from my trip to Ireland, click here
<urn:uuid:fe5d9be1-8c87-4c41-8ede-e320d29f3b34>
CC-MAIN-2022-33
https://mb-henry.com/2018/04/19/a-tour-of-the-troubles/?shared=email&msg=fail
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00205.warc.gz
en
0.964616
2,118
2.53125
3
“Child and youth care programs – particularly the residential ones – are constantly encouraged to adopt a developmental approach. What does 'developmental' mean in our context?” This is the second of three parts. (See Part I here) In Part I we considered the importance of being paced by the timetable of human development – and the urgency which this timetable imposes. Today we want to look at the developmental nature of our interventions with young people in difficulty. You will find that most processes which are effective and appropriate have a life cycle of their own: they are dynamic, they are interactive, and so they grow and change. Processes which are not legitimate are static, they do not interact and learn, they stay the same. In some programs we find a set of rules which seem to be set in concrete. “A youth caught smoking will be grounded on Saturdays." Easy. Nobody has to think beyond something so clear. There is no room for argument. We don’t have to trouble ourselves with the health issues, the addictive issues – or even any of the other difficulties the young person concerned may be having. This is an example of a non-developmental intervention. It is not going anywhere. It is not in any sort of dialogue with the child or the staff member. It’s not open-ended, doesn’t learn from experience. It doesn’t grow or change. Such a simplistic smoking rule cannot be called an intervention. The very word “intervention” means “to come into the middle of things, to get involved." And the point of this month’s article is to see how that involvement, in simple terms, has a beginning, a middle and an end. A central aspect of development is time. Things develop over a period. Development takes time. It’s helpful for child and youth care workers to think of development (unfolding, differentiating, fulfilling) in terms of growing plants. We have all seen those graphic animations of plants growing from seed to maturity. We know that a developing plant has to move through each growth stage incrementally; it cannot skip a stage to save time; it has to “do" each stage. It might struggle at certain stages, lack water for a period, endure wind, be undernourished – and its ultimate condition may well be affected – but there are no short cuts. A sapling simply cannot function as a mature tree. And an underfed sapling in a harsh climate cannot too easily function as a sapling – it may well have to give up on some developmental work in order to just hang in there, to survive. So the child and youth care worker will know that a youth who is having trouble with inner and outer challenges (like the underfed sapling in a harsh climate) cannot be simply “commanded" to behave as though nothing was wrong. For one thing, in relation to our knowledge of human development we must be realistic and appropriate in our expectations (as we discussed last month). Secondly, our intervention (which is to be a partnership of action between the youth and ourselves) must aim towards a future point where development can reasonably be resumed. And thirdly, our progress to this point will necessarily turn out to be a progressive path for both us and the youth – seldom do we see instant improvement. It will take planning, time and hard work – seasoned with some risk, some disappointment, and probably some modified goals. Don’t avoid the hard work Because we work in a tough environment with hurt, angry and scared kids, we naturally tend towards quick fixes. Getting involved (intervening) with these clients and their families is daunting and draining work and it would be natural for us to want to find an easier way than engaging and confronting. How often do we hear ourselves deciding to “have a talk with her" or to “impose a consequence" or “lay down clear expectations" as if one single encounter will magically make up for years of difficulty? Yes, we may threaten or cajole (using more therapeutic-sounding words, of course) but that just quietens the noise for an hour or an afternoon. Tomorrow the neediness will still be there, crying out louder, the anger will be sharper, the anxiety more obscured. Better to start today. A good critical team helps us to recognise our attempts at quick fixes, and offers us support in defining our task more objectively and accurately – and in getting started. There are two stages to an intervention. The first stage is largely transparent to the child in that it consists of our contribution to his or her environment and general development. It is essentially the work of normalising their experience to the extent that there is no unnecessary or extraneous deprivation or provocation, and that ordinary age-appropriate skills and strengths are encouraged. The second stage is to concentrate on the specific referral problems and/or those which may be dominant to the extent that they are impairing development or function and thus creating difficulties for the child and others – and then taking specific action to work at these. 1: Examine the appropriate levels of basic nurturing and emotional “hygiene" that we are maintaining for this youth. Easier said than done, and something to take much care over. When we look back over a crisis we often find that there was a build-up of frustrations and irritations which we didn’t at first notice but which might have been significant for the youth concerned: an expected letter didn’t arrive, someone called him a name, a poor math grade was coming down the tracks, he was told he couldn’t go into the TV room until 5 pm, another youth “borrowed" his shirt ... There is not a lot of visible “action" in these events and we might easily conclude that “a gratuitous aggressive act" resulted from the borrowed shirt! Our job is to familiarise ourselves with the raw material of a youth’s life if we are to be of any help in working towards important changes and growth. Think of this stage as “admitting the youth for observation" prior to an operation. We don’t want to make poor intervention decisions on the basis of our own lack of thoroughness or our ignorance. This stage is about ensuring that ordinary needs are met and not frustrated, and that needless restrictions, conflict and contagion are avoided. The safety and protection offered by the environment are enough to engender trust and lower defensiveness “to the point that the youth can let some of his “stuff" go, freeing energy for the needed “remedial” work. But while reducing a youngster’s disabling anxiety we are careful not to promote over-dependency or to weaken the vigilance or adeptness he needs to function within his roles in his own environment. It will be immediately clear that this task is not merely routine but an intensive and individualised task. This child's needs are not the same as that child's needs. Many will challenge this with cries of “inconsistency” or arousing the jealousy of other kids. My experience has always been that if we are careful to match the ordinary needs of our clients, they don’t much mind the personalisation of others' programs. (And if ever I am wheeled into a hospital with heart failure I shall be grateful to get into Cardiology and not Obstetrics!) 2: Attend to capacity: While we “normalise" the life space of the young person, we also look at his or her own attainment of “normal" identity, skills and resources. Nothing special, but does this sixteen-year-old have a reasonably average sixteen-year-old self-image, information, comprehension, personal capacity, access to resources ... ? The chances are high that the “referring problem” we have been asked to help with is grounded in a poor sense of well-being and personal value, a limited knowledge of rights, opportunities and resources in community and society, and a barely rudimentary repertoire of responses to daily problems and challenges. While all this seems obvious, the point is that we should remember the image of the underfed sapling in a harsh climate. If the youngster is going to be a participant in the intervention (remember the principle that we are to do things with youth, not to them or for them) then an essential part of our intervention is constantly to be moving him or her forward in terms of strength and skill. When you examine the troubling behaviour of a client, you will often find that this is characterised by a hostile, defensive, conservative and stubborn position which seems to be saying, “This is my way, this is where I’m sticking, these are all the cards I have in this game and I’m not giving any one of them up, I'll manage with what I’ve got." And, in turn, a static (non-developmental) view of intervention is for us to list the youth’s characteristics and to believe that this is all we have to work with! If we believe this, then we have already given up on the child. It’s game, set and match. We find ourselves believing the report that arrived with this kid – the one which said he’s no good, he doesn’t fit in here any more, we don’t want him. That is not child and youth care work. Our starting point is to believe that people can grow and change, and then to uncover and present to the child new possibilities – both within and around her. We should be at least nibbling at the edges of the young person's interest by the end of the first day, then starting to disprove her belief that things never change ... and soon moving to where every day can be different. (Remember the view of Heraclitus that no person can ever cross a river twice: because the second time it is not the same river, and the second time it is not the same person!) It is not hard to find ways of adding to this youth’s life, enhancing knowledge and insight, building strengths. If we want to restore equilibrium in his or her life, adding to one side of the balance is as effective as reducing the load in the other side. We must see ourselves being busy with this sort of detail, and never satisfied with what it says on the label which inevitably comes with the new client. And the test of a good program lies not in the behaviour of the children towards the staff, but in the behaviour of the staff towards the children. Take a lesson from the nurseryman to whom we bring a sick plant. He knows plants. So he says: “The pot is a bit small, so let’s re-pot. This plant likes acidic soil, so we will add that. Let’s take the risk of exposing it to a little more wind for a while – it doesn’t like it but it will clear some of this fungus. It’s not getting enough sun. We’ll clip off some of these dead pieces, give it some fertiliser ... and not too much water ... and we’ll get it going quite nicely again." "Getting it going quite nicely again" is about the best slogan I can think of for child and youth care. Translating the youth’s “stuckness" into a sense of renewed movement is a great gift we have to offer. We may approach this with great energy, yet to be realistic we also remember Redl’s warning that the most difficult child to work with is the improving child. How hard it is for him to let go of his old ways before he has confidence in new ways. Our intervention is not only about building new conditions and presenting opportunities; it is also about making it safe to try new things out, to fail without the failure being such a big deal, and then trying again. Where are we going with this? There is no doubt that child and youth care workers are often presented with serious and challenging behaviour. The safety of the client and those around him is then a dominant factor in planning an intervention. Often we do have to impose restrictions and limitations on the movement and behaviour of a young person. There may have been years during which a youth built up a pattern of assaultive, anti-social, risky behaviour which we have to stop. So we close a door, clamp down, restrict, turn a key. The static (non developmental) intervenor may well say at this point, “Well, we solved that problem. That fixed it. That fixed him!" But we can never leave it there. All we are doing here is stepping into the old power and conflict roles which have failed in the past. We forget that our ultimate aim for our clients is maturity and autonomy, not obedience and entropy. Stopping something is never the end; it can only be a beginning – else why did they send this kid to us and not directly to jail? Whenever we undertake an intervention which is conservative rather than developmental, we owe it to the child to regard this strictly and urgently as a temporary or “holding" step. When we restrict or limit, or punish or deprive, we must then ask, “Where are we going with this? Where can this lead? – Where do we start? Where do we want to be tomorrow? How far could we get by next week? ... so that we are not still here next week. I don’t much want to get on to Stage 2 today. These articles are not so much about intervention as they are about development. It is enough for us to know that there are stages, for that implies our need to move onwards. The interesting thing is that if we “do" Stage 1 well enough, there is very often no need for Stage 2. If we spend time and effort in getting involved (intervening) with youngsters, thoroughly enough to know the circumstances of their lives, to understand the meaning of their destructive feelings and behaviour, to affirm them as people, to complement their capacity to move forward, and then to “walk the walk" with them as they resist and then respond to new possibilities, Stage 2 often takes care of itself. More, a good Stage 1 will change us as well – definitely loosening up our conception of what is “wrong" in the first place, and certainly freeing us up to consider a whole bunch of alternative “treatment goals". Be prepared to be surprised at where the kids can get to. That youngsters can function is more important than how they function. And when they can once again function, their development can resume its course.
<urn:uuid:97daa5a2-cc30-4245-ab6b-b26773b610bf>
CC-MAIN-2022-33
https://cyc-net.org/cyc-online/cycol-0401-development.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00403.warc.gz
en
0.966681
3,061
3.09375
3
« السابقةمتابعة » found peculiar names, and that for the same reason; they being such as men have often an occasion to mark particularly, and as it were set before others in their discourses with them. And I doubt not, but if we had reason to mention particular horses as often as we have to mention particular men, we should have proper names for the one, as familiar as for the other; and Bucephalus would be a word as much in use as Alexander. And therefore we see that, amongst jockeys, horses have their proper names to be known and distinguished by, as commonly as their servants; because, amongst them, there is often occasion to mention this or that particular horse, when he is out of sight. How general § 6. The next thing to be considered words are is, how general words come to be made. made. For since all things that exist are only particulars, how come we by general terms, or where find we those general natures they are supposed to stand for? Words become general, by being made the signs of general ideas; and ideas become general, by separating from them the circumstances of time, and place, and any other ideas, that may determine them to this or that particular existence. By this way of abstraction they are made capable of representing more individuals than one; each of which having in it a conformity to that abstract idea, is (as we call it) of that sort. $ 7. But to deduce this a little more distinctly, it will not perhaps be amiss to trace our notions and names from their beginning, and observe by what degrees we proceed, and by what steps we enlarge our ideas from our first infancy. There is nothing more evident, than that the ideas of the persons children converse with (to instance in them alone) are like the persons themselves, only particular. The ideas of the nurse and the mother are well framed in their minds; and, like pictures of them there, represent only those individuals. The names they first gave to them are confined to these individuals; and the names of nurse and mamma the child uses, determine themselves to those persons. Afterwards, when time and a larger acquaintance have made them observe, that there are a great many other things in the world that in some common agreements of shape, and several other qualities, resemble their father and mother, and those persons they have been used to, they frame an idea, which they find those many particulars do partake in; and to that they give, with others, the name man for example. And thus they come to have a general name, and a general idea. Wherein they make nothing new, but only leave out of the complex idea they had of Peter and James, Mary and Jane, that which is peculiar to each, and retain only what is common to them all. $ 8. By the same way that they come by the general name and idea of man, they easily advance to more general names and notions. For observing that several things that differ from their idea of man, and cannot therefore be comprehended under that name, have yet certain qualities wherein they agree with man, by retaining only those qualities, and uniting them into one idea, they have again another and more general idea; to which having given a name, they make a term of a more comprehensive extension: which new idea is made, not by any new addition, but only, as before, by leaving out the shape, and some other properties signified by the name man, and retaining only a body, with life, sense, and spontaneous motion, comprehended under the name animal. $ 9. That this is the way whereby men General nafirst formed general ideas, and general tures are nonames to them, I think, is so evident, that thing but there needs no other proof of it, but the considering of a man's self, or others, and the ordinary proceedings of their minds in knowledge: and he that thinks general natures or notions are any thing else but such abstract and partial ideas of more complex ones, taken at first from particular existences, will, I fear, be at a loss where to find them. For let any one reflect, and then tell me, wherein does his idea of man differ from that of Peter and Paul, or his idea of horse from that of Bucephalus, but in the leaving out something that is peculiar to each individual, and retaining so much of those particular complex ideas of several particular existences as they are found to agree in ? in? Of the complex ideas signified by the names man and horse, leaving out but those particulars wherein they differ, and retaining only those wherein they agree, and of those making a new distinct complex idea, and giving the name animal to it; one has a more general term, that comprehends with man several other creatures. Leave out of the idea of animal, sense and spontaneous motion; and the remaining complex idea, made up of the remaining simple ones of body, life, and nourishment, becomes a more general one, under the more comprehensive term vivens. And not to dwell longer upon this particular, so evident in itself, by the same way the mind proceeds to body, substance, and at last to being, thing, and such universal terms, which stand for any of our ideas whatsoever. To conclude, this whole mystery of genera and species, which make such a noise in the schools, and are with justice so little regarded out of them, is nothing else but abstract ideas, more or less comprehensive, with names annexed to them. In all which this is constant and unvariable, that every more general term stands for such an idea, and is but a part of any of those contained under it. Why the § 10. This may show us the reason genus why, in the defining of words, which is dinarily nothing but declaring their significations, made use of we make use of the genus, or next general in definitions. word that comprehends it. Which is not out of necessity, but only to save the labour of enumerating the several simple ideas, which the next general word or genus stands for; or, perhaps, sometimes the shame of not being able to do it. But though defining by genus and differentia (I crave leave to use these terms of art, though originally Latin, since they most properly suit those notions they are applied to) I say, though defining by the genus be the shortest way, yet I think it may be doubted whether it be the best. This I am sure, it is not the only, and so not absolutely necessary. For definition being nothing but making another understand by words what idea the term defined stands for, a definition is best made by enumerating those simple ideas that are combined in the signification of the term defined; and if instead of such an enumeration men have accustomed themselves to use the next general term, it has not been out of necessity, or for greater clearness, but for quickness and despatch sake. For, I think, that to one who desired to know what idea the word man stood for, if it should be said, that man was a solid extended substance, having life, sense, spontaneous motion, and the faculty of reasoning; I doubt not but the meaning of the term man would be as well understood, and the idea it stands for be at least as clearly made known, as when it is defined to be a rational animal: which by the several definitions of animal, vivens, and corpus, resolves itself into those enumerated ideas. I have, in explaining the term man, followed here the ordinary definition of the schools : which though, perhaps, not the most exact, yet serves well enough to my present purpose. And one may, in this instance, see what gave occasion to the rule, that a definition must consist of genus and differentia : and it suffices to show us the little necessity there is of such a rule, or advantage in the strict observing of it. For definitions, as has been said, being only the explaining of one word by several others, so that the meaning or idea it stands for may be certainly known; languages are not always so made according to the rules of logic, that every term can have its signification exactly and clearly expressed by two others. Experience sufficiently satisfies us to the contrary; or else those who have made this rule have done ill, that they have given us so few definitions conformable to it. But of definitions more in the next chapter. General and $ 11. To return to general words, it is universal are plain by what has been said, that general creatures of and universal belong not to the real exthe under istence of things, but are the inventions standing and creatures of the understanding, made by it for its own use, and concern only signs, whether words or ideas. Words are general, as has been said, when used for signs of general ideas, and so are applicable indifferently to many particular things: and ideas are general, when they are set up as the representatives of many particular things; but universality belongs not to things themselves, which are all of them particular in their existence; even those words and ideas which in their signification are general. When therefore we quit particulars, the generals that rest are only creatures of our own making; their general nature being nothing but the capacity they are put into by the understanding, of signifying or representing many particulars. For the signification they have is nothing but a relation, that by the mind of man is added to them (1). (1) Against this the bishop of Worcester objects, and our author* answers as followeth: “However,” saith the bishop, “ the abstracted ideas are the work of the mind, yet they are not mere creatures of the mind; as appears by an instance produced of the essence of the sun being in one single individual : in which case it is granted, That the idea may be so abstracted, that more suns might agree in il, and it is as much a sort, as if there were as many suns as there are stars. So that here we have a real essence subsisting in one individual, but capable of being multiplied into more, and the same essence remaining. But in this one sun there is a real essence, and not a mere nominal or abstracted essence: but suppose there were more suns, would not each of them have the real essence of the sun? For what is it makes the second sun, but having the same real essence with the first? If it were but a nominal essence, then the second would have nothing but the name.” This, as I understand it, replies Mr. Locke, is to prove that the abstract general essence of any sort of things, or things of the * In his first letter.
<urn:uuid:4f03224d-36e1-4ec0-bfeb-5e2df62d0ecd>
CC-MAIN-2022-33
https://books.google.com.bh/books?id=CugOAAAAIAAJ&pg=PA168&dq=editions:ISBN134093311X&lr=&hl=ar&output=html_text
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00605.warc.gz
en
0.975366
2,256
3.015625
3
Botanical Name : Hydrastis canadensis Species: H. canadensis Habitat :Goldenseal is native to North America, and can be found growing wild from Ontario to Arkansas, across the southeastern U.S. to Georgia and cultivated in Oregon and Washington. The main growing region used to be Ohio valley, before it became the area fell victim to deforestation and development. It grows in the rich soil of shady woods and moist places at the edge of wooded lands. Goldenseal prefers open hardwood forests, with rich humic soils, and a slight slope around 5% to facilitate drainage. Plants are found to be most vigorous in stands with 60-65% shade, and pH values between 5.5 and 6.5. Goldenseal has a thick, yellow rootstock which sends up an erect hairy stem about 1 foot in height which branches near the top, one branch bearing a large leaf and another a smaller leaf and a flower.The stem is purplish and hairy above ground and yellow below ground where it connects to the yellow rhizome. The plant bears two palmate, hairy leaves with 5–7 double-toothed lobes and single, small, inconspicuous flowers with greenish white stamens in the late spring. The rhizome is thick, sarcous, oblong, irregular, and knotted, having a yellowish-brown, thin bark, and a bright-yellow interior; rootlets numerous, scattered, coriaceous fibres.This low perennial herb grows from 6 to 10 inches high, its leaves and fruit much resembling those of the raspberry. The flowering stem, which is pushed up early in the spring, is from 6 to 12 inches high, erect, cylindrical, hairy, with downward-pointing hairs, especially above, surrounded at the base with a few short, brown scales. It bears two prominently-veined and wrinkled, dark green, hairy leaves, placed high up, the lower one stalked, the upper stalkless, roundish in outline, but palmately cut into 5 to 7 lobes, the margins irregularly and finely toothed. The flower, which is produced in April, is solitary, terminal, erect, and small, with three small greenish-white sepals, falling away immediately after expansion, no petals and numerous stamens.It bears a single berry like a large raspberry with 10–30 seeds. The fruit ripens in July and has the superficial appearance of a raspberry, with small, fleshy, red berries, tipped with the persistent styles and containing 1 or 2 black, shiny seeds. However, it is not edible. Goldenseal can be grown both from seed and from the rhizome. It requires a partially shaded situation (60 – 70%), in a well draining, rich humus soil. Rootstocks can be divided into small pieces and set at least 8” apart. Planting should be undertaken in the autumn. The plants should be allowed to grow for 2 – 3 years before harvesting, though by the 4th year the roots are said to become too fibrous for medicinal use. Transplanting may be undertaken at any time. According to an American grower 32 healthy plants set per square yard will produce 2 lb of dry root after three years of growth. The fresh rhizome is juicy and loses much of its weight in drying. When fresh, it has a well-marked, narcotic odour, which is lost in a great measure by age, when it acquires a peculiar sweetish smell, somewhat resembling liquorice root. It has a very bitter, feebly opiate taste, more especially when freshly dried. The rhizome is irregular and tortuous, much knotted, with a yellowish-brown, thin bark and bright yellow interior, 1/2 inch to 1 1/2 inch long, and from 1/8 to 1/4 inch thick. The upper surface bears short ascending branches, which are usually terminated by cup-like scars, left by the aerial stems of previous years. From the lower surface and sides, numerous thin, wiry, brittle roots are given off, many of them breaking off, leaving small protuberances on the root. The colour of the rhizome, though yellow in the fresh root, becomes a dark, yellowish brown by age; that of the rootlets and the interior of the root are yellow and that of the powder still more so. When dry, the rhizome is hard and breaks with a clean, resinous fracture, the smooth, fractured surface is of a brownish-yellow, or greenish-yellow colour, and exhibits a ring of bright yellow, somewhat distant narrow wood bundles surrounding large pith. Goldenseal contains the isoquinoline alkaloids: hydrastine, berberine, berberastine, hydrastinine, tetrahydroberberastine, canadine, and canalidine. A related compound, 8-oxotetrahydrothalifendine was identified in one study. One study analyzed the hydrastine and berberine contents of twenty commercial goldenseal and goldenseal-containing products and found they contained variously 0%-2.93% hydrastine and 0.82%-5.86% berberine. Berberine and hydrastine act as quaternary bases and are poorly soluble in water but freely soluble in alcohol. The herb seems to have synergistic antibacterial activity over berberine in vitro, possibly due to efflux pump inhibitory activity. Multiple bacteria and fungi, along with selected protozoa and chlamydia are susceptible to berberine in vitro. Berberine alone has weak antibiotic activity in vitro since many microorganisms actively export it from the cell (although a whole herb is likely to work on the immune system as well as on attacking the microbes and hence have a stronger clinical effect than the antibiotic activity alone would suggest). Interestingly, there is some evidence for other berberine-containing species synthesizing an efflux pump inhibitor that tends to prevent antibiotic resistance, a case of solid scientific evidence that the herb is superior to the isolated active principle. However, it is not yet known whether goldenseal contains a drug resistance efflux pump inhibitor, although many antimicrobial herbs do. •The American aborigines valued the root highly as a tonic, tomachic and application for sore eyes and general ulceration. •It is a valuable remedy in the disordered conditions of the digestion and has a special action on the mucous membrane, making it of value as a local remedyin various forms of catarrh. •The action is tonic, laxative, alterative and detergent. The powder has proved useful as a snuff for nasal catarrh. •It is employed in dyspepsia, gastric catarrh, and loss of appetite and liver troubles. •Goldenseal was used by the American Indians as a treatment for irritations and inflammation of the mucous membranes of the respiratory, digestive, and urinary tracts. •Its traditional uses include treatment of peptic ulcers, gastritis, dyspepsia and colitis. •It is said to stimulate appetite and generally have a toning effect on the whole body. •Its astringent properties have also been employed in cases of excessive menstruation and internal bleeding. It has a stimulating effect on the uterine muscles for which it is sometimes used as an aid in childbirth. •The decoction is also said to be effective as a douche to treat trichomonas and thrush. As a gargle it can be employed in cases of gum infections and sore throats. •It was commonly used topically for skin and eye infections. •It is used for infectious diarrhea, upper respiratory tract infections, and vaginal infections. •It is used as aremedy for laxative, tonic, alterative, detergent, opthalmicum, antiperiodic, aperient, diuretic, antiseptic, deobstruent. •Excels for open sores, inflammations, eczema, ringworm, erysipelas, skin diseases, and nausea during pregnancy. •In combination with skullcap and red pepper it will relieve and strengthen the heart. •The Iroquois made a decoction of roots for treatment of whooping cough and diarrhea, liver trouble, fever, sour stomach and gas and as an emetic for biliousness. They also prepared a compound infusion with other roots for use as drops in the treatment of earache and as a wash for sore eyes. Known Hazards: Goldenseal is considered safe at recommended dosages.But it may cause side effects allergic reaction, headache and many others. Not safe for pregnant women and children. •Mixed with bear’s grease it is said to have been used as an insect repellent. •Native people also valued the yellow roots as a stain and dye Folklore and Myths: It is believed that Goldenseal root is a very rare and expensive botanical Curio widely thought to be a powerful Guardian and Healer and to provide Strength and Protection to those who possess it. Goldenseal root is used by many people for the purpose of Warding off Evil and bringing Good Luck in Health Matters. Some folks says that they place Goldenseal root in a white flannel bag along with Angelica Root and other Healing Herbs, anoint this conjure hand with 7-11 Holy Type Oil or Blessing Oil and sew it into the mattress of any loved one who suffers chronic pain, serious disease, or acute illness, for Protection and Healing. Disclaimer : The information presented herein is intended for educational purposes only. Individual results may vary, and before using any supplement, it is always advisable to consult with your own health care provider.
<urn:uuid:1160a91f-12ba-4df6-9d05-144da538da9f>
CC-MAIN-2022-33
https://findmeacure.com/tag/goldenseal/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572898.29/warc/CC-MAIN-20220817092402-20220817122402-00605.warc.gz
en
0.936737
2,171
2.640625
3
One resource I was pleased to come across was Gamestar Mechanic. This is a purely web-based resource that teaches elements of game design. It’s aimed at 4-9th graders (I make that 9-14 year olds) and offers them a chance to move from playing games through fixing games to making and sharing their own. Of the many resources I’ve used with key stage 3, it’s the one I see consistently used voluntarily by the students outside of formal lessons. As we’re partway through our year 7 computing unit, which so far has looked at Scratch, I thought I’d take a closer look at GSM and see exactly what offers in terms of learning and how it fits in with the new computer-orientated curriculum. One feature that makes GSM easy to use in class is that the registration system does not require an email address. It does, however, have a system to recover passwords that depends on students being able to remember a username and sequence of favourite colour, subject and animal, which isn’t ideal (it can change from attempt to attempt, let alone lesson to lesson!) so this time round I intend to make students make a note of their user name and passwords somewhere secure. They can use any nickname as their user name as long as it’s not already taken, but often it’s easier to tell them to use their school log-on names and passwords rather than spend hours trying to think of something suitable. Once registered, the student is presented with a quest to work through. There is one quest available free, while others are available for those with premium membership ($19.95 for premium membership, and it may well be that students are interested enough to get their parents to pay for it, but free membership is plenty for school use). There are two other areas of the site that will also interest users: in the workshop they can create their own games, while in Game Alley they can publish their games and try out those made by others, but more of those later. Episode 1 screen There are teaching materials provided by the website to serve as an introduction to the site, in the form of five lessons. Lesson 1 works through episodes 1 and 2 of the quest and then provides an opportunity to reflect on learning so far. The resources provided for lesson 1 are a set of cards that can be printed and used for matching – one set provides images of various concepts, while the other set provides names and explanations of those concepts, which are grouped into mechanics, space and components. For example, under the space group you will find bounded and unbounded space, under components you will find health meter and avatar, and under mechanics you will find collecting mechanic and exploring mechanic. This will give the students a whole collection of key terms and concepts to build the rest of the unit on, but I wonder just how many they will be able to take in and remember. The suggestion is that in small groups they work to pair up concepts and images and then everyone goes through the answers. I’m considering giving them worksheets with the concepts on and the cards with the names on, so they can fill in their worksheets and keep them for reference. Lesson 2 introduces the core design elements, which are defined as space, components, rules, mechanics and goals. Episodes 3 and 4 of the quest provide a chance to investigate ways of changing each of these and showing the effect on the games. The resource provided for this lesson is a graphic to serve as a reminder of the core design elements. Lesson 3 looks at balance, investigating how the different core design elements balance a game to achieve the right level of difficulty. This focuses on episode 5 and then gives students the first opportunity to build their own game. This ability is there right from the beginning, by the way, via the workshop, but each challenge the player completes in the episodes unlocks another feature they may use, either a different sprite, different background or something similar, so the further through the quest they get the more they have to use in their own games. Games creation screen Lesson 4 gets the students to design their own game, and offers challenge cards for different themed games should you wish to use them. Lesson 5 encourages students to play-test each other’s games and give feedback via the sheet provided. This guides them into answering questions like “What were the core mechanics of the game?” “how well was this game balanced?” and “how could this game be improved?”. So far so good, but what got me really thinking was when I started looking at the new computing curriculum and how Gamestar Mechanic might be considered to fit into it, because that was when I struggled to find anything in there that would link easily to games design. While games design is only a small part of what computing offers, at the age of these students it’s their most immediate attraction and links in most closely with what they already enjoy doing, so whether it fits into the computing curriculum or not, I feel it has a lot to offer. One aspect of the computing curriculum is to use two or more programming languages. Does this provide a programming language? Well no not really, but it does provide objects that have attributes. By changing those attributes the student interacts with elements of the game and causes changes. While this does not count as a programming language, I would certainly argue that it is an important step towards moving into object oriented programming in systems such as Greenfoot, by providing a way to play with parameters and settings in a very controlled and accessible way. Object oriented programming gets no mention in the computing curriculum, which is a shame. I’m starting to get the impression that it was written without the needs of children in mind; I can’t imagine too many children being excited at learning sorting algorithms, but give them a chance to learn games programming and they’ll be much more engaged (I know that object oriented programming and games design are not the same, but the latter provides a very good way into the former). What they learn via games design can then be applied more widely as they develop their skills. Game Alley – published games What about the creative element of the computing curriculum? Undertake creative projects that involve selecting, using and combining multiple applications … to achieve challenging goals… well it’s selecting, using and combining multiple elements and experimenting to see how they work together in order to achieve a playable game, does that count? It’s not really multiple applications, although it is multiple elements, which can include sound. What students can’t do with this, as far as I can see, is design their own elements. I’ll be taking a look at Gamemaker very soon, which is a natural successor to Gamestar Mechanic and does offer this facility. Create, reuse, revise and repurpose digital information and content with attention to design, intellectual property and audience – well it’s doing some of that, not intellectual property maybe, but attention to design and audience, and combining the elements in a suitable way, particularly if you use the challenge cards to set a specific purpose or setting for the game. Maybe Key Stage 2 would fit it better? After all, if the students haven’t been through computing at key stage 2 there’ll be some need for overlap for a year or few. Here we have solve problems by decomposing them into smaller parts, use sequence, selection and repetition in programs; work with variables and various forms of input and output, use logical reasoning… I would argue that it covers all those, although maybe not in the way those who created the curriculum were expecting them to be covered. What it does do is provide a common language and set of concepts for games design that can then be developed further in many directions, so that students can move on to programming their own objects while already aware of concepts like level design, object interaction, responding to events and parameters. Key stage 4? Here we fare much better. It should provide a chance to develop their capability, creativity and knowledge in computer science, digital media and information technology and to develop and apply their analytic, problem-solving, design and computational thinking skills, all of which I would say it does. Considering the restrictions on it, however, I would suggest that GSM would need to be used as a springboard to Gamemaker, Greenfoot or Scratch, all of which are much more versatile and provide more opportunity to incorporate a wide variety of imported assets. It does, however, have the advantage of allowing students to focus on the game design elements and how they interact without worrying too much about how they create them, so they are not trying to learn everything at the same time. So strangely, this seems to fit in far better with the older key stage than with the younger ones (although, of course, the key stage 4 curriculum was deliberately left very vague in order to fit in with the many ICT and computing qualification courses already available). Each games designer earns badges as they learn Looking at the old ICT levels, Gamestar Mechanic seems to fit in much better: strand 1 covers planning, developing and evaluating systems, using feedback to develop work, strand 2 covers creating sequences of instructions and changing variables and explaining the impact, and strand 3 covers presenting information in a range of forms for specific purposes and audiences. In summary, while GSM doesn’t completely seem to fit the new computing curriculum, it does seem to have a lot to offer as an introduction to game making, and as part of a larger unit or with explicit teaching on various aspects such as changing parameters and looking at audience and purpose, it does have a place in either late key stage 2 or early key stage 3 learning. More importantly, I would argue, it engages students and keeps them coming back for more, and shows them the satisfaction of creating their own games for others to play and comment on. Any frustration they eventually feel at the limitations of games created through this method can then be directed into Scratch etc, where they have much more control but need to create the behaviours themselves. Game review screen And that reminds me of another aspect that appears to be missing from the new computing curriculum: there is no mention of collaboration in there, of working together as a team to achieve a common goal and of supporting each other in their learning. This was present in the old system (use ICT to communicate and collaborate) and would appear to be a vital digital literacy skill, considering the extent to which young people use ICT to share ideas in the real world. In Gamestar Mechanic they have a chance to do this by writing reviews for games. Still, until the new computing curriculum is confirmed and we have more concrete information about what it entails and how to deliver it I’m happy that my students will indeed experience the games design fun of gamestar mechanic.
<urn:uuid:79e2912f-a7f0-4856-bb55-1edf56bde867>
CC-MAIN-2022-33
https://www.coinlea.co.uk/tag/computing/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00005.warc.gz
en
0.968977
2,262
3.046875
3
Bleomycin is a treatment for a number of types of cancer. You might have it as part of a clinical trial for some types of cancer. How it works Bleomycin is a type of antibiotic that is poisonous to cells. It binds to the cancer cells’ DNA so that the cells can't divide or grow. It also causes free radicals to be made inside the body. Free radicals are overactive oxygen atoms that damage DNA. How you have bleomycin You might have bleomycin in the following ways: Into a muscle You might have it as an injection into a muscle (intramuscular injection). Into your bloodstream Some people have bleomycin as a drip into their bloodstream (intravenously). Each treatment takes between 20 and 30 minutes, or longer. You can have it through a thin, short tube (a cannula) put into a vein in your arm each time you have your treatment. You can also have it through a long line either a central line, a PICC line or a portacath. These are long, plastic tubes that give the drugs into a large vein in your chest. The tube stays in place throughout the course of treatment. Into a tumour Some people may have bleomycin as an injection directly into a tumour. Into a cavity Sometimes, bleomycin is injected through a tube into a body cavity in the chest or abdomen. This is called an intracavity injection. You usually only have this once or twice. When you have it Bleomycin is often given as a course of several cycles of treatment. The treatment plan depends on which type of cancer you have. It is often used alongside other chemotherapy drugs as part of combination chemotherapy treatments. You have blood tests before and during your treatment. They check your levels of blood cells and other substances in the blood. They also check how well your liver and kidneys are working. How often and how severe the side effects are can vary from person to person. They also depend on what other treatments you're having. For example, your side effects could be worse if you're also having other drugs or radiotherapy. When to contact your team Your doctor, nurse or pharmacist will go through the possible side effects. They will monitor you closely during treatment and check how you are at your appointments. Contact your advice line as soon as possible if: - you have severe side effects - your side effects aren’t getting any better - your side effects are getting worse Early treatment can help manage side effects better. We haven't listed all the side effects here. Remember it is very unlikely that you will have all of these side effects, but you might have some of them at the same time. Common side effects Each of these effects happens in more than 1 in 10 people (more than 10%). You might have one or more of them. They include: Pain and swelling at the injection site Tell your nurse straight away if you have any pain, redness, swelling or leaking around your drip site. You might develop a cough or breathing problems. This could be due to infection, such as pneumonia or inflammation of the lungs (pneumonitis). Let your doctor or nurse know straight away if you suddenly become breathless or develop a cough. Poor blood flow in your fingers and toes These areas might look pale and feel cold. Tell your medical team if this is happening. This is an autoimmune condition. Collagen is laid down in the skin and body organs, thickening them and stopping them working well. It can affect joints, tendons, and internal organs. Mouth sores and ulcers can be painful. It helps to keep your mouth and teeth clean, drink plenty of fluids, avoid acidic foods such as oranges, lemons and grapefruits, and chew gum to keep the mouth moist. Tell your doctor or nurse if you have ulcers. Loss of appetite You might lose your appetite for various reasons when you are having cancer treatment. Sickness, taste changes or tiredness can put you off food and drinks. Increased risk of getting a chest infection Increased risk of getting an infection is due to a drop in white blood cells. Symptoms include a change in temperature, aching muscles, headaches, feeling cold and shivery and generally unwell. You might have other symptoms depending on where the infection is. Infections can sometimes be life threatening. You should contact your advice line urgently if you think you have an infection. Nail and skin changes Skin and nail problems include a skin rash, dry skin, itching and darker skin. Your nails may also become brittle, dry, change colour or develop ridges. This usually goes back to normal when you finish treatment. You could lose all your hair. This includes your eyelashes, eyebrows, underarm, leg and sometimes pubic hair. Your hair will usually grow back once treatment has finished but it is likely to be softer. It may grow back a different colour or be curlier than before. Feeling or being sick Feeling or being sick is usually well controlled with anti sickness medicines. Avoiding fatty or fried foods, eating small meals and snacks, drinking plenty of water, and relaxation techniques can all help. It is important to take anti sickness medicines as prescribed even if you don’t feel sick. It is easier to prevent sickness rather than treating it once it has started. Tiredness and weakness (fatigue) Tiredness and weakness (fatigue) can happen during and after treatment - doing gentle exercises each day can keep your energy up. Don't push yourself, rest when you start to feel tired and ask others for help. Occasional side effects These side effects happen in between 1 and 10 out of every 100 people (between 1 and 10%). You might have one or more of them. They include: - increased risk of getting an infection - bruising, bleeding gums or nosebleeds - allergic reaction (whilst having treatment or soon afterwards) - rash or redness of the skin - blood clots Rare side effects Each of these effects happens in fewer than 1 in 100 people (fewer than 1%). You might have one or more of them. They include: - low blood pressure - difficulty in passing urine - changes to the way the liver works - pain in area of cancer following bleomycin injection directly into the cancer What else do I need to know? Other medicines, foods and drink Cancer drugs can interact with some other medicines and herbal products. Tell your doctor or pharmacist about any medicines you are taking. This includes vitamins, herbal supplements and over the counter remedies. Pregnancy and contraception This treatment might harm a baby developing in the womb. It is important not to become pregnant, or father a child while you're having treatment, and for 6 months afterwards. Talk to your doctor or nurse about effective contraception before starting treatment. You may not be able to become pregnant or father a child after treatment with this drug. Talk to your doctor before starting treatment if you think you may want to have a baby in the future. Men might be able to store sperm before starting treatment. And women might be able to store eggs or ovarian tissue. But these services are not available in every hospital, so you would need to ask your doctor about this. Don’t breastfeed during this treatment because the drug may come through into your breast milk. Treatment for other conditions Always tell other doctors, nurses, pharmacists or dentists that you’re having this treatment if you need treatment for anything else, including teeth problems. Don’t have immunisations with live vaccines while you’re having treatment and for up to 12 months afterwards. The length of time depends on the treatment you are having. Ask your doctor or pharmacist how long you should avoid live vaccinations. In the UK, live vaccines include rubella, mumps, measles, BCG, yellow fever and one of the shingles vaccines called Zostavax. You can have: - other vaccines, but they might not give you as much protection as usual - the flu vaccine (as an injection) - the coronavirus (COVID-19) vaccine - talk to your doctor or pharmacist about the best time to have it in relation to your cancer treatment Members of your household who are aged 5 years or over are also able to have the COVID-19 vaccine. This is to help lower your risk of getting COVID-19 while having cancer treatment and until your Contact with others who have had immunisations - You can be in contact with other people who have had live vaccines as injections. Avoid close contact with people who have recently had live vaccines taken by mouth (oral vaccines) such as the oral typhoid vaccine. If your immune system is severely weakened, you should avoid contact with children who have had the flu vaccine as a nasal spray as this is a live vaccine. This is for 2 weeks following their vaccination. Babies have the live rotavirus vaccine. The virus is in the baby’s poo for about 2 weeks and could make you ill if your immunity is low. Get someone else to change their nappies during this time if you can. If this isn't possible, wash your hands well after changing their nappy. More information about this treatment For further information about this treatment go to the electronic Medicines Compendium (eMC) website. You can report any side effect you have to the Medicines Health and Regulatory Authority (MHRA) as part of their Yellow Card Scheme. This page is due for review. We will update this as soon as possible.
<urn:uuid:3354ea14-8db4-4def-a745-9b3123a1f725>
CC-MAIN-2022-33
https://about-cancer.cancerresearchuk.org/about-cancer/cancer-in-general/treatment/cancer-drugs/drugs/bleomycin
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00001.warc.gz
en
0.958975
2,075
3.109375
3
Location of the mouth of Putah Creek in California |Native name||Liwaito (Patwin)| |Counties||Yolo, Solano, Napa, Lake| |• elevation||3,651 ft (1,113 m)| |Prospect Slough in Yolo Bypass| |7.5 ft (2.3 m)| |Length||85 mi (137 km)| |Basin size||638 sq mi (1,650 km2)| |• location||near Winters, CA| |• average||477 cu ft/s (13.5 m3/s)| |• minimum||0 cu ft/s (0 m3/s)| |• maximum||81,000 cu ft/s (2,300 m3/s)| Putah Creek (Patwin: Liwaito) is a major stream in Northern California, a tributary of the Yolo Bypass, and ultimately, the Sacramento River. The 85-mile-long (137 km) creek has its headwaters in the Mayacamas Mountains, a part of the Coast Range, and flows east through two dams. First, Monticello Dam forms Lake Berryessa, below which Putah Creek forms the border of Yolo and Solano Counties, and then flows to the Putah Diversion Dam and Lake Solano. After several drought years in the late 1980s, the majority of Putah Creek went dry, prompting a landmark lawsuit that resulted in the signing of the Putah Creek Accord in 2000. The Accord established releases from the dams to maintain stream flows in Putah Creek, with natural flow regimes which spike in winter/spring and ebb in summer/fall. The restoration of natural flow regimes has resulted in a doubling of riparian bird species and a return of spawning native steelhead trout and Chinook salmon, as well as protecting the livelihood of farmers on the lower watershed. The true meaning of "Putah" in Putah Creek has been the subject of discussion and speculation. It was originally called "Arroyo de los Putos" (1844) and "Puta Creek" (1845), but the "Puta" form was rejected by the United States Board on Geographic Names, likely because of the resemblance to the Spanish word puta (lit. "whore"). According to Erwin Gudde (1889–1969), the resemblance is "purely accidental". The revised fourth edition of Gudde's California Place Names has the following entry: Putah Creek [Lake, Napa, Solano Cos.]. From Lake Miwok puṭa wuwwe "grassy creek" (Callaghan; cf. Beeler 1974:141). The similarity to Spanish puta "prostitute" is purely accidental. In the records of Mission San Francisco Solano (Sonoma Mission) of 1824, the natives of the place are mentioned with various spellings from Putto to Puttato. In the baptismal records of Mission Dolores an adulto de Putü is mentioned in 1817, and the wife of Pedro Putay in 1821 (Arch. Mis. 1:94.81). In 1842 the stream was well known by its name: "I know that the Rio was called 'Putos.'...It is well-known by the name which has been given it" (J. J. Warner, land-grant case 232 ND). The name was probably fixed by William Wolfskill, who named his grant Rio de los Putos on May 24, 1842. In 1843 the name was used in the titles of three other land grants, in one of which the spelling Putas occurs. In the Statutes of the early 1850s, in the Indian Reports, and in the Pac. R.R. Reports, the spelling of the name is in complete confusion. The present version was applied to a town in 1853, was used in the Statutes of 1854, was made popular by the Bancroft maps, and finally was adopted by the USGS. According to a map created by Eugène Duflot de Mofras, a French naturalist and explorer, and published in Paris in 1844, Putah Creek was once known as Young's River, named for the fur trapper Ewing Young, who hunted beaver on an expedition up Putah Creek to Clear Lake and on to the Mendocino County Coast in March, 1833. The lower reaches of the creek used to sometimes be called Walnut Bayou, in reference to the warm and sluggish water and the abundance of California Black Walnut trees on the banks. The creek originates from springs on the east side of Cobb Mountain south of the town of Cobb in southwestern Lake County and flows approximately 130 kilometres (81 mi) to Lake Berryessa. It descends eastward to the town of Whispering Pines, where it turns southeast, parallelling State Route 175. It passes the town of Anderson Springs, where it joins Bear Canyon Creek. North of Middletown, it curves counterclockwise around Harbin Mountain, merging in close succession with Dry Creek, Helena Creek, Crazy Creek, Harbin Creek, and Big Canyon Creek. From Harbin Mountain, it flows east again, joining Bucksnort Creek, then enters Napa County at a confluence with Hunting Creek about 11 mi (18 km) east of Middletown. In Napa County, the creek flows southeast, merging with Butts Creek just before it empties into Lake Berryessa, and the Monticello Dam. Downstream of Monticello Dam, on the southeastern corner of the lake, Putah Creek leaves Napa County and becomes the boundary between Yolo County and Solano County flowing about 13 kilometres (8.1 mi) to the Putah Diversion Dam (PDD), where most of water flows are diverted south through the Putah South Canal to users in Solano County. In this section the creek offers excellent fishing opportunities year round. California Department of Fish and Wildlife regulations require "catch and release" in this section of the stream, as well as the use of artificial lures with barbless hooks. The California Office of Environmental Health Hazard Assessment (OEHHA) has developed a safe eating advisory for fish caught in Putah Creek based on levels of mercury or PCBs found in local species. Stormwater runoff from a nearby Superfund site formally known as the Laboratory for Energy-Related Health Research (LEHR), has shown elevated levels of Mercury reaching 500 ng/L entering Putah Creek. While the site has been decommissioned since the late 1980s and federally listed as a National Priority Superfund site by the EPA in 1994, the amount of contamination to the soil, groundwater aquifer, and nearby Putah Creek, continue to be a hazard to the area. This concentration of mercury in Putah creek creates health risks for anything that may eat the fish, as the bioaccumulation of mercury found in the fish passes along the food web to birds and potentially humans. The stream continues east along State Route 128, receiving Pleasants Creek before arriving at Lake Solano where the Putah Diversion Dam diverts flows to the Putah South Canal, carrying water to the residents of Vallejo. Below Lake Solano, Putah Creek flows 37 kilometres (23 mi) before reaching the Yolo Bypass and by that artificial route, to the Sacramento River. In this section, Putah Creek first receives McCune Creek, then its last tributary, Dry Creek. After the Dry Creek confluence it passes through the town of Winters to reach Interstate 505. From there Putah Creek channel continues eastward, parallelling Putah Creek Road to Stevenson Bridge Road. Putah Creek used to flow near downtown Davis in what is now the UC Davis Arboretum channel, but early settlers redirected the creek south of Davis in 1871, and in the late 1940s the Army Corps of Engineers added levees to what is now the South Fork Putah Creek. A few miles east of Davis, the county line turns south, but the South Fork Putah Creek continues eastward, passing south of Davis to feed into the Yolo Bypass about a quarter mile (400 m) west of the Sacramento Deep Water Channel. Monticello Dam, a concrete arch dam, is the only major storage dam on the creek. It forms Lake Berryessa, which has a capacity of 1,602,000 acre-feet (1.976×109 m3), making it one of the largest reservoirs in the state of California. The dam and lake are part of the United States Bureau of Reclamation's Solano Project and was completed in 1957. The project's purpose is to provide water for irrigation, though it also supplies municipal and industrial water to major cities in Solano County. About 32,000 acre-feet (39,000,000 m3) is provided by the project annually. An 11 MW hydroelectric plant generates electricity for the Solano Irrigation District, which owns and operates the dam. The Putah Diversion Dam, or PDD, also constructed in 1957, diverts water into Putah South Canal about 6 miles (9.7 km) downstream of Monticello Dam. The dam is a gated concrete weir structure with an earth-fill embankment wing. It creates the small Lake Solano, which has a capacity of only 750 acre-feet (930,000 m3). The canal is entirely concrete-lined except for a mile (1.6 km) of pipe called the Putah South Pipeline. Most of the lands are below the level of the canal and are served by gravity. Lands above pump water straight from the canal. The canal ends at Terminal Dam, which is made from earth-fill. The dam forms a small 119 acre-foot (147,000 m3) reservoir called Solano Lake. This reservoir supplies drinking water to the city of Vallejo. Most of the canal is operated by Solano Irrigation District, including its headworks. Steelhead trout (coastal rainbow trout) (Oncorhynchus mykiss irideus) and Chinook salmon (Oncorhynchus tshawytscha) continue to survive in Putah Creek. Although these anadromous salmonids cannot pass the Putah Diversion Dam, stream resident rainbow trout (the landlocked form of steelhead trout) continue to thrive above Monticello Dam in the upper headwaters and grow to large size in the first few miles directly below the dam. The ecological centerpiece of the 2000 Putah Creek Accord mandated flow releases from the Putah Diversion Dam intended to secure spawning and rearing flows for spring-spawning native fishes with a natural flow regime of higher winter and spring flows, with lower summer and fall flows, but mandated sufficient perennial flow to support rearing salmonids. The Accord mandated a short three-day pulse to occur between 15 February and 31 March to initiate spawning behavior, followed by a month-long release of elevated flows. Further, the Accord established a schedule of monthly baseline flows designed to maintain continuous lotic (flowing) conditions year-round from the PDD to the Yolo Bypass. In December 2014, the California Fish and Game Commission designated Putah Creek a "Wild Trout Water" and efforts by citizen groups to restore the creek resulted in increased Chinook salmon rearing in the lower watershed. The natural flow regimes simulated by releases from the dams has restored native fishes while suppressing non-native fishes, the latter best adapted to warmer water and stagnant conditions. By increasing releases briefly in winter/spring and allowing much lower flows in late summer/fall, there has been little impact on overall water availability for diversion to agriculture and residents. An interesting study of the Putah Creek watershed from a bioregional perspective can be found in "Lifeplace: Bioregional Thought and Practice" by Robert L. Thayer Putah Creek is also known as the Green River due to the buildup of algae and vascular plants in the late summer. Putah Creek is the subject of the Creedence Clearwater Revival song "Green River" and served as a childhood vacation spot for John Fogerty. ((cite journal)): CS1 maint: uses authors parameter (link) ((cite journal)): CS1 maint: uses authors parameter (link) When John Fogerty of Creedence Clearwater Revival wrote "Green River" in 1962, he captured wondrous experiences he had with his family going to Putah Creek as a child.
<urn:uuid:69b93905-967c-4079-8a31-a42aae591d3c>
CC-MAIN-2022-33
https://db0nus869y26v.cloudfront.net/en/Putah_Creek
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00405.warc.gz
en
0.935037
2,745
2.859375
3
Mahabharata the Epic had many characters with less page space but more significance in terms of impact and story progression. Madri, the second wife of Pandu was one such character that had a very brief role in the narrative compared to her co-wife Kunti. The beauty of Mahabharata lies in the fact that lesser-known characters also contribute significantly in moving the story ahead. Madri was more remembered as the beloved wife of Pandu than the mother of the Pandava twins Nakula and Sahadeva. Madri, the sister of Shalya was introduced by Vyasa with the epithet rupenaasadrishi, famous for her unparalleled beauty. yAtvA devavratenApi madrANAM puTabhedanam | vishrutA triShu lokeShu mAdrI madrapateH sutA || 4|| sarvarAjasu vikhyAtA rUpeNAsadRRishI bhuvi | pANDorarthe parikrItA dhanena mahatA tadA || 5|| vivAhaM kArayAmAsa bhIShmaH pANDormahAtmanaH || 5|| Bori critical Edition Adi Parva ch 105 Kunti chose Pandu in Swayamvar, and with her by his side, he shone like Indra with Sachi. Madri was brought by Bhishma for Pandu and she was famous on earth for her beauty. Bhishma personally went to Madra kingdom and requested Shalya for Madri’s hand to be given in marriage to Pandu. He followed the custom of Madra kingdom by offering many valuable gifts for the sake of this alliance. Bhishma of great energy gave Shalya much gold, both coined and uncoined, and precious stones of various colours by thousands, and elephants and horses and cars, and much cloth and many ornaments, and gems and pearls and corals. Shalya accepting with a cheerful heart those precious gifts then gave away his sister decked in ornaments unto that bull of the Kuru race. Then the wise Bhishma, the son of the oceangoing Ganga, rejoiced at the issue of his mission, took Madri with him, and returned to the Kuru capital named after the elephant. (1.113) Subsequently selecting an auspicious day and moment as indicated by the wise for the ceremony, King Pandu was duly united with Madri. Later when Pandu decided to abandon his throne and live in the forest, both his wives accompanied him and served him with devotion. Madri‘s nature and her equation with her co-wife Kunti can be understood by means of the conversation that happened between her and king Pandu after the birth of Kunti’s sons. So how was the rapport between the wives of Pandu? Epic throws light on Madri’s prejudice for Kunti, particularly in this instance. It was celebration time for Pandu who got three sons by Kunti due to divine grace. Yudhishtira, Bhima, and Arjuna were born from Dharma, Vayu, and Indra with the power of the mantra that Kunti utilized on the order and consent of her husband Pandu. Kunti was obedient and submitted herself to Pandu’s ardent desire of becoming a father. Pandu who was cursed by Kindama Rishi had no other option but to let Kunti follow Niyoga to get sons for him. Even the choice of Gods was made by Pandu with great foresight and wisdom. Niyoga bore fruits and Pandu’s wish was fulfilled. His three sons born to Pritha were the epitome of Dharma, Bala and Shaurya. Madri was the one left without any hope of becoming a mother by herself and she could not bear the pain of living a childless life forever. Madri knew it was Kunti who enabled the birth of children with the power of her mantra but she did not approach her. Instead she poured her heart out before her loving husband Pandu and achieved her purpose. Madri’s words before Pandu, clearly mirrors her envy and disdain for Kunti. idaM tu me mahadduHkhaM tulyatAyAmaputratA | diShTyA tvidAnIM bharturme kuntyAmapyasti santatiH || 4|| yadi tvapatyasantAnaM kuntirAjasutA mayi | kuryAdanugraho me syAttava chApi hitaM bhavet || 5|| Bori critical Edition Adi Parva ch 115 Madri lamented that despite being equal to Kunti in every way, she has to remain childless. Unabridged Editions further elaborated Madri’s attitude towards Kunti. Vaisampayana said, “After the birth of Kunti’s sons and also of the hundred sons of Dhritarashtra, the daughter of the king of the Madra privately addressed Pandu, saying, ‘O slayer of foes, I have no complaint even if thou best unpropitious to me. I have, O sinless one, also no complaint that though by birth I am superior to Kunti yet I am inferior to her in station. I do not grieve, O thou of Kuru’s race that Gandhari hath obtained a hundred sons. This, however, is my great grief that while Kunti and I are equal, I should be childless, while it should so chance that thou shouldst have offspring by Kunti alone. If the daughter of Kuntibhoja should so provide that I should have offspring, she would then be really doing me a great favor and benefiting thee likewise. She being my rival, I feel a delicacy in soliciting any favor of her. If thou best, O king, propitiously disposed to me, then ask her to grant my desire.’” (1.129) Madri did not mince words and called Kunti.her rival. She said she was superior to Kunti by birth, probably due to the latter being a Yadava princess and an adopted daughter of Kunti Bhoja. Madri said that she and Kunti are equals (by being Pandu’s wives) but still she has to remain childless. Madri was clever enough to hint the benefit for Pandu if she also gets blessed with children. His children will grow in number to spread Pandava glory. Madri did not hesitate to tell Pandu about her delicacy in soliciting favor from Kunti. Pandu willingly became the mediator to fulfill the wish of his beloved wife. He already asked Kunti to get more sons but Kunti rejected the idea and said, “The wise do not sanction a fourth delivery even in a season of distress. The woman having intercourse with four different men is called a Swairini, while she having intercourse with five becometh a harlot.” (1.123) Hence Pandu was more than delighted to get more children by making Madri blessed with sons through Kunti’s grace. By obliging with Pandu’s request on behalf of Madri, Kunti proved herself to be noble and large-hearted. She was magnanimous and compassionate. She understood her co wife’s pain and also her inhibition to personally approach her for favour. But when Madri got twins by Aswins and again Pandu wished more children for Madri, Kunti felt cheated. She openly told Pandu about her feelings and refused to oblige. uktA sakRRiddvandvameShA lebhe tenAsmi va~nchitA | bibhemyasyAH paribhavAnnArINAM gatirIdRRishI || 23|| nAj~nAsiShamahaM mUDhA dvandvAhvAne phaladvayam | tasmAnnAhaM niyoktavyA tvayaiSho.astu varo mama || 24||( Bori 1.125) Sometime later, Pandu again requested Kunti on behalf of Madri. Addressing her lord in private, Kunti replied, ‘Having given her the formula of invocation only once, she hath, O king, managed to obtain two sons. Have I not been thus deceived by her, I fear, O king, that she will soon surpass me in the number of her children. This, indeed, is the way of all wicked women. Fool that I was, I did not know that by invoking the twin gods I could obtain at one birth twin children. I beseech thee, O king, do not command me any further. Let this be the boon granted (by thee) to me.'(1.129) Kunti called Madri wicked and deceitful. She sensed that given a chance Madri would surpass her by getting more number of sons. Madri got twins in one chance by Aswins and revelled in her newly attained motherhood. The beloved wife followed him in death also. Pandu was cursed by Kindama Rishi and danger was looming large over him, waiting to strike at any moment. The death of Pandu happened on Arjun’s birthday, according to Southern version. pUrNe chaturdashe varShe phalgunasya cha dhImataH.. yasminnR^ikShe samutpannaH pArthastasya cha dhImataH. tasminnuttaraphalgunyAM pravR^itte svastivAchane. rakShaNe vismR^itA kuntI vyagrA brAhmaNabhojane. purohitena sahitAnbrAhmaNAnparyaveShayat..’ ( SE 1. 134) Kunti who was more alert and watchful between the two, forgot to check Pandu who was roaming in the forest that blossomed with flowers in spring season. It was the day of Uttara Phalguni constellation that happened to be the birthday of Arjun. Kunti was serving food to Brahmins who were invited to extend blessings to Arjun on his birthday. Madri was with Pandu and he could not resist his desire, stuck by temptation and ill fate.The inevitable mishap happened.Pandu died on the spot, leaving lifelong sorrow for his wives and children. Kunti regretted not being with Pandu during his last moments. She immediately decided to follow him to the other world. Kunti wanted to follow Pandu but Madri did not allow her to do so. Madri knew that she was not that magnanimous and noble like Kunti who possessed motherly love for her children also. Madri finally admitted before her co wife Kunti, how noble she is and how narrow minded she herself is. By saying thus she redeemed herself. tasmAnme sutayoH kunti vartitavyaM svaputravat | mAM hi kAmayamAno.ayaM rAjA pretavashaM gataH || 28|| rAj~naH sharIreNa saha mamApIdaM kalevaram | dagdhavyaM supratichChannametadArye priyaM kuru || 29|| If I survive thee, it is certain I shall not be able to rear thy children as if they were mine. Will not sin touch me on that account? But, thou, O Kunti, shall be able to bring up my sons as if they were thine. The king, in seeking me wishfully, hath gone to the region of spirits; therefore, my body should be burnt with his. O revered sister, withhold not thy sanction to this which is agreeable to me. Thou wilt certainly bring up the children carefully. That indeed would be very agreeable to me. I have no other direction to give!’ (1.125) “Vaisampayana continued, ‘Having said this, the daughter of the king of Madra, the wedded wife of Pandu, ascended the funeral pyre of her lord, that bull among men.'” Madri could finally realise why Kunti is superior to her in every aspect. She understood the large hearted nature of Kunti and chose to leave her twins under her care while she followed Pandu to eternity. She knew she won’t be able to treat Kunti’s sons without partiality. She honestly admitted the fact before Kunti and entrusted her sons to her wholeheartedly. Surely after the birth of the five sons of Pandu, it was Kunti who took care of them and nourished them with equal affection. Madri thus got enlightened and accepted Kunti‘s motherhood as much superior to hers. She allowed the world to treat Kunti as the mother of five and not of three. Kunti did not disappoint Madri at all. She loved Nakula and Sahadeva more than her own children and showered her motherly affection more on them than on her own sons, especially on Sahadeva. That was why the twins never missed their own mother Madri at all. Madri was less remembered as the mother of twins but more acknowledged as the beloved wife of Pandu. She took time to realise how generous and noble her Elder co wife Kunti was. After knowing the fact, she relinquished her motherly status to Kunti and followed her loving husband in his last journey. She stands out in her own way, as the beautiful Madra princess loved passionately by King Pandu till his last breath. - Kisari Mohan Ganguli English Translation of The Mahabharata - Bori Critical Edition Of the Mahabharata Sanskrit version - Southern Recension Kumbhakonam Edition Of the Mahabharata - Gita Press Gorakhpur Version Of Mahabharata with Hindi Translation Featured Image Credits: Ramnadayandatta Shastri Pandey – wikimedia Disclaimer: The opinions expressed in this article belong to the author. Indic Today is neither responsible nor liable for the accuracy, completeness, suitability, or validity of any information in the article.
<urn:uuid:7ac597a6-a46d-4803-990f-0902f3a4387f>
CC-MAIN-2022-33
https://www.indica.today/long-reads/madri-mahabharata-forgotten-mother-twins/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573242.55/warc/CC-MAIN-20220818154820-20220818184820-00604.warc.gz
en
0.964927
3,134
2.84375
3
In music, a cadenza (from Italian: cadenza [kaˈdɛntsa], meaning cadence; plural, cadenze [kaˈdɛntse]) is, generically, an improvised or written-out ornamental passage played or sung by a soloist or soloists, usually in a "free" rhythmic style, and often allowing for virtuosic display. During this time the accompaniment will rest, or sustain a note or chord. Thus an improvised cadenza is indicated in written notation by a fermata in all parts. A cadenza usually will occur over the final or penultimate note in a piece, or over the final or penultimate note in an important subsection of a piece. It can also be found before a final coda or ritornello. The term cadenza often refers to a portion of a concerto in which the orchestra stops playing, leaving the soloist to play alone in free time (without a strict, regular pulse) and can be written or improvised, depending on what the composer specifies. Sometimes, the cadenza will include small parts for other instruments besides the soloist; an example is in Sergei Rachmaninoff's Piano Concerto No. 3, where a solo flute, clarinet and horn are used over rippling arpeggios in the piano. The cadenza normally occurs near the end of the first movement, though it can be at any point in a concerto. An example is Tchaikovsky's First Piano Concerto, where in the first five minutes a cadenza is used. The cadenza is usually the most elaborate and virtuosic part that the solo instrument plays during the whole piece. At the end of the cadenza, the orchestra re-enters, and generally finishes off the movement on their own, or, less often, with the solo instrument. As a vocal flourish The cadenza was originally, and remains, a vocal flourish improvised by a performer to elaborate a cadence in an aria. It was later used in instrumental music, and soon became a standard part of the concerto. Originally, it was improvised in this context as well, but during the 19th century, composers began to write cadenzas out in full. Third parties also wrote cadenzas for works in which it was intended by the composer to be improvised, so the soloist could have a well formed solo that they could practice in advance. Some of these have become so widely played and sung that they are effectively part of the standard repertoire, as is the case with Joseph Joachim's cadenza for Johannes Brahms' Violin Concerto, Beethoven's set of cadenzas for Mozart's Piano Concerto no. 20, and Estelle Liebling's edition of cadenzas for operas such as Donizetti's's La fille du Régiment and Lucia di Lammermoor. Perhaps the most notable deviations from this tendency towards written (or absent) cadenzas are to be found in jazz, most often at the end of a ballad, though cadenzas in this genre are usually brief. Saxophonist John Coltrane, however, usually improvised an extended cadenza when performing "I Want To Talk About You", in which he showcased his predilections for scalar improvisation and multiphonics. The recorded examples of "I Want To Talk About You" (Live at Birdland and Afro-Blue Impressions) are approximately 8 minutes in length, with Coltrane's unaccompanied cadenza taking up approximately 3 minutes. More sardonically, Jazz critic Martin Williams once described Coltrane's improvisations on "Africa/Brass" as "essentially extended cadenzas to pieces that never get played." Equally noteworthy is saxophonist Sonny Rollins' shorter improvised cadenza at the close of "Three Little Words" (Sonny Rollins on Impulse!). Cadenzas are also found in instrumental solos with piano or other accompaniment, where they are placed near the beginning or near the end or sometimes in both places (e.g. "The Maid of the Mist," cornet solo by Herbert L. Clarke, or a more modern example: the end of "Think of Me", where Christine Daaé sings a short but involved cadenza, in Andrew Lloyd Webber's The Phantom of the Opera). Notable examples of cadenzas - Concertos are not the only pieces that feature cadenzas; Scena di Canta Gitano, the fourth movement of Nikolai Rimsky-Korsakov's Capriccio Espagnol, contains cadenzas for horns and trumpets, violin, flute, clarinet, and harp in its beginning section. - The end of the first movement of Bach's fifth Brandenburg Concerto features a harpsichord solo. - The coloratura arias of Bel Canto composers Gaetano Donizetti, Vincenzo Bellini, and Giacchino Rossini. - Mozart wrote a cadenza into the third and final movement of Piano Sonata in B-flat major, K. 333, which was an unusual (but not unique) choice at that time because the movement is otherwise in Sonata-Rondo form. - Beethoven's "Emperor" Concerto contains a notated cadenza. It begins with a cadenza that is partly accompanied by the orchestra. Later in the first movement, the composer specifies that the soloist should play the music that is written out in the score, and not add a cadenza on one's own. - Beethoven famously included a cadenza-like solo for oboe in the recapitulation section of the first movement of his Symphony No. 5. - Tchaikovsky's first piano concerto is notable not only for having a cadenza within the first few minutes of the first movement, but also for having a second – substantially longer – cadenza in a more conventional place, near the end of the movement. - Rachmaninoff's Piano Concerto No. 3, in which the first movement features a long and incredibly difficult toccata-like cadenza with an even longer alternative or ossia cadenza written in a heavier chordal style. Both cadenzas lead to an identical section with arpeggios in the piano and a solo flute accompanying, before the cadenza ends quietly. - Fritz Kreisler's cadenzas for the first and third movements of Beethoven's Violin Concerto. - Aaron Copland uses a cadenza in his Clarinet Concerto to connect the two movements. - Karlheinz Stockhausen composed five ensemble cadenzas in his wind quintet Zeitmaße (1955–56), cadenzas for piccolo trumpet and piccolo in Luzifers Tanz (1983), and a cadenza for cor anglais in his trio Balance (2007) - Karol Szymanowski's two violin concertos both feature cadenzas written by the violinist who was intended to play them, Pawel Kochański. - In the third movement of Elgar's Violin Concerto, there is an unexpected cadenza in which the orchestra supports the solo with a pizzicato tremolando effect. ("cadenza accompagnato") - Franz Liszt's Hungarian Rhapsody No. 2 for piano contains a "cadenza ad libitum", meaning it is at the pianist's discretion that such a cadenza is added. - Pianists Chick Corea and Makoto Ozone incorporated jazz cadenzas into an otherwise traditional performance in Japan of the Mozart Double Piano Concerto. - Rimsky-Korsakov's Scheherazade features numerous cadenzas for violin. - Mozart wrote a cadenza in his own Horn Concerto No. 3, towards the end of the first of three movements. - Sergei Prokofiev's second piano concerto contains a taxing five-minute cadenza that closes out the first movement. - Carlos Chávez's Violin Concerto has a seven-minute unaccompanied cadenza as the third of its five main sections, despite the fact that the soloist plays almost without a break throughout the rest of the 35-minute-long composition Composers who have written cadenzas for other performers in works not their own include: - Carl Baermann's cadenza for the second movement of Mozart's Clarinet Concerto - Ludwig van Beethoven wrote cadenzas for Mozart's Piano Concerto No. 20 in D minor first and third movements - Joseph Joachim wrote the cadenza for Brahms's Violin Concerto. - Benjamin Britten wrote a cadenza for Haydn's Cello Concerto No. 1 in C for Mstislav Rostropovich. - David Johnstone wrote A Manual of Cadenzas and Cadences for Cello, pub. Creighton's Collection (2007). - Wilhelm Kempff wrote cadenzas for Beethoven's first four piano concertos. - Clara Schumann wrote a cadenza for Beethoven's Piano Concerto No. 3 - Karlheinz Stockhausen composed cadenzas for two Mozart concerti for wind instruments (flute and clarinet), for Kathinka Pasveer and Suzanne Stephens, respectively. - Richard Strauss wrote a vocal cadenza in 1919 for soprano Elisabeth Schumann to sing in Mozart's solo motet Exsultate, jubilate. This cadenza was sung by Kathleen Battle in her recording. - Friedrich Wührer composed and published cadenzas for Mozart's piano concerti in C Major, K. 467; C Minor, K. 491; and D Major, K. 537. - Sergei Rachmaninoff wrote a cadenza for Liszt's Hungarian Rhapsody No. 2 and was recorded playing the piece with this cadenza in 1919. - Alfred Schnittke wrote two cadenzas for Beethoven's Violin Concerto, of which the first includes musical quotations from violin concertos of Berg, Brahms, Bartók (Concertos No. 1 and No. 2), Shostakovich (Concerto No. 1), as well as from Beethoven's 7th Symphony. - Fritz Kreisler composed a half polyphonic cadenza for Beethoven's Violin Concerto. - Sir George Grove (1904). Grove's Dictionary of Music and Musicians, Vol. 1, p.442. John Alexander Fuller-Maitland, ed. Macmillan Company. - Randel, Don Michael (2003). The Harvard Dictionary of Music, p.132. ISBN 978-0-674-01163-2. - Kinderman, William (2006). Mozart's Piano Music, Ex.4.2. Oxford University Press. ISBN 9780199880164. - Kostka, Stefan and Payne, Dorothy (1995). Tonal Harmony, p.143. ISBN 0073000566. - Reitzes, David (1998). "A Love Supreme: God Breathes Through John Coltrane". Retrieved 1 May 2010. - Jerome Kohl, Karlheinz Stockhausen: Zeitmaße, Landmarks in Music Since 1950, edited by Wyndham Thomas (Abingdon, Oxon; London; New York: Routledge, 2017): 89–121. ISBN 978-0-7546-5334-9. - "Manual of Cadenzas & Cadences", Creighton's Collection. - Puritz, Gerd. "Schumann and Strauss". Elisabeth Schumann, A Biography. Grant & Cutler Ltd, London. Retrieved 5 September 2012. - "Scores of Friedrich Wuhrer", Di-Arezzo.co.uk. - Rachmaninoff plays Liszt Hungarian Rhapsody No. 2. YouTube. 2007-07-27. Retrieved 2014-02-28. - Rapaport, Aaron (2012). "An American Encounter with Polystylism: Schnittke's Cadenzas to Beethoven (Master's thesis)". University of North Carolina at Chapel Hill. Retrieved 19 July 2012. - Badura-Skoda, Eva, et al. "Cadenza". Grove Music Online ed. L. Macy (subscription required). Accessed 2007-04-06. - Lawson, Colin (1999). The Historical Performance of Music: An Introduction, p. 75-6. ISBN 9780521627382. - Randel, Don (1986). The New Harvard Dictionary of Music. Cambridge: Harvard University Press. ISBN 0-674-61525-5 - Tarloff, Eric (February 9, 2010). "Classical Cadenzas". TheAtlantic.com. - "Category: Cadenzas". IMSLP.org.
<urn:uuid:6235103e-1521-4e95-8060-747c8e9d33f1>
CC-MAIN-2022-33
https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/Cadenza.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00203.warc.gz
en
0.881077
2,805
3.453125
3
Chronic Non-Communicable Diseases in Adults Kate Walker, Nadia Chaves - Offer screening for non-communicable diseases (NCDs) as per the RACGP red book including screening for: - smoking, nutrition, alcohol and physical activity (SNAP) risk factors - obesity, diabetes, hypertension, cardiovascular disease (CVD), chronic obstructive pulmonary disease (COPD) and lipid disorders - breast, bowel and cervical cancer. - Assess diabetes and CVD risk earlier for those from regions with a higher prevalence of non-communicable diseases (NCDs) or an increased BMI or waist circumference. - Although this chapter does not specifically refer to children we recommend recording body mass index (BMI) and blood pressure (BP) in all and offering management if abnormal. Non-communicable diseases (NCDs) include CVD, diabetes, respiratory diseases such as chronic obstructive pulmonary disease (COPD), musculoskeletal diseases and some cancers. There are few published data on the prevalence of NCDs in people from a refugee-like backgrounds in Australia. Some studies report a higher rate of NCDs in some refugee populations.280 There is published evidence that people from refugee-like backgrounds may have an increased prevalence of diabetes,280–282 hypertension,282–285 dyslipidaemia,156,282 musculoskeletal disease, chronic respiratory disease,280 obesity or overweight274,280,283,284,286 and CVD,282,287 compared to the population of country of settlement. Conversely, some studies show a reduced prevalence of NCDs in some groups of immigrants living in high-income countries (HICs) compared to the long-term residents: the ‘healthy migrant effect.’288,289 The rates of death related to NCDs are increasing in Australia290,291 and internationally particularly in low- and middle-income countries (LMIC), including refugee-source countries.292,293 Premature death attributable to NCDs in LMIC occurs at a far higher rate than in Australia.294 The major potentially treatable risk factors for the development of NCDs are poor nutrition and low physical activity, which pre-dispose to obesity, excessive alcohol intake, cigarette smoking and hypertension. There may be additional explanations for the increased prevalence of NCDs. For immigrants moving from a low- or middle-income country to a high-income country (including people from a refugee-like background) these include abdominal obesity, dyslipidaemia, genetic and environmental factors.295–297 Experiences of prolonged poverty, forced migration, time spent in refugee camps or similar circumstances may also be potential risk factors for developing NCDs. For example, perinatal deprivation or malnutrition is considered to pre-dispose to diabetes and to other NCDs. 298,299 Post-traumatic stress disorder (PTSD) and depression are associated with hypertension and hyperlipidaemia.300 People from refugee-like backgrounds with NCDs may also be at risk of complex and multiple comorbidities due to poor socioeconomic conditions and concomitant mental illness, as well as inadequate access to preventive and chronic disease care. Nutrition and obesity There are few studies investigating risk factors for obesity in people from refugee-like backgrounds specifically but low socioeconomic status, food insecurity, high intake of sugar-sweetened drinks, body image and inappropriate beliefs related to food, stressful family life and depression are all risk factors for obesity in the general community, including those from refugee-like backgrounds.288,301,302 Some refugee-background children reportedly assimilate quickly to less healthy Australian diets,303 and cultural groups may value childhood obesity as a sign of health and success.304 Other refugee-background communities feeling overwhelmed by food choices305 and have limited knowledge and access to information about healthy food options in Australia.301 There are few published data on physical activity in people from refugee-like backgrounds. Amongst culturally and linguistically diverse communities, some refugees were less likely to be active or to consider physical activity due to PTSD.306 Diet and exercise requires individualised and culturally sensitive approaches.306 Tobacco, alcohol and other substances Little is known about the use of substance in refugee-background communities in Australia.307,308 A recent review of substance use in people from refugee backgrounds in the USA suggested a ‘refugee paradox’ much like the ‘healthy migrant effect.’309 Nevertheless drug, tobacco and alcohol issues have been identified as specific health issues of concern following consultations with refugee groups in Australia.15,310 There are no data on the prevalence of smoking in people from a refugee-like background, and reported prevalence in immigrants varies according to gender, time since migration and country of origin.311 There are reports of increased smoking behaviour and heavy alcohol use in people from a refugee-like background who experience PTSD.308 Tobacco intake via a water pipe has been reported in those from the Middle East and Africa and has been shown to potentially increase nicotine dependence.312 Certain ethnic groups may also use other addictive substances, such as betel nut in Burmese313 and khat in Somali communities.314 There are few data on the use of complementary and alternative medicines by people from a refugee-like background.315 Over-the-counter medications within some refugee communities have been linked to potential lead poisoning.271 As with any patient, obtain detailed history of complementary and alternative medicine use. + History and Examination - Evaluate for NCDs at initial assessment, then annually, or as opportunities arise. - Consider prevalence of NCDs in country of origin.294 These may be underestimates in some refugee-source countries, because of infrequent screening and adequate data collection. - Family history may be unknown; many people from refugee-like backgrounds have experienced family separation and loss. - Ask about: - diet and nutritional status, including the amount of sugar-sweetened drinks (see ‘nutrition and obesity’ above) processed food and other carbohydrates - smoking, alcohol, other substances, prescribed and non-prescribed medications - physical activity - chest symptoms. e.g. consider COPD in those > 35 years with breathlessness, cough and/ or sputum production (after active TB is excluded). Biomass fuel cooking, common in many LMIC is associated with COPD316 - over-the-counter medications, alternative medications and herbal products (e.g. betel nut, khat), illicit substances. - weight, height and waist circumference. Calculate BMI. It should be noted that ‘normal’ values vary between ethnic groups and gender317,318 - blood pressure - nutritional status - signs of CVD, COPD, alcohol use, tobacco use. At present there is no evidence to support screening for NCDs in refugee-background people earlier than current Australian guideline recommendations. We recommend diabetes and CVD risk assessment from age 35 years in patients from high prevalence countries and with risk factors such as obesity or hypertension. - Screen patients without risk factors for diabetes every 3 years from age 40 years using the AUSDRISK calculator and with a fasting blood sugar or HbA1c. In people who are obese and/or with high-risk ethnicity (Asian, Middle Eastern, Pacific Islander, Southern European, North or Sub-Saharan African) calculate AUSDRISK and undertake testing earlier. - Calculate absolute cardiovascular risk, serum cholesterol and other lipids: for patients >45 years, or earlier if risk factors. Cardiovascular risk may be increased in South East Asians and southern Europeans. Those with co-morbid PTSD and depression may have dyslipidaemia. These groups may warrant earlier screening. - Screen for chronic renal disease if at increased risk (e.g. because of smoking, hypertension, CVD, obesity, family history, diabetes) with a urine albumin:creatinine ratio and UEC (urea electrolytes and creatinine) with calculated glomerular filtration rate. - Offer screening for breast, cervical cancer, colorectal cancer and osteoporosis as per the RACGP red book - See Low Vitamin D. + Management and Referral Manage possible or established NCDs and according to current Australian guidelines, as indicated in the links below. Use tailored, patient-centred, explanatory models. Educate regarding lifestyle risk factors: - Provide dietary advice, including recommending tap water as the main drink to all patients, irrespective of age. - Consider discussions about NCDs in all individuals including adolescents especially in unaccompanied or separated minors. - Take note of cultural and religious impact on diet e.g. Ramadan and diabetes. - Consider referrals to diabetes nurse educators and dietitians to assist patients to understand and manage their chronic conditions. - Consider and address social and emotional wellbeing and psychiatric co-morbidities (see Mental Health). + Considerations in Pregnancy Refer to the Australian antenatal care guidelines 2015 + Considerations in Children and Adolescents Although this chapter does not specifically refer to children we recommend recording weight and height, calculating body mass index (BMI) and recording blood pressure (BP) in all children and adolescents and offering management if abnormal. Australian Heart Foundation Nutritional guidelines (includes patient resources) Chronic obstructive airways disease Physical activity guidelines Physical activity assessment
<urn:uuid:13d086e3-94b1-4d83-92ef-046aa441049b>
CC-MAIN-2022-33
https://refugeehealthguide.org.au/chronic-non-communicable-diseases-in-adults/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00005.warc.gz
en
0.911932
2,099
2.890625
3
The New Antidepressant Warnings: Not Enough to Prevent Further Harm. After Finally Issuing Warnings 16 Years Late, British and U.S. Authorities Fail to Tell Doctors and Patients How to Actually Prevent Serious Side Effects, Leaving Millions at Further Risk. What Should Be Done? On March 22, 2004, the U.S. Food and Drug Administration issued an advisory for the use of antidepressants in children and adults.1 This advisory, which followed a U.K. advisory, was long overdue. Sixteen years overdue: Prozac was marketed and immediately revealed problems in 1988. The new warnings covered 10 top-selling antidepressant drugs: Celexa (citalopram), Effexor (venlafaxine), Lexapro (escitalopram), Luvox (fluvoxamine), Remeron (mirtazapine), (Paxil (paroxetine), Prozac (fluoxetine), Serzone (nefazodone), Wellbutrin (buproprion), and Zoloft (sertraline). The advisories finally warned doctors that these drugs are clearly linked to severe side effects, but they failed to provide vital information about how doctors can prevent severe reactions from occurring. 1. Key Information Omitted First, isn’t it amazing that the FDA had to caution “physicians, their patients, and families and caregivers of patients about the need to closely monitor both adults and children with depression.” Aren’t doctors supposed to pay close attention to their patients, especially when starting new medications? Aren’t they supposed to follow-up in a timely fashion? The FDA was right to advise this, but the fact it was necessary is a stinging critique of today’s healthcare system. In fact, aren’t doctors supposed to warn patients and children’s parents about possible side effects and what to do if they occur? It’s called informed consent, a basic right of every patient. Yet very few medication patients receive informed consent these days, which is a big part of the antidepressant problem. Why is close scrutiny necessary? Because, as the FDA states, these antidepressants can provoke “anxiety, agitation, panic attacks, insomnia, irritability, hostility, impulsivity, akathisia (severe restlessness), hypomania, and mania.” It is difficult to believe that 16 years after Prozac’s entry, many doctors still don’t know this. So when these reactions occur, rather than reducing the dosage or stopping the drug, some doctors actually increase the dose, worsening the reactions and sometimes triggering destructive behavior. The British advisory in early March addressed this important point: “There is evidence that increasing the dose in this situation may be detrimental.” Yet the FDA omitted this important warning, which is a huge oversight because doctors will continue to make the same mistake. The fact is, many doctors don’t know how to prescribe antidepressants properly. One reason is that the drug industry, with its saturation advertising and 90,000 sales reps, has vigorously pushed antidepressants at family practitioners, pediatricians, gynecologists, and anyone else who can pen a prescription. Many of these doctors are inadequately trained to handle antidepressants, which are tricky drugs because patients respond so differently to them. This is why the lead author of a new study challenging the effectiveness and safety of these antidepressants in children2A told the New York Times, “We strongly want to say that non-child psychiatrists should not be initiating the prescribing” of SSRI antidepressants for children or adolescents. 2. Failure to Define the Role of Antidepressants in Anxiety Disorders The drug industry’s aggressive marketing methods are no different than other industries pushing their products. The more, the better. To accomplish this, the drug companies have convinced doctors that these drugs are not only useful for depression, but that some antidepressants are also useful for anxiety symptoms. Yet, these drugs are nothing like Valium or Xanax. Antidepressants have no immediate anxiety-reducing effects. To the contrary, they can actually cause severe anxiety, agitation, insomnia, mania, and the other reactions the FDA listed. Some antidepressants do have a longer-term role in treating anxiety disorders such as panic or obsessive-compulsive disorders, but their effects take weeks to work. And some patients, especially panic sufferers, are extremely sensitive to these drugs and must be started with very low doses. The U.S. and U.K. advisories say nothing about this. 3. Failure to Inform Doctors and Patients about Lower, Safer, Effective Antidepressant Doses This is the most egregious omission of the U.S. and U.K. advisories. These agencies know that antidepressant doses one-half and one-quarter the standard starting amounts work.3-5 Dr. Robert Temple, the FDA’s top drug expert, acknowledged this about Prozac in his debate with me on March 26, 2004, in front of 400 pharmacologists at the meeting of the American Society for Clinical Pharmacology and Therapeutics. Lower doses of Zoloft, Paxil, Effexor, Wellbutrin, and the others also work for millions of people. There’s a reason that serious reactions, as the U.K. advisory acknowledged, occur when patients are first prescribed these drugs. The reason is that the standard, one-size-fits-all starting doses are too strong for millions of people. These doses are derived from averaged results from studies, which may be meaningful statistically, but are misleading when treating individual patients. Giving all patients the same standard starting doses of antidepressants is like giving all shoe purchasers a size 10 and then telling them to come back in a month if the fit isn’t right. Such methods ignore the obvious broad variation among us and are guaranteed to provoke problems. As every medical textbook states, variation in medication response isn’t the exception, but the rule. Yet the drug companies — and regulatory agencies — ignore this basic medical principle because they are more interested in pushing new drugs to the widest populations possible. The result: high sales — and high side-effect statistics. Medication side effects cause more than 106,000 deaths and 1 million hospitalizations annually, and are the fourth leading cause of death in America. More than 75% of these adverse effects are dose-related:6 the problem isn’t the drugs themselves, but excessively strong doses. Consider what Dr. Carl Peck, a former director of the FDA’s drug division, said recently: “It’s long been known that for individual subjects the dosage listed on a drug label is not necessarily the right one.7” And what my friend and counterpart, Dr. Alexander Herxheimer of the U.K., wrote: “Drugs are often introduced at a dose that will be effective in around 90% of the target population, because this helps market penetration. The 25% of patients who are most sensitive to the drug get much more than they need.8” This is why so many people react so severely to the initial doses of antidepressants: the drug-company recommended, FDA-approved initial doses are too strong for millions of people. There are studies proving that much lower doses work, some conducted by drug companies. When one of my patients got psychotic in 1988 after just three doses of Prozac, I searched the medical literature. I’d prescribed her the standard 20-mg dose that the drug rep assured me was the lowest, safest dose. Yet I found a large study, conducted by Prozac’s manufacturer, showing that just 5 mg — 75% less medication — helped 54% of patients.9 But this information was omitted from the package insert, PDR, advertising, or rep’s info. Despite many subsequent articles on the effectiveness of low-dose Prozac,10-14 today most patients are still started at the 20-mg dose of Prozac and similarly strong doses of other antidepressants — and many people react like my patient. FDA: A Reactive Model Instead of a Preventive Model Some people do require strong doses of these drugs. But others don’t and get severe reactions when treated in this one-size-fits-all way. The FDA and British agencies know this. Why didn’t they advise us? Or would they look bad by finally admitting that the doses they originally approved were wrong? Some FDA officers already acknowledge the problem. FDA Officer James Cross stated in 2002: “We’ve seen a lot of situations where drugs are approved by the F.D.A. and subsequent important information about their optimal dose is not determined until afterward.7” Antidepressants are a perfect example. Yet the FDA still won’t admit this publicly and has again failed to offer a proactive, preventive approach for patients and doctors. Instead, we are left with the same reactive model that allows patients to get serious side effects. And some doctors will still misdiagnose the reactions, some will increase drug doses, and other doctors, not knowing what to do, will switch patients from one strong antidepressant to another and another with the same negative results. This is a wasteful, outdated method that does not put patients’ safety first. What must be done? The 16-year controversy about antidepressant medications was entirely avoidable. The problem isn’t the drugs, but a system that perpetuates a methodology guaranteed to cause unnecessary harm. Even with the new warnings, problems are going to continue and patients will become ever more fearful of using these drugs even when they are indicated. I agree with Dr. Laurence Greenhill, a professor of clinical psychiatry at Columbia University, who told the New York Times that neither side of this intense debate had a monopoly on the truth: “I think that these medications are neither as much of a silver bullet as the advocates would have it nor as terrible as the critics would say.2B” So how do we use these drugs appropriately and safely? In earlier newsletters, I outlined a 6-point plan for allowing people to get antidepressant therapy with minimum risk. Here’s an abbreviated version: 1. For serious depressions, standard antidepressant doses should be used with close monitoring. 2. Most depressive disorders are not acute, so patients must be given the option of starting with lower, safer, effective doses. The failure of the drug industry and regulatory agencies to provide this information constitutes a failure of informed consent. Patients and their doctors deserve the opportunity to discuss different doses and treatment options. 3. Doctors must become more knowledgeable about how to prescribe antidepressants, follow patients, and recognize and handle side effects. Doctors who prescribe antidepressants should be required to take a brief course or prove competence in using these drugs effectively and safely and in informing patients about potential risks. 4. Drug companies must define the lowest effective doses of antidepressants and must make this information readily available to patients and doctors. 5. The FDA must initiate policies requiring drug companies to develop the lowest, safest doses of not only antidepressants, but of all drugs. 6. The FDA must require doctors to report all serious antidepressant reactions. This is the only way we will learn the full scope of the problem. Maybe all of these steps aren’t practical today, but in a healthy healthcare system they would be automatic. Lower, safer doses would be encouraged. Doctors would follow patients closely and would handle side effects effectively. It’s not asking a lot. The Dose Makes the Difference Paracelsus said it six centuries ago: “The right dose differentiates a poison and a remedy.” A standard medical school textbook, Goth’s Medical Pharmacology, says the same thing: “Many adverse reactions probably arise from the failure to tailor the dosage of drugs to widely different individual needs.15” Ultimately, it doesn’t matter whether you need a low dose or high dose — what matters is that you get the right dose for you. Except in emergencies or other acute situations, there usually is no reason to start with the strong, standard, drug-company recommended doses of antidepressant drugs. That’s why I’ve long advocated a start-low go-slow approach for most patients. Even if you ultimately need a higher antidepressant dosage, starting low and increasing gradually is a good strategy because it triggers fewer side effects than starting immediately with a high dose. The issue here is about informed consent. It is about the failure of the drug industry to provide drugs to be used flexibly according to each patient’s needs and tolerances. It is about allowing marketing strategies for maximizing sales to override medical science that maximizes safety. The FDA and U.K. advisories are welcome steps forward, although long overdue and incomplete. New advisories should be issued that explain why so many serious reactions occur at the beginning of treatment and should inform patients and healthcare providers about low-dose options that can actually prevent these reactions. Other Recent Articles on Antidepressants Reactions In the Apr.-June 2004 E-Newsletter The Underlying Cause of Suicides and Homicides with SSRI Antidepressants: Is It the Drugs, the Doctors, or the Drug Companies? How a dysfunctional medical-pharmaceutical complex causes and perpetuates unnecessary harm. In the Jan.-Mar. 2004 E-Newsletter An Open Letter to the U.S. Food and Drug Administration on Serotonin-Enhancing Antidepressants in Youngsters: A 6-Point Solution That Makes Sense Scientifically. Antidepressant Side Effects: In A New York Times Exposé, A Doctor Describes Her Own Reaction To An Antidepressant Drug. But She Doesn’t Explain Why Antidepressant Side Effects Occur and How to Prevent Them. This Article Does. In the Oct.-Dec. 2003 E-Newsletter Suicides and Homicides in Patients Taking Paxil, Prozac, and Zoloft: Why They Keep Happening — And Why They Will Continue. Underlying Causes That Continue to Be Ignored by Mainstream Medicine and the Media. Cohen, JS. Over Dose: The Case Against The Drug Companies. Prescription Drugs, Side Effects, and Your Health. Tarcher/Putnam, New York: October 2001. (Highly recommended by all major reviewers including the Journal of the American Medical Association.) 1. FDA Talk Paper. FDA Issues Public Health Advisory on Cautions for Use of Antidepressants in Adults and Children. U.S. Food and Drug Administration, March 22, 2004:www.fda.gov\. 2. Braddock, CH, Edwards, KA, Hasenberg, NM, Laidley, TL, Levinson, W. Informed Decision Making in Outpatient Practice: Time to Get Back to Basics. JAMA 1999;282:2313-20. 2A. Jureidini, JN, Doecke, CJ, Mansfield, PR, et al. Efficacy and safety of antidepressants for children and adolescents. BMJ 2004;328: 879-883. 2B. Harris, G. Study advises against drugs for children in depression. New York Times, Apr. 9, 2004:nytimes.com. 3. Cohen, JS. Dose Discrepancies between the Physicians’ Desk Reference and the Medical Literature, and Their Possible Role in the High Incidence of Dose-Related Adverse Drug Events. Archives of Internal Medicine, April 9, 2001:161:957-64. 4. Cohen, JS. Adverse drug effects, compliance, and the initial doses of antihypertensive drugs recommended by the Joint National Committee vs. the Physicians’ Desk Reference. Archives of Internal Medicine 2001;161:880-85. 5. Cohen, JS. Do Standard Doses of Frequently Prescribed Drugs Cause Preventable Adverse Effects in Women? JAMWA 2002;57:105-110. 6. Lazarou, J, Pomeranz, BH, Corey, PN. Incidence of adverse drug reactions in hospitalized patients: a meta-analysis of prospective studies. JAMA 1998;279(15):1200-5. 7. Zuger, A. Caution: That dose may be too high. New York Times, September 17, 2002:nytimes.com. 8. Herxheimer A. How much drug in the tablet? Lancet 1991;337:346-8. 9. Wernicke, JF, Dunlop, SR, Dornseif, BE, et al. Low-dose fluoxetine therapy for depression. Psychopharmacology Bulletin 1988;24(1):183-188. 10. Schatzberg AF, Dessain E, O’Neil P, Katz DL, Cole JO. Recent studies on selective serotonergic antidepressants: trazodone, fluoxetine, and fluvoxamine. Journal of Clinical Psychopharmacology 1987;7(6):44S-49S. 11. Salzman C. Practical considerations in the pharmacologic treatment of depression in the elderly. Journal of Clinical Psychiatry 1990;59(1 Suppl):40-43. 12. Schatzberg AF. Dosing strategies for antidepressant agents. Journal of Clinical Psychiatry 1991:52(5suppl):14-20. 13. Cain, JW. Poor response to fluoxetine: underlying depression, serotonergic overstimulation, or a “therapeutic window”? Journal of Clinical Psychiatry 1992;53(8):272-277. 14. Louie, AK, Lewis, TB, Lannon, MD. Use of low-dose fluoxetine in major depression and panic disorder. Journal of Clinical Psychiatry 1993;54(1):435-438. 15. Clark, WG, Brater, DC, Johnson, AR. Goth’s Medical Pharmacology. 13th Edition. St. Louis: The C.V. Mosby Company, 1992. NOTE TO READERS: The purpose of this E-Letter is solely informational and educational. Theinformation herein should not be considered to be a substitute forthe direct medical advice of your doctor, nor is it meant to encourage the diagnosis or treatment of any illness, disease, or other medical problem by laypersons. If you are under a physician’s care for any condition, he or she can advise you whether the information in this E-Letter is suitable for you. Readers should not make any changes in drugs, doses, or any other aspects of their medical treatment unless specifically directed to do so by their own doctors. Category: Articles and Reports
<urn:uuid:2db18a0f-a9d6-4fed-806d-6579e27db06c>
CC-MAIN-2022-33
https://www.medicationsense.com/articles/april_june_04/ssri_warnings.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00404.warc.gz
en
0.905387
3,893
2.765625
3
Love it or hate it, we all have indulged in brainstorming sessions once in a while. Whether it involves taking necessary business decisions or major life decisions, brainstorming is something that has followed us throughout our journey. These deep-sighted sessions might also have been disorderly at times due to the overwhelming flow of ideas coming from every direction or totally structured with a strategy that helps. Since the late 1960s, Ishikawa diagrams have helped in shaping the lives of millions of entrepreneurs drowning in the pool of chaos and confusion. They have helped through the process of brainstorming causes of an effect and even mapping the relationships between cause-and-effect. Due to their shape, structure, and focus, these diagrams are popularly known as fishbone diagrams, herringbone diagrams, or cause-and-effect diagrams. They resemble an actual fishbone structure, with a long line running through the center reflecting the main outcome. It is sometimes also referred to as the ‘problem statement’. The other bones branch out from the middle line representing various other causes or ‘affinities’. This process is repeated until you feel satisfied with the fishbone diagram. Since fishbone diagrams are so useful and used by many industries, there are a few pre-designed templates that we have made available for your convenience. Using these 25 fishbone diagram PPT templates will help you avoid unnecessary cluttering and analyze things more fluidly. Fishbone Diagram PPT Templates To Download and Use Fishbone Diagram Template 1 Fishbone diagrams are extremely useful in the problem-solving arsenal. Use this template to figure out the cause and effect relationship between different variables. Also, present a breakdown of the contributing factors by employing this highly-resourceful PPT slide. Besides this, our Ishikawa diagram PPT visual can be utilized to give an in-depth understanding of the process and the problem. Additionally, highlighting opportunities for optimization, understanding current processes is acquainted with this professionally-designed template. Since the format of this design is fully-responsive, tweak it to fit your individual business perspective. Fishbone Diagram Template 2 Take advantage of this methodological tool to gain a greater understanding of how elements of a process result in the final outcome. Presenters can use this fishbone diagram PPT slide to design scientific cause and effect PowerPoint presentations. It can also be used to cause and effect relationships between various business and social phenomena. Such a diagram comes in extremely handy when you want to conduct brainstorming sessions in your organization. Besides this, it can facilitate an exquisite technical tool for problem analysis and solutions. Whichever purpose you want to use this design for, it is fully responsive owing to its editable layout. So, feel free to make as many amends as you like in this template. Fishbone Diagram Template 3 Convey the changes in your business as well as its progress by employing this invigorating design. This fishbone timeline diagram model helps divide various levels into discrete sections, each representing different stages of the process. Developments and progressions can be fluidly explained to the onlooker with this diagram that is pre-designed by our experts. You can either insert monthly updates into it or any other way you like as this template can be custom-tailored to your needs and requirements. Therefore, this template is an ideal fir for professionals undertaking a new project as articulating growth, progress, and time duration is a breeze with this design. Fishbone Diagram Template 4 Our root-cause analysis fishbone diagram template aims to present a breakdown of the causes of an issue. It also helps in organizing and determining what elements have the greatest impact so that various possibilities of them creating an effect can be judged proficiently. This fishbone PPT slide is designed in such a way that it will assist you in tackling smaller chunks of a problem on the basis of which the whole process can be judged, making your solution-finding process less intimidating and problem-solving a lot more manageable. Fishbone Diagram Template 5 Classify various potential causes of an issue in a systematized manner by employing this well-crafted Ishikawa diagram template. Determine the root causes of each problem that you face in your business, marketing, sales, or any other department. Essentially this layout helps you in breaking the whole process into smaller chunks, making it much more comprehensible. With a single-glance, the cause and effect relationship can be understood by the onlooker, if the information is presented using this template design. Fishbone Diagram Template 6 Take advantage of this creative yet very minimalistic design to present deductive generalizations with solid proofs. Business and academic research departments can employ this template to determine the cause-and-effect relationship between various variables. Additionally, social and market situations can be effortlessly analyzed by incorporating this cause-and-effect diagram PPT slide into your business structure. Fishbone Diagram Template 7 Analyze the root cause of your complex business problems by employing this template. The high-resolution graphics and visuals of this template will help you in displaying the potential causes of a problem very attractively. It will also help you in situations where minimal quantitative information is present for analysis. As such extensive analysis can be conducted to come out with possible solutions. Such templates are especially useful for start-ups as multiple causes and their effect can be efficiently judged in an orderly manner. Fishbone Diagram Template 8 Such fishbone PPT slides can help you create amazing presentations on manufacturing, sales, marketing, and the like. The user can employ this template to analyze the root cause of a problem. Also, utilize it to conduct proper analyses of the outcomes and their conclusions with cemented data. All of the research findings can be efficiently discussed with the audience by downloading this template. Fishbone Diagram Template 9 Business and academic researchers can employ this design to present logical connections to their findings. This template is well-suited to academic research centers to judge phenomenon and its root cause. Also, casual relationships between various variables can be determined with this well-structured PPT design. The diagram symbolically presents all the causes that can be organized systematically. Not only that, but the interdependency and relatedness of each variable can also be visually analyzed by including this template into your business research structure. Fishbone Diagram Template 10 If you need to discuss the causes and effects of some issue or simply conduct a root cause analysis, then this fishbone diagram PPT slide is the right fit for you. Make a visually appealing presentation that keeps your audience engaged by incorporating this design. Represent the causes and effects of various problems in the structure of a fish skeleton. Every business and industry can use this template to represent their ideas in an attractive manner that is easily understood by the onlookers. Fishbone Diagram Template 11 This is an ideal tool to identify and present various problems, their outcomes, shortcomings, and their possible solutions whether they arise in any area of business such as technology, machinery used, staff, production plant, or any other. Also defects in other distinctive areas like finance, marketing, processing, aviation, hospitality, etc. can be accounted for and discussed with your subordinates. This template design is an inseparable part of brainstorming sessions, presentations, meetings, and seminars. Hence take advantage of this fishbone PPT layout by clicking on the download button now. Fishbone Diagram Template 12 Communicate with your team efficiency by using the right visuals like our content-ready fishbone timeline cause and effect template. Share a rational process with your team members as well as subordinates in an orderly manner. This template can be used to show various project milestones, time, duration, and other factors in an organized manner. This will also help in reaching logical conclusions at the end of the process. This design is fully editable, so alter its design and aesthetics as per liking. Fishbone Diagram Template 13 Analyze the roots of complex issues. Visually display many potential causes that led to a particular effect. Professionals indulge in ales, marketing and manufacturing can conveniently use this template. Apart from this, this template is a very useful set for other professionals and industries as the layout is full-customizable. As such everything ranging from the color to theme can be tweaked as per one’s specifications. Fishbone Diagram Template 14 Help focus your team’s energy and resources on the root cause of a problem. Save unnecessary time wastage on the symptoms rather than the cause by employing this fully-editable layout. This fishbone diagram is especially useful in the analysis phase of Six Sigma DMAIC approach to problem-solving. Besides this, it helps in process improvement as well. Since, this slide is responsive to innumerable changes, tweak any of the components you like. Fishbone Diagram Template 15 Use this fishbone diagram slide to exhibit the cause and effect of various theories, concepts, and variables alike. Classify the facts and figures behind the occurrence of a particular phenomenon. Presenters can utilize this template to discuss details of various causes, their possibilities of leading to effect, the relationship between the two, and other such factors. This template is especially useful for business entrepreneurs as categorizing and dividing various factors like people, methods, machines, etc. is an absolute breeze. Fishbone Diagram Template 16 Identify the gaps in the production results. Determine the problem causes and divide them into categories by employing this fishbone framework. Analyze the six M’s that are manpower, method, machine, material, measurement, and mother nature with this well-crafted design that comes with editable features and attributes. Also, its high quality saves you from unnecessary pixelation while presenting on a large screen Fishbone Diagram Template 17 This is an extremely versatile tool that can aid you not only problem-solving but also presents a breakdown of contributing factors in an orderly manner. Apart from this, it can be utilized to show the management hierarchy with ease and precision. Brainstorming the possible causes and their apt solutions in another area that this design caters to, making it a highly resourceful PPT layout. Fishbone Diagram Template 18 Represent managerial hierarchy, departmental divisions, and stages of a process with this intuitively designed fishbone diagram template. Exhibit the cause and effect relationships between various theories, concepts, variables, and others by utilizing this meticulously crafted Ishikawa PPT slide. The presenter can outline different causes and their possibilities of creating an effect here in this design. Also, customer attitude can be verified with ease by employing this outstanding fishbone design. Since making alterations is quite easy in this design, feel free to modify it as per your liking. Fishbone Diagram Template 19 Detect the reasons for various imperfections, defects, and failures in your business setting. Find out the deviations that are required to detect for initiating the process of growth and expansion. Since this template is designed after due thought to design and aesthetics it is a very productive tool to download and use. Not only this, but it also acts as the greatest problem-solving tool an entrepreneur would have in his arsenal. Hence, click on the download button now! Fishbone Diagram Template 20 Envision the potential causes to find the root cause of an issue. Identify, determine, and improve quality issues with this fishbone diagram template design. It can also help in analyzing the discrepancies preventing the occurrence of future issues. Since this cause and effect diagram is professionally designed after due research and analysis, edit its format any which way. Whether it includes changing the color, design, font size, shapes or any other attribute, this template will respond to all the changes made by you. Fishbone Diagram Template 21 Use this 4s fishbone diagram template for not only your problem-solving endeavors but also analyzing complex problems with multiple causes, uncovering bottlenecks, identifying the loopholes in a problem, accelerating a process, and many others. This Ishikawa diagram also facilitates as a great quality improvement tool, that can be used any which way by the user. Tweaking all its elements is made effortless for the convenience of the user. Fishbone Diagram Template 22 Presenters who want to inspire their audience and explain their skills in a visually attractive way can download this fishbone diagram template. Professionals can also employ this template to conduct a thorough root cause analysis on any problem areas such as manufacturing, sales, production unit, or any other. Nonetheless, the components of this PPT can be tweaked as per your needs and aspirations. Fishbone Diagram Template 23 Managerial staff, professionals, and researchers can employ this template to display their findings, statistics, and interferences. It can also be utilized to interpret various objectives and their root causes, which is the main function of a fishbone diagram. The ill-effects of any cause can be effortlessly judged and possible solutions can be found out with this visually attractive template. Additionally, presenters can incorporate this design with DMAIC tools. User-friendliness is our biggest priority, hence tweaking the content of this template is very easy and convenient. Fishbone Diagram Template 24 Present conclusions to your study in this Ishikawa diagram PPT Template. Company managers can avail this design to interpret the problems created by the employees and decide upon the possible solutions. Therefore, download this well-crafted fishbone diagram design to conduct an effective root-cause analysis and wow your audience with the results. Fishbone Diagram Template 25 Track all the causes and conditions at various steps that led to a particular effect by employing this well-crafted fishbone diagram. Avoid unnecessary clutter by arranging your data in an orderly manner. This helps in better understanding and visualizing the process. Therefore download this must-have template to present like a pro! Don’t worry if you aren’t quite used to creating fishbone diagrams, these 25 built-in template designs will supply you with the ultimate visual toolkit. Tap into this collection to elevate your work and achieve the greatest impact in your business setting! These templates are a breeze to use and download: in just a few clicks you have the entire fishbone diagram outline ready at your doorstep. One of the coolest features of these templates is that if you don’t like the positioning of an attribute or cause, you can drag and drop the shape wherever you prefer.
<urn:uuid:dfa9bc4d-1f95-4bff-bbc2-6870a902f5bf>
CC-MAIN-2022-33
https://www.slideteam.net/business_powerpoint_diagrams/blog/top-25-fishbone-diagram-ppt-templates/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00404.warc.gz
en
0.91619
2,954
2.796875
3
Seeing your turtle not eating will make you concerned and worried since starvation can cause ill-health or even death. Before you die of worry, you need to know that there many possible normal and abnormal reasons why this could be happening including hibernation, sickness, poor lighting, a new environment and so on. To be able to deal with the reasons why this pet is not munching, you need to consider all the possible causes of this behavior. Ask yourself questions such does this pet like the food you are offering is it undergoing stress, is it under favorable temperature, is it ill among many others. Let us look at the possible causes. Why turtle not eating The following may be various reasons for your turtle not eating: 1. Low temperature Since they are poikilothermic reptiles, they may not be able to eat if the temperature is too low especially at night when temperatures typically drop below the room temperature of 25°C. For the turtles that live in water, the water temperature should be maintained at about 36°C. The basking area should be between 39°C and 42°C. The Zoo Med Aquatic Turtle UVB Heat Lighting Kit will provide required UVA, UVB, and heat. If you stay outdoor, it may become too cold if the outside temperature drops below the room temperature of between 25 and 28 degrees Celsius. This will make it inactive hence will not be able to eat. 2. Inadequate light Insufficient light can also be another reason for this behavior. If it gets less than 12 hours of a light per day, it may stop feeding. To enhance a healthy appetite, you should provide adequate light to the pet. Aquatic turtles may require both UVA and UVB light where they are kept. Give your turtle 12 to 14 hours of light followed by 10 to 12 hours of darkness. For instance, if you have a box turtle, you may be required to adjust the source of light depending on the seasons. For example, you can use artificial lighting more so, in the winter since the days are shorter and do not need any artificial light in the summertime. A turtle may not eat if it is hibernating, check to confirm if it is hibernating. Most European, North American and Asian turtles usually hibernate during winter. This happens even if it has a conducive environment and plenty of food. You may check its health condition and habitat; if it still doesn't feed, then you may take it to a veterinary doctor to confirm if it can be trying to hibernate. Note that hibernation can be stressful to the body. Therefore, it is advisable that only healthy ones be allowed to undergo hibernation. Stress is another common factor that would make this pet to lose appetite. A turtle could be stressed if it has dealt with too much, traveled lately, or has just been introduced to a new mate. In such a case, you may give them time to get used to each other. 5. Introduction to a new environment When they move to a new home or new environment, it is normal for them to stop eating within a short period because of the stress of an unfamiliar place. Otherwise, it is essential to ensure that you provide the right and conducive environment as well as proper nutrition to reduce the stress they experience since this will as well make them start munching as usual again. 6. Sign of sickness If you have improved the environment, and it is still not eating then, your turtle may be ill. Illnesses and conditions such as constipation, vitamin A deficiency, respiratory infection, pregnancy or an eye problem, may prevent it from feeding usually. Examine it for other symptoms to confirm if your turtle is sick. Consider talking to your vet if you are unsure what illness is afflicting it or why your turtle is not eating. Besides refusing to eat, if it has a vitamin deficiency, according to wikihow.com "signs and symptoms of Vitamin A deficiency include; the appearance of white, patchy discoloration on the shell." For instance, deficiency of vitamin A is related to respiratory complications. Other symptoms of respiratory infections include wheezing, difficulties in breathing, runny nose, lack of and swollen eyes. Your pet may be suffering from constipation if it quits eating as well as going to the bathroom. Also, the eye problem makes it not to see clearly. Consequently, it cannot feed as usual. Check for any signs of eye infections. Other diseases that cause pain, itching and inflammation may also make turtle stressed or make them not to eat. They are many diseases that could be blamed in this scenario. Finally, if the reason why your turtle is not eating is unclear, please visit specialized vet care to help find out the cause. After then, you could make efforts to make the pets feed again. How to make turtle eat A turtle not eating condition is absolutely a reversible condition. To make it feed as usual again, you must make it happy and stress-free. All these can be achieved by providing a better diet, treating any diseases or condition as well as making its living environment better and lovely. Below are some of the ways to make it eat again: 1. Provide brightly colored food Brightly colored foods attract turtles, and this can improve their appetite. Provide food substances such as tomatoes, strawberries, papaya, mango, watermelon, rose petals and other foods that may be brightly colored. Do not put too many fruits in your turtle’s diet. Put a small amount that is only enough to make it starts feeding as usual. You can also mix brightly colored foods with live food to get the best results. The brightly colored food with pleasant and robust smell may undoubtedly be attractive to this pet. Finally, emphasize vegetables because they have nutrients such as vitamin A that is good. Vegetables are critical when compared to the fruit. 2. Combine pellets with other food To make your turtle eat, crush the pellets and combine them with some of the live feeds. Pellets, as well as dry turtle food, are some of the staple foods in their diet. Also, you can soak the pellets in canned tuna water to make turtle pellets have a stronger and more enticing smell. Fruit juice can also be used to soak the pellets or caffeine-free drinks to encourage them to eat as usual. Place these foods in water because your turtle may prefer to eat underwater unless you have a box turtle. 3. Give live foods Live foods attract them due to their movement, and they can prefer to eat live food such as mealworms. Besides the moving, live food also has a strong sweet smell that may attract this reptile. Don’t dig up earthworms and give them to your turtle straight away as they might not be the healthiest. It is advisable to purchase the earthworms from bait stores. Some of the live foods it may enjoy eating include pill bugs, beetles, crayfish, flies, grasshoppers, spiders, and bloodworms 4. Supplement diet with calcium If you offer a well-balanced diet, your turtles will be able to get vitamins and nutrients they need. Otherwise, consider giving them supplements that contain calcium. This can be done by providing the turtle cutlet fish bones, calcium blocks as well as powder. Buying Zoo Med Block Value Pack for Aquatic Turtle will be an excellent idea. Give them these supplements at least once a week. Just put the calcium blocks or the cutlet fishbone in the habitat for your turtle to eat. You can also coat the food you give them with calcium powder before you give them to eat. 5. Switch up the diet. Your turtle may refuse to eat only because it never liked the kind of food that you have been giving it. You can overcome this by switching to a new diet. For instance, you can one day finely chop vegetables, mix them with pellets then dip all of them in bloodworm juice and then next day you can give them mangoes and pellets in tuna water. It is advisable to keep a record of how you have been feedings them to be able to tell how they respond to the various foods. This will help you know what they prefer and what they do not like. 6. Feed it early in the morning According to wikihow.com "turtles tend to be active early in the morning and prefer to eat them. Many may still refuse to eat if given food at other times of the day. You can try to give them food at 4:30 am or 5:30 am or as close to dawn as possible." If you keep box turtles, it is advisable to give them food early in the morning as that is when they enjoy munching them, especially when it is raining, because this is when slugs and earthworms can easily be found. Apart from specific times, you must adjust your feeding time according to the season. For instance, if you keep an outdoor turtle, it can be too cold to feed it at dawn during the winter or spring seasons. In such a case, give it food a little later. 7. Provide a healthy diet Give your turtle a balance to acquire nutrients that may protect them from the various diseases which can make them not to eat. You should give your turtle a well-balanced diet composed of vegetables, fruits, and meat. For aquatic turtles, the diet should be 66% to 91% meat some of which may be snails, frozen pinky mice, mollusks, dried turtle pellets and 11% to 36% vegetables including grated carrots, mangoes, mustard or collard greens and grapes. For a box turtle, the diet can be 51% meat and can include mealworms, slugs, crickets, slugs as well as snails and 50% vegetable such as green beans, berries, winter squash as well as the flower. 8. Check the temperature This pet may not feed if the environment of their habitat is not warm enough to make them active. Lower temperatures lower their metabolic rate. Hence they will lose interest in eating since during this condition they try to conserve energy to keep them warm. For instance, if you have the Gulf Coast box turtle, it implies that temperatures during the day in an enclosed place should be about 31 degrees Celsius with a basking spot of 42-44 degrees Celsius. Asian box turtle, as well as the ornate, require slightly warmer temperatures to keep them active and feed usually. 9. UVB and UVA lighting Providing them with ultraviolet light is very important as it may enhance their activity level, increase calcium absorption, metabolic process as well as stimulating their appetite. If the temperature outside is conducive and you have an outdoor pen, consider exposure them to natural sunlight as it is the best. Exposing them to sunlight through glass is not advisable as glass filters the UVA and UVB rays. If you can't get your turtle outside for at just a few hours per day then, you should get ultraviolet light bulbs that give out UVB and UVA lights. 10. See a veterinarian Take this pet to a veterinary in case it is eating any food you have given it and the changes in the environmental conditions we have discussed. It may be fighting illness and not feeding will only worsen its health. Getting a professional examination increases the chances of identifying the problem. A prompt solution reduces the possibility of your turtle's condition deteriorating. Best pet turtle food According to Dr. Starkey "what turtles can eat largely depends on their age and nutritional requirements. Keep in mind that younger sliders will eat relatively more protein than older animals". Note that baby turtles need to eat more pellets or even feeder fish when compared to vegetables and fruits. Commercial pelleted food It’s good to buy food made specifically for the turtles because this food will float on water and typically not fall apart quickly as compared to a pelleted diet designed for other reptiles. Although they may be reasonably expensive, they for sure have hefty perks. 1. Insects and feeder fish Feeders like comet goldfish provide a great source of protein, just like well-balanced minerals like phosphorous and calcium, and best levels of certain vitamins such as vitamin A. These pellets should form around 25% of their diet. 2. Fruits and vegetables Fill up the remainder of their daily diet with fresh produce. The best veggies are chopped dark leafy greens such as kale, collard, and mustard greens, Dr. Starkey recommends "shredded carrots, squash, and zucchini are great foods that your turtles can eat, too." You can as well provide edible aquatic vegetation such as water hyacinth, water lettuce, and duckweed. In the case of fruits, provide shredded melons and apples together with chopped berries. You can as well give them vegetables and fruits to supplement reptile vitamin and calcium pellets. If you keep a land turtle or tortoise, you should strictly give them herbivore diet. This implies that their food should consist of only fruits and vegetables, usually a diet mixture in the ratio of 2:8. The food to give this reptile pet would depend on which one it is exactly. For instance, you must know the right food for water turtle, red-eared slider, green sea turtles and so on. The type of food to be offered will also depend on the turtle’s age. What a young one feeds on may slightly vary. What not to give -may make it not eat Now that you know the right food to give your turtle, you should also know some kinds of food to avoid it not feeding. Do not give them foods that include: - Anything in the onions and garlic family - All fruit seeds - All milk products (g., cheese, yogurt) - Candy, chocolate, bread, refined sugar and flour - Canned and processed foods high in salt and preservatives As mentioned, new turtles may not eat for a while if scared by the new environment. Otherwise, you should ensure that the water temperature is warm as this can be another reason why they may refuse to feed. Sometimes you must feed the new ones the same type of food they were eating when you purchased them since some can be selective at the beginning.
<urn:uuid:38bbb667-2f4e-43a9-b663-5551e6976560>
CC-MAIN-2022-33
http://www.officialgoldenretriever.com/blog/turtle/turtle-not-eating-causes-and-how-to-make-it-eat/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00406.warc.gz
en
0.957847
2,987
2.78125
3
King Henry VI Part 2: Novel Summary: Act 1, Scene 1 - 4 Act 1, Scene 1 The play opens with the entrance of King Henry VI, accompanied by various lords. Suffolk enters from a separate direction, with York, Salisbury, and Warwick. Suffolk has just arrived from France, bringing Margaret to be the king’s wife. He presents her to the king, who welcomes her joyfully. Suffolk hands to Duke Humphrey of Gloucester the peace treaty that Henry has contracted with the French King Charles as part of Henry’s marriage agreement. Gloucester begins to read it, but when he gets to the part that agrees to the handing over of the hitherto English-owned French territories of Anjou and Maine to Margaret’s father, René, King of Naples, he lets the paper fall in horror. Beaufort finishes reading it, and it becomes clear that not only are Anjou and Maine to be given up to Margaret’s father, but also, Margaret comes with no dowry. Henry even has to pay for her journey to England. Henry, however, is perfectly happy with these terms and makes Suffolk a knight for bringing Margaret. He tells York that he is no longer regent of the French territories that have been handed back to the French. Henry leaves with Margaret and Suffolk to arrange his new queen’s coronation. Gloucester remains behind with the other lords and they complain about the terms of Henry’s match. Gloucester laments the loss of England’s territories in France, hard-won by Henry V, Henry VI’s father and predecessor on the throne of England, and the other lords present. Gloucester says the marriage between Henry and Margaret brings shame on them all and on England. Salisbury adds that Anjou and Maine are key to control of the whole of Normandy. Warwick weeps, saying that he was responsible for winning Anjou and Maine for the English and that he cannot believe that they would be delivered up to the French so meekly. York curses Suffolk for making a poor deal and wonders at Henry’s willingness to marry without material gain. Gloucester is amazed that Suffolk has levied a tax on personal property to pay for the cost of bringing Margaret to England. Beaufort rebukes Gloucester, pointing out that Henry wanted to marry Margaret. Gloucester accuses Beaufort of having a personal grudge against him, predicts that England will lose France altogether, and leaves. Beaufort denounces Gloucester to the other lords, saying he is an enemy of them all, and of the king. Until Henry has a son, Gloucester is next in line to the throne. Buckingham thinks that, as the king is now of an age at which he can rule in his own right, Gloucester is not needed as Protector (someone who governs the country while the monarch is too young to rule in his own right). Buckingham calls on his fellow lords to join with Suffolk and oust Gloucester. Beaufort agrees and leaves to seek Suffolk. With Beaufort gone, Somerset takes the opportunity to turn Buckingham against him. Somerset believes that Beaufort is getting above his place and warns that if Gloucester is ousted, Beaufort will take his position as Protector. Buckingham promises Somerset that one or the other of them will be Protector. Buckingham and Somerset leave. Salisbury worries about the state of England. He praises Gloucester as a good man and denounces Beaufort, Buckingham, and Somerset, for their selfish ambition. He takes comfort in his son, Warwick, who is respected by the nation. He also praises York for quashing a rebellion in Ireland and for his work governing the English territories in France as Henry’s regent. Salisbury wants York and Warwick to join with him in opposing Suffolk, Beaufort, Somerset and Buckingham, and supporting Gloucester, for the good of the nation. Warwick and York agree, though York reveals in an aside to the audience that he is acting out of self-interest (it later becomes clear that he means to be king). Warwick is determined to win Maine back for England. Warwick and Salisbury leave. York, alone on stage, summarises England’s losses in France. Anjou and Maine have been given back; Paris has been lost; and Normandy is in danger of reverting to French rule. York already sees himself as the rightful king of England, saying that it is his kingdom that is being given away. He plans to make a show of supporting Salisbury and Warwick (“the Nevilles”), but then to seize the throne for himself, while Henry is distracted with his new queen and his lords with infighting. He justifies his actions by saying that Henry is unfit for kingship and has brought England low. The first scene introduces the main theme of the play: the divisions and chaos that result from weak kingship. These divisions will result in the Wars of the Roses, a series of conflicts between two branches of the English royal family for the throne of England, which historically took place between 1455 and 1485. The weak king at the center of these events is Henry VI, during whose historical reign (1422–1461) England lost most of the territories in France that had been won by his father, Henry V. Henry V is portrayed in Shakespeare’s history plays as a great military leader who brought England to a powerful and glorious position on the world stage. The reign of his son is shown as a tragic and shameful descent. Henry V’s ghostly presence hangs over the Henry VI trilogy of plays, providing an implicit foil (contrasting character) to his unworldly and weak son. Henry VI’s marriage to Margaret is presented as a divisive and politically disastrous event, which is reinforced visually by having Suffolk bring her in by a separate door to that through which the king and his party enter. Henry has signed away Anjou and Maine, two important French territories, in exchange for her hand, and she brings no dowry: on the contrary, Henry has to meet the expense of bringing her from France himself. Characteristically, the unworldly Henry is oblivious to the political repercussions of this marriage. The audience will know from the prequel to this play, Henry VI, Part One, that Margaret was Suffolk’s choice (reinforced visually by his entrance with Margaret); that Margaret and Suffolk are attracted to one another and possibly engaged in an affair; and that Suffolk plans to use her for his own power-seeking ends. As well as being politically and financially without advantage, the marriage shows all the signs of being destructive to the king’s position and welfare. The various lords’ reactions to the signing away of the French territories in exchange for Margaret function as a barometer of their characters and motivations. Suffolk arranged the deal for his own self-interest, so he is in favor of it; Beaufort defends it, sycophantically pointing out that it was the king’s wish, though in reality he sees it as an opportunity to gain power for himself. Buckingham and Somerset are less interested in the fate of the nation than in their personal dislike of Gloucester and Beaufort and in jockeying for the position of Protector. Salisbury occupies the moral high ground, concerned only for England’s welfare. He is seconded in this position by his son, Warwick, who later, however, will be revealed to have ambitions of his own. While York seems to support Salisbury and is genuinely shocked by England’s sad decline, he reveals in an aside to the audience (line 206) and in his subsequent soliloquy that he is only pursuing his own interests. He plans to wait until Henry is distracted with Margaret and Gloucester is quarreling with the lords so that he can seize the throne for himself. Act 1, scene 2 Gloucester and his wife Eleanor are talking. Eleanor, observing her husband’s sadness, wants him to seize Henry’s crown for himself. Gloucester rebukes her for her evil ambition and swears that he will never do anything to hurt his nephew. He says he is troubled by a dream he had the previous night. He dreamed that his staff of office had been broken in two by Beaufort, and on the pieces were impaled the heads of Somerset and Suffolk. He wonders what it means. Eleanor is dismissive, telling him that she also had a dream, in which she was sitting on the throne in Westminster Abbey (where England’s monarchs are crowned) and being crowned queen by Henry and Margaret. Gloucester again scolds her for her treachery, pointing out that she is the second most powerful woman in the realm and should be content with that. Eleanor, offended, says in future she will not tell him her dreams. They reconcile. A Messenger from the king enters and invites Gloucester to a hawking party at St Albans. Gloucester leaves and Eleanor says she will follow. In a soliloquy to the audience, she reveals that she is impatient with her husband’s lack of ambition and that if she were a man, she would not hesitate to kill to gain her ends. Eleanor calls Sir John Hum and asks him about Margery Jourdayne, a witch, and Roger Bolingbroke, a conjuror. Hum says they have promised to raise a spirit from hell that will answer her questions about what the future holds for her. She plans to meet them when she returns from St Albans. She leaves. Hum, in a soliloquy to the audience, reveals that not only is he being paid by Eleanor to arrange the meeting with the witch, but he is also being paid by Beaufort and Suffolk to entrap her in the treasonous activity of conspiring to supplant Henry and Margaret on the throne. If she is charged with treason, this will also bring down Gloucester, in accord with Beaufort and Suffolk’s plan. Shakespeare mistrusted people whose motivation was money, as is plain from his portrayal of Hum. Hum is a mercenary whose only loyalty is to money and his own gain. He is happy to take Eleanor’s money in order to arrange a meeting with a witch and conjuror, who will summon a spirit to answer her questions about her aim of being queen; but he is also taking money from Beaufort and Suffolk to set a trap for Eleanor. Beaufort and Suffolk aim to show that Eleanor is engaged in treasonous activity (conspiring to replace the rightful king and queen on the throne of England). In doing so, they will bring down Gloucester, her husband, by association. Eleanor is blinded by her own greed and ambition to the fact that a trap is being set for her. While she plots against Henry and Margaret, Beaufort and Suffolk plot against her, through the agency of Hum, whom she believes to be her servant. This web of double-crossing and betrayal arises because of the weakness of the king. With no strong leader, England’s power base is up for grabs by unscrupulous persons. Act 1, scene 3 Some citizens present petitions to Suffolk and Margaret, in the mistaken belief that he is Gloucester and will help them. A man called Peter presents a petition charging his master, Thomas Horner, with treason for saying that York is the rightful heir to the crown and Henry a usurper. Suffolk is interested and arranges for the man to present his petition formally. Margaret is annoyed that Gloucester has such power and tears up a petitioner’s request. When the petitioners have gone, Margaret asks Suffolk why Gloucester still has authority over Henry. She reveals her disappointment with Henry, who, she says, compares poorly with Suffolk and is only interested in religious matters. Suffolk asks her to be patient, as he will arrange things to her liking. Margaret adds that she objects to Beaufort, Somerset, Buckingham, and York, who all seem to have more power than Henry. Suffolk says that Salisbury and Warwick are even more powerful. Margaret reserves special ire for Eleanor, whom she accuses of acting like an empress. She vows to be avenged on her. Suffolk assures Margaret that he has set a trap for Eleanor. He says they must appear to take Beaufort’s side in order to bring down Gloucester. Henry enters with the hawking party. They are discussing whether York or Somerset should be regent of France. Henry says he does not care who is regent. Gloucester encourages the king to decide, and Margaret says if Henry is old enough to decide for himself, then Gloucester is not needed as Protector. Suffolk and Beaufort join Margaret in attacking Gloucester, accusing him of acting as king and of bringing the country to ruin. They go on to level at him a variety of crimes, including enriching his own household out of the public purse and being unreasonably cruel in exercising criminal justice. Margaret says that his crimes are enough to justify execution. Gloucester leaves in anger. Margaret lets her fan drop, tells Eleanor to pick it up, and boxes her ear. Henry tells Eleanor it was unintentional, but Eleanor does not believe him and warns him against Margaret. Buckingham whispers to Beaufort that Eleanor is walking right into their trap. Gloucester enters, having calmed down. He challenges his accusers to prove their charges against him in law. He states his loyalty to king and country, and tries to move the discussion back to affairs of state, suggesting York as regent of France. Suffolk objects. York accuses Suffolk of holding a personal grudge because he (York) refuses to flatter him. He adds that if he is appointed, Somerset will keep him in England without pay until France is utterly lost to the French. Peter is brought in, along with his master, Horner, whom Peter has accused of treason in claiming that York should be king. Horner is under guard. Suffolk is pleased at this challenge to York, though York points out that no one has accused him of being a traitor. Suffolk tells Henry that Horner said that York was the rightful heir to the throne of England and that Henry is a usurper. Horner denies the charge. York asks Henry to punish him harshly. Horner defends himself, saying that Peter, his accuser, is his apprentice. When Horner corrected his mistake, Peter vowed he would get revenge. Gloucester says that given the doubts raised by this accusation about York’s loyalty, Henry should appoint Somerset regent of France. He says that Horner and Peter must settle their dispute by hand-to-hand combat. Peter is worried that he will lose. Henry sends them off to prison pending the day of their fight. Henry’s statement that he does not care whether York or Somerset is regent of France is typical of him. He probably intends it to mean that he is impartial, but it comes over as a dangerous indifference to affairs of state. Margaret and Eleanor are alike: each wants more power; each is impatient with her husband because he is not ambitious enough for her. As there is only room for one first lady in the land, this leads them to hate one another, with Margaret even hitting Eleanor. There is both irony and psychological accuracy in the fact that each woman hates the other for the same qualities that she herself exemplifies. Shakespeare had good knowledge of the law and a faith in its ability to deliver justice when properly applied. When law is mistreated, sidelined, disrespected, or taken into a person’s own hands in his plays, it is usually a sign that the social order has broken down and chaos reigns. Gloucester is an honorable man and thus believes that due process of law will prove him innocent of the charges that his enemies level against him. In this, he is naïve, as he has no idea that the corruption of the court is quite strong enough to pervert the course of justice. Nevertheless, Gloucester’s own approach to the law lacks objectivity and rigor. His decision to let Horner and Peter decide their dispute in combat instead of in a court of law would have seemed primitive by the standards of Shakespeare’s day. Moreover, in delivering his view of the situation, Gloucester speaks as if he is the law (line 211), rather than just a man who is interpreting the law in an ad hoc way. Suffolk, too, abuses the law, but in a more obvious way than the considered Gloucester. Suffolk is ready, for his own ends, to assume that Horner is guilty of treason in allegedly saying that York should be king, because this casts York’s loyalty into doubt. It is a case of guilt by association. This is not disinterested law, but self-interest on the part of Suffolk. Act 1, scene 4 Margery Jourdayne, the witch, and Roger Bolingbroke, the conjuror, enter with Hum, Southwell, and two priests. Hum and Eleanor are allowed to watch from above while the witch and conjuror conduct a ceremony to raise a spirit. The spirit appears and delivers an ambiguous prophecy, “The Duke yet lives that Henry shall depose, / But him outlive, and die a violent death” (lines 30-31). The spirit adds that Suffolk will die by water, and that Somerset should beware of castles. Southwell writes down the spirit’s words. Bolingbroke sends the spirit away. Suddenly, York, Buckingham, Stafford, and a guard break in. York orders the guard to arrest Bolingbroke, Southwell, and Jourdayne and imprison them. Buckingham confiscates Southwell’s writings. Hum and Eleanor are taken prisoner by Stafford and led away. York congratulates Buckingham on entrapping Eleanor and reads the spirit’s prophecies, but finds them hard to interpret. York says Henry, who is with Gloucester, must be told the news at once of Eleanor’s escapade and arrest. He anticipates that will bring Gloucester’s downfall. Buckingham leaves to deliver the news to Henry. York arranges for Salisbury and Warwick to dine with him the following night. It was treason (under the Treason Act of 1351) at the time the play was set, and in Shakespeare’s time, to “compass [plan] or imagine the death” of the sovereign, his queen, or his son and heir. Thus Eleanor’s asking questions of a spirit about the prospect of her and her husband being king and queen is arguably treason. Moreover, practicing or participating in witchcraft was a crime, so Eleanor is guilty of this too. Gloucester, as Eleanor’s husband, will be held guilty by association. The spirit’s prediction is ambiguous. The utterances of oracles were notoriously cryptic, and this is no exception. “Shall depose” and “die a violent death” could apply to York or Henry.
<urn:uuid:82dbd607-437f-4325-91e9-9fd9437cb3c2>
CC-MAIN-2022-33
https://ww.novelguide.com/king-henry-vi-part-2/summaries/act1-scene1-4
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00005.warc.gz
en
0.976579
3,959
3.15625
3
The UCLA International Cell Exchange has followed the progress in HLA typing since it began with 85 participating laboratories in 1974 and has expanded to 200 participants worldwide . The original goal of the Cell Exchange was to standardize the practice of HLA typing. This was an important undertaking because tissue typing for organ transplantation, disease studies, and population studies was dependent upon human typing sera obtained in very limited quantities, primarily from multiparous women. The accuracy of these reagents was dependent upon local methods of assessing the specificities of the anti-HLA antibodies and the volumes made it difficult to distribute sufficient quantities for use by everyone who performed HLA testing. The Cell Exchange provided an alternative strategy, distributing the same cells to many laboratories for HLA typing. Each laboratory would report their results to UCLA and then receive a report of every other laboratory's results for comparison. This provided the laboratories a means for evaluating their typing results and for identifying the weaknesses in their panels of typing sera. As the complexity of the HLA system defined by antibody reagents grew, the Cell Exchange focused its efforts on providing challenging cell types - those that included "rare" HLA antigens or unusual combinations of antigens that might be difficult to discriminate. A serum exchange was added in 1981, to check for anti-HLA antibody specificities. Accuracy of specificity and degree of sensitivity by various methods are assessed. Sera with complexes, interlocus antibodies, and reagent-quality antibodies are examined. This exchange helps labs detect problems in their serum screening panels and procedures. In 1987, testing for Class II typing was initiated with the first shipment of 2 lymphoblastoid cell lines. In 1990, DNA-based typing results were first reported in correlation with the serologic results. Cells with rare alleles and unusual DR-DQ associations are studied. DRB1, DRB3, DRB4, DRB5, DQB1, DQA1, and DPB1 alleles are evaluated. These cell lines can be maintained in culture and used as reference lines. In 1994, the Cell Exchange initiated offering the same cells for molecular typing as for serologic typing for Class I. The data from the parallel typings is instrumental in identifying serologic equivalents for Class I and Class II alleles that previously had little or no serologic information. This information is routinely added to the HLA Dictionary. In 1997, DNA extracts from cells with unusual class I alleles were provided to participating laboratories. Many of these extracts were from the reference cells sequenced for rare alleles, thus giving laboratories the opportunity to type them, whereas they may not detect them in routine typing them in their local populations. Having these cells typed by numerous laboratories will help to achieve standardization in the typing of rare types. In 2005, the International KIR Exchange was integrated within the framework of the International Cell Exchange, by offering reference DNA samples for KIR gene typing. The goals of this program are to standardize typing of KIR genes and alleles, and to identify new alleles. In February 2007, a pilot study for MICA (class I chain-related molecule A) typing was initiated by sending samples to a select number of laboratories. This will provide an opportunity to compare typing results from different technologies. In the near future, this will expand to encompass MICA antibody identification. The goals are to standardize typing of MICA alleles and MICA antibody identification, as well as to identify new alleles. In all the exchanges, the goals are to provide samples to validate methods and reagents, and to provide external quality control. By offering a forum for data exchange and discussion, the Cell Exchange has played a key role in international standardization. The UCLA International Cell Exchange has recorded the progress of HLA typing in a number of publications and presentations at national and international meetings. The Cell Exchange has helped laboratories to sharpen their skills and has monitored and published the development of tissue typing over the years. The goal of providing unusual types or combinations to participants was often accomplished by identifying cells that gave ambiguous or incomplete results. Many of these cells were provided to the Cell Exchange by the participating laboratories and often these challenging HLA types were found to include "variants," which represented new alleles that were not defined by serology. The problem of how to ship viable lymphocytes to locations throughout the world was solved by Dr Min Sik Park in 1973 (Park MS and Terasaki PI, Transplantation (1974) 18, 520-524) and permitted the evolution of international testing. This simple method is still used today by organizations involved in proficiency testing as well as for routine exchanges of material among laboratories. Over the years, the Cell Exchange has helped to identify numerous new or rare antigens. In the course of standardizing specificities to attain international agreement, the exchanges have identified duplicate names for the same specificity and the same name being used for different ones, for example, A26 versus A66 for the antigen encoded by A*6601, and A34 versus A66 for the one encoded by A*6602. More than 30 cells typed in the Cell Exchange now serve as reference cells for Class I alleles, confirmed through subsequent study. Examples of variants which were extensively studied in previous cell exchanges and received formal designations by the WHO Nomenclature Committee are: A9.3 (A*2403), BN21 (B*4005), B5.35 (B*5102), 5Y/8w58/BSNA (B*7801, B*7802), numerous B15 variants (B*1508, B*1511, B*1512, B*1515), and DT (B*8101). The Cell Exchange data has provided vital correlation between alleles and serologic names in many cases, such as establishing B*1518 as B71 and Cw*1701 as a short Cw7. Among the numerous alleles detected in exchange cells were A*1104, A*6803, B*1304, and B*4012. Our Cell Exchange continues to study serological variants not yet recognized and bring them to the forefront for validation by sequence analysis. By routinely contributing data to be used in the HLA Dictionary that offers allele-serologic equivalents, the Cell Exchange provides valuable information to be used in matching searches for unrelated donors in databases with mixtures of data attained using different techniques. This is important during the transition period as labs migrate to the exclusive use of molecular testing methods. The International Cell Exchange has a long and consistent history of service to the histocompatibility community. The Cell Exchange has operated continuously for more than thirty years, sending cells and sera, accounting for more than 3000 reference samples. The close of 2006 will mark the completion of 322 cell exchanges, encompassing 1288 cells for Class I serology, 920 sera for anti-HLA antibody identification, 386 cells for Class II serology, 310 cells for Class II DNA typing, and 464 cells for Class I DNA typing. The exchange has also provided 376 DNA extracts for HLA Class I testing. |AROUND THE WORLD| |Argentina||CABA||Hong Kong||New Zealand||Auckland| |Brisbane QLD||Ireland||Dublin||Saudi Arabia||Riyadh| |West Melbourne, VIC||Jerusalem||South Africa||Arcadia| |China||BDA Beijing||Korea, Republic Of||Seongnam-si, Gyeonggi-do||Switzerland||Geneva 14| |Shanghai||Suwon-si||United Kingdom||Bromborough, Wirral| |Finland||Helsinki||Lembah Pantai, Kuala Lumpur||London| |France||Paris Cedex 10||Mexico||Aguascalientes||Leeds England| |Toulouse Cedex 9||Maastricht||Uruguay||Montevideo| |Los Angeles||Worcester||New York| |Hawaii||Honolulu||North Carolina||Burlington||Washington DC| |New Jersey||New Providence||Waukesha| Collaborative efforts through international and regional workshops have played major roles in advancing HLA typing. Since 1974, the International Cell Exchange has played an important role in improving HLA typing in the interim between workshops. The main goals are: Within the International Cell Exchange - 6 programs and International KIR Exchange: |6 Shipments per year||Samples per Shipment| |1. Cell Exchange - Class I DNA||4 cell preps| |2. DNA Extract Exchange - Class I DNA||4 extracts| |3. Serum Exchange - Class I Antibody idenfitication||4 sera| |4. B-Cell Exchange - Class I and II DNA||2 cell lines| |2 Shipments per year||Samples per Shipment| |1. KIR Exchange||6 extracts| |2. Mica Exchange||6 extracts| |1 Shipment per year||Samples per Shipment| |1. Single Antigen, Flow and Virtual Crossmatch Exchange||2 cells/4sera| Many laboratories use our programs to fulfill their external quality control needs. In 2006, over 200 laboratories throughout the world actively participated in our exchange programs. Nearly half of the participants were laboratories outside the United States, affirming that our Exchange is truly an international collaboration. The acceptable allele and antigen names are the designations recognized by the WHO Nomenclature Committee. For lists of current HLA class I and class II allelges, please go to http://hla.alleles.org and click on "Alleles" at top of page. For more information regarding HLA nomenclature changes, visit their website. The nomenclature changes will be officially introduced in April 2010. Lists of old and new allele names will be made available through the IMGT/HLA Database at http://www.ebi.ac.uk/imgt/hla and will be published in Tissue Antigens.
<urn:uuid:9f4b670b-99bd-4b47-b1c9-853e44e32b29>
CC-MAIN-2022-33
https://www.uclahealth.org/pathology/uic-hla-cell-exchange
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00605.warc.gz
en
0.886887
2,621
2.65625
3
In this section, you will explore the following questions: - What are the functions of the structural components of a neuron? - What are the four main types of neurons? - What are the functions of different types of glial cells? Connection for AP® Courses Much information about the various organ systems of animals is not within the scope of AP®. The nervous system, however, was selected for in-depth study because an animal’s ability to detect, transmit, and respond to information is critical for survival. The nervous system interacts with all other organ systems to coordinate responses. The information in this chapter allows us to apply concepts we explored previously, including structure and function relationships, homeostasis, the movement of substances across cell membranes, cell signaling and communication, and the use of ATP. Nervous systems in animals range from relatively simple nerve nets in jellyfish to a complex brain, spinal cord, and peripheral nervous in humans. (For the purpose of AP®, you do not need to have detailed information about myriad types of nervous systems in other animals. Instead, just focus on the complex nervous system of humans.) The basic structure of the nervous system that reflects function is the neuron, of which there are three types: sensory, motor, and interneuron. A typical neuron consists of dendrites, a cell body, and an axon to detect, generate, transmit, and integrate signal information. Many neurons are surrounded by Schwann cells (a type of glial cell) that form a myelin sheath, which acts as an electrical insulator, like the plastic wrap that surrounds the copper wires in a household appliance cord. The Schwann cells are separated by gaps of unmyelinated fibers called nodes of Ranvier over which the nerve impulse travels as the signal passes along the neuron, increasing the speed of transmission. (As we will learn in the Nervous System Disorders section, some diseases of the nervous system result from the loss of myelin.) Glial cells—often thought of as the “supporting cast” of the nervous system—outnumber neurons and play a role in the development of neurons, buffer harmful ions and chemicals, and provide myelin sheaths around neurons. Most brain tumors are caused by mutations in glial cells. Information presented and the examples highlighted in the section support concepts outlined in Big Idea 3 of the AP® Biology Curriculum Framework. The AP® Learning Objectives listed in the Curriculum Framework provide a transparent foundation for the AP® Biology course, an inquiry-based laboratory experience, instructional activities, and AP® exam questions. A learning objective merges required content with one or more of the seven science practices. |Big Idea 3||Living systems store, retrieve, transmit and respond to information essential to life processes.| |Enduring Understanding 3.E||Transmission of information results in changes within and between biological systems.| |Essential Knowledge||3.E.2 Animals have nervous systems that detect external and internal signals, transmit and integrate information, and produce responses.| |Science Practice||1.2 The student can describe representations and models of natural or man-made phenomena and systems in the domain.| |Learning Objective||3.44 The student is able to describe how nervous systems detect external and internal signals.| |Essential Knowledge||3.E.2 Animals have nervous systems that detect external and internal signals, transmit and integrate information, and produce responses.| |Science Practice||1.1 The student can create representations and models of natural or man-made phenomena and systems in the domain.| |Learning Objective||3.48 The student is able to create a visual representation to describe how nervous systems detect external and internal signals.| Nervous systems throughout the animal kingdom vary in structure and complexity, as illustrated by the variety of animals shown in Figure 26.2. Some organisms, like sea sponges, lack a true nervous system. Others, like jellyfish, lack a true brain and instead have a system of separate but connected nerve cells (neurons) called a “nerve net.” Echinoderms such as sea stars have nerve cells that are bundled into fibers called nerves. Flatworms of the phylum Platyhelminthes have both a central nervous system (CNS), made up of a small “brain” and two nerve cords, and a peripheral nervous system (PNS) containing a system of nerves that extend throughout the body. The insect nervous system is more complex but also fairly decentralized. It contains a brain, ventral nerve cord, and ganglia (clusters of connected neurons). These ganglia can control movements and behaviors without input from the brain. Octopi may have the most complicated of invertebrate nervous systems—they have neurons that are organized in specialized lobes and eyes that are structurally similar to vertebrate species. Compared to invertebrates, vertebrate nervous systems are more complex, centralized, and specialized. While there is great diversity among different vertebrate nervous systems, they all share a basic structure: a CNS that contains a brain and spinal cord and a PNS made up of peripheral sensory and motor nerves. One interesting difference between the nervous systems of invertebrates and vertebrates is that the nerve cords of many invertebrates are located ventrally whereas the vertebrate spinal cords are located dorsally. There is debate among evolutionary biologists as to whether these different nervous system plans evolved separately or whether the invertebrate body plan arrangement somehow “flipped” during the evolution of vertebrates. Watch this video of biologist Mark Kirschner discussing the “flipping” phenomenon of vertebrate evolution. The nervous system is made up of neurons, specialized cells that can receive and transmit chemical or electrical signals, and glia, cells that provide support functions for the neurons by playing an information processing role that is complementary to neurons. A neuron can be compared to an electrical wire—it transmits a signal from one place to another. Glia can be compared to the workers at the electric company who make sure wires go to the right places, maintain the wires, and take down wires that are broken. Although glia have been compared to workers, recent evidence suggests that also usurp some of the signaling functions of neurons. There is great diversity in the types of neurons and glia that are present in different parts of the nervous system. There are four major types of neurons, and they share several important cellular components. The nervous system of the common laboratory fly, Drosophila melanogaster, contains around 100,000 neurons, the same number as a lobster. This number compares to 75 million in the mouse and 300 million in the octopus. A human brain contains around 86 billion neurons. Despite these very different numbers, the nervous systems of these animals control many of the same behaviors—from basic reflexes to more complicated behaviors like finding food and courting mates. The ability of neurons to communicate with each other as well as with other types of cells underlies all of these behaviors. Most neurons share the same cellular components. But neurons are also highly specialized—different types of neurons have different sizes and shapes that relate to their functional roles. Parts of a Neuron Like other cells, each neuron has a cell body (or soma) that contains a nucleus, smooth and rough endoplasmic reticulum, Golgi apparatus, mitochondria, and other cellular components. Neurons also contain unique structures, illustrated in Figure 26.3 for receiving and sending the electrical signals that make neuronal communication possible. Dendrites are tree-like structures that extend away from the cell body to receive messages from other neurons at specialized junctions called synapses. Although some neurons do not have any dendrites, some types of neurons have multiple dendrites. Dendrites can have small protrusions called dendritic spines, which further increase surface area for possible synaptic connections. Once a signal is received by the dendrite, it then travels passively to the cell body. The cell body contains a specialized structure, the axon hillock that integrates signals from multiple synapses and serves as a junction between the cell body and an axon. An axon is a tube-like structure that propagates the integrated signal to specialized endings called axon terminals. These terminals in turn synapse on other neurons, muscle, or target organs. Chemicals released at axon terminals allow signals to be communicated to these other cells. Neurons usually have one or two axons, but some neurons, like amacrine cells in the retina, do not contain any axons. Some axons are covered with myelin, which acts as an insulator to minimize dissipation of the electrical signal as it travels down the axon, greatly increasing the speed on conduction. This insulation is important as the axon from a human motor neuron can be as long as a meter—from the base of the spine to the toes. The myelin sheath is not actually part of the neuron. Myelin is produced by glial cells. Along the axon there are periodic gaps in the myelin sheath. These gaps are called nodes of Ranvier and are sites where the signal is “recharged” as it travels along the axon. It is important to note that a single neuron does not act alone—neuronal communication depends on the connections that neurons make with one another (as well as with other cells, like muscle cells). Dendrites from a single neuron may receive synaptic contact from many other neurons. For example, dendrites from a Purkinje cell in the cerebellum are thought to receive contact from as many as 200,000 other neurons. Types of Neurons There are different types of neurons, and the functional role of a given neuron is intimately dependent on its structure. There is an amazing diversity of neuron shapes and sizes found in different parts of the nervous system (and across species), as illustrated by the neurons shown in Figure 26.4. While there are many defined neuron cell subtypes, neurons are broadly divided into four basic types: unipolar, bipolar, multipolar, and pseudounipolar. Figure 26.5 illustrates these four basic neuron types. Unipolar neurons have only one structure that extends away from the soma. These neurons are not found in vertebrates but are found in insects where they stimulate muscles or glands. A bipolar neuron has one axon and one dendrite extending from the soma. An example of a bipolar neuron is a retinal bipolar cell, which receives signals from photoreceptor cells that are sensitive to light and transmits these signals to ganglion cells that carry the signal to the brain. Multipolar neurons are the most common type of neuron. Each multipolar neuron contains one axon and multiple dendrites. Multipolar neurons can be found in the central nervous system (brain and spinal cord). An example of a multipolar neuron is a Purkinje cell in the cerebellum, which has many branching dendrites but only one axon. Pseudounipolar cells share characteristics with both unipolar and bipolar cells. A pseudounipolar cell has a single process that extends from the soma, like a unipolar cell, but this process later branches into two distinct structures, like a bipolar cell. Most sensory neurons are pseudounipolar and have an axon that branches into two extensions: one connected to dendrites that receive sensory information and another that transmits this information to the spinal cord. At one time, scientists believed that people were born with all the neurons they would ever have. Research performed during the last few decades indicates that neurogenesis, the birth of new neurons, continues into adulthood. Neurogenesis was first discovered in songbirds that produce new neurons while learning songs. For mammals, new neurons also play an important role in learning: about 1000 new neurons develop in the hippocampus (a brain structure involved in learning and memory) each day. While most of the new neurons will die, researchers found that an increase in the number of surviving new neurons in the hippocampus correlated with how well rats learned a new task. Interestingly, exercise also promotes neurogenesis in the hippocampus. Stress has the opposite effect. While neurogenesis is quite limited compared to regeneration in other tissues, research in this area may lead to new treatments for disorders such as Alzheimer’s, stroke, and epilepsy. How do scientists identify new neurons? A researcher can inject a compound called bromodeoxyuridine (BrdU) into the brain of an animal. While all cells will be exposed to BrdU, BrdU will only be incorporated into the DNA of newly generated cells that are in S phase. A technique called immunohistochemistry can be used to attach a fluorescent label to the incorporated BrdU, and a researcher can use fluorescent microscopy to visualize the presence of BrdU, and thus new neurons, in brain tissue. Figure 26.6 is a micrograph which shows fluorescently labeled neurons in the hippocampus of a rat. This site contains more information about neurogenesis, including an interactive laboratory simulation and a video that explains how BrdU labels new cells.MISSING EXERCISE: tag:apbio-ch26-ex004 How does the unique structure of the neuron allow it to detect (and ultimately transmit) incoming signals? The Think About It question is an application of AP® Learning Objectives 3.44 and 3.45 and Science Practices 1.2 and 1.1 because students are explaining how the unique structural features of the neuron allow it to detect information that will be transmitted to other cells, including other neurons Specialized structures of the neuron, such as dendrites, which receive incoming signals and axons, which create outgoing signals, allow it to communicate with other neurons in other parts of the body. While glia are often thought of as the supporting cast of the nervous system, the number of glial cells in the brain actually outnumbers the number of neurons by a factor of ten. Neurons would be unable to function without the vital roles that are fulfilled by these glial cells. Glia guide developing neurons to their destinations, buffer ions and chemicals that would otherwise harm neurons, and provide myelin sheaths around axons. Scientists have recently discovered that they also play a role in responding to nerve activity and modulating communication between nerve cells. Types of Glia There are several different types of glia with different functions, two of which are shown in Figure 26.7. Astrocytes, shown in Figure 26.8a make contact with both capillaries and neurons in the CNS. They provide nutrients and other substances to neurons, regulate the concentrations of ions and chemicals in the extracellular fluid, and provide structural support for synapses. Astrocytes also form the blood-brain barrier—a structure that blocks entrance of toxic substances into the brain. Astrocytes, in particular, have been shown through calcium imaging experiments to become active in response to nerve activity, transmit calcium waves between astrocytes, and modulate the activity of surrounding synapses. Satellite glia provide nutrients and structural support for neurons in the PNS. Microglia scavenge and degrade dead cells and protect the brain from invading microorganisms. Oligodendrocytes, shown in Figure 26.8b form myelin sheaths around axons in the CNS. One axon can be myelinated by several oligodendrocytes, and one oligodendrocyte can provide myelin for multiple neurons. This is distinctive from the PNS where a single Schwann cell provides myelin for only one axon as the entire Schwann cell surrounds the axon. Radial glia serve as scaffolds for developing neurons as they migrate to their end destinations. Ependymal cells line fluid-filled ventricles of the brain and the central canal of the spinal cord. They are involved in the production of cerebrospinal fluid, which serves as a cushion for the brain, moves the fluid between the spinal cord and the brain, and is a component for the choroid plexus.
<urn:uuid:8f549297-b6a6-4b69-a903-4b6a1d1918e2>
CC-MAIN-2022-33
https://openstax.org/books/biology-ap-courses/pages/26-1-neurons-and-glial-cells
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00399.warc.gz
en
0.930537
3,352
3.734375
4
We are searching data for your request: Upon completion, a link will appear to access the found materials. The mountain ash, with names such as “rowan berries” or “thrush berries”, indicates that birds love their fruits. In contrast, the berries are popularly known to be toxic to humans. Wrongly: The rowanberries taste really good only when cooked, but they are not toxic, on the contrary they are very healthy. They contain a lot of vitamin C as well as many phytochemicals and are therefore effective against inflammation and digestive problems. Profile of the mountain ash - Scientific name: Sorbus aucuparia - Common names: Rowan berries, blueberries, bullfinches, blackberries, false ash, cranberry trees, aberesche, quince, stink ash, wielesche, crane bird berries, haweresche, aschitz'n, Schmalkabeer, jewish cherry - distribution: The mountain ash is widespread in almost all of Europe and Western Asia and occurs everywhere in Central Europe. - Parts of plants used: Fruits, formerly also seeds, bark and flowers - application areas: - Inflammation of the skin, the external mucous membranes and the throat - Intestinal inflammation - Prevention of colds and inflammatory diseases of the respiratory tract Rowan - ingredients Rowanberry contains a lot of vitamin C; after the first frosts in September, the fruits taste sweeter, but the content of the vitamin decreases. Provitamin A is also present. Rowan also offers ascorbic acid (0.06 - 0.13 percent for non-bitter fruits, 0.035 - 0.045 percent for bitter fruits) and parasorbic acid, which becomes sorbic acid when dried. Add to that - Tannins (tannins), - organic acids, - Malic acid, - Succinic acid, - Citric acid, - Tartaric acid, - cyanogenic glycosides - and sugar / sugar alcohol (sucrose, sorbitol, etc.). In the semi-bitter fruit, the sugar content is only half as high, while the sorbitol content is much higher. The seeds were previously used in folk medicine, they have an astringent effect. Today, however, this use is discouraged: the amygdalin content in the seeds is high and can be slightly toxic. Effect of rowan berries The tannins contained in the fruit have an astringent effect and help with wound healing and against diarrhea, since they contract tissue and thus contain bleeding. They also contract the intestinal tract, thereby helping to fight inflammation of the small intestine. The tannins or tannins also have a diuretic effect. The fruits of the mountain ash have an excellent anti-inflammatory effect and have traditionally been used here primarily as mus or brew against hemorrhoids. An extract from the bark served as a remedy for inflammation in the genital area. An extract from the rowanberry helps against intraocular pressure in glaucoma (glaucoma). This sorbitol is injected intravenously into the affected region. Rowan - naturopathy For ordinary people in Europe, the rowanberry with its high vitamin C content was above all an important remedy for the widespread scurvy - because this disease, in which the gums rot and the teeth fall out, is caused by the lack of vitamin C. In Central European folk medicine, rowan was also considered an all-round remedy. A porridge from the fruit should stimulate digestion, help against constipation and restlessness in the stomach. The fruits were a remedy for all types of colds, rheumatism and gout. Sorbose in rowan berries used to serve as a sugar substitute in the form of the sorbitol obtained from it, which is also suitable for diabetics. Today the fabric is produced industrially. Folk medicine used mus from the fruit, tea from the fruit and the bark as well as the seeds against liver and biliary complaints such as cirrhosis of the liver, biliary tract infections, biliary congestion, gall bladder infections or gall stones. However, a diagnosis of the respective disease was usually only possible through symptoms such as colic-like pain or pressure in the lower abdomen. Other clinical pictures that were treated with mountain ash were - Problems of the bladder and urinary tract such as urinary stones, bladder and urethral infections, - Gastrointestinal complaints such as constipation, bloating, flatulence, heartburn, intestinal inflammation and diarrhea, - Respiratory complaints such as bronchitis and pneumonia - and glaucoma. A study by researchers from the University of Lodź showed that Sorbus aucuparia showed the strongest antioxidant activity in direct comparison with two related species (Sorbus aria and Sorbus intermedia). For this purpose, 70% methanol extracts from the leaves and fruits of the three species were compared using three in vitro test systems. Rowan showed not only a superior effectiveness, but also the highest value of phenols and thus of all three relatives the greatest potential for natural health products. Rowan - Tree of the Thunder God The mountain ash inspired the mythology of the north. In Germanic cultures it was considered the tree of Thor, the god of thunder, who was called "Donar" in southern Germany - hence our Thursday, Donarstag and Donner. The literary work “Edda” tells that a mountain ash saved the life of God: Thor is said to have plunged into a raging river and was almost drowned when he grabbed a branch of the tree and was able to pull himself up on it. In Norwegian, the rowanberry is therefore called "Thorsbjörg" (Thor's encounter). In German folk belief, a mountain ash in the courtyard as a tree of the god of thunder was supposed to prevent lightning from striking the house. Rowan berries were hung in front of the windows or under the roof structure. Also in the Celts, Sorbus aucuparia was a spiritual tree that grew in sacred groves and in court places. It was a druid plant and they carved its sticks out of its wood. Rowan berries - fruits of the wild hedge Rowanberries are still considered poisonous today, and many parents warn their children not to eat them. But that is not true: rowanberries are not toxic, they only taste raw when raw and bitter before the first frost - this is due to the bitter substances, especially the parasorbic acid. However, this bitter taste disappears when boiled, and the bitter parasorbic acid turns into the milder sorbic acid. The berries ripen in autumn and are widely visible in bright orange to bright red. They can be harvested until October and attract birds just as magnetically as bilks and mice. Hence the common names of the mountain ash such as rowan berries, blackbirds, blueberries or bullfinches, because blackbirds, other bluebirds and bullfinches are among the species that love the fruits. Do not wait too long to harvest the berries, as they quickly disappeared from the stomach of animals. Before you prepare the berries, wash them thoroughly and pluck them from the umbels. With their high content of vitamin C and tannins, the fruits not only promote a stable cardiovascular system and help with colds and indigestion - they also taste good and can be converted into juice, liqueur, wine, jam, mush or sauce. Rowan-leaf and tea In naturopathy, tea is made from the leaves and fruits of the rowan berry. This is used against indigestion, cough, bronchial diseases and gastrointestinal problems and is also said to help with rheumatism, gout and hemorrhoids. Rowan - spreading Rowan belongs to the whitebeams and the rose family. It is a pome fruit and the fruits are reminiscent of tiny apples. The tree is distributed across Europe in several subspecies, from Western Siberia to Spain and from Norway to Sicily and Northern Greece. The tree makes few demands and is considered a typical pioneer plant that quickly settles new fallow land, such as clearings created by logging, abandoned factory premises or embankments on embankments. It is a classic tree of wild hedges, grows in deciduous and coniferous forests, on bog soil and on grasslands. Rowan is one of the most important trees in the forest and garden for birds and small mammals - for the natural garden, it is the number one bird plant and therefore a must-have: for a wild hedge in the animal-friendly ecological garden, you laid the foundation with rowan, sloe and hawthorn. 63 species of bird eat the fruits of the blackberry, thus leading the list of bird food plants - ahead of the elderberry (62 species) and the elderberry (47 species). Particularly important - yes a main source of food - are the fruits of the mountain ash for blackbird, song thrush, mistletoe thrush (plus mistletoe fruits), juniper thrush (plus juniper fruits), robins, starlings and blackcap. At the time of migration, red thrushes and waxwings swarm over the berries. The birds that like to eat rowan berries also include the black woodpecker, great spotted woodpecker, bullfinch, chaffinch, nuthatch and jay, as well as the common crow, carrion crow, magpie, blue tit and garden warbler. Small mammals who love rowan berries are dormouse, dormouse, earth mouse, yellow-necked mouse and field mouse. The leaves, shoots and buds of the trees serve as delicacies for hoofed deer, i.e. red deer, roe deer and wild boar. The rowanberry has a great benefit for forestry, because in beech rejuvenation the bite damage caused by the game is limited. The mountain ash makes a major contribution to biodiversity - in the forest, in the fields and in the garden. (Dr. Utz Anhalt) Author and source information This text corresponds to the requirements of the medical literature, medical guidelines and current studies and has been checked by medical doctors. - Schilcher, Heinz; Kammerer, Susanne; Wegener, Tankred: Guide to Phytotherapy, Urban & Fischer in Elsevier, 2007 - van Wyk, Ben-Erik; Wink, Coralie; Wink, Michael: Handbook of Medicinal Plants: An Illustrated Guide, Wissenschaftliche Verlagsgesellschaft Stuttgart, 2004 - Bavarian State Institute for Forestry and Forestry (LWF): LWF knowledge 17: Contributions to rowan berries (accessed: 7.2.2020), LWF - Olszewska, Monika A .; Michel, Piotr: Antioxidant activity of inflorescences, leaves and fruits of three Sorbus species in relation to their polyphenolic composition, in: Natural product research, 23 (16): 1507-21, November 2009, PubMed
<urn:uuid:71b430ec-4666-4f76-8a23-2859765b0cc2>
CC-MAIN-2022-33
https://gm.sauerandsons.com/2100-rowan-rowanberry-as-a-medicinal-plant.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00002.warc.gz
en
0.939553
2,389
3.1875
3
What is SIEM? Computers, network and security devices, and the applications that run on them generate records called logs that consist of a series of messages in time-sequence that describe activities going on within the system or network. Log data represents the digital footprints of activities that occur within the network or system. These data may be streamed to a central platform which can be reviewed to detect anomalous activities. A Security Information and Event Management (SIEM) provides a single centralized platform for the collection, monitoring, and management of security-related events and log data from across the enterprise. Because a SIEM correlates data from a wide variety of event and contextual data sources, it can enable security teams to identify and respond to suspicious behavior patterns more effectively than would be possible by looking at data from individual systems. The term SIEM was coined in 2005 by two Gartner analysts Mark Nicolett and Amrit Williams when they proposed a new security information system that combines the legacy Security Information Management (SIM) and Security Event Management (SEM). SIEM developed out of a necessity to deal with the barrage of alerts from events emanating from network security infrastructures such as firewalls, endpoint security, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), wireless access points, and other network devices that were overwhelming the IT department. By helping organizations to aggregate and better analyze events inside the network, SIEM helps them improve threat detection. How Does SIEM Work SIEM software works by gathering log and event data generated by various network and security devices and applications such as IPS/IDS, firewalls, and antivirus applications within the organization, pulling them together into a single centralized platform. It then analyzes and sorts the collected data into various groups or classifications such as failed logins, logins from unexpected regions or IP, port scans, exploit attempts, and other malicious activities. When an anomaly is found, the software triggers an alert and defines a threat level based on predetermined rules. For example, someone trying to log into an account from an unusual location or IP address might be flagged as an anomaly. By monitoring a SIEM, security, and incident response teams can spot activities that could identify malicious activities. The SIEM is able to identify potential threats based on correlations of miscellaneous security-related events, which by themselves wouldn’t necessarily provide attack indicators. The security incident response team will determine the plausibility of the identified threats, and where necessary commence remediation measures. The SIEM application supports security teams in two main ways: - Produce reports on security-related incidents and events, such as successful and failed logins, malware activity, and other possibly malicious activities. - Send alerts if analysis shows that an activity runs against set baselines and rules and thus indicates a potential security issue. Why is SIEM Important? Security is achieved via a combination of prevention, detection, and response efforts. Today’s cyber attacks have become much more sophisticated than ever. Prevention is where we first saw mass-market security products and services. The traditional methods of preventing attacks such as firewalls and antivirus are no longer enough. Nowadays, most security failures are more of detection and response than prevention. Intrusion Detection and Prevention Systems (IDS/IPS) alone won’t be able to detect or prevent potential attacks, which is why a SIEM is so essential. A SIEM solution is a great way for organizations to manage their cybersecurity issues, especially in the following areas: Incident detection: A SIEM solution uses correlation techniques and behavior analytics to detect threats and malicious activities in a network. It analyzes the log entries from a variety of sources to unravel incidents that otherwise can go unnoticed. Moreover, since it gathers events from sources across the network, the system can correlate and reconstruct the security events and log entries to identify signs of malicious activity. While a network IPS/IDS, firewalls, or antivirus might detect and prevent some malicious activities and attacks, a SIEM system can determine if, for example, a host on a network was infected with a spambot which then caused it to send unsolicited bulk email spam messages. A SIEM is focused on detecting activities associated with an attack rather than the attack itself. If the SIEM detects any activity involving a known threat, it can then take action by communicating and directing other network security devices, such as firewalls to block or terminate those malicious activities to proactively prevent an attack from occurring. This significantly improves the efficiency of incident handling. Insider threats mitigation: Conventional security measures tend to focus more on external threats. But there are also malicious threats that emanate from inside the organization. It is called an insider threat. Insider threats can prove even more difficult to detect or predict than external threats. The good news is that SIEMs can be configured to monitor and keep a continuous record of user behaviors, privileged and service accounts usage patterns, among others, and create alerts. This is made possible via a modern technique called User and Entity Behavior Analytics (UEBA). UEBA works by aggregating data about the behaviors of users which can then be analyzed for anomalies based on established baselines. Any deviation from established baselines can trigger an alert so your security team can investigate. Regulatory compliance: Regulatory compliance is a big deal in business. Companies spend money where auditors and regulators compel them to, and failing compliance audits could attract hefty fines. It is a necessary but often complicated component of modern business. While the primary purpose of SIEM is to improve threat detection and incident response capabilities, SIEMs can be critically important in helping organizations meet regulatory requirements such as PCI DSS, FISMA, GLBA, SOX, HIPAA, and ISO 27001, and to establish proof that they are doing so. With SIEMs, for example, organizations can easily streamline compliance reporting efforts through centralized logging. Each host that needs to have its logged security events included in reporting regularly transfers its log data to a SIEM server. A single SIEM server receives log data from many devices on the network and can generate rich customized reports that address all of the relevant information required by the various regulatory bodies. Data collection and analytics: As organizations scale up their network infrastructure, the chances of losing complete visibility within the network increases. This indirectly creates “blind or dark spots” within the network. Cyber crooks like to hide under these dark corners to perpetrate their malicious activities. SIEM solutions help organizations gain insight and visibility into what is going on in their networks. The data collected from security event information from across the network are then normalized (reformatted) for consistency, easy correlation, and analysis. This helps to uncover malicious activities on the network, preventing bad actors from concealing their tracks. The landscape of cybersecurity is constantly changing, even as technology advances, and SIEM needs to evolve with it. Many modern threats are now capable of changing their behavior to evade detection. For a SIEM to be effective, it must remain relevant in the face of a changing threat landscape and modern network infrastructure. However, a traditional SIEM solution often lags behind in the face of these modern demands and lacks the capability to produce actionable information. Other issues such as inflexible data sets, and a high number of false positives (high signal-to-noise ratio), among others, contribute to limiting the effectiveness of traditional SIEMs. As a result, security teams may struggle to justify ongoing investment costs such as system management, integration of additional data sources, personnel training, and of course annual license renewal. A modern SIEM should be responsive to today’s fluid network architecture and changing threat landscape, capturing data and generating information that security teams can use as intelligence to detect and respond to potential threats before any damage is realized. Given the limitations of traditional SIEM systems, a demand arose for tools that could provide actionable information while optimizing current and future security investments, and this gave rise to the emergence of next-generation SIEMs. Next-generation SIEM augments traditional capabilities such as event logging, pattern recognition, and alerting with modern technologies such as Security Orchestration Automation and Response (SOAR), User and Entity Behavior Analytics (UEBA), cloud-based analytics, machine learning, and artificial intelligence (AI). SOAR is a growing area of security that next-generation SIEM providers are leveraging to help automate incident analysis and response procedures. Orchestration which is at the core of SOAR technology still involves people. However, there are parts that require automation. The fundamental human-centered decision process has to be aided by technology and that’s what SOAR represents. With SOAR enabled SIEMs, organizations can collect data about security threats from multiple sources and respond to low-level security events without human assistance. Such response activities could include disabling compromised user accounts or blocking ports or IP addresses on a firewall. It also allows organizations to define incident analysis and response procedures in a digital workflow format; alerts from the SIEM systems can prioritize and drive standardized incident response activities. The goal is to improve the efficiency of security operations and response activities. By automating routine actions, SOAR helps security teams to become more efficient and frees up their time for more demanding tasks. Next-generation SIEM can automate and prioritize actions that allow workflow and productivity improvements to organizational security. Positive impacts can be expected in any area in which actions can be orchestrated. Another important feature of next-generation SIEMs is the use of UEBA technology. UEBA solutions use analytics to build the standard profiles and behaviors of users and entities, then activities that are anomalous to these standard baselines are presented as suspicious. This is achieved by analyzing historical data logs collected and stored in SIEM systems to identify patterns of traffic caused by user behaviors, both normal and malicious. UEBA enabled SIEM systems do not take action based on their findings, rather they are primarily intended to provide security teams with actionable insights. UEBA-supported SIEMs can be hugely valuable to organizations in identifying compromised accounts, as well as insider threats. It works by using advanced machine learning and behavioral profiling techniques to identify malicious actors and anomalous activities. Next-generation SIEMs with SOAR and UEBA capabilities are key to identifying hidden threats; they are increasingly being deployed in the cloud to enable organizations to manage and monitor modern hybrid infrastructure (cloud, on-premises, and BYOD systems) as a single entity. |Features and Functions||Traditional SIEM||Next Generation SIEM| |Incidence response||Case management||SOAR| |Threat detection||Static correlation rules||UEBA| |Data collection||Proprietary data management||Scalable security data leaks| |Deployment model||Mostly on-premise||Cloud/hybrid/on-premises| Figure 2.0 Comparison of traditional vs next-generation SIEM Choosing the right SIEM Solution for your Organization With a variety of SIEM solutions such as those from IBM, Intel, HE, SolarWinds, Manage Engine, and even open-source options, choosing the right one for your business and budget can be challenging. Like most network security solutions, not all SIEM solutions are created equal. What fits perfectly from a price, feature, and functionality standpoint for one organization may not fit for another. You need to consider a variety of factors, some of which include: - Is the SIEM solution capable of meeting your organization’s security and compliance requirements? - Can the SIEM supplement existing logging capabilities? - How much native support does the SIEM provide for relevant log sources? - Does the SIEM product provide forensic, data analysis, and automated response capabilities? - Does the SIEM solution possess the capabilities of next-generation SIEM functionalities such as SOAR and UEBA? - Is vendor support available in your region, and to what extent? - What is the total cost of ownership? With the right SIEM solution, your organization can capture actionable information and insight that security teams can use as intelligence to detect potentially malicious activity before any damage is materialized.
<urn:uuid:6a9be025-e9f5-4cbf-8b37-b0b7e7e291b0>
CC-MAIN-2022-33
https://www.comparitech.com/net-admin/siem-guide/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00206.warc.gz
en
0.936748
2,527
3.1875
3
Why STEM fields are our future The idea that technology is the future is not new. Not only is it the future however. It is very much the present and dominates our work, personal and leisure lives in almost every conceivable way. Rapid advancement is what allows us participate in a hobby that most never dreamed possible as a child. Drones are the things of yesterdays science fiction movies. Understanding how they work can be they keys to a bright future. Drones are the stepping stone to STEM fields. What if the commitment (some might say addiction) to flying drones could grant greater insight to your technological self? What if it could give you real, and tangible skills and advantages to your future professional self? Let’s dive into the ways that flying quadcopters has been complimented by all the technical skills I have amassed over the last few decades. For those born young enough to be enjoying this hobby as a child, how it might lead to a brighter future. Drones are the stepping stone to stem fields. They are in general the biggest stepping stone to STEM fields of this generation. What are STEM Fields STEM refers to fields relating to Science Technology Engineering and Mathematics. As we move more and more to a global economy of consumers, and technology continues to permeate our lives. Jobs will continue to move away from traditional fields to these STEM fields. The demand for people with skills, passions and knowledge where these fields are booming as the worlds economies evolve. Technology of the past that can be enhanced by the technology of the future are at a crossroad today. The demand will for these individuals will continue to grow. Scientists, Technologists, Mathematicians and Engineers that are at the core of every major science discovery. They are every major character of science fiction stories that inspire the youth of today. Walk down the hallway of any NASA engineering office and you will see the evidence of Star Trek, Star Wars, Back to the Future decorating the walls and cubicles. According to the Executive Director of STEM Education Coalition in Washington DC, James Brown. “The future of the economy is in STEM, That’s where the jobs of tomorrow will be.” Examples of FPV in STEM fields today The DaVinci Surgical Robot Intuitive Surgical, Inc, has developed one of the worlds leading Surgical Robots. The latest model of which the da Vinci Xi is an incredibly complex and amazing piece of technology. This surgical robot allows a Surgeon to see inside a patient from across the room. What is notable is that the surgeon performs this surgery via a First Person View! They sit at a console where their face rests into a 3D HD vision system. Tiny laparoscopic cameras inserted into small incisions allow a close up view inside the patient. This not only allows for much greater precision and a magnified view of the surgical site. Patients can recover faster due to the small incisions made. Laparoscopic incisions are far less invasive than cutting the entire abdomen open to perform surgery. These amazing robots allow for much less invasive laparoscopic procedures that allow faster recovery and greater precision. I had the amazing opportunity to take one of these robots for a test drive (NOT inside an actual patient), and the FPV feed is truly amazing. The dual HD camera setup allows for an unimaginable fully immersive view with depth perception. The da Vinci EndoWrist instruments allow for manipulation of micro instruments at a level of dexterity few humans could hope to achieve. It is unbelievable how inexpensive our goggle setups are like the HDO and Rapidfire combo. Best of all the system is smart enough to recognize undesired movements or tremors in the hand. It filters out these undesired movements, and does not pass that feedback into actual movement of the instruments. Are these types of filtering beginning to sound familiar? (I wonder what kind of PIDS this thing is using?) ROBONAUT: The Robotic Astronaut In the very late 90’s I was lucky enough to work on the building of the original Robonaut project. I remember running a delivery building to building at Johnson Space Center and seeing a hand sticking up from a filing cabinet. I was frozen in my tracks my mouth a gape, I had never seen anything like it. The hand and forearm was positioned on the cabinet almost exactly the same as the 1991 classic Terminator 2. The following year, I got to work on the project itself. Today, a flight version of ROBONAUT has been created to perform EVA missions on the ISS. This allows an Astronaut to perform tasks outside the station without having to go outside. ROBONAUT can also act as an assistant would to a mechanic or a surgical tech to a Surgeon. He flew to the International Space Station on shuttle mission STS-133. ROBONAUT can operate autonomously and via a First Person View setup. In the early days of Robonaut, off the shelf Sony Glasstron head sets were used, and later larger box style goggles were adopted. In those days, FPV or First Person View was not a common phrase outside of gaming. They referred to this control for ROBONAUT as “Telepresence”. Author, with the first ROBONAUT prototype in the year 2000. Critical STEM skills gained from flying Drones Soldering and Electronics Wiring It is amazing the amount of house hold items I have fixed after getting into FPV vs before. The amount of basic electronics skills one can gain can be extremely helpful, but these skills are truly valuable in many technology and science fields were repair, design, and development are both rare and sought after skills. Drones can be the introductory course that lets you learn while you have fun, which is always an easier learning opportunity than the classroom for both retention and depth of knowledge. This is a key skill that really applies to all STEM fields but especially the Technology aspect. I realized a while back that one of the reasons I took so much to quadcopters is because of the high level of complexity it keeps you engaged. You are constantly learning. Break an arm on your frame? Getting no video, or your drone is twitching on one axis? All involve a series of troubleshooting steps of varying difficulty. If you break it down it is really a union of 3 separate hobbies(building, flying repairing). Because of my career in IT, I tend to try to help people constantly and I just switch into Analyst/Tech support mode and help people troubleshoot. Just as a muscle car enthusiast a few decades ago might have ended up chief mechanic at a high end dealership. Today’s drone pilots may end up in a variety of technology related careers inspired by the learning that started with drones. Developing these skills in a hobby setting can allow extra years of development before ever reaching the workforce. Software configuration, and back end commands Software configuration including back end text commands, iterative adjustments for desired outcomes (ie: experimentation and tuning). One of the skills I have actually seen dwindle in some young people are computer skills. In the 90’s and early 2000’s in order to be “online” and communicating with people throughout the world you needed to have a basic set of computer skills. If you were into music, games, or other electronic hobbies you needed even more knowledge to manipulate software on the front and back ends. Today’s youth are starting to see these skills are fade because all young people need to be connected now is a cell phone. Interacting with Betaflight, Butterflight, Race One, Kiss, BLHeli and the other software needed for Quadcopters offer a learning curve that is steep but satisfying once mastered. It also gets users used to regular updates where new features must be learned, and incorporated into existing builds in order to continue success. Fast reflexes, Fast thinking The ability to think and make decisions at the speed that flying a Drone requires, is an exercise in training your brain to operate on a new level of speed. Adaptive fast learning, and fast thinking is a skill that few of us get to practice regularly and this ability is key for working in any STEM based field especially when solving new problems. Drone pilot HungryShark, competes in a local Drone Race Coordinating races, channel assignments, setting up and taking down tracks can help to build valuable project management skills. A well experience race coordinator can be the difference between a race that starts at 10:00 am lasting till 3:00pm or 7:00pm. Pilot Limon, and Drone World Owner James Vau, coordinate Race at Drone World. I have been fortunate to work in careers that have allowed me to work along side Rocket Scientists and Brain Surgeons. Scientists, Technologist, Engineers and Mathematicians all work in very different arenas. But one thing they all share is the thirst for knowledge. Many say that our new generation is crippled by a heavy reliance and obsession with technology. I wanted to point out the ways that these traits if focused in the proper direction can be great assets. We can grow the Scientists, Engineers and Technologists of tomorrow that will make all of our lives better. We can turn their annoying obsessions into training for future discoveries. Growing up the only way I could hope to achieve flight was playing an 8 bit game on a Nintendo Entertainment System. Well, I guess there was that one the time I tried to make a flying suit and ended up in the Emergency room for stitches to my forehead. As early as a decade ago, only hero’s like Pilots, or Astronauts could ever hope to fly. Today, anyone with the patience to take on the journey of FPV can achieve that same lofty goal. I am hopeful and inspired that many of the top pilots in the world are teenagers. And I am eager with anticipation to see in the next few decades that great things they do. And I look forward to seeing what future discoveries started from drones the stepping stone to STEM fields.
<urn:uuid:8966e665-33c5-40bf-bb84-2d25c40eaa26>
CC-MAIN-2022-33
https://www.getfpv.com/learn/fpv-essentials/drones-are-the-stepping-stone-to-stem-fields/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00405.warc.gz
en
0.951934
2,075
2.765625
3
Books. Chocolate. Fruit. Bubbles. On the surface, all of these things seem incredibly ordinary. Mundane, if you will. But what if the extraordinary could be found in the ordinary? What if, by using a little imagination, you could raise these seemingly mundane, insignificant things to a level that no one could ignore? What if you could raise them to a place where everyone would recognize them for years to come? What if all it took was a little imagination? I wonder if Roald Dahl ever asked these questions to himself as he sat writing, allowing his imagination to spill out through his pen onto paper and bringing his readers along on adventures that most would never dare to dream possible… Think about it: Who else would have imagined that giants blowing bubbles would create pleasant dreams for children? Who else would have dreamed up a tasty, inventive chocolate factory run by tiny men from deep in the jungle? Who else could have thought that a 5 year olds would be able to understand Charles Dickens? Who else could have imagined that insects could grow to sizes bigger than humans and befriend humans? Roald Dahl combines humor, real life, fantasy, and a great dose of imagination to create this beautiful blend of wonder, silliness, and incredulousness. Yet he makes it so relatable to each and every person. He writes for children about children who have to overcome unbeatable odds. On the surface it seems that the odds are stacked so high against his characters that there is no way that the circumstances can be overcome. Yet, there is a hopefulness that threads its way through his writing – an optimism that cannot be denied. Yes, there is undeniably a great deal of imagination that comes through his writings. Yet at the same time, as you read his works, it seems possible that the impossible could happen! This isn’t a glossed-over version of reality that everything just works out okay, but his characters work through trials and learn and grow even as they walk through incredible, seemingly impossible situations. While the title might seem odd, ‘The BFG’ tells the story of a young girl’s encounter with the Big, Friendly Giant. Sophie is what you might deem your average child that sees something extraordinary – giants coming and blowing bubbles of pleasant dreams into the windows of children. A grand adventure follows where Sophie is included into the world of the Big, Friendly Giant, learning a great many things along the way. My daughter just recently read this book and, while it took her a chapter or two to really get into the story, she fell in love with the book! The writing, the story, the silliness drew her in to the point where every time I saw her for the next two days, she was reading ‘The BFG.’ In her own words, “I love it! I really like where the BFG goes with Sophie to capture dreams. It inspires me to use my imagination more than I already do!” James and the Giant Peach Upon reading the first few pages of ‘James and the Giant Peach,’ you might think that the story will be a downer. A small boy, living with his two aunts that really don’t want him to be around, with no one to play with and no one to talk to…it has all the elements of a heart-wrenching story. Until you are introduced to the magic of the small, moving, green stone-like crystals. These magic crystals changed James’ life forever, taking him on adventures that no one would have dreamed – not in a carriage or a boat or on horseback, but in the most inconceivable way possible: in a Giant Peach. But what makes an adventure better? An adventure with friends! James meets the loveliest, most incredible, unforgettable characters that become his unplanned companions on his adventure. These wonderful characters, each with their own flaws, quirks, and endearing natures become true friends for James, the boy who had no friends. This is the story of a boy who is smart, funny, and open-hearted; a boy who is willing to make new friends – unconventional though they may be – and learn from them just as they learn from him. It is a story of adventure and thrills, a story told in words and in rhyme, an unforgettable, unplanned trek rolling across land and floating across oceans, flying across cities and countries. A story that opens the heart and imagination of all who read it no matter your age. What’s not to love about a spunky little girl who overcomes unbeatable odds and excels at what she does? Especially as she reads the whole time that she does it! When you see a book, you don’t automatically think that it is a vehicle that can propel you to a place outside of your current situation. Yet, for one girl named Matilda, books were the key, the catalyst, the motivation, and the love that propelled her beyond the circumstances that she was experiencing and into a world that could only be believed in the realm of books. Matilda is a paradox. She was practically forgotten by her family, but found her family in the world of books. She leaned to read at an extremely young age and began to immerse herself into a world beyond her own. She had a huge capacity to learn and understand things and used that to achieve heights of knowledge that no one could ever have dreamed. One of the things that I like best about Matilda is that she always stays positive. She never allows the circumstances surrounding her to drag her down or to determine how she acts. Oh, to be sure she does get hurt by people. She does feel sadness and frustration, but she does not allow those feeling to dictate her own actions. She shows remarkable maturity for her age. Even when the family that she was born into does not understand her, she seeks out people that do understand her: the librarian who takes Matilda under her wing and guides her reading, Miss Honey who challenges, encourages and loves her, her friend Lavender who sticks by her showing her what true friendship looks like. Matilda mingles a rare combination of brilliance and humility that is hard to find in anyone – let alone a small child! Yet, it is this brilliance and humility that allows her to rise above her circumstances and change what she can about them. She refuses to settle. She refuses to allow others to tell her what she “should” do, but at the same time, she is not an obnoxious, disobedient child. Matilda is the perfect blend of spunk, wit, intelligence, and humility! Charlie and the Chocolate Factory Have you ever had a dream that is so delicious that you can almost taste it? A dream filled with chocolate, toffee, creams, mints, marshmallows, and caramel? A dream where you are almost glad that it is dream because if it was reality you would really want to eat it all? Happily, Roald Dahl imagined such a place: A chocolate factory run by an extraordinary, inventive man names Mr. Willy Wonka. And he takes his readers around this magnificent factory through the eyes of little Charlie Bucket, a boy who has faced extremely hard circumstances all his life, yet a boy in whom hope shines bright thanks to the love of his family. Unconventional as his family may be, Charlie has no doubt that he is loved deeply by them and that knowledge brings out his kindness, love, and generosity towards others. Everyone wants Charlie to win. You almost can’t help yourself as you read through these chapters. And when he does win the golden ticket to tour Mr. Wonka’s factory, you can almost hear the cheers from the readers throughout the years as excited for Charlie as he and his family are! Bring on the imagination, the seemingly impossible, the rivers of chocolate, the flowers of candy as Charlie and Grandpa Joe are guided through the chocolate factory. The adventures and inventions that they encounter there will stick with you throughout all your life. The unforgettable people that they tour with and the Oompa Loompas that they meet will remain in your memory and make you smile years after you have set down the book. But instead of leaving that book on the shelf, those memories will drive you to pick up ‘Charlie and the Chocolate Factory’ once again and read it anew. To read the plight of Charlie, to read the rhyming songs of the Oompa Loompas, to read the stories of the other children, and to read the genius of Mr. Wonka. Beauty in Simplicity The pure, brilliant genius of Roald Dahl comes through in this: His books are children’s books, yes. However, they are not only books to be enjoyed by children. They are books to be enjoyed and gleaned from no matter the age of the reader. They are books that bring humor to unpleasant situations, imagination to ordinary situations, and rhyming song to enhance the memory of potentially forgettable situations. In short, Roald Dahl was a genius who gave the world an incredible gift by sharing his imagination through the words of his books and proving to the world that the key to happiness often lies in the small and simple things of life. - How to Make Reading Fun and Interesting - The World of Narnia and the Lessons to be Learned There - Exploring the Excitement that Makes the Mystery: The A to Z Mystery Series - How To Do More Than Read The Little House Books - Adventures and Mystery Await in the National Parks: The National Park Mystery Series Elizabeth Tatham, founder of Inspiration in the Everyday, is a homeschooling momma of 5 who loves helping other homeschooling mommas create a unique homeschooling adventure your kids will love…without the overwhelm! Join in on the journey with 7 simple steps to make your homeschooling day go faster, easier, and with less tears here.
<urn:uuid:44f9c8b3-af41-433d-89fc-867b4d006021>
CC-MAIN-2022-33
https://inspirationintheeveryday.com/roald-dahl/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00404.warc.gz
en
0.973522
2,079
2.625
3
In life, there are always obstacles and challenges that we will have to face head-on if we want to achieve our goals. And those issues are not easy. So, often we give up too easily when things get tough. We allow our fears and doubts to get the best of us, and before we know it, we have talked ourselves out of what we wanted. But with real commitment, that is not an option. We will do whatever it takes to reach our goals because we are determined to succeed no matter what. What is a commitment? In short, a commitment is to sacrifice your desires to do something else you care about more. A commitment is a pledge to do something. It can be a formal or informal agreement and can be made with yourself or with another person or group of people. A commitment at work is a promise to do something or act in a certain way. Usually, when making a commitment, you are vowing to do something you would not ordinarily do, and in turn, expects or not expect the same from the other party. Every commitment you make strengthens your character and helps you grow as an individual. Some commitments might be hard ones that take demanding work and determination, while others may be easier but are still important. Why commitment is important? In a personal sense, being committed to something (anything) can provide a feeling of purpose and fulfillment. It can give our lives direction and meaning and help us stay focused on what is important. Commitment also breeds discipline, which is essential for achieving any major goal. And, when we are deeply committed to something, we will do whatever it takes to see it through — no matter how difficult or challenging the task may be. From a professional standpoint, commitment is equally vital. Without it, there is no foundation on which to build trust with your team members, customers, co-workers, or boss. Professional commitment is the emotional connection an employee feels to their job and the workplace. When employee is committed to their jobs, they put in the extra effort to do their work on time and to a high standard. Professional commitment inspires others to trust one another which is key for teamwork. When people depend on each other to get the job done, commitment becomes vital. What are examples of commitments? Commitments can be small or large, easy or difficult, but all are important. Whatever they may be, each is valuable in making you a better person. Here are 15 examples of commitments at work that you can draw inspiration from: 1. Feeling happy to be at work One of the commitment examples is being genuinely happy to be at work first thing in the morning, welcoming colleagues with a smile, and the expectation of working together. Not everyone is thrilled to go to work first thing in the morning, but at least act like you are. You do not have to be miserable or disgruntled. It is great to be enthusiastic and happy at work, and it is especially important to show your commitment by being one of the first people in the office in the morning. Greeting your co-workers and being polite and professional sets the tone for the day. It shows that you are committed to your job and take it seriously. That sends a signal to your co-workers and supervisors that you take your job seriously and are ready to work hard. 2. Working hard beyond necessary A commitment to work ethic is the willingness to work hard beyond what is necessary. It can be something simple like staying late at work, or it could mean sacrificing your time to do something. Being dedicated to your work ethic shows that you are committed to the tasks you undertake, whether they are personal or professional. You can make a difference in your work by simply doing more than expected. A commitment to working hard separates the good from the great in any field. Having talent means nothing if you cannot push yourself through any obstacle and work your way to the top. 3. Apologising for making a mistake An apology is an act of commitment. When you apologize, you are pledging to do better in the future. You are sacrificing your pride to mend a relationship or situation that has gone wrong. It takes courage to admit we are wrong, and by doing so, you signal that you are willing to do whatever it takes to collect a mistake or repair the relationship. By doing this, you show that you want to put the needs of others before your own and that you can take responsibility for your actions. 4. Coming to work while dealing with a personal crisis Continuing to work even when you have a major personal crisis going on in your life — a relative is sick. Some people will take compassionate leave for these reasons, but some will continue to work regardless of the challenges they are going through at home. That is because they feel an obligation to their job. They commit themselves to the work by working while dealing with something difficult in their personal life. 5. Thanking people for their constructive criticism When someone accosts you with criticism or offers advice, be receptive and thank them for their input. Let them know that you appreciate the information and put feedback into your work. Thanking someone for the feedback shows that you respect the person even if you might not agree with everything they said. It also demonstrates a commitment to your work and willingness to get better at it, which will make it more likely that they will approach you with more suggestions or critiques in the future. That shows you are open to constructive criticism, are willing to put in the work necessary to improve your job performance, and are committed to doing so. 6. Giving credit to others without expecting praise It is a commitment to give credit to others without expecting to praise yourself and show your integrity in the workplace. It is an expression of humility and respect and shows that you are committed to the team and its success, rather than seeking personal recognition or accolades. It also sends the message that you believe in a collaborative effort and that everyone on the team is important. This type of behavior builds trust and collaboration among co-workers, leading to a more productive work environment. Read more: 16 Character Traits of a Hard Worker 7. Cancelling personal plans if it is better for the company Canceling personal plans can be a difficult decision to make. But there may be times when canceling your plans is better for the company than for you personally. When you put the company first, it shows your commitment and dedication to your work. It sends the message that you are flexible and willing to make sacrifices for the good of your team or the company. And finally, it shows that you are team-oriented and who put the needs of others before your own. 8. Doing overtime without expecting compensation It is a sign of commitment whenever you put in extra hours at work without expecting compensation. This shows that you want the company and its success. It can also be seen as a sign of trust since the company relies on the employee to take on more work without any added compensation. It is a gesture that proves the employee’s loyalty and dedication to the company. 9. Taking on an unfamiliar assignment When your boss comes to you for help on an unfamiliar assignment, it can be tempting to say no. You are not familiar with the task or already busy with your work. However, saying no in this situation sends the wrong message — it shows that you are not willing to help your manager or the team. It may not be something you are familiar with, but that does not mean you cannot learn quickly and jump in with both feet. You learn something whenever you work on new assignments. The key is to be proactive and ask questions if you do not understand something. Sticking your neck out for the boss can also pay off in other ways. For example, if there is ever a time when you need help from that person, they are more likely to be responsive since you have already shown your commitment and willingness to help. So, while there may be some inherent risk in taking on an unfamiliar task, the potential rewards make it worthwhile for any committed employee. 10. Take on a role you are overqualified for Accepting to take on a role in which you are overqualified but showed commitment by being willing to take on more responsibility, with the understanding that you will have an opportunity later to advance again. Some people do not want to take a role that does not fit their skills or abilities. Also, accepting to cover a position of higher responsibility but with little or no increase in compensation. Taking on extra responsibility can lead to advancement opportunities down the road, especially if it is done voluntarily and not because someone else asked you to do it. This is one example of how someone commits themselves to the organization. Read also: 12 Examples of Resilience at Work 11. Commit to self-improvement A commitment to self-improvement is a pledge you make to yourself to be the best person you can be. It is believing in yourself and working towards being better personally and professionally. As you go about your day-to-day life, many different experiences can teach you something new or help you become better at what you do. If there is a new challenge you want to take on, do not sit around waiting for it to come your way. Commit to learning it on your own. You will learn more by your own, and you might surprise yourself when you discover you are capable of more than you ever knew. 12. Coming in on your scheduled day off Coming in on my scheduled day off just because there is work that needs to do shows a level of dedication and is admirable. When there is no pressure for you to come in and the only reason you will do it is that you feel obligated to your co-workers and want to help them out, this is an example of showing commitment. It is your attitude towards work that determines your level of commitment. If you are committed to your job, you will come to work regardless of the situation. And it will have a positive impact on everyone around you. 13. Volunteering to take on tasks outside your role Volunteering to take on tasks outside your role because no one else wants them – A true sign of a supportive employee is when they do not mind taking on work that no one else wants to do. That could be anything from covering a shift for a co-worker or taking on an assignment that others do not want to do so the team can move faster and more effectively. 14. Staying after work so the rest of the team can finish It shows commitment and dedication to the team when someone stays after work to help everyone else finish. It shows that you are willing to put the team first and not just concerned with your workload. That sort of attitude is appreciated by managers and teammates alike, and it can help to build good relationships within the workplace. 15. Staying committed to unfulfilling work It can be tough to stay committed to your work when it is not what you thought it would be. If you are not enjoying what you are doing, it is much easier to move on to something else. However, there is no guarantee moving on to something else will be fulfilling either. Sometimes we need to be patient with ourselves and accept that what we are doing today might not be the best, but it will surely get better with time. We all experience some dissatisfaction at work. But the people committed to their job get past that quickly and look for ways of making things better. Disappointments are inevitable parts of life, but taking them too seriously or dwelling on them, is not. It is how you deal with those disappointments that determine your level of success. If you can stay committed to your work, even when it is not what you thought it would be, then you may be on the path to achieving Wonderfull things. So, if you want to show your commitment at work, set high standards for yourself and always do your best. Be reliable and ready to help whenever needed. Sometimes we need a little help from others to show our commitment at work, but it is up to us whether we want success. And remember that dedication and hard work are the keys to success. How do you show your commitment in the workplace? Leave your comment in the box below
<urn:uuid:f0ac0136-2613-45b1-a036-f3891de5a89f>
CC-MAIN-2022-33
https://opexmanagers.com/examples-of-commitments/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00405.warc.gz
en
0.965412
2,556
2.75
3
Incandescent lights are basically electric space heaters that give off light as a byproduct. They are VERY inefficient, wasting most of the power they consume as heat. Since lights are one of the biggest power uses in a remote home, pay close attention to what kind you use. If you replace all of your lights with efficient versions, you may be able to get by with fewer expensive batteries and solar panels. You may have noticed that we've made major changes to this page. This is because of new information given to us by some lighting experts regarding lighting efficiency. Our thanks to Don Klipstein and Victor Roberts for the engineering lessons... Otherpower.com's lighting recommendations in a nutshell: For best efficiency, use fluorescents of any type. Install standard fluorescents in workspaces where you can stand the blue-tinged light, hum and flicker. Use compact flourescents in living spaces for a more 'friendly' ambiance. Use halogen lighting for outdoor applications where temperature causes problems with fluorescents. Use white LED lighting for applications that normally use dismally-efficient small incandescents...task lights, nightlights, pathway lighting, exit signs, and flashlights. Don't use incandescent lighting at all if you can afford to avoid it. Lighting Efficiency Ratings A standard way of rating lighting efficiency is in lumens per watt--this figure accounts for all of the light produced by a bulb. This rating does not necessarily reflect how much usable light is is thrown on your work area. The reflector and fixture will have a large effect on this. So be sure to read our guidelines for each type of lighting discussed below--lights that show a lower efficiency may still save you energy depending on the application. Be aware of the different ways that lighting efficiency can be represented. For example, there's a big difference between two common LED manufacturer's efficiency specs -- some show only lumens per watt of light output, while others show lumens per watt used by the LED. The latter is useful information, a true efficiency rating. The former does not include power wasted as heat, and is useless for evaluating lighting in an off-grid home. But wait! What about all the white LED high-efficiency claims that are all over...including the claims that used to be on this site? - 32 watt T8 fluorescent--85 to 95 lumens/watt - standard F40T12 cool white fluorescent--60-65 lumens/watt - compact fluorescents--low 30's to low 60's lumens per watt, usually 48-60 - UPDATE 2012 -- The newest white LEDs shipping from manufacturers in 2012 are approaching the efficiency of compact fluorescents, into the 50-60 lumens/watt range. At this time, however, there are no RE lighting products that use these new LEDs, and they remain extremely expensive. Manufacturer's research labs are also reporting new white LEDs that approach the 80+ lumens/watt of T8 fluorescents. However, these products are not shipping yet. - T3 tubular halogen--20 lumens/watt - white LED--15-19 lumens/watt - standard 100 watt incandescent--17 lumens/watt - incandescent night light bulb (7w)--6 lumens/watt - incandescent flashlight bulbs--dismal, less than 6 lumens/watt Unfortunately, much of this information is incorrect. Comparing the efficiency of a white LED light with a compact fluorescent by measuring the intensity of a tiny spot within the beam does NOT give proper efficiency results. We got much of our data for efficiency claims from an article in Home Power Magazine (click here to see this testing article) and in literature from LED distributors. The problem? All of the light from our LEDs is concentrated in a 20 degree beam, while the incandescent and compact fluorescent lights were tested without fixtures...and most of the light they produced was never measured in the test, since it sensed only light falling on the sensor. It's OK to compare different lights by how brightly they illuminate a certain size area...but put a reflector behind the compact fluorescent and incandescent bulbs in the test rig and the data would change significantly. Therefore, while the LED lights in this test may illuminate a small area as brightly as other lights, they are NOT significantly more efficient. LEDs can still be a good choice for illuminating your workbench, for example, as long as the light cast onto your small work area is as bright as you need--in this case your LED light could be a good investment for saving power, especially if your old incandescent fixture is also lighting the rest of the room where you don't need the light (like in the Home Power experiment link above). If you try and light an entire living room with an LED fixture, though, you are not saving much--in that case you want a wide dispersal of light, and a fluorescent fixture would be the hands-down winner for efficiency, cost and practicality. Another thing to keep in mind--notice that with current commercial lighting products, the smaller the incandescent bulb, the less efficient it is. For small-sized and lower-light-intensity applications such as task and reading lights, pathway lighting, exit signs, and flashlights, LED lights will be much more efficient than the equivilant small incandescent. This is because fluorescent light products in these small sizes are not available commercially. We are currently researching remote power applications for small cold-cathode fluorescents, which are commonly used to backlight LCD screens. We hope to have more information about these lights soon, though they are still significantly larger than LED products...too big to use in anything smaller than a very large flashlight. Don Klipstein's LED news page is an excellent place to keep track of the latest developments in LED technology. Despite our new information regarding white LED efficiency claims, they are still VERY useful in certain applications. They are an excellent, efficient replacement for the terribly inefficient SMALL incandescent bulbs found in task lights, nightlights, pathway lighting, exit signs, and ESPECIALLY flashlights. As the amount of light needed gets larger (lighting an entire room, for instance) LEDs are only marginally more efficient than a 100 watt incandescent--but a nightlight made with white LEDs is almost three times as efficient as the incandescent it replaces. Also, if run at recommended current levels, LED lights should last tens of thousands of hours, a huge improvement over other lighting technologies. They are also very shock and cold resistant, perfect for portable and outdoor applications. Groups of 3-9 white LEDs are effective as reading lamps. 3 of our white LEDs running together use only 0.22 watts! Single white LEDs make great pathway lights, and can be left on all the time. Flashlights can be easily converted to use LED bulbs...this is probably the best application for them. Converted LED flashlights have become my favorite lights for fire/rescue and wildland firefighting, since the batteries last 6 times longer, I've never replaced an LED bulb, and light output is more even, though slightly dimmer than the original. These lights were a huge advance in energy efficient lighting--very efficient, with 10 times longer life than an incandescent bulb. Plus, the light quality (color temperature) is much warmer than normal fluorescents, they fit in most normal light fixtures, and flicker is hardly noticable. Models are available for any application, including spotlights with reflectors. We highly recommend these lights in both 120 volts AC and 12 volts DC models. The AC versions are available at any hardware store and are very inexpensive for efficient lights ($8 to $15 each). DC compact fluorescants are more expensive because of limited demand for 12 volt ballasts, but only the ballast is different for AC and DC compact fluorescents--the bulbs are the same! We may soon offer interchangable compact fluorescent bulbs and ballasts for both 12 volt DC and 120 volt AC systems. Currently, interchangable parts are available from various RE suppliers. The only drawbacks to keep in mind for compact fluorescents are 1) they are not very bright at cold temperatures, and 2) the quality of light is still not as good as halogen or incandescent bulbs. I personally use 12 volt DC halogen bulbs for reading lights, while lighting whole rooms with compact fluorescents. These really are a very good, energy efficient method of area lighting, and are widely available. They are the most efficient room light available. Problem is, the quality of light is very irritating to some people. It's too blue, and some of them flicker (depends on the ballast design), which is extremely annoying to me. Perhaps this is a reaction to my lifelong aversion to large office buildings with windows that don't open! But fluorescents make great energy efficient lights for shops, garages, etc. where you don't have to spend too much time in the winter. I also use them for under-cabinet countertop lights in the kitchen. These bulbs are only about 15% more efficient than standard incandescents, but are available in 12 volt DC versions. They were a lifesaver for our house--the inverter doesn't have to run to use them, they are more efficient, and the quality of light is excellent for reading or any other use. They fit in ALL standard light sockets, so the monetary investment is low. AC versions are available anywhere, and are still more efficient than standard bulbs. They give out lots of light even in an outdoor situation where its 25 degrees below zero, and last almost 3 times longer than incandescants. We hope to offer 12 volt DC Halogen bulbs for sale on our products page soon, as they are difficult to find--even most RV shops don't carry them, only the innefficient 12 volt incandescents. They give out more heat than light. Only 40 cents each, or lots more in 12 volt versions. Popular electricity wasters, seen in almost every grid-connected house. Edison's invention changed the world, but much more efficient lights are available now. Besides, EDISON HAD GRID POWER! Amory Lovins of the Rocky Mountain Institute calculated that replacing a 75 watt incandescent lightbulb with an 18 watt compact flourescent (that gives the same amount of light) would, over the lifespan of the new bulb, prevent the emission of about 1 ton of carbon dioxide and 8 kilograms of sulpher dioxide into the atmosphere, plus a huge savings on electricity cost. And, the compact flourescent will last over 10 times as long. A real technological innovation a hundred years ago, these lights are still effective today if you have no electricity and some propane or gasline to burn. Humphrey has been making these lamps for 92 years, they are available from Jade Mountain, Lehmans, and certain Amish catalogs. They make some noise, but not too much. Coleman lanterns are another familiar gas light--they use white gas that is vaporized in a heated generator tube. These are VERY noisy! Also, the mantles in these lights (and in kerosene mantle lamps) are treated with radioactive thorium--it doesn't pose much of a hazard, but don't carry mantles in your pocket! The thorium from lantern mantles can be used to contruct a home built lightning detector for fun or experiments--see our plans on this website. The Aladdin mantle version of these (with the tall glass chimney) produces lots of light and heat, more than enough to read by. Regular kerosene lamps produce enough to read by, barely, but are much brighter than a candle. But most of us up here spent at least a year with ONLY kerosene for lighting, and it sure beats a candle or nothing! Be careful of the fire hazard--don't burn these lights unattended. Even off-grid systems can fail at the worst possible time, and the utility grid experiences frequent failures. It's very handy to have automatic emergency lighting near the critical areas of your home, especially the power control center. And in the USA, most businesses (no matter how small) are required to have emergency lighting systems so that people can safely exit the building during a blackout. There are various systems available that use self-contained batteries and efficient CF or LED lights, but batteries fail over time too. Recent technological developments have made Self-Luminous Emergency Lighting possible, with no batteries or electricity involved. Both versions of these lamps are very handy to have around, and have at least a 25 year life span.
<urn:uuid:b659f59d-128a-4b0e-9d50-13cc00845a3b>
CC-MAIN-2022-33
https://www.otherpower.com/otherpower_lighting.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00003.warc.gz
en
0.934322
2,646
2.765625
3
Last Updated on June 19, 2019, by eNotes Editorial. Word Count: 324 Roethke's poem is rife with double meaning. On the surface, it seems to be about a graceful woman, "lovely in her bones," but on closer reader, the relationship Roethke describes is perhaps not as idyllic as one might think. The poem can also be read as a commentary on the nature of poetry itself, and its ability to capture the woman's "bright shapes." The poem consists of four seven line stanzas with an ABABCCC regular rhyme scheme. This regularity of form is contrasted with an irregular meter, and lines are often interrupted in the middle with commas that function like ceasuras ("Love likes a gander, and adores a goose: / Her full lips pursed, the errant note to seize;"). This gives the poem a kind of halting, or swinging sound, suggesting both the studied appreciation of the woman, and her graceful movement ("Ah, when she moved, she moved more ways than one"). This back-and-forth quality also mimics the back-and-forth nature of the poet's attitude towards the woman: the poet is clearly infatuated by this woman, but also recognizes that she is the dominant partner in their relationship, intellectually and sexually. The poem leaves little doubt about the double meaning of the "prodigious mowing" the poet and the woman "made," and the entire third stanza can be read as an account of their lovemaking, in which, as the "sickle," she instructs the poet (as the "rake"), who is "a martyr" to the woman's "motion." The woman's lessons in lovemaking can also be seen as a lessons in poetry, in that she teaches "Turn, Counter-turn, and Stand" another double meaning that could refer to sexual positions but also the rhetorical tricks Roethke is using in this very poem—a "counter turn," for instance, is a term referring to the repeating of words in inverse order, a figure Roethke uses himself in the poem to mimic the woman's undulating movements ("she moved in circles, and those circles moved"). Last Updated on May 5, 2015, by eNotes Editorial. Word Count: 484 “I Knew a Woman” (along with fifteen other short lyrics) appeared in a section of Words for the Wind entitled “Love Poems.” This poem was apparently written about the time of Theodore Roethke’s marriage to Beatrice O’Connell (a former student of his), and its speaker is a man very much in love and awed by the beauty of the woman he admires so profoundly. The poem concentrates on the erotic and physical but deals also with larger philosophical issues. Its tone is a subtle mix of the comic and the serious. The poem’s metrical pattern is consistently iambic pentameter, but its stanza form is somewhat unusual. Each of the four stanzas consists of seven lines, and the typical rhyme scheme is ababccc. Actually the first four lines contain no rhyme at all, but later lines (except for line 21) follow this scheme precisely. This movement from complete lack of rhyme to a very regular rhyme scheme parallels the growing harmony between the two lovers. Since the poem’s first line uses a past-tense verb and refers to bones, some readers have assumed that the central female character is now dead. Such a conclusion is questionable. In this case the verb “knew” surely alludes (in the biblical sense) to specific episodes of sexual intimacy and not necessarily to a relationship that has ended completely. Furthermore, the assertion that the woman was “lovely in her bones” may actually be extravagant praise of her enduring beauty. Such beauty is not only skin deep, and it will abide even if she is, in due time, reduced to a skeleton. Thus the poem is a grand eulogy rather than an elegy. In its high praise of a beloved woman, the poem recalls numerous English sonnets in the Petrarchan tradition by such authors as Sir Thomas Wyatt, Henry Howard (the earl of Surrey), and Sir Philip Sidney. (In fact, according to lines 5-6 these “English poets who grew up on Greek” might be worthy of singing the “choice virtues” of Roethke’s lady.) Just as those poems cataloged the physical traits attributed to the ideal woman (eyes bright as the sun, lips red as rubies, hair shining like gold, cheeks like roses, and so on), Roethke’s speaker lists comparable qualities in the one he loves. In stanza 1, for example, this woman’s voice is as harmonious as the song of birds, and she moves about with dazzling grace. Even so, the woman’s beauty and erotic allure are not the only subjects of the poem. In stanzas 2 and 3 she becomes also a skilled teacher, schooling the speaker in the ways of love. These lessons in worldly love lead, in stanza 4, to cosmic insights. Through his relationship with this remarkable woman, who lives in total harmony with the natural world, he acquires more profound knowledge about the cycles of life and his own role in a mysterious universe. Last Updated on May 5, 2015, by eNotes Editorial. Word Count: 585 Roethke’s metaphors are rapidly changing and, in some cases, subject to diverse interpretations. In their complexity and extravagance they are akin to the conceits of John Donne and other metaphysical poets. In stanza 2, for example, several capitalized terms (“Turn,” “Counter-turn,” “Stand,” and “Touch”) establish a sustained comparison. These terms describe the content of the speaker’s lessons in love, and figuratively they suggest movements or positions in a carefully choreographed dance. Dancing is a recurring image in many of Roethke’s poems (see, for example, “Four for Sir John Davies”). Here the various stages of the dance imply a graceful movement through seduction to lovemaking. While Roethke compares lovemaking to dancing, he simultaneously suggests another conceit. The capitalized words denoting dance positions are also technical terms from the sport of coursing, or hunting with hounds. In Roethke’s complex metaphor the seductive woman is both the dog trainer and the object of the hunt. She strokes the speaker’s chin as the keeper of the hounds might pet a favorite dog. She coyly orchestrates the chase by indicating changes in the direction (“Turn” and “Counter-turn”) taken by the hound. In hunting, the term “Stand” denotes the rigid posture of the hound as it locates and points out the quarry, and here the term is also a humorous indication of the speaker’s readiness for lovemaking. The term “Touch” denotes the initial contact between hound and quarry, and Roethke uses it to suggest the imminent union of the two lovers. Finally, the speaker nibbles meekly from the woman’s hand. Just as a faithful dog might gain a treat from its trainer, the man receives the rewards of love. At several points Roethke’s hunting metaphor is sexually suggestive, but its ingenuity prevents it from becoming especially bawdy. To describe the actual lovemaking, Roethke abandons the hunting conceit and shifts abruptly to an earthy agricultural metaphor. Figuratively the two lovers are now engaged in making hay. The sickle is frequently a grim image associated with death, but here it suggests exuberant life—the woman’s erotic power over everything in her path and also perhaps the enticing curves of her body. “Coming behind,” the speaker enthusiastically rakes the mown grass. Here the term “rake” is a triple pun—agricultural implement, dissolute male, and (recalling the earlier coursing metaphor) a dog’s action of following a trail by keeping its nose to the ground. Mowing, especially in Scottish dialect, is a slang term for sexual intercourse, and Roethke slyly reinforces this double meaning in a later poem entitled “Reply to a Lady Editor.” That poem is a comic response to the literary editor of Harper’s Bazaar who had liked “I Knew a Woman” but apparently failed to comprehend its sexual implications. In the later poem Roethke incorporates more Scottish dialect by calling Cupid a “braw laddie-buck.” Along with extravagant metaphors Roethke uses a number of paradoxical statements. Amid energetic sexual activity he observes in the “several parts” of his partner “a pure repose.” Indeed, in line 21 (“She moved in circles, and those circles moved”) he suggests that she is like the primum mobile. In the old Ptolemaic astronomy the primum mobile was the outermost sphere of the universe, which contained all lesser orbits of heavenly bodies and whose revolution was the source of all other celestial movement. By implication then, the woman in the poem is the powerful cause of dramatic action but at the same time she remains the basis of order and stability. Last Updated on May 5, 2015, by eNotes Editorial. Word Count: 111 Bloom, Harold, ed. Theodore Roethke. New York: Chelsea House, 1988. Bogen, Don. Theodore Roethke and the Writing Process. Athens: Ohio University Press, 1991. Bowers, Neal. Theodore Roethke: The Journey from I to Otherwise. Columbia: University of Missouri Press, 1982. Kalaidjian, Walter B. Understanding Theodore Roethke. Columbia: University of South Carolina Press, 1987. Kusch, Robert. My Toughest Mentor: Theodore Roethke and William Carlos Williams (1940-1948). Lewisburg, Pa.: Bucknell University Press, 1999. Malkoff, Karl. Theodore Roethke: An Introduction to the Poetry. New York: Columbia University Press, 1966. Seager, Allan. The Glass House: The Life of Theodore Roethke. New York: McGraw-Hill, 1968. Stiffler, Randall. Theodore Roethke: The Poet and His Critics. Chicago: American Library Association, 1986. Wolff, George. Theodore Roethke. Boston: Twayne, 1981.
<urn:uuid:0406bcf5-c7c3-4dd6-8d7d-6cbff9d8222d>
CC-MAIN-2022-33
https://www.enotes.com/topics/knew-woman/in-depth
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00206.warc.gz
en
0.949756
2,235
2.890625
3
Request copies of records you can order online or use natf form 86 for military service records and natf form 85 for pension records. reconstruction was considered a failure, both north and south. it was considered a failure because there were all papers these charges of corruption. it was considered a failure because of the violence which took place and the inability of the governments to put it down. and increasingly, racism reestablished itself in the north. the american civil war the american civil war took place between, and it involved the northern states ( union) and the southern states ( confederates) that had seceded from the union. the war was primarily due to longstanding friction over slavery. slave or soldier: the appalling destinies of african americans throughout the civil war, and post civil war eras. what was existence like for a slave? what was existence like as an african american combatant? what was the fugitive slave act and how did that affect the african american? explore a big database of【 free civil war essay examples】 all popular types of essays dbq, argumentative, persuasive, analysis & research papers. causes of the english civil war 494 words | 2 pages. the civil war broke out in 1642, and was a war that is within a country, it has many reasons for happening. this essay will explain and categorise the main cause’ s fop the civil war. i will start by listing the genres of events. the confederacy included the states of texas, arkansas, louisiana, tennessee, mississippi, alabama, georgia, florida, south carolina, north carolina and virginia. jefferson davis was their president. maryland, delaware, west virginia, kentucky and missouri were called border states. the civil war is perhaps the papers most studied time period in history of america. though the war was only four years, it would alter the course of history and change american culture forever. among the changes the war caused, the most prominent were the social and economic changes and the largest; slavery. the country was [. an index is available online at the civil war soldiers and sailors system website or on microfilm at selected nara facilities and large genealogical research research papers on the civil war libraries. the cmsr contains basic information about the soldier' s military career, and it is the first source the researcher should consult. essay on american civil war research paper the deadliest war in american history is known as the american civil war killing nearly 620, 000 soldiers and a mass amount of civilians. the war ad this american history research paper and over 89, 000 other research documents. civil war reconstruction. the period of reconstruction began immediately after the civil war and ended in 1877. this era is known for the. civil war research papers based on a extremely attentive themes are far more straight forward than broad themes while swaying professors. select a dissertation for your undertaking, and subsequently use the issues under it to assist you to start the papers topic’ s examination process. read this american history research paper and over 89, 000 other research documents. the american civil war. the american civil war this war was a war of epic proportion. never before and not since have so many. what was a major impact of the civil war? research within librarian- selected research topics on u. civil war from the questia online library, including full- text online books, academic journals, magazines, newspapers and more. list of 12 civil war research paper topics. how ironclads transformed naval combat. lincoln’ s emancipation proclamation’ s influence on the northern democrats. radical generals. significance of the papers mississippi river. get your research paper written by a professional writer. why was reconstruction a failure? the inscription reads, " walter washington williams - - who was recognized by the government of the united states as the last surviving confederate veteran died 1959 at the age of 117 years. the united states was about issues regarding slavery and secession, this is the ultimate site for you! comlists more than one hundred examples of research papers, reports, and essays on virtually every aspect of the civil war imaginable! use our " essay list" button to begin scrolling through a complete index of papers. civil warduring the american civil war, which lasted from, over 620, 000 accounted soldiers were killed. known as the " the first modern war", historians generally agree that the reason for this was because this was a time of transition for the military. provides help for students and educators in the study of american history, especially the american civil war and the american revolutionary war. includes information on term paper and research topics as well as how to study and write about these chapters of american history. conflict between the union ( northern states) and the 11 southern states that seceded and were organized as the confederate states of. | review and cite american civil war protocol. turning point of the civil war - research papers on the turning point of the civil war illustrate that the battle of gettysburg was the battle that caused the major turning point in the civil war. why the north won the civil war – why the north won the civil war term papers looks at reasons for the victory of the union over the confederate army in civil war battles. civil war essay the civil war was the most divisive war in american history. this research paper discusses the major theoretical contributions and controversies related to the civil war research program. first, civil wars are defined conceptually, then operationally. second, major theories focusing on the causes of civil wars are discussed, along with future directions and policy implications. the most important consequence of the civil war was the destruction of lives and property. more lives were lost in the civil war than in any of the nation’ s other wars. there were over 600, 000 military deaths, and in all over a million were killed or seriously wounded. civil war battles research papers overview some of the major military conflicts during the civil war. this is a topic suggestion on civil war battles from paper masters. use this topic or order a custom research paper, written exactly how you need it to be. who was the last confederate soldier to die? the paper will follow a proper format about any. topic related to the american civil war. step 1 – decide on the length of the research paper – the older the students, the longer the paper. however, short but well written research papers from high school students can be just as an important as a learning experience. if you' re writing an academic essay, or any type of essay that requires you to support your claims with evidence and examples, you' ll probably need to do some research. head to your library or go online to find up- to- date sources that provide accurate, verifiable information about your topic. tips for writing an essay. have papers a clear purpose. determine whether your essay is meant to inform or persuade ( you research papers on the civil war can also see persuasive essay) your readers. by doing so, focusing on the central point of your essay won’ t be too difficult. do your research. expand your knowledge on the topic by referring papers to several books and journals. an essay is an explanation on a " specific topic". it consists of three parts: = > introduction ( 1 paragraph) = > body ( 2 or more paragraphs) = > conclusion ( 1 paragraph) to write an essay, we' ll first introduce the topic. after moving to the body, we have to explain the topic in a detail. after we are done with the body, we conclude papers the topic. do you need an essay writing service? we write the best papers! essay writing services are a hot topic in university circles. professors don’ t like the fact that students are hiring essay writers. can they do something about that? they can stop assigning one essay after another, forcing students to find solutions to a problem they. papers many trustworthy writing services are willing to offer essay help. do not be afraid of some of the scam companies. just do good research for reliable service, and you will not regret your decision. the best thing about professional writers is, they have years of experience in writing essays. so, once you hire them, they will read your paper. to provide high- quality custom research paper writing services, we screen every applicant. first, we assess their resume to check for academic background, majors, and gpa. next, we run several rounds of evaluations on their writing samples to ensure they are original and hold no mistakes. image of a pig writing a letter. free vector writing paper clipart writing paper writing paper clip art free free japanese writing vectors free vector writing. three little pigs writing paper. selection of writing paper. this pdf contains four different pages; plain, half lined, wide fully lined and thin fully lined; an early years ( eyfs) and primary school printable teaching resource. print play learn. editions for the writer' s world: essays: paperback published in ), paperback published in ), paperback publis. published by mr essay writer on j. your grade will reflect both the quality of your initial post and the depth of your responses. we have a team of professional academic writers who can handle all your assignments. famous essay writers in the world - receive an a+ help even for the hardest writings. no fs with our high class essay services. give your projects to the most talented writers. heavensfield where hearts, minds and bodies heal wolf homework help; famous essay writers in the world. · [ pdf download] the writer' s world: essays ( 3rd edition) [ pdf] full ebook. browse more videos. download the writers world essays 3rd edition pdf online. How to write a film analysis. wyeescoving walker. pdf the writers world paragraphs and essays books a la carte edition 3rd edition free books. when it comes to learning how to essay on water pollution write better, uwritemyessay. papers net is that company. the writers there are skillful, humble, passionate, teaching essay on water pollution and tutoring from personal experience, and exited to show you the way. what they teach you will help you improve your grades. - iman, 1st year marketing. 29 customer reviews. essay on environmental pollution in 150 words ( pollution essay 1) in the modern world environmental pollution has become a concerning issue as it has been causing a lot of health problems not only among humans but also among animals. due to the industrial revolution from the late 20 th century the environment has been polluted to such an extent that now it has become a global issue. write first paragraph essay. water pollution needs to be stopped. image ref: calexico new river committee water is the main factor that helps. re: english report ( what is the impact of industrialization on water pollution in. pollution of lakes rivers, streams, and oceans has been killing land and water animals for years. bastion 23 expository essays. - important india. the paper " plastic water bottle pollution" is an outstanding example of an essay on environmental studies. Steps to writing a persuasive essay. plastic bottles are a terrible and severe papers threat to the environment. the guardian report shows that 8. 3 billion tons of plastic bottles have been manufactured since the 1950s worldwide. approximately, in a minute, people buy one million plastic water bottles with americans purchasing. How to cite quotes in essay English essay narrative writing Buy powerpoint Private equity business plan Essays on sleep disorders Thesis statistics Pay for papers written when the horrific war started, no one thought that it would be marked as a deadly phenomenon in history. I am always satisfied with the services provided, and what I like the most is the understanding, which had helped a lot. begin your civil war research learn about resources at the national archives for researching individuals who served in the civil war.
<urn:uuid:a61d3f65-adf4-49b3-b655-8dbee7db9b68>
CC-MAIN-2022-33
https://admissionessaywritingservice.com/?research.papers.on.the.civil.war
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00405.warc.gz
en
0.950568
2,476
3.25
3
The roots of Linux can be traced back to the origins of Unix TM . In 1969, Ken Thompson of the Research Group at Bell Laboratories began experimenting on a multi-user, multi-tasking operating system using an otherwise idle PDP-7. He was soon joined by Dennis Richie and the two of them, along with other members of the Research Group produced the early versions of Unix TM. Richie was strongly influenced by an earlier project, MULTICS and the name Unix TM is itself a pun on the name MULTICS. Early versions were written in assembly code, but the third version was rewritten in a new programming language, C. C was designed and written by Richie expressly as a programming language for writing operating systems. This rewrite allowed Unix TM to move onto the more powerful PDP-11/45 and 11/70 computers then being produced by DIGITAL. The rest, as they say, is history. Unix TM moved out of the laboratory and into mainstream computing and soon most major computer manufacturers were producing their own versions. Linux was the solution to a simple need. The only software that Linus Torvalds, Linux's author and principle maintainer was able to afford was Minix. Minix is a simple, Unix TM like, operating system widely used as a teaching aid. Linus was less than impressed with its features, his solution was to write his own software. He took Unix TM as his model as that was an operating system that he was familiar with in his day to day student life. He started with an Intel 386 based PC and started to write. Progress was rapid and, excited by this, Linus offered his efforts to other students via the emerging world wide computer networks, then mainly used by the academic community. Others saw the software and started contributing. Much of this new software was itself the solution to a problem that one of the contributors had. Before long, Linux had become an operating system. It is important to note that Linux contains no Unix TM code, it is a rewrite based on published POSIX standards. Linux is built with and uses a lot of the GNU (GNU's Not Unix TM) software produced by the Free Software Foundation in Cambridge, Massachusetts. Most people use Linux as a simple tool, often just installing one of the many good CD ROM-based distributions. A lot of Linux users use it to write applications or to run applications written by others. Many Linux users read the HOWTOs1 avidly and feel both the thrill of success when some part of the system has been correctly configured and the frustration of failure when it has not. A minority are bold enough to write device drivers and offer kernel patches to Linus Torvalds, the creator and maintainer of the Linux kernel. Linus accepts additions and modifications to the kernel sources from anyone, anywhere. This might sound like a recipe for anarchy but Linus exercises strict quality control and merges all new code into the kernel himself. At any one time though, there are only a handful of people contributing sources to the Linux kernel. The majority of Linux users do not look at how the operating system works, how it fits together. This is a shame because looking at Linux is a very good way to learn more about how an operating system functions. Not only is it well written, all the sources are freely available for you to look at. This is because although the authors retain the copyrights to their software, they allow the sources to be freely redistributable under the Free Software Foundation's GNU Public License. At first glance though, the sources can be confusing; you will see directories called kernel, mm and net but what do they contain and how does that code work? What is needed is a broader understanding of the overall structure and aims of Linux. This, in short, is the aim of this book: to promote a clear understanding of how Linux, the operating system, works. To provide a mind model that allows you to picture what is happening within the system as you copy a file from one place to another or read electronic mail. I well remember the excitement that I felt when I first realized just how an operating system actually worked. It is that excitement that I want to pass on to the readers of this book. My involvement with Linux started late in 1994 when I visited Jim Paradis who was working on a port of Linux to the Alpha AXP processor based systems. I had worked for Digital Equipment Co. Limited since 1984, mostly in networks and communications and in 1992 I started working for the newly formed Digital Semiconductor division. This division's goal was to enter fully into the merchant chip vendor market and sell chips, and in particular the Alpha AXP range of microprocessors but also Alpha AXP system boards outside of Digital. When I first heard about Linux I immediately saw an opportunity to have fun. Jim's enthusiasm was catching and I started to help on the port. As I worked on this, I began more and more to appreciate not only the operating system but also the community of engineers that produces it. However, Alpha AXP is only one of the many hardware platforms that Linux runs on. Most Linux kernels are running on Intel processor based systems but a growing number of non-Intel Linux systems are becoming more commonly available. Amongst these are Alpha AXP, ARM, MIPS, Sparc and PowerPC. I could have written this book using any one of those platforms but my background and technical experiences with Linux are with Linux on the Alpha AXP and, to a lesser extent on the ARM. This is why this book sometimes uses non-Intel hardware as an example to illustrate some key point. It must be noted that around 95% of the Linux kernel sources are common to all of the hardware platforms that it runs on. Likewise, around 95% of this book is about the machine independent parts of the Linux kernel. I have deliberately not described the kernel's algorithms, its methods of doing things, in terms of routine_X() calls routine_Y() which increments the foo field of the bar data structure. You can read the code to find these things out. Whenever I need to understand a piece of code or describe it to someone else I often start with drawing its data structures on the white-board. So, I have described many of the relevant kernel data structures and their interrelationships in a fair amount of detail. Each chapter is fairly independent, like the Linux kernel subsystem that they each describe. Sometimes, though, there are linkages; for example you cannot describe a process without understanding how virtual memory works. The Hardware Basics chapter (Chapter hw-basics-chapter) gives a brief introduction to the modern PC. An operating system has to work closely with the hardware system that acts as its foundations. The operating system needs certain services that can only be provided by the hardware. In order to fully understand the Linux operating system, you need to understand the basics of the underlying hardware. The Software Basics chapter (Chapter sw-basics-chapter) introduces basic software principles and looks at assembly and C programing languages. It looks at the tools that are used to build an operating system like Linux and it gives an overview of the aims and functions of an operating system. The Memory Management chapter (Chapter mm-chapter) describes the way that Linux handles the physical and virtual memory in the system. The Processes chapter (Chapter processes-chapter) describes what a process is and how the Linux kernel creates, manages and deletes the processes in the system. Processes communicate with each other and with the kernel to coordinate their activities. Linux supports a number of Inter-Process Communication (IPC) mechanisms. Signals and pipes are two of them but Linux also supports the System V IPC mechanisms named after the Unix TM release in which they first appeared. These interprocess communications mechanisms are described in Chapter IPC-chapter. The Peripheral Component Interconnect (PCI) standard is now firmly established as the low cost, high performance data bus for PCs. The PCI chapter (Chapter PCI-chapter) describes how the Linux kernel initializes and uses PCI buses and devices in the system. The Interrupts and Interrupt Handling chapter (Chapter interrupt-chapter) looks at how the Linux kernel handles interrupts. Whilst the kernel has generic mechanisms and interfaces for handling interrupts, some of the interrupt handling details are hardware and architecture specific. One of Linux's strengths is its support for the many available hardware devices for the modern PC. The Device Drivers chapter (Chapter dd-chapter) describes how the Linux kernel controls the physical devices in the system. The File system chapter (Chapter filesystem-chapter) describes how the Linux kernel maintains the files in the file systems that it supports. It describes the Virtual File System (VFS) and how the Linux kernel's real file systems are supported. Networking and Linux are terms that are almost synonymous. In a very real sense Linux is a product of the Internet or World Wide Web (WWW). Its developers and users use the web to exchange information ideas, code and Linux itself is often used to support the networking needs of organizations. Chapter networks-chapter describes how Linux supports the network protocols known collectively as TCP/IP. The Kernel Mechanisms chapter (Chapter kernel-chapter) looks at some of the general tasks and mechanisms that the Linux kernel needs to supply so that other parts of the kernel work effectively together. The Modules chapter (Chapter modules-chapter) describes how the Linux kernel can dynamically load functions, for example file systems, only when they are needed. The Processors chapter (Chapter processors-chapter) gives a brief description of some of the processors that Linux has been ported to. The Sources chapter (Chapter sources-chapter) describes where in the Linux kernel sources you should start looking for particular kernel functions. |serif font||identifies commands or other text that is to be typed| |literally by the user.| |type font||refers to data structures or fields| |within data structures.| Throughout the text there references to pieces of code within the Linux kernel source tree (for example the boxed margin note adjacent to this text ). These are given in case you wish to look at the source code itself and all of the file references are relative to /usr/src/linux. Taking foo/bar.c as an example, the full filename would be /usr/src/linux/foo/bar.c If you are running Linux (and you should), then looking at the code is a worthwhile experience and you can use this book as an aid to understanding the code and as a guide to its many data structures. Caldera, OpenLinux and the ``C'' logo are trademarks of Caldera, Inc. Caldera OpenDOS 1997 Caldera, Inc. DEC is a trademark of Digital Equipment Corporation. DIGITAL is a trademark of Digital Equipment Corporation. Linux is a trademark of Linus Torvalds. Motif is a trademark of The Open System Foundation, Inc. MSDOS is a trademark of Microsoft Corporation. Red Hat, glint and the Red Hat logo are trademarks of Red Hat Software, Inc. UNIX is a registered trademark of X/Open. XFree86 is a trademark of XFree86 Project, Inc. X Window System is a trademark of the X Consortium and the Massachusetts Institute of Technology. I was born in 1957, a few weeks before Sputnik was launched, in the north of England. I first met Unix at University, where a lecturer used it as an example when teaching the notions of kernels, scheduling and other operating systems goodies. I loved using the newly delivered PDP-11 for my final year project. After graduating (in 1982 with a First Class Honours degree in Computer Science) I worked for Prime Computers (Primos) and then after a couple of years for Digital (VMS, Ultrix). At Digital I worked on many things but for the last 5 years there, I worked for the semiconductor group on Alpha and StrongARM evaluation boards. In 1998 I moved to ARM where I have a small group of engineers writing low level firmware and porting operating systems. My children (Esther and Stephen) describe me as a geek. People often ask me about Linux at work and at home and I am only too happy to oblige. The more that I use Linux in both my professional and personal life the more that I become a Linux zealot. You may note that I use the term `zealot' and not `bigot'; I define a Linux zealot to be an enthusiast that recognizes that there are other operating systems but prefers not to use them. As my wife, Gill, who uses Windows 95 once remarked ``I never realized that we would have his and her operating systems''. For me, as an engineer, Linux suits my needs perfectly. It is a superb, flexible and adaptable engineering tool that I use at work and at home. Most freely available software easily builds on Linux and I can often simply download pre-built executable files or install them from a CD ROM. What else could I use to learn to program in C++, Perl or learn about Java for free? I must thank the many people who have been kind enough to take the time to e-mail me with comments about this book. I have attempted to incorporated those comments in each new version that I have produced and I am more than happy to receive comments, however please note my new e-mail address. A number of lecturers have written to me asking if they can use some or parts of this book in order to teach computing. My answer is an emphatic yes; this is one use of the book that I particularly wanted. Who knows, there may be another Linus Torvalds sat in the class. Special thanks must go to John Rigby and Michael Bauer who gave me full, detailed review notes of the whole book. Not an easy task. Alan Cox and Stephen Tweedie have patiently answered my questions - thanks. I used Larry Ewing's penguins to brighten up the chapters a bit. Finally, thank you to Greg Hankins for accepting this book into the Linux Documentation Project and onto their web site. 1 A HOWTO is just what it sounds like, a document describing how to do something. Many have been written for Linux and all are very useful.
<urn:uuid:3d4eaaff-4c10-45a8-a574-181632bc6883>
CC-MAIN-2022-33
https://www.linuxdoc.org/LDP/tlk/intro/preface.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00605.warc.gz
en
0.952747
2,948
3.65625
4
Nearly 200 nations pledged to reduce their greenhouse gas emissions under the Paris Agreement on climate change. But how will we know if some don’t follow through? The current inability to verify that a nation has made its promised carbon cuts remains a long-standing loophole that experts say must be closed to make the global pact effective. The National Research Council, representing some of the top scientists in the United States, framed the problem in a 2010 report. It noted that each nation’s basic estimate of its emissions comes from “self-reported national statistics,” many derived from statistical estimates of energy production and consumption. In an introduction to the study, Ralph Cicerone, then the president of the National Academy of Sciences, noted that “in many developing countries these data are not complete or accurate or are not consistently reported.” And other scientists suggest some nations might be tempted to simply change their data rather than make the needed economic sacrifices to reduce emissions that are warming the earth. At the moment, some of the world’s major emitters, including nations in Europe and Asia, are working on a solution to verification that would use commercial airliners carrying new sensors for a process that can measure man-made emissions of carbon dioxide and methane each time they land and take off from a given city. But Pieter Tans, a senior scientist at the National Oceanic and Atmospheric Administration and one of the pioneers of the measuring systems, worries that, so far, “the U.S. is absent in all of this.” Tans, who has led NOAA’s Carbon Cycle Greenhouse Gases group since 1985, suggested in an interview with E&E News that if the United States developed such a system, it would become a valuable political and diplomatic tool. In the United States, it could be used to help prod states to deliver promised emissions cuts. If skeptical nations questioned the U.S. emissions data, he explained, “we can say, ‘OK, here’s the data. You can make your own estimates of U.S. emissions. Go ahead.’” At the moment, nations estimate their annual emissions rates by self-reporting, adding up industry, government and utility inventories of the use of fossil fuels and estimates of emissions from coal mining and oil and gas drilling. It is a process that Tans and other scientists dismiss as mere “arithmetic” because it doesn’t involve more sophisticated, real-time measurements that are now possible. If the United States or other nations demonstrated that an international verification system could work, Steven Wofsy, a professor of atmospheric science at Harvard University, says, the results could also reduce the temptation to cheat. “If people think you know what they’re doing, then compliance gets better,” he said. Tans’ preoccupation with measuring greenhouse gases began in 1972 in a college in the Netherlands where he stumbled across a book: “Inadvertent Climate Modification: Report of the Study of Man’s Impact on Climate.” After reading that, he changed his college major from physics to earth sciences. As a graduate student in 1978, he helped develop a breakthrough that could allow verification to happen. It involves a tracer, a carbon isotope called C-14, that is present in natural emissions of CO2 from plants and animals. It is not present in emissions that result from the burning of fossil fuels, such as coal, oil products and natural gas, that have been stored underground for millions of years. Tests of air samples collected regularly from sensors on commercial aircraft would provide accurate measures of any depletion of C-14 caused by recent emissions from fossil fuels. NOAA and the University of Colorado have spent a decade perfecting ways to collect air samples of CO2 and measure the tiny presence of C-14 in them. According to Tans, it would need 5,000 air samples from aircraft and the ground to develop an accurate picture of man-made carbon emissions in the United States. NOAA already collects 20,000 air samples around the world every year. “We could easily do another 5,000,” said Tans. “It’s not really a big deal for us.” During the last three years, the Obama administration approved a NOAA budget proposal starting at around $5 million a year to analyze 5,000 C-14 measurements each year. So far, Congress has rejected it each year, prompting a paper from Tans and other atmospheric scientists asserting that more frequent reports of changes in emissions levels must be part of a “full court press” of measurements that could provide “ground truth” to correct current difficulties with far more expensive satellite greenhouse gas sensors. “Commercial aircraft sampling would cost-effectively address this need,” the paper asserts. At the moment, the political atmosphere in Washington makes the prospect of a U.S. role in verification dubious. Congress has been cutting NOAA’s climate change research projects, and agency officials say it’s too early to know whether a Trump administration budget would change matters. A CO2 assist from airlines Getting an accurate sample of what’s floating in the column of air hanging over a city has always been a tricky business. NOAA started decades ago by using small aircraft to collect air samples upwind of a given city, followed by downwind measurements. Tans and other scientists wanted to see what was different about a city’s exhalations, particularly the decrease in C-14 as power plants, cars and factories added their plumes of greenhouse gases. Indianapolis was NOAA’s favorite city to measure, a dense circle of population in an otherwise flat, agricultural area. High winds, which can quickly dilute the signature of pollutants in a given sample with outside air, were relatively rare. Los Angeles, with its sprawl, mountains in the east and the wind-whipped Pacific on the west, was often a nightmare to measure. The mountains and coastal weather would sometimes trap columns of stale air over the city and its suburbs. “So the air can sit there for a few days and suddenly, whoosh, it gets flushed out,” Tans explained. Looking for cheaper, more stable and frequent ways to measure pollution and greenhouse gases, NOAA scientists began attaching sample-grabbing instruments to radio and television towers that gave them access to emissions at different levels over the same location, yielding what scientists call a “vertical profile” of the emissions over a city. But tall towers weren’t always available, and scientists began looking more to commercial airlines as the most cost-effective and consistent way to collect data for vertical profiles. NASA started the effort during the 1970s, looking for a global way to track air pollution. Europe revived the approach in the 1990s, launching a program called MOZAIC, which has carried sensors on more than 30,000 flights, many of them by Lufthansa and other European airlines. At the time, other airlines were coming under pressure for their own CO2 emissions. Some wanted to be seen as helping in the fight against pollution. One result was a program by Japan Airlines called “Comprehensive Observation Network for Trace gases by Airliner” (CONTRAIL). That started in 1993, and in 2008, it added more sophisticated equipment to some aircraft to monitor CO2 and methane emissions used on flights in Asia, in Europe and into the United States. Since the Paris Agreement, the European Union has become more aggressive. MOZAIC has morphed into IAGOS (In-Service Aircraft for a Global Observing System). It is funded by the European Commission, which helped develop a suite of new instruments including sensors that sample CO2, carbon monoxide, methane and water vapor. Lufthansa, Air France, Iberia, Taiwan’s Air China and South African Airways joined it, and the emerging group made overtures to U.S. airlines to become members. One American airline, Hawaiian Airlines, is joining IAGOS this year. According to a report by the International Meteorological Institute in Stockholm, IAGOS is preparing six instrumentation packages that various airlines will put on as many as 600 flights per year, flights that would measure 6,000 vertical profiles. “We are encouraged that a number of our members have taken a proactive approach to help gain greater understanding of the current state of climate science,” explained Perry Flint, a spokesman for the International Air Transport Association, which represents 83 percent of the total air traffic in the world. “Commercial aircraft provide scientists a unique high-altitude platform for monitoring real-life atmospheric conditions,” Flint added. ‘Going from research to monitoring’ So far, though, the idea hasn’t really taken off in the United States, although NOAA has an agreement with two airlines to carry sensors that measure water vapor, which is essential for weather reports. Vaughn Jennings, a spokesman for Airlines For America, the major trade association for the U.S. airline industry, said it has never taken a stand on whether its members should carry greenhouse gas sensors. In a statement, Jennings pointed out that his group has signed an international airlines pledge calling for “carbon neutral growth” from 2020 on and technology and biofuel breakthroughs that could cut CO2 emissions in half by 2050. “I would note that U.S. commercial aviation accounts for only 2 percent of the nation’s man-made greenhouse gas (GHG) emissions,” Jennings added. While some space satellites can measure greenhouse gas emissions, they are expensive, depend on computer models and “have all kinds of biases” that make it difficult to reach the precision needed to accurately measure man-made emissions, explained NOAA’s Tans. NASA has recently selected a more sophisticated satellite for a launch in 2022, however, that offers some hope. It is called the Geostationary Carbon Cycle Observatory (GeoCARB), and would hover 22,000 miles in space, rotating with a constant view of most of the Americas. It comes with a bargain basement price (for a satellite) of $166 million over the next five years, partly because it will hitchhike a ride into space sitting in an unused area of a payload carrying a commercial communications satellite. Because GeoCARB will use a computer model, it will still need guidance from aircraft measurements to assure the precision that Tans says NOAA needs to verify emissions from a particular spot or region of the globe. “A dense vertical profile network using commercial aircraft would really allow us to eliminate small biases and let the satellites meet their potential,” Tans said, hopefully. Steven Wofsy of Harvard said, “It would represent a major step forward in the program” for verification that Tans has been developing. Steven Hamburg, a biochemist and chief scientist of the Environmental Defense Fund, says the combination of cheaper satellites and more accurate ground sensors is part of an emerging “revolution” that will help expose the flaws in ground-based inventories and estimates of greenhouse gas emissions. “Think of this as going from research to monitoring,” said Hamburg, who used aircraft and sensor-carrying teams on the ground to prove U.S. EPA estimates of methane emissions from the Barnett Shale, a major oil and gas field in north-central Texas, were 90 percent larger than EPA’s inventories predicted in 2015. When it comes to the Paris Agreement that nations will reduce their greenhouse gas emissions, verification shouldn’t be viewed as a game of “gotcha,” Hamburg asserts. “It’s creating a clarity that changes the nature of the conversation.” Reprinted from Climatewire with permission from E&E News. E&E provides daily coverage of essential energy and environmental news at www.eenews.net.
<urn:uuid:f954b569-d610-455b-bd7e-951a1c0fc039>
CC-MAIN-2022-33
https://www.scientificamerican.com/article/inside-the-quest-to-monitor-countries-co2-emissions/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00405.warc.gz
en
0.952122
2,485
3.421875
3
If you are in the UK and require professional advice regarding your health, the NHS provides a range of services. There are a number of health departments, staffed by a wide variety of healthcare professionals, with some crossover between departments. But what health services are available in the UK and what do the different terms mean? Below is a list of the main terms you'll come across when you visit an NHS hospital in the UK: • Accident and emergency (A&E) The A&E department of a hospital deals with people who need emergency treatment because of sudden illness or injury. Also called casualty or emergency department (E.D). • Acute care Acute care is the hospital-based medical and surgical treatment. • Acute trust Acute trust is the NHS body providing medical and surgical services from one or more hospitals. • Allied health professionals (AHP) These NHS staff offering clinical care who are not doctors or nurses, eg radiologists, physiotherapists and psychologists. Admission refers to when a patient is taken into hospital. • Ambulance service The ambulance service are the people who respond to 999 calls and major incidents, urgent admission requests from doctors, and high-dependency and urgent transfers between hospitals. • Blood-borne virus (BBV) Blood-borne virus is a virus that is carried in the bloodstream. • Bed blocking Bed blocking means when a patient in a hospital bed should be discharged from the hospital either to their own home or to another care setting. • Booking management service (BMS) BMS is part of the choose and book service that lets you change, cancel and book hospital appointments, once you've been referred by your GP. • Caldicott guardian This is a person who has responsibility for policies that safeguard the confidentiality of patient information. All NHS bodies must appoint one. • Care home A care home is a residential home providing accommodation with nursing and personal care. • Care package A race package is after an assessment, this is agreed so the patient can receive the right care for their needs - which may include NHS and social care. • Care pathway These are the guidelines for the entire process of diagnosis, treatment and aftercare for medical conditions - from the patient's first contact with the NHS to the end of their treatment. • Care plans Care plans are written agreements setting out how care will be provided. • Care professional A care professional is anyone involved in providing healthcare or social care. • Care programme approach (CPA) The CPA is coordinated care for people who use specialist mental health services. A carer is a friend or relative looking after a person who is ill, disabled or elderly. • Clinical Commissioning Group (CCG) The CCG are responsible for the planning and commissioning of health care services for the local area that they serve. Led by elected GPs and other clinicians. • Coronary heart disease (CHD) CHD stands for coronary heart disease • Chief Medical Officer (CMO) The CMO is the Government's principal adviser on health and the professional lead for all medical staff. There are four CMOs in the UK, one each for England, Northern Ireland, Scotland and Wales. • Child and adolescent mental health services (CAMHS) CAMHS are services provided for children and young people with emotional, behavioural and mental health needs. • Choose and book This is a method of booking hospital appointments once you have been referred by your GP. You can choose any hospital and the date and time of your appointment. The idea is to book online, although you may have to phone the hospital if they are not connected to the Choose and Book system. • Clinical audit This is a measurement and evaluation by health professionals of the clinical standards they are achieving. A clinician is a general term used to refer to any professional who provides clinical care to a patient. • Clinical negligence Clinical negligence is a breach of duty by a healthcare professional. • Community care This is social care or treatment given to patients outside hospital. • Community health services These are NHS services provided outside a hospital, eg by district nurses, health visitors and community midwives. • Continuing care This is a person's care needs after hospital treatment has finished. • Chief nursing officer (CNO) The CNO is the Government's most senior nursing adviser, responsible for delivering nursing strategy. There are four CNOs in the UK, one each for England, Northern Ireland, Scotland and Wales. • Cardiovascular disease (CVD) CVD is the diseases of the heart (cardiac muscle) or blood vessels (vasculature). • Day care Day care is social support provided in a centre. • Day case admission This is when you are taken into hospital for treatment that doesn't need an overnight stay. • District nurse This is a registered nurse trained to provide nursing care to people in their own homes. eBooking means online method of booking appointments for NHS services, eg via Choose and Book. • Elective admission When a patient is admitted to hospital from the waiting list for treatment. • Emergency admission When a patient is admitted to hospital at short notice because of clinical need. • Elective operation This is when an operation is booked in advance. • Ear, nose and throat (ENT) ENT means anything related to the ear, nose and throat. This is a period of a disease or treatment with a definite start and finish. • Electronic patient record (EPR) EPR is a patient's record, held electronically. • Expert patient programme This is for patients who, with support, can take the lead in managing their own long-term conditions such as diabetes or arthritis. • Family planning clinic (FPC) The FPC is an NHS clinic that offers free confidential advice and information on contraception and sexual health. Some may also offer specialist services such as abortion and rape counselling. • General practitioner (GP) A GP is a doctor who works in a local surgery or health centre, providing medical advice and treatment to patients registered on their list. • Genitourinary medicine (GUM) This related to sexual or reproductive health. • GUM clinic - sexual health centre This hospital department deals with sexual health with doctors who specialise in this area and is usually called a sexual health centre. A health visitor is a trained nurse who has done further training to specialise in the prevention of ill health, particularly for children. • Hospital consultant This is a senior clinician based in a hospital. • Intensive care unit (ICU) The intensive care unit is where very seriously ill patients are looked after in a hospital. This is a patient who has been admitted to hospital for an overnight stay or longer period of time. • Intravenous (IV) IV treatment is administered by injection into a vein. • Measles, mumps and rubella (MMR) MMR refers to the vaccination given for all three diseases. • Modern matron A modern matron is a trained nurse who leads the ward, raises standards of clinical care and helps nurses to undertake a greater range of clinical tasks. These services involve staff drawn from several organisations such as health, social services, education and voluntary groups. • NHS number This is the number used to identify a person within the NHS in England and Wales. These are specialist health professionals who test eyes and prescribe lenses to correct sight problems. Outpatients are people attending hospital for a consultation, advice or treatment, but not staying overnight. • Patient Advice and Liaison Service (PALS) PALS are the NHS equivalent of customer services. • Patient record This is the record of a patient's care and treatment (may be electronic). Pharmacists are specialist health professionals who prepare and sell medicines. • Primary care The primary care services are provided in the community by family doctors, dentists, pharmacists, opticians, district nurses and health visitors. • Rapid response team This team provides emergency care at home. • Royal College of General Practitioners (RCGP) The RCGP is the professional membership body for family doctors in the UK and overseas. • Royal College of Nursing (RCN) The Royal College of Nursing is a membership organisation and trade union for nurses, with over 432,000 members in the UK. • Respite care Respite care provides an opportunity for a carer to have a break; the person being cared for may spend time in a residential home. Road traffic accident (RTA) RTA is when someone is hurt in a road traffic accident. • Secondary care Secondary care is specialist care traditionally provided by hospitals in support of the primary care team. Examples are surgery, specialist medical services and mental health services. • Service user This is another term for a patient. • Social care Social care is non-medical care provided outside the NHS to help vulnerable people such as the sick and elderly to live their lives as fully as possible. Social services are non-clinical support and care services provided by local councils, voluntary organisations and private organisations. A stakeholder is a person or organisation with a direct interest in a service or practice. • Tertiary care Tertiary care is a complex or specialist care provided in a regional or national centre, eg for eating disorders such as anorexia nervosa. • Waiting list This is people waiting to be admitted to a hospital as an inpatient. • Walk-in centre An NHS walk-in medical centre that offers fast access to health advice and treatment, mainly from nurses. They are open to anyone and you don't have to make an appointment. Last updated: 17-10-19
<urn:uuid:1c86a6c6-191b-4699-9877-280e5bbebad5>
CC-MAIN-2022-33
https://www.netdoctor.co.uk/health-services/nhs/a4491/a-to-z-of-terminology/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00405.warc.gz
en
0.946867
2,119
2.9375
3
Often sold as Chrysanthemum leucanthemum. A clump-forming perennial with obovate spoon shaped, toothed, dark green leaves. Solitary flowerheads 1 to 2 inches across with yellow disc florets and white ray florets. They bloom in late spring and early summer. Tolerant of many soils, but do require water in hot, sunny climates. Divide clumps every 2 years or establish plants from seed. Remove and discard spent flowers to prolong bloom period. Google Plant Images: click here! Size: Height: 1 ft. to 3 ft. Width: 2 ft. to 2 ft. Plant Category: perennials, Plant Characteristics: edible flowers, Foliage Characteristics: evergreen, Flower Characteristics: long lasting, single, Flower Color: whites, Tolerances: deer, heat & humidity, seashore, Bloomtime Range: Late Spring to Early Summer USDA Hardiness Zone: 3 to 8 AHS Heat Zone: 1 to 1 Light Range: Dappled to Full Sun pH Range: 4.5 to 8 Soil Range: Some Sand to Some Clay Water Range: Normal to Moist FertilizingHow-to : Fertilization for Annuals and Perennials Annuals and perennials may be fertilized using: 1.water-soluble, quick release fertilizers; 2. temperature controlled slow-release fertilizers; or 3. organic fertilizers such as fish emulsion. Water soluble fertilizers are generally used every two weeks during the growing season or per label instructions. Controlled, slow-release fertilizers are worked into the soil ususally only once during the growing season or per label directions. For organic fertilizers such as fish emulsion, follow label directions as they may vary per product. LightConditions : Full to Partial Sun Full sunlight is needed for many plants to assume their full potential. Many of these plants will do fine with a little less sunlight, although they may not flower as heavily or their foliage as vibrant. Areas on the southern and western sides of buildings usually are the sunniest. The only exception is when houses or buildings are so close together, shadows are cast from neighboring properties. Full sun usually means 6 or more hours of direct unobstructed sunlight on a sunny day. Partial sun receives less than 6 hours of sun, but more than 3 hours. Plants able to take full sun in some climates may only be able to tolerate part sun in other climates. Know the culture of the plant before you buy and plant it! WateringConditions : Moist and Well Drained Moist and well drained means exactly what it sounds like. Soil is moist without being soggy because the texture of the soil allows excess moisture to drain away. Most plants like about 1 inch of water per week. Amending your soil with compost will help improve texture and water holding or draining capacity. A 3 inch layer of mulch will help to maintain soil moisture and studies have shown that mulched plants grow faster than non-mulched plants. PlantingHow-to : Preparing Garden Beds Use a soil testing kit to determine the acidity or alkalinity of the soil before beginning any garden bed preparation. This will help you determine which plants are best suited for your site. Check soil drainage and correct drainage where standing water remains. Clear weeds and debris from planting areas and continue to remove weeds as soon as they come up. A week to 10 days before planting, add 2 to 4 inches of aged manure or compost and work into the planting site to improve fertility and increase water retention and drainage. If soil composition is weak, a layer of topsoil should be considered as well. No matter if your soil is sand or clay, it can be improved by adding the same thing: organic matter. The more, the better; work deep into the soil. Prepare beds to an 18 inch deep for perennials. This will seem like a tremendous amount of work now, but will greatly pay off later. Besides, this is not something that is easily done later, once plants have been established. How-to : Planting Perennials Determine appropriate perennials for your garden by considering sun and shade through the day, exposure, water requirements, climate, soil makeup, seasonal color desired, and position of other garden plants and trees. The best times to plant are spring and fall, when soil is workable and out of danger of frost. Fall plantings have the advantage that roots can develop and not have to compete with developing top growth as in the spring. Spring is more desirable for perennials that dislike wet conditions or for colder areas, allowing full establishment before first winter. Planting in summer or winter is not advisable for most plants, unless planting a more established sized plant. To plant container-grown plants: Prepare planting holes with appropriate depth and space between. Water the plant thoroughly and let the excess water drain before carefully removing from the container. Carefully loosen the root ball and place the plant in the hole, working soil around the roots as you fill. If the plant is extremely root bound, separate roots with fingers. A few slits made with a pocket knife are okay, but should be kept to a minimum. Continue filling in soil and water thoroughly, protecting from direct sun until stable. To plant bare-root plants: Plant as soon as possible after purchase. Prepare suitable planting holes, spread roots and work soil among roots as you fill in. Water well and protect from direct sun until stable. To plant seedlings: A number of perennials produce self-sown seedlings that can be transplanted. You may also start your own seedling bed for transplanting. Prepare suitable planting holes, spacing appropriately for plant development. Gently lift the seedling and as much surrounding soil as possible with your garden trowel, and replant it immediately, firming soil with fingertips and water well. Shade from direct sun and water regularly until stable. ProblemsPest : Thrips Thrips are small, winged insects that attack many types of plants and thrive in hot, dry conditions (like heated houses). They can multiply quickly as a female can lay up to 300 eggs in a life span of 45 days without mating. Most of the damage to plants is caused by the young larvae which feed on tender leaf and flower tissue. This leads to distorted growth, injured flower petals and premature flower drop. Thrips also can transmit many harmful plant viruses. Prevention and Control: keep weeds down and use screening on windows to keep them out. Remove or discard infested plants, keep them away from non-infested plants. Trap with yellow sticky cards or take advantage of natural enemies such as predatory mites. Sometimes a good steady shower of water will wash them off the plant. Consult your local garden center professional or county Cooperative extension office for legal chemical recommendations. Pest : Slugs and Snails Slugs and snails favor moist climates and are mollusks, not insects. They can be voracious feeders, eating just about anything that is not woody or highly scented. They may eat holes in leaves, strip entire stems, or completely devour seedlings and tender transplants, leaving behind tell-tale silvery, slimy trails. Prevention and control: Keep your garden as clean as possible, eliminating hiding places such as leaf debris, over-turned pots, and tarps. Groundcover in shady places and heavy mulches provide protection from the elements and can be favorite hiding places. In the spring, patrol for and destroy eggs (clusters of small translucent spheres) and adults during dusk and dawn. Set out beer traps from late spring through fall. Many chemical controls are available on the market, but can be poisonous and deadly for children and pets; take care when using them - always read the label first! Pest : Aphids Aphids are small, soft-bodied, slow-moving insects that suck fluids from plants. Aphids come in many colors, ranging from green to brown to black, and they may have wings. They attack a wide range of plant species causing stunting, deformed leaves and buds. They can transmit harmful plant viruses with their piercing/sucking mouthparts. Aphids, generally, are merely a nuisance, since it takes many of them to cause serious plant damage. However aphids do produce a sweet substance called honeydew (coveted by ants) which can lead to an unattractive black surface growth called sooty mold. Aphids can increase quickly in numbers and each female can produce up to 250 live nymphs in the course of a month without mating. Aphids often appear when the environment changes - spring & fall. They're often massed at the tips of branches feeding on succulent tissue. Aphids are attracted to the color yellow and will often hitchhike on yellow clothing. Prevention and Control: Keep weeds to an absolute minimum, especially around desirable plants. On edibles, wash off infected area of plant. Lady bugs and lacewings will feed on aphids in the garden. There are various products - organic and inorganic - that can be used to control aphids. Seek the recommendation of a professional and follow all label procedures to a tee. Pest : Earwigs Earwigs, which hide during the day and emerge at night to eat, usually target young leaves and flower petals in late spring. Normally, they do not pose a huge problem, but their pinch can hurt. Prevention and control: Keep the garden tidy, eliminating hiding places. Control by reducing population. One way is to create a trap. Invert pots filled with dried grass on stakes. The earwigs will hide here during the day. Earwigs will also hide in moist balls of paper that have been placed on the ground, close to plants. Every few days, discard the paper balls. Heavy infestations may require the use of an insecticide. Select one that is labelled for earwig control and follow all label procedures to a tee. Fungi : Leaf Spots Leaf spots are caused by fungi or bacteria. Brown or black spots and patches may be either ragged or circular, with a water soaked or yellow-edged appearance. Insects, rain, dirty garden tools, or even people can help its spread. Prevention and Control: Remove infected leaves when the plant is dry. Leaves that collect around the base of the plant should be raked up and disposed of. Avoid overhead irrigation if possible; water should be directed at soil level. For fungal leaf spots, use a recommended fungicide according to label directions. MiscellaneousConditions : Deer Tolerant There are no plants that are 100% deer resistant, but many that are deer tolerant. There are plants that deer prefer over others. You will find that what deer will or will not eat varies in different parts of the country. A lot of it has to do with how hungry they are. Most deer will sample everything at least once, decide if they like it or not and return if favorable. A fence is the good deer barrier. You may go for a really tall one (7 to 8 feet), or try 2 parallel fences, (4 to 5 feet apart). Use a wire mesh fence rather than board, since deer are capable of wiggling through a 12 inch space. Glossary : Evergreen Evergreen refers to plants that hold onto their leaves or needles for more than one growing season, shedding them over time. Some plants such as live oaks are evergreen, but commonly shed the majority of their older leaves around the end of January. Glossary : Perennial Perennial: traditionally a non-woody plant that lives for two or more growing seasons. Glossary : Tolerant Tolerant refers to a plant's ability to tolerate exposure to an external condition(s). It does not mean that the plant thrives or prefers this situation, but is able to adapt and continue its life cycle.
<urn:uuid:7046016a-f127-4bac-95fd-96c818d62e4a>
CC-MAIN-2022-33
https://www.backyardgardener.com/plantname/leucanthemum-vulgare-marguerite-daisy/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00604.warc.gz
en
0.941473
2,538
2.984375
3
July 1, 2017 | Dr. Dhananjay Samant (Economist) The inevitability of Automation The extent of automation in every economic activity worldwide is set to accelerate in the foreseeable future. By some estimates, almost half of all globally available jobs today are expected to be automated by 2055, if not sooner. Technological prowess leading to various kinds of automation (which includes robotics, artificial intelligence (AI) and digitization) will cause job losses in some sectors of the economy, but it will also boost employment in others. Those gaining most will be workers who are prepared for a future of uncertainty and those who have invested adequately in themselves (via skill development, training, education etc.). The workplace losers will be those who do not have either the wherewithal or the mental agility to adapt themselves to the new realities. This does not bode well for socioeconomic stability anywhere in the world. Both the public and private sectors need to put in place aggressive workforce development programs to ensure that the gap between the haves and the have-nots does not widen any more. This is especially relevant for India as we have a unique demographic dividend which we cannot risk frittering away into a socioeconomic disaster. While few occupations are fully automatable, 66% of all occupations worldwide have around 33% of technically automatable components. Automation potential varies considerably both amongst sectors of the economy as well as amongst countries. Due to the sheer size of their labour forces, China and India together account for the world’s largest technically automatable employment potential – estimated at over 700 million full-time equivalents. Nonetheless, automation in the manufacturing sector is more likely to be adopted earlier in countries with high manufacturing wages, such as North America and Western Europe, rather than in developing countries with lower wages like India and China. Automation is now a central competitive factor for manufacturing industries globally, but it is also becoming increasingly important for the MSME sector all over the world. The future of work and learning The future of work is digital. With relatively low barriers to entry, plenty of online resources (many of which are free, and now contextualized to the local learning processes), a large youth population, and a sustained rise in broadband connectivity, India has a distinct competitive advantage which needs to be optimally harnessed. All over the world learning is going digital, and there is no reason India should lag behind. The key lies in correctly anticipating what tomorrow will bring and acting decisively today. Thanks to the explosive growth in internet-enabled mobile devices, a growing number of Indians are engaging digitally with the world, and that too in their own languages and on their own terms. Indians are also globally renowned for applying their innate digital abilities to push the limits of modern technologies. Ultimately, for all the change that digital reinvention demands, it is worth noting that it does not call for a “throw it all out” approach, due to a lot of transferability in the existing hardware and software. Institutional and cultural factors affecting automation Maximizing the efficacy of the forthcoming scale of automation will call for the development of a more mature and proactive political leadership. Technological disruption is here to stay but its adverse effect on society and the economy can be minimized with some strategic policy actions. Populism needs to be curtailed just as rationality needs to be incorporated to aid decision-making processes. Humans and computers will increasingly need to synergize as never before if new value propositions are to be created and new markets to be tapped. These changes will necessitate an attitudinal shift in the politico-legal establishment. It would also require strengthening the social safety net in one way or the other, so that workers displaced by automation would have some source of income to fall back on. Automation usually tends to enhance socioeconomic disparities, but with proactive public policies in place it need not be so. What also matters is the cultural aspect of adjusting to automation. The traditional norms of some societies make them better suited for adaptation to various kinds of automation. For example, due largely to their manga culture, robots and robotic solutions have widespread acceptance in Japan amongst people of all ages and socioeconomic groups. This has been one of the key factors responsible for enabling a rapid spread of automation in that country. In this regard, India and even many Western societies including the USA are relatively disadvantaged and still have some ground to cover to assimilate various forms of automation more thoroughly into their day-to-day activities. Man and Machine … The human element in the workplace is not likely to get obsolete anytime soon. People will be needed to develop the complex systems that lead to various kinds of automation. Also, only humans can provide the common sense, social skills, judgment, and intuition in decision-making processes that the world’s most advanced AIwill always lack, and which will always be required at various levels for certain key professions like education and healthcare. Besides, work involving any degree of dexterity or nimbleness will invariably necessitate the human touch. Even if repetitive tasks get automated, people are surely going to stay in the loop for the foreseeable future. After all, it is hard to imagine any technocratic solution which can do away completely with the necessity for work and human intervention. Tomorrow’s businesses will need to focus on developing innovative win-win collaborations of man and machine. Automation, Employment, and the Student Community Successfully adapting to workplace automation will require a new set of attitudes and skills. India is predicted to be particularly affected by this transition. According to World Bank research, automation will threaten 69% of the jobs in India and 77% in China. It is estimated that 66% of the jobs Generation Z will perform do not even exist today. While it seems that low-skill jobs face the most risk of being replaced by automation, a lot of repetitive work in complicated jobs also faces the same risk. The only way out is to boost the creativity and critical thinking skills of the workforce through the development of appropriate education and training programs and integrate them thoroughly into the school curriculum. After all, only well-trained and educated people can improvise knowledge in ways that the most advanced AI cannot. All students, regardless of their areas of specialization, will need to be reasonably comfortable with computers and have at least some elementary knowledge of coding in standard industry languages. However, this does not necessarily imply that science students are more likely to have an edge in the workplace of tomorrow. With widespread automation, it is soft skills like communication, adaptability, and getting along with (all kinds of) people which will make the biggest difference to students’ future prospects. AI is touted to be the single most disruptive technology the world has seen since the industrial revolution, but no matter how much it progresses; there will always remain distinct areas of interaction where humans will want to deal only with other humans and will pay adequately for doing so. The education and skill development system should be geared towards attempting to fill those spaces, with students being counseled and mentored accordingly. Robotic Solutions and the Economy Even if some robotic solutions may not seem amenable to India from a purely employment perspective, there could still be valid arguments for them from an environmental and/or socio-economic viewpoint. For example, in the agricultural sector, automated robotics can help minimize the use of pesticides, reduce water consumption, and enhance crop productivity. All this will ultimately benefit the farmers and the entire rural economy. After all, increased productivity (in any economic activity) will lead to a multiplier effect of more wealth, cheaper goods, greater spending power, and ultimately, more job-creation throughout the system. Around 40-45% of the Indian economy is still informal in nature, and hardly any reliable information pertaining to it is available. Strategically planned automation will enable it to join the mainstream, with all of its attendant benefits. At the macro level, that will include boosting the accuracy of the calculation of the GDP (in all its myriad forms) as well as the allied socio-economic indicators. The number of industrial robots deployed worldwide is expected to increase to around 2.6 million units by 2019. That is about a million units more than in the record-breaking year of 2015. Broken down by sectors, around 70% of industrial robots are currently at work in the automotive, electrical/electronics, and metal and machinery industry segments. In 2015, the strongest growth in the number of operational units recorded was registered in the electronics industry, a rise of 18%. The metal industry posted an increase of 16%, with the automotive sector growing by 10%. Should robots be taxed? A recent global debate revolved around whether robots should be taxed as they are becoming increasingly responsible for job-losses in the economy. The argument was that a robot tax could be used to subsidize specialized jobs taking care of senior citizens or working with juvenile delinquency, for which demand usually outstrips supply and to which human abilities are particularly well suited. Such a “robot tax” could also be used to finance a welfare concept like the Universal Basic Income (UBI), which is today gaining traction all over the world. However, the counterargument (to which the author subscribes) is that the advent of robotic machines which have never been operated by humans means that there will be no prior human income to act as a reference salary for calculating the taxes these machines would need to pay. A lump-sum tax on robots would simply induce their producers to bundle AI with other “dumber” machinery doing routine work-related tasks. This could also dampen the overall spirit of technological innovation in the economy. Rather than move into avoidable fiscal complications, it is better to legislate to improve the conditions of all those currently in employment. To begin with, more effective unemployment benefits and innovative pension schemes for the workforce could be devised and implemented. Automation and Financial Sector Reform An important economic outcome of digitization has been the global tendency to shift to a cashless society. For India, this transition is especially significant. A cashless (or less-cash) economy is generally more transparent and less prone to the accumulation of black money, both of which pave the way to a more egalitarian society. Currency demonetization will also lead to greater digitization of the economy and will eventually benefit the poor more than anyone else. Automating financial services and embracing digital transactions facilitates the movement of the masses into the formal economy, thereby increasing financial savings, reducing tax evasion, and leveling the playing field between tax-compliant and tax-evading individuals (and firms). According to a global survey by Accenture, seven out of ten consumers are content with computer-generated advice for banking, insurance, and retirement services. Robot advisory services are now making inroads even in India. Needless to say, mindless automation is not a panacea for the myriad issues facing our financial sector, and it should be done carefully as it may turn out to be not only unproductive but counterproductive. Adequate digitization will not only ease the inevitable pain of currency demonetization but it will also aid GST compliance, which India is soon going to need on an unprecedented scale. Compliance requirements will rise substantially under the GST regime, and the Government is putting increasing emphasis on electronic filing of returns for all taxpayers. Under the circumstances, both the business community and the public at large will need to be more techno-savvy or opt for user-friendly automation software to enable them to meet this challenge. Public policy will need to finely balance the costs and benefits arising from automating the new financial system. Some Concernspertaining to Automation Lowering independent thinking ability People tend to have worse recall when they know that what they need is stored somewhere online and can be retrieved whenever required. If information on any topic under the sun is freely available at the click of a button, there is little incentive to engage in the laborious process of building up the extensive knowledge base necessary to become a deep and deliberate thinker. Like an atrophied muscle, the brain’s ability to carry out heavy intellectual lifting gets gradually compromised. When we opt for the convenience that much of today’s technology offers, we may unknowingly be denying ourselves the opportunity to think independently and develop our innate cerebral talents. This is especially important for the student community to be aware of. Identity Theft and Data Abuse As big data becomes increasingly available to Government and public departments, many citizens (legitimately) believe that their personal information is being compromised. The issue of identity theft has become a major concern in many developed countries today, and there is no doubt that large-scale digitization – and its concomitant data breaches – have contributed much to it. In its extreme forms, the authorities need to recognize that identity theft is nothing short of organized white-collar crime, and deal with it accordingly. In general, as Against power and ubiquity, people need to ensure that Orwellian regimes do not misuse it, either to centralize power or to willfully target select socioeconomic groups. Many people see automation as a disruptive process leading to the displacement of labour. However, that view is not entirely justifiable. Automation can also be visualized as a unique opportunity to unshackle (well-trained and educated) people in the workplace to focus on higher-value economic activities and thereby boost the growth of businesses and entrepreneurship. Automation could thus become a blessing in disguise to many emerging economies like India, by enabling them to leapfrog standard development models and allowing them to experiment innovatively with their growth options, for example, by resorting to a strategic currency demonetization. Although it will not occur overnight, widespread automation in a large number of industries and economic activities is no longer optional. Automation can prove disruptive when it changes the nature of supply or demand or both, and it is undoubtedly going to reshape our world in ways which are presently unclear. For the better or worse, much of what passes off as science fiction today will be tomorrow’s reality. All responsible institutions will soon need to figure out how the people and machines they employ can leverage mutual strengths and weaknesses as intertwined players seeking to maximize workplace productivity while simultaneously minimizing the larger socioeconomic inequality. ---------------------------------------------------------------------------------------------------------AI is not just one technology but rather a variety of different kinds of software that can be applied in numerous ways for different applications.
<urn:uuid:5672b700-1876-43a0-891c-8c12a62caea7>
CC-MAIN-2022-33
https://medcindia.com/article-detail.php?page=1&ele_id=NOR_5c6535ff2b28d3.79903967
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00205.warc.gz
en
0.950589
2,932
2.65625
3
Southeast Asia, Relations with SOUTHEAST ASIA, RELATIONS WITH SOUTHEAST ASIA, RELATIONS WITH India's relations with the countries of what is today known as "Southeast Asia" date back to antiquity. Early Indian texts referred to Southeast Asia as Suvarnabhumi (land of gold). Trade and the transmission of the Hindu and Buddhist religions were key elements of India's early interaction with Southeast Asian lands, including Myanmar (Burma), Thailand, the Indochina peninsula, Malaya, and Indonesia. This was not a one-way traffic; Southeast Asians, particularly traders of the Malay world, also sailed west across the Bay of Bengal. The flow of Indian priests, traders, and adventurers, along with intermarriages and cultural assimilation, left a deep and lasting impact on the cultural landscape of Southeast Asia, one of the most impressive examples of acculturation in history. By the eleventh century, a number of strongly "Indianized" kingdoms, such as Funan and Champa, emerged in the Indochina peninsula, as did Nakhon Sri Thammarat in the Malayan peninsula. What historians describe as the "Indianization" of Southeast Asia was "the expansion of an organized culture, founded on the Indian conception of royalty, Hindu or Buddhist beliefs, the mythology of ancient Hindu Purāṇas, and the observance of the Hindu law codes, expressed in the Sanskrit language." Other features of Indianization included the use of alphabets of Indian origin, the pattern of Indian law and administration and monuments, and architecture and sculpture influenced by the arts of India. But the subject of "Indianization" or "Hinduization" of Southeast Asia has been controversial. The thesis of Indian colonization of Southeast Asia, or Indian views of Southeast Asia as "greater India" or "further India," popularized by nationalist groups, like the Greater India Society of Calcutta, and historians of ancient India, such as R. C. Majumdar, has found less favor among contemporary historians of Southeast Asia. Archaeological and literary evidence suggests that India's impact on Southeast Asia was achieved largely through peaceful means, by commerce rather than conquest, and by cultural assimilation rather than out-right colonization. Nor were Southeast Asians mere passive recipients of Indian ideas, but actively engaged borrowers. Ideas that suited indigenous traditions, or that could easily be adapted to local interests and practices, were more readily received than those that did not have such potential. The Indian caste system and the practice of according lower status to women were not popular in the Southeast Asia. The temple arts of the Hindu-Buddhist kingdoms of Pagan, Angkor, and Java differ from those of India. The influence of Indian ideas was heavily mediated by indigenous Southeast Asian beliefs and practices; Southeast Asians adapted or localized them to suit their own interests, needs, and values. The decline of Buddhism in India by the end of the twelfth century and the erosion of Hindu political power with the advent of Muslim rule in India contributed to the decline of Indian influence in Southeast Asia. The conversion of Malacca to Islam in the early fifteenth century saw Islam supplant Hinduism and Buddhism there, although it was Indian Muslim merchants who, ironically, played a key role in the spread of Islam by bringing with them mullahs, Sufi mystics, and Arab preachers. Indians, especially Muslim traders from the Tamil and Gujurati areas of India, played a major role in the rise of Malacca as the premier port city of Southeast Asia. Through intermarriage and commercial power, they became a major force at Malacca's royal court. The advent of European rule in Asia and the restrictive trade policies of the Dutch and the British severely undermined India's commercial links with Southeast Asia. The Europeans took control of the trade in spices and textiles, the staples of India-Southeast Asia trade. Under the British Raj, the Indian economy was transformed from being an exporter of manufactured goods to a supplier of raw materials for Britain. The British also actively curbed Indian shipbuilding and shipping. But British rule started a new type of migration from India to Southeast Asia, especially to Malaya, dating from the foundation of Penang in 1786. In contrast to earlier Indian migrants, who tended to be traders and financiers or priests and pandits, the new migration was more regulated and of a larger scale, consisting chiefly of indentured, illiterate laborers. Annual levels of migration from India to Malaya jumped from less than 7,000 in 1880 to over 18,000 in 1889, while migrations to Burma increased from less than 7,000 to over 38,000. In 1910 an estimated 331,100 Indians migrated to Burma, while the figure for Malaya was 91,723. In 1935 the respective figures were 296,600 for Burma and 81,350 for Malaya. The Post-colonial Period The Japanese conquest of Southeast Asia and the advance of the Japanese army to the border region between Burma and British India underscored the strategic vulnerability of India to attacks through Southeast Asia. During the Japanese occupation of the region from 1942 to 1945, Southeast Asia also became the launching point of the military campaign led by Netaji Subhash Chandra Bose and his Indian National army, drawn mainly from Indians in Southeast Asia, to oust the British from India. In the early postwar period, Indian interests in Southeast Asia comprised political, economic, and strategic dimensions. Politically, Indian nationalist leaders viewed the anticolonial struggles in Southeast Asia as being indivisible from their own struggle. India's struggle for independence from British rule was viewed in Southeast Asia with great interest. The second Asian country, after the Philippines, to achieve independence, India after 1947 played an important role in the campaign for self-determination in Southeast Asia. Economically, Southeast Asia was a market for Indian textiles (Burma was an almost exclusive Indian market); and India was heavily dependent on Burma, Indonesia, Malaya, Thailand, and Indochina for oil, rubber, tin, rice, and timber. An estimated 1.3 million to 1.8 million Indian immigrants in Southeast Asia during the immediate postwar period provided another crucial link between India and Southeast Asia; the treatment of Indian migrants in Burma would become an issue in Indian relations with that country. Strategically, Indian diplomat K. M. Panikkar (who is credited with being among the first to use the term "Southeast Asia") suggested the creation of an "Indian security sphere" extending from the Persian Gulf to Burma, Siam (Thailand), the Indochina peninsula, Malaya, and Singapore. Indian leaders like Deputy Prime Minister Sardar Vallabhbhai Patel expressed concern about instability and Communist insurgency in Southeast Asia as potential threats to Indian security. This concern was fueled by the meetings of Asian Communist leaders under the banner of the South Asian Youth Congress in Calcutta (the so-called Calcutta Conference) in February 1948, which was followed by the outbreak of Communist rebellions in both India and Southeast Asia. At the same time, the emergence of China as a major Asian power introduced an important new dimension to India's interest in Southeast Asia. Despite professing a strong commitment to decolonization in Southeast Asia, Prime Minister Jawaharlal Nehru was prepared only to extend diplomatic support to Southeast Asian struggles. Nehru refused Ho Chi Minh's request for material support against the French, though he took a more active role in supporting Indonesia's struggle against the Dutch. India took the lead in convening the 1949 conference on Indonesia to show support for Indonesian nationalists, though again Indian support was mainly moral rather than material. This affected Nehru's bid to organize a regional grouping of newly independent Asian nations. The unofficial Asian Relations Conference held in New Delhi in 1947 under Nehru's chairmanship attracted delegations from all Southeast Asian countries, but the resulting Asian Relations Organization was moribund and short-lived. Nehru joined Indonesia's efforts to convene a conference of African and Asian countries, which led to the famous Bandung Conference of 1955. At this time, the regional identity of Southeast Asia remained closely tied to that of India. The Bandung Conference was convened by the Conference of Southeast Asian Prime Ministers (also known as the Colombo Powers), a regional grouping that included the leaders of Pakistan, India, and Sri Lanka, as well as Indonesia and Burma. That conference, though successful in articulating a sense of solidarity among the newly independent countries, revealed serious differences, however, between India and the pro–United States Southeast Asian nations, Thailand and the Philippines. Nehru bitterly condemned military alliances between Asian nations and the superpowers, targeting specifically the Southeast Asia Treaty Organization, antagonizing the leaders of Pakistan, Thailand, and the Philippines. A highlight of India's involvement in Southeast Asia in the 1950s was its efforts to mediate in the conflict between the French and the North Vietnamese following the Geneva Accords in 1954. Indian diplomacy in the Indochina conflict included Nehru's call for an immediate cease-fire in February 1954. Nehru sought to prevent both Chinese military intervention in support of Ho Chi Minh and large-scale U.S. intervention that might have included nuclear weapons. India's role led to its appointment as chairman of the International Control Commission (ICC) on Indochina, whose role was to control the flow of armaments into Laos, Cambodia, and Vietnam. But the ICC suffered from a weak mandate and shortage of manpower, and was consumed by the escalation of great power rivalry. China made diplomatic and commercial gains in Southeast Asia at India's expense, while Nehru seemed more preoccupied with domestic issues. The 1962 war between India and China dashed any remaining hopes of Indian interaction with Southeast Asia within a pan-Asian framework. This was accompanied by a growing divergence of their national economic policies and development strategies: India remained preoccupied with its domestic problems and the conflict with Pakistan over Kashmir, while the Southeast Asian nations remained concerned with the threat of Communist insurgency and potential Chinese and Vietnamese expansionism. Economically, while Southeast Asian countries were experiencing robust economic growth through openness to foreign investment and multinational enterprise, India could muster only what was derisively called the "Hindu" rate of growth of around 5 percent, which was seen in Southeast Asia as the result of its socialist, centrally planned economy. Later, in the 1990s, India's democratic system invited unflattering comments from the likes of Singapore's Lee Kuan Yew, who favored "discipline over democracy." The divergence in strategic outlook was equally pronounced, especially after the formation of the Association of Southeast Asian Nations (ASEAN) in 1967. While India remained somewhat uninterested in joining ASEAN, its leaders also ruled out Indian membership on the ground that it was not "geographically included in Southeast Asia." More importantly, India's nonaligned outlook, albeit with a tilt to Moscow over cold war issues, conflicted with ASEAN's pro–U.S. stance, camouflaged in its doctrine of a "Zone of Peace, Freedom, and Neutrality" in Southeast Asia. The signing of the Indo-Soviet Treaty of Peace, Friendship, and Cooperation in August 1971, intended to deter any Chinese or American intervention in support of Pakistan, was seen in Southeast Asia as compromising India's nonalignment. The Vietnamese invasion of Cambodia in December 1978 led India to recognize the Vietnamese-installed Heng Samarin regime in Cambodia. This was at serious odds with ASEAN's effort to condemn and isolate Hanoi. Moreover, in the 1980s, India's naval modernization program caused some apprehension in Southeast Asia. India "Looks East" The coolness and mutual neglect in India-ASEAN relations persisted until the early 1990s. But a major shift occurred in 1994, when Indian prime minister Narashimha Rao outlined India's "look east" policy, whose main thrust was "to draw, as much as possible, investment and cooperation from the Asia-Pacific countries, in consonance with our common concept and solidarity and . . . our common destiny." The "look east" policy was a logical and necessary extension of India's domestic economic liberalization drive, which was dictated by harsh domestic economic and political realities. ASEAN is a key part of the look east policy. The focus of India's look east policy and India-ASEAN ties has been in the economic arena. According to official Indian figures, India's exports to ASEAN jumped from U.S.$2.9 billion in 1996–1997 to U.S.$4.6 billion in 2002–2003, while imports from ASEAN during the same period rose from U.S.$2.9 billion to U.S.$5.2 billion. Although Southeast Asia accounts for only 8.77 percent of India's total exports and 8.44 percent of India's total imports, and foreign direct investment (FDI) by ASEAN states in India accounted for only 3.4 percent of total FDI flows to India (January 1991–May 2002), India's impressive economic growth portends rising trade with ASEAN. India's leadership position in information technology provides ASEAN with an opportunity to forge stronger economic links with India through greater economic integration. India's relations with ASEAN have been facilitated by New Delhi's participation in a number of common regional forums. In 1992 India became a sectoral dialogue partner of ASEAN. Although restricted to areas concerning trade, investment, tourism, science, and technology, this represented India's first formal involvement with ASEAN. In 1995 India was made a full dialogue partner by ASEAN, becoming eligible to participate in a much wider range of sectors, including infrastructure, civil aviation, and computer software, as well as in ASEAN Post Ministerial Meetings. India was invited for the first time to summit level talks with ASEAN in Cambodia in November 2002, and at the second ASEAN-India Summit in Bali in October 2003, India signed a Framework Agreement for creating an ASEAN-India free trade agreement (FTA) in a decade. The same year, India also signed a Framework Agreement for creating an FTA with Thailand, and started negotiations for a Comprehensive Economic Cooperation Agreement with Singapore. In 1996, India joined the ASEAN Regional Forum (ARF), the first multilateral security organization in the Asia-Pacific region under ASEAN leadership. Until then, ASEAN members had opposed Indian membership. India, as with the rest of the South Asian countries, was considered to be outside the geographic scope of the Asia-Pacific region. A more important, if not publicly stated, factor was ASEAN's fear that South Asian membership would saddle the ARF with the seemingly intractable India-Pakistan rivalry, including the Kashmir problem. ASEAN's motives in inviting India into the ARF was partly determined by ASEAN's perception of the importance of India as a counterweight to China. India's growing links with ASEAN and sub-ASEAN groupings is indicated in its participation in the launching of a new subregional group involving Bangladesh, India, Myanmar, Sri Lanka, and Thailand for Economic Cooperation, whose objectives include regional cooperation in transport and infrastructure. India also engages the newer ASEAN members through the Mekong Ganga Cooperation initiative, which involves building transportation links between India and the newer ASEAN members. India has no border or land disputes in Southeast Asia and has already marked out its maritime boundary with Indonesia and Thailand. Currently, no Southeast Asian nation considers India to be a threat; nor does India expect any threats to security from any Southeast Asian country. While the situation in Myanmar, especially the growing military ties between Myanmar and China, has been a source of concern to Indian strategists, successive Indian governments have favored a policy of "engaging" China. Like ASEAN, India opposes the isolation of Myanmar. While Indian strategic planners recognize the importance of global trade routes through Southeast Asia, and share a concern over the rise of Chinese military power, India does not appear to have any grand plans for assuming a major security role in the Asia Pacific region, despite its powerful navy. Nonetheless, the changing strategic climate in Asia appears to favor the development of closer political and security ties between India and the Southeast Asian countries. The 1990s saw increased defense contacts between India and ASEAN countries. The Indian navy has conducted a number of "friendship exercises" with ASEAN navies, including the navies of Singapore, Indonesia, Thailand, and Malaysia. India and Malaysia have cooperated in a program to provide familiarization and maintenance training for Russian-supplied MiG aircraft to Malaysian air force personnel. Since the terrorist attacks of 11 September 2001, Indian has joined the U.S. Navy in providing escort vessels in the Straits of Malacca. Acharya, Amitav. Engagement or Estrangement? India and theAsia Pacific Region. Toronto: University of Toronto–York University Joint Centre for Asia Pacific Studies, 1999. Focus on "look east" policy and institutional links between India and ASEAN. Ayoob, Mohammed. India and Southeast Asia: Indian Perceptions and Policies. London: Routledge, 1990. A short, insightful study of India-ASEAN relations during the period of the Cambodia conflict. Coedes, G. The Indianized States of Southeast Asia, edited by Walter F. Villa and translated by Sue Brown Cowing. Honolulu: University of Hawaii Press, 1968. A classic study of Indianization by an Indologist. Majumdar, R. C. Greater India. 2nd ed. Mumbai: National Information and Publications, 1948. An Indian nationalist historian's perspective on Indian influence. Ministry of Commerce and Industry, Government of India. "Export Import Data Bank." Available at <http://commerce.nic.in/eidb/default.asp> Ministry of External Affairs, Government of India. "ASEAN-India Relations." Available at <http://www.meadev.nic.in/foreign/asian-indrelations.htm> Sandhu, K. S. Indians in Malay: Some Aspects of Their Immigration and Settlement (1786–1957). Cambridge, U.K.: Cambridge University Press, 1969. Pathbreaking and still the most authoritative work. SarDesai, D. R. "India and Southeast Asia during the Nehru Era." In The Legacy of Nehru: A Centennial Assessment, edited by D. R. SarDesai and Anand Mohan. New Delhi: Promilla, 1992. Sridharan, Kripa. The ASEAN Region in India's Foreign Policy. Aldershot, U.K.: Dartmouth, 1996. Ton-That, Thien. India and Southeast Asia, 1947–1960: AStudy of India's Policy towards the South East Asian Countries in the Period 1947–1960. Geneva: Librairie Droz, 1963. Comprehensive Southeast Asian perspective. Van Leur, J. C. Indonesian Trade and Society: Essays in AsianSocial and Economic History. The Hague: W. van Hoeve, 1955. Wheatley, Paul. "Presidential Address: India beyond the Ganges; Desultory Reflections on the Origins of Civilization in Southeast Asia." Journal of Asian Studies 42, no. 1 (1982): 13–28.
<urn:uuid:f4769951-4d73-486e-b450-b276753b21d8>
CC-MAIN-2022-33
https://www.encyclopedia.com/international/encyclopedias-almanacs-transcripts-and-maps/southeast-asia-relations
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00206.warc.gz
en
0.948889
4,006
3.8125
4
INTRODUCTION TO KNOWLEDGE MANAGEMENT Knowledge management is a system developed to utilize organization’s knowledge assets in order to achieve its objectives. It is the power of an organization to share knowledge of its products. Organization may also create and use the knowledge of people and process to enhance productivity of the enterprise. Here in this report Toyota’s approach to knowledge management has been analyzed along with its major characteristics. The 2008 article of Toyota is reviewed and on the basis of same article, various benefits of the approach to organization of Toyota are assessed. IBM, an American multinational technology corporation is chosen in the present report whose approach to knowledge management is compared with the approach of Toyota. Challenges that could be faced by IBM in the implementation of knowledge management system (KMS) have also been assessed. The impact of social media on the approach of knowledge management in the organization will also be analyzed in the current report. TASK 1: CHARACTERISTICS OF KNOWLEDGE MANAGEMENT As per the given article “Tapping tacit local knowledge in emerging markets- the Toyota way”, Toyota has changed from simply transferring knowledge to tapping tacit local knowledge by its local staff in foreign markets. Also Toyota had experienced a global lead in automotive industry with its new strategy ‘learn local, act global’ as well as by applying knowledge based approach to marketing. Toyota has adopted tacit knowledge approach for transferring information within its organization (Lehaney, 2004). Tacit knowledge approach is a personal approach which states that circulation of awareness can be accomplished in the best manner by transfer of people from one part of organization to another. Hence Toyota applied this approach, when it had opened new factory and wanted to transfer the knowledge of production system to new employees (Powers, 2006). The three major characteristics of adopting knowledge based marketing approach which includes creation of strategic knowledge in the organization, lessons learned for global knowledge management and various implications provided by the approach. Toyota’s IMV (Innovative international multi-purpose vehicles) project was one of the innovative strategic decisions taken by the company. This leads to knowledge creation, product development and huge production to Toyota. The emergence of new strategy was also very beneficial for company which stated the following: ‘learn local, act global’. It has reflected outstanding sales performance of Toyota along with increased profits (Eardley and Uden, 2011). Hence knowledge based marketing connects the customer knowledge to the capacity of Toyota to address their needs. It considers various internal experiences, skills and attitudes of employees. With the help of this management knowledge approach, Toyota has made the necessary customer values and information transparent. This approach has made easy access of information within the organization of Toyota and has opened the ways towards success and profitability. Also Toyota has experienced the benefits of long term profitability and growth for the company along with increased competitiveness. Also knowledge based approach has helped Toyota at the time of globalization in managing its core competencies. Toyota also brought the concept of front line management and global knowledge creation with the help of its ‘learn local, act global’ strategy. It has overcome various challenges by applying tacit knowledge approach to marketing (Green, Stankosky and Vandergriff, 2010). Hence it was easy for Toyota to identify and reuse the knowledge resources within the global operations of multinational corporations. Toyota has the strong market orientation which leads to its product success. It has also experienced profitability, high market share and sustainable competitive advantage by implementing knowledge based marketing approach within the organization. This approach focuses on the following: exploitation which means sharing and exploration meaning creation. Hence it is beneficial for Toyota to gain sustainable competitive advantage with the help of knowledge based marketing approach. The major characteristics of tacit knowledge approach that Toyota has applied in its structure are as follows: tacit knowledge is intangible in nature and it has its direct impact on people’s head. Processing of tacit knowledge changes its understanding as well as different contexts affect the meaning of knowledge collected through tacit approach. Under this approach information and knowledge is shared to the employees of the organization to enhance learning. Under this approach information is shared orally as well as employees learn by their observation. Sometimes experts are also interviewed under the approach (Hussain, Lucas and Ali, 2004). Hence all the above features along with the three characteristics of knowledge based on management approach of Toyota are related with the company’s knowledge system. Hence it is analyzed that the described approach is very much beneficial for the company to make it grow in long run. TASK 2: ANALYSIS The case of Accenture has been chosen for analyzing various challenges that can be faced by an organization at the time of implementing knowledge management system. Accenture has made effective efforts and used different approaches to establish successful knowledge management practices, as it was one of the first organizations to make investment in knowledge management on a global scale for collecting past experiences and knowledge of consultants. It considers knowledge as a core capability to achieve competitive advantages. The firm has spent more than $500 million on IT and people to support its knowledge management strategy in 1990s. Further it has conducted a research in year 2002 to obtain practical lessons on global knowledge transfer by assessing its experience. The knowledge management efforts of Accenture was a sophisticated electronic repository system called the knowledge exchange and these ware managed by 500 staff members around the world. Most of the new client projects started with a search of the knowledge exchange for past experience on similar projects. It helped the company to reduce planning time, minimize risk and improve quality of services so that knowledge exchange was the single most important capturing and delivering approach at Accenture. In the current business scenario, there is a high requirement of developing an effective knowledge management system in the business organizations like Accenture to achieve their main organizational objectives. There are various business objectives of Accenture which lead to development of knowledge management system in the company (Peña, 2002). It wants to achieve competitive advantages over its competitors like IBM, McKinsey, etc to lead in the competitive market. It is very important for the company to have adequate knowledge and information about its customers and competitors to fulfill its objective (Faucher, Everett and Lawson, 2008). Along with this the objectives of Accenture are to provide high quality services and solutions to their clients in timely manner. Knowledge management will help the company to properly collect information about the customers, competitors and market as well as to manage customer relationships by providing good quality services on time. Further knowledge is believed a core capability to achieve competitive advantages so this business objective helps to enterprise to develop an effective knowledge management system. Further achieving organizational efficiency is also one of the main objectives in Accenture and its fulfillment also needs an effective knowledge management. With the help of getting adequate information, knowledge and experiences Accenture will be able to perform in better way and improve its efficiency and capability in the tough competition of the globalized market (Herrmann, 2011). Along with this Accenture wants to achieve its objectives of long term sustainability and maintaining good position in the market which can also be achieved through effective knowledge management. Managing information may also provide accurate and useful information and with the help this information the company will lead to long term growth by improving its operational efficiency and continuously providing better and innovative customer services (Kreiner, 2002). Knowledge management is very useful in maximizing company’s potential, which in turn leads to help in resisting the effects of staff turnover in Accenture. The most economic task for the company is to manage its intellectual capital which can also be performed in better way with the help of adequate and accurate knowledge and information. In this way, all of above discussed objectives lead towards the development of knowledge management system in Accenture. Accenture can be unable to truly harness and transfer management knowledge across its international organization, as a variety of challenges could be faced by the enterprise in implementation of its knowledge management system i.e. knowledge exchange (Seidler-de Alwis and Hartmann, 2008). Such as the knowledge management strategy of Accenture is based on its vision of ‘One Global Firm’. Hence the strategy is not making sufficient consideration for local or regional challenges and there is only one sided flow of information. Further there are a variety of cultural challenges in the global environment but Accenture have not provided adequate support for addressing various cross-cultural challenges (Gao, Li and Clarke, 2008). There is an important role of various local challenges and cultural factors along with global factors so that avoidance of these factors could present issues in implementing knowledge management in Accenture. Company’s focus on a standardized global KM practice made inadequate allowances for its local offices to address their own needs. It could lead to create hindrance in implementing knowledge management in the company. Further usage of various technologies such as integrated databases and various technological tools in Accenture may create issues in the organization related to implementation of knowledge management (Green, A. Stankosky, M. and Vandergriff, 2010). Along with this, failure in coordinating knowledge management efforts with organization’s strategic objectives, creation of repositories without considering content management issues, etc could also present challenges in implementing knowledge exchange in Accenture. The management of Accenture can make use of a variety of measures to diminish the possibility of failure for knowledge management system in the company. Some of these measures are as follows: Balancing Global Integration and Local Responsiveness: For the purpose of developing a successful global knowledge management practice, Accenture can make a balance between various activates of global integration and local responsiveness (Kreiner, 2002). It will help in getting effective support from the local factors as well as in dealing with various local challenges along with global issues for successful implementation of knowledge exchange in Accenture. Training and development: Proper training should be provided to the employees for reducing chances of failure of knowledge management in the business organization (Gavrilova and Andreeva, 2012). With the help of effective training and development of employees, they will be able to easily adopt the changes implied through knowledge management and solve various issues in related to technologies at the time of implementing knowledge management system. Effective and continuous monitoring of the system: The management of Accenture can monitor the system from time to time after its implementation (Hicks, Dattero and Galup, 2006). It will help in effectively indentifying minor and major shortfalls in implementation so that these short falls can be address properly on time. Further it can also be analyzed that whether the company is getting advantage from the implemented system or there will be any need for implementing any other new strategy to get benefit from the system (Man, 2008). Effective coordination: The management can maintain effective coordination between knowledge management system and strategic objectives within the organization (Kreiner, 2002). It will help in easy understanding and accessibility of knowledge management system as well as will reduce the chances of failure of the system in Accenture. In this way Accenture could reduce the possibility of failure in implementation of knowledge management system and it can also win trust of the people working there (Mårtensson, 2000). Hence overall efficiency can be achieved along with sustainable growth of the company. TASK 3: IMPACT OF SOCIAL MEDIA It has been well known that knowledge management is very much useful in identification, retention and effective utilization of knowledge for achieving goals of the organization. But arrival of social media has forced the enterprise to rethink about knowledge management and create various challenges (Eardley and Uden, 2011). There are some behavioral and technical issues with the existing knowledge management approaches. These issues are described below: Behavioral issues: Employee must keep the current knowledge on a regular basis to have valuable knowledge management system. But there is problem in this behavior by many employees as they think they are reducing their value by sharing knowledge. Technical issues: Technical issues are related with information provided on the organizations’ website is not easy to search. People prefer local search engines and feel that they are much easy for finding information. Social media is emerging with high speed now days. Social media may act as a boon for knowledge in long run (Lehaney, 2004). It may provide effective searching, availability of unstructured data in an organized group as well as relevant content is provided by social media. For e.g. if IBM or any organization want to know about its staff member than their corporate information will only provide precise data relating to their role, timings, department etc but accessing on social networks may provide additional information related with his hobbies, photos or previous job details. Various companies are moving towards social media driven knowledge management as it requires less management. Many new employees and juniors require large experience in short time. Social networking may provide them a good source of learning. They may get benefit and can easily interact with higher level. Social media may also lead to harassment for highly knowledgeable people as they will not get any recognition by sharing knowledge on social media (Haerifar, 2013). According to IBM, knowledge management is a tool for innovation, competency and efficiency by using knowledge effectively. Also it is helpful in designing policies and procedures for the organization which are being used to manage intellectual capital. Some of the similarities and differences in social media and knowledge management are: - Both are different technologies used for the same purpose of accessing knowledge and information - Individuals are needed by both the technologies for generating information. - Under both the technologies, knowledge and information are being shared with others. - Knowledge management is a company driven approach, whereas social media is self directed approach (Fensel, 2003). - Under knowledge management, company decides the importance of information which is to be provided whereas under social media, the individual providing information will need to decide what information should be provided. Social media may deal with technical and behavioral issues effectively and hence it is beneficial in long run. Social media also removes various barriers to learning such as age, gender etc. Hence enterprises are being forced by this media to reconsider their approaches to knowledge management (Gottschalk, 2007). It is being concluded from the report that knowledge management is an essential tool for every organization to manage its knowledgeable resources for easy accomplishment of their objectives. Major characteristics of tacit knowledge approach are being assessed from the article of Toyota. An analysis has been done on the various objectives of IBM Corporation in relation to its knowledge management system. From the current study, number of factors has been found out which are affecting the implementation of knowledge based marketing approach in the present organization. Various challenges have been assessed within IBM at the time of implementation of KMS. It has been concluded that Toyota has applied knowledge based marketing approach within its organization for managing information with the long term objective of overall growth and sustainable competitive advantage. Several measures have also been found out to diminish the possibility of failure of KMS. It is also concluded that emergence of social media has led the organization to rethink on the approaches to knowledge management. - Christensen, H. P., 2003. Knowledge Management: Perspectives and Pitfalls. Copenhagen Business School Press DK. - Eardley, A. and Uden, L., 2011. Innovative Knowledge Management: Concepts for Organizational Creativity and Collaborative Design. IGI Global. - Fensel, D., 2003. Ontologies: A Silver Bullet for Knowledge Management and Electronic Commerce. Springer Science & Business Media. - Gottschalk, P., 2007. Knowledge Management Systems: Value Shop Creation. Idea Group Inc (IGI). - Green, A. Stankosky, M. and Vandergriff, J. L., 2010. In Search of Knowledge Management: Pursuing Primary Principles. Emerald Group Publishing. - Haerifar, P., 2013. Knowledge Management Within Tesco. GRIN Verlag.
<urn:uuid:1afdc43a-f9c9-45e2-9a67-9a2cca3b90a7>
CC-MAIN-2022-33
https://www.assignmentprime.com/free-samples/project-management/knowledge-management
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00404.warc.gz
en
0.951658
3,245
2.734375
3
“It is, therefore, from the history of nature and human society that the laws of dialectics are abstracted. For they are nothing but the most general laws of these two aspects of historical development, as well as of thought itself.” (Engels) The importance of dialectics Many people do not realise that Marxism began as a philosophy, and Marx and Engels adhered to a definite philosophical standpoint all their lives – the standpoint of dialectical materialism. And although it may seem unlikely to some, it is impossible to understand Marxism without a thorough understanding of this subject. Many people regard philosophy with a certain distain. It appears as something abstract, academic, dry and utterly remote from real life. This attitude is quite understandable. The “official” bourgeois philosophy that is taught in the universities is of interest only to a handful of academics who have nothing better to do than waste their time in endless and arid discussions on the meaning of words. But Marxist philosophy is not like that. It is a very powerful tool for understanding reality. And in order to change the world, it is first of all necessary to understand it. The present world situation, with its crises, wars, terrorism, death and destruction, drives many people despair. They conclude that the world has gone mad. But in the words of that wonderful old philosopher Spinoza – one of the fathers of modern philosophical materialism - the task of philosophy is “neither to weep nor to laugh, but to understand”. That is an appropriate starting point for understanding the importance of philosophy for Marxists. It was another great dialectician, Hegel, who pointed out that it is the wish for a rational insight, and not the accumulation of a heap of facts that must possess the mind of one who wishes to adopt the scientific standpoint. The dialectical method provides us with the necessary analytical tools we require to make sense of the mass of information we now possess about nature and society. An understanding of dialectics is therefore an essential prerequisite for any aspiring student of Marxism. Here, however, we are confronted with a difficulty. The most systematic account of dialectics is contained in the writings of Hegel, in particular his massive work The Science of Logic. But apart from the highly inaccessible way in which Hegel sets forth his ideas (“abstract and abstruse”, Engels called it), the dialectic appears in the hands of Hegel in a mystical, idealist form. It was only rescued by the revolutionary work of Marx and Engels, who for the first time showed the rational kernel in Hegel’s thought. In its scientific (materialist) form, the dialectical method provides us with an indispensable tool for understanding the workings of nature, society and human thought. Marx had always intended to write a work on dialectical materialism, but died before he could do so. After Marx’s death, his indefatigable comrade Frederick Engels wrote a number of brilliant studies on dialectical philosophy (Ludwig Feuerbach and the end of German classical philosophy, Anti-Dühring, and The Dialectics of Nature). The last-named work was intended to be the basis for a longer work on Marxist philosophy, but unfortunately, Engels was prevented from completing it by the immense work of finishing the second and third volumes of Capital, which Marx left unfinished at his death. The task of putting together a more or less systematic exposition of Marxist philosophy still remains to be done. To the best of my knowledge, Reason in Revolt is the first attempt to apply the method of dialectical materialism to the results of modern science since The Dialectics of Nature. Although there is no single book that expounds dialectics in its entirety, there exists a vast body of works in Marxist literature that deal with different aspects of philosophy. Scattered throughout the works of Marx, Engels, Lenin, Trotsky and Plekhanov, one can find a very large amount of material on this subject. But it would take a very long time to extract all this information. The collected works of Marx and Engels consist of over fifty substantial volumes, while the Works of Lenin amount to more than forty (in the English language). Whoever has read all these books will undoubtedly have acquired a very sound knowledge of dialectics. However, this is the task of a lifetime, which not everybody will either wish, or be able, to undertake. The purpose of the present reading list is to help to orient those readers who wish to obtain a knowledge of Marxist philosophy to acquire at least the most basic aspects of that subject. To make this task a bit easier, we have divided the list into three sections; 1) for beginners, 2) or those who have gained a basic knowledge of the subject and 3) for those who wish to acquire a deeper knowledge of dialectical materialism. Some people may find this a challenging task, although personally I have never found it so. On the contrary, ever since I first read Anti-Dühring, when I was sixteen years of age, I have found it a subject of endless fascination and enjoyment. To those who think it too difficult, I urge you to persevere. Of course, in the beginning, any new subject may seem difficult. The conquest of Marxist theory is rather like climbing a mountain. When, after all the exertions, you reach the summit, you will find, stretched out before you, all the vast expanse of history, the finest achievements of human thought, science, art and culture. At that moment, all the sacrifices will seem worthwhile, and a whole new vista will open up before you. You will not regret it. London 24 February 2015 What is Dialectical Materialism by Rob Sewell - An introduction to materialist dialectics, including study questions and excerpts from Marxist classics. Available in What is Marxism. The ABC of Materialist Dialectics by Leon Trotsky - A brilliant, short introduction to dialectics. Available in What is Marxism. Ludwig Feuerbach and the End of Classical German Philosophy by Frederick Engels - Engels’s account of the development of Marxist philosophy. This text is a very accessible introduction to Hegel, Feuerbach, and dialectical materialism. Available here. Anti-Dühring, Part One: Philosophy by Friedrich Engels - In polemicising against his contemporary Dühring, Engels gives a dialectical materialist explanation of natural science, morality and other aspects of philosophy. Available here. Afterword to the Second German Edition of Capital by Karl Marx - A short text by Max clarifying the relationship between his ideas and those of Hegel. The Fundamental Problems of Marxism by Georgi Plekhanov - An excellent exposition of the Materialist method from a dialectical point of view. Reason in Revolt: Marxist Philosophy and Modern Science by Ted Grant and Alan Woods - This book, by Ted Grant and Alan Woods published in 1995 coinciding with the centenary of Engels' death, defends the validity of the philosophical writings of Marx and Engels. It does this by showing that the scientific discoveries of the twentieth century confirm the very essence of the Marxist philosophical method, dialectical materialism. Ubiquity: Why Catastrophes Happen by Mark Buchanan - a book written by a non-Marxist which elaborates on the idea of ‘power laws’, suggesting that scientists have been asking the wrong questions in their attempts to understand reality. Although, at times the book can lean towards a mechanical approach, it provides a lot of very interesting scientific observations, which once again confirm dialectics. The Crisis in Cosmology (three parts) by Adam Booth - New evidence and inconsistencies have brought the established cosmological models into crisis. How can Marxist philosophy help us to understand our universe? On militant materialism by V.I. Lenin - Lenin explains the importance of the the philosophical struggle. Theses on Feuerbach by Karl Marx - These eleven theses are often considered to be the founding document of dialectical materialism. It is difficult to understand them at first, but they are condensed with insights and one always goes back to them. Available in The Revolutionary Philosophy of Marxism. Dialectics of Nature by Friedrich Engels - Marx and Engels were very keen on the scientific revolutions of their era, and how they related to Marxist philosophy. These are Engels’s notes that would have gone towards producing a book on this subject. Available here. Materialism and Empirio-Criticism by V.I. Lenin - Following the defeat of the 1905 revolution, the Bolsheviks were forced underground and entered into a period of trials and demoralization. In these conditions, alien, petit bourgeois ideas permeated the party and a number of Bolsheviks began to reject dialectical materialism. In response, Lenin dedicated a great length of time to writing the polemical work Materialism and Empirio-criticism, and the result was a masterpiece defense of Marxist philosophy. In Defence of Hegel by Hamid Alizadeh - The impact of Georg Wilhelm Friedrich Hegel’s ideas cannot be underestimated, and as Marxists we owe him a tremendous debt. However, he is much abused by the bourgeois and postmodern philosophers. This article provides a defence of Hegel and explains the real revolutionary content of his contributions. Philosophical Notebooks by V.I. Lenin - Lenin’s notes on the works of Hegel, Feuerbach, Marx, Engels and many others. The Shorter Logic (Encyclopaedia of the Philosophical Sciences (1830) Part One) by Georg Wilhelm Friedrich Hegel - In this work brilliant book, Hegel explains the basic laws of dialectics starting from the notion of Being. Introduction to Phenomenology of the Mind by Georg Wilhelm Friedrich Hegel - In this introduction to one of Hegels most celebrated books, he for the first time lays out his revolutionary dialectical method.
<urn:uuid:910f91e1-afc2-407a-910b-969dc8e2a238>
CC-MAIN-2022-33
https://www.no.marxist.com/reading-guide-marxist-philosophy.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00005.warc.gz
en
0.939238
2,071
3.1875
3
Non-outrageous aver: Dr. Martin Luther King This dawning, I woke up to decline on the 7 o clock tidings and attended to the follower to notify America of tyranny environing the earth. There were stories ranging from a shootout in Homewood to wars amongst territories. If tyranny subsists to destroydown communities, there conquer end a duration where there conquer be no communities left to undo. My grandmother was talented me how today is not the corresponding day as yesterday; when brothers and sisters accelerationed each other advance through struggles. During the the1900s, communion was disingenuous consequently of complexion. Whites wanted to government the unity, but this was not in the profit of ebon populace. Blacks wanted an end to disconnection, wrongs, and stainless nonsubjection. There were abundant contrariant directors that used contrariant arrangements to struggle for the luck of this design and abundant failed. Dr. Martin Luther Despot made a bulky subsidy to the disposal of tyranny for ebons. What did Martin Luther Despot do contrariantly to acceleration ebons and stainlesss stride concomitantly following centuries of tyranny? During the 1900s, ebons were visaged following a while elder obstacles that quiescent favor populace today. Blacks were not fond opportunities to assent-to a bulky counsel. During that duration, in Mississippi, three dollars was late on an African American’s counsel and sixty dollars was late on a stainless peculiar’s counsel. Blacks were not recognized to vote and were not perceived as gentleman citizens of the United States. Whites sought to terrorize ebon populace by baring them from cling existence spontaneously. The earth was divided and ebons were left following a while the beggarly border of it. African Americans wanted vary, but they did not perceive how to produce a bulky societal vary. During the duration of tyranny athwart ebon populace, there were populace, organizations, movements, and aver that aimed for ebon strength and disconnection. The Ebon Panther Party was formed in 1966 and aimed to subvert their stainless burdenors. Booker T. Washington deliberation it would be a good-tempered-tempered purpose to decide stainlesss, consolidate lineages economically, and be detached politically. Marcus Garvey countenancerd a “end to Africa movement” consequently he saw a advenient following a while no kindness betwixt ebons and stainlesss. Black Muslims countenancerd racial disconnection and it was rationalistic in their holiness. Muhammad said “Your complete lineage conquer be undoed and removed from this sphere by Almighty God. And those ebon men who are quiescent obscure to consolidate conquer inevitably be undoed parallel following a while the stainlesss” He paradeed fur inflame to stainless populace and wanted aggregate disconnection following a while ebon nonsubjection. Malcolm X was a director that countenancerd tyranny if it was requisite to destroy down the walls of racial tyranny. By any resources requisite” is a illustrious adduce systematic by Malcolm X that parades his aspect on obtaining ebon strength. These directors are perceiven to be bulky but tyranny subsistd to build; there was quiescent no reconciliation. Whites subsistd to burden ebons and beholded for ways to produce their speeds disconsolate. Dr. Despot prized communion would be demolished if anything subsistd. He firm to catch a contrariant admission. “Darkness cannot soundness out darkness: simply unencumbered can do that. Abhor cannot soundness out abhor: simply kindness can do that” is an inillustrious adduce systematic by Dr.Martin Luther Despot Jr. Dr. Despot speedd his all existence during a duration where ebons were severely mistreated and visaged huge wrongs. He felt if ebons subsistd to combat end following a while tyranny, then there would be a earth following a while no reconciliation until it is undoed. Dr. Despot had a reverie that ebons would not be judged by the delightd of their bark but by the delightd of their order. He reverieed of a earth following a while resembling opportunities and polite rights. He wanted this reverie to beend seeing and abundant populace swingd his admission. He countenancerd six axioms to acceleration communion grasp his anticipation. I would enjoy to use this individuality of the Nursing Dissertation to found who and what revealed the manners and purposes of Dr. King. While pursuing a rate at the Crozer Theological Seminary, Despot attended to a Nursing Dissertation presented by Mahatma Gandhi. Entity revealed by his articulation, Despot peruse contrariant books written by Gandhi. He read that Gandhi used non-tyranny athwart British government in India. Despot prized this was a arrangement that could maybe allay the wrongs for ebons in America. For past swing, Despot premeditated the theories of Henry David Thoreau following a while the unwandering to produce a societal vary. Despot was frank following a while the directors who used non-tyranny such as Frederick Douglass, Philip Randolph, and Bayard Rustin, but Despot wanted everyone to get compromised. Despot partnered up following a while Ralph Abernathy and Bayard Rustin and formed the Southern Christian Leadership Conference. Despot aimed for the SCLC to be winning to the ebon habitation so that everyone would delineate a role. The 6 axioms that Despot countenancerd. Do not disgrace or worst. During this duration of wrong, there was fur unpopularity betwixt ebon and stainless populace. Blacks were regularly entity worsted by stainlesss, and they were fatigued of stainless nonsubjection. As a upshot, ebons aimed to worst their burdenors to speed existence spontaneously. Dr. King, the exalted ponderer, succeeding a whilestandd the aspect. Dr. Despot said “the nonoutrageous resister should not solicit to disgrace or worst the foe but to win his cordiality and conception. ” Dr. Despot conversant what he preached. Following Rosa Parks unusual to bestow up her confirm to a stainless man on the bus, she was arrested. Many unity directors and Dr. Despot familiar a bus boycott. This recognized Despot to appliance what he read from Gandhi. Dr. Despot was arrested and his upshot was firebombed. Following his upshot was bombed, he named out for his lineage. Instead of combating end following a while tyranny, he said “Now let's not beend panicky, if you entertain weapons, catch them home; if you do not entertain them, defrivolous do not solicit to get them. We cannot clear-up this height through retaliatory tyranny. We must enresisting tyranny following a while nonviolence. We must kindness our stainless brothers, no substance what they do to us. We must enresisting abhor following a while kindness. ” However, that did not seal him. For environing 13 months, 17,000 ebon populace in Montgomery refused to ride the bus. As a upshot, the congregation was losing too fur coin. On November 13th, 1956, the Montgomery Bus Boycott was perceiven as a good-fortune, consequently the buses were desegregated. Non-outrageous hindrance is not for cowards. Some may discipline hindrance and prize that they entertain too fur lordliness to be disrespected. Abundant deliberation it was a discourteous act, notwithstanding, Despot prized unanalogously. Despot said non-outrageous hindrance is inert and regularly solicits opportunities to persuade the foe of advantages in forming a ardent similarity. Although one is not outrageous, one subsists to soundness on advenient concomitantly. A peculiar, who soundnesss on concomitantlyness notwithstanding hindrance, is question and influential consequently it is not unconcerned to go athwart the masses. This was paraden during the Greensboro sit-in on February 1st, 1960. Indecent ebon students from North Carolina A; T State University firm to sit at the “whites simply” resisting at a topical restaurant. They did not get served and firm to cling confirmed in the individuality until they were served. They subsistd to redecline day following day and brought friends following a while them. Following a week, hundreds were stoppage to be served. The restaurant notwithstanding served the students and the aver swingd abundant non-outrageous avers throughout contrariant cities. Instead of combating, mirroring, and hating, the students beholded to eat following a while other stainless populace. The stainless populace did not enjoy it, but they had the casualty to incline the ebon students. Non-outrageous resisters assault soundnesss of misfortune. African Americans prized that they were regularly under-assault and had to caress themselves. If populace are striving for a earth unmeasured of reconciliation, misfortune has to be non-existent. During the 1900s, ebons and stainlesss had misfortune unwanderingions, but it was delicious for stainlesss to beentertain on their unwanderingions. Despot wanted misfortune unwanderingions to egress the minds of everyone and out of the earth. Despot said “We are out to worst wrong and not stainless peculiars who may be disingenuous. ” Instead of hurting the peculiar who has effected misfortune, assault the misfortune soundnesss. He wanted everyone to centralize on assaulting the misfortune soundnesss of wrong, instead of obscure to worst the stainless man. Fond you entertain butchered a stainless man; the misfortune soundnesss conquer subsist to speed. However, if you assault the misfortune soundnesss, everyone can stride concomitantly. In 1961, the Freedom Riders abided by this axiom. Ebon and stainless Freedom Riders left Washington D. C. in 1961 and rode buses, trains, and planes from city to city to aver athwart the soundnesss of misfortune that segregated interstate step. They grasped hindrance, mobs and were arrested. After fur sedulousness, bulky subsistence was gained from environing the earth. Non-outrageous resisters sanction affliction following a whileout reciprocation. Despot prized one should sanction tyranny but never confide it. This would qualify stainless populace to incline and attend to what they had to say. It may gauge crazed consequently, in today’s earth, abundant heights are dealt following a while by using reciprocation; righteous contemplate the tidings. However, prior originations contemplateed ebons sanction the abuse, and later oscillate hands following a while stainless populace. In 1963, the 16th Street Baptist Habitation was bombed and 4 ebon girls were butchered. Instead of the parents and the unity obscure to butcher Chambliss, the bomber, they sanctioned the affliction. They non-violently avered to let their language be inclined and Chambliss was sentenced to existence in prison. If they had avenged, there would entertain been past than indecent dull girls. By not retaliating, Chambliss, who had used soundnesss of misfortune, left communion. As a upshot, there was one less soundness to combat athwart. #5 In Non-outrageous hindrance, one kindnesss the foe following a while “agape. ” Agape resources absolute kindness, and Despot expected everyone to kindness their foe following a while it. Abundant populace struggled following a while this axiom consequently populace could not invent anything following a whilein themselves to kindness someone who terrorized them for so covet. Despot wanted everyone to kindness everyone notwithstanding the hindrance and tyranny. The pursuit of this permission brought abundant complexions concomitantly. Despot said “Acovet the way of existence, someone must entertain perception abundance and capacity abundance to cut off the compact of abhor. ” Despot wanted ebons to give a unencumbered on destroying this compact of abhor and to bear kindness into the similaritys. #6 In Non-tyranny hindrances, the earth is righteous. Evidently, there are abundant populace who divide difficulty in ardent your foe. Despot prizes the earth was created to be righteous, but everyone is permitted to act following a while their own permitted conquer. Populace acted following a while their own permitted conquer and brought soundnesss of misfortune into the earth. The soundnesss subsistd to amplify past the begin of duration. Despot wanted everyone to know that the earth conquer encircleate into a righteous earth. Despot encouraged others to prize that God is moving us inland complete kindness and allness uninterrupted. He used this axiom to reinsoundness to African Americans that righteousice conquer be served in God’s duration. He wanted African American activists to entertain and detain credulity that righteousice conquer be served in the advenient. All of the toil for righteousice conquer upshot in kindness, reconciliation, and righteousice everywhere is a permission that Despot perspicuous by. Some may say non-tyranny was not going to fix the wrongs in communion. In the Student Non-outrageous Coordinating Committee (SNCC), non-tyranny was their arrangement to acceleration the stipulations of ebon populace The non-tyranny admission did not toil for the SNCC; notwithstanding, they did not subsist to hold-out through the firm duration. Sedulousness is defined as well-regulated retention in a continuity of operation notwithstanding difficulties. Dr. Despot is an inillustrious truthful icon that held this feature. Populace should not entertain expected duration to vary presently following abundant years of tyranny. When Dr. Despot hold-outd and gained influential subsistence, varyd happened, and he used the arrangement of non-tyranny which brought everyone concomitantly. To terminate, Dr. King’s admission to accelerationing restore communion was very contrariant from the outrageous reciprocation that populace countenancerd. Dr. Despot overcame fur to conclude his anticipation. He dealt following a while ebons not destitute to subsistence his arrangement but to succeeding a whilestand it. He dealt following a while stainlesss always obscure to bar him from madespot a vary in communion, but Dr. Despot subsistd to countenancer and manner his axioms. He was conducive to see that ebons had been obscure to produce a vary by using tyranny for abundant years and it did not toil. He underperspicuous that if ebons fought for ebon nonsubjection then it would righteous reason war and debasement. Whites feared entity burdened and became threatened when ebons avenged; which host for past tyranny. Dr. Despot knew if a vary was going to be made, then there would entertain to be kindness in the earth. His admission was good-fortuneful consequently he got the heed of stainless populace, and they attended to what he had to say. When ebons avenged, stainlesss had no duration to attend consequently they had to behold for new ways to burden ebon populace past. I maltreat Dr. Despot consequently he was conducive to bear ebons and stainlesss concomitantly following the unpopularity betwixt the two lineages for abundant years. Presently, we entertain ebons butchering their brothers, sisters, and communities following a whileout the fruit of ebon communion. This is an upshot following a whilein the ebon unity that demands to be unwandering. What should we do? We should exercise the 6 axioms presented by Dr. King. We entertain to counsel our brothers and sisters not to aim to worst each other but to kindness and upheave up one another. We entertain to counsel our brothers and sisters that existence is not environing entity the “baddest” peculiar on the block; it is ok to stride loose out of kindness. We demand to assault the misfortune soundnesss that are causing the bad behaviors of our brothers and sisters. The populace following a whilein the ebon communities demand to be taught how to sanction it when someone strikes you in the visage and to avenge following a while kindness instead of a shot to the leader. We entertain to parade our brothers and sisters that we kindness them absolutely; as a upshot, kindness conquer soundness out abhor. It conquer be firm to counsel populace that the non-outrageous axioms toil, righteous as it was firm for Dr. King. Abundant populace are uninformed of his subsidy to communion and are insensible of his arrangement. I ponder the purposes, values, permissions, and fact of the 1900s were not passed down from origination to origination talentedly abundance. When I was in ultimate ground, my grandmother told me “if someone hits you, do not hit them end. ” She was conducive to see how talented non-outrageous avers were. My parents told me “if someone hits you, then you hit them end. ” These are two contrariant philosophies from two contrariant originations on the corresponding theme. If my grandmother’s origination would entertain talentedly passed down their values and permissions, then the earth would be contrariant. The earth would not be the corresponding consequently reciprocation may be out of the political consecutiveness. Populace entertain to train everyone on the application of non-violence. Following we entertain effected all we can do, we entertain to wheedle on God and let he conquer be effected. Works Cited Carman, J. (2010). 6 grounds environing non-outrageous hindrance. http://www.care2.com/greenliving/martin-luther-king-six-facts.html Dyson, M. E. (2008). Basic Books. Dyson, M. E. (2001). http://www.spartacus.schoolnet.co.uk/USAkingML.html King, M. (1998). The autobiography of martin Luther despot, jr. New York: Warner Books. Despot Jr, M. (1957). http://teachingamericanhistory.org/library/index. asp?document=1131 Mintz S. (2007)
<urn:uuid:fcb368fd-74e0-4d4d-b506-f2aea69ea3cf>
CC-MAIN-2022-33
https://paperanswers.com/martin-luther-king/non-violent-protest-dr-martin-luther-king/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00204.warc.gz
en
0.95408
3,826
2.5625
3
Similarly, Does the author of Harrison Bergeron like the society he describes? The author despises the culture he portrays. His argument behind the narrative is that keeping everyone the same and uninteresting is impossible. Also, the concept is absurd. He demonstrates, for example, how Harrison rebels against the government, and how many more will ultimately rebel against society. Also, it is asked, What does Kurt Vonnegut say in Harrison Bergeron? In “Harrison Bergeron,” Vonnegut argues that ultimate equality is a misguided objective that is perilous in both implementation and end, not an ideal worth striving for as many people think. In Vonnegut’s novel, the government tortures its people in order to attain physical and mental equality for all Americans. Secondly, Which statement best expresses the theme of Harrison Bergeron? Which sentence best reflects “Harrison Bergeron’s” theme? Forcing individuals to conform does not lead to equality, but rather to conflict and dissatisfaction. Also, Is the society in Harrison Bergeron a utopia or dystopia? Harrison Bergeron is a dystopian character in which society has tightly regulated the population’s individual characteristics in order to make everyone precisely equal. People also ask, What critique of society does Kurt Vonnegut convey through the satire Harrison Bergeron and how do the characters develop this message? What message does Kurt Vonnegut’s satire “Harrison Bergeron” get through, and how do the characters build this message? This exposes leaders’ actual authority, and it is not in people’ best interests to rebel against them, since they will all be punished. Related Questions and Answers What do you think the author Vonnegut is trying to say about society vs individualism? Vonnegut demonstrates that governments that do not balance their pursuit of social equality with a commitment to personal freedom and individualism can impede the well-being of a state and its citizens by exploring the suppression of individualism in favor of equality under a totalitarian government. What does Harrison Bergeron symbolize? Harrison is a symbol of the rebellion and independence that may still be found in certain Americans. He lacks the timidity and passivity that practically everyone else in the novel has. He’s more of an overblown alpha male, a tall, bold, and stunningly powerful guy who craves authority. What is the main type of conflict in Harrison Bergeron? The major struggle in “Harrison Bergeron” is an example of man against society. While many people in his culture accept their limitations,. What is the plot and conflict of Harrison Bergeron? The story’s central battle is between Harrison Bergeron and the government. Harrison opposes the government’s method of managing and handicapping society, particularly because he has multiple handicaps. Is Harrison Bergeron a man vs society? The basic conflict in this novel is individual vs. society, which is Harrison vs. the police force, or, as I like to view it, Freedom vs. Restriction, as Harrison is fighting for freedom by removing his handicaps on live television. What is the state of US society as described in the first paragraph of the story? Describe the current status of society in the United States as indicated in the first paragraph. What has been done to attain “equality”? The society is defined as “equal,” and it was accomplished “thanks to the 211th, 212th, and 213th Amendments of the Constitution, as well as the constant vigilance of United States Handicapper General agents.” What is a major theme of Harrison Bergeron which evidence from the text best supports the answer in part a? What is “Harrison Bergeron’s” main theme? People may be manipulated via technology. Which textual evidence best supports the Part A answer? “To prevent individuals like George [Harrison’s father] from taking undue advantage of their minds,” the transmitters are utilized. What is a major theme of Harrison Bergeron? Furthermore, since Harrison is depicted as a metaphor for individuality, the tone change shows the dysfunctional government, and the short tale is an allusion to a perfect society, the major subject of “Harrison Bergeron” is equality. What is the society in Harrison Bergeron? “Harrison Bergeron’s” future American society is based on communist ideas, with the belief that money and power should be dispersed fairly and that class distinctions should be abolished. What is utopia in Harrison Bergeron? A dystopia, or negative utopia, is a civilization defined by an illusion of a flawless society perpetuated via coercive social control, in which abuses into an inflated. How is Harrison Bergeron similar to current society? This narrative is similar to today’s culture in that people aspire to break free from society’s restraints of societal conventions. In today’s environment, television and/or social media, as in Harrison Bergeron’s day, has become the quickest means to obtain information about what is going on in the globe. What is Vonnegut satirizing in Harrison Bergeron? Kurt Vonnegut’s short fiction “Harrison Bergeron” utilizes humor to show the flaw in our notion of a really “equal” society. Vonnegut explains the torment and suffering the government inflicts on the individuals throughout the novel, and although they were “equal,” they were not balanced. Who is the intended audience for Harrison Bergeron? Vonnegut’s “Harrison Bergeron” is aimed at those who believe in equality and democracy yet lack a basic understanding of. See the whole response below. How is individualism shown in Harrison Bergeron? Individuality is portrayed as bad in Kurt Vonnegut’s Harrison Bergeron, as something that causes jealously and poor self-worth in others. Individuality, on the other hand, is required to drive society forward: personal accomplishments and skill will better society as a whole. What is Vonnegut saying about improving society by making everyone average? What does Vonnegut mean when he says that making everyone average would improve society? Vonnegut is arguing that making everyone average would not enhance society but will exacerbate it. Does Harrison Bergeron act heroically by rebelling against the rules of society? Harrison Bergeron does not really behave heroically by defying society’s laws; instead, he seems to believe that since he destroyed the government and discovered out what was going on, he is superior to others and should be their leader. What does Harrison do in Harrison Bergeron? George and Hazel Bergeron’s kid. Harrison, who is fourteen years old and is seven feet tall, seems to be the most advanced model the human race has to offer. He’s a genius who can also escape out of prison, a dancer who can also break out of jail, and a self-proclaimed emperor. How is imagery used in Harrison Bergeron? 1 responses We may see a person’s beauty, intellect, and physique in the imagery of hideous weights and masks. The more a person’s “handicaps,” the more superior they are. When we watch Harrison and the ballerina dance, we witness this visual come to life. Why is Harrison Bergeron’s character considered a danger to society? Why is Harrison Bergeron’s character regarded a threat to society in “Harrison Bergeron“? He is physically and mentally superior to others, putting their feeling of equality at jeopardy. He styles himself the Emperor and has devised a meticulous plan to destabilize the administration. What is person vs society conflict? A character vs. society conflict arises in literature when the protagonist is pitted against society, the government, or some cultural tradition or social standard. What is the resolution of Harrison Bergeron? In Harrison Bergeron, the resolution occurs when Hazel says she witnessed something tragic on TV but can’t remember what it was. The portion of a literary plot that happens after the climax has been achieved and the conflict has been resolved is known as falling action. How does the style in which the story Harrison Bergeron is written change in this passage? In this paragraph, how does the writing style of the tale change? It reveals their genuine beauty and how incredible they can be when not stifled. The story’s atmosphere lightens significantly throughout the dance. Why do you believe Vonnegut chose to write the dancing scene in this manner? What was Hazel handicapped in Harrison Bergeron? Hazel Bergeron is Harrison Bergeron’s mother and George Bergeron’s wife. Unlike her husband and son, Hazel is characterized as having “totally ordinary” strength and intellect (she can’t “think about anything except in brief spurts”), hence she has neither mental or physical disabilities. The setting in harrison bergeron is a society where the people are forced to wear weights that make it difficult for them to move. The protagonist, george, is not able to use his muscles and is unable to escape from this society. This Video Should Help: The “in the pedestrian,” what idea most clearly” is a society in which people are forced to move at the same speed as everyone else. The idea of this society is that equality can be achieved by making sure that no one has an advantage over another. Reference: in the pedestrian,” what idea most clearly. - which excerpt most clearly suggests that george and hazel are living in a dystopian society - what story elements most clearly suggest mead is living in a dystopian society in the pedestrian - which thematic idea best represents both harrison bergeron” and the pedestrian - which societal problem is best represented from this excerpt - harrison bergeron theme
<urn:uuid:9b996ca4-185f-48f7-bb9e-6685943289c7>
CC-MAIN-2022-33
https://curiousoyster.co/which-statement-best-describes-society-in-harrison-bergeron/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00004.warc.gz
en
0.943459
2,108
2.96875
3
Arxius de Miscel·lània Zoològica. Volum 19 (2021) Pàgines: 73-82 → GBIF: Data paper Diversity of beetles associated with watermelon crops Citrullus lanatus (Thunb.) Mats. in the region of Ouargla (southern Algeria) Kacha, D., Guezoui, O., Marniche, F., Viñolas, A.DOI: https://doi.org/10.32800/amz.2021.19.0073 CitaKacha, D., Guezoui, O., Marniche, F., Viñolas, A., 2021. Diversity of beetles associated with watermelon crops Citrullus lanatus (Thunb.) Mats. in the region of Ouargla (southern Algeria). Arxius de Miscel·lània Zoològica, 19: 73-82, DOI: https://doi.org/10.32800/amz.2021.19.0073 Data de recepció: Data de publicació: Diversity of beetles in watermelon crops Citrullus lanatus (Thunb.) Mats. in the region of Ouargla (southern Algeria) We studied the diversity of beetle families in watermelon fields in the palm grove of Zaatote at Ouargla (34º 54′ N, 5º 20′ E). The sampling method used was Barber pots as they allowed the largest number of captures of insects, regarding both individuals and species. Over the three years of the study (2016, 2017 and 2018), we identified 787 individuals from 12 taxonomic families. Throughout the sampling period, the Coccinellidae family was clearly dominant, with an Fc = 35.02 % in 2016, 36.2 % in 2017 and 34.34 % in 2018. The second most dominant family was Tenebrionidae with an Fc = 26.35 % in 2016, 30.04 % in 2017, and 33.33 % in 2018. Other families were poorly represented. In 2016, regarding their trophism, 18 species of beetles (30.91 %) were phytophagous and feed on the watermelon crop, while 26 species were predatory and decomposing auxiliaries. Data published through GBIF (Doi: 10.15470/sfhxty) Key words: Inventory, Diversity, Watermelon, Beetle, Barber pot, Ouargla Diversidad de coleópteros asociados a cultivos de sandía Citrullus lanatus (Thunb.) Mats. en la región de Ouargla (sur de Argelia) Se estudió la diversidad de familias de coleópteros en campos de cultivo de sandía situados en el palmeral de Zaatote (Ouargla) (34º 54′ N, 5º 20′ E). El método de muestreo utilizado fueron botes de Barber, que permitieron el mayor número de capturas de insectos, tanto por lo que respecta a individuos como a especies. Durante los tres años del estudio (2016, 2017 y 2018) se identificaron 787 individuos pertenecientes a 12 familias taxonómicas. En todo el periodo de muestreo, la familia Coccinellidae fue claramente dominante con Fc = 35,02 % en 2016, 36,2 % en 2017 y 34,34 % en 2018, seguida de la familia Tenebrionidae con Fc = 26,35 % en 2016, 30,04 % en 2017 y 33,33 % en 2018. Las demás familias estaban muy poco representadas. En 2016, según su trofismo, 18 especies de coleópteros (30,91 %) eran fitófagas y se alimentaban de los cultivos de sandía, mientras que 26 especies eran depredadoras y descomponedoras auxiliares. Datos publicados en GBIF (Doi: 10.15470/sfhxty) Palabras clave: Inventario, Diversidad, Sandía, Coleóptero, Trampa de Barber, Ouargla Diversitat de coleòpters associats a cultius de síndria Citrullus lanatus (Thunb.) Mats. a la regió de Ouargla (sud d’Algèria) S’ha estudiat la diversitat de families de coleòpters en camps de síndria al palmeral de Zaatote a Ouargla (34º 54′ N, 5º 20′ E). El mètode de mostreig aplicat va ser amb pots de Barber que van permetre el major nombre de captures d’insectes, tant en individus com en espècies. Durant els tres anys d’estudi (2016, 2017 i 2018), es van identificar 787 individus pertanyents a 12 famílies taxonòmiques. Durant tot el període de mostreig, la família Coccinellidae va ser clarament dominant amb Fc = 35,02 % el 2016, 36,2 % el 2017 i 34,34 % el 2018. En segona posició, la família Tenebrionidae amb el Fc = 26,35 % el 2016, el 30,04 % el 2017 i 33,33 % el 2018. La resta de famílies estaven molt poc representades. En 2016, en funció del seu trofisme, 18 espècies de coleópters (30,91 %) eren fitòfagues i s’alimentaven dels cultius de sindria, mentre que 26 espècies eren depredadores i descomponedores auxiliars. Dades publicades a GBIF (Doi: 10.15470/sfhxty) Paraules clau: Inventari, Diversitat, Síndria, Coleòpter, Barber pot, Ouargla Watermelon Citrulus lanatus (Thunb.) Mats. is an annual plant belonging to the family of Cucurbitaceae, native to tropical Africa (Paris, 2015). The ripe fruit has a high nutritional value, being rich in vitamins B1, B2, A, C, and mineral salts, particularly magnesium (van Der Vosssen et al., 2004). In Algeria, especially in the province of Ouargla, watermelon is perceived as a promising sector. According to the Directorate of Agricultural Services (DSA, 2020), the area of watermelon in crops in green houses in the 2019/2020 season was estimated to be 1,957.5 ha with a production of 1,082,500 qx/ha. The area of crops in the open field is estimated at 274 ha with a production of 31,792 qx. The harvest generally lasts from April until mid-June. Watermelon in Ouargla are now cultivated in several new agricultural areas, such as Khechem-Errih, Hassi Benandalleh, Hassi Messaoud and Taibet (DSA, 2020). Considering the rapid maturation of this crop, farmers in these regions are interested in growing this product to benefit from the high prices at the start of the marketing campaign, despite lower yields. Market gardening has become one of the main income-generating activities in the area (Toni et al., 2020). However, the crops face several phytosanitary problems, such as pest arthropods that can severely damage the output. (Diatte et al., 2016). Unfortunately, the list of vegetable crop pests in general is not well established in the region of Ouargla. To our knowledge, the diversity or abundance of insects associated with watermelon production in this region has not been studied to date. The first step to protect this crop is therefore to determine which pest and which non-pest arthropods are associated with this plant. The present study was conducted to identify and create an inventory of the different families of beetles living in watermelon fields in order to establish sustainable phytosanitary protection of the crop. We aimed to establish a basic repository in order to draw up an inventory of the main pests and evaluate the natural control agents. Material and methods The present experiment was carried out in the palm grove of Zaatote at Ouargla. Plots were chosen in cultivated watermelon fields. This palm grove is located on the road between the region of Ouargla and that of El-Goléa (10 km south-east of Ouargla) (fig. 1). The region of Ouargla is located in the Saharan bioclimatic zone. It has clay-sandy soils. The winter is temperate and summers are hot and dry. Collection and conservation of specimens’ techniques Sampling was carried out in three plots, each of 500 m², using Barber pots from December (transplanting) until June (fruiting and ripening of the first fruits). The pots used were cylindrical cans, 15 cm in diameter and 18 cm in height (Benkhelil, 1991). They were buried vertically so that the opening was at ground level to avoid the barrier effect for small species. We installed 10 traps 5 meters apart per row in each field so that there was no interaction between them. The traps were filled with water to one-third and a few drops of detergent were added to prevent insects from climbing up the walls. The pots were placed on the ground and collected after 24 hours. The contents of each pot were filtered separately on to petri dishes, labelled with number, date and place of capture, and stored in alcohol (70 %), for subsequent faunal determinations in the laboratory. The watermelon plots where traps were installed watermelon underwent phytosanitary treatment at various stages crop growth. Identification of collected insects Insects were identified by Professor Faiza Marniche at the Zoology Laboratory at the National Veterinary School of El Alia, and confirmed in the Arthropod section of the Museu de Ciències Naturals de Barcelona by Amador Viñolas. The identified species were classified according to the trophism of images and grouped into four functional groups: pests, predators, scavengers and miscellaneous in order to determine the role played by each species. Recorded data based on identified beetle catches were analysed using software PASTsoftware (PA-leontologicalSTatistics) Version 2.17 (Hammer et al., 2001). The following numerical indices were used: ● The centesimal frequency (Fc) is the percentage of individuals of a species in relation to the total number of individuals, all species combined Fc = ni * 100/N where ni is the number of individuals of a concrete species, and N the total of individuals (Dajoz, 1971). ● The Shannon Diversity Index (H’) is calculated from the formula: H’= – ∑ Pi log 2 Pi expressed in bits (Ramade, 1984); where Pi is the probability of encountering species and it is calculated by the formula: Pi = ni/N where ni is the number of species’ individuals i; and N is the total number of individuals. ● The Pielou equity index (E) corresponds to the ratio of the observed diversity H’ to the maximum diversity H’max: E = H’ / H’max, it is expressed in bits (Ramade, 1984) and H’max is calculated using the formula H’max = Log2 S (Blondel, 1979). Sampling using Barber pots over the three study years (2016, 2017 and 2018) allowed us to draw up the list of beetles found on watermelon crops in the region of Ouargla. We collected a total of 787 individuals of beetles: 277 individuals in 2015 (Fc = 35.21 %), 213 in 2016 (Fc = 27.06 %), and 297 in 2017 Fc = 37.73 %). Twelve families were identified (fig. 2). The family Tenebrionidae was the most represented with a predominance of the species Mesostena longicollis (Lucas, 1858). The families Coccinellidae, Scarabaeidae and Curculionidae were represented by five species, followed by the Carabidae with four species. The families Anticidae and Staphylinidae were each represented by three species (table 1). We also identified two species for each of the families Chrysomelidae, Elateridae and Dermestidae. The Nitidulidae and the Cryptophagidae families were represented by only one species each. Concerning the Shannon diversity index (H’) for collected beetle families in watermelon fields according to the years of collection, 2018 was the most diverse (H’ = 4.63 bits), followed by 2016 (H’ = 4.3 7 bits) (fig. 3). These high values reflect the importance of the richness and diversity of the selected environments. The Pielou equity index (E) was substantially similar over the three years of study. The diet of the harvested species was divided into five trophic categories. Figure 4 shows the predominance of predatory beetles, with a rate of 45.81% in 2016, 45.53% in 2017, and 43.59% in 2018. Most of these predators were Carabids and Coccinelidae. Pests were most numerous in 2016 (30.91%). The proportion of scavenging insects, however, was almost identical over the three years of sampling. The aim of this study was to determine which beetle species were associated with the watermelon crop in the region of Ouargla. This would be the first step towards developing methods to control plant pests and to preserve auxiliaries in the environment. The beetles we identified belonged to 12 families, the most common being Tenebrionidae, Coccinellidae, Carabidae, Scarabeidae, and Curculiondae. The Shannon Index of the beetle family showed that watermelon fields were colonized by approximately the same number of insect families over the three years of the study. Furthermore, the equity index was close to unity, indicating a relatively similar abundance among the families with similar diversity over the years of the study. This is most likely explained by the cultural practices being similar throughout the study. Coleoptera are the richest group of insect species in the world. Their widely diverse way of life (as phytophages, decomposers, auxiliary, predators, etc) allows them to play an ecological role in agro ecosystems (Kromp, 1999). Eighteen species of beetles were identified as pests. The most harmful species (Oxythera feunesta, Phyllognathus exavatus, Tropinota squalida, Anthicus floralis, Heliotaurus sp.) were observed in watermelon plots in the region of Ouargla. These results were similar to those found by Tendeng et al. (2017) who demonstrated that the culture of Cucurbitaceae harbors a multitude of insects from many orders. Same authors have reported that pests of Cucurbitaceae: Bactrocera cucurbitae, Leptoglossus australis and Diaphania indica have also caused problems in the production watermelon, and also cucumber, in the region of Basse Casamance (Senegal). The low production of watermelon and cucumber in Lower Casamance was explained by the fact that many producers were discouraged by the significant damage caused, in the main, by B. cucurbitae (Tendeng et al., 2017). In contrast, in a study on the auxiliaries of vegetable crops on Reunion Island (Vayssières et al., 2000) showed that the main pests identified in the Cucurbitaceae family were: Bactrocera cucurbitae (Coq.), Dacus ciliatus Loew, Dacus demmerezi (Bezzi) (all three being Diptera, Tephritidae) and Aphis gossypii Glover (Hemiptera, Aphididae). The results also demonstrated that alongside pests, many useful beetles (predators and decomposers) coexist in watermelon crops. Zappalà et al. (2013) indicated that the presence of auxiliaries (predators and parasitoids) contributes significantly to the decrease in the numbers of pest populations, thus reducing the need to intervene to control their development. According to Son et al. (2018) the presence of natural enemies is partially linked to that of pests. According to Vayssières et al. (2000) Coccinellidae beetles are polyphagous predators not only of Aphididae but also of Aleyrodidae, Margarodidae and Coccidae, especially in the larval state but also in adults. Scymnus constrictus Mulsant has been observed as an essential predator of A. gossypii on Cucurbitaceae in all coastal areas and at medium altitude. The present study allowed us to determine the biodiversity of insects associated with the watermelon crop in the region of Ouargla, Algeria. This is the first step towards setting up a database that could provide useful information before establishing a pest control strategy. After identification, 50 species of beetles belonging to 12 families were listed (table 2), essentially belonging to the families of Tenebrionidae, Scarabaeidae, Coccinellidae, Carabidae, Curculionidae, among which, 14 genera and species of insects are recognized as pests. Besides the coexistence of pests and useful insects we identified 12 species of predators and 14 species of decomposers. This inventory represents a first approach and constitutes a working tool for the implementation of integrated pest management actions. To Berta Caballero and Glòria Masó, curators of the arthropod collections of the Museu de Ciències Naturals de Barcelona, for their facilities for consulting the specimens deposited in the entity. We thank Dr. M’Lik Randa for the help given to the writing of this document.
<urn:uuid:9047f830-0e8d-4f34-a550-08d21e35429a>
CC-MAIN-2022-33
https://museucienciesjournals.cat/amz/issue/19-2021-amz/diversity-of-beetles-associated-with-watermelon-crops-citrullus-lanatus-thunb-matsumura-and-nakai-in-the-region-of-ouargla-southern-algeria
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00205.warc.gz
en
0.799648
4,050
2.53125
3
As a conservationist, I find myself thinking a lot about the word “diversity”. Concerning nature, the word is “biodiversity”, and we use it as a proxy for the health of ecosystems. This refers not only to the types of plants and animals in an area, but also their genetic diversity, which produces the strongest, healthiest, and most adaptable organisms, as well as the types of landscapes they inhabit and adapt to. Diversity leads to resilience, and it is the reason we, and every other living thing on the planet exist. It is why we have fireflies that glow in the dark, and whales that sing across oceans, and feathery fractal ferns that drink water out of the air. It is the reason we have trees that live for millennia, oysters that make their own gemstones, and a fruit called a peacotum (which is what you get when you cross a plum with a peach with an apricot, and it’s every bit as awesome as it sounds). Humans come up with a lot of strange ideas. Some of them are so strange that they make no sense at all out of context, and when I’m not pondering the etymology of the word “diversity” (from the Latin divertere, meaning “to face both ways”, for those of you curious) I wonder how humans came up with all these diverse ideas. Sometimes it helps to think of ideas as if they were living things. After all, they reproduce if we choose to share them with others, and they live in the context of other ideas, thoughts, and habits. We call this collection of self-replicating ideas a culture. If a culture is an ecosystem of ideas, do the same rules for creating health, wonder, and resilience apply? What does it mean to cultivate diversity? As a queer person, I find myself thinking a lot about rainbows. Not just because it’s Pride month and they’re everywhere, but what our flag represents: a spectrum of light, an infinite gradation of colors we have a limited vocabulary for. Nature exists along a spectrum. This doesn’t always sit with our human desire to neatly label everything, because nothing natural exists in a homogeneous little box. Just as we like to label every species, sub-species, and variants of sub-species, we also like to label each other and ourselves. Lesbian, gay, bisexual, trans: we put a plus sign after LGBTQ because the diversity of human gender and sexuality was threatening to run out of alphabet before we ran out of identities-don’t worry, it’s not a test designed to fail the un-woke! It’s there because the grand spectrum of human potential has more words to describe it than we have letters to list. Labels can be helpful even when they are not perfect. No one label strictly defines us, none fully captures us, and we all have a collection of labels for ourselves vying for relevance in any given situation. This collection of labels is called “intersectionality” (from the word “intersect”, meaning a thing that passes through or comes together with another). We usually talk about intersectionality when we are talking about privilege and people’s advantages and disadvantages in society. Sex, gender, race, class, religion, ability… these labels and more go into the variance within us; they make us who we are as much as our genetics shape our physical body, and much like our genetics, our intersectionality benefits greatly from a healthy dose of diversity. As a scientist, I find myself thinking a lot about the truth. What is it, and how do we find it? How do we generate new ideas, and create a culture that promotes scientific discovery? Science is a process that concerns itself greatly with what is repeatable and relevant; what is true. We are human. The truth is our sex, sexuality, and gender exist along a spectrum, and we are as diverse in our internal identities as external ones. A culture that values those truths will reap the benefits of the people who live them-after all, we will never recognize the truth outside of ourselves if we do not begin by being true to ourselves. To all of my fellow queer conservationists, scientists, and nature lovers; to all of our friends, families, and allies; and to everyone willing to protect and celebrate diversity and authenticity: Happy Pride! What Do Sloths Eat? Sloth Diet, Food, and Digestion Sloths are folivores It takes up to 30 days to digest a leaf Ambient temperature affects sloths’ digestion Sloths eat small quantities of leaves per day Sloths have unusual toilet habits What is a folivore? A folivore is an animal that specializes in eating leaves. From the Latin folium meaning “leaf” (same root word as foliage) and the suffix -vore, meaning “to eat” or “to devour”, it refers to any animal that exclusively or primarily eats leaves. All species of sloths are folivores. The three-fingered sloth eats leaves and occasionally seed pods (like Cacao pods), while the two-fingered sloth has a more varied diet that sometimes includes both seed pods and fruit. What kinds of trees do sloths eat? Sloths as a species eat leaves from over 90 different kinds of trees, however, any given individual usually rotates between half a dozen to a dozen kinds of trees. They inherit these preferences from their mothers. Sloths are iconically associated with the Cecropia, and indeed these trees are an important part of reforestation programs that help restore sloth habitat. However, sloths need much more diversity in their habitats and diet than this. Montgomery and Sunquist (1975) listed 28 tree species and three lianas used for food by nine Brown-throated sloths (B. variegatus) and Queiroz (1995) listed 16 plant species in a study also carried out with Brown-throated sloths in the Mamirauá Reserve, in the Amazon. Cacao pods and leaves (Theobroma cacao) Sangrillo (Pterocarpus officinalis) Colorado (Luehea seemannii) Chilamate (Ficus insipida) Sapotaceans (Micropholis venulosa) Fig trees (Ficus spp) Apocynaceas (Mandevilla sp.) Barrigon leaves and flowers (Pseudobombax septenatum) Trees evolved leaves to collect and process sunlight, not to be eaten, and leaves have very tough cell walls containing large amounts of cellulose. Mature leaves may also contain chemicals that build up over time and make the leaves toxic if eaten in large quantities. Leaves also contain very few calories compared to other food sources, and in order to eat enough leaves to meet their energy requirements, folivores have some unique feeding habits and specialized digestion. Sloths do not digest the nutrients from leaves directly. Instead, they have a very complex digestive system that enables bacteria in the sloths’ gut to ferment and break down the leaves; the sloths derive their caloric and nutrient requirements from this gut bacteria. How does ambient temperature affect sloths’ digestion? As with most mammals, the gut bacteria of sloths are sensitive to temperature, however, sloths are poikilotherms, meaning that compared to most mammals sloths do not maintain a constant body temperature. Instead, the ambient temperature of the surrounding rainforest determines how warm or cold a sloth is. This is a very efficient evolutionary strategy to help sloths save energy and camouflage them from predators that detect infrared radiation (such as some snakes), but it makes sloths very vulnerable to extreme temperatures. If a sloth gets too cold, the bacteria in their gut can die and leave the sloth unable to digest any more food. Even if the sloth warms back up, the bacteria will have been killed off and the sloth could starve to death—even with a full stomach full of leaves. In rescue centers that specialize in rehabilitating wild sloths, emergency probiotics taken from healthy sloths can replenish this gut bacteria and save a cold sloth from starvation. A long-held presumption in ecology is that sloths get all the water they need from the foliage they consume, and few documented observations exist of either of the two sloth genera (Bradypus and Choloepus) drinking in the wild. Rainforests, in general, are becoming hotter and dryer with global warming. In addition, fragmented forests in urban areas tend to have hotter temperatures in the understory, because of more light penetrating the forest. Dr. Rebecca Cliffe believes that this is making urban sloths need to drink more and travel further to find water. Sloths are mammals, which means that they nurse their young on milk. Baby sloths crawl onto their mother’s stomach immediately after birth and cling to her, suckling small amounts of milk throughout the day. Producing milk is energetically expensive, so sloth moms can’t store much milk–instead, they produce milk on-demand as the baby needs it. What do baby sloths eat? Young sloths begin supplementing their diet with leaves as young as one week old. Baby sloths are very curious about what their mother is eating, and they will sample leaves from her mouth as she eats. As they do this, they learn which leaves are good to eat and which to avoid, and this early exposure will stay with them throughout their lives. Teaching baby sloths which leaves to eat is a major challenge for rescue centers that seek to raise orphan sloths to return to the wild. Many captive sloths live in zoos far from their native tropical rainforests. This can make getting fresh, natural foliage for sloths’ diets very difficult, and so many organizations will feed sloths whatever plants are available, such as vegetables, including root vegetables and plants from non-tropical climates, which they have not evolved to eat. The typical food plate for a two-fingered sloth in captivity consists of boiled carrots, eggs, flowers, celery, green beans, and bananas. This diet has far too much glucose for sloths and can lead to health complications including diabetes and heart disease. It is theorized that this has a negative impact on sloths’ health and lifespans, however, this will only be confirmed once scientists can better evaluate the lifespans of wild sloths and compare them to sloths living in captivity. How long does it take sloths to digest leaves? Sloths digest leaves like they do everything else: slowly. A single leaf can take up to 30 days to pass through the sloth’s digestive tract. Unsurprisingly, this is the slowest digestion rate of any mammal. Humans, for example, digest their food in 24 to 72 hours (1 to 3 days) depending on what kind of food it is, and hummingbirds can complete a digestive cycle in 10 minutes. Sloths’ digestive systems Sloths have some very unusual anatomy, and their digestive system is no exception. Of particular note is the fact that a sloth’s esophagus has a loop in it; instead of connecting in a direct line from the mouth to the stomach (as in humans), it forms a loop like a roller coaster. This helps any swallowed food stay in the stomach while the sloth hangs upside down in the trees. Their unusual esophagus keeps sloths’ food in their large, four-chambered stomachs no matter what. A sloth cannot vomit, belch or even fart, so it is very important that they do not eat anything bad for them or anything that produces excess gas. Some amount of gas is produced from the gut bacteria as part of the digestion process; this gas is diffused into their bloodstream and carried away to be slowly expelled through the lungs or skin. Sloths’ large stomachs also act as a floatation device when the sloths must swim across rivers to reach new territory. Are sloths geophages? Geophagy is when animals intentionally eat earth or soil, including clay, chalk, or termite mounds. Two-fingered sloths have sometimes been known to eat dirt from the ground, which is a far cry from their usual diet of leaves from the sky! Animals may do this to aid in digestion, absorb toxins, or access nutrients not found in their usual diet. It is thought that the sloths engage in geophagy to supplement nutrients and minerals that are sometimes not available in leaves. How are sloth toilet habits unusual? Sloths are very particular about how and when they go to the bathroom. Although they live in the canopy, they travel all the way to the forest floor to poop. Wild sloths defecate approximately once per week, and they can poop out as much as 30% of their body weight when they do. Sloths’ pooping ritual involves climbing down to the base of a tree, doing a special “poop dance” that includes wiggling their rear end back and forth, and in the case of three-fingered sloths, digging a small hole with their tail to poop in. Two-fingered sloths do not have tails and skip this step. When they are finished, the sloth climbs back up the tree and resumes hanging out in the canopy. Sloth feces is rich with nutrients and makes an excellent fertilizer for the trees they inhabit. Sloth fur is a miniature, mobile ecosystem that the sloths carry around with them. Fed by rainwater, algae grows on the hair, moths reproduce in sloth feces and then migrate back to a sloth to begin the life cycle over again. It was once speculated that these verdant green algae acted as a kind of garden, fertilized by moths, that the sloths would eat (from themselves and each other), supplementing their diet with nitrogen and phosphorous. While sloths groom their fur daily, they do not lick their fur like a cat would, and they are not social animals and do not engage in social grooming. The algae grow in specialized cracks in the sloths’ fur and are not found in sloths’ digestive systems, suggesting that they do not consume it. Additionally, there is no evidence suggesting that the algae feed off of moths or their byproducts. The role of sloth moths and how they benefit the sloths is not well understood, and much more research is necessary to understand the details and unique nature of the sloth fur ecosystem. Sloth fans in the United States – Mother’s Day is fast approaching! What better way to show your love and appreciation than by adopting a sloth in your mom’s name? We offer several different payment plans, and 100% of proceeds go directly towards funding our in-field sloth conservation efforts so it’s a double win! Sloth babies fully rely on their moms to teach them how to survive in the canopy of the rainforest… just like your mom had to do when you were a baby (although hopefully with less time spent in a tree)! You can still get your virtual adoption package even if you order ON Mother’s Day, so don’t worry about being late. The world is waking up to the palm oil crisis that has driven orangutans to the brink of extinction, but is boycotting palm oil really the answer? Unfortunately no, but that doesn’t mean that we are powerless. Last week the UK supermarket chain Iceland shone the international spotlight on palm oil after its controversial Christmas TV advert was banned from British television. The advert, which depicts an orangutan hiding in a child’s bedroom after loggers destroyed his rainforest home, has now been watched over 30 million times online making it one of the most successful Christmas adverts ever created. Similar to the anti-plastic movement that is sweeping across the world, this advert has stimulated an uproar against the palm oil industry. While it has been overwhelmingly successful at raising awareness of a very important issue, fears are growing as increasing numbers of people are demanding a boycott on palm oil. This is dangerous. Palm oil is used in approximately 50% of everything that we buy, ranging from food and shoes to cosmetics and cleaning products. It is everywhere and the demand is huge. Consequently, palm oil plantations are responsible for the majority of Malaysian and Indonesian deforestation, with a football pitch-sized area of forest being cleared every 25 seconds in Indonesia alone! However this is not just an issue affecting Asia. Palm oil plantations are also springing up in place of the sloths rainforest habitat in South and Central America, further adding to the ecosystem destruction occurring due to crops such as soy, bananas and animal agriculture. Boycotting palm oil, however, doesn’t mean that manufactures will simply remove oil from their products all together. It simply means that they will be forced to replace it with a different kind of vegetable oil. Unfortunately, palm oil is already the worlds most productive oil crop. All alternative oils such as soybean and rapeseed require up to 10 times more land to produce the same amount of product – increasing demand on these crops would be even worse. In addition, boycotting palm oil will drive the price down, consequently increasing the demand for use in biofuel and livestock feed, particularly in countries such as China and India. So what can we do? Thankfully the answer applies to all aspects of consumerism, and will have benefits for species and habitats globally (including sloths!): sustainable shopping. Think carefully about the products that you buy because as the consumer, you have the power. Only choose products from manufacturers and retailers who use ingredients from sustainable, certified, legal and deforestation-free sources. They exist, you just have to know which ones to look for! We know this sounds like a lot of hard work – who has time to read every label and search online for every product that you want to buy? But the good news is you don’t have to! There is a wonderful (and free!) bar-code scanning app called Giki that will do all of the hard work for you. Just scan the product that you want to buy and it will tell you all of the information you could ever want to know about that product. Whether it’s local pollution, global climate change, conservation, animal welfare or health, it will give you everything that you need to make an informed decision! Thankfully, using this app will also help you to avoid fruit and produce that is contributing to the sloth deformity epidemic in Costa Rica by way of rampant pesticide usage and forest fragmentation. It’s a win for everybody!
<urn:uuid:cf23265d-a66b-4a94-b331-f13b21ac8ec3>
CC-MAIN-2022-33
https://slothconservation.org/tag/sloth/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572077.62/warc/CC-MAIN-20220814204141-20220814234141-00604.warc.gz
en
0.956454
4,088
2.640625
3
Bring Us Back to You, O Lord Lamentations 4—5 The destruction of Jerusalem and the Temple in 586 B.C. smashed, like so much pottery, everything that had given God’s Chosen People a sense of national identity (Jer. 19:10–11). The process had not been quick, however. Babylon’s military forces breached the walls only after a prolonged, two-year siege with its accompanying horrific effects. Jeremiah the prophet witnessed it all, and the Holy Spirit moved him to inscribe the nation’s grief in the form of poetic laments, resulting in the book of Lamentations. Throughout Lamentations, Jeremiah skillfully painted word pictures to describe the terrors he experienced. His palette included metaphors, parallelisms, and personifications that bring color and intense feeling to the pages of this heartrending book. Jeremiah’s tears flowed for the terrible suffering the Jewish people endured during the babylonian assault. Although the narrative accounts do not go into great detail (2 Ki. 25; Jer. 52), Lamentations does, describing the ordeal graphically. Jeremiah’s tears also flowed because he realized God brought holy and due justice on an unrepentant, sinful nation. Through His prophets, God had pleaded incessantly with Israel to repent. He had even forewarned the nation as far back as Moses (Dt. 28:15–68; 32:24–25). Jeremiah himself had predicted similar horrors (Jer. 19:7–9). Instead of repenting, the nation mocked and scorned God’s messengers until it was too late (2 Chr. 24:19–21; 36:15–16; Jer. 7:25–26). Throughout Lamentations, Jeremiah acknowledged the sins of his people, declaring them worse even than the sins of Sodom (4:6). consequently, God’s judgment was justified. The magnitude of the disaster God brought suggests that He abandoned His people. How could such complete devastation insinuate anything else? Still, Jeremiah, through his tears, did not give up hope. He knew his God. Thus he cried out to Him for mercy and restoration. Chapter Four: Remembering Ruination In the fourth chapter of Lamentations, Jeremiah testified concerning the horrible days of siege, famine, and destruction. He staggered at how Israel was treated (vv. 1–2). Its situation implied the nation had little value, no more than clay pots. Images of famine and its animalistic effects on human beings haunted Jeremiah (vv. 3–10). He described infants dying of thirst because their mothers refused to nurse them. Even the lowly jackal does not behave so cruelly, he said. Children beg for a scrap of food, but no one gives them any. The once refined members of society now have no qualms about wallowing in garbage. The religious devotees, once beautiful and admired, now resemble walking skeletons, their skin darkened and shriveled like tree bark. The famine was so severe that Jeremiah said, “Those slain by the sword are better off than those who die of hunger; for these pine away” (v. 9). The sword, at least, was quick. The ravages of famine were so terrible that tenderhearted mothers boiled and ate their own children: “The hands of the compassionate women have cooked their own children; they became food for them in the destruction of the daughter of my people” (v. 10; cf. Dt. 28:57). Yes, Jeremiah brooded, the Lord truly had vented His great rage. He burned with such wrath that the foundations of Israel’s society were not only shaken, but destroyed: “The Lᴏʀᴅ has fulfilled His fury, He has poured out His fierce anger. He kindled a fire in Zion, and it has devoured its foundations” (v. 11). Outsiders “would not have believed” that Jerusalem could have been overrun by conquerors (v. 12). Yet it was, because of the sins of Israel’s corrupt spiritual leaders. These holy men had turned into violent thugs who murdered those more righteous than they (v. 13). Their vicious actions brought consequences. God despised such immoral phonies and scattered them among the nations to become dishonored outcasts and untouchables (v. 16). Jeremiah remembered that looking for outside help, some sort of last-minute ally, proved useless: “In our watching we watched for a nation that could not save us” (v. 17). Egypt drew away the Babylonians for a short time, but the relief was only temporary. God made sure they returned and burned the city of Jerusalem (Jer. 37:5–8). Once the city was breached, the Judeans ran for their lives. The Babylonians, however, hunted them down wherever they went: “They tracked our steps So that we could not walk in our streets. Our end was near; our days were over, for our end had come” (v. 18). Even King Zedekiah, whom the people of Israel had looked to for protection, was captured while he was fleeing (cf. Jer. 52:8). Jeremiah’s thoughts then turned to a particularly unpleasant memory. Edom, one of Israel’s neighbors and, in fact, a distant relative, apparently had rejoiced at Israel’s disaster, participating in the sacking of Jerusalem and even cutting down Jewish fugitives in their flight (Obad. 10–14). Their actions especially galled Jeremiah. He sarcastically encouraged Edom to go on rejoicing over Israel’s plight. But what goes around comes around. The cup of God’s wrath and judgment, he warned, will one day come to Edom, just as it had to Israel. Israel’s punishment was over. Edom’s was yet to begin. Chapter Five: Requesting Restoration Then Jeremiah prayed to Yahweh, making what seems like two requests. He asked that God remember Israel’s calamity: “Remember, O Lᴏʀᴅ, what has come upon us; Look, and behold our reproach!” (v. 1). The words look and behold are synonymous parallels with remember. Thus there is really only one request in this opening verse. When someone in the Bible calls on God to remember, he does not imply that God has forgotten or is even capable of forgetting. The speaker simply draws attention to the situation and looks to God for the beneficial outcome. In drawing attention to Israel’s situation, Jeremiah summarized the distressful facets of the nation’s predicament (vv. 2–16). Foreigners now controlled Israel’s property. Jeremiah’s people were destitute and unprotected, like orphans and widows. Even the basic necessities of life, such as water and wood, now cost money. They were worn out from their oppressors’ hounding. They were dependent on foreign aid. They bore the punishment for the sins of their dead ancestors. There was no true governing authority. (Gedaliah, the Babylonian-appointed governor, had been assassinated, Jer. 41:2.) They ventured outside to get food at the risk of their lives “because of the sword in the wilderness” (v. 9). At the same time, they suffered from starvation. The women had been ravished. Their leaders had been executed and dishonored. Younger men struggled under forced labor. Common, everyday experiences—such as old men’s guidance, young men’s carefree amusements, and a sense of lightheartedness—were all absent: “Our dance has turned into mourning. The crown has fallen from our head” (vv. 15–16). Israel’s honor was completely gone. As Jeremiah contemplated all the grief and shame his people bore, he painfully moaned, “Woe [literally, Oy] to us” (v. 16). Still, he conceded that the troubles came because of Israel’s own sin. Jeremiah concluded that Israel was left with little hope and much despair (vv. 17–18). The consummate illustration of the nation’s wretchedness was the condition of mount Zion. No worshipers strolled there, only foxes. Jeremiah recognized Yahweh’s eternal sovereignty (v. 19). God was in control. Since that was true, Jeremiah courageously asked God, for the first time in the book of Lamentations, the ultimate question—one that has been asked by humankind throughout the centuries when confronted with great sorrow: Why? “Why do You forget us forever, and forsake us for so long a time?” (v. 20). In poetic parallel form, Jeremiah inquired about the duration of God’s apparent rejection, wondering if it would be permanent (similar to his inquiry in Jer. 14:19–21). born in grief, Jeremiah’s question was rhetorical, meant to “remind” God of what Jeremiah himself had prophesied before the desolation of Jerusalem: Thus says the Lᴏʀᴅ: “If heaven above can be measured, And the foundations of the earth searched out beneath, I will also cast off all the seed of Israel For all that they have done,” says the Lᴏʀᴅ (Jer. 31:37). Because Jeremiah was convinced God is faithful to His Word, he submitted a second request. He asked for restoration: “Turn us back to You, O Lᴏʀᴅ, and we will be restored” (v. 21). This request is the crux of the chapter, if not the whole book, and is similar to Ephraim’s request in Jeremiah 31:18: “Restore me, and I will return.” The sentence could be roughly translated, “bring us back, Yahweh, to You in order that we might return to our previous state or course of life.” The second sentence of verse 21, “Renew our days as of old,” is simply a poetic parallel of the same request in the first sentence. In effect, Jeremiah asked God for the good old days. but he understood that the good old days are only good when people are right with God. To return to the good old days, Israel first needed to return to God. Jeremiah concluded the book with a slight expression of doubt. bring us back, he said, “Unless You have utterly rejected us, and are very angry with us!” (v. 22). Surveying the consequences of Israel’s sin and the intensity of God’s wrath, he could not help but wonder if God had utterly rejected His people. Yet he knew that such a thing could not be true. As he said earlier, “For the Lord will not cast off forever. Though He causes grief, Yet He will show compassion According to the multitude of His mercies” (3:31–32). “Do not fear, O Jacob My servant,” says the Lᴏʀᴅ, “For I am with you; for I will make a complete end of all the nations to which I have driven you, but I will not make a complete end of you. I will rightly correct you, For I will not leave you wholly unpunished” (Jer. 46:28).
<urn:uuid:e8774602-1dd3-4f00-9725-2d9a724eb1fc>
CC-MAIN-2022-33
https://israelmyglory.org/article/bring-us-back-to-you-o-lord/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00203.warc.gz
en
0.965849
2,441
3.625
4
Today we tell you the story of Nikola Tesla, Austrian inventor, born on July 10, 1856 in Smiljan, a village of the Austrian Empire that is now Croatia. He has left several very important contributions to technological development. Among his main studies are radio transmission, robotics, remote control, radar, nuclear physics, computer science and alternating current. He was the most prolific inventor ever known, with 900 patents filed, not to mention the many works that he never patented and those that were usurped from him. But let’s go from the beginning … Childhood and studies of Nikola Tesla Nikola Tesla was born to an illiterate but creative and intelligent mother. His father was an Orthodox priest. Legend has it that Tesla was born during a lightning storm. From an early age, Nikola was able to perform very complicated mathematical calculations in his head, which normally required calculation tables. In addition, he was also very good at learning languages and his visual memory was sensational. In fact, he had the ability to represent a machine so precisely that he could even reproduce its functioning. A sort of forerunner of Sheldon Cooper from The Big Bang Theory, a series that pays homage to Tesla and his inventions over and over again. In 1875 he entered the Graz Polytechnic School in Austria. He already dreamed of creating a flying machine. When he studied Gramme’s dynamo, which worked sometimes as a generator and other times as a motor depending on the direction of the current, he imagined the advantages that could be obtained from alternating current. He also studied philosophy, among other things. The student impressed all his teachers with his intellectual abilities which surpassed not only those of all his classmates, but also of the teachers themselves. In 1881, due to lack of means, Nikola Tesla abandoned his studies for a job as an official at the Central Bureau of Hungarian Telegraphs. Very quickly he became chief engineer for the first telephone system in Hungary. But it was in 1882 that Tesla discovered something that would mark a turning point in people’s lives at that time: the rotating magnetic field, for which he filed patents in 1886 and 1888. The rotating magnetic field is a fundamental principle of physics, which underlies all devices that use alternating current. In parallel, Tesla began working at the Edison Continental company in Paris. A few years later he was invited by Thomas Edison himself to work with him, and it was then that Tesla moved to New York. Nikola Tesla and Thomas Edison: allies and rivals As we said earlier, in 1884 Nikola Tesla arrived in the United States alongside Edison, who had just built a DC power grid for the entire city of New York. However, this system suffers frequent accidents, breakdowns and fires. Furthermore, electricity cannot be transported over long distances, and therefore requires the use of relay stations every 3 km. To all this is added another big problem: the voltage cannot be changed. Therefore, the current must be produced directly at the same voltage required by the devices. This therefore requires several specific distribution circuits, depending on the desired voltage. To solve this problem, Tesla proposes to use alternating current which would be a suitable solution. But Thomas Edison is opposed, as a fervent defender of the direct current. After a heated debate, Tesla can finally work on alternating current and Edison promises him $ 50,000 if he can. Tesla succeeds, but Edison does not offer him the promised sum, which is why he resigns in 1885. This clash over the current is well explained in the 2017film The Current War, starring Benedict Cumberbatch as Edison and Nicholas Hoult as Tesla. …and then rivals In 1886 Nikola Tesla created his company: Tesla Electric Light & Manufacturing. But very quickly he had to resign, because he did not agree with financial investors who asked him to develop an arc lamp model, without using alternating current. Having invested all of his savings in this business, Tesla finds himself on the street, while his associates enjoy the profits from his work and his patents. In 1888, Georges Westinghouse bought Tesla’s patents for $1 million and hired the young man. He then developed an alternating current production system in competition with Thomas Edison’s direct current. Thus, in 1893, the Westinghouse company had the opportunity to install the entire electrical infrastructure of the United States. Meanwhile, the prolific inventor created the Tesla coil. It is a high frequency alternating current transformer which can greatly increase the voltage. Today this coil is found in electrical systems that require high voltage, such as televisions, computers, and hi-fi devices. Thomas Edison goes to great lengths to prove that alternating current is not the right solution, proving that it can be dangerous. He kills many animals by electrocution. Tesla defends himself strongly. In fact, he invents a bulb with a better light output than those of the Edison types, which we can currently use. However, it needs a high frequency power supply. Prove that the high frequency current is harmless. For this reason, Nikola Tesla lends itself to being used as a current conductor to demonstrate its harmlessness. Edison then ended up losing the electric current war. Ironically, his defeat came due to corporate financial interests who realized that the Tesla system was much cheaper and more functional, becoming the global standard. Nikola Tesla’s global recognition In 1896, Tesla developed a hydroelectric system that converted Niagara Falls energy into electricity, thus powering industries in the city of Buffalo. The generators were produced by the Westinghouse company. The company is almost on the verge of bankruptcy due to numerous lawsuits over the Tesla patents it uses, but also due to expensive investments to equip homes and industries with electricity. Additionally, Westinghouse realizes that the contract signed with Nikola Tesla mentions a $ 2.5 royalty for the engineer, and that’s for each power sold. Thus, Westinghouse owes him nearly $ 12 million! The leaders then manage to convince Tesla to buy back his rights and patents for $ 216,000, because Nikola thought that the Westinghouse company would not have sunk and that the alternating current could benefit everyone. Therefore deciding not to claim the royalties promised by the contract. Tesla prevented the Westinghouse company from going bankrupt. In the same year he filed the patents for the first radio system. But Marconi will falsely claim to have filed one before. For this latter Marconi received the Nobel Prize in Physics, thinking he was the inventor of the radio. In 1943, shortly after Tesla’s death, the United States Congress revoked Marconi’s radio patent. Despite this, many still believe that radio was born thanks to Marconi and not Tesla, which is absolutely false! Most famous inventions by Nikola Tesla In 1898 Nikola Tesla built a radio-controlled boat. The automaton, certainly too ahead of its time, did not catch the attention of many people. Few saw the point of such a machine, while others thought it was a deception. In 1899 he additionally discovered the terrestrial standing waves, which for him was his greatest discovery. He wanted to show that we can carry energy through the ground or through the upper atmospheric layers. He then built a high voltage transformer surmounted by a copper sphere placed 37 meters high. During an experiment, he turns on 200 wireless lamps 40 kilometers away! Wireless is an understatement! In 1900 he undertook the construction of a 57 meter high tower. This Wardenclyffe tower could theoretically draw its energy from the earth’s crust, thus transforming it into a gigantic generator. Tesla believed that everyone, anywhere on the planet, could and should have access to electricity, for free. However, short of means and funding, he stopped his project in 1903 before the tower was destroyed in 1917. Gradually, Nikola Tesla sinks into oblivion. His promising inventions, with the aim of being available to everyone almost free of charge, compete with large companies interested in money. Few people want to finance his work in this way. However, he continues his experiments and continues to create and imagine, because his only goal is to improve the human condition. He had dreamed of flying from his youth and had left his job aside to take care of electricity. In 1921 he filed a patent for a propeller flight device with vertical takeoff, similar to today’s helicopters. In 1928 he filed his last patent which took over his 1921 flight device, to which he made improvements. Mystery around Nikola Tesla Tesla died of a heart attack, alone, in the New Yorker Hotel, between January 5 and 8, 1943, at the age of 86, in a room that is still used today. At the time of his death, the inventor was continuing to work on the teleforce, a project he had unsuccessfully proposed to the US War Department; it appears that the proposed ray – which the press had renamed “ray of peace” or “ray of death”. Although Tesla was forgotten by many after his death, the FBI did not forget him. Over time he collected all of Tesla’s patents, works and inventions and classified them as top secret. Gradually, however, the FBI made his inventions and patents public. But the mystery persists: why did the FBI recover all of his work? And today has he revealed all the works classified as top secret or is he still hiding some of them? Some articles and interviews with Nikola Tesla show that he had many projects and works in progress, in addition to the one on the “death ray”. There are those who speak of a flying machine that can move in any direction with self-propulsion thanks to certain frequencies that are reflected on the surfaces. Furthermore, Nikola Tesla talks about this invention in one of his autobiographical books. That is why the mystery surrounding this machine is even greater! Why is there no trace of this in what the United States government has revealed? Others think Tesla would have created a time machine. This device would be both transmitter and receiver. It does not move, but acts as a “portal” between different eras. There are still many mysteries surrounding Nikola Tesla’s inventions, with for example the use of free energy. Sometimes, when we talk about some of his inventions, we no longer know where the limit is between myth and reality. The only things we are certain of are found in his patents, in his autobiographical writings, in interviews of the time or in the testimonies of his relatives which are in the public domain. He was certainly a man who had predicted the future. In an interview, then advanced in years, he stated that we could video call each other and stay connected with each other at any time of the day through wireless technology. Maybe that’s why David Bowie, the man who came from outer space, wanted to play him in the movie The Prestige. In 1975, Nikola Tesla was officially described as one of America’s greatest scientists. 2006 was proclaimed by UNESCO and the governments of Serbia and Croatia as the year of Nikola Tesla. On the occasion of the 150th anniversary of his birth, on 10 July 2006, the reconstructed village of Smiljan was opened to the public together with the house of the great scientist, set up as a museum in memory of him; a new multimedia center was also dedicated to Tesla’s life and work. Maybe we can make a leap, since, at the moment, we are not too far from this city. And maybe we go aboard a Tesla car, which obviously pays homage to the brilliant inventor that we also remember today.
<urn:uuid:4b3e4963-0b27-4fa2-ab90-380b35cff4b9>
CC-MAIN-2022-33
https://www.zoastudio.com/en/2022/07/10/nikola-tesla/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573242.55/warc/CC-MAIN-20220818154820-20220818184820-00605.warc.gz
en
0.978604
2,402
3.171875
3
Movies like Anaconda and all its sequels may have you wondering whether or not your ball python can swim too. After all, it doesn't seem to care much for water except when it soaks in its water bowl, right? Can ball pythons swim?\n\n\n\nBall pythons can swim. They have often been observed swimming in rivers and lakes in the wild. A ball pythons' ability to swim stems from a survival mechanism and is not used for travel or hunting.\n\n\n\nHome video of ball python swimming.\n\n\n\nIn this article, we investigate just how good ball pythons are at swimming, whether they even like water in the first place, whether or not they can drown, and if it's a good idea to give your ball python a bath or put a bathing bowl in its enclosure.\n\n\n\n\n\n\n\nAre Ball Pythons Good Swimmers?\n\n\n\nDespite the fact that ball pythons are capable of swimming, its not a huge surprise to find out they aren't exactly the best swimmers around. \n\n\n\nThis is mainly due to two things - they are terrestrial snakes, and they are native to West and Central Africa.\n\n\n\nTerrestrial snakes, true to their name, spend the majority of their lives on land. They don't typically climb trees or swim to hunt or move and will stick to the fields in most cases. \n\n\n\nBall pythons are very much terrestrial snakes. They spend their days burrowed beneath rocks or soil, and their nights hunting for mice or rats found mainly in the bush or grasslands. \n\n\n\nSince they have no real need to swim, their abilities have not developed to the point where they could be classified as good swimmers.\n\n\n\nSome ball pythons may prefer staying close to a water source like a river or lake, and this may mean it has to swim every now and then. Not all ball pythons do so, however, and whether or not they will get into the water in the wild is entirely up to their individual disposition and personality. \n\n\n\nThe other reason why they are not commonly good swimmers is as a result of their origins. Ball pythons are native to West and Central Africa, a region of the continent known to be arid at times and often suffer from droughts or extended dry seasons. \n\n\n\nSince they do not come into contact with large bodies of water all that often in the wild, it makes sense that they wouldn't be the best at swimming. \n\n\n\nBall pythons mostly use their swimming ability when there is absolutely no alternative and are certainly not on the same level as other pythons.\n\n\n\nCan Ball Pythons Drown?\n\n\n\nUnlike many other species of snake that only have one functioning lung, ball pythons have two. They breathe in oxygen just like all land animals and need it to survive. Since they require air to live just like all other terrestrial creatures, it is very much possible for them to drown if submerged underwater for too long.\n\n\n\nMost of the time, ball pythons' instincts will tell them to get out of the water if it's too deep. This means the chances of a ball python drowning are very slim, and only likely if they are forced or trapped underwater. \n\n\n\nBall pythons can also tire from swimming and will eventually drown in deep water if they can't find a way out. \n\n\n\nDo Ball Pythons Like Water?\n\n\n\nAlthough they are not great swimmers, many ball pythons do love water. Other than them needing to drink water to survive, water can also aid in shedding and help a ball python relax. \n\n\n\nIn many cases, water also increases the humidity of the air around it, which ball pythons especially enjoy as they prefer humid climates. \n\n\n\nWe discuss the benefits of water to ball pythons in the next section.\n\n\n\nDo Ball Pythons Soak in Water?\n\n\n\nAh! Don't we all love a good soak in the tub after a long day? You may be surprised to discover there's a good chance your ball python likes it too! \n\n\n\nSome ball python owners have noticed their snake submerge itself in its water bowl for what seems like ages. Water is extremely important to ball pythons and they may be soaking in it for a variety of reasons including the following:\n\n\n\nThey Enjoy It\n\n\n\nJust like humans, some ball pythons may simply like water. This is very much dependent on your snake's personality, but there is no harm in letting it soak whenever it feels like it as long as the water is replaced and the bowl is cleaned after every session. \n\n\n\nIf you notice your ball python has an affinity for water it may be worth letting it soak in warm water every now and then as well. \n\n\n\nCold water won't necessarily hurt a snake, it may just cool them down too much and eventually make them uncomfortable.\n\n\n\nThey're Having a Problematic Shed\n\n\n\nYou may notice your ball python chooses to soak in its water bath exclusively when shedding. This is actually a natural instinct and extremely beneficial to the shedding process. \n\n\n\nMost reptile owners know they need to crank up the humidity when their pets are beginning to shed, and for ball pythons, soaking has almost the same effect.\n\n\n\nThe water helps loosen its skin and could be especially useful if there are still pieces of old skin stuck to the snake after it has shed. \n\n\n\nIf the ball python completed its shedding cycle but has not yet lost its eye caps, soaking could be an excellent solution as well. \n\n\n\nMake sure to get your ball python in water almost daily in this case. If the eye caps don't fall off by themselves after a few days of soaking, take your ball python to the vet. \n\n\n\nNever try to remove eye caps yourself.\n\n\n\nThey're Dehydrated\n\n\n\nIn this case, you may notice your ball python spending more time than usual in the water despite it not being near its shedding cycle. \n\n\n\nIf you suspect your snake is dehydrated, check for the signs such as wrinkly skin, constipation, and sunken eyes. \n\n\n\nInstead of just letting your snake soak, it is important to correct its tank conditions. Soaking will not stave off dehydration in the long term.\n\n\n\nCheck the temperature, humidity level, and heating pads in its tank and ensure they are in the correct range. Also, make sure it has an ample supply of chlorine-free drinking water in a clean bowl. \n\n\n\nIf the ball python's condition doesn't improve, take it to a vet.\n\n\n\nThey're Too Hot\n\n\n\nJust like humans, ball pythons will soak in cool water if their surroundings get too hot. \n\n\n\nIf you notice your ball python soaking in its water bowl more than usual, and you're sure it's not due to dehydration or shedding, check the temperature of its vivarium. \n\n\n\nThe ideal temperature range would be between 78 and 82 degrees Fahrenheit. \n\n\n\nIf it is above this, the problem is relatively simple to rectify and should be done immediately.\n\n\n\n\n\n\n\nCan Ball Pythons Hold Their Breath?\n\n\n\nIf you've ever seen a ball python soak, you may be wondering how it can completely submerge itself underwater, head included, for such a long period of time. \n\n\n\nAlthough most ball pythons can hold their breaths for anything between 4 and 10 minutes, some are able to do so for up to 20! [Source]\n\n\n\nThere's generally nothing to worry about if your ball python's head is underwater for a while, as long as you are sure it can get out when it wants to.\n\n\n\nCan I Bathe My Ball Python?\n\n\n\nBelieve it or not, the bathing of ball pythons is a much more common occurrence than you may imagine. Most people can't fathom the idea of giving their snake a bath, but it is a widespread practice and provides a lot of benefits to your snake. \n\n\n\nIf you want to bathe your ball python, fill the tub or a plastic pool with just enough relatively warm (not hot or boiling) water to reach just below the thickest part of the snake's body. Ensure this water is clean and, if possible, chlorine-free as some ball pythons are allergic to it. \n\n\n\nPlace your snake in the tub, ensure it can't escape, and then simply leave it to relax for anything up to 20 minutes. However, if your ball python thrashes when in contact with water it might not like the sensation and shouldn't be forced into the bath.\n\n\n\nBathing your ball python not only helps with shedding and keeping it hydrated, but it could also help kill mites on the snake's body. \n\n\n\nA secure bath is also a great spot to put your ball python on days when you are cleaning its tank. If you are worried about your ball python drowning, simply place a scrunched-up towel in the bath so it has somewhere to rest its head outside the water.\n\n\n\nSome owners prefer giving their ball pythons outdoor baths which are said to stimulate their mental activity as well as their immunity. It's also quite fun to do together with your ball python on exceptionally hot days.\n\n\n\nAlways take care when first introducing your ball python to the concept of a bath. While some ball pythons will love the water, others may despise it. [Source] \n\n\n\nShould I Include a Bathing Bowl in My Ball Python's Enclosure?\n\n\n\nAs has been explained above, your ball python's reaction to water may range from love at first sight, to pure hatred. If you notice your ball python seems to enjoy soaking in its water bowl, it may be a good idea to invest in a larger bathing bowl. \n\n\n\nThis should only be added if the tank is big enough to still provide the ball python with ample place to hide and burrow after the bathing bowl is installed.\n\n\n\nIt is also essential to remember ball pythons won't know the difference between a water bowl and a bathing bowl and will drink from both. \n\n\n\nThis means you absolutely must replace the water in whichever bowl it used after it has soaked. It is also good practice to clean the bowl with a weak bleach-water mixture and leave it in the sun to dry. \n\n\n\nWarm water, especially in its bathing bowl, may encourage digestion and end up with the ball python pooping in the water. In this case, you should clean the bowl and replace the water immediately, and regardless of this, you should still be changing your ball python's water every day without fail. \n\n\n\nConclusion\n\n\n\nAlthough ball pythons do not naturally have an affinity to swimming, many do enjoy water outside of just drinking it. \n\n\n\nMuch of this depends on the ball python's personality and temperament and it is never a good idea to force any snake into water. Despite all ball pythons being able to swim, it doesn't mean they like doing it. In a ball python's head, the only reason for it to swim may be as a survival tactic which is why some ball pythons seem desperate to get out of any body of water. \n\n\n\nIt's important to take note of your snake's preferences and not push it out of its comfort zone. This could cause frustration for you, stress for your ball python, and a deterioration of the trust built between owner and snake.\n\n\n\nIf you're lucky enough to own a ball python that likes water, though, there are endless opportunities for it to have fun swimming, soaking, or bathing as the need may arise.
<urn:uuid:d006b3fa-a502-49a1-93f8-9cf80fa34875>
CC-MAIN-2022-33
https://mercurypets.com/tag/ball-python-swimming/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00405.warc.gz
en
0.962664
2,815
2.9375
3
|Home -> Other California Books -> History of California -> Chapter 16 - The Hidden Treasures of Mother Earth| The Hidden Treasures of Mother Earth Thousands of years ago, before the time of which we have any history, there were rivers in California, - rivers now dead, - whose sides were steeper and whose channels were wider than those of the rivers in the same part of the world to-day. Rapid streams they were, and busy, too; washing away from the rocks along their sides the gold held there, dropping the yellow grains down into the gravelly beds below. After a time there came down upon these rivers a volcanic outflow; great quantities of ashes, streams of lava and cement, burying them hundreds of feet deep, until over them mountain ridges extended for miles and miles. Other changes in the earth's surface took place, and in the course of time our streams of to-day were formed. As they cut their way through the mountain ranges, some of them crossed the channels of old dead rivers, and finding the gold hidden there, carried some of it along, rolling it over and over, mixed with sand and gravel, down into the lower lands under the bright sunlight. Here it was found by Marshall and the gold hunters who followed him. These were the placer mines of which we read in Chapter VII. Gradually the best placer mines were taken up and the newcomers to the gold fields traced the precious metal up the streams into the gravel of the hillsides. Then was begun hydraulic mining, where water did the work. In the canons great dams were constructed to catch the flow from the melting snows of the mountains, and miles of flumes were built to carry the water to the mining grounds. Immense pipes were laid and altogether millions of dollars were invested in hydraulic mining. The water coming down under heavy pressure from the mountain reservoirs passed through giant hose which would carry a hundred miner's inches, and, striking the mountain side with terrific force, washed away the earth from the rocks. Down fell the sand and gravel into sluices or boxes of running water where cleats and other arrangements caught and held the gold, which was heavy, while the lighter mixture was carried out into the canyon. The material thus dumped on the mountain side was called debris, and to any one living in the mining region of the state that word means trouble - means fighting, lawsuits, ruin. For the debris did not stay up in the canyon, but was washed down into the rivers, overflowing farm lands, spoiling crops and orchards, and making the streams shallow, their waters muddy. So great was the destruction this process caused that, in 1893, the Congress of the United States enacted a law which provided for the creation of a Debris Commission to regulate the business of hydraulic mining in California. The result of the investigations of this commission was to put a stop to all hydraulic mining in territory drained by the San Joaquin and Sacramento rivers, or any other territory where the use of this form of mining should injure the river systems or lands adjacent. Thus, almost in a moment, the important industry was stopped. It is estimated that over one hundred million dollars were invested in hydraulic mining. Much of this was entirely lost, as the expensive machinery rusted and the water system fell into ruins. It was very hard for the miners, as well as for the commerce of the state, but the act of the government was based upon the principle that one man's business must not damage another man's property. Clever engineers in the pay of the government are still trying to find some way by which the debris can be safely disposed of in order that this valuable system may resume operation. Deprived of the use of water as their agent, gold hunters next tried mining by drifts; that is, by tunneling into the mountain's side until the bed of a buried river is reached. These tunnels are often five thousand to eight thousand feet long. The gold is brought out of the ground before it is washed clean of the gravel. Sometimes it is mixed with cement, when it has to be crushed in rollers before it can be cleared of other material. The counties where drift mining is most in operation are Placer, Nevada, and Sierra. Quartz mining is the most expensive manner of getting out gold, and a great deal of valuable and complicated machinery has been invented for this branch of the business. The quartz mines of California are among the richest in the world, and some of the greatest fortunes of modern times have been made from them. In a mine of this kind there is generally a shaft, or opening, extending straight down into the earth, from which, at different levels, passageways branch out where the veins of gold are richest. The openings must be timbered to prevent caving in, and there must be pumps to remove the water as well as hoisting works to take out the material. Then on the surface, as near as possible to the mouth of the mine, must be located the quartz mill. When possible, a tunnel is used in this mining, which makes the handling of ore less expensive, for then there need be no hoisting works or pumps, since the tunnel drains itself. Gold in quartz rock is generally in ledges or veins, one to three feet in width. Digging it out is not very hard, save where there is not enough room to stand upright and use the pick, or when, in a shaft deep in the ground, the heat makes it difficult to work. A California boy at the mines wrote recently: "Mining is not so bad; that is, if I could get along without the occasional whack I bestow upon my left hand. Last week I started a little tunnel and pounded my hand so that it swelled up considerably. Drilling is not hard, and loading is a snap, but it's all interesting work and there is the excitement of seeing what you are going to find next." When the ore reaches the surface it is sent to the mill, where it is first pulverized, then mixed with a chemical which goes about catching up the grains of gold - arresting and holding them fast. It is quite a long process before the gold is completely separated from all other material and ready for shipment. Often the quartz contains other minerals of value, the separation of which requires much work. There is a very rich mine in Nevada called the Comstock, which some years ago had sunk its shafts so deep into the earth that it became almost impossible for the miners to work on account of the great heat, the bad air, and the quantity of water which had constantly to be pumped out. How these troubles were remedied is the story of one of California's greatest and best citizens. Adolph Sutro was a Prussian by birth, and his adopted state may well be proud to claim him. He had built a little quartz mill in Nevada, near the Comstock mine. Seeing the suffering of the workmen in all the mines on that mountain side, he thought of a plan for the construction of a large tunnel which was to begin at a low level at the nearest point of the Carson River and run deep into the mountain so that it could drain all the rich mining section, give good ventilation for the deep underground works, and afford a much cheaper and more convenient way of taking care of the ore. It was to be four miles long, with branches extending from it to different mines. Its height was to be ten feet; width, twelve, with a drainage trench in the center to carry away the waste water to the Carson River, and tracks on each side for the passage of mules and cars. At first the mine owners were pleased with the project, and Mr. Sutro succeeded in forming a company to build the tunnel. Then he went to Washington, where the government became so interested in his plans that on July 25, 1866, there was passed an act of Congress granting Sutro such privileges in regard to public lands as would safeguard his work. About the time that the news of this action reached the West, the men who owned the mines and had made an arrangement for the use of the tunnel, decided that they did not want the work done; it is said, for the reason that they found Mr. Sutro too wise and far-seeing for them to be able to manage him. At all events, with all their wealth and power they tried to ruin him. They said that his plans were worthless, and any one was foolish to invest in the tunnel company. Then Mr. Sutro, by means of lectures upon the subject, appealed to the people. In California, Nevada, the Eastern states, and even Europe, he told what his plans would do for the miners and the good of the country. It was not long before he gained all the help he needed, and the great work was begun. As the workmen progressed into the mountain side there were many difficulties to overcome. Day and night without ceasing the work went on. Laborers would faint from the combined heat and bad air, and be carried to the outer world to be revived. Carpenters followed the drillers, trackmen coming closely after. Loose rock, freshly blasted, was tumbled into waiting cars and hauled away over rails laid perhaps but half an hour before. Constantly in the front was Sutro himself, coat flung aside, sleeves rolled up. In the midst of the flying dirt, great heat, bad air, dripping slush, and slippery mud he worked side by side with the grimy, half-naked miners, thus showing himself capable not only of planning a great work, but of seeing personally that it was well done, no matter with what sacrifice to his own ease and comfort. After the tunnel was completed, Mr. Sutro sold his interest in it for several millions of dollars. How that money was expended, any visitor to San Francisco well knows. With it were built the great Sutro baths, with their immense tanks of pure and constantly changing, tempered ocean water, their many dressing rooms, their grand staircases, adorned with rare growing plants, their tiers of seats rising in rows, one above another, with room for thousands of spectators, and their galleries of pictures and choice works of art. Over all is a roof of steel and tinted glass. Nowhere else in America is there so fine a bathing establishment. Besides this there are the lovely gardens of Sutro Heights, developed by Mr. Sutro's money and genius from the barren sand-hills of the San Miguel rancho. In addition to these is the choice library of about two hundred thousand volumes, which is of great use to the people of San Francisco. Perhaps neither San Francisco nor California has yet quite appreciated the value of the work of Adolph Sutro. Since 1848 the state of California has sent to the United States Mint over one billion dollars in gold. Of this, little Nevada County, which seems to be worth literally her weight in gold, has sent over two hundred and forty million. The Empire Mine is the leading producer of California, but there are others nearly as rich. Nevada City is in the center of this mining country. The streets are very hilly, and after a heavy rain people may be seen searching the city gutters and newly-formed rivulets for gold, and they are sometimes rewarded by finding fair-sized nuggets washed down from the hills above. A visitor to one of the deep mines of California says: - "We descended to the seven hundred foot level, where the day before a pile of ore had been blasted down. A little piece of the quartz, crushed in a mortar panned out four dollars in gold. I picked out one piece of rock, not larger than a peach, and the manager, after weighing and testing it, announced that it contained ten dollars in free gold. The kick of a boot would reveal ore which showed glittering specks of pure gold." In the estimate of many people all very valuable mines are supposed to be of gold, but this is a mistake. While gold is king in California, copper mining is rapidly becoming of great importance. A continuous copper belt, the largest yet discovered in the world, exists under her soil, and while a comparatively small depth has been so far attained, the profit has been considerable. One of the largest quicksilver mines in the world is at New Almaden. The value of the output of the borax mines is over a million dollars a year. There were mined in California in 1907 over fifty different materials, most of them at a value of several thousand dollars a year, with some as high as a million and over. The mineral product of California outranking gold in value is petroleum, which has added greatly to the wealth of the state. Natural gas and mineral waters are also valuable commercial products. To many, the most interesting class among minerals is the gems, of which California yields a variety. The beautiful lilac stone, Kunzite, was discovered near Pala, San Diego County. This county has also some fine specimens of garnets, and beautiful tourmalines are being mined at a profit. San Bernardino County yields a superior grade of turquoise from which has been realized as much as eleven thousand dollars a year. Chrysoprase is being mined in Tulare County, also the beautiful new green gem something like clear jade, called Californite. Topaz, both blue and white, is being foun d, and besides these, many diamonds of good quality have been collected, principally from the gravels of the hydraulic mines. In 1907 there was discovered in the mountains of San Benito County a beautiful blue stone closely resembling sapphire, more brilliant but less durable. It was named, by professors of mineralogy in the state university, Benitite, from the place where it was discovered. Perhaps the most valuable of all the products of California is its water supply, either visible as in springs and streams, or underground as in artesian water. Of its use in irrigation, we have already spoken. In the production of electricity it is coming to be of the greatest importance, making possible the most stupendous works of modern times. Such is the undertaking of the Edison Electric Company in bringing down to Los Angeles, over many miles of the roughest country, power from the Kern River, tapping the tumultuous stream far up in the Sierras. The taking of the necessary machinery to those heights was in itself a wonderful labor. The power thus created is a blessing to a wide region.
<urn:uuid:698efcca-db7d-44d9-a7a4-5814761fd0c2>
CC-MAIN-2022-33
http://www.books-about-california.com/Pages/History_of_California_HEB/History_of_California_Ch16.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00205.warc.gz
en
0.97892
2,988
3.21875
3
A Brief History 1895, the Town of Cocoa was incorporated. First in the order of business, establish a governing body. Modeling after the Mayor-Council form of government, they quickly nominate and elect the town leaders. According to the minutes of the council meeting held on October 01, 1895, the office of the Marshall/Collector was established. Geo. (George) L. Lynch was nominated and elected without opposition as Cocoa’s very first “Chief of the Police Force,” though this office would not be formally referred to as a “Police Chief” for decades to come. The duties of this office also included those of the Town’s collector of taxes, much as the historical sheriff’s had been. By the month’s end, the clerk had reported the receipt of the handcuffs ordered for the town. By November 1895, the town had established its first salary ordinance. The Chief/Marshall/Collector would earn $40/month plus $1 for each conviction where the fine is paid in full. Upon conviction, “vagrants, loafers, tramps, or suspicious characters” could be ordered to pay a $50 fine ($1,695 in 2020 dollars), work for the town at a salary 60 cents per day ($33 in 2020 dollars), or be hired out to the town. Being the Town’s first Marshall must not have been all that it was cracked up to be. Although the available records do not indicate why, Marshall Lynch submitted his resignation on February 11, 1896, just shy of 6 months on the job. Mayor W. L. Hughlett and the Town Council appointed Jas. (James) A. Paine as acting Marshall. After an advertisement had been placed in the Cocoa Rockledge News for the Town Marshall/Collector the council met again on February 15, 1896 to consider the appointment. After the Marshall/Collector salary was reduced from $40/month to $35/month, four of the applicants withdrew their applications and Acting Marshall Paine was reappointed. By August 1896, the Town had enacted an election ordinance which established an annual election day on the Monday preceding the second Tuesday in October. Each of the Town’s administrative positions would be elected by the people on an annual basis, including the Town’s Marshall/Collector. By October 1900, the office of the Marshall/Collector had changed hands twice more. By then the duties had been revised to permit the Mayor to order the Marshall/Collector to also act as the janitor for the Town Hall and public buildings. By November 1900, the Town had yet another Marshall/Collector, but he too resigned and Paine had been reappointed in January 1896 but will have resigned again within eleven months. It wasn’t until October 1927 that the office of the “Chief” moved from an elected position to an appointed one. Each year, after the election results were announced, the Mayor would announce his appointment and the Council would vote to confirm. By this time, the now “City of Cocoa” had elected/appointed eleven (11) new Chiefs since Paine last held the position. They had also added two (2) night policemen to the now force of three (3). On May 17, 1929, the Cocoa Tribune reported that Cocoa had purchased a new Ford Touring Car. Chief Wyatt Tucker and Officer H.L. Evans would use this patrol car with the words “Police-City of Cocoa” painted on either side. It was reported that the word “Police” on either side of the car means; “watch out or we will catch you.” October 1929 brought the start of the Great Depression and with it a reduction in salaries. By October 1932 the Chief’s salary had been cut in half from $200 to $100/month and the night policeman’s from $140 to $90/month. Six months later, Chief Tucker submitted his resignation and the City had eliminated all paid vacations for their employees. By the early 1940s, the country was already fully engulfed in World War II. The City however continued to grow. The police department had gone from Ford to Chevrolet and back to Ford. They purchased a 2-cylinder police motorcycle, which was assigned to Officer L.W. Silsby, and the City had constructed the Cocoa Municipal Airport. Shortly following World War II in 1945, the City had appointed its 20th new Chief, W.C. Bussell, who had been with the now four (4) man force since November 1942. The City had since abandoned its Municipal Airport venture, in the vicinity of the now standing National Guard Armory, and joined forces with the City of Titusville to create the Titusville-Cocoa Airport (TICO). On October 23, 1945, E.G Harvey was appointed as the City’s first “Colored Policeman”. Officer Harvey would serve the City of Cocoa for at least the next ten (10) years. On January 15, 1946, the City enacted ordinance No. 1273 creating the office of the city manager. Mr. Walter Bartholomew of Tarpon Springs, FL was hired and became the City’s first City Manager. By October of that year Bartholomew would also assume the duties as the city clerk and by July 1947 the City had called and received for his resignation. Claude H. Dyal was appointed as the city clerk and the city manager’s position would remain vacant until March 1952, when Dyal would be named as the new city manager. In September 1949, just prior to the start of the Korean War, it was announced that the police department would be getting two-way radios. A sending and receiving set would be installed in the car(s) and also the police phone booth (Magnolia/Hughlett Ave) or in the police department office. In September 1950, the police department received two (2) General Electric 50-watt mobile radios and the now force of six (6) was continuing to grow. Friday July 9, 1954, one of the most tragic days in the history of the Cocoa Police Department. Lt. Roy D. Blake was shot and killed in the line of duty. Details are sketchy at best, but reports indicate that, according to a witness, Lt. Blake was shot with his own service revolver in an apparent accidental self-inflicted incident. Lt. Blake had been an officer with the department since April 23, 1946. A plaque memorializing Lt. Blake now hangs in the current police department lobby. In April 1947, the City submitted a legislative request to modify the City charter and to change their form of government from a Mayor-Council to a Council-Manager system. Although the city ordinance had already been revised, the proposed charter was reportedly rejected by the people. By June 1957, this would become a volatile point of contention and a major power struggle between the mayor, H.L. Hughlett, the City Manager, Claude H. Dyal, and the Police Chief, G.E. Dempsey. Who had direct control over the police department? The City was still operating under the charter from 1929, wherein a Mayor-Council system was in place. However, the ordinance No. 1273 from 1946 had established a Council-Manager system. In a letter to council, Mayor Bennett called for the immediate suspension of the police chief for insubordination and cites his dissatisfaction with the city manager as well. The council rejects his request and Mayor Bennett ultimately files suit against the city council and City Manager Dyal. Three months later in September 1957, as the Nation was in its 2nd year of the Vietnam War, Chief Dempsey submits his resignation after 11 ½ years of service. Lt. Arthur Corlew was named acting chief of police. Three (3) months later, Mayor Bennett submits ordinance No. 1433 abolishing the office of the city manager. The next day, City Manager Dyal submits his resignation. In January 1958, now Chief Art Corlew is authorized to hire the City’s first “policewoman” to serve as parking meter enforcement. Available records indicate that on Monday February 10, 1958, Doris Adkins filled that position with an annual salary of $3000 ($28,711 in 2020 dollars). It is unclear just how long she served in this capacity as her name never appears within the council minutes’ employee roster. Providing the police department with a FY59 budget of $77,439 ($741,134 in 2020 dollars), the 1957 and 1958 council had been tagged with the title “A Do Something Council.” Relations between the mayor, council and the police department seemed to have settled for the time. Chief Arthur C. Corlew was hired by the City of Cocoa in May 1952 as a parking meter patrolman with a salary of $220/month ($2,148 in 2020 dollars). At the time of his retirement in March 1983, the City had finally almost settled into a Council-Manager form of government. Chief Corlew had served his community for nearly 30 years, 25 of which were as the Chief of Police. To date, Chief Corlew is the longest-sitting police chief ever to have served the City of Cocoa. Over the next 10+ years, the City would see five more chiefs and in 1994 Chief Richard Masten assumed the helm. By December of his first year at his new post, Masten will have lost two of his leaders in the department. Acting Captain Mike Blubaugh and Officer Roy Swinson were the first of many to fall after the FBI and the IRS announced a federal probe into gambling and racketeering. Though no arrests had been made yet, 22 federal search warrants had been served and Blubaugh and Swinson were suspended. In the next three months, it was announced that two more detectives were under investigation and were suspended. Before the investigation concluded, several officers submitted their resignations and walked out in protest of the investigation and support of the suspended officers. The Department was divided and bleeding. Chief Masten would resign his post after only two (2) years while the rest of the department tried to heal. To date, there remain only a handful of employees who worked through this who still remain. June 1999, the department moved into its newly-constructed current home at 1226 West King Street. Under the leadership of Chief David Crawford, the agency left its former home at 300 Brunson Blvd. and began to build its reputation as a professional law enforcement organization. The Brunson facility was occupied in December 1964 after moving from the City Hall building in the 200 block of Willard St. The new facility was a state-of-the-art police facility and quickly gained recognition throughout the law enforcement community. After receiving certification from FDLE as a designated training site, the agency began to host a multitude of outside quality training to agencies throughout the country. Portions of the basic recruit academy through the Brevard Community College (now Eastern Florida State College) were also held at the facility. In June 2003, the agency entered into a contract with the Commission for Florida Law Enforcement Accreditation and began the three-year process of obtaining state accreditation. In June 2006, Chief Phillip Ludos, Deputy Chief Mark Klayman (later Chief 2007-2013) and Accreditation Manager Sgt. John Hankins (now retired chief) appeared before the commission and were awarded the agency’s first State Accreditation. The agency has been reviewed and has received reaccreditation every three years since, and in April 2021, the agency was reviewed and passed for the 6th time under the guidance of Chief Michael P. Cantaloupe. Chief Cantaloupe was hired in December 1990 and had served as the Chief since 2013. After 30 years of service, Chief Cantaloupe retired in December 2020. Upon Chief Cantaloupe’s retirement, (then) Commander John Hankins assumed the duties as Chief of Police until his own retirement a few months later. In the interim, the City cast a nationwide net, in search of top candidates for the next chief. In 2021, the City of Cocoa appointed its first African-American chief of police, Evander Collier IV. Chief Collier retired from the Jacksonville Sheriff’s Office, where he served the county as Assistant Chief of a district, and now leads the Cocoa Police Department into the third decade of the 21st Century. Now, after over 125 years, the agency employs roughly 100 paid employees, over 70 of which are sworn, as well as a host of volunteers, and the agency is on its 33rd named Police Chief. This project has been a 125-year journey through time. Currently our walls of history throughout the police department do not extend beyond 1957. It is hopeful that this research grows and our employees are reminded of where we once were, so they understand where they must go.
<urn:uuid:cc64a1af-7dea-418f-9803-5983d69512e1>
CC-MAIN-2022-33
https://cocoafl.gov/1675/Department-History
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00405.warc.gz
en
0.986151
2,703
2.5625
3
“The rebel” by D.J. Enright, and “Festival”” by Kenneth Wee - Pages: 8 - Word count: 1861 - Category: Poetry A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteedOrder Now “The Rebel” is written from a third person view. The poet is quite removed from his own poem. He cites a few situations, and is purposely adding an ironic twist to the poem, even as he is relating their behaviour in the given situations. He is also kind of stereotyping rebels, showing only one aspect of their behaviour. He is taking it as a given point that rebels almost always act the same, which is why he is alluding to this certain behaviour of theirs. The main focus of the poem is to show the difference between rebels and the other members of the general public. The poem is written with a clear point in mind to make, that is-to emphasize the need that society has for rebels, for even as the are making life tricky and, occasionally, quite unpleasant for others, rebels are required to maintain a continuous flow of new life and creativity-some varying ways of doing normal things that may be better or can just add some spice and additional interest. “Festival”, however, is written from a first person view, as seen from the use of ‘I’ and ‘We’ in the poem. It is also very much like a personal recount, the persona relates his own experiences and feelings during a Chinese festival, probably the New Year, for lion dancers and spring couplets [used as good luck charms to usher in a good year ahead (only used by the Chinese)] are mentioned. The focus of the poem is the differences, and yet ironic ‘fake’ similarities between the persona’s generation and his/her grandparents, such as both generations have ‘door gods’, but the door gods for the older generation are for religious/protection purposes, while the door gods for the younger generation are merely their idols, and do not really have any special significance. The poet apparently means the obvious difference between the ‘door gods’ as a mocking pun. Although the persona and his grandparents are only about two generations apart, they seem to have a totally different conception of everything, and are on vastly different wavelengths (cannot understand each other, don’t know how to communicate). The persona of “The Rebel” is most likely an adult, for he is able to make calculated views of rebels, yet, being like a regular adult, he is unable to really grasp what rebels are doing and why, he is merely stating what they do externally. Thus, besides the fact that they may be good, and are necessary, he is not really able to make any other conclusions. He sounds like a typical adult, with an exasperated and irritated tone reflected in the poem. There is that constant insinuation that they are always doing the opposite, on purpose, and to no use at all. He probably sees them constantly in his daily life doing fairly controversial things. In comparison, although the persona of “Festivals” is a teenager and is unable to make a link between his grandparents and him, he is certainly quite perceptive of this gap. He is a model of the current teenager and their relations with the older generation. He is proud of his being Chinese; yet he realizes that being Chinese is more than just skin colour or genes. Although he may be born a Chinese, he has totally no roots, no understanding about Chinese culture and tradition. Everything about him is English, Western, pizzas, rock hit, Shakespeare etc. He knows all this, and portrays it all in a very ironic tone, yet, a sad undertone, that he has been ‘Westernized’, can be felt. The persona in “The Rebel” is quite aggravated, and very disparaging towards rebels, maintaining that although it may be good to be a rebel, “You may not find it very good” to be a rebel against society. He is very sure in his views. However, the persona in “Festivals”, although showing much understanding of his situation, is unsure and sad. He does not like his position as a Westernized Chinese, yet he likes Western things and has a distaste for traditional Chinese things. He is pensive, and shows it in an paradoxical reflection: And we think: “I’m proud to be Chinese,” The setting of “The Rebel” is quite ambiguous. However, evidence points to it being in a very open-minded country, where children are given much freedom to do what they liked, only slightly restricted by society rules and brought up to be candid. This freedom is revealed by the situations cited, for their conditions seem quite relaxed, no one seems to be doing anything about it. Thus, this poem would probably be set in America. There is a greater accent placed on freedom there than other countries. The “Festival”, on the other hand, is clearly set in Singapore, where the younger generations are greater influenced by the western world, with the western culture integrated into their daily lives. In the years between the two generations, many startling changes have come about. The advanced technology, along with the many Western influences, has totally changed the environment of which children in Singapore grow up in. Also, there is a greater emphasis on English, and many other more Western things. All these have caused a big difference in mindsets and behaviour, making contact minimal between the elders and their grandchildren in families. The setting was revealed through the big difference in cultural customs, such as the dancing and the traditional music of lion-dancers and ‘us’ dancing too, “But to the latest rock hits”-the clashes in thinking. An understanding of the setting is important in order to further understand the framework of the poem. The poet of “The Rebel” feels that it is perfectly fine, even, to a certain extent, good for rebels to be present in society. Evidence of that is in the first line of the last stanza, where he states that it is “very good that we have rebels”. There is also a certain sympathy for rebels however, as shown from the last line, that they might not “find it very good to be one”. I would probably describe the poet as quite arrogant, he think he knows everything, that rebels almost certainly act like that. I do not quite agree to his handling of this issue, for I feel that he is dwelling too much on the differences and the similarity of all the differences, which, I feel is not exactly the true essence of rebels. I think that real rebels do not do things differently on purpose, and besides, it is hard to insist that someone is a rebel, for we all rebel at one time or another. Both poets however, seem to be carrying a mocking condescending towards the differences between the persona and the other subjects in their poem. The poet of “Festivals” sarcastically portrays the ignorance of the young generation. He speaks of not understanding the meaning of things from their own culture, nor their own dialects. There is much verbal irony used in the poem, especially in the last two lines of the last stanza. Using the ‘similar differences’, things that are totally different, yet, similar background, he is disapproving of the persona, the current teenagers nowadays. Such examples are the spring couplets used for ushering good luck and Shakespeare’s quotes, and door gods for protection and Schwarzenegger and Stallone, generally most teenagers’ idols. I would describe the poet as very perceptive and frank, not afraid of what effect his words would have on the reader. These traits can be seen in the way he phrases his poem, and the techniques he uses. I agree with the way he handles this generation gap issue, for he is not trying to hide the facts, or cushion it. This is most effective to make an impact on the reader, and possibly, alter the views of any teenagers reading this poem. “The Rebel” as the title makes the reader prepare for either a poem about rebels, or a controversial poem, that might ‘rebel’ against normal rules of poetry. The title is repeated throughout the whole poem, except for the last two lines, in a couplet style where the line headings are alternated between “The rebel” and “When everybody”. The purpose of this is to emphasize that rebels are also purposely doing something different. The meaning of the word ‘rebel’ is the same throughout the poem. However, there is a slight ‘rebellion’ by the poet by putting the poem in such a phrasing. I think that the poet’s choice of the title, although very apt in describing the context of the poem, it does not capture the spirit of the poem properly. However, it is a good introduction of the poem. My expectations of a unique, controversial poem were foiled, for, the poet is simply listing the situations-not very ‘rebellious’… although, of course, it helps to emphasize the difference. At first sight, the title “Festival” prepares the reader for, perhaps, a poem about the beauty of a certain festival. Thus, when I started reading this poem, I was rather surprised at the choice of title. However, it does help to introduce the setting (time) of the poem, the Chinese New Year. The poet, although he did not use repetitions, various stanzas in the poem already relate back to the title, with “spring couplets”, “lion dancers” etc. The meaning of the title is changed, from a festival such as CNY, to, almost mockingly, a ‘celebration’ of the differences between the two generations. Of course, this might have been the choice of the poet. Anyway, only when you read further into the poem, then can you understand the choice of the title. My starting expectations were foiled, but I was more than amply repaid by the fantastic word play during the poem. The way the poet revealed the differences between the generations through a significant festival was incredible. There is a similar theme in both poems-differences. They both speak of contrast between groups of people, whether it be in behaviour (for ‘The rebel”) or culture (for the “Festival”). In the context of “The Rebel”, the conflict is between rebels and society. In “Festivals”, it describes the differences between two generations in a family. They both have a specific format that is constant, and is in free verse. “The Rebel” has stanzas of two sentences, where the first line shows everybody’s behaviour and the second line shows the rebels’ behaviour, which is, the opposite of the other people, and the next stanza after it shows what happens when others change to the rebels’ behaviour/the opposite of what they did before, and of course, the rebels’ behaviour is now what the others were before. “Festivals” has stanzas of four lines, where the poet, in describing the things the persona does during the day, associate what is happening, the traditional style, to the modern culture of the persona’s generation. These two poems have many similar areas, and of course, differences. However, these two poems both are, essentially, about diversity/difference, and the way the poets have chosen to present the poems in such a way is interesting and quite unique.
<urn:uuid:23979074-6406-4760-9e18-2fe8e2dcbcc9>
CC-MAIN-2022-33
https://blablawriting.net/the-rebel-by-d-j-enright-and-festival-by-kenneth-wee-essay
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00205.warc.gz
en
0.977662
2,458
2.796875
3
It’s a multi-million-dollar project, and the best chance yet to bring the Tasmanian tiger back from the abyss. Could de-extinction become a reality? And should it? The University of Melbourne has just received $5 million in funding to establish a new research lab dedicated to resurrecting the thylacine (Tasmanian tiger), as well as marsupial conservation. The new lab, the Thylacine Integrated Genetic Restoration Research (TIGRR) Lab, will be headed up by biosciences professor Andrew Pask. In the past, says Pask, “we could never propose to do something as big as bringing back a Tassie tiger, simply because we wouldn’t have had the funding or the longevity of funding to achieve such a big goal”. “But this philanthropic donation has now given us that scope that we can actually really have a bloody good go at trying to achieve this.” But how will it work? And what are the risks? The thylacine: an Aussie icon The Tasmanian tiger is a tragic allegory for the ravaging effects of European settlement on Australia. Once abundant on the island, the creatures were hunted to extinction because they were thought to kill sheep, a staple of the colonial economy. Later research revealed that tigers weren’t sheep predators at all, but by then it was too late. The last known Tassie tiger, named Benjamin, died in Hobart Zoo on 7 September 1936. The thylacine also lived on the Australian mainland until some 3,000 years ago. Its iconic striped and gape-jawed image can be found on ancient rock-art all over the continent, and especially in Western Australia and the Northern Territory. Skeletal remains have been found in western New South Wales. Though its ghost still stalks the hills of Tasmania in the form of tantalising alleged sightings and local folklore, it seems likely that the real thylacine has been lost to time – but for how long? How do you build a Tassie tiger from scratch? Bringing a creature back from oblivion may seem more Jurassic Park than actual science, but the researchers in the new laboratory have more than a simple idea: they have a plan to make the living thylacine a reality. “The first thing you need is a really good genome from your extinct species,” says Pask. “It’s like the blueprint of how to build a Tasmanian tiger, in their DNA.” In fact, that step is already complete. “We were fortunate enough to stumble upon a preserved pouch specimen,” says Pask. “So this is a baby that was taken from his mother’s pouch when she was shot, as part of the bounty they had in Tasmania to wipe out the tigers. “And they took these little babies from the parents and dropped them in alcohol, and those specimens that were sitting in alcohol actually preserved the DNA much better.” Pask and a team of researchers released an assembly of the thylacine genome in 2017. The next step involves identifying the extinct species’ closest living relative. “We can’t create life from extinct tissue or dead DNA, we have to start off with something that’s living,” Pask explains. “And then we can use that as our template to create the thylacine.” In this case, the closest living relative to a Tasmanian tiger turned out to be the dunnart, a marsupial mouse. “The next step is to compare those two blueprints, and look to find all the places [on the genome] where the thylacine is different from the marsupial mouse,” Pask says. “Then we go into a living cell from a marsupial mouse, and we start editing in all of those changes.” This kind of gene editing is only possible due to the revolutionary CRISPR-Cas9 technology. CRISPR-Cas9 was adapted from a naturally occurring function present in bacteria: it allows us to, in layman’s terms, ‘snip’ out certain target segments of DNA and replace them with others. With the help of this gene-editing technology, the team believe they can effectively turn a marsupial mouse cell into a thylacine cell – though some of the science will need to be refined in the next ten years (the length of time the current funding will last). “Once you’ve got that living cell – that is, a Tasmanian tiger engineered cell – it’s just a matter of going through the sort of standard cloning process that we use almost every day for other mammals, to turn that cell into a whole organism,” Pask says. And the lab’s work won’t just be about reviving the tiger: they will create a ‘biobank’ of diversity in at-risk marsupial populations, which they could then use to breed and reintroduce endangered or disappeared species. What are the risks? There are a few obvious and troubling questions raised here, of course. For example, if you’re creating a thylacine based on one particularly well-preserved specimen, how do you prevent the new population from forming a genetic bottleneck? How do you create a robust, diverse population that can thrive? “What we strive to do is not just recreate one, but to have a population that can actually thrive back in its native environment,” Pask stresses. “To do that, we need to understand what the variation was between animals in that population.” With that in mind, the research team hopes to apply these techniques to the genomes derived from multiple specimens. “Once we’ve got that one blueprint down pat for one thylacine – which is what we were able to get from that specimen – we can sequence all of those other specimens in museums around the world,” explains Pask. “Because even though the DNA is broken up into lots of little pieces, we can match it back to where it should sit.” That means that should they succeed in ‘building’ a thylacine and raising it to maturity, they can then do the same for other thylacines with different genes. That’s important, because lack of genetic diversity in a population can create dangerous risks, including diseases and defects. Another key issue is that we don’t know how much of the Tassie tiger’s behaviours, for example hunting abilities, were learned rather than innate. “Unless somebody goes down the pathway of bringing the animal back, we don’t know what that impact will be,” agrees Pask. There may be some potential avenues around this, though they sound like the stuff of a children’s book. “There are ways that you can teach that behaviour,” he muses. “Maybe we put it in with Tassie devils as surrogates, maybe you put it with a wolf or something that hunts so it can learn, there are ways that you can surmount these issues.” But Pask notes the most pressing ethical conundrum will rear its head when and if a thylacine population is successfully bred: “Then people will be thinking about whether we want to introduce these animals back in the wild, and what impacts that might have.” It’s an important question. Humans have a jaded history of introducing animals to environments they aren’t currently living in (see: cane toad). To some, that kind of decision looks a bit like playing God. This kind of work, playing around with genes and bringing creatures back from the brink, is deeply controversial – and not everyone in the scientific community is comfortable with it. “To play the Goldblum in this scenario,” wrote University of Tasmania conservation ecologist David Hamilton on Twitter, “I’m personally of the view that we should prioritise protecting the ecosystems we currently have in Tasmania – plenty [of] species are struggling, and we can have no idea what the impacts of throwing an apex predator back into the mix would be.” But Pask points out it was the removal of tigers from the island that jeopardised the ecosystem, not the other way around. “It’s a very recent extinction event, and completely human-driven,” he says. “So, if we could recreate [the thylacine] we could put it straight back into its natural habitat, and it should be able to reoccupy the same position in the food chain there.” The extinction of the Tassie tiger, Pask says, robbed the island of its one, sole apex predator. “Marsupials are really odd in that we don’t have any examples of apex predators in marsupials except for the Tassie tiger,” Pask says. “And they are really important animals for stabilising the ecosystem beneath them.” The loss of an apex predator can cause all sorts of mayhem in the prey populations of an ecosystem, according to Pask. “A great example of this is the Tasmanian Devil Facial Tumour disease,” Pask says. The disease, which was first described in 1996, has wiped out an estimated 50% of the Tasmanian devil population. “But if you’ve got a Tassie tiger there, they eat those sick animals and weak animals in the population, and so they remove those sick animals and prevent the spread of disease,” Pask says. “So that’s a great example of how if the tiger was still in place, we probably wouldn’t have seen that disease spread through the whole population.” Mike Archer, a professor in the life sciences at UNSW Sydney, is another prominent advocate for de-extinction. He pioneered early work exploring the possibility of cloning Tassie tigers by working with preserved DNA at the Australian Museum, of which he was director from 1999 to 2004. Nowadays, his de-extinction research with colleagues at UNSW is focused on trying to resurrect the extinct gastric-brooding frog, which disappeared in the 1980s. Archer has an easier time of it than Pask in his current research: they already have preserved cells from the frog, so it’s possible for them to transplant those into the egg of a different species in the hopes of producing a “100%, completely authentic gastric-brooding frog”. The team have already produced early-stage embryos of the frog. Archer believes, along with Pask, that restoring an apex predator to the ecosystem will do more good than harm. Archer draws a parallel with the North American experience in Yellowstone National Park: wolves disappeared from the park around the 1920s thanks to predator control. “When wolves were eliminated from Yellowstone, the ecosystem began to collapse,” he says. “The elk numbers got out of control, they began to overeat vegetation, rivers were beginning to erode because the vegetation wasn’t stabilising the banks anymore. “When [wolves] were returned, the ecosystem stabilised again, and it’s back to normal.” From both Archer’s and Pask’s perspectives, this work is thus more about righting the wrongs of the past than playing God. “When we wiped them from the face of the Earth, we created this massive imbalance in Tasmania, and if we have the technology to bring them back I think we owe it to that species and everything else in Tasmania,” says Pask. Archer agrees: “We played God when we inappropriately exterminated the thylacine, that’s when humans did a terrible inexcusable thing. I would like to think now…we can undo the damage we did.” Archer acknowledges, though, that there are some troubling ethical conundrums associated with de-extinction. “One of the things that has plagued all of us who have been interested in de-extinction has been some concern by ecologists that we would end up extincting extinction,” he says. “In other words, why would anybody concern themselves any more with conserving endangered species if there’s the possibility of bringing a species back from extinction?” But Archer has a response to those fears. “It’s much, much easier to look after an endangered species, and reduce the risks of extinction for that species, than it is to try to bring something back after it’s become extinct. “So, in terms of economics, energy, finances and so on, we’d be far better off looking at the species before they become extinct.” For Archer, the imperative is to do as much as possible to reverse the ravaging effects of human-driven extinction events – both before and after they happen. “When you get beyond frankly fairly facile arguments about playing God, every person in the world has an inarguable responsibility to stop the massive rate of things going extinct in the world.” And that, he says, involves deploying all the tools in our arsenal. “I’ve often said it’s a bit like playing a game of golf: when a golfer goes out to play a game of golf, if they only have one club in their bag they’re probably not going to play a particularly good game of golf. “But if they’ve got a range of different clubs, for all sorts of different purposes, they’re more likely to play a good game. “I think conservation is much like this. If we just go with the assumption that we can keep wildlife safe on the other side of the fence, and try to stop people from messing over in that area, we’re not going to do a very good job of conservation. “But if we use all these additional strategies, including de-extinction, including translocation, including even conceivably synthetic biology, then we’re more likely to play a much more effective game of conserving the precious biodiversity, the global genome, that underpins our own survival.” Amalyah Hart has a BA (Hons) in Archaeology and Anthropology from the University of Oxford and an MA in Journalism from the University of Melbourne.
<urn:uuid:4d524bf1-1ade-4f87-9808-888f99697293>
CC-MAIN-2022-33
https://cosmosmagazine.com/nature/evolution/thylacine-tasmanian-tiger-de-extinction/?noamp=mobile
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00204.warc.gz
en
0.956885
3,094
3.453125
3
Making The Revolution When Evo Morales was first elected to office, he was asked if he would make a ministry for gender. He responded that he would not and that instead he would make women themselves ministers. Various women’s organizations criticized his decision at the time yet his play on words proved to be true: in 2011, half of the twenty ministers in his cabinet are women, an unprecedented development for Bolivia. Evo Morales has acknowledged the significance of gender parity, calling it “a tribute to my mother, my sister, and my daughter.” There are a lot of “firsts” for women in the Morales government: Carmen Trujillo is the first Minister of Labor, Maria Cecilia Chacón recently became Bolivia’s first Defense Minister, Ana Maria Romero was elected the first female President of the Senate, Silvia Lazarte was the first woman to preside over a Constitutional Assembly, Leonilda Zurita became the first female leader of the Movimiento al Socialismo (MAS) party in Cochabamba, and the list goes on. Furthermore, thanks to the new Bolivian constitution, the work of the Bolivian Women’s Coordinating Committee, and Evo Morales’ commitment to gender parity various campaign strategies emerged—like Las Mujeres Listas para las Listas—that had a positive impact on women in the 2010 elections. Today the Plurinational Legislative Assembly has a total of 30% female representation, including 33 female deputies (28%) and 17 senators (47%). In addition, 43% of all Bolivian council members are women. While greater female political representation in formal politics is a trend in Latin America—the region currently boasts three female presidents, quite a few female defense ministers, and a significant increase of female representation in legislatures—the Morales government ranks among the most progressive in Latin America in female political representation. Perhaps the biggest achievement, one that is unparalleled in any other part of Latin America, is the political visibility of indigenous women. Although the Morales government has been criticized for forcing indigenous women to address ethnic discrimination over gender concerns, early indicators demonstrate that women in the Morales government are exerting their influence in both areas. Indigenous women were at Morales’ side since he was a union leader in the Chapare region. They organized demonstrations, marches, road blockades, sit-ins, and mobilized entire communities in support of his candidacy. Once Evo took office, the Bartolinas became his most ardent defenders as he began the transformation of the Bolivian political landscape. To his credit, Evo Morales had the vision to reward women’s contributions with political power, perhaps guided by the Andean principle of Chacha-Warmi—gender complementarity. Indeed, unlike other opposition movements in Latin America that relegated woman to the background once they came into power, Morales made sure that women occupied high ranking political roles from the very beginning, although they did not immediately enjoy as high a level of decision-making as they do today. Leonilda Zurita, one of Morales’ closest advisors, was once believed to be one of the most powerful women in Bolivia. Acknowledging the important strides that women have made in the last five years, she said, “We still have men who don’t want women to participate in Bolivia, but we have fought against that and here we are with more power than ever.” (Robert Clarkson, “Bolivian Constitution Reinvented to Champion Gender Equality,” The Solicitor. February 11, 2010). Zurita and Silvia Lazarte, supporting Morales since his Chapare days, are highly respected among Bolivia’s indigenous women. In January 2010, the powerful indigenous women’s organization, Bartolina Sisa National Federation of Bolivian Peasant Women (FNMCB-BS or Bartolinas) proposed them (along with that of former Senator Isabel Ortega) as their top choices for Morales’ new cabinet. Morales ended up tapping Bartolina leader Nilda Copa as Minister of Justice, and Isabel Ortega as her deputy minister. The president also elevated the role of indigenous women by including the FNMCB-BS as a powerful branch of Bolivia’s social movements, a step that proved to be beneficial for his political ambitions. Coming out of a long history of opposition, the Bartolinas embraced their new formal status proclaiming that they would “organically” support the government of Evo Morales Ayma. Today the Bartolinas have grown into a very powerful organization that has over 100,000 female members and a union presence in every region of Bolivia and in remote rural communities. One of the most impressive developments in the Bolivian political landscape is the transformation of the Bartolinas from a fringe radical women’s group to an organization that can wield power at the highest levels of government and have still have an impact in every corner of Bolivia. In the last five years, the federation has expanded its membership to include women from all sectors of society; it has also increasingly displaced traditional NGOs by working directly with women at the grassroots. The administration has also implemented various policies designed to improve women’s lives: between 2006 and 2008, the government distributed 10,300 property titles to rural women, a measure that is likely to have a positive long-term impact on their families and on their communities; the current government has addressed women’s reproductive health by providing subsidies designed to reduce maternal and infant mortality; poor pregnant women are able to receive a stipend for attending pre-natal and post-natal checkups; infants are able to get free vaccinations. However, women who are or were part of the Morales government still face many challenges, including family constraints, political violence and harsh punishment for political dissent. Nemecia Achacollo, the current Minister of Rural Development, has acknowledged that her political involvement has taken a toll on her family. Her younger daughters wondered why she was never home to wash their clothes and cook their meals. Her husband once got so mad at her for being absent that he burned her official documents (Ramón Rocha Monroy, Biografía de Nemecia Achacollo Tola, BOLPRESS). COBOL, the Association of Women Counselors of Bolivia has documented and denounced the continuing existence of political violence despite high rates of political representation. Elected women are sometimes violently forced to resign their positions if the elected alternate is a man. In addition, political dissent can be alienating for women who take a different stand or who publicly express their dissatisfaction with the government. Former MAS member Sabina Cuellar has been brought to trial for her failure to stop the attacks on indigenous peoples in Chuquisaca on May 24, 2008. Many believe this move by the government is politically motivated. Bartolina Leonilda Zurita, one of the most experienced women in the Morales government, has yet to be tapped for a high level position; she has publicly expressed her disenchantment with the lack of decision- making power for women in the government (Franz Chavez, “Q&A: Bolivian Women a Force Behind Power But Still Powerless.” IPS News, Dec. 10. 2009.) While Bolivian women are making impressive strides into the political process, they still represent a very small elite group. High teen pregnancy rates have reached alarming rates in Bolivia, labor discrimination against pregnant women continues to exist, laws that guarantee equal pay for equal work have yet to be enacted, and sexual harassment in the workplace is still rampant. Nonetheless, there are early indicators that a critical mass of women in political positions can positively impact the lives of all women. The number of elected women in Evo Morales’ second presidential term still offers hope for an improved quality of life. As quoted in Andres Schipani in “Bolivian Women Spearhead the Morales Revolution,” Minister of Justice Nilda Copa sums it up: “For a long time, we the women have been excluded in Bolivia. “I remember my mother didn’t know how to read and write, neither did my grandmother. “There used to be a lot of racism and machismo. There is still some, but now that is changing thanks to brother Evo Morales.” Gratzia Villarroel is an Associate Professor of Political Science at St. Norbert College. She was the 2007-2008 Santo Domingo Visiting Scholar at DRCLAS, Harvard University. Her research focuses on the UN Women’s Convention (CEDAW) and the political participation of Latin American women. She is currently completing a manuscript entitled In the Footsteps of Bartolina Sisa: Indigenous Women, Evo Morales, and the Bolivian Social Revolution. In July 2010, we asked the President of the Federation of Neighborhood Organizations (FEJUVE) in El Alto, Bolivia, how his organization planned to address seasonal water scarcity there. Our concern was aroused when, in 2007, local and international papers began to warn about the possible effects of rapidly retreating glaciers, changing weather patterns, and continued rural-to-urban migration on the reservoirs supplying … This year, on August 2, Bolivia will commemorate the 80th anniversary of the founding of the escuela-ayllu of Warisata, an extraordinary intercultural experiment in indigenous schooling that flourished between 1931 and 1940 on the high plateau (altiplano) in the shadows of the volcanic peak of Illampu. On that day, the usual civic rituals and official remembrances—school pageants, TV documentaries, and editorial page … As the American Airlines flight from Miami neared La Paz, we peered down through the thin light of early morning, trying to make sense of the arid land below us. Were the neat pyramids of stones at the corner of each field the result of clearing the land for planting? If so, it must be rocky, inhospitable soil for growing crops. Were those really herds of llamas and alpacas that dotted the landscape? And how spectacular …
<urn:uuid:3c4709f0-baeb-475b-b283-37362654bfd0>
CC-MAIN-2022-33
https://revista.drclas.harvard.edu/bolivian-women/page/2/?et_blog
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00206.warc.gz
en
0.962848
2,091
2.9375
3
Preparing ESL-friendly tests and worksheets Elsewhere on this site there is advice on helping ESL students understand what they read . What I want to concentrate on here is how to write comprehensible worksheets and tests. A great deal of the learning (and most of the testing) that goes on in school is done by means of written sheets with questions or prompts for students to respond to. Sometimes the wording of the task or question is deliberately made obscure in order to challenge the student to think about what is required. In most cases, however, it is intended that students should spend their time thinking about how to do something rather than puzzling over what the teacher wants of them. In such cases, it is essential that the wording of the task is as clear and unambiguous as possible. Making language comprehensible Following are a few tips on how to make the language of your questions and prompts more easily understood by ESL students: @ Use the shorter, more common word in favour of its less frequent equivalent. ~ For example, buy is better than purchase, begin is better than commence, look at the diagram on page 3 is easier than focus your attention on the diagram on the adjacent page, etc. The exception to this rule is when the aim is to introduce or develop vocabulary that is an integral part of the knowledge of the subject. Be aware of the difficulties of academic vocabulary . Academic vocabulary is the term for non-subject-specific vocabulary that occurs across all disciplines: e.g. duration, eventually, similarity, furthermore, rate, etc. ESL students often fail to comprehend tasks fully because they don't know the meanings of such words. If a worksheet contains academic words that are critical to an understanding of the main idea or task, it would be helpful to explain their meanings in advance. Read more on academic vocabulary. Be aware of the difficulty of idioms and phrasal verbs Such expressions are often impenetrable to non-native speakers, who may know the meanings of the individual words but who are not familiar with the overall sense. For example, the following (apocryphal) extracts from history examinations would certainly not be immediately comprehensible to most ESL students. - Explain how Grant was able to wipe the floor with Lee at the battle of Antietam? - Why did Britain blow hot and cold for so long on the invitation to join the Common Market? Avoid complex syntax in question prompts. @@ Use simple sentences and separate out the actual task from the illustrative detail. ~~ For example, the second of these prompts is probably more readily understood than the first: - Explain why metals expand when they get warmer and contract when they get cooler, whereas water does the opposite. - Metals expand when they get warmer and contract when they get cooler. Water does the opposite. Explain why. Be aware of the potential difficulty of negatives. Research† has shown that negative sentences can be harder or slower to process than positive ones. So the first of the following questions may slow down the reader (or even impede understanding) more than the second one, its equivalent: - Why didn't America enter World War 1 until 1917? - Why did America wait until 1917 before entering World War 1? Take care with punctuation. Generally, it is better to over- rather than under-punctuate, even though this goes against the current trend in (British) English style. Inner-sentence punctuation helps students parse the text into meaningful blocks, and speeds up comprehension‡. So, for example, the first of the following sentences is likely to be more immediately comprehensible than the second: - When you have finished part one, do part three. - When you have finished part one do part three. Remember that ESL students are often helped by the direct repetition of a noun This is better than omitting it or replacing it with a pronoun - even if this doesn't necessarily make for good English style. For example, the second version of the mathematics problem below is probably more easily understood than the first: - Alex has 4 friends. He wants to buy each of them 6 cookies. How many does he need to buy in all? - Alex has 4 friends. He wants to buy each friend 6 cookies. How many cookies does he need to buy in all? Avoid using different nouns (synonyms or hypernyms) to refer to the same thing. In the following science text, the ESL student may not immediately understand that prey is a hypernym of penguin and refers to it. It is preferable in tests, therefore, to choose one noun and repeat it, as in the second example below: - The killer whale tosses the penguin into the air and generally torments its prey before eating it. Why does it do this? - The killer whale tosses the penguin into the air and generally torments the penguin before eating it. Why does the whale do this? Take care with vague or ambiguous instruction words. These can often be replaced by direct questions. For example, the first instruction below may have the ESL student reaching for the dictionary, whereas the second is immediately clear: - Determine the probability of throwing a 6. - What is the probability of throwing a 6? Other factors in writing comprehensible tasks It is not only the language of question tasks that can cause difficulty. Following are suggestions on how to ensure that other aspects of the task do not prevent ESL students from easily comprehending what is expected of them: @@@ Avoid worksheet or test questions that assume a cultural knowledge that the ESL students are unlikely to have. ~~~ A mathematics question about the batting average of a baseball player may cause unnecessary difficulties to a student who has never seen the game played and knows nothing about its rules. Choose simple and familiar contexts for assessment tasks. For example, the context for a Computing Studies task about the collection and tabulation of data can be the school cafeteria, which students are familiar with, rather than a car factory, which they are not. Do not include extraneous information in worksheets or tests. The bold words in the following questions are unnecessary. ESL students may not know this until they have wasted time looking them up in their dictionary: - Mary bought a turquoise snowboard in a garage sale for $37.50 and promptly resold it for $41.30. What was her profit? - A cactus has prickly spines on its stem. What particular function do you think these fulfil? Be aware of the difficulties caused by including a plethora of multi-cultural names in worksheet questions. ESL students may not immediately recognise words such as Ranjeep, Beatrix, Seamus, Carmelita as names, and attempt to find them in their dictionary. Better is the simple: A girl buys 2 meters of rail track... , etc., Use (labelled) pictures or diagrams where possible A picture will very often help students with limited English proficiency to understand the assessment task more quickly and completely. Furthermore, illustrations can help to reduce the amount of text that students have to read. A good example is a task asking students to predict the outcome of a science experiment, which is accompanied by a picture of the equipment set-up. Preparing legible worksheets Preparing good worksheets and tests is not simply a matter of ensuring the language of the questions and tasks is readily understandable. It is important to give some consideration to the appearance of the sheet itself. Here are some tips you may wish to follow. Type all worksheets and assessments. It is helpful to use different and consistent typefaces and font sizes throughout the year. So, for example, the introductory text is always in one typeface, the question itself in another and the example in yet another. You can also use indentation for this purpose. Where possible separate ideas in bulleted lists (like this one), instead of using dense text. Make sure that the full text can be seen at all sides of the paper, and that no words are obscured where the holes are punched. If more than one diagram, chart etc. is to be included in the worksheet, label each one clearly and refer to the label in the question. It's better to have two well-spaced-out pages than one page cluttered with text in a small typeface. Ensure that there is enough space for students to write answers. Try to keep the whole question and its space for answers on just one side of the paper Ensure that copies are legible. Worksheets that have been cut and pasted from textbooks and then handed down through generations of teachers are notorious for their illegibility. Click the button below for some examples of what not to do. English: Hand-out sheet to help students choose a suitable book Rule: Make it legible! Science: Hand-out sheet about the hydrological cycle Rule: Make it legible! Mathematics: Question to determine the speed of a moving car Rule: Be aware of the difficulties of cultural references! The following text is the first part of the introductory paragraph to a question about car speed: The police used to measure the speed of cars on the road by having two PCs some distance apart using a stopwatch. One of them would stand and wave as a car reached him. When the wave was seen by the second PC a stopwatch was started. As the car passed the second PC, the stopwatch was stopped." The question itself read: Is the car exceeding the maximum speed limit in Britain? The ESL student who asked for my help with this question was puzzled how a personal computer could stand and wave. He also had no idea what the maximum speed limit is in Britain. Another problem with the introductory paragraph is used to, meaning a practice that existed in the past, but no longer does. On a first parse of the sentence, however, the student may assume that use has its common meaning of employ. Read more about the problems of polysemous words such as use. Below are some more suggestions that you might wish to take into account when creating your written class and homework tasks. However carefully you have prepared your homework sheet, it is very helpful that the students have the chance to read through it first in class and ask for clarification of anything they don't understand. Remember that your ESL teacher will be happy to check through important worksheets and tests, and advise on their comprehensibility for ESL students. See the Frequently Asked Questions page for advice on how to help students who struggle to do well in your tests. See Assessing ESL students in the subject classroom for a comprehensive look at the essential issues concerning setting fair assessments for ESL students and how to grade them. An increasing amount of communication with students is done via web pages created by the teacher. Here is an article from the Nielsen Norman Group that helps teachers write web content that is legible, readable and comprehensible. There is a useful chapter on preparing fair tests for ESL students in A Practical Guide To Assessing English Language Learners. The authors cover some of the suggestions made above, focusing on the importance of ensuring that the vocabulary of test tasks does not disadvantage ESL students. They make the crucial point that assessment should be considered at the start of a new unit so that ESL students can receive adequate preparation in the vocabulary to be included in the assessed tasks. It is important that students have had practice in doing tasks of a similar nature to those in the assessment, and have seen model answers. *Folse, Keith, Nancy Hubley, and Christine Coombe. A Practical Guide to Assessing English Language Learners. N.p.: University of Michigan Press, 2007. Print. † Extract: "Studies of negation comprehension using activation measures have shown that the presence of negation slows responses times to negated concepts ... " Retrieved from: http://www.psych.ufl.edu/~abrams/documents/margolin_abrams_09.pdf (2015) ‡ Missing the point : The effect of punctuation on reading performance. Benjamin J. W. Grindlay. Retrieved from: https://digital.library.adelaide.edu.au/dspace/handle/2440/21889 (2015)
<urn:uuid:cec36060-f205-4d3e-8fb8-1a26046b6509>
CC-MAIN-2022-33
https://www.internationalschooltutors.de/English/advice/teachers/info/tests.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572077.62/warc/CC-MAIN-20220814204141-20220814234141-00603.warc.gz
en
0.954515
2,587
3.984375
4
Abstract The growing prevalence of overweight and obesity is a major public health concern. Among the U.S. adult population, the prevalence of obesity (defined as a body mass index ranges from 30.0 kg/m2 to 99.8 kg/m2) increased from approximately 20% in 2000 to 27% in 2008. Previous researches indicated that obesity might be significantly associated with depression. Several researches conducted in the United States and Canada have indicated associations between obesity and depressive symptoms, measures of psychological distress, and history of depression. However, none of the studies to date has been conducted based on the 2006 Behavioral Risk Factor Surveillance System Survey (BRFSS). The propounded study participants will be 2006 Behavioral Risk Factor Surveillance System (BRFSS) responders. The 2006 BRFSS was chosen due to a significant set of “healthy days” questions along with some optional modules and state- added questions. Findings from this research can provide instructions to government officers on making social policy decisions to help people in need of mental health services. Key words: obesity, depression, PHQ, BRFSSS pacific Aims The growing prevalence of overweight and obesity is a major public health concern. Among the U.S. adult population, the prevalence of obesity (defined as a body mass index ranges from 30.0 kg/m2 to 99.8 kg/m2) increased from approximately 20% in 2000 to 27% in 2008 . Obesity can lead to many kinds of disease problems, such as diabetes, high blood pressure, high cholesterol, asthma, arthritis and poor health status. Usually, the overweight or obesity prevalence is perceived due to the consequence of an energy imbalance, with energy intake exceeding that of energy expenditure. It is estimated that each year, among the U.S. death persons, 280,000 of whom are attributed to obesity or overweight . Obesity-related morbidity is estimated to account for 9.1% of total annual U.S. medical expenditures each year . Previous researches indicated that obesity might be significantly associated with depression [4,5]. Depression is one of the most prevalent mental disorders . The National Institute of Mental Health (NIMH) in 2000 estimated that 9.5% of the U.S. populations suffer from a depressive illness in any given year . The National Survey on Drug Use and Health (NSDUH) estimated that, during the years 2005-2006, 11.29% of total U.S. adults had experienced serious psychological distress in past year . Several researches conducted in the United States and Canada have indicated associations between obesity and depressive symptoms , measures of psychological distress , and history of depression . It is reported that the relationship between depression and obesity is dependent upon different gender, age, and race/ ethnics. People younger than 65 years old are much more prone to get depressed than their counterparts . Besides, significant positive associations between depression and obesity are observed among women but not men [12,13,14]. However, when it comes to the relationship between depression and obesity dependent upon different races, there are some discrepancies. One report indicated that the Non-Hispanic Whites had a higher rate of depression compared to Non-Hispanic Blacks, Hispanics, and Asians . Another report observed that Hispanics are much more prone to get depressed than Whites and Blacks . 摘要:越来越多的超重和肥胖患病率是一个重要的公共卫生问题。美国成人人口当中,肥胖的患病率(定义为身体质量指数从30.0 KG/M2范围99.8 KG/M2)从2000年的约20%上升到2008年的27%。以往的研究表明,肥胖可能会显着地与抑郁症有关。在美国和加拿大进行的一些研究表明肥胖和抑郁症状,心理困扰的措施,和抑郁症病史的之间的关联。然而,迄今的研究已进行了2006年的行为危险因素监测系统调查(BRFSS)的基础上。会否研究参与者将是2006年行为风险因素监测系统(BRFSS)应答。被选为2006 BRFSS由于一个重大一套“健康日”的问题,随着一些可选模块和国有增值问题。从这项研究结果可以提供指示政府官员在社会政策决策,以帮助人们在需要心理健康服务。关键词:肥胖,抑郁,警察总部,BRFSSS泰富致力日益增长的超重和肥胖的患病率是一个重要的公共卫生问题。美国成人人口当中,肥胖的患病率(定义为身体质量指数从30.0 KG/M2范围99.8 KG/M2)从2000年的约20%上升到2008年的27%。肥胖可导致多种疾病的困扰,如糖尿病,高血压,高胆固醇,哮喘,关节炎,健康状况不佳。通常情况下,被认为超重或肥胖的患病率,由于能源失衡的后果,能量摄入超过能量消耗。据估计,每年在美国死亡人数280,000人归因于肥胖或超重的。肥胖有关的发病率估计占美国每年的医疗总支出的9.1%,每年的。以往的研究表明,肥胖可能会显着地与抑郁症有关[4,5]。抑郁症是最普遍的精神障碍之一。国立精神卫生研究所(NIMH)估计在2000年,美国人口的9.5%患有抑郁疾病,在任何给定的一年。全国药物使用和健康调查(NSDUH),的估计,在2005-2006年期间,11.29%,占美国成年人经历过严重的心理困扰,在过去的一年中。在美国和加拿大进行的一些研究表明肥胖和抑郁症状之间的关联,心理困扰的措施,抑郁症病史的。据悉,抑郁症和肥胖症之间的关系是依赖于不同的性别,年龄和种族/伦理。年龄小于65岁的人更容易获得比他们的同行郁闷。此外,观察到显着的正相关,忧郁和肥胖之间的妇女,但不是男人[12,13,14]。然而,当它涉及到抑郁症和肥胖症之间的关系取决于不同的种族,也有一些差异。一份报告指出,非西班牙裔白人有较高的抑郁症相比,非西班牙裔黑人,西班牙裔和亚裔。另一份报告指出,拉美裔比白人和黑人更容易产生郁闷。
<urn:uuid:ffb97b91-157d-4ba6-8bf6-5367a9e9c80e>
CC-MAIN-2022-33
http://essaylw.com/Essay/2029.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00605.warc.gz
en
0.698801
2,683
2.953125
3
Toxins can lead to Pancreatic Cancer. We live in a toxic world from the air we breathe, to the water we drink and bathe in, to the industrial production of our food which can contain inflammatory ingredients. Toxins are in, on and around us causing disruption in our endocrine and metabolic health. We shop for groceries on an average of 2.8 times a week. We’ve gone from food in it’s whole food form from Mother Nature, to food that contains toxic pesticides. Toxins trigger inflammation in our brain and impact the delicate balance of our complex digestive system, along with our heart health and hormonal balance. Chronic degenerative diseases don’t just happen. Decades of ingesting processed foods and chemicals, toxic work environments along with toxic household goods, eventually overburdens our biochemistry and bioelectrical balance of some 60 trillion cells. Diseases take years to develop long before any symptoms show up in diagnosis tests. Our biology slowly begins to become unbalanced from poor health habits resulting from a lack of awareness, a lack of self care and lack of nutrients leading to the inflammatory processes from foods and toxin exposure. Most are focused on their job, paying their rent, with little focus on their personal health. Yet we find many doctors that say they don’t know what habits may cause the pancreas to become inflamed. 12 “Toxic Habits” 1-I lost my good friend (Carol) and a great athlete to pancreatic cancer. Her vice was sugar of any kind. There can be hidden sugar that can lurk inside many healthy and unhealthy foods. Having a soda habit can be linked to pancreatic cancer. (1) “Hyperglycemia and hyperinsulinemia may be implicated in the development of pancreatic cancer.”(1.5) “Pancreatic stressors can be linked to high sugar intake, diabetes, medications, lactose and gluten intolerance.” (2) Our pancreas was never built to consume process sugar. A habit of bread and pasta at every meal can also add to blood sugar imbalances. “Gluten sensitivity can be linked to inflammatory cytokines which can induce pancreatic cell injury.”(3) 2-Weight gain and obesity causes inflammation in our body, as does sugar. The consumption of highly acidic substances such as alcohol, and vegetable oils are linked to autoimmune disorders. Today we know that cancer cells can have 15 times more insulin receptors than regular cells. If we are obese and continue to have a poor diet, this can set the stage for disease such as cancer. (4) 3- Diabetes isn’t a new disease, however it may be considered a well accepted disease, since we see it run in families. One that seems to be managed with medication instead of diet. Medications may increase inflammation. Januvia which is prescribed for diabetes, is a risk factor for pancreatic cancer. (5) 4-Cigarettes and alcohol are still accepted habits in many countries, even though these toxins play a causative roll in pancreatic cancer and several other diseases. Celebrities Michael Landon (1991) (6) and Patrick Swayze (2009) brought this to our attention with their untimely death. These habits can lead us toward inflammation and dis-ease. In a quest to relax from a stressful day at the office, we may want to rethink habits that are proven to be counterproductive. 5- Corticosteroids are anti-inflammatory medications that may be used for autoimmune disorders. These drugs reduce the body’s ability to activate vitamin D, resulting in decreased calcium absorption and increased calcium excretion in the urine. Vitamin D from sun exposure and diet has a protective effect against pancreatic cancer. (7) “Vitamin D and its analogues exhibit potent anti tumor effects in many tissues, including the pancreas.” (8) 6- From cereals, corn and wheat to eggs, dairy and meat we are exposed to and consume pesticides by way of Genetically Modified Organisms. These have been shown to have damaging effects on our good gut bacteria. “Small Intestinal Bacteria Overgrowth, is defined as an increase in the number and/or alteration in the type of bacteria in the upper gastrointestinal tract which can be associated with disorders of protective antibacterial mechanisms.” (e.g. pancreatic exocrine insufficiency, immunodeficiency syndromes) (9) 7-Whole foods from Mother Nature provides our bodies with energy. Eating lifeless/dead foods places a burden on the pancreas which may eventually cause exhaustion with imbalances in blood glucose levels. Many impair their pancreas and interrupt the ability to digest their food properly after a lifetime of cooked, boxed, frozen and processed foods. (10) “Cancer may be considered the lack of eating nutritious foods.” (11) 8-If we look at our body as an optimally running engine, would we take out parts of that engine to run more effortlessly? Cholecystectomy is the most common type of surgery used today. Preventative measures may include detoxing the gallbladder, because the gallbladder is an important part of the working mechanics to the pancreas. (12) 9-Fluoride can be in toothpaste and water supply and sprayed on our vegetables. Fluoride is a toxin and endocrine disruptor. It is linked to changes in exocrine pancreas cells. (13) “In chronic toxicity studies, fluoride targets the pancreas and other organs.” (14) 10- There may be an abundance of calcium in our system. Dr. Garry Gordon wrote, “If you have compromised cell membranes or low ATP production for any reason, then the cell has trouble maintaining the normal gradient. This is because the usual gradient is 10,000 times more calcium outside of cells than inside; when this is compromised you will have increased intracellular calcium.” “Calcification in pancreatic neuroendocrine tumors may form within amyloid deposits, as in insulinomas.”(15) Inflammation along with an overabundance of stress can lead to excessive uptake of calcium by our cells, and is know known to contribute to aging and degenerative diseases. 11-Xenoestrogens are toxins we may use everyday, without being aware. Environmental risk factors with xenoestrogens are linked to pancreatic cancer. We can find these in our water supply, plastic containers and plastic wrap, teflon and non stick cookware, dryer sheets and fabric softeners, cosmetics and perfumes that contain toxic chemicals, air fresheners, canned foods, red food dye and the list goes on. (16) 12- Chronic inflammation disrupts cortisol levels. Caffeine elevates cortisol levels, contributes to inflammation and endocrine disruption. As a nation we have an emotional attachment to caffeine. We stand in long lines just to order it. We sip it while walking or driving to work. We appear to be addicted, with common thinking -we can’t possibly have energy without our 2 cups a day. Unfortunately, coffee consumption may be associated with pancreatic cancer with inconsistent results. (17) So we may ASK– With cancer, why doesn’t the immune system just attack an overabundance of mutated cancer cells? Cancer cells have a protein coating with a negative electrical charge. In our body, immune cells also have a negative charge. Normal cells stop growing when there are enough cells. Cancer cells don’t stop growing with enough cells present. “In cancer, there is a loss of balance between cell division and cell death and cells that should have died did not receive the signals to do so.” (18) Diseases that can cut our life short don’t care who we are, how much money we have or how famous we might be. If we truly love life, and have no desire to be taken down by a debilitating dis-ease, we need to move from desire to decision and put all of our focus on eliminating unhealthy destructive habits while developing new, positive healthy daily habits. What are some simple “bite size steps” you can do today? The first thing to do is to get the support you need, to enable you to understand the causative elements involved. This gives you your power back to cure the cause. Preventing cancer can be the most important decision you ever make. Join my “toxic free you” program today. Go Here: Eat Organic and Wild – Choose organic foods and wild fish. Use Reverseage Wellness Lemon essential oil for a vegetable wash. Learn How to Garden Organically – avoid DDT and Roundup Ready weed-killer. These can contribute to the “Toxic Load” of pancreatic health problems. Learn How to read labels – GMO Foods contain pesticides and have been linked to Hormone Disruption. Go Dairy Free– Hormones in cows milk products may disrupt the endocrine system. Eat Cruciferous Vegetables – They are hailed for their anti- cancer benefits. Work through Stress- Stress is wearing on the body, disruptive to digestion and our hormones and increases susceptibility to disease. Spreading this information is likely to be the single most important thing you can do to help slow the spread of toxins and their accompanying health problems such as pancreatic cancer. Connie Rogers AKA Coach Educator, is a Certified Integrative Holistic Health Coach founder and owner of www.Bitesizepieces.net and www.weightlossforlifechange.com She coaches and supports men and women with Cancer Prevention, Weight Loss, Hormone Balance, Digestive & Skin Health. Her Expertise lies in toxins that can disrupt our skin, metabolic and endocrine health. 2- Pancreatic Stressors-http://www.jbc.org/content/279/41/42351.full 3-Cytokines, pancreatic cell injury-http://www.ncbi.nlm.nih.gov/pubmed/22913724 see also http://onlinelibrary.wiley.com/store/10.1111/imm.12007/asset/imm12007.pdf;jsessionid=06E4501C0E6525C5F3810B411E40819E.f04t02?v=1&t=i1vc3z7f&s=e1cb5b2cdf1504acebbdd9ee4e4a58aa0193b582 7-Vitamin D sun-http://www.hindawi.com/journals/jnme/2010/721365/ 10- Diet, digestion-http://www.ncbi.nlm.nih.gov/pubmed/23368926 11- Nutritious foods- http://www.ncbi.nlm.nih.gov/pubmed/1764568 12-Gallbladder-http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2362428/ See also http://www.ncbi.nlm.nih.gov/pubmed/22008981 15-Calcification in pancreatic neuroendocrine tumors-http://www.ncbi.nlm.nih.gov/pubmed/21071369 16-Xenoestrogens-http://www.ehjournal.net/content/11/S1/S8 see also http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3388472/#B102 18-Cancer, cell division, cell death-http://www.jeccr.com/content/30/1/87
<urn:uuid:8b8efafe-f5da-4a87-9f06-6a92bf2fb996>
CC-MAIN-2022-33
https://naturalnewsblogs.com/pancreatic-cancer-hard-habit-break/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00206.warc.gz
en
0.915942
2,613
3.015625
3
In this section we will provide more information on: People with bleeding disorders are treated with what is called replacement therapy. This means that the missing clotting factor is infused in their body on a regular basis so that the clotting process can occur normally. Unfortunately, some people develop antibodies, called inhibitors, that neutralise the replacement clotting factor. This means that the body induces an immune response to the treatment and therefore prevents the infused clotting factor from functioning normally. In this case, bleeds become very hard to control and can lead to permanent joint or muscle damage, making people with inhibitors disabled. Treatment of inhibitors is the biggest challenge in haemophilia care today. It is possible to get rid of inhibitors using a technique called immune tolerance induction (ITT). However, this type of treatment requires specialised medical expertise, is expensive and takes a long time. Drugs called bypassing agents can be used to work around inhibitors and help blood clot. In haemophilia, inhibitors occur more often in individuals with the severe form than those with moderate or mild haemophilia. It is estimated that approximately 30% of patients with haemophilia A and 1.5% to 3% of patients with haemophilia B develop inhibitors to factor VIII and factor IX concentrates, respectively. For rare bleeding disorders, figures are unclear due to the limited patient population and the lack of treatment. Inhibitors typically occur in the first 75 exposures to the treatment, this is why it is important that people with bleeding disorders receive their first treatment under medical supervision in a treatment centre where the right medical facilities and expertise are available in case of inhibitor development or other allergic reactions. In fact, allergic reactions may amplify when treatment is given over time. Ideally, children and adults who are newly diagnosed with haemophilia should be tested regularly for inhibitors between the 1st and 50th days of treatment. Even after the 50th day of treatment, they should be checked at least twice a year until they have received 150-200 doses and at least once a year after that. Testing for inhibitors should also be done before any major surgery. Some studies have shown that people who receive regular treatments with factor concentrates to prevent bleeds (prophylaxis or prophylactic treatment) have a lower chance of developing inhibitors in their lifetimes. Little is known about whether the type of factor concentrates (recombinant or plasma-derived) that is used plays a role, but there are ongoing studies to shed light on this matter. Treatment options for people with inhibitors: Immune tolerance induction therapy Immune tolerance induction (ITI) therapy involves giving the person with inhibitors frequent doses of factor concentrates over several months, or sometimes years, to train the body to recognise the treatment product without reacting to it. This process is called tolerance induction. If a person plans to undergo immune tolerance induction therapy, but has not yet started, it is better not to use factor products to treat acute bleeding episodes because they are likely to provoke a rise in inhibitor titer. Bypassing agents, such as activated prothrombin complex concentrates (APCC) and recombinant factor VIIa (rFVIIa), are used to treat acute bleeding in people with high titer inhibitors. However, these treatment products are expensive and not always available in every country. Tranexamic acid is an antifibrinolytic drug that can be given as an additional therapy in pill form or by injection to help stop blood clots from breaking down. It is particularly useful for bleeding that involves mucous membranes such as those in the nose or mouth. However, it should not be used in combination with APCCs. Plasmapheresis is a procedure that removes inhibitors from the person’s bloodstream. It is usually done when the inhibitor titer needs to be brought down quickly (for example, before major surgery or in cases of severe bleeding that are not well controlled with bypassing agents). High-dose factor concentrates Administering factor concentrates at higher doses and/or more frequent intervals is the preferred treatment for acute bleeding in low responders. The person’s factor level should be measured right after each infusion to make sure that target levels are reached. Continuous infusion may be useful. High-dose factor concentrate is also the preferred treatment option for acute bleeding in previous high responders with current low titer inhibitors — however, it is vital to take into account that the anamnestic response will get stronger within five to seven days, at which time treatment should be switched to bypassing agents. The European Inhibitor Network (EIN) is a programme of the European Haemophilia Consortium (EHC) that is dedicated to people with haemophilia who have inhibitors, their families and caregivers from across Europe. As you know, haemophilia is a rare disorder, but haemophilia with an additional diagnosis of inhibitors, further places the patients and their families into living with a rare disorder within a rare disorder. The number of patients diagnosed with inhibitors in each country is, thankfully, small, nevertheless this diagnosis brings a degree of stress and isolation due to a variety of reasons, e.g. lack of information among the patients and clinicians, scarcity of sufficient treatment, as well as social barriers caused by mobility and other issues. We can bring those patients together on the European level, in larger numbers with the help of various support systems. Through EIN they have the opportunity to connect, share experiences, and build a community and support network on a European level. In implementation of programme and activities of the European Inhibitor Network, EHC is working closely together with its NMOs and the key partners in order to achieve the following objectives: - Better understanding and prioritisation of the needs of PWI both at a community as well as at a policymaking level - Establish European consensus in order to harmonise and ensure that we have optimum standards for the treatment and care of PWI - Enable social and educational connections between PWI and between their caregivers to allow them to support and educate one another - Ensure that PWI themselves are also active and effective at engaging directly with payers, policymakers and other authorities to advocate for optimum therapy and care. An Inhibitor Working Group was established to work towards realisation of the objectives and implementation of the various elements of the programme. This working group consists of patients, parents, clinicians and other community members, as well as a staff member of the EHC to coordinate the programme. It has been and will continue to be essential to work in a close cooperation with all the NMOs of EHC, as well as to seek partnerships with the relevant partners. There are three main European Inhibitor Network programme elements:1. Establishment of European Standards of Treatment and care for PWI Ten complementary principles for the management of inhibitors in haemophilia have been developed and published, emphasizing the importance and benefits of a centralised, multidisciplinary, expert and holistic approach. These principles will serve as a benchmark to improve the multidisciplinary and practical management of patients with inhibitor. Implementation and adherence to each of these principles should have a major positive impact on the management and outcomes of patients developing an inhibitor. In addition to the article published in Orphanet Journal of Rare Diseases , a video and a poster outlining these principles, are being produced to be used as advocacy tools by PWI. EHC Inhibitor Summit 2016, 2017 & 2018 The purpose of the EHC Inhibitor Summit is to offer a special time and space for people with haemophilia who have inhibitors, their family members and caregivers to build a community, educate and empower themselves, and to help improve the quality of their lives. A very important aspect of the Summit is building the community, and finding support and understanding among people in a similar situation. Since the first Summit in 2016, more than 200 patients and their families from over 17 European countries have come together to share their experiences and learn from one another. The Summit has proved invaluable in creating a community for this isolated and rare group within the haemophilia population. The next EHC Inhibitor Summit is scheduled to take place in December 2018. This is a person, nominated by the EHC National Member Organisation or NMO. The main role of the Inhibitor Ambassador is to further strengthen the community of people with inhibitors and their caregivers in Europe by being the active link between the PWI in his/her country and the EIN on the European level, more actively involving the people with inhibitors within your society. Chat Room & ASK THE EXPERT An online platform for people with inhibitors has been developed ad a part of the EIN. It seeks to create an online community and facilitate exchange, support and education, enabling social and intellectual connections between PWI and between their respective caregivers and family members. The online community consists of 3 main segments, which are interlinked – understanding, learning and meeting. Information and articles are available about inhibitors and various aspects of living with inhibitors; a Chat Room is open to enable the discussions and exchange of experiences among the PWI; experts in haemophilia treatment and care are available each month to provide educational information to patients on various nominated topics. To enable people with inhibitors, their caregivers and family members to engage with the relevant stakeholders to advocate for optimum therapy and care, the EHC has developed several tools. The EIN online platform provides specific educational material for each relevant stakeholder – patients, caregivers and NMOs on current management, treatment available for people with inhibitors and other issues such as physiotherapy and psychosocial issues. Series of good practices collected from the NMOs give an insight of support systems available for implementation, and the European Principles of Inhibitor Management set a benchmark that will enable improvement and help ensure that all inhibitor patients receive optimal treatment and care, regardless the country they live in.
<urn:uuid:3eeed067-cf29-46aa-a56d-d5ce078d4421>
CC-MAIN-2022-33
http://www.ehc.eu/bleeding-disorders/inhibitors/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00206.warc.gz
en
0.951597
2,071
3.46875
3
Disclaimer: Information about the SARS-COV2 that causes COVID-19 is evolving on a daily basis. My opinions expressed here as solely my own, and are based on the medical consensus TODAY, and may change based on emerging evidence. Question 1- Can coronavirus affect pregnant women? • SARS-COV2, the virus that causes the disease COVID-19 can affect anyone, including pregnant and postpartum women. We are still learning many things about SARS-COV2, so information about how this virus affects the pregnant or postpartum woman, and not to mention newborns, is pretty limited. The consensus in the Medical Community is that pregnant women should assume that they are just as susceptible to SARS-COV2 as any one else in the population, and, with the normal changes in pregnancy like decreased air reserve in the lungs and risk of blood clots, pregnant women may be at increased risk for worse outcomes than the general population if they develop COVID-19. Question 2- Is immunity low during pregnancy? • The short answer to this question is “NO!” Many years ago, the immune system during pregnancy was considered to be very similar to the immune system of a person after an organ transplant—where the fetus was viewed as the “foreign organ.” The biggest concern after and organ transplant is that the person’s body “rejecting” the transplanted organ. Because a baby is part of two different people, it was assumed that the mother’s immune system must be “suppressed” to avoid “rejecting” her baby. Today, we know better. Emerging research has proven that the immune system in pregnancy is actually quite complex. The fetus’ developing immune system, and the placenta also play a big role in how a woman’s body responds to viruses and bacteria. Depending on which trimester of pregnancy a woman is in, her immune system may respond differently to bacteria or a virus like SARS-COV2. The Medical community is learning more daily about the pregnant woman’s response to SARS-COV2. In some communities, hospitals are universally testing all pregnant women who come in. Many of these communities are finding that 20-40% of pregnant women are positive for the SARS-COV2 virus, but more than 80% of the moms who test positive have only mild symptoms, or no symptoms at all. This likely speaks to the very complex, efficient functioning of the pregnant woman’s immunity along with the fetal-placental immune complex. We are now learning that the pregnant woman’s immune system is working synergistically with the immunity produced by the placenta and the baby to form a sort of “super immunity”—so researchers conclude that it is much more likely that the immune system during pregnancy is changed and ENHANCED, versus “suppressed.” 1 (Am J Reprod Immunol. 2010 Jun; 63(6):425-433) Question 3- What are the safe ways to boost the immune system while pregnant? • Immune boosters are agents that can help boost our immune’s response to infection. Often, these are agents may be foods, vitamin or mineral supplements, herbs, or even exercise. I always recommend that my patients eat a very balanced diet with REAL food—especially plenty of fruits and vegetables, which are chock-full of vitamins and minerals that help boost immunity, and improve health overall. Moderate exercise is something I also encourage. For best results, mamas should get 30 minutes of moderate exercise most days per week, at the level that they are used to. For example, if a woman was a weight-lifter or a yogi before she became pregnant, she can certainly continue doing what her body is used to doing. Alternatively, if a woman decides to start a fitness journey during her pregnancy, I recommend she start with low impact exercise like stretching, walking, or swimming. Of course, every pregnant woman should consult her Obstetrician prior to starting a fitness journey. Other “immune boosters” may be helpful as well. I’m personally a big fan of essential oils, and use essential oil blends with clove, orange, cinnamon bark, eucalyptus, and rosemary in a diffuser. Many naturopathic immune-boosters can be used during pregnancy, however, each woman’s pregnancy and health condition is unique, so I always ask my patients to bring any supplements they are considering to their appointment so we can look at them together. Question 4- How to protect your baby from coronavirus in pregnancy • During an International Pandemic, almost every pregnant woman’s first thought is ‘How will this affect my baby?” The good news is that it does not appear that “vertical,” or mother-to-baby transmission occurs with this particular virus. In fact, many viruses that have been studied in pregnancy have a hard time breaking through the maternal-placental-fetal immunity “super team” I speak of above. There are some viruses that have been found to pass from mother to baby, and while we are learning more and more about SARS-COV2 each day, so far, there have been no case reports of babies being BORN with the virus. With that said, it is important to note that newborns ARE susceptible to this virus, and some newborns have contracted it from their mothers shortly after birth. Many hospitals are doing the best that they can to protect newborns from becoming infected by trying to practice “mother-baby social distancing”: o Keeping babies of infected mothers in the nursery if there is space available, or placing the bassinet at least 6 feet away from the mother—preferably with a physical barrier between them such as a curtain. o Strictly limiting visitors to the maternity and newborn care units. Many hospitals have limited visitors to 1 designated support person (the same person supports during the entire hospital stay), and in some extreme, rare, cases, hospitals have implemented a “no visitor” policy on their maternity ward. There is much debate about visitor and infant separation protocols throughout the medical community. Personally, while I understand the importance of protecting newborns with fragile immunity, I also think it is very important for birthing people to have support. I am allowing one designated visitor. Question 5- What type of food increase pregnant women immunity? Here are some examples of foods that help boost the immune system and promote health: Berries, especially Elderberries have Antioxidants Button Mushrooms have Selenium & B vitamins Watermelon had glutathione Wheat germ contains zinc, antioxidants, and B vitamins Low-fat yogurt- Vitamin D, Probiotics Spinach -fiber, folate, vit C, Black, White, or Green Tea contain disease-fighting polyphenols and flavonoids. Sweet Potatoes have beta-carotene, which becomes Vitamin A Broccoli- vitamins A and C,Glutathione Fresh Garlic(Not powder) has ability to fight bacteria, viruses, and fungi Chicken Soup had carnosine that can protect your body from the flu virus. Pomegranate Juice may help your body fight bacteria and several kinds of viruses, including the flu. Ginger contains Antioxidants and is effective against nausea Question 6- What exercises and routine helps boost immunity system? • 30 minutes of moderate exercise most (at least four) days per week has been proven to improve overall health—especially heart and lung health. In pregnancy, I recommend exercising at the level your body was used to prior to being pregnant. For example, if you were walking 2 miles a day before you became pregnant, you can safely continue doing so. In addition, swimming, yoga, and dancing are great options for pregnant women at any fitness level. • Along with exercise, good sleep routines are essential to maintaining optimal health and immunity. When we are tried, our immune system is not functioning at its optimal capacity. Sleeping 6-8 hours out of every 24 hours is a great way to allow your body to repair itself and function normally. Late second and third trimesters are often the most difficult times for pregnant women to achieve restful sleep. Talk with your doctor if you are having trouble sleeping. For my patients, I often recommend Sleepy Time Tea with chamomile and Valerian; warm baths with epsom salt and lavender, as well as online sleep stories or meditations. If these are not successful alone, I often add Benadryl or Unisom before bedtime, which are both safe mediations to take in pregnancy. Question 7- How to prepare for doctor or hospital visits during pregnancy? • Every hospital or doctor’s office may not have the same policies. This is because policy is often made based on how many really sick people are in your area. In areas with fewer outbreak, policies may be more lax, whereas, in areas that have been hit hard by COVID-19, you are likely to find stricter policies on visitors, appointment availability, and ability to schedule certain surgeries. Nearly every hospital has temporarily stopped allowing visitors with the exception of one designated visitor on the maternity floor. Most clinics are allowing limited or no visitors in the office for prenatal care o Prepare by calling ahead to find out your doctor’s office or hospital policy on visitors. o If you have other children, Make sure you arrange childcare before your appointment or hospital stay. Children under 18 have not been allowed in most offices or hospitals unless they are being seen by the doctor. Also, be prepared for the real possibility that children may not be allowed to visit while you are in the hospital. o Choose one designated labor support person. Make sure you also have a backup support person on standby just in case your original Support person becomes ill or is screened upon entry to the hospital and is found to have a fever or other COVID-19 risk factors and is unable to accompany you. o Be prepared to have a nasal swab and be tested for Corona virus—many labor and delivery units are moving toward rapid testing for every mom. You may also be asked to wear a mask. Question 8- Can coronavirus transmit from mother to child in the womb? • Based on the limited data we have, it does not appear that this Coronavirus is transmitted from mother to baby in the womb, however, it is very important to make sure mothers are not potentially transmitting the virus after giving birth—that is why social distancing is so important, even if it mean distancing yourself from your baby if you have the virus. Being away from your baby for a few days is definitely painful, but certainly less painful than being away from them forever! Question 9- Can breast milk help shield infants from coronavirus? • Yes! The antibodies, or proteins that we make to fight infection, are passed to our newborns in breast milk. Breastfeeding is still definitely recommended. If a mother has tested positive for Coronavirus, it’s important that she wash her hands, neck and chest with soap and water, or a skin-safe disinfectant prior to breastfeeding. She should also wear a mask while feeing her baby. If she is continuously coughing or sneezing, it’s safer to have the baby stay at a safe distance away and hand express or pump milk and feed the newborn with a bottle. Breast milk is ALWAYS best! Question 10- What home remedies can lower the risk of COVID-19? • The best “home remedy” for lowering the risk of developing COVID-19 is social distancing as much as possible and frequent hand-washing with soap and water for at least 20-30secs (sing the “happy birthday” song through twice to help you keep track of the time). • Avoid touching your face unless you have thoroughly washed your hands. • Drink something warm daily, like black, white, or green tea. I usually add clove, cinnamon, and orange to my tea. • Sanitizing every frequently touched surface like door knobs, fridge handles, countertops, and your phone at least once per day (sanitize more frequently if you have guests) has also been shown to help prevent spread of the virus as well.
<urn:uuid:29f44620-806f-4b6f-9d47-dc45b3fa4df2>
CC-MAIN-2022-33
https://deliveringjoymd.com/2020/05/02/pregnancy-in-a-pandemic-an-ob-gyn-answers-your-questions-joy-baker-m-d-facog/?like_comment=145&_wpnonce=819ba87423
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00206.warc.gz
en
0.959897
2,587
3.046875
3
Kanha National Park “Man-eaters have always been numerous in Mandla” – Forsyth, 1889 India’s wildlife has reached a critical stage in its survival, and the country is fortunate in possessing a sanctuary like Kanha Park, … Above all, Kanha Park is part of India’s cultural heritage, a heritage in many ways more important than the Taj Mahal, and the temples of Khajuraho, because unlike these structures formed by the hands of man, once destroyed it can never be replaced. – George B Schaller 1965 Skirted by the Maikal range on its east, Kanha is essentially a collection of flat raised plateaus set in the salubrious Satpuras. Locally known as Dadars, these plateaus are part of the rich Deccan trap that ranks amongst the largest volcanic creations in world. Kanha’s Soil can be largely classified as (i) Alluvial (ii) Sahara (iii) Barra and (iv) Black Cotton. The humus rich soil stratum supports dense vegetation, watered by local tributaries of River Narmada. If River Halon is perennial, Banjar dries up into pools of water during the summer season. Rock formations are mostly high in iron compounds imparting a reddish tinge to them. Inhabited through centuries by tribal mainly from the Gond and Baigas – Kanha is a Gondwana’s heartland. Kanha has been fortunate to get under the protection cover early when part of it was declared as a Reserve Forest way back in 1879. Post independence, the situation worsened as more and more Indians picked up rifles. During this era of lawlessness massive killings took place in Kanha with “Vizzy” hogging all the limelight. Making unreasonable use of his political associations, the Maharajkumar of Vizianagram obtained a “Special Permit” and mercilessly hunted 33 tigers in 1953. With support from political masters, finally in 1955, Kanha was accorded status of a National Park. But this did very little for conserving its immense natural wealth. Hunting was still permissible under the Indian law attracting game hunters from all over the world. Things became streamlined with companies such as “Allwyn Cooper” and “Tiger Trails” who managed shikars with connivance of government authorities. When Kailash Sankhla came to Kanha, he researched on the impact of legalised hunting around Kanha and found, “From 1955 through to 1970, a shikar out-fitter arranged 332 successful hunts for its foreign clients in the forests adjoining Kanha.” Historically, jungles of Kanha have been a favourite with tigers. If Supkhar was known for hefty tigers, Kanha had been home to thriving tiger populations. As a result of effective implementation of conservation initiatives, tiger count of Kanha has increased from 48 in 1976 to 128 in 2003. Steady relocation of villages has reduced pressure on forests, and left the ecosystem replenished. Besides the main core-buffer, an area of 110 Sq Kms of Phen WLS serves as a satellite micro-core and takes care of dangers arising out of gene stagnation. Availability of an extended tiger corridor, with Pench in south and Achanakmar in North, tigers of Kanha are assured of unhindered movement. Kanha, a frontrunner in conservation, has been a model for others to emulate. Kahna’s forest can be classified into (i) Moist Peninsular Sal Forest (ii) Southern Tropical Moist Mixed Deciduous Forest and (iii) Southern Tropical Dry Mixed Deciduous Forest. Because of thinner soil strata at dadars, grasslands are commonly seen at these flat beds. Descending down, the high slopes look laden with mixed forests that thicken with Bamboo in the middle reaches. Further down, the jungles becomes thick and luxuriant with the famed carpet of pure Sal forests occupying the ground levels. Kanha’s Sal forests have a classic unmistakable charm of their own; a nostalgic feel capable of taking us back to the good old days of Indian wilderness. Common Trees | Sal (Shorea Robusta), Saaj (Terminalia Tomentosa), Bija (Pterocarpus Massupium), Jamun (Syzygium Cumini), Mahua (Madhuca Indica), Haldu (Adina Cordifolia), Aonla (Emblica Officinalis), Thwar (Bauhinia Roxburghiana), Semal (Bombax Ceiba), Pipal (Ficus Religiosa), Tendu (Diospyros Melanoxylon), Achar (Buchanania Ianzan), Dhaman (Grewia Tiliaefolia), Ghont (Zizyphus Xylopyrus), Maniphal (Randia Dumentorum), Sendoor (Mallotus Philippensts), Kumhi (Careva Arborea), Bel (Aegle Marmelos), Palas (Butea Monosperma), Kusum (Schleichera Oleosa), Arjun (Terminalia Arjuna), Lasoda (Cordia Dichotoma), Dhaora (Anogeissus Latifolia), Harra (Terminalia Chebula), Bahera (Terminalia Bellerica), Moyen (Lannea Grandis), Banyan (Ficus Bengalensis), Pakhri (Ficus Virens), Lendia (Lagerstroema Parvoflora), Kasahi (Bridelia Squamosa), Ber (Zizyphus Mauritiana), Mango (Mangifera Indica) Wildlife | Kanha has a bountiful of wildlife in its lap and its conspicuous all over the park. As a complete enriched ecosystem, Kanha offers unmatched wild sightings, ranging from a roaring tiger, to an elegant swamp deer, to innumerable hordes of chitals. Gaurs are spotted easily and so are jackals, which at times even refuse to make way for gypsies. Kisli and Kanha are famed for tiger sighting with “Kanha” categorized as “premium” zone attracting a higher entrance fee. Sunset point of Bamni Dadar is popular with sloth bears, leopards and chausinghas. Langurs can be seen literally everywhere, although Rhesus Macaques are fewer. With a total of 43 mammal species including tiger, leopard, wild dog, sloth bear, jungle cat, small Indian civet, hyaena, jackal, barasingha, chital, sambar, barking deer, chousingha, gaur, langur, and wild boar, Kanha is a complete jungle. Common Birds | Kanha’s aviary richness is outstanding with close to 300 bird species. Amongst the commonly seen, there are painted stork, open-billed stork, spotted owl, barred jungle owlet, black-shouldered kite, pond heron, green sandpiper, pied myna, common myna, wood sandpiper, red-wattled lapwing, yellow-wattled lapwing, wagtail, sunbird, white breasted kingfisher, stork-billed kingfisher, black drongo, greater racquet tailed drongo, oriental magpie robin, long-tailed shrike, black ibis, rock pigeon, Indian peafowl, grey francolin, jungle babbler, golden oriole, spotted dove, magpie, paddy field pipit, crested serpentine eagle, jungle crow, green bee-eater, honey buzzard, changeable hawk eagle, shikra, paradise flycatcher, verditer flycatcher, black naped monarch, common woodshrike, plum headed parakeet, rose ringed parakeet, greater coucal, red jungle fowl, grey hornbill and Lesser Adjutant Stork. The best place to observe wildlife is Kanha meadow where a village by the same existed till the early 1970s. Between 1969 and 2010, a total of 28 villages have been relocated to make way for wildlife. Creation and sustenance of these flat grassy meadows has worked wonders for Kanha’s thriving ungulate population, more specifically the hard Ground Swamp Deer or Barasingha. This success has only been achieved because of the indefatigable efforts of forest department by keeping the meadows free from weeds and Sal saplings. Meadows have been systematically conditioned by (i) making controlled fires (ii) tilling the meadows and rowing grass seeds. Water bodies around these meadows are the best places for sighting Barasinghas. Vantage point of Bamhni dadar, now closed to tourists is a plateau famous for sighting of Sloth Beer and Four horned Antelope (Chausingha). While we were busy observing a pack of birds led by Orange-headed thrush, Bee-Eater, Red Munia and others, our guide spotted a lone Chausingha – the smallest antelope in the entire of Asia, this ungulate has a unique arrangement of horns. Sunset – no, it was more than that! A sweeping panorama from one of the highest points inside Kanha national park, Bamhni Dadar is unmatched for its stupendous aerial views of the emerald valleys of Halon and Banjar below. The unending warped landscape in shades of green effortlessly merged into the hazy horizon. As the colours deepened with the fading sun, a golden glow engulfed the forests. Mukki, the remotest zone, and understandably the least frequented, is undoubtedly Kanha’s most exotic. This realization dawns upon your conscience the moment you reach the dark forests of Mukki. Crossing river Banjar, we reached the forest entry gate, less crowded, and better managed. The very first look of Mukki looked pleasantly alien from Kisli and Kanha – thicker, denser, and untouched by humans. The straight road that dived into the jungle was surprisingly broad and well paved. Mukki’s claim of fostering hefty hunks is historical; with sound supporting evidences by none other than the legendary A A Dunbar Brander. Although Brander lost accurate measurements of around 200 tiger he witnessed being shot mostly around Central India, he had vivid memories of Kanha. If the largest tiger measured 10’3″, another hunk measuring 9’10” was shot by Royal highness the duke of Connaught at Supkhar near Mukki. When in Mukki, don’t miss the nature walks! Currently, there are two operational nature trails along the waters of River Banjar. If the one at Bamhni, is known to be frequented even by tigers, the other leading to village Lagma next to MPT Kanha Safari lodge, further downstream is known for its aviary buzz. Early into the latter trail, playful butterflies invited us along the river, as mellifluous bird calls, greeted us with curiosity. Nearing a bend the river withered away into many small streams, with scattered pools of waters. We wanted to spend the entire day by the riverside, but for the worldly worries we retreated. Want to read more, Grab a copy of Wild Escapades Around Central India by Author – Malay Mandal About the Book “…An air of fragrance as mild as incensed by wild lavenders, aroma of flowering Sal trees, a quietness overpowered by symphonies of millions of living beings, a solitude of unimaginable proportion – are just a few to name. I have found them immensely soulful, perfect for an emotional and mental recoup – A regeneration that lingers on forever! It’s a magical concoction made by nature to soothe all our senses. Yes! Your life is “incomplete” if have not seen a jungle because it is something that cannot be simulated and experienced from writings, commentaries, photographs and videos. These must be seen, experienced, and savored as warmth of a campfire cannot be encoded in words. Same is true for a night-out under a star studded sky with crickets singing aloud. For culinary temptations, I bet if you could find a better place to experience survival more minimally with food being cooked on an earthen oven imparting subtle shades of smokiness…” The Book Includes:- 400 Pages Full Color Print 300+ Photographs 170+ Hand Illustrations 5 Tiger Reserves and National Parks 5 Wildlife Sanctuary 5 Picture Spreads 10 Fast Fact Jungle guides With special chapters “Photographing Wilderness” and “Practicalities for jungle” The Book Includes details about Kanha National Park, Bandhavgarh National Park, Panna, Pench, Satpura etc. It gives detail overview of Indian Jungles mainly Jungles of Central India i.e Madhya Pradesh, India Each Book you will buy will support MP Tiger Foundation Society for conservation of nature and wildlife protection. A collection of travel stories through the wooded valleys of Madhya Pradesh. Bestseller in Amazon and Flipkart Indian Wildlife – Its history, conservation efforts and current situation Indian jungles, Indian Wildlife, Indian Wildlife Guidebook
<urn:uuid:2d34535d-b595-4710-9284-7673b4d7a835>
CC-MAIN-2022-33
https://www.resurrect.co.in/kanha-national-park/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00002.warc.gz
en
0.915573
2,815
3
3
|This article is part of a series on| | Political divisions of| the United States United States portal A civil township is a widely used unit of local government in the United States that is subordinate to a county, most often in the northern and midwestern parts of the country. The term town is used in New England, New York, and Wisconsin to refer to the equivalent of the civil township in these states; Minnesota uses "town" officially but often uses it and "township" interchangeably. Specific responsibilities and the degree of autonomy vary based on each state. Civil townships are distinct from survey townships, but in states that have both, the boundaries often coincide and may completely geographically subdivide a county. The U.S. Census Bureau classifies civil townships as minor civil divisions. Currently, there are 20 states with civil townships. Township functions are generally overseen by a governing board (the name varies from state to state) and a clerk, trustee, or mayor (in New Jersey and the metro townships of Utah). Township officers frequently include justice of the peace, road commissioner, assessor, constable, and surveyor. In the 20th century, many townships also added a township administrator or supervisor to the officers as an executive for the board. In some cases, townships run local libraries, senior citizen services, youth services, disabled citizen services, emergency assistance, and even cemetery services. In some states, a township and a municipality that is coterminous with that township may wholly or partially consolidate their operations. Depending on the state, the township government has varying degrees of authority. In the Upper Midwestern states near the Great Lakes, civil townships (known in Michigan as general law townshipsand in Wisconsin as towns), are often, but not always, overlaid on survey townships. The degree to which these townships are functioning governmental entities varies from state to state and in some cases even within a state. For example, townships in the northern part of Illinois are active in providing public services—such as road maintenance, after-school care, and senior services—whereas townships in southern Illinois frequently delegate these services to the county. Most townships in Illinois also provide services such as snow removal, senior transportation, and emergency services to households residing in unincorporated parts of the county. The townships in Illinois each have a township board, whose board members were formerly called township trustees, and a single township supervisor. In contrast, civil townships in Indiana are operated in a relatively consistent manner statewide and tend to be well organized, with each served by a single township trustee and a three-member board. Civil townships in these states are generally not incorporated, and nearby cities may annex land in adjoining townships with relative ease. In Michigan, however, general law townships are corporate entities (e.g. they can be the subject of lawsuits), [ citation needed ] In both documents and conversation, "town" and "township" are used interchangeably. Minnesota townships can be either Non-Urban or Urban (giving the township government greater power), but this is not reflected in the township's name. In Ohio, a city or village is overlaid onto a township unless it withdraws by establishing a paper township. Where the paper township does not extend to the city limits, property owners pay taxes for both the township and municipality, though these overlaps are sometimes overlooked by mistake. Ten other states also allow townships and municipalities to overlap.and some can become reformulated as charter townships, a status intended to protect against annexation from nearby municipalities and which grants the township some home rule powers similar to cities. In Wisconsin, civil townships are known as "towns" rather than townships, but they function essentially the same as in neighboring states. In Minnesota, state statute refers to such entities as towns yet requires them to have a name in the form "Name Township". In Kansas, some civil townships provide services such as road maintenance and fire protection services not provided by the county. In New England and New York, states are generally subdivided into towns and cities, which are municipalities that provide most local services. With the exception of a few remote areas of New Hampshire and Vermont and about half of Maine, all of New England lies within the borders of an incorporated municipality. New England has counties, though in southern New England, they are strictly used as dividing lines for judicial systems and statistical purposes, while in northern New England, they often handle other limited functions, such as law enforcement, education and some public facilities in addition to judicial systems. New England also has cities, most of which are towns whose residents have voted to replace the town meeting form of government with a city form. Maine has a third type of township called a plantation, which previously existed in other New England states, that has more limited self-governance than other New England towns. In portions of Maine, New Hampshire, and Vermont, county subdivisions that are not incorporated are occasionally called townships, or by other terms such as "gore", "grant", "location", or "purchase". The State of New York is subdivided into counties, which are subdivided into cities and towns—except for New York City, whose five coextensive counties for state government purposes are municipal boroughs for city government purposes (Bronx County/The Bronx, Kings County/Brooklyn, New York County/Manhattan, Queens County/Queens, and Richmond County/Staten Island). As in New England, the term "town" equates to "township" in most other states. Additionally, New Yorkers colloquially use the term "township" to mean “town”. Townships and hamlets are unincorporated areas within a town or towns. Because towns are administrative divisions of a county, town boundaries cannot cross county lines. In addition to administrative subdivisions, New York State also has cities. Cities in New York are fully autonomous municipal corporations and, thus, are able to cross county lines and whose governments fully independent of county control. Finally, New York and Vermont also have villages, which are smaller communities lying within the boundaries of a town that provide additional government services not provided by their parent town, such as sewage, fire, law enforcement, garbage collection, public facilities, water and building code enforcement. In Vermont, most current cities were actually former villages that broke off from their parent town. Connecticut has boroughs and non-consolidated cities, although these communities are not as autonomous as villages in New York and Vermont, and today there are only eight non-consolidated boroughs (plus the community of Groton Long Point) and one non-consolidated city. A Pennsylvania township is a unit of local government, responsible for services such as police departments, local road and street maintenance. It acts the same as a city or borough. Townships were established based on convenient geographical boundaries and vary in size from six to fifty-two square miles (10–135 km2). A New Jersey township is similar, in that it is a form of municipal government equal in status to a village, town, borough, or city, and provides similar services to a Pennsylvania township, and varies in size from one-tenth (Shrewsbury Twp.) to one hundred (Jackson Twp.) square miles. In the Southern United States, outside cities and towns there is generally no local government other than the county. North Carolina is no exception to that rule, but it does have townships as minor geographical subdivisions of counties, including both unincorporated territory and also land within the bounds of incorporated cities and towns (as well as the extraterritorial jurisdiction of municipalities). Every county is divided into townships as mandated since the North Carolina Constitution of 1868. Some urbanized counties such as Mecklenburg County (Charlotte) now number their townships (e.g. "Township 12") rather than using names. Townships all over the state used to have some official organization and duties but now are only considered ceremonial divisions of each county. Township names are still used quite extensively at the county government level in North Carolina as a way of determining and dividing up areas for administrative purposes; primarily for collecting county taxes, determining fire districts (e.g. Lebanon Township in Durham County gives its name to the Lebanon Volunteer Fire Department), for real estate purposes such as categorizing land deeds, land surveys and other real estate documents, and for voter registration purposes. In most areas of North Carolina that are outside any municipal limit (outside cities or towns), townships are used to determine voter polling places, and in most instances county election boards divide up their voter precincts by township. However, there is no government per se at the township level in North Carolina, and there are no elected or appointed offices associated with townships. In 2015 Utah created a form of civil township called a metro township. While each metro township has a mayorand township council, and manage a budget, and cannot be annexed without its permission, its powers of taxation are limited, and must contract with other municipalities or municipal shared-service districts for most municipal services (police, for example). The five metro townships—all located in Salt Lake County—are Kearns, Magna, Copperton, Emigration Canyon and White City. As of 2012, there were 16,360 organized town or township governments in the following 21 states: There were 29 states without organized town or township governments as of 2012: The provinces of Eastern Canada have, or have had, divisions that are analogous to the townships of the United States. Ontario and Quebec continue to have townships that subdivide their respective counties. Local government was introduced into Nova Scotia (which at the time also included the maritime provinces of New Brunswick and Prince Edward Island) in 1749 in the form of townships controlled by a court of quarter sessions, a system that had characterized local government in Britain and Virginia. This court had both administrative and judicial functions, and took over most responsibilities of local government, including the appointment of necessary officers. A form of direct democracy was introduced into the townships by settlers from New England in 1760 with the help of a provincial statute. However, the statute was disallowed by the King in 1761, and direct democracy was replaced in the townships that had adopted it by the quarter sessions. Acts in 1855 and 1856 provided for the incorporation of self-governing townships, but only Yarmouth partook in incorporating, and abandoned the prospect after three years. These acts were repealed in 1879, and townships were replaced in the third quarter of the 19th century by self-governing municipalities. Lynda Bowers, Lafayette Township Trustee, noted that we already have property that is dual citizenship and they pay taxes in 2 places. There is Chippewa Lake in Lafayette Township, Westfield Village in Westfield Township and Lodi in Harrisville Township. A county is a geographic region of a country used for administrative or other purposes in certain modern nations. The term is derived from the Old French comté denoting a jurisdiction under the sovereignty of a count (earl) or a viscount. Literal equivalents in other languages, derived from the equivalent of "count", are now seldom used officially, including comté, contea, contado, comtat, condado, Grafschaft, graafschap, and zhupa in Slavic languages; terms equivalent to and commune/community are now often instead used. Local government is a generic term for the lowest tiers of public administration within a particular sovereign state. This particular usage of the word government refers specifically to a level of administration that is both geographically-localised and has limited powers. While in some countries, "government" is normally reserved purely for a national administration (government), the term local government is always used specifically in contrast to national government – as well as, in many cases, the activities of sub-national, first-level administrative divisions. Local governments generally act only within powers specifically delegated to them by law and/or directives of a higher level of government. In federal states, local government generally comprises a third or fourth tier of government, whereas in unitary states, local government usually occupies the second or third tier of government. A town is a human settlement. Towns are generally larger than villages and smaller than cities, though the criteria to distinguish between them vary considerably in different parts of the world. A township is a kind of human settlement or administrative subdivision, with its meaning varying in different countries. In the United States, a county is an administrative or political subdivision of a state that consists of a geographic region with specific boundaries and usually some level of governmental authority. The term "county" is used in 48 U.S. states, while Louisiana and Alaska have functionally equivalent subdivisions called parishes and boroughs, respectively. Special districts are independent, special-purpose governmental units that exist separately from local governments such as county, municipal, and township governments, with substantial administrative and fiscal independence. They are formed to perform a single function or a set of related functions. The term special district governments as defined by the U.S. Census Bureau excludes school districts. In 2017, the U.S. had more than 51,296 special district governments. An unincorporated area is a region that is not governed by a local municipal corporation. Widespread unincorporated communities and areas are a distinguishing feature of the United States and Canada. Most other countries of the world have either no unincorporated areas at all or these are very rare; typically remote, outlying, sparsely populated or uninhabited areas. A census-designated place (CDP) is a concentration of population defined by the United States Census Bureau for statistical purposes only. CDPs have been used in each decennial census since 1980 as the counterparts of incorporated places, such as self-governing cities, towns, and villages, for the purposes of gathering and correlating statistical data. CDPs are populated areas that generally include one officially designated but currently unincorporated community, for which the CDP is named, plus surrounding inhabited countryside of varying dimensions and, occasionally, other, smaller unincorporated communities as well. CDPs include small rural communities, edge cities, colonias located along the Mexico–United States border, and unincorporated resort and retirement communities and their environs. A minor civil division (MCD) is a term used by the United States Census Bureau for primary governmental and/or administrative divisions of a county or county-equivalent, typically a municipal government such as a city, town, or civil township. MCDs are used for statistical purposes by the Census Bureau, and do not necessarily represent the primary form of local government. They range from non-governing geographical survey areas to municipalities with weak or strong powers of self-government. Some states with large unincorporated areas give substantial powers to counties; others have smaller or larger incorporated entities with governmental powers that are smaller than the MCD level chosen by the Census. A school district is a special-purpose district that operates local public primary and secondary schools in various nations. A township in some states of the United States is a small geographic area. An incorporated town is a town that is a municipal corporation. Local government in the United States refers to governmental jurisdictions below the level of the state. Most states and territories have at least two tiers of local government: counties and municipalities. Louisiana uses the term parish and Alaska uses the term borough for what the U.S. Census Bureau terms county equivalents in those states. Civil townships or towns are used as subdivisions of a county in 20 states, mostly in the Northeast and Midwest. The town is the basic unit of local government and local division of state authority in the six New England states. Most other U.S. states lack a direct counterpart to the New England town. New England towns overlay the entire area of a state, similar to civil townships in other states where they exist, but they are fully functioning municipal corporations, possessing powers similar to cities in other states. New Jersey's system of equally powerful townships, boroughs, towns, and cities is the system which is most similar to that of New England. New England towns are often governed by a town meeting legislative body. The great majority of municipal corporations in New England are based on the town model; there, statutory forms based on the concept of a compact populated place are uncommon, though elsewhere in the U.S. they are prevalent. County government in New England states is typically weak at best, and in some states nonexistent. Connecticut, for example, has no county governments, nor does Rhode Island. Both of those states retain counties only as geographic subdivisions with no governmental authority, while Massachusetts has abolished eight of fourteen county governments so far. Counties serve mostly as dividing lines for the states' judicial systems and some other state services in the southern New England states, while providing limited services in the three northern New England states. The following is a set–index article, providing a list of lists, for the cities, towns and villages within the jurisdictional United States. It is divided, alphabetically, according to the state, territory, or district name in which they are located. In the United States, the meaning of village varies by geographic area and legal jurisdiction. In many areas, "village" is a term, sometimes informal, for a type of administrative division at the local government level. Since the Tenth Amendment to the United States Constitution prohibits the federal government from legislating on local government, the states are free to have political subdivisions called "villages" or not to and to define the word in many ways. Typically, a village is a type of municipality, although it can also be a special district or an unincorporated area. It may or may not be recognized for governmental purposes. The government of Vermont is a republican form of government modeled after the Government of the United States. The Constitution of Vermont is the supreme law of the state, followed by the Vermont Statutes. This is roughly analogous to the Federal United States Constitution, United States Code and Code of Federal Regulations respectively. Provision is made for the following frame of government under the Constitution of the State of Vermont: the executive branch, the legislative branch, and the judicial branch. All members of the executive and legislative branch serve two-year terms including the governor and senators. There are no term limits for any office. A Vermont municipality is a particular type of New England municipality. It is the basic unit of local government.
<urn:uuid:b3ace791-2ff0-4255-ba0d-e0d66991db3c>
CC-MAIN-2022-33
https://wikimili.com/en/Civil_township
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00605.warc.gz
en
0.965127
3,864
3.46875
3
Georgia and Georgians GEORGIA AND GEORGIANS Georgia [Sak'art'velo] is among the "Newly Independent States" to emerge from the collapse of the Soviet Union. Its territory covers 69,700 square kilometers, bordered by the North Caucasus republics of the Russian Federation on the north, Azerbaijan to the west, Armenia and Turkey to the south and southwest, and the Black Sea to the east. It includes three autonomous regions: Adjaria, Abkhazia, and South Ossetia. The latter two have maintained a quasi-independent status for most of the post-Soviet period, and have been the scenes of violence and civil war. The capital city of Tiflis, located on the Mtkvari (or Kura) River in the heart of Georgia, has a population of 1.2 million, approximately 22 percent of the republic's 5.4 million. Georgia's head of state is a president. A unicameral parliament is Georgia's legislative body. The Georgians are historically Orthodox Christians, with some conversions to Islam during times of Muslim rule. Their language, with its own alphabet (thirty-three letters in the modern form), is a member of the Kartvelian family, a group distinct from neighboring Indo-European or Semitic languages. Speakers of Mingrelian and Svanetian, two of the other Kartvelian languages, also consider themselves Georgian. Laz, closely related to Mingrelian, is spoken in Turkey. Georgia has an ethnically diverse population: Georgian 70.1 percent, Armenian 8.1 percent, Russian 6.3 percent, Azeri 5.7 percent, Ossetian 3 percent, Abkhaz 1.8 percent, and other groups comprising 5 percent. Georgian principalities and kingdoms began to appear in the last few centuries of the first millennium b.c.e, and existed alongside a well-traveled east-west route on the peripheries of both Persian and Greco-Roman civilizations. These influences were mediated through their Armenian neighbors who, with the Georgians, also maintained contacts with Semitic cultures. Ancient Georgian culture was split into two major areas: east and west, divided by the Likhi mountains. The eastern portion, known as Kartli, or Iberia, had its center at Mtskheta, at the confluence of the Aragvi and Mtkvari Rivers. When not directly controlled by a Persian state, it still maintained ties with the Iranian political and cultural spheres. This connection lasted well into the Christian period, when the local version of Zoroastrianism vied with Christianity. Western Georgia was known by different names, depending upon the historical source: Colchis, Egrisi, Lazica. It had more direct ties with Greek civilizations, as several Greek colonies had existed along the Black Sea coast from as early as the sixth century b.c.e. Western Georgia was eventually more directly under the control of the Roman Empire, in its successive incarnations. The conversion of the Kartli to Christianity occurred in the fourth century as the Roman Empire was beginning its own transition to Christianity. As with other aspects of cultural life, Armenian and Semitic sources were important. Mirian and his royal family, after being converted by St. Nino, a Cappadocian woman, made Christianity the official religion. Dates in the 320s and 330s are argued for this event. The conversion of the west Georgians land owes itself more directly to Greek Christianity. The conversion of the Georgians was accompanied by the invention of an alphabet in the early fifth century. Scripture, liturgy, and theological works were translated into Georgian. This association of the written language with the sacred is a vital aspect of Georgian culture. The Georgian capital was transferred from Mtskheta to Tiflis in the fifth century, a process begun during the reign of King Vakhtang, called Gorgasali, and completed under his son Dachi. Vakhtang is portrayed in Georgian sources, in an exaggerated fashion, as one of the important figures in transferring Kartli from an Iranian orientation to a Byzantine one. This was a complex time of struggle in the South Caucasus, not only between Byzantine and Persian Empires, but also among various Armenian, Caucasian Albanian, and Georgian states vying for power. These currents of conflict were drastically altered in the seventh century when Islam asserted its military and political power. Tiflis was captured by an Arab army in 645, a mere thirteen years after the death of Muhammad, and would remain under Arab control until the time of David II/IV (the numbering of the Bagratid rulers differs according to one's perspective) in the eleventh century. While Christianity was tolerated in Eastern Georgia, the political center shifted westward, where the Kingdom of Abkhazia grew to preeminence in the eighth century. This realm was one of mixed ethnic composition, including the Kartvelians of West Georgia (i.e. the ancestors of today's Mingrelians and Svanetians) and, toward the northwest, the ancestors of the Abkhazian people. Meanwhile, a branch of the Bagratid family, which had ruled parts of Armenia, and who were clients of the Byzantine Empire, became prominent in the Tao-Klarjeti region of southwest Georgia. Because of Bagrat III (d. 1014), they became inheritors of the Kingdom of Abkhazia. From their capital Kutaisi they contemplated the re-conquest of Tiflis and the unification of Georgian lands. This was accomplished in 1122 by David II/IV, called the Builder, who reigned from 1089 to 1125. For nearly two centuries, through the reign of Tamar (1184–1212), the Georgians enjoyed a golden age, when they controlled a multiethnic territory from the Black to the Caspian Seas and from the Caucasus Mountains in the north, toward the Armenian plateau in the south. It was also a time of great learning, with theological academies at Gelati, near Kutaisi, and in the east at Iqalto on the Kakhetian plain. The literary output of this time reached it zenith with Shota Rustaveli's epic tale of heroism and chivalry, Knight in the Panther Skin, written in the last quarter of twelfth century. In the thirteenth century a succession of invasions by Turks and Mongols brought chaos and destruction upon the Georgians. These culminated in the devastating raids of Timur in the early fifteenth century. From these depredations Georgian society was very slow to recover, and for much of the next four centuries it remained under the sway of the Savafid Persian Empire and the Ottoman Empire. Georgians at this time were active at the Safavid court. The Bagratid dynasty continued to reign locally over a collection of smaller states that warred against one another. West European travelers who ventured through Georgia in these centuries give sad reports about the quality of life. In the eighteenth century the Russian Empire's steady expansion brought it to the foothills of the Caucasus Mountains and along the Caspian Sea to the east of Georgia. Russians and Georgians had been in contact through earlier exchanges of embassies. Persian invasions in that century had been especially harsh, and the Georgians looked to their northern Orthodox neighbor for assistance. This assistance culminated first in the 1783 Treaty of Georgievsk, by which Irakle II's realm of Kartli-Kakheti became a protectorate of the Russian Empire. Then, in 1801, soon after his accession to the throne, Alexander I signed a manifesto proclaiming Kartli-Kakheti to be fully incorporated into Russia. Other parts of Georgia followed within the next decade, although not always willingly. Despite Russification efforts during the nineteenth century, the Georgian language and culture underwent a renaissance that would undergird Georgian national aspirations in the twentieth century. The Society for the Spread of Literacy among the Georgians, founded by Iakob Gogebashvili, was important for fostering language acquisition, especially among children. Ilia Chavchavadze, Akaki Tsereteli, and Vazha Pshavela dominated the literary scene into the twentieth century. Georgians joined with comrades throughout the Russian Empire in the revolutions of 1905 and 1917. When the Russian state began to shed its periphery in 1918, the Georgians briefly entered the Transcaucasian Republic. This political entity lasted from February until May 1918, but then split into its constituent parts. Georgia proclaimed its independence on May 26, 1918. The Democratic Republic of Georgia, beset by internal and external enemies, lasted less than three years, and on February 26, 1921, the Bolsheviks established Soviet power in Tiflis. Independent Georgia had been governed mainly by Mensheviks, an offshoot of the Russian Social Democratic Workers' Party. They were reluctant nationalists, led by Noe Zhordania, who served as president. These Mensheviks became the demonic foil for any number of aspects of Soviet historiography and remained so for the Abkhazians when they would press for greater autonomy. The Soviet Socialist Republic of Georgia entered the USSR through the Transcaucasian Soviet Federative Socialist Republic in 1922 and remained a member of it until its dissolution in 1936. Afterward the Georgian Soviet Socialist Republic became one of the USSR's constituent republics. Three autonomous regions were created within Georgia, part of what some describe as a manifestation of the "divide and conquer" regime of ethnic pseudosovereignties. The South Ossetian Autonomous Oblast was established across the border from North Ossetia, and the Adjar A.S.S.R. was an enclave of historically Muslim Georgians in the southwest. The third, and most troubled, part of Georgia was Abkhazia. This region in the northwest along the Black Sea coast had been in an ambiguous federative, treaty status with Georgia, but was finally, in 1931, incorporated as an A.S.S.R. Georgia fared generally no better or worse for having its "favorite son," Iosep Jugashvili (a.k.a. Josef Stalin), as the dictator of the Soviet Union. With other parts of the U.S.S.R., it suffered the depredations of party purges and the destruction of its national intelligentsia in the 1930s. In the latter decades of the Soviet period, Georgia was held up as a sort of paradise within the Soviet system. Agriculture, with tea and citrus in the subtropical zone in the west, prospered, and the Black Sea coast was a favorite spot for vacationers from the cold north. The hospitality of the Georgians, seemingly uncooled by Soviet power, and always warmed by the quality of Georgia's famous wines, wooed Soviet and foreign guests alike. The Georgians developed a vigorous dissident movement in the 1970s, with Zviad Gamsakhurdia and Merab Kostava playing leading roles. Tens of thousands came out into the streets of Tiflis in 1978 to protest the exclusion of the Georgian language from the new proposed Constitution of the Georgian S.S.R. As Gorbachev's glasnost worked its effects, the Georgian independence movement gave rise to competing movements in South Ossetia and Abkhazia. In reaction to a communiqué issued by Abkhazian intellectuals in March 1989, the main streets of Tiflis again overflowed with protesters. On the morning of April 9, 1989, troops moved against the demonstration, killing at least twenty and injuring scores of others. This outburst of violence marked the beginning of the rapid devolution of Soviet power in Georgia. Georgia voted for its independence on April 9, 1991, and elected its first president, Zviad Gamsakhurdia, in May. His rule was harsh, and his presidency barely survived the final collapse of the USSR by a few months into 1992. Eduard Shevardnadze, who had held power in Georgia under Communist rule, and who became Gorbachev's foreign minister, returned to Georgia, eventually to be elected twice to the presidency. His presidency was plagued by warfare and continuing conflict in South Ossetia and Abkhazia, both of which claimed independence. The ethnic conflict compounded the economic dislocations, although the proposed Baku-Tiflis-Ceyhan oil pipeline, the beginning of an east-west energy corridor, has brought the promise of some future prosperity. See also: caucasus; nationalities policies, soviet; nationalities policies, tsarist; shevardnadze, eduard amvrosievich Allen, W. E. D. (1971). A History of the Georgian People: From the Beginning down to the Russian Conquest in the Nineteenth Century. New York: Barnes & Noble. Aronson, Howard. (1990). Georgian: A Reading Grammar, 2nd ed. Columbus, OH: Slavica.. Braund, David. (1994). Georgia in Antiquity: A History of Colchis and Transcaucasian Iberia, 550 bc– ad 562. Oxford: Clarendon. Lang, David Marshall. (1962). A Modern History of Soviet Georgia. New York: Grove. Suny, Ronald G. (1994). The Making of the Georgian Nation, 2nd ed. Bloomington: Indiana University Press. Toumanoff, Cyril. (1982). History of Christian Caucasia. Washington, DC: Georgetown University Press.
<urn:uuid:edf8a09b-fd1d-4170-99a9-52a9947e9058>
CC-MAIN-2022-33
https://www.encyclopedia.com/history/encyclopedias-almanacs-transcripts-and-maps/georgia-and-georgians
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00205.warc.gz
en
0.959568
2,835
3.34375
3
We all know our water comes out of the kitchen faucet, but is tap water safe to drink? After all, it has a long journey before it reaches homes for human consumption. It seems like the most cost-effective, easiest source of water. However, it’s important to be aware of how contamination might affect your tap water quality. While there are specific water treatment protocols municipalities must follow, you need to know where your water is sourced. Water treatments vary per area depending on where the water originates from and the quality of water that is captured. For example, Sioux Falls, South Dakota recently earned a clean water score of 110, one of the highest in the U.S., based on data that showed evidence of the lowest potential for water pollution. Comparably, one of the worst clean water cities is Modesto, CA with a water score of 47 due to the number of contaminants found in the water. The Environmental Protection Agency (EPA) has set regulations for the amounts of certain contaminants in water provided by public water systems. These standards are required under the Safe Drinking Water Act (SDWA). There are several steps to the process before water is stored and deemed acceptable to drink from the faucet. Regardless of treatments, water scores, and regulations, consumers simply want a low level of contaminants and water that tastes good. If you’re wondering if your tap water is safe to drink, consider where it comes from, how it’s treated, and how it makes its way to your home. Where Does Tap Water Come From? According to the EPA, the majority of public water systems (91%) are supplied by groundwater, while 68% of the U.S. have community water systems that use surface water. Typically speaking, well-populated cities use surface water and more rural areas rely on water from the ground. Keep in mind, not all community water is treated for human consumption. Some of it is used for recreational, agricultural, and industrial activities alone. It’s important to understand the different types of drinking water and where it comes from to evaluate whether your tap water is safe to drink. It turns out two-thirds of our tap water comes from rivers and streams. This is what we call surface water. This type of water is collected from precipitation like rain and snow. It can also come from groundwater deposits that reach the surface. Some additional examples of surface water include lakes, wetlands, and oceans. Saltwater from the ocean, however, is not potable water without special processing. Surface water is the most common source for public water utilities. The supplier only needs to draw the water from the source before it analyzes, treats, and pumps it to the consumer. The amount of surface water collected depends on the region, climate, and other geographic factors. There are 21 water resource regions based on surface topography and drainage areas of major rivers. In 2017, the annual runoff in the nation’s streams and rivers was higher than the average of annual runoff for the years 1930-2017. Each area has its own water supply systems to account for how surface water is captured. For example, California uses dam construction as a centerpiece for its water supply system, in addition to the California Aqueduct and the Sacramento-San Joaquin Delta. There are 17 reservoirs throughout the state including Lake Oroville, the largest in the State Water Project, which receives water from the Feather River Watershed. Alternatively, in Texas, surface water is publicly owned and governed by the state. Landowners may use surface water for domestic and livestock purposes only unless they have a permit from the Texas Commission on Environmental Quality (TCEQ). Surface water in this region is commonly found in ponds, rivers, streams, and lakes and captured in stock tanks. Groundwater is also a source of tap water and is used by approximately 78% of community water systems in the U.S. and supplies drinking water to 32% of community water system users. This type of water comes from rain and snow that collects in an underground pocket of rock called an aquifer. Groundwater comes to the surface to form a spring. It can also be accessed by drilling a well in the ground. The well fills with groundwater and is pumped to the surface. If the water table falls below the bottom of the well, it can go dry. There are also artesian wells that don’t require a pump because there are natural pressures present that force the water out of the well and up to the surface. Through this process of retrieving groundwater, fertilizers and pesticides can easily pollute the water, which makes it unsafe to drink. Lastly, there are private wells that distribute water to an individual residence. These include dug/bored wells, driven wells, and drilled wells. Well owners are responsible for ensuring their water supply is safe by regularly testing the well every spring at a minimum. EPA regulations that protect public drinking water systems don’t apply to privately owned wells. Still have questions about the source of your drinking water? The best way to get more information about your tap water quality is to contact your local water provider. They can tell you where it comes from and how they treat it before pumping and piping it to your home. Public water systems are also required to notify consumers if water quality standards haven’t been met. Sometimes, it’s just easier to not worry about this and buy a residential bottleless water cooler for your home. You can also find out about the safety of your tap water through the annual Consumer Confidence Report. How is Tap Water Treated? In order to remove contaminants from either kind of water source to eventually be drinkable, public water systems must follow several steps to treat tap water for human consumption. The first steps are coagulation and flocculation. This is when chemicals with a positive charge are added to the water to neutralize the negative charge of dirt and other particles in the water. This chemical binding results in the formation of larger particles called floc, which settles to the bottom of the water supply due to its weight, a process called sedimentation. From there, the water on top passes through filters to remove any additional particles like parasites, bacteria, viruses, chemicals, and other harmful components. Once the water is filtered, a disinfectant like chlorine is often added to kill any remaining contaminants. Each region in the U.S. uses a slightly different water purification method based on the original quality of water that is obtained. In general, surface water requires more treatment and filtration than groundwater due to the number of pollutants found in the water source. These come from naturally occurring chemicals like radon and arsenic, local land use pesticide and fertilizers, sewer overflows, and malfunctioning wastewater treatment. The EPA regulates over 90 contaminants in water to make it drinkable for communities. These include: - Organic chemicals - Inorganic chemicals - Disinfection byproducts This regulation helps to eliminate exposure to contaminants that cause illness and other adverse health effects as much as possible when it comes to an area’s water supply. The EPA also has non-mandatory water quality standards for 15 additional contaminants established from the National Secondary Drinking Water Regulations. Although the contaminants tested are not considered a risk to human health, they do take into consideration water taste, color, and odor. These include aluminum, fluoride, copper, and sulfate, among others. Finally, once it goes through all testing, the filtered and treated water, which is called potable water, gets stored in a reservoir. This water is then pumped through underground pipes that we call water mains. A public water utility also stores plenty of water to prepare for emergencies. The large water tanks that you may have seen around or outside your community are where this water is stored. Eventually, it then gets pumped to your tap. How Does Tap Water Get to Your Home? Where you live dictates how your tap water makes its way to your faucet. If you live in the country, your tap water likely comes from a private well on your property. However, you likely get your water from a public water supply regardless of if you live in a small town or a large city. For example, if you live in Seattle, your water comes from the Tolt and Cedar Rivers. New Yorkers get their water from the Delaware River Basin, while the Colorado River supplies water to more than 36 million people from Denver to Los Angeles. A water pipe, known as a service lateral line, connects the water main to the plumbing in your home. The city’s water department pumps water from the reservoir, water tower, or other water storage area through these pipes directly to your home. This is what brings the water to your faucet when you turn it on. It’s amazing to think how many steps tap water has gone through and how long of a journey it’s been on before it reaches your home. When your water comes from a public water supply, you pay a supplier fee based on your water usage. The water meter outside of your home or property measures your water use. Water utility companies charge customers to maintain infrastructures, such as storage tanks and underground pipes. Unfortunately, many cities face water infrastructure problems because of aging. Older infrastructures still use asbestos-cement pipes that are no longer allowed in today’s newer supply systems. In Duluth, Minnesota, for example, there are 435 miles of water pipes underneath the city designed to last for approximately 100 years, which has led to a city plan for replacing one percent of the system each year. Other cities throughout the nation have to consider similar replacement plans, in order to avoid water pipe breaks and leaks. Pipes can also freeze and shift depending on weather conditions, construction projects, and other environmental causes. Fees also help pay for corrosion control technology that can help reduce contaminants in tap water and provide energy savings from transporting water through uncorroded pipes. There are several rate structures including: - Flat fee - Uniform rate - Increasing block rates - Declining blocks rates - Seasonal rates - Drought rates - Water budget based rates Typically, water companies follow a mix of a fixed fee base with a variable fee determined by volume. All of this goes to the infrastructure and also the costs for a chemical treatment to provide safe, drinkable water to your home. A Modern Way to Transform Tap Water Even with regulated treatment, contamination may still be found in tap water and can pose health risks, such as gastrointestinal illness, neurological disorders, and reproductive problems. The frequency of drinking water testing depends on the water source and the types of contaminants tested. After the process is complete, tap water still has traces of chemicals and other contaminants such as: It’s been reported that 25% of tap water fails to meet EPA standards. It’s not as drinkable as other options like FloWater, which eliminates 99% of contaminants from water. Clean and safe water is achievable through its innovative filtration system, which transforms tap water through seven purification steps. The water purification process includes: - Sediment Filter (catches dirt, dust, and other solid impurities) - Carbon Filter (removes smaller particles such as chlorine and hydrogen sulfide) - Advanced Osmosis Filter (captures bacteria, viruses, pesticides, etc.) - Activated Oxygen Filter (sanitizes tanks and internal systems and increases oxygen in the water) - Alkaline Filter (neutralizes acidity by raising pH levels in the water through a proprietary blend of ten trace minerals) - Electrolytes Filter (adds magnesium, potassium, sodium, and calcium, the same electrolytes found in sports drinks and coconut water) - Coconut Carbon Filter (absorbs tiny contaminant particles and removes odors and taste) This unique process removes impurities from tap water and adds minerals and electrolytes to the water for optimal taste. Due to the demand for pure water, all industries are interested in what FloWater provides. It’s been incorporated in businesses, schools, hotels, and gyms and wellness studios as part of a healthy lifestyle. The convenience the FloWater Refilling Stations makes it easier to get purified water that benefits them physically, mentally, and environmentally. There’s no waste (as with plastic water bottles) and minimal maintenance. It’s an advanced way to use the tap water that’s already easily accessible and make it the best-tasting, most purified water on the market.
<urn:uuid:c856c4f9-c554-4e59-9ccb-82f5b63ca233>
CC-MAIN-2022-33
https://drinkflowater.com/blog/is-tap-water-safe-to-drink/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00005.warc.gz
en
0.949818
2,637
3.546875
4
In the early 1900s three elegant sister ships sailed the Great Lakes, the Tionesta, the Juniata, and the Octorara. One of them, renamed the S.S. Milwaukee Clipper, would serve its namesake city from 1941 to 1970. A lot can happen to a ship in nearly seven decades – and a lot did. The second of the three nearly identical ships built by the Anchor Line, the Juniata was launched on December 22, 1904, at Cleveland, Ohio. Placed in service between Buffalo, New York, and Duluth, Minnesota, the 361-foot Juniata carried 350 passengers on three decks and 3,500 tons of cargo in its holds. The 3,000 horsepower quadruple-expansion steam engine was an uncommon design and state-of-the-art for its time. It gave the Juniata a top speed of 18 knots – just over 20 miles an hour. The Juniata’s hull was riveted steel but its passenger decks were made of wood and its elegant staterooms and public areas gleamed with polished oak and mahogany. For 30 largely uneventful years, the Juniata steamed sedately back and forth across Lake Superior – until a far-distant disaster nearly ended her career. In 1934, a minor fire broke out on the four-year-old passenger liner Morro Castle in the Atlantic Ocean. In a startlingly short amount of time, the ship was fully engulfed and 137 passengers and crew members were dead. Stringent safety rules were adopted in the wake of the disaster including a requirement that ships be made of fire-resistant materials. The Anchor Line sister ships with their beautiful woodwork did not meet the new regulations and their owner had no interest in undertaking an expensive rebuilding program in the midst of the Great Depression. All three were laid up in 1937. For the Juniata, one chapter had ended but a new one was about to be written. In 1940, the Wisconsin & Michigan Steamship Company purchased the ship and brought it to Manitowoc, Wisconsin. The wooden superstructure was removed and new steel passenger decks in Streamline Art Moderne style installed. The cargo area reconfigured to handle automobiles. After a million-dollar rebuild (the equivalent of $17.8 million today), the Juniata steamed into Milwaukee on the afternoon of June 2, 1941, and tied up at the Wisconsin & Michigan Steamship Company dock at 601 East Erie Street. With dignitaries assembled, 16-year-old Patricia McKee of Detroit, daughter of Max McKee, one of the line’s directors, was handed a quart bottle of Wisconsin cream to rechristen the ship, Milwaukee Clipper. Patricia swung the cream high and then brought it down with terrific force, shattering the bottle and showering cream over the guests of honor, including Wisconsin Governor Julius Heil, Milwaukee Mayor Carl Zeidler, and the directors of the steamship line. The Milwaukee Sentinel described the christening as “brief but impressive.” The Milwaukee Journal reported, “[The dignitaries] fished out handkerchiefs and wiped off the drops and looked good-natured about it.” The streamlined Clipper with its cream-speckled guests of honor then glided up the Milwaukee River, pausing at the Wisconsin Avenue bridge for a second rechristening ceremony, and on as far as State Street, cheered by thousands of onlookers lining the river. The Clipper had arrived, and it would remain a local favorite for three decades. But where did its name come from? According to the book The S.S. Milwaukee Clipper: An Illustrated History (2014, S.S. Milwaukee Clipper Preservation Inc.), Mark McKee, one of the line’s directors, was friends with the then-president of Pan American Airways and served on the airline’s board. At the time, Pan American operated a famous fleet of long-distance passenger seaplanes each named after a city the airline served followed by the word “Clipper.” That evening the Milwaukee Clipper hosted 900 guests for a two-hour cruise on Lake Michigan. “The guests promenaded around on the decks, admiring the new chromium and stainless steel and fresh paint,” reported the Journal, which also printed the ship’s statistics: 361 feet long, 45 feet wide, a draft of 15½ feet, and a crew of 110. “At midnight the Clipper left for her first lake crossing to Muskegon, Mich.,” the Journal added, “where she arrived Tuesday within five minutes of the crossing schedule of 5 hours and 15 minutes, an hour less than the previous schedules.” Carrying an average of 900 passengers per trip with space for more than 100 automobiles, the new ship featured 36 staterooms and a “Pullman” section, which seated 112 passengers by day and converted into sleeping berths for 56 passengers at night. The passengers enjoyed many amenities, including a 185-seat buffet restaurant and a bar with a 25 x 40-foot polished wood dance floor and a live orchestra. The ship also had a broad sun deck lined with chaise lounges, a 144-seat movie theatre, and a supervised children’s playroom. But one form of passenger entertainment attracted the ire of authorities just weeks after the new liner entered service. In July 1941, Morton Wolf, prosecuting attorney of Muskegon County, Michigan, booked a round trip aboard the passenger liner. Since his election the previous January, Wolfe had focused on ending commercial gambling – and he certainly got an eyeful of it during his voyage, including witnessing unsupervised children feeding coins into slot machines in the ship’s onboard casino. As soon as the ship docked in Muskegon at the end of its overnight run, Wolf hurried to the office of the local justice of the peace. He had to move quickly for the Clipper spent just 30 minutes in port. Wolf returned with a platoon of law enforcement officers and a search warrant. He planned to serve the captain the warrant and seize the slot machines. There was just one problem. The captain was missing. On seeing the police officers march up the gangplank, Allen K. Hoxie, a Great Lakes’ captain since 1909, had quietly slipped away from the bridge, changed into civilian clothing, and joined the passengers. As police milled about and Wolf searched for the captain, time was ticking away. On the bridge, the ship’s first officer patiently waited a half-hour past the appointed sailing time before sounded the whistle signaling the boat’s departure. Wolf directed two officers, Sgt. Earl Secrist of the Michigan State Police and Muskegon County Deputy Sheriff Ralph R. Hodges, to remain and watch the slot machines then hurried ashore with the rest of his team seconds before the gangplank lifted and the Clipper steamed away to Milwaukee. “While Wolfe sat with his warrants in Muskegon, Sgt. Secrist and Deputy Hodges were having plenty of trouble on the luxury boat,” reported the Milwaukee Journal in a page one story on July 24, 1941. “As the vessel crossed the Michigan-Wisconsin border – the middle of the lake – busboys in the employ of the Clipper line walked into the casino and began moving the slot machines. “Not a word was said. Secrist made no protest because he knew that, having left Michigan, he had lost jurisdiction. So he and Hodges sat there helplessly watching the evacuation of their evidence. In view of hundreds of passengers sunning themselves on the deck, the busboys wheeled the machines to the rear hold.” During the boat’s five-hour crossing, Wolf was burning up the long-distance telephone wires to Milwaukee. As soon as the Clipper docked, Milwaukee Police Detective Sgt. Martin Fallon and Detectives Al Verbel and John Zilavy stepped aboard. Hoxie was again making himself scarce, but the detectives eventually tracked the captain down then started searching for the gambling devices. “Fallon’s face wore a baffled, perplexed look when he finally found the casino,” the Journal reported. “He looked inside and saw no slot machines. There was paper strewn around the room and a few devices played for amusement only.” While the police officers were walking the ship’s long decks in search of the elusive Captain Hoxie, a truck backed up to the Clipper’s rear cargo door and was swiftly loaded with slot machines and driven away. It was neatly done but the Milwaukee police were not fooled – an additional two detectives had been posted on the dock to watch for just such an attempt. The machines were seized and one man, described as the custodian of the gambling devices, was arrested. The Milwaukee Sentinel summed it up, “When the storm cleared, the streamlined vessel had been stripped of a dozen slot machines, Milwaukee police had all the evidence and one prisoner, and the Michigan authorities who started it all had only a sheaf of unserved documents.” Proving there were no hard feelings, the steamship line hosted Sgt. Secrist and Deputy Hodges as guests of the line for the duration of their ride from Michigan to Wisconsin and back. “In addition to their fare they had a fine breakfast and lunch, with the company’s compliments,” wrote the Journal. “On the trip back, when there were no slot machines to look at, they had such games as shuffleboard available to them and an orchestra played a matinee concert.” The two-state gambling raid received a moment of national attention. According to the book The S.S. Milwaukee Clipper: An Illustrated History, “ABC radio’s national news ran a story about the Clipper that sailed without its skipper.” The space occupied by the ship’s casino was leased to a Chicago firm, Stein Amusement Co., which owned the devices. Steamship line officials claimed they had no idea games of chance were offered. Even so, they said, it was entirely legal because the machines were kept covered in port and gambling took place “outside the three-mile limit.” The Milwaukee Journal quoted an opinion written by Milwaukee District Attorney Herbert J. Steffes saying the three-mile limit concept did not apply to the boundaries of state jurisdictions. “Steffes cited the Wisconsin constitution to show that the eastern boundary of Wisconsin extends to the center of Lake Michigan,” the Journal reported, “and he cited Wisconsin statutes to show that the eastern boundary of Milwaukee county likewise extends to the center of the lake.” Charges were filed in both states against company officials but were soon dropped or dismissed. The steamship line abandoned on-board gambling and the former casino became The Soda Bowl, a 35-seat snack shop selling souvenirs, magazines, light lunches, and ice cream. Summer after summer the Clipper steamed between Muskegon and Milwaukee occasionally adding side trips to Chicago. The ship remained popular, so much so that its owners decided to double capacity on the route by buying a former World War II troopship and spending $8 million to rebuild it into a modern passenger liner called the Aquarama. An April 11, 2011 article in the Muskegon Chronicle described the 520-foot Aquarama. It could carry 2,500 passengers and 160 automobiles. It had five bars, four restaurants, two dance floors, a soda fountain, a solarium, a movie theater, a television room, and a children’s playroom. “The first new passenger ship to sail the Great Lakes in more than 20 years,” the Chronicle reported, “she was heir-apparent to the aging Milwaukee Clipper on Lake Michigan’s premier cross-lake ferry route. At the end of the 1962 season, the line announced, the Clipper would retire and the much larger and faster Aquarama would take over the route. The Milwaukee Board of Harbor Commissioners were on board with the plan and requested Milwaukee’s 1963 budget include a $700,000 dredging project to accommodate the Aquarama. “[But] Milwaukee officials squandered the Aquarama’s rightful inheritance when they balked at dredging their city’s harbor to accommodate the ship’s deep draft,” the Chronicle added. With the dredging proposal languishing in Milwaukee, the Clipper was suddenly back in business. After a hasty $50,000 in repairs, it returned to service in 1963. But its days were numbered. In need of extensive repairs and with tight new Coast Guard regulations on the horizon, the Clipper made its last trip on September 8, 1970, and then laid up in Muskegon. In 1977, she was sold and towed to Sturgeon Bay, Wisconsin for repairs and a planned return to excursion service. The idea collapsed when the Coast Guard refused to certify the vessel for passenger service. A new owner renamed it S.S. Clipper and moved it to Chicago’s Navy Pier where it served as a floating – but stationary – restaurant and nightclub. A stint as a marina clubhouse in Hammond, Indiana followed. All the while the once-grand ship steadily deteriorated. A happier event took place in 1983 when the Clipper was added to the National Register of Historic Places. The designation stated, “Many of the design elements introduced in Milwaukee Clipper are still being included in modern ocean-going passenger ships. The quadruple-expansion steam engines installed in 1905, though, are exceedingly rare, particularly in such fine condition.” She was designated a National Historic Landmark in 1989. In 1996, the marina offered the ship for sale. A handful of fans of the old Clipper formed a non-profit organization and succeeded in purchasing the ship in 1997 and having it towed across the lake to its old home port of Muskegon. Appropriately, given the Clipper‘s brief history of hosting commercial gaming, the $45,000 cost of the tow was donated by Empress casinos. The Clipper was back home after a 20-year absence and volunteers began the overwhelming task of restoring the long-neglected ship on a shoestring budget. Its original sister ships are long gone. The Tionesta was sold for scrap in Hamilton, Ontario, in 1940. The Octorara was converted into a troop transport, served in the Pacific Ocean in World War II, and was scrapped in 1951 in San Francisco. In 2007, the Aquarama, once seen as the modern replacement for the elderly Clipper, was towed all the way to Aliaga, Turkey, where it was scrapped. The S.S. Milwaukee Clipper is six stories tall, longer than a football field, and is the oldest passenger steamer on the Great Lakes (and is six years older than the Titanic). It is open for tours in the summer months. Improbably, incredibly, the Clipper survives.
<urn:uuid:b52d88b7-5fed-46c1-9dd4-4480de0c37a6>
CC-MAIN-2022-33
https://milwaukeenotebook.com/2019/02/08/milwaukeeclipper/?like_comment=3873&_wpnonce=0c700e7b4b
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00402.warc.gz
en
0.965934
3,167
2.96875
3
Ulysses S. Grant was fresh out of West Point when he reported for duty with the Army’s 4th Infantry Regiment at Jefferson Barracks, Missouri, in 1844. The 21-year-old second lieutenant found his work as a quartermaster, managing equipment and supplies, to be dull. He was eager to escape the monotony of peacetime, and when his West Point roommate Frederick T. Dent invited him to his family home just ten miles from the barracks, Grant jumped at the opportunity. It was at Dent’s White Haven home that Grant first laid eyes on the woman of his dreams. Young and lean, Grant was a promising officer from the prestigious military academy in New York. Julia Dent was plain, squat and cross-eyed, and she didn’t have much in the way of a formal education. But she was warm and self-aware, and with young single women few and far between west of the Mississippi, Grant became enamored of her. Before long, he was visiting Julia daily, and just weeks into their courtship, he had marriage on his mind. The time they spent together in Missouri, riding horses and reading poetry to each other, cemented Grant’s commitment to the teenage girl. At one point her pet canary died, and Grant crafted a small yellow coffin and summoned eight fellow officers for an avian funeral service. But Grant had been raised in a Northern household that looked down on slave owners, and Julia’s father had purchased his eldest daughter her own personal slave, known as “Black Julia.” Still, he wanted to be around the woman he had fallen for. By 1844, tensions between the United States and Mexico over the territory of Texas were heating up, and Grant was soon serving under General Zachary Taylor, the future U.S. president, on the front lines in Mexico. But before he headed south, he pulled off his West Point ring and handed it to Julia, securing their engagement. They held this in secret, as Julia’s father did not approve of his daughter marrying a military man, especially a disapproving one from the North. Julia gave the departing soldier a lock of her hair in return. As soon as he was away, Grant began writing love letters to Julia Dent. They portray a tender, sensitive and insecure young man, overly concerned that his fiancée did not share the intensity of his longing for her. She did not write as frequently as he did, causing him great despair, but when she did compose and send letters, Grant would read them over and over. “My Dear Julia,” he wrote. “You can have but little idea of the influence you have over me Julia, even while so far away…and thus it is absent or present I am more or less governed by what I think is your will.” One letter arrived in return with two dried flowers inside, but when Grant opened it the petals scattered in the wind. He searched the barren Mexican sands for even a single petal, but in vain. “Before I seal this I will pick a wild flower off of the Bank of the Rio Grande and send you,” he wrote. Later, from Matamoras, he wrote, “You say in your letter I must not grow tired of hearing you say how much you love me! Indeed dear Julia nothing you can say sounds sweeter…. When I lay down I think of Julia until I fall asleep hoping that before I wake I may see her in my dreams.” Grant admitted to her that the time between battles was burdensome. “I have the Blues all the time,” he wrote. She had moved to St. Louis with her younger sister, Nell, and attended school, and her social life had become far more active. Grant assumed the worst. “I believe you are carrying on a flirtation with someone, as you threaten of doing,” he wrote her. In truth, it was Nell who had brought the young men of St. Louis into Julia’s orbit. But none of them seemed interested in the plump, cross-eyed woman who was the focus of Grant’s obsession. In July of 1848, after they had been apart for four years, Grant’s regiment returned to the United States, and he took leave so that he might make wedding arrangements in St. Louis. By then, Julia’s father, Frederick Dent, had fallen on hard times, which Julia attributed to his being “most kind and indulgent” toward the slaves he owned. (The fact of the matter is that Dent had simply dragged his family into poverty by mismanaging his farm.) Suddenly, he could overlook his future son-in-law’s Northern arrogance and he blessed his daughter’s choice of him as husband. Grant’s father refused to attend their August wedding, objecting not to Julia, but to her family’s owning slaves. After the Grants were married in August 1848, Ulysses was back in the Army. Julia gave birth to Frederick Dent Grant in May of 1850, and Ulysses Simpson Grant followed while his father was dispatched to the West Coast for several years. The separation was agonizing for Grant, and he resumed his drinking. He resigned from the Army in 1854, and while some historians have suggested that in lieu of a court-martial for being intoxicated while off-duty, he may have been given the choice to resign, it didn’t matter: The young officer was now free to return East to his wife and boys, and it was in St. Louis that he built a log cabin and attempted to live off the land with his family. He named their home “Hardscrabble,” and it fit; Grant’s cleared trees from the land by himself, then peddled firewood on the streets of St. Louis. At one point, he purchased a slave from Julia’s brother Fred, his old West Point roommate. Yet without explanation, when he was in debt and barely able to put food on his family’s table, Grant appeared in court on March 20, 1859, and emancipated his slave rather than selling him. With four children now, Grant became ill with malaria, and he couldn’t run his farm; he had to give up Hardscrabble and move in with Julia’s parents in White Haven. Once he recovered he took a job collecting rents for a real estate firm in St. Louis, but he couldn’t earn enough money. By 1860, Grant was out of options, and he asked his father for help. He was offered a job in the family leather business, working under his two younger brothers. Earning $600 a year, he could go a long way toward getting his family out of debt, so he moved Julia and the children to Illinois. Ulysses S. Grant was 38 and living a settled life with his family when Southerners fired on Fort Sumter in April 1861. His father-in-law tried to persuade him to fight for the Confederacy, without luck. (Even Dent’s own West Point son chose to support the Union.) Grant helped organize volunteers, but it wasn’t long before, by dint of his Army experience, he took command of the Illinois troops. This time around, he found that military life suited his temperament, and he was promoted to brigadier general. He vowed never to return to the leather store, and with renewed energy and confidence he led 15,000 troops into battle at Fort Donelson, Tennessee, and trapped the Confederates inside the fort. His message of “No terms except unconditional and immediate surrender” earned him the nickname “Unconditional Surrender Grant.” President Abraham Lincoln promoted him to major general. Yet the monotony between battles once again began to wear on Grant, and again he began to drink. He concluded that he was a better man and a better commander when he was around Julia, and so he sent for her. She would leave the children with relatives to travel to his encampments, at times at considerable risk, and over the course of the Civil War she would stay with him during campaigns at Memphis, Vicksburg, Nashville and Virginia. Her presence lifted her husband’s spirits and buoyed his confidence; in 1864, when Lincoln appointed Grant commander of the Union armies, the president sent for Julia to join her husband, aware of the positive effect she had on him. Three years after General Robert E. Lee surrendered his army to Grant on April 9, 1865, at the Appomattox Court House in Virginia, Grant was elected president of the United States. Julia worried that her strabismus—the condition that gave her her cross-eyed appearance—might be an embarrassment to her husband. She considered surgery, but, as she wrote in her memoirs, “I never had the courage to consent, but now that my husband had become so famous I really thought it behooved me to try to look as well as possible.” When the surgeon told her that it was “too late” to correct the condition, she expressed her regret to her husband. “What in the world put such a thought in your head, Julia?” he asked. “Why, you are getting to be such a great man, and I am such a plain little wife,” she replied. “I thought if my eyes were as others are I might not be so very, very plain.” Grant pulled her close. “Did I not see you and fall in love with you with these same eyes?” he asked. “I like them just as they are, and now, remember, you are not to interfere with them. They are mine, and let me tell you, Mrs. Grant, you had better not make any experiments, as I might not like you half so well with any other eyes.” Julia Grant never considered surgery again. But she did take care to pose for portraits in profile, so her crossed eyes would not appear in photographs. After Grant’s tumultuous two terms in the White House, he and Julia traveled the world, and were welcomed by great crowds in Ireland, Egypt, China and Russia. They spent most of their savings on the trip, and when they returned to New York an investment banking firm defrauded Grant of his remaining funds, and he was forced to sell his Civil War mementos to cover debts. In 1884, Grant learned that he had throat cancer and set about writing his memoirs. When Samuel Clemens (Mark Twain) learned of Grant’s intent, he brokered a publishing deal that guaranteed higher-than-standard royalties and an aggressive marketing plan. Julia remained by her husband’s side as he finished his writing only days before he died, on July 23, 1885, at Mount McGregor in upstate New York. Grant’s Memoirs, published shortly thereafter, were critically acclaimed and commercially successful. The book’s sales left Julia with enough wealth to live out the rest of her life in comfort. After she died, in Washington in 1902, her body was laid to rest in a sarcophagus beside her beloved husband’s in New York. Books: Julia Dent Grant, The Personal Memoirs of Julia Dent Grant, Putnam’s, 1975. Ulysses S. Grant, Mary D. McFeely, William S. McFeely, Ulysses S. Grant: Memoirs and Selected Letters: Personal Memoirs of U.S. Grant/Selected Letters, 1839-1965, Library of America, 1990. Geoffrey Perret, Ulysses S. Grant: Soldier & President, Modern Library, 1998. Edward G. Longacre, General Ulysses S. Grant: The Soldier and the Man, First DeCapo Press, 2007. Kate Havelin, Ulysses S. Grant, Lerner Publications Company, 2004. Patricia Cameron, Unconditional Surrender: The Romance of Julia and Ulysses S. Grant, BookSurge Publishing, 2010. Articles: “Julia Dent Grant,” Marie Kelsey, http://faculty.css.edu/mkelsey/usgrant/julia.html
<urn:uuid:07fb94c4-6573-4b72-899c-6211c781ee58>
CC-MAIN-2022-33
https://www.smithsonianmag.com/history/general-grant-in-love-and-war-94609512/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00405.warc.gz
en
0.986695
2,587
3.25
3
Ken Haapala | SEPP Divergence and the EPA: The August 28 TWTW discussed three forms of increasing divergence: 1) the surface temperatures record as reported by US National Oceanic and Atmospheric Administration (NOAA) and the atmospheric record; 2) the divergence between the global climate models and the atmospheric record; and 3) the divergence between what is being reported and discussed by the Climate Establishment and what is occurring in Nature. Several readers inquired how do these forms of divergence impact on the US EPA’s Endangerment Finding (EF)? The EF is the EPA ruling that human emissions of greenhouse gases, particularly carbon dioxide (CO2), endanger human health and welfare. The ruling is critical to the Administration’s plan to regulate CO2 emissions from power plants, making the American public more dependent on unreliable and expensive solar and wind. As being witnessed in Europe, those countries with the greatest expenditures, “investments”, in solar and wind have the highest electricity costs to consumers, led by Demark and Germany. As explained below, these forms of divergence weaken the already empirically weak evidence offered by the EPA for its endangerment finding. The weakening of evidence is particularly true for the non-existent “hotspot,” which the EPA erroneously claims is the distinct human fingerprint for CO2-caused global warming. [Note: since other greenhouse gases can be measured and regulated separately from CO2, and since CO2 cannot be separated, on a commercial scale, from emissions from fossil fuel-fired power plants, CO2 is the focus below.] The hotspot is a pronounced warming centered over the tropics at an altitude of about 33,000 feet (10,000 meters). This region should show a greater rate of warming (warming trend) than the surface, but not higher temperatures. [In the lower atmosphere, temperatures decrease as altitude increases.] The issue is not the science of the hotspot, but its very existence. Where is it, can it be measured. As discussed by Fred Singer in American Thinker in 2013 and 2014, in its Second Assessment Report (AR2-1996) the UN Intergovernmental Panel on Climate Change (IPCC) declared that a hotspot existed, without producing evidence of it. Subsequently, IPCC lead author Ben Santer of the USA, had a study published that showed the hotspot, but the researchers truncated the time series data, removed the 5 years beginning the period covered by observations and the 8 years ending the period. The removed data bring into question the existence of the hotspot. Santer also was a lead author of the 2006 report of the US Climate Change Science Project (US CCSP, now the US GCRP), which showed a hotspot in the models, but produced no physical evidence of its existence. In its Endangerment Finding, the EPA produced no physical evidence of the existence of the hotspot. Further, with the divergence of atmospheric data from the surface data, which has been inflated to show a greater warming trend than before, it is doubtful if anyone can show the existence of a pronounced hotspot. During the earlier litigation over EPA’s endangerment finding, the Chief Justice of the US Circuit Court of Appeals for the District of Columbia, the court of relevant jurisdiction, made it clear he would not tolerate any questioning of the EPA science. In general, the full court and the Supreme Court had a similar view. However, the issue is not the scientific interpretation of a phenomena, but its very existence. The question is not the cause, but is it there? If the Federal Courts will not review if a pronounced warming trend exists, is there any physical evidence they will review? See links under Challenging the Orthodoxy. Mann’s Nature Trick: During Climategate, the removal of data that conflicted with hockey-stick, which purported to show dramatic temperature increases during the 20th century, became known as Michael Mann’s Nature Trick – after the journal, Nature, which published Mr. Mann’s article. The removed data showed a decline in recent temperatures in one of the proxy datasets used. The hockey-stick was featured in the Third Assessment Report (AR3-2001). Thus, we have two successive IPCC reports that have glaring problems, which have not been adequately addressed by the Climate Establishment. See links under Challenging the Orthodoxy. The Show: The United States is currently the chair of the Arctic Council, a group of the eight countries bordering the Arctic (Canada, United States, Denmark (Greenland), Iceland, Norway, Sweden, Finland, and Russia.). The Council also has a dozen countries with permanent observer status, including China, India, Japan, South Korea, and Singapore. On August 30 & 31, at the request of the US, officials of these countries attended a meeting titled Conference on Global Leadership in the Arctic: Cooperation, Innovation, Engagement, and Resilience (GLACIER). President Obama used the conference to promote his perceived need for swift action on climate change. China and India refused to sign a non-binding agreement to aggressively address climate change at the 21st session of the Conference of the Parties (COP-21) of the United Nations Framework Convention on Climate Change (UNFCCC) to be held in Paris from November 30 to December 11. Reports of whether or not Russia signed are conflicting. According to a report in The Diplomat, the inability of the President to have total support for a non-binding agreement may indicate difficulties at COP-21. The President also used event to publicize his interpretation of global warming/climate change. One photo opportunity was the melting of ice in Glacier Bay, where ice has been melting since about 1750. The melting began before the beginning of the Industrial Revolution and major use of fossil fuels, which many blame to be the cause of global warming/climate change. As Patrick Moore, a Greenpeace co-founder, points out, the ice in Glacier Bay has been retreating and advancing for centuries. According oral tradition of the native “Huna Tlingit people, it is said that the glacier has advanced and retreated a number of times during their occupation of the area. Each time the glacier advanced they would move to the village of Hoonah in Icy Strait outside Glacier Bay. When the glacier retreated, many of them would move back into the bay. These multiple migrations were certainly caused by climate change, but it had nothing to do with human activity.” Such photo opportunities may impress Mr Obama’s entourage of journalists, however they seem to have a diminishing impact on the American public as explained on the web site Fabius Maximus when discussing the fictitious 97% consensus on climate change and controversies regarding it. The author states: “Summary: This vignette illustrates important aspects of the climate change debate, and why it has failed to gain sufficient support from Americans to pass large-scale public policy measures. For two decades journalists and scientists have cooperated to produce political propaganda, exaggerating and misrepresenting the work of the IPCC. Their failure should inspire us, showing a resistance to manipulation greater than many people expected (it surprises me).” The photo opportunities can be classified as propaganda. Edward Bernays, who helped sell World War I to Americans as necessary to keep the world safe for democracy, praised propaganda as needed to organize the habits and opinions of the masses. It is becoming evident that this target audience is journalists. See Article # 1 and links under Problems in the Orthodoxy, and Communicating Better to the Public – Use Propaganda. The Sun: European Physics News published an article by Henrik Svensmark, a co-founder of the hypothesis that cosmic rays, modulated by the sun, influences the climate on earth. In concluding the article, Svensmark asserts a consistency exists between, variations in cosmic ray flux and climate that warrants additional research. Willie Soon, a target of those in Congress who organized a witch hunt, was a co-author of another article evaluating the role of solar variability on temperature trends in the Northern Hemisphere. Further, Climate Etc. links to a Russian article that uses data from deep boreholes to establish Earth’s surface temperatures for the past 1,000 years. The article suggests that, about 500 years ago, temperatures began rising from the Little Ice Age, not 150 years ago as usually assumed. That 1000 years ago it was warmer than today and the driving factor is natural, solar activity, not humans. These studies contest the assertions by some in the climate establishment who consider the role of the sun to be trivial, and those who assert that recent warming must be from CO2 because they cannot think of anything else that would drive it. See links under Science: Is the Sun Rising? Social Cost of Carbon: Nicholas Stern, of the Grantham Research Institute on Climate Change and the Environment, created a study on the economics of climate change that has had a significant impact on politics in the US and in the UK. The Stern review asserts that the benefits of strong, early action outweigh the costs of climate change. Among other tricks, it uses an average discount rate below 1.5%. Most politicians would be lost when such tricks are explained. In effect, a low discount rate inflates the apparent value of actions today, as compared with taking actions in the future. The US Government Accountability Office recommends a discount rate of 7%. A discount rate of 1.5% would be justified if the economy was in a depression. Ruth Dixon of the University of Oxford wrote a review of Mr. Stern’s latest book. Why Are We Waiting? The Logic, Urgency and Promise of Tackling Climate Change. She quotes Stern as writing: ‘[t]o be effective, some economists and scientists may have to become directly involved in the processes of practical decision-making and advice. It is, of course, a challenge to do this and retain some objectivity, but the alternatives may be irrelevance or gross misuse of the work.'” Some readers may recognize the argument as similar to the false dilemma presented by Stephen Schneider, which can be called the Schneider syndrome. By invoking it, Stern is essentially stating he knowingly misled the public as to the future cost of climate change in order to achieve the goal of actions today. See links under Lowering Standards. NASA – Sea Level Rise: Last week TWTW linked to a press release by the NASA Sea Level Change Team announcing a dramatic rise in sea levels. A recent search of the internet failed to locate a study substantiating a dramatic rise. Other than the press release, TWTW located a report stating, in effect, sea level rise is dependent upon location – it may be rising faster than a world-wide average in some locations or even falling in other locations. There is nothing new here, and the importance of the location has been emphasized many times, including in the NIPCC Reports. Could the press release be in honor of the President’s show in Alaska? See links under Changing Seas Number of the Week: 54% According to statistics compiled US Department of Agriculture, Foreign Agriculture Service, from the period 1986-89 to 2013-15 the world-wide average yield for wheat and coarse grains (essentially cereals except rice) grew from about 2.4 metric tons per hectare to about 3.7 metric tons per hectare, or about 54%. If this is the result of climate change, it is bountiful. So much for the US Global Change Research Program and other entities that predict starvation and death from climate change, and entities such as the US Department of Defense that predict mass refugees and conflicts due to starvation from climate change. Please note that articles not linked easily or summarized here are reproduced in the Articles Section of the full TWTW that can be found on the web site under the date of the TWTW. 1. Obama’s Half-Baked Alaska Yes, the glacier of Glacier Bay is receding-as it has from time to time for centuries. By Patrick Moore, WSJ, Sep 3, 2015
<urn:uuid:1dd42882-03e9-4c83-80da-db9a389fff3e>
CC-MAIN-2022-33
https://rightsidenews.com/life-and-science/energy-and-environment/climate-change-report-divergence-and-the-epa/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00405.warc.gz
en
0.948194
2,501
3.296875
3
Tennessee is a beautiful and open land that is filled with stunning natural attractions and a wide variety of wildlife. This beautiful state has plenty to offer its local residents, human and animal alike, and it is a much-loved space because of it. One animal that takes up residence here frequently is the owl. Currently, Tennessee is frequented by a total of eight notable owl species, making it a great state to spot these exciting nighttime birds if you are interested. Fortunately, this state has a variety of different habitats and benefits to offer the local owls. Tennessee is known for its temperate climate that offers warm summers and mild winters. This beautiful state has a nice enough weather pattern to allow for a variety of residential and nomadic owl species that have been known to grace the skies and dazzle the local residents. Since it offers so many different natural areas, there are regions to support owl species of all kinds, making it a great place to owl watch. Whether you are looking for a residential owl or a seasonal one, you might be in luck in this charming state if you are willing to spend some time outside. The state of Tennessee has a collection of beautiful State Parks known to play home for many animals, including owls of all shapes and sizes. As long as you know where to look, you can easily find a variety of exciting owl species not too far from your home. What Owls can be seen in Tennesse? Table of Contents 1. Barn Owl 107 to 110 cm 430 – 620 g Up to 4 years Voles, Shrews & Mice The barn owl is a native resident in Tennessee that can be easily spotted if you know where to look. These courageous birds can seem massive with their long wingspan and tall build, but they are distinctly more interested in hunting small animals rather than bothering you. If you are looking for barn owls, simply look for the white figures soaring through open spaces in the night. They can be heard with their shrill call in the night and are known to mate for several seasons with the same owl partner. The barn owls in Tennessee are known to be a little more open-minded than barn owls in other states when it comes to living spaces. These birds can be found along forest edges, near meadows, in fields, and even in towns. These ghostly white figures are even known to frequent local cemeteries near wet areas. These favored owls can be seen in Tennessee all around the year, but they are known to spend time nesting in Spring and Fall, so you might have a better chance of spotting one of their unique couplings then. These wonderful birds are known to spend time out looking for food around sunup and sundown, so try venturing out during these hours if you suspect there might be some nearby. 2. Eastern Screech Owl 46 to 61 cm Rats, Squirrels, Rabbits & Skunks The Eastern Screech Owl is a mottled owl with feathers that tend to be grey or brown mixed with white. They can be easily recognized a lot of the time because they tend to be smaller than a lot of other owls in most areas. However, they are still skilled hunters and can be found sleeping in a nice hole in a tree or soaring through the sky at night. Their signature call involves a descending sound that many people consider to be unique. Though you are more likely to hear one of these owls than see them, they are common enough to make seeing them a distinct possibility. Since they do not migrate, it is common to find them continuously in an area, so your chances of seeing one are even better. They are known to be seen around forests, near suburban spaces, and in the wetlands. Eastern Screech Owls like most owls are nocturnal, so it is easier to spot them at night. Your chances might be increased during mating season in the spring, but the best time will always be during their hunting hours just after the darkness settles in. These adorable owls are known to stay hidden, but you can also see them during the day tucked away in trees from time to time. 3. Great Horned Owl 28 years old Squirrels, Rabbits & Skunks The Great Horned Owl is a magnificent species of owl known for its large size and intimidating horn-shaped feathers that rest atop its head. Many people find this owl to be quite a sight to marvel at. These unique birds often nest in nesting sites that have been stolen from other birds and are generally found perched high in trees for their nesting rituals. Their large size makes them fairly easy to spot. The Great Horned Owl nests in late Fall and early Winter in Tennessee making it fairly easy to spot during these times of activity. These owls are known to inhabit a great many areas including forests, marshes, and fields. You can see them resting throughout the day up in stolen nests in trees or flying by at night as they hunt small mammals. These owls are known for their characteristic love of dusk. Unlike other owls that wait for the dark, the Great Horned Owl is known for heading out in broad daylight if it sees something particularly delicious. You can generally see these birds out and about as the sun goes down. With their large size, you can spot their silhouettes around sundown. Simply look for the bright yellow eyes in the darkening light. 4. Barred Owl 107 and 111 cm Birds, Fish, Reptiles Though it is smaller than the Great Horned Owl, the Barred Owl is a competitive bird that enjoys hunting and a nice midday nap. With its nests that are often tucked away in the trees, you can expect to see them nestled away in tree cavities during the day. However, these birds are plenty active at night and are known for being adept hunters who are willing to chase down just about anything that moves if it is small enough. The barred owl is easy to spot in Tennessee because it is the only local owl with dark eyes. These birds, which can be found facing off with the Great Horned Owl in some areas, is known for its unique habit of being present during the day, making it much easier to spot than some of the other common owls in the area. You can find them around Tennessee in a wide range of woodland areas including state parks, and they are fairly common in the middle of Tennessee. Since the Barred Owl is known to spend time flying around during the day, you might have a good chance of seeing one if you head out for a stroll through the right kind of habitat. If not, you can always look near woodland areas in the night when small mammals and reptiles spend time scurrying across the bottom of the forest floor. Their numbers increase in Spring and Summer due to mating rituals. 5. Long-Eared Owl 90 to 100 cm Small mammals, mice, rats & rabbits The Long-Eared Owl is an owl that is hard to miss simply because of how enormous it is. This particular owl is known for its massive size with a wingspan that can reach up to three feet. Many people consider this nighttime predator to be a bit on the scary side given its large size, but it has no interest in heckling humans. However, these large birds won’t think twice about taking over another bird’s nest to start a family of its very own. With its fun songs and stunning air displays, these owls stop at nothing to find a good mate. Long-Eared Owls can be found in areas with plenty of vegetation. Though they aren’t the most common owl in Tennessee, you can see them if you find a place that has plenty of them to eat. They enjoy dense cover and brush because it generally houses plenty of small prey that they can scoop up and eat. If you live near a good rich prairie or forest area with plenty of flight room, you might be in luck. These birds are known for their nocturnal activities and will generally be hidden away completely during the day. However, when night comes out, don’t be surprised if you see a large form descending on the brush below to snatch up a delicious meal to eat. They mate between Winter and Spring, making this a good time to spot them as they head out to win over a sweetheart and start a family. 6. Short-Eared Owl 85 to 110 cm Voles, Mice, Squirrels This dark nomadic owl is known for its unique physical appearance and peculiar migratory patterns. If you live in the mid to southern United States, you will only see this beauty seasonally, but it does like to spend plenty of time in Tennessee. These unique birds spend time in safely covered nests on the ground and enjoy hunting for smaller prey. Their dark feathered forms make them stand out among the other owls. These medium-sized owls have distinctly round heads and short tail feathers too. The Short-Eared Owl primarily visits the west and middle regions of Tennessee. These areas offer the right kind of habitat including brush, open fields, and other fun areas for these darling birds to spend time building nests. You can easily spot them hunting on the ground, and they are most easily noticed because of their bizarre flight patterns. Short-Eared Owls fly low above the ground in awkward and irregular patterns. These feathered friends are most commonly seen in the cold months, particularly November through January, and are frequent visitors to Tennessee. You can spot them when they head out hunting, which they generally do in low light rather than outright night. Like most owls, they remain tucked in during the day for the most part. 7. Snowy Owl (Rare) Birds, Rabbits, Fish & Rodents When you see this unmistakable snow white owl, you will recognize them immediately. These unique birds, which are most commonly found in Alaska and Canada, have been known to venture far and wide and surprise many a bird watcher. Their distinctive white feathers make it obvious to anyone who sees them that they are out of their natural element when you see them down south, but it does happen from time to time. These birds are known for nesting on the ground and for their monogamous relationships. However, two females have been known to take up with the same male in the event that there is enough food around. Finding one of these owls in Tennessee is nothing short of a miracle sighting. The Snowy Owl generally doesn’t go much further south than Canada, but that doesn’t mean that you can’t spot one out in the open if you are lucky. You will find these birds flying anywhere over the state when they stop by for a snack, but very few venture that far south. If you are lucky enough to see a Snowy Owl, it is almost always going to be in Winter. These migratory birds have been known to fly south during this time, but they generally don’t go too far south because they like the cold and are well built for it. You can spot them out during the day or night if you are lucky enough. 8. Northern Saw-Whet Owl (Rare) 40 - 60 cm Small birds, young squirrels, voles & shrews The Northern Saw-Whet Owl is a beautiful brown owl that is known to spend time nesting inside small and comfortable cavities. While a nice tree cavity will do, they are also known to take over woodpecker holes and enjoy building their nests tucked away from natural predators, including other owls. These unique birds generally call out in quick succession, making it easy for you to know when one is around. Finding the Northern Saw-Whet Owl is a feat by itself. Though these birds do spend plenty of time in Tennessee, the fact is that they generally live where humans don’t spend too much time. These birds favor high trees and deeply wooded areas that are home to a wide range of smaller mammals that they can eat. When you aim to see the Northern Saw-Whet Owl, you will need to venture out into the cold dark night. These nocturnal birds only hunt in true dark and since they only visit Tennesse in Winter, it is generally fairly cold out when you get to see them. Spotting one of these elusive owls means taking the time to head out into the forest and listen for their call. We are avid bird-watchers who recently retired, allowing us more time to travel the world. Fortunately, we have managed to visit numerous countries around Europe, Asia, and America. Watching and photographing birds has been a passion for many years and we are making the most of the extra time on our hands!
<urn:uuid:9a299d75-fe3e-468b-a830-63a625ce5db4>
CC-MAIN-2022-33
https://wildbirdworld.com/owls-in-tennessee/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00002.warc.gz
en
0.965749
2,856
2.71875
3
Transition to the new year in each of the monotheistic religions in the world, in connection with the civilization of spirituality, can be studied. While the status and celebrations of each of them are respectable, it should be acknowledged that the new year and the changes and excitement it brings with it is of special importance. Especially Nowruz that is celebrated by 200 million people in Iran and 12 other countries, and coincides with a significant normative shift in nature. The UN resolution, under article 49, regarding March 21, under the title of “culture and peace”, has included the international Nowruz day in its calendar, and by this act, which was confirmed for the first time in the history of this Organization, Iranian Nowruz has been internationally recognized as an important occasion. Anticipation of New Year’s transition, the glorious moment to New Year’s transition, which is like rebirth of man as well as nature, and at the same time the excitement and joy felt during the transition; leaves its effect for a long time on the people and their lives, and manifests the real values of life in a more sustained and balanced manner; all animals and birds seem to be more joyful in this season of nature; so, we come to realize that this joy is part of this transition of nature in life on earth. They have experienced the new, and it may not be an exaggeration to say that they have, in fact, experienced periods of spiritual civilization. Therefore, it is no secret that this period can be considered a model of spiritual culture until sometime later. Its characteristics can be called the beauty of value and not look at things in a one-dimensional manner. The flourishing and transcendence of human life, exchanging best wishes for many years to come, and observing from close life’s harmony and beauty, in our thoughts, words and deeds, though being repeated every year, but will still be new. And for the elderly, but in multiplication for the young, it will always show its radiance and freshness. It is worth mentioning here that many such important days have occurred in our lives, like the New Year, our birthdays, when we actually feel deep emotional changes in us, the auspicious day of marriage, and also anniversaries, such glorious days, commemoration of great days in the history of each country, days of tragic events in human life such as floods or earthquakes, in such days we value health and happiness more as well as the days of any other happy or disturbing event that brings people to serious challenge or high motivation. The norm found in nature, birds, and other living things is a confirmation of the sustainable growth, prosperity, and development that humanity, in turn, must contribute to the emergence of evidence and signs of spiritual civilization. The practice that is necessary for meritocracy, the preservation of high human values and morals, and what we must adhere to at the beginning of each new year in each of the monotheistic religions that have principles for human excellence and in line with the improvement of civilizations and progress for humanity, is unintentionally implemented. As has been said, it is not very difficult to see such days all year round on various occasions. After entering the civilization of spirituality, perhaps due to the different lives, it will continuously cover all the days of the year and all our lives. And this flourishing and habit of excellence and growth cause the progress of human society. This is defending the theory that going without return towards civilization of spirituality is the only way to continue the glorious life of humanity for the next few thousand years, and there is almost no second way. Another point to note is that it may not be possible or at least very difficult to do this experience individually in society. It is advisable to enter the civilization of spirituality in harmony and larger groups, with more realistic effects and more people benefiting. Let us think more deeply; few people think of their wealth at the time of the New Year in the monotheistic religions and do not think of the rich and the poor of the vast majority, what excels humanity, and that is spirituality. Can we believe that all 365 days of the year have occasions like this? We see this in the rich Iranian culture; we a greeting which says “May every day be Nowruz; and may Nowruz be always victorious”. The common denominator of such days in life is not simply happiness or their potential challenge, but high understanding and deep thinking that bring people to the reality of life. And as mentioned before, the civilization of spirituality is a new level of consciousness and attitude that causes the growth and excellence of human life. A new balance in the value-based economy creating stability in industry, agriculture, and the economy in general, followed by less and less natural resources in countries, including oil mines and wells, and the pursuit of innovation and knowledge-based activities, and the exploitation of renewable energies, ultimately sustainable development, and the founding of the economic literature of spiritual civilization in general, are cases that you will read hereunder. The new economic world We can write a lot about the new economic world after the transition period, which we will summarize here. According to what has been said so far, we can say that with this surgery, which lasts at least 2 to 4 years in each country, we can expand the one-dimensional economy to at least 2 to 3 times larger than its current volume, which is pervasive and almost everything used in interactions. Maybe whatever is measurable or unimaginable and perceptible. What is meant in everyday interactions is agreement. In a value-based economy, part of which is money-based (privilege), agreement is a part of the deal and satisfaction is also sought, and not all is weighed with money. It is possible that in a negotiation one of the parties may not have to pay money. The stock market and the profit sensitivities of factories and production units, and performing all the relevant calculations with the necessary details, the impact of the economy on exports and imports and the free foreign exchange market, and the absence of any problems in all business affairs are essential requirements of the value-based economy. There is only one significant difference: the bulk of the business in which public welfare lies must be guaranteed and unilaterally made available to the public, perhaps by the government, charities, or philanthropists. This means that the certified welfare line of society should not be reduced. If for some reason, it fluctuates for a while, it is tolerable, but it should not be long-term, and if possible, it is better to change towards more prosperity than less prosperity. All economic concepts can be reviewed to reach new definitions, which is not difficult and any economist can explain it. We will see how quickly the economic challenges and today’s problems can be solved. It is easy to see that when bread or the minimum wage becomes accessible, a high level of culture and precision is made in maximum savings, and extravagance in this category will be minimized. Corruption and the motives for corruption, due to pressure levers, will not longer occur. There is no more leverage once there is minimal welfare in society, and only healthy attractions and competitions can attract people. Thus we will see another facet of the economy in which there will be only momentum and moving forward, and fishing in muddy water no longer makes sense. Merely more production, innovation, creativity, and knowledge-based companies have the final say. Inflation of a few percent, recession perhaps to a minimum, and economic growth of about 5 percent may be potential for most countries that have gone through a transition and recession and entered a value-based economy. It is clear that whenever a company or group faces a recession or the beginning of bankruptcy, it can join a group of charitable companies and offer its goods and services to its customers for free, sell them at a significant discount, and be confident in the economy. It is value-oriented, has no problems, and is supposed to be compensated by the sources of this work. In terms of its details, it seems that we are not in a value-oriented environment and conditions. It is not easy for us to talk about it and understand its details. The gross national product includes both sectors of economy: value-based and money-based (privilege). It does not matter that the two sides exchange money for the products and services provided. As soon as the production has taken place and the goods have reached the consumer, or the services have been performed for the customer, it will be added to the gross national product. The seller sets the price of goods and services, and the consumer may not pay for them. The amount they received as support or charity of products, is compensation for not receiving money from the customer and should not be included in the total revenue or products, but only should be considered as compensation. Bank loans, facilities, and debts of companies with this view and implementation of a value-based economy over time and during the transition period should reach zero and include forgiveness or be repaid gradually. When inflation comes down and by calculating actual cost price and reasonable profit and the absence of inflammation in the market, we can be sure that there is usually no price bubble and that every product is offered at an absolute price in the market and not that the customer is an extravagance because money is not essential. To pay, instead here the price competition must again show itself. Optimization and conserving Due to the limited resources on the planet, the environment’s observance, and the number of greenhouse gases in the atmosphere will result in correction and improvement of our behavior and we will start thinking more about protecting our environment. The impact of this change on monetary and banking policy in any country is evident just because purpose has gone beyond money and all the dimensions of the flow of life will be seen together; not planning will be done on single dimension, instead planning will be done for decades or even centuries. We should not have to think that we will consume right now and solve problems for short term, and leave the rest for the future to solve. The future will finally do something. Another interpretation of value-based economics is the combination of ethics and economics, including individual and social ethics in economic concepts that will impressively affect one-dimensional money-centered economics and neutralize irrational fluctuations. And in a multidimensional system where all the values are taken into account, equilibrium can be seen, and it takes a long time for the value-oriented economy to show and write about it entirely. Given constant stability of borders and respect for nationalities, which in turn leads to competition between countries to gain success, it is clear that each country will have more export to other countries, including its neighbors, and this in itself is an incentive to innovate and improve the quality and quantity of products. It is obvious that the countries also, in the context of improving global welfare and charity, should be able to have good relations with other countries in a value-based economy, the same way that in other countries people’s prosperity, work and production and a healthy living is intended, this viewpoint should also be important on global basis and in a value-based economy, and as a result the whole of mankind will benefit and inventions and technology can spread everywhere speedily. No organization is going to lose its role in the economy, but always first development should be kept in mind. They will have to be more serious in eliminating failures in the world because they have serious responsibilities. It seems to be, of course, a prediction, and time should show, that organization who control corruption in different countries will inevitably become smaller and smaller. According to the debates that have been raised so far, human values are to be further developed. As a result, corruption and the motives of corruption in the world will decrease, so a logical process will eliminate the organizations that control and fight against corruption and give their place to value organizations of education and development of positive and sustainable values. Each country’s performance in the world is measured by its gross national product, which determines its economic rank. If it exceeds the domestic demand it will export abroad. Each country’s currency support consists of its foreign currency reserves, its mineral and oil reserves and also its production strength, and its efforts to increase its gross national product. These competitions at global level are of value and result in the progress of mankind. Environment protection and minimum use of mines and resources and sale of raw material by countries; instead using more of manpower, innovations and added value of products will cause healthy competition in a healthy economy and will gradually institutionalize these concepts in all countries around the world. The first monetary circulation, at the highest volume in the world, is the military money circulation. With the establishment of value based economies in countries and, eventually, in the world, we will see that other economic activities will occupy high ranks. This Equilibrium in a value-based economy will help and initially seek more resources in the world for the welfare of humanity in all areas. Due to the existence of various resources in the world, which is ultimately exhausting, no attempt has been made not to use them, one of the most important of which is energy resources, which have recently been able to produce environmentally friendly renewable energy from various methods and replace fossil fuels. COVID.19 pandemic was an experience that humanity was compelled to go through. Here we see how low the power of money is and precision, culture, history of medical problems, and also other human strength points could show itself in this hard test. Value-based economy was reveled for a short while. It is simple to find in the short period of time the definitions and new values. Health and healthy surroundings that we live in with peace of mind has now become costly. We thought that money can solve all problems but now we see that money can only solve a small part of the problem. On the contrary, we see how, by using precision and a good culture, there will be no need for extra costs and money will be easily substituted with cheaper replacements, and thus our intellectual balance and assumptions about money-based economy will be upset. The loss of a large amount of stock market value in the world, along with the fact that the stock prices of many industries in the world have not fallen, indicates the existence of several types of monetary value: stable money and less stable money, which may grow fast and with even a small crisis will fall fast, and so it is not difficult to see the difference of view created in the world; and this is exactly the moving from money-based economy towards value-based economy. Though the corona virus was a human mistake or a great disaster, but besides the high cost paid for it we can take great lessons for our future lives. In the economy of the stable money type, like food products industry, agriculture, medicine or heavy industry and infrastructure, like steel industry, copper and aluminum, and also refineries and petrochemical products, the damages due to crises like corona will be much less. On the other hand, we can see markets that are very vulnerable, like commodities that are not among the first rate necessities of the people, for instance clothes or decorative items or services. Heavy automobile or locomotive companies and wagons are another heavy industry that always has high-priority applications. But families may not have to consider buying a car as higher priority than food or more urgent needs. On the other hand, we see investment in the IT or telecommunications industry, which is a safe investment. We should not ignore this literature, which may have been unfamiliar in pre-Corona times but is now considered invulnerable in foresight and strategy. We will come to the same literature in a value-oriented economy when we do not think only of windfall profits and quick-return organizations. It means seeing many aspects of a business and its sustainability that results from benefiting different segments of society and being an infrastructure that will automatically minimize the vulnerability of that business. On the other hand, the possibility of exporting such industrial equipment is easier, the reason being professional competition of countries worldwide for such businesses and customers who understand the value of these products well. However, mistakes are sometimes made in these global competitions, and companies with false booming markets are introduced, which then fade into such crises. Agricultural, medical, and biological industries are also in the category of less vulnerable businesses. As much as it is tough to compete and grow, on the other hand, their stability and invulnerability are more, and separation of these sustainable industries in the value-based industry from unsustainable industries may not be very difficult and can open the way for future investments in any country. Interestingly, a simple calculation shows us that we will not run out of resources in this value-based economy. The same expenses spent only on fighting corruption and controlling such issues and problems, now that we are sure that corruption and the motives of corruption will soon vanish, and can be spent, in part, for minimum public welfare in society. This can be the first steps of this development, so that this conversion can move slowly and result in a better economic turnover.
<urn:uuid:1d199149-08ff-4d49-bc27-971ee801e289>
CC-MAIN-2022-33
https://amordadnews.com/en/131260/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00205.warc.gz
en
0.962541
3,488
2.5625
3
Amos, herdsman of Tekoa, was sent from God with a powerful message of correction for the ancient House of Israel. In spite of withering opposition, he fearlessly indicted the nation for its hollow, meaningless piety, social injustice and general immorality. Amos' message must not be lost on our modern generation! I am no prophet," protested Amos, "nor a prophet's son; but I am a herdsman, and a dresser of sycamore trees, and the Lord took me from following the flock, and the Lord said to me, 'Go, prophesy to my people Israel'" (Amos 7:14-15). Amos was hardly a theologian. He was not even a member of the priestly or prophetic castes of his day. He was neither scholar nor Levite, yet God used him mightily to bring a powerful message of warning to his own people. During the long and peaceful reign of Jeroboam II (circa 786-746 B.C.) the House of Israel had been lulled into a false sense of security. National borders had been extended to their maximum and the country was basking in comparative opulence and prosperity. Religious activity and ceremony was at a peak and the people had come to believe that God was smiling benignly down upon them. Into this scene of national self-satisfaction stepped the prophet Amos. His indicting message was something less than popular and he was met with immediate opposition from the religious and political elements of his nation. He was even accused of conspiracy and disloyalty to the royal house: "Then Amaziah the priest of Bethel sent to Jeroboam the king of Israel, saying, 'Amos has conspired against you in the midst of the house of Israel; the land is not able to bear [tolerate] all his words'" (Amos 7:10). "The land is not able to bear all his words"! He conspired! Treason! Disloyalty! Amaziah attempted to inflame the king's emotions against this unqualified upstart who presumed to represent God and to prophesy against the nation. But Amos had a job to do through no choice of his own. He would not be intimidated by the priest's threats and false charges. He spoke out even more pointedly: "Now therefore hear the word of the Lord. You say, 'Do not prophesy against Israel, and do not preach against the house of Isaac.' Therefore thus says the Lord: 'Your wife shall be a harlot in the city, and your sons and your daughters shall fall by the sword, and your land shall be parceled out by line; you yourself shall die in an unclean land, and Israel shall surely go into exile away from its land'" (verses 16-17). God backed up the words of his prophet. He brought about a devastating round of famines, droughts, disease epidemics and insect-induced crop failures (Amos 4:6-10). "Yet you did not return to me," says the Lord. God warned; He punished; He threatened and He pleaded through all of His prophets including Amos (Hosea, Isaiah and Micah were contemporaries). But the stubborn Israelites still refused to repent. All attempts to warn the people of the end result of their national conduct failed. Amos was but one of the many prophets God sent to the two nations, Israel and Judah, before their demise. As God said through Jeremiah: "... I have spoken persistently to you, but you have not listened" (Jer. 25:3). Within three decades of Amos' prophecy Israel experienced the ultimate prophesied punishment — national defeat and captivity. From 721-718 B.C., the northern house went captive to the murderous Assyrians under the leadership of the dreaded Shalmaneser (II Kings 17). Cause and Effect Why didn't Israel heed the messages of her prophets? What made them so complacent — so intent upon self-justification? Amos described the national condition in chapter 6: "Woe to those who are at ease in Zion, and to those who feel secure on the mountain of Samaria, the notable men of the first of the nations, to whom the house of Israel come!" (Verse 1.) The problem was centered on the political and religious leaders who sat in the seat of government. They were "at ease," lulled into a false sense of personal security. After all, were they not the leaders of the "chief of the nations" — Israel? Was not Israel the chosen nation of God, the Covenant People? And did not its citizens come respectfully to these great sages for advice and counsel? Why should they become alarmed at the preachments of some self-appointed shepherd-cum-prophet? They were willing victims of their own self-deception! The leaders and the people alike had blinded themselves to the critical seriousness of the national condition. They looked upon the deceptive barometer of temporary national prosperity as an indicator of God's approval. They allowed themselves to become preoccupied with the pleasures of high living and personal self-indulgence. Amos indicted them for their hedonism: "Woe to those who lie upon beds of ivory, and stretch themselves upon their couches, and eat lambs from the flock, and calves from the midst of the stall; who sing idle songs to the sound of the harp, and like David invent for themselves instruments of music; who drink wine in bowls, and anoint themselves with the finest oils, but are not grieved over the ruin of Joseph!" (Verses 4-6.) Eat, drink and be merry — for tomorrow will never come, was the national philosophy. The nation's "I hate, I despise your feasts, and I take no delight in your solemn assemblies.... Take away from me the noise of your songs... I will not listen. But let justice roll down like waters, and righteousness like an ever flowing stream." Amos 5:21-24 elite was preoccupied with petty pleasures while the country disintegrated from within. No one seemed to be sufficiently concerned to take action. Somehow the nation's leaders were unable to exercise sufficient vision to see the end result of what was happening within Israel Amos spoke of them as those "who put far away the evil day" (verse 3). Any national crisis was relegated to the distant future. The national conscience was seared and no sense of guilt seemed to exist. Pride and self-satisfaction prevailed. Therefore God said through Amos: "I abhor the pride of Jacob..." (verse 8). "Pride," wrote wise King Solomon centuries earlier, "goes before destruction, and a haughty spirit before a fall" (Prov. 16:18). The fall of the House of Israel was not far distant. What, exactly, was ancient Israel guilty of before God? What was happening within that nation that so angered God that He was willing to bring about such devastating punishment? Amos does not leave any room for uncertainty. The record is clear. Chapters 3 through 6 of the book of Amos specifically list the many sins of which the northern house was guilty. Before itemizing the sins of the nation, God pointed out that he had entered into a special relationship with Israel that rendered her more accountable: "Hear this word that the Lord has spoken against you, O people of Israel, against the whole family which I brought up out of the land of Egypt: You only have I known of all the families of the earth; therefore I will punish you for all your iniquities" (Amos 3:1-2). In the days of Moses, when God had brought Israel out of slavery in Egypt, He had entered into a covenant relationship with her. The nation was to become a showpiece for God's way of life upon the earth. They were to become a nation of priests, an example for all to follow (Isa. 42:6; Deut. 4:6-8). Instead, the Israelites rebelled from the beginning. They failed to live up to their part of the bargain. Again and again God sent prophets to warn them and remind them of the curses that were in store for those who would disobey (Lev. 26:14-46; Deut. 29:21). Prophet after prophet reminded them of their failure to fulfill the covenant obligation (Jer. 11:1-4; 22:9; 31:32; Ezek. 16:59; 44:7; Mal. 2:10). Still, the nation rebelled. Internal decay and corruption continued to worsen. In King James terminology, "Their sins waxed worse and worse." And just what were these sins? Drastic Increase in Crime Crime, graft, bribery, political corruption and resultant societal instability prevailed in the days of Amos. He spoke of "great tumults" and "oppressions" within Israel (Amos 3:9). He said: "They do not know how to do right.... those who store up violence and robbery in their strongholds" (verse to). It was also a time of pay-offs, hush money and political corruption. Every man had his price. Therefore Amos wrote: "... How great are your sins — you who afflict the righteous, who take a bribe, and turn aside the needy in the gate.... It is an evil time" (Amos 5:12-13). Bribe-taking was commonplace. Political leaders could be bought and sold. When in government office — "in the gate" — these leaders were unwilling to dispense social justice; the "little man" bore the brunt of such corruption and lack of character. Amos lived in a day when the "rights of the poor" were made a mockery. Only those who could buy their way out of trouble escaped political oppression. The self-indulgent, hard-drinking wives of political leaders were instrumental in grinding the poor into the dust of Israel. Amos minced no words in addressing them: "Hear this word, you cows of Bashan, who are in the mountain of Samaria" who oppress the poor, who crush the needy, who say to their husbands, 'Bring, that we may drink!'... the days are coming upon you, when they shall take you away with fishhooks..." (Amos 4:1-2). Their husbands turned "justice to wormwood" and "cast down righteousness to the earth" (Amos 5:7). So greedy for wealth were the leaders that they could hardly wait for the end of the traditional holy days to resume their corrupt, money-making activities. As always, "John Q. Public" was the victim: "Hear this, you who trample upon the needy, and bring the poor of the land to an end, saying, 'When will the new moon be over, that we may. sell grain? And the sabbath, that we may offer wheat for sale, that we may make the ephah small and the shekel great, and deal deceitfully with false balances, that we may buy the poor for silver and the needy for a pair of sandals, and sell the refuse of the wheat?" (Amos 8:4-6.) It was the day of the "Almighty Shekel." Everything was for sale — even the "falling off" of the grain, normally given as fodder for animals, was sold to the poor for exorbitant prices. The poor became yet poorer, and many were forced to sell themselves into slavery in order to survive. Meanwhile, the "idle rich" became richer, at the expense of the working classes. In addition to their preoccupation with pleasure-seeking pursuits, the wealthy classes involved themselves in elaborate religious rites and ceremonies. This factor represented a kind of "spiritual insurance policy" and gave them a feeling of being "right with God." But God was not pleased with their rites or their wrongs! They were denying the true essence of the Faith, and replacing it with elaborate ceremonies and traditions. Isaiah — a contemporary of Amos — said: "This people draw near with their mouth and honor me with their lips, while their hearts are far from me, and their fear of me is a commandment of men learned by rote..." (Isa. 29:13). God wanted justice and righteousness more than He wanted songs and ceremonies! He' demanded peace instead of pageantry. The outward forms of religious worship had become hollow, meaningless vanity. The people erroneously measured righteousness quantitatively instead of qualitatively. These endless rituals — though originally commanded through Moses — had become a stench in the nostrils of God because of hypocrisy. They had become nothing more than hollow proceedings without real meaning. Spiritually, that ancient nation was bankrupt. Therefore God said through His prophet: "I hate, I despise your feasts, and I take no delight in your solemn assemblies .... Take away from me the noise of your songs... I will not listen. But let justice roll down like waters, and righteousness like an ever flowing stream" (Amos 5:21-24). A Message for Today The same God who sent Amos to Israel still sits on His throne in heaven looking out over the nations here below. Sin is no less sinful today than it was in Amos' time. Social injustice, the oppression of the poor, graft, bribery, corruption, crime and violence are every bit as abhorrent to God today as they were in the 8th century B.C. Today's religious ceremonies — often masquerading as "Christian" but unaccompanied by true righteousness and justice — are often every bit as hollow and meaningless as those of ancient Israel. So long as Catholic "Christians" are willing to bomb, maim and kill Protestant "Christians" (and vice versa), their religion is vain and empty. It means nothing. The sheer volume of violence in today's "civilized" societies is as much an odor in the nostrils of God today as it was when the herds man of Tekoa walked the trails of the northern kingdom. So long as modern politicians can be bought and sold, corrupted by political ambition, or induced to tread on the rights of the poor, they are no better than the "cows of Bashan" or the "husbands in the gates" described by Amos. So long as crime — organized and disorganized — can flourish within modern society, the words of Amos have powerful meaning for today's world. The United States claims to be "One Nation Under God." Its coinage reads "In God We Trust." In spite of these noble and high-sounding words, how much of God do we see in Britain and the United States? How much mercy, true justice, honesty and purity of heart and intent? In Britain, according to one source, only about 2% of the people attend church regularly. The Soviet Union, with an atheistic government, claims 3%! In the United States, organized Christianity is rapidly losing its influence. Noted religion writer Leo Rosten was recently quoted in Saturday Review: "... The fortresses of faith are experiencing the most profound alterations in centuries. Church authority is being challenged on a dozen fronts. Traditional creeds are being drastically revised. Hallowed canons are being shelved. Religious practices are changing daily. Church leaders are beleaguered by new, bold, persistent demands — from their clergy no less than from their congregations. "It is not hyperbole to say that we are witnessing a remarkable erosion of consensus within the citadel of belief" ("Ferment in Our Churches," Saturday Review, July 12, 1975). Rosten also spoke of the "mounting skepticism about the validity or effectiveness of church teachings." He said: "About 75% of the American people think religion is losing its influence" (ibid.). Religion that does not change its adherents for the better is merely a form of godliness. It means nothing to God. "Politics as usual" is an admission of corruption that is ultimately destined to exact a heavy national price. As long as the nation's courts and prisons are still full and overflowing we are in deep moral trouble. So long as simple monetary greed and lust for power are the criteria for union/management relationships, the nations are headed for certain oblivion. The utter pride and stubbornness of human political and religious leaders is in itself a terminal moral illness. But Will We listen? God sent a herdsman from Tekoa to warn ancient Israel to help them get their priorities straight. Of course they didn't listen. They rejected the humble prophet of God and labeled him a traitor. Messages like that of Amos are rarely taken seriously by those in political or ecclesiastical power. They are relegated, most often, to the same category as doomsday prophets, Jeremiahs and religious fanatics who have paraded before the populace from time immemorial. But Amos' prophecies came true. The House of Israel entered a time of national captivity and suffering unparalleled in its long history of nine dynasties and nineteen kings. Amos' Message — For Us? Whether you accept the idea that our peoples are the modern descendants of the ancient House of Israel or not, Amos' message is still valid for us today. Why? Because God has one standard for all of mankind. Sin is sin wherever it is found. And, as the apostle Paul wrote: "... Is God the God of Jews only? Is he not the God of Gentiles also? Yes, of Gentiles also, since God is one..." (Rom. 3:29). If these frightening parallels between ancient Israel and our peoples today hold true, then it might be best to close this article with yet another message from Amos: "Prepare to meet your God, O Israel!
<urn:uuid:8e8aa573-2dfe-4701-99e6-077af524c17c>
CC-MAIN-2022-33
https://www.hwalibrary.com/cgi-bin/get/hwa.cgi?action=getmagazine&InfoID=1378129602&GetMag=GN&byYear=&page=6&return=magazines
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00205.warc.gz
en
0.971844
3,659
2.625
3
MANAGERIAL EDUCATIONAL ADMINISTRATION Managerial Educational Administration is one of fundamental function from education administration. This function is entire effort compile, developing, construct condition become fluent, perfection and respect. Based on all expert, there are some administration function having the character of managerial. According to George Terry, the functions are: Among of the function are filling each other, interconnected one another form one intact union. Every function need the other function. This paper will all function of educational administration briefly. According to William H. Newman (1978, 15) stated that “Planning is deciding in advance what is to be done’. Therefore, according to Louise Allen, “Planning is determination of course of action to achieve a desired result”. So, we can conclude that planning in educational administration is activities to think and to choose the action network which concentrated to reaching of intentions and education target network. 1. Kinds of Planning Based on the certain time, planning type can be grouped to three types, they are: 1. short term plan, 2. middle term plan, 3. long term plan. Types of planning can also grouped into two types, based on the frequency of usage, they are: permanent plan and once wear plan. 2. Usage of Planning in Educational Administration Goals Determination to and reachable possible As determinant program the teaching and education which is carried out Directive for the compilation of activity schedule Base to compile the procedure of execution and teaching and education development. Compilation of Budget and earnings of school expense 3. Process of Making Plan Formulating important problem Mustering complete data information hit the needed activity Analyzing and evaluating and also make the classification of existing data and information Determining opinion base and making the limitation Determining most conducive alternative and priority. Specifying most precise plan Making detail plan and schedule for the time in correct formation Approximating management process 4. Scheduling of Plan Analyze the Fact Plan Compilation which concrete My Comment : Planning is first and especial activity once in target attainment. Almost every activity need the matured planning. Included in education administration require the planning. So that education management walk at ease. Simply the definition organization according to Bayle is a collection of people working together in a division of labor to achieve a common purpose. While the definition of organizational as one of function of educational administration is activities to compile and to form the relation, so that existed by union of effort in reaching intentions and education target. According to Drs. Yusak Burhanuddin, in his book that the title is Administrasi Pendidikan, the functions of organization are: Specifying area work, method and appliance required and also required personnel. Opening relation to personnel in concerned, responsibility, authority, their rights and obligations so that quicken reaching of organizational target. Organization as administration function become the especial duty [of] education leaders of[is inclusive of headmaster. What require to be paid attention to in organization is duty division, authority and responsibility, shall be adapted for [by] a experience, talent, enthusiasm, knowledge, and personality each one needed in running the duties. Directing is systematic effort to instruct the organizational mechanism. In more special directing is effort determine the direction , looking after, moving forward organization through every individual in concerned structurally and also functional so that every activity is not quit of target attainment. Forms of Directing Forms of directing can be grouped into three forms, they are: oral, writing and deed. Directing core is effective communications. Seen from its process [is] divisible communications to two shares: one way traffic communication and two way traffic communication. Both of process communications can be done by hence media ( visual audio). In this case need is also paid attention to direct to can reach the target, hence communications shall: clearity, consistency, and adequacy, timing, uniformity, acceptance. Budgeting in taking care of mechanism fluency of organization without exception of education management. To fulfill fund requirement in budgeting education management, there are some fund source which can be utilized, that are a. Fund from central government b. Fund from local government c. Fund SPP d. Fund BP-3 f. Other; Dissimilar Efforts which do not fasten Directing and budgeting are very important in managerial educational administration Coordination is activity to bring the people, material, mind, technique and target into harmonious [relation/link] and target into productive and harmonious to reach the target. The benefit of coordinating for organization itself: · Can be avoided the feeling each other release among each part of and worker of organization. · Can avoid [is] relying on each other position and quarrel among them and usher part of organization · Can avoid the double duty and certain shares executor blankness in organization · Pushing functionary to mutually assisting and advise the problem faced to parts of other. Report is gathering from all note of activity and experience in structured execution systematically. Perhaps note for the report of good not only good things record and attainment of eye efficacy but also all bitter experience which also entered so that can become the lesson substance in order it is not to come again in the future Generally report of education classified into two category: · Achievement report learn and student activity · School report. Existence of all kinds of duty done by many people, needing the existence of coordination from a leader. With the existence of good coordination, all shares and personal can cooperate to go to one way of target which have been specified and obviate the possibility of the happening of indisposed emulation Every action will be asked by the report or its responsibility. OPERATIONAL EDUCATIONAL ADMINISTRATION A. Arrangement of Educational and Instruction. To support the process learn to teach in order to reaching higher level education target, hence process the instruction also require the arrangement. Therefore, in instruction activity elaborated in advance education target by hierarkis. · Formulating education target of various level · Compiling school calendar · Compiling annual job Program · Formulating formulation of duty and burden determination teach · Compiling schedule · Compiling Program learn to teach more go forward · Compiling assessment phase of result of learning and process to learn · Progress Report learn student B. School Community Relationship School represent one part of from a society. Become the school arrangement have to be seen in its relation with the component in other education management and attributed to all society program. Purposes of School Community Relationship are: · Defining how important school for society is · Developing to arrange the relation between school and society · Giving information to society about content and execution program the school · Getting support and aid of moral and also financial needed for school development · Developing tighter cooperation between family and school in educating children. Arrangement very needed in the field of teaching and education. So that, all education target can be reached others school relation with the society shall be harmonious and equipping each other because school is the part of society also. C. Student Operational Activity in the field of this student operationally include the service to student which can equip instruction in class that is need, interest, welfare. detailed is duties which is come within in the field of cover : Managing and preparing pupil data Listing pupil attendance at school Acceptance, orientation and classification and pupil indicator to class and program the study Evaluate and reporting of pupil progress Supervise the programs for pupil having disparity Operation of pupil Discipline Personal adjustment, social, [is] emotional the than pupil · Organizational intra school. D. Operational Equipment Administration of Medium education represent all activity process planned and laboured in intend and mean business and also construction by continue to education object, [so that/ to be] ever ready for use in course of learning to teach, so that process to learn to teach effective progressively efficient and utilize to assist reaching of education target which have been specified Chronologically operational, activity of administration and medium of education cover the: · Planning of goods Levying · Qualification Client · Goods Levying · Depository, stocktaking, channeling · Conservancy and rehabilitate the · Abolition and elimination Sometimes student area less be professional and less be optimal serve the student. For that need the existence of training to officer placed in this area. The right man in the right place. E. Personnel Administration Officer at one particular school all human being joined in job of equal at one particular school for execute the duties in reaching education target. They are consisted of headmaster, vice of headmaster, teacher, lead to arrange the effort, all employees arrange the effort is inclusive of courier. Officer of school employees consisted of the: · Employee of Educative academic that is teacher or instructor remain to and erratic or honoree · Employee of Non-Educative or administration, that is accounting staff remain to or erratic. In doing duty in this personnel area require the administration equipment, so that duty run to be realized better. Others personnel area hold responsible fully in the effort make-up of quality and existing officer quality. F. Financial and Material Administration School undertake to manage the finance problem or often referred with the Revenue Plan and School Expense, which this APBS is consisted of the report comprising development expense and also unforeseen costs or other technical expense. G. Secretariat Administration Secretariat Administration school manage fully the vertical communications problem and also horizontal in school and also extramural. Activity arrange the other effort is manage the documentation important features in activity institute the education. Arrange the effort also manage the administration equipment like stationery etcetera. Every thing which have been burdened by trust which must be executed obligingly and high level professionalism because this matter relation to the education. There are a lot of generation base on education administration. Learning this is really important for me because I become know about educational administration included managerial educational administration and operational administration. So, I hope I will application what I got I daily life especially in the future when I become a professional teacher.
<urn:uuid:e1cda480-f293-4e30-a20c-b211b1b1f603>
CC-MAIN-2022-33
https://www.nufazee.com/managerial-educational-administration/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00604.warc.gz
en
0.927386
2,249
2.671875
3
In our last lesson, we learned that our tongue could be very destructive if we do not learn to control it. Thank God, He can give us the power to tame our tongues! This lesson will talk about another part of our body that is equally as important as our tongue. “22 The light of the body is the eye: if therefore thine eye be single, thy whole body shall be full of light. 23 But if thine eye be evil, thy whole body shall be full of darkness. If therefore the light that is in thee be darkness, how great is that darkness!” Amazing Eye Facts - Your eyes are the most complex organs you possess except for your brain. - Your eyes are composed of more than 2 million working parts. - The average person blinks 12 times per minute – about 10,000 blinks in an average day. - Your eyes can process 36,000 bits of information every hour. - Only 1/6th of your eyeball is exposed to the outside world. - The external muscles that move the eyes are the strongest in the human body for the job that they need to do. - The eye is the only part of the human body that can function at 100% ability any time, day or night, without rest. - Your eyes contribute to 85% of your total knowledge. - Your eyes are always the same size from birth, but your nose and your ears never stop growing. - The eyes are very complex and work very much like a camera. - The human eye is remarkable. It accommodates to changing lighting conditions and focuses light rays originating from various distances from the eye. When all the components of the eye function properly, light is converted to impulses and conveyed to the brain, where an image is perceived. In Mathew 6:22-23, Jesus describes the duty of fixing our affections on heavenly things. Everything is clear and plain when healthy eyes are directed steadily toward an object in single focus. But if it flies to different objects and looks at multiple things instead of a singular entity, it does not see clearly. The eye regulates the motion of the body. To have an object distinctly in view is necessary to correct and regulate action. Think about this, if a man is crossing a stream on a log and looks across the stream at some object steadily, he will be in little danger because he clearly sees where he is going. But, if he looks down on the running waters or to the right of himself, he will become dizzy and unstable on the log. This is because he is not focused on where he is going. In Mathew 6: 22-23, Jesus is saying, for us to have the proper conduct or be a good Christian, we must have our eyes fixed on Him. “Thy whole body shall be full of light” means our conduct will be regular and steady conduct of a Christian. The word “light,” in Mathew 6:22-23, signifies “the mind,” or principles of the deeper soul of our soul and mind. In short, Jesus told those He spoke to, if you keep your mind focused on the right direction, you will be full of light, or full of God’s light for your life. But if you turn your eye toward the evil things of this world, it will affect your body, mind, and soul, and you will become dark. We need to keep our eyes on Jesus. We have discussed Mathew 6:22-23 and the importance of fixing our eyes on Jesus. Now let us look at a story in the Bible found in Matthew 14:25-33. The story deals with the raging storms on the Sea of Galilee. The Sea of Galilee, by all standards, is small in size. It is 13 miles long, 8 1/2 miles at its widest point, and has a maximum depth of 150 feet. As told in the Bible, one might ask, “How can a body of water this small get so rough and bring so much fear to the disciples?” The answer is the shallow depth, combined with the wind currents in that area, make quite a storm. When the winds blow hard over the sea, the water rocks back and forth, causing rough waves. It acts in the same principle as holding a shallow pan of water in your hands and tipping it from side to side. Thus, the constant high wind over the sea rocks the water back and forth. “25 And in the fourth watch of the night Jesus went unto them, walking on the sea. 26 And when the disciples saw him walking on the sea, they were troubled, saying, It is a spirit; and they cried out for fear. 27 But straightway Jesus spake unto them, saying, Be of good cheer; it is I; be not afraid. 28 And Peter answered him and said, Lord, if it be thou, bid me come unto thee on the water. 29 And he said, Come. And when Peter was come down out of the ship, he walked on the water, to go to Jesus. 30 But when he saw the wind boisterous, he was afraid; and beginning to sink, he cried, saying, Lord, save me. 31 And immediately Jesus stretched forth his hand, and caught him, and said unto him, O thou of little faith, wherefore didst thou doubt? 32 And when they were come into the ship, the wind ceased. 33 Then they that were in the ship came and worshipped him, saying, Of a truth thou art the Son of God.” It is to our loss as Christians that we often forget the simplest teachings of the Scriptures. Peter could walk on water by faith until he took his eyes off Jesus, looking at the storm’s tempest instead. What a truth! So often, take our eyes off Jesus because of trouble around us. Maybe we need to deal with rude people, unfair situations, or we didn’t do well on a test at school. If we keep our eyes on Christ, we will be able to go through the trial with the right attitude, the right mindset, and positive thinking. But when we take our eyes off Christ, it leads to trouble. Are you familiar with the sport of horse racing? Here in America people race, horses for sport. Do you know it is customary before the race to put blinders on the horse? The purpose of this is so the horses will not see each other. Horses with blinders will not look to the right or the left. So, when the horses race around the track, all the horses see is what is in front, not each other. As a young person, you will find yourself in frustrating, discouraging, and maybe even upsetting situations. We need to remember to keep our eyes focused on Christ in those times. It is pretty easy to lose sight of our Christian beliefs when overshadowed by adversity and grief. Life can be overwhelming at times. There can be troubles and problems; we all go through this. The account of Peter walking on water to Jesus is a lesson that we should never lose sight of. When we focus our thoughts upon the divine Truths of God’s Word, we can withstand all the attacks Satan puts in front of us. The devil is trying to get us to look to the right or the left. The devil’s goal is to distract us, so we take our eyes off Christ. Turn your eyes upon Jesus O soul are you weary and troubled No light in the darkness you see There’s light for a look at the Savior And life more abundant and free Turn your eyes upon Jesus Look full in His wonderful face And the things of earth will grow strangely dim In the light of His glory and grace This song challenges us to turn our eyes upon Jesus. I want to share a couple of thoughts with you that keep young people from keeping their eyes on Christ. 1. We tend to focus our eyes on ourselves. It is easy to spend much of our time analyzing our feelings. We ask ourselves questions like, “Am I happy?”, “Am I fulfilled?”, “Am I doing well or poorly?”. Remember when Peter stepped out of the boat, while he kept his eyes on Christ, he could walk on water toward Jesus, but as soon as Peter looked at the waves or the trouble, he started to sink. We need to look outward toward the things of God and not inward toward ourselves all the time 2. We tend to look to the right or left. Meaning we tend to look at other people and start asking, “I wonder what they are doing about Christ?”. As an example, Maybe Peter looks around and says, “I wonder what Emily is doing with God? “or “I wonder what Sharon is doing with God?”, or “What about Jerimiah? I wonder what he is doing?” God wants us to keep our focus on Him. We need to be concerned about what God is doing in our lives and not so worried about what others are or are not doing. John 21: 19-22 “19 This spake he, signifying by what death he should glorify God. And when he had spoken this, he saith unto his, Follow me. 20 Then Peter, turning about, seeth the disciple whom Jesus loved following; which also leaned on his breast at supper, and said, Lord, which is he that betrayeth thee? 21 Peter seeing him saith to Jesus, Lord, and what shall this man do? 22 Jesus saith unto him, If I will that he tarry till I come, what is that to thee? follow thou me.” Notice here, in John 2:19-22, the conversation with Peter and Jesus. Jesus asked Peter to follow Him, but Peter looked at another and asked Jesus, “what shall this man do?” Jesus told Peter, “If I will that he tarry till I come, what is that to thee?” Jesus told Peter; what concern is it of yours what this man does for me? I am asking you to follow me, Peter. Peter’s job was to focus on following Christ. As young people, we are often concerned about what everyone else is doing. But Jesus wants us to focus on Him. 3. We tend to set our eyes on the future or worry about the future. Maybe we are worried about what will happen when we graduate. When we worry about the future, we forget what is important in the now. “34 Take therefore no thought for the morrow: for the morrow shall take thought for the things of itself. Sufficient unto the day is the evil thereof.” In essence, Jesus says, “do not worry about tomorrow because it will take care of itself.” We need to focus on what God wants us to be looking at today and do what we know is right today. Today if we are doing what is right, meaning: we are honest, we are not stealing, not cheating, not lying to our parents or others, we are doing our homework, we are doing our best in school, and we are working hard, focused on what we are doing today, tomorrow will work itself out. What are you looking at? Your friends? Things of the world? Jesus is challenging us to keep focused on Him through every decision and challenge we face in life. Trouble will come when we do not keep our eyes focused on Christ. So, turn your eyes upon Jesus, and look full in His wonderful face; the things of earth will grow strangely dim in the light of His glory and grace. So, I challenge you to keep your eyes upon God, and He will continue to strengthen and help you as you go forward through life. “I will lift up mine eyes unto the hills, from whence cometh my help. 2 My help cometh from the Lord, which made heaven and earth.” Keep your eyes on Jesus, He is your help, and He will be with you through every good time, every difficult time, and all the time.
<urn:uuid:6d6c7128-7f18-4dc6-8803-84fa81c03036>
CC-MAIN-2022-33
https://truebibledoctrine.org/ms_my/2021/04/27/keep-your-eyes-on-jesus/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573242.55/warc/CC-MAIN-20220818154820-20220818184820-00604.warc.gz
en
0.957659
2,587
2.921875
3
From the Potomac River near Knoxville, Maryland, in the south, to Dillsburg, Pennsylvania, in the north, the 70-mile-long (110 km) range separates the Hagerstown and Cumberland valleys from the Piedmont regions of the two states. Part of the Blue Ridge Mountain Range, South Mountain separates the Hagerstown and Cumberland valleys from the Piedmont regions of Maryland and Pennsylvania. United States ; Maryland (MD) Boonsboro ; ... 21843 National Pike, Boonsboro, MD 21713-1640. Posts Tagged ‘South Mountain State Park’ ... More Than 1,200 People Brave Cold for First Day Hikes The Maryland Department of Natural Resources welcomed 1,227 hikers at more than 30 state parks this New Year’s Day as part of the annual First Day Hikes initiative. South Mountain Realty serves the entire Washington County and Frederick County real estate market. Dans Mountain in Allegany County was named after Daniel Cresap, one of the early settlers in the area, while Savage Mountain honors John Savage, an eighteenth-century surveyor. South Mountain, a ridge composed largely of resistant quartzite, posed a formidable obstacle to the early settlers until 1755 when General Edward Braddock and a young surveyor, George Washington, constructed a road over one of its passes. The battle of South Mountain took place just east of Sharpsburg, Maryland, on September 14, 1862, only days before the larger and better known battle of Antietam. South Mountain is the name given to the continuation of the Blue Ridge Mountains after they enter Maryland.It is a natural obstacle that separates the Hagerstown Valley and Cumberland Valley from the eastern part of Maryland.. After Lee invaded Maryland, a copy of an order, known as Special Order 191, detailing troop movements that he wrote fell into the hands of McClellan. Other Names: Crampton’s, Turner’s, and Fox’s Gaps Location: Frederick County and Washington County Campaign: Maryland Campaign (September 1862) Date(s): September 14, 1862 Principal Commanders: Maj. Gen. George B. McClellan [US]; Gen. Robert E. Lee [CS] Forces Engaged: Corps Estimated Casualties: 4,500 total It is especially important for those who are pregnant, nursing, chronically ill, elderly or under the age of 18 to discuss the use of these products with a physician prior to consuming. c/o South Mountain Recreation Area We look forward to serving you. For over 275 years, the Old South Mountain Inn has sat poised atop scenic, historic Turner’s Gap. Learn More Estamos ubicados a una cuadra de Main Street en el centro de Boonsboro (junto a la estación de bomberos). To learn more about the practice or to make an appointment, click here. Hometown Harvest Kitchen. Call toll-free in *Maryland* at 1-877-620-8DNR (8367). This hand drawn color map shows the entire battlefield and commanders/units. Fought on September 14, 1862, the Battle of South Mountain was a critical turning point in the American Civil War. Registration for 2020 is now closed. We work to establish a mutually beneficial relationship with the building owner that will continue long after the warranty has expired. ... railing needs, no job is too small Artisan Darren Myers, with 18 years experience as railing manager of former Maryland business Frederick Railing Works, continues to provide the known quality and expertise appreciated by … South Mountain State Park is an abundance of geologic, natural, cultural, and historic experiences. 844-SMC-MILK 844-762-6455. We are dedicated to providing you with the best auto body repair and collision damage repair services as well as mechanical repair services available. Restaurants near South Mountain Creamery: (0.00 mi) South Mountain Creamery (3.11 mi) The Main Cup (7.89 mi) Nutters Ice Cream (4.32 mi) Dan's Restaurant & Tap house (9.41 mi) Dutch's Daughter; View all restaurants near South Mountain Creamery on Tripadvisor $ The mountains of Maryland captured the nation's attention in September 1862, when Confederate forces crossed the Potomac River into western Maryland. (Scott Braid) OFFICIAL SELECTION. Contact South Mountain Recreation Area at 301-791-4767 or by Email at email@example.com, To learn more about hiking on the Appalachian Trail visit the Appalachian Trail Conservancy at: http://www.appalachiantrail.org/home/explore-the-trail/hiking-basics, Call toll-free in *Maryland* at 1-877-620-8DNR (8367), http://www.appalachiantrail.org/home/explore-the-trail/hiking-basics. Old South Mountain Inn - Boonsboro, Maryland - Fine Dining and Hospitality. Address: 50 Citizen’s Way. South Mountain State Battlefield: Gathland State Park is located in Crampton's Gap, which witnessed a portion of the Battle of South Mountain, the first major battle of the Civil War fought in Maryland. hiking forest views wildlife birding nature-trips wild-flowers camping trail-running dogs-leash walking backpacking dogs historic-site. Madeleine Dahlgren fell in love with South Mountain House and the fascinating local legends and lore of the surrounding townsfolk. In 1882, Dahlgren published, “South Mountain Magic: Tales of Old Maryland.” It was in this volume, that Dahlgren devoted numerous pages to the haunts, witches and wizards of these mountains. This Welcome Center has a wealth of information for western Maryland and the rest of the state. Rocks of the South Mountain Anticlinorium and Frederick Valley The information contained on this page was adapted from Maryland Geological Survey's Geologic Map of Maryland (1968) . You are basically making a circle to park and then to leave that parking area. This Welcome Center has a wealth of information for western Maryland and the rest of the state. See our full menu for our current cuisine, as well as beer, wine, and tasty boozy shakes! South Mountain Railing Quality Custom Ornamental Iron Click to call: 301-676-0646. McClellan was unable to destroy Lee at The Battle of South Mountain, and they met again a few days later at the Battle of Antietam. Boonsboro forms a gateway to relevant colonial and Civil War heritage sites including the National Road, Washington Monument State Park, South Mountain and Antietam National Battlefield. Your complete satisfaction with our service and representation is our number one priority. The Battle of South Mountain was apart of the Maryland Campaign and fought in September 1862. Designated camping areas and shelters are available on first-come-first served basis for backpackers and thru-hikers. ... Middletown, MD 21769. Old South Mountain Inn - Boonsboro, Maryland. Boonsboro, MD 21713. We are dedicated to providing you with the best auto body repair and collision damage repair services as well as mechanical repair services available. Its diverse terrain features rolling farmland of western Maryland and the deep forests of the Appalachian Trail. The baseball field is a place for our community to come together as one and display our enthusiasm for living in the South Mountain area. South Mountain Village is located in Brunswick, Maryland in the 21716 zip code. Old South Mountain Inn - Boonsboro, Maryland. Begin with a visit to the office and museum at It stretches from the Potomac River at the southern end up to the Pennsylvania border and some distance north--a total distance of about 40 miles in Maryland alone. Complete with audio/visual equipment and a comprehensive food & beverage selection, this space is perfect for regional and district meetings, as well as training seminars, intimate parties and more. 16,300 were here. COVID-19 TESTING SITES IN WASHINGTON COUNTY, MD Meritus Screening Drive Thru Center is located at 13620 Crayton Blvd. ALERT: Parking lots for the Appalachian Trail lots fill quickly. The first battle of the Maryland Campaign of 1862 was fought in these mountain gaps on September 14, 1862. Greenbrier, Washington Monument and Gathland are neighboring state parks along South Mountain. See our full menu for our current cuisine, as well as beer, wine, and tasty boozy shakes! South Mountain, a ridge composed largely of resistant quartzite, posed a formidable obstacle to the early settlers until 1755 when General Edward Braddock and a young surveyor, George Washington, constructed a road over one of its passes. There are lots of interesting things to do just a short distance from our Gallery. Accepting appointments. Volunteer2908 South Mountain West Welcome Center. South Mountain State Park has no official entrance, but instead has various access points. All ingredients made in the USA! 568 likes. Only problem is the way over flow parking is located. Sterling Care South Mountain is located in historic Boonsboro and is nestled at the foot of South Mountain, between Hagerstown and Frederick. Serving Maryland, Northern VA, Southern PA & Panhandle, WV. Today, the area where Michael was born is fittingly known as Zittlestown, just a few miles up the road from Boonsboro which itself was formally established in 1792 by George and William Boone, cousins to the more famous Daniel Boone. Stop by, watch our cows get milked, take a self-guided tour of the farm, and visit Karen’s Kountry Store to pick up some farm-fresh goodies. We are located at the west entrance to Gathland State Park near Burkittsville, MD.We are about an hour outside of Washington, D.C. and Baltimore. The park includes two hunting areas that require a hunting license and knowledge of the Maryland hunting seasons. South by Southwest Film Festival Maryland Film Festival. South Mountain West Welcome Center. Little League Mission Statement. We are committed to breeding quality Light Yellow/White colored AKC Labs with English-Type features (blocky structure and head with excellent temperament). 15 Other Attractions within 5 miles. COVID-19 TESTING SITES IN WASHINGTON COUNTY, MD Meritus Screening Drive Thru Center is located at 13620 Crayton Blvd. Its diverse terrain features rolling farmland of western Maryland and the deep forests of the Appalachian Trail. South Mountain State Park is an abundance of geologic, natural, cultural, and historic experiences. Welcome to South Mountain Collision & Auto Center Serving Washington County & Frederick County, Maryland We now feature free Wi-Fi for customer use in our comfortable waiting area! South Mountain Realty serves the entire Washington County and Frederick County real estate market. Directions to the Maryland Film Festival. Find all the transport options for your trip from Washington to South Mountain (Maryland and Pennsylvania) right here. The South Mountain State Battlefield encompasses Crampton's, Fox's, and Turner's Gaps of South Mountain. South Mountain is the northern extension of the Blue Ridge Mountain range in Maryland and Pennsylvania. Nearby towns include Hagerstown , Frederick , and Middletown . Click to expand photos The Battle of South Mountain was fought on September 14, 1862 between Union forces commanded by Maj. Gen. Ambrose Burnside and Confederate forces commanded by Maj. Gen. James Longstreet in Frederick and Washington counties, Maryland during the American Civil… William Guthrie was killed September 14, 1862 at South Mountain near Boonesboro, Maryland. Most of these access points are by foot only, making a visit quite the adventure. South Mountain State Park Due to the remote nature of the hunting areas please visit the Hunting link below for more information. Background. Registration for 2020 is now closed. CVS Drive Thru Testing Site located at 1503 Potomac Ave, Hagerstown MD 21742. South Mountain Soy Candles, Hagerstown, Maryland. Greenbrier, Washington Monument and Gathland are neighboring state parks along South Mountain. Local ice cream made right on the farm! Welcome To South Mountain … Watch us milk our cows from 1:30-4:30 p.m. She received her Bachelor of Science in Nursing from Towson University and her Doctor of Nursing Practice degree from University of Maryland, Baltimore. Photo from the Boonsbourough Museum of History. showing positions at Fox's and Turner's Gaps, Sept. 14th 1862. Fine Dining and Hospitality. The Union victories at South Mountain and Antietam (fought three days later) led President Abraham Lincoln to issue the Emancipation Proclamation. Aug 7, 2018 - van Gilder Pottery is a working pottery and contemporary craft gallery in a restored barn atop South Mountain. South Mountain State Park, Boonsboro: Address, Phone Number, South Mountain State Park Reviews: 4.5/5. We are located in historic Washington County Maryland, nestled in the South Mountain Valley in close proximity to the Antietam National Battlefield. The Public Consensus Building Plan for the South Mountain Battlefield is the first in-depth study of the preservation status of the critical battlefield in a generation. South Mountain State Battlefield seeks to preserve and interpret the first major Civil War battle to take place in Maryland. Little League Mission Statement. Panama Canal Time Lapse, Sesame Street In Communities Facebook, How To Animate Gacha Life In Kinemaster, Lorie Ladd Family, Manitowoc Herald Times, Psalm 145 Shane And Shane Lyrics,
<urn:uuid:65f3203e-2e2e-4445-9f26-ffc154897a00>
CC-MAIN-2022-33
http://www.executeeng.com.br/01afg/a1f1d9-south-mountain%27%27-maryland
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00204.warc.gz
en
0.919471
2,809
2.8125
3
Early childhood influences, whether remembered or not, are the foundation for later development into adulthood. The child learns about her world at a young age: whether the world is a safe or unsafe place; whether other people, especially those who have power over her, can be trusted or not; and whether kindness, love and respect really exist in people. Early influences determine how people will function—the kinds of relationships they form, how they handle adversity and whether they find joy in life. Life experiences may facilitate or obstruct healthy growth and maturation. We are beginning to recognize that these complex psychosocial factors also play a greater role in perinatal care and outcomes than we ever suspected. A shocking number of adults were born and/or grew up in harmful, dangerous, adverse circumstances. Each year, in the US alone, over a million cases of child abuse—neglect, sexual or physical assault, and emotional abuse—are reported. These reported cases almost surely represent the tip of the iceberg. Abuse is a private, lonely matter that is easily hidden, and the victim is at enormous disadvantage in stopping it. While many survivors grow up to function well, develop close friendships, raise families, take pleasure in life and become skilled and productive, these accomplishments often come after overcoming much psychological distress. The effects of abuse and other trauma clearly continue long after the abuse ends. The protective survival techniques that a child relies on to deal with the abuse and accompanying fear and anxiety often become exaggerated, maladaptive or even self-destructive, as the child grows up and applies them inappropriately to situations that in some way resemble the abuse. Some examples include: avoiding people and situations that might seem risky; distrusting people who have authority over her; dissociating mind from body (“checking out,” “leaving my body,” “going blank”) at stressful or threatening times; using alcohol or drugs to forget or to calm oneself; making unhealthy and unsafe lifestyle choices, engaging in elaborate control rituals to avoid threat and danger. To relate this more specifically to childbearing, the survivor may deny her pregnancy or hide it from others; avoid or postpone prenatal care; have anger, trust, or abandonment issues with her midwife; or make maternity care choices out of ignorance, anger, fear or anxiety. A victim’s conscious memory of her past abuse is often partly or totally blocked, which may result from dissociation during the abuse or other mechanisms to protect herself when the trauma is too horrible to deal with. Blocked memories tend to surface in midlife under circumstances of emotional or physical stress, or during particular life transitions, one of which comes during the childbearing year, encompassing pregnancy, birth and new parenthood, including breastfeeding. When memories surface, the survivor suffers pain and anguish and often benefits from therapy and/or support through the long and difficult healing process. Within a typical midwifery practice, some women survivors have no memory, while others may be well along the healing journey. Whatever their degree of healing, survivors may experience some replay of their abuse before, during or after birth. Those who are recovering are more likely to recognize the present experience as a trigger and to know ways to put it into perspective (e.g., talking about it, self-calming techniques). Others may be re-traumatized—something all midwives want to prevent. Relationship between a Female Survivor and Her Midwife Not surprisingly, women who were violated, neglected or hurt during childhood by adults in authority and power, whom they loved and trusted and on whom they were dependent, may sadly find that their relationship with a midwife raises past issues with their mothers or other powerful figures in their early lives. If we try to see the relationship through the eyes of a troubled survivor, we realize that midwives or doctors are powerful figures—knowledgeable, comfortable in their own “territory” (office, clinic or hospital) and authoritative within their field of maternity care. They remain clothed and upright. They may do painful or intrusive things to the woman. The woman, on the other hand, has less knowledge, is in a strange environment, remains partially unclothed, is lying down and submits to the procedures being done to her. Even when a midwife intends to be kind and sensitive, her client may find many aspects of the relationship very stressful. She also may find this power differential confusing, more so if the midwife is the same gender as her abuser(s). Her contacts with her midwife may evoke the same feelings and reactions she had at the hands of her abuser. Her body may tense, she may feel panicky and unable to speak on her own behalf, or she may react with anger or resistance. Depending on the degree of recovery, she may or may not recognize the connection between these reactions and her previous abuse. Women who were victimized by a male (which is most often the case) sometimes choose a female midwife in the belief that a female will be safer. Because of their more personal and less interventive style of care, midwives attract a higher percentage of middle-income survivor clients (that is, those who have a choice of providers) than do medical doctors. If, however, the female midwife then does some of the things the woman expected to avoid by going to a midwife (for example, limiting time for appointments; performing tests, vaginal exams and other invasive procedures; leaving at shift changes; going on vacation near the due date; discontinuing the relationship at 4 or 6 weeks postpartum, etc.), the woman may feel betrayed or abandoned, even when these things have been discussed and the intention is to enhance the well-being of mother or baby. She may replay some of the old experiences of being let down, confused or hurt by her mother’s complicity (knowing or unknowing) in the abuse and/or failure to protect her. The midwife may resemble her mother, who didn’t protect her. Thus, even though she chose her, a survivor may have difficulty trusting her midwife during the emotionally demanding time of pregnancy. Sometimes midwives feel as though they are being tested and having to prove themselves to their client, while the client believes that she is trying to gain some control, establish herself as an equal, and assure herself that she can trust her midwife. It is not surprising, therefore, that most survivors do not disclose their abuse history to their midwives—out of shame, guilt, fear of being labeled or out of a sense that it will not help. Those who do tell their midwives usually find that the disclosure improves the relationship. Most midwives want to help and, when they understand, they are better able to provide appropriate care. Being challenged is always difficult, and midwives are as likely as anyone else to become defensive, hurt or angry. If you are the midwife in such a situation, it helps to remind yourself that you are not really the target of her dissatisfaction; you resemble in some way someone from years ago, who taught her to be skeptical or untrusting. Try to see beneath the surface, recognize that the survivor has special needs, and treat her as kindly, patiently and respectfully as you treat all the women in your practice. Be as flexible as possible without compromising safety or your own boundaries. How Pregnancy and Birth Trigger Abuse Memories The physical experience of pregnancy and birth (fatigue, enlarging body, clumsiness, aches and pains, fetal movements, contractions, the urge to push, the baby’s descent and birth) may evoke feelings of being out of control, ugly or dependent, and trigger “body memories”—that is, extreme pain and tension—or psychological reactions of fear, panic, dissociation, withdrawal or flashbacks. Clinical care activities and a challenging or complicated pregnancy and birth also bring up numerous potential triggers, such as vaginal exams, breast exams, injections, blood draws, bladder catheters, intravenous fluids, transfer to the hospital, which may be followed by administration of an epidural, episiotomy, forceps or vacuum extractor, restriction to bed (with or without “restraints” in the form of tubes, belts, monitors, blood pressure cuffs, oxygen masks). To survivors, these may become metaphors for the abuse—invasion of body boundaries, exposure of sexual body parts, physical restraint in the “victim” position (lying down while others stand) and powerlessness. Control issues also arise. When she was vulnerable and not in control in the past, the survivor was hurt. Having lived in constant but unpredictable danger or having been assaulted when her guard was down, she may become extremely vigilant and guarded so as never to be caught by surprise. A timid, unassertive, compliant woman may have learned as a child that the only hope of safety lies in not breaking other people’s rules. She knows that if she breaks the rules, she is bad and deserves punishment. On the other hand, some survivors become angry and distrustful, which may translate into actions designed to keep her birth, her midwife and other staff under her control. These may include careful questioning of the midwife about her philosophy of care and use of interventions, preparing a detailed and specific birth plan that includes lists of things the midwife should not to do, suspicion of the nurse’s intentions, bringing many people to the hospital for “protection” from unanticipated staff actions, or giving birth at home where she is more in control. This desire to remain in control may also translate into actions to keep control over her own behavior when she is in pain. Some women want a hospital birth because they desire an epidural before the labor pain reaches a point where they can no longer behave normally. They may worry about behaving in a shameful way—wincing, writhing, crying out—when in pain. The epidural enables them to control their facial expressions, actions, speech, thoughts and responses to others. The tradeoffs involved with an epidural—a degree of helplessness in both physical movement and in self-care—bother some survivors more than others. The fear of losing control makes some laboring women struggle against their contractions. Relaxation may be impossible and suggestions from well-meaning midwives, doulas, or nurses to “relax,” “surrender,” “yield,” “open up” may remind the survivor of other times when she was made to do these things and was hurt. Other suggestions, meant to reassure, such as “Trust your body” and “Do what your body tells you to do” are incomprehensible to the survivor whose body has been a source of anguish, pain and betrayal. Her efforts to keep labor under her control may actually slow or stop progress. In fact, I believe that some women, in a conscious or unconscious need to avoid pain or injury to the vagina, have controlled their labor (even when Pitocin and an epidural were used) to the point that a cesarean for failure to progress became the only solution. I wonder how many cesareans for “failure to progress” are done to survivors who have a deep fear for their vaginas. A cesarean bypasses and thus protects the vagina. During traumatic and abusive situations, many people dissociate. In a sense they “leave their bodies,” altering their consciousness to take themselves away from horrible thoughts, pain and memory. Dissociation is a powerful survival technique when abuse or trauma cannot be avoided. The same thing may be done during a frightening labor. If survivors perceive their ability to dissociate as an indicator of strength or a helpful way to manage under difficult circumstances, they will welcome dissociation during labor. If they connect dissociation with victimization, they will want to remain present and aware. One issue that is unique to home- or birth center births is transfer to the hospital if problems arise. Unplanned transfer carries the potential for trauma, especially if the midwife does not remain with her client. Issues of abandonment, helplessness, or, as one woman said, “being thrown to the wolves,” sometimes come up for the woman. It is traumatic if the woman and her partner, exhausted and worried, are left alone while the midwife arranges transfer, packs up her gear and rides in a separate car. All midwives should consider the emotional impact of transfer and try to minimize the distress that may accompany it. A doula can be worth her weight in gold in situations like this, by remaining with the woman throughout the entire process of transfer and until the baby is born. Survivors are sometimes unprepared for the baby’s needs and demands. Having to always be available at the baby’s beck and call may feel like abuse by their baby “perpetrator” at times. Giving the baby total access to their breasts (feeding on the baby’s demand or cue), especially if their breasts were a major target of the abuse, may trigger resentment, guilt and memories of a childhood when they could not say no. On the other hand, they may become fiercely protective of their tiny baby, somehow identifying with the baby’s helplessness. Others fear that they or their partner might abuse their child, just as they themselves were abused. Having the baby with them in bed or having the father bathe with the baby sometimes evokes suspicion in the survivor mother that her partner will sexually abuse their child. Some Practical Tips for Midwives The following tips are not intended as a comprehensive discussion of everything a midwife should know in order to provide the most appropriate care for survivor clients. I hope these tips help you understand your clients better, but also whet your appetite to learn more about working with survivors during the childbearing year. - Be aware that many pregnant women in your practice have been traumatized or abused earlier in their lives and may not disclose this—for any number of reasons. They may have no memory of the abuse. They may believe that it is not relevant, since it happened long ago. They may believe they are “over it.” They may not want you to know. They may feel you’ll perceive them as damaged, weak or shameful. They may believe that having that information will not make any positive difference in how you will care for them. - It is not necessary to be told by a woman that she has an abuse or trauma history in order to provide sensitive and effective care. While being able to discuss her history openly is helpful, she may not be at a point in her healing where this is possible. It is enough to recognize that she has some out-of-the-ordinary concerns or needs and to be willing to personalize care to take those into account. Whether or not she discloses her history, if she exhibits some of the signs mentioned in this article, ask yourself, “Would everything that I see, hear and feel with this woman make more sense if she were in fact a survivor of trauma or abuse?” If the answer is “Yes,” then you’ll understand her better and may find you have more empathy than if you saw her as merely needy, difficult, demanding or otherwise challenging. - If you ask a survivor during a relaxed prenatal discussion how she usually reacts when stressed, frightened or in pain, she may tell you that, among other things, she “checks out, dissociates, leaves her body,” or similar actions. Your next question might be, “How would you feel about doing that in labor?” Some survivors will say they want to remain in the present during labor (“I don’t want him, the perpetrator, ruining my birth experience!”), while others will say they need to be able to do that to protect themselves from becoming overwhelmed. Depending on her answer, you might explore ways to help her remain in the present (eye contact, hand-squeezing, having her talk to you, etc.) or ways that she and her partner may have already discovered to bring her back if she has “checked out,” or ways to keep her safe if she has dissociated and is not communicating. - Be sure you have a support system around yourself, as well as around your clients. Working with survivors is extremely rewarding, but can be draining. You need ways to manage your own stress and people who can give you a listening ear, empathy and reflection. - Be aware of the many ways that a history of trauma or abuse may affect a pregnant survivor (many of which are discussed in this article) and use the “Midwife’s Motto” to guide you if you feel tension or negativity in your relationship: “She has good reason for feeling this way, behaving this way, believing these things, and saying these things. I may be the target of her negative emotions at the moment, but I am not the cause.” The motto can keep you from becoming defensive or wrongly blamed. You’re more likely to use your more powerful position in a constructive and appropriate way and avoid being drawn into an unhealthy dynamic of guilt, resentment, co-dependency, bafflement, or hurt. - Use good communication skills. Learn to read between the lines and recognize when a question or statement may have a deeper emotional meaning that should be addressed. For example, if she asks, “How often do you do vaginal exams?” you may simply answer, “Not very often. Only when I need to.” If you then follow up with, “How are you with vaginal exams?” you may discover that she dreads them, which was the real reason she was asking. - Treat all her requests and preferences as valid, even if they seem unwise, inconvenient or unsafe. Find out what is behind her requests, then bring up your concerns. You can have a discussion between equals. Hold the intention of resolving differences with win-win results, while maintaining safety. This paper describes many of the ways early abuse or trauma may negatively affect the survivors’ later experiences with childbearing and offers some tips for midwives for providing sensitive and effective care and support. This work can be extremely rewarding, especially when a survivor gains confidence and self-esteem through her childbearing experience. In fact, when a woman identifies and voices her needs and then is cared for in a sensitive and respectful way, she learns good things about herself and finds empowerment in childbirth. Every woman deserves such thoughtful treatment and a good or great birth experience. For further information on ways to improve maternity care for abuse and trauma survivors, please read the following: Simkin, P., and P. Klaus. 2004. When Survivors Give Birth: Understanding and Healing the Effects of Early Sexual Abuse on Childbearing Women. Seattle: Classic Day Press (available from www.pennysimkin.com). Sperlich, M., and J. Seng. 2008. Survivor Moms: Women’s Stories of Birthing, Mothering, and Healing after Sexual Abuse. Eugene, Oregon: Motherbaby Press.
<urn:uuid:8422c261-7b1c-4558-babd-03620dc8f908>
CC-MAIN-2022-33
https://www.midwiferytoday.com/mt-articles/early-trauma-its-potential-impact-on-the-childbearing-woman-and-the-role-of-the-midwife/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00405.warc.gz
en
0.965732
3,967
3.40625
3
Black Panther could blow one of history’s greatest lies right out of the water. The movie creates the technically potent Black African city-state of Wakanda that has somehow evolved without being touched by colonialism. Fantasy, right? Well, yes, in its comic book inventions it is. But this misses the point about one of the most insidious effects of colonialism in Africa. The whole history of the continent has been rigged by Europeans to suggest that before the arrival of the white man Africans had been incapable of creating any semblance of modern urban civilization. So let’s get this straight: long, long before any of those colonialists turned up there were cities and civilizations built by Africans that, in the context of their time, were every bit as kick-ass smart as Wakanda. There’s a compelling irony in seeing a Marvel superhero collide directly with another fantasy, the remarkably durable Eurocentric view of world history in which the only legitimate origin of civilization is the one that began in the ancient east from the Nile to the “Fertile Crescent” bounded by the Tigris and Euphrates rivers. Many educators have yet to catch up with the truth. Maybe they don’t want to, or are not ready for the implications. But—thanks more to modern archaeologists than to white historians—we now know that there were great cities in Africa as early as 900 BC. Let’s begin with the elusive Nok Civilization. In 1928 some tin miners working in central Nigeria came upon some strikingly beautiful life-sized terra-cotta statues. Since then excavations have revealed a fully developed center of civilization, the realm of a people named the Noks, originating around nine centuries before Christ. At that time the civilizations of Egypt and Mesopotamia had already been around for several millennia. But the Noks were advanced enough to create, sui generis, a society governed by laws, just as 800 years earlier in Babylon the man regarded as the intellectual father of all judicial systems, Hammurabi, had established the basis of Assyrian judicial codes. With little evidence to go on, we have to assume that the Noks’ level of sophistication occurred independently among a people to whom the ancient east was just as unknown as West Africa was to the folks lounging around the hanging gardens of Babylon. The Noks thrived until around 200 AD and then, apparently, the whole society and culture just disappeared. Early history across the world is timelined with frequent disappearances that remain unexplained; this one, like others, could have been as a result of sudden climate change, in the form of drought, as a result of some kind of plague, or war. We will probably never know, but the millennium of the Noks spanned the time when Persia, Greece, and Rome built the first world empires and began the whole idea of conquest and colonization, spreading as far west as Ireland and as far east as India. What we do know—with much more detail—is that on the east coast of Africa from the 10th century onward, some of the most advanced city-states of the Middle Ages appeared, the equal of Venice in their impact on trade and culture. These were teeming cosmopolitan entrepots. Typical of them is Songo Mnara, a Swahili walled city built on an artificial island on the coast of southern Tanzania, now a World Heritage Site undergoing frequent archaeological exploration. A similar but larger city nearby, Kilwa Kisiwani, is as yet relatively unexplored. It’s now clear that these and other cities on the Indian Ocean were integrated with a world trading system using the Silk Route between Europe and China. African gold and ivory were exported and goods from Persia, Arabia, India, and China were imported. (The Chinese, who are smart about the lessons of history, are now busy re-building the Silk Route and through it expanding their trade with Africa.) The cities were Islamic sultanates with independent rulers and a shared language, Kiswahili, an offshoot of today’s Swahili. They were laid out like other Muslim trading centers with domed mosques (built of stone) and shaded courtyards. These courtyards functioned like a caravanserai, as both social centers and market places, full of exotic goods and life, part of a prosperous and diverse African culture. When archaeologists found these cities in the 20th century they were amazed that they hadn’t been disturbed by early 19th century European excavations—until it became apparent that their predecessors, blinded by racial stereotypes, thought they were too advanced in structure to be African and were simply more examples of what they already knew as Arab-built trading posts. Cities like these died off in the 16th century when the Europeans—first the Portuguese and then others—usurped the whole trading system and supplanted it with their own, building new and larger ports along the African littoral to speed up colonization. But perhaps the most spectral presence of a pre-colonial African city is Great Zimbabwe, near Lake Mutirikwe in present-day landlocked southern Zimbabwe. This site was discovered by the Portuguese in the 16th century, when the city and its culture had already become ruins, but never systematically explored until the late 19th century. Great Zimbabwe was founded and developed by the Shona people, from the 12th to the 15th century. At its prime it covered more than 1,780 acres and had a population of 18,000, and a grand palace occupied by the Shona kings. As the magnificence of the city dawned on the first generation of white settlers in the country they named Rhodesia, for the British entrepreneur Cecil Rhodes who first grabbed the territory, it became an embarrassing contradiction of their racist dogma that indigenous Africans would never have been capable of building and running a highly advanced urban civilization. As a result, continuing through to the last gasp of British colonial rule in the 1970s Greater Zimbabwe was written out of Rhodesian history. Disregarding the archaeological evidence, guidebooks, museums, and school textbooks were purged of any suggestion that some of the oldest and largest structures in Southern Africa, including the largest ancient structure south of the Sahara, could be the work of Africans. This practice reflected a deeply and widely held prejudice that gained a firm hold on the entire white world’s view of Africa and was sustained by white-dominated popular culture. Indeed, a whole body of literature grew out of the popular Victorian view of Africa as the Dark Continent, a virtually impenetrable place where it was impossible to imagine the existence of developed civilizations. The concept of Africa, a continent three times the size of Europe, as basically a vast, dark unknown (in which rivers are often the only perilous means of passage into and out of the interior, a trope that is explicit in many tales) was based not on its actual topography but on Europe’s lack of knowledge of it. For example, as late as 1978, the Encylopaedia Britannica was saying that “Although Africa was the first continent whose entire coastline was known, much of the interior remained unknown to the rest of the world until the nineteenth century.” This imagined landscape could be as specific as Joseph Conrad’s Heart of Darkness where the vulnerable white man disappears up the river into the mesmerizing embrace of the deep jungle or as absurd as Edgar Rice Burroughs’ version (circa 1912) where the virile young white man emerges from the same jungle as Tarzan having been saved and tutored in survivalism by primates. (In these narratives the line between apes and tribal savages is always thinly drawn, with the frenzied beat of African drums being the forewarning of evil afoot.) A popular 1930s example of the genre is a movie, Sanders of the River, based on a series of stories by Edgar Wallace (also the creator of King Kong). Sanders is a British colonial overlord, a district commissioner, portrayed as a relatively enlightened white man playing the adjudicator between inherently untrustworthy tribal kings. In the movie Paul Robeson agreed to appear as one of those chiefs, believing that it was a genuine attempt to show indigenous African culture. After filming Robeson discovered that the plot had been changed with a spin summed up in the dedication in the closing titles to “the handful of white men whose everyday work is an unsung saga of courage and efficiency.” Although Robeson disowned the movie, the Sanders stories remained popular through to the Britain of the 1950s when the BBC ran them as a drama series on radio and when Britain’s colonial role was still regarded as paternalistic. The persistence of this idea can seem chilling. As Emma Dabiri, a social historian and teaching fellow at the School of Oriental and Asian Studies in London, pointed out recently in the British magazine World Histories: “Hugh Trevor-Roper, the eminent Oxford professor of history, declared in 1962: ‘Perhaps in the future there will be some African history to teach. But at the present there is none—there is only the history of the Europeans in Africa. The rest is darkness… and darkness is not a subject of history.’” Nothing could better show the arrogance of the historical establishment toward African studies. The great crime they buried and wanted to stay buried was one in which their forbears participated. When the indigenous societies and cultures of the whole continent of Africa were largely reconfigured by European colonialism roughly 10,000 distinctively rooted and independent human ecosystems were bundled into 40 European-style “nations” often referred to as protectorates. Barring the actions of the Belgians, it was certainly not ethnic cleansing, but it was ethnic mayhem in which dignity, identity, and particularly history were shredded. As Emma Dabiri wrote: “Africa remains a prisoner of the lies told about its pre-colonial past, and of the legacy of its colonial history. The kidnapping of millions of able-bodied young people in their prime, the destruction of complex societal organization, the decimation of often egalitarian and socially just spiritual belief systems and philosophies—all these paved the way for fictitious states… any meaningful acknowledgement of this remains a long way off.” That is sadly true. There is a built-in lag in the time it takes to revise history with the benefit of new empirical evidence and to have it accepted in the curriculum, and an even longer time for attitudes to change enough to accept the truth. Even worse, bad history is the essential foundation of all bigotry, from white supremacy to Holocaust denial. Uncomfortably closer to home, bad history still corrupts the way America’s schools teach subjects like slavery and Native American history, where euphemisms and anodyne accounts mask atrocities and embedded racial prejudice. When a president of the United States can talk about sending Africans “back to their huts” it’s going to take a lot more than a Marvel superhero to get us to where we need to be.
<urn:uuid:50a3af08-4c1d-48ec-b1ee-52ddb549e285>
CC-MAIN-2022-33
https://www.thedailybeast.com/black-panther-and-the-real-lost-wakandas
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00605.warc.gz
en
0.969892
2,286
2.953125
3
Although ethics has been part of computer science for decades, its focus has been on methods of storage and security for traditional systems of record. Whilst these needs still exist in AI systems, we also need to factor in wider ethical influences as we build the future. Today, we’re evolving into systems of engagement, where end-users directly engage with AI systems in their day-to-day lives. When we make decisions that directly affect end users, we need to align those decisions with the moral constructs we live by. To do so, we must re-evaluate how we look at ethics in computer science—we’re no longer affecting just a person's data, but also the person themself. In fact, according to CloudFactory’s recent Ethics in AI survey of IT professionals in the U.K., 69% of IT leaders say that they encounter ethical issues often or all the time.1 By acting early and decisively, we can avoid the dystopian futures laid out in science fiction novels, where our lives are dictated by computers and humans have no social mobility. Ethics in supervised and unsupervised learning Ethics is based on three main principles: Truth, rightness, and sincerity. If a person is being truthful to the best of their knowledge, acting in line with the norms of the world in which they exist, and taking your personal world into account, you would say the person is acting ethically. But as soon as one of those elements is not true, they immediately flip to being unethical. To put it into context, imagine you've lost and ask someone for directions. You ask a person who appears to care about your personal situation; they’re courteous to you when they find out you’re lost. Then, unbeknownst to you, they give you the wrong directions to your location—on purpose. You'd say that person is unethical. They’re breaking the trust that people innately give to one another. The same is true of the systems we use. We can train an AI system to provide information in two ways: Supervised and unsupervised learning. With supervised learning, we partially de-risk ethical issues by creating checkpoints at which humans validate the outputs of the system. It doesn’t mean the system is perfect or even ethical though. With unsupervised learning, we can find ourselves self-reinforcing unethical logic. In the early days of unsupervised learning, there were a few now-quite-notorious examples of how systems using these methods got out of hand. One of the most prolific, and public, of those systems was Tay. Tay was a Twitter bot produced by Microsoft. It learned through its interactions with other platform users and quickly spiraled into spewing misogynistic, anti-Semitic, and hateful content on the platform. Microsoft wasn’t alone in this, though. IBM’s Waston had similar issues after learning of the Urban Dictionary; it had to be muzzled to reduce the same kind of unethical behavior. This doesn’t mean supervised learning is “better” than unsupervised learning. Other elements beyond training also play into the ethics of a system (or person) such as the source of data, how we check if the system (or we!) made the wrong decision and how we set goals for systems or ourselves. Goalsetting in ethically designed AI systems To tackle the first challenge of successfully applying ethics into an AI system, we need to think about goalsetting. At its most fundamental level, goalsetting is trying to maximize a goal within a set of defined parameters. Parameters might be real-world constraints, resources, or time, for example. Or they could be business-related, such as customer satisfaction, profitability, or cost. Without limiting parameters, we’re designing a utopian system, which in practice provides no useful value at all. Whilst you may not realize it, every time we humans make a decision, we’re aiming to maximize a goal based on the limitations in front of us. Most of these decisions we don’t consciously make; others, we do. It’s also worth noting that we don’t always manage to achieve the “best” outcome; sometimes we fail spectacularly even when we try. There have been far too many meetings where I’ve tried my best to arrive on time only to be foiled by public transport around London! Avoiding bias while training AI models The second challenge with training AI models is that it's incredibly easy to bias them. One of the principles of ethics is rightness, acting in line with the norms of the world. When you train a model, you’re defining the world it operates in, and if that world is not an accurate representation, the outputs of the model will seem odd, such as recommending you save more money than you earn in a year for retirement. Outputs can also be unethical, such as a hypothetical scenario in which you want to make sure no human is unhappy. One seemingly easy but unethical solution is to have no humans! To relate back to humans and how we perceive ethics, consider cases where highly isolated communities have been exposed to the modern world. The new world often deems their practices immoral simply because they’re different. We want to avoid this happening when a newly released AI system interacts with the world, and with users, for the first time. To make things even more challenging, sometimes bias is actually good for a system, such as when we don’t want to replicate the status quo. There have been cases in banking where certain minorities have had challenges accessing credit; building a system based on historical data is only going to replicate that issue. Meta (formerly Facebook) and ethics You might think we have years to sort out the issue of ethics and AI but, sadly, we do not. We’re facing real issues today, especially inside the big tech companies. It’s not all bad though; big tech has done some great things with AI and machine learning. For example, Meta, formerly Facebook, has been actively monitoring posts and assisting users with suicide prevention. Whilst they don’t publish statistics, any life Meta saves through this type of monitoring is valuable; we should applaud it. This also doesn’t mean Meta is perfect. They are, in fact, far from it. As I’m sure you’re aware, Meta makes money by delivering ads to users. Meta users have become the product they’re selling. If you’re using Meta as a business, you may want to pay them to deliver ads to their user base. Meta’s Business Help Center is the main resource for advertiser information. They define the goal of their machine learning ads-matching system like this: “...[to help] each advertiser meet their goals at the lowest cost, the delivery system uses machine learning to improve each ad's performance.” If you take their words at face value, it seems that Meta is trying to provide the best value for their customers—organizations that want to advertise on the platform. But the reality may well be different. There have been reports that this goal may actually be causing a rise in the hateful and decisive advertising being shown across the platform. As you would expect, Meta has denied this. Without further information, we can’t say who, if anyone, is at fault. But it does serve as a cautionary tale that even large companies experienced with AI run the risk of creating systems that don’t always perform ethically. Seek guidance when designing ethical AI systems There are no silver bullets for designing an ethical AI system. In fact, our survey revealed that 64% of IT leaders think AI systems will be fundamentally biased.2 Governments, enterprises, and not-for-profits provide the guidance you can use as a basis for designing an ethical AI system. My recommendation is to start with a group like the Alan Turing Institute, which has made a good start teaching the world how to build ethical AI systems with Project ExplAIn. But no guidance is perfect, especially when you’re communicating across borders. Whereas the developed world predominantly conforms to the same ethical values, nuanced differences still exist between countries. Even in Europe, norms can change within a few hundred miles, as is the case with France, Benelux, and Germany, which weigh the importance of values differently and even have different values themselves. That’s why it’s important to keep in mind the audience for your system. Having a single ubiquitous system and model across borders may not be suitable; you may instead want to train separate models to suit local customs and ethics. Conclusion: Steps to building a successful, ethical AI system What’s the best course of action if you’re designing or overseeing the design of an AI system? The first step is to look into ethical frameworks you can use to help guide you. Consider Project ExplAIn, Google’s Responsible AI framework, or the EU’s proposed legal framework for AI development. By aligning to a framework, you’ll have a process and structure to follow, as well as a method of accountability for the model. The next step is to think critically about goalsetting. Look at the strictest way to apply your goals while removing yourself from the typical social constraints you work within in your daily life. This may feel uncomfortable, as you may have to go against what you think the “right” answer is, for example, setting a goal to maximize loan repayability might be discriminatory against minorities. The final, and possibly most challenging, step is to realize that failure is inevitable. It’s not about if you fail, but when—and how you react when you do. Allowing for human override and maintaining continual development are keys to building a successful and ethical AI system. In my next post in this Ethics of AI series, I’ll discuss the ethical sourcing of training data, a hot-button topic that delves into copyright and fair use, identifiable and unidentifiable people, data obfuscation, edge cases, and over-representation. If you’d like to learn more about creating an ethical AI system, and how CloudFactory can help with those efforts, please contact us. 1 CloudFactory’s Ethics in AI Survey, with 150 respondents, was conducted by Arlington Research in March 2022. 2 CloudFactory Ethics in AI Survey.
<urn:uuid:ff9b7f8b-7f3e-4034-a818-8d3c64dc1668>
CC-MAIN-2022-33
https://blog.cloudfactory.com/ethics-of-ai?utm_campaign=EMEA%20%7C%20Events&utm_content=211541423&utm_medium=social&utm_source=twitter&hss_channel=tw-193168799
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572898.29/warc/CC-MAIN-20220817092402-20220817122402-00605.warc.gz
en
0.955896
2,189
3.359375
3
The Anatomy of a Digital Investigation This chapter will deal with the structural aspects that are common to most, if not all, digital investigations. Most current texts on the subject refer to a common investigation model, although there is some disagreement on how many components make up the model. This book will use a six-part model, which will be covered in more detail later in this chapter. It is essential to understand at the outset precisely what the scope of the investigation entails. The type of investigation dictates the level of authorization required. Generally, there are three types of investigation. Internal investigations are sponsored by an organization. They generally start out as a deep, dark secret that the company doesn’t want getting out. Therefore, courts and state and federal agencies are rarely involved at the outset. The other two types—civil and criminal—both require involvement by the courts, but on different levels. There will never be an investigation that does not have multiple stakeholders. In all court cases, there is the plaintiff and the defendant. In civil cases, these are the two litigants asking the courts to settle a dispute. In criminal cases, the defendant is the person accused of a crime and the plaintiff is the one making the accusation, which will always be some level of government authority. In addition to these obvious players, there are those on the sidelines whose interests must be considered. Lawyers will almost always be involved, and in cases that are likely to end up in court, be assured that the judge will take an active interest. With people’s finances, freedom, or even lives at stake, the necessity for accurate and thorough reporting cannot be emphasized enough. It is so critically important that the subject of documentation will be discussed several times and in several places in this book. This chapter will start the reader off with the basics of good documentation. Please be aware that this chapter deals only with the process of investigation. In Chapters 2 and 3, there will be detailed discussions of the various legal issues that the digital investigator must face on a daily basis. Consider the legal issues to be the glue that binds the model, but not the actual model. You can perform any number of investigations with no regard for the law. The results will be very revealing, but useless. Failure to be aware of legal aspects will cause the most perfectly executed investigation to fall apart the instant the case is picked up by the legal team. A Basic Model for Investigators Today’s teaching methods require everything to be broken down into a simplified structure that you can put into a diagram. Computer investigations are no different. Even though there will probably never be any two cases that are identical, they should always be processed in accordance with a standard investigative model. Kruse and Heiser (2001) laid out the basic computer investigation model in their book entitled Computer Forensics: Incident Response Essentials. Their model was a four-part model with the following steps: As shown in Figure 1.1, the four steps are further broken down into more granular levels that represent processes that occur within each step. A more thorough study expands the model to six steps, as follows: Figure 1.1 The steps of a digital investigation The six-step model (Casey 2001) as seen in Figure 1.1 emphasizes the importance (and process) of preserving the data. It also distinguishes between the process of examination and analysis, whereas Kruse and Heiser considered them to be two parts of a single process. Experience has shown that acquisition and preservation are not the same, and while it might be an easy enough procedure to extract and examine data, accurate analysis is as much an art as it is a science. From a management standpoint, each of these steps must be carefully monitored. Through a process of careful documentation of the history of each case, the various processes can be constantly reassessed for efficiency and reliability. When it becomes necessary, knowing what works and what doesn’t allows the observant manager to tweak the steps in order to improve organizational effectiveness. Figure 1.1 emphasizes just how detailed these seemingly simple steps can actually be. The assessment phase alone has a multitude of steps involving people, hardware, environment factors, political implications, and jurisdiction. Acquisition of evidence cannot begin until all potential sources of evidentiary material are identified, collected, inventoried, and catalogued. All of this must be done according to strict legal guidelines, or any subsequent investigation will be a waste of time. Legal and internal regulations regarding privacy must be followed at all times, or any information collected will not be admissible as evidence should the case ever make its way to court. In the case of internal investigations, adherence to corporate guidelines will generally be sufficient. Before beginning any investigation, the general rules of engagement must be established in advance and from the very start be strictly followed. Those rules can be very different between criminal and civil cases. It is essential that the investigator know what regulations apply to a specific investigation in order to not damage or destroy a case by failure to abide, either flagrantly or inadvertently. In a criminal investigation, it is almost always necessary to obtain a warrant before seizing systems, media, or storage devices. In order to obtain that warrant, the investigating entity must provide a judge sufficient evidence that a crime has been committed, is about to be committed, or is in the process of commission. The specific type of information sought by the investigation must be identified; general fishing expeditions are never approved by a reputable judge—at least not for the purpose of issuing warrants. Civil cases have more lenient guidelines. Internal investigations sponsored by an organization can be even more lenient. Federal guidelines regarding invasion of privacy are not as strictly enforced on civilian investigators looking into civil infractions as they are on agents of a government—state, federal, or local—who are investigating criminal complaints. Internal investigations can be made even easier when employees or members have signed a statement outlining an organization’s policies and guidelines. No case should be accepted by an investigator directly. An executive-level decision, based on a set of predefined guidelines (to be discussed later), must be made on whether to accept or decline each individual case presented to the organization. While it falls upon a law enforcement agency to accept any case assigned that involves violation of state or federal statutes, a private organization can refuse to accept cases for a variety of reasons. The organization’s leadership must indentify the criteria for case acceptance and stick to those criteria. It does the company’s reputation no good to be associated with a pedophile after publicly stating that its motives are to defend the community. Make a list of all legal documentation that will be required. Warrants will be required in criminal cases. Court orders or subpoenas will be needed in civil matters. Signed agreements outlining the scope of the investigation should be required in all internal investigations. Once the ground rules are established, it is time to identify potential sources of evidence. The obvious place to look is on the local system, including hard disk drives, removable media that might be lying about, printers, digital cameras, and so forth. Less obvious sources of information might be PDAs, external hard disks or optical drives, and even system RAM if the data processing systems are still running when the incident is reported. Knowing in advance what must be acquired can prevent the investigator from making critical errors during the process of acquisition. This is the most technical part of the investigation and can also be the most critical time for making errors. If the case under scrutiny should ever come to trial, the investigator presenting the case must be able to prove the following: - The data is authentic. - The copy of the data used for analysis is reliable. - The data was not modified during acquisition or analysis (chain of custody). - The tools used to analyze the data are valid tools. - Sufficient evidence, both incriminating and exculpatory, has been acquired and analyzed to support the proffered conclusion. - The conclusions drawn are consistent with the data collected and analyzed. - People involved in the collection and analysis of the data are properly trained and qualified to do their job. This doesn’t sound easy, and it isn’t. Details on how to assure that all of these requirements are met are covered in greater detail in later chapters. For now, suffice it to say that it is essential that they be fulfilled. A cardinal rule of digital investigation is that the original data must never be touched. For many years, the standard rule has been that a forensically sound copy of the original be made and that the examination and analysis of data be performed on the forensic copy. In terms of nonvolatile media, such as hard disks, removable media, and optical disks, this is still the rule. Devices should always be mounted as read-only in order to assure that no data is modified or overwritten during the process of mounting the device. Hard disk duplicators are designed specifically for this purpose, and in Windows systems, a simple modification of the registry allows USB devices to mount read-only. Legal issues might arise if there is any possibility that media used to store images may have been contaminated. Be aware of that possibility and either have new media available for collection or be certain that previously used media has been forensically wiped. In many cases, it becomes essential that copies of data be acquired through a process of live acquisition. This is the case when it becomes necessary to capture the contents of memory from a running system, to acquire log files from network devices that cannot be brought down, or to archive information from network servers or storage appliances that defy the making of a forensic copy. If it is not possible, for any reason, to create a forensically sound copy, it is essential that the investigator document the reasons such a copy could not be made and record as accurately as possible the state of the evidentiary source before and after acquisition. Storage of preserved information becomes part of the chain of custody process, and care must be taken that all data and devices collected during this phase are properly documented and tracked. Be able to verify that there was never a possibility for evidence to become tainted through outside tampering, corruption, or improper procedure. The process of examining data increases in scope and complexity every year. Whereas 1.44MB floppy disks were once the repository for stolen and illicit data, investigators these days are presented with flash drives the size of key fobs that hold 64 or more gigabytes of data and hard disks that store in excess of a terabyte. To make matters worse, the data is not likely to sit on a porch swing in plain view for anyone to see. Investigators will find it necessary to look for evidence in unallocated space left behind by deleted files. Hidden partitions, slack space, and even registry entries are capable of hiding large quantities of data. Steganography can hide documents inside of an image or music file. So essentially, the investigator is given an archive the size of the Chicago Public Library and asked to find a handwritten note on the back of a napkin tucked somewhere inside of a book. Data carving tools and methods of looking for evidentiary material have evolved, and depending on the nature of the case, the investigator’s tool kit will require having several utilities. For criminal cases requiring forensically sound presentation, it is critical that the tools used to examine data be those considered valid by the courts. There are a few commercially available software suites approved for evidentiary use. Among these are Encase by Guidance Software and the Forensics Tool Kit (FTK) from Access Data Corporation. A suite of tools running on Linux that is not “officially” sanctioned but is generally considered acceptable by most courts is The Sleuth Kit, designed by Brian Carrier. Keeping up with technical innovations in the industry is most critical in this area. As new technology emerges, new tools will be needed to examine the accumulated data it creates. The organization that follows the cutting edge of technology will always be two steps behind those that help develop it. The balancing act comes when management must defend the use of a new tool to which the courts and lawyers have not yet been exposed. Be prepared to defend the tool along with the conclusions it helped you formulate. Here is where the process of digital forensic investigation leaves the realm of technology and enters that of black magic. It is up to the investigator to determine what constitutes evidence and what constitutes digital clutter. A variety of tools exist that assist the investigator in separating OS files from user data files. Others assist in identifying and locating specific types of files. Technique is as critical as the selection of tools. For example, when searching an e-mail archive for messages related to a specific case, string searches can bring up all those that contain specific keywords. Other utilities can detect steganography or alternate data streams in NTFS file systems. Collecting the data necessary to prove a case becomes as much art as it is science. One thing that the investigator must always keep in mind is that exculpatory evidence must be considered as strongly as incriminating evidence. Documentation of the project begins the minute an investigator is approached with a potential case. Every step of the process must be thoroughly documented to include what people are involved (who reported what, who might be potential suspects, potential witnesses, or possible sources of help), as well as thorough documentation of the scene, including photographs of the environment and anything that might be showing on computer monitors. Each step taken by the investigator needs to be recorded, defining what was done, why it was done, how it was done, and what results were obtained. Hash files of data sources must be generated before and after acquisition. Any differences must be documented and explained. Conclusions drawn by the investigating team must be fully explained. On the witness stand, it is likely that an investigator will be required to prove his or her qualifications to act as an investigator. A meticulously investigated case can be destroyed by inadequate documentation. While commercial forensic suites automate much of the documentation process, there is still much manual attention required of the investigator.
<urn:uuid:ee8b5456-ad2f-4891-876b-19b28fb5414e>
CC-MAIN-2022-33
https://www.informit.com/articles/article.aspx?p=2129764&amp;seqNum=4
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00405.warc.gz
en
0.948217
2,933
2.671875
3
There are many things you need to know about our planet, so if you’re making essays about Earth, you can read these sample essays and topic ideas. The planet Earth is where we, humans, and other living creatures live. It also provides us with all the necessities we need – air to breathe, water to drink, and soil to grow fruits and vegetables. Without its natural resources, life would be impossible for all of us. Writing an essay about Earth can help give knowledge and spread awareness about climate change or look at the beauty of our planet. If you are writing an essay about the Earth, here are some essay examples and topic ideas to help you get started. Tip: If you want to use the latest grammar software, read our guide to using an AI grammar checker. $30 per month $79 per year $20 per month - 1. Short Essay On The Structure Of Planet Earth By Shyam Soni - 2. Interest and Concern About the Fate of The Earth By John Olson - 3. Our Planet in Danger By Derrick Wells - 4. A Planet without Trees: A Nightmare or Our Future? By Shannon Cain - 5. The Possibility of an Asteroid Falling to Earth By Lewis Rios - 6. Save Earth Before Colonizing Mars By Luz Estrada - 7. My Earth, My Responsibility By Poonam Ghimire - Topic Idea Essays About Earth - 1. Are There More Planets Like Earth? - 2. How Has The Earth’s Surface Changed Over The Years? - 3. Causes And Effects Of Global Warming - 4. Does Planting Trees And Reforestation Help Limit Global Warming? - 5. How Does Population Growth Affect Earth’s Climate Change? - 6. Human Impacts On The Planet Earth - 7. How Did The Planet Earth Form? 1. Short Essay On The Structure Of Planet Earth By Shyam Soni “Direct observation of the interior of the Earth is not possible as the interior becomes hotter with depth which is convincingly indicated by the volcanic eruptions. Apart from the seismological studies, other important sources of data, even though indirect, logically prove that the Earth’s body comprises several layers, which are like shells resting one above the other. These layers are distinguished by their physical and chemical properties, particularly, their thickness, depth, density, temperature, metallic content, and rocks.” Author Shyam Soni discusses some essential facts about the structure of the planet Earth. This essay focuses on its layered structure and the differences in the density and temperature at different depths. 2. Interest and Concern About the Fate of The Earth By John Olson “I have found myself increasingly interested and concerned with the fate of the Earth and the way humankind views sustainability. In my perspective, many humans believe that Earth’s materials and resources are infinite, they will always be there to feed and maintain human life. The Earth will endlessly support and provide for the needs of the humans that inhabit it. Yet, that is just simply not true, as the human population grows we use more and more of the natural resources Earth provides.” Author John Olson shares his point of view about the Earth’s “infinite” resources and its sustainability. However, Olson tells us that it may not be as unlimited as we think because of the rapid growth of the human population. 3. Our Planet in Danger By Derrick Wells “Since the beginning of the Industrial Revolution in the 18th century that started in England, the people during those times were already writing down the blueprint for a problem that the succeeding generations will have to face – the increasing problem of Carbon Dioxide emissions in our atmosphere. Carbon dioxide (CO2) is released in tons, millions of tons every day in every country – released from various factories and cars most especially. This buildup of toxic gases such as the carbon dioxide heats up our planet thereby increasing the possibility, and the danger of global warming – this is what we call the greenhouse effect.” Author Derrick Wells talks about one of the environmental problems we are facing today – the Greenhouse Effect and the actions that we could take to save our planet Earth from the danger it can pose. 4. A Planet without Trees: A Nightmare or Our Future? By Shannon Cain “Can we imagine a world without trees? What a world without trees would look like? Could such a world even exist? Let us close our eyes, and try to imagine a desolate Earth. Imagine no more paper, and everyone would have to resort to some other source or maybe technology could help, but that is, if anyone was left at that time. Trees are an important factor to our existence not only because they produce paper, lumber, or chewing gum, but due to the fact that they serve an important role in the carbon cycle, they are the key to our very existence! Due to the ever increasing population, that seemingly distant future is getting near each passing day.” Author Shannon Cain shares his thought about a planet without trees, telling us what it would be like and what we can do to prevent it from happening to our home planet – the Earth. 5. The Possibility of an Asteroid Falling to Earth By Lewis Rios “Jonathan Haidt gave a speech about the possibility of an asteroid falling on Earth and asked the audience what people could do to stop them. Haidt notes that if an asteroid threatens to destroy the Earth, people will forget about their differences and stand together to fight for their survival. This is what he refers a common ground in the midst of a crisis. Haidt’s video shows us the many problems that people are facing, but yet people cannot find a common ground to fight them while the issues are threatening all of us.” Author Lewis Rios talks about the possibility of an asteroid falling on Earth and then relates it to some common problems we are facing right now. Such as poverty, which tells us that we should all cooperate and work together to find a solution to these threats to survive. 6. Save Earth Before Colonizing Mars By Luz Estrada “Has humanity irreversibly defaced Earth from being a sustainable planet for further centuries? Many would believe that humanity has come to a point of constant destruction of Earth with no hope for change. This thought process has come forth with the resolution of starting a new sustainable planet on Mars. However, it is tremendously more challenging to restart than to fix damage and change simplistic daily routines.” Author Luz Estrada shares her opinion about the plan of starting a new sustainable planet on Mars. Estrada shares with the readers that it is much easier to save and fix Earth – as it is now – rather than thinking of starting a new life on a different planet, which is impossible for most people. 7. My Earth, My Responsibility By Poonam Ghimire “Earth is a beautiful living planet in the Universe and the common habitat of more than 7 billion human population and millions of species of biodiversity. Our Earth provides us with food, shelter, and most of our requirements. Despite unavoidable free services provided by the earth to humans, we are not able to pay off her kindness to us. Rather we humans are being cruel to our Earth with our selfish activities.” Author Poonam Ghimire talks about the selfish acts that cause Earth’s slow destruction. Ghimire encourages the readers to be responsible enough to protect and preserve our planet for the next generations. Topic Idea Essays About Earth 1. Are There More Planets Like Earth? Earth, our home, is the only planet known to support life, although there are current missions determining Mars’ past and future potential for life. While scientists continue to look for signs of life elsewhere in the universe, Earth remains the only place where we’ve ever identified living creatures. If you are writing an essay about the Earth, you can use this topic idea to discuss some Earth-like planets discovered so far. 2. How Has The Earth’s Surface Changed Over The Years? The planet Earth has not always looked the same way it looks today; the United States, a billion years ago, was in a completely different location compared to where it is today! So, how does this happen? Why does this happen? In your essay about the Earth, you can use this topic idea to give the readers some understanding of how our planet has changed over time – like the things that took place and are still taking place. 3. Causes And Effects Of Global Warming Recent global warming is mainly because of human actions, which involve releasing greenhouse gases into the atmosphere. An increase in greenhouse gases leads to a more significant greenhouse effect, which results in increased global warming. Global warming is also being felt everywhere – drought, heatwaves, melting glaciers, rising sea levels, and storms. If you are writing an essay about the Earth, you can discuss this topic in more detail to spread awareness to your readers out there. 4. Does Planting Trees And Reforestation Help Limit Global Warming? Planting more trees is one of the most effective ways to lessen atmospheric carbon dioxide (CO2) and stop global warming. As the forests grow, they remove the carbon dioxide from the air through photosynthesis, which works as a natural reservoir to store carbon. Reforestation, one of the planned projects worldwide, is thought to help protect the environment for the next generations. You can use this topic idea for your essay about the Earth to encourage your readers to plant more trees to reduce the harmful effects of deforestation and save our home planet, Earth, from getting slowly destroyed. 5. How Does Population Growth Affect Earth’s Climate Change? Since humans require fossil fuels to power their increasingly mechanized lifestyles, human population growth is undoubtedly a significant contributor to global warming. More people mean more demand for oil, gas, coal, and other underground fuels that, when burned, release enough carbon dioxide (CO2) into the atmosphere to trap warm air inside like a greenhouse. So, in your essay about the Earth, let your readers know to what extent human population growth affects climate change and what can be done about it. 6. Human Impacts On The Planet Earth Humans affect the planet Earth in many ways – overpopulation, pollution, burning fossil fuels, and deforestation. These things have caused global warming, soil erosion, poor air quality, and non-potable water. In your essay about the Earth, you can detail these negative impacts and how they can affect us, humans. 7. How Did The Planet Earth Form? The planet Earth’s formation remains a bizarre, scientific mystery. This is because we live on a planet in a solar system with seven other planets, and thousands of exoplanets have been discovered so far. However, the formation of planets like Earth is still a hotly debated topic. So, currently, there are only 2 leading theories about planetary formation – in your essay about the earth, look into this topic in more detail to share some exciting facts about the Earth with your readers. If you’re stuck picking your next essay topic, check out our guide on how to write a diverse essay. If you’re still stuck, check out our general resource of essay writing topics. Join over 15,000 writers today Get a FREE book of writing prompts and learn how to make more money from your writing.
<urn:uuid:d9cc7597-1be5-45bd-86f3-349a906435f7>
CC-MAIN-2022-33
https://becomeawritertoday.com/essays-about-earth/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00004.warc.gz
en
0.928461
2,417
2.578125
3
On Jan. 14,protestersgathered within the northern Indian city of Allahabad and lit candles on the bottom of a tree trunk, beside portraits of two fathers of the Indian nation. One, Mohandas Karamchand Gandhi—higher identified by his honorific, Mahatma (huge soul)—is recognizable because the Indian independence activist and icon to smooth protesters around the sphere. The varied, on the opposite hand, stays lesser identified outside India. He’s Bhimrao Ramji Ambedkar, the predominant author of the Indian structure, which got here into form 70 years ago on Sunday. Since December, his image has been held aloft by crowds of demonstrators, who snortthe ruling Bharatiya Janata Occasion’s makes an try to reform citizenship rulesundermine that structure. Ambedkar did bigger than draft the structure: he became as soon as moreover a revered civil rights chief. Born aDalit(a social classification formerly called “untouchable,” the lowest build within the Hindu caste procedure,) he suffered discrimination in the end of his lifestyles. In 1936, he wrote the influential pamphletAnnihilation of Caste, a blistering argument in opposition to the habitual procedure of social stratification. And when, beginning in 1947, he hammered out the Indian structure’s integral ideas of democracy, equality and freedom of faith, he moreover inserted sections prohibiting caste-basically based mostly discrimination and legally outlawing the be conscious of untouchability. But 70 years after theIndian structuregot here into force, left-hover protesters aren’t the totally group claiming to be the ideological heirs to Ambedkar. In recent weeks, his image has moreover appeared atHindu nationalistcounter-protests. Prime MinisterNarendra Modiin overall invokes Ambedkar in speeches, claiming his government’s insurance policies further the targets Ambedkar pursued in the end of his lifestyles, including the annihilation of caste. “No government has, probably, given admire to Babasaheb [Ambedkar] the potential our government has,” Prime Minister Modi acknowledged in 2018, relating to him by an honorific loosely translated as “revered father.” “As one more of dragging him into politics, we must aloof all strive to dash on the path he has confirmed us.” The last 40 years, on the opposite hand, notify how Ambedkar has been over and over dragged into the political arena — even while the casteless future he fought for all over his lifestyles stays a ways away. Here’s what to learn about the fight over Ambedkar’s legacy. Who became as soon as B.R. Ambedkar? Ambedkar became as soon as born in 1891 valid into a family that had lengthy been sure to the underside of Indian society, regarded as impure by elevated-caste Hindus. Even supposing he and various Dalits were segregated at faculty, he managed to stir his exams, fabricate a diploma in economics and political science from Bombay College, and went on to secure a Masters at Columbia College in Unique York sooner than coaching as a criminal authentic in London. In 1936, after returning to India, he wroteAnnihilation of Caste, his magnum opus. Written all around the fight that one way or the other ended in India’s independence in 1947,Annihilation of Castebecame as soon as a searing critique of now not genuine the age-veteran caste procedure (aloof seen this day by many Hindus in India), nevertheless moreover the independence lag led by Gandhi and Jawaharlal Nehru, both high-caste Hindus. Ambedkar argued that even though India were to turn out to be self sustaining, Dalits would aloof languish on the underside of society unless caste became as soon as abandoned by all. “The ask of whether or now not the Congress is fighting for freedom has very shrimp importance as when compared to the ask for whose freedom is the Congress fighting,” he acknowledged. Fetch The Brief.Register to receive the discontinuance tales it is a ways a must-must know correct now. To your security, we enjoy despatched a affirmation electronic mail to the take care of you entered. Click the hyperlink to confirm your subscription and commence up receiving our newsletters. Must you fill now not secure the affirmation within 10 minutes, please check your spam folder. Before his loss of life in 1956, Ambedkar converted from Hinduism to Buddhism, difficult hundreds of Dalits to total the identical. “I had the ache of being born with the stigma of an Untouchable,” he acknowledged. “Nonetheless, it is a ways now not my fault; nevertheless I is now not going to die a Hindu, for here’s in my energy.” What is caste? The caste procedure in India is a create of social hierarchy deriving from thevarnaprocedure specified by Hinduism’s foundational texts. There are fourvarnas: Brahmins (monks), the top; Kshatriyas (soldiers or directors); Vaishyas (retailers); and Shudras (servants), the lowest. Exterior thevarnaprocedure are these regarded as decrease aloof: Dalits, whose frail tasks includeshoveling human manure. Dalits—who assign up bigger than 200 million of India’s 1.3 billion inhabitants—proceed to face discrimination in India this day. Some people of elevated castes refuse to contact anything else that has come into bodily contact with them, hence the moniker “untouchables.” The Mahars, the actual Dalit caste to which Ambedkar belonged, were anticipated to tie brooms around their waists to sweep away their footprints. Even in 1998, nearly about 90% of of us employed by the Indian government as “sweepers,” whose jobs include inserting off human atomize from toilets, were Dalits. In Ambedkar’s day,genuine as in recent-day India, murders of decrease castes by elevated castes were overall. “Untouchability is now not a straight forward topic,” Ambedkar acknowledged in a speech in 1927. “It is the mum of all our poverty and lowliness and it has brought us to the abject philosophize we are in this day… The inequality inherent within the four-castes procedure must be rooted out.” Why are each and every facet claiming Ambedkar’s legacy? The fight over Ambedkar’s legacy between India’s Hindu nationalist correct-hover and its secular left is moderately current, in step with historians and anti-caste activists. “The BJP’s discovery of Ambedkar is recent, and started after the election which brought Modi to energy in 2014,” says Sumantra Bose, professor of worldwide and comparative politics on the London College of Economics. “Following that victory, Modi and his chief strategist Amit Shah targeting wooing non-upper caste Hindus, who enjoy traditionally now not been BJP supporters in gorgeous numbers, in expose to elongate their give a get rid of to base.” Dalits, says Bose, are a natural target for the BJP because they assign up roughly one sixth of the Indian voters. “It’s a transparent case of attempting to superficially flatter the memory of the supreme Dalit icon in expose to secure a pan-Hindu vote monetary institution all over caste divides.” The BJP promised in its 2014 manifesto to eradicate the closing vestiges of untouchability in Indian society and get rid of Dalits from poverty. But the BJP government has diminished funding for packages supposed to total so, in step with a look for by Sukhadeo Thorat, dilapidated chairman of the Indian Institute of Dalit Review. “They never raised the usual of these castes,” Thorat tells TIME. “That is the total technique light by the Prime Minister, that you acceptable an particular person, neglect about his views and beliefs, and within the system assassinate that ideology.” In some technicalities of the structure, on the opposite hand, Hindu nationalists argue they’re in closer alignment with Ambedkar’s beliefs than secular protesters. The BJP acknowledged in 2019 that Ambedkar antagonisticArticle 370, the half of the structure guaranteeing semi-autonomy to Jammu and Kashmir, whichthe BJP revoked in August. Historians, on the opposite hand, enjoydisputedthat notify. The BJP moreover says Ambedkar became as soon as a proponent of a “uniform civil code” in India, one of the occasion’s key protection targets. Below India’s version of secularism, various non secular communities are dominated by various “non-public rules” governing matters like divorce and inheritance. Ambedkar inserted a clause into the structure calling for a uniform civil code. But within the febrile climate after independence, with non secular violence on the upward push, Nehru determined to compromise and permit for non-public rules to reassure the Muslim minority group. So as one more, Ambedkar diverted his attention to reforming the Hindu non-public rules to be extra revolutionary. His reforms legalized inter-caste marriages and gave women folks the actual to provoke divorce. In making these reforms, Ambedkar’s predominant opponent became as soon as the Hindu nationalist correct. This day, the BJP says Ambedkar would were their ally in their pursuit of a uniform civil code. But Dalit activists snort here’s one other case of attempting to suitable of Ambedkar’s legacy. “If uniformity is what [the BJP] need, there’s no uniformity among Hindus,” says S. Anand, relating to persevered caste hierarchy in India this day. Anand, the co-founding father of Navayana, a Delhi-basically based mostly publishing home fascinated by anti-caste literature, provides: “Ambedkar never spoke of a uniform civil code as a priority.” A BJP supporter holds up an image of B.R Ambedkar all over a rally for Indian Prime Minister Narendra Modi on December 22, 2019 in Unique Delhi, India. Sanchit Khanna/Hindustan Instances by potential of Getty Photography—2019 Hindustan Instances One more explanation for the BJP’s adoption of Ambedkar’s legacy is that Hindu nationalism’s enjoy political forefathers enjoya shaded history of idolizing European fascist leaderslike Adolf Hitler and Benito Mussolini. Given this history, Ambedkar is a necessary exchange icon for the BJP, experts snort. “Every person wants a fraction of Ambedkar,” says Anand. “Modi doesn’t stir around saying that every one these of us that admired Hitler and Mussolini are his idols. He’s muted about it for diplomatic reasons and political reasons.” What about Ambedkar’s role within the anti-government protests? Fragment of the cause protesters are carrying Ambedkar’s image is to “scenario the appropriation of Ambedkar being tried by the BJP,” Bose says. “Ambedkar became as soon as one of the framers of the Indian structure, whose upholding of equal citizenship is at odds with the Modi-Shah agenda of a Hindu nationalist republic.” But experts snort Ambedkar’s lifestyles has been appropriated by the left-leaning Congress Occasion, too, despite his role in drafting the structure for the put up-independence Congress government. “He fought with Gandhi, but he selected to work with Congress because he essential to be generous to Indian society,” Anand says. “It became as soon as a huge act of magnanimity that he determined to chair the drafting committee of the Indian structure.” Bose agrees. “Great of this Ambedkar-like by the BJP government’s opponents is shallow, and uninformed about the complexity of Ambedkar’s personality and political lifestyles,” he says. Within the discontinuance, Ambedkar became as soon as sad with the closing version of the structure, and resigned in 1951 after clashing with Nehru, India’s first put up-independence Prime Minister. “He became as soon as [unhappy with the constitution] simply because he idea these of us would squander it,” says Anand. The recent controversy over the BJP’s alleged undermining of the Indian structure, Anand says, vindicates that survey. “Ambedkar says the structure is as valid because the of us that are going to enforce it,” says Anand. “It’s now not foolproof.” Is the fight over Ambedkar’s legacy a brand current one? Fairly talking, yes. The supreme to notify Ambedkar’s legacy would perchance moreover be hotly fought-over this day, nevertheless sooner than the 1970s, a host of his writings had never been printed, and he became as soon as a shrimp bit-identified figure in Indian political history. It became as soon as thanks to Dalit activists — in build of supporters of the structure, or Hindu nationalists — that Ambedkar became as soon as now not consigned to the ash heap of history, says Anand, whose publishing home Navayana prints quite so a lot of works by and about Ambedkar. “It’s totally within the late 70s, early 80s, that Ambedkar begins getting printed,” Anand says. “They were in manuscripts which he didn’t enjoy the money to submit. He became as soon as now not on hand to the general public, and no-one various than the Dalits were queer. They, the Dalits, carried his legacy on their heads and shoulders for years.” Strictly talking, Anand says, both all americans and no-one has the actual to notify the legacy of Ambedkar. “Every person, because each and every citizen of India is now equal attributable to Ambedkar and the structure,” he says. “And no-one, simply for the reason that valid legacy of Ambedkar is something few of us are attempting to chat about.” Write toBilly Perrigo email@example.com.
<urn:uuid:f0da0e1a-e25d-475e-a757-05df7e8020bc>
CC-MAIN-2022-33
https://interinfobank.com/2020/01/25/%D0%B2-%D1%82%D0%BE-%D0%B2%D1%80%D0%B5%D0%BC%D1%8F-%D0%BA%D0%B0%D0%BA-%D0%BA%D0%BE%D0%BD%D1%81%D1%82%D0%B8%D1%82%D1%83%D1%86%D0%B8%D0%B8-%D0%B8%D0%BD%D0%B4%D0%B8%D0%B8-%D0%B8%D1%81%D0%BF%D0%BE%D0%BB/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570730.59/warc/CC-MAIN-20220807211157-20220808001157-00606.warc.gz
en
0.953531
3,091
2.65625
3
For a course in secure development that I am teaching, I recently outlined some of the different ways available to implement authentication in .NET-aplications. The purpose was mainly to highlight the different types of data that cross the wire (and which endpoints are part of the interaction), so that developers are just a little more aware of the risks involved in each authentication method, and the ways to mitigate those risks. The first two authentication methods, Forms Authentication and NTLM, can be labeled direct authentication, as opposed to brokered authentication (below). ‘Direct’ here refers to the fact that the client only interacts directly with the server during the authentication handshake. The first direct method of authentication, widely used back in the days of membership providers and the like, is plain old forms authentication; the request/response sequence is shown in the image below. As you probably know, this authentication method simply redirects the unauthenticated user to a login page, where the user can fill out his credentials. These credentials are then posted over the wire, and upon successful authentication the user is redirected back to the page he initially tried to visit. So unless the connection is protected with SSL, the credentials are sent over the wire in clear-text at step 5. The other direct authentication method I want to discuss is NTLM. This authentication method is typically used to authenticate against a domain-joined web server, whose users are stored in Active Directory. As you can see in the image below, an NTLM handshake does not redirect the user to a login page; instead it kind of abuses the “401 Unauthorized” HTTP status code. Apart from the fact that NTLM does not use redirects, the main difference between NLTM and Forms is that the password does not travel over the wire in clear-text, even if no SSL is used. Instead, it uses hashing to let the user prove that he knows the password without actually having to disclose it. In step 2, the client receives a 401, as well as a WWW-Authenticate header with the value ‘NTLM’, to let the client know that a NTLM handshake is expected. In step 3, the client sends a so-called NLTM Type 1 Message to the server. This message contains the hostname and the domain name of the client. In response, the server again answers with a 401 in step 4, but this time it includes a NLTM Type 2 Message in the WWW-Authenticate header. This message contains a challenge called the nonce. For the purpose of this post, this is just a set of characters. The client performs a third GET to the server in step 5, and it includes an NLTM Type 3 Message. This message contains the user name, again the hostname and the domain name, and the two client responses to the challenge: a LanManager response and an NT response, calculated using the nonce and the LM password hash and the NT password hash respectively. Upon receiving this message, the server can use the user name to look up the users’ password hashes and caculate the expected reponse given the nonce. If the client-provided response matches with the expected reponse, access is granted. It should be noted that, even though the password does not travel over the wire in clear-text, the LM and NT hashes are not exactly super-safe. And even though the addition of the nonce makes the responses a type of salted hashes, I would still highly recommend using SSL here. The other two authentication methods I want to discuss (Kerberos and claims) can be dubbed brokered authentication. This means that the client does not only interact with the server to complete the authentication handshake, but also (and even primarily) with a third party: an identity store. In .NET environments, this identity store is typically Active Directory. Another way of authenticating in a Windows (read: Active Directory) environment, is by using Kerberos. Kerberos is a ticket-based method of authentication, and these tickets are distributed by a KDC (Key Distribution Center). This KDC resides on a Domain Controller, as does the user database of a Windows domain, Active Directory. The image below shows a Kerberos sequence in the order in which the different tickets are issued. Before we dive into the contents of all the requests and responses as lined out in the image, a note on something we call ‘long-term keys’. These types of keys will frequently pop up when we try to make sense of Kerberos, so I want to make clear beforehand that those are all password-derived keys. So when we talk about a user’s long-term key, we mean a key that is derived from the user’s password. This key is accessible to the KDC, and can also be calculated by anyone who has knowledge of the password. The same goes for a service’s long-term key: that’s simply a key that is derived from the service account’s password. Now, as you can see in the image, the user requests a TGT (Ticket-Granting Ticket) upon logging on to his workstation. The request contains the user principal name, the domain name, and a timestamp that is encrypted with the user’s long-term key. By looking up this long-term key and decrypting and evaluating the timestamp, the KDC can be sure (enough) that only a user with knowledge of the password could have created the request. (This is one of the reasons why the time on a workstation must be in sync with the KDC.) The KDC response provides the client with a TGS (Ticket-Granting Service) session key, and a TGT (Ticket-Granting Ticket). The TGS session key, which is the key the client will use in subsequent interactions with the KDC, is encrypted with the user’s long-term key. The TGT contains a copy of the TGS session key and some authorization data, and is encrypted with the KDC’s long-term key. So the client only has ‘real’ access to the TGS session key, and even though he possesses the TGT, he cannot see inside it or modify it without the KDC noticing. When the client wants to access a service (say an intranet web application), he first goes back to the KDC and requests a ticket to access the service. The request contains the TGT, the name of the server and the server domain the user is trying to access, and an authenticator containing a timestamp. The authenticator is encrypted with the TGS session key that the client shares with the KDC. Note that the KDC does not have to hold on to the TGS session key itself: it is embedded in the client request because it is part of the TGT, which is encrypted with the KDC’s long-term key. When the request for a service key is legitimate (which is verified by decrypting the authenticator that holds a timestamp), the KDC issues a service ticket and a service session key to the client. The session key is the key that the client will use in its interactions with the target server; it is encrypted with the user’s long-term key. The service ticket contains a copy of the service session key and is encrypted with the service’s long-term key. Now the client can start interacting with the service it is trying to access by passing it an authenticator containing a timestamp, and the service ticket. The service session key is used to encrypt the authenticator, and since it is also embedded in the service ticket, the service gains possession of the session key so that it can decrypt and validate the authenticator. Of course, when looking at things from the perspective of the client that is trying to access a service, the interaction is a bit different: the client first requests access to the service, which refuses access and tells to client to go get a Kerberos ticket first. This interaction is shown in the image below. The last authentication method I want to discuss is claims-based authentication. As can be seen in the image below, it uses interactions with an endpoint other than the target server, just like Kerberos. But unlike Kerberos, all requests and responses are HTTP-based. This makes claims-based authentication much more useful for a variety of environments, and not just for a Windows environment with domains and domain trusts that are required for Kerberos. As the image shows, the target server (called an RP (Relying Party) in claims-lingo) redirects the unauthenticated client to something called an STS (Security Token Service) when the client tries to access a protected resource. The client then starts interacting with the STS. The STS typically interacts with a user store (called an IdP (Identity Provider)) to authenticate the user. The interaction in the image shows a simple forms-based authentication handshake going on between the client and the STS, but this could just as well be NTLM or Kerberos. It can even be a claims-based authentication sequence all over again, if the STS further redirects the client to another STS instead of authenticating him against an IdP. But whichever mechanism is used to authenticate against the STS, if the client is successfully authenticated the STS provides the client with a Security Token and redirects him back to the RP. If the RP understands the Security Token and finds the claims it needs to authenticate and authorize the user, it starts serving the protected resource. To make all this possible, we need to establish trust between the STS and the RP: the RP needs to know what kind of token to expect from the STS, and the STS needs to know what kind of token to prepare for the RP. This trust is established once and out-of-band, typically when the RP is first deployed. When using claims-based authentication, the user’s credentials may or may not travel the wire in some form or another, depending on the authentication mechanism used at the STS. More important though in this context, the token travels from the STS to the client, and then from the client to the RP. And this token may contain sentitive user information, possibly a photograph (although I would not recommend putting it in there). It may also contain information that is used to authorize a user at the RP, such as role claims. But even though we apparently need to protect that token, SSL does not help here: SSL is point-to-point, so it is only protects the data as it travels from the STS to the client, and from the client to the RP. In other words: at the client itself, the token is visible in clear-text. So even though SSL might solve the problem of the ill-conceived photograph, it won’t help with the role claims: it may be no problem for the user to see and change its own photo, but it is certainly a problem if the user can change or add role claims. What any STS worthy of the name enforces, therefore, is token signing. This works by means of an X509-certificate, the private key of which is only known at the STS. When trust between the STS and the RP is established, the public key is exported to the RP. Now, when a client requests a token from the STS, that token is signed using the private key at the STS. Then, when the token reaches the RP, the signature is verified with the public key. If the client (or someone else along the way) changed the token, signature verification will fail and the RP will not grant access. If you also want to prevent the user (or anyone who can intercept the network traffic when SSL is not used) from reading the contents of his own token, you can optionally encrypt it. This also works using an X509-certificate, but this one’s private key is only available at the RP. Upon establishing trust, the public key is exported to the STS, so that it can be used to encrypt the token. The RP can then decrypt the token using its own private key and verify its signature, and be sure that the STS created the token and that nobody was able to read or change its contents. So, is SSL redundant when using token signing and encryption? Well, no, not entirely. The connection between the client and the STS handles authentication against the STS, and that will most likely involve some form of credential-derived data travelling the wire. That in itself is enough to warrant SSL between the client and the STS. Now, theoretically, SSL is not required between the client and the RP when the token is both signed and encrypted. But if you go through all this trouble to protect the claims in the ticket, chances are that the resource you are protecting also involves sensitive data traveling back and forth between client and RP, making SSL required here, too.
<urn:uuid:44d31528-1221-4df9-be5d-38292e119559>
CC-MAIN-2022-33
https://blog.annejanbarelds.nl/author/volatilecoding/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00003.warc.gz
en
0.937411
2,768
2.796875
3
How Can I Help My Child If your child has hypothyroidism, it’s very important to give the thyroid hormone as instructed by your doctor. If your child is too young to chew or swallow the pill, crush it and mix it with a small amount of water, non-soy baby formula, or breast milk. Make sure your child drinks all the liquid. Some thyroid hormone pills dissolve more easily in liquids than others, so talk to your doctor if you’re having trouble with this. Some infant formulas , medicines, and mineral supplements may block the thyroid medicine from being absorbed. Check with your doctor about how and when to give other medicines or supplements while your child takes thyroid hormone. Screening In Special Categories Of Neonates At Risk Of Ch Special categories of neonates with CH can be missed at screening performed at usual time, particularly preterm babies and neonates with serious illnesses and multiple births. Drugs used in neonatal intensive care , immaturity of hypothalamic-pituitary thyroid axis, decreased hepatic production of thyroid binding globulin, reduced transfer of maternal T4, reduced intake of iodine or excess iodine exposure, fetal blood mixing in multiple births can affect the first sample, and in many center a second specimen is required to rule out CH. . Preterm babies have a higher incidence of a unique form of hypothyroidism, characterized by a delayed elevation of TSH. These babies can later develop low T4 and elevated TSH concentrations. This pattern has been termed atypical congenital hypothyroidism or delayed TSH. Preterm babies with a birth weight of less than 1500 gr. have an incidence of congenital hypothyroidism of 1:300. Survival of even extremely premature babies is around 90% in developed countries, and the incidence of prematurity is around 11.5 % in US and 11.8 % worldwide. So, an increasing subpopulation of preterm babies and high risk newborns deserves a special sight about screening and follow up of CH. What Is The Thyroid Gland And What Is Its Function The thyroid gland is a small, butterfly-shaped gland located in the anterior part of the neck. It produces the hormones thyroxine and triiodothyronine . These hormones have a major impact on the following functions: - Growth, puberty and fertility - Use of vitamins, proteins, carbohydrates, fats, electrolytes and water The secretion of these hormones is controlled by the thyroid stimulating hormone , which is produced by the pituitary gland. The pituitary gland is located at the base of the brain and produces hormones which control the other glands. You May Like: How To Get Rid Of Thyroid Swelling Is It Safe To Breastfeed While Im Taking Beta Certain beta-blockers are safe to use while youre breastfeeding because only a small amount shows up in breast milk. The lowest possible dose to relieve your symptoms is best. Only a small amount of thyroid hormone medicine reaches your baby through breast milk, so its safe to take while youre breastfeeding. However, in the case of antithyroid drugs, your doctor will most likely limit your dose to no more than 20 milligrams of methimazole or, less commonly, 400 mg of PTU. What Are The Symptoms Of Hyperthyroidism Thyroid hormone has important effect on almost every organ in the body, including the brain, heart, bone, skin, and intestinal tract. In hyperthyroidism, excessive amounts of thyroid hormone can cause symptoms from any of these organs. Excess thyroid hormone increases metabolism and can cause weight loss, sweating, and a rapid heartbeat. It can also affect your childs mood and ability to concentrate, making them nervous, irritable, and anxious. In infants, too much thyroid hormone can result in developmental delay. Signs and symptoms of hyperthyroidism may include: - difficulty gaining weight - always feeling hot - trembling of the hand Don’t Miss: What Organ System Is The Thyroid Gland In How Is Hypothyroidism Diagnosed Because the signs and symptoms can be subtle, our pediatric endocrinologist will be very thorough at your initial visit. The doctor gets the medical history, does an exam and decides if a blood test is needed. - History and physical examination: The doctor takes a careful history of the child and family. Have family members had an autoimmune condition? The doctor feels around the neck, carefully checking the thyroid gland. Is it swollen ? Are there nodules? Signs and symptoms that could be due to a thyroid disorder are noted and considered. - Blood test: We measure the levels of thyroid hormones in a sample of blood. The amounts of thyroid-stimulating hormone and free T4 in the blood are important to learn. Testing for antithyroid antibodies is often helpful as well. What Causes Congenital Hypothyroidism Most cases of congenital hypothyroidism happen because the thyroid doesn’t form correctly in the baby during pregnancy. At birth, the baby may have no thyroid gland at all, or have a small, partially developed gland. Why this happens is often unknown, but in some cases it is genetic. Less commonly, a baby’s thyroid did fully develop, but can’t make normal amounts of thyroid hormone. This is usually due to a genetic problem. Other children born to the same parents have a 1 in 4 chance of having the same thyroid problem. You May Like: What Are Early Warning Signs Of Thyroid Cancer? Autoimmune Hypothyroidism: Chronic Lymphocytic Thyroiditis Acquired hypothyroidism is most frequently caused by an autoimmune disorder called chronic lymphocytic thyroiditis . In this disorder your childs immune system attacks the thyroid gland, leading to damage and decreased function. The disorder was originally described by Japanese physician Hakaru Hashimoto and thus is often referred to by his name: Hashimotos thyroiditis. CLT is more common in girls than in boys, and in adolescents more than pre-adolescents. Patients with other forms of autoimmune disease, most commonly insulin-dependent diabetes, are at increased risk of developing CLT. Overall, about 20 to 30 percent of diabetics will develop CLT. Because of this, annual screening for CLT is a routine part of diabetic care.; How Does Hyperthyroidism Affect Pregnancy Uncontrolled hyperthyroidism has many effects. It may lead to preterm birth and low birth weight for the baby. Some studies have shown an increase in pregnancy-induced hypertension in women with hyperthyroidism. A severe, life-threatening form of hyperthyroidism, called thyroid storm, may complicate pregnancy. This is a condition in which there are extremely high levels of thyroid hormone that can cause high fever, dehydration, diarrhea, rapid and irregular heart rate, shock and death, if not treated. It is always best to plan for pregnancy and to consult with your physician to ensure your thyroid status and treatment are optimized prior to becoming pregnant and monitored throughout your pregnancy. However, if this does not happen and you find out you are pregnant, you should contact your physician immediately to arrange for increased testing of your thyroid functions and a potential change in your medication. Recommended Reading: Is Thrush A Sign Of Underactive Thyroid Signs And Symptoms Of Hypothyroidism Symptoms of hypothyroidism are usually subtle and gradual, and may resemble those of other conditions or medical problems. Many symptoms are non-specific and may be ignored as normal parts of our everyday lives. Because of this, the condition may go undetected for years. Symptoms may include: - Slower reaction time - Weight gain - Sparse, coarse and dry hair - Coarse, dry and thickened skin - Slow pulse - Sides of eyebrows thin or fall out - Dull facial expression - Enlarged thyroid, producing a goiter-like growth on the neck - Increased menstrual flow and cramping in girls and young women If you have concerns about your child’s health, talk to your childs physician. How Often Are Blood Levels Checked An important part of treatment involves monitoring of blood thyroid hormone levels to make sure that the amount of medication is adjusted to keep up with how fast the baby is growing. Generally, blood tests are checked every 1 to 2 months up to 6 months of age and then every 2 to 3 months thereafter. In general, it is recommended that babies with congenital hypothyroidism be managed in consultation with a pediatric endocrine specialist. The primary care provider or the pediatric endocrine specialist will give instructions for how often the blood tests are monitored. You May Like: Armour Thyroid Copay Card Low T4 And Normal Tsh Normal TSH levels with low T4 values occurs in about 3 to 5 percent of neonates and may indicate thyroid insufficiency. It is more common among preterm or ill infants. Possible causes are hypothalamic immaturity , protein-binding disturbances such as TBG deficiency, central hypothyroidism, or primary hypothyroidism with delayed TSH elevation. Constant infusions of dopamine or high-dose glucocorticoids can inhibit TSH, causing low T4 concentrations. Midline facial abnormalities, hypoglycemia, microphallus, or visual abnormalities should suggest hypothalamic-pituitary abnormality. Septooptic dysplasia should be suspected in infants with clinical symptoms of hypopituitarism and blindness or midline defects of the brain. The optimal follow-up is unclear. Options include no further testing, follow-up filter-paper testing until T4 levels are normal, and measurement of FT4 and TSH concentrations on a second blood sample. However, FT4 values and thyroid function test results usually are normal. Treatment with LT4 has no proven benefit except in infants with central hypothyroidism or delayed TSH elevation. When deciding whether to pursue further testing, physicians should weigh the benefits of detecting rare conditions against the cost and psychological impact on the family. Thyroid Disease Increases Birth Defects Jan. 18, 2002 — Women with thyroid disease are more likely to have a child with birth defects — even if thyroid tests taken during pregnancy are normal. A researcher at the Society for Maternal-Fetal Medicine meeting in New Orleans is recommending testing before getting pregnant. Babies born to women with thyroid disease are at increased risk of heart, brain, and kidney defects, says lead author David Nagey, MD, PhD, in a news release. Nagey is associate professor of gynecology and obstetrics at Johns Hopkins Medical School. The infants are also at risk for physical abnormalities like cleft lip or palate or extra fingers, he reports. The risk for heart defects was seen in women with an underactive thyroid but not in women with an overactive thyroid. And this was true even if the women were taking medication to bring their thyroid levels back to normal. “We already knew that there was an increased risk of problems, mostly intellectual or developmental … but the link with birth defects is new and unexpected,” Nagey says. If the study results are confirmed, it could lead to routine testing of women for thyroid disease prior to pregnancy. If the test indicates a woman has an underactive thyroid, a fetal ultrasound of the heart — called an “echocardiogram” — during the 20th week of pregnancy might be necessary, he says. Overall, there were 108 pregnancies with 114 fetuses. Also Check: Is Apple Cider Vinegar Good For Your Thyroid Can Other Members Of The Family Have Ch Having CHIf they are healthy and developing normally, older brothers and sisters of a baby with CH are unlikely to have the condition. Talk to your doctor if you have questions about your other children. Future pregnanciesAll 50 US states offer newborn;screening;for CH. However, when a previous child in the family has had CH, newborn screeningA screening test that looks for different disorders using a small sample of blood taken from a newborns heel. A positive or abnormal newborn screening result means that there are slight differences that were found in the babys blood, and further testing is needed to figure out if the baby has a metabolic disorder. results may not be sufficient to rule out the condition in a newborn baby. In this case, special diagnostic testing may be advised in addition to newborn screeningThe process of testing for disease in a person who does not show signs of having the disease . The goal of screening is to catch the disease in its early stages.. Does The Treatment Have Any Side Effects Because thyroxine medicine is simply replacing a normal chemical produced by the body, giving the correct dose every day should not have any side effects. However, if given too little thyroxine, the child will develop the symptoms of hypothyroidism outlined earlier, and over a long period, may grow more slowly than usual. If the child has too much thyroxine, he or she may develop mild diarrhoea, not put on weight, may be more restless than usual and over a long period may grow more quickly than usual. But, as described above, the correct dose for the child will be calculated on a regular basis, so these effects are unlikely to occur. Predictors Of Transient Congenital Hypothyroidism Children who had the lower increases in their blood levels of thyroid stimulating hormone which controls thyroid gland activitywhen diagnosis at birth, were more likely to outgrow the condition,1 the researchers found. TSH tells the thyroid gland how much hormone to produce so if levels are high, it is an indication of hypothyroidism. Those who no longer had the hypothyroidism were also more likely to need lower doses of levothyroxine initially and again at 6 and 12 months.1 These babies were also less likely to have a hereditary or genetic form of this hypothyroid condition While the usual routine generally is to treat children until they reach 3 years of age because the time to that point is very important for brain development, Dr. Saba says her findings suggest that it may not be necessary to continue treatment out that long in every baby, and that treatment may often be safely stopped at six months, based on the blood test results for the thyroid levels. She cites the benefits of potential cost savings in being able to stop the levothyroxine sooner whenever possible. Luiz Gonzalez-Mendoza, MD, pediatric endocrinologist and director of the division of endocrinology at Nicklaus Children’s Hospital in Miami, Florida who was not involved, reviewed the study findings for EndocrineWeb, and recommended a bit of caution. How Do Doctors Treat Postpartum Thyroiditis The hyperthyroid stage of postpartum thyroiditis rarely needs treatment. If your symptoms are bothering you, your doctor may prescribe a beta-blocker, a medicine that slows your heart rate. Antithyroid medicines are not useful in postpartum thyroiditis, but if you have Graves disease, it may worsen after your baby is born and you may need antithyroid medicines. Youre more likely to have symptoms during the hypothyroid stage. Your doctor may prescribe thyroid hormone medicine to help with your symptoms. If your hypothyroidism doesnt go away, you will need to take thyroid hormone medicine for the rest of your life. You May Like: How Long Can You Have Thyroid Cancer Without Knowing Development Of Thyroid Function During fetal life, the thyroid gland develops with production of thyroxine and triiodothyronine and secretion into the serum from about 12 weeks gestation, the levels of which increase to term. Throughout gestation, maternal T4 crosses the placenta in limited amounts, but in the first trimester, this plays a critical role in central nervous system development, as exemplified by the fetal neurological impairment seen in fetomaternal Pit-1 deficiency and severe iodine deficiency. In both situations there is severe maternal and fetal hypothyroidism. In areas of endemic iodine deficiency, iodine supplementation to women before pregnancy or up to the end of the second trimester protects the fetal brain from the effects of iodine deficiency whereas third trimester or neonatal supplementation does not improve neurological outcome. T3 and T4 are also inactivated to sulphated analogues by sulphotransferase in fetal liver. Sulphated iodothyronines are major thyroid hormone metabolites in the fetus, and sulphate conjugation of the iodothyronines accelerates deiodination. What Causes Thyroid Problems Among Women According to the American Thyroid Association, women are five to eight times more likely than men to have thyroid problems. And of the women who develop a thyroid dysfunction during their life, 1 in 5 has it as a result of genetic mutation of the TSHB gene. The following thyroid-related diseases affect more women than men: - Disorders that cause hypothyroidism - Thyroid nodules - Thyroid cancer Because women are more likely than men to have a thyroid condition, there are several symptoms that exclusively affect women and child-bearing individuals with thyroid disease. For example, pregnant women with undiagnosed or inadequately treated hypothyroidism have an increased risk of miscarriage, preterm delivery, and severe developmental problems in their children. Additionally, women with thyroid disorders may experience problems with their menstrual cycles, fertility issues, and problems during pregnancy. Recommended Reading: Is Noni Juice Good For Thyroid Does This Hypothyroxinaemia Matter In preterm infants, almost all reports document an association between adverse outcome and hypothyroxinaemia. Severe hypothyroxinaemia, as measured on blood spots in newborn screening programmes that utilise T4 , has been associated with an increase in perinatal mortality and morbidity, with prolonged oxygen supplementation, mechanical ventilation, and hospital stay, an increased incidence of intraventricular haemorrhage, and a greater risk of echolucencies in cerebral white matter on ultrasonography. In the survivors, an increased risk of neurodevelopmental problems, reduced intelligence quotient ,, and disabling cerebral palsy has been reported, even when corrected for potential confounders including gestation, fetal growth, and illness severity. A British cohort in which T3 was measured twice in the first week and weekly thereafter in babies of less than 1850 g has shown an association between a T3 level less than 0.3 nmol/l and a reduction on the Bayley mental developmental index score, and the Bayley psychomotor index score of 8.3 points and 7.4 points respectively at 18 months, even with adjustment for confounding variables known to affect outcome. When reassessed between 7.5 and 8 years, overall IQ was 6.6 points lower in those whose lowest T3 had been < 0.3 nmol/l. Management Of Babies At Risk Of Neonatal Thyrotoxicosis Figure 1 shows a suggested scheme for the management of a baby at risk of neonatal thyrotoxicosis. This will include all babies of mothers with a current or past history of Graves disease , and those rare families with a family history of neonatal thyrotoxicosis secondary to TSH receptor mutations. The diagnosis of euthyroid, hypothyroid, or hyperthyroid has to be made in the light of expected TSH and T4 levels for postnatal age, as the huge surge in both after delivery will necessarily mean that the usual normal ranges for adults and older children are inappropriate. You May Like: How Long Can You Have Thyroid Cancer Without Knowing
<urn:uuid:7287687b-f068-4234-b630-d5eb2fb4f0ea>
CC-MAIN-2022-33
https://www.thyroidtalk.net/what-causes-thyroid-problems-in-newborns/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00206.warc.gz
en
0.939954
4,068
2.953125
3
Cleaning up22 February 2005 Professor Tong Jiandong and Beth Marshall discuss how to address the barriers to the commercial development of clean hydroelectric power in China China, particularly in the western, rural areas, still suffers from power deficiency and there continues to be a strong reliance on thermal power plants for energy needs. The Chinese government, through its programmes such as ‘Send electricity to the villages’ and ‘Replace fuelwood with electricity’, aims to accelerate the current thrust to utilise hydro power resources as a clean energy alternative to emission polluting power stations and deforestation which occurs through fuelwood gathering for residential energy needs. China has attracted international attention due to its large scale and rapid development of small hydro, having developed 39% of the worldwide capacity. China has a potential small hydro capacity of approximately 128,000MW, currently only one quarter of this – 28,489MW, between 42,221 stations – has been exploited. Over 300M people are served by the 94.7BkWh of small hydro generated electricity produced. However, considering 10.15M people were still without electricity by the end of 2002, and the considerable remaining economically viable small hydro potential remaining for exploitation, small hydro is likely to continue playing a major role in the electrification process in China. Small hydro in China is currently being developed at a rate of 3000MW/yr and this is set to rise to 8000MW/yr to meet the target for an installed capacity of 93,000MW by 2020. International bodies and agencies have become involved with some of this development through the International Network on Small Hydropower (IN-SHP), based in Hangzhou, China. In particular, alleviating barriers to private sector financing has been a major focus to help ensure the long-term sustainability of the development of clean hydroelectric power. The dual goals of both achieving effective commercialisation of environmentally benign renewable energy projects in China and the promotion of clean energy development are objectives addressed by the Synergy programme, sponsored by the EC Commission, and the Xiaogushan project, part funded by the Asian Development Bank (ADB). The latter project has a generating capacity of 98MW, therefore is not a small-scale project, but it is a run-of-the-river development which will have very limited environmental impact on its surrounding area. CDM small hydro projects The Clean Development Mechanism (CDM) arising from the Kyoto protocol is one innovative financing methodology, which can encourage the commercialisation of hydroelectric projects. This facility is being developed under the Synergy Programme and the Xiaogushan hydroelectric project to achieve their stated objectives. As a relatively mature technology with demonstrable environmental and socio-economic benefits, small hydro projects are able to meet many of the requirements of the CDM. Of the more than 160 CDM projects identified by a recent OECD/iea study, two thirds involved electricity generation from renewable energy. Hydro power is the most popular project type so far, accounting for 39 projects. However, renewable energy projects only account for 38% of the expected emission reductions generated under the CDM. In terms of the objectives of the Kyoto protocol and the CDM, small hydro meets important requirements: it is a renewable energy, with minimal environmental impact, and contributes to sustainable development. The CDM also offers small hydro project developers an opportunity to gain crucial financing for projects that may be too small or focused on rural development to attract sufficient private sector investment. China’s small hydro potential, existing capabilities, and government support for small hydro initiatives enhance the opportunities for developing small hydro projects under the CDM. China’s GHG emissions from the energy sector are predicted to increase from 3080Mt CO2 in 2000, to around 4000Mt CO2 in 2010, with coal contributing the major share. To realise its certified emission reduction (CER) potential, China will need a significant number of new power initiatives to be registered as CDM projects, and up to 100 renewable energy (RE) power projects to be in operation by 2006-2007. Now at the second phase of development, the Synergy project, sponsored by the EU Commission, aims to establish the preliminary activities necessary to commercialise RE projects in China. Phase one of the programme officially started in September 2004 in Beijing. Activities within this project include policy advising to create favourable framework conditions for renewable energy sources in China – from site identification, to the drafting of business plans for concrete projects; from the active involvement of all the main stakeholders, to the training of the future RE production site owners and managers. In the second phase of the programme, currently underway, ten small hydro power projects in China are being developed into project summaries by IN-SHP. Ten other projects are being summarised by another Chinese organisation, CREIA, which will include non-hydro power sources such as wind, solar and biomass. These projects are intended to become concrete examples of methods to create commercially viable means to advance renewable energy. The main focus of these projects is on developing CDM, but other strong investment projects are also under consideration. The main barrier associated with selecting projects under the Synergy programme has been finding appropriate sites that comply with regulations under the CDM. There is a lack of local knowledge and skills which creates problems for implementing CDM projects in China. Local capacity to identify CDM projects and gather the appropriate information required is limited. Furthermore, there is still a lack of easily accessible information – for example, technical information, particularly in poorer and more isolated regions can be difficult to obtain. In addition, the challenge of demonstrating additionality under the CDM for small hydro projects in conducive policy and commercial environments is particularly evident in China. Chinese government programmes and incentives for the development of small hydro include preferential policies, soft loans and subsidies. However, the ratio of government to private finance in small hydro activities is approximately 1:24, indicating that significant funding must still be sought from private investors and commercial loans. But despite these difficulties, a number of sites have been selected for CDM eligibility. Yuzaikou small hydro project One project of particular interest is the Yuzaikou small hydro power station, situated on the lower reaches of the Qijiang river, in Rucheng County, Hunan Province. A project development document (PDD) is currently being compiled for the project, for application for the CDM. This project, being developed by the Liu Yihou Company, will replace the need for the combustion of fuelwood and coal. Local residential use of small hydro generated electricity for heating and lighting will prevent local deforestation, which is currently causing the felling of 25,000m3 of timber per annum. Salient associated problems such as soil erosion will then also be alleviated and the preserved forests can then act as a carbon sink for CO2 emissions. Environmental protection is a key associated feature of this project. One of the components involves the establishment of an ‘Environmental Protection Unit’ to ensure the adherence to environmental regulations during the construction of the plant. The tasks of the unit relate to water, air and soil quality evaluation. In terms of direct effects for the local economy, the project will generate 32 permanent full time jobs and 400 workers will be employed during the construction of the plant. It is anticipated the project will attract greater investment in small and medium scale industries in the resource rich Rucheng County. Geological and meteorological aspects of the area lend itself ideally for small hydro installations. The installed capacity of the station will be 15MW, utilising two 7.5MW Francis turbines. There is a 55m net head, with an associated maximum hydraulic capacity of 15.65m3/sec. The annual energy output of the plant will be 66,000GWh. The primary purpose of the project is naturally energy generation but it will have an additional positive effect in that it will help the county better manage the severe flooding which plagues the inhabitants of the local terrain. Water control will be facilitated by a 67m high dam, which will divert water at a discharge of 2 x 15.65m3/sec. The water will then be diverted along a 384.2m tunnel. Two 2.1m diameter pipes then convey the water to the power house and the two Francis turbines respectively. The estimated construction period of the station is three to four years. The project is anticipated to cost almost US$12M, 7% of which is intended to be financed through the CDM. Xiaogushan hydro project Part funded by Asian Development Bank (ADB) loans, the Xiaogushan hydro power plant project is being initiated as a CDM project. One of IN-SHP’s national sub-bases in China, Zhangye base in Gansu Province, which is run by the Heihe Hydropower Development Shareholding, is the project developer for the site. The Xiaogushan hydroelectric power station site lies in Xishui township, Sunan county, 86km from Zhangye City, approximately 600km northwest of the provincial capital, Lanzhou, Gansu Province. The aim of this project is to alleviate the problems of power deficiency in the project area and to ensure the clean sustainable development of the local area. The project is interesting in that it displaces CO2 from the least cost alternative, which would have been a coal-fired plant; consequently, this project reduces greenhouse gas emissions. The project is anticipated to produce an annual GHG abatement of 370,660t CO2 equivalent. The project is a 98MW run-of-the-river hydro power plant, situated on the Heihe river in the Sunan Yugu Autonomous County of Zhangye City. Although at 98MW this project is not a small hydro station, as it is a run-of-the-river project there will be very minimal environmental impact on the area surrounding the project site. There will be very little alteration to the geography of the site, particularly as there is little foliage to be disturbed in a sparse landscape. Also, there will be little long-term impact to the geography of the area as there is no dam construction. The Xiaogushan project has been developed to significantly improve the ecological environment of the project area as problems associated with air pollution will be avoided. The main components of the project include a diversion weir with an active storage capacity of 1.3Mm3; an intake power tunnel (9100m) with an intake flow of 105.5 m3/sec, and a rated water head of 117m; a surface power station for three units (2 x 40MW and 1 x 18MW) and a 110kV high voltage switchyard, with 27km of 110kV transmission lines for power evacuation. Total investment in the project is US$83.5M, 50% of which will be ADB loan financing. The project will be constructed over a three-year period. For further information, contact International Center for Small Hydropower, No 136 Nanshan Road, Hangzhou, P R China. Tel: ++86 571 8707 0070, fax: ++86 571 8702 3353.Email: [email protected] www.inshp.org.
<urn:uuid:7022d82c-31fd-48e0-b9d7-09af9466f534>
CC-MAIN-2022-33
https://waterpowermagazine.com/features/featurecleaning-up/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00206.warc.gz
en
0.941328
2,312
2.703125
3
British India, White Australia: Overseas Indians, Intercolonial Relations and the Empire By Kama Maclean | UNSW Press | $39.99 | 320 pages Australianama: The South Asian Odyssey in Australia By Samia Khatun | University of Queensland Press | $34.95 | 320 pages Indian-origin Australians are the fastest-growing group in the population, their numbers catching up with those of Chinese descent. Canberra, meanwhile, is in the midst of one of its periodic rediscoveries of India, this time as a potential economic and strategic counterweight to China. The timing couldn’t be better for two books that explore Australia’s early relations with what we now call South Asia and highlight pitfalls to be avoided this time around. Before Australia finally shrugged off the White Australia policy in 1973, South Asians were a small minority — a little over 5000 at their peak in the 1890s, as against 29,000 or so Chinese. In scattered numbers on the margins of settlement, they incurred less of the resentment that sometimes erupted into murderous anti-Chinese riots. Many of these South Asians were here because they had been invited: recruited by colonial authorities and businessmen from the 1860s to build and operate the networks of camel transport that serviced remote mines and grazing runs. They also had the advantage of being British subjects, if second-class ones. In asserting this imperial identity, according to historian Kama Maclean, Indian Australians separated themselves from “Asiatics” and “Orientials” with some lasting effect. “It is curious that in Britain, many Indian communities have come to identify and be identified as ‘Asian,’” she writes. “In Australia, Indians have largely been thought of as an entirely separate category, not necessarily Asian at all.” But they suffered calumnies and bureaucratic obstruction enough, as historian Samia Khatun shows in her case studies. And the official exclusion after Federation, when they were lumped in with “Asiatics” under the Immigration Act, was an immense and long-lasting insult to the educated classes of the entire subcontinent, even those who never thought to come here. White nationalism in the settler colonies was the fly in the ointment London was using to try to soothe India from the mid nineteenth century on. After suppressing the great Sepoy Mutiny of 1857, Queen Victoria had proclaimed that all subjects of the empire would be treated equally. Colonial secretaries chided premiers in Australia, Canada, New Zealand and South Africa over racial exclusion, but the admonishments were generally batted off as humbug on the part of an empire that embodied a deep racial hierarchy. Among Australians, images of the subcontinent derived from the writings of Rudyard Kipling, who visited Sydney, Melbourne and Hobart in 1891, and from romantic writings about fabulously wealthy maharajas and sultans, the mystical yearnings of Theosophists, and the opinions of resident “old India hands.” The term “Hindoo” was used synonymously with Indian, emphasising “otherness” and “heathen rituals.” Even the few senior politicians with a deeper knowledge of India, among them Alfred Deakin, upheld the White Australia policy. But some softening of the policy did occur quite early. Persuaded by a new governor-general, Lord Northcote, who had come straight from governing Bombay, the Watson government amended the Immigration Restriction Act in 1904 to let Indian merchants, students and tourist travellers enter for up to twelve months. Not many took advantage, and deportations of Indian traders like Mool Chand (in his case for having entered Australia under false pretences) raised periodic outcries in India. Meanwhile Deakin, as external affairs minister, was trying to get more Australians into the elite Indian Civil Service, arguing that hardy Australians were just the thing India needed to get organised and open up new fields of development. “In this, Deakin seemed to be imagining an India of mutiny novels and Boy’s Own adventures,” observes Maclean. Indian newspapers saw it as a double standard: let us in, but you stay out. After diggers fought alongside Indian soldiers in Gallipoli, Palestine and France during the Great War, postwar Australian views moderated a little. Norman Lindsay’s South Asian character “Chunder Loo,” who featured in advertisements for Cobra Boot Polish, was transformed into an amiable, subservient comic figure present at great events. Australian prime minister Billy Hughes and his British counterpart David Lloyd George might have cursed each other in Welsh at times, but at the 1921 Imperial Conference Lloyd George pressed Hughes to agree on a compromise — keep your external barriers, but remove discrimination for those inside — acceptable to the Indians. As much as Hughes had fought at Versailles against a racial equality clause in the League of Nations charter, he also worried about the growing power of the United States, which was drawing Canada closer, and the unrest in Ireland, Egypt and India. It all threatened to break up the empire and threaten Australia’s “lifeline” to Europe. So imperial duty saw British-Indian residents of Australia — now about 2000 in number — given the vote and the pension. The remnant of the earlier, larger population most widely recalled are the itinerant turban-wearing pedlars who roamed inland settlements in horse-drawn carts, bringing haberdashery and household implements along with a touch of exotic colour to isolated households. As nationalism deepened in British India, writes Maclean, settler colonies like Australia “inadvertently presented a third front against which the British in India and in London could imagine and claim to be championing Indian causes.” The Balfour Declaration of 1925, which gave equal status to all Britain’s dominions — Australia, Canada, New Zealand, Newfoundland, South Africa and the Irish Free State — let London off the hook: it could say it had no control over their immigration policies. Continuing discrimination through the 1930s and 1940s also had the unintended effect of encouraging India’s leaders to reject British offers of eventual dominion status. India would always be a second-class member of the empire, said Jawaharlal Nehru, the man who would be India’s first prime minister. The Bank of England had brought Australia to near bankruptcy in the Great Depression; imagine what it might have done to an Indian dominion. With the fall of Singapore, India became even more of a lifeline for Australia, and the Indian nationalists had Churchill over a barrel. Eventually, two years after Japan’s surrender, London agreed to India’s independence. Prescient Australians had seen this coming. In September 1942, external affairs minister H.V. Evatt had said that Australia “looked forward to the people of India becoming a truly self-governing nation,” with the rider that it should still be loyal to the King. Canberra and New Delhi exchanged high commissioners during 1943–44. The appointment of R.G. Casey as governor of Bengal in December 1943 put an Australian at the centre of one of the second world war’s most tragic episodes, the famine that gripped this frontline state during 1943–44 and killed some three million people. Maclean shows us how Australians became aware of the famine through church, business and personal correspondence that got around wartime censorship, and pressured Canberra to release its stockpiles of wheat. The government was prepared to do so if the War Cabinet in London would release the necessary ships. Only in February 1944 did large shipments begin belatedly flowing. Somehow the glamorous couple, Casey and his wife Maie, floated above this misery. After Casey resigned as governor in June 1945 in order to return to Australia and enter politics, he wrote An Australian in India, a book that took a relatively sympathetic view of Indian nationalism, and distanced himself from the British administration. As an Australian, he claimed, he had gone to India “with no imperial past.” Casey argued that once it was explained that the White Australia policy was based on economic, not racial, grounds it was “generally accepted” in India. But when the departing British asked Australia to take in some “Anglo-Indians” — the mixed-race and generally well-educated and prosperous children of empire — Canberra agreed only to those who were “predominantly of European blood.” As external affairs minister for most of the 1950s, Casey shared with his prime minister, Robert Menzies, a somewhat distant relationship with Prime Minister Nehru. According to Maclean, Casey was arguably closer to Pakistan, which was drawn to the Western side as the cold war set in. He continued to play down the White Australia policy rather than try to change it, and urged the Australian press to stop using the term. And so it went on — and so, to some extent, it continues. Our leaders are puzzled why Indians are so “hypersensitive” about race; they tend to assume all experiences of empire are the same. Multiculturalism has comfortably located racism in the past; events like the Cronulla riot of 2005 and the attacks on Indian students in 2010 are seen as aberrations. “Many note that Australian attempts to engage with India have gone unrequited,” Maclean says. “Few have tried to appreciate why this might be the case.” Still, the Indian population in Australia grew 30 per cent over 2016–18. Whether Australia can overcome its past is still an open question, she says, but “it is clear that a redefinition of ‘Australian’ is under way.” Samia Khatun isn’t so sure. She sees cant in how we welcome well-off and highly skilled South Asians, patting ourselves on the back for our openness, while treating undocumented arrivals by boat, many from the same region, so shamefully. Khatun’s book focuses on the South Asians (having been born in Bangladesh, she is careful to use that term) who came to Australia during that early half-century window. This is an important, eye-opening exploration of their world and its connections, bringing into vivid centrality the “Afghan” cameleers who are auxiliary figures on the periphery of events in mainstream history. Her “Book of Australia,” as the title translates, began as a doctoral thesis in history at the University of Sydney, and still reads like that in places. But between the thickets of Foucauldian and other theoretical analysis of the “epistemic arrogance of modernist paradigms of thought” is a fascinating detective story. It began when she read of “an old Quran” found by local historians in the corrugated-iron mosque in Broken Hill. She travelled there, and found the book was actually a compendium of eight books of Sufi poetic legend titled Kasasol Ambia (Stories of the Prophets). How did a book of poetry in Bengali published in 1895, written to be read aloud, come to Broken Hill, when most of the cameleers were from the northwest of undivided India and Afghanistan? Her quest to find out took her to Calcutta and its busy publishing hubs, to encounters with an irascible scholar of old texts, and to the stories of the men and women who might have picked up the book in Calcutta on their way to Australia. We learn about characters like Khawajah Muhammad Bux, who became a wealthy Perth-based trader before retiring to Lahore in the 1920s, where he built a mosque and a girl’s school in what became known as Australia Chowk (Australia Bazaar); Bux’s son later founded the one hundred–branch Australasia Bank, now part of Pakistan’s big Allied Bank. And Hasan Musakhan, a brilliant scholar from Karachi who won a scholarship to Bombay University and then joined a big camel operator in Australia. A follower of the Ahmadi branch of Islam (later declared heretic by the mainstream), he married Sophia Blitz from a German-Jewish family in Adelaide and became active in court cases contesting discriminatory application of the law and a writer of letters to newspapers. Khatun recounts marriages and other encounters between South Asian men and white and Aboriginal women; brides and wives brought out from India, some in purdah, some not; and jealous shootings and elopements. This richly detailed account culminates in her journeys with descendants of the Aborigines who mixed with the Abigana (Afghans) along the camel routes and railway lines that penetrated inland to places like Marree and Oodnadatta. In this sandy country, she coaxes out the background to some of the perplexing incidents in the written record. Khatun is not very forgiving of settler Australians and “monolingual” historians attracted to facts and progressive narratives rather than the imagined worlds and dreams she taps into. She has a wonderful ability to capture the landscapes of inland Australia and make its “marginal” people central. In showing us what has been under our noses, Australianama is as good as Bruce Chatwin’s The Songlines, if not better. •
<urn:uuid:b0a4cee3-63a3-4585-8ca5-1d36d5837b95>
CC-MAIN-2022-33
https://insidestory.org.au/encountering-the-subcontinent/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00205.warc.gz
en
0.967946
2,794
2.546875
3
See how age and illnesses change the risk of dying from covid-19 Our risk model estimates chances of death and hospitalisation based on age, sex and comorbidities Covid-19 threatens everyone, but its risk is concentrated among particular groups of people. To help readers understand how the disease interacts with demography and with other illnesses (“comorbidities”), we have built a statistical risk model, using records in the Covid-19 Research Database from 425,000 people in America who tested positive. For any group of unvaccinated people of a given age, sex and mix of comorbidities, our model estimates the share that would be hospitalised or die within 30 days of a covid-19 diagnosis. To learn more about which medical conditions most exacerbate covid-19, please see Graphic Detail; the model’s methodology is summarised here. The interactive below lets you explore the model’s output for any combination of variables. It assumes that comorbidities not selected are not present, even if they often appear together. For example, if you enter only Type 2 diabetes, you will receive an estimate for people with Type 2 diabetes but not hypertension. We do not store any records of which readers use the interactive, or of which medical conditions they select. Users should not interpret these results as a personalised risk assessment. Any given individual’s risk will differ from the group average that our model estimates. Readers seeking medical advice should consult a doctor. Rare combinations of inputs can produce unreliable results (see FAQ). The reliability of our model’s output depends partly on how many examples of the specified combination of age, sex and comorbidities are present in its training data. The more common a profile is, the narrower the confidence interval surrounding the central estimate. Enter an age and sex above, and you can see how the risk level for people with those attributes and the listed comorbidities compares with that of a representative sample of 10,000 people in our database. Frequently asked questions What information does the covid-19 risk estimator provide? Our interactive tool estimates the risks posed by covid-19 to different groups of people. Formally, it is designed to answer a very specific question: if a group of randomly selected people in the United States with the specified age, sex and comorbidities had been diagnosed with covid-19 on December 1st 2020, what percentage would have died or been hospitalised by the end of the year? Why did you build it? The broad contours of covid-19 risk are well-known: older and sicker people face more danger than younger and healthier ones do, and men more than women. However, there is far less awareness of the magnitude of these effects, how they interact with each other and which comorbidities are most relevant—particularly when assessing the chances of hospitalisation rather than of death. We built this estimator so that readers could explore a wide range of combinations of these variables. What data is it based on? The model is trained on medical records from the Covid-19 Research Database, drawn from 425,000 people in America who tested positive for the disease between May and December 2020. The archive lists their age, sex, date of diagnosis, presence or absence of 29 different comorbidities, whether they were hospitalised during their infection and whether they died in 2020. The database has several limitations. It only includes people with health insurance, and does not list patients’ location, ethnicity or date of death. Most octogenarians’ ages appear as “80+”. Anyone who has filed a medical claim since 2014 citing a comorbidity is listed with that condition, regardless of recency or severity—preventing distinctions between malignant tumours and cancers in remission. Not everyone without known illnesses is healthy: some have ailments not on the 29-condition menu. Moreover, the database is not a representative sample of the SARS-CoV-2-positive population. Because it only contains records from people who have interacted with a medical service provider, it excludes those who weather the disease at home without medical assistance. As a result, the people it tracks are disproportionately old and sick. We have tried to counteract this bias using official data from America’s Centres for Disease Control and Prevention, which record deaths and confirmed cases by age, sex and time period. However, our method could conceivably lead to a slight underestimation of the impact of comorbidities on risk. How does it work? The interactions between covid-19, age, sex and over 500m potential combinations of comorbidities—roughly 30,000 of which are present in the model’s training data—are too complex to be captured by standard statistical tools such as logistic regression or proportional-hazards models. As a result, we used a popular machine-learning algorithm called “gradient-boosted trees”, which is designed to incorporate such multi-faceted relationships into its predictions. Please read our methodology summary for a detailed account of this process. How accurate is it? Our estimator is extremely reliable within the confines of its training dataset. To measure its accuracy on unseen data, we randomly split up the archive into two halves; trained separate models on each half; and used the resulting models to make predictions on the “opposite” halves. The estimator performed admirably: around 5% of people to whom it assigned a death risk between 4% and 6% did in fact die; roughly 30% of people to whom it assigned a hospitalisation risk between 29% and 31% were admitted to hospitals; and so on. When evaluating models’ accuracy when making predictions on data not used to train them, the gradient-boosted trees fared far better than did simpler alternatives, such as logistic regression. Whether such performance can be replicated outside the confines of the Covid-19 Research Database, however, is a different question. The circumstances of the vast majority of the world’s SARS-CoV-2-positive population are not similar to those of the people in the model’s training data. Barring the invention of time travel, no one in the future will be in the United States in December 2020, which is one of the model’s central assumptions. More practically, most people who get covid-19 are unlikely to be infected with the same variants of the virus, have similar genetics or receive healthcare treatment of the average American quality at that time. We cannot estimate how any of these differences will affect our model’s performance, but at least some of them are likely to cause significant errors. Why does estimated risk sometimes decline at higher ages or with more comorbidities? Such counterintuitive estimates result from quirks in our dataset. Many medical conditions tend to show up in pairs or trios. For example, almost 99% of people in our archive listed with hyperlipidemia also have metabolic disorders. Others are closely correlated to sex or age: 97% of people listed with breast cancer are female, and 96% of those with Parkinson’s disease are 50 or older. People who do not fit these patterns—such as people diagnosed with hyperlipidemia but not metabolic disorders, men with breast cancer or young people with Parkinson’s—are likely to have unusual presentations and perhaps particularly severe cases of these conditions, which may increase their vulnerability to covid-19. Conversely, 99.9944% of the 500m potential combinations of comorbidities never showed up in our training data. Although the model can make educated guesses about such cases based on similar examples, its estimates will be quite unreliable. Moreover, unlike regression-based approaches—which treat all variables as having constant, independent effects that can simply be added together—gradient-boosted trees do not impose such assumptions. As a result, they are just as likely to predict that adding a comorbidity or raising a person’s age will decrease risk rather than increasing it, in the absence of evidence to the contrary. In particular cases, the model may well have good reasons for displaying surprising results. But in general, whenever it seems to behave strangely, the most likely explanation is that your instincts are right and that our tool, lacking sufficient data to produce a robust estimate, is wrong. You can tell how much to trust its predictions by the width of its confidence interval. The wider the shaded area surrounding the central estimate, the greater the chances that it is leading you astray. What did you learn about covid-19 while developing this tool? We were most surprised by the difference in the relative importance of age and comorbidities when measuring the chances of death versus those of hospitalisation. Whereas survival rates are primarily a function of age, even young people can easily wind up in hospital if they have medical conditions that sharply exacerbate covid-19’s severity. We were also surprised to see that kidney and liver ailments, as well as cardiovascular ones, seemed to have more dangerous interactions with covid-19 than respiratory conditions did. You can read more about these findings in our Graphic Detail article. How should this information affect my personal risk choices? It shouldn’t—at least not without consulting a medical professional first. Leaving aside broad questions about how reliably the statistical relationships within the Covid-19 Research Database will translate to the world at large, our estimator doesn’t have nearly enough information about individuals to provide accurate personal risk assessments. Its output represents rough group averages, from which every specific person’s situation will differ substantially. Moreover, covid-19 can still harm people who survive it without a hospital stay. Many people suffer debilitating symptoms that persist for months, and even those who do not know they are sick can infect vulnerable people around them. Nonetheless, we hope that our estimator can cast some light on decisions that people will have to face by force of circumstance as societies open up. Once you know the impact of age, sex and the particular set of medical conditions that our model incorporates, you will have an inkling of the context in which other risks present themselves. ■ Sources: Covid-19 Research Database; AnalyticsIQ; A3.AI; CDC; The Economist The federal government is forcing states to act But repression remains commonplace It will get harder to provide a timestamp for anything from human remains to aged whiskies
<urn:uuid:261934a5-0222-43ea-9fa8-126f2a367b82>
CC-MAIN-2022-33
https://www.economist.com/graphic-detail/covid-pandemic-mortality-risk-estimator?utm_campaign=editorial-social&utm_medium=social-organic&utm_source=twitter
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00405.warc.gz
en
0.954116
2,174
3.046875
3
Food has become the centerfold of the 21st century. Once simply a (hopefully delicious) way to keep the body alive, the way we nourish ourselves has intersected with politics, culture, tradition, history, and art. Chefs have been fairy-godmothered from faceless white hats sweating over a pile of onions into celebrities. Molecular gastronomers tinker on the edge of art and science to further separate food from a simple way to consume calories. Food is now a source of wonder. American culture's new celebration of food has put it in the same realm as art, music, science, and technology to such an extent that it's now getting its own museum — a lot of museums. A global desire for food museums seems to have sprung up almost overnight. In the last five years, museums dedicated to the wider world of food have gotten underway in Brooklyn, Prague, London, and Chicago, to name a few. For the most part, they either have or are working toward a brick-and-mortar location where they will host interactive exhibits (even if it's just providing something for guests to smell and taste) as well as outside events to further their educational outreach. While art collections often grew in wealthy hands for generations before winding up in a museum, a global desire for food museums seems to have sprung up almost overnight. Though an exhibit about flavor (currently hosted by Brooklyn's Museum of Food and Drink) or one centered on hot dogs (at the Chicago Foodseum) may not seem terribly serious, food museums have set out to tie everyday products into a larger story of history and culture. But the question is: How did food grow from a set of recipes and traditions (perhaps with some politics thrown in) into something so many people feel the need to catalogue and exhibit? The meaning and use of museums "The history of museums is the history of colonialism," says museologist and NYU professor Aimee VonBokel. Traditionally museums have been a place to collect works from artists or artifacts from foreign lands. "Any museum opening is an expression of a certain kind of power or dominance over cultures," VonBokel adds. The first museum dates back thousands of years, but looked very different from a museum today. These early museums were mostly private collections of ancient artifacts housed in royal or religious buildings — not meant for public or educational use. It wasn't until the development of England's Ashmolean Museum in the 1600s that museums were opened to the public. For the most part, public museums spread along with the fall of royalty. Over time, museums have become a form of reciprocity between citizens and their governments. Views of education have also shaped the modern museum. Gilded Age museums were grand structures, shrines to knowledge where the purpose was to go and soak up information without much guidance, VonBokel explains. "Over time we've learned that lecturing doesn't work as well." As a result, museums have tried to change themselves from "arbiters of high culture" and become "welcoming forums" instead. The barrier to entry is much lower when museums are sites for community engagement rather than shrines to culture. And what could be more accessible and welcoming than food? "Any museum opening is an expression of a certain kind of power or dominance over cultures." Since the beginning, museums have been a display for the objects we deemed of greatest importance — either humanity's greatest hits or artifacts symbolizing the growth of knowledge. "Taste is one of the ways we distinguish ourselves," VonBokel says. Cuisine has now entered the canon of cultural capital. "When you think about what museums do — they inspire people to make connections between things they didn't see before," says Peter Kim, executive director of MOFAD. Unlike other fields, Kim believes that everyone is a food expert to some degree. "Even if you're 10 years old, you've had 10 years of experience dealing with food." Of course, just because you like macaroni and cheese doesn't mean you know anything about the history of pasta, the dairy industry, or artificial flavors, and coloring. That's where the food museum comes in. Kim's goal is to take each visitor on a "learning adventure to see all of these other connections they might not have thought of before." Anyone can repeat what someone else said, but a personal link allows people the chance to think for themselves. Both Chicago's Foodseum and the Southern Food and Beverage Museum in New Orleans have used regional history or foods as a way to organize the more general history and culture of food. The Foodseum is currently exhibiting a pop-up on hot dogs. Its executive director, Kyle Joseph, describes it as a combination history lesson about the Chicago meat industry, a peek into global culture (with information on 23 "encased meats" from around the world), and a children's museum (with a hands-on kitchen where visitors can experiment). "We wanted to talk about the south because it gave us a geographic area we could put our arms around," says SoFAB president, Liz Williams, of the museum's development. The region's cuisine has been heavily influenced by immigrants — both voluntary and not — from many different eras and cultures. "We are looking at the world through the eyes of the south," Williams explains. She believes the newness of food museums gives them a certain cachet. It's hard to know what to expect from a food museum, which means people may not have decided that it's somehow not for them. "Everyone knows what an art museum is because it's everywhere," Williams says. "But not everyone wants to go because it requires a certain amount of appreciation, understanding, knowledge." People understand food: Once you get the visitors in the door, food is a subject with something for everyone. So what do you put inside a food museum? Museums, as constructed "cultural institutions," have a magical (and sometimes problematic) property that allows them to put an object on display and irrevocably transform it into "art." And unlike visual art or natural history, food is a consumer product, too. With so few of these major food museums in existence (even if they are growing in number), what each one exhibits and how they organize or narrate it could have a large impact on how people view food. This is true for any museum, though the impact of thinking Van Gogh is better than an unknown painter is smaller than permanently altering someone's eating habits. An exhibit glorifying food science and packaged food inventions like Lunchables or Fruit Loops would teach very different lessons about what society values than a museum that looked at small farms or water-saving hydroponic growing systems. Mini-food museums were often created as a late-20th-century version of the roadside attraction. Specialized food museums, which focused on food as a commodity as much as (if not more than) food as culture, are not new. Mini-museums were often created as a late-20th-century version of the roadside attraction. How to get people to your Philadelphia pizzeria? House it next to a Guinness World Records-certified "world's largest collection of pizza memorabilia." Want an excuse to build a replica of a Japanese street circa 1950? Add on a series of ramen shops, a little context, and a race car track. One-man museums like the beer can museum or now-defunct banana club are nicely exhibited, public repositories of personal collections run amok. The food and beverage industry has also had a big hand in developing mini-museums (even though some of them are quite large). Coca-Cola, Dole, Dr. Pepper, Hershey's, SPAM, and many others all have museums devoted to the company's history and product line. A major Korean company has a kimchi museum. Belgians have a museum of fries. Even Idaho potatoes have a museum. Most of these mini-museums are marketing first, education second. While the new food museum may have loftier goals, it's not without underlying motivations of its own. The Canada Agriculture and Food Museum, located in Ottawa, is one of many national museums around the world focused on the history and how-to's of farming. While the museum itself has been around for 30 years, it was recently retitled to include "food." It also developed a host of new programming "to highlight the link between agriculture and the food, fibers, and fuel people use every day," says director Kerry-Leigh Burchill. The change has had a big impact on the museum's demographics, as Lee notes "the food movement hasn't hurt." In the past, visitors were mostly families or teachers with groups of young children. "Now, we are seeing more hipster 20-somethings, adults of every age, and seniors coming on their own," says Burchill — a first in the museum's history. The fact that the museum had to make the link between food and farming more explicit to draw visitors also shows why food museums are so necessary. Somehow it wasn't apparent that a museum about farming would be a museum about eating, too. "One of the biggest challenges is that people think museums only celebrate the past," explains Burchill. "We want people to understand contemporary agriculture and the future of agriculture." While visitors do get general knowledge on food and agriculture from the museum's exhibits, the real reason why the federal government in Canada (and many other countries) funds a program like this is because they need more farmers. "From 30 percent of the population directly related to farming, we're now under three percent," says Burchill, adding, "We want to inspire not just future farmers but entrepreneurs and agronomists and food scientists." It's a noble goal but also a great example of why designing a food museum shouldn't be taken lightly. "We feel an immense ethical burden to be a credible and objective source of information," Kim says of MOFAD. "Our subject matter has a direct effect on people's health and the environment... and it's a place where there is an enormous amount of misinformation." "Our subject matter has a direct effect on people’s health and the environment... and it’s a place where there is an enormous amount of misinformation." Though MOFAD is currently sponsored by a number of businesses, it turned down funding by food companies to maintain both autonomy and its new reputation. The Foodseum, on the other hand, does accept sponsors, "but we control the editorial piece," Joseph insists. "We do look for opportunities for them to give out samples or products." Because the Foodseum's goal is to get people to start asking questions about what they're eating, they feel that if their job has been done correctly, people will come to their own conclusions regardless of who sponsored an exhibit. "We don't ignore those brands," Joseph adds. "They're part of the food process, like it or not." Financial backing aside, the act of choosing what to exhibit and how to explain it can cause controversy. MOFAD's first exhibit in its new brick-and-mortar location is on the flavor industry. "Doing anything the right way is doing things the hard way, and every word in this exhibition coming out has been agonized and argued over," says Kim. The museum wanted to make sure it wasn't leaning too far in either direction and had consultants from "diverse backgrounds" advise them throughout the process. But eventually MOFAD had to make a decision. As Kim points out, "You have to say something." It may be impossible for these new food museums to avoid ruffling feathers, for either feeling too partisan or objective to the point of bland. But the age of the food museum is clearly upon us. Williams remembers that in SoFAB's early days, people often stumbled in out of curiosity but without really knowing what they were getting into. "You had those early hardcore foodies and other culture-vulture people who wanted a unique attraction in New Orleans." Today people visit because they like food or like cocktails and want to see what SoFAB has on display. Williams can't wait to see more food museums open up. "It only helps all of us in this business if more people know what a food museum is," she says. * Disclosure: Eater's parent company Vox Media is one of the founding sponsors of the Museum of Food and Drink.
<urn:uuid:6b5698df-9550-463c-8eb8-da3339cbbb8a>
CC-MAIN-2022-33
https://www.eater.com/2015/10/23/9598674/food-museums
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00406.warc.gz
en
0.974535
2,577
2.828125
3
If you’re building a home recording setup and you're ready to start playing back and recording sounds, the time has come to consider getting your first audio interface. An audio interface serves as the hub between your microphones, instruments, computer, and speakers. Given the sheer number of options out there, though, choosing the best interface for your personal setup can be difficult. And of course, there's no one-size-fits-all solution: which interface is right for you depends on a number of factors, so making a decision relative to your personal needs is crucial. In this article, we'll take a stab at defining what exactly an audio interface is, what they commonly contain, and how you can start to make an informed decision about the interface that best suits you. So What Even is an Audio Interface? An audio interface is a specialized computer peripheral designed to help you get sounds into and out of your computer for recording—like a standalone sound card that allows you to interface with your recording software of choice. So when you use an audio interface, you can forego your computer's built-in mic and speakers and instead connect to other gear—you could connect studio microphones, studio monitors, and even connect electronic instruments directly for the sake of recording. For an example of how a typical audio interface might be laid out, see below and read on. Often, interfaces connect to a computer via USB, Thunderbolt, or other standard digital communication protocols. Additionally, you'll find that most interfaces have some number of audio inputs and audio outputs. Inputs allow you to receive audio from the external world—so you could plug in microphones, synths, guitar, or other devices and get their sound into your computer for recording, allowing for much cleaner, clearer recording that you could get out of your computer's built-in mic. Internally, the input connections are connected to Analog to Digital Converters (ADCs) that help translate the analog signals from your gear into a digital format that can travel over USB and be interpreted by your computer. In addition to ADCs, most interfaces also include Digital to Analog Converters (DACs) that translate the computer's digital audio output back into an analog format for sending to external devices. An interface's outputs might include speaker outputs so that you can listen to your mixes on studio monitors, or headphone outputs for more discreet listening. Many budget-friendly interfaces also include MIDI inputs and outputs, allowing you to communicate directly with MIDI-capable synths, drum machines, or other electronic music equipment. So in so many words, an interface is meant to act as a hub for your recording setup—translating the analog signals from instruments and mics into a digital format your computer can understand, and then turning the computer's digital audio output into something you can monitor via speakers or headphones. Interfaces can be large or small, expensive or affordable—so now that we have a basic working definition of what an interface is, let's analyze some ways you might determine whether what specific interface is right for your needs. The Ageless Question: Should I Get a Mixer or an Audio Interface? We often see folks new to electronic music confused about the functional difference between a mixer and an interface, and why you might need one versus the other. This is complicated by the fact that many musicians use audio interfaces and mixers in tandem or as replacements for one another—and truthfully, mixers and interfaces can have a significant amount of functional overlap. Understanding these devices' relationships with one another can help to demystify some options for how to build your recording setup. First things first—we need to offer advice regarding a common misconception about building your home studio setup: for many musicians building a home studio, a mixer is not necessary. It can offer some conveniences, but the image of a recording studio with a giant mixing console isn't necessarily what you need to model your workflow after. In most project studios, the traditional role of the mixing console is entirely handled by your audio interface and your recording software: the interface gets sound into your computer on individual tracks, and the mixing process happens entirely "in the box" in your Digital Audio Workstation (DAW) software of choice. So if that's the case, why are mixers even a thing? Well, while high-end mixing consoles are praised for their sound quality and do play a role in professional studios, oftentimes mixers are simply intended for live use: they have several input channels, and function primarily as a way of combining multiple inputs into a single set of stereo outputs to go to a single destination, such as a live PA. Once mixed, the sounds are intrinsically linked together: they are part of a single combined signal, and cannot be separated from one another for further editing/processing. In analog studios, this is critical—you need to be able to combine all of your tracks to print on tape (which, unlike the computer, typically supports a very low number of independent audio channels), or to apply similar processing to multiple sounds simultaneously. So in live situations or in analog studios, mixers are a key piece of the puzzle—audio often needs to be mixed together for one reason or another. But for the purposes of editing in modern digital studio environments, it is usually undesirable to lay down initial tracks in this way. This is where the audio interface comes in. An audio interface usually has several inputs which allow for multitracking into a DAW: if there are six channels on your interface, for example, it will record six independent channels in your DAW. This is a critical concept in modern recording workflows: multitracking allows you to maintain a separation between sounds when they are recorded, making it possible to later balance them relative to one another, to apply effects to individual sounds without affecting others, or even to overdub individual tracks within a larger mix without affecting the other tracks. Once your mixing/editing/processing is done, you can then use the DAW to merge all of these tracks into a single file. But mixers and interfaces can definitely work together! For live recording, it is common to plug your instruments into a mixer, set your levels to ensure a good mix, and then connect the mixer's stereo outs to the interface to capture a stereo recording in the computer. In home studios, though, it is far more common to use an interface alone: connecting each instrument directly to the interface so that you can capture them all separately, ensuring the ability to go back and tweak your mix later. So for our purposes, it feels like it's virtually always a stronger bet to build your personal recording setup with an interface as the hub rather than a mixer. Note that some mixers do provide USB or other digital outputs to connect directly to a computer. Many of these, such as several members of Allen & Heath's ZED series mixers, only send the Master Stereo output over USB...so while they're great for capturing live mixes, they do not allow for true multitracking in the way a typical interface does. Devices like that merge all of your tracks into a single stereo file, and you'll have no ability to treat sounds separately from one another in your DAW (the same conundrum we described above regarding analog mixers!). There are, of course, yet other mixers that do allow you to multitrack into a DAW, however: Zoom's Livetrak series mixers and Keith McMillen's K-Mix, for instance, allow you to record all of their channels separately in a DAW, making them a great combination of both workflows. Presonus's Studiolive series of mixers is also a great place to look for a device that can handle both workflows equally well. Now that we've highlighted some of the finer points of the mixer v. interface debate, you can start to consider what sort of recording interface you would need for your own purposes. When it comes to making a final decision, it is best to consider what you need from three critical features: the inputs, the outputs, and the overall sound quality. All About Inputs One of the key factors in picking an interface is determining how many inputs you need, and what sort of things you'll need to plug into them. A singer-songwriter with a mic and an electric guitar has different musical needs than a musician with a studio full of synthesizers—and so, each would likely benefit from a different audio interface. You should choose the number of inputs on your interface in part by determining how many sound sources you need to record at one time. If you're planning to record your music one instrument at a time, for instance, it may not be necessary to buy an interface with eight inputs. On the other hand, if you're recording several synths or drum machines simultaneously, you'll need to make sure that your interface can accommodate all of them. Simple enough! Next, you'll want to consider what types of sound sources you're plugging into your interface. Specifically, in this regard we can usually divide sound sources into three different categories: sources with line-level output, sources with instrument-level output, and sources with mic-level output. Line-level devices include most mixers, keyboards, synthesizers, and drum machines; instrument-level signals include electric guitars, basses, and other instruments with passive pickups; and naturally, mic-level signals typically original from microphones. Out of these, line level is the highest of all—followed by instrument level, and then mic level. It's worth noting that Eurorack modular synthesizers often have much hotter output levels than any of these listed signal types...but worry not! You can read some thoughts about that in this article, as well as this one, which focuses on ideas about connecting your modular synth to your audio interface. Interfaces can have any combination of mic, instrument (sometimes labeled "Hi-Z"), and line-level inputs. Because the level (loudness) of each source is so dramatically different, they each have different needs for recording: more specifically, instrument and mic-level signals require a significant amount of gain (level boost) for optimal recording. Usually this boost is provided by a preamp with variable gain, which in many cases is part of the interface itself. So when picking an interface, it is important to be sure you wind up with not just the right number of inputs, but the right type of inputs. Luckily, interface manufacturers are usually quite straightforward about the types of inputs their products include—so just a quick look at their published specifications should tell you what you need to know. They'll tell you how many XLR mic inputs there are, how many Hi-Z instrument inputs there are, and how many line-level inputs there are on any given interface. Returning to our examples above: the singer-songwriter with a mic and an electric guitar well may only require an interface with two inputs. Most likely, they will want one input that will accept mic-level signals, and one input that will accept instrument-level signals. At that point, they will be able to plug their mic and guitar into the interface at one time, capturing each at an optimal signal level. There is a wide range of interfaces that could suit this artist: the ESI MAYA22, for instance, could both be solid choices on a budget, while the Universal Audio Apollo Solo could also work spectacularly, albeit at a slightly higher price (with a number of additional niceties); the Focusrite Scarlett 2i2 could make an excellent middle ground. The musician with a studio full of synths, however, will have different needs. Let's say, for instance, that they want to be able to record four of their synthesizers at one time: they'll most likely want an interface with at least four line-level inputs (or eight, if the synths each have stereo outputs). This musician may not be concerned with having mic or instrument-level inputs. They could, for instance, opt for an ESI U168XT, MOTU Ultralite, or something as fancy as a Universal Audio Apollo x8. A quick note: sometimes, a individual input on an interface may have the option of operating at mic, instrument, or line level—usually allowing you to change the behavior by flipping a switch or pressing a button. Again, just check out the published specs for the interface you're looking at, and things should become clear. Solid Two-Input Interfaces What About Outputs? Once you're settled on the number of inputs you need, it's time to consider how many outputs you need. Choosing this is fairly straightforward: it's mostly a matter of knowing what type of speaker setup you'll use, and knowing whether you plan to use any external effects when recording. Speaker-related demands are fairly straightforward. Most small studios work exclusively in stereo: if you're only doing stereo mixes, you most likely need two outputs for your monitors. Additional outputs can be useful for a number of reasons, though: extra pairs of outputs can easily be set up to assist in A/B testing mixes on different pairs of monitors, for instance, or for sending independent mixes to other musicians in your studio. Additionally, if you're planning to work with more complex speaker arrangements, more outputs may be required. If you're mixing in 5.1 surround, for instance, you'll most likely want an interface with six outputs: five for main speakers and one for a subwoofer (though 5.1 can be set up in slightly different ways). Some major DAWs do provide the option for surround sound output, and even if you aren't a film composer, it can still be a blast to experiment with mixing in these more peculiar contexts. Additional outputs can also be useful if you plan to utilize external effects processors. Those looking to route their interface through outboard effects, such as reverb or compression, will need one interface output per mono send and one input per mono return. By assigning the computer audio tracks to the right output on the interface and sending back into the interface after your favorite effect processor, it’s possible to add external effects to projects in a DAW. So if you have a rackmount or pedal-format effect processor that your music requires, there is most likely a way to get it hooked up with your interface. Getting an interface with multiple sets of outputs doesn't have to be expensive. The ESI MAYA44 USB+, for instance, is a straightforward, four-in, four-out line-level interface. The Focusrite Scarlett 4i4 offers four line outputs and a mix of mic/instrument/line-level inputs at a still quite affordable price. The iConnectivity Audio4c is another excellent choice: with four mic/line inputs, four line outputs, and a headphone output, it packs an amazing amount of connectivity into a portable package. Inputs and outputs aside, there is the further matter of sound quality. This ties in closely with one of our largest practical deciding factors, which we have only discussed in part so far: budget. With interfaces, sound quality does correlate with price to some degree. Some aspects of sound quality are subjective, such as the tonal difference between one preamp and the next. It is true that more expensive interfaces do tend to have better-made preamps with lower noise floor, but generally, interfaces on the more affordable end of the spectrum will do fine for the typical home studio. Of course, there are some more objective ways to assess sound quality as well. One of the most obvious and important measures of quality to consider are sample rate and bit depth. Entry-level interfaces often operate no higher than 44.1kHz sample rate with 16-bit bit depth. Luckily, this quality is perfectly fine for many applications: after all, that is CD-level quality, and if you plan to release your projects digitally, recording to 44.1kHz/16-bit will be perfectly sufficient. But if you're working in other professional contexts, higher resolution may be necessary: sound for film typically requires 48kHz or 96kHz sample rate and 24-bit bit depth. Similarly, many professional recording studios tend to run their sessions at 88.2kHz/24-bit—so in short, if you're collaborating with others, knowing the resolution audio that they will require is a big part of the puzzle. That way, you can always ensure that your collaboration goes as smoothly as possible. Top-of-the-line interfaces such as the Universal Audio Apollo x16 will allow up to 192kHz/24-bit operation, while many interfaces on the lower end of the spectrum (~$100 or so) will only be capable of 44.1kHz, 16-bit operation. There are still, of course, exceptional cases: Presonus's AudioBox USB 96, for instance, records up to 96kHz/24-bit and, at the time of writing, costs only $99.95. Focusrite's Scarlett series, mentioned several times in this article, also offers a great combination of overall sound quality and price across the board. And of course, there's plenty of space inbetween the lowest and highest price points: if you only need a couple of input or output channels, Universal Audio's Apollo Solo, Antelope's Zen Q Synergy Core, and even SSL's 2 and 2+ interfaces all provide stellar sound quality at a wide range of intermediate price points. Tying It Together: Final Considerations These big three things aside (inputs/outputs/sound quality), there are of course other considerations to keep in mind. Another aspect to consider is how the interface will connect to the computer, whether by USB, Firewire, Thunderbolt, PCI Express, etc. Of these, USB is most convenient for many users, and is certainly the most common—though more and more Thunderbolt, USB 3.0, and USB-C interfaces have become available as time has progressed. Interfaces can also be great for recording with an iPad or iPhone. Interfaces such as Focusrite’s iTrack Solo, for instance, have been designed for use with iPads or other mobile devices The iTrack Solo specifically contains two Focusrite preamps, great for use with mics and guitar in particular. As mentioned before, some (but not all!) interfaces also come with MIDI input and output jacks in addition to the audio ins and outs. This MIDI in and out with provide MIDI to and from a computer or MIDI-equipped instrument via the 5-pin MIDI jack. If you only need MIDI for a few instruments, having this in your audio interface will save you from buying a separate MIDI interface. And of course, it’s also worth considering whether the interface will be gigging or staying put in the studio. If it will be traveling, the best choice would be a compact, lightweight, and durable interface, such as the Focusrite Scarlett series (again, a great value for the overall sound quality, build quality, and I/O count). In the end, every situation is unique—and your personal combination of musical needs will play a strong role in determining what your ideal interface looks like. Even given the breadth of musical diversity that we have seen, though, odds are that there is an interface out there suitable for anyone's individual needs.
<urn:uuid:13408f54-c416-415a-a872-ee2a9797bed0>
CC-MAIN-2022-33
https://www.perfectcircuit.com/signal/choosing-your-first-audio-interface
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00406.warc.gz
en
0.942518
3,974
3.046875
3
We are searching data for your request: Upon completion, a link will appear to access the found materials. Why is that whenever we feel sleepy, our eyelids start to feel heavier. It is not like we can any time close our eyes and will immediately fall asleep. But, when we feel sleepy our eyelids automatically become heavy. What causes heaviness of eyelids? Is it because of sleep hormone or something? Why do our eyelids get so heavy when we are tired? Generally speaking, heaviness of the muscles around the eyes, including the levator muscles that open the upper eyelids, is similar to fatigue of any muscle of the body. Ocular and brow muscles are especially prone to fatigue because they are active for most of our waking hours. Over the course of the day, they gradually grow leaden with extended use, as our arms and legs do. Such a feeling may be compounded by general fatigue, including a lack of sleep, or by specific muscle overuse related to long hours of focusing on, say, a computer monitor. Excess skin of the eyelid, or prolapsed fat pads underneath the eyes, makes an individual more prone to this sensation. Chronic allergies and sinus infections may also exacerbate the heaviness, and sun exposure may cause eyelid swelling and thereby increase the probability that the drooping will interfere with vision. Although heavy eyelids do not typically indicate underlying medical issues, some conditions do cause drooping eyelids, or ptosis. A stroke or a muscular disorder such as myasthenia gravis or myotonic dystrophy can damage facial muscles or their nerves and cause ptosis, as can elective facial surgery or interventions such as Botox injections to the brow. Editor's Note: This story was originally printed in the November 2008 issue of Scientific American. Interesting facts about blinking Human biology is interesting. The quick mechanism of blinking, although some may be aware of it, is often unconscious. The human brain has made the person unconscious of blinking that one is made unaware of the brief moment when the eyes close. The risk of eye infection increases when one does not blink for an extended period. If you are now caught aware of your blinking and detects problems with it, there are ways to improve blinking. This includes one-minute sessions done five times in a day. In each session, you must close your eyes, gentle and not tightly shut, and direct your eyes up, down, left, right, and center. This should improve your eyes’ state and help give your eyes enough time to rest, get back its moisture, and sanitize it against irritants and bacteria. Perhaps sleep is simply our version of such "adaptive inactivity", allowing us to be productive during the daylight hours while avoiding overexertion If it played a role in memory consolidation or some other brain function, then you wouldn’t expect the big brown bat to get a whopping 20 hours a day, while the much larger and cognitively complex African elephant survives comfortably on just two. Instead, Siegel wonders whether sleep may not be a biological requirement itself, but rather evolution's way of maximising productivity. As he wrote in Nature Reviews Neuroscience in 2009, perhaps sleep provides a means of "increas[ing] the efficiency of behavior by regulating its timing and by reducing energy use when activity is not beneficial." Bears hibernate so that they don't expend energy at times when food is scarce (Credit: iStock) It's a common trick in both the animal and plant kingdoms. Some trees shed their leaves in the autumn and cease photosynthesising, which could be thought as a kind of botanical slumber. Bears hibernate in the winter, in part to avoid fruitlessly expending energy hunting and foraging at a time when there is not much food to be found. Other mammals, such as echidnas, enter a sleepy-state known as torpor, where their metabolism slows down to barely a whisper to help them get through hard times. Perhaps sleep is simply our version of such "adaptive inactivity", allowing us to be productive during the daylight hours while avoiding overexertion - and, historically, exposure to predators - at night, while still permitting us to awaken easily if necessary. Symptoms Associated With Tired Eyes Whatever the cause, the signs of eye fatigue are unmistakable. Other symptoms that may be associated with tired eyes include: - Redness or irritation - Difficulty focusing - Dry or watery eyes - Blurred or double vision - Increased sensitivity to light - Pain in the neck, shoulders, or back Sleep deprivation can intensify these symptoms and reduce your productivity. Getting enough sleep is essential for eye health. Sleep allows your eyes to fully rest, repair, and recover. Insufficient sleep may result in persistent eye irritation and weaken your vision. 5. Bone structure Some people simply have a genetic predisposition to forming dark circles under the eyes, which are often present as early as childhood, explains Dr. Sanders. That may be a result of the contour of your skull and how your skin and the fat underneath it interact with it. A deep tear trough—a groove extending from the inner corner of the eye out along the cheek—can create a noticeable semicircle under the eye. Some people have eye sockets that are further sunken in, and the shadow of their bone structure makes it appear as though their dark circles are worse, adds Dr. Elliott. ELI5: What Happens In Your Body The Exact Moment You Fall Asleep? Wow Guys, thanks for all your answers. I learned so much today! See, you don't actually fall asleep all at once. It's more of a well-defined process that everyone makes their way through in their own time. I'll attempt to explain it. You start off moving into what's called Stage 1, from being completely awake. When you first lay down to go to sleep, you pass from your awake state to what's called Alpha state. You've daydreamed before, right? That's basically Alpha state. You're still mostly conscious, but you start to see some little bouts of color behind your eyes (hypnogogic hallucinations) and you start to feel more relaxed. After Alpha, you enter Theta state. Theta state is when you could technically be considered asleep. This is when you move completely into sleep paralysis (have you felt like you were falling then woken up with a start? that's sleep paralysis setting in and you not being completely unaware when it happened). You're still sleeping relatively lightly, but if you can get through this stage you move into deeper sleep. The next major stage of sleep is called Stage 2. Your brain starts to produce short periods of rapid brain waves that are called Sleep Spindles. This is the precursor to what comes next in sleep, deep sleep. Your body temperature begins to drop and your heart rate slows down, settling you in for the night. When you enter stage 3, really slow brain waves called Delta waves start happening. This is the true transition between light and deep sleep. Stage four is commonly referred to as Delta Sleep because of the brain waves associated with it. It's a deep sleep that lasts for about thirty minutes. You are the technically the most asleep in this stage. Here's where it gets interesting. There is another stage of sleep unlike all the others. It's called Stage 5, or REM sleep. REM stands for Rapid Eye Movement, your eyes literally start moving rapidly behind your eyelids. Your breathing rate increases, and your brain waves shoot up to almost as active as if you were awake. Your voluntary muscles become completely paralyzed, and you start dreaming. REM is also where most of the body's repairs happen. REM sleep is what makes you feel rested when you wake up, and where the body actually rests and restores itself (which is why you usually don't feel rested after a night of drinking or smoking weed, they both inhibit REM sleep). These stages come in cycles. It takes roughly 90 minutes for you to go from awake into REM. The first cycle typically has a short REM period, but subsequent cycles increase the duration of REM. When we actually fall asleep, we go from stage 1 into 2, then 3, then 4, but here's where something curious happens. We then go from 4 to 3, then 3 to 2, then into REM. After REM, we usually return to stage 2, then go back to 3, 4, then 3, 2, REM. We have as many cycles as we stay asleep for, when we wake up, feeling refreshed and ready or the day. I don't know if that answered your question, but I hope it shed some light on the subject. Edit 2: I'll be here if anyone has any other questions theyɽ like answered about this topic. Edit 3: Holy crap! Thanks for popping my gold cherry anon! Much love! <3 Edit 4: Wow this blew up. Thanks for all the questions! I'm getting to them all, don't worry! There are several treatments for a stye, ranging from home remedies to medical and surgical treatments. When you have a stye, do not wear eye makeup or use contact lenses until it resolves. Do not ever squeeze or pop a stye. Home remedies and self care include: - A warm compress: Place a clean, moist, hot washcloth over your eyelids for 10 to 15 minutes, three to five times a day. Reheat the washcloth as needed if it loses its heat. - Gently massage the area around the stye: This can help loosen clogged oil glands. Again, remember not to touch or squeeze the stye itself. - Wipe away drainage: If you have any drainage from the eye, use a baby shampoo or eyelid wipes to remove it. - Over-the-counter pain relievers: These can help reduce pain and inflammation associated with the stye. Medical treatments may include: - Antibiotics: A doctor may prescribe oral or topical antibiotics if you have a stye that is infected. - Steroid injection into the stye: This may be used to lessen the swelling, especially if a chalazion forms. - Drainage of the stye: An eye doctor would do a procedure if the stye does not go away and if it affects your vision. It is usually done in a doctor's office using local anesthesia. What happens if you sleep with your eyes open? People who sleep with their eyes open may wake up feeling their eyes are dry and grainy. Some may think this habit is odd, but it is quite common. A person who sleeps with their eyes open regularly could end up with severe eye problems, however. The medical term for sleeping with the eyes open is nocturnal lagophthalmos. Up to 20 percent of people are affected. One reason that it happens is problems with the facial nerves or muscles that make it difficult to keep the eyes fully closed. It can also occur because of problems with the skin around the eyelids. If people keep their eyes open while sleeping, their eyes can dry out. Without enough lubrication, the eyes are more susceptible to infections and can become scratched and damaged. People may experience the following: - blurred vision - irritation or a burning sensation - sensitivity to light - feeling as if something is in the eye or rubbing against it - poor sleep quality Most people realize they have slept with their eyes open because another person tells them they have done so. People usually sleep with their eyes open because of a problem with the facial muscles, nerves, or skin around the eyelids. Paralysis or weakening of the muscle that closes the eyelids, known as the orbicularis oculi, can cause someone to sleep with their eyes open. Conditions that can cause muscle weakness or paralysis of the facial nerves include: Trauma, injury, or surgery can also result in damage and paralysis to facial muscles and nerves. Infections can be less common causes, and these may include: Graves’ ophthalmopathy, where the eyes bulge or protrude, can also make it difficult to close the eyes. Very thick upper or lower eyelashes may also prevent the eyelid from closing completely, though this is rare. There is not always a reason or underlying condition that causes nocturnal lagophthalmos. It may also be genetic. There are several treatment options. A doctor might also prescribe medications, including: A person can also wear moisture goggles at night, which can help. These work by moisturizing the eyes during sleep. Sleeping with a humidifier in the bedroom can also keep the surrounding air moist and less likely to dry out the eyes. A doctor may recommend using an external eyelid weight. This is attached to the outside of the upper eyelids to keep them closed. Applying surgical tape to the eyelids also serves the same purpose. Another option is surgery, though this is usually only recommended for severe cases. Surgery for nocturnal lagophthalmus There are multiple surgeries that can treat lagophthalmos. In one type of surgery, a gold surgical implant is inserted into the eyelid that works like an eyelid weight to keep the eye closed while someone is sleeping. This surgery involves making a small incision on the outside of the eyelid above the lashes. This creates a small pocket where the implant is inserted. The implant is held in place with stitches, which seal the pocket. Antibiotic ointment is applied to the eyelid to help it heal. As a result of the surgery, a person may experience:
<urn:uuid:ba1eac15-06f3-4c15-a989-c01ece339fda>
CC-MAIN-2022-33
https://standardtoday.co.uk/5325-what-happens-to-eyelids-when-we-feel-sleepy.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00404.warc.gz
en
0.950016
2,875
2.78125
3
Abstract: As the human population is increasing and resources are limited, there is demand for more sustainable practices. Especially in agriculture where arable land is limited and demand of food will increase, for this concern one must shift to modern farming techniques. Vertical farming technique has the potential to impact the world in more sustainable form. Vertical farm is life-altering innovation whose era has been started. Production of food vertically by new agricultural methods, combining the design of building and farms all together in a building inside the cities, a perfect combination of architecture , agriculture and technology. Considering this technique as a modern tool for feeding a large world population by future. It is all about constructing a farm which is close to people, serves cheaper, organic, disease free crops along with sustaining limited natural resources. Keywords: Vertical farming, sustainable, traditional, hydroponics, aquaponics, aeroponics, skyscraper Global food system is starting to shear as the world population is expected to reach 9.7 billion by 2050 and food demand is expected to increase anywhere between 59% to 98%. By that period the planet's arable land is estimated to be half of what it was in the 1970s. To come up with the solution “Vertical Farming” is one of technique to replace arable land. Vertical farming is the exercise of producing food in vertically stacked layers which are commonly integrated into other structures like skyscrapers, reallocated warehouses or shipping containers rather than farming on field or a protected greenhouse. Maximum output of crops in a narrowed space and replacement of traditional farms with vertical farms located in urban areas to decrease the proportion of land, water, and energy used and create more sustainable form of food production is the prime goal of this farming. This indoor modern farming technique is done by using Controlled Environment Agriculture (CEA) technology. In vertical farming there is artificial control of temperature, light, humidity, and gases which is close to greenhouses where natural sunlight is extended through metal reflectors and artificial lighting. Vertical farms' key purpose is to lower the overall resources used and also to reduce agriculture’s carbon footprint. This farming is defined as “a type of indoor farming that seeks to maximize production and efficiency per square foot by growing crops in multiple levels on a vertical axis”. Fig. 1 Vertical farming skyscraper model and Indoor Vertical farming (Source: The Economist) We know growing research on vertical farming through various sources such as academic papers, professional reports, news, articles, blogs, etc. The paper is based on secondary data collected from these various sources. The paper gathers information on basic vertical farming. First part of the paper gives overall introduction follows major components of vertical farming, second part expresses the need of this technique along with benefits and limitations and lastly third part is about the type of technique used in vertical farming and some effective vertical farming all over the world. Overall, the main aim of this paper is to critically examine Vertical Farming modern techniques to an approach of sustainable agriculture. The paper collects complex information and makes it accessible to the amateur. By reviewing, organizing, and gathering information of various sources, the paper hopes to provide a better understanding of the theory and practice of vertical farming. A. How Vertical Farming Works? Vertical Farming works with help of four important components: 1) Physical Design: Prime goal of vertical farming is to maximise volume basically to produce more food in less area. It is achieved by growing crops vertically on a stacked tower. 2) Lighting: Mixture of grow lights and natural light is accurate for crop growth in vertical agriculture. To increase the efficiency of light, rotating bed technologies should be used. It can also fulfill different crop requirements. 3) Growth Medium: In vertical farming instead of soil, different growth medium is used. Generally, use of nutrient solution(in hydroponics), air and spray mist (in aeroponics) as growth medium. Peat moss or coconut husk and some other non- soil medium are very popular in vertical farming. 4) Sustainability Features: Vertical farms are considered for sustainability as they use sustainable features like rainwater tanks, wind turbines, and multipurpose spaces to offset energy costs of farming. can in a vertical farm. These farms use less water than conventional farming practices. B. Why Vertical Farming? 1) Food Security: As the world’s population will increase by 40%, exceeding 9 billion people by the year 2050, and as predicted we will need 70% more food to meet the demands.Vertical farms promoter claims that vertical farming creates close-packed and self sufficient ecosystem which cover numerous functions from food production to waste management. It can entitle production of food in a structured and sustainable manner, and can provide access to healthy food. Current agricultural supply will soon become inadequate and to meet further demand we need to adopt this modern farming. 2) Climate Change: Climate change will destroy large tracts of arable land, making them useless for farming. In traditional farming, farmers use fossil fuel to run machinery, emit GHG which leads to climate change, a major issue to deal with. “Food miles” refers to the distance crops travel to reach central urban populations. Food travels 1500 km averagely from farm field to dinner table. It requires transportation which emits carbon dioxide. Vertical farming somehow reduces use of machinery and food miles will not become an issue as this farming technique is done in between urban populations. 3) Space Efficient: Vertical farming has benefits over horizontal farming. As population is increasing and agriculture land is now converting into housing properties, reducing scope of arable land. Vertical farming in a 30-story building about 100 m high with a basal area of almost 2 ha would be able to produce a crop yield equal to almost 970 ha of conventional horizontal farming which means the production of one high rise farm equivalent to 480 conventional horizontal farms. 4) Ecosystem: According to Dickson Despommier, “Farming has upset more ecological processes than anything else—it is the most destructive process on earth”. The agricultural impact on ecosystems can be reduced by indoor vertical farming through biodiversity restoration and less negative influences of climate change. If cities implement vertical farms which consume 10% of ground area, then it might help in CO2 emission reduction which might be enough to develop better technological innovations for improving the condition of the biosphere long-term. By elimination of fertilizer runoff, coastal and river water could be restored, and marine life could increase. 5) Economic Development: Vertical farming provides an opportunity to support the local economy. Vertical farms can narrow the gap of food cost of traditional farms as it is located in urban areas and increase the possibility to sell produce directly to the consumer, reducing transportation costs by removing the intermediary and comprise up to 60% of costs. Table 1. Advantages and disadvantages of vertical farming S.No. Advantages Disadvantages 1. Provide proposals to deal with future food problems. Expensive to build and high installation costs. 2. Allows crops to grow year-round. Pollination would be costly and difficult. 3. Water can be used efficiently. Too much dependency in technology. 4. Less exposure to chemicals and diseases. Involve high cost technical labour. 5. Not affected by unfavourable climatic conditions. Requires large amounts of electricity. 6. Environment friendly. Leaves a smaller footprint. Significant maintenance efforts. III. TECHNIQUES OF VERTICAL FARMING In this technique, plants are grown in nutrient solution without soil. Plant roots are submerged in nutrient solution in the grow tray. These grow trays are filled with nutrient solution by using a reservoir below the tray, a water pump and a timer. Timer is set according to parameters like plant size, water, nutrient requirement and growth cycle of the plant as well as temperature. This is a predominant technique used in vertical farming. Fig 2. Schematic Diagram of Hydroponic System Most efficient vertical farming system, uses 90% less water than the hydroponic system and plants grow quicker. In this technique, plants are grown in an environment where air is present with little water or mist but without soil. Plant roots are suspended in air and nourished by misting of root zone with nutrient solution on a regular basis by sprayer. Fertilizer usage is reduced by 60% while crop yield increases by 45 to 75%. Fig 3. Schematic diagram of Aeroponics System Combination of aquaculture and hydroponics in the same ecosystem. Fish grown in fish tanks produce waste which is supplied as nutrients for plant growth in a growth tray. Water in the fish tank is circulated in the grow tray as it is rich in ammonia. In a growth tray, nitrifying bacteria convert ammonia to nitrites and then to nitrates and finally the solids are converted to vermicompost, used as bio fertilizer. Water which has all decomposed waste used by plants as nutrients is recycled back to the fish tank. Major benefit of aquaponic is it has to be monitored carefully for the first month, but once it is set up only pH and ammonia levels have to be monitored per week. Fig 3. Schematic diagram of Aquaponics Systems Table 2. Some effective Vertical Farming all over the World S.N Vertical Farm Height Area Products Technology 1. The Plant VF Chicago, IL 3 story 100,000 sq.ft Edible crops include artisanal brewery, kombucha brewery, mushroom. -Aquaponics system and fish breeding area -Recycling waste to energy - Biogas usage from anaerobic digester. 2. Sky Green farms, Singapore 9m 600sq. m Leafy green vegetables. -Aeroponic system -Low carbon hydraulic water- driven -Natural sun energy 3. Republic of South Korea VF, South Korea 3 story 450 sq.m Leafy green vegetables, almost wheat and corn. -Renewable resources like geothermal and solar -Automated rack system 4. Nuvege plant factory, Japan (Kyoto) 4 story 30,000 horizontal sq.ft 57,000 vertical sq. ft Leafy green vegetables -Automated rack system -LED grow lights 5. Vertical Harvest Plant, Wyoming, USA 3 story 4500 sq. ft. footprint into 18,000 sq.ft Tomatoes, Strawberries, Lettuce and micro greens -Recirculating hydroponic method 6. AeroFarms 9m 20,000sq.ft with 35 rows and 12 levels Different herbs and green grows like kale, arugula and mizuna -LED lights -Using sensors that track growing process -Recycle water technique -Without soil, pesticides and sunlight To sum up, Vertical farming is the future of agriculture. As population is increasing day by day and it is estimated by 2050, the population will touch almost 10 billion but on the other side arable land is decreasing due to urbanization, industrialization and many more things which are occupying agricultural land. It is high time to switch to modern Vertical Farming to practice a more sustainable form of agriculture. Currently, it is not so popular and advanced and has some limitations over benefits but near future it will be normalised as traditional agriculture. This farming technique comes with so many opportunities, “Technology from farm to rooms”.These farms can be small or large in scale and totally depend on the farmer. Even urban cities can farm in limited areas and even provide new opportunities for architecture and urban designing. “We live vertically, so why can’t we farm vertically?” Global Demand for Food Is Rising. Can We Meet It? https://hbr.org/2016/04/global-demand-for-food-is-rising-can-we-meet-it How Sustainable is Vertical Farming? Students Try to Answer the Question https://blogs.ei.columbia.edu/2015/12/10/how-sustainable-is-vertical-farming-students-try-to-answer-the-question/ Kor Kamonpatana et.al, Vertical farming concept in Thailand: Important decision Variables Volume 2, Issue 12, December 2013 International Journal of Innovative Research in Science, Engineering and Technology (An ISO 3297: 2007 Certified Organization), The United Nations.World Population Prospects: The 2017 Revision;United Nations: NewYork, NY, USA, 2017 P. Platt, “Vertical Farming: An Interview with Dickson Despommier,” Gastronomica, vol. 7, no. 2, pp. 80–87, 200 Corvalan, C.; Hales, S.; McMichael, A.J. Ecosystems and Human Well-Being: Health Synthesis; World Health Organization: Geneva, Switzerland, 2005. Banerjee and Adenaeur, 2014, The Aquaponic Source , 2017. Rashmi Maria Royston, PavithraM.P., VERTICAL FARMING: A CONCEPT, ISSN: 2395-1303, Volume 4 Issue 3 A Review of Vertical Farming Technology: A Guide for Implementation of Building Integrated Agriculture in Cities Fatemeh Kalantari1, Osman Mohd Tahir, Ahmad Mahmoudi Lahijani, and Shahaboddin Kalantari, ISSN: 2234-991X, Vol. 24, pp 76-91 The Vertical Farm: A Review of Developments and Implications for the Vertical City, by Kheir Al-Kodmany Opportunities and Challenges In Sustainability of Vertical Farming: A Review by Fatemeh Kalantari , Osman Mohd. Tahir, Raheleh Akbari Joni and Ezaz Fatemi Vertical Farming Using Information and Communication Technologies by Manoj Kumar Gupta and Shreedhar Ganapuram
<urn:uuid:5af772ba-332e-4a88-92b3-171730671b28>
CC-MAIN-2022-33
https://www.ijraset.com/research-paper/Vertical-Farming.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00003.warc.gz
en
0.905338
3,047
3.71875
4
“The Eucharist commits us to the poor.” When I first encountered this statement in the Catechism of the Catholic Church, I was puzzled, because in all my years of Catholic education I had never been taught this. Oh sure, I had been taught the obligation to care for the poor, the call to see the face Christ in the poor. But that was ethics; that was morality; that was justice; that was discipleship. It wasn’t sacramental theology. Yet here it was before me, from an authoritative Catholic source, and with backup from no less than Saint John Chrysostom, one of the fathers of the church: “The Eucharist commits us to the poor.” Saint Luke’s gospel is the ultimate source of this idea, I think. Luke is always concerned with the poor, from the jubilant song of Mary celebrating how God has cast the mighty down from their thrones and raised up the lowly, and the moment when poor shepherds in the fields become the first to hear the angels announce the birth of the Messiah, to the story of the widow’s mite, the parable of the woman who searches for one small lost coin—an image of the Kingdom of God—and much, much more. For Luke, the use of possessions is a sign of the Reign of God—a theme he carries out through the Acts of the Apostles, when he says that the hallmark of young Christian community is “they shared all things in common.” When Luke tells us the story of the feeding of the five thousand, he is talking about people with actually empty stomachs. It’s a wonderful story. All these hungry people, and the disciples don’t think they’ve got the wherewithal to help. But, guess what? They have. “Give them something to eat yourselves,” Jesus gently tells them, and then proceeds to show them how. What happens next is something marvelous: five loaves and a couple of fish turn into food for five thousand, with twelve baskets left over. Did the people in that crowd begin to share with each other, once the disciples shared what they had? This story is not just about a picnic out in the fields however, or a miracle however marvelous. It’s a sign, a prophetic sign of what it looks like when the Reign of God breaks into the world. And, for the apostolic Christians and for many throughout Christian history, the meaning of this sign is inextricable from the meaning of Eucharist. Here’s the clue: In the feeding of the five thousand, Jesus takes the bread, blesses it, breaks it, and gives it. What did we hear Saint Paul saying in the second reading? “The Lord Jesus took bread” gave thanks and broke it and gave it. And something happens. At the Last Supper, bread and wine become the Body and Blood of Christ, given for us. Out in the fields, scarcity turns into abundance. Hungers are satisfied, and things the disciples thought they could not do become amazingly possible. It can happen still, whenever people gather, listen to the words of Jesus, andbreak the bread. “The Eucharist commits us to the poor.” I’ve been helped to understand how this makes sense theologically by reading the writings of one of the American leaders of the Liturgical Movement from the early twentieth century: a Benedictine monk of St. John’s Abbey in Collegeville Minnesota, Fr. Virgil Michel. He argued that it is through the liturgy that we come to know and experience ourselves as members of one body in Christ. It’s through participation in the Eucharist—the sharing of the one loaf and the one cup—that we discover and affirm again and again that we need one another, that no one is dispensable. We are all part of the same Mystical Body of Christ. No one can say to another person, “I don’t need you.” The act of celebrating Eucharist is thus a promise, Virgil Michel explained: A promise that we will live our life outside the liturgy according to that same love of God and neighbor that we experience within it. Unless we do that, our action at the altar “would be at best lip-service, a lie before God.” It follows, therefore, that a Eucharistic piety that discerns the Body of the Lord in the consecrated species, but not in the body of our brothers and sisters in need is not a genuine Eucharistic piety. It’s something less than that. Eucharist commits us to the poor, because Jesus chose to identify himself with them, and he tells us again today: “Give them something to eat.” So let us then, as a Eucharistic people, commit ourselves to sharing our bread with the hungry, but also to sharing the wine of gladness and joy with the poor that comes from sharing our very lives. We meet today to celebrate the Solemnity of the Most Holy Body and Blood of Christ, the church’s feast honoring the Eucharist. But what does Eucharist mean? That is the great question—one that we must continue to ponder. Catechism of the Catholic Church, Second Edition; United States Catholic Conference, 1997; no. 1397. John Chrysostom is often quoted in this regard, but he is not alone. For more patristic texts on poverty, see Helen Rhee, Wealth and Poverty in Early Christianity; Minneapolis: Fortress Press, 2017. Luke T. Johnson, Sharing Possessions: Mandate and Symbol of Faith; Philadelphia: Fortress Press, 1981. [i4] Acts 4:32. See also Acts 4:34–35. See Paul Marx, OSB; Virgil Michel and the Liturgical Movement; Collegeville: Liturgical Press, 1957, and Keith F. Pecklers; The Unread Vision: The Liturgical Movement in the United States of America 1926–1955; Collegeville, MN: Liturgical Press, 1998. Marx’s biography contains a complete bibliography of Michel’s own writings, which were extensive, including many essays in Orate Fratres, a publication he founded in 1926 (renamed Worshipin 1951 to signal its support for liturgy in the vernacular). Michel died in 1938. Virgil Michel, “The Cooperative Movement and the Liturgical Movement,” Orate Fratres Vol. XIV, Feb. 1940, p. 156. For a bracing treatment of this subject, see Goffredo Boselli, “Liturgy and Love for the Poor,” in The Spiritual Meaning of the Liturgy: School of Prayer, Source of Life,translated by Barry Hudock; Collegeville: Liturgical Press, 2014; 183–208. In the words of Andrew McGowan, “Hunger makes for interesting and diverse table fellowship.” “The Hungry Jesus,” Biblical Archeology Society, December 7, 2017; https://www.biblicalarchaeology.org/daily/biblical-topics/bible-interpretation/the-hungry-jesus/ accessed May 28, 2019. Rita Ferrone is an award-winning writer and frequent speaker on issues of liturgy and church renewal in the Roman Catholic tradition. She is currently a contributing writer and columnist for Commonweal magazine, and serves as general editor for The Yale ISM Review, an ecumenical journal of worship and the arts for the Yale Institute of Sacred Music. She is a contributor to the Pray Tell Blog, and writes for the Liturgical Press daily prayer resource, Give Us This Day. Rita’s books include Liturgy: Sacrosanctum Concilium (Paulist Press), Sourcebook for Sundays and Seasons 2006(LTP), and On the Rite of Election (LTP). She co-authored the eighteen-volume series, Foundations in Faith (RCL-Benziger), and the parish renewal program Living the Eucharist (Paulist Evangelization Ministries). A contributor to scholarly journals here (Worship, Horizons, Studia Liturgica), and abroad (La Maison Dieu, Gregoriusblad); as well as international web publications (katholische.de, Il Sismografo), Rita has written for Catholic general interest magazines (America, Ligourian), and ministry journals (Rite, Catechumenate, GIA Quarterly). Her articles and essays have been translated into eight different languages. Her commentary has also appeared in The Washington Post and on CNN International. Rita’s background in ministry includes work as a parish liturgist (New York) and cathedral liturgy director (Milwaukee) as well as a diocesan director of the catechumenate (New York and Allentown). As a speaker, she has presented in more than eighty dioceses. She has given parish retreats and missions, as well as talks to university audiences. She has written religion textbooks and educational materials for major publishers, and has served on liturgical commissions in four dioceses. Rita holds an MDiv from Yale Divinity School. She received their Alumni Achievement Award for Distinction in Congregational Ministry in 2007. Her bachelor’s degree, in Communications, is from Fordham University. She lives in Mount Vernon, NY. Take an opportunity to read and reflect on the Sunday readings during the first five weeks of Lent. Participants are provided with links to reflections on the Lectionary readings (Cycle A) written by scholars -- including weekly preaching from Catholic Women Preach. Then, each week participants share their insights in an online community discussion, guided by a facilitator.MORE INFO/REGISTER Advertise with Catholic Women Preach: email Russ at email@example.com
<urn:uuid:7cb3af1c-2f96-4b5d-bb77-e4511a30fee7>
CC-MAIN-2022-33
https://www.catholicwomenpreach.org/preaching/06232019
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00005.warc.gz
en
0.945395
2,169
2.59375
3
The south-western region of the Central African Republic includes one of the most pristine tropical forests in the whole of Africa. Located in the Congo basin, it remains a paradisiacal habitat, harbouring an exceptional faunal diversity: forest elephants, forest buffaloes, sitatungas, bongos, several duiker species, two species of forest pigs, and 10 primate species besides gorillas and chimpanzees. This great biodiversity and the presence of so many species of large mammals are the treasures of this area. Large mammals are important flagship species that, when endangered and charismatic, have the potential to attract international attention for their conservation. The gorilla is a perfect example, raising great international attention. Even though continuous efforts have been made towards its preservation, further action still needs to be taken to protect such a charismatic primate. Throughout their range, western gorillas (Gorilla gorilla) are endangered not only by habitat destruction and poaching, but also by threats unrelated to human activities. As a consequence of the tremendous decline of western gorilla populations in Gabon and Republic of Congo due to Ebola outbreaks, the IUCN reclassified western gorillas as "critically endangered". Despite the great international attention, very little information based on direct observation is available on western gorilla ecology, behaviour and natural history, creating a crucial necessity to fill this gap. The south-western region of the Central African Republic is also characterized by the presence of natural forest clearings ("bai" in the local Pygmy language) of different sizes. These allow an easy observation of large mammals, including gorillas and elephants, since the animals are attracted by mineral rich soil, clay and aquatic plants. Acknowledging the high biodiversity and the high tourist potential of the area, a system of protected areas was officially created in 1990. Under the direction of the Dzanga-Sangha Project, today named Dzanga-Sangha Protected Areas, it consists of 1) the Dzanga-Ndoki National Park, integrally protected, and 2) the Dzanga-Sangha Dense Forest Special Reserve where local people can carry out legal forest activities. The project is a partnership between the World Wildlife Fund (WWF), the Central African Republic government, and, since 1994, the German Technical Cooperation (GTZ). The long-term goals of the project are: 1) to protect the forest ecosystem from changes in forest cover due to the increase in logging activities and illegal hunting, and 2) to promote sustainable development in the region through a rational use of natural resources. Until now, Dzanga-Sangha Protected Areas has greatly contributed to the protection of western gorillas and forest elephants, preserving their habitat and supporting ecological and behavioural studies. Today the Dzanga-Ndoki National Park, together with the Lobéké National Park in Cameroon and the Nouabalé-Ndoki National Park in the Republic of Congo, is part of a larger system of protected areas called the Sangha Trinational Complex. The Trinational Complex is one of the best examples of organized conservation planning in the Congo Basin covering contiguous lowland tropical rainforest of critical biological significance, and supporting one of the most pristine blocks of protected forest in Central Africa. One of the several forest clearings in the Dzanga sector of the Dzanga-Ndoki National Park is Bai Hokou, chosen as a camp site in the forest and the headquarters for research and tourist activities. At Bai Hokou, the Dzanga-Sangha Protected Areas created the "Primate Habituation Programme" under the direction of Chloe Cipolletta, now run by Angelique Todd. Its long-term objective is to develop eco-tourism based on viewing of gorillas and other primates. Gorilla tourism draws national and international attention to problems involved in protecting the ecosystem where gorillas live, and increases support for higher conservation efforts. Good examples are found in Rwanda and Uganda, where gorilla ecotourism has been contributing significantly to the conservation of mountain gorillas (Gorilla beringei beringei) and the livelihood of local people. Developing gorilla ecotourism in Central Africa, however, has been more difficult since western gorillas have been particularly challenging to habituate to human presence, much more so than mountain gorillas. Difficulties are linked to the lowland forest habitat (limited visibility and unclear tracks left by western gorillas) and differences in gorilla sociality (wider group spread, and possibly higher rate of changes in group dynamics in western gorillas in comparison to mountain gorillas). In Bai Hokou, gorilla habituation was successful thanks to the unparalleled knowledge of the forest by the native Ba'Aka Pygmies, who retain their traditional lifestyle in this area. However, when habituating animals, especially primates, risks associated with habituation must be taken into account. The success of Bai Hokou in habituating western gorillas is also due to rigorous application of rules aimed at minimizing risks of disease transmission from humans to gorillas. In addition, the long-term action of the Dzanga-Sangha Protected Areas guarantees constant protection of the habituated gorillas that become more vulnerable to poachers, having lost their fear of approaching humans. With respect to other Central African conservation projects, where gorillas are observed from platforms in open clearings, the unique advantage of Bai Hokou is that researchers and tourists can follow the daily life of this elusive primate deep into the forest and observe it in close proximity. The recent success of habituation of western gorillas is starting to gradually fill the gap in our knowledge of western gorilla socioecology. Until recently, information based on direct observation of gorilla behavioural ecology was limited to few specific habitats, such as forest clearings, or to the well studied population of mountain gorillas. Mountain and lowland habitats, and accordingly the socio-ecology of western and mountain gorillas, differ dramatically. Long-term research and monitoring of habituated groups of western gorillas are fundamental to increasing our understanding of their nutritional and habitat requirements, their life history and their social dynamics, all critical information for their conservation. In Bai Hokou 4 western gorilla groups are currently identified and/or followed daily. Two groups are in the process of habituation; a third group, called "Mayele", is currently semi-habituated and almost ready to receive tourists and researchers; while the fourth group, "Makumba", is one of the only two groups of western gorillas in the whole of Africa fully habituated to human presence. The group was first located in 2001 by Angelique Todd, and since early 2002 it has been followed daily, becoming fully habituated only in 2007-2008. Thanks to the skilled Ba'Aka trackers this group is now located every day at the night nest site and followed closely from dawn to dusk, right up till the gorillas stop to build new nests for the coming night. Since the commencement of the habituation, the group's composition has changed several times, including transfers of 3 subadult individuals, one death of a 1-year-old infant (of natural causes) and the ensuing transfer of his mother. Today group Makumba consists of 1 silverback, 3 adult females, 1 blackback, 3 juveniles and 3 infants. In 2000, together with collaborators, I started to investigate in Bai Hokou how habitat and seasonal changes in food availability influence western gorilla feeding ecology, examining in particular gorilla food choice in relation to the nutritional and energetic value of available food. With my colleagues at the Max Planck Institute in Leipzig, we found that even though gorillas become more frugivorous when fruit is more available in the habitat, their energy budget and energy requirements do not change throughout the year. During periods of fruit scarcity western gorillas can still rely on high quality young leaves and herbs. Investigating the behavioural responses of gorillas to seasonal changes in food availability helps us to understand the diverse adaptations of apes to different environments, and provides us with insights into their resilience in response to habitat alteration associated with deforestation and forest degradation. Currently I am collaborating with Sabrina Krief at the National Museum of Natural History in Paris to continue my research on western gorillas in the Central African Republic to obtain a complete picture of western gorilla food choice. We will integrate our previous data on nutritional and energetic values of gorilla food with new data from direct observations of gorilla feeding behaviour, with gorilla health monitoring (including fecal, urine and genetic analysis of each individual of group Makumba), and with phytochemical analyses of plants consumed by gorillas. Our aim is to understand whether gorillas choose plants also in relation to their health condition and the medicinal properties of plants, or only in relation to the nutritional value of plants. Our goal is also to investigate the ontogeny of food choice, focusing on possible social influences on young gorillas during acquisition of diet and information on plants. Finally, we aim to quantify the overlap between gorillas and the native forest population of Ba'Aka Pygmies in the use of forest products. Preliminary results show that gorillas consume many plants used by the Ba'Aka in traditional medicine. Since this research requires the active involvement of the local Pygmy communities, we hope to increase awareness and understanding of the value of forest biodiversity for both local human and gorilla populations. One of the often quoted benefits of preserving tropical forests and its biodiversity both for apes and humans is its role as a reservoir of important medicinal components. This long-term research is part of a larger comparative project on great apes, supervised by Sabrina Krief, which will enhance our understanding of the interaction between our closest relatives and their habitat, providing important insights for understanding human origins and coevolution of great apes, humans, and diseases. The success of habituating western gorillas in Bai Hokou has greatly contributed to their protection, and has permitted gorilla ecotourism as well as field research which has increased our knowledge of the species. A better understanding of socioecology, nutritional, energetic and habitat requirements provides useful information to improve conservation plans for this elusive species and can also help to inform gorilla management in captivity and in sanctuaries. This article was first published in an earlier version in the Gorilla Gazette 21, 2009 Our sincere thanks go to the Ministries of Education and Water and Forests of the Central African Republic government for permission to conduct this research in the park, to the Dzanga-Sangha Protected Areas and the Bai Hokou staff for logistic facilities and administrative support. I am particularly grateful to the "Primate Habituation Program" directors C. Cipolletta and A. Todd for their support and great contribution. Thanks go to S. Krief and M. Robbins for their collaboration and supervision of the research projects. Special thanks go to the Ba'Aka trackers, for their incredible courage, for sharing their forest knowledge and for their dedication to their work. I especially thank my research assistant, Kemanda Bienvenu Florentin, a student of the University of Bangui, Central African Republic, who was trained in research methods and hopefully will play a long-term role in the future of the Dzanga-Sangha Protected Area projects. Cleveland Metroparks Zoo has greatly contributed to his training by providing funding for his salary in 2008 and 2009. My research was also funded during my PhD by the University of Rome "La Sapienza" (Italy), the Max Planck Society (Germany), and partially by the Zoos and Aquariums Italian Union (UIZA) and the Italian Primatological Association (API). My current research is part of a two-year post-doc supported by the Centre National de la Recherche Scientifique (CNRS) and the National Museum of Natural History (MNHN) in Paris (France).
<urn:uuid:a5d9f450-82d6-4f4f-9039-b9b913725f30>
CC-MAIN-2022-33
https://www.berggorilla.org/en/gorillas/protected-areas-for-gorillas/protected-areas-for-gorillas/bai-hokou/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00406.warc.gz
en
0.934992
2,449
3.59375
4
A garden with elements surviving from the C18 with which Charles Bridgeman and Lancelot Brown are associated and for which Humphry Repton prepared apparently unexecuted proposals in a Red Book, and with additional C19 formal features. Part of the Lordship of medieval Eastbourne, the manor known as Eastbourne Place was acquired by James Burton in 1544. He changed its name to Bourne Place and was the likely builder of the Elizabethan house which became incorporated into the present mansion. The property passed by marriage in 1644 to the Wilson family who farmed the estate before letting it, in 1718, to Spencer Compton, younger son of the third Earl of Northampton. He purchased it in 1724 and, through his acquaintance with Lord Burlington, commissioned Colen Campbell (1676-1729) to enlarge and remodel the house which he renamed Compton Place. Charles Bridgeman (d 1738) is recorded as working on the site between 1728 and 1738 (Willis 1977). Spencer Compton, ennobled as Lord Wilmington, then later as Viscount Pevensey, died in 1743 and in 1766 a payment was made to Lancelot Brown (1716-83), for unknown works 'relative to the late Earl of Northampton' (Chatsworth papers). The house and its grounds passed by the marriage in 1782 of Lady Elizabeth Compton to Lord George Cavendish, son of the fourth Duke of Devonshire. In the late C18 the grounds were extended by the incorporation of land to the east and south, Humphry Repton (1752-1818) being invited by Lord Cavendish to advise on the landscape. He produced a Red Book in 1803 but his proposals were not, apparently, adopted. Lord Cavendish died in 1843 and by the mid C19 the grounds had reached their maximum size, through further small extensions to the south-west. Residential development had begun by 1899 with the building of Fairfield Court on the southern, Meads Road, frontage. The Saffrons Court flats were built on the Compton Place road frontage in 1963 and the housing development of Saffrons Park was begun in 1987/8. The tenth Duke of Devonshire died in 1950. In 1954, Compton Place was leased as its present use as an educational establishment. LOCATION, AREA, BOUNDARIES, LANDFORM, SETTING Compton Place is situated on the western fringe of Eastbourne, just to the south of the Old Town and the A259, and c 1km inland from the coast. To the north and west, its boundaries open immediately onto the Royal Eastbourne Golf Club course and are defined by a flint-walled ha-ha, probably of early C18 origin and possibly part of Bridgeman's work. To the south, a concrete and pebble-faced wall marks the C20 boundary with the housing development of Saffrons Park, begun on land sold in 1983. A block of flats, Saffrons Court, separates the registered site from Compton Place Road which runs the length of the eastern boundary. In 1782, the road which then formed the site's eastern boundary, known as the Way to the Bourne, was diverted eastwards to the course of the present Compton Place Road to unite the detached walled garden with the remainder of the grounds (estate survey dated 1739). The c 9.9ha site lies at the east end of a shallow, north-east-facing valley, which is enclosed by the lowest slopes of the South Downs where they drop steeply towards the south-west side of the town from Beachy Head. The house occupies the level valley floor with the land rising gently to the near horizon on its north side but much more steeply and quickly on its south-west side. ENTRANCES AND APPROACHES The site has one main entrance, from Compton Place Road. This seems to have been established after this road was diverted eastwards in 1782. The original north to south line of the road can be seen on the estate map of 1739 and also on a plan (of the Hundred and Parish of Eastbourne) dated 1783. Before the road was moved, the entrance to the estate appears to have been further south and associated with the Elizabethan house. Except along the frontage of the estate office, a high flint boundary wall encloses the site along Compton Place Road, with a convex wing of dressed flint wall defining each side of the entrance. Inside to the south is a single-storey, flint-fronted lodge, shown in existence on the Tithe map of c 1841. The drive sweeps in a wide arc westwards and then southwards across the lawns to the house. The present house, offices and courtyard stable block (listed grade I) form an east to west range of buildings in the centre of the site. Sophia Burrell's water colours of 1783 show open views from the house south-eastwards to the coast at Sea Houses and north to downland windmills which are now obscured by woodland and development. Little evidence exists of the detailed layout of the Elizabethan house built in 1544 and incorporated into the present house. Its entrance was on the north front, through a courtyard formed by projecting wings. In 1726, Colen Campbell extensively remodelled and refaced the house but retained the E-shaped plan and a north entrance point. New kitchens and a brew house were built to the east of the house but the proximity, then, of the boundary of the grounds to the route of the public road prior to its diversion in 1782, suggests a later date for the construction of the extreme eastern stable and coach-house court. During the ownership of Lord George Cavendish, (from 1782 until 1843), the house was given its present, stuccoed, Regency appearance, including the Doric colonnade to the south porch. The eastern kitchen and stable blocks were also altered and added to. GARDENS AND PLEASURE GROUNDS The house has small formal gardens on its west and south sides. The southern terrace, running the length of the house and edged by a stone plinth, was laid out in the early C19 by Lord George Cavendish. Rose beds are cut into the grass surface of the terrace. At the west end is a further garden with formal beds which were laid out after 1930, surrounded by a flint retaining wall and enclosed by trees and shrubbery. South and west of the terrace are open lawns, dotted with a few single trees. The lawn rises steeply to the south-west, forming a glade within the woodland edge at the top of the slope. The woodland now contains few of the mature trees shown established on the OS 1st edition map surveyed 1873-5. It forms a wide belt around the south-west boundary, screening the house from external view. Within it is a short length of a hollow-way, running from east to west and marking the boundary of the grounds in the early C18. The land now occupied by the late C20 Saffrons Park development was added and planted as woodland in the mid or late C18 and early C19 and contained meandering walks. From the eastern end of the terrace, a gravelled path curves south-eastwards across the lawn. To its east, enclosed within a grove of beech, holm oak and chestnut, and approached by a path lined with five pairs of stone plinths, is a circular, open lawn with a central mound and circular, metalwork rose arbour. The present ground plan of this feature has been in existence since at least the mid C19; it appears to have developed from the layout of the land prior to its incorporation into the estate after the road diversion in 1782 (estate survey, 1739; estate map, 1803). North of the rose arbour grove, a path runs northwards between the stable block and the kitchen garden wall. Built against the eastern wall of the stable block is a small, rustic bothy, faced with unpeeled timber and with gothic windows. It is shown on the OS 1st edition and is now used as a gardener's store. On its north side, the house opens onto a gravelled forecourt and a small lawn. The vista is limited to the near horizon of the golf links, just beyond the boundary ha-ha. A serpentine, iron paling fence, shown established on this line on the OS 1st edition, separates the whole building range and southern gardens from the grounds to the north. The present drive was in existence by 1845, as was its link southwards to the coach house and stable block; map evidence suggests that the link follows a section of the route of the Way to Bourne before its diversion in 1782. The northern grounds are laid out to lawn, lightly dotted with trees, a few of which survive from the denser planting shown in 1873-5. To the north-west of the house, beyond a tennis court, the surrounding woodland belt encloses the grounds from vistas westwards. An opening in the belt was created between 1845 and 1875 but this had grown or been planted over by the early C20. The opening would have given a view to the folly, known as the Paradise Belvedere, sited 650m away on the western edge of the golf links. The flint-faced folly has a central pedimented arch and two wings with arched niches. A folly of stone seems to have been erected on the orders of Lord Wilmington in c 1740, to replace a previous timber structure on the same site (Compton estate archives) but it is unclear if the present folly is that erected by him. The high, part brick and part flint north and west walls of the kitchen garden form part of the present eastern boundary of the estate. The garden was separated from the main grounds by the Way to Bourne before its diversion eastwards in 1782. An estate map of 1803 and William Figg's map of 1816 appear to indicate that the garden was more extensive to both the north and west than the double cube shown on the Tithe map of c 1841. Saffrons Court was built over the garden in 1963. H Pechell, A Complete History of Sussex (vol 5 of the Magna Britannia and Hibernica, 1730, with notes and additions by Sir William Burrell between 1730 and 1796) E M and E Hopkins, The Guide to Eastbourne (c 1845), p 22 G F Chambers, Eastbourne Memories (1864), pp 16-18, 36 W Budgen, Old Eastbourne (1912), appendix A, p 339 Country Life, 40 (2 September 1916), pp 266-73; (9 September 1916), pp 294-303; 77 (9 February 1935), pp 144-50; 113 (13 March 1953), pp 734-7; (20 March 1953), pp 818-21 C Hussey, English Country Houses: Early Georgian (1955), pp 87-96 I Nairn and N Pevsner, The Buildings of England: Sussex (1965), p 485 P Willis, Charles Bridgeman and the English Landscape Garden (1977), pp 61-2 D Robert Ellaray, Eastbourne, a Pictorial History (1978), entries 29, 30 Garden History 17, no 2 (1989), p171 Eastbourne Hundred ... in the Year 1552 (Eastbourne Borough Library) A survey of the Compton Estate, 1739 (Compton Place Archives, Chatsworth) Plan of the Hundred and Parish of Eastbourne ... based on Yeakell and Gardner's Map of 1783 and other Surveys, c 1783 (Eastbourne Borough Library) Estate plan, c 1803 (Compton Place Archives, Chatsworth) William Figg, A map of the Parish of East-bourn in the County of Sussex, 1":352", 1816 (East Sussex Record Office) William Figg, Plan of the Parish of Eastbourne in the County of Sussex, 1":396', 1845 (East Sussex Record Office) Tithe map of Eastbourne, c 1841 (East Sussex Record Office) OS 1st edition Old Series, 1" to 1 mile, surveyed 1793-6 OS 6" to 1 mile: 1st edition surveyed 1873-5, published 1879 2nd edition published 1900 3rd edition published 1910 4th edition published 1930 5th edition published 1938 OS 25" to 1 mile: 1st edition published 1876 2nd edition published 1899 3rd edition published 1910 4th edition published 1925 S H Grimm, Bourne Place, otherwise Compton Place, 1783 (Burrell Collection, British Museum) S Burrell, View of Sea Houses at Southbourne, taken by S Burrell from Lady Elizabeth Compton's Gardens, 1781 (Magna Britannia) S Burrell, View of the Mill above Lady Betty Compton's, taken by S Burrell from a Field behind the House, late Sir John Dyke's at Southbourne, 1781 (Magna Britannia) View of north elevation of the house, signed S B, dated 1781 (Magna Britannia) Compton Place Archives ,Deeds and Documents belonging to His Grace the Duke of Devonshire at Compton Place... The above index to the archive [copy at Eastbourne Library, E 942.25] lists items from early charters relating to the Burton family, plans, surveys, designs, stewards' accounts and garden accounts etc, for the Compton and Cavendish periods, the material being stored at Chatsworth House. Repton's Red Book is also kept at Chatsworth, with photographic copies of a number of pages and illustrations at the Towner Art Gallery, Eastbourne Borough Council. Description written: December 1996 Amended: July 1997 Register Inspector: VCH Edited: March 2000
<urn:uuid:d5e40ede-b5a5-412d-8e7c-7aaae9c3e6cb>
CC-MAIN-2022-33
https://historicengland.org.uk/listing/the-list/list-entry/1000735
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572077.62/warc/CC-MAIN-20220814204141-20220814234141-00605.warc.gz
en
0.959176
2,982
2.578125
3
On This Page About Personality Disorder A personality disorder is an enduring pattern of inner experience and behavior that deviates markedly from the expectations of the individual's culture, is pervasive and inflexible, has an onset in adolescence or early adulthood, is stable over time, and leads to distress or impairment. There are 10 specific personality disorders. They are as follows: - Paranoid personality disorder – a pattern of distrust and suspiciousness such that others' motives are interpreted as malevolent. - Schizoid personality disorder – a pattern of detachment from social relationship and a restricted range of emotional expression. - Schizotypal personality disorder – a pattern of acute discomfort in close relationships, cognitive or perceptual distortions, and eccentricities of behavior. - Antisocial personality disorder – a pattern of disregard for, and violation of, the rights of others. - Borderline personality disorder – a pattern of instability in interpersonal relationships, self-image, and affects, and marked impulsivity. - Histrionic personality disorder – a pattern of excessive emotionality and attention seeking. - Narcissistic personality disorder – a pattern of grandiosity, need for admiration, and lack of empathy. - Avoidant personality disorder – a pattern of social inhibition, feelings of inadequacy, and hypersensitivity to negative evaluation. - Dependent personality disorder – a pattern of submissive and clinging behavior related to an excessive need to be taken care of. - Obsessive compulsive personality disorder – a pattern of preoccupations with orderliness, perfectionism, and control. JAN's Accommodation Solutions: Executive Functioning Deficits is a publication detailing accommodations for individuals with limitations related to executive functioning. These ideas may be helpful in determining accommodations. Personality Disorder and the Americans with Disabilities Act The ADA does not contain a list of medical conditions that constitute disabilities. Instead, the ADA has a general definition of disability that each person must meet. A person has a disability if he/she has a physical or mental impairment that substantially limits one or more major life activities, a record of such an impairment, or is regarded as having an impairment. For more information about how to determine whether a person has a disability under the ADA, see How to Determine Whether a Person Has a Disability under the Americans with Disabilities Act Amendments Act (ADAAA) . Accommodating Employees with Personality Disorder People with personality disorders may develop some of the limitations discussed below, but seldom develop all of them. Also, the degree of limitation will vary among individuals. Be aware that not all people with personality disorders will need accommodations to perform their jobs and many others may only need a few accommodations. The following is only a sample of the possibilities available. Numerous other accommodation solutions may exist. Questions to Consider: - What limitations is the employee experiencing? - How do these limitations affect the employee and the employee’s job performance? - What specific job tasks are problematic as a result of these limitations? - What accommodations are available to reduce or eliminate these problems? Are all possible resources being used to determine possible accommodations? - Once accommodations are in place, would it be useful to meet with the employee to evaluate the effectiveness of the accommodations and to determine whether additional accommodations are needed? - Do supervisory personnel and employees need training? Situations and Solutions: An employee with obsessive compulsive personality disorder works as an administrative assistant for a physician's office. After being hired, she discloses her condition and requests accommodations in the form of written instructions, checklists, and a private workspace. The employer agrees to the accommodations. A few weeks into the job, the employee tells her supervisor she does not like the documentation system the office is using, and will be making changes as she sees fit. The supervisor explains that will not be tolerated, that she needs to follow their protocol, but the employee follows through with making her own changes. The supervisor takes disciplinary action and tells the employee if she continues to go against the employer's protocol that she could be terminated. The employee responds by writing an e-mail to the supervisor outlining how her way of doing things is better and why the employer should make the changes she is suggesting. The employer insists it will not make the changes and the employee needs to comply. The employee continues to defy the employer's instruction and is terminated. An employee with borderline personality disorder works as a hairstylist in a beauty salon. At times, she becomes very upset and leaves work abruptly. The supervisor meets with her regarding these occurrences and the employee discloses her disability and explains that because of her work schedule, she has been unable to attend therapy and psychiatrist appointments, which has resulted in an exacerbation of her symptoms. The employer suggests providing her a consistent schedule, allowing her to keep the early part of the day open for her therapist and doctor appointments. The employer also agrees to allow the employee to take two additional unpaid breaks per shift. The accommodations result in the employee getting the treatment she needs, allowing her to continue working successfully in her position. An employee with antisocial personality disorder works as a construction worker. One day while at work, the employee tells a coworker he does not like him and that the coworker should watch his back. The coworker reports this to the supervisor who then addresses the employee about the comment. The supervisor asks what the problem is, and the employee responds only by saying he just does not like the coworker. The supervisor tells the employee that if he threatens his coworker again he will be terminated. A week later the employee threatens his coworker again. The supervisor terminates the employee. In response, the employee discloses that he has antisocial personality disorder. The employer has no obligation to rescind the termination because it occurred prior to the employee's disclosure. An employee with schizoid personality disorder has worked in a call center as a customer service representative for two years. Due to business necessity, the employer restructures the employee's position to include face to face interactions with customers. The employer begins receiving complaints from customers that the employee is acting in a rude and generally unfriendly manner. When the issue is brought up during a performance evaluation, the employee discloses his schizoid personality disorder, and explains that it affects his ability to show appropriate affect. He generally appears unenthusiastic regardless of what is happening. As a result, he may appear to be acting rude or disinterested when interacting with customers in person. The employer reassigns the employee to a position where he can work on the phones exclusively again. An employee with avoidant personality disorder works as a vocational specialist for a disability insurance company. Originally, the employee's position allowed him to work from home full time. Recently, the company decides to begin transitioning some of its teleworking employees back into the office. The employee discloses his condition and requests he be allowed to continue working from home as an accommodation. The employee provides medical documentation explaining that he experiences intense feelings of inadequacy and discomfort when around others and would not be able to perform at the same level in an office environment as he would at home. As a result, the employer allows the employee to continue working from home. An employee with histrionic personality disorder works in a cubicle environment as an insurance claims processor. She is regularly talking and distracting her coworkers, at times talking about very personal issues and having crying fits. At other times the employee will be very physical with coworkers, hugging and talking about how much she loves being around them. The employee's behavior is generally disruptive, and when the supervisor confronts her about this, the employee discloses her condition. The employee provides medical documentation that states that she would benefit from working in a more private space where it is not so easy for her to talk to coworkers and listening to music on earphones while doing work off the phones. The employer is able to provide these accommodations, which prove to be effective. An employee with schizotypal personality disorder just started working as a cashier in a small department store. Within three weeks, the employer receives four comments from customers regarding the employee's behavior, that the employee had begun talking to them about strange things including aliens and various conspiracy theories. The employer meets with the employee to discuss these occurrences, at which point the employee discloses her disability. The employee provides medical documentation that states that the employee will at times have episodes where she will think and talk about things that are not grounded in reality and that while medication can help to prevent such occurrences, they will inevitably occur on an almost daily basis. Because it is an essential function to be able to communicate effectively with customers, and the employee's eccentric behavior is not in compliance with the employer's conduct standards, the employer determines the employee is not qualified for the position. Because the employee wasn't qualified for the position from the point of hire, the employer does not have an obligation to consider reassignment, but does anyway, reassigning the employee to a position as a stock clerk, which requires much less interaction with customers. An employee with narcissistic personality disorder is hired as a project manager for a software development company. The employee tells his subordinates that he will be replacing the "incompetent" president of the company within two years, so they had better respect him. One of his subordinates tells the vice president of the company, who tells the president. The president puts the employee on probation, explaining that the next such conduct violation would result in termination. Three months later, the project manager sends out a memo to everyone on his team outlining his accomplishments and how he deserves the praise of his team members and the company. He ends the memo by signing off as the future president of the company. The memo makes its way to the president who then terminates the employee. The employee then discloses he has a personality disorder. The employer follows through with the termination as there is no obligation to excuse prior conduct violations that occur before the employer is made aware of the condition. An individual with paranoid personality disorder is working as a financial consultant for a large marketing firm. Due to his condition, he often feels like coworkers and supervisors are looking for ways to hurt or sabotage him. He has been going to therapy and is aware that at least some of his beliefs are not true. He decides to disclose his disability and requests more frequent interactions with the supervisor to insure effective communication, the ability to have a support person present for performance evaluations, and a flexible schedule to allow for continued therapy appointments. The employer agrees to provide the accommodations and the employee is able to remain in his position and continue to work effectively. JAN Publications & Articles Regarding Personality Disorder Accommodation and Compliance Series Consultants' Corner Articles - Accommodating Social Anxiety Disorder (Social Phobia) - Accommodations for Difficulties with Assisting Others on the Telephone Due to Stress, Anxiety, and Interpersonal Communications - Cognitive Impairment and the Interactive Process - Communication Difficulties in the Workplace - I Understand You Are Stressed...But Aren’t We All? - My Disability Made Me Do It! When It Does and Doesn’t Matter - Return to Work After Hospitalization for Mental Health Treatment
<urn:uuid:5153abe1-a88e-4e3c-b9ef-8ba91af509dd>
CC-MAIN-2022-33
https://askjan.org/disabilities/Personality-Disorder.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00005.warc.gz
en
0.959959
2,307
3.65625
4
The conditions which are essential to the safety and efficiency of a big gun having already been explained, it only remains to give a description of how these are practically carried out in the great industry which has its head-quarters at Woolwich. An account of how the work is done will best fall under four headings. They are, first, the appliances necessary to obtain the temperature required for the softening, welding, and preliminary treatment of the materials; second, those necessary for dealing with it, so as to secure the highest capacity for resisting excessive strains in particular directions; third, those contrivances which are needed to manipulate large masses of iron in conveying them from place to place, more especially when heated to a high temperature; and fourth, the processes required for finishing the work of the forge, and rendering the masses of iron practically serviceable for the duties of the field or of the fortress. As in other branches of the iron trade, the furnace is the method employed for the puddling, heating, and welding of the iron. Though there has never been any disposition shown by the authorities to look askance upon the more recent improvements of private enterprise, nor yet upon the proposals of inventors, there are reasons why such methods as those of the modem regenerative furnaces of Siemens, and other improvements, should not be readily adopted at Woolwich. These reasons are to be discovered in the fact that the scale upon which the work is carried out is not so extensive as to make it by any means certain, that much economy would be effected by the introduction of appliances, which are essentially applicable to works that are conducted with different objects in view. It is not that the Arsenal at Woolwich is in any sense a small establishment, or that the number of the workmen employed is less than in other great establishments connected with the iron trade, but in most of these works the object that is desired is to be able to turn out large quantities of manufactured iron in the form of rails, or plates, or bars, whereas at Woolwich the iron that is made is all consumed upon the establishment. What would be a small amount of plant in a work that supplied outside customers whose demands may amount to thousands of tons in a single order, is nevertheless sufficient for the turning out of malleable iron in the quantities that are necessary for the making of big guns, on which a vast amount of labour, employing great numbers of workmen, is necessary before they are ready to be sent to the proof butts upon their final trials. It follows from this that though the authorities are quite alive to the value of improvements, they have not yet adopted those appliances which are common elsewhere, where the scale upon which they are used justifies the outlay of a large amount of capital; and although everything is very complete and perfect of its kind, the visitor will find that in the puddling department at Woolwich, there is much the same sort of plant that might have been seen some years ago, in the leading establishments of the iron trade depending upon private enterprise for their development, or which may still be seen in the smaller works throughout the kingdom, that have not yet adopted the improvements referred to. The puddling furnace, however, in use in the Royal Gun Factories, is a product of that department, and the invention of Mr. Price, the forge manager. Puddled iron can be produced by it at a considerable saving in fuel, and steel ingots are made from it with the same quickness and facility as from the Martin-Siemens furnace. The methods and designs are novel, and their efficiency has been proved practically over a period of years. A step has been made in one direction, however, which it would be well for other iron-masters to follow, in the adoption of mechanical means for working, or rather assisting to work, the iron in the puddling furnace. Immense exertion is required on the part of the puddler, more especially when the stage of “balling” has been reached, by the iron in its process of conversion, and any one who sees how much this labour is curtailed in the simple and effective machinery employed at the Arsenal cannot but wish that its adoption had become universal. Among the appliances upon which experiments have been made with more or less success for doing away with the labours of the puddler altogether, and substituting machinery, which in itself would afford the requisite labour, there is one at least which has received the most careful consideration of the authorities at the Arsenal, and we wish it every success. But although the puddling process at Woolwich is not characterised by any novelty, and the furnaces used for fagging the scraps of iron are of the type ordinarily employed in forges throughout the country, no one can fail to be struck by the great size and completeness of those which are used for heating the huge coils of the big guns, and raising them to the temperature for welding them in solid masses under the blows of the steam-hammers. Their dimensions are alone sufficient to strike even the professional visitor, who has seen them for the first time, with astonishment, and when the great door of fire-brick, braced and bound together by its massive iron bands, rises and reveals the molten depths within, an impression is conveyed to the mind not only of the energy and ingenuity of those who have subjected such an element to their use but of their courage as well. But we must go on to the next part of the subject, which is embraced under the appliances that are necessary for dealing with the iron so as to secure the highest capacity for resisting excessive strains in a particular direction. When the ball of iron, or the faggot of scraps, is taken from the furnace, and subjected to the blows of the steam-hammer, and then allowed to cool, it is impossible to say, with any certainty, what the direction of its greatest strength may be. Every blow which it received must have effected a change in the constitution of its substance, so that its internal structure when it is finally thrown aside and allowed to cool must be a matter of very uncertain guess-work. The first appliance, then, which combines in itself not only the means of reducing the iron to the shape required for further operations, but the disposal of its fibres in the direction best suited for withstanding the ultimate strain of the explosion, is the rolling-mill. Here again we find that the Arsenal differs in no essential respect from other first-rate establishments, though it may safely be said that there is no better rolling-mill in existence. One advantage it has over most others, in being provided with facilities for reversing the revolutions of the rolls, by means of an apparatus which has been adopted with the greatest success, and which greatly simplifies the operation. It is the invention of Mr. R. D. Napier, whose name is associated with many improvements in modem machinery, and who found at the Arsenal at Woolwich, the sympathy and assistance which are essential to the success of a new invention. The apparatus is of too complicated a character to admit of a description in these pages; but we cannot pass from the subject without congratulating both Mr. Napier and the authorities upon having been rewarded for their enterprise by the great success of the appliance. The limits that are placed in practice upon the dimensions of a mass of iron which has to be passed through a rolling-mill, depend upon the space between the rolls when they are separated, so as to leave the widest possible room for its reception; and the length of the bar which is produced from the rolling process is not only dependent upon this condition, but also upon the cooling of the iron, which takes place when it has been too long exposed to the action of the atmosphere. From both these causes - the limited capacity of the rolling-mill for receiving the mass, and its tendency to become hardened during the process of rolling - it is impossible to obtain anything approaching to the full length of a completed bar ready for being coiled. The unit of length, as it comes from the rolling-mill cannot be more at the most than twenty or thirty feet, and it therefore becomes necessary to weld a number of them together in order to obtain what is required for the formation of a complete coil. When the iron has been reduced to the proper shape in the rolling-mill, it is removed to another department, and the different lengths are welded together, so as to form, if necessary, a bar that, in the case of an 80-ton gun, is about 200 feet in length, and considerably over a foot square in section. Much care is required in the welding process, and it would no doubt be of great advantage, if such a bar could be produced directly in the rolling-mill. As this cannot be done, the only course left is to exercise every precaution, so as to ensure, as far as possible, that the bar is homogeneous and continuous in its fibrous structure; and as the blows of the hammer necessary for welding the bars together are made at right angles to their length, there is little doubt that the desired object is, in this manner, to a great extent obtained. When the bar has been completed to the desired length, it is placed in a furnace which stretches from one end of a long workshop to the other, and is not equalled in this respect by any other in the kingdom. The longest furnaces employed in the iron trade are those which are used for preparing the frames of ships for the bending that is necessary to shape them to the form of the vessel; but that which is used at Woolwich for heating the coiled bars of the big guns is more than double the length of the longest of those used in ship-building. As it would be impossible to obtain an equable distribution of heat from one centre of combustion, the firing of the coil furnace takes place at intervals along the length of the bar, and in this way the workmen are enabled to obtain the required temperature throughout. The coiling of the bars can best be described by comparing it with the winding of a strip of paper round the finger, in which the edges of the paper touch each other throughout, and the result of the process is the formation of a cylinder. The difference between this very simple operation and that which takes place at Woolwich, is that the finger of one hand which forms the centre or mandril in the case of the strip of paper is fixed, and the coil is wound round by the fingers of the other hand, whereas at Woolwich the coil is fixed to the centre-mandril, which is made to revolve, and in that way to coil the bar round it just as a rope is coiled round the barrel of a windlass. The bar having been rapidly drawn out of the furnace when it has been sufficiently heated to render it soft and pliable, is borne up at intervals upon portable supports provided with rollers on which the bar rests, and which render it easier for the workmen to move it backwards and forwards in the direction of its length. As the power required for this operation is very considerable, even when the friction to be overcome has been reduced by means of the rollers on which the bar is resting, a chain is made fast to the end which projects from the furnace, and this being attached to a sort of winch, in connection with a revolving shaft of the workshop, provides a ready means for removing the coil. When the mandril, or centre round which the red-hot coil is twisted, is set in motion, much care and skill is required on the part of the workmen to insure its being wound round so as to leave as little space as possible between the edges, but practice has made perfect in this department, as well as in others where the technical difficulties are even greater, and the result of the operation is so complete that nothing further is required than a welding heat, and a few blows of the great steam-hammer to convert the long unwieldy bar as it came from the coil furnace into a solid cylinder, which is practically homogeneous throughout, and having its fibres arranged in the direction best suited to resist excessive strains. There is one respect in which the coiling machine differs from other appliances of a somewhat similar description, such as rolling-mills, and this arises from the necessity for removing the coil, and detaching it from the mandril upon which it has been wound. This can only be done by withdrawing it, and provision has therefore to be made for removing one of the side framings in which the mandril revolves. When this has been effected, the coil is then free to be drawn away to one side, leaving the mandril behind. No such appliance is necessary in the case of the rolling-mill, where the bars or plates or rails go in at one side and out at the other. - Next >>
<urn:uuid:c97033c8-2d89-4d68-b84c-3c6c3ade72e9>
CC-MAIN-2022-33
http://www.researchpress.co.uk/index.php/bmh/ordnance/big-guns-manufacture
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573849.97/warc/CC-MAIN-20220819222115-20220820012115-00605.warc.gz
en
0.974808
2,631
2.625
3
Individual differences | Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology | Philosophy Index: Aesthetics · Epistemology · Ethics · Logic · Metaphysics · Consciousness · Philosophy of Language · Philosophy of Mind · Philosophy of Science · Social and Political philosophy · Philosophies · Philosophers · List of lists For others meanings of universal or universality, see universal (disambiguation) page. Universality is opposed to relativism in philosophy. Truth may be said to be universal, as well as rights, for example in natural rights or in the 1789 Declaration of the Rights of Man and of the Citizen, heavily influenced by the philosophy of the Enlightenment and its conception of a human nature. The 1948 Universal Declaration of Human Rights is inspired by the same principles. A proposition is said to have universality if it can be conceived as being true in all possible contexts without creating a contradiction. Some philosophers have referred to such propositions as universalizable. Truth is considered to be universal if it is valid in all times and places. In this case, it is seen as eternal or as absolute. The relativist conception denies the existence of universal truths - although they are, of course, grades of relativism: most relativists deny the existence of universal moral values, which make them moral relativists, but few deny the existence of universal truths when mathematics are concerned. In other words, since truth has various domains of application, relativism does not necessarily apply to all of them. A classic argument against extreme forms of relativism rely on the relativist fallacy: claiming that "all truths are relative" is, in itself, a universal proposition, since it asserts something about a totality. Thus, this extreme form of relativism is seen as self refuting (however, relativists often argue that, as sceptics, they have never made such universal assertion). A universal proposition is one that affirms a property of all the members of a set. For instance, the proposition that all dogs are mortal and the proposition that all cows can fly are universal propositions, the former (assumedly) true and the latter false. A universal proposition is logically equivalent to the negation of an existential proposition. Thus, claiming that all cows can fly is equivalent to denying that there is a cow that cannot fly. It may be noted, along the lines of Humean causal scepticism, that the only universal propositions that must be true are those that exist a priori, drawn from definitions (i.e. "All dogs are mammals"). Universal propositions that are drawn a posteriori, from one's experience of the world (i.e. "All dogs are born with four legs"), can never be confirmed as true, simply supported to be true (though such propositions are falsifiable). Universality in metaphysics In metaphysics, a universal is a type, a property, or a relation. The noun universal contrasts with individual, while the adjective universal contrasts with particular or sometimes with concrete. The latter meaning, however, may be confusing since Hegelian and neo-Hegelian (e.g. British idealist) philosophies speak of concrete universals. A universal may have instances, known as its particulars. For example, the type dog (or doghood) is a universal, as are the property red (or redness) and the relation betweenness (or being between). Any particular dog, red thing, or object that is between other things is not a universal, however, but is an instance of a universal. That is, a universal type (doghood), property (redness), or relation (betweenness) inheres a particular object (a specific dog, red thing, or object between other things). Platonic realism holds universals to be the referents of general terms, i.e. the abstract, nonphysical entities to which words like "doghood", "redness", and "betweenness" refer. By contrast, particulars are the referrents of proper names, like "Fido", or of definite descriptions that identify single objects, like the phrase, "that apple on the table". By contrast, other metaphysical theories merely use the terminology of universals to describe physical entities. The problem of universals is an ancient problem in metaphysics concerning the nature of universals, or whether they exist. Part of the problem involves the implications of language use and the complexity of relating language to ontological theory. Most ontological frameworks do not consider classes to be universals, although some prominent philosophers do, such as John Bigelow. The term universality also refers to the medieval concept of an absolute, all-encompassing morality that justified a universal secular rule by one all-powerful Holy Roman Emperor, and also justified as universal the religious rule by one all-powerful all-encompassing (hence the term catholic) church. In the 17th century, the doctrine of universality gave way to the doctrine of raison d'état or national interest. Universality is comparable, but not equivalent, to the concept of the Mandate of Heaven in Chinese history. As a state (truth) Absolutism contends that in a particular domain of thought, all statements in that domain are either absolutely true or absolutely false: none is true for some cultures or eras while false for other cultures or eras. These statements are called absolute truths. A common reaction by those who newly criticize absolutism is the absolute truth statement: Absolute truths do not exist. The statement, 'Absolute truths do not exist.', reveals the characteristic of absolute truth. Absolute truth does not apply to reality, existence, belief, or to human intelligence. In the logic of dichotomy of true-not true, application is without respect to what is absolutely true. Certainly, absolute truth does not define material existence, but supports material existence, position, and state of being. Absolute truth is as applicable to 'not true' as it is to 'true'. The double negative reveals this monistic status of absolute truth. The non-existence of absolute truth would, if true, be as true as the existence of absolute truth in an absolute sense. To postulate the non-existence of truth, however, is to violate the most fundamental capacity of mind. It is as though a snake could swallow itself by starting at the tail. Therein lies the value of absolute truth for thought. Violation of truth value in an absolute sense, validates the truth value of existence versus non-existence. Some say, "If I see it I believe it." Others say, "I believe it if I know it." If the sense of knowing is little better than the sense of sight, little can be made of the analogy. The acuity of the sense of absolute truth may not be good enough for most to clearly distinguish the difference between what is true and truth itself. One could ask, 'Is it true that truth exists?' One can also ask, 'Is it true that truth does not exist?' The first can be affirmed by mind, while the latter cannot be affirmed without a gross distortion of sense. If truth does not exist, it would certainly be true that truth does not exist. That is the quality of absolute truth. If the negation were true, one could not ask the question and expect a true answer. Absolute truth is the essence of thought and distinguishes the capacity of the sapient being. As an action (verity) In action form, absolute truth most closely represents verity. This form can be likened to the action usage of metaphysical truth, but not its state usage (which represent metaphysical truths in state form). Absolute truth in action form is considered by many to be metaphysical only, and therefore the same as the action usage of metaphysical truth. Some believe the outcome of absolute truth (verity) can be metaphysical truths, physical truths or both, but by definition not any form of a lie. A particularly confusing absolute truth in state form (but good for example) is: - Absolute truth cannot be a lie. Some interpret this to mean: - The outcome of absolute truth cannot be a lie. But that refers specifically to the action form of absolute truth. Others interpret it as: - Absolute truth statements cannot be lies. But that refers specifically to the state form of absolute truth. The original statement can be interpreted as either the state or action form. In the state form the statement is not true, but in the action form it is true. Either way the statement is an absolute truth in state form. A potential example of absolute truth in action form is: - The words you are reading exist because of absolute truths in action form supporting their ability to exist. Attentive readers will recognize the previous statement as an absolute truth in state form describing absolute truth in action form. Whether or not the statement is true is left as an exercise for the reader. An interesting paradox arises when someone refutes the existence of any absolute truths. Their statement might be something along the lines of: - There are no absolute truths. If this statement were true, it would imply that it is an absolute truth itself. And if this statement is an absolute truth, it would contradict its original statement and mean that the statement is in fact false. Therefore it is impossible to prove that there are absolutely no absolute truths. However, this doesn’t necessarily imply that they exist. A more proper way of stating it would be to say that "Relative truth is correct". Although this seems to be an absolute statement, it is in fact not, because it does not exclude that "Absolute truth is also correct". To a relativist, whose culture holds this as a tenet; relativism is indeed correct. But a relativist can also allow that to one raised in a culture of absolutism, it would be incorrect. "What is absolutely true is always correct, everywhere, all the time, under any condition. An entity's ability to discern these things is irrelevant to that state of truth." - Steven Robiner - Kant's categorical imperative: "Act only according to that maxim by which you can at the same time will that it would become a universal law." - 1948 Universal Declaration of Human Rights References & Bibliography |This page uses Creative Commons Licensed content from Wikipedia (view authors).|
<urn:uuid:4fddc69d-baf9-4fb7-a81f-8697f940d5a5>
CC-MAIN-2022-33
https://psychology.fandom.com/wiki/Universality_(philosophy)
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00005.warc.gz
en
0.922825
2,225
3.171875
3
As of 9 June 2018: - Recruiting Y-DNA descendants of William White for Next Generation Sequence/Whole Genome Sequence (NGS/WGS) testing. Interested persons contact firstname.lastname@example.org For more information see: Sherman, Robert M. & Ruth W. (re-edited by Robert S. Wakefield), Mayflower Families through Five Generations: vol. 13 White Recent research by Caleb Johnson, Susan Allen, & Simon Neal has determined William White was baptized at Wisbech, Cambridgeshire, England, 25 Jan 1586/7 the son of Edward White & Thomasine CROSS May. William was an uncle to Dorothy May, who was the first wife of Gov. William Bradford. William's mother died in 1591 and his father died in 1594. William and his sister, Martha, were then raised by their maternal grandmother, Jacomine and her second husband, Thomas Robinson. Thomas died in 1595 and William's sister died in 1608. While this large number of family deaths is very unusual and shocking to us today, it was not a rare occurrence during William's time. William and his half-siblings (his mother was a widow when she married her father) received permission to settle in Amsterdam, Holland in 1608. This likely indicates William was a Separatist, or at least attended a religion other than the official Church of England. William married Susanna Jackson, likely at Amsterdam, likely about 1615. The couple had two known sons: Resolved (about 1616) and Peregrine (born aboard the Mayflower around the end of November 1620). The family decided to emigrate with some of the Scrooby congregation and William died at the New Plimouth colony on 21 Feb 1620/1. The widow Susanna married widowed Edward Winslow on 12 May 1621, being the first marriage in the new colony. William & Susanna had two sons before William's death. Resolved was born in England, about 1615. He died sometime after September 19, 1687. He and his first wife were buried in Winslow Cemetery, Marshfield. He was married twice, but all of his children were by his first wife, Judith Vassall, daughter of William Vassall (married 5 Nov 1640 in Scituate). They had eight children (born Scituate): William (1642-1695 unm.), John (1644-b1684/5), Samuel (1646), Resolved (1647), Anna (1649), Elizabeth (1652), Josiah (1654-1710) & Susanna (1656). Peregrine was born aboard the Mayflower while it was anchored in what is now called Providence Harbor. He died at Marshfield on 20 Jul 1704. He married Sarah Bassett, daughter of William Bassett, before 6 Mar 1648/9 and had seven children (born Marshfield): Daniel (c1649), infant son (c1651), Jonathan (1658), Peregrine (c1661), Sarah (c1663), Sylvanus (b1667) & Mercy (c1670). Samuel White was born Scituate 13 Mar 1645/6 and died Rochester 20 Sep 1720. He married Rebecca ____ and they had nine children (born Rochester): John (1669 m Martha Doty), Samuel (1671 m Mary ___ & Susanna ___), Elizabeth (1673), Melatiah (1675 m Mercy Winslow [granddaughter of Kenelm Winslow), Judith (1681), Susannah (twin 1682), Hezekiah (twin 1682), Penelope (1687) and William (1690). Josiah White was born Scituate 29 Sep 1654 and died Boxford 5 Jun 1710. He married Salem bef Dec 1680 Remember Read and they had: Hannah, Mary, Samuel (1696 m Dinah Kinne), Josiah (1705 m Mary Taylor), Joseph (m Beatrix Houghton) and Sarah (1713). Daniel White was born Marshfield 19 Aug 1649 and died there 6 May 1724. He married Hannah Hunt and they had: John (1675 m Susanna Sherman), Joseph (1678 m Elizabeth Dwelley), Thomas (1680 m Rachel Horton), Cornelius (1682 m Hannah Randall), Benjamin (1684 m Faith Oakman), Eleazer (1686 m Mary Doggett) and Ebenezer (1691 m Hannah Doggett). Jonathan White was baptized Marshfield 4 Jun 1658 and died Yarmouth aft Feb 1736. He married twice, first Yarmouth 2 Feb 1682/3 Hester/Esther Nickerson and second aft 1703 Elizabeth ____. By his first wife Jonathan had: Mary (c1684), Esther (c1686), Jonathan (c1692 m Dorcas GODFREY Hamlin), Ebenezer (1698 m Mercy ___) and Joseph (c1702 m Elizabeth Baker). Peregrine White (II) was born Marshfield abt 1662 and died Boston 20 Nov 1727. He married twice, Susanna _____ and Mary _____. By Susanna he had Sarah and Benoni. By Mary he had Mark. Sylvanus White was born Marshfield bef 1667 and died Scituate in Jun 1688. He married Deborah ___ and had one son, William (c1683 m Elizabeth Cadman). - Caleb Johnson's MayflowerHistory.com White profile - Edward and the widow Thomasine were married at Wisbech on 11 Jan 1584. - It is also possible the couple had either a stillborn child, or a child who died in infancy about 1618. - Mayflower passenger deaths 1620-1621. - See page 5 of this issue for one line of Resolved - Pilgrim Hall Museum Resolved White biography. - He either died young, or moved to Barbadoes, no further record. - Some sources state (without any source citation) her maiden name may have been Lapham. - See p. 19 for one line of descent (owners of the White homestead) - TAG 40:101 states she may have been Deborah Church but there is currently no evidence to support this claim. DNA Results R1b-ZS8379 Previous Y-DNA testing Previous Y-STR testing found at both the Mayflower DNA Project and the White surname DNA Project Group R --- 1324.1410.11-13.000---William W has disclosed that William White belongs to the Y haplogroup R1b-M269, which is quite common in Western Europe. In addition, the Nevgen.org R1b clade predictor has further refined the clade to likely fall under R1b L21>DF13>Z39589>DF49>>M222 with 99.99% probability. According to the R M222 and Subclades Project "This diagnostic marker is associated with many individuals whose ancestry lies in the counties of Ulster (Northern Ireland), Northwest Ireland, and Scotland including certain Highland, Lowland, Western and North Eastern counties, and is not restricted to known ancestry in the UK/Ireland region." Thus, it appears William White's Y-DNA ancestors likely moved from Ulster Ireland to Scotland to Northern England and finally settling at Wisbech, Cambridgeshire, where William was baptized. As of Mar 2022, there are three individuals claiming their patrilineal (direct male line) ancestry goes back to William White who have ordered the Big Y-700 test. When these test results are published, we should be able to learn more about the White ancestry. One Big Y-700 test result has come in on 12 Apr 2022. The haplogroup came out as: R-M222>Z2959>S658>DF104>DF105>ZS8379 Lineage of DNA testers One of the three individuals has disclosed their White lineage: William White (1586/7-1620/1) Peregrine White (1620-1704) Daniel White (1649-1724) Ebenezer White (1681-1733) Obadiah White (1716-1801) Joseph White (1747-1831) John Hamilton White (1780- ) Joseph Guthrie White (1827-1900) John Sterling White (1856-1935) Ray Presley White (1900-1981) father of tester tester According to the Family Tree DNA R-M222 and Subclades Project: The R-M222 branch of the Y-DNA tree is defined by a Single Nucleotide Polymorphism (SNP) called M222. This diagnostic marker is associated with many individuals whose ancestry lies in the counties of Ulster (Northern Ireland), Northwest Ireland, and Scotland including certain Highland, Lowland, Western and North Eastern counties, and is not restricted to known ancestry in the UK/Ireland region. It is believed the M222 SNP/clade originated in Northwest Ireland and probably emigrated to what is now Scotland during the Dál Riata migration. From this history of the M222 clade, a logical hypothesis may be that William White (or at least his patrilineal ancestry) was more than likely from the North of England. - Sherman, Robert M. & Ruth W. (re-edited by Robert S. Wakefield), Mayflower Families through Five Generations: vol. 13 White General Society of Mayflower Descendants, Plymouth, MA. Third edition 2006 - Roser, Susan E., Mayflower Increasings From the Files of George Ernest Bowman at the Massachusetts Society of Mayflower Descendants, Genealogical Publishing Co., Baltimore, MD, Second edition 1995, 1996. pp. 121-123 - Roser, Susan E., Mayflower Passenger References (from contemporary records & scholarly journals) [www.stewartbooks.com Stewart Publishing & Printing], Canada. Second Edition, 2015 - Anderson, Robert Charles, The Mayflower Migration: Immigrants to Plymouth, 1620 New England Historic Genealogical Society, Boston, MA 2020 - Johnson, Caleb, Sue Allan and Simon Neal, The American Genealogist vol. 89 (2017):81-94, 168-88, 241-64 - Wikipedia biography of William White - Caleb Johnson's Mayflower History biography of William White - General Society of Mayflower Descendants - The Pilgrim William White Society - Johnson, Caleb Johnson, Sue Allen and Simon Neal,The American Genealogist 89-2 (Apr 2017) pp. 81-94 "The English Origin and Kinship of Mayflower Passengers William White and Dorothy (May) Bradford of Wisbech, Cambridgeshire"; 89-4 (Oct 2017) pp. 241-264 "The Origin of Mayflower Passenger Susanna (Jackson) (White) Winslow" - The Pilgrim William White Society see pages 7-8 for one of the earliest William White's Y-DNA descendants experience with Y-DNA testing - Pilgrim Fathers Origins.org biography for William and Susanna - Geni.com Mayflower-White - blog "A Taile of Two Mayflower Descendant applications - blog about White Y-DNA results - wikitree profile for William White - The White Family - The Mayflower Society © 2015-2022 mayflowerdna.org All Rights Reserved
<urn:uuid:f76cd52b-5905-4e3d-928b-26702cb874c6>
CC-MAIN-2022-33
https://mayflowerdna.org/wiki/index.php?title=White_(Y-DNA)&oldid=9367&printable=yes
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00004.warc.gz
en
0.938623
2,466
2.765625
3
Page 1 - Physiological Adaptation Study Guide for the NCLEX-RN Exam Often, a patient will need some sort of physiological adaptation to preserve and maximize physiological integrity. These questions deal with providing appropriate care for patients with chronic, acute, or life-threatening health conditions and any adaptations required to improve their situations. Body System Alterations A patient’s body undergoes numerous alterations in response to an illness, disease process, intervention, and/or surgery. Recognizing these alterations help to implement proper care to return the patient to a more “normal” state of health. Nurses must explain these adaptations and resultant changes in patient care to help patients understand the reason behind these interventions. Every patient’s care begins with your assessment of the health and psychological status of the patient. This includes not only alterations due to illness, disease, or interventions/treatments, but also the patient’s ability to cope with his or her health situation and adaptation to an altered (sometimes permanently) state of impairment. Patient assessment may also extend to the patient’s family and external support system as well. The following are some of the more important clinical scenarios in which you will be required to perform these functions: Any wound or tube drainage must be closely monitored. Pertinent characteristics of drainage assessment include monitoring for changes in color, consistency, and volume. Common drainage sites include surgical wound drains, respiratory secretions, chest tube drainage, and negative pressure wound therapy. Be familiar with the appropriate care involved in monitoring each. Nurses must be able to perform important interventions with drainage tubes including keeping dressings occlusive, monitoring for leaks or damage to the drainage systems, maintaining the drains (i.e., stripping,emptying, maintaining suction), and changing of equipment. Patients undergoing radiation therapy will need to be closely monitored for systemic and localized effects of treatment. Common adverse reactions can include: alopecia, damage to the skin and mucosa, fatigue, immunosuppression, etc. Also be familiar with appropriate lifestyle modifications to discuss with your patient such as proper dietary modifications and sunlight exposure precautions. Understand how to identify potential prenatal complications as well as give appropriate intervention during complications from pregnancy, labor, and/or delivery. Common prenatal complications include constant or excessive bleeding, chemical pregnancy, or molar pregnancy. Complications of later pregnancy, labor, and/or delivery include eclampsia, gestational diabetes, still-birth, birth positioning, and birth trauma. This may also include complications from previous surgical cesarean sections. Nurses should frequently monitor vital signs, especially heart rate and signs of fetal or maternal distress. Be familiar with the signs and symptoms of infectious processes. This includes localized findings (pustule, erythema, swelling, etc.) as well as systemic signs (fever, chills, gastrointestinal changes, fatigue, etc.). Understand common incubation periods for various infections, and be able to link a patient’s history of exposure or contact with your clinical findings. Lastly, be familiar with various treatments for infectious processes (bacterial, fungal, viral) as well as specific interventions based on affected body systems (respiratory versus genitourinary versus gastrointestinal, etc.) Understand the role of the nurse during invasive procedures. Many of these are done at the bedside, so a general, working knowledge is critical. Understand how to identify the patient and verify the order, gather the supplies, and set up for the procedure (i.e., sterile field if necessary), assist and monitor the patient during the procedure, assess and monitor the patient post procedure, and how to properly document the procedure in the medical record. Examples of such procedures include a central line (know patient positioning, preparation, monitoring, etc.); thoracentesis (patient positioning, preparation, specimen care, post-procedural care, etc.); bronchoscopy (patient preparation, sedation/general anesthesia, post-procedure monitoring, etc.), and lumbar puncture (patient preparation, patient positioning, sedation if needed, vital signs, etc.). Be familiar with the uses of phototherapy for both adults and newborns. Phototherapy is most commonly used for physiologic jaundice in neonates. Potential complications of phototherapy include eye damage (all clients should wear protective eye gear while under phototherapy), hyperthermia, and medication interaction (i.e., ibuprofen, diuretics, specific antibiotics). Understand how to implement therapy per the practitioner’s order as well as monitor for therapeutic effectiveness. Hypo and Hyperthermia Understand the risk factors for the development as well as the signs and symptoms of both hypo- and hyperthermia. Hypothermia is defined as a core body temperature less than 95 degrees. Hyperthermia is a core body temperature greater than 99.4 degrees. Nursing interventions to correct these conditions include correcting underlying disorders; hydration and cooling; wet packs for hyperthermia; and warming packs, warming blanket, and warm fluids for hypothermia. Understand the indications for the use of a ventilator as well as the many potential complications of their use (alveolar overdistension, cardiac complications, oxygen toxicity, hypo/hyperventilation, infection, etc.). While many facilities have specialized respiratory therapists who closely monitor these patients along with the nurse, it is important to have a working knowledge of the care of the patient on a ventilator. Be familiar with the signs and symptoms of wound infections including wound temperature changes, erythema, edema, and purulent drainage. Nurses should educate patients on smoking cessation, improved dietary changes, proper wound positioning, adequate hydration, dressing changes, wound care, and early signs of wound deterioration to improve wound healing and early detection of concerns. Understand how to monitor drainage devices in a postoperative patient. Be familiar with the indications for and frequency of peritoneal dialysis. Know how to monitor a patient before, during, and after this procedure, and be familiar with common complications and troubleshooting measures used during the treatment to ensure its safety and effectiveness. Nurses should especially monitor for fluid and electrolyte imbalances, consistency and volume of drainage, and patient vital signs. Know the proper procedures for performing suctioning of an endotracheal and/or tracheostomy tube, and oral and nasal passages. This also includes preoxygenation prior to and in between suctioning sessions when indicated/necessary. Always remember that when performing deep suction, the nurse should initiate suction while withdrawing the catheter, not during the insertion. Alterations in Body Systems Patients may experience alterations in bodily systems. This includes patients at risk for aspiration, skin breakdown, insufficient vascular perfusion, complications from disease, and any changes from baseline status. Nurses not only monitor their patients for these risks, but also educate the patients and their caregivers how to manage these changes. It is critical for a patient’s recovery to adapt to these alterations whether it is thickening liquids to reduce aspiration after stroke or using a walker for stability after a hip surgery. Be familiar with the care of patient and patient education for all ostomies including bowel diversion ostomies, tracheal ostomies (tracheostomy), and enteral ostomies (gastrostomy tubes or buttons). Specifically, understand the techniques used to maintain patency of each, prevent complications of each, monitor intake and output (as appropriate) for each and to ensure proper placement and functioning. Stomas of these diversions should be pinkish-red in color without skin excoriation or breakdown. Understand the difference between primary and secondary seizure disorder as well as the signs and symptoms of the many different types of seizures (absence, tonic, clonic, grand mal, etc.). Be familiar with your responsibilities for patient care during a seizure (patient safety, etc.) and proper postictal care, including proper documentation of the seizure. Be familiar with all aspects of pulmonary hygiene care from simple techniques like coughing and deep breathing to more complicated procedures like vibration, percussion, and postural drainage for the removal of respiratory secretions. Understand how to use and teach incentive spirometry. Specifically, understand proper patient positioning during postural drainage, as well as proper technique and location for percussion and vibration. Increased Intracranial Pressure Be familiar with the etiology, signs and symptoms, diagnosis, monitoring and care of patients with increased intracranial pressure. This includes all invasive and non-invasive monitoring (CT, ventriculostomy, etc.). Monitor for changes in consciousness, mental awareness, and physical signs such as pupil size changes and changes in motor skill. Also be familiar with treatments for increased intracranial pressure depending on the underlying cause and severity (pharmacologic management, procedures/interventions, etc.). Be familiar with the principles of postoperative care for patients who have received conscious sedation and/or general anesthesia. Understand common postoperative complications (bleeding, pain, infection, etc.) and how to effectively monitor for them and intervene when appropriate to prevent them. Review the procedures for removing sutures and/or staples. Educate patients and their caregivers on any post-operative instructions such as signs of infection, wound disruption, medications, and dressing changes as indicated. Nursing care will always include an evaluation of the patient’s response to many of the therapeutic interventions discussed above (surgery, radiation therapy, medications, etc.). Evaluate the patient’s progress toward achieving his or her individual treatment goals. This process typically has five steps: collection of data on the current health status; analysis of the data; comparison of the analyzed data to the patient’s expected outcome; determining the success/failure of specific interventions using critical thinking and professional judgement; and deciding to continue, modify, or discontinue a specific plan of care based on its effectiveness or lack thereof. Also, incorporate education into patient care to promote the patient’s progress toward his or her health goals. Be mindful of all intrinsic and extrinsic factors that can help or hinder the patient’s progress. For example, the presence of a complicating intrinsic factor, such as diabetes, will require special education and attention to improve the patient’s self-care and implementation of healthy lifestyle choices. Likewise, an extrinsic factor, like a strong family support system, should be maximized to help patients fully return to their optimal state of health. Educating patients on how to maximize their strengths and minimize weaknesses is critical to improving their overall outcome and health.
<urn:uuid:7eb5fb9e-1d0c-4c40-ab43-6ad4eeddd67a>
CC-MAIN-2022-33
https://uniontestprep.com/nclex-rn-exam/study-guide/physiological-adaptation/pages/1?show_menu=true
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00204.warc.gz
en
0.909447
2,284
3.328125
3
What is it? The bowel is a tube of intestine which runs from the stomach to the back passage. It is much longer than the inside of your belly (tummy). It fits in by coiling up in loops. The upper part of the bowel is called the small bowel. It joins the lower part of the bowel (the colon) just to the right of the waistline. This is where the appendix pouches out from the colon. The colon runs up to the right ribs and loops across the upper part of the belly. Then it passes down the left side to run backwards into the pelvis (the lower part of your abdomen) towards the back passage, where it is called the rectum. If most of the colon is diseased it can cause diarrhoea, bleeding or general illness which can potentially be life-threatening. It is better removed. Sometimes the ends can be joined up inside your tummy. More often, the back passage is not healthy enough to make a safe join. Then the lowest part of the small bowel is brought out as a sort of spout (ileostomy) on the right side of the tummy. This looks like a big nipple of pink bowel stuck to the tummy skin. The bowel waste runs into a special bag stuck over the ileostomy. A cut is made in the skin in the middle lower part of your abdomen and is about 25 cm (10 inches) long. The colon is freed inside your tummy. The diseased bowel is taken out. The lower end of remaining bowel is stitched shut. The upper end is made to open as an ileostomy. The wound in the tummy is stitched up. You should plan to leave hospital two weeks or so after the operation. Leaving things as they are is risky. Bleeding or perforation (a hole in your bowel) will mean that an urgent operation is a must. General ill health will not get better by carrying on with drug treatment alone. A bigger operation to take out the back passage as well as the rest of the colon is not needed. There are three ways of dealing with the stoma. The simplest and most reliable is called a spout stoma. This means wearing a bag to collect the waste. A second way is to make a pouch out of the bowel inside your tummy so that you can empty the pouch from time-to-time and there is no need to wear a bag. A third way is to make a pouch joined to the back passage so that the waste will pass out the normal way. The second and third operations are possible only in certain cases and can give rise to problems. Both the latter two operations can be done on a spout stoma at a later date. Before the operation If you know that you have problems with your blood pressure, your heart, or your lungs, ask your family doctor to check that these are under control. Check you have a relative or friend who can come with you to the hospital, take you home, and look after you for the first week after the operation. Sort out any tablets, medicines, inhalers that you are using. Keep them in their original boxes and packets. Bring them to the hospital with you. On the ward, you will be checked for past illnesses and will have special tests, to make sure that you are well prepared and that you can have the operation as safely as possible. Please tell the doctors and the nurses of any allergies to tablets, medicines or dressings. You will have the operation explained to you and will be asked to fill in an operation consent form. Before you sign the consent form, make sure that you fully understand all the information that was given to you regarding your health problems, the possible and proposed treatments and any potential risks. Feel free to ask more questions if things are not entirely clear. Many hospitals now run special preadmission clinics, where you visit a week or so before the operation, where these checks will be made. After – in hospital You will have a fine thin plastic drip tube in an arm vein connected to a plastic bag on a stand containing a salt solution or blood. You may have a fine plastic tube coming out of your nose and connected to another plastic bag to drain your stomach. This is to decompress your stomach which, along with the bowel, may feel sluggish after an operation. Swallowing may be a little uncomfortable. You will have a dressing on your wound and a drainage tube nearby, connected to yet another plastic bag. This drains any residual blood from the operation. You may have a fine rubber tube (catheter) passing into the bladder through the front passage. This lets the bladder stay empty and small during the operation and helps control your body fluids afterwards. A general anaesthetic will make you slow, clumsy and forgetful for about 24 hours. The nurses will help you with everything you need until you can do things for yourself. Do not make important decisions during this time. You will be most likely able to get out of bed with the help of the nurses the day after the operation despite some discomfort. You will not do the wound any harm, and the exercise is very helpful for you. The second day after operation you should be able to spend an hour or two out of bed. You may be given a blood-thinning injection in your skin once a day to prevent any blood clots in your legs. This can happen in the first few days after the operation until you can move around a bit more. Those clots can be very dangerous because they can 'travel north' through your blood stream to your heart and lungs and cause very serious problems and even death. Many hospitals are now using what is called PCA (patient controlled analgesia). By pressing a button on a device you can inject painkillers into your bloodstream through a very fine plastic tube that goes into one of the small blood vessels (veins) in your hand. A small computer controls the amount of painkiller that is released and prevents any accidental overdose. Alternatively, you may have a fine tube in your back through which pain relief can be given to help control the pain. Ask for more if the pain is not controlled or if it gets worse. By the end of four days you should have little pain. The ileostomy may not work for a day or two. It is always runny. It does not smell. You will get special advice and help from the nurses. Because of the drainage tube (catheter) in the bladder, passing urine should not be a problem. Once you can walk about in reasonable comfort, the catheter will be taken out. You can take the dressing off after 48 hours. Usually there are stitches or clips in the skin. These will come out 7 to 10 days after the operation. Sometimes, the wound may be held together underneath the skin. There may be some purple bruising around the wound which spreads downwards by gravity and fades to a yellow colour after two to three days. This is expected and you should not worry. There may be some swelling of the surrounding skin which should also improve in two to three days. You can wash as soon as the dressing has been removed but try to keep the wound area dry until the stitches/clips come out or if there are stitches only inside the wound, for a week after the operation. Soap and warm tap water are entirely adequate. Salted water is not necessary. You can shower or bath as often as you want. You will be given an appointment to visit the outpatient department for a check-up about one month after you leave hospital. The stoma nurse will arrange to visit you at home. The nurses will advise about sick notes, certificates etc. After – at home You are likely to feel very tired and need to rest two or three times a day for a month or more. You will gradually improve so that by the time three months have passed you will be able to return completely to your usual level of activity. You can drive as soon as you can make an emergency stop without discomfort in the wound, ie after about three weeks. You can restart sexual relations within two or three weeks when the wound is comfortable enough. Sometimes the operation affects the sex nerves. This will be discussed with you. You should be able to return to a light job after about six weeks and any heavy job within 12 weeks. As with any operation under general anaesthetic, there is a very small risk of complications related to your heart and lungs. The tests that you will have before the operation will make sure that you can have the operation in the safest possible way and will bring the risk for such complications very close to zero. Complications are relatively unusual but are rapidly recognised and dealt with by the surgical staff. If you think that all is not well, please let the doctors and the nurses know. Chest infections may arise, particularly in smokers or obese patients. Do not smoke. Getting out of bed and being as mobile as possible after the operation and working together with the physiotherapists who will help you do a lot of breathing exercises will minimise the chances of getting a chest infection. Occasionally the bowel is slow to start working again. This requires patience. Your food and water intake will continue through your vein tubing until the bowel works. Sometimes there is some discharge from the drain by the wound. This stops given time. Wound infection is sometimes seen. This happens relatively more frequently in any bowel operation compared to other 'clean' operations such as taking out your gallbladder and the reason is that the bowel has many bugs that can cause an infection. The infection settles down with antibiotics in a week of two. Other complications are a skin rash, infection or an abscess (a pool of pus) around the ileostomy, narrowing/stricture or necrosis (death of bowel tissue) of the bowel at or near the area of the ileostomy and also a hernia of the ileostomy, a situation where the bowel falls through the skin. These complications occur in 4 to 30 per cent of cases depending on the original disease of the bowel that lead to the creation of the ileostomy. Some inflammatory diseases of the bowel (the bowel gets swollen red and possibly infected) and cancer are diseases that are associated with higher chances of complications following the creation of an ileostomy. If you get such complications it is likely that you will need another operation to fix the problem. Aches and twinges may be felt in the wound for up to six months. Occasionally there are numb patches in the skin around the wound which get better after two to three months. The stoma can sometimes swell, or shrink or irritate the skin. The stoma nurses will help you here. The operation should not be underestimated. Some patients are surprised how slowly they regain their normal stamina – but virtually all patients are back doing their normal duties within three months. Most patients are delighted how well they feel. These notes should help you through your operation. They are a general guide. They do not cover everything.
<urn:uuid:824f043d-70f6-4dc8-83a9-907e5d481d1d>
CC-MAIN-2022-33
https://www.netdoctor.co.uk/procedures/surgical/a4715/colectomy-8211-total-8211-and-ileostomy/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00402.warc.gz
en
0.958247
2,310
3.203125
3
When you think of a math lesson, you probably conjure up an image of a teacher in front of the classroom demonstrating mathematical concepts. While that certainly qualifies as a lesson, I’d like to broaden your mental image. Consider a “lesson” any facilitated activity where students are building or practicing their content knowledge. In addition to our imagined lecture, let’s also consider activities such as card sorts, investigations, practice time, and other structured times in the classroom. Lessons include any activity that involves transmitting or practicing content knowledge. They can vary from whole class lectures to hands-on manipulative activities. Lessons probably make up the bulk of your course. Students walk in to your room, you teach them some stuff, the day ends. That’s a lesson. How you teach offers endless possibilities. Let’s look at some of these possibilities. There’s nothing inherently wrong with a lecture. I’d suggest it’s not always the best way to engage students. But oftentimes it is the most efficient way to transmit information, provided you are lecturing effectively. How does one lecture effectively? Despite being perhaps the most oft-used instructional approach, little time if any is spent in pre-service teacher programs in how to do lecture well. Things to consider: - How will you ensure all students are engaged throughout the lecture, not just an eager few? - What’s the shortest amount of time you could possibly do the talking? Go with that. And maybe subtract a few more minutes. - Are you incorporating visual elements into your lecture? When you’re lecturing, you want to stop and prompt discussion often, perhaps every 3 minutes or so. Rather than asking a question and waiting for a student to raise a hand, consider utilizing some of our general discussion routines from the previous post. The more you can make your lecture feel like a conversation the more successful the lecture will be. When you’re lecturing, try to get students in the mode where they’re talking to one another rather than to you. See this blog post on various lecture models. Some additional tips for lecturing: - Start your lecture with pizazz. Bring in a recent news article that pertains the the topic. Start with a memorable or funny quote. Post a picture or diagram and ask a question about it. For example, launch a lecture on horizontal asymptotes with the following graph and the prompt “Do you think these lines will ever intersect? Turn and talk to your neighbor and explain your reasoning.” Create a hook that will grab students’ attention. A picture plus the Notice and Wonderprotocol works extremely well. - Question authentically, not putatively. Questioning to get to deeper understanding is a skill that takes years to hone. It’s important to get genuinely curious about students’ ideas. As much as possible try to avoid the punitive, I-bet-he’s-not-listening questioning. Of course we want students to be paying attention, but we don’t need to “gotcha” students by asking them to derive the quadratic equation on the spot when we’re actually trying to make them feel foolish for zoning out during our boring lecture on the quadratic equation. - Talk slower. Every human talks 30-40% (not precise calculations) faster in front of audiences than they do in normal conversation. I’m not sure why, but it just is. Slow down. You need natural pauses and a good cadence, otherwise your words will morph into that of Charlie Brown’s teacher. I found this potentially effective technique: Mark a paragraph / in this manner / into the shortest possible phrases. / First, / whisper it / with energetic lips, / breathing / at all the breath marks. / Then. / speak it / in the same way. / Do this / with a different paragraph / everyday. / Keep your hand / on your abdomen / to make sure / it moves out / when you breathe in / and moves in / when you speak. Before you whisper each phrase, take a full bellyful of air and then pour all the air into that one phrase. Keep your throat open, and don’t grind your vocal chords. Lift your whisper over your throat. Pause between phrases. Relax. Then, take another full breath and whisper the next phrase. Whisper as if you were trying to reach the back of the room. As a fan of the Discovering Mathematics series of math textbooks, investigations were a staple in my classroom. These lessons involve an intentionally structured activity that reveals some new mathematical truth. Using tools or manipulatives As an example, here is an activity on Triangle Inequality and dried spaghetti: Kids use their hands and dried spaghetti to determine the triangle inequality theorem: the sum of two sides of a triangle must be greater or equal than the third side. Discovering Geometry was big into patty paper activities. These were excellent, cheap ways to get kids using their hands to make discoveries. Using a highly scaffolded series of questions This was the mode for my Running from the Law lesson. In this activity students (much like in the spaghetti activity) identify mathematical concepts through purposeful questions. In Running from the Law, it was the connection between the distance formula and Pythagorean’s Theorem. The questions are carefully ordered to point out possible discoveries hidden in the mathematical weeds. In some ways these activities mimic a quality activity debrief. The desmos team – and many of their contributors via the activity creator – use the clean interface to construct lessons that allow for students to construct their own understanding through carefully designed activities. Desmos’ Central Park is a great example of this. Students begin by interfacing with a challenge, notably without any discernable mathematics. Throughout the activity, students are prompted to identify what information would be helpful to solve the challenge. Eventually, we build enough knowhow to write expressions that help us out. Each slide presents an additional prompt intended to get students to think mathematically about the scenario. The Card Sort Another general type of lesson is The Card Sort. Teachers provide students materials that need to be matched up or ordered in a specific way to make the puzzle work. The most common type of card sort is matching. Students match two or more like items, typically in the form of paper or card cuttouts. A twist on the matching card sorts I quite like is that of “dominoes.” It’s like card sorts in that there are cuttouts and students are asked to arrange them in the matching order. But in this case each cuttout has two “things” on it and they match with another “thing” from another card. The result is a circular matching activity: I like it because it offers an immediate check: the “dominoes” should circle completely around and there shoulndn’t be any gaps. Things to consider: - Card sorts take a little time to build. It’s helpful if you have a template. Here’s one: Card Sort Template - Card sorts take significant time to cut out and put into plastic baggies. However, if you do it once – and have students place them back in the baggies at the end of the period – you’ll have them forever. I’ve had some card sorts in baggies for almost ten years now. The Practice Problem(s) Some classes and class days incorporate a lot of practice problems, packets even. That’s ok. We can work with that. A packet of a few high-quality problems can be an effective means of deepening understanding. I’ll go ahead and re-emphasize it for ya: a few high-quality problems. Now that we have that out of the way, we can hone in on effective means of teaching on a day – or a time of day – with a lot of student practice. I’ll offer two strategies that make the Practice Problem lesson an effective one. Same problem, same time Assuming students are progressing through practice problems in groups (which I recommend), make this a norm in your class: “same problem, same time.” This means that group members cannot proceed to the next problem or next page until all their group members are ready and have demonstrated understanding. Every group and every group member ought to be on the same problem so they may discuss it when it becomes challenging. You should never have a student call you over to ask about a problem that they’re working on and their groupmates aren’t (either because they left him in the dust or vice versa). What are the norms of groupwork you want to see in a given problem work time? Make those public and identify when those moments are happening – or not happening. This can easily be achieved through a document camera or anything that’ll project a document. In this case, the teacher identifed “plusses” and “deltas.” Or, positive behaviors or phrases students are exhibiting and behaviors that need to be changed. In this case, plusses include “OH I GET IT NOW!”, all heads in, paper in middle, “how do we solve this” and other markers of persistent problem solving. The deltas include “crosstalk” and “phone out”. At the end, you can debrief with the class with this document: how did we do today? What do we need to focus on for tomorrow? What ought we celebrate? Note that the teacher has maybe five “plusses” for each “delta.” That’s four lesson “types,” which is certainly not exhaustive. This exercise through the DNA of our classroom is not meant to be exhaustive or definitive. But it is meant to give us some common vocabulary. And, as with routines these activities are malleable, and even interchangeable. You may wish to employ specific sharing Routines throughout your Lesson. You may wish to follow up a Lecture with a Card Sort (is that a Lesson followed by another Lesson?). What other lesson types or structures ought we add to our list? What else ya got? - I have this facilitation one-pager from Necessary Conditions (Krall 2018). That might give you a nice menu of teaching techniques. Read more at Emergent Math.
<urn:uuid:d4b52e17-6974-41d5-9de2-e1ae032f9b07>
CC-MAIN-2022-33
https://newtechnetwork.org/resources/lessons-the-stuff-we-envision-only-better/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00605.warc.gz
en
0.941364
2,234
3.640625
4
The Villanovan culture developed during the Iron Age in central Italy from around 1100 BCE. The name is actually misleading as the culture is, in fact, the Etruscans in their early form. There is no evidence of migration or warfare to suggest the two peoples were different. The Villanovan culture benefitted from a greater exploitation of the area’s natural resources, which allowed villages to form. Houses were typically circular and made of wattle and daub walls and thatch roofs with wooden and terracotta decoration added; pottery models survive which were used to store the ashes of the deceased. With the guarantee of regular, well-managed crops a portion of the community was able to devote itself to manufacturing and trade. The importance of horses is seen in the many finds of bronze horse bits in the large Villanovan cemeteries located just outside their settlements. By around 750 BCE the Villanovan culture had become the Etruscan culture proper, and many of the Villanovan sites would continue to develop as major Etruscan cities. The Etruscans were now ready to establish themselves as one of the most successful population groups in the ancient Mediterranean. The Etruscan cities were independent city-states linked to each other only by a common religion, language, and culture in general. Geographically spread from the Tiber River in the south to parts of the Po Valley in the north, the major Etruscan cities included Cerveteri (Cisra), Chiusi (Clevsin), Populonia (Puplona), Tarquinia (Tarchuna), Veii (Vei), Vetulonia (Vetluna), and Vulci (Velch). Cities developed independently so that innovations in such areas as manufacturing, art and architecture, and government occurred at different times in different places. Generally speaking, coastal sites, with their greater contact with contemporary cultures, evolved quicker but eventually passed on new ideas to the Etrurian hinterland. Nevertheless, the Etruscan cities still developed along their own lines, and significant differences are evident in one city from another. Prosperity was based on fertile lands and improved agricultural tools to better exploit it; rich local mineral resources, especially iron; the manufacture of metal tools, pottery, and goods in precious materials such as gold and silver; and a trade network which connected the Etruscan cities to each other, to tribes in the north of Italy and across the Alps, and to other maritime trading nations such as the Phoenicians, Greeks, Carthaginians, and the Near East in general. Whilst slaves, raw materials, and manufactured goods (especially Greek pottery) were imported, the Etruscans exported iron, their own indigenous bucchero pottery, and foodstuffs, notably wine, olive oil, grain, and pine nuts. With trade flourishing from the 7th century BCE, the cultural impact of the consequent increase in contact between cultures also became more profound. Craftsmen from Greece andd the Levant settled in Emporia – semi-independent trading ports that sprang up on the Tyrrhenian coast, most famously at Pyrgri, one of the ports of Cerveteri. Eating habits, clothing, the alphabet, and religion are just some of the areas where Greek and Near Eastern peoples would transform Etruscan culture in the so-called ‘Orientalising’ period. Etruscan cities teamed with Carthage to successfully defend their trade interests against a Greek naval fleet at the Battle of Alalia (aka Battle of the Sardinian Sea) in 540 BCE. Such was the Etruscan dominance of the seas and maritime trade along the Italian coast that the Greeks repeatedly referred to them as scoundrel pirates. In the 5th century BCE, though, Syracuse was the dominant Mediterranean trading power, and the Sicilian city combined with Cumae to inflict a naval defeat on the Etruscans at the battle at Cumae in 474 BCE. Worse was to come when the Syracusan tyrant Dionysius I decided to attack the Etruscan coast in 384 BCE and destroy many of the Etruscan ports. These factors contributed significantly to the loss of trade and consequent decline of many Etruscan cities seen from the 4th to 3rd century BCE. Inland, Etruscan warfare seems to have initially followed Greek principles and the use of hoplites – wearing a bronze breastplate, Corinthian helmet, greaves for the legs, and a large circular shield – deployed in the static phalanx formation, but from the 6th century BCE, the greater number of smaller round bronze helmets would suggest a more mobile warfare. Although several chariots have been discovered in Etruscan tombs, it is likely that these were for ceremonial use only. The minting of coinage from the 5th century BCE suggests that mercenaries were used in warfare, as they were in many contemporary cultures. In the same century, many towns built extensive fortification walls with towers and gates. All of these developments point to a new military threat, and it would come from the south where a great empire was about to be built, starting with the conquest of the Etruscans. Rome was on the warpath. In the 6th century BCE some of Rome’s early kings, although legendary, were from Tarquinia, but by the late 4th century BCE Rome was no longer the lesser neighbor of the Etruscans and was beginning to flex its muscles. In addition, the Etruscan cause was not in any way helped by invasions from the north by Celtic tribes from the 5th to 3rd century BCE, even if they would sometimes be their allies against Rome. There would follow some 200 years of intermittent warfare. Peace treaties, alliances, and temporary truces were punctuated by battles and sieges such as Rome’s 10-year attack on Veii from 406 BCE and the siege of Chiusi and Battle of Sentinum, both in 295 BCE. Eventually, Rome’s professional army, its greater organizational skills, superior manpower and resources, and the crucial lack of political unity amongst the Etruscan cities meant that there could only be one winner. 280 BCE was a significant year and saw the fall of Tarquinia, Orvieto, and Vulci, amongst others. Cerveteri fell in 273 BCE, one of the last to hold out against the relentless spread of what was fast becoming a Roman empire. The Romans often butchered and sold into slavery the vanquished, established colonies, and repopulated areas with veterans. The end finally came when many Etruscan cities supported Marius in the civil war won by Sulla who promptly sacked them all over again in 83 and 82 BCE. The Etruscans became Romanised, their culture and language giving way to Latin and Latin ways, their literature destroyed, and their history obliterated. It would take 2,500 years and the almost miraculous discovery of intact tombs stuffed with exquisite artifacts and decorated with vibrant wall paintings before the world realized what had been lost. GOVERNMENT & SOCIETY The early government of the Etruscan cities was based on a monarchy but later developed into rule by an oligarchy who supervised and dominated all public positions and a popular assembly of citizens where these existed. The only evidence of a political connection between cities is an annual meeting of the Etruscan League. This is a body we know next to nothing about except that the 12 or 15 of the most important cities sent elders to meet together, largely for religious purposes, at a sanctuary called Fanum Voltumnae whose location is unknown but was probably near Orvieto. There is also ample evidence that Etruscan cities occasionally fought each other and even displaced the populations of lesser sites, no doubt, a consequence of the competition for resources which was driven both by population increases and by a desire to control increasingly lucrative trade routes. Etruscan society had various levels of social status from foreigners and slaves to women and male citizens. Males of certain clan groups seem to have dominated key roles in the areas of politics, religion and justice and one’s membership of a clan was likely more important than even which city one came from. Women enjoyed more freedom than in most other ancient cultures, for example, being able to inherit property in their own right, even if they were still not equal to males and unable to participate in public life beyond social and religious occasions. The religion of the Etruscans was polytheistic with gods for all those important places, objects, ideas, and events, which were thought to affect or control everyday life. At the head of the pantheon was Tin, although like most such figures he was probably not thought to concern himself much with mundane human affairs. For that, there were all sorts of other gods such as Thanur, the goddess of birth; Aita, god of the Underworld; and Usil, the Sun god. The national Etruscan god seems to have been Veltha (aka Veltune or Voltumna) who was closely associated with vegetation. Lesser figures included winged females known as Vanth, who seem to be messengers of death, and heroes, amongst them Hercules, who was, along with many other Greek gods and heroes, adopted, renamed and tweaked by the Etruscans to sit alongside their own deities. The two main features of the religion were augury (reading omens from birds and weather phenomena like lightning strikes) and haruspicy (examining the entrails of sacrificed animals to divine future events, especially the liver). That the Etruscans were particularly pious and preoccupied with destiny, fate and how to affect it positively was noted by ancient authors such as Livy, who famously described them as “a nation devoted beyond all others to religious rites” (Haynes, 268). Priests would consult a body of (now lost) religious texts called the Etrusca disciplina. The texts were based on knowledge given to the Etruscans by two divinities: the wise infant Tages, grandson of Tin, who miraculously appeared from a field in Tarquinia while it was being ploughed, and the nymph Vegoia (Vecui). The Etrusca disciplina dictated when certain ceremonies should be performed and revealed the meaning of signs and omens. Such ceremonies as animal sacrifices, the pouring of blood into the ground, and music and dancing usually occurred outside temples built in honour of particular gods. Ordinary folk would leave offerings at these temple sites to thank the gods for a service done or in the hope of receiving one in the near future. Votive offerings were, besides foodstuffs, typically in the form of inscribed pottery vessels and figurines or bronze statuettes of humans and animals. Amulets were worn, especially by children, for the same reason and to keep away evil spirits and bad luck. The presence of both precious and everyday objects in Etruscan tombs is an indicator of a belief in the afterlife which they considered a continuation of the person’s life in this world, much like the ancient Egyptians. If the wall paintings in many tombs are an indicator, then the next life, at least for those occupants, started with a family reunion and rolled on to an endless round of pleasant banquets, games, dancing, and music. The most ambitious architectural projects of the Etruscans were temples built in a sacred precinct where they could make offerings to their gods. Starting with dried mud-brick buildings using wooden poles and thatch roofs the temples, by c. 600 BCE, had gradually evolved into more solid and imposing structures using stone and Tuscan columns (with a base but no flutes). Each town had three main temples, as dictated by the Etrusca disciplina. Much like Greek temples in design, they differed in that usually only the front porch had columns and this extended further outwards than those designed by Greek architects. Other differences were a higher base platform, a three-room cella inside, a side entrance, and large terracotta roof decorations. These latter were first seen in the buildings of the Villanovan culture but now became much more extravagant and included life-size figure sculpture such as the striding figure of Apollo from the c. 510 BCE Portonaccio Temple at Veii. Private houses from the early 6th century BCE have multiple intercommunicating rooms, sometimes with a hall and a private courtyard, all on one floor. Roofs are gabled and supported by columns. They had an atrium, an entrance hall open to the sky in the centre and with a shallow basin on the floor in the middle for collecting rainwater. Opposite was a large room, with a hearth and cistern, and side rooms including accommodation for servants. The burial practices of the Etruscans were by no means uniform across Etruria or even over time. A general preference for cremation eventually gave way to inhumation and then back to cremation again in the Hellenistic period, but some sites were slower to change. It is the burial of members of the same family over several generations in large earth-covered tombs or in small square buildings above ground that are, in fact, the Etruscan’s greatest architectural legacy. Some circular tombs measure as much as 40 meters in diameter. They have corbelled or domed ceilings and are often accessed by a stone-lined corridor. The cube-like structures are best seen in the Banditaccia necropolis of Cerveteri. Each has a single doorway entrance, and inside are stone benches on which the deceased were laid, carved altars, and sometimes stone seats were set. Built in orderly rows, the tombs indicate a greater concern with town-planning at that time. Without doubt the greatest artistic legacy of the Etruscans is their magnificent tomb wall paintings which give a unique and technicolor glimpse into their lost world. Only 2% of tombs were painted, which indicates only the elite could afford such luxury. The paintings are applied either directly to the stone wall or onto a thin base layer of plaster wash with the artists first drawing outlines using chalk or charcoal. The use of shading is minimal, but the color shades many so that the pictures stand out vibrantly. The earliest date to the mid-6th century BCE, but topics remain consistent over the centuries with a particular love of dancing, music, hunting, sports, processions, and dining scenes. Sometimes there are also historical scenes such as the battles depicted in the Francois Tomb at Vulci. The paintings give us not only an idea of Etruscan daily life, eating habits, and clothing but also reveal social attitudes, notably to slaves, foreigners, and women. For example, the presence of married women at banquets and drinking parties (indicated by accompanying inscriptions) shows that they enjoyed a more equal social status with their husbands than seen in other ancient cultures of the period. Pottery was another area of expertise. Bucchero is the indigenous pottery of Etruria and has a distinctive, almost black glossy finish. Produced from the early 7th century BCE, the style often imitated embossed bronze vessels. Popular shapes include bowls, jugs, cups, utensils, and anthropomorphic vessels. Bucchero wares were commonly placed in tombs and were exported widely throughout Europe and the Mediterranean. Another later specialization was the production of terracotta funerary urns which had a half-life-size figure of the deceased on the lid sculpted in the round. These were painted, and although sometimes a little idealized, they, nevertheless, present a realistic portraiture. The sides of these square urns are often decorated with relief sculpture showing scenes from mythology. Bronze work had been another Etruscan specialty dating back to the Villanovan period. All manner of daily items were made in the material, but the artist’s hand is best seen in small statuettes and, particularly, bronze mirrors which were decorated with engraved scenes, again, usually from mythology. Finally, large-scale metal sculpture was produced of exceptional quality. Very few examples have survived, but those that do, notably the Chimera of Arezzo, are testimony to the imagination and skill of the Etruscan artist. The Romans not only grabbed what lands and treasures they could from their neighbors but also stole quite a few ideas from the Etruscans. The Romans adopted the Etruscan practice of divination (itself an adaptation of Near Eastern practices) along with other features of Etruscan religion such as rituals for establishing new towns and dividing territories, something they would receive ample practice opportunities for as they expanded their empire. Also, Etruscan soothsayers and diviners became a staple member of elite households and army units, acknowledged as they were as the Mediterranean’s experts in such matters. The Tuscan column, arched gate, private villa with atrium (an Etruscan word), tombs with niches for multiple funerary urns, and large-scale temples on impressive raised stepped platforms are all Etruscan architectural features the Romans would adopt and adapt. Other cultural influences include the victory procession which would become the Roman triumph and the Etruscan robe in white, purple or with a red border, which would become the Roman toga. Finally, in language, the Etruscans passed on many words to their successors in Italy, and through their alphabet, itself adapted from Greek, they would influence northern European languages with the creation of the Runic script.
<urn:uuid:a78b941a-bda2-40f0-9d10-94c71535198c>
CC-MAIN-2022-33
https://fleurtyherald.wordpress.com/2018/05/15/history-of-etruria/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00005.warc.gz
en
0.975826
3,733
4.375
4
The computer is a device that is used to process and store data in binary form, according to the commands given to it in a variable program. Introduction, History, and Generations of Computer. Introduction to Computer The computer is a device that is used to process and store data in binary form, according to the commands given to it in a variable program. The word computer is derived from the word compute which means to calculate. People usually thought a computer to be a calculating device that can perform arithmetic procedures at high speed, but today computers are used for communication, administration, research, and drawing. Computers are everywhere, in places of employment, in schools, shopping malls, and so on. Charles Babbage introduces the concept of a programmable computer and is considered the father of the computer. He created the 1st mechanical computer in the initial the 19th century. The word computer was firstly used in 1613. ore Charles Babbage’s invention Tally sticks were the first memory aid device. The abacus also has its role in the history of computers. Many devices were invented by different scientists. Many years ago, Tally sticks, Abacus, Pascaline, Napier’s bones, and Arithmometer were considered the computers but now a day, we are using the most modern computers. Efforts by people to build up a device to multiply data go back as far as 2600 BC when the Chinese thought of the Abacus. The slide ruler was created in 1621 and remained broadly utilized until the rise of electronic adding machines during the 1970s. In 1830 Charles Babbage made an analytical engine, which was modified with punched cards to complete the calculations. It was not the same as its antecedents since it had the option to resolve choices dependent on its calculations. The analytical engine was difficult to such an extent that Babbage was always unable to construct a working model of his plan. It was built after 100 years by the London Science Museum. History of computers The history of computers is very vast. It has consisted of the following list. 1. Tally sticks 3. Napier’s bones 4. Slide rule 6. Stepped reckoner 7. Jacquard loom Tally sticks were invented by King Henry. These were the first memory aid device. These were used to record data like quantity, and document numbers and even were used for messages. Abacus is a mechanical device that is used by a person in mathematical calculations. It was used to achieve basic arithmetic processes. The abacus was invented in Babylonia in 2400 B.C. it was a frame in which rocks are fixed in a moveable way. John Napier invented Napier’s bones in 1614. This device allowed a person to operate multiply, divide and calculate square and cube roots by moving the rods around and placing them on specially constructed boards. Slide Rule was invented by William Oughtred in 1622. It was based on Napier's concepts of logarithms. It was first and foremost used for multiplication, division, roots, logarithms, and trigonometry. It was not ordinarily used for addition or subtraction. Pascaline was invented by Blaise Pascal in 1642. It was restricted to subtraction and addition. It was too expensive. It was a mechanical calculator used for addition and subtraction. It consisted of gears and wheels. It also had a dialer. Stepped Reckoner was Invented by Gottfried Wilhelm Leibniz in 1672. It was the machine that can add, subtract, multiply and divide mechanically. It was a digital calculator. The Jacquard loom is a mechanical loom, invented by Joseph-Marie Jacquard in 1881. It is a programmed loom organized by punched cards. Arithmometer was a mechanical calculator designed by Thomas de Colmar in 1820. This machine could carry out the four basic mathematic functions. This machine was the first mass-produced calculating machine. It was the first reliable, useful, and commercially successful calculating machine. It is an instinctive, mechanical calculator planned to organize polynomial functions. It was the first computer invented by Charles Babbage in 1822 and 1834. It was able to perform calculations as well. It was also organized with punched cards to perform the numerical operations. It could do 60 addition per minute The idea of an analytical engine didn’t take physical form but served as a base for modern digital computers. In 1890 Dr. Herman Hollerith hosted the First electromechanical, punched-card Data-processing machine. It was used to compile information for the 1890 U.S. census. His company would eventually become International Business Machines (IBM) This paper-based machine represents the origin of computer database software. •1941 Conrad Zeus from Germany, introduced the first programmable computer • solved complex engineering equations. • It was also the first to work on the binary system instead of the decimal system. Many modifications were made and now we are using very modern computers. But there is a gap of generations in the history of computers. Generation of computers There are five generations of computer which describes the history of computers. In manufacturing the first generation of computers, as an electronic switching device, vacuum tubes were used. Vacuum tubes were the basic component for the first generation of computers. Vacuum tubes are like electric bulbs and a large amount of energy is used for the working of these computers. In those days, the vacuum tube computer was the fastest (high speed) machine that was available. It performs its work in milliseconds and was known as the first-generation computer. These computers worked on the principle of storing program instructions. It also worked as a stored program concept, so they could perform a program automatically without human interference. Electromagnetic relays were used by the memory of these computers, users provide all the instructions, as well as all the data to the system by using punched cards. Due to a lack of high-level programming languages, programmers have to assemble the language. It was a difficult task at that time so some experts can understand how to program these computers. Types of computers: • Mark I was developed by Aiken in 1944. • ENIAC was built in 1946 by J. Presper Eckert and William Mauchly. Second generation (1955-1964) In the second generation, the transistors were used as the switching device instead of vacuum tubes. The transistors are invented by John Bardeen, William Shockley, and Walter Brattain at the Bell laboratories in 1947. Soon, transistors were proved as a stronger switching device than vacuum tubes. 1. They were made up of germanium instead of glass as in first-generation computers. They were easier to handle. 2. They produce less heat as compared to vacuum tubes. 3. They were of less cost as compared to the vacuum tubes. 4. They had no parts like a filament in vacuum tubes, which can burn out, so they were more reliable. 5. They absorb less power as compared to vacuum tubes. These computers were more powerful than vacuum tube computers. There were also changes in storage technology. The new one consisted of magnetic cores made up of ferrite. These cores can be magnetized in any direction. In 1957, more faster and reliable programming languages (FORTRAN, COBOL, ALGOL, and SNBOL) were made. This made the second-generation computer easier to program. A Batch operating system was also introduced. Types of computers: 1. RCA 501 2. IBM 1620 3. IBM 7094 4. UNIVAC 1107, UNIVAC III Third-generation computers (1964-1975) In the third-generation computers, integrated circuits (ICs) were used instead of transistors. Along with the associated circuitry, a single IC has many transistors, resistors, and capacitors. IC was the invention of Jack Kilby. They were introduced in 1958. It made the computers small and efficient. This technology was known as microelectronics. In this development, time-sharing operating systems were used. High-level languages were also used in these computers such as PASCAL and ALGOL-68. Types of computers: • Honeywell 200 • IBM system 360 • UNIVAC 9000 series Fourth-generation computers (1957-1989) A Very Large Scale Integrated (VLSI) circuit was used in manufacturing the fourth-generation computers. VLSI had almost 5000 transistors and other elementary circuits with their correlated circuits on a chip. These computers were smaller, compact, and more affordable than the other three generations. As a result of the formation of fourth-generation computers personal computer trends arouse. High-level languages were installed on these computers. Types of computers: 1. IBM system 3090, IBM RISC6000, IBM RT. 2. ILLIAC IV 3. HP 9000 Fifth-generation computers (1989-present) In the fifth generation, VLSI technology was converted into ULSI technology. Due to the ULSI technology microprocessor chip technology was created which had almost ten million electronic components. This generation working on artificial intelligence software and parallel processing hardware. The main reason to insert the Al software is to make the computer, think like a computer. Highly programmed languages like C, C++, and Java were installed in this generation. Types of computers • Facial face detector This content is accurate and true to the best of the author’s knowledge and is not meant to substitute for formal and individualized advice from a qualified professional. © 2022 Tooba
<urn:uuid:73899d2b-9e19-40c1-b8bd-e5ddc980a8b4>
CC-MAIN-2022-33
https://discover.hubpages.com/technology/history-and-Generations-of-computer
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00005.warc.gz
en
0.974117
2,148
3.171875
3
Technology Profile - Solar The recent evolution of solar technology makes the future bright for homeowners and the design-build community. BY jason takahashi THE APOLLO II TILE FROM CERTAINTEED IS RATED TO WITHSTAND OPERATING TEMPERATURES OF -40 TO 90 C AND HIGH VELOCITY WINDS OF UP TO 194 MPH. THE SOLAR WINDS ARE STARTING TO SHIFT AGAIN, and no, I’m not talking about the extensive cyber-attack carried out as 2020 came to a close. Rather, the rapid proliferation of solar energy that took a back seat to traditional fossil fuels over the past four years is set to sail again. With the United States resuming its position as a leader in the reduction of global greenhouse gas emissions worldwide and major clean energy jobs and infrastructure legislation in the works, solar energy is well positioned to take a leading role in the decentralized search for reliable, clean and effective energy in 2021 and beyond. What is perhaps most exciting for architects, designers, builders and ultimately homeowners, is the recent evolution of solar technology that makes the future appear particularly bright. Just as televisions evolved from tubes to flat panels to today’s chameleon-like OLEDs, solar panels are similarly finding ways to hide themselves in plain sight. As they often do, Tesla stole the headlines in 2016 with the release of their integrated solar roof tile system shortly after acquiring SolarCity. But four years and three iterations later, the company is still struggling to scale their manufacturing and installation capabilities to meet nationwide demand. Luckily, the Building Integrated Photovoltaic (BIPV) sector beyond Tesla (and the continental U.S.) is still moving ahead. And with demand for new builds continuing to grow, finding ways to couple construction with solar cells is a proper approach. The advantage of solar roofs and other BIPV setups over traditional systems is primarily aesthetic. Slick solar lined roofs and other façades negate the need for large, unfavorable rooftop panel arrays by weaving light-converting technology into the tiles, shingles and siding. This is particularly enticing with new builds, but also when thinking about replacing an entire roof, where combining costs can generate supplemental savings. While the overall scope of products available is still limited, here’s a quick look at some of the best options on the market today. MICHIGAN-BASED LUMA SOLAR'SINTEGRATED ROOFTOP SHINGLE SYSTEM If you’re seeking a tested roofing solution within the U.S., I’d start with taking a look at Certainteed’s Apollo Tile II. The Pennsylvania-based member of the Saint-Gobain conglomerate is perhaps the antithesis to some of the failed startups in this sector. Certainteed has been innovating building materials for more than a century, now working to achieve the dream of ‘making sustainable habitats a reality’. Of the half-dozen or so solar tiles and shingles currently available in the U.S., Certainteed is a reliable option thanks to a strong reputation among builders and a robust installer network. While the Apollo II tile is not an entirely incognito solution, depending on the color of your other roof tiles — high-quality aesthetics are still achievable. Furthermore, the monocrystalline modules are water tight, featuring raised fastener locations to provide added protection against intrusion. Lastly, Apollo II is rated to withstand operating temperatures of -40 to 90 C and high velocity winds of up to 194 MPH. Certainteed’s century of experience in roofing helps provide peace of mind, while delivering up to 70W of electricity per tile in the process. Another exciting contender in this space is Michigan-based Luma Solar. Visually speaking, Luma’s latest installations lead the pack with its luxurious integrated rooftop shingle system, which they call the ‘only upgradable’ solar shingle system in the world. With three different packages to choose from, the highest-end Mirage Collection sports black monocrystalline cells with a minimum of 75W per shingle, with power monitoring, upgradeability and hurricane ratings to boot. For those interested, reservations are required. Luma recommends ordering a Base Study to bring in one of their consultants to assess the property and outline the best possible setup for your home or business, before partnering with a local installer to complete the project. EXASUN'S X-ROOF IS EQUIPPED WITH REAR CONTACT CELLS AND GLASS-PANEL TECHNOLOGY THAT SHOULD DELIVER HIGH EFFICIENCY YIELDS FOR 30 YEARS. Solstex is the photovoltaic (PV) member of the Elemex building façades family. Headquartered in Ontario, Elemex specializes in ceramic, aluminum and stone exterior cladding surfaces, which fortify the elegant exteriors of celebrated buildings across Canada and beyond. While their products are not a natural first choice for a residential exterior design, it does provide an opportunity to imagine how PV technology embedded into modern siding might find their way into future trends. The panels come in two different sizes, delivering 110 - 122.5W and 420 - 450W respectively, each with a quarter-inch thickness. They can be seamlessly integrated to any of Elemex’s other products thanks to their proprietary Unity attachment technology. Unity is engineered to create an ecosystem in which all of Elemex’s exterior cladding surfaces can combine to create all-in-one superior façade systems. Weighing at approximately 3.5 pounds per square foot, the Solstex panel consists of a thin-film Cadmium Telluride (CdTe) solar technology housed between two sheets of heat-strengthened glass. While sometimes less efficient than crystalline silicon systems, thin-film CdTe cells have made major strides in recent years, thanks in part to research and development from the National Renewable Energy Laboratory (NREL). NREL has produced outstanding solar efficiency results in lab settings using CdTe, and other benefits include the smallest carbon footprint and lowest water usage during manufacturing, as well as the ability to achieve light-weight, large format designs that help maximize facade coverage and energy production. ELEMEX SPECIALIZES IN CERAMIC, ALUMINUM AND STONE EXTERIOR CLADDING SURFACES If asked who is leading the solar revolution, you wouldn’t be at fault to assume North America. In 1954, Daryl Chapin, Calvin Fuller and Gerald Pearson developed the first silicon cell capable of powering everyday electrical equipment via sunlight at Bell Labs, making the U.S. the original home of solar energy. Canada has produced some photovoltaic powerhouses as well, with Canadian Solar Inc. continually topping growth and revenue charts in the sector. Similarly, no one would bat an eye if you guessed Asia. It’s certainly likely that heavy hitting titans like LG, Kyocera, Panasonic and JinkoSolar are riding furthest ahead out on the edge of the solar wave. If not, then they are at least leading the manufacturing front by a country kilometer. Fascinatingly though, I would argue it is neither. For me, the future of solar is blooming in none other than one of Europe’s most notoriously creative culture centers: the Netherlands. In 1974, Dutch footballer Johan Cryuff carried the small European nation to the World Cup final in West Germany, introducing their concept of total football onto the world stage. Like a jazz band where members are capable of rotating instruments, the 1974 squad centered positional versatility among all its outfield players in its vision of the game. The result was an astonishing second place finish, a Golden Boot (best player) award for Cryuff, and a legacy that carries on in the highest levels of the sport today. The contemporary solar equivalent to this approach is Exasun. Headquartered in The Hague, Exasun is a design, manufacturing and installation company with a firm grasp on all the BIPV technologies we’ve discussed, coupled with a compelling vision for the future sustainability of the field. Through learning how to play all the positions, Exasun has developed a total solar approach that could serve as a model for all solar manufacturers moving forward. Products like their X-Roof have the potential of approaching residential mainstream adoption at a far greater pace than anything we are seeing in the U.S. today. When glancing through their past projects, you immediately get the sense that this type of integration is not only ingenious, but inevitable. It’s not the typical photo of a single luxury home or eco retreat with gorgeous solar tiles glistening by the coast. Rather, they feature blocks of multi-family housing in urban areas, elegant modern farmhouses in the countryside, and stunning solar façades that sweep across commercial structures. Exasun still offers standard-style PV panels (X-Glass), but are making waves with their new X-Roof design, specifically engineered for slanted roofs. X-Roof is equipped with rear contact cells and glass-panel technology that should deliver high efficiency yields for 30 years. Similarly, they also offer their own façade system and are preparing to launch X-Tile, which could feature a terracotta design that debuted at RAI Amsterdam in 2019. X-Tile is expected to debut in Q2 2021. To top it all off, Exasun is developing innovative offsets for the less beneficial side-effects of renewable energy. They were ahead of the pack in taking steps to eliminate many of the unnecessary toxins, such as lead, fluorine and cadmium, used in most solar panels today. On top of their 30-year warranty, their new cradle-to-cradle solution makes 90 percent recyclability of panels a possibility through dismantling at the part level for replacement, recycling and reuse. This future-minded approach is only going to help the renewable sector avoid repeating the mistakes of its predecessors, while allowing the company to keep up with the increasingly stricter new building efficiency regulations being put into practice by the Dutch government, as well as the EU. While cloudy days always still lie ahead, the 10-year solar forecast is remarkably bright. This can only be enhanced by taking a total solar approach to new building development, and engaging public and private interest in establishing new guidelines for new construction. Designing future-proofed solutions to limit negative impacts from the manufacturing cycle will hopefully encourage local production and more sustainable practices to maximize emissions offsets. Finally, transforming the future of energy is a collective effort reminiscent of landing a new rover on Mars, with the potential of helping to ensure our future residency on the Earth.
<urn:uuid:39822cc8-0425-4fbe-86ce-14e085d7a356>
CC-MAIN-2022-33
https://www.technologydesigner.com/2021/03/11/total-solar/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00206.warc.gz
en
0.930553
2,238
2.671875
3
The history of El Prat airport in the Spanish city of Barcelona traces back almost one hundred years to 1918, when a small airdrome was first constructed on the site of the modern airport. However, passenger flights in the contemporary sense of this term were not conducted at the beginnings of the airdrome’s existence; the first charter flights began to operate in 1927. In general, the history of El Prat de Llobregat airport reflects a chain of ever-evolving, global construction projects, additions, reconstructions, and transportation hub improvement plans. Among airports, this location always has operated at a high level. It was only a matter of time before the early airport became more comfortable and spacious. In the 1960’s, El Prat underwent its first significant renovation, during which its efficiency was increased and flights with new, major airlines were introduced. The first global airline to offer flights from the airport was Pan American, which launched connecting flights among Barcelona, Lisbon, and New York. As early as the beginning of the 1980’s, the airport in Barcelona, Spain, was receiving over four million passengers per year. The Olympic Games that Barcelona hosted in 1992 triggered a new wave of reconstructions and improvements in the already independent aeronautical space. These improvements to El Prat are considered to be another significant page in the history of the airport of Barcelona. Ricardo Bofill Levi, one of the most prominent architects of that period, was involved in the process of airport reconstruction. He was the architect to create and execute the new plans and supervise the construction works accordingly. As of today, the building of the airport of Barcelona, Spain looks like a series of waves with numerous crystal elements that intersect to resemble a plane. This shape provides aesthetic advantages both without and within; from the airport, visitors also can enjoy incredible views over the airplanes, while the interior of the building is characterized by smooth lines, ergonomics, and pleasant illumination. As for more practical information concerning the Barcelona airport, the key factors are as follows. El Prat is located 12 kilometers to the south-west of Barcelona in the municipality of El Prat de Llobregat, the area after which the airport was named. - The exact airport address is 08820 El Prat de Llobregat, Barcelona; - The phone number for 24/7 information is (+34) 902 40 47 04; - The email address is: email@example.com; - The airport website also contains plenty of useful information— www.barcelona-airport.com —available in Spanish, Catalan, and English; - The airport of Barcelona, Spain, is the largest airport in Catalonia and the second largest in Spain, second in terms of passenger traffic only to the Barajas airport of Madrid; - The airport code is BCN; - The airport consists of two terminals, Т1 and Т2. T1, the larger terminal (with 545,000 m2), began operating in 2009 and is included in the list of the largest buildings and constructions in the world (in 22nd position). T1 has five zones, A, B, C, D, and E, has 101 gates, and offers flights operated by the biggest international airlines; - Т2 is smaller and is the older terminal of El Prat. It occupies an area of about 150,000 m2 and has 48 gates. The second terminal includes the zones Т2А, Т2В, and Т2С. This terminal specializes mainly in domestic flights and services low-cost carriers; - There are three landing strips in the airport of Barcelona, Spain (each from 2,500 m to 3,300 meters long), two of which are made of asphalt and the third of concrete; - El Prat carries out both passenger and cargo air services. What services are provided in the airport of Barcelona, Spain The airport of Barcelona is a modern, innovative transportation hub that offers hundreds of services. It is a real challenge to memorize the location and features of all the services provided. Thus, the best option for visitors is to consult one of the information desks. The general contact number for all the information desks is +34 902 404 704. There are seven information desks in Т1 (tel.: +34 933 788 175), all of which are located on the first floor. In Т2, you can find the information desks at the arrival zone (tel.: +34 933 788 149). In Т2, one of the information desks also offers detailed information about the hotels in Barcelona. - The airport of Barcelona, Spain, offers its guests various options for car rentals. With this purpose, multiple car rental companies operate on the grounds of El Prat: “Europcar,” “Herz,” “Enterprise,” “Avis,” and “Solmar.” Their representative offices are located in both terminals (in Т1, every company has its own office, while in Т2, there are two offices, in zones В and С). The procedure for car rental is relatively easy and can be accomplished via Internet. The offices of the rental companies are open from 7:00 am until midnight. Below, you can find the contact information for the car rental companies: - Hertz: +34 90 201 1959 - Avis: +34 90 210 8495 - Enterprise: +34 935 219 095 - Europcar: +34 913 434 503 - The parking lots at El Prat have space for over 25 thousand cars. (Т1 has 13,000 parking spaces, and Т2 has 12,000 parking spaces.) To be able to use the parking lots, you should receive a parking receipt before the barrier upon entering. Also, it is recommended that you read about the rules and requirements of the parking lot in advance. The phone number for protected VIP parking is +34 93 297 1381. - Numerous ATMs and currency exchange services can be found throughout the airport. Currency exchange services are open every day from 7:30 am until 20:30. The bank branches can be found both in the T1 zone and the T2B zone. - Non-automatic luggage lockers in the airport of Barcelona, Spain, can be found in both terminals (on the “zero” floor) and are the property of the British company, “Excess Baggage.” In T1, the lockers are open around the clock, seven days a week, while in T2 there is a special schedule for the locker department, which is open from 6:00 am until 22:00. The maximum weight is 30 kilograms per piece of luggage (and the client pays individually for each piece of luggage). It is crucial not to lose the number tag issued at the time of placing the luggage in the locker to avoid penalty. The lost and found department’s phone number is +34 932 596 440, and it is located in Т1. - In the T2 zone, there is a post office. Visitors here also can take advantage of the Wi-Fi and charging device rental services in the area. - Apart from numerous shops, trade kiosks, restaurants, and cafes, El Prat features pharmacies, a 24/7 medical care center, a prayer room, tourist agency offices, and children’s play places. - If you are looking for hotels in the airport of Barcelona, Т1 has a 4-star hotel called Air Rooms. Such hotels as the Renaissance Barcelona Airport, Tryp Barcelona Aeropuerto Hotel, and Centre Esplai Hostel are also located in the close vicinity of El Prat (up to 3 kilometers away). How to get to the airport of Barcelona Barcelona airport transfer is a comfortable service that offers several options: - The first and most popular option is a taxi. You can take a taxi to get to the airport any time of day, from any city location. Should you need to return to Barcelona, it is possible to catch a taxi near the airport, for taxis stop regularly at the entrances to both terminals. The average travel time is 25-35 minutes by taxi (although it is best to clarify with the driver which terminal you need to reach). The average travel fee is 30-35 euros. The El Prat airport taxi services phone number is +34 93 303 3033. - The express bus, Aerobus, circulates every day at intervals of 5-10 minutes from Plaza de España and Plaza de Catalonia to the airport of Barcelona. This transfer option is much better in terms of price than a taxi, since you save a lot of money this way. A one-way ticket by bus costs about 6 euros. - Another answer to the question of how to get to the airport of Barcelona is to take bus #46. (A T10 ticket can be used on this route.) The main difference between this bus and Aerobus is the greater number of stops on the way to the city and the distinctive schedule of circulation between 4:50 am and 23:50. - NitBus is a nocturnal bus that travels between T1 of the Barcelona airport and the center of the city and operates from 21:55 until 4:45 am. The ticket fee is slightly over 2 euros, and you can use a T10 travel pass as well. - A RENFE train is another convenient and cheap option for transfer to the airport of Barcelona. The train departs every half an hour, with a travel time of about 20 minutes to the airport. You can take a train from Clot, Passeig de Gràcia, or Barcelona Sants to the station called Aeropuerto. For more information, please contact +34 91 232 0320. - The L9 Sud metro line with two stops (at each of the two terminals) connects Barcelona center with El Prat. You can purchase a ticket for this metro trip in the terminals at the station; the price is 4.5 euros. “INEEDSpain” service center provides its clients with a wide spectrum of services, including the organization of trips to Spain. Among many other options, our specialists will help you to arrange the most comfortable mode of transfer to and from the airport, book or buy your tickets at the best prices, and help transform your journey into a unique and enjoyable experience.
<urn:uuid:78c1f786-e7e5-4e26-a156-2172bf98ae64>
CC-MAIN-2022-33
http://ineed.es/en/pedia/article/576597
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00005.warc.gz
en
0.946264
2,187
2.671875
3
This exams the artifact found from my earlier post Examining Maptiles from iOS. This is part of my thesis for my master's of Digital Forensics Sciences at Champlain College. You can download the complete thesis: PDF SQL, or Structured Query Language, was standardized in 1986 and 1987 by American National Standards (ANSI) and International Organization for Standardization (ISO) respectively . SQL provides the language to retrieve and store data inside of databases. SQLite uses SQL (as well as many other database software) to provide “an in-process library that implements a self-contained, serverless, zero-configuration, transactional SQL database engine” . SQLite databases are everywhere in Android devices, iOS devices, and web applications. Nemetz et al. examined six different software packages with 77 different database files and found widely different parsing between each software and database pair. For example, Nemetz et al. found nearly every program contained errors if the database contained special encapsulation characters in some situations and failed to display certain types of text encodings [11, sec. Keywords& Identifiers, sec. Encodings]. In addition, most forensic software today has trouble parsing SQLite databases requiring special programming scripts to parse them. Blobs are binary large objects which can be stored both in a database and in the file system. Developers can store just about any kind of object within a blob such as jpegs, pngs, iOS plists, XML, json, or other objects. Generally, most software parsing databases with embedded blobs do not parse because of the different types of blobs. Similarly to SQLite databases, blobs need to be handled on a case by case within the application. Steve Job reveals the iPhone 1 at MacWorld 2007 showing it to be a multi-usable device--an iPod, a Phone, and an Internet Communications device; "It’s the internet in your pocket, for the first time ever, " stated Steven Jobs at the MacWorld 2007 where he had no idea how his simple device would be used today [12, para. 14]. Five years later at WWDC 2012, Apple released Apple Maps replacing Google Maps and similar services on iPhones [12; 16, para. 1]. Mobile phones continue to expand around the world with a growing number of features and applications being used on them. With every iOS version released and every version, software updates change where information is stored. Heather Mahalik, senior SANS instructor for FOR585 (Advanced Smartphone Forensics), explains changes between iOS 10 to iOS 11 for Apple Maps. She noticed changes between the location of the basic history file, GeoHistory.mapsdata, for Apple Maps where it is generally no longer stored on the device; she notes, “the user must sync to iCloud or you will not find it” in the sync data pulled with Elcomsoft Phone Breaker [10, para. 20]. Apple Maps will also cache directions even if a user is not requesting them for future use and keep all the data for years within iCloud according to Mahalik’s research [10, para. 23]. Similarly, Core Location caching changed between iOS7 and iOS 13. Apple decided to store more data on the phone near each other in the cache directories in iOS 13. The Core Location daemon has been around since iOS 2.0 and supports geographic location and orientation of an Apple device . This research only examines the Core Location without correlating it to Apple Maps history files or other sqlite database files. Caching web applications may provide up to a 20% or more reduction of traffic by removing redundant data transfers when caching is properly implemented [13, sec. Abstract]. Qian et al. [13, sec. Web caching in cellular networks, para. 2] further explain the benefits of caching as lower monthly plans, better user experience, and better handset battery life. These three factors provide incentive for mobile applications developers to use caching for their applications. Since there is a high incentive for using caching, investigators need to always look for the data when the data is of likely value and is easy to acquire per NIST 800-86 . Caching data is not as volatile as memory where losing power to a computerized device will cause the information to be lost; however the longer the data sits on a device, the software on the device will delete the data during routine storage cleanup routines. Images used during this examination are from three different iPhones: - Josh Hickman’s iOS images from an iPhone SE running iOS 13.4.1 [7, sec. Description] - Champlain College DFS-550 iOS image from an iPhone 4 running iOS 7.1 - iPhone 6s running iOS 13.6 Each of the images were manually examined using a Windows 10 Professional (2004) virtual machine running DB Browser for Sqlite. The iPhone 6 was factory reset; then, bootra1n, a LiveCD running Void Linux providing a shell to run checka1n, was used to jailbreak the iPhone 6 . Jailbreaking the phone is required to gain access to the iOS file system and perform the extractions. Checka1n was used to install Cydia, a 3rd party application store, on the phone. Cydia provides the packages for OpenSSH server which was used for manual extraction of the database files. Method 1 - DB Browser for SQLite Acquisition of each of the databases was accomplished manually through copying the database files from each different image to the Windows analysis virtual machine using Filezilla, a free FTP solution. For iOS 7.1, the database files are located at Data\mobile\Library\Caches\MapTiles with only MapTiles.sqlitedb database being at this location [14, para. 3]. iOS 13.4.1 and 13.6 contain the same database with other files in Data\mobile\Library\Caches\com.apple.geod. Method 2 - iLEAPP iLEAPP written by Alexis Brignoni provides a complete toolkit written in Python 3 to parse iOS data such as Mobile Installation Logs, notifications, build info, wireless, cellular service info, screen icons, application state information, KnowledgeC, Powerlog, and more [5, sec. Features]. iLEAPP does not parse map tile cached information and other data within this research. iOS Forensics: iLEAPP Updates post explains the changes to iLEAPP which mentioned in my thesis Appendix A. The MapTiles.sqlite contains cache data which keeps a limited set of data for a limited amount of time. Analysing cache data requires capturing the files before their expiration date and time which can be days, minutes, or seconds depending on the cache’s application. MapTiles.sqlite and other files in newer iOS versions provide geolocation during an investigation even when applications are reset or removed. iOS 7.1 image retained only information within the MapTiles.sqlite database file and no other files created around with file; in contrast, iOS 13.X versions contain several different databases which will be examined below. Generation of Cached Data Due to the complexity of mapping caching, several different acquisitions of the database files were performed on the iPhone 6 (iOS 13.6) after performing different sets of tasks. The list below lists the tasks performed before each acquisition: - Task 1 -- Jailbroke phone using checkra1n - Task 2 -- Opened Apple Maps to examine a location with satellite images on and off. Closed Apple Maps. - Task 3 -- Opened Apple Maps without satellite images enabled. Examined two businesses: Lyfja and Orange Cafe: Espresso Bar in Reykjavik, Iceland. - Task 4 -- Opened Apple Maps without satellite images enabled. Searched for New York City. Examined Glendale Pharmacy in New York City. Closed Apple Maps. - Task 5 -- Installed Yelp. Examined Iceland, but no locations on map. Searched for New York City and Examined Da Claudio and Hole in the Wall businesses. Closed Apple Maps. After each task above, the Data\mobile\Library\Caches\com.apple.geod folder was copied and compared. iOS 7.1 contains only the MapTiles.sqlitedb; whereas, iOS 13.X contains several databases with different location information. The following sections explain what information is contained within each database; differences, if any, between iOS versions are noted in the sections. iOS 13.4 and 13.6 contain the same databases and structure while iOS 7.1 contains structure changes in the MapTitles.sqlitedb file. AP.db. The database appears to list different applications using the Core Location API. After each of tasks, com.apple.maps gets added to the mkcount table multiple times. Yelp is added to the mkcount table when it is run for Task 5. GeoConfigStore.db. This database lists each application which accesses location and mapping information. Included with the name of the application, the database lists four fields per entry: current count, type, expires, and last. MapTitles.sqlitedb. This database contains the map tiles information which includes the vector images and satellite. Figure 1 and Figure 2 show the differences between iOS 7 and iOS 13.X table structure. The columns ‘a’, ‘b,’, ‘c’, and ‘d’ or ‘key_a’, ‘key_b’, ‘key_c’, and ‘key_d’ in either database seem to contain longitude, latitude, zoom, and other information. The data in these fields appear to be encoded in a non-standard format. Yogesh Khatri (personal communication, August 10, 2020), Champlain College professor and author of Swift Forensics blog, came to the same conclusion when examining the database from iOS 13.4.1. The titleset column references some number in relation location in the application; rows which have the same titleset numbers are adjacent or near each other. The data column contains at least four different types of blobs: VMP4 blobs also contain location street and place names within the area of the map viewed (Figure 3). Task 5 shows that Yelp does update the map tiles database similarly to Apple Maps. However, Yelp does not have a satellite view option so there are no embedded images within the database rows. PDPlaces.db. This database holds the list of places viewed from some applications. Apple Maps viewed locations from Task 3 and Task 4 show up on this database as shown in Figure 4. Yelp does not update this list when viewing locations within the application. On the pdplaces table, blobs contain text with location information which is reflected on the location cards in Apple Maps. Stitching Map Tiles Together JPEG Map tiles are 256 x 256 pixels in size. Each of these tiles can be processed to show a small section of a map. There are several methods that may be used to stitch these tiles into a single image which are explained below. Manually Stitching. Manually matching up the image sides and generating a single image can be quickly accomplished due to the size and number of tiles an examiner would extract. Exporting the JPEG images from the MapTitles.sqlite database’s image provides a list of tiles shown in Figure 5. Using any application to match the tiles up such as Microsoft PowerPoint, Adobe Photoshop, or GIMP provides the end result in Figure 6. The exporting and stitching of the images is the same for iOS 7.1 and iOS 13.X. Automatic Stitching. Each titleset represents a single area of the map. As shown above, stitching the images together provides more context per tileset. OpenCV, or Open Source Computer Vision Library, is “an open-source library that includes several hundreds of computer vision algorithms” for image processing, video analysis, camera calibration, 3d reconstruction, object detections and other features 8, paras. 1 & 2. Rokas Balsys [3; 4] explains how to use version 18.104.22.168 of the open-contrib-python library to stitch together two images. Opencv-contrib-python, at the time of this writing, is version 22.214.171.124 contains major improvements over the previous 3.x versions. OpenCV provides the python bindings that may help in automating the process of stitching the images together and providing better context for investigators. Volatile data continues to give insight to computerized devices even when users of those devices attempt to hide or modify the stored data. The life span of this data remains short and needs to be captured as soon as possible. In this research, the com.apple.geod application was examined which stores map cache data for a short period. This data reveals pieces of satellite imagery when viewing Apple’s own map application, Apple Maps, and location information hidden with the binary data inside the MapTitles.sqlitedb file. Yelp, a business review application, also stores cache data in the same location as Apple Maps. Further research may reveal the connection between these applications and the application data and how long these applications store data within the cache. Deletion of applications may leave traces behind which was the case with Yelp, but other applications would need to be reviewed to see if the same observation is held. About SQLite. (n.d.). SQLite. Retrieved August 25, 2020, from https://www.sqlite.org/about.html Apple, Inc. (n.d.). Core Location. Apple Developer Documentation. Retrieved August 20, 2020, from https://developer.apple.com/documentation/corelocation Balsys, R. (2019, February 14). OpenCV image Stitching (Part 1). Learn Python Programming. https://pylessons.com/OpenCV-image-stiching/ Balsys, R. (2019, February 19). OpenCV image Stitching (Part 2). Learn Python Programming. https://pylessons.com/OpenCV-image-stiching-continue/ Brignoni, A. (2020). Abrignoni/iLEAPP [Python]. https://github.com/abrignoni/iLEAPP (Original work published 2019) Foxlet. (2020). Foxlet/bootra1n. https://github.com/foxlet/bootra1n Hickman, J. (2020). IOS 13.4.1 Image. http://downloads.digitalcorpora.org/corpora/cell-phones/ios_13_4_1/iOS 13.4.1 Extraction/iOS13-4-1-ImageCreation.pdf Introduction. (2020, August 22). [Wiki]. OpenCV. https://docs.opencv.org/master/d1/dfb/intro.html Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to integrating forensic techniques into incident response (NIST SP 800-86; p. NIST SP 800-86). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-86 Mahalik, H. (2018, March 30). First the Grinch and Now the Easter Bunny! Where is Apple Maps Hiding? [Blog]. Smarter Forensics. https://smarterforensics.com/tag/apple-maps/ Nemetz, S., Schmitt, S., & Freiling, F. (2018). A standardized corpus for SQLite database forensics. Digital Investigation, 24, S121–S130. https://doi.org/10.1016/j.diin.2018.01.015 Pierce, D. (2018, December 7). The Complete History of the iPhone—And What’s Coming Next. Wired: Illustrations by Radio. https://www.wired.com/story/guide-iphone/ Qian, F., Quah, K. S., Huang, J., Erman, J., Gerber, A., Mao, Z., Sen, S., & Spatscheck, O. (2012). Web caching on smartphones: Ideal vs. reality. Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services - MobiSys ’12, 127. https://doi.org/10/ggcc45 Spangenberger, J. (2020, August 2). Examining Map Tiles from iOS [Blog]. Cyber F?nix Tech. https://cyberfenixtech.blogspot.com/2019/10/examining-maptiles-from-ios.html SQL Introduction. (n.d.). W3 Schools. Retrieved August 25, 2020, from https://www.w3schools.com/sql/sql_intro.asp Vroegop, B. (2012, June 11). WWDC 2012: Apple kondigt eigen kaartendienst Maps met volledige navigatie aan. iCulture. https://www.iculture.nl/nieuws/wwdc-apple-kondigt-eigen-kaartendienst-maps-met-volledige-navigatie-aan-wwdc/
<urn:uuid:50d6ae31-cac2-4add-8c21-d5948ab9cd26>
CC-MAIN-2022-33
https://digitalforensics.io/ios-forensics-data-hidden-within-map-cache-files/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00406.warc.gz
en
0.850405
3,740
2.875
3